Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Describe in detail the consistency model of the distributed file system (GFS or AFS). Present the consistency model selected and how it was achieved through design. Clarity of presentation matters, so take your time to formulate your answer clearly.

2. Suppose you are provided a uniprocessor system with one gigabyte of memory and a 300 gigabyte disk. The OS on the machine has a demand paged virtual memory system with a local page replacement policy and a multi-level feedback queue (MLFQ) CPU scheduler. On the system there are two compute-intensive jobs running: Job-A and Job-B. Job-A has a working set of 50 gigabytes while Job-B has a working set of 100 megabytes. Suppose you left the system to execute for a while till it reached a steady state with both jobs running.

a. Which job will you expect to have a higher CPU scheduling priority from MLFQ scheduler?

b. Suppose you add the second CPU to system, how will this affect priorities of the jobs?

c. Suppose you switch from a local to the global page replacement policy, how does this alteration affect priorities of the jobs? Justify your answer and state any assumptions you make.

3. Consider organization of a UNIX file as represented by the inode. Suppose there are 13 direct block pointers and a singly, doubly and triply indirect pointer in each inode. Further, Suppose that system block size and the disk sector size are both 4K. If the disk block pointer is 32 bits, then:

a. Find the maximum file size supported by this system?

b. Supposing no information other than file inode is already in main memory, how many disk accesses are needed to access the byte in position 5Y3+100, where Y=1024?

4.a. Define the term “deadlock”. There are four conditions which should hold before deadlock is possible. Name them.

b. Outline the algorithm which detects whether there is a deadlock. The algorithm must be able to cope with multiple types of resources, each type having a limited number of units available.

c. When must the algorithm be invoked? The answer to this problem might depend on system characteristics like the rate of resource requests, the granularity of resources, and the expected rate of deadlock. List three possible choices and discuss the criteria you will use to choose among them.

5. Assume an instruction takes 1 nanosecond to execute (on average), a page fault takes 20 microseconds of processor time, and it takes 300 microseconds of disk time to read or prepare a single page. Assume that on average, 1/2 of the pages are modified. What is the average number of instructions between page faults which will cause the disk to be busy doing page transfers all the time?

6. List three broad design goals of the ESX memory management system, and briefly outline how the design meets those goals.

7. Consider a system implementing multilevel feedback queue scheduling. What strategy could a computer user employ to maximize amount of CPU time allocated to the user’s process?

8. Your OS has a set of queues, each of which is protected by a lock. To enqueue or dequeue an item, a thread should hold the lock associated to the queue. 
}

You require to implement an atomic transfer routine which dequeues an item from one queue and enqueues it on another. The transfer should appear to occur atomically. This is your first attempt:

void transfer(Queue *q1, Queue *q2) {
Item thing; /* the thing being transferred */
q1->lock.Acquire(); thing = q1->Dequeue(); if (thing != NULL){
q2->lock.Acquire(); q2->Enqueue(thing); q2->lock.Release();
} q1->lock.Release()

You might suppose that q1 and q2 never refer to the same queue. Also, suppose that you have a function Queue::Address which takes a queue and returns, as an unsigned integer, its address in memory.

a. Describe how using this implementation of transfer leads to deadlock; 

b. prepare a modified version of transfer which avoids deadlock and does the transfer atomically;

c. If the transfer does not require to be atomic, how may you modify your solution to achieve a higher degree of concurrency? Justify how your modification increases concurrency.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91856

Have any Question? 


Related Questions in Computer Engineering

Repeat 4164 but now your predictor should be able to

Repeat 4.16.4, but now your predictor should be able to eventually (after a warm-up period during which it can make wrong predictions) start perfectly predicting both this pattern and its opposite. Your predictor should ...

You are an internal data management consultant your

You are an internal data management consultant. Your organization wishes to "know its customer" much better in order to improve customer satisfaction and identify up-sell and cross-sell opportunities. Leadership has aske ...

Assignment apple versus samsungapple ipads continue to be

Assignment : Apple versus Samsung Apple iPads continue to be successful. The Samsung Galaxy Tab is one (1) of iPad's competitors. Use the Internet and Strayer Library to research the advantages and disadvantages of these ...

1 discuss the steps you would take to protect your mobile

1. Discuss the steps you would take to protect your mobile device. 2. Search the Internet to find a company's security policy for its mobile devices. Suggest what you would change in that security policy to enhance secur ...

While there is no end to what you might write you must

While there is no end to what you might write you must convey your thoughts in essay of at least four to five pages excluding cover page and references section. Assignment: Write an essay that describes the preparation r ...

Format for the 448548 research projectpaperthe image

Format for the 448/548 Research Project/Paper The Image Processing and Computer Vision Research Project/Paper is designed to be an opportunity for you explore a particular branch of this diverse field in more depth than ...

What are the benefits of web cache and list four of the

What are the benefits of web cache and List four of the principles of the best use of cache?

Rewrite exercise 1 so that it stores the words from a text

Rewrite Exercise 1 so that it stores the words from a text file. Display all the words in the file and the number of times they occur in the file. Exercise 1 Write a program that generates 10,000 random integers in the r ...

1 who is ultimately responsible for managing a technology

1. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology? 2. What is contingency planning? How is it different from routine management plann ...

1 how is an incident response plan different from a

1. How is an incident response plan different from a disaster recovery plan? 2. What is risk appetite? Explain why risk appetite varies from organization to organization. 3. What is a cost benefit analysis?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro