The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).
|
|
- Janel Lee
- 6 years ago
- Views:
Transcription
1 Research Commons at the University of Waikato Copyright Statement: The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). The thesis may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use: Any use you make of these documents or images must be for research or private study purposes only, and you may not make them available to any other person. Authors control the copyright of their thesis. You will recognise the author s right to be identified as the author of the thesis, and due acknowledgement will be made to the author where appropriate. You will obtain the author s permission before publishing any material from the thesis.
2 "# $%%&
3
4 " #$% #$ & '
5
6
7 $ $ # $
8
9 $ $ # # # $ ' $ $ # $ $ $ $ " # $ "% $ $
10 & $ $ $ " # $ # # $ $ $ $ # $ $ $ % $ $ # $
11 & & $ $ # # # $ $ % # #$ # $ # $ # $ $ " # & $$% " #$% $ " #$% " #$% & " #$% # "
12 ' # $ ' '# $ ' ' # # # # # & $$ $ $ # $ # $ #$ " # $ % " #$% " #$% #$ " $ # $ % #$ $ " $ % # $ & $' $ # #$ #$ $ ' $ & # &
13 $ $ $ #$ $ #$ $ $ $ $ & & # $ # $ # $ " #$% #$ # $ # % & ' %
14 # # $ # $ $ # # & $ $ # $ # # $ $ # $ # $ # #$ & #$ & & & '
15 $ $ & '
16 $ # #$ $ # $ '
17 $
18 ' & & & " & %
19
20 " % " % $$
21 $ $ # $ & " %
22 User handle Client Server handle descriptor file descriptor file File System Centralised System Distributed System # # " % & $ #$ #$ " %
23 PA R2 PA R2 PB PB R1 R3 R4 R1 R3 R4 PC PD PE PC PE (a) No Deadlock (b) Deadlock KEY Resource Process Process has locked resource Process is waiting for resource # # $ # $
24 $ # ' $ $ #
25 # & $ "
26 % $ $ $ $ & ' $ # & & $ & $ & & # #$
27 & $ & & " % & $ # " % $ " % & # &
28 $ & & $ $ # " & $ %
29
30 $ " #$%
31 # " % System A Network System B End System functions End System functions Distribution Interface Communications Protocols # $ #
32 " % $ $ # &
33 $ # # & $$ #$
34 #$ $# # $ " ' % $ " % ' " & % #$ #
35 $
36 " ' % " % " % #$ " % " $ % #
37 " % #$ # #$ #$ #$ " #$ % & " % & " % $ #$ $ $ #$
38 $ $ #$ # # " % & $ # " %
39 Client Data Server 1 Server 2 Server 3 # $ $ " % $ # " % & " %
40 " % $ $ $ # $ " $ $% # #
41
42 # " % " % #$
43 " % & & " %
44 & " & % ' &
45 " % " % $ & & & " %
46 Application Client DFS Server DFS Disk Application Client DFS Server DFS Disk Request Request Data Ack Disk Request Reply Disk Request Sliding Window Whole File Transfer # # Block Based File Transfer # " % " % $ $
47 Application Client Server Disk DFS DFS Request Disk Request Reply Disk Reply # # " % $
48 ' $ " % $ # & #
49 " % " % $ & &
50 $ $
51
52 $ " % # " %
53 $ Client A Server Client B copy block copy block time set bit write block set bit write block # & " %
54 S $2,000,000 C $500,000 Read S $2,000,000 Subtract $1,000,000 $1,000,000 Write Result Read C Add $1,000,000 Write result $500,000 $500,000 S $1,000,000 C $500,000 S $1,000,000 C $1,500,000 S $1,000,000 C $500,000 SUM= $1,500,000 # " % Read S Read C Print Sum Read $2,000,000 $2,000,000 Modify $1,000,000 Customer moves to another site Delay $2,000,000 Read Print Write $1,000,000 #
55 & " %
56 $ " % # " % #$ " % $
57 Client 1 Client 2 Client 1 Client 2 read Cache 5 data item Cache Cache 5 Cache 5 Cache 5 Cache Server Server Client 1 has a copy cached Client 2 reads data and caches it Client 1 Client 2 Client 1 Client 2 Cache 5 write read Cache 6 Cache 5 Cache 6 Cache 5 5 Cache 5 5 Server Server Client 2 modifies the data # $ Client 1 reads stale data CPU cache CPU cache CPU cache Storage Controller Main Memory # $
58 $ $ # $ # # $
59 & $ $ & & & $ $ " % " %
60 $# #$ #$ $ #$
61 ' '
62 $ " % $ $ $ '
63 ' " % " % ' &
64 $ $ $ $ #$
65 #$ #$ & # $
66 # # & $$ $ " % $ $ $ " % #
67 " % $ " % # $ #
68 & " % $
69 # $ # $ #$ # $ " #$% & #$ #$ #$ #$ $ # "$#% ' #$
70 #$ #$ #$ #$ #$ # #$ # #$ ' & $
71 V r i t u e. V r i t u e. V r. i t u e VICE V r i t u e. V r. i t u e Virtue. # #$ $ # $ #$ " %
72 #$ $ #$
73 $ $ " % #$ #$ & & & " % " % & $ " %
74 #$ $ #$ #$ #$ & $
75 Disk Descriptor Inode 1 Inode 2 Inode 3 Inode Table... Inode N File 2 free File 1 Files and Holes free File 3 Free # " %
76 # ' # $ # #$
77 & $ " %
78 object entry points Distributed Object Space (persistent virtual Memory) Thread execution path Thread execution path Stack Stack # " % # # $ '
79 $ " % $ # " %
80 # " % " % " % " %
81 # & # # # # #
82 vol=6 r1.h3 r2.h7 r4.h5 Volume with parent directory is replicated twice sub-volume is replicated three times # # # # # # ' ' " % # #
83 # $ # " % ' # " % # $ $ & # #$ #$ # # # # # # &
84 # # #$ #$ " %
85 File System Calls (Local) File System Calls disk Local Local Unix File System cache Local or Remote? Remote NFS cache NFS Local Unix File System cache disk Client # #$ Server #$ $ $ # $ $ #$ #$ #$
86 #$ # $ & #$ " % #$ #$ #$ #$ $ " % " %
87 & & ' $' " % $ & ' #$ " % ' ' ' ' ' ' ' ' ' ' " % $ ' $ #$ #$
88 #$ $ #$ " #$ #$% $ #$ #$ #$ $ & $ #$ $ #$ & $ # $ $ $ #$ " % " %
89 $ $ & & & $ & ' & & " % # $ # $
90 $ " # $%& '(& )*+ %& & *, ' -./ *
91 # # $ " %
92 $ & #$ " $ #$ % $ #$ # $ #$ #$ #$ $ " % $
93 & $ #$ #$ # # $ $ $ #$ $ $ " $ %
94 Client Server 1 Applications A C B A D file time order File System Server 2 File Log A A C B D Server 3 File Manager #
95 $ ' $ # " % " % " %
96 " " # $ % # $ % & # $ " " # $ " " ' " " % " ( # )( *++,-&. ++,-& ( ( ( ( /0
97 /$ + - $ # User Client User Client User Client User files file system blocks Client User User Distributed Block Service blocks block server sectors Server Disk Server Disk Server Disk - $ ++ % " * $. $ " " ( ( " " #$%&#' ( %# ) *)%+&,-.+ " # $ / 0 * $ # 6 "
98 / 3 " " " ( " " ' " ( ( 2 # % # $ #%+ &' $%+( *)%+&,-.+ ) % " # $ 3 " " 3 * /* 0 $0. % +3,$/1-
99 / -. #) # * $$ # $. * 1. % # " * $. + ( ( " ' # ( ( -. + ) $#$%+ ).' # " ( " " # 6 ( " - ( "( 6 # * $. " " % # " 6 " % /0 + + ( " ( # " "
100 / - $ 6 " 6 " 6 " ( " " ( # *. ", - % ( 6 % ( " 6 " " " *& / 0 ) # $. " ( ( 6 &+.( &#%' + "( & + " "( "
101 / % 5 $0 # $ " " " " " " " "( " " " " + 3 ( " + 3 " 3 *. 53 " " " " " ) " " 6( + %#.-%# ) " # $ / 0 *. 3 " " 3 3
102 /) ( " - % + " " ( 6 # &-%# ) - ) - ( #) % ( " ( " 3 "( ( 6 6 " " " ( ( "( 6 " " (, ( ( ( ( ( % % " ( " " " % " (
103 /1 * ". " ( " % % " % 4 ( ( 4 # $ * / 0 1. " ( " " - "( ( ( " 3 ( " ),$ 1-( " &( ( ( - &' " # + ",
104 //, * $$. * $. * $. * $. * $. * $). ) " 2 *. * ). ( ( " *. ( + + * ). + * $. " *. " *. 2 *., 3 & * $. " 2 5 *. * $1. +3 *. * $/. - *. " #* + * $. *. " " * $. - & 6 - ", 6 # $ "
105 $ # " 2 6 ( " & " 3 " " 3 # * /) 0 /). # " 6 # % " ( # 1( ( # / /
106 0 &+ & #.+ # " " +3 &0,-&( 6 ++,-& + ++,-&( " ", 6 ++,-& " " + 3 % ( ( " ( " ( " 6 * " %
107 $ Minix Minix Minix User Client User Client User Client files file system blocks User User Unix server Server application Unix OS Disk - )$ % & Ethernet LAN )3( ++,-& +3 1 * 3 +. % " " ( ( " " 3 # * /0. " # *( %+ ( + )%-%# ) - $+ - )$ 3 " ++,-& ) 3, $ ) 3 " " " % " 3 # *. ) 3 " * $$0. 3 0(000 ) ) )3,$ 1- )3 %+) *# % *# $) + 0 /) $)) * $000
108 5, ) 3 " " + 3 " * 3,5 +&. 3 " ' +3 +&,- " " 3( +3 & & " - )3( ( 3 " #$%&#' ( %# ) *)%+&,-.+ 3 " " " + ( * /. ( "
109 % 6 " ( 3 +, 3 ( " 6 % " % " ( 6 " 6 " " 2-3( ( " )$ 3 * $0). -. #) # ) ) " % ( ( " 6 " % * 1 3 " ".
110 * *. # +,, * + *.,+ - # +,, * + + *. # +,, * + *. & - -,+ - + # +,, * + + *. & +,, *. # * + ) *. *. )$ %
111 6 * ( $00. )3 ( ( ( ( $+ $ 3 & * /% 0 ). % # *. 0 " " 3 + " " + " "( " " 3 " + "( " " 6 *. 3 " ) % " (
112 ) client server client 1 client 2 server Lease Request Lease Request Lease Granted Lease Granted Lease Request Lease Returned T lease timer Lease Revoke Lease Returned Lease Granted T lease timer Lease Request Lease Granted lease lapses (block no longer locked) T lease timer - ) +
113 1 " " ( " " " 6 5 " " 6 ( " # 1( " ( 6 3 " 3 " / 0 $0 # 1 2 % 6 ( 6 ( 3 % ( " " " 6 " " 3 6 ( " " % * ". " % " " "
114 / & % +3 ( 6 4 % " " " " " " *. 6( " " " " " 3 " ( *. % " ( 3 % ( ( ( ) " * " 1 $. " $ " 6 " " " " " + 6 " 6 " & " " - 3 " ( ( " ( " ( " ( %
115 ( " 3 + $) / 0 ) " * # ( 1. " 1 " # * / 0 /. /" 0 " $ * 1. " 5 ( " 5 6 ( ( " 5 ( " % " ( " "( ( % ( ( " " " *" /0. " 6 " 53 " ++,-& "
116 $00 System Calls data structures File System Cache IO IO Disk - ) - & " " " - ) )3 6 % ( ( ( 3 ( 6 % ( 2 - ) " " ++,-& )3 " 2 ( 0 " " " %
117 $0$ System Calls key data structures File System Cache copied at start of transaction first write to block Write to server at end of transaction Server copy original copy blocks - ) + - & % % " ( " " 2
118 $0 ( " " ( ( " 6 " " " % " 2 " " " % ", 6 4 % ) 3 ++,-& *. ( 3 4 ( " 3 " ( " ++,-& 4 2 " " % "
119 $0 3 " " " 6 " +3 "( "( #* #* + * $. 3 ' 6 3 #*+ 6 " -%- ' %. $ (,-&( * /# #0 / #. " " ( "( # ) $#$%+ ).' 3 % 3 " 3 " "
120 $0 % 3 *. ( *. ( 4 " % ++,-& - 3 ( " " ( 2 ( " ( " " " & $ ,-& " %( " # " ( % ( " " 6 ( " ( " ) 3 & % /0 " 6 % % " ( "
121 $0 & - 3 ( *. +3 % ( " " + 3 " " ( ( ( ( " ( ( " " " 4 " " " ( ) 3 " " " ++,-& 6( 4 ( % ( 4 6
122 $0) Request size in bytes Type [1] Position Size Sequence Partition Piggyback Reserved [4] [2] Number [1] [1] leases [80] [1] Data [1024] Reply Flags [1] Reserved [4] Reserved [2] Sequence Number [1] Reserved [1] Reserved [80] - ) ) - Result [1] Data [1024] ( ( ( ) #.-%# ) % # " " *. % " " " ( "( " + * %* #* %* " " "" % " ++,-& " ) " " " ++,-& 6, 0-6 "
123 $01 DFS BB-NFS UDP IP MAC Physical TCP/IP Ethernet - )) -& +* %* 3 ( 3 % 6 3 " + + " & + + $$$ " ( " 3 % " 6 " 6 " % +*,$1- %*,$11- + %* +* 6 ( " 3 " #,( %*( + * * +
124 $0/ size in bytes Ethernet Header (14) IP Header (20) UDP Header (8) DFS Header (90) File System block (1024) - )1 -& " +* %* " +* ( " " %* ( ( ( 5 * )1. *+ " ( " *+ " )1 " ++,-& + +* ( +*( %* 5 ++,-& 3 # */* 0. $) + ( ( * + 6( 5 5 ( %*( + * + ++,-& ( 5( %* + * *+ %* +* ( 5 " % #* %* #* %* 6 ++,-& %" " 3, "," ( " (," " + & 3 " ++,-& ( ( " " " $0(000 5
125 $0 " 3 " * * ) $) 5 /) #*+ /. 3 " %* + * * 5. " 5 " " " " " " 3 %( 3 ( 5 ( " 6 " " 6 %* %* " % %* +* ++,-& 6 %#) *,$1)- *,$1 - +,1- % ( %#) * * % # ) *. 6 %* % " %* ( * * *. 5 %* + * *+ *. " %* +. + &' 6 " 3 # $ *. ++,-& " + 4 % ( "( 2 " ( " 3
126 $$0 " + ( ( " " " 3 " 3 0 " % ( " " ( " ( 3 - " " " 2 3 " 3 $0 % ( " ' $0 " 0 5 0( 3," " 2 ( " " " " 6 % 0 " " " 6 % " % " " " ( + +
127 $$$ " 3 ( - " " +3 " " " 3 " " " " " " ++,-& ( " " 0,$ 0-( " + + ( " " " % " " * ". % " ( ( " " " " 0 + " /0 % ( " " % " " ( 3 % +
128 $$ Client write 1 Server Quarantine Disk write 2 read 1 Block 1 Block 2 Block 3 write 3 End of Transaction (replies have been omitted for simplicity) - )/ + + % ",$ 0- "( 6 3 " " " " " 2 *-. ++,-& ' + + " " + + ( " " " #$.+ %%- ) + ( $ ) 3 " ' "
129 $$ & + 3,$1 -, 0-,$00- " # ) +3 % 6 ( **%. ( + *% 6( " " % ( *% 6 +3 " ( % % " ( & 0,-&( " " ++,-& 5 3 " ++,-& 4 * 4 3, - " " 3 4 " " &,$$- 4 ++,-& % " 2 6 #
130 $$ Index Data Block in Write Time Order bit map (used to indicate block is original or changed) - ) 4 * + " ( " 2 ",$/- " ( " 3 " ) 6 ( % " 4 ( ' " " % " ( " ( # " "
131 $$ ( 2 " ( & $ * 3. 3( % ) 3 ( 6 2 ) 3 " " ( ( *. - " % " 0( " " " " " ( %+ #%' ) " ++,-& 3 " ) 2 " 6 " 3 " " " ( " 5
132 $$) - & $ # / # & 0 ) / 5 $ 1 + * $ * $0 %#) * / / 4 $$$ 5 # $$1 $$/ )$/ ) # # + $%#) ++,-& ( 3 " + ) 3 " 3 "( " " " 6 " % " " 2 " " " " " ++,-& 6 & ( ( ( " " 3
133 $$1 &( ( ( - &' ++,-& " " " 3 " ++,-& " " ' 2 " 3 % " + ( " ++,-& '
134 - " " " 2 " 2 2 " " ,-& #*+ " * / 0 #. $00)%*& #*+ (000(000 3 " 5 % ++,-& 2 ++,-&0 # ) " ++,-& *. 6 $ % 6 % 6 " " 3 6 $$/
135 $$ ( " "( " - 1$ # + *( &%- ).+, % + +- $ ,-& " 6 " " 6-1$ " ++,-& ", " $/ 6 2 " 6-1 " 2 " 6 3 " * / " #. 5 * $0 1) " # +-$+ % #) #( + 2( " ( ( "
136 $ Transactions Lease Holding Time (s) " (
137 $ $ 2 " % ( * ".( " ( " % " 6 3 ) 3 * " ++,-& " ( 6 0 % 2( ( 3 2 " - 1 " 6 3 " " " " " * $ ) 4 *# /) $00 *# "
138 $ " 6 3 " +
139 $, # 53 3 $ / $ $0/)1 / $ ) 1 1$ 53 6 ) # 5 3 & " ( " 3 * $. " " " 5 " 0 ( ( 3 ( " 1 2 " $0 ++,-& + $%, %. ) $#$%+ ).' " $0 6 " + % 6 3 " ( 4( 4 " " *. " " " - " $/)0/ % 1$ " 3 6 *" $0. " 1$ 3 " " " " 3 " 6 " *.
140 $ " 6 3 " +(
141 $ " " 3 3 " % " " + " & ), 0/-,-& " " + % ( ( " ( / * $ )$ )( ) +,-& " $ ",$ -,$ - * 4. " 2 % ) " " 2 " " % ++,-& "
142 ) " % ( ( ) ( 3 " " 3 & % $ )
143 $ 1 # " " " "( " ' ( " " ( 0 ",)- # % + 3 " ( " ++,-& " " ++,-& % " % " $( &% + & & " " ++,-& " ++,-&
144 $ / - " " " ++,-& " (,-& " " ++,-& ++,-& " " " " # " +( " ( 6 " +", -, $- 3 6 * / 50 #. 3 6 " " " # ++,-& " % *" 1$ $. " % " " # " * / 0 #. ++,-& " % "
145 $ ++,-& " ++,-& " 3 " ' ++,-& " * /). " % " + " " 4 " " % " 2 % 3 " " # $( %( &+ + $+-&. ++,-& " " " " " " " 4 " %
146 $ 0 " " #*+ " 2 * /0( " " " % " " 6 + " " ( % " " "( ( " & #*+ * " % " " " #( " ( " % " "
147 $ $ ).%( $# ) 2 3 " " "
148 3 " ' % 6 " 3 " " & " 3. &) % " ',)- $
149 $ # % #) + % " # " " " 3 3 ", /- *,$ )-. ( + ' - %+ $+ & #.+ $ & & 2 + 3,$ )-, ) & *-+&&. + & -+&& +, $1-,$ 1-, 0-, $/-, -, )-, -, -, -, 0-,$ -,$ -,10-,$ )- *,$ /-,$0/-,$ -,$ -, $ -, -,$ -, )-, 1-. ) &+ $ & " " " ",/- ) " +3 & #,$00-,$ 1-,$ /- *,$ -, )-,/-, -,$ )-,/1-,$ -. " " " ",$00-,$ -, 0/- - " " # ( %% ( - #) ( ' % ' ' % " %
150 $ " ",$ -,$ - *,$ -,$$$-, )-,$ -, 1-. % + ) - " ( % +3,-&( -& ( ( ( *" " " '. ", )- $%&'. + + % " ( ",$ )- ( %%+% + *. + ( + " " (, - *, 0-, -,$ -. - # ( / - ( ' &# + " & # *
151 $ " " %* & #*+,) -,1/-,$/)- *,$0)-,$ -,$ -, $ -,$ )-, $ -. - &) + #+ + %% ).+ )%&- % %+ $' $%+ ( $ & #-& " # ) # & $ /0 #-& " /0 % ( % " " # " % *. *". - & #-& " ) % %# " # ), -*,$ 1-,$ $ + & # % " # " % # " # 5, 1- # + - & $ & # # -,/$-, 1-, 00- *,$ -, /-, 0$-,$$$-, 1-.
152 $ ) - &% %%+ ( + 3 " " ", )-,1 -,$0- #.+$ # ' ( " " * ( ", -, -,$ -*,$ -, 1-. &( $ # " +3 % - ( 3 ( ( *". 4 - # ", -,/)-,$-, -,$ - *, -, 1-. % ( $ # ' % ( ( ( ) " ' ( " ' ' ",-, -,)0-,)$-
153 $ 1 - # ( )$.- ) +% ) # # %5 " " "( " ( " " ",$ $- - # 6 " " 3 +3 ( ( " " " *" ' ". *. " " # ",$$ - *, -, -,$ -. ).( &&+ )% %+ $' $%+ ( $ & $& ( *)%+% #-& " * %. % +3 # % # % - /0( %
154 $ / 6,1- *, 1-. # $( $ # " " " ( ' ' ' #,$ -,$-, - # " -.) $ #, & % % *,. " ( &% #* %* * -. " 6 - *. - ",1 - # # " - $ ( " #* + *$0 $00 ". *00$ $.( " * 0 0 " " ( %*# " " 3 " % " ",)-,1-*, )-.
155 $ # " $ & #5 -& &" - # 5 % " 5 # " +. &( ( &" - 0 * &-. # 5 *#5. - & % " ( * " 3.( 5 * #5 -&. & 5 * &% & 5,$$0-, -,$ - # " ( ) # " /0 *. * ( " ( ( " " " +% +% " - " +% " " " 3 ) &,$ - # + ) 5 ' " ' ' & + ' 5
156 $ 0 5 5, -*, $ -. # $ & 5-& *53 - & % % " 5-3 " 3 *. 5-& + 3 *. /0, - # ( + &- % 5 ' 5 ' " 5 ' ' ' ( " " ',$ 1-, - # #$ + 5 &" - 0 * &-. # 5 *#5. % ( "( - " ", -,$$0-*,$ -. $+ %# -3 " % %
157 $ $ 4 *,1)-. % +% -3 " 3,11-,1)-*,11-. $ #.( $ " 6 ( ( ( 3 " 3 ( ( ( " 3 " + - % * #. - " 6 % ",/1-,$) -,$/ -, -, -*,$/-. - # ( ) # $& %#. - ( " (,/ - % " " " " " - 2 3,$) -,$ - $ - ( ) *- ). % & *%&. & % * &%. % " # " - )
158 $ * " ( " * # & 5 #&5. " &% )( (,$0 -,) -,)1- $ & & -+&& -+&& - " % 4 " +3, 0-,$ )- - +$ 2 " --5& " " - "( " ( & " # " *. - " " - 3 ",/ - + ( #) # +3 " " "( + 3 ( " " " ( " +3 3
159 $ ( " ( ", 0- *,/1-. &- + #) + ( (, *. " 2 $00 " " # %-& *% - &., -*, )-,$ )-. ( - & #- ),& % ( ( # " " * " *. ( - 2 " % ( " " " ", - & & +3 # & " " " & *# #* 6 & ", 0-
160 $ - & +3 - ( " 6 " & 6 " +*& " " " " * -&. ",-& ",$ /- & #& " ' # & ( " 6 " #& *# " " ( 3 #& - & * -&. + " ( *.,$1-,$1 -*, )-. # + %# 3 ' %, /0 ' ' " ' " '( * %. ' ' #,11- $ & -& #& *.
161 $ # # % * -&. / 0 3 $0 6 " ) ",$$ -*, -,$1/-. ' &- *$ 1. ' - ' ', )- * ( &#. + $+- &. - ' $ $ #%+ &' $%+ ( %+) %* & % %+) *# " 1 %+) 0 &, % " " #,$0)- *' #$ % 3 +3( % & - * ". % 6 *. " ", -*,$ )-.
162 $ ) *$ & + & *)%+ &#( $ #%+ &+& + & %-& # % " " - " %-& %-& " "( " $) " *,/$-, /-, 00-. * %# " ' & " - + " " % 4( ( - " 6 " ",$/0- ( ) # + & + & " $ & " $ & * 3 -& - &. 3 % " % 3 %, /- " ", 0 -, /-,$ -.
163 $ 1 # $ & &%&(.%( &+ $ $ #%+ &' $%+ ( -& & & - & & & -&.( $ " % +3 2 " ( ( " #3 " 3 " 2 *. * #&&. " " " 3 #&& %,$1 -, -, 0-*, )-,$ -,$ )-,/1-. (.- $$ & -& " ( ) # *. " " ) -& " ( ( 5 ( - " " 44, - & ) & " % + 3 * 1. * ( " ( ( " " 5 ' * *#. 3 3
164 $ / ) &, - ( ) # ) ) 6 ' % ( " '( " ' ( 3 *, )- " ) +% & #$,& ( &( ), % " ", & "( " +% - &+," )& &( & + 3,",-&, % " ",",$ $%%+. ) ) +.%# )," # * ," # *. " " +3 3," # " " + 3 *#, -*,$ )-.
165 $ + ( $,3 ' % 3 +3 & " ' ' ', - $ &,-& " " % (,-& ",-& " (,-& " % % 6 3 / / +,$ $-,$ -,$ -*,$01-,/$-,$ -, 0/-,$$$-, )-, 0 -,/-,$ )-, 01-,/1-,$ -. - # ( )/ # %- ) * " % 3 " +3 & * + 3 % " " * $0) ",. + " " *" )00. * # *. * " " - 3 *. *. & -
166 $0 % " - ) " # ",$1 $-,$1 -,$10- & *+&5 +3, *+&5 " " *+&5 + " # " % " +3 " 3, - ( #. &#% + & & 3 & ' 5 ' *. ( " ( & 4 ( " " ' ( " " " ( " % *. &, - $ - &
167 $$ $ & - & * -&. & +3 -& +3 ( +3 ( & # /0 " " % ( " "( % # ",$-,$//-*, 0/-,$ -. $ &,-& & 0,-& ",-& % %&%& %0 # 6 " 6 " " " ( "" 6 6,$ -*, ( ( " - # " ",1$-*, $ -.
168 $ & &# 5 " # /0 " - " & " ( ", 0)- " *. ", + ", )- $)%*& #*+ * 3 $$ ", )-, )- & ) # - ) $ ) # & *. +3 " " " -+ 3 & ,$ 0- # &- ( - & & % ( & " # " ( 2 & *. &
169 $ % & &#%+ & & - & & 2 " " + 3 " " & % * ( "( (. 3-6 " *. " * + 3. & ' & & " " " ",$ -,$$-, -,$ -*, # ( 1 & &#%+ $ & & -& & & " " " 6 " % % " ) -& &0,$/ -,$ 0-*,$/-,$$ -. & &#%+ %' $ & 3 ( &,-& & &,-& % " (,-& 6 + &,-& ",-&
170 $, 0/-, 01- &% & & " - " 4 " 6,$))-*,$ )-. & - %% &"" ' % -& 5 - &"",$ 0- ' &"" ( " ",$/ - &"",$/ -*,$ )-,/$-. & #,% &" %,$)/- % ( 5 +3 # - * ( ( ". *. 3, $- * & %* & # & %* & % #* +
171 $ & # &,$/)-,$0)-*, $ -. &( +$ 3 - * 5 ) **5)., $- & - -,$/- ) # ) #% ," # &," # # +3 - % ( " * %5 ( # " " % ( % +%, 1- ( " " ( "" " ", ( ) ( " ( ", /-, -*, $ -. -.%( $%+& 5# 0 )& - / +%( " $) 6 -
172 $) ( " ( )& ), 0- " ( 3 * 2 " # #% *. " 10), 5 &",$$ -,$ -,/ -, 0-,$$-,$ /- + + &$# ) +% & $ #%+ &' $%+ ( /," - & +3 * /. " + /," - & +3 *#, - $ & -& - ) -& -&, $ -*,$) -,$ -. + & " #$%&#' ( %+ $ #%+ &' $%+ ( " $ & -& & $ & 3-& " " % ( 3 ",
173 $1 " ( " ( " " " " 6 &,$/ - " 2, - +' &- *-&. & % ( " ) *. " ( ( ", -, $-, 0-,/ - - # ( 1)
174 *)%& (.%# ) % *5 %, & &5)& % *" ) 3 +. " " ) " % " " )%,% 1 +,% *3., $- )3 %+) *# )/000 % " " " 3 # )3 + " )3 * $$0 * ". 000 # 000 ( " " )3 '( 100 # % ) 3 " " % *. $/
175 $ User Process User Process Memory Manager User Process File System system call interface Server Processes Disk task TTY Task Clock Task System Task IO Tasks Process Management ( - +$ )3 * - ), $-. # $ #%+ &' $%+ ( - %%$ ) ,-& " # " # # "( # " 3 % # " # / 0 # 0 # " ( " 4 ) "
176 $)0 Boot Block Super Block Inode Bit map Zone Bit map Inodes - + )3 * - 0, $-. Data Blocks ) & & # # " # & & *. & & # " #$ -' ( % ) 3 3 " + " 3 *# " " " " % 4 *. & " " " " 4 " 5 "
177 $)$ File name inode number cs201 cs412 comp-org inode owner permission size dates file data (file system blocks) dead old pointers to storage for file directory other inodes - + )3 & " #&+.% &#+ $ ) 3 " 5 " ( 3 % * " *". *) + $ % 3 *. ( " + 5 " +
178 $) 3 2 B y t e s Mode UID File Size Time of last modification Links GID Zone 0 number Zone 1 number Zone 2 number Zone 3 number Zone 4 number Zone 5 number Zone 6 number Indirect Double Indirect File type and RWX bits Identifies the user who owns the file Number of bytes in the file In seconds since Jan, 1, 1970 The number of directory entries for this file and the files group number Zone numbers for the first 7 data zones in the file Only used for files larger then 7 zones - + )3 % * -, $-. #% - $ " ) 3 % " 0 " " " " ( " ( 0 $ " 6 " % )3 % - 3 " " " "
179 $) Hash table MRU LRU - + )3 # & * -, $-. " 6 % % " 6 " +
180 " "# $ %%&'() *+,-./ :;<35 8= >276 7;?@3;39>A>789 8= >23 BC?58>8D8@E $ F $ $G H IJK 123 L39M>2 8= >23 BC N3AO35E P() $ $# $ $ "# Q RST+ / U+,V W3LO D89>A796 A 63> 8= 8?>7896 >2A> 79X:39D3 >23?57857>Y A9O 8?>7;76A>789 8= >23 OA>AM5A; >5AZDE P() $ [ G \$ ] G $ $ #^ # _ G G & $ $ $ " _$ _ F # ] $[$ $ # _ )F R/` a K+0b` 1 23 L39M>2 8= >23 BC OA>AM5A;E ] P() Pc de # eqf # $^ $ $ $ " # # g " [ $ " # $# # [ $ " hh
181 hq 4 bits Version Header Length Type of Service Identification Time to Live Protocol Flags Source Address Destination Address Options (if any) Total Length Fragment Offset Header Checksum Padding Data I +0`. `./0 ( 9;<35 >2A> 7O39>7W36 A =5AM;39> 7>2 A?A5>7D LA5 BC OA>AM5A;E % P() Pc G^ $ G $"g $ # Qee #^ _G$ $ $ [ " ] $[$ "# $"g $ _ P() " $ cp $ ^ " _G$ $ $ $ $ $ $ $$ $ ^ $ $ c)]^ ] $ '" $ a b- 7> O A9O ; 6> <3 E 7> 6?3D7W36 23>235 =5AM;39>A> ALL83OE 7> 76 63> >8 79O7DA>3 >23 > >23 LA6> =5AM;39>E % _G$ $ $ [ e
182 hh, b+0` -+` 27D2 =5AM;39> 8= >23 857M79AL OA>AM5A; 76 DA5573O <Y >276?AD3>E % _G$ $ $ [ "# e R.+ `/ K.V+ 28? D89> 63O >8 L7;7> >23 9;<35 8= 98O36 >2A> A9 BC OA>AM5A; DA9?A66 >258M2E W3LO 76 A 6A=3MA5O AMA796> OA>AM5A;6 L88?79M = ;AL=85;3O 93> 856E ( $ F _ he $ $ $ #G F " $,/`/ /a M235 LAY35?58>8D8L >2A> >276 OA>AM5A; 76 DA55Y79ME 85;ALLY 37>235 1 C 85 CE ^ _# $ cp J+ +, + - % _ ^ $^ $$^ gg _ " \$ $ G $ G GG$ $ " $ $ $ " F# $# $ $ $ gg $ $ $ GG# " _ cp $ P() Pc GG # _" U/, +, BC AOO5366 8= >23 639O79M 98O3E +-`.0 `./0, BC AOO5366 >23 OA>AM5A; 76 79>39O3O =85E T`./0-4A57A<L3 L39M>2 W3LO 79DLO79M O3<MM79M?35=85;A9D3 A9O 63D57>Y 8?>7896E ' $ cp $ $ _" $ f U/, + /,`
183 h 16 bits 16 bits Source Port Length Destination Port Checksum Data ( f cp Destination Address Source Address Protocol Data 6 bytes 6 bytes 2 bytes ( d $ >23 C?85> 9;<35 >2A> >23 D8;;97DA> M79A>36 =58;E $G $ _ P() fee +-`.0 `./0 /,` >23 C?85> 9;<35 >2A> >23 D8;;97DA> O753D>3O >8E $G $ _ P() fee K+0b` 123 L39M>2 8= >23 C OA>AM5A; 79DLO79M >23 23AO35E ( P() ehf^ _ g g $ # G d _ $ g g $ D23D6 ; W3LO 76 8?>789ALE B= 7> 2A6 >23 4AL3 98 D23D6 ; 76 D8;?>3O A> >23 53D37479M ;AD2793E P() gg _ # _ $# $ $"g $ $[$# cp gg e ( d " _G _ $ _G _G _" $ U/, +,+--
184 h 1 23 <Y>3 >23593> AOO5366 8= >23 639O79M O347D3E AD2 93> 85 79>35=AD3 DA5O 76 ALL8DA>3O A 97 3 AOO5366E +-`.0 `./0, <Y>3 >23593> AOO5366 8= >23 53D37479M O347D3E ( $ "$ $ $ F $ $ $ $ $ "$ $ GG# "$ $ $,/`/ /a 123 7O39>7>Y 8= >23 27M235 LAY35?58>8D8L <379M DA5573O <Y >276 =5A;3E 123?53639D3 8= >276 W3LO ALL86 A 679ML3 >23593> >8 DA55Y ;7 3O >5AZD =85 A 9;<35 8= 27M235 L343L?58>8D8L 3EME >23 BC?58>8D8L =58; 1 C BC A9O 843L6 BC?58>8D8L E %%&'() $ F $ G % $ $ "#
185 $ _ $ " G _ % _ $ $ $ _ $ $ ( _ G $ $ _$ "" # $ I0-`, +0` `./0% ] $G$ $ $ $ $" #G $ $ &a/ T-% 'g g G g $ $ g _ $ $ $ &a/ U` `-% %g $ g F $ $ $ $ $ # $ $G$ g $^ #^ $G$ $ $ U` a+ &a/ -% %g _ $ $ $ G " $ $$&$ $ $ $ K+ -+ (+V/+% )$ Fg F^ $ GG # _ $ $ $ $ $ K/ +% ]" g g $ ^ $ g $ g _G #$ "$ Fg F $.a+ US-`+ R, 0- `./0-% * # _ $ g $ $# $ g +F _ g $ GG$ ] g # $ $G _ $ $ $ $ P # G $ _ g " g _ #G $ $ ] g h,
186 e 'G c $ $G _ [ $ $ $ %g [ _G " $ $$ g " 'G _ $g $ " F $ g %g $ g %g [ _G [ $ # " $ 'G _ " [ $ $ g " c$g $ " "$ g $ $ $ $ g ' [ # " %g " $ g & $ _ #G % c$ ]G c _ $ " ^ " $ "$ $ %g _G # de $ $ $ $ $ # & _ c$ #G &_ $G _ g & P g [ _ $^ # $ $ #$ F G _ $ hh %g _ $ $ G$ G $g Fg %g Fg [ F P $G$ $ $
187 $ ^ _ ^ $ $ G # " _ $ $ ] GG $ ] g $ $ $# $ $ $ $ $ G $ )$ #G ^ $# g $ $ $ [ & $ $ F^ F $# g F $ G _G ^ _ $ $^ $^ $ $ _G $ $ G _G # $ $ F F $ _G " g # _ $ $ $ $ $ $ $ F $$ _G # $ g g " # $ "$ # _ $^ G $$# " $ $#"# $ 0-` a+ `/. T `+% $ $ $ $ # #$ g$" "$ $ $ $ $ #$ _ $ [ $ #$ $ g " ^ $ $ $ Gg $ _ #G $ $ "$ " $ $ "$ #$ $ ] G $ " #G $ #$ ( G "$ _G " $ #G ^ $ " g F $ $ $ F G "$ $ $ $ / +,+0 +% 'g "# _G F $ # g ] ' c) g g $ ] $ G $" g ^ _# " $" g g $F g "$ $ _ Gg $ " $ g g F$ _ G GF _G $ 0a/ aa -S-`+ aa% ] #G $ _ $ \ _ g $.bbs a+ -+,+`,0-% ] # $ $ $ g P# $ $ G $ F $ U /,` R+, K+ -+-% G $ $ G^ "$ Fg F _ $ $ $ $ ] $ G G $ # $ $ _ $ $
188 f $ / 0. `./0-% ] # $ $ $ G ] G F F " F G _G G $ F $G^ $ $ G $ $ G P ^ $# #&g g " $ $^ $ $ G $ g ) _ # _G $ g $ g " $ $ G $ _ G _ $ # _ $ # _ G^ $ G F F $ $ $ _ # F^ g _ Fg $ # $ G _ Fg^ $ $ $ " _ $ G # $ K/b +-- b+-% ] g$ G _G $ F fe $ $ F ]$# " F $ I0/ + / +,+0 +% 'g $ $g $ 'g g $ $ $ g $ $ $ # g $ g^ _ ^ $ &g ] $ g "$ _ $ $g $ _ $ $ ) $ g _ $# $g $ $ # G# F _ $ $ $ G # F g $^ $ $ $ $g $ $ `.+% G G$G$ $ $^ "$ $ $ $" _ G $ $ $ g $ G $ $& $ _ " # $ $ (+/`+ +a+`+% ] $ $G _ $g "$ $ $ $ $ $ $ $ $ "$ $ $ $ [ c$ G$ $ G "$ $ " $ ()* $,,/,- /,,+ `+ 0.0/, 0b+-% $ g $ $ $ $ " g G F $ " GF $$# $^ $ "$ $ # $# _ $ $ GF _G $ $ $ $ G$ G $ &.` T-% ] # _ G g $ GG# )$ $" g ^ G _ g " _ G G " $ $ _$^ g _ G g^ Gg $ $
189 d $ g $ $ _ $ g _^ g % ^ G g $ $ $ g $ GG# # $ $ $ _G $$ $ &//` / +% G$ G " G ^ $ F _ $ $ $ _ F & $ " _ F $ $ G $ U+,V+,% c$ F $ $ $ F " $ GG$ G $ $
190 ] GF $ $ F GG# G$G$ _ $ #G g$ $ " #$ %^ fd+ dh^ ' g^ ] $^ c)] ^ PG,, f ] GF^ ^ $ $ GG# G$G$ $ $ &'" #$ $ &'" $$ ^ % $^ ],, ) $ d ]^ $^ )#$#$$^ $ G$ $ _ $"g $ #G $ c&)& e&dh^ G ) $ PG$^ $ &G$ c$ F #^ ], e H ]G^ ] %g^ '"g^ $ ( P ' $ #G ] $ F " )*** +$$,$ *^ Hd+Q,^ ($#, Q Q ]$$$#$$^ ) $$^ ] $^ $ c G$$ $ $ $ $ GG# " F GG# G$G$ )-# #$./,^ fhd H+fh^ (#,,f h P ]$$ $ P ( P]) ]$ FF " $ c%&)p& &HeQ^ G ) $ P F $^ c$ F # $ ^ %g#^ %g#^ _$ ^,Hfe^ (#, P ]$$ $ )&0 P]) g$ $ c%&)p& &Hhd^ G ) $ P F $^ c$ F # $ ^ %g#^ %g#^ _$ ^,Hfe^ 'FG, ]$$^ P P $^ ( '_^ P ] $^ P ) ^ $ 0 )$ )F $"g #G +$$ " ^ H H+,^ (#,,h, ( ]G$^ $^ ( G$$^ $ F $, $ c$ $ g $ F $ )1 &,&dh^ H
191 Q )# G^ ( '^ ('^ c)] ^,, % $ _ )g $ $ " % $ P $ )#G e 0 ]# $ ( $g P $ $ G $ _ # $ )*** "^ ff, H+Qh^ )G,, ) ]# / " $ $ " ^,,e f %$ $ G $ $ #& #G ] # $ $ -$ $$%%% ^, h d %$ P $ $ GG$ $ _ Gg " ^ f dq+ Q ^, H %$^ * ^ $ ] ) $$G $ $ _ ]G $ $ G $ )-# +,$ * ^ H Q+ff^ 'FG,, Q ( %^ ) ' ^ ] ) G^ $ * 0 ] G& _ () $ * ) " ^ fd+f,^ $ ^ ] $^ c)]^ ($, c) ' h %g^ ( G$^ P *_^ * ) ) \^ $ (* G$ _ #G $ " #$ %^ F^ _$ ^ c)] ^,, ] %^ ( *g^ $ ] ) $$G ] GG$ $ _ & G $ * ) *. *, "% &'" $ "% ^ +,^ ( ' (' c)]^,, c) ' % $ ] ) $$G P GG $ " $ )*** " $"$^ f+, ^,, %^ F$ $^ $ ] ) $$G GG$ $ & G $ G $ $$% " ^ H,,+QeQ ]G $ ( $ _ $_G $ $ ) & ^, fe ] % $ ' )_$ ] *0) + ] $" $"g #G $ * - "" ^ hd+d^ $^ c*^ )G, h $ c$ c
192 h f P %$$ F# $$G$ _ $$ $ G & $ ( Hf&HfH^ $$ )$^ (#,,d % "'% $ &* +$% ff ] %g $ ] ' G$ ) ] G G $ #G,$ $ $ *^ Q fq+d ^ ], Q fd ( ( % ] '$) g$ )-# #$./,^ QQ ff+f,^ PG, fh ( %$ ^ ) ^ 0 ] * ^ ( ]G^ ) ( ]^ P^ ( '%$^ $ c G$$ _ ] g$ _ $ &)& 1fQ^ ) _ $_G $ $ G ) $^ $ _ $#^ ]$^ c)] ^, fq ] %$ $ $ ' G$ $$# $ $ #G " "/^ df Q+ff^ ($, fh * % G$ $ ] ( $ $ $ &,^ PG$ _ G ) $^ $ c$ F #^ ^ '0 ^ c)] ^ ($, f * % G$ $ * ] _ FF " _ )) G& G $ g $ $ #G $ ^ $ c$ F #^ '0 ^ c)]^,, f * % G$ $ * )) GG $ g $ $ #G " +%^,e+ eh^ GG,, f, ] P % ^ 'F $^ 'G ^ $ P ) F $ ]$ $ G $ "$ ^ fq fhe+fd^ ], f de ] P % $ % ( '$ GG$ $ G +$ $ " ^ f d,+q,^ (#, H d % " $ * * Gg $$ ( $ _ ]1 ) $F & $G$ $ + )$$% &'" " ^ ff+fdh^ ^ ( ]' ^ #,,e df % "^ * * Gg $$^ P "#^ $ * $ _G$ $& _ $$&F $ #G $ c&)&,,h&e,^ G ) $ PG$^ c$ F # _ ^ ]G^ ]^,,H
193 dd ] %g^ ' $$^ (^ $ 'F# P $ $ # $ G )*** +$$,$ *^ d + h^ ($#, dh ) % ^ ( $^ ( ' ^ $ P ) ] g$"& $ #G + " "$%^ ded,d+fee^ ($, dq P %"^ ( P %^ P ' #^ ) G $$^ % %$g^ $ '"G$ $ ' ^ G $ #G _ &e "$ ^ Qd dq+hd^,f dh c %\ $ * '&* P #G ] G$ F F# $ c&,e,^ $ c$ F $^ $ ^ G$#^ 'FG,, d %"$^ ^ $ ' )g P%) ] G $# $ )$$% $$ &$$^ feq+f ] ^ ], d %"$^ * ' * $^ $ ] _ ] $ #G +$ $ " ^ dh fh+f,d^ 'FG, Q d, P %"$ ^ ' ^ $ % $ '" $$ $ c' _ " $,$ $ $ *^ ff H+ hf^ PG, f He ) ] %g^ % $^ $ (&( G $ #G & $ + )$ & $$ *^ HH+H ^ (#, H '&( $ P P '$ )" _ c $ g $ 1 " ^ HH HeQ+Hdh^,, Hf G^ ' G ^ $ $# ^ _G"g $ $G$ " ^ Qd f+fq ^,,f Hd G^ ' G ^ P ^ $ $# P $ $ $ GG$ $ ]$ & $ #G $ "$ ^ dh, + fh^ )G,,d HH ( ' ^ P P^ $ P '$ %g&f $ $# _ $ + )$$% &'" " ^ Hh+Qd ^,
194 HQ ' $ $ ( ] $" $ $ G $ G #G )*** +$$ "^ f f f+ ^ PG, Hh ] G $ $ P ]$ G #G )*** "^ He+Qe^ )G,,e H P $ c ] $ _G 1 $ #G +$$ " ^ Q f+hh^ (#, H P $ #G "$ ^ dd dh+ ddd^, H, P $ $ ) "$ g$ $ _G$ _ g "g $ $ " #$ %^ f,+he^ %$ )^ ' c)]^, d ] Qe ) 0 $^ ]G^ $ ]GG & G$ $ F $ ] $& G _ GG$ $ #$$ $ $ #G $ + )$$% &'" " ^ dhf+dh,^ ^ ( ]' ^ #,,e Q )# G $ FF " _ c) #G $ $ _ & G^ $ $ c$ $ )1 &,&efe^ )# G^ ) ^ ' ] ^,, Qf ) $ ^ ]$$^ ' *^ % ) 'F^ ) ] $^ $ ' ) G #G $ * ) ^ Hd+he c) ' ^ ($#,,f Qd ^ % ( $$^ $ ]% ] ]$ GG$ $ _ $ $ #G _ c$ $ " ^ d+ H,^ $^ ($, Q c$ QH P G ),, +) %" ) $ ^,,Q QQ P G ),, +) %" ))) $ ^,,Q Qh ^ ( P G^ $ * $ &'" & ] $&)#^,,H $ Q % _ $ ( G % % $ (,Q^ $$ )$^ )G, Q
195 , Q P P $^ ( ^ )$^ 0 ]$$^ $ P ] $ ] [$ F $# $"g #G $ c%11)p&,h&, ^ c$ F # $ ^ %g#^ %g#^ _$,Hfe^ (#,,d Q, P P $^ 0 )$^ ]$$^ $ P ] $ F $ c $ G $ GG# GF #G _G$ $ " #$ & $ ) % $^,,H he P^ $^ ) $$^ $^ ]$$$#$$^ c & G$$^ ]G^ ( '%$^ ) ( ]^ ( %$ &] $^ ) ^ 0 ] * ^ $ ( ) g$ $ $ GG$ $ _ $ #G * ) " "$%^ d^,,e h P $ ( '%$ $ #G )*** "^ 'FG,,f hf ( PF G $ _G GG$ $ $ _ F " /$ "^ e e,+ f ^,e hd ( P P# $ GGG$$ ) _$ G )***^ f ddh+ dhq^ PG, d hh ) ($^ ( *g^ $ ) ' g ] G $" GF $ #G _G$ $ 1')1 & Qhh^ '# _ G ) $^ ],,d hq ' P ] F _ $"g _ " $ G G,$ $ $ *^ f eq+ eh ^, f hh P P$$ $ $ ) GG $ g# $ "$ ^ fh Qdd+Qdh^ ], h P g$ $ ] '# # ) " "$ $$ $ -#) *%$ $ ^,,f h ) P g & $ [$ $ $# (^ ^ $ $"$^ Hd+ f ]G ^ '" 0g^,h h, ( P $ G ( )F )-# #$./,^ HH fh+dq^, e
196 e e ( P ^ ( *g^ ( * ^ $ ] ) $$G ] G $ _ " #G ]G $ ) $ ),^ c$ F # $ )$ ^ )$ ^ )G,, ) $ ] (# #G $ ".%$'% &'",$ $ & $$'$ ^ +,^ " %^ ( ^ c)]^, d f 0 $ $ )G _ $&g$ $ $ &dh&,h^ $ _ $ G $ $#^ F c$ F #^ G ^ ^ PG,,H d * "$^ ( ' #^ ] ' ^ $ ' $ $ _ $ $# $ g $ #G "$ ^, hfh+ hdd^ 'FG,h H ( $g^ )G$^ P P" ^ $ ' '$" $ #G _ $ # $ Qef^ G ) $^ c$ F # _ ) $ $^ $^ c)] ^ (#, d Q ( ($^ ) ^ $ P _G$ GG$ _ $$ #G _ $ )1f # "$% $$%%% $ &'" "^ &f Q+ f^ ($ $ (,,d h ( $ ) ( F )-# #$./,^ QQ d+hh^ PG, ( $ ) ' _ #G $ + )$$% &'" " ^ Hff+ Hd ^, H ' $ $ 'G ]$ #$$ _ G ( )F )-# #$./,^ HH dh+he^, e, * $ c F $ P]' ) "$ ^ ddh Hd,+HH ^ ],,e e P * \ ) F $ _ $ " #$ %^ Qe+ hf^ ] G^ _$ ^ c)]^,, ] P * \^ 'G ^ $ P ) #G "$ ^ dd f +f, ^,
197 f P ) ^ ) ^ $ ) )$ ] # _ #G "g $ & #G $ ) &f,h^ G )#G $ ^ $ c$ F #^ $^ ' ^ Q) ]H^,,H % ) ) #,,H $ d ] $ $ $ GG$ $ _ #G &)- ) + +$% "$%^ Q HQ+QQ^ )G, H ] $ ^ #^ ) *F^ ^ $$^ $G ^ ) )& ^ ) F$^ $ P # ](( ) $ _ # #G $ c%1)p1 1dh^ c$ F # $ ^ %g#^ ($, Q # $ P $ ' ]$ $ _&$ G$ G _ & )-# #$./,^ fdq fef+fe^ P& G,, % $ _ f ] )#G G $ $ )#G $ h G$ G $ G $ $F $G$ $ )1 &,e&hqe^ #G^ ) ^ ' ] ^ PG,,e # ( ] F# #G $ )P&,ee ^ G ) $^ c$ F # $ ^ ' ]$^ ($,, ( & $$ "$ ", $ # ] $& )#^,,f, ( G$ $ ( * $"g #G & $ c%1)p&,d&hh^ )P ^ c$ F # $ ^ %g#^ %g#^ _$,Hfe^ c)]^,,d,e ( G$ $ ( * $"g #G )-# #$./,^ f Q f,+hd^ PG,,d, ( G$ $ ( * $"g #G )*** +$$ " ^ dd fh+de^ ],,Q,f ( G$ $ (* ] $"g #G $ * ) % c) ' ^ #,,f,d ( ) G$$ $ GG$ $ (#,,h
198 f,h ( ) G$$^ ) ^ #^ $ ( g G # $$ $ $ " ( $ $$.%$ &$$ ^ 'FG,,f,Q ( ) G$$ $ ( g ( &#G FG$ " g # +$$ " ^ f Q +,^ (#,,H,h ^ * $$^ ) ^ $ ( $ ] $ & $ #G $ )) &,dh^ ) _ G ) $ $ $ $ $^ c$ F # _ '" ) )^ 'FG,,d, ] $^ ] % ^ $$^ )^ $ )" ]F # $ $ $# \ $ #G $ $ #$ ^ H,+Qd^ F^ ] ^ c)]^ )G,,, ] $ ]$ $ #G $ $ "$ ^ e QH,+QQ^,H,, )G g _ G #G " "/^ Hd,+,Q^ )G,f ee ( "^ ' *^ ) $^ P] ' ^ )#$#$$^ ' ) G ^ $ ( ) ) $ _G$ $ #G +$$ " ^ h Q+ ^ (#, e $ $ * ' $& $ #$G F $ G _ #G $ + )$$% &'" " ^ Q,+Q h^ '" %^ ] c)]^ ($,, ef ] #G$ $% $''$ " _ c$ F # ^, f ed ) ( $_^ $ G$G$ (] $ ) Q^ ) ^, &,d eh c $_G $ $# & $ #G $$$ $ & $ $ $ $ $ ffh^ $$ $ GG$ $ c$ $^ ' $^ f $F fe^ )" $^ ],,Q eq c $_G $ $# & $ #G $$$ $ & $ $ F $ $ $ fh^ $$ $ GG$ $ c$ $^ ' $^ f $F fe^ )" $^ ],,Q
199 d eh ($$^ ' )FF^ $ ( $ $ $ $ F $ $"g $ & $$ "$ " ^ f+f, ^, d e (g GF $ _G$ $ $ _ $ '() F $ * ) ^ Qd+hd^ )$ P ^ (#,, c) ' e ( *g^ ] ) $$G ^ ) (#$$ GG^ $ % ]$ $ )-# #$./,^ fd Q+,^,, e, ( *g^ F$ $^ F$ )F$^ $ ] $$G (' ]$ $$"g _ $ #G +$$ " ^ Q+ eh^,,d e ' *^ % ) 'F^ ]$$^ ] ^ % ] %^ ) $ ^ ( F^ ) ] $^ )& ^ $ # P & G #G FF " $ " ^ Q+hH^ ]$ G ^ _$ ^ c)]^ ($,,e c) ' ] *$ $ $ #G $ 1H^ P )$ '#^ ]^ _$ ^ c)]^ PG, f ( ( * $ )#$#$$ P $$ $ $ #G +$$ " ^ e d+fq^ (#,,f d ( * $ ) $ ' c $ & #G _ # G $G$ $ * ) ^ HdQ+ HH^ )$ P ^ ]^ c)]^ ($#,,d c) ' % c% $ )f*&,f&h H ' *$$^ 'F#^ $ ) )g ] ] #& & #G +$$ " ^ Hf de+ Hh^ #, h Q ' *$$^ 'F#^ ) P )g^ $ ( " ] $ ]$ FF " _ #G &)-) + +$% "$%^ Q +f^ )G, h *G $ )#$#$$ '& # $ $ #G $ c&)&,&hh^ $ $ c$ F #^ ) _ G ) $^ $ $ c$ F #^,,
200 H *$ $ ( $$ $ G G _ $$# $ +$$ & $$'$ ^ hf fd+ffh^ ($, ' 'G G^ g^ $ $ _ F$ $ #G "$ ^ f QQ +QhQ^ (#,, ' 'G^ )g^ $ %#$ $ $ G +$$ $ $"$ $ ^ H d d f+he^, f fe % ) 'G$ ]G $ $ " " '" " $ ) % $^ eq fhh+fhq^, f % ) 'G$ $ _ G #G $ )-# #$./,^ QQ dd+h ^, d ff % ) 'G$ $ ( ) ]$ $ $ #G _ $& G& $ $ " #$ %^, +eq^ ] G^ _$ ^ c)]^ PG,, ] fd ( ' cp $$ $G $ #G $ " % &'" "^ dh+h ] ^, f fh ( ' _ $ $ $"g )*** % $$ "$^ Q Hf+ Qh^ 'FG, d fq 'F c $ P() " P 1'() $ &,H&f^ $ _ $_G $ $#^ c$ F # _ $^ Q, ) ) G )^ ]$$ ]^ H ed&h,hd^ ($#,,H fh 'F# $ ] ) P #G $ $ G " "/^ ffh df+dh^ PG,,e f ( 'F#^ ' $$^ $ ] %g ( $& $ G # $ G #G +$$ " ^ h e,+ dd^ (#, % $ _ )#G G $ $ )#G $ ] ] $ 'F, f % ' gf^ ) G"^ ^ ($$^ ) '^ $ ) G & $ $ #G )-# #$./,^ fqq ffh+ fd ^,, f, ] ' G$ Pc' +] c$ #G )-# #$./,^ ff Hf+Qe^ ($#, &
201 Q de ) '^ ^ ( #^ ] * ^ $ ) ] c$ #G $ F " )-# #$./,^ QQ he+ h ^ PG, d % '#$ $ $ $ $ $ ^ )$ & #G $^ $ $ "^ ]^ c)]^, H % (eh df % '#$ )$ G $ $ ^ )$ #& G $^ $ $ "^ ]^ c)]^, H % (eqe dd gg HH%)P '() GG$ $ & ^,,d % " $ dh ) $#^ G^ ^ $ P '#$ ] # _ $ G& $ #G $ * ## ^ d+df ^ ' $G ^ c*^,, dq P ^ $^ $ * " ]$ FF " _ '" $ #G $ * ) ^ dqq+df^ %g# _$ c)]^ ($#,,H c) ' dh $$^ ] $^ $ )" ]$ ] G _ P $ $ Hh^ P [ G$ $ )#G $^ ($,, d ^ ' *$$ ^ % $ $ ^ $ ' ) c $ G G $ _ $ $ &GG# #G $,H QdQ^ c$ F #^ ($,,H d ) ( $^ ( $$^ $ P $ PFG$ _ ] $G F &)-) + +$% "$%^,,+ Q^ ($,, d, * $ ( )Gg )# $ F # " $ $"g #G $ + )$$% &'" " ^ HH+HQd^ )$ (^ ]^ d& ($, He _ $ P % $ g " $ _ G $"g "$ ^, eq+ ^ (#,h H )$ #G ( e,h '() '"g #G $ $ ^ $$ )$^,, Hf ( $ ( P $ ] G $ _ " $"g& F $ " #$ %^ F^ _$ ^ c)]^ PG, ]
