Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Virtual Machine Usage and File Allocation Methods

Determining Suitable Hypervisor for Virtual Machines

Question 1(a)Usage of virtual machine is getting more important in the modern world. Determine and explain whetherType 1 or Type 2 hypervisor is more suitable for the following scenario.“A company has recently purchased a high-end physical server, and the server is to be used to host 4 virtual machines. 2 virtual machines will be running Redhat Enterprise Linux which will be used for real-time system. The other 2 virtual machines will be running Windows Server 2019 Standard and will be used for training purpose.”File management uses different file allocation methods. Two of the file allocation methods are chain allocation method and contiguous allocation method. Referring to Figure Q1(b), which the shaded blocks indicate blocks that are already used by existing files. FigureQ1(b)Sketch and demonstrate howthe disk diagram(with a file allocation table that only indicates the new file)looks like if anew file that has a length of 6, and starts at block 1, are to be written to the diskfor each of the following method.(i)chain allocation method(ii) contiguous allocation methodState your reasons if the new file cannot be written to the disk.(c)Contrast the following two devices on their “operating system” using the ability to evolve objective of operating system.-A traditional microwave oven-An iPadQuestion 2(a)Create ONE (1)bash shell script (using a “for” loop) to implement the following tasks which are related to file and folder access control. All the tasks need to be implemented inside the “for” loop and the root user will execute the bash shell script.?Create THREE (3)files (Happy1, Happy2, Happy3) in the current folder Write today’s date (with the format of YYYY-MM-DD) in each of the file Append another line “keep a 2m distance” in each of the file?Change the owner of the file to ‘Tony’ (assume that there is a user “Tony” and you do not have to create this user)Change the permission of each file such that the owner can read, write and execute, the group can readandwrite, whereas all others can read Move each of the file to the /tmpfolder if the file does not already exist in /tmp?Display the owner and permissions of file Happy2 in the /tmp folder (only display once for the execution of the whole script)(b)Two countermeasures to security threats areauthentication and access control. Justify the validity of the following statement.“Authentication systemis useless without access controlsystem”Question 3(a)Paging is an important concept in memory management. Sketch the page tables for process A, B, C, D and free frame list for Figure Q3(a).FigureQ3(a)(b)Short-term scheduling determines which process will be executed by the processor. Illustrate by sketching the execution pattern to describe the Shortest Remaining Timescheduling algorithm by referring to Table Q3(b). ProcessArrival TimeService Time Q3(b) Question 1(a)Usage of virtual machine is getting more important in the modern world. Determine and explain whetherType 1 or Type 2 hypervisor is more suitable for the following scenario.“A company has recently purchased a high-end physical server, and the server is to be used to host 4 virtual machines. 2 virtual machines will be running Redhat Enterprise Linux which will be used for real-time system. The other 2 virtual machines will be running Windows Server 2019 Standard and will be used for training purpose.”(b)File management uses different file allocation methods. Two of the file allocation methods are chain allocation method and contiguous allocation method. Referring to Figure Q1(b), which the shaded blocks indicate blocks that are already used by existing files. FigureQ1(b)Sketch and demonstrate howthe disk diagram(with a file allocation table that only indicates the new file)looks like if anew file that has a length of 6, and starts at block 1, are to be written to the diskfor each of the following method.(i)chain allocation method(ii) contiguous allocation methodState your reasons if the new file cannot be written to the disk.(c)Contrast the following two devices on their “operating system” using the ability to evolve objective of operating system.-A traditional microwave oven-An iPad 2021Question 2(a)Create ONE (1)bash shell script (using a “for” loop) to implement the following tasks which are related to file and folder access control. All the tasks need to be implemented inside the “for” loop and the root user will execute the bash shell script. Create THREE (3)files (Happy1, Happy2, Happy3) in the current folder Write today’s date (with the format of YYYY-MM-DD) in each of the file Append another line “keep a 2m distance” in each of the file Change the owner of the file to ‘Tony’ (assume that there is a user “Tony” and you do not have to create this user) Change the permission of each file such that the owner can read, write and execute, the group can readandwrite, whereas all others can read Move each of the file to the /tmpfolder if the file does not already exist in /tmp Display the owner and permissions of file Happy2 in the /tmp folder (only display once for the execution of the whole script)(b)Two countermeasures to security threats areauthentication and access control. Justify the validity of the following statement.“Authentication systemis useless without access controlsystem”Question 3(a)Paging is an important concept in memory management. Sketch the page tables for process A, B, C, D and free frame list for Figure Q3(a).FigureQ3(a)(b)Short-term scheduling determines which process will be executed by the processor. Illustrate by sketching the execution pattern to describe the Shortest Remaining Timescheduling algorithm by referring to Table Q3(b). ProcessArrival TimeService Time Q3(b)Question 4(a)Explain why programmed I/O is slow by using an example.(4 marks)(b)A server comes with 5 hard disks and each hard disk is having a storage size of 500GB. Calculate the usable space (in TB, 2 decimal places) if the server is using the following RAID system.(i) RAID 0(ii) RAID 5(iii) RAID 6(c)Contrasting the different layers of an OS involves understanding the different layers. Hard disk is an example in the hardware layer that is controlled by the OS. Ability to calculate metricsrelated to hard disk is thus an important task.A disk is having an average seek time of 6 ms, and 2000 sectors per track with each sector having 512 bytes. The total time to read a file of 1000 sectors is 22 ms. Calculate the rotational speed of the disk in rps (revolution per second).(10 marks)

support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close