Api the system-call interface and the operating system

Assignment Help Operating System
Reference no: EM13935967 , Length: 2480 Words

Chapter 2:

1. There are two different ways that commands can be processed by a command interpreter. One way is to allow the command interpreter to contain the code needed to execute the command. The other way is to implement the commands through system programs. Compare and contrast the two approaches.

2. Describe the relationship between an API, the system-call interface, and the operating system.

3. What are the advantages of using a higher-level language to implement an operating system?

4. Explain why a modular kernel may be the best of the current operating system design techniques.

Chapter 3:

1. Explain the purpose of external data representation (XDR).

2. Explain the concept of context switching.

3. Ordinarily the exec() system call follows the fork(). Explain what would happen if a programmer were to inadvertently place the call to exec() before the call to fork().

Chapter 4:

For chapter 4, you may complete any two of the first three exercises. You must complete the two exercises marked required.

1. What are the two different ways in which a thread library could be implemented?

2. List the four major categories of the benefits of multithreaded programming. Briefly explain each.

3. Multicore systems present certain challenges for multithreaded programming. Briefly describe these challenges.

4. Distinguish between data and task parallelism. (Required)

5. Describe how OpenMP is a form of implicit threading. (Required)


Chapter 5

1. Explain two general approaches to handle critical sections in operating systems.

2. Write two short methods that implement the simple semaphore wait() and signal() operations on global variable S.

3. What is the difference between software transactional memory and hardware transactional memory?

4. Assume you have a function named update() that updates shared data. Illustrate how a mutex lock named mutex might be used to prevent a race condition in update().


Chapter 6

1. What effect does the size of the time quantum have on the performance of an RR algorithm?

2. Explain the process of starvation and how aging can be used to prevent it.

3. Describe two general approaches to load balancing for processes.

4. What is deterministic modeling and when is it useful in evaluating a scheduling algorithm?


Chapter 7

1. Describe two protocols to ensure that the hold-and-wait condition never occurs in a system.

2. Describe a wait-for graph, compare it to a resource-allocation graph, and explain how it detects a deadlock.

3. What factors influence the decision of when to invoke a detection algorithm?

4. Name three issues that need to be addressed if a preemption is required to deal with deadlocks.

Chapter 8

Exercise 0 is an Extra Credit exercise.

0. What is the context switch time, associated with swapping, if a disk drive with a transfer rate of 2 MB/s is used to swap out part of a program that is 200 KB in size? Assume that no seeks are necessary and that the average latency is 15 ms. The time should reflect only the amount of time necessary to swap out the process.

1. Describe how a transaction look-aside buffer (TLB) assists in the translation of a logical address to a physical address.

2. How are illegal page addresses recognized and trapped by the operating system?

3. Briefly describe the segmentation memory management scheme. How does it differ from the paging memory management scheme in terms of the user's view of memory?

4. How is a limit register used for protecting main memory?


Chapter 9

1. Explain the sequence of events that happens when a page-fault occurs.

2. What is the equation that is used to compute the effective access time for a demand-paged memory system? Explain.

3. Explain the concept behind prepaging.

4. Why doesn't a local replacement algorithm solve the problem of thrashing entirely?

5. Explain how copy-on-write operates.

 

Chapter 10

1. What is the advantage of LOOK over SCAN disk head scheduling?

2. What are the factors influencing the selection of a disk-scheduling algorithm?

3. Describe two techniques that can enable multiple disks to be used to improve data transfer rates.

4. Describe an approach for managing bad blocks on a disk.

5. Describe how ZFS uses checksums to maintain the integrity of data.

Reference no: EM13935967

Questions Cloud

You are done meeting with the four vice presidents : You are done meeting with the four vice presidents, and Jared has called you into his office for a quick meeting to discuss next steps.
Bootstrapping problem : Bootstrapping Problem, One method used to obtain an estimate of the term structure of interest rates is called bootstrapping. Suppose you have a one-year zero coupon bond with a rate of r1 and a two-year bond with an annual coupon payment of C.
Issues in global marketing : Issues in Global Marketing. Major Project Requirements, The paper is expected to cover the recent issue Volkswagen has faced, further to the discovery that it had manipulated its system to pass emission tests. I am assuming all of you are aware of th..
International human resources management bhrm 9701 : International Human Resources Management BHRM 9701,  Term Project - Written Report and Presentation (15 %) Your team of up to four individuals (no exceptions) is required to research the human resources practices of a country other than the US in ord..
Api the system-call interface and the operating system : Describe the relationship between an API, the system-call interface, and the operating system. What are the advantages of using a higher-level language to implement an operating system?
What is the froude number : A trapezoidal channel with a bottom width of 4.00 feet and side slopes of 2 horizontal to 1 vertical conveys a discharge of 300 cfs. If the depth of flow is 2.25 feet, what is the Froude number? Is the flow subcritical or supercritical?
Research in the area of construction productivity : This project will be focused research in the area of construction productivity. The research is to explore the current state of the art within the subject area. Published research shall be examined to produce a paper evaluating work done within th..
Calculate profit and the value of ending inventory : Explain why, using variable costing, profit does not fluctuate from year to year.
Determine the pound amount of your profit or loss : Determine the pound amount of your profit or loss from buying a call option contract specifying C$100 000. Determine the pound amount of your profit or loss from buying a futures contract specifying C$100 000.

Reviews

Write a Review

Operating System Questions & Answers

  What kind of file security does linux provide?

What kind of file security does Linux provide?

  Medical management committees are convened for nearly all

medical management committees are convened for nearly all large health care systemsorganizations who determine which

  Disk requests arrive at the disk driver

Disk requests arrive at the disk driver for cylinders, 45, 97,21,43,11,69,81,8,55,14,78,74, and 7. A seek takes 5 milliseconds per cylinder moved. Assume that the arm starts initially at cylinder 50 and was moving downward.

  Eight servers running red hat linux

There are eight servers running Red Hat Linux (RHL) 7.3 and two running RHL 8.0.At this point, the two servers running version 8.0 are only test servers.

  Backup, restore and roll forward recovery in apache derby

The reason of this three page paper is to discuss, Backup, Restore, and Roll forward Recovery in Apache Derby. Backup and restore capabilities are key to ensuring data recoverability for any database management system.

  A computer has a cache, main memory, and a disk

A computer has a cache, main memory, and a disk. If a referenced word is in the cache, 20 ns are required to access it. If it is in main memory but not in the cache (called cache miss)

  Design a memory management scheme

Design a memory management scheme for a 64 bit architecture, using various types of paging and/or segmentation available. Then highlight its advantages and disadvantages. Your scheme must be different from your colleagues' schemes.

  Several key parts required

Calculate the total price based on several key parts required to build a state-of-the-art gaming computer. The user will have the option of selecting different parts.

  Central role of information systems in organisations

Information systems have become so integrated into the UK society and economy that the cashless society is a realistic possibility within the next 25 years.

  Value in managing security and risk

Explain ISO 27001's value in managing security and risk. What are the drawbacks and benefits for obtaining ISO 27001 certification?

  Autonomous intelligent software agents are used in

autonomous intelligent software agents are used in artificial intelligence to solve an increasing number of complex

  Example for processor scheduling

Give a (specific) example for processor scheduling in which preemption helps improve performance. Now discuss the feasibility of designing a preemptive disk scheduling algorithm for a disk read workload in which each job has the same priority. Do ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd