New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
computer architecture
The Architecture of Computer Hardware, Systems Software and Networking An Information Technology App 5th edition Irv Englander - Solutions
For the computer that you normally use, identify which pieces constitute the hardware and which pieces constitute the system software. Now think about the file system of your computer. What part of the file system is hardware, what part software, and what part data?
Look at the computer ads on the business pages of a large daily newspaper and make a list of all the terms used that you don’t understand. Save this list and check it from time to time during the semester. Cross out the items that you now understand and look up the items that have been covered
What is a protocol? What is a standard? Do all protocols have to be standards? Explain. Are all standards protocols? Explain.
Virtualization is a concept that has taken on major importance in the early twenty-first century. Explain what is meant by virtualization.
The book compares a large mainframe computer to a smartphone or tablet, and states that the difference between them is one of magnitude, not of concept. Explain the meaning of that statement.
The book divides the software component of a computer system into two major categories. Identify each category and give an example of each that you are already familiar with. Briefly explain the role of each category.
Explain the differences between primary storage and secondary storage. What is each type used for?
One way to view an information technology system is to consider an IT system as consisting of four major components or building blocks. This book takes this approach by dividing the remainder of the book into parts, with a part devoted to each major type of component. What are the four components
Any computer system, large or small, can be represented by the four elements of an IPO model. Draw an IPO model; clearly label each of the four elements in your drawing.
It is possible to provide more flexible protection than that in the Intel Pentium architecture by using a protection scheme similar to that used in the Hewlett-Packard Precision Architecture (HP/PA). In such a scheme, each page table entry contains a “protection ID” (key) along with access
How big should a TLB be? TLB misses are usually very fast (fewer than 10 instructions plus the cost of an exception), so it may not be worth having a huge TLB just to lower the TLB miss rate a bit. Using the SimpleScalar simulator (www.cs.wisc.edu/~mscalar/simplescalar.html) and one or more SPEC95
Power efficiency has become very important for modern processors, particularly for embedded systems. Create a version of gcc for two architectures that you have access to, such as x86, MIPS, PowerPC, and ARM. Compile a subset of EEMBC benchmarks while using EnergyBench to measure energy usage
Gcc targets most modern instruction set architectures (see www.gnu.org/software/gcc/). Create a version of gcc for several architectures that you have access to, such as x86, MIPS, PowerPC, and ARM.a. Compile a subset of SPEC CPU2006 integer benchmarks and create a table of code sizes. Which
SPIM is a popular simulator for simulating MIPS processors. Use SPIM to measure the instruction set mix for some SPEC CPU2006 benchmark programs.
For the SGEMM code developed above for the i7 processor, include the use of AVX intrinsics to improve the performance. In particular, try to vectorize your code to better utilize the AVX hardware. Compare the code size and performance to the original code.
Newer processors such as Intel’s i7 Sandy Bridge include support for AVX vector/multimedia instructions. Write a dense matrix multiply function using single-precision values and compile it with different compilers and optimization flags. Linear algebra codes using Basic Linear Algebra Subroutine
Many computer manufacturers now include tools or simulators that allow you to measure the instruction set usage of a user program. Among the methods in use are machine simulation, hardware supported trapping, and a compiler technique that instruments the object code module by inserting counters.
Compiler optimizations may result in improvements to code size and/or performance. Consider one or more of the benchmark programs from the SPEC CPU2006 suite. Use a processor available to you and the GNU C compiler to optimize the program using no optimization, ?O1, ?O2, and ?O3. Compare the
Can you think of a way to test some of the characteristics of an instruction cache using a program? Hint: The compiler may generate a large number of non obvious instructions from a piece of code. Try to use simple arithmetic instructions of known length in your instruction set architecture (ISA).
With software prefetching it is important to be careful to have the prefetches occur in time for use but also to minimize the number of outstanding prefetches to live within the capabilities of the microarchitecture and minimize cache pollution. This is complicated by the fact that different
Consider a CPU that implements a single instruction fetch–decode–execute–write back pipeline for scalar processing. The execution unit of this pipeline assumes that the execution stage requires one step. Describe, and show in diagram form, what happens when an instruction that requires one
Using the same notation as in Exercise 5.23, multiply the following numbers. Present your answer in standard decimal notation.a.0545250004822200b.9465000094450000Data from Exercise 5.23The following decimal numbers are stored in excess-50 floating point format, with the decimal point to the left of
For the format used in Exercise 5.19, what decimal number is represented by each of the following numbers in floating point format?a. C2F0000016b. 3C54000016Data from Exercise 5.19Convert the following binary and hexadecimal numbers to floating point format. Assume a binary format consisting of a
If you have access to two or more command line interface shells, such as Windows and Linux bash or Linux bash and tcsh, compare the major commands that are available on each. Note the similarities and differences between them, particularly in their capabilities and in the way the command task is
Describe, in step-by-step form, the procedure that the operating system would use to switch from one user to another in a multi-user time sharing system.
What values would you expect to find in the process state entry in a process control block? What purpose is served by the program counter and register save areas in a process control block? (Note that the program counter entry in a PCB is not the same as the program counter!)
Discuss the steps that take place when a process is moved(a) From ready state to running state.(b) From running state to blocked state.(c) From running state to ready state.(d) From blocked state to ready state.
Why is there no path on the process diagram from blocked state to running state?
Describe what occurs when a user types a keystroke on a terminal connected to a multitasking system. Does the system respond differently for a preemptive or non-preemptive system? Why or why not? If the response is different, how is it different?
The multilevel feedback queue scheduling method looks like FIFO at the upper levels and like round robin at the lowest level, yet it frequently behaves better than either in terms of the performance objectives mentioned in the text. Why is this so?
Discuss the shortest-job-first scheduling method in terms of the various objectives given in the text.
What is the risk that can result from the mixed non-preemptive–preemptive scheduling system taken by Linux, as discussed in the text?
A VSOS (very simple operating system) uses a very simple approach to scheduling. Scheduling is done on a straight round-robin basis, where each job is given a time quantum sufficient to complete very short jobs. Upon completion by a job, another job is admitted to the system and immediately given
Earlier versions of Windows used an essentially non-preemptive dispatching technique that Microsoft called “cooperative multitasking”. In cooperative multitasking, each program was expected to voluntarily give up the CPU periodically to give other processes a chance to execute. Discuss. What
In the memory management schemes used in earlier operating systems, it was necessary to modify the addresses of most programs when they were loaded into memory because they were usually not loaded into memory starting at location 0. The OS program loader was assigned this task, which was called
Discuss the impact of virtual storage on the design of an operating system. Consider the tasks that must be performed, the various methods of performing those tasks, and the resulting effect on system performance.
There are a number of different factors, both hardware and OS software, that affect the operating speed of a virtual storage system. Explain carefully each of the factors and its resulting impact on system performance.
Create a page table that meets the translation requirements of Figure 18E.1. Assume a page size of 10.Figure 18E.1 Program 80 100 130 150 310 200 Logical 410 450 memory 500 500 Physical memory
Explain why the installation of additional physical memory in a virtual memory system often results in substantial improvement in overall system performance.
Develop an example that explains thrashing clearly.
What kind of fragmentation would you find in virtual storage? Is this a serious problem? Justify your answer. Discuss the relationship between fragmentation and page size.
Explain why page sharing can reduce the number of page faults that occur in a virtual storage system.
The manual for an old operating system pointed out that the number of concurrent users on the system can be increased if the users are sharing programs, such as editors, mail readers, or compilers. What characteristics of virtual storage make this possible?
Explain deadlocking.
The CPU scheduling algorithm (in UNIX) is a simple priority algorithm. The priority for a process is computed as the ratio of the CPU time actually used by the process to the real time that has passed. The lower the figure, the higher the priority. Priorities are recalculated every tenth of a
Explain the working set concept. What is the relationship between the working set concept and the principle of locality?
Why is the working set concept much more effective if it is implemented dynamically, that is, recalculated while a process is executing?
What are the differences, trade-offs, advantages, and disadvantages between an OS that implements deadlock prevention versus deadlock avoidance versus deadlock detection and recovery?
An operating system designer has proposed using inverted page tables for each process instead of conventional page tables as the lookup tables for each memory reference. Since there are always fewer frames than pages in the page table, this would reduce the amount of memory required for the tables
Figure 18E.2 shows that, for a given process, the page fault rate in a virtual storage system increases as the page size is increased and then decreases to 0 as the page size approaches P, the size of the process. Explain the various parts of the curve.Figure 18E.2 Page size |Page fault rate
Assume that you have a program to run on a Little Man-type computer that provides virtual storage paging. Each page holds ten locations (in other words, one digit). The system can support up to one hundred pages of memory. As Figure 18E.3 shows, your program is sixty-five instructions long. The
What is a real-time system? Discuss the impact of a real-time system on the design of the operating systems, paying particular note to the various components and algorithms to be used.
Consider the operation of a jukebox. Each table has a jukebox terminal where customers can feed coins to play songs (50 cents apiece, three for a dollar). Prior to the iPod era, the queue to hear your songs in a busy restaurant could be quite long, sometimes longer than the average dining time, in
Tanenbaum notes that the problem of scheduling an elevator in a tall building is similar to that of scheduling a disk arm. Requests come in continuously, calling the elevator to floors at random. One difference is that once inside, riders request that the elevator move to a different floor. Discuss
Discuss possible tape scheduling algorithms for a tape controller. Assume that files are stored contiguously on tape. What effect would non-contiguous, linked files have on your algorithm?
You may have noticed a number of similarities between virtual storage paging and cache memory paging. One major difference, of course, is that main memory is much faster than disk access.Consider the applicability and performance of the various paging algorithms in a memory caching system, and
The designer of a new operating system to be used especially for real-time applications has proposed the use of virtual storage memory management so that the system can handle programs too large to fit in the limited memory space sometimes provided on real-time systems. What are the implications of
Discuss the various trade-offs and decisions involved in task dispatching and the options and methods used for implementing those trade-offs and decisions.
A system status report for a virtual storage operating system shows that between 2 p.m. and 4 p.m. CPU usage and I/O usage both climbed steadily. At 4 p.m., the I/O usage reached 100 percent, but continued to increase. After 4 p.m., the CPU usage, however, dropped off dramatically. What is the
Discuss the network features and services provided in an operating system. Which services are mandatory? Why?
Explain the bootstrap procedure for a diskless workstation.
Consider the operation of an OS dispatcher on a computer with multiple cores operating under symmetric multiprocessing. Assuming that there are more processes being executed than there are cores, the dispatcher is responsible for maximizing the work load by keeping every core as busy as possible.
List and explain some definite advantages to the use of a command line interface over other types of interfaces. Do the same for a graphical user interface. Do the same for aWeb-based interface. What is the target audience for each type of interface?
Discuss the advantages and disadvantages of providing the user interface as a separate shell, rather than as an integral part of the operating system.
Consider the major commands in a command line interface system such as the Linux bash shell. Explain how each task would be performed on a graphical user interface system such as Windows or the Macintosh.
There are some capabilities that are easy to achieve with a GUI, but much more difficult with a CLI. Describe a few of these capabilities.
Explain piping. What additional capability does piping add to a command language?
Explain the concept of redirection. Illustrate your answer with an example of a situation where redirection would be useful.
What purpose do arguments serve in a batch file or shell script?
Identify the name and purpose of each of the components of the GUI that you use.
Describe the difficulties that exist in providing a GUI at a location remote from the computer that is creating the display. Describe the methods used by X Window to partially overcome these difficulties. Why is it not possible for X Window to totally solve these problems?
Discuss the advantages that result from the client–server architecture of the X Window system.
When people describe client–server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With XWindow, the reverse is frequently the case. Explain.
The designers of the UNIX operating system described the ideal shell command language as one that is made up of a large set of simple commands, each designed to perform one specialized task well. They also provided various means to combine these simple commands to form more powerful commands.a.
If you could design a “wild card” system with features beyond those normally provided in a CLI, what features would you add?
Suppose that you are designing an app for a mobile device, such as an iPhone or Android device. Name several services that you would expect to find in the operating system API to assist you with your program design.
You have noticed that loading the programs from your hard disk seems to take longer than it used to. A friend suggests copying the files from your disk, one at a time, to a different device, and back to your disk. You do so and discover that the programs load much faster now. What happened? What
Explain why a MOVE operation from one device to another requires manipulation of the file itself, whereas a MOVE operation from one place to another on the same device involves manipulation only of the directory.
In many systems, the operations that work on a file as a whole are made up by combining the operations that manipulate the internal file data. Explain how you would copy a file from one location to another using the internal file operations. Does this method seem consistent with your experience of
From a Windows command line prompt, do a DIR command. Carefully note how much space remains on your disk. Now open up NOTEPAD, and create a new file containing just a period with a carriage return. Call this file PROB174.TXT and return to the prompt. Do a DIR PROB174.TXT command. How much space
List a number of types of files that you would expect to be accessed sequentially. Do the same for files that you would expect would require random access.
Explain the trade-offs between contiguous, non-contiguous linked, and non-contiguous indexed file allocation. In particular, note the effect on sequential and random access methods.
Assume a UNIX i-node requires a block of 60 bytes. How many disk blocks can be accessed using just direct, single, and double indirect indexing, as shown in Figure 17.9?Figure 17.9 file file attributes file file name | ptr direct blocks file →( file file directory single indirect file file double
What are the advantages of partitioning a disk, rather than using the entire disk as one partition?
What does it mean to mount a disk?
What role does a path serve?
Explain the specific file privileges for each file in Figure 17.21. Who is the owner of these files? What is the name of the group that has access to these files?Figure 17.21 $1s -1F 1 iengland csdept 36005 Feb 15 12:02 bookchapters/ drwx------ -rw-r--r-- 1 iengland csdept -- wx--x--- 2 iengland
The access control list for a file specifies which users can access that file, and how. Some researchers have indicated that an attractive alternative would be a user control list, which would specify which files a user could access, and how. Discuss the trade-offs of such an approach in terms of
a. Disk caching is a technique that is used to speed up disk access by holding blocks of disk in memory. Discuss strategies that could be used to improve system performance with disk caching.b. The time of write back for files that have been altered depends on the system. Some systems write back a
Consider a file that has just grown beyond its present space on disk. Describe what steps will be taken next for a contiguous file, for a linked non-contiguous file, and for an indexed file.
One approach to operating system design is to provide as small a kernel as possible and to make all other modules optional. What are the minimum services that must be provided in such a miniature kernel?
Write a Little Man bootstrap loader that will reside permanently in high memory for the Little Man Computer. The reset button will automatically cause the Little Man to start executing the first instruction of your bootstrap loader. Assume that the application program to be loaded will be input one
Windows hides most of its configuration in a binary file called the registry. Special Windows tools must be used to read and modify the registry. What are the advantages and disadvantages of this approach versus the use of text-based configuration files?
Based on the system status report shown in Figure 15.5, describe some of the ways in which the system could be tailored, and explain how the various items in the report would influence your tailoring decisions.Figure 15.5 vnstat " style="" class="fr-fic fr-dib"> GNOME System Monitor Konsole File
What are the conditions and restrictions that you would want to impose on a multitasking system that is being used with real-time processes?
What operating system functions would you expect to find in the computer that is built in to control your automobile, and which functions would be omitted? Justify your answer.
Clearly explain the differences between multi-programming, multi-user, and multiprocessing.
a. Of what use is the list of active processes shown in Figure 15.5? What changes might a system administrator make in the system on the basis of this information?b. What does the average number of processes data tell you about the way that this system is normally used?c. Compare the three graphs
What is an interrupt vector?
Early versions of Windows did not support true preemptive multitasking. Instead, the designers of Windows provided something they called “cooperative multitasking” in which each program was expected to give up control of the CPU at reasonable time intervals, so that the Windows dispatcher could
Showing 1000 - 1100
of 1390
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Step by Step Answers