• Keine Ergebnisse gefunden

Faculty of Computer Science and Engineering Frankfurt University of Applied Sciences

N/A
N/A
Protected

Academic year: 2021

Aktie "Faculty of Computer Science and Engineering Frankfurt University of Applied Sciences"

Copied!
3
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Prof. Dr. Christian Baun Operating Systems (WS2021)

Faculty of Computer Science and Engineering Frankfurt University of Applied Sciences

Exercise Sheet 10

Exercise 1 (Virtualization and Emulation)

1. What is the difference between emulation and virtualization?

2. Name a drawback of emulation against virtualization.

3. How works partitioning?

4. What component of a computer distributes the physical resources to the virtual machines in the partitioning virtualization concept?

5. Which sort of computer systems usually implement partitioning?

f

Mobiltelefone

f

Desktop PCs

f

Mainframes

f

Workstations 6. How works application virtualization?

7. Name an example for application virtualization.

8. How works full virtualization?

9. What is the function of the Virtual Machine Monitor (VMM)?

10. Where runs the Virtual Machine Monitor (VMM)?

f

The VMM runs hosted as an application in the host operating system.

f

The VMM runs bare metal and replaces the host operating system.

11. Can all physical hardware resources be virtualized when full virtualization is used? If this is not possible, give an example where it does not work and explain your answer.

12. How many privilege levels contain x86-compatible CPUs?

13. In which privilege level runs the VMM?

14. In which privilege level run the VMs?

15. How get VMs access to hardware resources when full virtualization is used?

16. Name an example of a full virtualization implementation.

17. How works paravirtualization?

18. Where runs the hypervisor when paravirtualization is used?

f

The hypervisor runs hosted as an application in the host operating system.

f

The hypervisor runs bare metal and replaces the host operating system.

Content: Topics of slide set 10 Page 1 of 3

(2)

Prof. Dr. Christian Baun Operating Systems (WS2021)

Faculty of Computer Science and Engineering Frankfurt University of Applied Sciences

19. In which privilege level runs the hypervisor when paravirtualization is used?

20. Why is for paravirtualization a host operating system required?

21. What is an unprivileged domain (Dom0) of Xen?

22. What is a Domain 0 (Dom0) of Xen?

23. Name a drawback of paravirtualization.

24. In which way have the privilege levels of x86-compatible CPUs been modified to implement hardware virtualization?

25. Name an advantage of hardware virtualization.

26. How works storage operating system-level virtualization (containers/jails)?

27. Name a drawback of operating system-level virtualization (containers/jails).

28. Name an example of an operating system-level virtualization (containers/jails) implementation.

29. How works storage virtualization?

30. How works network virtualization via Virtual Local Area Networks (VLAN)?

Exercise 2 (Shell Scripts, Loops)

1. Program a shell script, which generates with loops this output:

1 22 333 4444 55555

2. Program a shell script, which generates with loops this output:

1 12 123 1234 12345

3. Program a shell script, which generates with loops this output:

|_

| |_

Content: Topics of slide set 10 Page 2 of 3

(3)

Prof. Dr. Christian Baun Operating Systems (WS2021)

Faculty of Computer Science and Engineering Frankfurt University of Applied Sciences

| | |_

| | | |_

| | | | |_

4. Program a shell script, which generates with loops this output:

*

**

***

****

*****

5. Program a shell script, which generates with loops this output:

*

**

***

****

*****

*****

****

***

**

*

6. Program a shell script, which generates with loops this output:

*

***

*****

*******

*********

Content: Topics of slide set 10 Page 3 of 3

Referenzen

ÄHNLICHE DOKUMENTE

The paper concludes with a push towards finding a global performance index through kinematic sensitivity, but is not able to find a robust method due to the

At first, we decided to divide the experimental arena into 4 blocks and apply classification algorithms to predict in which particular block the rat was in a given time based on

While certain analysis approaches in this area are concerned with the control flow of expressions or statements (control flow analysis ), others are, i.e., rather focused on

The scaling mechanisms of Mesosphere, regarding scaling up the number of instances of applications and scaling up the available resources of an application, within the meaning

We analyze how regular key management tasks like key renewal and key revocation in classic public-key infrastructure (PKI) using certificate revocation lists (CRLs) and

What component of a computer distributes the physical resources to the virtual machines in the partitioning virtualization concept.. What is the difference between emulation

Cloud Computing (WS1314) Faculty of Computer Science and Engineering Fachhochschule Frankfurt am Main.. Exercise

Pattern (d) and (e) in Figure 18 indicate the ow of information between the core entities of news media and Facebook channels with the article to article diusion and Facebook post