Ask Question, Ask an Expert


Ask Computer Engineering Expert

1. Describe in detail the consistency model of the distributed file system (GFS or AFS). Present the consistency model selected and how it was achieved through design. Clarity of presentation matters, so take your time to formulate your answer clearly.

2. Suppose you are provided a uniprocessor system with one gigabyte of memory and a 300 gigabyte disk. The OS on the machine has a demand paged virtual memory system with a local page replacement policy and a multi-level feedback queue (MLFQ) CPU scheduler. On the system there are two compute-intensive jobs running: Job-A and Job-B. Job-A has a working set of 50 gigabytes while Job-B has a working set of 100 megabytes. Suppose you left the system to execute for a while till it reached a steady state with both jobs running.

a. Which job will you expect to have a higher CPU scheduling priority from MLFQ scheduler?

b. Suppose you add the second CPU to system, how will this affect priorities of the jobs?

c. Suppose you switch from a local to the global page replacement policy, how does this alteration affect priorities of the jobs? Justify your answer and state any assumptions you make.

3. Consider organization of a UNIX file as represented by the inode. Suppose there are 13 direct block pointers and a singly, doubly and triply indirect pointer in each inode. Further, Suppose that system block size and the disk sector size are both 4K. If the disk block pointer is 32 bits, then:

a. Find the maximum file size supported by this system?

b. Supposing no information other than file inode is already in main memory, how many disk accesses are needed to access the byte in position 5Y3+100, where Y=1024?

4.a. Define the term “deadlock”. There are four conditions which should hold before deadlock is possible. Name them.

b. Outline the algorithm which detects whether there is a deadlock. The algorithm must be able to cope with multiple types of resources, each type having a limited number of units available.

c. When must the algorithm be invoked? The answer to this problem might depend on system characteristics like the rate of resource requests, the granularity of resources, and the expected rate of deadlock. List three possible choices and discuss the criteria you will use to choose among them.

5. Assume an instruction takes 1 nanosecond to execute (on average), a page fault takes 20 microseconds of processor time, and it takes 300 microseconds of disk time to read or prepare a single page. Assume that on average, 1/2 of the pages are modified. What is the average number of instructions between page faults which will cause the disk to be busy doing page transfers all the time?

6. List three broad design goals of the ESX memory management system, and briefly outline how the design meets those goals.

7. Consider a system implementing multilevel feedback queue scheduling. What strategy could a computer user employ to maximize amount of CPU time allocated to the user’s process?

8. Your OS has a set of queues, each of which is protected by a lock. To enqueue or dequeue an item, a thread should hold the lock associated to the queue. 

You require to implement an atomic transfer routine which dequeues an item from one queue and enqueues it on another. The transfer should appear to occur atomically. This is your first attempt:

void transfer(Queue *q1, Queue *q2) {
Item thing; /* the thing being transferred */
q1->lock.Acquire(); thing = q1->Dequeue(); if (thing != NULL){
q2->lock.Acquire(); q2->Enqueue(thing); q2->lock.Release();
} q1->lock.Release()

You might suppose that q1 and q2 never refer to the same queue. Also, suppose that you have a function Queue::Address which takes a queue and returns, as an unsigned integer, its address in memory.

a. Describe how using this implementation of transfer leads to deadlock; 

b. prepare a modified version of transfer which avoids deadlock and does the transfer atomically;

c. If the transfer does not require to be atomic, how may you modify your solution to achieve a higher degree of concurrency? Justify how your modification increases concurrency.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91856

Have any Question? 

Related Questions in Computer Engineering

Assume that we have an isolated as running rip we can say

Assume that we have an isolated AS running RIP. We can say that we have at least two different kinds of datagram traffic in this AS. The first kind carries the messages exchanged between hosts; the second carries message ...

Describe the facilitators role in a virtual team what tools

Describe the Facilitator's Role in a virtual team. What tools can a facilitator use to ensure High Impact Virtual Meeting? What are the keys to giving/ receiving constructive feedback? How is feedback different in a one- ...

1 explain how dhcp can be used when the size of the block

1. Explain how DHCP can be used when the size of the block assigned to an organization is less than the number of hosts in the organization. 2. Compare NAT and DHCP. Both can solve the problem of a shortage of addresses ...

Compose a safety policy statement for your current

Compose a safety policy statement for your current organization (or an organization for which you previously worked), following the guidelines in the course textbook. Be certain it is specific to the organization and not ...

Powerpoint presentationin this presentation you will

PowerPoint Presentation In this presentation, you will describe the different data types and give examples of each. Conduct a brief research on the Internet about different data types. This research should supplement you ...

1 list and describe the three fundamental ways that data

1. List and describe the three fundamental ways that data can be intercepted. How does a physcial security program protect against each of these data interception methods? 2. What can you do to reduce the risk of laptop ...

1 find at least two new coin denominations that make the

1. Find at least two new coin denominations that make the greedy algorithm for coin changing shown in the chapter produce suboptimal results. 2. Using a "commercial" compression program, such as WinZip, compress a small ...

1 prove that any file in the dgux system with a link count

1. Prove that any file in the DG/UX system with a link count greater than 1 must have an explicit MAC label. 2. In the DG/UX system, why is the virus prevention region below the user region? 3. In the DG/UX system, why i ...

The wolf sheep simple model explores two animal species

The Wolf Sheep Simple model explores two animal species interacting, but most ecologies have many more animal species. Create a third species in the model. One interesting way to do this would be to create a species that ...

For the following we assume aes with 192-bit key length

For the following, we assume AES with 192-bit key length. Furthermore, let us assume an ASIC which can check 3 · 107 keys per second. 1. If we use 100,000 such ICs in parallel, how long does an average key search take? C ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro