Describe the steps to get the output

Assignment Help Operating System
Reference no: EM131955702

Assignment: Operating Systems

Examining mechanism to visualize memory pages of common programs in Linux:

On Linux systems /proc/<pid>/maps file shows information about pages in each memory region.

In this assignment, you are required to examine the output of /proc/<pid>/maps for common programs and explain the role of each field displayed in the output. You will write a report describing and explaining each step of your task.

Project requirements:

Since you have to examine actual Linux kernel, it is recommended that you install a virtual machine (something like VirtualBox) on your computer and install some version of Linux on it (if you install Linux on hardware (dedicated computer) you may skip the VM steps). The steps (assuming VM involved) are:

1. Installation of virtual machine and Linux

a. Indicate the version of VM and Linux used
b. Describe actual steps performed for both tasks so that replicating the steps would return the same result as yours.
c. You may provide screenshots together with the description

2. Select 5 common programs on your system and give brief details about them

a. You can use utilities like ‘application manager',‘task manager' or ‘top' to identify the processes. You may add a screenshot as well to identify the programs.

3. Display output of /proc/<pid>/maps for each of the selected 5 programs.

a. Describe the steps (commands to be executed, or tasks to be performed) to get the output. You may add screenshot of the output you got.

b. Explaining the information (role of each field) in the output obtained.

[The following task may require knowledge of C programming at kernel level.]

Modify the kernel to show additional information about pages in each memory region. You need to add a string that represents the pages in the region. An ‘x' is used if the page is absent. If present, then a single digit (1 - 9) if the page reference count is below 10, or a ‘*' otherwise.

Provide a brief description of your modification task. Submit a document displaying the original kernel code andyour modifications, with corresponding output. You may copy-paste the code segments. To display modified output, include screenshots in your report.

Reference no: EM131955702

Questions Cloud

What evidence might undermine twains argument : How does the following passage from another part of Twain's essay support the central claim he makes in the first and longer excerpt?
Calculate the annual deposit : Calculate the annual deposit. FV (deposits) = PV (tuition payments). Calculate the amount needed if only equal annual deposits are made on birthday's 5-10.
Calculate the speed of the masses at the end : Total work done on the systems Use work energy method to calculate the speed of the masses at the end
Create presentation highlighting key elements of formulation : Create a 5-8 minute video presentation highlighting key elements of the formulation, implementation, and evaluation of the strategic plan that you've written
Describe the steps to get the output : Describe the steps (commands to be executed, or tasks to be performed) to get the output. You may add screenshot of the output you got.
How much would you have to invest for each year : Your child will attend college for 4 years, starting 3 years from now. His tuition will be $12,000 per year for each of the four years.
Maximum spacing between lines on this grating : The entire first order is observed, but no second order spectrum is seen. What is the maximum spacing between lines on this grating?
Level of income will ryan need in first year of retirement : What percentage of his income does Ryan need to set his contribution rate to? What level of income will Ryan need in his first year of retirement?
What is the firm cost of equity : Chelsea Fashions is expected to pay an annual dividend of $1.10 a share next year. The market price of the stock is $21.80 and the growth rate is 4.5 percent.

Reviews

Write a Review

Operating System Questions & Answers

  Represent the ownerships and permissions

Represent the ownerships and permissions shown in this UNIX directory listing as a protection matrix.

  The dining philosophers problem

Assume the Dining Philosophers problem. Explain the problems and assess what will happen if we allow the following code:a) Pick up chopstick on right, If chopstick on left is free, take it; else drop right chopstick. When done, drop both chopsticks.

  Question about deadlock

A system has five active procedures(A-E) and one type of resource, which there are two-hundred total unites available in the system.

  Can a dll be mapped into two process virtual address spaces

Can a DLL be mapped into two process' virtual address spaces at different virtual ad- dresses? If so, what problems arise? Can they be solved? If not, what can be done to eliminate them?

  What is the subnet mask

Give the network number, local broadcast and the usable IP address ranges for the 5000th, 50000th & 150000th networks

  State the proper syntax needed to configure the routers

Given the physical topology below, state the proper syntax needed to configure the routers and the computers included in the topology.

  Explain in detail at least four types of system programs

Explain in detail at least four types of system programs. Describe in advantages a time-shared operating system has over a non-time-shared operating system.

  Implement a paged memory allocation scheme

Create a memory allocation program that determines the number of frames that are needed by a requesting client and assigns pages to available frames using a client-server architecture.

  Define the necessary components and functions of a linux os

Define the necessary components and functions of a Linux operating system. Discuss 3 mechanisms that are available to secure a computer system.

  Address how the selected operating system would be used

Write a paper that describing the OS you chose. Address how the selected operating system would be used in your business or another business environment.

  Indetify four security strategies used for firewalls

Identify and explain four security strategies used for firewalls. Which two would you favor implementing, and why?

  Prepare a plan for utilizing active directory

Prepare a plan for utilizing Active Directory and Group Policy Objects to achieve the goals of setting secure permissions on business unit resources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd