What deadlock mean and give examples of deadlock

Assignment Help Operating System
Reference no: EM132334612

OPERATING SYSTEM II

General Objectives:

On Completion of this course the student should be able to:

1.0 Understand memory management technique.

2.0 Understand issues involved in virtual memory systems.

3.0 Understand file management in operating systems.

4.0 Understand additional processor scheduling Techniques.

5.0 Know how to deal with deadlocks simulation computing.

6.0 Understand implementation of various resource management techniques in real life operating system.

1-2 To understand:

Various main memory management techniques.

To Explain

The following memory management: swapping, fixed partition, paging, segmentation

3-4 To understand:

The strength and weakness of each technique.

To explain:

The advantages and disadvantages of the memory management technique and Give examples of real life OS in which the technique have been implemented.

5 To understand:

The concept of Virtual memory in an operating system.

To explain: Virtual memory

The need for virtual memory.

How virtual memory is implemented

Name the virtual memory techniques.

6-7 To Understand:

Demand paging technique, the various page reflect algorithm, and speechify the strength and weakness of each technique.

To explain:

The demand Paging technique.

Page replacements algorithm LRU, FIFU, second chicues, Not-recoding used, optimal etc. and

To State the:

Advantage and disadvantages of the page replacement algorithm.

8-9 To understand:

The concept of file system and its management in an  Operating System.

To explain:

Files and directory.

common file operation e.g. creation delete, update etc.

File management techniques.

Security and protection mechanism on files.

File system implementation in specific OS e.g. Urax, MS-OOS, Windows, etc.

10-11 To understand:

Processor scheduling techniques.

To explain:

Multi level queuing schedule.

The Real time active scheduling.

Scheduling and dispatching in a multiprocessor system.

Necessity of codes in a multiprocessing system.
 
12-13 To understand:

Deadlock occurrence in computing, and the methods of deadlock avoidance, previous and defect.

Explain

• What deadlock mean and give examples of deadlock.

• condition for deadlock.

• method of deadlock prevention.

• method of deadlock avoidance

• technique of Deadlock detection.

14-15 To understand:

Resource management techniques in an operating system.

To Explain:

Implementation technique employed in managing processor, main memory, the drive and information in operating system like UNIX, MS-DOS Windows, etc.

Reference no: EM132334612

Questions Cloud

System for storage and processing of big data : Your company has decided to adopt a NoSQL database management system for storage and processing of big data. You have been asked to investigate alternative NoSQ
Describe primary threats that compromise organization data : Describe at least 2 primary threats that could compromise the organization's data. Describe how the encryption methodologies that should be implemented.
Regress GDP per capita on the number of patents : Need help with data analysis in Stata for a master's thesis topic - Innovative activity in East-Central and Eastern Europe during the early 20th century"
What are the best practices in terms of sharing knowledge : What are the best practices in terms of sharing knowledge between the different levels. especially in large, complex organizations like academic medical centers
What deadlock mean and give examples of deadlock : COM 321-OPERATING SYSTEM II -What deadlock mean and give examples of deadlock. condition for deadlock. method of deadlock prevention.
Difference between transport mode and tunnel mode : What is the difference between transport mode and tunnel mode? What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?
What is a trusted computing base : Min of 350 words. APA format. What is a trusted computing base? List at least 3 limits and three benefits of implementing a trusted computing base.
Explain the key objectives of the communications plan : You are a member of the Human Resources Department of a medium-sized organization that is implementing a new inter-organizational system that will impact employ
What kinds of publics does this style of art appeal to : What does it mean if the piece is in your local gallery/coffee house vs. an institution or elsewhere and Why do you like the piece? What kinds of publics does

Reviews

Write a Review

Operating System Questions & Answers

  Establish shared-memory object between parent and child

the child process must output the sequence of numbers generated from the algorithm specified by the Collatz conjecture because the parent and child have their own copies of the data.

  Discuss about the windows and unix file management systems

Evaluate the ease of use and efficiency of using both Windows and Unix file management systems.

  How will dns be accessed by the lsdg systems

How will systems receive IP addresses? Explain. How will DNS be accessed by the LSDG systems? Explain. Explain how files on the network may be accessed by LSDG.

  Disk scheduling algorithm

Simulation of Elevator and Shortest Seek Time First

  Demonstrate competency in use of a command line interface

MN404 - Fundamentals of Operating Systems and Programming - Assignment-1: Role of Operating Systems and Command Line Interface (CLI)

  Write a symbol table package consisting of two routines

Write a symbol table package consisting of two routines: enter(symbol, value) and lookup(symbol, value). The former enters new symbols in the table and the latter looks them up. Use some form of hash coding.

  Clarity of methods and assumptions

Application of relevant course concepts, tools and frameworks use of evidences, engagement with the literature.

  Analyze video game-type interfaces and discuss three 3

describe the three 3 principles of direct manipulation and give examples as to how they are used in video game

  Developing ipv6

What is the primary reason for developing IPv6

  About methodology and new literature discovered

Update can include information about methodology, new literature discovered, or even questions regarding current progress.

  Explain significane of the operating system

What is the significane of the operating system (OS)? What reasons would the computer user have to change from one OS to another?

  Program to test the class myarray

Create and implement the class myArray that solves the array index out of bound problem and also permit the user to start the array index starting at any integer, positive or negative.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd