SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
1
Operating Systems
BT0070 Part-2
By Milan K Antony
2
1. Explain how virtual addresses are mapped on to physical
addresses.
Let's assume that we have 1M of RAM. RAM is also called
physical memory. We can subdivide the RAM into 4K pages.
Thus 1M / 4K = 256 pages. Thus, our RAM has 256 physical
pages, weach holding 4K. Let's assume we have 10 M of disk.
Thus, we have 2560 disk pages. In principle, each program may
have up to 4 G of address space. Thus, it can, in principle,
access 2
20
virtual pages. In reality, many of those pages are
considered invalid pages.
Page Tables
How is an address translated from virtual to physical? First,
like the cache, we split up a 32 bit virtual address into a
virtual page (which is like a tag) and a page offset.
If this looks a lot like a fully-associative cache, but whose
offset is much much larger, it's because that's basically what it
is.
3
We must convert the virtual page number to a physical page
number. In our example, the virtual page consists of 20 bits.
A page table is a data structure which consists of 2
20
page
table entries (PTEs). Think of the page table as an array of
page table entries, indexed by the virtual page number.
The page table's index starts at 0, and ends at 2
20
- 1.
Here's how it looks:
Translation
Suppose your program generated the following virtual address
F0F0F0F0hex (which is 1111 0000 1111 0000 1111 0000 1111 0000 two).
First, you would split the address into a virtual page, and a
4
page offset (see below).
Then, you'd see if the virtual page had a corresponding
physical page in RAM using the page table. If the valid bit of
the PTE is 1, then you'd translate the virtual page to a
physical page, and append the page offset. That would give
you a physical address in RAM.
2. Discuss the Optimal Page Replacement algorithm.
The theoretically optimal page replacement algorithm ,
or Belady's optimal page replacement policy is an algorithm
that works as follows: when a page needs to be swapped in,
the operating system swaps out the page whose next use will
occur farthest in the future. For example, a page that is not
going to be used for the next 6 seconds will be swapped out
over a page that is going to be used within the next 0.4
seconds.
5
This algorithm cannot be implemented in the general purpose
operating system because it is impossible to compute reliably
how long it will be before a page is going to be used, except
when all software that will run on a system is either known
beforehand and is amenable to the static analysis of its
memory reference patterns, or only a class of applications
allowing run-time analysis is allowed. Despite this limitation,
algorithms exist
]
that can offer near-optimal performance —
the operating system keeps track of all pages referenced by
the program, and it uses those data to decide which pages to
swap in and out on subsequent runs. This algorithm can offer
near-optimal performance, but not on the first run of a
program, and only if the program's memory reference pattern
is relatively consistent each time it runs.
3. Explain the concept of File.
A file system (often also written as filesystem) is
a method of storing and organizing computer files and their
data. Essentially, it organizes these files into a database for
the storage, organization, manipulation, and retrieval by the
computer's operating system. ost file systems make use of an
underlying data storage device that offers access to an array
of fixed-size physical sectors, generally a power of 2 in size
(512 bytes or 1, 2, or 4 KiB are most common). The file
system is responsible for organizing these sectors into files and
directories, and keeping track of which sectors belong to which
file and which are not being used. Most file systems address
6
data in fixed-sized units called "clusters" or "blocks" which
contain a certain number of disk sectors (usually 1-64). This is
the smallest amount of disk space that can be allocated to
hold a file.
However, file systems need not make use of a storage device
at all. A file system can be used to organize and represent
access to any data, whether it's stored or dynamically
generated
4. Explain the execution of RPC.
Remote procedure call (RPC) is an Inter-process
communication technology that allows a computer program to
cause a subroutine or procedure to execute in another address
space (commonly on another computer on a shared network)
without the programmer explicitly coding the details for this
remote interaction. That is, the programmer would write
essentially the same code whether the subroutine is local to the
executing program, or remote. When the software in question
is written using object-oriented principles, RPC may be
referred to as remote invocation or remote method
invocation.
A RPC is initiated by the client sending a request message to
a known remote server in order to execute a specified
procedure using supplied parameters. A response is returned
to the client where the application continues along with its
7
process. There are many variations and subtleties in various
implementations, resulting in a variety of different
(incompatible) RPC protocols. While the server is processing
the call, the client is blocked (it waits until the server has
finished processing before resuming execution).
An important difference between remote procedure calls and
local calls is that remote calls can fail because of
unpredictable network problems. Also, callers generally must
deal with such failures without knowing whether the remote
procedure was actually invoked. Idempotent procedures (those
which have no additional effects if called more than once) are
easily handled, but enough difficulties remain that code which
calls remote procedures is often confined to carefully written
low-level subsystems.
5. Write a note on computer virus.
A computer virus is a computer program that can copy
itself and infect a computer. The term "virus" is also
commonly but erroneously used to refer to other types of
malware, including but not limited to adware and spyware
programs that do not have the reproductive ability. A true
virus can spread from one computer to another (in some form
of executable code) when its host is taken to the target
computer; for instance because a user sent it over a network
or the Internet, or carried it on a removable medium such as
a floppy disk, CD, DVD, or USB drive. Viruses can increase
8
their chances of spreading to other computers by infecting
files on a network file system or a file system that is accessed
by another computer.
As stated above, the term "computer virus" is sometimes used
as a catch-all phrase to include all types of malware, even
those that do not have the reproductive ability. Malware
includes computer viruses, computer worms, Trojan horses,
most rootkits, spyware, dishonest adware and other malicious
and unwanted software, including true viruses. Viruses are
sometimes confused with worms and Trojan horses, which are
technically different. A worm can exploit security vulnerabilities
to spread itself automatically to other computers through
networks, while a Trojan horse is a program that appears
harmless but hides malicious functions. Worms and Trojan
horses, like viruses, may harm a computer system's data or
performance. Some viruses and other malware have symptoms
noticeable to the computer user, but many are surreptitious or
simply do nothing to call attention to themselves. Some viruses
do nothing beyond reproducing themselves.
6. Explain first-fit, best-fit and worst-fit allocation
algorithms with an example.
First Fit - A resource allocation scheme (usually for
memory). First Fit fits data into memory by scanning from the
beginning of available memory to the end, until the first free
space which is at least big enough to accept the data is
9
found. This space is then allocated to the data. Any left over
becomes a smaller, separate free space.
Best Fit - A resource allocation scheme (usually for
memory). Best Fit tries to determine the best place to put
the new data. The definition of 'best' may differ between
implementations, but one example might be to try and minimise
the wasted space at the end of the block being allocated -
i.e. use the smallest space which is big enough.
worst fit The allocation policy that always allocates from
the largest free block. Commonly implemented using a size-
ordered free block chain (largest first).In practice, this tends
to work quite badly because it eliminates all large blocks, so
large requests cannot be met.
Given five memory partitions of 100 KB, 500 KB, 200 KB, 300
KB, and 600 KB (in order), how would each of the first-fit,
best-fit, and worst-fit algorithms place processes of 212 KB,
417 KB, 112 KB, and 426 KB (in order)? Which algorithm makes
the most efficient use of memory?
(a) First-fit:
(b) 212K is put in 500K partition
(c) 417K is put in 600K partition
(d) 112K is put in 288K partition (new partition 288K = 500K
- 212K)
(e) 426K must wait
(f) Best-fit:
(g) 212K is put in 300K partition
(h) 417K is put in 500K partition
10
(i) 112K is put in 200K partition
(j) 426K is put in 600K partition
(k) Worst-fit:
(l) 212K is put in 600K partition
(m) 417K is put in 500K partition
(n) 112K is put in 388K partition
(o) 426K must wait
In this example, best-fit turns out to be the best.
7. Explain demand paging virtual memory system.
Demand paging follows that pages should only be brought into
memory if the executing process demands them. This is often
referred to as lazy evaluation as only those pages demanded
by the process are swapped from secondary storage to main
memory. Contrast this to pure swapping, where all memory for
a process is swapped from secondary storage to main memory
during the process startup.
When a process is to be swapped into main memory for
processing, the pager guesses which pages will be used prior
to the process being swapped out again. The pager will only
load these pages into memory. This process avoids loading
pages that are unlikely to be used and focuses on pages
needed during the current process execution period.
Therefore, not only is unnecessary page load during swapping
avoided but we also try to preempt which pages will be needed
and avoid loading pages during execution.
11
Commonly, to achieve this process a page table implementation
is used. The page table maps logical memory to physical
memory. The page table uses a bitwise operator to mark if a
page is valid or invalid. A valid page is one that currently
resides in main memory. An invalid page is one that currently
resides in secondary memory
8. Explain different operations possible on Files.
Files on a computer can be created, moved, modified,
grown, shrunk and deleted. In most cases, computer programs
that are executed on the computer handle these operations,
but the user of a computer can also manipulate files if
necessary. For instance, Microsoft Word files are normally
created and modified by the Microsoft Word program in
response to user commands, but the user can also move,
rename, or delete these files directly by using a file manager
program such as Windows Explorer (on Windows computers).
Although the way programs manipulate files varies according to
the operating system and file system involved, the following
operations are typical:
 Creating a file with a given name
 Setting attributes that control operations on the file
 Opening a file to use its contents
 Reading or updating the contents
12
 Committing updated contents to durable storage
 Closing the file, thereby losing access until it is opened
again
9. Explain how applications and data can be distributed.
Here are two main reasons for using distributed systems and
distributed computing. First, the very nature of the application
may require the use of a communication network that connects
several computers. For example, data is produced in one
physical location and it is needed in another location.
Second, there are many cases in which the use of a single
computer would be possible in principle, but the use of a
distributed system is beneficial for practical reasons. For
example, it may be more cost-efficient to obtain the desired
level of performance by using a cluster of several low-end
computers, in comparison with a single high-end computer. A
distributed system can be more reliable than a non-distributed
system, as there is no single point of failure. Moreover, a
distributed system may be easier to expand and manage than a
monolithic uniprocessor system
 The graph G is the structure of the computer network.
There is one computer for each node of G and one
communication link for each edge of G. Initially, each
computer only knows about its immediate neighbours in
the graph G; the computers must exchange messages with
13
each other to discover more about the structure of G.
Each computer must produce its own colour as output.
 The main focus is on coordinating the operation of an
arbitrary distributed system.
While the field of parallel algorithms has a different focus than
the field of distributed algorithms, there is a lot of
interaction between the two fields
10. How the protection is implemented using the concept
of domains?
System resources need to be protected. Resources
include both hardware and software. Different mechanisms for
protection are as used.
The operating system defines the concept of a domain .A
domain consists of objects and access rights of these objects.
A Subject then gets associated with the domain and access to
object in the domain .A domain is a set of access rights for
associated objects and a asystem consists of many such
domains.A user process alwaya executes in any one of the
domians. Domain switching is also possible.In reality domain is a
user with a specific id having different access right for
different objects such as files,directories and devices.Processes
created by the user inherit all access rights for that user.
14
On Windows Server Systems, a domain controller (DC) is a
server that responds to security authentication requests
(logging in, checking permissions, etc.) within the Windows
Server domain.[1] A domain is a concept introduced in Windows
NT whereby a user may be granted access to a number of
computer resources with the use of a single username and
password combination.

Mais conteúdo relacionado

Mais procurados

Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma
 
Gfs google-file-system-13331
Gfs google-file-system-13331Gfs google-file-system-13331
Gfs google-file-system-13331Fengchang Xie
 
Netw 230 Success Begins / snaptutorial.com
Netw 230  Success Begins / snaptutorial.comNetw 230  Success Begins / snaptutorial.com
Netw 230 Success Begins / snaptutorial.comWilliamsTaylor65
 
Oracle exalytics deployment for high availability
Oracle exalytics deployment for high availabilityOracle exalytics deployment for high availability
Oracle exalytics deployment for high availabilityPaulo Fagundes
 
Final jaypaper linux
Final jaypaper linuxFinal jaypaper linux
Final jaypaper linuxjaya380
 
Applyinga blockcentricapproach
Applyinga blockcentricapproachApplyinga blockcentricapproach
Applyinga blockcentricapproachoracle documents
 
Active directory interview_questions
Active directory interview_questionsActive directory interview_questions
Active directory interview_questionssubhashmr
 
Testing pc’s performance
Testing pc’s performanceTesting pc’s performance
Testing pc’s performanceiteclearners
 
Talon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategyTalon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategySaptarshi Chatterjee
 
Ppt project process migration
Ppt project process migrationPpt project process migration
Ppt project process migrationjaya380
 
Cassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User GroupCassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User GroupAdam Hutson
 
Hadoop distributed file system
Hadoop distributed file systemHadoop distributed file system
Hadoop distributed file systemsrikanthhadoop
 

Mais procurados (20)

Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
 
Hadoop
HadoopHadoop
Hadoop
 
Replistor Resume
Replistor ResumeReplistor Resume
Replistor Resume
 
Fsck Sx
Fsck SxFsck Sx
Fsck Sx
 
Memory management
Memory managementMemory management
Memory management
 
Gfs google-file-system-13331
Gfs google-file-system-13331Gfs google-file-system-13331
Gfs google-file-system-13331
 
Hadoop admin
Hadoop adminHadoop admin
Hadoop admin
 
Netw 230 Success Begins / snaptutorial.com
Netw 230  Success Begins / snaptutorial.comNetw 230  Success Begins / snaptutorial.com
Netw 230 Success Begins / snaptutorial.com
 
Oracle exalytics deployment for high availability
Oracle exalytics deployment for high availabilityOracle exalytics deployment for high availability
Oracle exalytics deployment for high availability
 
Final jaypaper linux
Final jaypaper linuxFinal jaypaper linux
Final jaypaper linux
 
Applyinga blockcentricapproach
Applyinga blockcentricapproachApplyinga blockcentricapproach
Applyinga blockcentricapproach
 
Active directory interview_questions
Active directory interview_questionsActive directory interview_questions
Active directory interview_questions
 
Testing pc’s performance
Testing pc’s performanceTesting pc’s performance
Testing pc’s performance
 
Talon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategyTalon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategy
 
Process coordination
Process coordinationProcess coordination
Process coordination
 
Ppt project process migration
Ppt project process migrationPpt project process migration
Ppt project process migration
 
Cassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User GroupCassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User Group
 
Sucet os module_4_notes
Sucet os module_4_notesSucet os module_4_notes
Sucet os module_4_notes
 
Hadoop distributed file system
Hadoop distributed file systemHadoop distributed file system
Hadoop distributed file system
 
4 026
4 0264 026
4 026
 

Destaque

Bt0070 operating systems 1
Bt0070 operating systems  1Bt0070 operating systems  1
Bt0070 operating systems 1Techglyphs
 
Bt0075 rdbms with mysql 2
Bt0075 rdbms with mysql 2Bt0075 rdbms with mysql 2
Bt0075 rdbms with mysql 2Techglyphs
 
Bt0066 database management system2
Bt0066 database management system2Bt0066 database management system2
Bt0066 database management system2Techglyphs
 
Bt0087 wml and wap programing2
Bt0087 wml and wap programing2Bt0087 wml and wap programing2
Bt0087 wml and wap programing2Techglyphs
 
Bt8901 objective oriented systems1
Bt8901 objective oriented systems1Bt8901 objective oriented systems1
Bt8901 objective oriented systems1Techglyphs
 
Bt0077 multimedia systems
Bt0077 multimedia systemsBt0077 multimedia systems
Bt0077 multimedia systemsTechglyphs
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing Techglyphs
 
Bt0084 technical communications 1
Bt0084 technical communications 1Bt0084 technical communications 1
Bt0084 technical communications 1Techglyphs
 
Bt0077 multimedia systems2
Bt0077 multimedia systems2Bt0077 multimedia systems2
Bt0077 multimedia systems2Techglyphs
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
Bt0066 database management system1
Bt0066 database management system1Bt0066 database management system1
Bt0066 database management system1Techglyphs
 
Bt9002 Grid computing 2
Bt9002 Grid computing 2Bt9002 Grid computing 2
Bt9002 Grid computing 2Techglyphs
 
Bt0081 software engineering2
Bt0081 software engineering2Bt0081 software engineering2
Bt0081 software engineering2Techglyphs
 
Bt0083 server side programing 2
Bt0083 server side programing  2Bt0083 server side programing  2
Bt0083 server side programing 2Techglyphs
 
Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1Techglyphs
 
Social media new uma1roopa
Social media new uma1roopaSocial media new uma1roopa
Social media new uma1roopaRoopa slideshare
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2Techglyphs
 
Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Techglyphs
 
Bt0084 technical communications 2
Bt0084 technical communications 2Bt0084 technical communications 2
Bt0084 technical communications 2Techglyphs
 
Bt0080 fundamentals of algorithms1
Bt0080 fundamentals of algorithms1Bt0080 fundamentals of algorithms1
Bt0080 fundamentals of algorithms1Techglyphs
 

Destaque (20)

Bt0070 operating systems 1
Bt0070 operating systems  1Bt0070 operating systems  1
Bt0070 operating systems 1
 
Bt0075 rdbms with mysql 2
Bt0075 rdbms with mysql 2Bt0075 rdbms with mysql 2
Bt0075 rdbms with mysql 2
 
Bt0066 database management system2
Bt0066 database management system2Bt0066 database management system2
Bt0066 database management system2
 
Bt0087 wml and wap programing2
Bt0087 wml and wap programing2Bt0087 wml and wap programing2
Bt0087 wml and wap programing2
 
Bt8901 objective oriented systems1
Bt8901 objective oriented systems1Bt8901 objective oriented systems1
Bt8901 objective oriented systems1
 
Bt0077 multimedia systems
Bt0077 multimedia systemsBt0077 multimedia systems
Bt0077 multimedia systems
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing
 
Bt0084 technical communications 1
Bt0084 technical communications 1Bt0084 technical communications 1
Bt0084 technical communications 1
 
Bt0077 multimedia systems2
Bt0077 multimedia systems2Bt0077 multimedia systems2
Bt0077 multimedia systems2
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
Bt0066 database management system1
Bt0066 database management system1Bt0066 database management system1
Bt0066 database management system1
 
Bt9002 Grid computing 2
Bt9002 Grid computing 2Bt9002 Grid computing 2
Bt9002 Grid computing 2
 
Bt0081 software engineering2
Bt0081 software engineering2Bt0081 software engineering2
Bt0081 software engineering2
 
Bt0083 server side programing 2
Bt0083 server side programing  2Bt0083 server side programing  2
Bt0083 server side programing 2
 
Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1
 
Social media new uma1roopa
Social media new uma1roopaSocial media new uma1roopa
Social media new uma1roopa
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2
 
Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Bt0067 c programming and data structures2
Bt0067 c programming and data structures2
 
Bt0084 technical communications 2
Bt0084 technical communications 2Bt0084 technical communications 2
Bt0084 technical communications 2
 
Bt0080 fundamentals of algorithms1
Bt0080 fundamentals of algorithms1Bt0080 fundamentals of algorithms1
Bt0080 fundamentals of algorithms1
 

Semelhante a Operating Systems: Virtual Address Mapping and Page Tables

Operating system Memory management
Operating system Memory management Operating system Memory management
Operating system Memory management Shashank Asthana
 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1rohassanie
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memoryvampugani
 
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by KeylabsSAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by Keylabskeylabstraining
 
1.sap basis material_keylabs1
1.sap basis material_keylabs11.sap basis material_keylabs1
1.sap basis material_keylabs1chipanda
 
MongoDB Sharding
MongoDB ShardingMongoDB Sharding
MongoDB Shardinguzzal basak
 
Google File System
Google File SystemGoogle File System
Google File SystemDreamJobs1
 
Cache memory and cache
Cache memory and cacheCache memory and cache
Cache memory and cacheVISHAL DONGA
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementkazim Hussain
 
1.multicore processors
1.multicore processors1.multicore processors
1.multicore processorsHebeon1
 

Semelhante a Operating Systems: Virtual Address Mapping and Page Tables (20)

virtual memory
virtual memoryvirtual memory
virtual memory
 
Operating system Memory management
Operating system Memory management Operating system Memory management
Operating system Memory management
 
os
osos
os
 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1
 
Nachos 2
Nachos 2Nachos 2
Nachos 2
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
 
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by KeylabsSAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
 
1.sap basis material_keylabs1
1.sap basis material_keylabs11.sap basis material_keylabs1
1.sap basis material_keylabs1
 
MongoDB Sharding
MongoDB ShardingMongoDB Sharding
MongoDB Sharding
 
Operating system
Operating systemOperating system
Operating system
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
 
UNIT-2 OS.pptx
UNIT-2 OS.pptxUNIT-2 OS.pptx
UNIT-2 OS.pptx
 
Google File System
Google File SystemGoogle File System
Google File System
 
Cache memory and cache
Cache memory and cacheCache memory and cache
Cache memory and cache
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
 
1.multicore processors
1.multicore processors1.multicore processors
1.multicore processors
 

Mais de Techglyphs

Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1Techglyphs
 
Bt8901 objective oriented systems2
Bt8901 objective oriented systems2Bt8901 objective oriented systems2
Bt8901 objective oriented systems2Techglyphs
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Techglyphs
 
Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)Techglyphs
 
Bt0064 logic design1
Bt0064 logic design1Bt0064 logic design1
Bt0064 logic design1Techglyphs
 
Bt0064 logic design2
Bt0064 logic design2Bt0064 logic design2
Bt0064 logic design2Techglyphs
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Techglyphs
 
Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2Techglyphs
 
Bt0074 oops with java2
Bt0074 oops with java2Bt0074 oops with java2
Bt0074 oops with java2Techglyphs
 
Bt0074 oops with java
Bt0074 oops with javaBt0074 oops with java
Bt0074 oops with javaTechglyphs
 
Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1Techglyphs
 
Bt0078 website design
Bt0078 website design Bt0078 website design
Bt0078 website design Techglyphs
 
Bt0078 website design 2
Bt0078 website design 2Bt0078 website design 2
Bt0078 website design 2Techglyphs
 
Bt0080 fundamentals of algorithms2
Bt0080 fundamentals of algorithms2Bt0080 fundamentals of algorithms2
Bt0080 fundamentals of algorithms2Techglyphs
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineeringTechglyphs
 
Bt0082 visual basic2
Bt0082 visual basic2Bt0082 visual basic2
Bt0082 visual basic2Techglyphs
 
Bt0082 visual basic
Bt0082 visual basicBt0082 visual basic
Bt0082 visual basicTechglyphs
 

Mais de Techglyphs (17)

Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1
 
Bt8901 objective oriented systems2
Bt8901 objective oriented systems2Bt8901 objective oriented systems2
Bt8901 objective oriented systems2
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)
 
Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)
 
Bt0064 logic design1
Bt0064 logic design1Bt0064 logic design1
Bt0064 logic design1
 
Bt0064 logic design2
Bt0064 logic design2Bt0064 logic design2
Bt0064 logic design2
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture
 
Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2
 
Bt0074 oops with java2
Bt0074 oops with java2Bt0074 oops with java2
Bt0074 oops with java2
 
Bt0074 oops with java
Bt0074 oops with javaBt0074 oops with java
Bt0074 oops with java
 
Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1
 
Bt0078 website design
Bt0078 website design Bt0078 website design
Bt0078 website design
 
Bt0078 website design 2
Bt0078 website design 2Bt0078 website design 2
Bt0078 website design 2
 
Bt0080 fundamentals of algorithms2
Bt0080 fundamentals of algorithms2Bt0080 fundamentals of algorithms2
Bt0080 fundamentals of algorithms2
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
Bt0082 visual basic2
Bt0082 visual basic2Bt0082 visual basic2
Bt0082 visual basic2
 
Bt0082 visual basic
Bt0082 visual basicBt0082 visual basic
Bt0082 visual basic
 

Último

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Último (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Operating Systems: Virtual Address Mapping and Page Tables

