Pos 355 Failures

In: Computers and Technology

Submitted By ac0102dad
Words 953
Pages 4
Failures

POS/355
August 26, 2013
UOPX

Failures
Distributed systems emerged recently in the world of computers. A distributed system is an application of independent computers that appear to work as a coherent system to its users. The advantages of distributed systems consist of developing the ability to continually to open interactions with other components to accommodate a number of computers and users. Thus, stating that a stand-alone system is not as powerful as a distributed system that has the combined capabilities of distributed components. This type of system does have its complications and is difficult to maintain complex interactions continual between running components. Problems do arise because distributed systems are not without its failures. Four types of failures will characterize and the solutions to two of these failures will address on how to fix such problems.
Before constructing a distributed system reliable one must consider fault tolerance, availability, reliability, scalability, performance, and security. Fault tolerance means that the system continues to operate in the event of internal or external system failure to prevent data loss or other issues. Availability needed to restore operations to resume procedure with components has failed to perform. For the system to run over a long period without any errors is need and known as reliability. To remain scalable means to operate correctly on a large scale. Performance and security remains needed so the system can resist attacks against viruses and errors, so it can run in a timely manner. Distribution systems have their advantages and disadvantages.
The disadvantages are that there are more than just four types of failures. Resolving failures is important and typically fall into two main categories: hardware and software failures. Understanding the classification of the types of…...

Similar Documents

Pos 355

...UNIX Protection Scheme Cedric Lee POS/355 Scott Stewart March 25, 2013 UNIX Protection Scheme There is an operation system that supports 5,000 users, and the company only wants to allow 4,990 users permission to access one file. In order to have a protection scheme in UNIX, a number of operations need to be performed first in order for this to work. UNIX file management hierarchy is very essential to know in order to understand and devise a plan that will allow this protection scheme to protect the files. Without knowledge of the hierarchy of the file management system within the UNIX operating system, there is no way that the 4,990 will have access to only one file. A file access control scheme will be the design of UNIX operating system. Therefore, user ids and passwords are needed in order to gain access to the system. All users of the UNIX operating system will each be given a user id and a user password. These user ids and passwords will be kept by the assigned users only. The protection of these ids and passwords depend on how well the user protects them. Encryptions and decryptions can also be used when the users are attempting to login. The administrator can put each user into different groups that allow access or deny access to certain files within the operating system. By doing this, there can be control on who can access what file due to the permission given to them by the administrator. The administrator is referred to as the super user......

Words: 385 - Pages: 2

File Management Pos-355

...File Management POS/355 05/13/2013 John Buono File Management The file managers function is to regulate all of the files on a system that is stored on the storage mediums. There are several tasks that the file manager must perform in order to manage these files. The file manager must be able to identify the unique naming conventions of the files in order to complete its tasks. The file manager must also be able to determine the location of the files, the sectors that make up the file on the storage medium, and the order of those sector that make up the file. It is important that the file manager work with the device manager and use effective algorithms for the read and write of files. The file manager also gives or denies access to files by users or programs. The file manager also is in cooperation with the process manager to allocate or de-allocate files to the processor. The last task is that the file manager provides easy commands that assist users and/or programs in file handling (Gallert, 2000) . Unix/Linux File Management UNIX/Linux uses the distinction of inodes to refer to files or segments of files on the system and uses pointers to indicate where the files are on the storage media. There are some slight differences between each version of Unix/Linux but we will not go into those differences in this paper and will only cover the basics of file management. No matter what version of Unix/Linux is being used the file structure and permissions do seem to be...

Words: 2096 - Pages: 9

File Management Pos/355

...File Management POS/355 February 25, 2013 Bhupinder Singh File Management Imagine a system that support 5000 users, and only allow 4000 of those users can access one file. This can be accomplished in many different ways. One option is for the 4000 users placed in a specific group and then set another group access to the group already on file. The second option is would be the way to go, and that is to have an access control list made up with names of all 5000 users on it. This paper will look into a protection scheme that will be used in an efficiently way to provide that protection to the system. There are techniques to protect the systems directories, files, and folders. Most IT departments will set up appropriate file permission on the files, set up certain tools to check accounts security, and make sure that every account and user set up passwords when in the systems. Security properties can be the source of protecting this. This paper will talk about the security descriptor referred to as access control list (ACL). There are two different types of ACL’s. Access Control List is specifically for the directory and files, and Access Control Default can only be associated with the directory. Example: when a file is in the directory and does not have access to the ACL it will use the rule of default for the directory. So with setting up those 500 users the system can access the list and find if those users are allowed to......

Words: 584 - Pages: 3

Failures Paper Pos/355

...POS/355 March 11, 2013 Bhupinder Singh Failures Paper The distributed systems are unique in that it’s executions of the application of the protocols are to coordinate on multiple processes on the network, they have their own local memory and it communicates in entities with each of them using a massage passing mechanism. They also have their own personal users to them that they can use for personal uses. What are shared across the distributed systems are the data, processor, and the memory that can achieve those tasks when processing information. The distributed system has features to help achieve in in solving problems and issues with software and programs, when being useful with the distributed system is not very easy; its capabilities are the components, than just the stand alone systems that are sometimes not as reliable. Because of the complexities of interactions between running the distributed systems, it must have special characteristics like the fault tolerant; this can recover from component failures without performing incorrect actions. Recoverable is where failed components can restart and then rejoin the system after the cause failure has been repaired. The failure on a distributed system can result in anything from easily repairable errors to a catastrophic meltdown. Fault tolerance deals with making the system function in the presence of defaults. Faults can occur in any one of components. In this paper we will look at the......

