Computer Systems: A Programmer's Perspective (3rd Edition)
3rd Edition
ISBN: 9780134092669
Author: Bryant, Randal E. Bryant, David R. O'Hallaron, David R., Randal E.; O'Hallaron, Bryant/O'hallaron
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 11.5, Problem 11.5PP
Program Plan Intro
IP addresses:
- The IP address denotes an unsigned integer that is 32-bit.
- The IP addresses is been stored by network programs in IP address structure.
- The addresses present in IP address structure are stored in network byte order.
- An unsigned 32-bit integer is converted from host byte order to network byte order by “htonl” function.
- An unsigned 32-bit integer is converted from network byte order host byte order by “ntohl” function.
- The IP address is presented to humans in a form known as “dotted-decimal” notation.
- Each byte is been represented by its corresponding decimal value and is separated by a period from other bytes.
Passing
- The arguments for “GET” requests are passed in the URI.
- The character “?” separates filename from the arguments.
- The character “&” separates each argument.
- The arguments do not allow spaces in it.
Server passes arguments to child:
- The server calls “fork” to create a child process and calls “execve” to run program in child’s context once it receives a request.
- The child process sets CGI environment variable values.
- The “adder” program can reference it at run time using “getenv” function of linux.
Output is sent by child:
- The dynamic content of a CGI program is to be sent to standard output.
- A CGI program sends dynamic content to standard output.
- It uses “dup2” function for redirecting standard output to connected descriptor associated with client.
- The result written to standard output by CGI program, it goes directly to client.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Media applications that play audio or video files are part of a class of workloads called "streaming" workloads i.e., they bring in large
amounts of data but do not reuse much of it. Consider a video streaming workload that accesses a 512 KiB working set sequentially
with the following address stream:
0, 1, 2, 3, 4, 5, 6, 7, 8, 9....
(a) Assume a 64 KiB direct-mapped cache with a 32-byte block. What is the miss rate for the address stream above? How is this miss
rate sensitive to the size of the cache or the working set? How would you categorize the misses this workload is experiencing,
based on the 3C model?
(b) Re-compute the miss rate when the cache block size is 16 bytes, 64 bytes, and 128 bytes. What kind of locality is this workload
exploiting?
(c) "Prefetching" is a technique that leverages predictable address patterns to speculatively bring in additional cache blocks when a
particular cache block is accessed. One example of prefetching is a stream buffer that prefetches…
Question 1 In your own words, compare the real and protected modes of
80286
Question 2 Instead of just using the traditional way of address translation
(similar to 8086) why do you think there comes the necessity of using selectors
and descriptors in 80286? –
Question 3 In your opinion, what advantage do we receive from using privi-
lege levels? – : : ':
What is the addressing mode for each of the following.
MOV CX, [SI]
MOV CX, [DI + 0A2H]
JZ 0CH
MOV CL, DH
MOV DX, [BP + DI + 0CH]
MOV DL, 08H
MOV BX, [1354H]
MOV AX, [BX + 08H]
Chapter 11 Solutions
Computer Systems: A Programmer's Perspective (3rd Edition)
Ch. 11.3 - Prob. 11.1PPCh. 11.3 - Prob. 11.2PPCh. 11.3 - Practice Problem 11.3 (solution page 967) Write a...Ch. 11.4 - Prob. 11.4PPCh. 11.5 - Prob. 11.5PPCh. 11 - Prob. 11.6HWCh. 11 - Prob. 11.7HWCh. 11 - Prob. 11.8HWCh. 11 - Modify TINY SO that when it serves static content,...Ch. 11 - Prob. 11.10HW
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- a) A paging system with 512 pages of logical address space, a page size of 28 and number of frames is 1024. Answer the following questions (in bytes or in form 2") and show all your work. i. ii. iii. iv. V. vi. vii. Page number 1 2 3 4 5 6 7 Frame number 100 50 180 10 79 644 21 301 What is the total size of the logical address space? [2] What is the total size of the physical address space? [2] What is the frame size of the physical memory? [1] How many frames of the physical memory in a number of the form 2”? [1] How many number of entry in the page table? [1] What is the number of bit for the page number in logical memory address and frame number in physical memory address? [2] What is the logical address (in decimal) given a physical address of 1010000100102. [2]arrow_forwardAccording to the following table if the destination address is 11001000 00010111 00011100 10101010 Destination Address Range Link interface 11001000 00010111 00010*** ********* 11001000 00010111 00011000 ********* 1 11001000 00010111 00011*** ***** 2 otherwise 3 The link interface will be O A 1 OB. 3 OC. O D.0arrow_forwardMicroprocessor and Assembly Languagearrow_forward
- Assume that printer interrupt priority: 2, disk interrupt priority:4, Ethernet interrupt priority: 5. A user program starts at t = 0 and takes 40 seconds to complete.At t = 10, a disk interrupt occurs, takes 5 seconds to complete ISR (Interrupt Service Routine) At t = 12, a printer interrupt occurs, takes 10s to complete ISR At t = 20, ethernet interrupt occurs, takes 5s to complete ISR Which of ISRs is executed at t = 13s and please explain why ?*show solution stepsarrow_forward3 a) Let us assume that the CS and IP values of the base and offset of an ISR are 1210h and 1010h. The ISR is 8 lines of code where each line takes 2 bits to be stored. At which address, shall we find the IRET instruction? b) Describe the process that would take place if an interrupt arises at the IR0 pin of 8259A while servicing an interrupt that arose at IR3 pin of 8259A. You are expected to refer to the 3 registers in particular.arrow_forwardQUESTION 2 Each block of data in a computer's hard drive is addressed with a unique number. A given computer hard drive uses a binary 8 bit number to address all 256 data blocks. If a computer designer wants to double the number of addressable data blocks to 512, the MINIMUM humber of bits of the address length is: O 2 BITS O 257 BITS O 9 BITS O can not be determined from the data presented O 18 BITS O g² BITS O 512 BITSarrow_forward
- Consider a system which employs an interrupt driven I/O for a particular device that transfer data at an average of 10 KBps on a continuous basis. Assume that interrupt processing takes about 100 µs (i.e. jump to the interrupt service routine (ISR); execute it and return to the main program). The fraction of processor time which is consumed by this I/O device when it is interrupted for every byte will be ?arrow_forwardPlease provide Handwritten answerarrow_forward2. Create a new asm project "Lab2_Q2.asm". Assume that port B 8255A PPI is the source for 256 bytes of data to 8085. Write assembly code to receive data from port B of 8255A PPI with a delay of 500 ms. After that, save the received data at memory locations starting at 2000H.arrow_forward
- QUESTION 2 Discuss with examples the main difference between system programming and application programming and explain in your own words how each of these can be carried out in the computer system. With your knowledge in memory addressing modes and using the given opcodes LDA = 00 0000 0000 (00) 0 (x) What will be the content of the address loaded into the accumulator? b. With your knowledge in memory addressing mods and using the given opcodes STCH = OX54 Buffer = 1000 0101 0100 (00) 1 (x) 000 1000 0000 0000 () 011 0000 0000 0000 () What will be target address? Briefly explain the usage of the JSUB and RSUB instruction sets in an SIC architecture codingarrow_forward1.compare the real and protected modes of 80286 2. Instead of just using the traditional way of address translation (similar to 8086) why do you think there comes the necessity of using selectors and descriptors in 80286? 3.what advantage do we receive from using privilege levels?arrow_forwardoperating systemarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning