There are 2 ways to turn off file operations: - Method 1: Completely turn off the running process Right-click the file on Process Explorer and select Kill Process then select OK - Meth
Trang 1BỘ GIÁO DỤC VÀ ĐÀO TẠO TRƯỜNG ĐẠI HỌC NGUYỄN TẤT THÀNH VIỆN ĐÀO TẠO QUỐC TẾ NTT
BÁO CÁO TIỂU LUẬN MÔN HỌC
Hệ Điều Hành Giảng viên hướng dẫn: ThS TRỊNH HUY HOÀNG Lớp: 21BITV01
Năm học 2022 - 2023
Nhóm sinh viên thực hiện:
2100004703 Phạm Mạnh Hùng
Trang 2 2100002375 Nguyên Văn Lĩnh
2100004822 Phan Duy Khánh
2100010263 Lê Phúc Tài
TP Hồ Chí Minh,Ngày 15 Tháng 12 Năm 2023
Table of contents
1 Deadlock 3
2.Given the following reference string: 4
2.1 Page replacement progress 4
2.2 Page faults occur during the processing of the reference scheme? 4
2.3 What do you observe when you move from Scheme 1 to Scheme 2? 4
3 Process Scheduler 5
First come first server(FCFS) 5
Shortest job first(SJF) 5
Shortest Remaining Time Next(SRTN) 6
Round robin(RR) with q = 4 6
4 Disk Scheduling 7
First-come, First-served 7
Shortest Seek Time First (SSTF) 7
SCAN 8
5 Application 9
5.1 How to use Process Explorer 9
5.2 How to use Winhex 13
Trang 35.5 How to use Sauce Lab cloud service (https://saucelabs.com/) 16
Trang 41 Deadlock
Consider the following snapshot of a system (P=Process, R=Resource):
Available
RA RB RC RD
9 9 9 9
Current Allocation
RA RB RC RD
P0 1 1 1 1
P1 0 1 2 0
P2 3 1 0 2
P3 1 2 1 0
P4 1 1 3 0
Describe about banker’s algorithm and calculate the Needs matrix
Needs
RA RB RC RD
Trang 52.Given the following reference string:
0 2 0 3 1 2 0 1 3 5 0 1 4 5 4 3 4
2.1 Page replacement progress
2.2 Page faults occur during the processing of the reference scheme?
2.3 What do you observe when you move from Scheme 1 to Scheme 2? Explain
Add a column: row "KT4" is not in Diagram 1 This row can represent a new variable, state, or entity in the system represented by the table
Adding page faults: In both diagrams, there is a row labeled "X" with the phrase "number of page faults=8" This shows that both schemes encounter page faults during execution
From these changes, I can infer that Diagram 2 represents a more complex system or process than Diagram 1 Diagram 2 may be collecting more data or using an alternative algorithm for memory management
Trang 63 Process Scheduler
Consider the following set of processes, with the length of the CPU burst and arrival time given in milliseconds
Process Burst Time Arrival time
First come first server(FCFS)
In this algorithm, the priority of process service is based on the time of process formation The queue of processes is organized in FIFO style, all processes are served in the order they appear until interrupted or terminated
Waiting time FCFS:
P1: 0
P2: 4
P3: 9
Average Waiting Time :
(0 + 4 + 9) / 3 = 4,33333333
Completion Time FCFS:
P1: 7 P2: 15 P3: 22
Average Completion Time:
(7 + 15 + 22) / 3 = 14,6666667
Shortest job first(SJF)
Thuật toán này xác định thứ tự ưu tiên thực hiện tiến trình dựa vào tổng thời gian thực hiện tiến trình Tiến trình có tổng thời gian thực hiện ngắn sẽ được ưu tiên phục
vụ trước
Waiting time SJF:
Trang 7P2: 11
P3: 1
Average Waiting Time :
(0 + 11 + 1) / 3 = 4
P2: 22 P3: 14
Average Completion Time:
(7 + 22 + 14) / 3 = 14,33
Shortest Remaining Time Next(SRTN)
The SRTN (Shortest Remaining Time Next) algorithm is a preemptive CPU scheduling algorithm based on the remaining execution time of the process This algorithm works by always selecting the process with the shortest remaining execution time to process next
22
Waiting time SRTN:
P1: 0
P2: 11
P3: 1
Average Waiting Time :
(0 + 11 + 1) / 3 = 4
Completion Time SRTN:
P1: 7 P2: 22 P3: 14
Average Completion Time:
(7 + 22 + 14) / 3 = 14,33
Round robin(RR) with q = 4.
