You are on page 1of 7

Running head: PROTECTION SCHEME

Protection Scheme Tokla Xen POS/355 March 17, 2014 Ashok Rao University of Phoenix

PROTECTION SCHEME

Protection Scheme Our assign task for this assignment is to provide a method that allows or enable 4,990 users to access one file using a UNIX system that is capable of supporting 5000 users. There are many ways to achieve this approach. To keep it short, the answer to this method would be: 1. Create an access control list with the names of all 4990 users. 2. Put these 4990 users in one group and set the group access accordingly. This scheme cannot always be implemented since user groups are restricted by the system.( SILBERSCHATZ) Before you think of trying to use both of these method, make sure your system can support up to 5000 users. If not, read further along for a brief detail on how you can setup a system that will allow you achieve this task. To achieve our assigned task, we will setup a system that allows us to support 5000 users at once using the UNIX system. The enterprise server is the best option to contain multiple users compared to the other operating systems. What is an enterprise server? An enterprise server is a computer containing programs that collectively serve the needs of an enterprise rather than a single user, department, or specialized application. (techtarget.com) Supporting 5000 users simultaneously is a very hefty job/duty, so we will use SPAC Enterprise M5000 specification as reference and custom built your own system per preference. Below are the specifications from a SPAC Enterprise M5000 (Use as reference to build your supercomputer):

PROTECTION SCHEME

SPAC Enterprise M5000


Processor Fujitsu SPARC64 VII 2.4 GHz Memory 16.0 GB / 256.0 GB (max) Hard Drive 146.0 GB Operating System SunSoft Solaris 10 (11/06) Optical Drive DVD-ROM Monitor Type none. Cache Type L2 cache Cache Size 10.0 MB The UNIX system is capable of performing many protection schemes. The systems directory and files are protected and handled very similarly. They all are associated with a sub-directory that is part of owner, group and universe that consists of the three bits RWX. Owner. The user who created the le is the owner. Group. A set of users who are sharing the le and need similar access, is a group, or work group. Universe. All other users in the system constitute the universe. Each directory is part of a subdirectory that only users who are associated with it can gain access. If the letter R is associated with the Users privileges, then he or she will be able to read the files. The letter W will allow the user to write or edit the file. The letter X will allows the users to execute the files. Having all letters (RWX) associated with the user will allow full control. Each user is part of a subdirectory that associates with different levels of permission or privileges. The permission level is written in a 9 Bits format for the different subdirectory: RWX-RWX-RWX (Owner, Group, Universe). If we add 4990 users into a group, they will all have the same privileges. This mean if the group is set for RW, then the group can only read and write the files. Below are some samples:

PROTECTION SCHEME

To grant access to other users, an Administrator or Manager (super user) will create a group and modify the permissions. Users can all be part of one group or split among different groups for different access level. Access control list is more secured than just adding users in a group. ACL have the ability for users to be part of different groups and let the Superusers defines access level for a basis of per user/per group. ACLs provide inheritance of attributes from directories to files via so called default permissions (which exists only for directories) and generalize unmask concept by applying it to read and write operations, in addition to file creation like in classic Unix. (SoftPanorama)

PROTECTION SCHEME

References ABRAHAM, S., PETER B. G., GREG G., (2013)Operating Systems Concepts 9th Edition, Hoboken,NJ Wiley INC http://www.softpanorama.org/Access_control/acl.shtml

Content / Development 70% or 10.5 points

Points Earned 10.5

Comments:

All key elements of the assignment are covered in a substantive way.

Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX?

You chose option 1 and did cover the key elements of the assignment, which, was to describe the access provisioning that would allow 4990 users access to a particular file. Assigning the 4990 users to a group that owns the file is the correct approach.

Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX ?

PROTECTION SCHEME

The content is comprehensive, accurate, and /or persuasive. The paper develops a central theme or idea, directed toward the appropriate audience. The paper links theory to relevant examples of current experience and industry practice, and uses the vocabulary of the theory correctly. Major points are stated clearly; are supported by specific details, examples, or analysis; and are organized logically. Minimum of 2 references

Yes Yes

Yes

Yes

The introduction provides sufficient background on the topic and previews major points. The conclusion is logical, flows from the body of the paper, and reviews the major points.

Yes

Yes

Readability and Style 15% or 2.25 Points

Points Earned 2.25

Comments:

Paragraph transitions are present and logical and maintain the flow throughout the paper. The tone is appropriate to the content and assignment. Sentences are complete, clear, and concise. Sentences are well-constructed, with consistently strong, varied sentences. Sentence transitions are present and maintain the flow of thought.

Yes

Yes Yes Yes

Yes

PROTECTION SCHEME

Mechanics 15% or 2.25 points

Points Earned 2.25

Comments:

The paper, including the title page, reference page, tables, and appendices, follow APA guidelines for format. Citations of original works within the body of the paper follow APA guidelines. The paper is laid out with effective use of headings, font styles, and white space. Rules of grammar, usage, and punctuation are followed. Spelling is correct.

Yes

Yes

Yes

Yes Yes

Total 100% or 15 Points

Points Earned 15

Comments:

You did a great job with the paper adhering to the APA standard.

You might also like