Week 7 and 8 Flashcards

1
Q

What is Belady’s Anomaly?

A

In Page Referencing the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

local vs global frame allocation

A

local: choose from a frame already owned by process (number of frames is fixed, cannot surrender extra pages)
global: processes can steal frames from other processes (allows pages to be reshuffled, more commonly used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is thrashing? how do you detect it? and how do you fix it

A

Thrashing occurs when there is not enough page frames so you constantly keep page faulting (can detect because the page fault frequency is high and CPU utilization low)
- to fix it put processes to sleep and reallocate their pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you do if the page fault rate is too small?

A

take frames away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you do if the page fault rate is too large

A

give the process more frames (may have to suspend another process to give more frames)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a segment?

A

A segment is a separate logical address space used for various elements of the program process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the file system?

A

Abstract layer above secondary storage (system most people interact with) - smallest allotment of secondary storage, all user data stored in files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Single level directory vs two level directory

A

single: organization difficult (small disks)

Two: top level is directory, second level is user file directory, files are in user directories, path concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is mounting?

A

Before a directory is accessible to the file system it must be mounted

  • operating system checks the disk to make sure it has a valid file system on it
  • loads info about the file system into internal structures for future access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a mount point?

A

Where a file is accessed through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The first mounted system is mounted at location ‘/’ - know as the what? of the file system?

A

root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the levels of the file system

A
  • logical file system
  • file organization level
  • basic file system
  • I/O control
  • devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the boot control block?

A

block containing code to start the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the partition control block?

A

aka the super block. Controls information inside of the partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the file control block?

A

one for each file. Contains information about each file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

opening a file

A
  • search directory structure
  • see if FCB is already in memory
  • allocate entry in process FCB table
17
Q

What is the virtual file system?

A

Layer above the file system that maps file system specific view to operating system view

18
Q

What is a ‘Bit Vector’?

A

Free space management

one or more blocks, each bit represents data block in the system, easy to get contiguous space

19
Q

What is 80 - 20 reffering to?

A

Efficiency
it means 80% of processes are short vs 20% being long processes. It was that graph he showed like week 5 for the quantum

20
Q

What are journaled file systems?

A
  • transaction based
  • reliable log is used
    (actions are written to log and put on disk before actions is taken, then removed from log -> don’t have to check entire disk, just look at files who have entries in the log)
21
Q

What is DMA?

A

Direct memory access - DMA controller for the bust mediates the transfer of data in and out of the controllers

  • DMA holds memory bus for controller
  • DMA steals cycle from CPU access