22
Waiting time RR:
P1: 4
P2: 8
P3: 9
Average Waiting Time :
(4 + 8 + 9) / 3 = 7
Completion Time RR:
P1: 11 P2: 19 P3: 22
Average Completion Time:
(11 + 19 + 22) / 3 = 17,33
Trang 84 Disk Scheduling
Disk requests come into the disk driver for cylinders 20, 25, 22, 4, 40, 46,
88, and 38 in that order Assume that the disk has 100 cylinders
A seek takes 6msec per cylinder moved Compute the average seek time for the request sequence given above for
First-come, First-served
20 25 22 4 40 46 88 38
20
25
22
4
40
46
88
38
32 5 3 18 36 6 42 50
Average seek: 24
Average seek time:144msec
Shortest Seek Time First (SSTF)
20 25 22 4 40 46 88 38 (52)
Trang 9Next track accessed Number of tracks traversed
46
40
38
25
22
20
4
88
6 6 2 13 3 2 16 84
Average seek: 16.5
Average time seek :99msec
SCAN
20 25 22 4 40 46 88 38 (52)
88
100
46
40
38
25
22
20
4
36 12 54 6 2 13 3 2 16
Average seek 16
Average seek time 96msec
Trang 105 Application
Introduction and instructions for using the following applications
5.1 How to use Process Explorer
Process Explorer is a versatile software whose main function is system management and monitoring In addition to using anti-virus software, another way for you to find and track viruses and spyware is to use Process Explorer
In addition, in cases where the computer has problems, errors with
applications, or freezes, crashes Process Explorer will be a necessary tool to handle these problems
HOW TO USE PROCESS EXPLORER
Step 1: First, to make it easier to use Process Explorer, we need to tweak it a bit Go to View on the Menu bar, uncheck Show Process From All Users
Step 2: Start filtering for suspected virus software.
In this example, we assume that the CEPHtmlEngine.exe file is a strange file, possibly a virus
Trang 11Step 3: Right-click on this file and select Properties to view information about
this file
lot of information about this file, but here we only need to pay attention to one tab, Image
At the Image Tab we will know the basic information of this file
- Name: Adobe CEP HTML Engine
- Version: 7.0.0.67
- Build Time: Sat Sep 17 10:09:43 2016
- Path: C:\Program Files\Adobe\Adobe Photoshop CC 2017 (32 Bit)\Required\ CEP\CEPHtmlEngine\CEPHtmlEngine.exe
Step 5: Next, click on the Explore button to find this file on the system
Trang 12Step 6: After identifying the file, we proceed to turn off the operation of this file
on the system After turning it off, we can delete the folder containing the files There are 2 ways to turn off file operations:
- Method 1: Completely turn off the running process
Right-click the file on Process Explorer and select Kill Process then select
OK
- Method 2: Pause the running process
Right-click on the file and select Suspend Then you continue to right-click and select Kill Process Tree and select Ok to complete
Trang 13Step 7: Check the results to see if the process of this file has been turned off.
Trang 145.2 How to use Winhex
WinHex is a powerful data analysis and editing tool, widely used in the fields of forensics, data recovery, and network security WinHex can be used to view, edit, and restore data on various storage devices, including hard drives, memory cards, USB, CD/DVD, etc
How to use WinHex
To start using WinHex, follow these steps:
Download and install WinHex from its official website
Run WinHex
Select the file or storage device you want to view, edit, or restore data from
Main features of WinHex
WinHex has many powerful features, including:
View data in binary, text, and hexa formats
Edit binary data
Search and replace data
Recover deleted or corrupted data
Forensic data analysis
Some examples of how to use WinHex
Here are some examples of how to use WinHex:
View data: You can use WinHex to view data in binary, text, or hexa format For example, you can use WinHex to view the contents of a text file, or view the structure of a hard drive
Editing data: You can use WinHex to edit binary data For example, you can use WinHex to correct an error in a program file, or change the value
of a variable
Search and replace data: You can use WinHex to search and replace data For example, you can use WinHex to find all occurrences of a character string in a file, or replace all 0s with 1s
Trang 15 Data recovery: You can use WinHex to recover deleted or corrupted data For example, you can use WinHex to recover data from a deleted hard drive, or recover data from a damaged hard drive
Forensic data analysis: You can use WinHex to analyze forensic data For example, you can use WinHex to search for traces of criminal activity
in a file, or to determine the origin of a file
5.3 How to do some actions on files
To do some action on files, you can use built-in tools in your operating system
or use third-party applications
Use built-in tools
Most modern operating systems provide built-in tools for file management For example, in Windows, you can use File Explorer to view, edit, and perform other actions on files
Here are some common actions you can perform on files using File Explorer:
View the contents of a file: To view the contents of a file, double-click the file
Edit the contents of a file: To edit the contents of a file, right-click the file and select "Open with" Then, select the application you want to use to edit the file
Copy a file: To copy a file, right-click it and select "Copy." Then, paste the file into the new location
Move a file: To move a file, right-click it and select "Move." Then, choose a new location for the file
Delete a file: To delete a file, right-click it and select "Delete"
Use third-party applications
In addition to built-in tools, you can also use third-party applications to manage files Third-party applications often offer more advanced features and functionality than built-in tools
Here are some popular third-party apps for file management:
Total Commander: Total Commander is a powerful and fully featured file management application
Trang 16 FileZilla: FileZilla is a free and open source FTP client.
WinRAR: WinRAR is a paid file compression application
Some specific actions you can perform on files using third-party applications:
File Concatenation: File concatenation is the process of combining multiple files into a single file
File Splitting: File splitting is the process of dividing a file into multiple smaller files
Insert data into file: Insert data into file is the process of adding new data
at the end of a file
Delete data from file: Delete data from file is the process of removing existing data from a file
5.4 How to use CMD
Follow the below-mentioned steps
Step 1: Open the Command Prompt by clicking on the Start Menu and typing cmd Alternatively, one can also use a shortcut- Ctrl+R (key), and on the Run dialogue box, type cmd, and press Enter
Step 2: In order to retrieve the list of commands- Type Help and press Enter This will help to list down all the commands in alphabetic order, and the commands can be found by scrolling up and down The list may vary depending upon the version of Windows used
Below is a list of the function keys which can help to enhance the experience with CMD commands
Trang 175.5 How to use Sauce Lab cloud service ( https://saucelabs.com/ )
Sauce Labs is a cloud-based platform for automated testing of web and mobile applications It provides access to a wide range of real devices and browsers, enabling you to test across various operating systems, screen sizes, and configurations Here's a general guide on how to use Sauce Labs cloud service:
1 Sign Up:
Head to the Sauce Labs website and create an account You can start with a free trial to explore the platform
Choose a plan that suits your testing needs and budget
2 Upload Your App:
You can upload your web app by providing its URL or by uploading the app file itself
For mobile apps, you can upload native app files (APKs for Android and IPAs for iOS)
3 Configure Your Test:
Define your test suite, which can include unit tests, integration tests, and UI tests
Choose the desired test framework (e.g., Selenium, Appium) and programming language
Specify the test environment, including the operating system, browser, device, and screen resolution
4 Run Your Test:
Once everything is configured, trigger the test run
Sauce Labs will spin up a virtual machine with the specified environment and run your tests on the chosen device or browser
5 Analyze Results:
View detailed reports on your test execution, including screenshots, logs, and performance metrics
Identify any errors or bugs that occurred during the testing
Additional features:
Parallel testing: Run your tests on multiple devices and browsers concurrently for faster feedback
Live testing: Manually test your app on real devices in real-time
Trang 18Integrations: Connect Sauce Labs with your CI/CD pipelines for automated testing within your development workflow