Assess the techniques used for memory management policy and


IT professionals are often called upon to make decisions, provide recommendations, arid perform analyses that require an in-depth understanding of the inner workings of an operating system.

This assumptive assessment will provide students with the knowledge and skills required to achieve and maintain this level of understanding. throughout their careers.

For the summative assessment, students will perform a technical evaluation of an operating system. Students will perform a technical evaluation of operating systems to analyze. Students will use real-time and log-based tools, empirical observation, and scholarly research to ansh.yle :he :ore subsystems of the operating system.

For each subsystem, students will research and describe the technology used in that subsystem and compare it to other available technologies.

For the final report, students will assess the results of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved.

For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global enterprise that provides premium technical support to other enterprise businesses.

Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management, maintenance, and performance.

The scope of the evaluation will include analyses and assessments of the hardware-software interface, the techniques used to implement processes and threads, the file systems supported by the operating system, the input/output subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed technology review.

MHO will provide tools to support analysis of some commonly used operating systems, but you may select another operating system if you have the resources to do so. There will also be several milestones throughout the course that will allow you to develop the evaluation incrementally.

The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Three, and Seven. Your final report will be submitted in Module Nine.

Prompt

Your technical evaluation of an operating system should include analyses and assessments of the hardware-software interface, the techniques used to implement processes and threads, the file systems supported by the operating system, the I/O subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed technology review.

Specifically, the following critical elements must be addressed:

I. Organizational Needs and Requirements

A. Develop an organizational profile that analyzes the tasks performed by the organization, the computer applications in use or expected to be in use, and the estimated system loads anticipated for the operating system.

B. What are the organizational, security, and performance and reliability requirements related to operating system function, management, and maintenance?

II. Computer Architecture

A. What hardware is required to host the operating system? This should include an identification of the minimal hardware required and an assessment of what would be needed to support organizational needs and requirements.

B. Analyze the architecture in terms of support and functionality of process management, memory management, If 0, and mass storage.

C. Analyze the architectural support for multiprocessor systems and assess the organization, connection, and control aspects. What are some architectural issues that might arise regarding technologies used in multiprocessor systems and how would you recommend utilizing multiprocessor systems in light of these issues?

III. Process Management

A. Assess the operating system process management in terms of its responsiveness to organizational requirements. Use process monitoring tools to gather data for your assessment.

B. Assess software tools for thread analysis and deadlock detection that are available for the operating system. What strategies does the operating system provide for handling deadlocks?

C. What support does the operating system provide for multiprocessing? Assess the applicability and ability of the operating system to allocate tasks between multiple processors.

IV. Memory Management

A. Describe how the types of memory supported by the operating system are used. What memory abstraction does the system use? Use an analysis tool to investigate the mapping to physical memory.

B. Describe the system support for virtual memory, memory paging, and segmentation. Use a monitoring tool to assess their activity under heavily loaded conditions.

C. Assess the techniques used for memory management policy and mechanism separation and their utility in managing complexity.

V. If I/O and Mass Storage

A. Describe the hardware-software interface for I/O management used by the operating system. Various techniques are used for enabling the operating system to communicate with devices. What techniques are supported and what are their advantages and disadvantages?

B.Analyze the file systems supported by the operating system. Use file system performance tests to assess the available file systems.

C.What is the relationship between scheduled process context switching and I/O interrupt handling? Analyze the use of device interrupts in the operating system and compare them to other possible approaches to input/output.

VI. Security

A. What formal security model does the system support? Analyze the system to determine what support it provides for implementing security models and assess the relevant tools and services made available to administrators.

B. Recommend techniques and best practices to further support security of the operating system.

VII. Overall Evaluation: Using the defined requirements, analyses, and assessments, develop a comprehensive detailed technology

Recommendation. Include an integrated assessment of the operating system's capability to support organizational needs and technical requirements.

Have you incorporated all of the feedback and suggestions you received from your instructor?

b) Does your submission address all of the critical elements outlined above?

c) Does the operating system you selected match the specific requirements your organization identified?

d) Do you have title and references pages?

e) Is your submission at least 15 pages of content not including title and reference pages?

f) Have you supported each of your positions with a credible source?

g) Have you properly cited your sources and made proper attribution for any copyrighted graphics or photos?

h) Does your submission make a clearly stated recommendation for an operating system?

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Assess the techniques used for memory management policy and
Reference No:- TGS02899671

Expected delivery within 24 Hours