Anda di halaman 1dari 3

Rajbir Dhanda February 23 at 8:17pm Report

Q1:- Why Modern OS are interrupt driven?


Give an example.
Ans :- Modern operating system are interrupt driven to internally
schedule the performance of tasks related to I/o events. Interrupt
driven systems can provide low overhead and good latency at low
offered load. Interrupts are useful as they allow CPU to spend most of
its time for doing processing. Modern operating systems are used to
handle I/O devices that interrupt every few milliseconds.Interrupt
mechanism control both networking processes and I/O devices. Tasks
performed at interrupt level have high priority over all other tasks.
Interrupts are there in modern OS only to initiate polling. Example :-4.2
BSD , VMS, MS-DOS, Windows NT and several other Ethernet chips.

Q2:- Comparative study of linux boot loaders .


Ans :- A boot loader, also called a boot manager, is a small program
that places the operating system (OS) of a computer into memory.
When a computer is powered-up or restarted, the basic input/output
system (BIOS) performs some initial tests, and then transfers control to
the master boot record (MBR) where the boot loader resides. Most new
computers are shipped with boot loaders for some version of Microsoft
Windows or the Mac OS. If a computer is to be used with Linux, a
special boot loader must be installed. For Linux, the two most common
boot loaders are known as LILO (Linux Loader) and LOADLIN (Load
LinUX). An alternative boot loader, called GRUB (GRand Unified
Bootloader), is used with Red Hat Linux. LILO is the most popular boot
loader among computer users that employ Linux as the main, or only,
operating system. The primary advantage of LILO is the fact that it
allows for fast boot-up. LOADLIN is preferred by some users whose
computers have multiple operating systems, and who spend relatively
little time in Linux.

Q3:- Write the five major activities of an


operating system in regard to file
management.
Ans : The five major activities of an operating system in regard to file
management are :
1) Creating and deleting files :- All file systems follow the same general
naming conventions for an individual file: a base file name and an
optional extension. Each file system can have specific and differing
rules about the formation of the individual components in a directory
or file name. The data that we work with on computers is kept in a
hierarchical file system in which directories have files and
subdirectories beneath them.
2) Creating and deleting directories to organize files :- Each program
you install creates its own folder on your Hard Drive where it keeps
most of its files. This helps your PC to find the right files to use when
running a program. Keeping files organized in folders can also help you
when you are working with your PC.
3) Supporting primitives for manipulating files and directories :-

4) Mapping files onto secondary storage :-A file system provides a


mapping between the logical and physical views of a file, through a set
of services and an interface. Simply put, the file system hides all the
device-specific aspects of file manipulation from users.The basic
services of a file system include:
keeping track of files (knowing location).
I/O support, especially the transmission mechanism to and from main
memory.
management of secondary storage.
sharing of I/O devices.
providing protection mechanisms for information held on the system.
5) Backing up files on stable storage media :-

PART (B)
Q4:-List five services provided by an operating
system . Explain how each provides
convenience to the users. Explain in which
cases it would be impossible for user-level programs to
provide these services.
Ans:- The five services provided by an operating system are :-
1) Program execution
2) Input / Output operations
3) File system manipulation
4) Communication
5) Error Detection.
1)Program execution. The operating system loads the contents (or
sections) of a file into memory and begins its execution. A user- level
program could not be trusted to properly allocate CPU time.
2) I/O operations. Disks, tapes, serial lines, and other devices must be
communicated with at a very low level. The user need only specify the
device and the operation to perform on it, while the system converts
that request into device- or controller-specific commands. User-level
programs cannot be trusted to access only devices they should have
access to and to access them only when they are otherwise unused.
3) File-system manipulation. There are many details in file creation,
deletion, allocation, and naming that users should not have to per-
form. Blocks of disk space are used by files and must be tracked.
Deleting a file requires removing the name file information and freeing
the allocated blocks. Protections must also be checked to assure
proper file access. User programs could neither ensure ad- herence to
protection methods nor be trusted to allocate only free blocks and
deallocate blocks on file deletion.
4) Communications. Message passing between systems requires
messages to be turned into packets of information, sent to the net-
work controller, transmitted across a communications medium, and
reassembled by the destination system. Packet ordering and data
correction must take place. Again, user programs might not coordinate
access to the network device, or they might receive packets destined
for other processes.
5) Error detection. Error detection occurs at both the hardware and
software levels. At the hardware level, all data transfers must be
inspected to ensure that data have not been corrupted in transit. All
data on media must be checked to be sure they have not changed
since they were written to the media. At the software level, media
must be checked for data consistency; for instance, whether the
number of allocated and unallocated blocks of storage match the total
number on the device. There, errors are frequently process-
independent (for instance, the corruption of data on a disk), so there
must be a global program (the operating system) that handles all types
of errors. Also, by having errors processed by the operating system,
processes need not contain code to catch and correct all the errors
possible on a system.

Q5:- Write down the command which search for all files starting with
‘A’ and end with ‘K’.
Ans:-

Q6:- Discuss about the applications of network .

Anda mungkin juga menyukai