Questions from Operating Systems


Q: In priority-based process scheduling, the scheduler only gives control

In priority-based process scheduling, the scheduler only gives control to a particular process if no other process of higher priority is currently in the Ready state. Assume no other information is us...

See Answer

Q: For Figure 19.9, it is claimed that all four

For Figure 19.9, it is claimed that all four processes assign an ordering of to the two messages, even though q arrives before a at Work through the algorithm to demonstrate the truth of the claim Fi...

See Answer

Q: For Lamport’s algorithm, are there any circumstances under which Pi can

For Lamport’s algorithm, are there any circumstances under which Pi can save itself the transmission of a Reply message?

See Answer

Q: For the mutual exclusion algorithm of [RICA81], a.

For the mutual exclusion algorithm of [RICA81], a. Prove that mutual exclusion is enforced. b. If messages do not arrive in the order that they are sent, the algorithm does not guarantee that critical...

See Answer

Q: In the token-passing mutual exclusion algorithm, is the timestamping

In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? If not, what is the function of the timestamping?...

See Answer

Q: For the token-passing mutual exclusion algorithm, prove that it

For the token-passing mutual exclusion algorithm, prove that it: a. guarantees mutual exclusion. b. avoids deadlock. c. is fair

See Answer

Q: In Table 6.2, some of the Linux atomic operations

In Table 6.2, some of the Linux atomic operations do not involve two accesses to a variable, such as /. A simple read operation is obviously atomic in any architecture. Therefore, why is this operatio...

See Answer

Q: In Figure 19.11b, explain why the second line cannot

In Figure 19.11b, explain why the second line cannot simply read "request (j)=t." Figure 19.11b:

See Answer

Q: The TFTP specification (RFC 1350) states that the transfer identifiers

The TFTP specification (RFC 1350) states that the transfer identifiers (TIDs) chosen for a connection should be randomly chosen, so the probability that the same number is chosen twice in immediate su...

See Answer

Q: In to retransmit lost packets, TFTP must keep a copy of

In to retransmit lost packets, TFTP must keep a copy of the data it sends. How many packets of data must TFTP keep at a time to implement this retransmission mechanism?

See Answer