What deadlock mean and give examples of deadlock

Assignment Help Operating System
Reference no: EM132334612

OPERATING SYSTEM II

General Objectives:

On Completion of this course the student should be able to:

1.0 Understand memory management technique.

2.0 Understand issues involved in virtual memory systems.

3.0 Understand file management in operating systems.

4.0 Understand additional processor scheduling Techniques.

5.0 Know how to deal with deadlocks simulation computing.

6.0 Understand implementation of various resource management techniques in real life operating system.

1-2 To understand:

Various main memory management techniques.

To Explain

The following memory management: swapping, fixed partition, paging, segmentation

3-4 To understand:

The strength and weakness of each technique.

To explain:

The advantages and disadvantages of the memory management technique and Give examples of real life OS in which the technique have been implemented.

5 To understand:

The concept of Virtual memory in an operating system.

To explain: Virtual memory

The need for virtual memory.

How virtual memory is implemented

Name the virtual memory techniques.

6-7 To Understand:

Demand paging technique, the various page reflect algorithm, and speechify the strength and weakness of each technique.

To explain:

The demand Paging technique.

Page replacements algorithm LRU, FIFU, second chicues, Not-recoding used, optimal etc. and

To State the:

Advantage and disadvantages of the page replacement algorithm.

8-9 To understand:

The concept of file system and its management in an  Operating System.

To explain:

Files and directory.

common file operation e.g. creation delete, update etc.

File management techniques.

Security and protection mechanism on files.

File system implementation in specific OS e.g. Urax, MS-OOS, Windows, etc.

10-11 To understand:

Processor scheduling techniques.

To explain:

Multi level queuing schedule.

The Real time active scheduling.

Scheduling and dispatching in a multiprocessor system.

Necessity of codes in a multiprocessing system.
 
12-13 To understand:

Deadlock occurrence in computing, and the methods of deadlock avoidance, previous and defect.

Explain

• What deadlock mean and give examples of deadlock.

• condition for deadlock.

• method of deadlock prevention.

• method of deadlock avoidance

• technique of Deadlock detection.

14-15 To understand:

Resource management techniques in an operating system.

To Explain:

Implementation technique employed in managing processor, main memory, the drive and information in operating system like UNIX, MS-DOS Windows, etc.

Reference no: EM132334612

Questions Cloud

System for storage and processing of big data : Your company has decided to adopt a NoSQL database management system for storage and processing of big data. You have been asked to investigate alternative NoSQ
Describe primary threats that compromise organization data : Describe at least 2 primary threats that could compromise the organization's data. Describe how the encryption methodologies that should be implemented.
Regress GDP per capita on the number of patents : Need help with data analysis in Stata for a master's thesis topic - Innovative activity in East-Central and Eastern Europe during the early 20th century"
What are the best practices in terms of sharing knowledge : What are the best practices in terms of sharing knowledge between the different levels. especially in large, complex organizations like academic medical centers
What deadlock mean and give examples of deadlock : COM 321-OPERATING SYSTEM II -What deadlock mean and give examples of deadlock. condition for deadlock. method of deadlock prevention.
Difference between transport mode and tunnel mode : What is the difference between transport mode and tunnel mode? What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?
What is a trusted computing base : Min of 350 words. APA format. What is a trusted computing base? List at least 3 limits and three benefits of implementing a trusted computing base.
Explain the key objectives of the communications plan : You are a member of the Human Resources Department of a medium-sized organization that is implementing a new inter-organizational system that will impact employ
What kinds of publics does this style of art appeal to : What does it mean if the piece is in your local gallery/coffee house vs. an institution or elsewhere and Why do you like the piece? What kinds of publics does

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd