You are on page 1of 7

Table of content

Contents
ACCEPTABLE USE POLICY.......................................................................................................................2
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY ACCEPTABLE USE POLICY FOR NETWORK AND
INTERNET ACCESS OVERVIE...................................................................................................................2
Difference between deadlock and starvation........................................................................................3
What is Deadlock?.................................................................................................................................3
What is Starvation?...............................................................................................................................4
Four general strategies for dealing with deadlocks...............................................................................4
THE FOUR CONDITIONS REQUIRED FOR DEADLOCK TO OCCUR............................................................4
1 GREEN COMPUTING...........................................................................................................................5
To promote green computing concepts at all possible levels. The following four approaches are
employed:..............................................................................................................................................5
The steps you can take to contribute to green computing....................................................................6
Video conferencing................................................................................................................................6
How big of a role do green issues play in the value proposition that you pitch to customers when
they are looking at upgrading their data centre?..................................................................................7
QUESTION 1
ACCEPTABLE USE POLICY
The most important part of an AUP document is the code of conduct governing the behaviour of a
user whilst of a user whilst connected to the network or internet. The code of conduct may include
some description of what may be called netiquette which include such items of code of conduct as
using appropriate/polite language while online, avoiding illegal activities, ensuring that activities the
user may embark on, should not disturb or disrupt any other user on the system, and caution not to
reveal personal information that could be the cause of identity theft.

Most AUP statements outline consequences of violating the policy. Such violations are met with
consequences depending on the relationship of the user with the organisation. Common actions that
schools and universities take is to withdraw the service to the violator and sometimes if the activities
are illegal the organization may involve appropriate authorities, such as the local police. Employers
will at times withdraw the service from emlpoyees, although a more common action is to terminate
employment when violation may be hurting the employer in some way, or may compromise
security. Earthlink, an American service provider has a very clear policy relating to violations of its
policy. The company identifies six levels of response to violations:

 Issue warnings: written or verbal


 Suspend the member’s newsgroup posting privileges
 Suspend the member’s account
 Terminate the member’s account
 Bill the member for administrative costs and/or reactivation charges
 Bring legal action to enjoin violations and/or collect damages, if any, caused by violation.

Central to most AUP documents is the section detailing unacceptable uses of the network, as
displayed in the University of Chicago AUP. Unacceptable behaviours may include creation and
transmission of offensive, obscene or indecent document or images, creation and transmission of
material which is designed to cause annoyance, inconvenience or anxiety, creation of defamatory
material, creation and transmission that infringes copyright of another person.

Particularly when an AUP is written for a college or school setting, AUPS remind students (or when in
the case of a company, employees) that connection to the internet, or use of a website, is a
privilege.

RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY ACCEPTABLE USE


POLICY FOR NETWORK AND INTERNET ACCESS OVERVIE
1. Statement of policy- the use of computers and access to the RGIT network is a privilege, not
a right. Unacceptable use may result in cancellation of the privilege for any user, whether
that user is a student, a staff member, or a community member.
2. Terms and Conditions- the use of the network/internet is for the purpose of education,
communication, or search and must be consistent with the educational objectives of the
district as set forth in written board policy
 Users will not disclose their passwords to others or use the passwords of others
 Users shall not intentionally seek information, obtain copies of, or modify files belonging
to other users or misrepresent other users on the network
 User will not attempt to obtain unauthorized access to any account or network security
level other than those specifically provided for their use
 Users are not to install software of any type on any computer without permission from
the technology director or network support personnel.

QUESTION 2
Difference between deadlock and starvation
The difference between deadlock and starvation is the cause and effect relationship
between them; it’s deadlock that causes starvation. Another interesting difference between
deadlock and starvation is that deadlock is a problem while starvation can, sometimes, help
to get out from a deadlock. In the computer world, when writing a computer program there
will be more than one process/thread that will concurrently run one after the other in order
to fulfil the required service to the program. Therefore, in order to have a fair system, the
programmer should have to ensure that all the processes/threads will receive or get enough
access to resources that they need. If not there will be a deadlock, and it will lead to a
starvation later. Generally, a fair system does not contain any deadlocks or starvations.
Deadlocks and starvation will occur mainly when many threads are competing for limited
resources.

What is Deadlock?
A deadlock is a condition that occurs when two threads or processes wait for each other to
complete task. They will hang up but never stop or finish their task. In computer science,
deadlocks can be seen everywhere. In a transaction database, when two processes each
within its own transaction updates the same two rows of information but in the opposite
order, will cause a deadlock. In concurrent programming, a deadlock may occur when two
competing actions will wait for each other to proceed forward. In telecommunications
systems, a deadlock can happen due to loss or corruption of signals. At present, deadlock is
one of the main problems in multiprocessing systems and parallel computing. As a solution,
a locking system called process synchronization is implemented fot software as well as
hardware.
What is Starvation?
Starvation is a problem that is encountered when multiple threads or processes wait for the
same resources, which is called a deadlock

Four general strategies for dealing with deadlocks


There are couple strategies people tend to make when dealing with deadlock. When
deadlock happens very infrequently and data loss is insignificant, you could ignore deadlock .
This was actually the approach originally taken by UNIX systems.
If you know a bit about how your system works and you think you can identify in which
situation you’ll probably run into deadlock, you could also use a deadlock detection
approach. You could use a deadlock detection algorithm to track resource allocation and
process states and thus check to see if some processes are blocked while simultaneously
using allocated resources, which they’d like to trade but will not due to deadlock. In this
scenario, after detection you could either end one process involved in the deadlock at a time
until the deadlock is resolved (expensive since you have to keep checking to see if you’re
still in deadlock), or you can end all processes involved (problematic since you could lose
partial computations). Another way to approach this is to pre-empt the resources in
contention and allocate them to each processes such that there’s no deadlock.
I do believe the most common way to deal with deadlock to prevent deadlock with deadlock
prevention. Programs using this method will try to avoid ever entering any one of 4
conditions for deadlock (Coffman conditions):
1. Mutual exclusion: no process has exclusive access to a resource
2. Hold and wait: while a process waits for a resource, it hold onto the one it currently has

IGNORANCE- if deadlocks are not liable to happen, the effort required to deal with them
outweighs the problem of deadlocks actually occurring.
DETECTION AND RECOVERY- keep log of resource ownership and request. If no progress is
made, recover from said deadlock by pre-emption (steal a resource from another process),
rollback (back checkpoints- but operating systems aren’t Halo or call of Duty, this is difficult),
or crudely killing processes in the deadlock cycle.
DEADLOCK AVOIDANCE- the most difficult option. We disallow deadlock by setting “safe
states”, in which process completion is always guaranteed.
DEADLOCK PREVENTION- Negate one of the four deadlock conditions. Most commonly we
deal with the circular wait condition. Attacking mutex is infeasible, attacking hold and wait is
prone to starvation, and attacking no pre-emption is downright idiotic.

THE FOUR CONDITIONS REQUIRED FOR DEADLOCK TO OCCUR


Mutual exclusive-a mutual exclusion (mutex) is a program object that prevents
simultaneously access to a shared resources. This concept is used in concurrent
programming with a critical section, a piece of code in which processes or threads access a
shared resource.
Hold and wait or partial allocation-the processes must hold the resources they have already
been allocated while waiting for other (requested) resources. If the process had no release
its resources when a new resource or resources were requested, deadlock could not occur
because the process would not prevent others from using resources that it controlled.
No pre-emption- The processes must not have resources taken away while that resource is
being used. Otherwise deadlock could not occur since the operation system could simply
take enough resources from running processes to enable any process to finish. Pre-emption
means: in computing, pre-emption in the act of temporarily interrupting a task being carried
out by a computer system, without requiring its cooperation, and with the intention of
resuming the task at a later time. Such changes of the executed task are known as context
witches. It is normally carried out by a privileged task or part of the system known as a pre-
emptive scheduler, which has the power to pre-empt, or interrupt, and later resume, other
tasks in the system.
Circular wait- each process must be waiting for a resource which is being held by another
process, which in return is waiting for the first process to release the resource. In general,
there is a set of waiting processes, P={P1,P2…,PN}, such that P1 is waiting for a resource held
by P2, P2 is waiting for a resource held by P3 until PN is waiting for a resource held by P1

QUESTION 3
1 GREEN COMPUTING
Green computing is the environmentally responsible and eco-friendly use of computers and their
resources. In broader terms, it is also defined as the study of designing, engineering, manufacturing,
using and disposing of computing devices in a way that reduces their environmental impact. Many IT
manufacturers and vendors are continuously inventing in designing energy-efficient computing
devices, reducing the use of dangerous materials and encouraging the recyclability of digital devices.
Green computing practices came into prominence in 1992, when the Environmental Protection
Agency (EPA) launched the energy star program. Green computing is also known as green
information technology (green IT). Green computing also aims to attain economic viability and
improve the way computing devices are used. Green IT practices include the development of
environmentally sustainable production practices, energy-efficient computers and improved disposal
and recycling procedures.

To promote green computing concepts at all possible levels. The


following four approaches are employed:
 Green use: minimizing the electricity consumption of computers and their peripheral devices
and using them in an eco-friendly manner.
 Green disposal: repurposing existing equipment or appropriately disposing of, or recycling.
Unwanted electronic equipment.
 Green design: designing energy-efficient computers, servers, printers, projectors and other
digital devices.
 Green manufacturing: minimizing waste during the manufacturing of computers and other
subsystems to reduce the environmental impact of these activities.

The steps you can take to contribute to green computing


 Power down when not in use: seems obvious but many of us leave computers powered up
for long periods when not in use. Computer displays in particular use a large amount of
energy so if you’re not using the computer for a while press the power button to shut it off
until required, you can do this even if the computer is working on something. Remember
that a screensaver doesn’t save power. Same goes for your computer itself, you don’t have
to shut it down completely if you don’t want to reboot, just use sleep or hibernation mode.
This will save energy but restore the system to its current state when you need it again.
 Make use of power saving features: all computers include power saving option. Using these
features you can command your computer to perform various energy-saving tasks
automatically, include shutting off unused hard disks, powering off a monitor after a certain
time or even placing the computer into sleep mode after a set period inactivity. These are
especially used on laptops to help retain battery life
 Buy energy efficient hardware: if you don’t need super-fast computing power, then look out
for energy efficient components when buying a new computer, such as green hard drives
and low-energy processors. While performance is slower they can use significantly less
power. In particular and save money, they’re often quieter too.
 Use a laptop: laptops are far better for the environment than desktop computers as they
have components which require less power. If you don’t need a desktop computer consider
buying a laptop instead, or if you have both use the laptop whenever possible.

Video conferencing
Video conferencing has been use numerically since the 1970s and is designed to service groups,
rather than individuals through a simultaneous audio and video connection. Each participant need
access to the internet as well as a webcam, screen, microphone and set of speakers. Although this
may sound like a lot of costly IT investment before you even start, most new computers and laptops
have a lot of this equipment built in to them as standard.

Video conferencing is now used more and more in the business world for presentations, training,
and board meetings. However, what are the real benefits to businesses and will they ever
completely replace face to face meetings?

Video conferencing saves time, there is no denying that, when it’s necessary to gather delegates
from around the city, country, or even the world, video conferencing saves a huge amount of time in
travel. Meetings can start promptly without being delayed due to late arrivals of trains or planes, or
the impact of traffic or bad weather. In addition, staff loses only a minimum amount of time from
their working day ensuring they’re more productive. This is crucial for many companies, particularly
SMEs, where having an employee out of the office for a day can have huge impact to work load and
deliverables.
Video conferencing saves money: in sir Philip Green’s review of UK government spending, he found
that staff spent around 38 million of London hotels when attending meetings in the capital alone.
This is clearly just a fraction of what UK businesses spend on business travel but shows how costly it
can be when you take into account return travel and, , if necessary, an overnight stay. Using video
conferencing cuts this amount drastically, allowing delegates from around the globe to meet quickly
and easily with minimal cost to the business. Indeed, this amount can be as low as just the cost of
your internet connection thanks to skype, and other web based services, making the service more
cost effective yet.

Video conferencing enhances business relationships: of course meetings can be far more about
enhancing and improving business relationships than about the actual business in hand. Establishing
relationships between colleagues, clients and suppliers are crucial to running a successful business
and face to face meetings are the best way to facilitate this. However, when these are not possible,
holding a ‘face to face’ video conference can be an effective alternative to meeting in person. Giving
people the opportunity to present, catch up or simply brainstorm in front of each other is a great
way to promote effective working and maintain business relationships already in place.

How big of a role do green issues play in the value proposition that
you pitch to customers when they are looking at upgrading their data
centre?
All the above can be translated into costs. Green issues are important but most data centres
concentrate on the best overall efficiency for an acceptable cost. The green issues resolve out of the
system that it put into place. There more efficient the system the less are the green issues, it is a big
role because efficiency reduces costs and lower energy consumption. Data centres are no longer
places where extreme environmental control is required to ensure that the equipment used has the
best opportunity for a long operational life. The investment in housing and cooling is now a
moderate expenditure. Many small data centres can operate their main servers in a well-ventilated
cupboard within an air-conditioned office space that accommodates employees with their workplace
equipment as well.

Today’s data centres demand efficiency. Efficiency translates to a lower carbon footprint and less
waste. (Walter Fiori) “When I started working I was associated by function with the taken known
EDP department. EDP was a sanctified area where only specialists trained in the equipment were
allowed to enter and manage the equipment and data. When the company upgraded their computer
memory capacity from 1MB to 2MB the end wall of the building had to be removed and an area
about 30 foot long and 30 foot wide had to be added. This are also needed an extensive air
conditioning plant and clean room. It cost almost as much as to add to the building as it did to
purchase the extra 1MB of memory. My , and each of my colleagues, end of month reports were a
stack

You might also like