1. Trang chủ
  2. » Luận Văn - Báo Cáo

Báo cáo tiểu luận môn học hệ Điều hành

18 0 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Báo Cáo Tiểu Luận Môn Học Hệ Điều Hành
Tác giả Phạm Mạnh Hùng, Nguyên Văn Lĩnh, Phan Duy Khánh, Lê Phúc Tài
Người hướng dẫn ThS. Trịnh Huy Hoàng
Trường học Trường Đại Học Nguyễn Tất Thành
Chuyên ngành Hệ Điều Hành
Thể loại báo cáo tiểu luận
Năm xuất bản 2022 - 2023
Thành phố TP. Hồ Chí Minh
Định dạng
Số trang 18
Dung lượng 1,16 MB

Nội dung

There are 2 ways to turn off file operations: - Method 1: Completely turn off the running process Right-click the file on Process Explorer and select Kill Process then select OK - Meth

Trang 1

BỘ GIÁO DỤC VÀ ĐÀO TẠO TRƯỜNG ĐẠI HỌC NGUYỄN TẤT THÀNH VIỆN ĐÀO TẠO QUỐC TẾ NTT

BÁO CÁO TIỂU LUẬN MÔN HỌC

Hệ Điều Hành Giảng viên hướng dẫn: ThS TRỊNH HUY HOÀNG Lớp: 21BITV01

Năm học 2022 - 2023

Nhóm sinh viên thực hiện:

 2100004703 Phạm Mạnh Hùng

Trang 2

 2100002375 Nguyên Văn Lĩnh

 2100004822 Phan Duy Khánh

 2100010263 Lê Phúc Tài

TP Hồ Chí Minh,Ngày 15 Tháng 12 Năm 2023

Table of contents

1 Deadlock 3

2.Given the following reference string: 4

2.1 Page replacement progress 4

2.2 Page faults occur during the processing of the reference scheme? 4

2.3 What do you observe when you move from Scheme 1 to Scheme 2? 4

3 Process Scheduler 5

First come first server(FCFS) 5

Shortest job first(SJF) 5

Shortest Remaining Time Next(SRTN) 6

Round robin(RR) with q = 4 6

4 Disk Scheduling 7

First-come, First-served 7

Shortest Seek Time First (SSTF) 7

SCAN 8

5 Application 9

5.1 How to use Process Explorer 9

5.2 How to use Winhex 13

Trang 3

5.5 How to use Sauce Lab cloud service (https://saucelabs.com/) 16

Trang 4

1 Deadlock

Consider the following snapshot of a system (P=Process, R=Resource):

Available

RA RB RC RD

9 9 9 9

Current Allocation

RA RB RC RD

P0 1 1 1 1

P1 0 1 2 0

P2 3 1 0 2

P3 1 2 1 0

P4 1 1 3 0

Describe about banker’s algorithm and calculate the Needs matrix

Needs

RA RB RC RD

Trang 5

2.Given the following reference string:

0 2 0 3 1 2 0 1 3 5 0 1 4 5 4 3 4

2.1 Page replacement progress

2.2 Page faults occur during the processing of the reference scheme?

2.3 What do you observe when you move from Scheme 1 to Scheme 2? Explain

Add a column: row "KT4" is not in Diagram 1 This row can represent a new variable, state, or entity in the system represented by the table

Adding page faults: In both diagrams, there is a row labeled "X" with the phrase "number of page faults=8" This shows that both schemes encounter page faults during execution

From these changes, I can infer that Diagram 2 represents a more complex system or process than Diagram 1 Diagram 2 may be collecting more data or using an alternative algorithm for memory management

Trang 6

3 Process Scheduler

Consider the following set of processes, with the length of the CPU burst and arrival time given in milliseconds

Process Burst Time Arrival time

First come first server(FCFS)

In this algorithm, the priority of process service is based on the time of process formation The queue of processes is organized in FIFO style, all processes are served in the order they appear until interrupted or terminated

Waiting time FCFS:

P1: 0

P2: 4

P3: 9

Average Waiting Time :

(0 + 4 + 9) / 3 = 4,33333333

Completion Time FCFS:

P1: 7 P2: 15 P3: 22

Average Completion Time:

(7 + 15 + 22) / 3 = 14,6666667

Shortest job first(SJF)

Thuật toán này xác định thứ tự ưu tiên thực hiện tiến trình dựa vào tổng thời gian thực hiện tiến trình Tiến trình có tổng thời gian thực hiện ngắn sẽ được ưu tiên phục

vụ trước

Waiting time SJF:

Trang 7

P2: 11

P3: 1

Average Waiting Time :

(0 + 11 + 1) / 3 = 4

P2: 22 P3: 14

Average Completion Time:

(7 + 22 + 14) / 3 = 14,33

Shortest Remaining Time Next(SRTN)

The SRTN (Shortest Remaining Time Next) algorithm is a preemptive CPU scheduling algorithm based on the remaining execution time of the process This algorithm works by always selecting the process with the shortest remaining execution time to process next

22

Waiting time SRTN:

P1: 0

P2: 11

P3: 1

Average Waiting Time :

(0 + 11 + 1) / 3 = 4

Completion Time SRTN:

P1: 7 P2: 22 P3: 14

Average Completion Time:

(7 + 22 + 14) / 3 = 14,33

Round robin(RR) with q = 4.

22

Waiting time RR:

P1: 4

P2: 8

P3: 9

Average Waiting Time :

(4 + 8 + 9) / 3 = 7

Completion Time RR:

P1: 11 P2: 19 P3: 22

Average Completion Time:

(11 + 19 + 22) / 3 = 17,33

Trang 8

4 Disk Scheduling

Disk requests come into the disk driver for cylinders 20, 25, 22, 4, 40, 46,

88, and 38 in that order Assume that the disk has 100 cylinders

A seek takes 6msec per cylinder moved Compute the average seek time for the request sequence given above for

First-come, First-served

20 25 22 4 40 46 88 38

20

25

22

4

40

46

88

38

32 5 3 18 36 6 42 50

Average seek: 24

Average seek time:144msec

Shortest Seek Time First (SSTF)

20 25 22 4 40 46 88 38 (52)

Trang 9

Next track accessed Number of tracks traversed

46

40

38

25

22

20

4

88

6 6 2 13 3 2 16 84

Average seek: 16.5

Average time seek :99msec

SCAN

20 25 22 4 40 46 88 38 (52)

88

100

46

40

38

25

22

20

4

36 12 54 6 2 13 3 2 16

Average seek 16

Average seek time 96msec

Trang 10

5 Application

Introduction and instructions for using the following applications

5.1 How to use Process Explorer

Process Explorer is a versatile software whose main function is system management and monitoring In addition to using anti-virus software, another way for you to find and track viruses and spyware is to use Process Explorer

In addition, in cases where the computer has problems, errors with

applications, or freezes, crashes Process Explorer will be a necessary tool to handle these problems

HOW TO USE PROCESS EXPLORER

Step 1: First, to make it easier to use Process Explorer, we need to tweak it a bit Go to View on the Menu bar, uncheck Show Process From All Users

Step 2: Start filtering for suspected virus software.

In this example, we assume that the CEPHtmlEngine.exe file is a strange file, possibly a virus

Trang 11

Step 3: Right-click on this file and select Properties to view information about

this file

lot of information about this file, but here we only need to pay attention to one tab, Image

At the Image Tab we will know the basic information of this file

- Name: Adobe CEP HTML Engine

- Version: 7.0.0.67

- Build Time: Sat Sep 17 10:09:43 2016

- Path: C:\Program Files\Adobe\Adobe Photoshop CC 2017 (32 Bit)\Required\ CEP\CEPHtmlEngine\CEPHtmlEngine.exe

Step 5: Next, click on the Explore button to find this file on the system

Trang 12

Step 6: After identifying the file, we proceed to turn off the operation of this file

on the system After turning it off, we can delete the folder containing the files There are 2 ways to turn off file operations:

- Method 1: Completely turn off the running process

Right-click the file on Process Explorer and select Kill Process then select

OK

- Method 2: Pause the running process

Right-click on the file and select Suspend Then you continue to right-click and select Kill Process Tree and select Ok to complete

Trang 13

Step 7: Check the results to see if the process of this file has been turned off.

Trang 14

5.2 How to use Winhex

WinHex is a powerful data analysis and editing tool, widely used in the fields of forensics, data recovery, and network security WinHex can be used to view, edit, and restore data on various storage devices, including hard drives, memory cards, USB, CD/DVD, etc

How to use WinHex

To start using WinHex, follow these steps:

 Download and install WinHex from its official website

 Run WinHex

 Select the file or storage device you want to view, edit, or restore data from

Main features of WinHex

WinHex has many powerful features, including:

 View data in binary, text, and hexa formats

 Edit binary data

 Search and replace data

 Recover deleted or corrupted data

 Forensic data analysis

 Some examples of how to use WinHex

Here are some examples of how to use WinHex:

 View data: You can use WinHex to view data in binary, text, or hexa format For example, you can use WinHex to view the contents of a text file, or view the structure of a hard drive

 Editing data: You can use WinHex to edit binary data For example, you can use WinHex to correct an error in a program file, or change the value

of a variable

 Search and replace data: You can use WinHex to search and replace data For example, you can use WinHex to find all occurrences of a character string in a file, or replace all 0s with 1s

Trang 15

 Data recovery: You can use WinHex to recover deleted or corrupted data For example, you can use WinHex to recover data from a deleted hard drive, or recover data from a damaged hard drive

 Forensic data analysis: You can use WinHex to analyze forensic data For example, you can use WinHex to search for traces of criminal activity

in a file, or to determine the origin of a file

5.3 How to do some actions on files

To do some action on files, you can use built-in tools in your operating system

or use third-party applications

Use built-in tools

Most modern operating systems provide built-in tools for file management For example, in Windows, you can use File Explorer to view, edit, and perform other actions on files

Here are some common actions you can perform on files using File Explorer:

 View the contents of a file: To view the contents of a file, double-click the file

 Edit the contents of a file: To edit the contents of a file, right-click the file and select "Open with" Then, select the application you want to use to edit the file

 Copy a file: To copy a file, right-click it and select "Copy." Then, paste the file into the new location

 Move a file: To move a file, right-click it and select "Move." Then, choose a new location for the file

 Delete a file: To delete a file, right-click it and select "Delete"

Use third-party applications

In addition to built-in tools, you can also use third-party applications to manage files Third-party applications often offer more advanced features and functionality than built-in tools

Here are some popular third-party apps for file management:

 Total Commander: Total Commander is a powerful and fully featured file management application

Trang 16

 FileZilla: FileZilla is a free and open source FTP client.

 WinRAR: WinRAR is a paid file compression application

Some specific actions you can perform on files using third-party applications:

 File Concatenation: File concatenation is the process of combining multiple files into a single file

 File Splitting: File splitting is the process of dividing a file into multiple smaller files

 Insert data into file: Insert data into file is the process of adding new data

at the end of a file

 Delete data from file: Delete data from file is the process of removing existing data from a file

5.4 How to use CMD

Follow the below-mentioned steps

Step 1: Open the Command Prompt by clicking on the Start Menu and typing cmd Alternatively, one can also use a shortcut- Ctrl+R (key), and on the Run dialogue box, type cmd, and press Enter

Step 2: In order to retrieve the list of commands- Type Help and press Enter This will help to list down all the commands in alphabetic order, and the commands can be found by scrolling up and down The list may vary depending upon the version of Windows used

Below is a list of the function keys which can help to enhance the experience with CMD commands

Trang 17

5.5 How to use Sauce Lab cloud service ( https://saucelabs.com/ )

Sauce Labs is a cloud-based platform for automated testing of web and mobile applications It provides access to a wide range of real devices and browsers, enabling you to test across various operating systems, screen sizes, and configurations Here's a general guide on how to use Sauce Labs cloud service:

1 Sign Up:

Head to the Sauce Labs website and create an account You can start with a free trial to explore the platform

Choose a plan that suits your testing needs and budget

2 Upload Your App:

You can upload your web app by providing its URL or by uploading the app file itself

For mobile apps, you can upload native app files (APKs for Android and IPAs for iOS)

3 Configure Your Test:

Define your test suite, which can include unit tests, integration tests, and UI tests

Choose the desired test framework (e.g., Selenium, Appium) and programming language

Specify the test environment, including the operating system, browser, device, and screen resolution

4 Run Your Test:

Once everything is configured, trigger the test run

Sauce Labs will spin up a virtual machine with the specified environment and run your tests on the chosen device or browser

5 Analyze Results:

View detailed reports on your test execution, including screenshots, logs, and performance metrics

Identify any errors or bugs that occurred during the testing

Additional features:

Parallel testing: Run your tests on multiple devices and browsers concurrently for faster feedback

Live testing: Manually test your app on real devices in real-time

Trang 18

Integrations: Connect Sauce Labs with your CI/CD pipelines for automated testing within your development workflow

Ngày đăng: 16/12/2024, 09:20

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN