Preview

Operating System Concept

Good Essays
Open Document
Open Document
999 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operating System Concept
Operating System | Assignment #1 | | Information System | 2012-03-29 | |

1. What is the purpose of interrupts? What are the differences between a trap and an interrupt? Can traps be generated intentionally by a user program? If so, for what purpose? (Chapter 1)

Interrupt is that causes a computer processor to temporarily stop executing its current program and execute another program instead, finally returning control to the original program. So it prevent that more important task goes back because of less important task.
The main difference between a trap and an interrupt is where they are generated. An interrupt is a hardware-generated. And it can be used to signal the completion of an I/O to obviate the need for device polling. Whereas a trap is software-generated interrupt and it can be used to call operating system routines or to catch arithmetic errors.

2. Direct memory access is used for high-speed I/O devices in order to avoid increasing the CPU’s execution load. (Chapter 1)

a) How does the CPU interface with the device to coordinate the transfer?
b) How does the CPU know when the memory operations are complete?
c) The CPU is allowed to execute other programs while the DMA controller is transferring data. Does this process interfere with the execution of the user programs? If so, describe what forms of interference are caused.

a) After setting up buffers, pointers, counters and I/O device, the device controller transfers an entire block of data directly to or form its own buffer storage to memory with no intervention by CPU. b) One interrupt is generated per block. c) Cycle stealing. It causes CPU computation slow down because the memory can fetch at a time. So if CPU and DMA do it at the same time, it causes some bump. So they give DMA priority because CPU speed is fast enough.

3. Describe three general methods for passing parameters to the operating system.
(Chapter 2)

1) Pass parameters in registers.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 3 Quiz

    • 1152 Words
    • 5 Pages

    During data transfer, what is the receiving host responsible for? (Choose the best two answers).…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    1 Which statements are true concerning the shared memory buffering used by an Ethernet switch? (Choose two.)…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Study Guide

    • 378 Words
    • 2 Pages

    The term _________________ is used to denote when instructions from only one thread can be issued at a time.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter?…

    • 957 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    CIST1122 Lab 5

    • 349 Words
    • 2 Pages

    8) What feature is used on memory slots and modules to prevent modules from being inserted incorrectly?…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data. As described in the chapter?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Good Essays

    This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter?…

    • 605 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 System Performance

    • 251 Words
    • 2 Pages

    2. With more processes loading and running at the same time the performance of the system will degrade due to increased disk activity.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Interrupt-driven I/O: The processor issues an I/O command on behalf of a process, continues to execute subsequent instructions, and is interrupted by the I/O module when the latter has completed its work. The subsequent instructions may be in the same process, if it is not necessary for that process to wait for the completion of the I/O. Otherwise, the process is suspended pending the interrupt and other work is performed. Direct memory access (DMA): A DMA module controls the exchange of data between main memory and an I/O module. The processor sends a request for the transfer of a block of data to the DMA module and is interrupted only after the entire block has been…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    4. What layer of the OSI model ensures that information sent by the application layer will be formatted properly so that the application layer of another system can read the data?…

    • 256 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Nt1210 Chapter 1 Summary

    • 696 Words
    • 3 Pages

    The purpose of system programs is that system programs can be thought of as bundles of useful system calls. They provide basic functionality to users so that users do not need to write their own programs to solve common problems.…

    • 696 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter?…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Faith Integration

    • 613 Words
    • 3 Pages

    It seems that any certain instruction(s) can be executed, only when the CPU is in kernel mode. At the same instance, the hardware devices could only be accessed, only when the program is executing in the kernel mode. There is a propensity that control over when interrupts could be enabled or disabled is also possible only when the CPU is in kernel mode. Therefore, the Computer Processing Unit (CPU) has very limited capability when executing in user mode. This in turn will enforce protection of critical resources.…

    • 613 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Java

    • 5076 Words
    • 21 Pages

    Explanation: B) Programs are classified as software to differentiate them from the mechanisms of the computer (hardware). Storage and the processor are two forms of hardware while input is the information that the program processes.…

    • 5076 Words
    • 21 Pages
    Good Essays