Get help from the best in academic writing.



Research a processor architecture and how it supports virtual memory.

Post a 2- to 3-paragraph analysis of the processor’s support for virtual memory. Do the following:

Summarize how the processor architecture supports virtual memory.

Identify at least two advantages and two disadvantages in its virtual memory support.

Explain what effects (positive or negative) the architecture’s virtual memory support has on application software.

Discussion #2

For this Discussion, you will evaluate the failure of a distributed application and analyze where in the OSI Model the failure may be related to.

To prepare:

Consider a distributed application that you use and for which you have experienced a recent failure.

Post a 2- to 3-paragraph evaluation of the application failure you dealt with. Do the following:

Describe the application and the failure.

Analyze the failure relative to each layer of the OSI model. For each layer, identify and describe at least one service from that layer that may have failed and caused the application failure you experienced.

Explain which layer you consider to be the most likely cause of the failure you experienced and why.

Answer these students:

Respond two of your colleagues’ postings in one or more of the following ways:

Ask a probing question.

Share an insight from having read your colleague’s posting.

Offer and support an opinion.

Validate an idea with your own experience.

Make a suggestion.

Expand on your colleague’s posting.

Student # 1

Evaluating Techniques to Ensure Atomicity and Concurrency Control

Modern Operating Systems (OS) like Windows 10, Linux (Various flavors) and Apple’s iOS run multiple programs at the same time. The single program can run several threads of control at the same time. There is always a chance that threads that are running might be accessing shared information concurrently. Thus, it becomes necessary to regulate concurrency control. Concurrency control is all about ensuring that the processes are constrained to avoid accessing shared information at the same time (Weihl, 1998). Locking is one technique that is used to manage concurrency control.

Spinlocks put the thread in a loop and it continuously checks until the lock becomes available. The threads are active in the OS but they are not processing anything at al. The locks are mostly released dynamically but they can be released explicitly. This type of technique can be wasteful if the threads are held for a longer duration. By implementing the spin locks correctly, as they offer challenges as the programmers must take into account the possibility of simultaneous access to the lock, which could cause race conditions. Generally, such implementation is possible only with special assembly-language instructions, such as atomic test-and-set operations, and cannot be easily implemented in programming languages not supporting truly atomic operations (Silberschatz & Galvin, 1994).

Spinlocks are best implemented using the all-or-nothing atomicity. It assumes that there is no concurrency. Plus, modern Central Processing Units (CPU) are designed to handle multithreading and if it is implemented on a single core CPU, it has to wait for threaded to be


Leave a Comment

Your email address will not be published. Required fields are marked *