Fall 2014 - Scheme of Evaluation PROGRAM SEMESTER SUBJECT CODE & NAME CREDIT BK ID MAX. MARKS Q.No 1 A 4 B1405 60 Question and Scheme of Evaluation Differentiate between Distributed Systems and Real-time Systems. 2 A MCA(REVISED FALL 2012) SECOND MCA2010 – OPERATING SYSTEM Unit/ Page No. Marks Total Marks U1/9 5+5 10 In distributed system, all the computations are distributed among several processors. Distributed systems are also referred as loosely coupled systems because here the processors do not share memory or a clock. Instead, each processor has its own local memory. The processors communicate with one another through various communication lines, such as high speed buses or telephone lines. The processors in distributed system vary in size, function and are referred as sites, nodes, and computers and so on depending on the context in which they are mentioned. 5 10 Real-time operating systems are specially designed to respond to events that happen in real time. A real time operating system has well-defined, fixed time constrains. Processing must be done within the defined constraints, or else the system will fail. This feature is very useful in implementing systems such as an airline reservation system. In such a system, the response time should be very short because a customer’s reservation is to be done while he/she waits. There are two flavors of real-time systems. A hard real-time system guarantees that critical tasks complete at a specified time. A less restrictive type of real time system is soft real time system, where a critical real time task gets priority over other tasks, and remains that priority until it completes. Explain the different process states. A process being an active entity, changes state as execution proceeds. A process can be any one of the following states: New: Process being created. Running: Instructions being executed. Waiting (Blocked): Process waiting for an event to occur. Ready: Process waiting for CPU. Terminated: Process has finished execution. 5 U3/ 34 5*2 2 2 2 2 2 Page 1 of 4 10 10 3 Define Deadlock. Explain necessary conditions for deadlock. A 4 A U6/ 94 2+ (2*4) Deadlock occurs when we have a set of processes [not necessarily all the processes in the system], each holding some resources, each requesting some resources, and none of them is able to obtain what it needs, i.e. to make progress. A deadlock occurs in a system if the following four conditions hold simultaneously: 1) Mutual exclusion: At least one of the resources is nonsharable, that is, only one process at a time can use the resource. 2) Hold and wait: A process exists that is holding on to at least one resource and waiting for an additional resource held by another process. 3) No preemption: Resources cannot be preempted, that is, a resource is released only by the process that is holding it. 4) Circular wait: There exist a set of processes P 0, P1… Pn of waiting processes such that P0 is waiting for a resource held by P1, P1 is waiting for a resource held by P 2… Pn-1 is waiting for a resource held Pn and Pn is in turn waiting for a resource held by P0. Differentiate between Sequential access and Direct access methods. In Sequential access method, information in a file is accessed sequentially one record after another. To process the ith record all the i-1 records previous to i must be accessed. Sequential access is based on the tape model that is inherently a sequential access device. Sequential access is best suited where most of the records in a file are to be processed. For example, transaction files. 10 2 2 2 2 2 U9/ 155 5+5 10 5 10 5 A Sometimes it is not necessary to process every record in a file. It may not be necessary to process records in the order in which they are present. Information present in a record of a file is to be accessed only if some key value in that record is known. In all such cases, direct access is used. Direct access is based on the disk that is a direct access device and allows random access of any file block. Since a file is a collection of physical blocks, any block and hence the records in that block are accessed. For example, master files. Differentiate between Daisy chain bus arbitration and Priority encoded bus arbitration. Daisy chain arbitration: Here, the requesting device or devices assert the signal bus_request. The bus arbiter returns the bus_grant signal, which passes through each of the devices 5 U10/ 178 5+5 Page 2 of 4 10 which can have access to the bus. Here, the priority of a device depends solely on its position in the daisy chain. If two or more devices request the bus at the same time, the highest priority device is granted the bus first, and then the bus_grant signal is passed further down the chain. Generally a third signal (bus_release) is used to indicate to the bus arbiter that the first device has finished its use of the bus. Holding bus_request asserted indicates that another device wants to use the bus. 6 A 5 Priority encoded arbitration: Here, each device has a request line connected to a centralized arbiter that determines which device will be granted access to the bus. The order may be fixed by the order of connection (priority encoded), or it may be determined by some algorithm preloaded into the arbiter. Following figure shows this type of system. Note that each device has a separate line to the bus arbiter. Differentiate between encryption and decryption. What are the two basic methods for encryption? Encryption is an important tool in protection, security and authentication. The process involves two steps Encryption: the original message is changed to some other form 10 5 U12/ 212 5+5 5 Page 3 of 4 10 Decryption: the encrypted message is restored back to the original. 10 Encryption could be by one of the following two basic methods: Transposition ciphers Substitution ciphers 5 In transposition ciphers the contents of the data are not changed but the order is changed. For example, a message could be sent in reverse order like: I am fine enif ma I Substitution ciphers work by sending a set of characters different from the original like: I am fine r zn ormv *A-Answer Note –Please provide keywords, short answer, specific terms, and specific examples (wherever necessary) *********** Page 4 of 4