Implementing protection with virtual memory, Computer Engineering

Implementing Protection with Virtual Memory - computer architecture:

To enable the operating system to implement protection in the VM system, the HW have to:

I. Support at least 2 modes that denoted whether the running process is a user process (executive process) or an operating system process (kernel/supervisor process).

II. Provide a part ion of the CPU state that a user process may read but not write (includes supervisor mode bit).

  • Provide mechanism where the CPU may go from user mode to supervisor mode (accomplished by a system call exception) and vice versa (return from exception instruction).

o   Only operating system process may change page tables. Page tables are held in operating system address space thereby preventing a user procedure from changing them. 

o   When processes desire to share information in a restricted way, the OS have to assist them.

o   The write access bit (in both the TLB and the page table) can be used to limit the sharing to only read sharing.

 

Posted Date: 10/13/2012 6:00:07 AM | Location : United States







Related Discussions:- Implementing protection with virtual memory, Assignment Help, Ask Question on Implementing protection with virtual memory, Get Answer, Expert's Help, Implementing protection with virtual memory Discussions

Write discussion on Implementing protection with virtual memory
Your posts are moderated
Related Questions
What is an interface and what is an abstract class? Please, expand by examples of using both. Explain why?   Abstract classes are closely related to interfaces. They are classe

Q. Which Colour technologies used in Monitors and Printer? Monitor screens and Printers use different colour technologies.  The monitor uses RGB and the Printer CMYK. So, how d

What are conditions under which a deadlock situation may arise? A deadlock situation can arise if the following four conditions hold concurrently in a system:  a. Mutual exc

Q. Illustrate why does a tea kettle sing? Answer:- There is a little attachment with a hole in it which acts as a whistle. It is inserted into the spout of the kettle as w

The reason is, LINQ is used with C# or other programming languages, which needs all the variables to be declared first. From clause of LINQ query just describes the range or condit

How to draw the pipe and filter using data flow and it components and connectors

It is desirable that operating speed of primary storage of a computer system be as fast as possible since most of the data transfer to and from processing unit is via main memory.

The last digit of a credit card number is the check digit, which protects against transcription errors like an error in a single digit or switching two digits. The following method

Design a circuit which computes the square of a number? This should not make use of any multiplier circuits. This should use Multiplexers and some other logic as: 1^2=0+1=1

What are the characteristics and features of Client/Server Computing? Several of client/server computing architecture is listed below: a. It comprises a networked webs of sm