Describe how it differs from deadlock and give an example


PROJECT

Group 1: Introducing Operating System

Research the internet or current literature to identify an operating system that runs a cell phone or palm computer. These are generally known as mobile operating systems. Typically the power of these operating systems exceeds that of the desktop computers of the 1980s. List the key features of the operating system and the hardware it is designed to run. Cite your sources, prepare a details report and present to the class.

Group 2: Memory Management

For a platform of your choice, investigate the growth in the size of main memory (RAM) from the time the platform was developed to the present day. Create a chart showing milestones in memory growth and the approximate date. Choose from microcomputers, midrange computers and mainframes. Be sure to mention the organization that performed the RAM research and development. Cite your sources, prepare a details report and present to the class.

Group 3: Virtual Memory

Conduct research on the internet or in academic sources to discover the history of virtual memory. Find out which computer manufacturers first made it standard and how virtual memory has evolved since then. Find out how much space is reserved for virtual memory on two different computer. Cite your sources, prepare a details report and present to the class.

Group 4: Processor Management

Compare two processors currently being used in personal computers. Use standard industry benchmarks for your comparison and briefly list the advantages and disadvantages of each. You can compare different processors from the same manufacturer (such as two Intel processors) or different processors from different manufacturers (such as Intel and AMD). Cite your sources, prepare a details report and present to the class.

Group 5: Concurrent Processes

Research current literature on the internet to identified a computer model with exceptional parallel processing ability. Identify the manufacturer, the maximum number of processors the computer uses, how fast the machine can perform calculations and typical applications for it. Cite your sources, prepare a details report and present to the class.

Group 6: Deadlock

During the lecture, we discussed the problem of thrashing. Research current literature on the internet to investigated the role of deadlock and any resulting thrashing. Discuss how you would begin to quantify the cost to the system (in term of throughput and performance) of deadlock-caused thrashing. Cite your sources, prepare a details report and present to the class.

Group 7: Deadlock

Research the problem of livelock in a networked environment. Describe how it differs from deadlock and give an example of the problem. Identify at least two different methods the operating system could use to detect and resolve livelock. Cite your sources, prepare a details report and present to the class.

Group 8: Device Management

Conduct research to discover two of the fastest devices available today for desktop computers or workstations that can be used to copy important files from the computer to a medium (paper, disk, flash memory, tape, etc.) and that can be removed and stored in a safe place off-site. For both devices, explain why you believe they are best available. Include important benchmarks. Cite your sources, prepare a details report and present to the class.

Group 9: Device Management

Consult current academic literature to research the concept of circular buffer. Define it and compare and contrast it to a single buffer and double buffers. Explain why the circular buffer might be advantageous in multimedia applications. Cite your sources, prepare a details report and present to the class.

Group 10: File Management

Consult current literature or the Internet to research file naming conventions for four different operating systems. It includes UNIX, MS_DOS, Windows or LINUX. Note the acceptable range of characters, maximum length, case sensitivity, etc. Give examples of both acceptable and unacceptable filenames. Explain how File Managers for those operating systems shorten long filenames in their internal lists to make them easier to manipulate. Cite your sources, prepare a details report and present to the class.

Group 11: Network Organization

Consult current literature or credible sources on the Internet to further explore the current status of WiMAX technology or WiMAX standard. Describe any barriers to commercial use and the applications that show the most promise. Explain which countries expect to benefit the most and why. Cite your sources, prepare a details report and present to the class.

Request for Solution File

Ask an Expert for Answer!!
Business Management: Describe how it differs from deadlock and give an example
Reference No:- TGS02437785

Expected delivery within 24 Hours