New Assignments
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04
Week_05_Assignment_05Week_05_Assignment_05
Week_06_Assignment_06Week_06_Assignment_06
Week_07_Assignment_07Week_07_Assignment_07
Week_08_Assignment_08Week_08_Assignment_08


Sl.No Chapter Name MP4 Download
1Intro to the CourseDownload
2Introduction to OSDownload
3PC HardwareDownload
4From Programs to ProcessesDownload
5Sharing the CPUDownload
6IntroductionDownload
7Virtual MemoryDownload
8MMU MappingDownload
9SegmentationDownload
10Memory Management in xv6Download
11PC BootingDownload
12Week 3 IntroductionDownload
13Create Execute and Exit from ProcessesDownload
14System Calls for Process ManagementDownload
15InterruptsDownload
16Interrupt HandlingDownload
17Software Interrupts and System callsDownload
18CPU Context switchingDownload
19CPU SchedulingDownload
20Priority Based Scheduling AlgorithmsDownload
21Multi-Processor SchedulingDownload
22Scheduling in LinuxDownload
23Completely Fair SchedulingDownload
24Inter Process CommunicationDownload
25SynchronizationDownload
26Software solutions for critical sectionsDownload
27Bakery AlgorithmDownload
28Hardware LocksDownload
29MutexesDownload
30SemaphoresDownload
31Dining Philosophers ProblemDownload
32DeadlocksDownload
33Dealing with DeadlocksDownload
34Threads Part 1Download
35Threads Part 2Download
36Operating system securityDownload
37Information Flow policiesDownload
38Buffer OverflowsDownload
39Preventing Buffer Overflow AttacksDownload

Sl.No Chapter Name English
1Intro to the CourseDownload
Verified
2Introduction to OSDownload
Verified
3PC HardwareDownload
Verified
4From Programs to ProcessesDownload
Verified
5Sharing the CPUDownload
Verified
6IntroductionDownload
Verified
7Virtual MemoryDownload
Verified
8MMU MappingDownload
Verified
9SegmentationDownload
Verified
10Memory Management in xv6Download
Verified
11PC BootingDownload
Verified
12Week 3 IntroductionDownload
Verified
13Create Execute and Exit from ProcessesDownload
Verified
14System Calls for Process ManagementDownload
Verified
15InterruptsDownload
Verified
16Interrupt HandlingDownload
Verified
17Software Interrupts and System callsDownload
Verified
18CPU Context switchingDownload
Verified
19CPU SchedulingDownload
Verified
20Priority Based Scheduling AlgorithmsDownload
Verified
21Multi-Processor SchedulingDownload
Verified
22Scheduling in LinuxDownload
Verified
23Completely Fair SchedulingDownload
Verified
24Inter Process CommunicationDownload
Verified
25SynchronizationDownload
Verified
26Software solutions for critical sectionsDownload
Verified
27Bakery AlgorithmDownload
Verified
28Hardware LocksDownload
Verified
29MutexesDownload
Verified
30SemaphoresDownload
Verified
31Dining Philosophers ProblemDownload
Verified
32DeadlocksDownload
Verified
33Dealing with DeadlocksDownload
Verified
34Threads Part 1Download
Verified
35Threads Part 2Download
Verified
36Operating system securityDownload
Verified
37Information Flow policiesDownload
Verified
38Buffer OverflowsDownload
Verified
39Preventing Buffer Overflow AttacksDownload
Verified
Sl.No Chapter Name Tamil
1Intro to the CourseDownload
2Introduction to OSDownload
3PC HardwareDownload
4From Programs to ProcessesDownload
5Sharing the CPUDownload
6IntroductionDownload
7Virtual MemoryDownload
8MMU MappingDownload
9SegmentationDownload
10Memory Management in xv6Download
11PC BootingDownload
12Week 3 IntroductionDownload
13Create Execute and Exit from ProcessesDownload
14System Calls for Process ManagementDownload
15InterruptsDownload
16Interrupt HandlingDownload
17Software Interrupts and System callsDownload
18CPU Context switchingDownload
19CPU SchedulingDownload
20Priority Based Scheduling AlgorithmsDownload
21Multi-Processor SchedulingDownload
22Scheduling in LinuxDownload
23Completely Fair SchedulingDownload
24Inter Process CommunicationDownload
25SynchronizationDownload
26Software solutions for critical sectionsDownload
27Bakery AlgorithmDownload
28Hardware LocksDownload
29MutexesDownload
30SemaphoresDownload
31Dining Philosophers ProblemDownload
32DeadlocksDownload
33Dealing with DeadlocksDownload
34Threads Part 1Download
35Threads Part 2Download
36Operating system securityDownload
37Information Flow policiesDownload
38Buffer OverflowsNot Available
39Preventing Buffer Overflow AttacksNot Available


Sl.No Language Book link
1EnglishDownload
2BengaliDownload
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiDownload
8TamilNot Available
9TeluguNot Available