How to implement hot switching of servers?

In Section 12.3, we examined an issue related to access control and notification in the CTC system. Select a
similar issue that could occur in the development and CTC and populate it with relevant proposals, criteria,
arguments, and justify a resolution. Examples of such issues include:
This exercise is best done in groups of three or more. The goal is not to test the student’s knowledge of the CTC
systems and its related issues, but rather, to test their ability to structure the debate resulting in this knowledge using
rationale techniques.


P[2]: Requests to the mainServer are concurrently forwarded to the hotBackup (e.g., by a proxy
server standing between the clients and the servers). The replies from both servers are
received by the proxy but those from hotBackup are simply ignored.(same as P[2] above).
If the main server fails to respond within a time out, it is restarted and the hotBackup
becomes the mainServer.
A[5]: Simplicity.
P[4]: A similar proxy server forwards requests to both servers and forwards the first reply that
comes back to the client. If the second reply does not occur within a time out, the slower
server is restarted.
A[6] for P[4]: Better response time.
A[7] against P[4]: To take advantage of the shorter response time, the proxy has to be
multithreaded, adding complexity to a single point of failure.
R[2]: P[4] for response time.

Computer Science & Information Technology

You might also like to view...

A(n) ________ SmartArt diagram shows a proportional relationship with the largest component on the top or the bottom

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following opens as a canvas in the center of the window that acts as an easel?

A) Calculator B) Notepad C) Paint D) Wordpad

Computer Science & Information Technology

Which of the following situations would most likely indicate a potential error with a host's default router setting?

A) A standard ping of a local LAN host and extended ping of the same LAN host both fail. B) A standard ping of a local LAN host succeeds and an extended ping of the same LAN host fails. C) A standard ping of a local LAN host and extended ping of the same LAN host both succeed. D) A standard ping of a local LAN host fails and extended ping of the same LAN host succeeds.

Computer Science & Information Technology

Bob Smith is suspected of using his company's Internet facilities as a conduit for sending large quantities of SPAM to millions of users. You are called in to examine his computer to see if there is evidence to support this claim. This is initially a form of what type of investigation?

a. Civil b. Internal c. Criminal d. This is not something you would do.

Computer Science & Information Technology