<s>
The	O
fallacies	B-Operating_System
of	I-Operating_System
distributed	I-Operating_System
computing	I-Operating_System
are	O
a	O
set	O
of	O
assertions	O
made	O
by	O
L	O
Peter	O
Deutsch	O
and	O
others	O
at	O
Sun	O
Microsystems	O
describing	O
false	O
assumptions	O
that	O
programmers	B-Application
new	O
to	O
distributed	B-Architecture
applications	I-Architecture
invariably	O
make	O
.	O
</s>
<s>
The	O
network	B-Architecture
is	O
reliable	O
;	O
</s>
<s>
The	O
network	B-Architecture
is	O
secure	O
;	O
</s>
<s>
Topology	B-Architecture
does	O
n't	O
change	O
;	O
</s>
<s>
The	O
network	B-Architecture
is	O
homogeneous	O
.	O
</s>
<s>
Software	B-Application
applications	I-Application
are	O
written	O
with	O
little	O
error-handling	O
on	O
networking	O
errors	O
.	O
</s>
<s>
During	O
a	O
network	B-Architecture
outage	O
,	O
such	O
applications	B-Application
may	O
stall	O
or	O
infinitely	O
wait	O
for	O
an	O
answer	O
packet	O
,	O
permanently	O
consuming	O
memory	O
or	O
other	O
resources	O
.	O
</s>
<s>
When	O
the	O
failed	O
network	B-Architecture
becomes	O
available	O
,	O
those	O
applications	B-Application
may	O
also	O
fail	O
to	O
retry	O
any	O
stalled	O
operations	O
or	O
require	O
a	O
(	O
manual	O
)	O
restart	O
.	O
</s>
<s>
Ignorance	O
of	O
network	B-Architecture
latency	O
,	O
and	O
of	O
the	O
packet	B-Protocol
loss	I-Protocol
it	O
can	O
cause	O
,	O
induces	O
application	O
-	O
and	O
transport-layer	O
developers	B-Application
to	O
allow	O
unbounded	O
traffic	O
,	O
greatly	O
increasing	O
dropped	O
packets	O
and	O
wasting	O
bandwidth	O
.	O
</s>
<s>
Complacency	O
regarding	O
network	B-Architecture
security	O
results	O
in	O
being	O
blindsided	O
by	O
malicious	O
users	O
and	O
programs	O
that	O
continually	O
adapt	O
to	O
security	O
measures	O
.	O
</s>
<s>
Changes	O
in	O
network	B-Architecture
topology	I-Architecture
can	O
have	O
effects	O
on	O
both	O
bandwidth	O
and	O
latency	O
issues	O
,	O
and	O
therefore	O
can	O
have	O
similar	O
problems	O
.	O
</s>
<s>
Multiple	O
administrators	O
,	O
as	O
with	O
subnets	B-Protocol
for	O
rival	O
companies	O
,	O
may	O
institute	O
conflicting	O
policies	O
of	O
which	O
senders	O
of	O
network	B-Architecture
traffic	O
must	O
be	O
aware	O
in	O
order	O
to	O
complete	O
their	O
desired	O
paths	O
.	O
</s>
<s>
The	O
"	O
hidden	O
"	O
costs	O
of	O
building	O
and	O
maintaining	O
a	O
network	B-Architecture
or	O
subnet	B-Protocol
are	O
non-negligible	O
and	O
must	O
consequently	O
be	O
noted	O
in	O
budgets	O
to	O
avoid	O
vast	O
shortfalls	O
.	O
</s>
<s>
If	O
a	O
system	O
assumes	O
a	O
homogeneous	O
network	B-Architecture
,	O
then	O
it	O
can	O
lead	O
to	O
the	O
same	O
problems	O
that	O
result	O
from	O
the	O
first	O
three	O
fallacies	O
.	O
</s>
<s>
Around	O
1997	O
,	O
James	O
Gosling	O
,	O
another	O
Sun	O
Fellow	O
and	O
the	O
inventor	O
of	O
Java	B-Language
,	O
added	O
the	O
eighth	O
fallacy	O
.	O
</s>
