Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
Disk Scheduling: SCAN
(Elevator Algorithm)
Disk Scheduling: C-SCAN
2
RAID RAID (cont.)
• Level 0 (“striping”)
Good: large requests
Bad: small requests; MTTF (no redundancy)
• Level 1 (“mirroring”)
Good: fault tolerance
Bad: Double the cost of storage
• Level 2
Bad: must be rotationally synchronized; hamming code
• Level 3
Good: fastest for large-file transfer
Bad: what happens if parity disk fails?
• Level 4
• Level 5
Good: Higher I/O rate for writing data; no dedicated parity disk
Bad: Not as fast as RAID 3
Bootstrap loader program. Solaris 2 allocates swap space only when a page is forced out of
physical memory, not when the virtual memory page is first
• Methods such as sector sparing used to handle bad created.
blocks.
3
Reducing Power Consumption Crypto 101: Basic terminology
•Display • Authentication: Assurance of identity of person or
Dimming originator of data
•Hard Disk Password, biometrics, challenge/response (e.g., certificates)
Spinning down/up • Authorization: Rights to perform some action
Increase disk cache in RAM?
• Integrity: Maintaining data consistency
Have OS inform app (e.g., auto-save in emacs?)
Checksums, MD5 (hash)
•CPU
Voltage/frequency scaling • Confidentiality: Protection from disclosure to
Intel “SpeedStep”: 750MHz 600MHz; 1.6V 1.35V (related: unauthorized persons
“Quickstart”) Encryption: cleartext ciphertext, ciphertext cleartext
•Memory • Non-repudiation: Originator of communications can't
Turn off cache (lines)?; writing main memory to disk? deny it later
•Wireless • Availability: Resources available for authorized parties
More definitions
• Threat: external to entity under
consideration/protection
• Vulnerability: internal to entity under
consideration/protection