Final Exam Flashcards
Describe the multiple processor system architecture…
separate CPU and a shared memory system; multiple ways of connecting in
have multicore chips that abide by Moore’s Law - number of transistors on chip doubles every two years
Multiprocessor OS - each CPU shares OS code, but has its own OS data structures
Describe the master-slave processor…
each CPU has its own data in relation to the OS
one master processor sees what needs to be done and allocates work to the other processors while keeping track of processor availability - balances the load
creates a bottleneck with increase in processors
Provide an example of the master-slave processor…
bank tellers - only one waiting line which balances the load amungest tellers
Describe symmetric multiprocessor…
one OS that anyone can run, OS is broken into small critical sections and locks are in place to prevent bottlenecks and race conditions
Describe multicomputer system architecture…
multiple individual computers; striped down usually without peripherals, may have network card with high performance
to have access, there would be one access point to the head node with separate access to communicate through the various other nodes of the structure - this is a way of parallel computing; send and receive, blocking and non-blocking
has load balancing with heuristic based processor allocation algorithms
Describe the distributed system architecture…
multiple full computers spread out over a wide area
independent; each computer is running part of the process to get to a solution to a larger problem
Provide an example of a distributed system…
BOINC (berkley open infrastructure for network computing) - anyone can download a client and help the researchers solve problems - when your computer isn’t doing anything else, it will aid in run their program
WWW
Describe virtualization system architecture…
multiple systems running on a computer with the appearance you are working on multiple computers
combine multiple servers and “hypervisor” controls the virtual machine
Provide an example of a virtualization system…
Windows machine running Mac OS X - problem with this is that, specialized things don’t work - graphics card doesn’t work, sound doesn’t work
Describe what a page is…
process address spaces that are broken into chunks
only some of the process’s pages may be in memory
process can run even if part of it is in memory
Describe what page frames are…
memory broken into the same size chunks as pages
Describe the information stored in a page table and how it is used in virtual memory…
page table consists of a page frame number, present/absent bit, protection bits, modified bit, and referenced bit
program in broken into chunks called pages and scattered into memory in an organized fashion; memory is broken into the same size chunks called page frames; virtual memory swaps pages in and out of memory as needed; all that needs to be in memory is the code that needs to be executed and the data; when a location needs to be accessed that is not in memory, the system has to decide if there is a free block and must load the page into the page frame; if there is no space in memory, the system has to decide what must be taken out of memory to make space
multilevel page tables:
- two page table indices
- first page table gives the address of the second page table
- each index is offset within that table
- only needed tables are in memory
inverted page tables:
- one entry per page frame
- virtual address is hashed into the table to see if the page is in memory and where
Describe a modified bit…
aka. dirty bit
if a modified bit has a value of 0, nothing has been changed
if a modified bit is set, something changed and if it needs to be removed from memory, it must be copied to disk or the information will be lost
Name the page replacement algorithms…
not recently used first-in-first-out second chance least recently used not frequently used working set
Describe the ‘not recently used’ page replacement algorithm…
when a page is modified, the bit is set and stays set
when a page is accessed, the system sets the page’s reference bit
system periodically goes through and clears all the reference bits
when space is needed, the system classifies pages into four categories:
- not referenced, not modified
- not referenced, modified
- referenced, not modified
- referenced, modified
page is chosen for removal at random from the lowest non-empty class
look for pages with reference bit not cleared
Describe “not referenced, not modified”…
not referenced in a while
hasn’t been modified and can write over top of it
Describe “not referenced, modified”…
take and write page back out to disk before you can write over the top of it
Describe “referenced, not modified”…
don’t have to spend extra time to write back out to disk when a page is to be removed
Describe “referenced, modified”…
Answer.
Describe the ‘FIFO’ page replacement algorithm…
as pages are added to memory, the page number is also added to the end of the list - new pages are first
things brought into memory early are not likely to be needed
when space is needed, the system removes the first page on the list
the page removed is the page that has been in memory the longest ***it may not be needed anymore because it has been there so long, but it may also be there so long because it is frequently used
Describe the ‘second chance’ page replacement algorithm…
as pages are added to memory, the page is also added to the end of a list
when space is needed, the system looks at the first page on the list
- if referenced bit is 0, page is removed
- if referenced bit is 1, bit is reset and the page is moved to the end of the list and give it another block to execute
pages that have been around for a while and not used since the last referenced bit clearing cycle are removed
Describe the ‘least recently used’ page replacement algorithm…
list of pages is kept in order of last used
when a page is used, it is brought to the front of the list
close to optimal
costly - list has to be searched for each page access to find the page to move to the front
Describe the alternative to the ‘least recently used’ page replacement algorithm…
system has a counter that is incremented with each page and each instruction
counter is stored in the page table entry for the accessed page
counter isn’t associated with anyone process
when space is needed, the page table entry with the smallest value indicates the page to remove
Describe the ‘clock’ page replacement algorithm…
page frames are kept in a circular list with a pointer to the oldest page
when space is needed, system looks at the page the pointer points to
- if referenced bit is 0, page is removed and a new page takes its place in the list
- if referenced bit is 1, reference bit is reset and the pointer moves to the next page - repeated until page is found to remove
clears referenced bits
Describe the ‘not frequently used’ page replacement algorithm…
each page has a referenced bit and counter
at each clock cycle, the referenced bit is added to the counter - a page being referenced frequently is set to 1 and its counter keeps going up; there are low counts for pages used infrequently
when space is needed, the page with the lowest counter value to removed
Describe the alternative to the ‘not frequently used’ page replacement algorithm…
shifting bits is quicker
bits in the counter are shifted right by one bit and outs the referenced bit in the leftmost bit which divides the counter in half
Describe the ‘working set’ page replacement algorithm…
for each process, there is a set of pages that it’s using now
code that is to be executed is in a tight space
page faults bring in initialization pages and then moves to processes and issuing page faults - cycles up and down with each new working set
if a process is working and not issuing page faults, it’s in memory
if a process is blocked, all the pages it has in memory are its working set - take it out and free up space, then other things can be brought in, when ready to run again, bring entire working set back in and it will not cause page faults - tough to figure out!
What is a record type and how is it stored in memory?
record types combine multiple data fields that can be off different types into one new type
each individual piece of the record is stored in sequential memory
Give an example of a record type…
C++ structs
What is a boolean and how is it stored in memory?
a binary variable, having two possible values called “true” and “false”
can be implemented as bits, but more often as bytes as they are represented in computers as full words
What is a character and how is it stored in memory?
unit of information that is mapped to a numeric value
stored as numeric coding
ASCII and Unicode (2 byte) are examples of encoding standards where each character/digit is mapped to a numeric value
What are the methods of user authentication?
something you know
something you have
What is user authentication?
how do we verify who someone is to give them access
Give an example of ‘something you know’ user authentication…
passwords
What is a problem with passwords as user authentication?
user selects own password - liable for dictionary attacks - when set up new account will be encrypted and stored, take a dictionary and encrypt and compare words to passwords; a system may select a password - then people write down the difficult password and others may find it
Give examples of ‘something you have’ user authentication…
data media - combination with password; ex. ATM card and pin number
biometrics - finger print, retinal scan, facial recognition, voice recognition
What is a problem with data media as user authentication?
can be lost, stolen, or forged
Name the six system vulnerabilities…
trojan horse
trap door
buffer and stack overflow
social engineering
spyware
viruses
Describe the trojan horse system vulnerability…
program that masquerades as something beneficial but actually causes damage or invades privacy
viruses and spyware are often introduced as trojan horses
Give an example of the trojan horse system vulnerability…
ATM, user enters login information and trojan horse program logs keystrokes and returns a message to user that they incorrectly entered their login information, trojan horse program then directs user to the correct terminal where the user just though they entered the information incorrectly the first time and tries again; vital login information is now communicated across the Internet
Describe the trap door system vulnerability…
program fragment that issues a sequence of commands that the program writers have inserted to circumvent (find a way around) the security system
trap doors are often left in applications/systems to help support staff
Give an example of the trap door system vulnerability…
changing data in database, tampering with account activities; may be written into compilers where it would not be discovered by examining source code of the program - must examine source code of the compiler
Describe the buffer and stack overflow system vulnerability…
user sends more data into a field than the program anticipates - this can overflow memory (stack, kernel)
Give an example of the buffer and stack overflow system vulnerability…
hacker tampers with pointers to transfer control to malicious code; always validate user input before accepting it
Describe the social engineering system vulnerability…
attempt made by an attacker who pretends to be a trusted and convinces someone to divulge confidential information
Give an example of the social engineering system vulnerability…
phishing - act of sending out an email that appears to be from a trusted institution - link takes user to attacker’s website and confidential information is requested
attacker makes a phone call and poses as someone else who is asking for confidential information
Describe the spyware system vulnerability…
includes innocuous software cookies that monitor the user’s browser habits and report back to the application when the user is online
Give an example of the spyware system vulnerability…
hack the user’s web browser so that web searches are diverted to an unexpected website
Describe the virus system vulnerability…
invasive/malicious software - programs with the property of being self-replicating and/or self-propagating (spread from one computer to another)
Give an example of the virus system vulnerability…
fragments of OS script code found in parts of files - usually hidden in the boot sector; first thing a virus does is make a copy of itself to one or more files
Name the network security issues…
IP port scanning
server attacks
denial of service
firewalls
Describe the network security issue of IP port scanning…
can make connections to computer system; someone can send a message to every port on the IP address - can figure out which ports are active and which ports are not and can taylor attack based on port accessed
Describe the network security issue of server attacks..
each type of server listens on a particular port; once the attacker knows there is a particular type of server listening, they can attempt to exploit unknown security flaws
ex. web service on port 80, you can try to poke at various security holes at web servers
Describe the network security issue of denial of service…
don’t take data from system, but tie up system and prevent valid use
websites go down because of these attacks
multiple computers do nothing but send sync messages to a system and get a message back and flood system with so many sync messages that it has no time to do anything but send out acknowledgements
Describe the network security issue of firewalls…
method to keep unauthorized users from accessing the system
firewalls control which messages can come in from the outside and where they may go
hardware firewall can make systems behind the firewall invisible to the outside world
software firewalls can also detect programs unexpectedly accessing the internet; designed to prevent spyware from transmitting data without your knowledge throughout the internet
tables are used to configure firewalls
What is the use for virtual machines?
allows us to eliminate the number of servers running
makes it easy to test applications on different platforms - don’t have three different computers running three different OS
new software only has to be installed in the virtual system and every time a computer is booted up the new software is updated
powerful if done correctly
What are the requirements for virtual machines?
fidelity
performance
safety
What is a virtual machine?
programs that run on a computer that make it appear as though the computer is something other than what it is
Describe the fidelity requirement for virtual machines…
programs run the same on virtual machine as they do on a real machine
Describe the performance requirement for virtual machines…
close as possible to a real machine speed; won’t get the same performance due to emulation
Describe the safety requirement for virtual machines…
must not damage, alter, or interfere on the host system or any other system
Describe a page frame number…
index to access the corresponding table entry
Describe a present/absent bit…
indicates if the page is currently stored in physical memory
if not in memory, the OS interrupts the process and starts a routine to fetch the page from virtual storage
Describe a protection bit…
indicate privileges
Describe a referenced bit…
checks if the referenced page corresponds to a valid reference
Describe the relationship between process address space and physical memory…
early implementation used base and limit registers (base held the starting address and limit held the size of the address space)
general problem is that the total of the address spaces of all running processes may be larger than the available memory
address spaces can be allocated in a contiguous or noncontiguous physical address space
memory swapping - simple strategy for contiguous space allocation; the entire address space for a process is copied from disk when the process runs; if there is no room, the address space of one or more of the blocked processes are copied to disk; a process address space can expand, adjacent process address spaces my never be swapped out; memory can become fragmented (manages free memory through bitmaps and linked lists)
In relation to user authentication, what is protection?
mechanism to control what an authenticated user can do (file protection, memory protection, web protection)
mechanism to keep unauthorized users from accessing the system (firewalls, virus detection, spyware detection)
What is an integer?
a reflection of the hardware so mapping is trivial
may be as many as eight different integer types in a language depending on the number of bytes used
What is a floating point?
model real numbers but only as an approximation of numbers; 4 bytes; stored as an exponent (the shift to represent the number) and fractional component (decimal point to the left of it)
ex. IEEE floating point standard
What is a string?
values are stored as an array of characters
some layouts begin with a count of the number of characters
other layouts use a special character for termination
What are 1D arrays?
occupies successive locations of memory
access function maps subscript expressions to an address in the array
What are 2D arrays?
values stored in one dimensional memory in row major order (by rows) or in column major order (by columns)
causes the computer to do 2 multiplications and an addition
What is a double?
8 bytes
adding 3 bits to exponent gives a higher power!
Name the four necessary and sufficient conditions for deadlock to occur…
mutual exclusion
hold and wait
no preemption
circular wait
Explain mutual exclusion…
each resource is available or allocated to exactly one process; resources are not shared
Explain hold and wait…
a process is holding resources can request and wait for an additional resources
Explain circular wait…
a circular chain of processes where each process is waiting on a resource that is held by the next process in the chain
ex. dining philosopher’s problem - every philosopher was holding their left fork and waiting for the left fork
Explain no preemption…
resources allocated to a process may not be forcibly taken away
Describe priority-based scheduling methods…
preemptive method
priority is assigned to each type of process; processes are queued based on decreasing priority; highest priority processes are given CPU time and will be interrupted if a higher priority process arrives; interrupted processes will return to the end of the queue
static - keeps priority until job finishes; assigned at creation; any fixed decision about I/O processes will tend to be wrong and not maximize system performance
dynamic - based on processes behavior while in the system; know past history, may indicate future history
Describe processes…
an instance (multiple copies of the program running) of a program; actual execution of instructions; there is a hierarchy and the children are additional processes of the main process
they are created at system startup, by another process, by the user or by a batch job
they are terminated by a normal exit, an error exit, a fatal error or kill process
there are two types of processes - user and system processes
a data structure called a process descriptor is created for each process in a system; this is where the OS stores all data about a process
Describe threads…
one flow of control through a program; movement of the processor through the code; may have multiple threads that operate in parallel (ex. producer/consumer), faster than processor because there is less information to be stored - program counter, registers, stack, state
actions
- creation - returns an identifier - exit - called by the thread when it’s done doing what it needs to do - join - allows for synchronization; waits for other threads to complete - yield - moving from state of run to state of ready
Describe the use of rank to determine what parts of the code are executed by which processes…
rank will be assigned to each processor in a cluster – starting at zero for the head processor/node; incremented by one for all the other processors in the cluster
having this rank is a way of identifying the processors in the cluster
it can be concluded which processor executed particular parts of code, which processor sent a message and which processor broadcasted a message.
MPI has a function call that is associated with getting the rank of the node using that line of code. MPI::COMM_WORLD.Get_rank() returns an integer of the rank number of the node from the host file. That integer that is returned is then used for comparisons (if/else statements) so that some nodes perform tasks that other nodes should not
Describe the MPI Broadcast function…
MPI Broadcast function is used for performing collective data distribution tasks; it will broadcast (send and receive) a message to all other processes
Describe the MPI Send and Receive functions…
MPI Send and MPI Receive are communication routines
provide the transfer of information between processes
send function will send messages to other processes
receive function will receive a message from sending processes
Describe semaphores…
- abstract data type that functions as a software synchronization tool that can be used to implement a solution to the critical section problem; an object whose methods are invoked by the processes that need to share a resource
- analogy - solution would be to add a traffic light at the intersection
- types
- binary semaphore - integer attribute can only take 2 values of 0 or 1; used to allow mutual exclusion
- counting semaphore - can take any non-negative integer value
- critical section in every process is enclosed between the wait and signal operations
- sequence of instructions
- invoke wait on a semaphore mutex - this tests the value of its integer value; if greater than 0, decremented and process proceeds to the critical section; if integer value is 0, the wait operation suspends the process and places the semaphore in a queue
- execute the critical section of the process
- invoke the signal operation on semaphore mutex; increments the integer value of the attribute and reactivates the process waiting at the head of the semaphore queue - wakes up the process
- normal sequence continues to execute; reactivated process becomes the current process
- sequence of instructions
Describe monitors…
high-level programming language concept; encapsulation; views as a class in oop - can have methods and data in the object; view monitor as a room and the methods are doors to enter the room - if one processes enters the room all of the doors get locked - only one process can be in the room at any given time - must wait for the process to complete and leave the room - other processes will be queued and randomly picked; processes shouldn’t be able to blocked or go into a waiting state - if blocked, will be pulled out of the monitor and put on a separate queue to avoid deadlock
Describe message passing…
communication and synchronization; can use a blocking version of send and receive - each process will have to wait until message is completely communicated; barrier command will require all processes to get to a particular point
synchronized - producer produces an item and will wait for the consumer and will build a message, receives message, extracts data, sends message and waits
unsynchronized- relying on the buffer; allows multiple values stored in the buffer; produces item, builds, and sends repeatedly - if buffer fills up, the consumer end will be block until there is space in the buffer; consumer receives and processes message - consumer will wait until a message is put in the buffer