NonStop Systems Introduction

Requirements of ZLE Systems
NonStop Systems Introduction527825-001
2-3
Data Security
check the customer’s credit card transaction history, including purchases, refunds, and
exchanges. The ZLE software would return a recommendation based on its
examination of the customer’s history. But the recommendation is only as reliable as
the data; any missing or incorrect information in the transaction history could result in
an unreliable recommendation.
If a processor, disk drive, or disk drive controller fails, the dangers to data integrity are
even greater. Many applications, each with multiple concurrent users, could be
executing at the point of failure. These applications could be in the process of
updating hundreds of records on the data store at the moment of failure. If we have no
way of knowing which updates were successful and which ones did not get recorded in
the data store, the data store is no longer useful because it no longer reflects the real
state of things.
A ZLE system must ensure that transaction data and data in the data store are correct
and consistent at all times. The need for data integrity imposes the following three
requirements:
The system must preserve data as received from the end user or other source,
even if a system component fails while the system is processing the data.
The system must back out those transactions that cannot transform the data store
from one consistent state to another.
The system must restore the data store to its correct and operational state in the
event of a failure such as a head crash on a disk drive or the loss of a pair of disk
drives.
Data Security
ZLE applications make data resources available to multiple end users of business
applications. Such ZLE applications must be able to restrict the use of data resources
to a subset of the total user population, or the business loses control of its resources.
For example, the data store might contain credit card information for an order-entry
application running on an operational system. The server that runs the application that
accesses the data store must provide a security mechanism that prevents
unauthorized users from viewing or altering records.
In addition, the system must offer a security mechanism that restricts authorized users
to subsets of data. For example, each manager who has access to the database must
be able to view and alter only those records that pertain to that manager’s employees.
High Performance
If a ZLE system is to provide anything close to zero latency, the ZLE applications and
data store must be able to handle massive workloads without overwhelming the
processing capabilities of the ZLE system. Furthermore, as the business grows, the
system must be able to handle the increasing volume of transactions with no loss of