Epilogue. Thursday, December 09, 2004
|
|
- Clarence Byrd
- 5 years ago
- Views:
Transcription
1 Epilogue Thursday, December 09, :16 PM We have taken a rather long journey From the physical hardware, To the code that manages it, To the optimal structure of that code, To models that describe the code, To predictive techniques for behavior. Epilogue Page 1
2 Elements of the story Thursday, December 10, :09 PM Elements of the story The realities of running in constant time. How to maintain the illusion of autonomy for processes. How and why actions are made atomic in a concurrent environment. Algorithms for managing concurrency, conflict, and complexity. How the complex is made simple via knowledge boundaries and producer/consumer relationships. Design tradeoffs between efficiency and responsiveness. Conditions to avoid and how to avoid them. Epilogue Page 2
3 Epilogue Page 3 Some design tradeoffs Thursday, December 09, :25 AM Some design tradeoffs throughput versus response. hashing versus caching. (dense versus sparse structures). processes versus threads. semaphores versus mutexes. (kernel objects versus user objects). states versus events. (regular versus transactional filesystems).
4 Epilogue Page 4 Some important principles Thursday, December 10, :34 PM Some important principles Knowledge boundaries: it's easier to write modules if one limits what knowledge they collect and/or interpret. Locality: if next accesses are near prior accesses, then caching is effective in speeding up access. Proof: it is not possible to debug concurrent code. It is necessary to prove it correct. Contracts: some multi-level subsystems work properly only because the lower-level system caches content for the upper-level one.
5 Epilogue Page 5 Knowledge boundaries Thursday, December 10, :12 PM Knowledge boundaries The disk scheduler doesn't know the meaning of blocks. The virtual memory subsystem doesn't know the meaning of pages. The raw disk driver doesn't know where the superblocks are located. The filesystem driver doesn't know how to write a block. And if they did, they would be too complex to write.
6 Epilogue Page 6 Locality Thursday, December 09, :56 AM Locality Accesses to memory/disk tend to be close together, so caching speeds up access. physical memory is a cache for virtual memory. page cache is a cache for disk files. The reason bit arrays "work" for keeping track of what's used in a filesystem is that they tend to stay in the LRU cache!
7 Epilogue Page 7 Proof Thursday, December 09, :57 AM Proof I hope the examples I gave show that locking, deadlock, and livelock are subtle concepts. It is not enough to debug a concurrent program; this would not detect subtle race conditions. One must prove that a process is deadlock-free. => use of fully debugged concurrent abstractions is highly recommended (e.g., bounded buffer queues)
8 Contracts Thursday, December 06, :48 PM Contracts Some subsystems only function properly because of the behavior of others. Example: the disk page cache makes EXT2 and EXT3 filesystems practical. Epilogue Page 8
9 Epilogue Page 9 Some comditions to avoid Thursday, December 09, :48 AM Some conditions to avoid Deadlock: no progress is made, because everyone is blocked. Livelock: no progress is made, even though no one is blocked. Thrashing: the operating system overhead exceeds the useful computation. Starvation: a process or processes do not have the resources and/or cycles to make progress.
10 Some algorithms to know Thursday, December 06, :11 PM Some algorithms to know Round robin scheduling. Batch scheduling. (know about O(1) and completely fair scheduling as well) Buddy system. Least-recently used and least-frequently accessed. Epilogue Page 10
11 Epilogue Page 11 Structural representation Thursday, December 10, :13 PM Structural representation Sparse structures (e.g. memory pages) are represented by hashing (inverted tables). Dense structures (e.g., driver tables) are represented by arrays and caches. Translation lookaside buffering: a way to speed up use of multiple-level hashes.
12 Epilogue Page 12 Scheduling Thursday, December 10, :32 PM Scheduling There is no such thing as perfect scheduling. Fairness versus throughput. Queueing models and predictions. Little's law: predicts performance based upon steady state. M/M/1 queues: predicts performance based upon statistical assumptions on input and processing.
13 Epilogue Page 13 Security Wednesday, December 07, :26 PM Security The concept of identity. Users and groups. Files and protections.
14 Epilogue Page 14 For what's on the final. Thursday, December 09, :02 PM For what's on the final. Look at the preceding slides. Emphases: design tradeoffs. I/O subsystem. Filesystems. It is impossible not to touch upon prior concepts. Kinds of questions: Design tradeoffs: compare options, suggest the best one. Algorithms: demonstrate an algorithm and predict its results. General literacy: understand how the subsystems of an operating system interact. Expert question: answer questions on a new feature that doesn't exist in any operating system. Is it possible; is it a good idea?
15 Epilogue Page 15 Not the end Thursday, December 10, :40 PM This is not the end It is not the beginning of the end It is the end of the beginning (John Varley, "Millenium")
16 Epilogue Page 16 What next? Thursday, December 10, :55 AM What next? Networking (comp112) Databases (comp115) Security (comp116) Distributed systems (comp150ids) Cloud computing
17 Epilogue Page 17 Not a stale discipline Thursday, December 09, :19 PM Not a stale discipline: Operating systems are a very active research area. Advances are made each year. We haven't talked much about present-day innovations.
18 Epilogue Page 18 How to keep up with what's hot... Thursday, December 10, :02 PM How to keep up with what's hot (a brief list): USENIX Annual Technical Conference. USENIX HotOS: pre-publication results. Operating Systems Design and Implementation (OSDI). Network Systems Design and Implementation (NSDI). File and Storage Technologies (FAST).
19 Epilogue Page 19 What's hot: Thursday, December 09, :22 PM What's hot: Virtualization: running multiple operating systems on one physical host. Proactive bug avoidance: making the operating system detect and avoid known software bugs. New privilege models: the "user" is obsolete. High-performance storage: rethinking the disk drive. Provenance-aware filesystems: store how the file was created, as well as its contents. Power-aware filesystems and operating systems: server power is the dominant cost in providing services. Self-management and self-organization: can operating systems take care of themselves?
20 Epilogue Page 20 Virtualization Thursday, December 09, :26 PM Virtualization Allow two operating system instances to run on the same physical host. Use an overall scheduler to manage instances. Implementing virtualization: A mini-os (the "hypervisor") manages which OS runs and has its own scheduler. The OSs talk to the hypervisor instead of devices. Reasons for virtualization: Configuration conflicts can be avoided. Can utilize standard configurations without change. Leading to higher reliability.
21 Epilogue Page 21 Proactive bug avoidance Thursday, December 09, :26 PM Proactive bug avoidance We know that deadlocks in software are due to bugs. What if we could detect the bugs and avoid them? A new approach: deadlock avoidance through schedule avoidance. We know web applications are full of bugs. Deadlocks occur because affected threads execute according to a particular schedule. Detect the schedule, and prevent it from occurring via artificial delays!
22 Epilogue Page 22 Rethinking privilege Thursday, December 09, :27 PM Rethinking privilege The old ideas of user/group/other protection are outmoded. Especially in the cloud! Example: the android phone Runs linux! Completely ignores linux protections! Has its own idea of protection based upon cloud storage. Your google account determines your privileges. linux accounts protect applications, not users.
23 Epilogue Page 23 Provenance Thursday, December 09, :27 PM Provenance Often, it's not enough to just store a file. We want to know how it was created. This is called the "provenance" of the file. New work: provenance-aware filesystems. Store actions taken to create the file. Transparently, without user intervention.
24 Epilogue Page 24 Rethinking "filesystems" Thursday, December 09, :05 PM In Google AppEngine, There are no "files". There are distributed objects with multiple instances. To store an instance of an object, one throws it into the cloud. To reconstruct something like a file, one makes a query into the cloud to return matching instances. So, your so-called "serial program" utilizes 10,000 or more machines to accomplish its result. In google mail your messages are spread all over google's infrastructure. your "inbox" is a polite illusion: it's a query.
25 Epilogue Page 25 Managing human-computer communities Thursday, December 09, :06 PM We face a future in which computers and humans are equal partners. Both are more complex than one person can understand. Both are subject to motivations and develop "personality".
26 Epilogue Page 26 Trends Thursday, December 09, :35 PM Some current trends: Multi-core applications and use of GPUs as extra "cores". Ubiquitous interactions between tiny embedded computers. The social power of scale.
27 Epilogue Page 27 Operating systems and social scale Thursday, December 09, :37 PM Operating systems and social pressure You might consider operating systems to be dramatically non-social tools. In fact, they're very much controlled by social factors: what people use is where bugs get discovered, which is what implementors debug. There is huge social pressure to fix some things, and an equal lack of pressure to fix other things.
