What is the main advantage of the micro-kernel approach

Assignment Help Operating System
Reference no: EM13968852

MICROCOMPUTER OPERATING SYSTEMS

1. When triggering a System call, it is needed sometimes to pass input parameters to the OS as part of the system call. Describe three general methods for passing parameters to the operating system.

4) What are the two models of interprocess communication? State one strength and one weakness of the two approaches?

a) Model of IPC:

Strength:                                      Weakness:

b) Model of IPC:

Strength:                                     Weakness:

3) Put the following "layers" in the right order, based on "calling sequence", when a user writes code in his program that requires a system call, and the code compiled and then executed.

1. System Call is made (_____)

2. Application Programming Interface (API) is used (_____)

3. User writes program code that requires a system call (e. g., I/O service). (_____)

4. System call interface intervenes (i.e., is being utilized/used) (_____)

4) It is sometimes difficult to achieve a layered approach if two components of the operating system are dependent on each other. Identify a scenario in which it is unclear how to layer two system components that require tight coupling of their functionalities.

5) What is the main advantage of the micro-kernel approach to system design?

6) How do user programs and system services interact in a micro-kernel architecture?

Reference no: EM13968852

Questions Cloud

Design a table describing the dimensions of culture : Design a table describing the five dimensions of culture proposed by Hofstede. Include the managerial implications of these dimensions and a comparison of Hofstede's findings with those of Trompenaars' and the GLOBE project team
What input parameters the function takes : What input parameters the function takes.  What results it returns to the calling program.  How it is called in the main.  Do not forget to create a prototype for it at the top of the program.
Describe the type of business you have created : The product or service, and general staffing plan. Provide a rationale for your plan.
Determine the timing a pendulum swing or a drop time : What do you conclude about the accuracy of your measurement technique - Define uncertainties Are they SD, SEM or confidence intervals? Always state the sample size.
What is the main advantage of the micro-kernel approach : What is the main advantage of the micro-kernel approach to system design? How do user programs and system services interact in a micro-kernel architecture?
What happens if you delay start of savings for 5 years : Once you add up all the future values from step 2 above, and do a time line to determine how much you will be able to spend each year assuming you are going to spend all your money
Components of effective communication : You will consider one of the more important components of effective communication: determining your target audience. It does not take much for a good decision to be torpedoed by a group or an individual who does not feel that they were consulted o..
Conclusion based on the standard deviations : Following are some representative scores. (High scores represent more favorable attitudes.) Calculate for both before and after scores, and write a conclusion based on the standard deviations.
Hair color and social extroversion : Conduct a one-way ANOVA to investigate the relationship between hair color and social extroversion.

Reviews

Write a Review

Operating System Questions & Answers

  When a process is multithreaded

Explain the differences, advantages, and disadvantages between user and kernel threads. What are the advantages and disadvantages of a lightweight process?

  How long does a paged memory reference take

how long does a paged memory reference take - What is the effective memory reference time?

  Risk assessment matrix table

Create a risk assessment matrix table for the purchase and integration of six new web servers for a start-up Internet firm. Include a brief (1-2 page) description of rationale for risk ranking (1 thru 5, or very low to very high) and probability d..

  How would you define an enterprise

How does this guide or limit the scope of an enterprise system implementation project?

  What is a federated database and why becoming common

What are examples of databases in a work enviroment that could be federated?

  The purpose of this program is to change such that it makes

the purpose of this program is to change such that it makes use of the ipc facilities provided by unix.masterbull

  Discuss the different features of the operating system

Write a paper on the history of the UNIX operating system and discuss how it evolved based on industry needs and requirements.

  Limitations of the model view controller principle

Determine the advantages and limitations of the model view controller principle. Recognize one way in which MVC helps software designers create better code, and one way in which it deters them.

  Solving wired versus wireless lan issues

Suppose your local hospital has decided to extend their offices to another department of the building where it is difficult to have cables installed,

  Determine the rang of usable ip addresses

Determine the rang of usable IP addresses for the following IP subnet also determine the bradcast address for the subnet?

  Network crashes are hypothesized

Assume we are using Lamport's hash, and Bob's system crashes before receiving Alice's reply to a message.

  How many total servers are needed

How many total servers are needed? Which roles will be combined - What edition of Windows will be used for each server

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd