Operating Systems Assignment 3: Buffering, Least Privilege Principle, Disk Scheduling Algorithms, and DMA
Verified
Added on 2023/05/30
|6
|1101
|95
AI Summary
This Operating Systems assignment covers topics such as buffering, least privilege principle, disk scheduling algorithms, and DMA. It includes a description of the OS mechanism for process management, timing, memory, I/O, file, and concurrency management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Assignmen t 3 Instructions: This Assignment must be submitted on Blackboard (WORD format only) via the allocated folder. Email submission will not be accepted. You are advised to make your work clear and well-presented, marks may be reduced for poor presentatio You MUST show all your work, and text must not be converted into an image, unless specified otherwise Late submission will result in ZERO marks being awarded. The work should be your own, copying from students or other resources will result in ZERO marks. UseTimes New Romanfont for all your answers. College of Computing and Informatics Student Details: Name:### CRN:### ID:### Operating Systems IT-241
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Pg.1Question FourQuestion Four Question One 1.What are the three reasons that buffering is performed? The three purpose of buffering are: Synchronization of the speed between different devices: The difference of the two devices may vary. In case of slow device, the processing of the data may be slow (Silberschatz, Gagne and Galvin 2018). In case , when the buffer is full, all the contents are transferred to the fast buffer. In this way two buffers alternate for the transfer of the data. This is known as double buffering. Difference in the data transfer size: The size of data to be transferred may be different. In this case the use of buffer in done in a networking system for the breaking of the messages into smaller packets (Silberschatz, Gagne and Galvin 2018). After the receiving of the data, the fragmented messages are reassembled. Supporting for copying semantics: In case, if the non blocking interface executes the return instructions, the content of the buffer is needed to be copied to another location, so that the content of the application can be modified after the execution of return function. Learning Outcome(s): Describe the OS mechanism for process management, timing, memory, I/O, file and concurrency management. 1.5Mark
Pg.2Question FourQuestion Four Question Two What is the least privilege principle? Why such a principle aid in the creation of protection systems? Least privilege layer is defined as the creation of the abstract layer in a computing environment. In this situation a user or a processcan only access the information which are necessary and have legitimate purposes for the access. This provides the concept of user account (Dautenhahnet al.2015). The access through the user account will control the access on the content of the system by the users. The least privilege principal provides the advantage controlling the access and abstraction of data. This helps to protect sensitive information and data from the users. In this case, the user can access the necessary part for the uses through user account. On the other hand,admin can control the whole system through the admin access. This protects information inform of access control. Learning Outcome(s): Describe the OS mechanism for process management, timing, memory, I/O, file and concurrency management. 1.5 Mark
Pg.3Question FourQuestion Four Question Three Consider the following request queue for disk cylinders: 75, 168, 92, 22, 55, 78, 39, 82, 157, 99 Using following disk scheduling algorithms, find the total head movements using schematic diagram for a disk of 200 cylinders (0-199). It is assumed that read write head is initially present at cylinder number 50. a.First Come First Serve (FCFS) b.Shortest Seek Time First (SSTF) FCFS Total head movement computation: (THM)=(168-50)+(168-92)+(92-22)+(55-22)+(78-55)+(78-39)+(82- 39)+(157-82)+(157-99) =535 Shortest Seek Time First Total head movement computation: (THM)= (55-50)+ (168-55)+(82-55) =5+113+27=145 Learning Outcome(s): Describe the OS mechanism for process management, timing, memory, I/O, file and concurrency management 2 Mark
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Pg.4Question FourQuestion Four Question Four Why is DMA used for devices that execute large transfers? DMA is defined as Direct Memory Access, where hardware components can access the main memory, without the interface of central processing unit. It is referred as “memory to memory” moving information. DMA is referred as one of faster technique of the synchronization process. DMA request is sent by the DMA controller to CPU. After acknowledge the request CPU allows the DMA controller to get the control of all data, address and control bus lines for the direct transfer of the data with out the interface of central processing unit (Bergstenet al.2016). There are certain advantages of using DMA. It allows few CPU cycle for each transfer which increase the transfer rates. This makes the DMA suitable for transferring the large chunk of data , as the transfer will take fewer CPU cycle and the whole process will be completed in a faster way. Learning Outcome(s): Describe the OS mechanism for process management, timing, memory, I/O, file and concurrency management 1 Mark
Pg.5Question FourQuestion Four References Bergsten, J.R., Lomelino, L.W., Christ, C. and Lahr, S.R., APEIRON DATA SYSTEMS, 2016.Method and apparatus for accessing multiple storage devices from multiple hosts without use of remote direct memory access (RDMA). U.S. Patent 9,483,431. Dautenhahn, N., Kasampalis, T., Dietz, W., Criswell, J. and Adve, V., 2015, March. Nested kernel: An operating system architecture for intra-kernel privilege separation. InACM SIGPLAN Notices(Vol. 50, No. 4, pp. 191-206). ACM. Silberschatz, A., Gagne, G. and Galvin, P.B., 2018.Operating system concepts. Wiley.