wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

profile
Riya Dharsandiya
Jul 11, 2023
0 Likes
0 Discussions
33 Reads

OS AND ITS OBJECTIVES

An OS is a program that controls the execution of application programs and acts as
an interface between applications and the computer hardware. It can be thought of
as having three objectives:
• Convenience: An OS makes a computer more convenient to use.
• Efficiency: An OS allows the computer system resources to be used in an efficient
manner.
• Ability to evolve: An OS should be constructed in such a way as to permit the
effective development, testing, and introduction of new system functions without
interfering with service.

Fault Tolerence

Fault-tolerance is the process of working of a system in a proper way in spite of the occurrence of the failures in the system. Even after performing the so many testing processes there is possibility of failure in system. Practically a system can’t be made entirely error free. hence, systems are designed in such a way that in case of error availability and failure, system does the work properly and given correct result.Any system has two major components – Hardware and Software. Fault may occur in either of it. So there are separate techniques for fault-tolerance in both hardware and software.

Hardware Fault-tolerance Techniques:

  1. BIST –
    BIST stands for Build in Self Test. System carries out the test of itself after a certain period of time again and again, that is BIST technique for hardware fault-tolerance. When system detects a fault, it switches out the faulty component and switches in the redundant of it. System basically reconfigure itself in case of fault occurrence.
  2. TMR –
    TMR is Triple Modular Redundancy. Three redundant copies of critical components are generated and all these three copies are run concurrently. Voting of result of all redundant copies are done and majority result is selected. It can tolerate the occurrence of a single fault at a time.

Software Fault-tolerance Techniques:

  1. N-version Programming –
    In N-version programming, N versions of software are developed by N individuals or groups of developers. N-version programming is just like TMR in hardware fault-tolerance technique. In N-version programming, all the redundant copies are run concurrently and result obtained is different from each processing. The idea of n-version programming is basically to get the all errors during development only.
  2. Recovery Blocks –
    Recovery blocks technique is also like the n-version programming but in recovery blocks technique, redundant copies are generated using different algorithms only. In recovery block, all the redundant copies are not run concurrently and these copies are run one by one. Recovery block technique can only be used where the task deadlines are more than task computation time.
  3. Check-pointing and Rollback Recovery –
    This technique is different from above two techniques of software fault-tolerance. In this technique, system is tested each time when we perform some computation. This techniques is basically useful when there is processor failure or data corruption.

 

 

 


Comments ()


Sign in

Read Next

Getting into anime My anime suggestions

Blog banner

Review on Recovering Deleted Files

Blog banner

Atlantis - The Lost Island.........

Blog banner

Memory management

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Deadlock

Blog banner

Deadlock in operating system

Blog banner

File Systems in OS.

Blog banner

Evolution of operating systems

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

OS Assignment-3

Blog banner

Computer security techniques

Blog banner

Multithreading in Operating System

Blog banner

Models of Information Security.

Blog banner

Introduction to GIS

Blog banner

Working with AES cryptographic algorithm using crypto++

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Women Empowerment

Blog banner

Memory Management

Blog banner

Explain website hacking issues

Blog banner

File System

Blog banner

Population

Blog banner

A True Friendship

Blog banner

Hash password! Is it really secured?

Blog banner

Busted : Common Web Security Myths

Blog banner

Elegant fashion style

Blog banner

OS Assignment 3 Deadlock

Blog banner

geographic information system (GIS)

Blog banner

Transgender

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Modern operating system

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Constrained Management in IT

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Disk Scheduling

Blog banner

Honeypot in cyber security

Blog banner

Importance Of Blockchain

Blog banner