StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Operating System Concepts - Research Paper Example

Summary
The researcher of this paper claims that the computer and information science products are analyzed and evaluated for their performance and efficiency. The judgment of optimality in the utilization of the resources like time and storage space plays a key role in the conduction of this analysis…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Operating System Concepts
Read Text Preview

Extract of sample "Operating System Concepts"

A Short Research Paper The computer and information science products are analyzed and evaluated for their performance and efficiency. Judgment of optimality in utilization of the resources like time and storage space play key role in conduction of this analysis. The consideration of time and space for performance analysis is equally important in evaluating both the computer hardware and software. The software being an algorithmic structure can be analyzed through the algorithm analysis techniques. The time complexity is measured as a function of input size n and the growth is taken as a measure to comment on the algorithmic efficiency through asymptotic. In different scenarios the notations for representation of time are different like turnaround time, waiting time and response time. Time efficient algorithms are not space efficient usually due to time/space trade off. These algorithms may prove to be heavier for the hardware in terms of their need for storage space they require to execute. In case of computer hardware the representation of time and space for performance evaluation can be seen in terms of processor speed, bus speed, memory access latency, throughput and the size of storage space accordingly. It has been observed historically that advancement in computer hardware and software always go hand in hand in order to cope up with the requirements of each other. The advent of semi conductor memory introduced the capability of memory addressing, memory segmentation and memory fencing through fence registers. This created the capacity of multiprogramming with memory security against old fashioned batch processing systems. Multiprogramming later evolved into timesharing and facilitated processor sharing. The huge sizes of peripheral devices and offline operations were replaced by the invention of miniaturized controllers with local buffers. This revolutionized the co-existence of peripheral devices through techniques of spooling and DMA. The memory management schemes evolved from a single partition allocation mechanism to multi partition mechanisms like MVT and MFT. The problems of internal and external fragmentation and compaction resulted in the genesis of paging as a non-contiguous memory allocation mechanism. The overgrowth of program sizes was initially dealt with techniques of overlays. This technique went obsolete due to programming restrictions and enormous sized program code. The concept of virtual memory appeared as a solution to this problem. The fact that has been continuously observed during the evolution of computing was, that with the implementation of new and advance techniques to address old problems the room of improvement in the performance of the computing systems remained persistent. The new solutions in turn produced new problems and this cycle goes on. For example to address the problem of incompatibility between the sizes of physical memory and program code, the concept of virtual memory and the techniques of paging and demand paging were introduced. These in turn resulted in multiple problems like, Access latency due to the involvement of secondary storage. Memory allocation for oversized page tables for which different strategies like multi level paging, inverted page tables and hashed page tables were applied (These have their drawbacks too). The involvement of cache as TLB to reduce access latency. Frame allocation and page replacement strategies and their drawbacks. Thrashing etc. The improvement capacity always coexisted with the upcoming solutions and increasing requirements. The last few decades saw the advent of some remarkable achievements like the RISC architecture, pipelining, cache, super scalar processing, memory management systems and virtual memory. The computational power increased manifolds as a result of these achievements. Referring to “Reduced instruction set computing” The type of computer architecture that involved simple instructions that were comprehensive and lesser in number. RISC incorporated registers along with the main memory itself for the allocation and storage of instructions. Superscalar computing involves the parallel execution of instruction by a single CPU. The main transition between CISC and RISC type of computing resulted after the advent of Superscalar computing. Pipelining, on the other hand, refers to a series of data elements. Connected in a series, the output of one process is the input of the next. Pipelined instructions can also be executed in parallel. Overlapping execution of multiple instructions having the same circuitry is greatly assisted by the phenomenon of pipelining. Superscalar computing involves the incorporation of pipelining within it. Thus it can easily be figured out that the combination of pipelining and superscalar processing within a system would definitely result in faster processing speed(1). Main memory is an essential part of every computer system. The main memory holds part of any computer process that is in execution. It is also referred to as RAM. Data can be read from or written to the computer memory. It is essential for the computer memory to have substantial space so as to facilitate the execution of processes. There, however is a limit to the size of RAM that can be incorporated into a computer system. For a number of processes to be executed simultaneously in a system the size of RAM often does not suffice. It is then that the phenomenon of Virtual memory comes in handy. Virtual memory looks up any pages in the memory that are static and are not being used for long. It swaps these pages onto the hard disk thus freeing space for the allocation of new tasks. This process happens automatically. Virtual memory increases the size of the RAM without introduction of any new physical memory components into the computer system. A system that incorporates virtual memory has its memory divided into physical and logical pages. Cache is another type of memory. Its hardware composition is different from that of the main memory. This enables the access latency of the cache to be much lesser than that of the main memory. The most frequently accessed instructions are placed in cache so that they can be accessed very quickly. There are two main strategies that are used to implement access to and from the cache. Most flexible cache strategy is the “Fully associative cache”. The other strategy is the “direct mapped or one way subsystem associative cache”. A fully associative cache subsystem involves the mapping of bytes of data onto any one of the lines of the cache memory. In direct mapped cache however fixed blocks of memory are always associated with cache lines whether they may be in use or not. Both the strategies have their specific pros and cons and neither can be weighed over the other (2). The close study reveals that the improvement in the software implementation techniques to utilize the hardware resources optimally is highly necessary. Some of the unsaturated areas for example are software pipelining (3) and multiprogramming scheduling (4). Sources: Silberschatz A., Galvin P. & Gagne G. (2010) Operating System Concepts 8 Ed. John Wiley and Sons. References: (1) Walters Garrison E. (2000). ESSENTIAL GUIDE TO COMPUTING: THE STORY OF INFORMATION TECHNOLOGY. Prentice Hall. (2) Watts D, Chabrol A, Dundas P, Fredrickson D, Kalmantas M, Marroquin M, Puri R, Rodriguez J, Zheng D.(2000). TUNING IBM SYSTEM X SERVERS FOR PERFORMANCE. IBM Redbooks. (3) Lam, M. (1988). Software Pipelining: An Effective Scheduling Technique for VLIW Machines. UMUC Library. (4) Liu,C.L. & Layland J. W. (1973) Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment. UMUC Library. Read More

CHECK THESE SAMPLES OF Operating System Concepts

Virtual Memory Paging and Segmentation

Smartphone Operating System Concepts with Symbian OS: A tutorial guide.... Smartphone Operating System Concepts with Symbian OS: A tutorial guide.... Link: Book Smart Phone Operating System Concepts As the cell phone industry has shown no limited potential, demand for high tech applications on smart phones is ever since increasing.... This article ''Virtual Memory Paging and Segmentation'' tells that programming and designing virtual memory for a smart phone operating system, logical-segment addresses and physical-segment- addresses is the prime focus....
9 Pages (2250 words) Article

The Development Of The Computer Technology

Any type of dynamic storage allocation system imposes both CPU and memory costs.... The costs often strongly affect the performance of the system and pass directly to the purchaser of the hardware as well as to software project schedules.... This essay "The Development Of The Computer Technology" discusses the jobs or programs which are to be executed by the Central Processing Unit (CPU) are kept in a job pool or process pool....
3 Pages (750 words) Essay

Networking Users for a Company Holding Employees in a Homebased Basis for Three Months

This is the reason why a particular entrepreneur trying to make the business scene in the current era of globalization needs to know the basic of computer applications and internet system operations for their business organization.... ost of the benefits that the said system of business transacting has mainly attracted investors as well as stockholders in making a great decision of joining in the process of industrial change through the innovative integration of technology within the system....
3 Pages (750 words) Business Plan

IDS Policy Parameters and Network Intrusion

These could comprise user shell commands, process system calls, as well as network packet headers or contents.... In a complicated type of action, a system might redirect an intruder's action to a trap.... The main goal behind this policy implementation is to protect the system from outer assaults on the corporate network.... Preventing un-authorized system entrance 3.... This paper has presented a detailed overview of the different aspects and parameters of the IDS policy and operating structure....
2 Pages (500 words) Essay

Operating System Concepts: The Fragmentation of the Network Packet

The author of the paper under the title "Operating System Concepts: The Fragmentation of the Network Packet" will begin with the statement that in this age of technology, every network requires a number of utmost sizes on its network transmission packets.... The developers and designers of the network don't have the choice to decide some packet size they would want there are aspects that should be considered like the operating system, and hardware, (inter)national quality standards, protocols, need to minimize error tempted in transmissions to a number of degrees and need to stop one packet from holding the communication channel for a long session....
2 Pages (500 words) Essay

Technology of Information Security

Operating System Concepts (7th Edition).... On the other hand, some organizations prefer to store their data in the decentralized data storage system.... On the other hand, some organizations prefer to store their data in the decentralized data storage system.... Intrusion Detection system (IDS)An intrusion detection system (IDS) is aimed at identifying applied or attempted intrusions into the network and carrying out appropriate operations for the intrusions....
2 Pages (500 words) Essay

Client-Server Communications Technology

Operating System Concepts (6th ed.... This paper 'Client-Server Communications Technology' discusses the connection and connectionless client-server communications in detail.... The main aim of this research is to rationalize the main network communication protocols in terms of connection and connectionless oriented communication systems....
7 Pages (1750 words) Research Paper

InterContinental Hotels Group Computer System Update

?Operating System Concepts.... ?Operating System Concepts.... ?Applied Operating System Concepts.... ?VAX/VMS: Operating System Concepts.... Some of the system software include; system software assembler, debugger, compiler, interpreter, file management tools, and operating system that can further be divided into multitasking, multiprocessing, multi-tasking, multi-threading, real-time.... Some of the system software include; system software assembler, debugger, compiler, interpreter, file management tools and operating system that can further be divided into multitasking, multiprocessing, multi-tasking, multi-threading, real time ...
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us