Describe the difference between livelock and deadlock

Assignment Help Operating System
Reference no: EM132310695 , Length: word count:1000

Assignment Questions -

Q1. Figure 1 shows a tunnel going through a mountain and two streets parallel to each other-one at each end of the tunnel. Traffic lights are located at each end of the tunnel to control the cross flow of traffic through each intersection. Based on this figure, answer the following questions:

2250_figure.png

a. How can deadlock occur and under what circumstances?

b. Model the deadlock scenario of figure 1 using the deadlock graph and determine how deadlock can be detected.

c. Research "livelock" and describe it in your own words with example.

d. Describe the difference between "livelock" and "deadlock".

Q2. Research on integration of hardware, operating systems and application software and answer the following:

a. How do computer hardware, OS and application programs work together?

b. Discuss the steps involved with their interactions.

Q3. Reason out why are RAM memory capacities in powers of 2 and why don't hard disk and DVD discs follow the same norm? For instance, 512 KB, 512 MB, 1 MB, 2, 4, 8 MB.

Q4. Describe in your own words the purpose and applications of all user interfaces? Which one you would prefer and why?

Q5. On a disk with 1000 cylinders, number 0 to 999, compute the number of tracks the disk arm must move to satisfy all the requests in the disk queue. Assume the last request serviced was at track 345 and the head is moving toward track 0. The queue in FIFO order contains requests for the following tracks: 123, 847, 692, 475, 105, 376.

Answer the below questions for the following disk scheduling algorithms: FCFS, SSTF, SCAN and LOOK.

a. Draw a diagram for the arm movement.

b. Calculate the total number of tracks and the average number of tracks travelled by the head to satisfy the requests in Q5-a (Details of the calculations is essential).

Q6. Document the following UNIX commands (in clear and concise form):

  • chmod
  • Is
  • cp

Each of the above commands must be documented to the extent so that the reader of your report could understand how each command works, including the following points:

  • Brief introduction of the function of the command in your own words (in 2-3 sentences).
  • The basic syntax of the command, including options. Where appropriate, give a brief description in your own words of at least two options of the command.
  • At least two examples of the usage of the command that you have used in lab (provide screen capture).

Q7. As a matter of fact, operating systems are not designed to utmost perfection since at times they suffer from a number of problems. Such problems can be very inconveniencing if one is not familiar with the troubleshooting tools. Hence one should be aware of all these techniques which can resolve the problem so one can continue working without any problems.

What are the common operating system problems? Suggest and provide details of some trouble shooting tools that can be used. List 5 problems and 5 solutions to fix them.

Example:

Invalid boot disk - The invalid boot disk error message mainly appears when there is a problem with one's operating system's boot order. On receiving such a message, make sure that no USB device is plugged in since the BIOS might be configured to boot from external USB devices instead of the local drive. In addition, one can make modifications onto the BIOS configuration so as to modify the devices that should boot first on one's computer.

Fixboot - Fixboot command is used when one wants to create a new boot sector for the operating system. By using this command, one might want to write some new booting sector in a particular partition. When using this command, one might also require using the DISKPART command so as to identify the part or section of the disk one wants to write the new boot sector.

Please Note: Give references and cite the sources that you used for this task.

Reference no: EM132310695

Questions Cloud

Implement the specified behaviour of the pneumatic cylinder : Write a PLC program in LD to implement the specified behaviour of the pneumatic cylinder - Provide evidence in the form of appropriate, neat visualization
Support after software deployment : Support after Software Deployment" Please respond to the following:
Analyze predictive sdlc versus adaptive sdlc : Analyze predictive SDLC versus adaptive SDLC. Ascertain at least two advantages and two disadvantages of each approach. Provide a rationale for your response.
Third-party app stores but android devices : Why iOS devices cannot install applications from third-party app stores but Android devices can?
Describe the difference between livelock and deadlock : Research "livelock" and describe it in your own words with example. Describe the difference between "livelock" and "deadlock"
What are pros and cons of installation time permission : What are pros and cons of installation time permission scheme and run time permission scheme respectively? How does Android 6 change its permission scheme?
Coordinating and managing a project : When coordinating and managing a project, some of the greatest challenges can stem from the group's ability to work as a team.
Get a quote for the annual cost of insurance for business : It is a massage business plan for a shop in a shopping center just let you know, just fill some number taking a reference of massage center in Australia.
Differentiate block ciphers from stream ciphers : Differentiate block ciphers from stream ciphers and contrast symmetric from asymmetric cryptography. Illustrate with examples.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd