Create a server process that acts as a memory manager

Assignment Help Operating System
Reference no: EM13889273

Programming Assignment

Create a server process that acts as a Memory Manager that allocates valid memory requests (your server double checks that they are valid, meaning that a process cannot ask for more memory than is available, either to the entire system, or for the current run of this set of jobs) to frames for multiple clients as in Program #2. Every time a valid memory request is made, a PCB for that client is created and enqueued to the Ready Queue. When a memory request is made that is too large for the system memory, an error message is sent back to that client, and another client will be allowed to make a request.

When the Memory Manager declines a client request for memory because there are not enough remaining frames available, the server begins to act as CPU short-term scheduler for all of the processes that are now in Ready. The server manipulates the Ready Queue using a FCFS or a round-robin scheduling algorithm, depending on the choice of the server. The degree of multiprogramming will depend on the number of clients in the Ready Queue.

Each client sends the name of its private FIFO (or just the PID, depending on who creates the private FIFO), a memory request in terms of number of bytes, and a CPU burst to the server through the common FIFO. As before, the common FIFO is created and opened once, and receives one struct input per client, and will use the private FIFO to respond to the client. The server begins at time zero. A clock (simple counter) is incremented for the current client's entire CPU burst (FCFS) or for the system time quantum (round-robin). Each client will receive its assigned frames and its completion time through its private FIFO.

When all clients are finished, the server will calculate and report throughput, average turnaround time, and average wait time (time in Ready). You may calculate turnaround times and wait times as you wish as long as it is accurate...

Prepare your own test data. On paper, work through your data showing Gantt charts, turnaround times, and wait times. Use these same values for testing your program.

• Save your C program using Notepad, and name it with the .c extension.
• Input values and Output values with the screenshots of execution.
• Gantt charts which show results of a test run of your data. These may be hand-drawn, or computer-generated.


Attachment:- Program assignment.rar

Reference no: EM13889273

Questions Cloud

Optimality condition for maximization of utility function : What is the optimality condition for the maximization of the utility function U (x,y) = xy^3 and the prices (Px,Py) = (2,.0.5)? Using the utility function and optimality condition from the previous question, If M = 40  what are the utility-maximizing..
Discuss understanding of contract law : Discuss, incorporating your understanding of contract law, the following:- Whether a contract was formed. If so, when was it formed and who are the contracting parties. Bernard's legal position
Comparative advantage in manufacturing : Suppose that Home in a two-sector (i.e., agriculture and manufacturing) specific-factors model has a comparative advantage in manufacturing. If Home were to open up to trade, will Home’s workers be better off, worse off, or are we unable to say the i..
State the two ways that variable costs may be defined : Scott Winter asks your help in understanding the term "activity index." Explain the meaning and importance of this term for Scott. State the two ways that variable costs may be defined.
Create a server process that acts as a memory manager : Create a server process that acts as a Memory Manager that allocates valid memory requests to frames for multiple clients as in Program
Do you agree with the court of appeals ruling : In a narrative format, brief the U.S v. Leon case: detail the facts, issues and court holdings. Do you agree with the Court of Appeals ruling or the Supreme Court decision? Give a basis for your stance
Label the substitution effect and the income effect : A consumer consumes 2 goods (X and Y) and has convex indifference curves for the two goods. In period 1 the price of each good is 2 and the consumer’s income is 8. In period 2 income and the price of Y are constant, but the price of X declines to 1. ..
Evaluate how you believe company operates in relation to crm : Evaluate how you believe the company operates in relation to CRM, both operational and analytical. (For example: What are the customer touch points? How are customer enquiries over the web managed
The natural rate of unemployment never changes : Which type of unemployment is most likely to fall as a result of government policies that stimulate aggregate demand? The natural rate of unemployment never changes. Changing the discount rate is a tool of fiscal policy. Government demand-management ..

Reviews

Write a Review

Operating System Questions & Answers

  Time slot interchange switch

In a time slot interchange switch, eight input lines are scanned in sequence to build up an input frame with eight slots.

  List at least 5 significant differences between the two you

select two of the following os avoid combinations that your classmates have picked already windows unix andor linux mac

  Explain the sequence of events

Assume three values (x, y, and z) are stored in a equipments memory. Explain the sequence of events that lead to the computation of x+y+z.

  Network security principles

Explain a recent high profile computer security issue that you have heard of. Based on basic network security principles, how might the issue have been avoided?

  Can a register be use as the actual parameter in macro call

One way to do (static) linking is as follows. Before scanning the library, the linker builds a list of procedures needed. Can a register be used as the actual parameter in a macro call? How about a constant? Why or why not?

  Question about network security

Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?

  Most of the operating systems use a virtual memory manager

most operating systems use a virtual memory manager vmm whose responsibility is to manage the relationship between the

  Potential management plans for monitoring network activities

Discussion on potential management plans for monitoring network activities and maintaining security of the network.

  Program of law of total probability

Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.

  Rights to privacy

Determine what rights to privacy do people have when using the Internet at home? Are their privacy rights limited? Do those same rights and limits exist at work? Describe your view.

  Calculate which jobs will have arrived ready for processing

Compute the time-before-deadline for each incoming job and place it in the chart above. Give the order in which the six jobs will finish, and identify any jobs that fail to meet their deadline. It may help to draw a timeline.

  Describe the processes involved in the management

Identify and describe the processes involved in the management of the services, disk quotas and security of both Windows and UNIX operating systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd