Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1 Introduction

In this assignment, you require to experiment with computer system measurements. At first, pick a platform to study. Any Unix-based system (such as a PC running some version of Linux) is acceptable (no Windows-based systems please). Secondly, perform some simple experiments, which you design to bring out various properties of the file system under test. Thirdly, generate plots to demonstrate properties – call them “empirical proofs”. At last, prepare up what you did.

2 Problem

In this assignment, we shall explore inner-workings of the file system. In a Unix based file system, suppose we have the following system calls to work with: open(), close(), read(), prepare(), lseek(), and fsync(). Use man pages to find more information about working of these calls.

The assignment is based on writing code snippets which help in measuring time taken to do a variety of file system operations.

Step1. Platform. Choose a Unix-based platform to work on. This may very likely be something like a PC running Linux, but feel free to experiment with whatever system you have access to, e.g., FreeBSD, some old UNIX system like AIX, or even Mac OS X. However, it should be a Unix-based system.

Step2. Timers. The accuracy and granularity of the timer the is being used would have a large effect on your measurements. Hence, you must use the best timer 1available. Fortunately, on x86 platforms, a highly correct cycle counter is already available. The instruction to use it is known as rdtsc, and it returns a 64-bit cycle count. By knowing the cycle time, one could easily convert result of rdtsc into useful time.

First thing is to figure out how to utilize rdtsc or its analogue (you could use Google to determine more about it). Then, you require to get a cycle count, convert the result into seconds and measure how long something takes to run (e.g., a program which calls sleep(10) and exits must run for about 10 seconds). Confirm whether results make sense by comparing them with the less correct but reliable counter like  gettimeofday. Note that confirmation of timer accuracy is highly significant.

Step3. Measuring the file system. After getting the timer in order, measurements have to be recorded for the file system which is being used. All measurements must be taken on the local disk of some machine, Do not measure performance of a distributed file system, like, the CSE home directory. If you aren't using your own machine, you may consider Linux Lab in which case you may want to work in /tmp.

The experiments which are designed must address the following problems.

1. How big is the block size used by file system to read data? use reads of varying sizes and plot the time it takes to do such reads. Also, be wary of prefetching effects which often kick in during sequential reads.

2. During a sequential read of a large file, how much data is prefetched by file system? Time each read and plot time per read.

3. How big is the file cache? Repeated reads to a group of blocks that fit in cache would be very fast; repeated reads to a group of blocks that don't fit in cache would be slow.

4. How many direct pointers are in the inode? Think about using prepare() and  sync() to answer this problem. Or use read(). Also, think about what happens when you extend a file and all of a sudden an indirect pointer has to be allocated – how many more prepares happen at that point?

In the prepare-up, there must be one or more plots that help answer the problems above. Also, try to critique the answers by posing problems like, are the conclusions you draw foolproof? Or are they simply hypotheses? A main issue with any data collection is, how convincing are the numbers? How does one deal with experimental noise? etc. You must use repetition to increase the confidence, like, take multiple measurements of an event, and find out (for ex) an average over many runs instead of the result from just a single experiment.

Step 4. Writing it up. After the experiments, follow the below mentioned format to prepare the paper (report).

1. Title: The title must be descriptive and fit in one line across page.

2. Author: This must be right under the title, says who you are.

3. Abstract: This is the paper in brief and must state the basic contents and conclusions of the paper. In general, the abstract is an advertisement which  must draw the reader into reading your paper, without being misleading. It must be complete enough to understand what would be covered in the paper. Do not be afraid of giving away the ending!

4. Intro: This is a brief overview of what you did, and what you learnt. This must contain more motivation than the abstract. Again, ensure you include your main conclusions.

5. Methodology: This must answer problems like, what you measured in the file system and how you went about doing it. Include something about your timer accuracy, as well as a description of the platform you used to the level of detail such that someone else can reproduce the similar experiments elsewhere.

6. Results: This section must mainly consist plots, each addressing the problems above. Ensure that graphs have axes labeled (including units).

Also include code snippets with each plot (or some rough description of the methodology used to conduct the experiment) so that the reader could follow your idea. This must be followed by conclusions for each of the plots.

7. Conclusions: Summarize the conclusions here, and discuss things you have learnt during this experimentation.

Note. This paper (report) should be at most 6 pages long (including everything), in 10 point, double column format.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91733

Have any Question? 


Related Questions in Computer Engineering

In this problem we will examine why techniques that work

In this problem, we will examine why techniques that work nicely for error correction codes are not suited as cryptographic hash functions. We look at a hash function that computes an 8-bit hash value by applying the fol ...

A 2 gb ie 2 230nbspbyte memory system with 32-bit

A 2 GB (i.e., 2 * 2 30  byte) memory system with 32-bit addresses is used with a 4-way set associative cache that contains a total of 65536 lines (each line is 512 bytes in size).  How many different memory blocks could ...

1 what type of topology is used when customers in an area

1. What type of topology is used when customers in an area use DSL modems for data transfer purposes? Explain. 2. What are the user data rates of STS-3, STS-9, and STS-12? 3. Show how STS-9s can be multiplexed to create ...

1 what is a vulnerability what do you understand by a

1. What is a vulnerability? What do you understand by a system vulnerability? 2. Discuss four sources of system vulnerabilities. 3. What are the best ways to identify system vulnerabilities? 4. What is innovative misuse? ...

Project descriptionthe programming project provides you

PROJECT DESCRIPTION The Programming Project provides you with a chance to develop and display your computer programming skills using Visual Basic. The project consists of four (4) programming problems based on programmin ...

1 please explain the standard file permissions in the linux

1). Please explain the Standard file permissions in the Linux. And also explain the different types of permissions. (Elaborate your Answers with examples and also run commands in the Linux machine). 2). Why chgrp & chown ...

1 how does technological obsolescence constitute a threat

1. How does technological obsolescence constitute a threat to information security? How can an organization protect against it? 2. Does the intellectual property owned by an organization usually have value? If so, how ca ...

Database design consider the following supply chain

Database design . Consider the following Supply Chain information system description. The system should support a collaborative supply chain composed of suppliers, manufacturers, shippers, and end customers. Items of dif ...

Would you recommend using the routing table that has a

Would you recommend using the routing table that has a default route or hasn't? Please explain the advantage and disadvantages.

The leadership of gti has chosen oracleregnbspfor their

The leadership of GTI has chosen Oracle ®  for their Enterprise Application System, but some members of the leadership team are skeptical of this solution. They have asked you to provide them with a report describing the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen