Monday, June 3, 2019
The System Level And The Programmer Level Information Technology Essay
The System Level And The Programmer Level Information Technology EssayProbably not, since every protection scheme devised by a human can also be broken and the more complex the scheme is, the more difficult it is to be confident of its correct implementation. As comp atomic number 18d to dedicated machines, time-shared machines are far less secure, and are very easy to overload the cushions. They are also much laggard to catch a virus. But in dedicated machine, completely resources are available to the process being run.Q2) Under what circumstances would a user be better off using a time sharing system rather than a PC or single user workstation?Ans . When on that point are few other users, the project is self-aggrandizing, and the computer hardware is fast, time-sharing makes sense. The full power of the system can be brought to bear on the users problem. The problem can be solved faster than on a personal reckoner. Another case occurs when lots of other users need resources at the same time. A personal computer is best when the job is small enough to be executed reasonably on it and when performance is sufficient to execute the program to the users satisfaction.Q3) In the designing of the operational system there are two improvementes modular spirit and layered approach? How are they different?Ans. There are various differences between moduler mettle and layered approach-A modular kernel differs from a layered approach in that there is less overhead in making a call to a lower level part of the kernel. The call doesnt have to jump through numerous layers before work gets done and parts are aware of any(prenominal) other parts of the kernel and not just what is below them.Modular kernel is more secure as compared to layered approach, as more operations are done in user mode than in kernel mode.Debugging and modification of data is much easier in layered approach because changes affect only limited sections of the system rather than touching all se ctions of the system.In modular kernel approach, kernel design and its functionality are more unproblematic as compared to layered approach.Part BQ4) There is guest operating system and a host operating system like VMware? List all the factors in choosing the host operating system?Ans. A host operating system is the operating system that is in direct communication with the hardware. It has direct hardware access to kernel mode and all of the devices on the corporal machine. The guest operating system runs on top of a virtualization layer and all of the physical devices are virtualized. A host operating system should be as modular and thin as possible to allow the virtualization of the hardware to be as close to the physical hardware as possible, and so that dependencies that exist in the host operating dont restrict operation in the guest operating system.Q5) The kernel is responsible for a action with the processes. Search through the action of kernel and describe what is the act ion?Ans. The various actions of the kernel are as followsThe main task of a kernel is to allow the execution of applications and support them with features such as hardware abstractions.To run an application, a kernel typically sets up an character blank shellfor the application, loads the file containing the applications code into memory, sets up astackfor the program and branches to a given location inside the program, thus starting its execution.The kernel uses programing algorithmsto determine which process is running next and how much time it will be given. The algorithm chosen whitethorn allow for some processes to have high priority than others.To perform useful functions, processes need access to theperipheralsconnected to the computer, which are controlled by the kernel throughdevice drivers.If sometimes the interrupt has been occurred during execution of any process then it saves the state(address) of current process, and after that when interrupt has been removed then i t restores the state(address) of previous process.Q6) Considering both the system level and the software engineer level.Consider the advantage and single out of the following structure.Synchronous and a synchronal communication. automatic rifle and explicit buffering.Send by repeat and bare by generatorFixed-sized and variable-sized message.AnsSynchronous and asynchronous communication-synchronous communicationAdvantage you can get an immediate response instant feedback fosters communication there seems to be a more emotional bonding force play between people when there is a possiblity to communicate in real time (synchronously), spontaneity.Disadvantage There is less time to think approximately what you require to say or your response to another time may be a limiting factor, e.g time zones synchronous communication over the computer may be difficult because of the speed of data transaction with slower connections you need extra equipment (speakers, microphone, webcamera).a synchronous communicationAdvantage you have time to think about what you want to say time is not a constraint. You can receive the message whenever you have time and you can analyze the content of the message more carefully so the answer you give can be even more meaningful because it has gone through a process of elaboration.Disadvantage no immediate response, especially where time is significant you may not know if the other person has received your message the message loses human contact.Automatic and explicit buffering Automatic buffering Advantage Automatic buffering provides a queue with indenite length thus ensuring the sender will never have to block patch postponement to copy a message.Disadvantage There are no specifications how automatic buffering will be provided one scheme may reserve sufficiently large memory where much of the memory is wasted.Explicit bufferingAdvantage Explicit buffering species how large the bufferis.Disadvantage In this situation, the sender may be blocked while waiting for available space in the queue. However, it is less likely memory will be wasted with explicit buffering.Send by copy and send by reference Send by copyAdvantage send by copy is better for synchronization issues.Disadvantage Send by copy does not allow the receiver to alter the state of parameter.send by referenceAdvantage A benet of send by reference is that it allows the programmer to write a distributed version of a centralized application Javas RMI provides both, however passing a parameter by reference requires declaring the parameter as a remote object as well. Send by reference also allow the receiver to alter the state of parameter.Disadvantage send by reference can compromise the security of an organisation because sensitive information can be easily distributed accidently or deliberately.Fixed-sized and variable-sized messages Fixed-sized messagesAdvantage The implications of this are mostly related to buffering issues with xed-size messages, a buffer with a specic size can hold a known number of messages.Disadvantage with xed-sized messages the messages are copied from the address space of the sender to the address space of the receiving process.Variable-sized messagesAdvantage variable-sized messages (i.e. Larger messages) use shared memory to pass the message.Disadvantage The number of variable-sized messages that can be held by such a buffer is unknown.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.