Monday 9 January 2017

mit4023 smu msc it fall 2016 (jan/feb 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
4
SUBJECT CODE & NAME
MIT4023– Real Time Operating Systems
Qus:1 What is RTOS? What are its requirements?
Answer: A real-time system is one whose correctness involves both the logical correctness of outputs and their timeliness. An embedded system is a specific real-time computer system. Earlier embedded systems were designed for specialized applications but now reconfigurable and programmable embedded systems are used. Some examples of embedded systems are: the microprocessor

Qus:2 a) State RISC characteristics.
b) Why memory protection is necessary?
Answer: a) State RISC characteristics.
A real time system is often implemented on custom hardware that isspecifically designed and developed for the purpose. For example a cell phone does not use traditional microprocessors. Cell phones use processors which are tiny, supporting only those processing capabilities that are really for cell phone operation and specifically designed to be power

Qus:3 Briefly describe the followings:
(a) DROL
(b) RTC++
(c) FLEX
Answer:
(a) DROL
DROL is an object-oriented language which extends the general purpose Language C++ for distributed real-time applications. DROL is based on the idea of distributed real-time objects which have asynchronous message passing. A distributed real-time object has the properties of best effort and least suffering. Best effort is defined as a scheduling policy in which two


Qus:4 Describe the basic design principles in ROTS environment.
Answer: An embedded system with a single CPU can run only one process at an instance. The process may be either an ISR, kernel function or a task. An RTOS use in embedded system provides the following.
1. The user threads to run in kernel space(to execute fast).
2. Effective handling of ISRs, device drivers, tasks or threads and enabling and disabling of

Qus:5 Describe the following disk scheduling algorithms:
(a) Elevator algorithm
(b) D-SCAN and FD-SCAN algorithm
Answer: (a) Elevator algorithm
Classical disk scheduling schemes attempt to minimize the average seek distance. For example, in the elevator algorithm, the disk head is in either an inward-seeking phase or an outward-seeking phase. While seeking inward, it services any requests it passes until there are no


Qus:6 Explain Cryptography. Describe the components of Cryptography with a neat labeled diagram.
Answer: Cryptography, a word with Greek origins, means “Secret Writing”. However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks.
The original

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment