Understanding Operating Systems 8th Edition
McHoes Solutions Manual download
https://testbankdeal.com/product/understanding-operating-
systems-8th-edition-mchoes-solutions-manual/
Explore and download more test bank or solution manual
at testbankdeal.com
Here are some recommended products for you. Click the link to
download, or explore more at testbankdeal.com
Understanding Operating Systems 7th Edition McHoes
Solutions Manual
https://testbankdeal.com/product/understanding-operating-systems-7th-
edition-mchoes-solutions-manual/
Understanding Operating Systems 5th Edition McHoes
Solutions Manual
https://testbankdeal.com/product/understanding-operating-systems-5th-
edition-mchoes-solutions-manual/
Understanding Operating Systems 5th Edition McHoes Test
Bank
https://testbankdeal.com/product/understanding-operating-systems-5th-
edition-mchoes-test-bank/
Essentials of Statistics for Business and Economics 7th
Edition Anderson Test Bank
https://testbankdeal.com/product/essentials-of-statistics-for-
business-and-economics-7th-edition-anderson-test-bank/
Access to Health 13th Edition Donatelle Test Bank
https://testbankdeal.com/product/access-to-health-13th-edition-
donatelle-test-bank/
Cornerstones of Financial Accounting 4th Edition Rich
Solutions Manual
https://testbankdeal.com/product/cornerstones-of-financial-
accounting-4th-edition-rich-solutions-manual/
Legal and Ethical Aspects of Health Information Management
3rd Edition McWay Test Bank
https://testbankdeal.com/product/legal-and-ethical-aspects-of-health-
information-management-3rd-edition-mcway-test-bank/
Discrete Event System Simulation 5th Edition Banks
Solutions Manual
https://testbankdeal.com/product/discrete-event-system-simulation-5th-
edition-banks-solutions-manual/
Managing Human Resources Global 8th Edition Balkin Test
Bank
https://testbankdeal.com/product/managing-human-resources-global-8th-
edition-balkin-test-bank/
Cengage Advantage Books Business Law Text and Exercises
8th Edition Miller Solutions Manual
https://testbankdeal.com/product/cengage-advantage-books-business-law-
text-and-exercises-8th-edition-miller-solutions-manual/
Understanding Operating Systems, Eighth Edition 9-1
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Chapter 9
Network Organization Concepts
At a Glance
Instructor’s Manual Table of Contents
• Overview
• Learning Objectives
• Teaching Tips
• Quick Quizzes
• Class Discussion Topics
• Additional Projects
• Additional Resources
• Key Terms
Understanding Operating Systems, Eighth Edition 9-2
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Lecture Notes
Overview
When computer resources are connected together by data communication components, they
form a network to support the many functions of the organization. Networks provide an
essential infrastructure for the members of an information-based society to process,
manipulate, and distribute data and information to each other. This chapter introduces the
terminology and basic concepts of networks.
Learning Objectives
After completing this chapter, the student should be able to describe:
• Several network topologies and how they connect hosts
• Several types of networks: LAN, MAN, WAN, and wireless LAN
• How circuit switching and packet switching compare
• How conflicts are resolved to allow a network to share common transmission hardware
and software effectively
• Two transport protocol models and how the layers of each one correspond to each other
Teaching Tips
Definitions and Concepts
1. Begin the discussion by introducing the terms network, network operating system
(NOS), and distributed operating system.
2. Note that at a minimum, a distributed operating system must provide the following
components: process or object management, memory management, file management,
device management, and network management. Use Figure 9.1 to aid the discussion.
3. Discuss the advantages of a distributed operating system.
4. In a distributed system, each processor classifies the other processors and their resources
as remote and considers its own resources local. Note that processors are referred to as
sites, hosts, and nodes, depending on the context in which they are mentioned. Use
Figure 9.2 to aid the discussion.
Network Topologies
1. Introduce the term topology.
Understanding Operating Systems, Eighth Edition 9-3
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
2. Note that in each topology, there are trade-offs among the need for fast communication
among all sites, the tolerance of failure at a site or communication link, the cost of long
communication lines, and the difficulty of connecting one site to a large number of
other sites. Point out that the physical topology of a network may not reflect its logical
topology.
3. For the network designer, there are many alternatives available, all of which will
probably solve the customer’s requirements. When deciding which configuration to use,
designers should keep in mind four criteria: basic cost, communications cost, reliability,
and user environment.
Star
1. Use Figure 9.3 to introduce the star topology.
2. Note that the star topology permits easy routing because the central station knows the
path to all other sites.
Ring
1. In the ring topology, all sites are connected in a closed loop, with the first site connected
to the last. Use Figure 9.4 to aid the discussion.
2. Introduce the term protocol.
3. Use Figures 9.5 and 9.6 to discuss variations of the ring topology.
4. Note that although ring topologies share the disadvantage that every node must be
functional for the network to perform properly, rings can be designed that allow failed
nodes to be bypassed - a critical consideration for network stability.
Bus
1. In the bus topology, all sites are connected to a single communication line running the
length of the network. Use Figure 9.7 to aid the discussion.
2. Note that because all sites share a common communication line, only one of them can
successfully send messages at any one time. Therefore, a control mechanism is needed
to prevent collisions.
Tree
1. Use Figure 9.8 to introduce the tree topology.
2. Point out that one advantage of bus and tree topologies is that even if a single node fails,
message traffic can still flow through the network.
Understanding Operating Systems, Eighth Edition 9-4
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Hybrid
1. The objective of a hybrid configuration is to select from the strong points of each
topology and combine them to meet that system’s communications requirements most
effectively. Use Figures 9.9 and 9.10 to aid the discussion.
Teaching
Tip
To learn more about network topologies, visit:
https://www.lifewire.com/computer-network-topology-817884
Network Types
1. Networks are generally divided into local area networks, metropolitan area networks,
and wide area networks. Note however, that as communications technology advances,
the characteristics that define each group are blurring. In recent years, the wireless local
area network has become ubiquitous.
Personal Area Network
1. Explain that a personal area network (PAN) includes information technology that
operates within a radius of approximately 10 meters of an individual and is centered
around that one person.
2. Also called body area networks (BANs), PANs include networks for wearable
technology (gloves, caps, monitors, and so on) that use the natural connectivity of the
human body to communicate.
Local Area Network
1. Introduce the terms bridge and gateway.
2. Note the factors that should be considered when selecting a transmission medium: cost,
data rate, reliability, number of devices that can be supported, distance between units,
and technical limitations.
Metropolitan Area Network
1. A MAN is a high-speed network often configured as a logical ring. Depending on the
protocol used, messages are either transmitted in one direction using only one ring or in
both directions using two counter-rotating rings. Use Figures 9.4 and 9.5 to aid the
discussion.
Wide Area Network
1. A wide area network (WAN) defines a configuration that interconnects communication
facilities in different parts of the world, or that is operated as part of a public utility.
Point out that WANs use the communications lines of common carriers, which are
Understanding Operating Systems, Eighth Edition 9-5
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
government- regulated private companies, such as telephone companies that already
provide the general public with communication facilities.
Wireless Local Area Network
1. A wireless local area network (WLAN) is a local area network that uses wireless
technology to connect computers or workstations located within the range of the
network. Use Table 9.1 to aid the discussion.
2. For wireless nodes (workstations, laptops, and so on), a WLAN can provide easy access
to a larger network or the Internet, as shown in Figure 9.12. Emphasize that a WLAN
poses security vulnerabilities because of its open architecture and the inherent difficulty
of keeping out unauthorized intruders.
Teaching
Tip
To learn about wireless network security, visit:
http://searchsecurity.techtarget.com/WLAN-security-Best-practices-for-wireless-
network-security
Quick Quiz 1
1. A(n) ____ provides good control for distributed computing systems and allows their
resources to be accessed in a unified way.
Answer: distributed operating system
2. The term ____ is used to describe a specific set of rules used to control the flow of
messages through the network.
Answer: protocol
3. A(n) ____ is a data-link layer device used to interconnect multiple networks using the
same protocol.
Answer: bridge
4. A(n) ____ translates one network’s protocol into another, resolving hardware and
software incompatibilities.
Answer: gateway
Software Design Issues
1. Examine four software issues that must be addressed by network designers in this
section:
▪ How do sites use addresses to locate other sites?
▪ How are messages routed, and how are they sent?
▪ How do processes communicate with each other?
Understanding Operating Systems, Eighth Edition 9-6
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
▪ How are conflicting demands for resources resolved?
Addressing Conventions
1. Discuss the difference between local and global names.
2. Introduce the Domain Name Service (DNS) protocol. Use the example on page 305 to
aid the discussion.
3. Point out that not all components need to be present in all Internet addresses.
Nevertheless, the DNS is able to resolve them by examining each one in reverse order.
Routing Strategies
1. A router is an internetworking device, primarily software driven, which directs traffic
between two different types of LANs or between two network segments with different
protocol addresses.
2. Discuss the role of routers.
3. Routing protocols must consider addressing, address resolution, message format, and
error reporting. Note that most routing protocols are based on an addressing format that
uses a network and a node number to identify each node.
4. Introduce the term address resolution.
5. Briefly discuss the most widely used routing protocols in the Internet:
▪ Routing Information Protocol (RIP): In this protocol, selection of a path to
transfer data from one network to another is based on the number of intermediate
nodes, or hops, between the source and the destination. The path with the smallest
number of hops is always chosen.
▪ Open Shortest Path First (OSPF): In this protocol, selection of a transmission
path is made only after the state of a network has been determined. This way, if an
intermediate hop is malfunctioning, it is eliminated immediately from consideration
until its services have been restored.
Connection Models
1. A communication network is not concerned with the content of data being transmitted
but with moving the data from one point to another. Note that because it would be
prohibitive to connect each node in a network to all other nodes, the nodes are
connected to a communication network designed to minimize transmission costs and to
provide full connectivity among all attached devices.
2. The following topics should be discussed:
▪ Circuit Switching: This is a communication model in which a dedicated
communication path is established between two hosts. The path is a connected
Understanding Operating Systems, Eighth Edition 9-7
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
sequence of links; the connection between the two points exists until one of them is
disconnected.
▪ Packet Switching: This is basically a store-and-forward technique in which a
message is divided into multiple equal-sized units called packets, which are then
sent through the network to their destination where they are reassembled into their
original long format. Use Figure 9.13 to aid the discussion. Note that there is no
guarantee that after a message has been divided into packets that they will all travel
along the same path to their destination or that they will arrive in their physical
sequential order. Note also, that packets from one message may be interspersed with
those from other messages as they travel toward their destinations.
Discuss the differences between circuit switching and packet switching. Use Table
9.2 to aid the discussion. Datagrams and virtual circuits should also be discussed.
Conflict Resolution
1. Introduce some medium access control techniques: round robin, reservation, and
contention. Then briefly examine three common medium access control protocols used
to implement access to resources: carrier sense multiple access (CSMA); token passing;
and distributed-queue, dual bus (DQDB).
2. The following topics should be discussed:
▪ Access Control Techniques: In networks, round robin allows each node on the
network to use the communication medium. If the node has data to send, it is given
a certain amount of time to complete the transmission. If the node has no data to
send, or if it completes transmission before the time is up, then the next node begins
its turn. The reservation technique is well-suited for lengthy and continuous traffic
while the contention technique is better for short and intermittent traffic.
▪ CSMA: Carrier sense multiple access (CSMA) is a contention-based protocol that is
easy to implement. Carrier sense means that a node on the network will listen to or
test the communication medium before transmitting any messages, thus preventing a
collision with another node that is currently transmitting. Introduce the terms
multiple access, carrier sense multiple access with collision detection
(CSMA/CD), and CSMA with collision avoidance (CSMA/CA).
▪ Token Passing: In a token passing network, a special electronic message, called a
“token,” is generated when the network is turned on. The token is then passed along
from node to node. Only the node with the token is allowed to transmit, and after it
has done so, it must pass the token on to another node. These networks typically
have either a bus or ring topology and are popular because access is fast and
collisions are nonexistent. Introduce the term token bus network.
▪ DQDB: The distributed-queue, dual bus (DQDB) protocol is intended for use with a
dual-bus configuration, where each bus transports data in only one direction and has
been standardized by one of the IEEE committees as part of its MAN standards.
Transmission on each bus consists of a steady stream of fixed-size slots, Use Figure
9.14 to aid the discussion.
Understanding Operating Systems, Eighth Edition 9-8
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Transport Protocol Standards
1. This section compares the OSI reference model with the TCP/IP model.
OSI Reference Model
1. This model provides the basis for connecting open systems for distributed applications
processing. Note that the word “open” means that any two systems that conform to the
reference model and the related standards can be connected, regardless of the vendor.
2. Use Figure 9.15 to illustrate the seven-layer OSI model.
3. Briefly discuss the function of each of the layers:
▪ Layer 1-Physical Layer: Layer 1 is at the bottom of the model. This is where the
mechanical, electrical, and functional specifications for connecting a device to a
particular network are described.
▪ Layer 2-Data Link Layer: Bridging between two homogeneous networks occurs at
this layer. On one side, the data link layer establishes and controls the physical path
of communications before sending data to the physical layer below it. It takes the
data, which has been divided into packets by the layers above it, and physically
assembles the packet for transmission by completing its frame.
▪ Layer 3-Network Layer: Layer 3 provides services such as addressing and routing
that move data through the network to its destination. Basically, the software at this
level accepts blocks of data from Layer 4, the transport layer, resizes them into
shorter packets, and routes them to the proper destination.
▪ Layer 4-Transport Layer: Software for this layer contains facilities that handle
user addressing; it ensures that all the packets of data have been received and that
none have been lost.
▪ Layer 5-Session Layer: While the transport layer is responsible for creating and
maintaining a logical connection between end points, the session layer provides a
user interface that adds value to the transport layer in the form of dialogue
management and error recovery.
▪ Layer 6-Presentation Layer: Layer 6 is responsible for data manipulation
functions common to many applications, such as formatting, compression, and
encryption. Data conversion, syntax conversion, and protocol conversion are
common tasks performed in this layer.
▪ Layer 7-Application Layer: This layer provides the interface to users and is
responsible for formatting user data before passing it to the lower layers for
transmission to a remote host. It contains network management functions and tools
to support distributed applications.
Teaching
Tip
To learn more about the OSI model, visit:
http://computer.howstuffworks.com/osi.htm
Understanding Operating Systems, Eighth Edition 9-9
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
TCP/IP Model
1. The Transmission Control Protocol/Internet Protocol (TCP/IP) reference model is
probably the oldest transport protocol standard. It is the basis for Internet
communications and is the most widely used network layer protocol today. Note that it
was developed for the U.S. Department of Defense’s ARPANET and provides
reasonably efficient and error-free transmission among different systems.
2. The TCP/IP model organizes a communication system with three main components:
processes, hosts, and networks. Processes execute on hosts, which can often support
multiple simultaneous processes that are defined as primary units that need to
communicate. These processes communicate across the networks to which hosts are
connected. Use Figure 9.16 to aid the discussion.
3. The following topics should be discussed:
▪ Layer 1-Network Access Layer: Protocols at this layer provide access to a
communication network.
▪ Layer 2-Internet Layer: The Internet layer is equivalent to the portion of the
network layer of the OSI model that is not already included in the previous layer,
specifically the mechanism that performs routing functions.
▪ Layer 3-Host-Host Layer: This layer supports mechanisms to transfer data
between two processes on different host computers.
▪ Layer 4-Process/Application Layer: This layer includes protocols for computer-
to-computer resource sharing.
Quick Quiz 2
1. The ____ is the most widely used protocol for ring topology.
Answer: token ring
2. The ____ makes technical recommendations about data communication interfaces.
Answer: International Organization for Standardization (ISO)
3. The term ____ refers to the name by which a unit is known within its own system.
Answer: local name
4. The term ____ refers to the name by which a unit is known outside its own system.
Answer: global name
Class Discussion Topics
1. Discuss the advantages and disadvantages of the different network topologies.
2. Which network topology do you think your school employs, and why? Give reasons to
support your answer.
Understanding Operating Systems, Eighth Edition 9-10
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
3. Which communication model do you think is most commonly used on the Internet?
Additional Projects
1. What is the most popular transmission media used in today’s high-speed LANs? Submit
a report that details its key characteristics.
2. Submit a report that discusses the steps involved in setting up a local area network in
Windows 10.
Additional Resources
1. Wi-Fi: http://www.gsmarena.com/glossary.php3?term=wi-fi
2. Network topologies: https://www.lifewire.com/computer-network-topology-817884
3. The OSI Model's Seven Layers Defined and Functions Explained:
https://support.microsoft.com/en-us/kb/103884
4. Circuit Switching vs. Packet Switching: https://www.lifewire.com/circuit-switching-vs-
packet-switching-3426726
5. Setting up a Local Area Network:
http://www.ibm.com/developerworks/library/l-lan/index.html
Key Terms
➢ bridge: a data-link layer device used to interconnect multiple networks using the
same protocol.
➢ bus topology: network architecture to connect elements together along a single
line.
➢ circuit switching: a communication model in which a dedicated communication
path is established between two hosts and on which all messages travel.
➢ distributed operating system: an operating system that provides control for a
distributed computing system, allowing its resources to be accessed in a unified
way.
➢ Domain Name Service (DNS): a general-purpose, distributed, replicated data
query service. Its principal function is the resolution of Internet addresses based
on fully qualified domain names.
➢ gateway: a communications device or program that passes data between
networks having similar functions but different protocols.
Visit https://testbankdead.com
now to explore a rich
collection of testbank,
solution manual and enjoy
exciting offers!
Understanding Operating Systems, Eighth Edition 9-11
© 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
➢ International Organization for Standardization (ISO): a voluntary, nontreaty
organization responsible for creating international standards in many areas,
including computers and communications.
➢ local area network (LAN): a data network intended to serve an area covering
only a few square kilometers or less.
➢ metropolitan area network (MAN): a data network intended to serve an area
approximating that of a large city.
➢ network: a collection of loosely coupled processors interconnected by
communications links using cables, wireless technology, or a combination of both.
➢ network operating system (NOS): the software that manages network resources
for a node on a network, and may provide security and access control.
➢ open shortest path first (OSPF): a protocol designed for use in Internet Protocol
(IP) networks, concerned with tracking the operational state of every network
interface.
➢ open systems interconnection (OSI) reference model: a seven-layer conceptual
structure describing computer network architectures and the ways in which data
passes through them.
➢ packet switching: a communication model in which messages are individually
routed between hosts, with no previously established communication path.
➢ protocol: a set of rules to control the flow of messages through a network.
➢ ring topology: a network topology in which each node is connected to two
adjacent nodes.
➢ routing information protocol (RIP): a routing protocol used by IP, based on a
distance-vector algorithm.
➢ star topology: a network topology in which multiple network nodes are
connected through a single, central node.
➢ token bus: a type of local area network with nodes connected to a common cable
using a CSMA/CA protocol.
➢ token ring: a type of local area network with stations wired into a ring network.
topology: in a network, the geometric arrangement of connections (cables,
wireless, or both) that link the nodes.
➢ Transmission Control Protocol/Internet Protocol (TCP/IP) reference model:
the suite of transport-layer and application-layer protocols that operate over the
Internet Protocol.
➢ tree topology: a network architecture in which elements are connected in a
hierarchical structure.
➢ wide area network (WAN): a network usually constructed with long-distance,
point-to-point lines, covering a large geographic area.
➢ wireless local area network (WLAN): a local area network with wireless nodes.
Other documents randomly have
different content
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E. Unless you have removed all references to Project Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is derived
from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is posted
with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
testbankdeal.com

Understanding Operating Systems 8th Edition McHoes Solutions Manual

  • 1.
    Understanding Operating Systems8th Edition McHoes Solutions Manual download https://testbankdeal.com/product/understanding-operating- systems-8th-edition-mchoes-solutions-manual/ Explore and download more test bank or solution manual at testbankdeal.com
  • 2.
    Here are somerecommended products for you. Click the link to download, or explore more at testbankdeal.com Understanding Operating Systems 7th Edition McHoes Solutions Manual https://testbankdeal.com/product/understanding-operating-systems-7th- edition-mchoes-solutions-manual/ Understanding Operating Systems 5th Edition McHoes Solutions Manual https://testbankdeal.com/product/understanding-operating-systems-5th- edition-mchoes-solutions-manual/ Understanding Operating Systems 5th Edition McHoes Test Bank https://testbankdeal.com/product/understanding-operating-systems-5th- edition-mchoes-test-bank/ Essentials of Statistics for Business and Economics 7th Edition Anderson Test Bank https://testbankdeal.com/product/essentials-of-statistics-for- business-and-economics-7th-edition-anderson-test-bank/
  • 3.
    Access to Health13th Edition Donatelle Test Bank https://testbankdeal.com/product/access-to-health-13th-edition- donatelle-test-bank/ Cornerstones of Financial Accounting 4th Edition Rich Solutions Manual https://testbankdeal.com/product/cornerstones-of-financial- accounting-4th-edition-rich-solutions-manual/ Legal and Ethical Aspects of Health Information Management 3rd Edition McWay Test Bank https://testbankdeal.com/product/legal-and-ethical-aspects-of-health- information-management-3rd-edition-mcway-test-bank/ Discrete Event System Simulation 5th Edition Banks Solutions Manual https://testbankdeal.com/product/discrete-event-system-simulation-5th- edition-banks-solutions-manual/ Managing Human Resources Global 8th Edition Balkin Test Bank https://testbankdeal.com/product/managing-human-resources-global-8th- edition-balkin-test-bank/
  • 4.
    Cengage Advantage BooksBusiness Law Text and Exercises 8th Edition Miller Solutions Manual https://testbankdeal.com/product/cengage-advantage-books-business-law- text-and-exercises-8th-edition-miller-solutions-manual/
  • 5.
    Understanding Operating Systems,Eighth Edition 9-1 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Chapter 9 Network Organization Concepts At a Glance Instructor’s Manual Table of Contents • Overview • Learning Objectives • Teaching Tips • Quick Quizzes • Class Discussion Topics • Additional Projects • Additional Resources • Key Terms
  • 6.
    Understanding Operating Systems,Eighth Edition 9-2 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Lecture Notes Overview When computer resources are connected together by data communication components, they form a network to support the many functions of the organization. Networks provide an essential infrastructure for the members of an information-based society to process, manipulate, and distribute data and information to each other. This chapter introduces the terminology and basic concepts of networks. Learning Objectives After completing this chapter, the student should be able to describe: • Several network topologies and how they connect hosts • Several types of networks: LAN, MAN, WAN, and wireless LAN • How circuit switching and packet switching compare • How conflicts are resolved to allow a network to share common transmission hardware and software effectively • Two transport protocol models and how the layers of each one correspond to each other Teaching Tips Definitions and Concepts 1. Begin the discussion by introducing the terms network, network operating system (NOS), and distributed operating system. 2. Note that at a minimum, a distributed operating system must provide the following components: process or object management, memory management, file management, device management, and network management. Use Figure 9.1 to aid the discussion. 3. Discuss the advantages of a distributed operating system. 4. In a distributed system, each processor classifies the other processors and their resources as remote and considers its own resources local. Note that processors are referred to as sites, hosts, and nodes, depending on the context in which they are mentioned. Use Figure 9.2 to aid the discussion. Network Topologies 1. Introduce the term topology.
  • 7.
    Understanding Operating Systems,Eighth Edition 9-3 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 2. Note that in each topology, there are trade-offs among the need for fast communication among all sites, the tolerance of failure at a site or communication link, the cost of long communication lines, and the difficulty of connecting one site to a large number of other sites. Point out that the physical topology of a network may not reflect its logical topology. 3. For the network designer, there are many alternatives available, all of which will probably solve the customer’s requirements. When deciding which configuration to use, designers should keep in mind four criteria: basic cost, communications cost, reliability, and user environment. Star 1. Use Figure 9.3 to introduce the star topology. 2. Note that the star topology permits easy routing because the central station knows the path to all other sites. Ring 1. In the ring topology, all sites are connected in a closed loop, with the first site connected to the last. Use Figure 9.4 to aid the discussion. 2. Introduce the term protocol. 3. Use Figures 9.5 and 9.6 to discuss variations of the ring topology. 4. Note that although ring topologies share the disadvantage that every node must be functional for the network to perform properly, rings can be designed that allow failed nodes to be bypassed - a critical consideration for network stability. Bus 1. In the bus topology, all sites are connected to a single communication line running the length of the network. Use Figure 9.7 to aid the discussion. 2. Note that because all sites share a common communication line, only one of them can successfully send messages at any one time. Therefore, a control mechanism is needed to prevent collisions. Tree 1. Use Figure 9.8 to introduce the tree topology. 2. Point out that one advantage of bus and tree topologies is that even if a single node fails, message traffic can still flow through the network.
  • 8.
    Understanding Operating Systems,Eighth Edition 9-4 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Hybrid 1. The objective of a hybrid configuration is to select from the strong points of each topology and combine them to meet that system’s communications requirements most effectively. Use Figures 9.9 and 9.10 to aid the discussion. Teaching Tip To learn more about network topologies, visit: https://www.lifewire.com/computer-network-topology-817884 Network Types 1. Networks are generally divided into local area networks, metropolitan area networks, and wide area networks. Note however, that as communications technology advances, the characteristics that define each group are blurring. In recent years, the wireless local area network has become ubiquitous. Personal Area Network 1. Explain that a personal area network (PAN) includes information technology that operates within a radius of approximately 10 meters of an individual and is centered around that one person. 2. Also called body area networks (BANs), PANs include networks for wearable technology (gloves, caps, monitors, and so on) that use the natural connectivity of the human body to communicate. Local Area Network 1. Introduce the terms bridge and gateway. 2. Note the factors that should be considered when selecting a transmission medium: cost, data rate, reliability, number of devices that can be supported, distance between units, and technical limitations. Metropolitan Area Network 1. A MAN is a high-speed network often configured as a logical ring. Depending on the protocol used, messages are either transmitted in one direction using only one ring or in both directions using two counter-rotating rings. Use Figures 9.4 and 9.5 to aid the discussion. Wide Area Network 1. A wide area network (WAN) defines a configuration that interconnects communication facilities in different parts of the world, or that is operated as part of a public utility. Point out that WANs use the communications lines of common carriers, which are
  • 9.
    Understanding Operating Systems,Eighth Edition 9-5 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. government- regulated private companies, such as telephone companies that already provide the general public with communication facilities. Wireless Local Area Network 1. A wireless local area network (WLAN) is a local area network that uses wireless technology to connect computers or workstations located within the range of the network. Use Table 9.1 to aid the discussion. 2. For wireless nodes (workstations, laptops, and so on), a WLAN can provide easy access to a larger network or the Internet, as shown in Figure 9.12. Emphasize that a WLAN poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders. Teaching Tip To learn about wireless network security, visit: http://searchsecurity.techtarget.com/WLAN-security-Best-practices-for-wireless- network-security Quick Quiz 1 1. A(n) ____ provides good control for distributed computing systems and allows their resources to be accessed in a unified way. Answer: distributed operating system 2. The term ____ is used to describe a specific set of rules used to control the flow of messages through the network. Answer: protocol 3. A(n) ____ is a data-link layer device used to interconnect multiple networks using the same protocol. Answer: bridge 4. A(n) ____ translates one network’s protocol into another, resolving hardware and software incompatibilities. Answer: gateway Software Design Issues 1. Examine four software issues that must be addressed by network designers in this section: ▪ How do sites use addresses to locate other sites? ▪ How are messages routed, and how are they sent? ▪ How do processes communicate with each other?
  • 10.
    Understanding Operating Systems,Eighth Edition 9-6 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. ▪ How are conflicting demands for resources resolved? Addressing Conventions 1. Discuss the difference between local and global names. 2. Introduce the Domain Name Service (DNS) protocol. Use the example on page 305 to aid the discussion. 3. Point out that not all components need to be present in all Internet addresses. Nevertheless, the DNS is able to resolve them by examining each one in reverse order. Routing Strategies 1. A router is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or between two network segments with different protocol addresses. 2. Discuss the role of routers. 3. Routing protocols must consider addressing, address resolution, message format, and error reporting. Note that most routing protocols are based on an addressing format that uses a network and a node number to identify each node. 4. Introduce the term address resolution. 5. Briefly discuss the most widely used routing protocols in the Internet: ▪ Routing Information Protocol (RIP): In this protocol, selection of a path to transfer data from one network to another is based on the number of intermediate nodes, or hops, between the source and the destination. The path with the smallest number of hops is always chosen. ▪ Open Shortest Path First (OSPF): In this protocol, selection of a transmission path is made only after the state of a network has been determined. This way, if an intermediate hop is malfunctioning, it is eliminated immediately from consideration until its services have been restored. Connection Models 1. A communication network is not concerned with the content of data being transmitted but with moving the data from one point to another. Note that because it would be prohibitive to connect each node in a network to all other nodes, the nodes are connected to a communication network designed to minimize transmission costs and to provide full connectivity among all attached devices. 2. The following topics should be discussed: ▪ Circuit Switching: This is a communication model in which a dedicated communication path is established between two hosts. The path is a connected
  • 11.
    Understanding Operating Systems,Eighth Edition 9-7 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. sequence of links; the connection between the two points exists until one of them is disconnected. ▪ Packet Switching: This is basically a store-and-forward technique in which a message is divided into multiple equal-sized units called packets, which are then sent through the network to their destination where they are reassembled into their original long format. Use Figure 9.13 to aid the discussion. Note that there is no guarantee that after a message has been divided into packets that they will all travel along the same path to their destination or that they will arrive in their physical sequential order. Note also, that packets from one message may be interspersed with those from other messages as they travel toward their destinations. Discuss the differences between circuit switching and packet switching. Use Table 9.2 to aid the discussion. Datagrams and virtual circuits should also be discussed. Conflict Resolution 1. Introduce some medium access control techniques: round robin, reservation, and contention. Then briefly examine three common medium access control protocols used to implement access to resources: carrier sense multiple access (CSMA); token passing; and distributed-queue, dual bus (DQDB). 2. The following topics should be discussed: ▪ Access Control Techniques: In networks, round robin allows each node on the network to use the communication medium. If the node has data to send, it is given a certain amount of time to complete the transmission. If the node has no data to send, or if it completes transmission before the time is up, then the next node begins its turn. The reservation technique is well-suited for lengthy and continuous traffic while the contention technique is better for short and intermittent traffic. ▪ CSMA: Carrier sense multiple access (CSMA) is a contention-based protocol that is easy to implement. Carrier sense means that a node on the network will listen to or test the communication medium before transmitting any messages, thus preventing a collision with another node that is currently transmitting. Introduce the terms multiple access, carrier sense multiple access with collision detection (CSMA/CD), and CSMA with collision avoidance (CSMA/CA). ▪ Token Passing: In a token passing network, a special electronic message, called a “token,” is generated when the network is turned on. The token is then passed along from node to node. Only the node with the token is allowed to transmit, and after it has done so, it must pass the token on to another node. These networks typically have either a bus or ring topology and are popular because access is fast and collisions are nonexistent. Introduce the term token bus network. ▪ DQDB: The distributed-queue, dual bus (DQDB) protocol is intended for use with a dual-bus configuration, where each bus transports data in only one direction and has been standardized by one of the IEEE committees as part of its MAN standards. Transmission on each bus consists of a steady stream of fixed-size slots, Use Figure 9.14 to aid the discussion.
  • 12.
    Understanding Operating Systems,Eighth Edition 9-8 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Transport Protocol Standards 1. This section compares the OSI reference model with the TCP/IP model. OSI Reference Model 1. This model provides the basis for connecting open systems for distributed applications processing. Note that the word “open” means that any two systems that conform to the reference model and the related standards can be connected, regardless of the vendor. 2. Use Figure 9.15 to illustrate the seven-layer OSI model. 3. Briefly discuss the function of each of the layers: ▪ Layer 1-Physical Layer: Layer 1 is at the bottom of the model. This is where the mechanical, electrical, and functional specifications for connecting a device to a particular network are described. ▪ Layer 2-Data Link Layer: Bridging between two homogeneous networks occurs at this layer. On one side, the data link layer establishes and controls the physical path of communications before sending data to the physical layer below it. It takes the data, which has been divided into packets by the layers above it, and physically assembles the packet for transmission by completing its frame. ▪ Layer 3-Network Layer: Layer 3 provides services such as addressing and routing that move data through the network to its destination. Basically, the software at this level accepts blocks of data from Layer 4, the transport layer, resizes them into shorter packets, and routes them to the proper destination. ▪ Layer 4-Transport Layer: Software for this layer contains facilities that handle user addressing; it ensures that all the packets of data have been received and that none have been lost. ▪ Layer 5-Session Layer: While the transport layer is responsible for creating and maintaining a logical connection between end points, the session layer provides a user interface that adds value to the transport layer in the form of dialogue management and error recovery. ▪ Layer 6-Presentation Layer: Layer 6 is responsible for data manipulation functions common to many applications, such as formatting, compression, and encryption. Data conversion, syntax conversion, and protocol conversion are common tasks performed in this layer. ▪ Layer 7-Application Layer: This layer provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host. It contains network management functions and tools to support distributed applications. Teaching Tip To learn more about the OSI model, visit: http://computer.howstuffworks.com/osi.htm
  • 13.
    Understanding Operating Systems,Eighth Edition 9-9 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. TCP/IP Model 1. The Transmission Control Protocol/Internet Protocol (TCP/IP) reference model is probably the oldest transport protocol standard. It is the basis for Internet communications and is the most widely used network layer protocol today. Note that it was developed for the U.S. Department of Defense’s ARPANET and provides reasonably efficient and error-free transmission among different systems. 2. The TCP/IP model organizes a communication system with three main components: processes, hosts, and networks. Processes execute on hosts, which can often support multiple simultaneous processes that are defined as primary units that need to communicate. These processes communicate across the networks to which hosts are connected. Use Figure 9.16 to aid the discussion. 3. The following topics should be discussed: ▪ Layer 1-Network Access Layer: Protocols at this layer provide access to a communication network. ▪ Layer 2-Internet Layer: The Internet layer is equivalent to the portion of the network layer of the OSI model that is not already included in the previous layer, specifically the mechanism that performs routing functions. ▪ Layer 3-Host-Host Layer: This layer supports mechanisms to transfer data between two processes on different host computers. ▪ Layer 4-Process/Application Layer: This layer includes protocols for computer- to-computer resource sharing. Quick Quiz 2 1. The ____ is the most widely used protocol for ring topology. Answer: token ring 2. The ____ makes technical recommendations about data communication interfaces. Answer: International Organization for Standardization (ISO) 3. The term ____ refers to the name by which a unit is known within its own system. Answer: local name 4. The term ____ refers to the name by which a unit is known outside its own system. Answer: global name Class Discussion Topics 1. Discuss the advantages and disadvantages of the different network topologies. 2. Which network topology do you think your school employs, and why? Give reasons to support your answer.