  • 2. 2 1. Explain how virtual addresses are mapped on to physical addresses. Let's assume that we have 1M of RAM. RAM is also called physical memory. We can subdivide the RAM into 4K pages. Thus 1M / 4K = 256 pages. Thus, our RAM has 256 physical pages, weach holding 4K. Let's assume we have 10 M of disk. Thus, we have 2560 disk pages. In principle, each program may have up to 4 G of address space. Thus, it can, in principle, access 2 20 virtual pages. In reality, many of those pages are considered invalid pages. Page Tables How is an address translated from virtual to physical? First, like the cache, we split up a 32 bit virtual address into a virtual page (which is like a tag) and a page offset. If this looks a lot like a fully-associative cache, but whose offset is much much larger, it's because that's basically what it is.
  • 3. 3 We must convert the virtual page number to a physical page number. In our example, the virtual page consists of 20 bits. A page table is a data structure which consists of 2 20 page table entries (PTEs). Think of the page table as an array of page table entries, indexed by the virtual page number. The page table's index starts at 0, and ends at 2 20 - 1. Here's how it looks: Translation Suppose your program generated the following virtual address F0F0F0F0hex (which is 1111 0000 1111 0000 1111 0000 1111 0000 two). First, you would split the address into a virtual page, and a
  • 4. 4 page offset (see below). Then, you'd see if the virtual page had a corresponding physical page in RAM using the page table. If the valid bit of the PTE is 1, then you'd translate the virtual page to a physical page, and append the page offset. That would give you a physical address in RAM. 2. Discuss the Optimal Page Replacement algorithm. The theoretically optimal page replacement algorithm , or Belady's optimal page replacement policy is an algorithm that works as follows: when a page needs to be swapped in, the operating system swaps out the page whose next use will occur farthest in the future. For example, a page that is not going to be used for the next 6 seconds will be swapped out over a page that is going to be used within the next 0.4 seconds.
  • 5. 5 This algorithm cannot be implemented in the general purpose operating system because it is impossible to compute reliably how long it will be before a page is going to be used, except when all software that will run on a system is either known beforehand and is amenable to the static analysis of its memory reference patterns, or only a class of applications allowing run-time analysis is allowed. Despite this limitation, algorithms exist ] that can offer near-optimal performance — the operating system keeps track of all pages referenced by the program, and it uses those data to decide which pages to swap in and out on subsequent runs. This algorithm can offer near-optimal performance, but not on the first run of a program, and only if the program's memory reference pattern is relatively consistent each time it runs. 3. Explain the concept of File. A file system (often also written as filesystem) is a method of storing and organizing computer files and their data. Essentially, it organizes these files into a database for the storage, organization, manipulation, and retrieval by the computer's operating system. ost file systems make use of an underlying data storage device that offers access to an array of fixed-size physical sectors, generally a power of 2 in size (512 bytes or 1, 2, or 4 KiB are most common). The file system is responsible for organizing these sectors into files and directories, and keeping track of which sectors belong to which file and which are not being used. Most file systems address
  • 6. 6 data in fixed-sized units called "clusters" or "blocks" which contain a certain number of disk sectors (usually 1-64). This is the smallest amount of disk space that can be allocated to hold a file. However, file systems need not make use of a storage device at all. A file system can be used to organize and represent access to any data, whether it's stored or dynamically generated 4. Explain the execution of RPC. Remote procedure call (RPC) is an Inter-process communication technology that allows a computer program to cause a subroutine or procedure to execute in another address space (commonly on another computer on a shared network) without the programmer explicitly coding the details for this remote interaction. That is, the programmer would write essentially the same code whether the subroutine is local to the executing program, or remote. When the software in question is written using object-oriented principles, RPC may be referred to as remote invocation or remote method invocation. A RPC is initiated by the client sending a request message to a known remote server in order to execute a specified procedure using supplied parameters. A response is returned to the client where the application continues along with its
  • 7. 7 process. There are many variations and subtleties in various implementations, resulting in a variety of different (incompatible) RPC protocols. While the server is processing the call, the client is blocked (it waits until the server has finished processing before resuming execution). An important difference between remote procedure calls and local calls is that remote calls can fail because of unpredictable network problems. Also, callers generally must deal with such failures without knowing whether the remote procedure was actually invoked. Idempotent procedures (those which have no additional effects if called more than once) are easily handled, but enough difficulties remain that code which calls remote procedures is often confined to carefully written low-level subsystems. 5. Write a note on computer virus. A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase
  • 8. 8 their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. 6. Explain first-fit, best-fit and worst-fit allocation algorithms with an example. First Fit - A resource allocation scheme (usually for memory). First Fit fits data into memory by scanning from the beginning of available memory to the end, until the first free space which is at least big enough to accept the data is
