a. The creation and also deletion that both user and also system processesb. The suspension and resumption of processesc. The provision of mechanisms for process synchronizationd. The supplication of mechanisms for procedure communicatione. The provision of mechanisms for deadlock handling
a. Store track the which parts of memory are currently being used and also by whom.b. Decide which procedures are to it is in loaded into memory once memory space becomes available.c. Allocate and de-allocate memory an are as needed.

You are watching: What are the advantages of using loadable kernel modules?

What are the three major activities of an operating system with regard come secondary-storage management?
It reads commands from the user or native a document of commands and also executes them, normally by turning them into system calls. It is commonly not component of the kernel because the command interpreter is topic to changes.
What mechanism calls need to be executed by a command interpreter or shell in order to start a brand-new process?
In Unix systems, a fork system contact followed by an exec system call need to be performed to start a brand-new process.
They provide straightforward functionality to users so that users carry out not must write their very own programs come solve common problems.
What is the main benefit of the layered approach to mechanism design? What space the flaw of utilizing the layered approach?
The system is easier to debug and also modify because changes impact only minimal sections that the system rather than poignant all sections of the operating system. Info is kept only where it is needed and is easily accessible only in ~ a characterized and restricted area, so any type of bugs affecting the data have to belimited come a specific module or layer.
List five services listed by an operation system, and also explain exactly how each creates convenience for users. In which cases would it be impossible for user-level program to administer these services? explain your answer.
a. Program execution.b. I/O operations. C. File-systemmanipulation. D. Communications. E. Error detection.
For specific devices, such together handheld PDAs and cellular telephones, a disk through a record system may not be obtainable for the device. In this situation, the operating mechanism must it is in stored in firmware.
How can a device be design to enable a selection of operating solution from which come boot? What would certainly the bootstrap program should do?
Consider a system that would prefer to operation both WindowsXP and three various distributions that Linux. Each operating system will be stored on disk. During system boot-up, a special regimen (which we will contact the boot manager) will recognize which operating device to boots into. This way that rather originally booting to an operating system, the boots manager will an initial run throughout system start-up. It is this boots manager the is responsible fordetermining which mechanism to boot into. Typically boot supervisors must it is in stored at details locations the the tough disk to be recognized throughout system start-up. Boot supervisors often administer the user v a selection of systems to boot into; boot supervisors are likewise typically designed to boot into a default operating device if no choice is selected by the user.
The services and also functions noted by an operation system can be separated into two key categories. Briefly explain the 2 categories and discuss exactly how they differ.
Enforce protection between different procedures running simultaneously in the system. Procedures are allowed to access only those memory locations that are associated with their address spaces. A process is likewise not permitted to accessibility devices directly without operating device intervention. The 2nd class the services provided by an operating system is come provide brand-new functionality that is not supported straight by the basic hardware.
a. With registersb. Registers pass starting addresses of block of parametersc. Parameters can be placed, or pushed, ~ above the stack by the program, and also popped turn off the stack by the operating system
Describe how you could obtain a statistical profile that the amount of time invested by a routine executing various sections of its code. Discuss the importance of obtaining together a statistical profile.
One could issue periodic timer interrupts and also monitor what indict or what sections of code are right now executing once the interrupts room delivered. A statistics profile that which pieces of password were energetic should be regular with the time spent by the program in different sections of its code. As soon as such a statistics profile has actually been obtained, the programmer could optimize those part of code that are consuming much more of the CPU resources.
• The creation and deletion of files• The creation and also deletion that directories• The assistance of primitives because that manipulating files and also directories• The mapping of files onto secondary storage• The back-up of documents on steady (nonvolatile) storage media
What space the benefits and flaw of utilizing the very same system-call user interface for manipulating both files and devices?
Each device can it is in accessed as though it was a document in the paper system. The disadvantage with using the same interface is the it can be complicated to capture the use of details devices within the paper definition of the paper access API, thereby causing either a ns of usability or a lose of performance.
Would it be feasible for the user to build a new command interpreter utilizing the system-call interface listed by the operation system?
Yes. The command interpreter enables an user come create and manage procedures and also determine ways through which they connect (such as through pipes and files).
What are the 2 models that interprocess communication? What are the strengths and weaknesses that the 2 approaches?
• post passing- strengths: program structures far better separated, danger operations firewalled- weaknesses: blog post passes much more slowly, because that symmetrical copy operations are to be made• mutual memory- strengths: fast and also direct- weaknesses: unexpected habits when unauthentic programs incorrectly accesses the shared memorysegments
Mechanism and policy need to be separate to for sure that equipment are basic to modify. No two mechanism installations are the same, so each installation might want to song the operating mechanism to fit its needs. With mechanism and also policy separate, the policy may be changed at will while the system stays unchanged. This arrangement provides amore versatile system.
It is sometimes challenging to accomplish a layered strategy if two materials of the operating system are dependence on each other. Identify a script in which that is unclear exactly how to layer 2 system materials that need tight coupling of their functionalities.
Many systems allow files to it is in mapped right into the digital memory an are of an executing process. Top top the other hand, the digital memory subsystem frequently uses the storage mechanism to administer the backing keep for pages that carry out not right now reside in memory. Also, updates come the record system are sometimes buffered in physical memory before it is flushed to disk, thereby requiring careful coordination of the usage of memory in between the digital memory subsystem and also the paper system.
What is the main benefit of the microkernel strategy to system design? just how do user programs and also system services communicate in a microkernel architecture? What are the flaw of utilizing the microkernel approach?
Benefits commonly include the following(a) adding a new service does no require editing the kernel,(b) that is an ext secure as much more operations space done in user setting than in kernel mode,and(c) a less complicated kernel design and also functionality frequently results in a much more reliableoperating system.
Functionality can be included to and also removed from the kernel while that is running, result in having no need to recompile or reboot the kernel.
They are similar in that both are based upon existing kernels. Both permit developers to have actually a framework. Both usage stacks. Castle are different in the IOS is closed-source while Android is open-source. Android supplies a virtual maker unlike IOS. Androids applications are coded in Java when IOS applications space coded in Objective-C.
Explain why Java programs running on Android systems carry out not use the standard Java API and also virtual machine.
It is due to the fact that the conventional API and also virtual device are designed for desktop and server systems, not mobile devices. Google emerged a separate API and virtual device for cell phone devices.
The experimental Synthesis operation system has actually an assembler incorporated in the kernel. Come optimize system speak to performance, the kernel assembles routines within kernel room to minimize the course that the system call must take with the kernel. This technique is the antithesis of the layered approach, in which the path through the kernel isextended to make building the operating system easier. Comment on the pros and also cons of the Synthesis approach to kernel design and system-performance optimization.

See more: What Is The Formula For Hydrobromic Acid, Hydrobromic Acid Formula And Structure

Synthesis is impressive as result of the performance it achieves with on-the-fly compilation. Unfortunately, that is daunting to debug problems within the kernel as result of the fluidity of the code. Also, such compilation is mechanism specific, make Synthesis an overwhelming to port (a new compiler have to be created for each architecture).

Introduction come Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, cutting board H. Cormen