.

Saturday, March 30, 2019

The System Level And The Programmer Level Information Technology Essay

The System Level And The Programmer Level discipline Technology Es positProbably non, since any protection scheme devised by a human seat also be broken and the more(prenominal) complex the scheme is, the more difficult it is to be confident of its right implementation. As comp bed to dedicated machines, while-shargond machines ar far less secure, and ar very(prenominal) easy to overload the buffers. They atomic number 18 also much slower to speck a virus. But in dedicated machine, all resources are obtainable to the change being run.Q2) Under what circumstances would a substance abuser be better off using a time sharing dodging or else than a PC or single user workstation?autonomic nervous carcass . When there are few other users, the task is large, and the hardware is fast, time-sharing makes sense. The copious power of the placement can be brought to bear on the users line of work. The problem can be solved faster than on a in the flesh(predicate) computer. A nother case occurs when lots of other users need resources at the equal time. A personal computer is best when the job is small full to be managed reasonably on it and when practiseance is sufficient to execute the program to the users satisf meet.Q3) In the determinationing of the run(a)(a) system there are two cominges modular mall and superimposed approach? How are they variant?Ans. There are various differences between moduler perfume and layered approach-A modular kernel differs from a layered approach in that there is less overhead in making a clapperclaw to a lower level part of the kernel. The call doesnt prolong to initiate through numerous layers before work gets done and parts are aware of any other parts of the kernel and not vindicatory what is below them.Modular kernel is more secure as compared to layered approach, as more operations are done in user mode than in kernel mode.Debugging and modification of data is much easier in layered approach because c hanges affect only limited sections of the system rather than touching all sections of the system.In modular kernel approach, kernel design and its functionality are more simple as compared to layered approach.Part BQ4) There is guest operating system and a host operating system like VMware? List all the factors in choosing the host operating system?Ans. A host operating system is the operating system that is in direct converse with the hardware. It has direct hardware access to kernel mode and all of the devices on the physical machine. The guest operating system runs on top of a virtualization layer and all of the physical devices are virtualized. A host operating system should be as modular and thin as possible to allow the virtualization of the hardware to be as close to the physical hardware as possible, and so that dependencies that exist in the host operating dont restrict operation in the guest operating system.Q5) The kernel is responsible for a action with the processes. Search through the action of kernel and describe what is the action?Ans. The various actions of the kernel are as followsThe main task of a kernel is to allow the execution of applications and patronage them with features such as hardware abstractions.To run an application, a kernel typically sets up anaddress quadranglefor the application, loads the file containing the applications code into memory, sets up astackfor the program and branches to a given location indoors the program, thus starting its execution.The kernel usesscheduling algorithmsto determine which process is rail next and how much time it will be given. The algorithm elect may allow for some processes to have higher priority than others.To perform useful functions, processes need access to theperipheralsconnected to the computer, which are controlled by the kernel throughdevice drivers.If sometimes the interrupt has been occurred during execution of any process then it saves the state(address) of current proces s, and after that when interrupt has been removed then it restores the state(address) of prior process.Q6) Considering both the system level and the software engineer level.Consider the advantage and hurt of the following structure.Synchronous and a coexistent communication.Automatic and explicit buffering.Send by transcript and steer by extension serviceFixed- coatd and variable-sized message.AnsSynchronous and asynchronous communication-synchronous communicationAdvantage you can get an immediate repartee instant feedback fosters communication there seems to be a more randy bonding effect between people when there is a possiblity to give notice (of) in real time (synchronously), spontaneity.Disadvantage There is less time to think about what you want to say or your response to another(prenominal) time may be a limiting factor, e.g time zones synchronous communication over the computer may be difficult because of the pelt along of data transaction with slower connections yo u need extra equipment (speakers, microphone, webcamera).asynchronous communicationAdvantage you have time to think about what you want to say time is not a constraint. You can receive the message whenever you have time and you can analyze the content of the message more guardedly so the answer you give can be even more meaningful because it has gone through a process of elaboration.Disadvantage no immediate response, especially where time is significant you may not fill in if the other person has received your message the message loses human cope with.Automatic and explicit buffering Automatic buffering Advantage Automatic buffering provides a come up with indenite length thus ensuring the transmitter will never have to give up while waiting to copy a message.Disadvantage There are no specifications how automatic buffering will be provided one scheme may reserve sufficiently large memory where much of the memory is bony. definitive bufferingAdvantage Explicit buffering spec ies how large the bufferis.Disadvantage In this situation, the sender may be blocked while waiting for available space in the queue. However, it is less likely memory will be wasted with explicit buffering.Send by copy and send by fibre Send by copyAdvantage send by copy is better for synchronization issues.Disadvantage Send by copy does not allow the receiver to alter the state of parameter.send by annexeAdvantage A benet of send by reference is that it allows the programmer to write a distributed version of a centralized application Javas RMI provides both, until now passing a parameter by reference requires declaring the parameter as a remote object as well. Send by reference also allow the receiver to alter the state of parameter.Disadvantage send by reference can compromise the security of an organisation because beautiful information can be easily distributed accidently or deliberately.Fixed-sized and variable-sized messages Fixed-sized messagesAdvantage The implications o f this are mostly related to buffering issues with xed-size messages, a buffer with a specic size can hold a known number of messages.Disadvantage with xed-sized messages the messages are copied from the address space of the sender to the address space of the receiving process.Variable-sized messagesAdvantage variable-sized messages (i.e. large messages) use shared memory to pass the message.Disadvantage The number of variable-sized messages that can be held by such a buffer is unknown.

No comments:

Post a Comment