Exokernel/SPIN/L3 The context for this question is the same…

Exokernel/SPIN/L3 The context for this question is the same as the previous question. Based on the design principles outlined in the SPIN, Exokernel, and L3 papers, imagine that you are tasked with implementing a packet multiplexer. You want this to be fast since it sits on the critical path (examining every packet).   b) After you have implemented the code for the multiplexer, you realize that you introduced two undesirable bugs.  The first bug results in out-of-bound memory access that could potentially be very dangerous. Explain how this bug would be dealt with in (i) SPIN (ii) Exokernel and (iii) a microkernel. 

Full Virtualization Suppose you are a cloud provider using f…

Full Virtualization Suppose you are a cloud provider using full virtualization to host multiple tenants on the same physical hardware.  a) A malicious tenant gains root privileges within their own virtual machine andattempts to access the memory of another VM on the same host. Describe one mechanism by which full virtualization prevents this unauthorized memory access. 

À vous!Write a paragraph of at least five complete sentences…

À vous!Write a paragraph of at least five complete sentences about the last time you stayed in a hotel. Mention when you arrived, if you made a reservation, on which floor you stayed, whether you took the elevator to your room, and when you checked out (left). You are writing about an event that happened in the past You should use the passé composé