Describe any similar operating-system-related challenge face

Assignment Help Computer Engineering
Reference no: EM133541795

Homework: Situation Analysis

Overview

For the project, you will evaluate a fictitious organization and develop a set of operating system requirements and a comprehensive recommendation for that organization. The goal is to leverage the cumulative knowledge you acquire in each module of this course to map operating system components to organizational challenges. Each module will have a conceptual base. You will then complete a hands -on lab by leveraging the workstation you are using to take this course. Later, you can apply the knowledge of the specific operating system commands in those labs to write about how the commands would be applied in a real-world analysis of an operating system's capabilities. Review the Top Secret, Inc. scenario below carefully to understand the nature of the problem. They make a fine product, yet they cannot use it effectively to run their own operation. Consider the differences between a simple single-purpose operating system and a general-purpose operating system and how the concepts you are learning in this course can help Top Secret, Inc. find a solution.

Scenario: Top Secret, Inc. (TSI) is a successful operating system company whose customers include Fortune 500 companies, governments throughout the world, and major U.S. contractors. TSI makes embedded operating systems for secure terminals that control ingress/egress control systems for Wall Street firms, camera systems for drone aircraft for government contractors, and alarm systems for top-secret government installations. TSI operating systems are world-renowned for their quick response to sensor input, highly reliable operation, limited memory utilization, small size on disk, and low power consumption.

GPOS Feature

TSI OS Support for GPOS Feature

Multiprogramming

TSI OS does not support more than one program running at a time. TSI customers need one program resident, and that is the program that handles sensor input and (e.g., from cameras and motion sensors). A back-office operating system requires preemptive multitasking and advanced scheduling features.

Multiprocessing

TSI OS does not support more than one processor on a physical device. The operating system locks up when interrupts are generated by a second processor. Since most processors on the market are multicore, TSI has to purchase old, decommissioned hardware with single-core processors for its data center.

Multithreading

TSI OS lacks a system call interface beyond basic file open, close, read, and write. As such, it does not provide a CreateThread() or pthread_create() API call like Windows or Linux. Back-office applications that offer multithreaded operation hang at launch, so TSI has to use open-source software so that a team of TSI software developers can remove multi-threading functionality.

Virtual Memory

TSI OS uses a flat memory model without paging. As a result, TSI OS administrators in the back office frequently have to reboot the operating systems when they crash due to insufficient memory.

System Call Interface

As previously mentioned, TSI OS has only a basic system call interface. This causes severe software compatibility issues. To get around this limitation at TSI headquarters, developers have had to modify traps to kernel mode and develop custom system call responses.

Security

Given the fact that TSI OS operates based on sensor input, it does not have any security for log in, file system modifications, or network security. In customer installations, the system is typically located on a closed TCP/IP network, so operators can quickly get access to device statistics. As a result, anyone with network access at TSI headquarters can log into any TSI OS server in the back office.

Device Drivers

TSI software developers write custom device drivers for each customer. That does not work well for the TSI back office because the variety of devices is so large and sophisticated, TSI developers are unable to code for them.

Fault Tolerance

Given the device driver limitations of TSI software developers, they are unable to code device drivers for RAID cards. As a result, all company data resides on individual SATA and SCSI drives.

The TSI Operating System (TSI OS) works exceptionally well on the devices owned by TSI customers, but it does not work well in the TSI back office. Like many startup companies, TSI had to cut costs when it launched a few years ago. To save money, the company decided not to use enterprise-class operating systems for its own workstations and servers. Instead, it chose to use a single-purpose TSI OS, reasoning that TSI OS was good enough for TSI customers, so it should be good enough for TSI. Unfortunately, TSI OS lacks many features of a modern operating system and does not take advantage of the architectural optimizations present in the latest hardware. Below is a matrix of general purpose operating system (GPOS) features and how they map to TSI OS:

Table 1: Mapping of the features found in a typical general purpose operating system compared to the TSI OS used at TSI headquarters for its back-office servers. The mapping shows that the choice of a single purpose OS for its back-office function has limitations that require an enterprise-class, general-purpose operating system.

Prompt

For this milestone, conduct an analysis of the situation in which TSI finds itself. Write a short paper that describes the business-related challenges faced by the organization. You are not describing solutions to those challenges just yet. Search for case studies or articles that discuss similar challenges faced by organizations with constraints related to the lack of features listed in Table 1 above. If you work in the information technology field, describe any similar operating-system-related challenges faced by your organization. If you are a consumer of IT services, describe how any of the features or lack thereof would play a role in your productivity at work or school.

Create a short paper that includes the following critical elements in this homework:

I. A description of the business-related challenges faced by the organization

II. One example of a case study that discusses similar challenges faced by organizations with constraints related to the lack of features listed in Table 1, or

III. If you work in the information technology field, describe any similar operating-system-related challenges faced by your organization, or

IV. A description of how any of the features listed in Table 1 or a lack thereof would play a role in your productivity at work or school.

Reference no: EM133541795

Questions Cloud

Address requirements and approval conditions : The regulatory body will review the audit report and if they address requirements and approval conditions, a delegated officer will give notice of approval
Describes to the puritan vision of settlement in new england : Can you explain what this question is asking. It says , define and explain the threat that Bradford describes to the Puritan vision of settlement in New England
What policies or reconciliations would create the conditions : what policies or reconciliations would create the conditions for less division in politics and society at large as well as strengthen weakened trust
What are transaction recordings in the mm module : What are transaction recordings in the MM module that represents economic events occurring?
Describe any similar operating-system-related challenge face : If you work in the information technology field, describe any similar operating-system-related challenges faced by your organization.
How does the writer propose to solve the central problem : What is the central problem that concerns the document writer? How does the writer propose to solve the central problem that they identify?
Financial statement at the end of the year : Public accountant does not send out confirmation requests on balances. If Ian's business is run through a public Canadian company, an audit will be required
How did the participation of native americans in wwii change : How did the participation of Native Americans in WWII change the identity of Native Americans and how they saw themselves, their history and culture?
How best to proceed under these circumstances : How best to proceed under these circumstances. Due to the current situation I am attached my assignment directly to you through this mail

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd