Write program to simulate operations of an operating system

Assignment Help Operating System
Reference no: EM131054467

PROGRAMMING ASSIGNMENT: O/S SIMULATION PROCESS MANAGEMENT

Your team programming assignment is to write a program to simulate the operations of an Operating System as it processes a stream of incoming processes. Students will normally work in teams of two or three. Students may work by themselves but are highly discouraged from doing so. The purpose of the simulation is to compare the results of at least two different scheduling algorithms and their effect on system performance. The completed assignment is due on May 11, 2015.

PROGRAM SPECIFICATIONS: This simulation will employ only one processor (CPU), one I/O device, and one each Long Term Queue, Short Term Queue and I/O Queue. Each queue is to be limited in size as follows:

A. Long Term Queue 60 jobs
B. Short Term Queue 30 jobs
C. I/O Queue 30 jobs

Each job is to have a Process Control Block in which data about the job is kept. The actual format of the data structure to maintain this information will be determined by each team. Other data structures, such as temporary storage locations, flags, queues, etc., will be used as needed for the simulation and the format will again be determined by each team.

Time in the simulation will be measured in a unit called a "clock tick". A clock tick is one pass through the main loop of the program (see PSEUDOCODE). All statistical calculations are to be made using a clock tick as the unit of measure for the simulation.

All processes will be non-preemptive. The simulation will encounter only one type of interrupt, I/O. When a process is interrupted, suspend the process without returning it to the SHORT TERM QUEUE. When a process is suspended for I/O, use a suspend time of 3 clock ticks before returning the process to the CPU. (This simulates the context switch time)

Use FCFS scheduling for both the Long Term Queue and I/O Queue. The initial scheduling algorithm for the Short Term Queue is also to be FCFS.

For extra credit, your team may run the simulation a second time employing one (or more) of the following changes:

1. Employ one other scheduling algorithm for the Short Term Queue selected from the following:

a. Round Robin -- quantum between 10 and 50 (your choice)
b. Shortest Remaining Time Next
c. Shortest Job First
d. Highest-Response-Ratio Next

2. Simulate the system using preemptive processes for the scheduling algorithm(s) employed.

3. Simulate the system using two CPUs but one STQ

4. Simulate the system using two I/O Devices (either with one I/O queue for each or one I/O queue for both I/O Devices.

Queues may be implemented as linked lists, arrays or any other data structure you think is appropriate. You are to use separate wait counters for each queue and the CPU (for jobs that are suspended.) You may use GLOBAL VARIABLES if you desire but all GLOBAL VARIABLES MUST de declared in one central location (i.e. "variable.h" file)

Each team will process the same data stream so a meaningful comparison of STQ algorithms can be made. The system in the simulation will process an unknown number of jobs. You may however figure on a MAXIMUM of 150 jobs for the simulation. DO NOT WRITE YOUR SIMULATION TO PROCESS ONLY 150 JOBS. IN PRACTICE, JOBS ENTER AND LEAVE THE SYSTEM ON A CONTINUING BASIS. YOU DO NOT KNOW HOW MANY JOBS YOU WILL BE PROCESSING. YOU MAY HOWEVER USE THIS FIGURE TO SET A MAXIMUM SIZE ON ANY DATA STRUCTURES USED IN YOUR SIMULATION. Other specification may be added later as the need develops.

DOCUMENTATION: Your program must be well documented. Internaldocumentation is to include a short heading in each routine/procedure/function to include the following:

1. File name (if external files are used) or module name.
2. The identity of the PRIMARY author of the module
3. The identity of the CONTRIBUTING author(s) of the module
4. The date the module was last revised (or created)
5. A short narrative description of what the module does (how it contributes to the simulation).

Attachment:- simulation_flags.xlsx

Reference no: EM131054467

Questions Cloud

What type of risk does it bring to business : HC1041 IT for Business - What benefits and advantages does IT bring to business and what type of risk does IT bring to business?
Scoring rubricassignment requirements : Introduction / Thesis is thoughtful, clear, and well supported. Sentences are free of major grammatical errors, careless mistakes, and exhibit sufficient variety.
Identification and explanation of the key internal structure : Identification and explanation of the key internal structures (at least 3) that will be designed to enhance the culture within your organization
Several old hydraulic manuals : As a new firefighter you were given several old hydraulic manuals that were mimeographed from the 1920s. Over the years the manuals were exposed to air at room temperature and gradually turned yellow and the pages became brittle. The rate at which..
Write program to simulate operations of an operating system : Your team programming assignment is to write a program to simulate the operations of an Operating System as it processes a stream of incoming processes.
Calculate the mass percentage of benzene : Calculate the mass percentage of benzene (C6 H 6) and carbon tetrachloride (CCl 4) if 22 g of benzene is dissolved in 122 g of carbon tetrachloride.
Problem regarding the available modelling software : Write an essay about molecular modelling, its uses, and applications, and use a freely available modelling software from the internet and include the details of the modelling you followed, and give examples of at least three models you developed.
What is the probability that two of the analysts hired : Bright Star Financial Advisers receives a mean of 19.5 applications per week for a personal financial review. What is the probability that two of the analysts hired for part a would have no clients for an entire week
Proof of the given ethanol-water solution : The density of ethanol is 0.789g/cm^3 and that of water is .998g/cm^3. Alcoholic beverages are rated in proof, which is a measure of the relative amount of ethanol in the beverage. Pure ethanol is exactly 200 proof. What is the proof of the given ..

Reviews

Write a Review

Operating System Questions & Answers

  What would you do to influence procurement process-platform

What would you do to influence the procurement process for both platforms (hardware & OS, such as desktops, laptops, servers, etc.) and application software?

  Header fields in the ipv4 and ipv6 protocols

Compare the header fields in the IPv4 and IPv6 protocols. Explain strategies for converting IPv4 packets to IPv6 packets in a hybrid IP network.

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

  Write a java application that performs the following task

Display a message whether the user input has been found in the array, at what position, and how many steps the program required to search for the data value.

  Differences between routers and switches

Assume you are currently working for Surebank, a medium financial institution. The company has approximately eighty people working in their main location where your office is located.

  Subject of embedded operating systems

Review an article about the subject of embedded operating systems or embedded systems that appeared in a recent computing magazine or academic journal.

  Is the process before and after the swap are the same

Is the Process before and after the swap are the same? Give reason. What do you mean by u-area (user area) or u-block?

  Create a makefile called makefile

Create a makefile called Makefile based on all the .cpp files in the current directory

  What are the advantages and disadvantages of bpm

What are the advantages and disadvantages of BPM? How do "value chain" principles apply to BPR and BPM? Why should an IT manager know the differences between the concepts?

  Security administrators to monitor servers

Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task or system monitors used?

  Solving problem by ipv6

Discuss and explain some of the problems NATs develop for IPsec security. Solve this problems through using IPv6?

  Describing the gnu public license and its role

Write a 1- to 2-page paper defining and describing the GNU public license and its role and Write a 1- to 2-page paper defining and comparing open source and closed source operating systems. Provide examples of each

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd