search
Log In

Recent questions tagged galvin

0 votes
0 answers
1
Discuss the advantages and disadvantages of associating with remote file systems (stored on file servers) a set of failure semantics different from that associated with local file systems.
asked Mar 22, 2019 in Operating System ajaysoni1924 89 views
0 votes
0 answers
2
Some systems provide file sharing by maintaining a single copy of a file. Other systems maintain several copies, one for each of the users sharing the file. Discuss the relative merits of each approach
asked Mar 22, 2019 in Operating System ajaysoni1924 59 views
0 votes
0 answers
3
Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to a file that is stored in a different volume).
asked Mar 22, 2019 in Operating System ajaysoni1924 75 views
0 votes
0 answers
4
0 votes
1 answer
5
If the operating system knew that a certain application was going to access file data in a sequential manner, how could it exploit this information to improve performance?
asked Mar 22, 2019 in Operating System ajaysoni1924 85 views
0 votes
0 answers
6
Some systems automatically open a file when it is referenced for the first time and close the file when the job terminates. Discuss the advantages and disadvantages of this scheme compared with the more traditional one, where the user has to open and close the file explicitly
asked Mar 22, 2019 in Operating System ajaysoni1924 41 views
0 votes
0 answers
7
0 votes
0 answers
8
Discuss the reasons why the operating system might require accurate information on how blocks are stored on a disk. How could the operating system improve file-system performance with this knowledge ?
asked Mar 22, 2019 in Operating System akash.dinkar12 114 views
0 votes
0 answers
9
Compare the performance of $C-SCAN$ and $SCAN$ scheduling, assuming a uniform distribution of requests. Consider the average response time (the time between the arrival of a request and the completion of that request’s service), the variation in response time, and the effective bandwidth. How does performance depend on the relative sizes of seek time and rotational latency ?
asked Mar 22, 2019 in Operating System akash.dinkar12 104 views
0 votes
0 answers
10
Suppose that a disk drive has $5,000$ cylinders, numbered $0$ to $4,999$. The drive is currently serving a request at cylinder $2,150$, and the previous request was at cylinder $1,805$. The queue of pending requests, in $FIFO$ ... for each of the following disk-scheduling algorithms ? $a. FCFS$ $b. SSTF$ $c. SCAN$ $d. LOOK$ $e. C-SCAN$ $f. C-LOOK$
asked Mar 22, 2019 in Operating System akash.dinkar12 106 views
0 votes
0 answers
11
0 votes
1 answer
12
None of the disk-scheduling disciplines, except $FCFS$, is truly fair (starvation may occur). a. Explain why this assertion is true. b. Describe a way to modify algorithms such as $SCAN$ to ensure fairness. c. Explain why fairness is an important goal in a ... d. Give three or more examples of circumstances in which it is important that the operating system be unfair in serving $I/O$ requests.
asked Mar 22, 2019 in Operating System akash.dinkar12 95 views
0 votes
0 answers
13
It is sometimes said that tape is a sequential-access medium, whereas a magnetic disk is a random-access medium. In fact, the suitability of a storage device for random access depends on the transfer size. The term streaming transfer rate denotes the rate for a data transfer that ... cache, memory, and tape. $f$. When is a tape a random-access device, and when is it a sequential-access device ?
asked Mar 22, 2019 in Operating System akash.dinkar12 111 views
0 votes
1 answer
14
Why is rotational latency usually not considered in disk scheduling ? How would you modify $SSTF$, $SCAN$, and $C-SCAN$ to include latency optimization ?
asked Mar 22, 2019 in Operating System akash.dinkar12 70 views
0 votes
0 answers
15
0 votes
1 answer
16
1 vote
0 answers
17
Consider a system that allocates pages of different sizes to its processes. What are the advantages of such a paging scheme ? What modifications to the virtual memory system provide this functionality ?
asked Mar 22, 2019 in Operating System akash.dinkar12 123 views
0 votes
0 answers
18
The slab-allocation algorithm uses a separate cache for each different object type. Assuming there is one cache per object type, explain why this scheme doesn’t scale well with multiple CPUs. What could be done to address this scalability issue?
asked Mar 22, 2019 in Operating System akash.dinkar12 60 views
0 votes
2 answers
19
A system provides support for user-level and kernel-level threads. The mapping in this system is one to one (there is a corresponding kernel thread for each user thread). Does a multithreaded process consist of $(a)$ a working set for the entire process or $(b)$ a working set for each thread ? Explain
asked Mar 22, 2019 in Operating System akash.dinkar12 133 views
0 votes
0 answers
20
Consider the parameter$\triangle$ used to define the working-set window in the working-set model. When $\triangle$ is set to a small value, what is the effect on the page-fault frequency and the number of active (non suspended) processes currently executing in the system ? What is the effect when $\triangle$ is set to a very high value ?
asked Mar 22, 2019 in Operating System akash.dinkar12 83 views
1 vote
1 answer
21
0 votes
1 answer
22
What is the cause of thrashing ? How does the system detect thrashing ? Once it detects thrashing, what can the system do to eliminate this problem ?
asked Mar 22, 2019 in Operating System akash.dinkar12 52 views
0 votes
0 answers
23
Consider a demand-paging system with a paging disk that has an average access and transfer time of $20$ milliseconds. Addresses are translated through a page table in main memory, with an access time of $1$ microsecond per memory access. Thus, each memory reference through ... those remaining, $10$ percent (or $2$ percent of the total) cause page faults. What is the effective memory access time?
asked Mar 22, 2019 in Operating System akash.dinkar12 105 views
1 vote
0 answers
24
A page-replacement algorithm should minimize the number of page faults. We can achieve this minimization by distributing heavily used pages evenly over all of memory, rather than having them compete for a small number of page frames. We can associate with each page ... number of page faults for an optimal page replacement strategy for the reference string in part $b$ with four page frames?
asked Mar 22, 2019 in Operating System akash.dinkar12 211 views
0 votes
0 answers
25
What are the advantages and disadvantages of providing mandatory locks instead of advisory locks whose use is left to users’ discretion?
asked Mar 22, 2019 in Operating System ajaysoni1924 68 views
0 votes
0 answers
26
The open-file table is used to maintain information about files that are currently open. Should the operating system maintain a separate table for each user or maintain just one table that contains references to files that are currently being accessed by all users? If ... file is being accessed by two different programs or users, should there be separate entries in the open-file table? Explain.
asked Mar 22, 2019 in Operating System ajaysoni1924 50 views
0 votes
0 answers
27
Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist.What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?
asked Mar 22, 2019 in Operating System ajaysoni1924 51 views
0 votes
0 answers
28
Researchers have suggested that, instead of having an access list associated with each file (specifying which users can access the file, and how), we should have a user control list associated with each user (specifying which files a user can access, and how). Discuss the relative merits of these two schemes.
asked Mar 22, 2019 in Operating System ajaysoni1924 25 views
0 votes
0 answers
29
Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of these users to be able to access one file. a. How would you specify this protection scheme in UNIX? b. Can you suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX?
asked Mar 22, 2019 in Operating System ajaysoni1924 54 views
0 votes
0 answers
30
In some systems, a subdirectory can be read and written by an authorized user, just as ordinary files can be. a. Describe the protection problems that could arise. b. Suggest a scheme for dealing with each of these protection problems.
asked Mar 22, 2019 in Operating System ajaysoni1924 26 views
...