- To
validate the system partially i.e. to determine if the system under
consideration fulfills the portability requirements and can be ported to environments
with different :-
Friday, September 13, 2013
What is Portability Testing?
Posted by
Sunflower
at
9/13/2013 06:42:00 PM
0
comments
Labels: Application, Code, Components, Conditions, Design, Environment, Objectives, Operating System, Platform, Portability Testing, Process, Processor, Re-usable, Requirements, Software, System Testing, Testing
![]() | Subscribe by Email |
|
Monday, June 17, 2013
Explain the Round Robin CPU scheduling algorithm
How to implement Round Robin CPU scheduling algorithm
- The ready queue is maintained as the FIFO
(first in first out) queue of the processes.
- Addition of new processes is made at the rear
end of the ready queue and selection of the process for execution by the
processor is made at the front end.
- The process first in the ready queue is thus
picked by the CPU scheduler. A timer is set that will interrupt the
processor when the time slice elapses. When this happens the process will
be dispatched.
- In some cases the CPU burst of some processes
may be less than the size of the time slice. If this is the case, the
process will be voluntarily released by the CPU. The scheduler will then
jump to the process next in the ready queue and fetch it for execution.
- While in other cases the CPU burst for some
processes might be higher than the size of the time slice. In this case
the timer set will send an interrupt to the processor, thus dispatching
the process and putting it at the rear end of the ready queue. The
scheduler will then jump to the next process in the queue.
Posted by
Sunflower
at
6/17/2013 04:47:00 PM
0
comments
Labels: Algorithm, Conditions, CPU, Implementation, Operating System, Preemption, Processes, Processor, Queue, Ready, Round Robin, Scheduling, Scheduling algorithm, System, Time, Time sharing, Waiting
![]() | Subscribe by Email |
|
Wednesday, June 5, 2013
Explain the various techniques for Deadlock Prevention
- Recursive
locks: In such locks, only one thread can pass through it. Any other
threads or processes entering the lock need to wait for the initial one to
pass through after its task is finished.
- Non
– recursive locks: Here only once a thread can enter the lock. If the same
thread again tries to enter the lock without unlocking it, a deadlock can
occur.
Posted by
Sunflower
at
6/05/2013 01:46:00 PM
0
comments
Labels: Algorithms, Conditions, Data, Deadlock Prevention, Deadlocks, Distributed, Environment, Multiprocessing, Multitasking, Operating System, Performance, Prevention, Processes, Resources, System, Wait
![]() | Subscribe by Email |
|
Tuesday, June 4, 2013
Explain briefly Deadlock Avoidance and Detection?
What is Deadlock Avoidance?
- Avoiding a deadlock is possible only if certain information regarding the processes is available with the operating system.
- This information has to be made available to the OS just before the resources are allocated to the processes.
- These are the processes that are to be consumed by the process in its lifetime.
- For every resource request made by the process, any potential threats are checked by the system i.e., whether granting the request of the process will send it in to an unsafe zone or not.
- If it is so then there are possibilities that the system could enter a deadlock.
- Therefore, only those requests are granted by the process that will ensure a safe state of the process.
- It is important for the system to determine whether the next level of the process will be safe or unsafe.
- There are 3 things that the operating system must know at any before or after the execution of the process:
1. The currently available resources.
2. The resources currently allocated to the processes.
3. Resources to be required and released in the future by these processes.
- It is possible that a process might be in an unsafe state but still may not cause a deadlock.
- By the notion of the safe and unsafe state of the process we refer to the system’s ability of entering in to a deadlock.
An example will make it clearer:
- Consider a resource A requested by a process which would make the process state unsafe.
- At the same time it releases another resource say B preventing the circular wait of the resources.
- In such a situation, the system is said to be in an unsafe state though not necessarily in a deadlock.
- There are various algorithms that have been designed for deadlock avoidance and one such is the banker’s algorithm.
- To use this algorithm knowledge about the resource usage limit is required in advance.
- It is impossible for most of the systems to know what a process will request for in advance.
- This only implies that the deadlock avoidance is also not possible here.
- There are other two algorithms for achieving this task namely wound/ wait and wait/ die algorithms.
- Each of them makes use of a symmetry breaking technique.
What is Deadlock Detection?
- Deadlocks are free to occur under the implementation of this concept.
- Then through the state of the system, the occurrence of the deadlock is confirmed and subsequently mended.
- Here, the resource allocation activities are tracked along with the process states by certain algorithms.
- After this, the algorithm is used for removing the deadlock.
- Deadlock detection is quite easy since the OS scheduler knows about the resources that have been locked by the processes.
- Model checking is one of the techniques used for deadlock detection.
- In this a finite state model is created up on which a progress analysis of the process is carried out and all the terminal sets of the model are found.
- Each of these stands for a deadlock.
- Correction of the deadlock can be done by any of the below mentioned methods after the deadlock has been detected:
1. Process termination: This is about aborting one or more of the processes that cause the deadlock thus ensuring a certain and speedy removal of the deadlock. But this method might prove to be a little expensive because of the loss of the partial computations.
2. Resource preemption: This is about a successive preemption of the allocated resources until the breakdown of the deadlock.
Posted by
Sunflower
at
6/04/2013 01:54:00 PM
0
comments
Labels: Algorithms, Avoid, Conditions, Deadlock Avoidance, Deadlock Prevention, Deadlocks, Detect, Operating System, OS, Processes, Requests, Resources, Safe, Scheduler, States, System, Unsafe, Wait
![]() | Subscribe by Email |
|
Saturday, May 11, 2013
What is meant by Deadlock? List the necessary conditions for arising deadlocks?
Conditions for a Deadlock to arise
- Mutual exclusion: There has
to be at least one resource that cannot be shared. So that only one
process would use at any given time.
- Resource holding (or hold
and wait): There should be at least one resource held by a process that in
turn should be request more resources that are being held by other
processes.
- No preemption: Once the
resources have been allocated, they should not de-allocated by the
operating system. The condition is that the process holding the resource
must release it voluntarily.
- Circular wait: A circular
chain of processes must be formed as explained in the earlier example.
- Ignoring deadlock
- Detection
- Prevention
- Avoidance
Posted by
Sunflower
at
5/11/2013 09:48:00 PM
0
comments
Labels: Actions, Approaches, Arise, Avoid, Compete, Conditions, Deadlock, Detection, Operating System, OS, Preemption, Processes, Resources, Situation, System, Threads, Wait, Waiting
![]() | Subscribe by Email |
|
Sunday, May 5, 2013
What is DRAM? In which form does it store data?
What is Dynamic Random Access Memory (DRAM)?
- Charged and
- Discharged
Posted by
Sunflower
at
5/05/2013 09:40:00 PM
0
comments
Labels: Advantages, Bits, Capacitors, Conditions, CPU, Data, Disadvantage, DRAM, Dynamic, Information, Memory, Physical, Random, Random Access Memory, States, Static, Storage, Store, Transistor, Volatile
![]() | Subscribe by Email |
|
Wednesday, March 20, 2013
What are components of autonomic networking?
Components of Autonomic Networking
Posted by
Sunflower
at
3/20/2013 08:17:00 PM
0
comments
Labels: Access, Application, Autonomic Networking, Autonomic Systems, Components, Conditions, Configuration, Data, Design, Inputs, Interface, Network, Networking, Performance, States, Switches, System
![]() | Subscribe by Email |
|
Saturday, January 19, 2013
What is meant by Statistical Usage Testing?
About Statistical Usage Testing
- Uninformed approach: In this approach, same probability is assigned to the exit arcs of a
state.
- Informed approach: In
this approach, a sample of user event sequences for calculating suitable
properties. The sample is captured from either an earlier version of the
software or its prototype.
- Intended approach: This
approach is used for shifting the focus of the test to certain state
transitions and for modeling the hypothetical users.
- Expected test case
length
- Number of test cases
required for the verification of the desired reliability of the software
system or application.
Posted by
Sunflower
at
1/19/2013 05:18:00 PM
0
comments
Labels: Application, Approach, Automated, Behavior, Conditions, Defects, Description, Errors, Events, Process, Properties, Scenario, Software System, Statistical Usage Testing, System, Tasks, Testing, Tests, Transitions, Usage
![]() | Subscribe by Email |
|
Wednesday, January 16, 2013
What kinds of functions are used by Cleanroom Software Engineering approach?
- Usage scenarios
- Incremental
development
- Incremental release
- Statistical modeling
- Separate development
- Acceptance testing
- No unit testing
- No debugging
- Formal reviews with
verification conditions
- Incremental
development
- Box structured
specifications
- Statistical usage
testing
- Function theoretic
verification
- Box structured Designing: Three types of boxes are identified namely black box, state box and clear box.
- Verification properties of the structures and
- Program functions: These are one kind of functions that are used by the clean room approach.
- Program functions and
- Verification
conditions
Posted by
Sunflower
at
1/16/2013 02:53:00 PM
0
comments
Labels: Application, Approach, Cleanroom approach, Cleanroom Software engineering, Conditions, Debugging, Defects, Errors, Features, Functions, Incremental, Process, Productivity, Software System, Syntax, Users, Verification
![]() | Subscribe by Email |
|