  • 14.
    Understanding Operating Systems,Eighth Edition 9-10 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3. Which communication model do you think is most commonly used on the Internet? Additional Projects 1. What is the most popular transmission media used in today’s high-speed LANs? Submit a report that details its key characteristics. 2. Submit a report that discusses the steps involved in setting up a local area network in Windows 10. Additional Resources 1. Wi-Fi: http://www.gsmarena.com/glossary.php3?term=wi-fi 2. Network topologies: https://www.lifewire.com/computer-network-topology-817884 3. The OSI Model's Seven Layers Defined and Functions Explained: https://support.microsoft.com/en-us/kb/103884 4. Circuit Switching vs. Packet Switching: https://www.lifewire.com/circuit-switching-vs- packet-switching-3426726 5. Setting up a Local Area Network: http://www.ibm.com/developerworks/library/l-lan/index.html Key Terms ➢ bridge: a data-link layer device used to interconnect multiple networks using the same protocol. ➢ bus topology: network architecture to connect elements together along a single line. ➢ circuit switching: a communication model in which a dedicated communication path is established between two hosts and on which all messages travel. ➢ distributed operating system: an operating system that provides control for a distributed computing system, allowing its resources to be accessed in a unified way. ➢ Domain Name Service (DNS): a general-purpose, distributed, replicated data query service. Its principal function is the resolution of Internet addresses based on fully qualified domain names. ➢ gateway: a communications device or program that passes data between networks having similar functions but different protocols.
  • 15.
    Visit https://testbankdead.com now toexplore a rich collection of testbank, solution manual and enjoy exciting offers!
  • 16.
    Understanding Operating Systems,Eighth Edition 9-11 © 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. ➢ International Organization for Standardization (ISO): a voluntary, nontreaty organization responsible for creating international standards in many areas, including computers and communications. ➢ local area network (LAN): a data network intended to serve an area covering only a few square kilometers or less. ➢ metropolitan area network (MAN): a data network intended to serve an area approximating that of a large city. ➢ network: a collection of loosely coupled processors interconnected by communications links using cables, wireless technology, or a combination of both. ➢ network operating system (NOS): the software that manages network resources for a node on a network, and may provide security and access control. ➢ open shortest path first (OSPF): a protocol designed for use in Internet Protocol (IP) networks, concerned with tracking the operational state of every network interface. ➢ open systems interconnection (OSI) reference model: a seven-layer conceptual structure describing computer network architectures and the ways in which data passes through them. ➢ packet switching: a communication model in which messages are individually routed between hosts, with no previously established communication path. ➢ protocol: a set of rules to control the flow of messages through a network. ➢ ring topology: a network topology in which each node is connected to two adjacent nodes. ➢ routing information protocol (RIP): a routing protocol used by IP, based on a distance-vector algorithm. ➢ star topology: a network topology in which multiple network nodes are connected through a single, central node. ➢ token bus: a type of local area network with nodes connected to a common cable using a CSMA/CA protocol. ➢ token ring: a type of local area network with stations wired into a ring network. topology: in a network, the geometric arrangement of connections (cables, wireless, or both) that link the nodes. ➢ Transmission Control Protocol/Internet Protocol (TCP/IP) reference model: the suite of transport-layer and application-layer protocols that operate over the Internet Protocol. ➢ tree topology: a network architecture in which elements are connected in a hierarchical structure. ➢ wide area network (WAN): a network usually constructed with long-distance, point-to-point lines, covering a large geographic area. ➢ wireless local area network (WLAN): a local area network with wireless nodes.
  • 17.
    Other documents randomlyhave different content
  • 18.
    1.C. The ProjectGutenberg Literary Archive Foundation (“the Foundation” or PGLAF), owns a compilation copyright in the collection of Project Gutenberg™ electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is unprotected by copyright law in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg™ mission of promoting free access to electronic works by freely sharing Project Gutenberg™ works in compliance with the terms of this agreement for keeping the Project Gutenberg™ name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg™ License when you share it without charge with others. 1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg™ work. The Foundation makes no representations concerning the copyright status of any work in any country other than the United States. 1.E. Unless you have removed all references to Project Gutenberg: 1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg™ License must appear prominently whenever any copy of a Project Gutenberg™ work (any work on which the phrase “Project Gutenberg” appears, or with which the phrase “Project Gutenberg” is associated) is accessed, displayed, performed, viewed, copied or distributed:
  • 19.
    This eBook isfor the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. 1.E.2. If an individual Project Gutenberg™ electronic work is derived from texts not protected by U.S. copyright law (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase “Project Gutenberg” associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg™ electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg™ License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg™ License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg™. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1
  • 20.
    with active linksor immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information
  • 21.
    about donations tothe Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or
  • 22.
    damaged disk orother medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
  • 23.
    INCLUDING BUT NOTLIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™ Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will
  • 24.
    remain freely availablefor generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many
  • 25.
    small donations ($1to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg™ electronic works Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
  • 26.
    Project Gutenberg™ eBooksare often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
  • 27.
    Welcome to ourwebsite – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! testbankdeal.com