Question

In: Computer Science

Provide an outline of the following essential managers of an operating system: memory manager, processor manager, device manager, network manager and file manager


1.1 Provide an outline of the following essential managers of an operating system: memory manager, processor manager, device manager, network manager and file manager 

1.2 Name and describe 5 key concepts about an operating system that you think a typical user needs to understand  

1.3. Give special examples of situations where battery performance is of crucial importance to a mobile device user. What specific recommendations would you make to battery developers to improve the user experience with mobile devices  

Solutions

Expert Solution

1.1) An outline of the memory manager, processor manager, device manager, network manager, and file manager an Operating System (OS) has:
Memory manager:
* Memory Manager uses a kernel with a paging algorithm to figure out the amount of available memory.
* It accepts requests for memory from both local and global sources.
* Its function is to allocate pages based on the local policy.
* It receives requests from the Process Manager to provide memory to new or expanding client or server processes.
* It simply performs memory management operations dynamically allocating primary memory portions to programs based on their requests and freeing it when no longer needed so it can be reused.
* It manages Random Access Memory (RAM).

Processor manager:
It decides and manages how to allocate the Central Processing Unit (CPU) to a process.
* It allocates resources to processes.
* It is responsible and enables processes to share and exchange information.
* It protects the data of one process from all other processes.
* It enables synchronization among processes.

It has two main parts:
* Job Scheduler.
* Process Scheduler.

Device manager:
* It is a component of an OS that monitors all the hardware peripheral devices connected to the computer.
* Its functions are to allocate system's devices to a process based on a scheduling policy, tracks the status of each device, and deallocates them when not in use or needed.

Network manager:
* It provides policies to provide intrasite and intersite communications.
* Its function is to locate processes in the network.
* It sends messages throughout the network and tracks media use.
* It is responsible to reliably transfer data.
* It is responsible for the coding and decoding of messages, and retransmitting errors.
* It acknowledges messages and replies if required.
* It provides routing functions.
* It maintains statistics on the network usage.

File manager:
* Its function is to perform different file related operations.
* It keeps track and manages every file in the computer system.
* It comes with a file browser providing a user interface (in terminal or GUI- Graphical User Interface) to work with file systems.
* It manages the file operations such as create, open, edit, view, print, rename, move, copy, delete, search or find, etc.
* It manages the file attributes, properties, and permissions such as read-only, write, execute permissions, etc.

1.2) Name and description of five key concepts about an operating system a typical user needs to understand:

1) It is the most important software used to manage computer resources, making the hardware resources available for most of the software programs or technical processes.

2) Its main function is to coordinate hardware components in the computer with the software applications and programs.

3) An operating system is basically, a software which acts as an intermediary software providing common services and coordinating between the underlying hardware components and the application software above it.

4) It has a user command interface.

5) It has managers that are components that manage computer hardware resources and provide common services for application software. These managers are memory manager, processor manager, file manager, device manager, and network manager.

An OS also has Command Line Interface (CLI) or a Graphical User Interface (GUI) so a user can manage, use, view, operate on the OS software, other application software, and all other underlying hardware components and devices connected to the computer.

1.3) Special examples of situations where battery performance is of crucial importance to a mobile device user:

* When the user is using Wi-Fi on the mobile device, i.e., any activity on the Internet using Wi-Fi where Wi-Fi consumes the most of the battery power and it does it quickly.

* When the user uses applications (mobile apps) installed on the mobile device, especially battery power intensive applications i.e., which could require hardware components or devices usage which in turn require high battery power. The applications running or simply opened on the device consume more battery power.

Specific recommendations to battery developers to improve the user experience with mobile devices:

* To increase the long battery life.
* To manufacture batteries with compute capability to manage and monitor the battery power consumption, charging, etc with proper indications and suggestions.
* The battery should charge as quickly as possible.
* To manufacture batteries such that those can be charged wirelessly for almost all models of mobile devices making them wire or cable free.
* It should not dissipate heat while being charged and used.
* It should have certain compute capability to stop receiving excess AC power after 100% of the battery is charged.
* A high-quality battery made of safe and eco-friendly chemical composition.

* To manufacture light-weight batteries.


Related Solutions

The network Manager is seen the arm of the operating system responsible for providing services such...
The network Manager is seen the arm of the operating system responsible for providing services such as user accounts, resource security, and mechanisms used to implement communication between computers. In not less than four (4) pages, Discuss in detail, the concept of resource management by the operating system and explain in detail the role played by the network manager, as well as the two (2) major challenges
Explain the below concepts in depth. Server virtualization Application virtualization Processor and memory virtualization Network virtualization...
Explain the below concepts in depth. Server virtualization Application virtualization Processor and memory virtualization Network virtualization Data and storage virtualization
An intrusion detection system (IDS) is a device or software application that monitors network or system...
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station
Explain the associative network memory model of brand equity. Provide examples.
Explain the associative network memory model of brand equity. Provide examples.
Outline the objectives and functions of memory management in operating systems. Compare and contrast the physical...
Outline the objectives and functions of memory management in operating systems. Compare and contrast the physical address space with the virtual address space as they relate to differenct memory mapping techniques in operating systems. Create a concept map the logically arrange the essential concepts about memory management into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map. Use connecting nodes to accurately describe each relationship...
Discuss clearly the cooperation issues that are involved amongst the various essential managers of an operating...
Discuss clearly the cooperation issues that are involved amongst the various essential managers of an operating system when a user carries out a particular task via the user interface. Your answer must describe the task.
(Operating System CSE) Consider a file system in which a file can be deleted and its...
(Operating System CSE) Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?2)Consider a file systemthat uses a modifiedcontiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of...
In operating system: How can a multicore processor take advantage of data parallelism?
In operating system: How can a multicore processor take advantage of data parallelism?
What causes deadlock in an operating system? excessive resource swapping a new processor interrupts in the...
What causes deadlock in an operating system? excessive resource swapping a new processor interrupts in the middle of servicing an existing attempt too much resource sharing a process requests a resource that is held by another waiting process
Answer the following questions about cache coherency protocols in a dual-processor system. a) If each processor...
Answer the following questions about cache coherency protocols in a dual-processor system. a) If each processor has a separate cache, what is the main advantage of the 4-state MESI snoopy cache coherency protocol compared to a snoopy cache coherency protocol that uses only 3 states M, S and I (modified, shared and invalid)? b) Suppose that processor P1 (in a dual-processor system) writes to a memory block. A copy of this same memory block is already in a modified line...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT