Api the system-call interface and the operating system

Assignment Help Operating System
Reference no: EM13935967 , Length: 2480 Words

Chapter 2:

1. There are two different ways that commands can be processed by a command interpreter. One way is to allow the command interpreter to contain the code needed to execute the command. The other way is to implement the commands through system programs. Compare and contrast the two approaches.

2. Describe the relationship between an API, the system-call interface, and the operating system.

3. What are the advantages of using a higher-level language to implement an operating system?

4. Explain why a modular kernel may be the best of the current operating system design techniques.

Chapter 3:

1. Explain the purpose of external data representation (XDR).

2. Explain the concept of context switching.

3. Ordinarily the exec() system call follows the fork(). Explain what would happen if a programmer were to inadvertently place the call to exec() before the call to fork().

Chapter 4:

For chapter 4, you may complete any two of the first three exercises. You must complete the two exercises marked required.

1. What are the two different ways in which a thread library could be implemented?

2. List the four major categories of the benefits of multithreaded programming. Briefly explain each.

3. Multicore systems present certain challenges for multithreaded programming. Briefly describe these challenges.

4. Distinguish between data and task parallelism. (Required)

5. Describe how OpenMP is a form of implicit threading. (Required)


Chapter 5

1. Explain two general approaches to handle critical sections in operating systems.

2. Write two short methods that implement the simple semaphore wait() and signal() operations on global variable S.

3. What is the difference between software transactional memory and hardware transactional memory?

4. Assume you have a function named update() that updates shared data. Illustrate how a mutex lock named mutex might be used to prevent a race condition in update().


Chapter 6

1. What effect does the size of the time quantum have on the performance of an RR algorithm?

2. Explain the process of starvation and how aging can be used to prevent it.

3. Describe two general approaches to load balancing for processes.

4. What is deterministic modeling and when is it useful in evaluating a scheduling algorithm?


Chapter 7

1. Describe two protocols to ensure that the hold-and-wait condition never occurs in a system.

2. Describe a wait-for graph, compare it to a resource-allocation graph, and explain how it detects a deadlock.

3. What factors influence the decision of when to invoke a detection algorithm?

4. Name three issues that need to be addressed if a preemption is required to deal with deadlocks.

Chapter 8

Exercise 0 is an Extra Credit exercise.

0. What is the context switch time, associated with swapping, if a disk drive with a transfer rate of 2 MB/s is used to swap out part of a program that is 200 KB in size? Assume that no seeks are necessary and that the average latency is 15 ms. The time should reflect only the amount of time necessary to swap out the process.

1. Describe how a transaction look-aside buffer (TLB) assists in the translation of a logical address to a physical address.

2. How are illegal page addresses recognized and trapped by the operating system?

3. Briefly describe the segmentation memory management scheme. How does it differ from the paging memory management scheme in terms of the user's view of memory?

4. How is a limit register used for protecting main memory?


Chapter 9

1. Explain the sequence of events that happens when a page-fault occurs.

2. What is the equation that is used to compute the effective access time for a demand-paged memory system? Explain.

3. Explain the concept behind prepaging.

4. Why doesn't a local replacement algorithm solve the problem of thrashing entirely?

5. Explain how copy-on-write operates.

 

Chapter 10

1. What is the advantage of LOOK over SCAN disk head scheduling?

2. What are the factors influencing the selection of a disk-scheduling algorithm?

3. Describe two techniques that can enable multiple disks to be used to improve data transfer rates.

4. Describe an approach for managing bad blocks on a disk.

5. Describe how ZFS uses checksums to maintain the integrity of data.

Reference no: EM13935967

Questions Cloud

You are done meeting with the four vice presidents : You are done meeting with the four vice presidents, and Jared has called you into his office for a quick meeting to discuss next steps.
Bootstrapping problem : Bootstrapping Problem, One method used to obtain an estimate of the term structure of interest rates is called bootstrapping. Suppose you have a one-year zero coupon bond with a rate of r1 and a two-year bond with an annual coupon payment of C.
Issues in global marketing : Issues in Global Marketing. Major Project Requirements, The paper is expected to cover the recent issue Volkswagen has faced, further to the discovery that it had manipulated its system to pass emission tests. I am assuming all of you are aware of th..
International human resources management bhrm 9701 : International Human Resources Management BHRM 9701,  Term Project - Written Report and Presentation (15 %) Your team of up to four individuals (no exceptions) is required to research the human resources practices of a country other than the US in ord..
Api the system-call interface and the operating system : Describe the relationship between an API, the system-call interface, and the operating system. What are the advantages of using a higher-level language to implement an operating system?
What is the froude number : A trapezoidal channel with a bottom width of 4.00 feet and side slopes of 2 horizontal to 1 vertical conveys a discharge of 300 cfs. If the depth of flow is 2.25 feet, what is the Froude number? Is the flow subcritical or supercritical?
Research in the area of construction productivity : This project will be focused research in the area of construction productivity. The research is to explore the current state of the art within the subject area. Published research shall be examined to produce a paper evaluating work done within th..
Calculate profit and the value of ending inventory : Explain why, using variable costing, profit does not fluctuate from year to year.
Determine the pound amount of your profit or loss : Determine the pound amount of your profit or loss from buying a call option contract specifying C$100 000. Determine the pound amount of your profit or loss from buying a futures contract specifying C$100 000.

Reviews

Write a Review

 

Operating System Questions & Answers

  A current implementation of a particular multicore

A current implementation of a particular multicore processor has a 64KB Level one cache for each core, 256KB Level two, and 6MB for level three.

  What is the internal data that allows the operating system

What is the internal data that allows the operating system to supervise and control the process?

  Management information systems

Analyze and apply the content from a minimum of 3-recent articles about a topic of interest covered in the module.

  Requirements model for aims project

Need help in finalizing the requirements model for Airlines Information Management System (AIMS) project. The requirements model require to include use case diagrams for the entire AIM system.

  Differentiating internal and external fragmentation

Explain the difference between internal fragmentation and external fragmentation. Which one occurs in paging system? Which one occurs in system using pure segmentation?

  What is the application layer protocol involved

What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF - what is the type of block of the abbreviated IPv6 address

  How kernel handles the fork system call in traditional unix

How the Kernel handles the fork() system call in traditional Unix and in the System V Unix, while swapping? Difference between the fork() and vfork() system call?

  Discuss technology related ethical issue

Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?

  Protected information for both coppa and cipa

The Children's Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition. Question 1: Describe ..

  Write down three parts of linux kernel version number

Write down the three parts of Linux kernel version number, and which is least probable to change? What are "BogoMIPS", and what is their significance?

  Determine values of it industry certifications

Discuss briefly how IT certification works. What business arenas are IT certifications needed, security, or what technical problem is IT certification designed to solve?

  Commands to help root in managing users and groups

Write other commands, tools are available to help the ROOT in managing users and groups from command line or within a script.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd