Tuesday, April 2, 2019

Multiprogramming And Time Sharing

Multiprogramming And Time SharingIn a multiprogramming and sequence sh be-out environment, several substance abusers sh ar the administration simultaneously. This note after part result in various gage enigmas.What atomic subjugate 18 devil such problems?Ans1. (a) In Multiprogramming and time sharing environment septuple users sh be the data and musical arrangement so these ar following deuce problems which might occur in that location potbelly be the case of pilfering of data, which can result in various problems. It means after gaining illegal rise to business office in somebody system and thieving the data is a problemOne more problem can be, no proper invoice of choices, it means if somebody is using the resource without maintaining proper accounting data, is a serious problem.Can we ensure the same degree of security in a time divided machine as in a dedicated machine? Explain your answer.Ans1. (b) We cannot assure same take aim of security as it is presented in dedicated machine. Because in time sharing environment, ten-fold users are accessing the system, so it is somewhat difficult to implement because if we are grooming to use a high-level encryption for the sharing environment, than it get out be difficult to implement that security. Each and every security system do by human can be broken by some other human.Under what circumstances would a user be better strike using a time sharing system rather than a PC or single user workstation?Ans2. There are twain types of basic working environmentsTime sharing environmentDedicated resource environmentIn time sharing environment, multiple users are sharing the system and resources and this type of environment is useful when the childbeds which are to performed are braggy or large and hardware resources are fast efficient. The full power of the resources can be consumed for the user problems.Dedicated environment is useful when the tasks which are to be performed are small level. This environment is preferred when hardware resources are sufficient to handle the users problem.In the intention of the in operation(p) system there are two come neares modular content and layered approach? How are they different?Ans3. Both modular substance and layered approach are the approaches of the designing of the architecture of operating system.Layered Approach Layered approach follows the concept of design in the form of different layers. In this the operating system is divided into layers in which core layer is hardware resources and the topmost layer is User-Interface. The layers which are in-between interact with the layer below it and mop up the tasks. In this all the subsystems are to be executed in set order.Modular Kernel Approach This approach divides the operating system designing into modules of various levels. Like for e.g. in modules various different fields alike(p) booting, process, jobs, etc are divided and they run their modules in random manner. In a single module a group of various tasks are specified. inequality between both these designs is that layered approach imposes strict ordering of other layers lower layers are not digested to invoke operations corresponding to pep pill layer operations, whereas in the case of modular approach various modules can invoke each other without both constraint.Part BThere is guest operating system and a troops operating system like VMware? List all the factors in choosing the host operating system?Ans4. The factors which affect the selection of host operating system areThe host operating system should be of upgraded version which you are using as using as guest operating system.Hardware resources get shared in case of guest operating system, so care moldiness be taken off. Because if the resources scarcity occurs both the OS will hang. run system used must be stable.It more depends upon security and speed.The kernel is responsible for(p) for a action with the processes. Search thro ugh the action of kernel and describe what the action is?Ans5. Kernel is known as the heart of the in operation(p) System. Kernel is the main task handler of the OS. It represents as a nosepiece between applications and the data processing which is performed at hardware level. The actions of Kernel are Kernel sets up an address space for the program, loads the files containing the programs code into storage and executes it.Multi-tasking kernels are able to give the user the virtual view that the number of processes running simultaneously is higher than the maximum number of processes the computer is very running.Kernel uses scheduling algorithms to determine which process is running next and how frequently time it will be given. The algorithm chosen may allow for some processes to have higher priority than others. The kernel generally withal provides these processes a way to communicate this is known as inter-process communication.Kernel is responsible for communicating the ha rdware resources with the software components.Co-operative multitasking, where each process is allowed to run unbroken until it makes a special request that tells the kernel it may switch to some other process. Such requests are known as yielding.Q6. Considering both the system level and the programmer level.Consider the advantage and disadvantage of the following structure.Synchronous and asynchronous communication.Ans (a) Synchronous communication is direct communication. In which the communication is time synchronized. It means all the users are involved in the communication are present at the same time.Asynchronous communication does not read that all the users involved in the communication should be present at the same time. For e.g. e-mails, blogging.Asynchronous is useful when the communication is done at distant scale means online.Automatic and explicit buffering.Ans (b) Automatic buffering provides a queue which of infinite length, which will never block the user bit w aiting to perform a task. Disadvantage In this large meat of memory space is emaciated while tryst.Explicit Buffering asks explicitly that how more than memory must be allocated as the available queue. In this user can be blocked while it is performing some task Advantage Less Memory space will be wasted with explicit buffering.Send by copy and send by telephone extensionAns (c) Send by copy, in this type of method archetype value of the variable is never changed throughout the program or task. Whereas in the case of send by reference, address of the original variable is passed and any changes made in the reference value will be reflected in the original value.Fixed-sized and variable-sized messages.Ans (e) This concept is used at the time of allocation of space of the buffers. In fixed-sized, fix amount of memory is allocated to buffer which will create a problem at the time of memory allocation and forms a memory blockage. Because it can hold limited number of tasks/messages only. Whereas in variable sized the buffer memory can be reallocated and resized at any place. In this the buffer-size is not pre-known.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.