  • 9. 9 found. This space is then allocated to the data. Any left over becomes a smaller, separate free space. Best Fit - A resource allocation scheme (usually for memory). Best Fit tries to determine the best place to put the new data. The definition of 'best' may differ between implementations, but one example might be to try and minimise the wasted space at the end of the block being allocated - i.e. use the smallest space which is big enough. worst fit The allocation policy that always allocates from the largest free block. Commonly implemented using a size- ordered free block chain (largest first).In practice, this tends to work quite badly because it eliminates all large blocks, so large requests cannot be met. Given five memory partitions of 100 KB, 500 KB, 200 KB, 300 KB, and 600 KB (in order), how would each of the first-fit, best-fit, and worst-fit algorithms place processes of 212 KB, 417 KB, 112 KB, and 426 KB (in order)? Which algorithm makes the most efficient use of memory? (a) First-fit: (b) 212K is put in 500K partition (c) 417K is put in 600K partition (d) 112K is put in 288K partition (new partition 288K = 500K - 212K) (e) 426K must wait (f) Best-fit: (g) 212K is put in 300K partition (h) 417K is put in 500K partition
  • 10. 10 (i) 112K is put in 200K partition (j) 426K is put in 600K partition (k) Worst-fit: (l) 212K is put in 600K partition (m) 417K is put in 500K partition (n) 112K is put in 388K partition (o) 426K must wait In this example, best-fit turns out to be the best. 7. Explain demand paging virtual memory system. Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those pages demanded by the process are swapped from secondary storage to main memory. Contrast this to pure swapping, where all memory for a process is swapped from secondary storage to main memory during the process startup. When a process is to be swapped into main memory for processing, the pager guesses which pages will be used prior to the process being swapped out again. The pager will only load these pages into memory. This process avoids loading pages that are unlikely to be used and focuses on pages needed during the current process execution period. Therefore, not only is unnecessary page load during swapping avoided but we also try to preempt which pages will be needed and avoid loading pages during execution.
  • 11. 11 Commonly, to achieve this process a page table implementation is used. The page table maps logical memory to physical memory. The page table uses a bitwise operator to mark if a page is valid or invalid. A valid page is one that currently resides in main memory. An invalid page is one that currently resides in secondary memory 8. Explain different operations possible on Files. Files on a computer can be created, moved, modified, grown, shrunk and deleted. In most cases, computer programs that are executed on the computer handle these operations, but the user of a computer can also manipulate files if necessary. For instance, Microsoft Word files are normally created and modified by the Microsoft Word program in response to user commands, but the user can also move, rename, or delete these files directly by using a file manager program such as Windows Explorer (on Windows computers). Although the way programs manipulate files varies according to the operating system and file system involved, the following operations are typical:  Creating a file with a given name  Setting attributes that control operations on the file  Opening a file to use its contents  Reading or updating the contents
  • 12. 12  Committing updated contents to durable storage  Closing the file, thereby losing access until it is opened again 9. Explain how applications and data can be distributed. Here are two main reasons for using distributed systems and distributed computing. First, the very nature of the application may require the use of a communication network that connects several computers. For example, data is produced in one physical location and it is needed in another location. Second, there are many cases in which the use of a single computer would be possible in principle, but the use of a distributed system is beneficial for practical reasons. For example, it may be more cost-efficient to obtain the desired level of performance by using a cluster of several low-end computers, in comparison with a single high-end computer. A distributed system can be more reliable than a non-distributed system, as there is no single point of failure. Moreover, a distributed system may be easier to expand and manage than a monolithic uniprocessor system  The graph G is the structure of the computer network. There is one computer for each node of G and one communication link for each edge of G. Initially, each computer only knows about its immediate neighbours in the graph G; the computers must exchange messages with
  • 13. 13 each other to discover more about the structure of G. Each computer must produce its own colour as output.  The main focus is on coordinating the operation of an arbitrary distributed system. While the field of parallel algorithms has a different focus than the field of distributed algorithms, there is a lot of interaction between the two fields 10. How the protection is implemented using the concept of domains? System resources need to be protected. Resources include both hardware and software. Different mechanisms for protection are as used. The operating system defines the concept of a domain .A domain consists of objects and access rights of these objects. A Subject then gets associated with the domain and access to object in the domain .A domain is a set of access rights for associated objects and a asystem consists of many such domains.A user process alwaya executes in any one of the domians. Domain switching is also possible.In reality domain is a user with a specific id having different access right for different objects such as files,directories and devices.Processes created by the user inherit all access rights for that user.
  • 14. 14 On Windows Server Systems, a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain.[1] A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.