|
15-410 Homework 2This homework assignment is due Friday, December 5th at 23:59:59. As we intend to make solutions available on the web site immediately thereafter, . If you wish to turn in your homework on paper, you may do so, but due to the lack of a timestamped drop-box, you will need to bring the paper portion of it to 3503 Wean Hall by 17:00. Homework must be submitted in either PostScript or PDF format (not:
Microsoft Word, Word Perfect, Apple Works, LaTeX, XyWriter, WordStar,
etc.). Except as otherwise directed (in the crypto question), turn
in your answers as either
As usual, you may discuss this assignment with others, but you must then go off by yourself to write up the solution. Question 1 - Public Key PracticumThis question is not hard, but it does take some time to do it right. Please don't leave this question to the last minute. Follow the directions in pgp.html to generate
a PGP key ring,
containing public and private keys
for digital signature and encryption purposes.
Do not turn the key ring in to your
Question 2 - Kernel stack sizeWhen we gave out an exam question on how to compute (or approximate) the kernel stack size required by a particular kernel, we received many answers of the form "pick a size and see what happens". Measuring the behavior of a system on a particular set of inputs is dangerous, because if the inputs you choose don't cover the worst case then your answer will be inadequate. That said, measuring the typical case is often easier than computing the worst case, or at least it can be more fun. To that end, take your group's Project 3 kernel and instrument it to measure the maximum amount of kernel stack actually used by a process during a single boot.
Please note that althrough Project 3 was a group project this homework is not, so you should work by yourself with a private copy of your group's sources. Question 3 - IPC(a) On slide 14 of the IPC/RPC lecture,
I presented a brief code example and claimed there was "a problem" with it.
Draw a "system resource-allocation graph" (as presented in
the text and in class) depicting a deadlock situation that
can arise from running this code. Your graph
must depict both processes and resources, and should do so in an
accurate way. For example, it should be "sensible" for the particular
resource type(s) in question.
Also, assume that the
(b) How should an operating system deal with this sort of problem? Suggest a design and briefly defend it. Helpful HintBy the way, if you think you are having AFS permission problems,
try running the program located at
| |||||||||||
[Last modified Saturday January 10, 2004] |