Sie sind auf Seite 1von 4

Annexure

Homework type/no: 1 Course code CSE-316

Course instructor: Mr.Gaurav Pushkarna

Date of allotment:27/8/2010 Date submission:2/9/2010

Student roll no: B54 Section no: E2803

Declaration:
I declare that this assignment is my individual work. I have not copied from any
other student’s work or from any other source except where due acknowledgment
is made explicitly in the text, nor has been written for me another person.
Student’s signature: NEERAJ

Evaluator’s comments:
Marks obtained _____________________ out of
______________________________
Content of home work should start from this page only:

Part A
1. In a multiprogramming and time sharing environment, several users share the system
simultaneously. This situation can result in various security problems.

a) What are two such problems?

Ans. Stealing or copying a user's files; writing over another program's (belonging to another user
or to the OS) area in memory; using system resources (CPU, disk space) without proper
accounting; causing the printer to mix output by sending data while some other user's file is
printing.

b) Can we ensure the same degree of security in a time shared machine as in a dedicated
machine? Explain your answer.

Ans. Probably not, since any protection scheme devised by a human can also be broken -- and the
more complex the scheme is, the more difficult it is to be confident of its correct implementation.

2. Under what circumstances would a user be better off using a time sharing system rather than a PC
or single user workstation?

Ans . When there are few other users, the task is large, and the hardware is fast, time-sharing makes
sense. The full power of the system can be brought to bear on the user’s problem. The problem can be
solved faster than on a personal computer. Another case occurs when lots of other users need resources at
the same time. A personal computer is best when the job is small enough to be executed reasonably on it
and when performance is sufficient to execute the program to the user’s satisfaction.

3. In the designing of the operating system there are two approaches modular kernel and layered
approach? How are they different?

Ans. when lots of other users need resources at the same time.. A time-sharing system (what we call a
server now days) provides many people the opportunity to use the system. Technically, even a standard
PC is a time-sharing system, because you can run many different programs on it at a time (think Browser,
iTunes, Anti-Virus, etc.). A personal computer is best when the job is small enough to be executed
reasonably on it and when performance is sufficient to execute the program to the user’s satisfaction

Part B

4. There is guest operating system and a host operating system like VMware? List all the factors in
choosing the host operating system?

Ans. A guest operating system provides its services by mapping them onto the functionality provided by
the host operating system. A key issue that needs to be considered in choosing the host operating system
is whether it is sufficiently general in terms of its system-call interface in order to be able to support the
functionality associated with the guest operating system.
5.The kernel is responsible for a action with the processes. Search through the action of kernel and
describe what is the action?

A guest operating system provides its services by mapping them onto the functionality provided by the
host operating system. A key issue that needs to be considered in choosing the host operating system is
whether it is sufficiently general in terms of its system-call interface in order to be able to support the
functionality associated with the guest operating system.

6. Considering both the system level and the programmer level.

Consider the advantage and disadvantage of the following structure.

a) Synchronous and asynchronous communication- A benefit of symmetric communication is


that it allows a rendezvous between the sender and receiver. A disadvantage of a blocking
send is that a rendezvous may not be required and the message could be delivered
asynchronously; received at a point of no interest to the sender. As a result ,message-passing
systems often provide both forms of synchronization.

b) Automatic and explicit buffering - Automatic buffering provides a queue with indefinite
length ; thus ensuring the sender will never have to block while waiting to copy a message.
There are no specifications how automatic buffering will be provided; one scheme may
reserve sufficiently large memory where much of the memory is wasted. Explicit buffering
specifies how large the bufferis. In this situation, the sender may be blocked while waiting for
available space in the queue. However, it is less likely memory will be wasted with explicit
buffering.

c) Send by copy and send by reference – Send by copy does not allow the receiver to alter the
state of parameter; send by reference does not allow it A benefit of send by reference is that it
allows the programmer to write a distributed version of a centralized application Java’s RMI
provides both, however passing a parameter by reference requires declaring the parameter as
a remote object as well.

d) Fixed-sized and variable-sized messages - The implications of this are mostly related to
buffering issues; with fixed-size messages, a buffer with a specific size can hold a known
number of messages. The number of variable-sized messages that can be held by such a
buffer is unknown. Consider how Windows 2000handles this situation: with fixed-sized
messages (anything< 256bytes), the messages are copied from the address space of the sender
to the address space of the receiving process. Larger messages (i.e. variable-sized messages)
use shared memory to pass the message.

Das könnte Ihnen auch gefallen