Describe a modification that solves this problem

Assignment Help Basic Computer Science
Reference no: EM131323271

You are developing a storage system for a application that demands unusually high reliability, so you have decided to use a three-replica durable storage scheme. You plan to use three ordinary disk drives D1, D2, and D3, and arrange that D2 and D3 store identical mirror copies of each block stored on D1. The disk drives are of a simple design that does not report read errors. That is, they just return data, whether or not it is valid.

10.1a. You initially construct the application so that it writes a block of data to the same sector on all three drives concurrently. After a power failure occurs during the middle of a write, you are unable to reconstruct the correct data for that sector. What is the problem?

10.1b. Describe a modification that solves this problem.

10.1c. One day there is a really awful power glitch that crashes all three disks in such a way that each disk corrupts one random track. Fortunately, the system wasn't writing any data at the time. Describe a procedure for reconstructing the data and explain any cases that your procedure cannot handle.

Reference no: EM131323271

Questions Cloud

The new equipment and cabinetry will cost dollar : Sam Hinds, a local dentist, is going to remodel the dental reception area and two new workstations. He has contacted A-Dec, and the new equipment and cabinetry will cost dollar 18, 000. A-Dec will finance the equipment purchase at 7.5 percentage over..
Calculate the value of your selected barrier option : Calculate the value of your selected barrier option and use it with the results you obtained in part a or b to determine the price of a standard European call or put.
Discuss about the research methods and data mining : Using the Waters Bottling Company in Module 1, continue to build the Marketing Plan Sections for the product you have selected/ invented/ created. Complete the following in MS Word: Be concise but complete in your analysis of each plan element. Yo..
What is wrong with tracy''s idea : A user who wishes to log in simply presents his or her name and this password; the system can authenticate the user by again transforming the user's name with the password key to see if the result is the same as the presented password. Thus no cen..
Describe a modification that solves this problem : You initially construct the application so that it writes a block of data to the same sector on all three drives concurrently. After a power failure occurs during the middle of a write, you are unable to reconstruct the correct data for that secto..
Find the available fonts on the user''s system : Enhance the font viewer program to allow the user to select different fonts. Research the API documentation to find out how to find the available fonts on the user's system.
Consequences of in group and out group categorization : So, what are the consequences of in group and outgroup categorization? How does this categorization affect a person's behavior in a group or team?
Create your own interpretation of a poem : Create your own interpretation of a poem. Underscore and define unfamiliar vocabulary, note formal elements, identify the speaker, situation, etc. Your essay must comment on each line of the poem and it must include an introductory paragraph that ..
Write a program that contains a text field and a button : Write an application with three buttons labeled "Red", "Green", and "Blue" that changes the background color of a panel in the center of the frame to red, green, or blue.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw a context diagram and a diagram

1.) Draw a Context Diagram and a Diagram 0 Data Flow Diagram that represents the information system at a typical library. 2.) On the internet, locate at least three firms that offer CASE tools as shareware or free, public domain software. Describe ..

  Create the logic for a program that continuously

Create the logic for a program that continuously prompts the user for a numeric number of dollars until the user enters 0

  Determine the number of distinct labelling of knn do the

1. determine the number of distinct labelling of knn. do the same for kmm and kmnl2. give an example of a graph g with

  M uses the average and maximum error of the two values. c.

A Atmega128 is being used to monitor humidity inside test chamber 03. The device uses two sensors to have some fault tolerance.

  Considered when choosing programming

What factors are considered when choosing programming?

  Find the average heat transfer coefficient

Atmospheric air at a velocity of 61 m/s and a temperature of 16°C enters a 0.61-m-long square metal duct of 20-cm x 20-cm cross section. If the duct wall is at 149°C, determine the average heat transfer coefficient. Comment briefly on the LD/h eff..

  Use the method of iteration to find a formula

Use the method of Iteration to find a formula expressing S(n) as a function of n for the given recurrence relation and initial condition

  How index locking resolves the preceding conflict

Give an example of a query or a command that would conflict with this command, such that the conflict could not be resolved by just locking individual tuples or pages, but requires index locking.

  Forms of electronically stored information

Computer Forensics, also known as Digital Forensics, is a scientific examination by a certified computer forensic specialist, which includes the identification, collection, preservation and analysis of all forms of Electronically Stored Informatio..

  Explain areas of information technology as a metric

The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security.

  Approach appropriate for company forefront of technology

However, adopting a secondary approach where others adopt early and a firm learns from their mistakes is often a viable strategy. When is each approach most appropriate and why?

  Which of the following baseband technologies

The IEEE 802.3u standard identifies which of the following baseband technologies

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd