Explain basic concept of process management in unix kernel

Assignment Help JAVA Programming
Reference no: EM131251021

Program 1

Objective:

This program assignment is provided to let the students know how to handle threads and enhance system availability on a multiprocessor or multicore environment. A single process is supposed to create multiple threads with runner functions which include individual threads roles. Threads can be created by using Pthreads API, Win32 API, or Java API. on Unix/Linux or Windows platform environment.

Environment: Unix/Linux environment (VM Linux or Triton Server), Windows platform

Language: C, Java

Requirements:

i. You have wide range of choices for this assignment. First, design your program to explain the basic concept of the process management in Unix Kernel. This main idea will be evolved to show your understanding on inter-process communication, file processing, etc.

ii. Refer to the following thread API:

- pthread_create(), pthread_join(), ...

• - https://www.yolinux.com/TUTORIALS/LinuxTutorialPosixThreads.html

• - CreateThread(), CloseHandle(), ResumeThread(), ...

• - https://www.relisoft.com/win32/active.html

• - https://www.codeproject.com/Articles/5542/Simple-Multithreaded-Application-in-pure-C-Win32-a

• - https://msdn.microsoft.com/en-us/library/windows/desktop/ms684847(v=vs.85).aspx

• - https://msdn.microsoft.com/en-us/library/windows/desktop/ms682516(v=vs.85).aspx

- Thread handling with Java API
- https://docs.oracle.com/javase/tutorial/essential/concurrency/procthread.html
- https://docs.oracle.com/javase/7/docs/api/java/lang/Thread.html
- https://www.wideskills.com/java-tutorial/java-threads-tutorial

iii. The program should create at least two different threads and assign corresponding runner functions with the threads.

iv. The output should contain the screen capture of the execution procedure of the program.

v. Runner function may contain any logic you've designed, for example login procedure by opening session, collection of bank account information, catalog information display, audio/image data handling, etc.

vi. Result should be organized as a document which explains the overview of your program, code, execution results, and the conclusion including justification of your program, lessons you've learned, comments, etc.

Note:

i. Before you include Pthread API in your c source code,

- #include<pthread.h>

ii. To compile the code written in Pthread API,

- gcc -lpthread -o threadtestthreadtest.c

Program 2

Please write a simulation program which assumes a number of virtual pages of a process(es) and frames of physical memory.

Your program replaces pages according page faults caused by invalid access to pages.

You have to generate random number of page accesses from the simulator.

You need to show the snapshot of page tables/tlbs and physical memory allocated to each process.

Graphical User Interface may be considered as for maximum credits.

Program source file, execution snapshot with program execution sequence and optional document should be submitted with a single zip file.

[Original Direction for Program Assignment ]

Virtual Memory Handling (Demand Paging and Page Replacement)

Reference no: EM131251021

Questions Cloud

Determine the e-r for the proposed system : Determine the E-R for the proposed system. Provide the timeframe for delivering the solution to the project. Proposed system Interfaces and Dialogues prototype including forms and reports.
Auditor for wartz limited : MQ Chartered Accountants (MQ) was the auditor for Wartz Limited (Wartz) for the financial year ending 30 June 2016. In August 2016, Downtown Limited (Downtown) made a successful takeover offer of Wartz Limited based on the unqualified 2016 audit r..
How do elderly people respond to exercise training compared : From a public health standpoint, why is there so much attention paid to increasing a sedentary person's physical activity by a small amount rather than suggesting strenuous exercise? How do elderly people respond to exercise training compared to yo..
Identify one step in the attack that used social engineering : Identify one step in the attack that exploited a local vulnerability. This is the most common type of vulnerability exploited in the attack. Identify one step in the attack that used social engineering
Explain basic concept of process management in unix kernel : You have wide range of choices for this assignment. First, design your program to explain the basic concept of the process management in Unix Kernel.
Production function of a perfectly competitive firm : Given the Production Function of a perfectly competitive firm, Q = 160L + 18L2 - L3, where Q = Output and L = labor input a. At what value of L will Diminishing Returns take effect? b. Calculate the range of values for labor over which stages I, II, ..
State clearly investment in the riskless cash fund : Obtain Hypatia's new allocation of her inheritance to the (now) six funds.  - State clearly investment in the riskless cash fund and describe in detail the tangency portfolio.
How social media influenced the 2016 presidential elections : Based upon the articles above, how has social media influenced the 2016 presidential elections? Has this influence been positive or negative? You MUST cite specific examples from the articles in response to these questions. Points will be deducted..
Market basket of goods and services cost : In 2009, a market basket of goods and services cost $100 in Maryland; the same basket cost $200 in Berryland. In 2010, the cost in Maryland was $150 and in Berryland it was $225. Based on that information, which of the following statements is true..

Reviews

Write a Review

JAVA Programming Questions & Answers

  What would be an incorrect way of writing this equation

Jim develops 5 Java applications a year. Joe develops 10 Java applications a year. Jim gets paid $5000.00 per application, but Joe gets paid $10000.00 per application.

  Write java program to store employee id number

Use employee data file called employees.txt should comprise at least 5 employee records. Each record stores employee ID number (six digits) last name, first name, middle inital,gender(m or f).

  One-dimensional array to solve the

In C#, Use a one-dimensional array to solve the following problem. A company pays its salespeople on a commission basis. The salespeople each receive $200 per week plus 9 percent of their gross sales for that week. For example, a salesperson who gros..

  Overriding the equals method

Use the equals method, which Player inherits from the Object class, to determine whether two players are the same. Are the results what you expect?

  Write a program that creates an apartment object and prompts

Create a structure named Apartment that contains data fields to hold the number of bedrooms, the number of bathrooms, and the monthly rent for the apartment.

  Write an if statement that uses the flag as the condition

Write an if statement that uses the flag as the condition. Remember that the flag is a Boolean variable, therefore is true or false. It does not have to be compared to anything.

  How are java source code files named

What is the purpose of the wait(), notify(), and notifyAll() methods? How are Java source code files named?

  Class to initialize values

Create a constructor that allows a user of the class to initialize values. Also create a method named SetJustSold()(Hint ++) that increments the number of hot dogs the stand has sold by one and should also increase the TotalSold by one

  Write program to keep track of a hardware stores inventory

Write a program to keep track of a hardware store's inventory. The store sells various items. For each item in the store, the following information is kept: item ID, item name, number of pieces in stock, manufacturer's price of the item, and the s..

  Write a program to track hourly employee departure

A company hires you to write a program to track hourly employee arrival and departure times from work. In essence, you are tasked to make an online time clock.

  Strong authentication can also risk availability

Strong authentication can also risk availability. A simple example is that forgetting your password denies you access to that which required a password. Sometimes the stakes are high, for example, if a network administrator is the only one who knows ..

  Chat facility using java

Develop an intranet based email server with user registration, user login, inbox, compose mail and chat facility using java, JSP, MS Access/MySQL, JDBC etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd