操作系统第7版课后练习答案(英文).pdf
《操作系统第7版课后练习答案(英文).pdf》由会员分享,可在线阅读,更多相关《操作系统第7版课后练习答案(英文).pdf(112页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、solutionsto the exercisesChapter 11.1 In a multiprogramming and time-sharing environment,several users share thesystem simultaneously.This situation can result in various security problems,a.What are two such problems?b.Can we ensure the same degree of security in a time-shared machine as in a dedic
2、atedmachine?Explain your answer.Answer:a.Stealing or copying one,s programs or data;using system resources(CPU,memory,disk space,peripherals)without proper accounting.b.Probably not,since any protection scheme devised by humans can inevitably bebroken by a human,and the more complex the scheme,the m
3、ore difficult it is to feelconfident of its correct implementation.1.2 The issue of resource utilization shows up in different forms in different typesof operating systems.List what resources must be managedcarefully in the following settings:a.Mainframe or minicomputer systems b.Workstations connec
4、ted to servers c.Handheld computersAnswer:a.Mainframes:memory and CPU resources,storage,network bandwidth.b.Workstations:memory and CPU resoucesc.Handheld computers:power consumption,memory resources.1.3 Under what circumstances would a user be better off using a timesharing systemrather than a PC o
5、r single-user workstation?Answer:W hen there are few other users,the task is large,and the hardware is fast,time-sharingmakes sense.The full power of the system can be brought to bear on theuser s problem.The problemcan be solved faster than on a personal computer.Anothercase occurs when lots of oth
6、er users need resources at the same time.A personal computer is best when the job is small enough to be executed reasonablyon it and when performance is sufficient to execute the program to the user ssatisfaction.1.4 Which of the functionalities listed below need to be supported by the operatingsyst
7、em for the following two settings:(a)handheld devices and(b)real-time systems,a.Batch programming b.Virtual memory c.Time sharingAnswer:For real-time systems,the operating system needs to support virtual memoryand time sharing in a fair manner.For handheld systems,the operating system needsto provid
8、e virtual memory,but does not need to provide time-sharing.Batchprogramming is not necessary in both settings.1.5 Describe the differences between symmetric and asymmetric multiprocessing.Whatare three advantages and one disadvantage of multiprocessor systems?Answer:Symmetric multiprocessing treats
9、all processors as equals,and I/O can beprocessed on any CPU.Asymmetric multiprocessing has one master CPU and the remainderCPUs are slaves.The master distributes tasks among the slaves,and I/O is usuallydone by the master only.Multiprocessors can save money by not duplicating power supplies,housings
10、,andperipherals.They can execute programs more quickly and can have increasedreliability.They are also more complex in both hardware and software thanuniprocessor systems.1.6 How do clustered systems differ from multiprocessor systems?What is requiredfor two machines belonging to a cluster to cooper
11、ate to provide a highly availableservice?Answer:Clustered systems are typically constructed by combining multiple computersinto a single system to perform a computational task distributed across the cluster.Multiprocessor systems on the other hand could be a single physical entity comprisingof multi
12、ple CPUs.A clustered system is less tightly coupled than a multiprocessorsystem.Clustered systems communicate using messages,while processors in amultiprocessor system could communicate using shared memory.In order for twomachines to provide a highly available service,the state on thetwo machines sh
13、ould be replicated and should be consistently updated.W hen one ofthe machines fail,the other could then take-over the functionality of the failedmachine.1.7 Distinguish between the client-server and peer-to-peer models of distributedsystems.Answer:The client-server model firmly distinguishes the ro
14、les of the client andserver.Under this model,the client requests services that are provided by theserver.The peer-to-peer model doesn,t have such strict roles.In fact,all nodesin the system are considered peers and thus may act as either clients or serversor both.A node may request a service from an
15、other peer,or the node may in factprovide such a service to other peers in the system.For example,let s consider a system of nodes that share cooking recipes.Under theclient-server model,all recipes are stored with the server.If a client wishes toaccess a recipe,it must request the recipe from the s
16、pecified server.Using thepeer-to-peer model,a peer node could ask other peer nodes for the specified recipe.The node(or perhaps nodes)with the requested recipe could provide it to therequesting node.Notice how each peer may act as both a client(i.e.it may requestrecipes)and as a server(it may provid
17、e recipes.)1.8 Consider a computing cluster consisting of twonodes running adatabase.Describetwo ways in which the cluster software can manage access to the data on the disk.Discuss the benefits and disadvantages of each.Answer:Consider the following two alternatives:asymmetric clustering and parall
18、elclustering.With asymmetric clustering,one host runs the database application withthe other host simply monitoring it.If the server fails,the monitoring host becomesthe active server.This is appropriate for providing redundancy.However,it doesnot utilize the potential processing power of both hosts
19、.With parallel clustering,the database application can run in parallel on both hosts.The difficultyimplementing parallel clusters is providing some form of distributed lockingmechanism for files on the shared disk.1.9 H ow are network computers different from traditional personal computers?Describe
20、some usage scenarios in which it is advantageous to use network computers.Answer:A network computer relies on a centralized computer for most of its services.It can therefore have a minimal operating system to manage its resources.A personalcomputer on the other hand has to be capable of providing a
21、ll of the requiredfunctionality in a standalonemanner without relying on a centralized manner.Scenarios where administrative costs are high and where sharing leads to moreefficient use of resources are precisely those settings where network computers arepreferred.1.10 What is the purpose of interrup
22、ts?What are the differences between a trap andan interrupt?Can traps be generated intentionally by a user program?If so,forwhat purpose?Answer:An interrupt is a hardware-generated change-of-flow within the system.Aninterrupt handler is summoned to deal with the cause of the interrupt;control isthen
23、returned to the interrupted context and instruction.A trap is asoftware-generated interrupt.An interrupt can be used to signal the completion ofan I/O to obviate the need for device polling.A trap can be used to call operatingsystem routines or to catch arithmetic errors.1.11 Direct memory access is
24、 used for high-speed I/O devices in order to avoidincreasing the CPU s execution load.a.How does the CPU interface with the device to coordinate the transfer?b.How does the CPU know when the memory operations are complete?c.The CPU is allowed to execute other programs while the D M A controller istr
25、ansferring data.Does this process interfere with the execution of the userprograms?If so,describe what forms of interference are caused.Answer:The CPU can initiate a D M A operation by writing values into special registersthat can be independently accessed by the device.The device initiates thecorre
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 操作系统 课后 练习 答案 英文
限制150内