Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1 Introduction

In this assignment, you require to experiment with computer system measurements. At first, pick a platform to study. Any Unix-based system (such as a PC running some version of Linux) is acceptable (no Windows-based systems please). Secondly, perform some simple experiments, which you design to bring out various properties of the file system under test. Thirdly, generate plots to demonstrate properties – call them “empirical proofs”. At last, prepare up what you did.

2 Problem

In this assignment, we shall explore inner-workings of the file system. In a Unix based file system, suppose we have the following system calls to work with: open(), close(), read(), prepare(), lseek(), and fsync(). Use man pages to find more information about working of these calls.

The assignment is based on writing code snippets which help in measuring time taken to do a variety of file system operations.

Step1. Platform. Choose a Unix-based platform to work on. This may very likely be something like a PC running Linux, but feel free to experiment with whatever system you have access to, e.g., FreeBSD, some old UNIX system like AIX, or even Mac OS X. However, it should be a Unix-based system.

Step2. Timers. The accuracy and granularity of the timer the is being used would have a large effect on your measurements. Hence, you must use the best timer 1available. Fortunately, on x86 platforms, a highly correct cycle counter is already available. The instruction to use it is known as rdtsc, and it returns a 64-bit cycle count. By knowing the cycle time, one could easily convert result of rdtsc into useful time.

First thing is to figure out how to utilize rdtsc or its analogue (you could use Google to determine more about it). Then, you require to get a cycle count, convert the result into seconds and measure how long something takes to run (e.g., a program which calls sleep(10) and exits must run for about 10 seconds). Confirm whether results make sense by comparing them with the less correct but reliable counter like  gettimeofday. Note that confirmation of timer accuracy is highly significant.

Step3. Measuring the file system. After getting the timer in order, measurements have to be recorded for the file system which is being used. All measurements must be taken on the local disk of some machine, Do not measure performance of a distributed file system, like, the CSE home directory. If you aren't using your own machine, you may consider Linux Lab in which case you may want to work in /tmp.

The experiments which are designed must address the following problems.

1. How big is the block size used by file system to read data? use reads of varying sizes and plot the time it takes to do such reads. Also, be wary of prefetching effects which often kick in during sequential reads.

2. During a sequential read of a large file, how much data is prefetched by file system? Time each read and plot time per read.

3. How big is the file cache? Repeated reads to a group of blocks that fit in cache would be very fast; repeated reads to a group of blocks that don't fit in cache would be slow.

4. How many direct pointers are in the inode? Think about using prepare() and  sync() to answer this problem. Or use read(). Also, think about what happens when you extend a file and all of a sudden an indirect pointer has to be allocated – how many more prepares happen at that point?

In the prepare-up, there must be one or more plots that help answer the problems above. Also, try to critique the answers by posing problems like, are the conclusions you draw foolproof? Or are they simply hypotheses? A main issue with any data collection is, how convincing are the numbers? How does one deal with experimental noise? etc. You must use repetition to increase the confidence, like, take multiple measurements of an event, and find out (for ex) an average over many runs instead of the result from just a single experiment.

Step 4. Writing it up. After the experiments, follow the below mentioned format to prepare the paper (report).

1. Title: The title must be descriptive and fit in one line across page.

2. Author: This must be right under the title, says who you are.

3. Abstract: This is the paper in brief and must state the basic contents and conclusions of the paper. In general, the abstract is an advertisement which  must draw the reader into reading your paper, without being misleading. It must be complete enough to understand what would be covered in the paper. Do not be afraid of giving away the ending!

4. Intro: This is a brief overview of what you did, and what you learnt. This must contain more motivation than the abstract. Again, ensure you include your main conclusions.

5. Methodology: This must answer problems like, what you measured in the file system and how you went about doing it. Include something about your timer accuracy, as well as a description of the platform you used to the level of detail such that someone else can reproduce the similar experiments elsewhere.

6. Results: This section must mainly consist plots, each addressing the problems above. Ensure that graphs have axes labeled (including units).

Also include code snippets with each plot (or some rough description of the methodology used to conduct the experiment) so that the reader could follow your idea. This must be followed by conclusions for each of the plots.

7. Conclusions: Summarize the conclusions here, and discuss things you have learnt during this experimentation.

Note. This paper (report) should be at most 6 pages long (including everything), in 10 point, double column format.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91733

Have any Question? 


Related Questions in Computer Engineering

1 discuss by giving extensive examples the claim put

1. Discuss, by giving extensive examples, the claim put forward by Berghel that computer forensics investigators and network forensics investigators have similar levels of skills. 2. It has been stated on many occasions ...

1 can a router combine the advertisement of a link and a

1. Can a router combine the advertisement of a link and a network in a single link-state update? 2. Explain why we can have different intradomain routing protocols in different ASs, but we need only one interdomain routi ...

Crossing disciplines at the end of the chapter we

Crossing disciplines At the end of the chapter, we speculated on how the Wolf Sheep Simple model might be construed as, or converted into, a model of companies moving around in a marketplace searching for resources. Deve ...

Homework1 determining the format of the number to be

HOMEWORK 1) Determining the format of the number to be entered first (binary, decimal and hexadecimal) This should be done using the CheckBoxes found in the interface. - Access to the other two text boxes outside the rel ...

A variation on the basic binary algorithm involves not

A variation on the basic binary algorithm involves not centering the algorithm around the lower and upper limits. Instead, two alternate parameters are maintained, one that points to the middle of the array segment still ...

A food processing company makes meatloaf to be sold in the

A food processing company makes meatloaf to be sold in the frozen food section of supermarkets. Each week the recipe used changes based on the current cost of ingredients. Ingredients and current costs are as shown below ...

Alternative matrixdesign alternatives have to be thoroughly

Alternative Matrix Design alternatives have to be thoroughly considered. There must be a process to fairly evaluate the pros and cons of each option. Let's look at how the alternative matrix can help facilitate the desig ...

Computer aided engineering final examq1 figure shows a

Computer Aided Engineering Final Exam Q1. Figure shows a concrete reinforced slab undergoing deflection under its own weight. Using the FEM principles (stiffness method), calculate a. Deflection and reactions at the node ...

Database design consider the following supply chain

Database design . Consider the following Supply Chain information system description. The system should support a collaborative supply chain composed of suppliers, manufacturers, shippers, and end customers. Items of dif ...

The text derives the following formula for the difference

The text derives the following formula for the difference of a product: How can this formula be correct, when the left-hand side is symmetric with respect to u and v but the right-hand side is not?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen