Write server program act a memory manager

Assignment Help Computer Engineering
Reference no: EM13324523

let your server program act a memory manager, "She memory manager uses a vellOrog as sane. in which pages and frames are 4/14%7.4: 256 bytes, ( .11mts request main memory spate by mottling, to the server the total number of bytes in their lopy.:31 oro,;ccn, (liven a list of free trainees, the server allocates frames for the clients, After client-:• space has been mapped to pirysival space, the server will be prompted with a client number (mum be verified) and a logical address. The server will respond by calculating the physical address,
Example: Client' requests memory fOr its program of size 700 bytes, if free space list (the list of free frames) is 5, 3, 0, 1, 2, then Client" will be allocated frame 5 (1(rr its first 256 trite", frame 3 (firr its next 256 bytes) and frame 0 (fin its final 188 bytes), When prompted lot the physical address for logical address 400, the page table for Clientiwill be examined, We will know that the address in question is on page 1 at offset 144, which in loaded in frame 3. ldra-me begins at location 768, which is (256 * 3), The server calculates the physical address to be '168+144,

The server:
The server program accepts memory requests for each of several clients. A page table is built for each client. The frames assigned to the client are sent hack to the client. Pages are mapped to frames according to a free frame list. For the final check on your program, please use the following free frame list: 4, 6, 2, 7, 0, 5, 9, 11, 1(), 1, 6, 3. The serves will work on a static set of memory allocations as long as the operator wants to continue.

The client:

Each client program sends a memory request to the server program.

The server:
The server program accepts memory requests for each of several clients. A page table is built for each client. The frames assigned to the client are sent hack to the client. Pages arc mapped to frames according to a free frame list. For the final check on your program, please use the following free frame list: 4, 6, 2, 7, 0, 5, 9, 11, 10, 1, 6, 3. The server will work on a static set of memory allocations as long as the operator wants to continue.

The client:
Each client program sends a memory request to the server program. Each client will print its memory size and its assigned frames.

Memory Management:
A physical memory of 12 frames should be sufficient. To be displayed:

The server should print the client number, the logical address, the frame number and a representation of the physical memory.

Reference no: EM13324523

Questions Cloud

Differences between static and dynamic models : Explain the differences between static and dynamic models. How can one evolve into the other?
Selected transactions for protheroe corporation : Selected transactions for Protheroe Corporation during its first month in business are presented below.
Utilizing cost allocation methods : Decision making in companies is often facilitated by utilizing cost allocation methods.
Cultural differences between team and non-team environment : Describe the cultural differences between a team and non-team environment. What is a High Performance Team (HPT)? What are the benefits to the employees, customers and management for using such teams? Describe the conditions necessary to create a HPT..
Write server program act a memory manager : The server program accepts memory requests for each of several clients. A page table is built for each client. The frames assigned to the client are sent hack to the client.
Considered a member of the moral community : which of the following groups is not considered a member of the moral community in the US?
Research on aspects of network administration and support : Peer-to-Peer, Client/Server and Virtualization platforms can be used to setup networks for organizations small in size. Compare the three mentioned platforms and mention their associated merits in relation to administration, security and usability
Traditional subdivisions of moral philosophy : What are the 2 traditional subdivisions of moral philosophy?
Is intuition a reliable source of moral truth : which of the following would be interested in the question, Is intuition a reliable source of moral truth?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program that inputs an integer for n

Write a program that inputs an integer for n, iterates through the Babylonian algorithm twenty times, and outputs the answer as a double to two decimal places. Your answer will be most accurate for small values of n.

  Find out which servers might need more system resources

define what components she'll need to add or upgrade, at minimum, to make Nichol's servers capable of running Windows Server 2008. Also, explain why you don't recommend leaving all the servers at the minimum hardware requirements. Write down four ..

  Which is true of today''s cios

The traditional set of IS responsibilities includes all of the following except.

  Discuss the pros and cons of the synthesis approach

This approachis the antithesis of the layered approach, in which the path through the kernel is extended so that building the operating system is made easier. Discuss the pros and cons of the Synthesis approach to kernel design and to system-perfo..

  Distributed data processing

Explain how has the increasing availability of the inexpensive yet powerful personal computers and workstations generated an increasing trend towards distributed data processing (DDP).

  Create a disaster plan to protect the organization

build a disaster plan for your selected organization that includes how you will recommend the company back up and protect network data. Your plan should be 1,250 to 1,500 words in length and your recommendations must be based on the RAID system of..

  Guassian function and digital transmission technique

Prove the following properties of Gaussian function:Explain four benefit and one de-merits of utilizing the digital (rather than the analog) techniques for transmission of the voice-telephone signals.

  Discuss and describe the potential security threats

Discuss and describe the potential security threats

  How office applications installed on a computer

List the common interface features seen in this applications versions of each of the office applications installed on a computer.

  Make a c++ class that implements a "safe" array

design a C++ class that implements a "safe" array, where the arrays bounds are checked before accessing its elements. The class constructor must accept an integer parameter and create a dynamic array of that size for storing integers, implemented ..

  Java program that allows a user to enter three words

design a Java program that allows a user to enter three words, and displays the appropriate three-letter acronym (constructed from the input) in all uppercase letters. If user enters more than three words, ignore the extra words.

  Determined through default conventions

An advantage of dynamic scoping is that access to nonlocal variables is considerably faster than accesses to nonlocals when static scoping is used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd