Explain the os/2 operating system, Operating System

Assignment Help:

Explain the OS/2 Operating System

Like NetWare, OS/2 manage resources at three levels, as shown in Figure 4.5 Resources may be maintained at the session, process, and thread level. Session is the topmost level of the OS/2hierarchy and manages virtual devices such as screen, keyboard, and mouse. Most commonly, one application runs per session. The process contains the applications resources such a memory, semaphores, files, pipes,  and others. Processes may create child processes or threads.  Each process created contains one thread (the Main Thread) just as is the case with Windows NT. With OS/2, the only contextual data owned by a thread is a stack and a user-defined data area.

OS/2 allows the application developer to store per-thread information via the DosGetInfoBlocks( ) call. The DosGetInfoBlocks functional call returns a pointer to a Thread Information Block(TIB).In the TIB , a 4-byte user-defined field, is available to the programmer. As with NetWare, this field may be used as a pointer or an index to per-thread data items.

Is summery, application architects must evaluate each target operating system and its capabilities for variable scoping. Obvious design and architecture modifications may be required for each operating system port. If threads or thread scoping are not available to the application developer, an index into a client structure must be passed as a parameter to be used for thread scope data access. This index will need to be passed to each and every function in the thread accessing the data items on a per-client basis. Proper architecture of data item access may ease excessive recording during an application port. Indexes passed to functions, for example, may be used for every OS, whether thread scoping is available or not.


Related Discussions:- Explain the os/2 operating system

Briefly explain the process management in unix., Briefly explain the proces...

Briefly explain the process management in UNIX. UNIX makes use of the easy but powerful process facility that is visible to the user. UNIX follows the model in which the majori

Operating system.., What is the use of FIFOs in client-server applications

What is the use of FIFOs in client-server applications

Explain memory management using bit maps, MEMORY MANAGEMENT USING BIT MAPS ...

MEMORY MANAGEMENT USING BIT MAPS   In this memory is separated into different allocation units each of some particular size(a few bites).consider every space of size 4k. A

Explain the statements present in assembly language, Explain the Statements...

Explain the Statements Present in Assembly Language An assembly program consists of subsequent three types of statements: a. Imperative statements: this point out an action

Page faults, Assume there are only 4 page frames in the physical memory, fo...

Assume there are only 4 page frames in the physical memory, for the following reference string: 1, 2, 3, 4, 5, 3, 4, 1, 6, 7, 8, 7, 8, 9, 7, 8, 9, 5, 4, 5, 4, 2, 8. a) What i

Exdplain many-to-many model, Many-to-Many Model The many-to-many model-...

Many-to-Many Model The many-to-many model- many user-level threads to many kernel-level threads avoids several of the limitations of the one-to-one model, although extending mu

Define maintaining data on a per client basis, Define Maintaining Data on a...

Define Maintaining Data on a Per Client Basis Perhaps the most dramatic syntactical programming change for the application developer of client – server applications is maintain

Compute how many disk input - output operations are required, Q. Consider ...

Q. Consider a file at present consisting of 100 blocks. Presume that the file control block (and the index block in the case of indexed allocation) is already in memory. Compute h

What is an i/o subsystem?, What is an I/O subsystem? The control of dev...

What is an I/O subsystem? The control of devices connected to the computer is a main issue while designing operating systems. Since I/O devices differ widely in their function

Explain file allocation using i nodes, File allocation using I nodes. T...

File allocation using I nodes. This method is used to decrease the size of the table in the above method. Every file will have an I-node list. Allow a file have 15 pointers a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd