Pos/355 Week 1

In: Computers and Technology

Submitted By SunnyFlorida
Words 566
Pages 3
Memory Management Requirements

The requirements that memory management is intended to satisfy are; relocation, protection, sharing, logical organization and physical organization. Main memory is vital component in a computer system, as both the operation system and some user application have to be loaded into main memory before they can be executed. I will describe each requirement is a bit more detail.

The first requirement in memory management is relocation. Relocation is essentially relocating the process to a different area of memory. Often it is impossible for a programmer to know in advance which other programs will be resident in main memory at the time of execution of their program, therefore, in an effort to maximize processor utilization, we like to be able to swap active processes in and out of main memory.

The next requirement in memory management is protection. The purpose of protection is to protect each process against unwanted interference by other processes, whether they are unintentional or deliberate. Since, the location of a program in main memory is unpredictable, it is impossible to check absolute address at compile time to assure protection. Furthermore, most programming languages allow the dynamic calculation of addresses at run time. Therefore, all memory references generated by a process must be checked at run time to ensure that they refer only to the memory space allocated to that process.

Any protection mechanism must have the flexibility to allow several processes to access the same portion of main memory. For example, if a number of processes are executing the same program it is advantageous to allow each process to access the same copy of the program rather than have its own separate copy. Processes that are cooperating on some task may need to share access to the same data structure.

Then next requirement in memory…...

Similar Documents

Pos 355

...UNIX Protection Scheme Cedric Lee POS/355 Scott Stewart March 25, 2013 UNIX Protection Scheme There is an operation system that supports 5,000 users, and the company only wants to allow 4,990 users permission to access one file. In order to have a protection scheme in UNIX, a number of operations need to be performed first in order for this to work. UNIX file management hierarchy is very essential to know in order to understand and devise a plan that will allow this protection scheme to protect the files. Without knowledge of the hierarchy of the file management system within the UNIX operating system, there is no way that the 4,990 will have access to only one file. A file access control scheme will be the design of UNIX operating system. Therefore, user ids and passwords are needed in order to gain access to the system. All users of the UNIX operating system will each be given a user id and a user password. These user ids and passwords will be kept by the assigned users only. The protection of these ids and passwords depend on how well the user protects them. Encryptions and decryptions can also be used when the users are attempting to login. The administrator can put each user into different groups that allow access or deny access to certain files within the operating system. By doing this, there can be control on who can access what file due to the permission given to them by the administrator. The administrator is referred to as the super user......

Words: 385 - Pages: 2

Pos/355 Operating Systems Paper Week 3

...dependable and it does not freeze up or slow down due to low memory or leak. It provides great performance on workstations and on networks while having several users simultaneously. Linux was developed by an extensive group of programmers and has strong support for network functionality which can backup faster and is more dependable than other systems. Linux is very flexible and can be used for server applications, embedded systems, and desktop applications. Linux performance is great even with a limited hard drive space. Linux can multitask for example a large print job running in the background while not slowing down other applications. Linux security is very efficient in the user can select and download it for free. References: 1. Open-source systems versus closed source systems. By Ahmad Basha (2001). Retrieved from http://www.enderunix.org/docs/opensource_ vs_ closedsource.html 2. Open Vs. Closed Source Operating System. By Sue Smith Retrieved from http://www.ehow.com/info_8084277-open-closed-source-operating-system.html...

Words: 883 - Pages: 4

Pos 355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more......

Words: 283 - Pages: 2

Pos 355 Pos355 Pos/355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS 355 POS355 POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can......

Words: 286 - Pages: 2

Pos 355 Pos355 Pos/355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS 355 POS355 POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can......

Words: 286 - Pages: 2

Pos 355 Week 1 Dq 2

...In this pack of POS 355 Entire Course you will find the next docs: POS-355 Week 1 DQ 1.doc POS-355 Week 1 DQ 2.doc POS-355 Week 1 Lectures Lecture 1.1 Computer Basics.doc POS-355 Week 1 Lectures Lecture 1.2 OS Basics.doc POS-355 Week 2 Assignments Individual Real-time Operating System.doc POS-355 Week 2 DQ 1.doc POS-355 Week 2 DQ 2.doc POS-355 Week 3 Assignments Individual IND.doc POS-355 Week 3 DQ 1.doc POS-355 Week 3 DQ 2.doc POS-355 Week 4 Assignments Individual IND.doc POS-355 Week 4 DQ 1.doc POS-355 Week 4 DQ 2.doc POS-355 Week 5 DQ 1.doc POS-355 Week 5 DQ 2.doc General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: ·  Option 1: Write a 2-page paper that explains memory management requirements. ·  Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: ·  Memory management ·  Process management ·  File management ·  Security Format your paper consistent with APA guidelines....

Words: 367 - Pages: 2

Pos 410 Week 1 Dq 1&2

...A++PAPER;http://www.homeworkproviders.com/shop/pos-410-week-1-dq-12/ POS 410 WEEK 1 DQ 1&2 POS 410 Week 1 Dq 1&2, A relational database matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand. For example, a data set containing all the real-estate transactions in a town can be A relational database matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand. For example, a data set containing all the real-estate transactions in a town can be In the field of relational database design, normalization is a systematic way of ensuring that a database structure is suitable for general purpose querying and free of certain undesirable characteristics; insertion, update, and deletion anomalies that could lead to a loss of data integrity. Informally, a relational database table is often described as "normalized" if it is in the Third Normal Form. Most 3NF tables are free of insertion, update, and deletion anomalies, i.e. in In the field of relational database design, normalization is a systematic way of ensuring that a database structure is suitable for general purpose querying and free of certain undesirable characteristics; insertion, update, and deletion anomalies that could lead to a loss of data integrity. Informally, a relational database table is often......

Words: 347 - Pages: 2

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 1529 - Pages: 7

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 765 - Pages: 4

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 765 - Pages: 4

Pos 410 Week 1 Dq 1&2

...POS 410 WEEK 1 DQ 1&2 A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=pos-410-week-1-dq-12 Visit Our website: http://hwsoloutions.com/ Product Description PRODUCT DESCRIPTION POS 410 Week 1 Dq 1&2, A relational database matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand. For example, a data set containing all the real-estate transactions in a town can be A relational database matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand. For example, a data set containing all the real-estate transactions in a town can be In the field of relational database design, normalization is a systematic way of ensuring that a database structure is suitable for general purpose querying and free of certain undesirable characteristics; insertion, update, and deletion anomalies that could lead to a loss of data integrity. Informally, a relational database table is often described as “normalized” if it is in the Third Normal Form. Most 3NF tables are free of insertion, update, and deletion anomalies, i.e. in In the field of relational database design, normalization is a systematic way of ensuring that a database structure is suitable for general purpose querying and free of certain undesirable characteristics; insertion, update, and......

Words: 362 - Pages: 2

Pos 355 – Week 1

...Option 2: The Differences in Memory Management between Windows® and Linux®. Linux and Windows are both operating systems for the everyday computers. They both do not require special hardware. Many claim one operating system is better than the other. Windows does something better than Linux and Linux does something’s better than Windows. How each of these handles memory is the key to understanding. Linux has the unique ability to virtually extend system RAM capabilities with another form of partitioning called SWAP space. SWAP space is used by Linux to add more virtual RAM to the system. Virtual memory sort of trick the system to think it has more memory that it actually has by sharing it between competing processes as they are desired. This speeds up the capability of Linux to operate faster and with less system resources than a Windows machine with similar RAM specs. This swap space is dedicated specifically for paging operations. Paging is the function of writing parts of memory chunks to temporary space on a hard disk. Windows commonly uses a dynamically allocated temporary space on a hard disk called a “page file” for memory management. A “page file” is allocated on disk, for less frequently accessed objects in memory; things that would not necessarily be needed to be constantly in the hard drive or RAM memory buffer. This leaves more RAM obtainable to aggressively used objects. Windows and Linux have modern memory management architecture that in reality have......

Words: 310 - Pages: 2

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 3821 - Pages: 16

Pos 355 Academic Professor / Tutorialrank.Com

...POS 355 Entire Course (UOP Course) For more course tutorials visit www.tutorialrank.com Tutorial Purchased: 6 Times, Rating: A+ POS 355 Week 1 DQ 1 (UOP Course) POS 355 Week 1 DQ 2 (UOP Course) POS 355 Week 2 Individual Assignment Huffman Trucking Paper (UOP Course) POS 355 Week 2 Team Assignment Complete Outline (Windows XP Features) (UOP Course) POS 355 Week 2 DQ 1 (UOP Course) POS 355 Week 2 DQ 2 (UOP Course) POS 355 Week 3 Individual Assignment PC Mainframe Paper (UOP Course) POS 355 Week 3 Team Assignment (Complete outline) Windows2003 Features (UOP Course) POS 355 Week 3 DQ 1 (UOP Course) POS 355 Week 3 DQ 2 (UOP Course) POS 355 Week 4 Team Assignment (Complete outline) Linux Features (UOP Course) POS 355 Week 4 Individual Assignment Operating Systems Analysis Paper (UOP Course) POS 355 Week 4 DQ 1 (UOP Course) POS 355 Week 4 DQ 2 (UOP Course) POS 355 Week 5 Team Assignment Operation System Analysis (UOP Course) POS 355 Week 5 DQ 1 (UOP Course) POS 355 Week 5 DQ 2 (UOP Course) POS 355 Week 5 DQ 3 (UOP Course) --------------------------------------------------------------------- POS 355 Week 1 DQ 1 (UOP Course) For more course tutorials visit www.tutorialrank.com Tutorial Purchased: 2 Times, Rating: B+ Is service-oriented architecture (SOA) a new solution to information technology, or is it a new name for the rehash of providing the user with what the user wants?......

Words: 538 - Pages: 3

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 4585 - Pages: 19