Anda di halaman 1dari 7

# Early Intervention Program

Assignments
for
Operating Systems and Web Technologies
March 2008

## Document No. Authorized By Ver. Revision Signature / Date

HEX/EIP/02 Eugene Xavier P 1.0 24-Mar-2008

COMPANY CONFIDENTIAL
Hexaware Technologies Document Revision History

## Document Revision History

Ver.
Date Author(s) Reviewer(s) Description
Revision
0.0 18-Mar-2008 Muruganantham A, Eugene Xavier P, Initial draft
Hexaware, Chennai Hexaware, Chennai
1.0 24-Mar-2008 Muruganantham A, Eugene Xavier P, After incorporating
Hexaware, Chennai Hexaware, Chennai review comments

## HEX/EIP/002 Version No. 1.0 ii

Hexaware Technologies Assignments for OS & Web Technologies

## Assignment 4: Networking, IP addressing and Subnetting

Assignment 5: WWW

## HEX/EIP/002 Version No. 1.0 1

Hexaware Technologies Assignments for OS & Web Technologies

## Assignment 1: Paging and Page Replacement algorithms

Problem:

a) A computer uses an 18 bit address system, with 6 bits used as a page address and 12
bits used as a displacement. Calculate the total number of pages and express the

001111000000111000

b) In a paged segmented system, a virtual address consists of 32 bits of which 12 bits are
for displacement, 11 bits are for sequence number and 9 bits are for page number.
Calculate:
I. Page Size
II. Maximum Segment Size
III. Maximum Number of Pages
IV. Maximum number of segments

c) Assume a virtual paging system has three real page frames. Simulate the effect of
LRU, FIFO and optimal policies for page replacement for the following sequence of
virtual page references, indicating the position of page faults.

Sequence: 1 3 3 2 5 4 5 4 1 4 2 2 5

d) A computer has four page frames. The time of loading, time of last access, and the
R (Read) and M (Modified) bits for each page are as shown below:

0 126 280 1 0
1 230 265 0 01
2 140 270 0 0
3 110 285 1 1

## I. Which page will NRU replace?

II. Which page will FIFO replace?
III. Which page will LRU replace?

## HEX/EIP/002 Version No. 1.0 2

Hexaware Technologies Assignments for OS & Web Technologies

## Assignment 2: Process Scheduling

Problem:
a) What kind of data structure is required to implement the round-robin scheduling
policy?

b) List the advantages and disadvantes of round robin scheduling if the time slice is too
large.

c) Find the average waiting time in the round robin scheduling for the following. Assume
a time slice of 5ms.
Process CPU time (in ms)
P1 4
P2 3
P3 3

## Assignment 3: Client server concepts

Problem:

a) How does the system’s performance change with respect to response time when more
(user) terminals are added to a) Host-centric computing (for example Mainframes)
b) Network of computers. Which is better and why?

b) List out the applications which are based on RPC & P2P, ODBC middleware.

Problem:

## a) Complete the following table given below:

Use of Repeaters
Repeaters operate at which layer of OSI
Bridges are used for
Bridges operate at which layer of OSI
Routers are used for
Routers operate at which layer of OSI

## HEX/EIP/002 Version No. 1.0 3

Hexaware Technologies Assignments for OS & Web Technologies

## Function OSI Layer TCP/IP Layer

Routing of messages from
source to destination
Transmission of bits
Node to Node delivery of
messages
End to End delivery of
messages
Error and Flow Control
Dialogue control

215.26.50.12
122.12.25.11
150.5.5.22
192.168.20.2
172.12.45.3

## d) Global Inc Company obtains a class C address of 190.150.20.0. The company

requirements of dividing the physical network into 4 subnets interconnected by routers.
Each subnet requires at least 30 Hosts.
I. Determine the number of bits to be borrowed from the host portion of the IP
II. Determine the number of bits left for the host addresses

## HEX/EIP/002 Version No. 1.0 4

Hexaware Technologies Assignments for OS & Web Technologies

Assignment 5: WWW

Problem:

## a) Consider the URLs:

http://www.eip.hexaware.com/schdule.html
ftp://www.unisys.hexaware.com:8091/books/java.doc

## Identify the following:

I. Host Name
II. Port Number
III. Resource name
IV. Protocol name
b) List the difference between HTTP GET and HTTP POST methods.

c) Why is dynamic web content response time slower than static web content?

## d) An entrepreneur starts a small software company with a network infrastructure

consisting of 20 hosts with a cable modem internet access. The entrepreneur wants to
implement security policy for the network and the network should be protected from
the security attacks from the outside world. If you have been a security consultant,
what security solution you would provide at first hand?

---------------------