Introduction to Mission Critical Systems and Its Requirements

Introduction to Mission Critical Systems and Its Requirements

Ashraf A. Ali, Khalid Al-Begain
DOI: 10.4018/978-1-5225-2113-6.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this chapter, the definition of Mission Critical Systems, users, and services will be introduced, then main applications of such system will be listed, the general requirements will be investigated, and finally a distinction between different types of Mission Critical Systems will be briefly discussed. Nowadays, many governmental and non-governmental organizations (NGOs) play critical roles in its operations on everyday basis. The services provided by such organization is of special nature that makes it less tolerant to executional or operational errors; such services are referred as Mission Critical Services. The criticality of the service implies that it has a set of special requirements that distinguish it from other services, and it should be available anytime, anywhere within the service operational scope, and also it is supposed to be functioning within expectation limits regardless of the operational circumstances or running conditions.
Chapter Preview
Top

Applications Of Mission Critical Systems

Based on the definition mentioned above, The Mission Critical Systems (MCSs) are considered as systems that provide critical services for a certain target group. MCS is needed mainly as All-Time-Available backbone system to be accessible by system users and ensuring connectivity between clients and satisfying the service requirements with acceptable service quality based on the task and service type demanded by the client. The American Public Safety Advisory Committee (PSAC) in the United States describes every system that is capable of providing: an immediate communication with instantaneous connectivity, reliability to minimize the short term disruptions, and in most cases secure in order not to be accessed by unauthorized users. Such systems are required by many applications that will be briefly introduced in the following subsections.

Complete Chapter List

Search this Book:
Reset