wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

profile
Riya Dharsandiya
Jul 11, 2023
0 Likes
0 Discussions
33 Reads

OS AND ITS OBJECTIVES

An OS is a program that controls the execution of application programs and acts as
an interface between applications and the computer hardware. It can be thought of
as having three objectives:
• Convenience: An OS makes a computer more convenient to use.
• Efficiency: An OS allows the computer system resources to be used in an efficient
manner.
• Ability to evolve: An OS should be constructed in such a way as to permit the
effective development, testing, and introduction of new system functions without
interfering with service.

Fault Tolerence

Fault-tolerance is the process of working of a system in a proper way in spite of the occurrence of the failures in the system. Even after performing the so many testing processes there is possibility of failure in system. Practically a system can’t be made entirely error free. hence, systems are designed in such a way that in case of error availability and failure, system does the work properly and given correct result.Any system has two major components – Hardware and Software. Fault may occur in either of it. So there are separate techniques for fault-tolerance in both hardware and software.

Hardware Fault-tolerance Techniques:

  1. BIST –
    BIST stands for Build in Self Test. System carries out the test of itself after a certain period of time again and again, that is BIST technique for hardware fault-tolerance. When system detects a fault, it switches out the faulty component and switches in the redundant of it. System basically reconfigure itself in case of fault occurrence.
  2. TMR –
    TMR is Triple Modular Redundancy. Three redundant copies of critical components are generated and all these three copies are run concurrently. Voting of result of all redundant copies are done and majority result is selected. It can tolerate the occurrence of a single fault at a time.

Software Fault-tolerance Techniques:

  1. N-version Programming –
    In N-version programming, N versions of software are developed by N individuals or groups of developers. N-version programming is just like TMR in hardware fault-tolerance technique. In N-version programming, all the redundant copies are run concurrently and result obtained is different from each processing. The idea of n-version programming is basically to get the all errors during development only.
  2. Recovery Blocks –
    Recovery blocks technique is also like the n-version programming but in recovery blocks technique, redundant copies are generated using different algorithms only. In recovery block, all the redundant copies are not run concurrently and these copies are run one by one. Recovery block technique can only be used where the task deadlines are more than task computation time.
  3. Check-pointing and Rollback Recovery –
    This technique is different from above two techniques of software fault-tolerance. In this technique, system is tested each time when we perform some computation. This techniques is basically useful when there is processor failure or data corruption.

 

 

 


Comments ()


Sign in

Read Next

ARTICLE ON WRIKE CORPORATION

Blog banner

The art of being alone

Blog banner

Mutual exclusion

Blog banner

 " Healing of Yoga "

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Importance Of Yoga.

Blog banner

HR Automation : Need of the hour

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

GOOGLE

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Consumer to consumer business mode

Blog banner

MORDERN UNIX SYSTEM

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Memory Management

Blog banner

Caching windows

Blog banner

MENDELEY

Blog banner

Beauty of indian railway

Blog banner

The Sunny Side of Instagram

Blog banner

VIRTUAL MACHINE

Blog banner

Tableau

Blog banner

Memory management

Blog banner

Women empowerment

Blog banner

(Input/Output) in os

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Mumbaicha Dabbawalla

Blog banner

Computer Security

Blog banner

Save Environment

Blog banner

Artical on FreshBooks

Blog banner

Threat management

Blog banner

Emerging threats in cyber Forensics

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

ONLINE NEWSROOMS

Blog banner

What is OS and its overview

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Inventory management software system

Blog banner

"Audit" In Data Science

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

File system

Blog banner

Embaded operating system

Blog banner

Smitten Kitchen Keepers

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

SAVE TREES

Blog banner