Words: 811 - Pages: 4

Pos/355 Project Failures

...Failures Adam Cain POS/355 2/6/2014 Randy Shirley Failure is not an option! This is what I have been told growing up and while I served in the Marine Corps, but as I found out in this assignment, failure is an option. This holds true when talking about a distributed system, which is a computer network like a Wide Area Network (WAN) or a Local Area Network (LAN). Distributed systems is defined as a software system in which components located on networked computers communicate and coordinate their actions by passing messages (Coulouris, Dollimore, Kindberg, & Blair, 2012). This allows the computers or even devices like smart phones and tablets, to share resources like printers, hard drives, and even internet access. A centralized system is a computer that is by itself, one that is not connected to a laptop. Think of a centralized computer as one of the spy computers in movies, like Mission Impossible. These systems can and will fail, while sharing some failures; a distributed system has more components that could fail, leading to them having more problems. There a many things that could fail on a distributed system, this paper will cover four of them, starting with hardware failure. Video cards, network access card, hard disk drives, solid-state drives, memory, and power supply units (PSU), these are all pieces of hardware that are in most of the computers sold today, and they can all die at a moment’s notice. Some of these items, if they failed would......

Words: 1129 - Pages: 5

Week3 Pos/355

...| | POS/355 | | |Professor Sumayao | | | | | |June 9, 2014 | |[Week 4 Individual Assignment-Failures] | | | Types of Failure in Distributed System December 5, 2012 Types of Failure in Distributed System To design a reliable distributed system that can run on unreliable communication networks, it is utmost important to recognize the various types of failures that a system has to deal with during a failure state. Broadly speaking failures of a distributed system fall into two obvious categories: hardware and software failure. A distributed system may suffer any of such types of failures. Yet each of the failure has its own particular nature, reasons and corresponding remedial actions to restore smooth operation (Ray, 2009). Follow are few types of failure that may occur for a distributed system. Transaction failure: Transaction failure is a centralized system failure. The failures generally occur due to two...

Words: 731 - Pages: 3

Pos 355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more......

Words: 283 - Pages: 2

Pos 355 Pos355 Pos/355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS 355 POS355 POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can......

Words: 286 - Pages: 2

Pos 355 Pos355 Pos/355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS 355 POS355 POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can......

Words: 286 - Pages: 2

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 1529 - Pages: 7

Pos/355 Week5 Individual

...Mac OS Vulnerabilities: Buffer Overflow Michael Andrews POS/355 Introduction to Operational Systems May 1, 2014 Professor Christopher Warner   Mac OS Vulnerabilities: Buffer Overflow The risk of a buffer overflow to an operating system is high, especially to operating systems using C language. Based on the UNIX architecture, Mac OS uses C, Objective C, and C++ code as its foundation, primarily for its speed and efficiency. However, this leaves them vulnerable to attacks. Despite its reputation for security, this fundamental operating system security flaw leaves the Mac OS open for external attacks, which can result in theft of user information and corruption of internal systems. However, measures exist to prevent attacks on buffer overflows through code as well as systems built into the Mac OS architecture. A buffer overflow occurs when more data is put into the buffer than it can hold. This happens when there is not enough room allocated in the buffer and vital program information is overwritten by the new data. Attackers are able to exploit this by taking advantage of a program that is waiting on user’s input. In order to do this, an attacker must know the weaknesses in a program and understand how information will be stored in memory in order to alter the programs execution and gain access to a user’s system. Malware can also be specifically written in order to compromise the integrity of the system. Buffer overflows are the most common way for an attacker to......

Words: 957 - Pages: 4

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 765 - Pages: 4

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 765 - Pages: 4

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 3821 - Pages: 16

Pos 355 Complete Class

...POS 355 Complete Class Purchase here http://chosecourses.com/POS%20355/pos-355-complete-class Description POS 355 All DQs and Assignments Complete Class Week 2 Individual Huffman Trucking Paper Write a 1-2 page paper describing the operating systems used by Huffman Trucking. Address the following questions in your paper: Why do you think these operating systems were chosen? What are the implications of the operating systems that are in use by Huffman Trucking? You can access the Huffman Trucking website from the Virtual Organizations Portal. (Hint: Look at network diagrams.) Week 3 Individual PC/Mainframe Paper Write a 2-3 page paper comparing and contrasting PCs and mainframes. It will be necessary to research this topic outside your course readings. Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Windows® 2003. Week 4 Learning Team Instructions Continue work on the Operating System Analysis. Outline the important features of Linux. Begin work on the Microsoft® PowerPoint® presentation. Individual Operating Systems Analysis Paper Write a 2-4 page paper describing operating systems that are common on the Internet. It is necessary to research this topic outside your course readings. Week 5 Learning Team Learning Team Project Complete work on the Operating System Analysis. ...

Words: 4585 - Pages: 19