28 Some parting words Thursday, December 09, :38 PM What have we learned? That it is possible to build complex systems from very simple building blocks. That subsystems can cooperate toward a common mission with only partial knowledge of the mission. That knowledge boundaries don't just make a problem easier; they make it possible to solve. Epilogue Page 28
29 The next 10 years Monday, December 8, :54 PM The job of programmer is obsolete. But the systems remain, and are more complex than ever. The big job is to be a lens between the users and the increasingly complex systems. Epilogue Page 29
30 As a metaphor for life Thursday, December 09, :03 PM Operating systems are a metaphor for life One often doesn't know precisely what's going on. One must at best use partial knowledge to make decisions. One is constantly faced with systems that no one person can completely understand. Small changes have big effects. Nonetheless, things get done! Epilogue Page 30
31 So, in your own personal operating system: Thursday, December 09, :10 PM Don't deadlock. Don't livelock. Don't thrash. Epilogue Page 31
Epilogue Thursday, December 09, :16 PM
Epilogue Page 1 Epilogue Thursday, December 09, 2004 2:16 PM We have taken a rather long journey From the physical hardware to the code that manages it, To the optimal structure of that code, To models
More informationFully journaled filesystems. Low-level virtualization Filesystems on RAID Filesystems on Flash (Filesystems on DVD)
RAID_and_Flash Page 1 Beyond simple filesystems 4:33 PM Fully journaled filesystems. Low-level virtualization Filesystems on RAID Filesystems on Flash (Filesystems on DVD) RAID_and_Flash Page 2 Network
More informationScheduling. Monday, November 22, 2004
Scheduling Page 1 Scheduling Monday, November 22, 2004 11:22 AM The scheduling problem (Chapter 9) Decide which processes are allowed to run when. Optimize throughput, response time, etc. Subject to constraints
More informationTo understand this, let's build a layered model from the bottom up. Layers include: device driver filesystem file
Disks_and_Layers Page 1 So what is a file? Tuesday, November 17, 2015 1:23 PM This is a difficult question. To understand this, let's build a layered model from the bottom up. Layers include: device driver
More informationCan "scale" cloud applications "on the edge" by adding server instances. (So far, haven't considered scaling the interior of the cloud).
Recall: where we are Wednesday, February 17, 2010 11:12 AM Recall: where we are Can "scale" cloud applications "on the edge" by adding server instances. (So far, haven't considered scaling the interior
More information"what you don't know, that can't kill you (but can kill your performance)"
Hashes Page 1 Addressing Tuesday, November 02, 2010 1:21 PM Today, we study how memory is managed Part architecture: what a modern processor can do Part tradition: we've always done it that way. Part performance:
More informationMultiprocessor Systems. Chapter 8, 8.1
Multiprocessor Systems Chapter 8, 8.1 1 Learning Outcomes An understanding of the structure and limits of multiprocessor hardware. An appreciation of approaches to operating system support for multiprocessor
More informationOperating Systems Comprehensive Exam. Spring Student ID # 3/16/2006
Operating Systems Comprehensive Exam Spring 2006 Student ID # 3/16/2006 You must complete all of part I (60%) You must complete two of the three sections in part II (20% each) In Part I, circle or select
More informationSo far, we've seen situations in which locking can improve reliability of access to critical sections.
Locks Page 1 Using locks Monday, October 6, 2014 9:49 AM So far, we've seen situations in which locking can improve reliability of access to critical sections. In general, how can one use locks? Locks
More informationRecall from deadlock lecture. Tuesday, October 18, 2011
Recall from deadlock lecture Tuesday, October 18, 2011 1:17 PM Basic assumptions of deadlock theory: If a process gets the resources it requests, it completes, exits, and releases resources. There are
More informationCS 153 Design of Operating Systems Winter 2016
CS 153 Design of Operating Systems Winter 2016 Lecture 12: Scheduling & Deadlock Priority Scheduling Priority Scheduling Choose next job based on priority» Airline checkin for first class passengers Can
More informationStanford University Computer Science Department CS 140 Midterm Exam Dawson Engler Winter 1999
Stanford University Computer Science Department CS 140 Midterm Exam Dawson Engler Winter 1999 Name: Please initial the bottom left corner of each page. This is an open-book exam. You have 50 minutes to
More informationMain Points of the Computer Organization and System Software Module
Main Points of the Computer Organization and System Software Module You can find below the topics we have covered during the COSS module. Reading the relevant parts of the textbooks is essential for a
More informationMidterm Exam. October 20th, Thursday NSC
CSE 421/521 - Operating Systems Fall 2011 Lecture - XIV Midterm Review Tevfik Koşar University at Buffalo October 18 th, 2011 1 Midterm Exam October 20th, Thursday 9:30am-10:50am @215 NSC Chapters included
More informationAddress spaces and memory management
Address spaces and memory management Review of processes Process = one or more threads in an address space Thread = stream of executing instructions Address space = memory space used by threads Address
More informationWhy is scheduling so difficult?
Queueing Page 1 Why is scheduling so difficult? Wednesday, November 8, 2017 7:35 AM Scheduling is a matter of great controversy. Should it be fair? (O(log n)) Should it instead be fast? (O(1)) As well,
More informationChapter 8 Virtual Memory
Chapter 8 Virtual Memory Contents Hardware and control structures Operating system software Unix and Solaris memory management Linux memory management Windows 2000 memory management Characteristics of
More informationCSI3131 Final Exam Review
CSI3131 Final Exam Review Final Exam: When: April 24, 2015 2:00 PM Where: SMD 425 File Systems I/O Hard Drive Virtual Memory Swap Memory Storage and I/O Introduction CSI3131 Topics Process Computing Systems
More informationCSC369 Lecture 5. Larry Zhang, October 19,2015
CSC369 Lecture 5 Larry Zhang, October 19,2015 1 Describe your A1 experience using the feedback form 2 Announcements Assignment 2 out later this week, due November 11 Midterm next week in lecture: 9:10AM
More informationArchitectural Support. Processes. OS Structure. Threads. Scheduling. CSE 451: Operating Systems Spring Module 28 Course Review
Architectural Support CSE 451: Operating Systems Spring 2012 Module 28 Course Review Ed Lazowska lazowska@cs.washington.edu Allen Center 570 Privileged instructions what are they? how does the CPU know
More informationCSE 153 Design of Operating Systems
CSE 153 Design of Operating Systems Winter 2018 Midterm Review Midterm in class on Monday Covers material through scheduling and deadlock Based upon lecture material and modules of the book indicated on
More informationOperating Systems. Week 9 Recitation: Exam 2 Preview Review of Exam 2, Spring Paul Krzyzanowski. Rutgers University.
Operating Systems Week 9 Recitation: Exam 2 Preview Review of Exam 2, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 March 27, 2015 2015 Paul Krzyzanowski 1 Exam 2 2012 Question 2a One of
More informationMultiprocessor System. Multiprocessor Systems. Bus Based UMA. Types of Multiprocessors (MPs) Cache Consistency. Bus Based UMA. Chapter 8, 8.
Multiprocessor System Multiprocessor Systems Chapter 8, 8.1 We will look at shared-memory multiprocessors More than one processor sharing the same memory A single CPU can only go so fast Use more than
More informationChapter 2 Processes and Threads. Interprocess Communication Race Conditions
Chapter 2 Processes and Threads [ ] 2.3 Interprocess communication 2.4 Classical IPC problems 2.5 Scheduling 85 Interprocess Communication Race Conditions Two processes want to access shared memory at
More informationMultiprocessor Systems. COMP s1
Multiprocessor Systems 1 Multiprocessor System We will look at shared-memory multiprocessors More than one processor sharing the same memory A single CPU can only go so fast Use more than one CPU to improve
More informationOperating Systems Comprehensive Exam. Spring Student ID # 3/20/2013
Operating Systems Comprehensive Exam Spring 2013 Student ID # 3/20/2013 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,
More informationI/O Systems. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic)
I/O Systems Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) I/O Systems 1393/9/15 1 / 57 Motivation Amir H. Payberah (Tehran
More information(b) External fragmentation can happen in a virtual memory paging system.
Alexandria University Faculty of Engineering Electrical Engineering - Communications Spring 2015 Final Exam CS333: Operating Systems Wednesday, June 17, 2015 Allowed Time: 3 Hours Maximum: 75 points Note:
More informationCSE 410 Final Exam 6/09/09. Suppose we have a memory and a direct-mapped cache with the following characteristics.
Question 1. (10 points) (Caches) Suppose we have a memory and a direct-mapped cache with the following characteristics. Memory is byte addressable Memory addresses are 16 bits (i.e., the total memory size
More informationReadings and References. Virtual Memory. Virtual Memory. Virtual Memory VPN. Reading. CSE Computer Systems December 5, 2001.
Readings and References Virtual Memory Reading Chapter through.., Operating System Concepts, Silberschatz, Galvin, and Gagne CSE - Computer Systems December, Other References Chapter, Inside Microsoft
More informationMid-term Roll no: Scheduler Activations: Effective Kernel Support for the User-Level Management of Parallelism
Advanced Operating Systems Spring 2013 Mid-term Roll no: Instructions. The exam consists of 30 multiple choice questions, each worth one mark. You have 2 hours and 30 minutes to solve this. If you think
More informationConcurrency, Mutual Exclusion and Synchronization C H A P T E R 5
Concurrency, Mutual Exclusion and Synchronization C H A P T E R 5 Multiple Processes OS design is concerned with the management of processes and threads: Multiprogramming Multiprocessing Distributed processing
More informationSistemas Operacionais I. Valeria Menezes Bastos
Sistemas Operacionais I Valeria Menezes Bastos Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Summary Basic Elements Evolution
More informationCoupling Thursday, October 21, :23 PM
Coupling Page 1 Coupling Thursday, October 21, 2004 3:23 PM Two kinds of multiple-processor systems Tightly-coupled Can share efficient semaphores. Usually involve some form of shared memory. Loosely-coupled
More informationMemory Management Virtual Memory
Memory Management Virtual Memory Part of A3 course (by Theo Schouten) Biniam Gebremichael http://www.cs.ru.nl/~biniam/ Office: A6004 April 4 2005 Content Virtual memory Definition Advantage and challenges
More informationOperating Systems Comprehensive Exam. Fall Student ID # 10/31/2013
Operating Systems Comprehensive Exam Fall 2013 Student ID # 10/31/2013 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,
More informationScheduling Mar. 19, 2018
15-410...Everything old is new again... Scheduling Mar. 19, 2018 Dave Eckhardt Brian Railing Roger Dannenberg 1 Outline Chapter 5 (or Chapter 7): Scheduling Scheduling-people/textbook terminology note
More informationExam Guide COMPSCI 386
FOUNDATIONS We discussed in broad terms the three primary responsibilities of an operating system. Describe each. What is a process? What is a thread? What parts of a process are shared by threads? What
More informationToday: Protection! Protection!
Today: Protection! Goals of Protection Domain of Protection Access Matrix Implementation of Access Matrix Revocation of Access Rights Capability-Based Systems Language-Based Protection Lecture 27, page
More informationChapter 8 Virtual Memory
Operating Systems: Internals and Design Principles Chapter 8 Virtual Memory Seventh Edition William Stallings Operating Systems: Internals and Design Principles You re gonna need a bigger boat. Steven
More information2 nd Half. Memory management Disk management Network and Security Virtual machine
Final Review 1 2 nd Half Memory management Disk management Network and Security Virtual machine 2 Abstraction Virtual Memory (VM) 4GB (32bit) linear address space for each process Reality 1GB of actual
More informationCONTENTS. Computer-System Structures
CONTENTS PART ONE OVERVIEW Chapter 1 Introduction 1.1 What Is an Operating System? 3 1.2 Simple Batch Systems 6 1.3 Multiprogrammed Batched Systems 8 1.4 Time-Sharing Systems 9 1.5 Personal-Computer Systems
More informationDesign of Operating System
Design of Operating System Architecture OS protection, modes/privileges User Mode, Kernel Mode https://blog.codinghorror.com/understanding-user-and-kernel-mode/ a register of flag to record what mode the
More informationLecture 23 Database System Architectures
CMSC 461, Database Management Systems Spring 2018 Lecture 23 Database System Architectures These slides are based on Database System Concepts 6 th edition book (whereas some quotes and figures are used
More informationChapter 8 Virtual Memory
Operating Systems: Internals and Design Principles Chapter 8 Virtual Memory Seventh Edition William Stallings Modified by Rana Forsati for CSE 410 Outline Principle of locality Paging - Effect of page
More informationMidterm Exam Solutions Amy Murphy 28 February 2001
University of Rochester Midterm Exam Solutions Amy Murphy 8 February 00 Computer Systems (CSC/56) Read before beginning: Please write clearly. Illegible answers cannot be graded. Be sure to identify all
More informationTo Everyone... iii To Educators... v To Students... vi Acknowledgments... vii Final Words... ix References... x. 1 ADialogueontheBook 1
Contents To Everyone.............................. iii To Educators.............................. v To Students............................... vi Acknowledgments........................... vii Final Words..............................
More informationLessons learned so far... Wednesday, January 26, :16 PM
Consistency_and_Concurrency Page 1 Lessons learned so far... Wednesday, January 26, 2011 4:16 PM Last lecture: syntax: A cloud application is a java serial program that interacts with persistent instances
More informationLecture 9: Midterm Review
Project 1 Due at Midnight Lecture 9: Midterm Review CSE 120: Principles of Operating Systems Alex C. Snoeren Midterm Everything we ve covered is fair game Readings, lectures, homework, and Nachos Yes,
More informationDeadlock Wednesday, October 13, :08 PM
Deadlock Page 1 Deadlock Wednesday, October 13, 2004 8:08 PM Deadlock Other side of spectrum (from race conditions) Common forms Circular dependencies. Resource saturation. All symptoms of roughly the
More informationToday: Protection. Sermons in Computer Science. Domain Structure. Protection
Sermons in Simplicity Performance Programming as Craft Information is Property Stay Broad Ack: Tom Anderson, U. Washington Today: Protection Goals of Protection Domain of Protection Access Matrix Implementation
More informationOperating System Review Part
Operating System Review Part CMSC 602 Operating Systems Ju Wang, 2003 Fall Virginia Commonwealth University Review Outline Definition Memory Management Objective Paging Scheme Virtual Memory System and
More informationPhysical and Logical structure. Thursday, December 02, 2004
Logical_and_physical Page 1 Physical and Logical structure Thursday, December 02, 2004 2:32 PM Logical and Physical structure Physical structure of a disk: tracks, sectors, cylinders. Logical structure
More informationChapter 5 Concurrency: Mutual Exclusion. and. Synchronization. Operating Systems: Internals. and. Design Principles
Operating Systems: Internals and Design Principles Chapter 5 Concurrency: Mutual Exclusion and Synchronization Seventh Edition By William Stallings Designing correct routines for controlling concurrent
More informationAdvanced file systems: LFS and Soft Updates. Ken Birman (based on slides by Ben Atkin)
: LFS and Soft Updates Ken Birman (based on slides by Ben Atkin) Overview of talk Unix Fast File System Log-Structured System Soft Updates Conclusions 2 The Unix Fast File System Berkeley Unix (4.2BSD)
More informationOperating Systems (1DT020 & 1TT802)
Uppsala University Department of Information Technology Name: Perso. no: Operating Systems (1DT020 & 1TT802) 2009-05-27 This is a closed book exam. Calculators are not allowed. Answers should be written
More informationCPS 310 second midterm exam, 11/14/2014
CPS 310 second midterm exam, 11/14/2014 Your name please: Part 1. Sticking points Consider the Java code snippet below. Is it a legal use of Java synchronization? What happens if two threads A and B call
More informationOperating Systems Comprehensive Exam. Spring Student ID # 2/17/2011
Operating Systems Comprehensive Exam Spring 2011 Student ID # 2/17/2011 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,
More informationDistributed Consensus Protocols
Distributed Consensus Protocols ABSTRACT In this paper, I compare Paxos, the most popular and influential of distributed consensus protocols, and Raft, a fairly new protocol that is considered to be a
More informationMEMORY MANAGEMENT/1 CS 409, FALL 2013
MEMORY MANAGEMENT Requirements: Relocation (to different memory areas) Protection (run time, usually implemented together with relocation) Sharing (and also protection) Logical organization Physical organization
More informationAnnouncements. Reading. Project #1 due in 1 week at 5:00 pm Scheduling Chapter 6 (6 th ed) or Chapter 5 (8 th ed) CMSC 412 S14 (lect 5)
Announcements Reading Project #1 due in 1 week at 5:00 pm Scheduling Chapter 6 (6 th ed) or Chapter 5 (8 th ed) 1 Relationship between Kernel mod and User Mode User Process Kernel System Calls User Process
More informationCSc33200: Operating Systems, CS-CCNY, Fall 2003 Jinzhong Niu December 10, Review
CSc33200: Operating Systems, CS-CCNY, Fall 2003 Jinzhong Niu December 10, 2003 Review 1 Overview 1.1 The definition, objectives and evolution of operating system An operating system exploits and manages
More information6.033 Computer System Engineering
MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.033 2009 Lecture
More informationVirtual Memory. Chapter 8
Virtual Memory 1 Chapter 8 Characteristics of Paging and Segmentation Memory references are dynamically translated into physical addresses at run time E.g., process may be swapped in and out of main memory
More informationSubject: Operating System (BTCOC403) Class: S.Y.B.Tech. (Computer Engineering)
A. Multiple Choice Questions (60 questions) Subject: Operating System (BTCOC403) Class: S.Y.B.Tech. (Computer Engineering) Unit-I 1. What is operating system? a) collection of programs that manages hardware
More informationChapter 5 Concurrency: Mutual Exclusion and Synchronization
Operating Systems: Internals and Design Principles Chapter 5 Concurrency: Mutual Exclusion and Synchronization Seventh Edition By William Stallings Designing correct routines for controlling concurrent
More informationLecture 11: Linux ext3 crash recovery
6.828 2011 Lecture 11: Linux ext3 crash recovery topic crash recovery crash may interrupt a multi-disk-write operation leave file system in an unuseable state most common solution: logging last lecture:
More informationCSE 410 Final Exam Sample Solution 6/08/10
Question 1. (12 points) (caches) (a) One choice in designing cache memories is to pick a block size. Which of the following do you think would be the most reasonable size for cache blocks on a computer
More informationFCM 710: Architecture of Secure Operating Systems
FCM 710: Architecture of Secure Operating Systems Practice Exam, Spring 2010 Email your answer to ssengupta@jjay.cuny.edu March 16, 2010 Instructor: Shamik Sengupta Multiple-Choice 1. operating systems
More informationDistributed File Systems Issues. NFS (Network File System) AFS: Namespace. The Andrew File System (AFS) Operating Systems 11/19/2012 CSC 256/456 1
Distributed File Systems Issues NFS (Network File System) Naming and transparency (location transparency versus location independence) Host:local-name Attach remote directories (mount) Single global name
More informationThe Journey of an I/O request through the Block Layer
The Journey of an I/O request through the Block Layer Suresh Jayaraman Linux Kernel Engineer SUSE Labs sjayaraman@suse.com Introduction Motivation Scope Common cases More emphasis on the Block layer Why
More information1. Draw and explain program flow of control without and with interrupts. [16]
Code No: R05310503 Set No. 1 1. Draw and explain program flow of control without and with interrupts. [16] 2. Explain the following transitions: (a) Blocked Blocked/Suspended. (b) Blocked/Suspended Ready/Suspended.
More informationSupplementary Materials on Multilevel Feedback Queue
Supplementary Materials on Multilevel Feedback Queue Review Each job runs for the same amount of time. All jobs arrive at the same time. Once started, each job runs to completion. Performance is more important.
More informationCS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University
Frequently asked questions from the previous class survey CS 370: SYSTEM ARCHITECTURE & SOFTWARE [CPU SCHEDULING] Shrideep Pallickara Computer Science Colorado State University OpenMP compiler directives
More informationCSE 4/521 Introduction to Operating Systems. Lecture 24 I/O Systems (Overview, Application I/O Interface, Kernel I/O Subsystem) Summer 2018
CSE 4/521 Introduction to Operating Systems Lecture 24 I/O Systems (Overview, Application I/O Interface, Kernel I/O Subsystem) Summer 2018 Overview Objective: Explore the structure of an operating system
More informationCS140 Operating Systems and Systems Programming Midterm Exam
CS140 Operating Systems and Systems Programming Midterm Exam October 31 st, 2003 (Total time = 50 minutes, Total Points = 50) Name: (please print) In recognition of and in the spirit of the Stanford University
More informationOperating Systems Overview
Operating Systems Overview 1 operating system no clear traditional definition each definition cover a distinct aspect an interface between applications and hardware true, this was the first reason for
More informationVirtual Memory. Chapter 8
Chapter 8 Virtual Memory What are common with paging and segmentation are that all memory addresses within a process are logical ones that can be dynamically translated into physical addresses at run time.
More informationStudent Name: University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science
University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science CS 162 Spring 2011 I. Stoica FIRST MIDTERM EXAMINATION Wednesday, March 9, 2011 INSTRUCTIONS
More informationProcesses Prof. James L. Frankel Harvard University. Version of 6:16 PM 10-Feb-2017 Copyright 2017, 2015 James L. Frankel. All rights reserved.
Processes Prof. James L. Frankel Harvard University Version of 6:16 PM 10-Feb-2017 Copyright 2017, 2015 James L. Frankel. All rights reserved. Process Model Each process consists of a sequential program
More informationCSE 544: Principles of Database Systems
CSE 544: Principles of Database Systems Anatomy of a DBMS, Parallel Databases 1 Announcements Lecture on Thursday, May 2nd: Moved to 9am-10:30am, CSE 403 Paper reviews: Anatomy paper was due yesterday;
More informationFinal Exam Preparation Questions
EECS 678 Spring 2013 Final Exam Preparation Questions 1 Chapter 6 1. What is a critical section? What are the three conditions to be ensured by any solution to the critical section problem? 2. The following
More informationOperating Systems. Operating Systems
The operating system defines our computing experience. It is the first software we see when we turn on the computer, and the last software we see when the computer is turned off. It's the software that
More informationCS 571 Operating Systems. Midterm Review. Angelos Stavrou, George Mason University
CS 571 Operating Systems Midterm Review Angelos Stavrou, George Mason University Class Midterm: Grading 2 Grading Midterm: 25% Theory Part 60% (1h 30m) Programming Part 40% (1h) Theory Part (Closed Books):
More informationCSE 544 Principles of Database Management Systems
CSE 544 Principles of Database Management Systems Alvin Cheung Fall 2015 Lecture 5 - DBMS Architecture and Indexing 1 Announcements HW1 is due next Thursday How is it going? Projects: Proposals are due
More informationConcurrent Programming Synchronisation. CISTER Summer Internship 2017
1 Concurrent Programming Synchronisation CISTER Summer Internship 2017 Luís Nogueira lmn@isep.ipp.pt 2 Introduction Multitasking Concept of overlapping the computation of a program with another one Central
More informationMultiprogramming. Evolution of OS. Today. Comp 104: Operating Systems Concepts 28/01/2013. Processes Management Scheduling & Resource Allocation
Comp 104: Operating Systems Concepts Management Scheduling & Resource Allocation Today OS evolution Introduction to processes OS structure 1 2 Evolution of OS Largely driven by desire to do something useful
More informationCOMP 3430 Robert Guderian
Operating Systems COMP 3430 Robert Guderian file:///users/robg/dropbox/teaching/3430-2018/slides/06_concurrency/index.html?print-pdf#/ 1/76 1 Concurrency file:///users/robg/dropbox/teaching/3430-2018/slides/06_concurrency/index.html?print-pdf#/
More informationCSC369 Operating Systems. Spring 2007
CSC369 Operating Systems Spring 2007 Final Review 1 Final mechanics Processes & Threads Overview Concurrency, Synchronization & Deadlock Scheduling Memory management Paging Page replacement Disk I/O File
More informationWhat s An OS? Cyclic Executive. Interrupts. Advantages Simple implementation Low overhead Very predictable
What s An OS? Provides environment for executing programs Process abstraction for multitasking/concurrency scheduling Hardware abstraction layer (device drivers) File systems Communication Do we need an
More informationOperating System Performance and Large Servers 1
Operating System Performance and Large Servers 1 Hyuck Yoo and Keng-Tai Ko Sun Microsystems, Inc. Mountain View, CA 94043 Abstract Servers are an essential part of today's computing environments. High
More informationFile Systems: FFS and LFS
File Systems: FFS and LFS A Fast File System for UNIX McKusick, Joy, Leffler, Fabry TOCS 1984 The Design and Implementation of a Log- Structured File System Rosenblum and Ousterhout SOSP 1991 Presented
More informationIBM Research Report. A Comparison of Virtualization Technologies for Use in Cloud Data Centers
H-0330 (HAI1801-001) January 3, 2018 Computer Science IBM Research Report A Comparison of Virtualization Technologies for Use in Cloud Data Centers Joel Nider IBM Research Division Haifa Research Laboratory
More informationFrequently asked questions from the previous class survey
CS 370: OPERATING SYSTEMS [CPU SCHEDULING] Shrideep Pallickara Computer Science Colorado State University L14.1 Frequently asked questions from the previous class survey Turnstiles: Queue for threads blocked
More informationWhat's new in MySQL 5.5? Performance/Scale Unleashed
What's new in MySQL 5.5? Performance/Scale Unleashed Mikael Ronström Senior MySQL Architect The preceding is intended to outline our general product direction. It is intended for
More informationa. A binary semaphore takes on numerical values 0 and 1 only. b. An atomic operation is a machine instruction or a sequence of instructions
CSE 306 -- Operating Systems Spring 2002 Solutions to Review Questions for the Final Exam 1. [20 points, 1 each] rue or False, circle or F. a. A binary semaphore takes on numerical values 0 and 1 only.
More informationGFS-python: A Simplified GFS Implementation in Python
GFS-python: A Simplified GFS Implementation in Python Andy Strohman ABSTRACT GFS-python is distributed network filesystem written entirely in python. There are no dependencies other than Python s standard
More informationChapter 18: Database System Architectures.! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems!
Chapter 18: Database System Architectures! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types 18.1 Centralized Systems! Run on a single computer system and
More informationCSE544 Database Architecture
CSE544 Database Architecture Tuesday, February 1 st, 2011 Slides courtesy of Magda Balazinska 1 Where We Are What we have already seen Overview of the relational model Motivation and where model came from
More informationParallelism Marco Serafini
Parallelism Marco Serafini COMPSCI 590S Lecture 3 Announcements Reviews First paper posted on website Review due by this Wednesday 11 PM (hard deadline) Data Science Career Mixer (save the date!) November
More information