Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

5.5 Performance and security isolation Performance isolation is a critical condition for quality-of-service (QoS) guarantees in shared computing environments. Indeed, if the run-time behavior of

5.5 Performance and security isolation

Performance isolation is a critical condition for quality-of-service (QoS) guarantees in shared computing environments. Indeed, if the run-time behavior of an application is affected by other applications running concurrently and, thus, is competing for CPU cycles, cache, main memory, and disk and network access, it is rather difficult to predict the completion time. Moreover, it is equally difficult to optimize the application. Several operating systems, including Linux/RK [270], QLinux [343], and SILK [44], support some performance isolation, but problems still exist because one has to account for all resources used and to distribute the overhead for different system activities, including context switching and paging, to individual users a problem often described as QoS crosstalk [348].

5.1 Virtualization

Virtualization simulates the interface to a physical object by any one of four means:

1. Multiplexing. Create multiple virtual objects from one instance of a physical object. For example, a processor is multiplexed among a number of processes or threads.

2. Aggregation. Create one virtual object from multiple physical objects. For example, a number of physical disks are aggregated into a RAID disk.

3.Emulation.Constructavirtualobjectfromadifferenttypeofphysicalobject.Forexample,aphysical disk emulates a random access memory.

4. Multiplexing and emulation. Examples: Virtual memory with paging multiplexes real memory and disk, and a Virtual address emulates a real address; TCP emulates a reliable bit pipe and multiplexes a physical communication channel and a processor.

((problem quastion))

In Section 5.5 we stated that a VMM is a much simpler and better-specified system than a traditional operating system. The security vulnerability of VMMs is considerably reduced

because the systems expose a much smaller number of privileged functions. Research the literature to gather arguments in support of these affirmations. Compare the number of lines of code and system calls for several operating systems, including Linux, Solaris, FreeBSD, Ubuntu, AIX, and Windows, with the corresponding figures for several system virtual machines in Table 5.1.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Concepts of Database Management

Authors: Philip J. Pratt, Mary Z. Last

8th edition

1285427106, 978-1285427102

More Books

Students also viewed these Databases questions