Thursday, July 9, 2009

Operating system 4


4.Cooperating Process
- Independent process cannot affect or be affected by the execution of another process.
-Cooperating process can affect or be affected by the execution of another process
-Advantages of process cooperation
-Information sharing
-Computation speed-up
-Modularity
-Convenience


5.Inter Process Communication



-Mechanism for processes to communicate and to synchronize their actions.
-Message system – processes communicate with each other without resorting to shared variables.
-IPC facility provides two operations:
-send(message) – message size fixed or variable
-receive(message)
-If P and Q wish to communicate, they need to:
-establish a communication link between them
-exchange messages via send/receive
-Implementation of communication link
-physical (e.g., shared memory, hardware bus)
-logical (e.g., logical properties)


-------------------------------------------------------------------------------------------------

1.What are the major activities of the operating system with regards to Process management.
-process creation and deletion
-process suspension and resumption
-provision of mechanism for:
>process synchronization
>process communication
>deadlock handling

2.What are the major activities of the Operating system regards to Memory Management.
-keep track of which parts of memory are currently being used and by whom
-decide which processes to load when memory space becomes available
-allocate and deallocate memory space as needed.

3.What are the major activities of the Operating system Secondary Storage Management.
-Free space memory
-Large allocation
-disk scheduling

4.What are the major activities of the Operating system File Management.
-File creation and deletion
-Directory creation and deletion
-support of primitives for manipulating files and directories
-Mapping files onto secondary storage -
-File backup on stable (nonvolatile) storage media

5.What is the purpose of the Command Interpreter.
-process creation and management
-I/O handling
-Secondary Storage Management
-File system access
-Protection
-Networking


No comments: