Draw the architecture of the ready queue

Assignment Help Operating System
Reference no: EM132497887

Question 1: Discuss the differences between the OS Startup Procedure and the Bootstrap Procedure. In class we discussed "OS Start Up" and "The OS Boot-strap Procedure". Write a half-page or at most one-page typed essay that talks about the following points: (a) list all the steps in the OS startup procedure, (b) list all the steps in the bootstrap procedure, (c) why is it advantages to separate the "turning on of the computer" into these two different procedures, (d) identify a service that is launched at bootstrap and a service that is launched at OS startup, and discuss how these 'kinds" of services are fundamentally different from one another?

Question 2: Answer the following questions given this scenario:
Assume an operating system manages a CPU with 2 cores. Core alpha is used for "regular" processes, while core beta is used for "real-time processes. The OS uses kernel threads. Five kernel threads are used by alpha and one dedicated kernel thread is used by beta. Each executing process has a PCB and the PCB has a flag indicating whether it is a real-time process or not. There are 10 processes running at this moment. Two of the ten processes are real-time.
(a) Draw the architecture of the ready queue and populate it with the 10 processes (p0, p1, p9 - assume p8 and p9 are real-time).
(b) Describe, in a paragraph, how the kernel threads are shared with the processes.
(c) What problem do you expect, given this scenario, for the real-time processes?
(d) What thread model is being used in this case study?

Question 3: Assume we have the following situation: a ready queue is populated with 5 processes (p0,p1,p2,p3,p4). Process p0 is running. Process p1 is at the head of the queue and process p4 is at the tail of the queue, and the processes are all ordered, at the beginning, numerically. Process p0 is just about to start running. This is a time sharing OS where each process can use the CPU for a full quanta before it is returned round-robin to the ready queue. Assume there is no wait list. Assume there are no other interrupts or events effecting this case study. Assume all processes need to run for 5 quanta. Assume 100 quanta occurs in 1 second.
Answer the following questions:
(a) What is the throughput?
(b) What is the turnaround time (measured in quanta)?
(c) What is the wait time (measured in quanta)?
(d) Using Little's formula and assuming that new processes arrive on a regular basis after each 10 quanta, is this ready queue stable?

Question 4: In a virtual memory system, computing the real address from a virtual address needs to happen as quickly as possible, while at the same time respecting security issues. Given all the "Page Addressing' slides we looked at in this course, answer the following questions:
(a) Draw a flowchart (not a circuit diagram) that demonstrates how to convert a virtual address into a real address taking care of the following: protecting the OS code from pointer references, protecting other programs from pointer references from other processes, while NOT using a paging memory model.
(b) Repeat (a) but WITH a paging memory model.
(c) Draw the page addressing hardware that completely describes (b).
NOTE: In all your answers optimality is important.

Question 5: Assume a hard disk is formatted to store files in blocks. Assume it has a File Allocation Table that implements iNodes. Assume it has a bit string that implements free space.
Answer the following questions:
(a) Assume the free space bit string became corrupted. How can we rebuild it given this case study?
(b) If each block stores 10 bytes and we have a 100 byte file. Compare the run-time, using the number of times we need to access a block as our measure, between iNode file storage method and linked block storage method, if we want to get to the 90th byte
(c) What is the maximum size of a file in bytes, given each block can store 10 bytes and the iNode has 3 direct block pointers, 1 single indirect block pointer, and 1 double indirect block pointer. Each indirect block has 3 direct block pointers.

Reference no: EM132497887

Questions Cloud

ISY2005 Enterprise Systems Assignment : BISY2005/ISY2005/ISY205 Enterprise Systems Assignment Help and Solution - Australian Institute of Higher Education, Australia
How much value will be forgone : If the decision is made by choosing the project with the higher MIRR rather than the one with the higher NPV, how much value will be forgone?
How is a bond price determined : What are the advantages of issuing bonds over borrowing funds from a bank? What are the advantages of issuing bonds over issuing common stock?
What was the dividend yield : What was the dividend yield? You purchased a stock at a price of $44.36. The stock paid a dividend of $1.67 per share and the stock price
Draw the architecture of the ready queue : Draw the architecture of the ready queue and populate it with the 10 processes (p0, p1, p9 - assume p8 and p9 are real-time)
Prepare a report interest payable and bonds payable : Report interest payable and bonds payable as they would appear on the Sunray Management Ltd. balance sheet at December 31 2020.
What role does the fair value of the investment play : Show everything that SampsonSampson Inc. would report for the investment and any investment revenue in its year-end financial statements.
What amount should chewy report as chocolate inventory : Chewy's normal profit margin is 10% of sales. Under the LCNRV, what amount should Chewy report as chocolate inventory in its December 31 balance sheet?
Distribute the shares and print prospectuses : Consider a firm in the 40% tax bracket, which just paid a $ .47 dividend to common stockholders. If the firm estimates that the growth rate in dividends

Reviews

Write a Review

Operating System Questions & Answers

  Which declaration of x is the correct one for a reference

Assuming static scoping, which declaration of X is the correct one for a reference to X in the following

  Implement a memory manager that manages page reads

La Trobe University-CSE3OSA-OPERATING SYSTEMS AND COMPUTER ARCHITECTURE-Australia- Implement a memory manager that manages page reads.

  Explain the difference between a cpu-bound process

Explain the difference between a CPU-bound process and an I/O bound process in terms of the length of CPU burst and the length of I/O burst. Why is it important for the operating system to select a good mix of I/O bound and CPU bound processes?

  Saving the customer user accounts

A local beauty corporation has implemented a website to boost sales and awareness of products they manufacture. The website will contain data about the firm and all products available.

  How they are related in the context of a unix os

How they are related in the context of a UNIX operating system: userid (uid), groupid (gid), root user, and file access permissions.

  Describing the different types of operating systems

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone.

  Create an interface for automobile mechanics

Imagine you are managing a design project that will create an interface for automobile mechanics. when designing an interface for an automotive repair shop.

  Design a program to simulate the operation of the simmac

CISC 640 OS Problem Set. Design and implement a program to simulate the operation of the SIMMAC based on the descriptions above

  Determine major computer components

Suppose you have decided to buy a personal computer system for personal use and wish to be able to do the following tasks on the computer,

  Write an exception class called mortgageinputexception.java

Modify MortgageDisplayGui.java to try and catch for this MortgageInputException and upon error, report the Error to the user via a JoptionPane using the ERROR_MESSAGE and DEFAULT_OPTION constants provided by the JoptionPane class.

  Question about misused applications

Corporations sometimes buy expensive applications, and then under utilize these. In a sense, economic downturn has been beneficial, as many corporations are starting to more regularly

  Describe the four conditions of deadlock

BN104/BN104D Operating Systems Assignment. Deadlock and File Management: Describe the four conditions of deadlock in your own words

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd