Explain a method for process migration, Operating System

Assignment Help:

Q. Process migration in a heterogeneous network is typically impossible given the differences in architectures and operating systems. Explain a method for process migration across different architectures running:

a. The similar operating system

b. Dissimilar operating systems

Answer: For the similar operating system process migration is relatively straightforward as the state of the process requires migrating from one processor to another. This engages moving the address space state of the CPU registers as well as open files from the source system to the destination.

Nevertheless it is significant that identical copies of the operating system are running on the different systems to ensure compatibility.

If the operating systems are the similar however perhaps different versions are running on the separate systems then migrating processes should be sure to follow programming guidelines that are consistent between the different versions of the operating system.

Java applets provide a nice illustration of process migration between different operating systems. To hide dissimilarities in the underlying system the migrated process (that is a Java applet) runs on a virtual machine rather than a specific operating system.


Related Discussions:- Explain a method for process migration

What is independent process, What is independent process? A process is ...

What is independent process? A process is independent it cannot influence or be affected by the other processes implementing in the system. Any process does not share data with

File system, what are disadvantages of using single directory

what are disadvantages of using single directory

What is the purpose of the command interpreter, What is the purpose of the ...

What is the purpose of the command interpreter? Why is it usually separate from the kernel? It reads commands from the user or from a file of commands and executes them, usuall

Explain second-chance algorithm, Second-Chance algorithm When a page ha...

Second-Chance algorithm When a page has been selected, we inspect its reference bit. If the value is 0, we proceed to replace this page. If the reference bit is set to 1, thoug

List three ways of allocating storage, List three ways of allocating storag...

List three ways of allocating storage, and give advantages of each. a. Contiguous allocation. Fastest, if no changes are to be made. Also simplest for random access files. b

How several bits are there in the logical address, Q. Regard as a logical a...

Q. Regard as a logical address space of eight pages of 1024 words every mapped onto a physical memory of 32 frames. a. How several bits are there in the logical address? b. H

Ipc, Explain in detail about ipc in linux

Explain in detail about ipc in linux

search tree generated by hill-climbing search, Show the search tree genera...

Show the search tree generated by Hill-Climbing search (text figure 4.2, page 122; or Local Search lecture, slide 6) for each of the two heuristics (a) and (b) applied to the follo

Naming scheme for servers in an enterprise, Problem: Within a corporate...

Problem: Within a corporate environment, there are usually many servers located across various departments. Naming of servers is often a tedious task. In many circumstances, w

Explain hierarchical paging method, Hierarchical paging method Most mo...

Hierarchical paging method Most modern computer systems maintain a large logical-address space. In this situation the page table itself turns into excessively large. To remedy

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd