Assignment 2: Chapter 1

This assignment is to be completed individually, not as a group.

Please make sure that you're using the same edition of the book. There is no guarantee that older editions use the same numbering for problems. Please submit a single tar file.

  1. Operating Systems Concepts, 1.2:

    The issue of resource utilization shows up in different forms in different types of operating systems. List what resources must be managed carefully in the following settings: (a) Mainframe or minicomputer systems; (b) Workstations connected to servers (c) Handheld computers.

  2. 1.4

    Which of the functionalities listed below need to be supported by the operating system for the following two settings: (a) handheld devices and (b) real-time systems?

    1. Batch programming
    2. Virtual memory
    3. Time sharing
  3. 1.5

    Describe the differences between symmetric and asymmetric multiprocessing. What are three advantages and one disadvantage of multiprocessor systems?

  4. Provide three additional examples for each of the various above-kernel library levels discussed in class.
  5. What makes Apache and a web browser similar to an operating system? What facets of an operating system do they not support or are of significantly lower concern?
  6. 1.8

    Consider a computing cluster consisting of two nodes running a database. Describe two ways in which the cluster software can manage access to the data on the disk. Discuss the benefits and disadvantages of each.

  7. 1.12

    Some computer systems do not provide a privileged mode of operation in hardware. Is it possible to construct a secure operating system for these computer systems? Give arguments both that it is and that it is not possible.

  8. 1.13

    Give two reasons why caches are useful. What problems do they solve? What problems do they cause? If a cache can be made as large as the device for which it is caching (for instance, a cache as large as a disk), why not make it that large and eliminate the device?

  9. 1.15

    Describe a mechanism for enforcing memory protection in order to prevent a program from modifying the memory associated with other programs.


Last updated by Henning Schulzrinne