StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Operating System Theory - Assignment Example

Cite this document
Summary
The author of this paper "Operating System Theory" discusses the role of the dynamic loading in the operating system, the basic method of implementing paging, the role of segmentation and demand paging, a second chance algorithm, the functions of the operating systems, a logic file system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Operating System Theory
Read Text Preview

Extract of sample "Operating System Theory"

Operating System Assignment Operating System Assignment Question Dynamic loading helps in obtaining better memory space use. Dynamic loading offers a number of advantages. For example, a routine is loaded merely when it is required. This technique is specifically valuable when significant numbers of codes are required to manage the rarely occurring instances, such as error routines. In this example, regardless of the total programme size being large, the proportion applied and further loaded can be even smaller. Also, dynamic loading does not need distinctive backup from the operating system (OS). It is the role of the end users to create their programmes to use this method. On the other hand, the operating system can aid the programmer by offering library routines to execute dynamic loading. Question 2 The basic method of implementing paging is where the physical memory is reduced to fixed sized blocks referred to frames. This takes place when the logical memory is translated into equivalent sized blocks referred to pages. When the CPU creates a consistent address, the page numbers and offsets, into the pages, are applied together to a page table, to decipher the command to a point in the physical memory. As the data is not normally altered, an end user may begin to feel as if the pagination is working correctly. However, the result of the pagination turns out to be incorrect when introducing fresh data or getting rid of available data. Question 3 Segmentation, which is a reference to a location of the memory, entails a factor that denotes a section and an offset in a section. These sections are put in object files of created programmes when connected to a programme image and when the image is stacked into memory. Segmentation deciphers a logical address as a cluster of segments. Every segment is attributed to distinctive names and measurements, such as lengths. These addresses denote the segment terms and offsets equally in the segments. An end user in this regard distinguishes every address by two factors: the terms of the segments and offsets. However, in a paging scheme, an end user denotes a distinctive address, separated by the hardware in page numbers and offsets. Every of these factors cannot be seen by a programmer. Question 4 In computers, demand paging is a technique of managing memory virtually. A demand paging system is comparable to a paging framework with swapping. This is with regard to the processes located in a secondary memory. In demand paging, when processes are started, it is switched over into memory. A lazy swapper is applied other than switching over the complete processes into memory. A lazy swapper does not exchange pages into memory, apart from when the page is not required. In this regard, a paging framework with swapping controls the whole process. This is where the demand pagers work on the distinctive page of a progression. Question 5 A second chance algorithm is founded on the FIFO replacement algorithm. In addition, it disintegrates to FIFO in the adverse instances. In a second chance algorithm, FIFO replacement is executed together with a reference bit. In the case that the reference bit is ready, it is absolved. The onset time for the page is put to the present and the programme advances together in a comparable progression in the course of the pages pending when a page with an absolved reference bit is located and consequently restored. A FIFO page replacement algorithm is applied to the VAX or VMS operating systems that have moderate forms of adjustments. Question 6 A copy on write primarily permits parent and child progressions to divide up similar pages. If any of the progression is reading, and not adjusting, the split pages, with equal progression, can split similar pages. This will result in system effectiveness. When any of the progression alters a divided up page, a duplicate of the divided page is formed. This leads to the provision of private pages to every progression. When an integer Y, with a value of 4 is in a divided up page termed as VUM, the parent progression advances to alter Y, further translating its value to 8. Given that this page is termed VUM, a duplicate of the page is formed for the parent progression that alters the value of Y to 8. However, the value of Y still stands at 4 for the child progression. Question 7 Operating systems must always present the times of functions linked to files in order to have end users securely save and access data. If I were creating an operating system to handle files, the six basic file operations will entail the following: constructing a file, composing a file, reading a file, relocating in a file, removing the file and compressing a file. A file is described as a set of data that is placed on a secondary backup device, for example, a hard drive. These functions contain the minimum level of the needed file functions. Also, the functions of independent data factors in a file are backed up by read, write or search. Question 8 A logic file system is a research file system that swaps path-names with terms in planned logic. It permits file metadata to be commanded with a superset of Boolean syntax frequently applied in contemporary search engines. The steps that a logical file system takes to create a file involve the following: the logical file system assigns a new FCB. On the other hand, in the case of a file system execution forms every FCB, at the file system formation time and an FCB is assigned from the pack of free FCBs. The structure later converts the required directory into memory, replaces it with a new file name and FCB and marks it back to the disk. Question 9 In the world of computer science, a hash table, also known as hash map, is a data framework applied to execute a linked array, a framework, which has the potential to outline keys to quantities. Hashtable applies a hash operation to calculate indexes into arrays of slots from which the accurate quantities can be established. A hash table implementation applies a linear list to record directory accounts. On the other hand, a hash data framework is applied to increase the speed of searching. The hash data framework lets the file term to be applied in aiding the process of computing the files site in a linear list. Clashes that take place at a time when numerous files pile up in one site need to be managed by this execution. Question 10 In operating systems (OS), seeking time is significant. This is given that every device requests are connected to rows of commands that may lead to a slowdown of the entire system. In this regard, disk scheduling algorithms are applied to decrease the entire seeking time upon receiving a command. A number of factors influence the selection of disk scheduling algorithms. First, the functioning of a scheduling algorithm relies mainly on the numbers and kinds of commands. The commands for disk service can be significantly impacted on by the file assigning process. The site of the directories and index blocks are also significant. Lastly, other factors for scheduling can include revolving latency (apart from mainly seeking distance) and OS limitations, for example, demand paging. Question 11 SSTF scheduling algorithm or shortest seek first algorithm, also known as the shortest seek time first algorithm is an advanced storage scheduling algorithm that to establish the movement of the disk’s arm and head in determining read and write commands. There are a number of disadvantages of the SSFF scheduling algorithm. Irrespective of SSFF scheduling algorithm being a great boost over the FCFS algorithm, it is not optimal. The SSFF is known to bring about the starvation of the commands. In the case that a flow of commands reaches close to one another, a command of a cylinder away from the top location has to remain pending for an indefinite period of time. Question 12 A bus is a list of wires and firmly organised protocols that distinguish a list of the messages that can be disseminated to the wires. These messages are expressed by arrangements of electrical voltages, introduced to the wires with distinctive measures. On the other hand, a daisy chain is a device design that one device is characterised by a cable, which links an added device. This device also has a cable, which links a new device and the progression advances even further. Daisy chains can be applied for power, analog signals, digital data or a merge of such uses. In particular, daisy chains may also stand for scale devices linked to a number of power strips fitted jointly to create long wire strips or wiring designs stacked in pieces of equipment. Some examples of daisy chains may include USBs, Fire-wires or Ethernet systems. Question 13 A buffer is a memory location, which helps in storing information when they are moved between two devices or application and one device. Buffers normally regulate timing by executing a queue or FIFO algorithm in memory, at the same time writing data into the row at one speed and reading it at a different speed. Firstly, one of the main reasons why buffering is performed is to manage data/information when the speed fails to tone with the generator and user of the information flow exist. Secondly, the buffer is performed to adjust between devices, which have varying data transfer extents. Thirdly, the buffer is performed to provide backup for copy language of application I/O. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Operating System Theory Assignment Example | Topics and Well Written Essays - 1500 words, n.d.)
Operating System Theory Assignment Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1880028-operating-system-assignment
(Operating System Theory Assignment Example | Topics and Well Written Essays - 1500 Words)
Operating System Theory Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1880028-operating-system-assignment.
“Operating System Theory Assignment Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1880028-operating-system-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Operating System Theory

Review Questions

Q # 3 – Types of Computer system The computers are turning out to be more powerful with passing time in terms of high computing speed, increased storage capacity of data, and the capability to execute a number of diverse functions and purposes, for example, the computers are capable of transmitting voice and video communication regardless of physical distance....
3 Pages (750 words) Assignment

Systems Thinking

The status of every employee in the organization system refers to the "level " in the system theory.... Any system model contains three variables - levels : auxiliaries and rates Levels are those amount of stocks held while the rates refers to the pattern in change of the stocks.... Or the rate component in the system is varying.... The system refers to the organized collection of activities or smaller systems referred to as subsystems integrated to produce a larger goal....
4 Pages (1000 words) Essay

The Methodology of Risk Decreasing and Fraud Operations Avoiding with Payment Cards of International Payment Systems

Here we tried to observe briefly the most fundamental methods of statistical analysis, systems analysis of multiple risks and Bayes confidence net theory theory.... The process of Bayes confidence net theory is learned in 2 phases: Identification of net topology.... For fraud operations detecting and negative results avoiding we can use some methods of content analysis: variance analysis for some independent factors influence on feature under review; cluster analysis for object and their features classification; longlinear analysis for statistical testing of hypothesis about the system of simultaneous even and plural relations in features group; analysis of causes for causal relations modeling among features with the help of statistical equation systems; regression analysis for regression dependence investigation among dependent and independent features; factor analysis for getting general information about the relation structure among the features of object under consideration with concealed factors detaching; correlation analysis for dependence detecting among numerical variates, one of which also depends on many chance factors....
2 Pages (500 words) Essay

Gangs and Drugs Operations

Traffic-This operation is concerned with regulating traffic so that there is no congestion in the streets and that the transport system is efficient.... The writer of the essay states that the historical view of the police is that of law enforcement officers who are responsible for preventing the law from being broken and apprehending those who have been caught in a crime....
1 Pages (250 words) Essay

Using a functional analysis to explore Tri-Met system in Portland

Tri-Met system concurs with Talcott Parsons theory of social action theory in the sense that it was formulated out of a necessity to streamline or bring social order to the Portland metropolitan area in transport sector (Taylor 89).... This is what Talcott Parsons social action theory demands even in formulation of systems that work efficiently and effectively like the Tri-Met system (Taylor 89).... The Tri-Met system was a deliberate move by the Oregon legislature to overhaul transportation in Portland metropolitan area, which exemplifies a manifest function of the social theory....
2 Pages (500 words) Essay

Operating Segments in the International Accounting Standard Board

The main function of the IFRS 8 operating system is to establish recommendations that ensure the disclosure of information on an entitys operating segments.... The relevance and usefulness of the operating segment information have overweighed the expressed concerns on the comparability of the financial report (Behn, 2002). The Since then there have been minor changes that have been made to IFRS 8 by the other IFRSs.... These reportable segments comprise of aggregations of operating segments with specific criteria....
6 Pages (1500 words) Essay

Do Memories Reflect the Operation of Different Systems or Are They Ways of Accessing a Unitary Store

The Russian physiologist Ivan Pavlov studied the conditioned-reflex system, which was further carried on by the American psychologist Edward Thorndike.... "Do Memories Reflect the Operation of Different Systems or Are They Different Ways of Accessing a Unitary Long-Term Store" paper states that one of the biggest problems related to visual perception lies in the fact that the objects which people see are not indeed what the retina showed the brain....
6 Pages (1500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us