Operating System



Item Name

An echo server echoes back whatever it receives from a

An echo server echoes back whatever it receives from a client. For example, if a client sends the server the string Hello there! The server will respond with the exact data it received from the client-that is, Hello there! Write an echo server using the Java networking API described in Section 3.6.1. This server will wait for a client connection using the accept () method. When a client...

An experimental addition to UNIX allows a user to connect

An experimental addition to UNIX allows a user to connect a program to a file. The watchdog is invoked whenever a program requests access to the file. The watchdog then either grants or denies access to the file. Discuss two pros and two cons of using watchdogs for security.

Argue for or against the judicial sentence handed down against

Argue for or against the judicial sentence handed down against Robert Morris, Jr., for his creation and execution of the Internet worm discussed in Section 15.3.1.

As described in Section 4.5.2, Linux does not distinguish betwee

As described in Section 4.5.2, Linux does not distinguish between processes and threads. Instead, Linux treats both in the same way, allowing a task to be more akin to a process or a thread depending on the set of flags passed to the clone() system call. However, many operating systems-such as Windows XP and Solaris-treat processes and threads differently. Typically, such systems use a notation...

Assume that a digital video file is being displayed at

Assume that a digital video file is being displayed at a rate of 30 frames per second; the resolution of each frame is 640 x 480 and 24 bits are being used to represent each color. Assuming that no compression is being used, what is the bandwidth necessary to deliver this file? Next assuming that the file has been compressed at a ratio of 200: 1, what is the bandwidth necessary to deliver the...

Assume that a finite number of resources of a single

Assume that a finite number of resources of a single resource type must be managed. Processes may ask for a number of these resources and-once finished-will return them. As an example, many commercial software packages provide a given number of licenses, indicating the number of applications that may run concurrently. When the application is started, the license count is decremented. When the...

Assume that a program has just referenced an address in

Assume that a program has just referenced an address in virtual memory. Describe a scenario in which each of the following can occur. (If no such scenario can occur, explain why.) TLB miss with no page fault TLB miss and page fault TLB hit and no page fault TLB hit and page fault

Assume that a system has a 32-bit virtual address with

Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./a.out 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program...

Assume that in a particular augmentation of a remote-file-access

Assume that in a particular augmentation of a remote-file-access protocol, each client maintains a name cache that caches translations from file names to corresponding file handles. What issues should we take into account in implementing the name cache?

Assume that we have a demand-paged memory. The page table

Assume that we have a demand-paged memory. The page table is held in registers. It takes 8 milliseconds to service a page fault if an empty frame is available or if the replaced page is not modified and 20 milliseconds if the replaced page is modified. Memory-access time is 100 nanoseconds. Assume that the page to be replaced is modified 70 percent of the time. What is the maximum acceptable...