Premium Essay

Operating System Assignment: Switching Systems

Submitted By
Words 1524
Pages 7
OPERATING SYSTEM ASSIGNMENT-I
Name: K. Sri Sirisha
Class: CSE-3A, Rollno:13951A0539
1.Explain about context switching with necessary diagram? Switching the CPU to another process requires
“performing a state save of the current process and state restore of a different process”. This task is known as a context switch. A context switch is a procedure that a computer’s CPU follows to change from one task to another while ensuring that the tasks do not conflict. A context switch may occur without changing the state of the process being executed.Fast memory that holds the address of the instruction to be executed immediately after the current one.
->In a CPU,the term”context” refers to the data in the registers and program counter at a specific …show more content…
The operating system picks
&begins to execute one of the jobs in memory.
Eventually, the job may have to wait for some task, such as an I/O operation, to complete.

Operating system Job 1 Job 2 Job 3 Job 4 In a non – multiprogramming system, the
CPU would sit idle. In a multiprogramming system, the operating system simply switches to & executes another job. When that job needs to wait the CPU is switched to another job, and so on. Eventually, the first job finishes waiting and gets the CPU back. As long as at least one job needs to execute, the CPU is never idle. Time sharing systems must also provide a file system. The system resides on a collection of disks, hence disk management must be provided. Also time sharing systems provides a mechanism for protecting resources from inappropriate use.
Process Management and OS manages many kinds of activities: ● User programs
● System programs: printer spoolers,name servers, file servers, etc. and Each is encapsulated in a process
● A process includes the complete execution context
(code, data, PC,registers, OS resources in use, etc.)
● A process is not a program and A process is …show more content…
Memory Management and Primary (Main) Memory
● Provides direct access storage for CPU
● Processes must be in main memory to execute and OS must: ● Mechanicsand Keep track of memory in use and Keep track of unused (“free”) memory and Protect memory space and Allocate, deallocate space for processes and
Swap processes: memory disk
● Policies and Decide when to load each process into memory and Decide how much memory space to allocate each process and Decide when a process should be removed from memory.
One OS Structure: Large Kernel and The kernel is the protected part of the OS that runs in kernel mode
● Critical OS data structures and device registers are protected from user programs
● Can use privileged instructions signals terminals character I/O files swapping disk, tape
CPU scheduling page replacement sytem services: shells, compilers, printing, network access system calls user programs hardware: terminals, I/O devices, memory machineindependent machinedependent.
OS Design Issues and Another approach: layered OS
● Divide OS into layers
● Each layer uses services provided by next lower

Similar Documents

Free Essay

Ntc360 Summary

...Syllabus College of Information Systems & Technology NTC/362 Version 1 Fundamentals of Networking Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: · University policies: You must be logged into the student website to view this document. · Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall All electronic materials...

Words: 2225 - Pages: 9

Premium Essay

Network Administrator

...CURRICULUM VITAE NAME : NYAMACHE EVANS ONGUTI ADDRESS : P.O. BOX 672 - 00100 GPO NAIROBI TELEPHONE : 0724–395-908 E-MAIL : javansong@gmail.com, enyamache@jambo.co.ke MARITAL STATUS : SINGLE DATE OF BIRTH : 28/10/1984 PLACE OF BIRTH : KISII NATIONALITY : KENYAN LANGUAGES : ENGLISH AND KISWAHILI AGE : 26 YEARS ID NUMBER : 23769870 CARRIER OBJECTIVES To design and plan an advanced Telecom infrastructure that services over a million subscribers with ‎Triple Play Services (Voice, Data & Video Services).‎ To contribute to the growth of a progressive company with quality products and services in the field of Telecommunications and Information Technology (ICT).‎ SUMMARY OF SKILLS AND EXPERIENCE • Total 2 years and 4 months of experience with Advanced Diploma in Telecommunication Engineering and Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network). Possess the expertise in the following: Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks ...

Words: 1141 - Pages: 5

Free Essay

Write and Paper

...NT 1310 Physical Networking Andre Mosley Unit 2. Assignment 1. Service Provider Types 09-27-2012 RBOCS (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell System or "Ma Bell") by a U.S. Federal Court consent decree on December 31, 1983. The seven original regional Bell operating companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. RBOCs are generally in competition for digital data and Internet traffic with wireless service providers and cable TV companies. RBOCs are gradually making available new telephone carrier technologies such as ISDN and DSL. ILEC An ILEC (incumbent local exchange carrier) is a telephone company in the U.S. that was providing local service ILECs include the former Bell operating companies which were grouped into holding companies known collectively as the regional Bell operating companies (RBOCs). A "local exchange" is the local "central office" of an LEC. Lines from homes and businesses terminate at a local exchange. Local exchanges connect to other local exchanges within a local access and transport area (LATA) or to interexchange carriers (IXC) such as long-distance carriers AT&T, MCI, and Sprint. CLEC In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already...

Words: 618 - Pages: 3

Premium Essay

Doc Remove Delibitablement

...Analysis | 3,5 | 48 | Algebra for Engineers | 2,5 | 32 | Probability 1 | 3,5 | 48 | Statistical Decision (courses +Tuto) | 3,5 | 48 | Microprocessor System | 3 | 40 | Signal Transmission | 2,5 | 32 | Data Transmission | 2,5 | 32 | Workshop on Linux | 3 | 40 | Databases | 3 | 40 | TOEIC 1 | 2,5 | 32 | Advanced Maintenance | 2,5 | 32 | Numerical Analysis | 2,5 | 32 | Operations Research | 2,5 | 32 | Servo (Tuto) | 2,5 | 32 | Servo (Courses) | 2,5 | 32 | Algorithm (Data Structure) | 2,5 | 32 | Algorithm oriented object (Tuto, C++ Language) | 3 | 40 | Operating System (Theories and Fundamental) | 2,5 | 32 | WAN (courses + Tuto) | 4,5 | 60 | Method of Analysis 1 | 3 | 40 | Programming Workshop C | 2,5 | 32 | Software Engineering workshop (Access, VB) | 3 | 40 | Management Workshop for Science Engineer | 2 | 24 | Entrepreneurship | 1,5 | 20 |   |   |   | TOTAL | 63,5 | 832 | ------------------------------------------------- OBJECT ORIENTED ALGORITHM ------------------------------------------------- (Hands-On in Language C + +) CHAPTER I: GENERAL ON CLASS I. Notion of class • Generality of P.O.O • Incompatibility C / C + + II. Property of the member functions • Defaults • Member functions in-line • Transmission of object as argument III. Object assignment IV. Object Constructors and Destructors V. Object initialization VI. The copy constructor VII. Tables to Objects CHAPTER II: THE OPERATOR SURDEFINITION ...

Words: 2262 - Pages: 10

Free Essay

Analyzing Security Data

...define and explain the core components of the Windows Server Networking operating system. The following components will be explained: Active Directory, Domain Controller, Tree, Forest, Distinguished Name, Client Services for Netware, Gateway Services for Netware, Microsoft Management Console, Striped Set, Scheme, Global Catalog Server, Native Mode, DHCP, Default Gateway, Emergency Repair Disk, hardware Disk, hardware Compatibility List, Resource Kit, and IP sec. II. Scope of Work This paper discusses the definitions of core components of Windows Server Networking operating system. III. Windows Terminology A. Active Domain The Active Directory is a directory service designed by Microsoft that acts as a universal distributed information service point from which all network objects, including users, processes, configurations and services can be utilized at any entry point to the network. B. Schema The Schema is the formal set of definitions for all object classes and their attributes contained in the Active Directory. Microsoft designed the Schema to be programmable, allowing the system administrator to create new object types and their attributes and modify attributes of existing objects. C. Domain, Tree and Forest The Active Directory structure is comprised of several different levels: the domain, the tree and the forest. The domain consists of the rational grouping of computers operating Microsoft Windows that share a central directory database—the Active Directory...

Words: 571 - Pages: 3

Free Essay

Swot Analysis of Reliance Communcations Limited

...subscribers. It shall support all the features and functionalities provided by the legacy switching systems. MINS was required as the rate of the “Qualcomm chipset “for the BSC (base station controller) was rising day by day. Qualcomm company is extracting 5$ per subscriber from any Indian company for using their chipset that why in MINS, BSC is constructed not using any hardware but by binding the system by some algorithms. It means that in MINS, software is prepared which can do the work of the hardware chip for BSC instead of using that Qualcomm chipset. The basic aim of designing of the MINS project is the removal of the Qualcomm chipset for BSC. MINS is not the whole network; it is the part of a network which contains following networks identities. They are:- 1.      BTS CONTROLLER-Base transceiver system controller 2.      BSC-Base station controller 3.      MSC-Mobile switching centre 4.      HLR-Home location register 5.      VLR-Visitor location register MINS also contains some essential parts other than which are specified above. They may be either the parts of the four of them specified above or other ones. They should be considered in following lines as they come into the act. Some assumptions are made preparing the MINS project. They are:- ¬      SSD (Shared secret data) is shared with the VLR, in case of Authentication. MINS system shall work with the Soft switch MGC (Media Gateway Controller) for all the calls originating...

Words: 6859 - Pages: 28

Free Essay

A Project on Mnp

...of around 1000 subscribers. It shall support all the features and functionalities provided by the legacy switching systems. MINS was required as the rate of the “Qualcomm chipset “for the BSC (base station controller) was rising day by day. Qualcomm company is extracting 5$ per subscriber from any Indian company for using their chipset that why in MINS, BSC is constructed not using any hardware but by binding the system by some algorithms. It means that in MINS, software is prepared which can do the work of the hardware chip for BSC instead of using that Qualcomm chipset. The basic aim of designing of the MINS project is the removal of the Qualcomm chipset for BSC. MINS is not the whole network; it is the part of a network which contains following networks identities. They are:- 1. BTS CONTROLLER-Base transceiver system controller 2. BSC-Base station controller 3. MSC-Mobile switching centre 4. HLR-Home location register 5. VLR-Visitor location register MINS also contains some essential parts other than which are specified above. They may be either the parts of the four of them specified above or other ones. They should be considered in following lines as they come into the act. Some assumptions are made preparing the MINS project. They are:-  SSD (Shared secret data) is shared with the VLR, in case of Authentication. MINS system shall work with the Soft switch MGC (Media Gateway Controller) for all the calls originating from/terminating...

Words: 6843 - Pages: 28

Free Essay

How Multithreading Works in a Server

...| CSC 302- Principles of Operating Systems | Assignment on Multithreading | | | Stephen Nyabuti – 12S01ABT023 | Feb 2013 | 1. How multithreading works in a server Multithreading occurs when a process executing an application, is divided into threads that can run concurrently. Multithreading is useful for applications that perform a number of essentially independent tasks that do not need to be serialized. When a multithreaded application is active in a server, the events that occur take place in three phases: i. Start-up phase- requests come in and are handed to a thread for processing. ii. Work phase- in this phase multiple client requests are handled concurrently in multiple contexts. The system allocates a separate thread for each request. In response to clients’ requests for a service, the server dispatcher creates multiple threads in one server that can be assigned to various client requests simultaneously. Each thread is associated with a separate context or request to the server. This feature is useful in both conversational and RPC servers which otherwise may stay idle waiting for the client side of a conversation. iii. Completion phase- When the application is shut down or stopped, the server performs any termination processing that is necessary such as closing a resource manager. 2. Advantages and Disadvantages of implementing multithreading As user space threads * Switching threads is faster when thread management is done...

Words: 853 - Pages: 4

Premium Essay

Nt2640

...Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College...

Words: 2573 - Pages: 11

Free Essay

Serious Matters.

...PBL ASSIGNMENT (10%) TOPIC : INTERNET (INFORMATION SEARCH) Lecturer : (2) Acer (3) Google.com (4) Aspire V3-471G (5) Acer Inc. . (Hongqi Corporation) commonly known as Acer, stylized as acer, or formerly as acer) is a Taiwanese multinational hardware and electronics corporation specializing in advanced electronics technology and is headquartered in Xizhi, New Taipei City, Taiwan. Acer's products include desktop and laptop PCs, tablet computers, servers, storage devices, displays, LED, LCD and plasma televisions, smartphones and peripherals. It also provides e-business services to businesses, governments and consumers. In 2014 Acer was the fourth-largest personal computer vendor in the world. In the early 2000s, Acer implemented a new business model, shifting from a manufacturer to a designer, marketer and distributor of products, while performing production processes via contract manufacturers. In addition to its core business, Acer owns the largest franchised computer retail chain in Taipei, Taiwan. (6) PRODUCT | DESCRIPTION | Operating System | | Operating System | Windows 8.1 | | | Processor & Chipset | Processor Manufacturer | Intel | Processor Type | Core i5 | Processor Model | i5-5200U | Processor Speed | 2.20 GHz | Processor Core | Dual-core (2 Core) | Memory | Standard Memory | 8 GB | Memory Technology | DDR3L SDRAM | Memory Card Reader | Yes | Memory Card Supported | Secure Digital (SD) Card | ...

Words: 417 - Pages: 2

Premium Essay

Ccna 3 Pt Lab Manual

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...

Words: 48601 - Pages: 195

Premium Essay

Trying Something

...Week 9 Capstone Most businesses relies heavily on information an information systems for the delivery of services and management of resources and must therefore ensure that its information assets are well protected. Failure to adequately protect the business information assets through the implementation of appropriate security controls puts the business at risk. This policy applies to business records and all other information that is in the custody or control of the business. This policy serves the following purposes: * Provides a security classification scheme for the business information that can be referenced in other policies, guidelines, standards, and procedures relating to information. * Outlines the responsibilities that members of the business community have with respect to information security. Use of information means any access to, collection, storage, transmission, processing, or destruction of information. Custody of information means the keeping, care, watch, preservation, or security of information for a legitimate business purpose. Control of information means the power or authority to make a decision about the use or disclosure of information in a business records. An information security breach involves one or more of: a circumvention of information security controls; the unauthorized use of information; the unintended exposure of information. Restricted information is the subset of confidential information where the protection of such...

Words: 658 - Pages: 3

Premium Essay

Dell Strategic Management

...Harvard Business School: Matching Dell Assignment 1 4701U - 001 Word Count: 738 Submitted By: David Pascual Shees Mazhar and Ryan Lerma Submitted To: Professor Jelavic SID: 100 369 901 100 369 510 100 344 842 Date: November 16, 2011 Question 1 444 Bargaining Power of Buyers (High and Rising) 80 Buyers have relatively high power of bargaining since Wintel standards create easy switching and low brand loyalty. The category of retailers and resellers could easily backward integrate and sell their own manufactured PC’s. Appealing to end users meant concern for price sensitivity and easy switching. The category of major companies and government buying power is very high because a bidding war is created where different PC firms fight to provide the best service, product and support at the lowest prices. Supplier Power (Very high and low) 54 Generally, there was only one category of suppliers to the PC industry which was Microsoft, while Intel provided the operating system and the microprocessor, both at a near monopoly. At the time, no other company had the manufacturing or distribution capability of either provider. In the category of peripherals and commodity inputs, these were cheaply bought nationally and internationally. Threat of New Entry (Moderately High)...

Words: 863 - Pages: 4

Premium Essay

Hris

...NI-LIMIT 11 NI-LIMIT COMPUTER NETWORK SYSTEM PROPOSAL [Type the document subtitle] [Type the author name] TABLE OF CONTENTS ACKNOWLEDGEMENTS My fellow group members would like to thank our dear lecturer Mrs. Noris Ismail for doing her lecturing job professionally which broadened our knowledge greatly about networking and enabled us to come up with such a detailed proposal for network infrastructure and mixing it with several other ideas to finally make a final report on it. I would also want to thank my fellow group members for the effort and dedication they put in to complete the task of coming up with the report and the final proposal. Chapter one: Company profile NI-Limits Sdn Bhd NI-Limits Sdn Bhd is a digital design & web management company that provides stateof-the-art service through a mixed team of local and foreign professionals with the mission of delivering unparallel service and support to both Malaysian and International markets. NI-Limits Sdn Bhd is a Malaysian based company resulting from a merger of several independent web development agencies (Pixel Media, Webb Designs and Quartz Interactive) and international freelancers that have been in business since 1997. Mark Smalley and Nigel Webb formed Pixel Media in Sarawak, Malaysia in 1997. As a team of independent freelancers working together, they developed online marketing material to clients throughout Asia. The company primarily dealt with Oil and Gas related companies that were...

Words: 10139 - Pages: 41

Premium Essay

Lab 4

...with an on-screen keyboard so that he may use the mouse to type data. How would you configure this user’s computer to comply with his request? Sticky Keys A friend with severe arthritis is having difficulty pressing multiple keys simultaneously (for example, ctrl-alt-delete). You offer to enable sticky keys for her. How would you configure this setting? Add Hardware Driver Not Detected You are running Windows XP Professional on an old Pentium II computer. A friend has just bought a new network interface card (NIC) for his computer and asks if you would like to have his old one. You install the NIC and the correct driver on your computer, but you discover that when you restarted your computer, the operating system did not detect the new NIC. Without restarting your computer, how would you troubleshoot this problem? Add/Remove Programs Add Components How would you install IIS (Internet Information Services) on your computer? Remove Programs Adobe Reader has recently become corrupted. How would you remove it from your computer? Administrative Tools Computer Management Add User to Group A user named Bob Smith needs to install and uninstall software packages for the Research and Development department. You decide to make him a Power User. How would you do this? Change Password at Logon You have just reset the password for a...

Words: 6123 - Pages: 25