Homework 8 Operating Systems CS 3430 Sarah Diesburg.

Slides:



Advertisements
Similar presentations
. Today you will: Learn about how an is processed once it has been sent Learn some advantages and disadvantages of using Learn how.
Advertisements

TRANSACTION PROCESSING SYSTEM ROHIT KHOKHER. TRANSACTION RECOVERY TRANSACTION RECOVERY TRANSACTION STATES SERIALIZABILITY CONFLICT SERIALIZABILITY VIEW.
ICOM 6005 – Database Management Systems Design Dr. Manuel Rodríguez-Martínez Electrical and Computer Engineering Department Lecture 16 – Intro. to Transactions.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Computer Science Lecture 12, page 1 CS677: Distributed OS Last Class Distributed Snapshots –Termination detection Election algorithms –Bully –Ring.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
Services Course Live SkyDrive Participant Guide.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Cs3431 Transactions, Logging and Security. cs3431 Transactions: What and Why? A set of operations on a database must appear as one “unit”. Example: Consider.
Transaction. A transaction is an event which occurs on the database. Generally a transaction reads a value from the database or writes a value to the.
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 21: Publishing Your Pages on the Web.
Distributed File Systems Sarah Diesburg Operating Systems CS 3430.
Transactions and Reliability. File system components Disk management Naming Reliability  What are the reliability issues in file systems? Security.
Accessing Barney Off- Campus How can I get my H: files when I am not on the GU network? Business 111 Edward Mitchell Fall 2006.
CPSC203 Introduction to Computers Lab 69 By Jie Gao.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Chapter 9 How Do Users Share Computer Files?. What is a File Server A (central) computer which stores files which can be accessed by network users.
Transaction Processing Concepts. 1. Introduction To transaction Processing 1.1 Single User VS Multi User Systems One criteria to classify Database is.
Presented By: Shreya Patel ( ) Vidhi Patel ( ) Universal College Of Engineering And Technology.
10/28/20151 Operating Systems Design (CS 423) Elsa L Gunter 2112 SC, UIUC Based on slides by Roy Campbell, Sam.
1 File Systems: Consistency Issues. 2 File Systems: Consistency Issues File systems maintains many data structures  Free list/bit vector  Directories.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
Introduction to Database Systems1. 2 Basic Definitions Mini-world Some part of the real world about which data is stored in a database. Data Known facts.
Chapter 10: Rights, User, and Group Administration.
Permissions and User Rights
Managing Files In Windows XP My Computer Versus Windows Explorer.
Kerberos  Kerberos was a 3-headed dog in Greek mythology Guarded the gates of the deadGuarded the gates of the dead Decided who might enterDecided who.
Computer Science Lecture 19, page 1 CS677: Distributed OS Last Class: Fault tolerance Reliable communication –One-one communication –One-many communication.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
 Registry itself is easy and straightforward in implementation  The objects of registry are actually complicated to store and manage  Objects of Registry.
Database Systems Recovery & Concurrency Lecture # 20 1 st April, 2011.
Cloud Computing Computer Science Innovations, LLC.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Transactions and Reliability Andy Wang Operating Systems COP 4610 / CGS 5765.
ICOM 6005 – Database Management Systems Design Dr. Manuel Rodríguez-Martínez Electrical and Computer Engineering Department Lecture 16 – Intro. to Transactions.
Advanced Database CS-426 Week 6 – Transaction. Transactions and Recovery Transactions A transaction is an action, or a series of actions, carried out.
Computer Science Lecture 19, page 1 CS677: Distributed OS Last Class: Fault tolerance Reliable communication –One-one communication –One-many communication.
The Functions of Operating Systems Network Operating Systems (NOS)
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
Group policy.
Key management issues in PGP
How Do Users Share Computer Files?
Jonathan Walpole Computer Science Portland State University
Transactions and Reliability
SVN intro (review).
Active Directory Administration
Services Course 9/9/2018 3:37 PM Services Course Windows Live SkyDrive Participant Guide © 2008 Microsoft Corporation. All rights reserved.
Journaling File Systems
Lab 1 introduction, debrief
THE BASICS.
Using Office 365 in the Classroom
Introduction to Operating Systems
Transactions Properties.
Kerberos.
Fundamentals of Databases
Printed on Monday, December 31, 2018 at 2:03 PM.
Security.
Lecture 20: Intro to Transactions & Logging II
Install AD Certificate Services
Chapter 3 - Public-Key Cryptography & Authentication
Operating System Concepts
CSE 542: Operating Systems
Eric Mazzocco, Jake Smith, Ian Anderson
Electronic Payment Security Technologies
Key Exchange, Man-in-the-Middle Attack
Windows Networking ICCM 2004 Tim Young
Transaction Communication
Presentation transcript:

Homework 8 Operating Systems CS 3430 Sarah Diesburg

Transactions in File Systems Sometimes multiple small actions need to take place to implement a single file system action E.g. moving a file involves deleting the file from an old directory and adding it to a new directory If computer crashes in the middle of the actions, file system could be left in an inconsistent state Transactions solve this problem.

Transactions in File Systems Offer 3 properties: Atomic: all operations either happen or they do not (no partial operations) Serializable: transactions appear to happen one after the other Durable: once a transaction happens, it is recoverable and can survive crashes How it works: Write what you are going to do to a log (journal) in a transaction before you do it If computer crashes, replay what is in journal

Access Control List vs Capability List Access Control List - Stores all permissions for all users with each object Capability List – Stores all objects a process can touch Access control list is easier for file systems Easy to know who can access the file when doing permission checks on a per-file basis

Public Key Encryption I send you a message: Encrypt(KEYsarah_private, “Homework is due tomorrow”)

Public Key Encryption I send you a message: Encrypt(KEYsarah_private, “Homework is due tomorrow”) This is authentication – everyone can read the message with my public key, but only I could have created it. You know it came from me!

Public Key Encryption You send me a message: Encrypt(KEYsarah_public, Encrypt(KEYmy_private, “I need another day.”))

Public Key Encryption You send me a message: Encrypt(KEYsarah_public, Encrypt(KEYmy_private, “I need another day.”)) Both authentication and secrecy. Only you can create this message created with your private key, but only I can read it because the whole thing is encrypted with my public key.

Pentagon Traffic Analysis Another example – Can tell that it must be close to a project deadline due to the number of connections to the class Linux server