StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Design, Fault Tolerance and Prevention - Research Paper Example

Cite this document
Summary
From the paper "Computer Design, Fault Tolerance and Prevention" it is clear that when an individual refers to redundancy while talking about the storage of data, they tend to talk about RAID. People refer to RAID as referring to the backup of data of a computer system; this is not true at all…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Computer Design, Fault Tolerance and Prevention
Read Text Preview

Extract of sample "Computer Design, Fault Tolerance and Prevention"

?Computer Design Computer Design Computer systems crash every now and then and each time they crash they cause huge losses to the owners. Computer systems are a need today; they are used in various settings for different means. These systems are used not only by individuals, these system have become a part of organizations. Organizations store huge amount of information on these systems. If these systems crash, all the important information that organizations might have stored on these systems might be lost. Thus, it is advised by computer experts to keep a backup of the information and resources that are stored on computer systems. This paper will focus upon the various storage devices that can be used by computer users to keep a backup of their information and resources, and the differences between redundant and backup data storage and how systems fail and how can they be protected. Backup Media Various forms of backup media available to users include: optical storage methods such as writeable and re-writable CDs and DVDs, external and internal hard disks that can be mounted on the systems and flash memory systems such as pen drives, USB drives and memory cards. Information stored on optical drives can last for very long period of time if these drives are kept safely, secondly these drives are even available in write once only form. This is an advantage because the data that is stored on these drives cannot be replaced or over-written. These drives even come in re-writable form; this means that same drive can be used do over write if old information is no longer needed. These drives are easy to move from one pc to another, these drives can be used in several systems but one system can use it at a time. Another downside of optical drives is that the time taken by these drives to write data and store information on them is considerably high if compared to the time taken by flash drives and other forms of memory drives. Another form of backup media that can come in handy for computer users is installing a second hard drive internally or externally. The advantages of having a second hard disk are enormous. Firstly, the second hard disk can act as a backup for files stored on your system; this will come in handy if the files from the first hard disk are deleted. Another advantage of using an extra hard disk is that the process of backing up files in a second hard disk is faster as compared to backing up these files in an optical drive or a USB flash memory drive. Having a second hard disk is even of advantage as the files and the resources that have been downloaded over time on the computer system can be safe and the users d not have to take the pain of downloading and saving these resources again. All the operations conducted in a computer system take place on the first hard disk or the primary hard disk, due to this continuous usage, the hard disk becomes old and starts wearing out and ultimately the user has to replace it. When two hard disks are involved in the process of running a computer system, the burden of running the computer system is shared and both the hard disks gain higher functional life time. Disadvantages associated with installing a second hard disk are few in number. Firstly, hard disks have to be dealt with extra care, misuse may easily damage or corrupt the hard disk and data loss may occur, secondly, if the drive is installed inside the system, moving the drive to another system might become difficult and during the transfer, the chances of damage are quite high. One of the best backup media designed to-date is USB flash memory drives/sticks. The advantages of using this media are: they are very small in size and can hold huge amount o information, they are easy to move and do not contain parts that might get corrupted if they are mishandled. These drives are even better than optical drives as they cannot be destroyed due to scratches and dust. Installing them is much easier than installing hard disks as they do not need drivers; he data transfer rate of USB is higher than the data transfer rate of Optical drives. The downside of using this memory device is that the device is so small in size that it can be easily misplaced or forgotten which might cause huge damage if the information stored on it is of high secrecy. Secondly, USB drives do not have huge memory space as compared to hard disks. RAID When an individual refers to redundancy while talking about storage of data, they tend to talk about RAID. People refer to RAID as referring to backup of data f a computer system; this is not true at all. Backup storage and RAID or redundancy are two different terminologies and are quite different in nature but both come in handy for data protection. RAID refers to Redundant Array of Inexpensive Drive, this means that RAID is a collection of different amounts of drive that consists of same specifications and is entirely based on the way users configure them to replicate data or divide data that is saved by the user on them. A user can setup RAID in different patterns, the m0ost commonly way of setting up RAID are RAID 0, 1 and 5. RAID 0 is the simplest form of configurations of RAID; it is even recognized as Striping as in this configuration two hard disk drives that have similar space are connected to a computer system and information that is stored by the user is divided between these two drives. This helps in increasing the life of the hard disk as two drives are used at the same time and burden is shared. The downside of using this configuration is that, all the data on the drives will be lost of both the drives are corrupted. Another RAID configuration is recognized as mirroring, it is even called RAID 1, in this configuration, two drives are used at the same time and the data stored on one of the drive is mirrored or copied on the other drive (Shapiro, 2008) . This is very helpful as if one of the drives fails or stops working; the second drive holds the same information and data is saved. On the other hand, backups are a saved copy of the original documents. These copies are created by users and are conducted over a specific period of time, depending on the amount of data being stored. Fault Tolerance and Prevention There are various reasons due to which RAM gets corrupted or fails to operate properly. One of the main reasons is changes in power such as increase in power or decrease in power or power fluctuations. Certain times the components of a RAM become very heated up due to which they experience damage. Parity Checking is one of the best methods of detecting errors experienced by RAM, this method does not provide solutions or help in identifying solutions but can aid in identifying issues faced by RAM. On the other hand, ECC or Error Checking and Correction can be quite useful in not only detecting faults in the RAM, it even solves and corrects the issue itself. One way to cope with power shortages is using a UPS, but a UPS is not a permanent solution, it cannot help the system continue operating at all times, in this scenario, using two power supplies is the best option. References Shapiro, J. R. (2008). Windows server 2008 bible. Indianapolis, IN: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
IT Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/other/1400087-it
(IT Research Paper Example | Topics and Well Written Essays - 1250 Words)
IT Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/other/1400087-it.
“IT Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/other/1400087-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Design, Fault Tolerance and Prevention

Role of Information Technology

Today, everyone stores and retrieves information using a computer system.... Numbers of techniques are being used to ensure the reliability and security of the computer system.... In present times, nearly each and every personal computer comes with DVD or CD burners or writers.... nternal Hard Disk or A Second Hard Disk, Mounted InternallyInternal Hard Disk is used for storing and retrieving digital information in the computer system....
7 Pages (1750 words) Research Paper

Problem solving and quality improvement

In turn, results obtained from FMEA has broader impact on different aspects of product life cycle including suppliers, design, manufacturing, after sales services and intended service.... SWANSEA METROPOLITAN UNIVERSITTY OF WALES TRINITY SAINT DAVID BEng Mechanical and Manufacturing Engineering Problem Solving and Quality Improvement ENGINEERING MANAGEMENT M2X8277 BY (MIMMO) APRIL 2013 SUBMITTED TO ANDREW THORN DECLARATION I declare that this assignment is all my own work and that I have acknowledged all materials used from published and unpublished works of other people....
10 Pages (2500 words) Essay

The Security of an Organizations Information System

fault tolerance in critical systems The ability of a system to tolerate fault during an occurrence is very critical.... This particular design enables continuity in the business through various configurations of networks and hence secures data by preventing any data exit.... ll the workstation computer users make use of virtual replication of the critical data (Costello 64)....
4 Pages (1000 words) Essay

Advanced Networking

he organisation is looking for evaluation and strategies to improve grey in the fields of fault management, Configuration Management, Network management, Security Management and Account Management.... This paper attempts to provide a strategic solution in all the areas of fault management, Configuration Management, Network management, Security Management and Account Management.... The fault management is of two types - Passive and Active.... The Passive fault management is also knows the breakdown management as in this case the designated person or system does not work towards correcting the fault until the system has broken down....
9 Pages (2250 words) Coursework

Computer Network Mangment

This paper adopts a problem solving approach to the scenario.... So this paper proceeds with discussing the problems encountered in the implementation of a LAN and a WAN.... Then solutions to each problem are suggested with the use of relevant technologies.... .... ... ... According to the paper while Wi-Fi networks are often seen as simple and inexpensive to deploy, there are plenty of hidden costs and complexities lurking under the surface....
14 Pages (3500 words) Essay

Physical & Network Fault Tolerance

This paper "Physical & Network fault tolerance" analyses the technologies and alternatives associated with Physical & Network fault tolerance.... fault tolerance is a general term associated with physical things, networks, databases, software, system etc.... fault tolerance is the ability of a system in response to an unexpected hardware or software failure.... Advanced planning and a proactive anticipation are necessary to avoid the problems caused by fault tolerance....
4 Pages (1000 words) Essay

Providing Reliable Security Services to the Company

Disaster Recovery “fault tolerance is a design that ensures a computer application will remain functioning in the event of catastrophic failure” (Holmes, n.... fault tolerance includes such hardware, software, and network safety measures, which continue their operations in the events of failures.... fault tolerance measures are used to secure critical applications whereas disaster recovery systems ensure data safety.... Power fault tolerance provides more than one power inlets to the computers to ensure continuity in computer operations....
2 Pages (500 words) Essay

Information Security

This case study "Information Security" focuses on the best practices for the IT systems of an IT solutions firm called Check Point Software Technologies Ltd.... Check Point is charged with the development, marketing and supporting different categories of software plus.... ... ... ... Information systems are crucial in supporting routine operations within a different organizational context....
22 Pages (5500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us