202 h Hd ] $ $ c G$$ ] F# _ GG# $ #& #G $ &&,1e^ _ G $^ $ _ $#^ ]$^ ] ^ c)] ^ ($#,, HH ] ) $ #G $ #G G$ $ ] G $ _ F $"g G$ $ " _ g$ $G$ $ $ [ ^ $ c$ F #^,,Q HQ ] ) ^ ] ( ^ $ ( ) %$ ] G $ _ #G G$ $ G^ F $"g G$ $ $ g$ $G$ $ )-# #$./,^ de h+d ^ ($#,,h Hh ) $ $ ] $$G ] F $ G $$# $ $ #^ PG, Q H ) ( $^ F$ G ^ ] ) $$G ^ F$ $^ $ F$ )F$ ]G +] $ #G _,,e )*** "^ fdq HH+Qd^ #,,e H )( $ P $ #G &_&& $ _ & $ $ * +* # ^ Q+hh^ $$^ ] ^, '& $ H, 'G $ P ) c $ $# $ _ $ $ $ $"g _ G "$ ^ ff,,d+,,,^ PG, Qe 'G $ P ) ]$ $ F )-# #$./,^ f ^ ($#, Q ' '$ $ ( * #&$&" _ ) $ " ^ +fe^ )$ ($ ^ ] c)] ^ ($, c) ' Qf ' '$^ % % )^ $ ( * $ $ ) $"g #G +$$ " ^ h dh+qh^ (#, Qd ) ' $ ( ) G P $ $ GG$ $ _ ] F &)-) + +$% "$%^, h+f ^ ($,, QH ( ' ^ % ^ $ ( ) $ #G $ " )-# #$./,^ f +,^ ($#,
203 QQ ( ' ^ % ^ ( g^ $ ( ) ) ) ]$ _ GG $ $F $G$ " "$^ fd H+ Q ^,, Qh % ' $ ' P ) G# ] F# _ $ & G )*** "^ fh Qf+he^ ],, Q P 'g $^ ] %g^ P '"g^ 'F#^ ( )$ ^ $ ( $ $$$ $ $ G #G "$ ^ dd fq +fd^, Q ( $ ( P % $ 1 $g ] _ & #G )-# #$./,^ fd +f ^ ($#,, Q, ( * ) $"g $ #G )*** "^ ff fd+ dh^ (#, he ( * )# $ $ #G $ & " $ * ) " ^ ]$ G ^ _$ ^ c)]^ ($,,e c) ' h ( * ^ P ^ P $^ *$ (]^ *_ ^ $ G$ ( ] & F$ $# _ c$ Hf %)P #G $ " #$ %^ Q+fH^ $^ )]^ c)]^ PG, Q ] hf ) ^ #^ $ ( g ] _ ( & #G $ )P&,eeeQ^ PG$ _ G ) $^ c$ F # $ ' ]$^,, hd ( 0 $^ P ) ^ $ ) GG$ $ $ _G$ _ & $ $ & #G $ ) & fh^ G ) $ $ ^ c$ F # _ $^ $^ $ ^ $^ Q) ]^ ],,f hh (&( $ " " $ ] $ $# G _ $ + )$$% &'" " ^ heh+hf^ %$^ ^ #, h hq (&( $ " #$ $ + )$$% & '" " ^ d,h+he^ '" %^ ] c)] ^ ($,,
204 hh (&( $ ) ( # ) * ]$ G$ G $ #G _ G $"g $ )*** ) ## ^ h + Q^ )$ P ^ ]^ c)]^ ], d h P ) ( g^ g^ $^ )$ P ]^ )g % (^ )$ ^ " ( ^ " P^ * )^ $ * $ P $ _ G $$ $# $ #G )*** +$$,$ *^,d fhe+fh ^ #, d h P ] $^ $^ $ * ] _ $$ # _ $& $ F g ]P $ $$ &$$ )- #& ^ e,+h^ ^ '^ c)]^ ($, ] h, ) $ ] $ $ $ #G G $ $ $ # $ " #$ %^ + fd^ ] G^ _$ ^ c)]^ PG,, ] e g^ P ^ g^ * G$^ g#^ $ ) $G _ $G $ $, $,f&&e^ ] % '^ # ^ '" (# e,h^ c)] ^ ($#,,f g^ P ^ * G$^ $ g# $, _G % ' $ * - ^ Q+f^ '$$^ ], $ c$ c f % $g$^ P '"g^ P 'g $^ $ ( $ ] $ & #G $ + )$$% &'" " ^ HfH+Hd^ ^ ( ]' ^ #,,e d P GG $ $ $F $ $"g & H & $ _ $G $ $ $ " $ ( fh^ $$ )$^ 'FG, f H g^ % )g^ ( "^ P "^ * $^ $^ $ ' c) ] $"g $$^ # #G $ " #$ %^ h,+ ^ F^ _$ ^ c)]^ PG, ] Q ( c G $ (h ^ P] ]^ ], e h ( $$ $ G $ (,f^ P] ] ^ )G,
205 , ( $$ $ (,^ P] ]^ )G, ) g^ P ]"^ ] ] ^ $ ] ) $ # & $ $ _ $ $ )&,h&f^ G ) $^ c$ F # $ ^ )$ %^ )$ %^ ],deh^ c)]^,,h, P ^ g^ * G$^ $ g# $,^ #G $ *"# ^ Hd+Qe^ #,, e $ ' $ ] $ $ $ $$ ( ( )#G )*** +$$,$ *^,h hd+hfh^ ($,,d ( $ ( $ $ _ F GG# $ $ GG$ $ $ ]$ +$$ " ^ Hf H+^ #, h f P 'G $ $ #$$ $ $ $ G #G & $ 1')1 &feq^ ^, d P $ ' )FF # &'" &$$ $ $ $%, ^ dqq+dd '& $^, H ^ ( ) G$$^ P $^ )g $$^ $ g ( F $ $ $ ( #G $ + * ) ^ ($,,H Q ^ ^ g^ ( g^ $ ) g +] F _ " $ $ /$ $ ".$ -", $ &'" "^,,H h ^ ] ]#"^ %$^ F$^ $ % *$ ) ] $ #G _ G $ &G,$ $ $ *^, Qd+ Qfh^ (#,, P $ * G$ c$ G& $ #G "$ ^ dhq+dq^ (#,H ] _g $^ (^ ' G $^ ) ^ ) )^ $ * 0 () FF " $ " * ) ^ fh +fq,^ ]$ ^ ($, h c) ', $G $ ( * '() G$ $ + * ) " ^ dq+dfh^ ]$ G ^ _$ ^ c)]^ ($,,e c) '
206 ,e,e $G $ ( * $ $ GG$ $ _ & #G $ " #$ %^ F^ _$ ^ c)] ^ PG,, ], ' " $ * % G$ ] $"g $ c$ $ #G )*** +$$,$ *^ f d+ Hh^, f,f ^ ] GF^ ( ]G$^ %^ $^ G$^ ( & G$$^ * ^ ) '$ ^ ' $ ^ $ ' ) FF " _ c) $ #G $ )1 &,e&fq^ )# G^ ) ^ ' ] ^ ],,e,d ( )^ P ^ $ PP g $&&$ G$ $ #G $ +$$ " ^ fh f+f ^ 'FG, H,H )$^ P ^ ) * G$^ P )^ $ % '#$ P $ $ G& G$ $ _ )$ $"g #G $ " * ) +$% ^,+ de^ $^ $^ c)] ^ ($, Q c) ',Q ) )$ $ ) & $ $ & #G $ )-* +.) $ $ ] ^ ],,f % G )#G $ ^ c$ F # _ $ $ ) &fqq^ ($,,f,h ] )$ ] F $ F # $ #G # #$G # & $ $ $ $ + )$$% &'" " ^ Hdf+Hd,^ ^ ( ]' ^ #,,e, )#$#$^ "^ ( ' ^ ' ) G ^ ] )^ $ ( ) #G $ $ $ $ " #$ %^ dd+qe^ $^ ) $$^ c)] ^ PG, Q ], )#$#$$ $ $ # $ #G +$ $ " ^ d fh+f e^ ],,,, )#$#$$ &'" % ^ dqd+d d ] ^,,d fee )^ P \^ $ 'G ] $ #G _ GG "g $ $ + + " #$ %^ fq+dh ] ^ PG, Q
207 , fe ] )" $ #G "$ ^ dd fqq+fq^, fef % )$ G$ P G$ $ ] #$ GG $ $ )*** "^ h Q+h,^ ], d fed ] ) P ] #G $,&ehf^ PG$ _ G ) $^ $ c$ F #^ ^ '0 ^ c)] ^ 'FG,, feh ] ) $ %'% &'" % P ^ $ c$ F #^ #,,f % $ &,f&fhh feq ) )$G$ $ P ) ]1 ) g G$ &)-) + +$% "$%^ Q f,+hh^ )G, feh )G$ $ ] ( $g ) $ #G $ " #$ %^ e + H^ F^ _^ P,, ] fe ) $ F$ $ ( ) # '() G$ " &$ $# )-# #$./,^ fdq HQ+Q ^ PG, fe ) $ F$ $ ( ) # '() GG$ $ $ _G$ _ &$ $# $,1Q^ P )$ '#^ ]^ _$ ^ c)] ^ #,, fe, ) ^ ( ^ $ ( $ $ $ _ F )-# #$./,^ H d QQ+h,^ (#, e fe )$ )g ] G$&G $ GG$ $ #G $ ) ^ df,+dhh^,hd f ' )FF ( F _ $"g& #G " "/^ hh dqd+d, ^ PG, H ff P )" $^ P$ ^ $ P % ) () ] G #G _ $F $G$ $ " #$ %^,+^ ] G^ _$ ^ c)]^ PG,, ] fd P $ [ _ $ # F #G & $ c)&h,& ^ G c$ F # PG$ _ G ) $^ '" 0g^ '0 eef c)]^,,e
208 ,f fh ] ) $$G ' ] c$ $ " _ % % ^ ff d+,^, fq ] ) $$G #$ & $ ) % $ $ & ^, fh ] ) $$G ", $ & ^,, f ] ) $$G $ ) ( $ ]$ $ $ ]G $ #* %% $^ H+ e^ ]GG ^ '$^,, PG$ _ G $ G ) $^ c$ F f ] ) $$G ^ ) ( $^ $ F$ $ c $ $ $ #G $ + )$$% &'" " ^ QQ +Qhd^ %$^ ^ #, h f, ] ) $$G $ F$ $ P $ #G " "/^ H H,+Hh,^ PG, Q ffe ] ) $$G ^ F$ $^ F$ )F$^ ) (^ $ )(^ ($$ ](^ $ F$ G $ " ]G & $ #G $ &,H^ PG$ _ G $ G ) $^ c$ F ^ ]GG ^ '$^ (#,, ff * $ #G $ $ # G #G $ $$% " ^ H,+Qd ]()^,h fff G^ ' ^ $ ( )# g) F _ $ ^ # #G $ + )$$% &'" " ^ f +dq^ '" %^ ] c)] ^ ($,, ffd G ] G # $$ $$# $ _ G # +$$ & $$'$ ^ Hf e+fe,^ ($,, ffh ) ( # $ $ " #G $ " * ) +$% ^ +, ^ ) 'g #^ c^ c)]^ GG, H c) ' ffq G $$^ P *_^ )$^ $ ] ( ) $ c') #G,$ $ $ *^ Q e + e^ 'FG, Q
209 ,d ffh ) %g# c$ $ eee "g $ ]$ $ Hd%)P $ ^ P^ ^ c)] ^ (#, c) ' ff ] $ ' *$ g $ $ G $ & $ #G $ ^ PG$ _ G ) $ c$ F # _ $$^ $$ ' QQHQQ^,,Q ff ) ) $ %$ +" ) \^ G ^,Q, ff, * c^ #"^ * 0GG^ ) $^ $ ] _G"g _ G $ $ _ $ ' #G $,H&H^ PG$ _ $_G $ ) $^ c$ F # _ g#^ &d& $^ %$g#&* g#^ d ($^ PG,,H fde ' ( F$ ^ %^ *g^ F$ $^ ( )^ F$ )F$^ $ ] $$G ]G $ G $ & feh^ PG$ _ G $ G ) $^ c$ F ^ ]G& G ^ '$^,, fd F$ $ $ ] ) $$G $ " $ + )$$% &'" " ^ HQh+Hh^ )$ (^ ] ^ d& ($, fdf F$ $^ ] ) $$G ^ $ F$ )F$ $$ $ & #G $ " & $"g $ + )$$% &'" " ^ f +dh ^, fdd F$ $^ ] ) $$G ^ $ ] ) $ _ & _G$ F $ + )$$% &'" " ^ ff+f^ '" %^ ] c)]^ ($,, fdh F$ $ $ F$ )F$ ) & GG$ $ $ ]G $ &^ PG$ _ G $ G ) $^ c$ F ^ ]GG ^ '$^ PG, h fdq F$ $^ F$ )F$^ $ ] ) $$G _G$ _ ]G $ #G,$ $ $ *^, ffd+fdh^,, fdh F$ G ]' +] & $ $ _ ]G $ *, &'" ^ ( _ G$#^ )G,, ) $
210 ,H fd ( $^ ' %^ ] P^ $^ $ % $ $ " ^ Qd dd+dq,^ )GG,,f fd ' #g $ ) *$ ) # G$ G $ &F $"g " "/^ Qf dq+ ^ ($, d fd, % )g^ g^ $ ^ * $^ $ ' c) $ #G )-# #$./,^ Q H,+e^, d fhe % ( )g P c$ $$# ^ $ $ ( G ) $^ H+de^ (#,, fh )$ $_G $ F /$ "^ h +de^,hq fhf 0 )$ $ ]$$ () ] " G #G $ c%11)p&,h& d^ c$ F # $ ^ %g#^ %g#^ _$,Hfe^ PG,,d fhd ( ) $ F $ $"g #G $ " * ) +$% ^ h^ ) 'g #^ c^ c)]^ GG, H c) ' fhh % % ) 'G $^ G$G$^ $ &F $ $ $ ) #G $ c%1)p,e1qh^ )^ c$ F # $ ^ %g#^ _$,Hfe^ ],,e fhq ( )_ G$ G $ G ] $ g $G$ G )-* +.)^ +e^ #,, fhh ) )_^ $^ ) " $^ ] ($^ 'F $^ $^ $ ( g # g$ _ G $ #G "$ ^ h dd+dhq^ ($,H
CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More informationCIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1
Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is
More informationCIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1
Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5
More informationCIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1
Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is
More informationCIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next
More informationCIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router
More informationCIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1
Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,
More informationSPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN
SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS
More informationSPARE CONNECTORS KTM 2014
SPAREPARTSCATALOG: // ENGINE ART.-NR.: 3208201EN CONTENT CONNECTORS FOR WIRING HARNESS AA-AN CONNECTORS FOR WIRING HARNESS AO-BC CONNECTORS FOR WIRING HARNESS BD-BQ CONNECTORS FOR WIRING HARNESS BR-CD
More informationCIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationCIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationJason Manley. Internal presentation: Operation overview and drill-down October 2007
Jason Manley Internal presentation: Operation overview and drill-down October 2007 System overview Achievements to date ibob F Engine in detail BEE2 X Engine in detail Backend System in detail Future developments
More informationUNIX File Systems. How UNIX Organizes and Accesses Files on Disk
UNIX File Systems How UNIX Organizes and Accesses Files on Disk Why File Systems File system is a service which supports an abstract representation of the secondary storage to the OS A file system organizes
More information! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+)
! "#! # $ %& #! '!!!( &!)'*+' '(,-. +) /,*+), 01/-*+) + 01/.*+) ) 05,-. +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+,3 4 +. 6*! ) ) ) ) 5 ) ) ) ) + 5 + + ) ) ) 5 9 + ) ) + 5 4 ) ) + ) 5, ) )
More informationThe cache is 4-way set associative, with 4-byte blocks, and 16 total lines
Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total
More informationhttps://support.industry.siemens.com/cs/ww/en/view/
Support Packages for TIA Portal V13 March 2018 https://support.industry.siemens.com/cs/ww/en/view/72341852 Siemens Industry Online Support This entry is from the Siemens Industry Online Support. The general
More informationCIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 24 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Questions from last time How
More informationAdvanced Operating Systems
Advanced Operating Systems File Systems: File Allocation Table, Linux File System, NTFS Lecture 10 Case Studies of File Systems File Allocation Table (FAT) Unix File System Berkeley Fast File System Linux
More informationCourse Contents. The TCP/IP protocol Stack
Course Contents PART 1 Overview and Introduction PART 2 Communication Reference Models PART 3 Data Communication Fundamentals and Physical Layer PART 4 Datalink Layer and Emerging Network Technologies
More informationFrequently asked questions from the previous class survey
CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [FILE SYSTEMS] Shrideep Pallickara Computer Science Colorado State University L27.1 Frequently asked questions from the previous class survey How many choices
More informationFile Systems. What do we need to know?
File Systems Chapter 4 1 What do we need to know? How are files viewed on different OS s? What is a file system from the programmer s viewpoint? You mostly know this, but we ll review the main points.
More information" ## $ %& * +,-& . )&/#& 3 /#& ) # ) ) 6 $ 1< ' =85;197<) . ) 3!1 4 91>
! " ## $ %& '!#()%& * +,-&. )&/#& 0 )12&() 3 /#& 4 5%)/#& ) # ) ) 6 5 789:6)%&! " 5 789:6/95;! $ 1< ' =85;197 1 1?8!1@A7)1># 1?8!1@ AB C " 1?8!17@A!)) $ 1?8!17@A!C) ' 1?8!17@1A6
More informationCustomer Maintenance Parts List
C US R MODEL SUFFIX Customer Maintenance Parts List Model 0 R0000 dot recorder Made in China RECORDER STYLE FREQUENCY NO. SUPPLY N00 0 TAG NO. Note: Parts marked with a symbol are Customer Maintenance
More informationECE 598 Advanced Operating Systems Lecture 18
ECE 598 Advanced Operating Systems Lecture 18 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 5 April 2016 Homework #7 was posted Project update Announcements 1 More like a 571
More informationMC68705U3 Bootstrap ROM
MC68705U3 Bootstrap ROM ;This is a listing of the Bootstrap ROM which resides in Motorola's MC68705U3 single chip ;micros. Its sole purpose is to program its own EPROM by copying the data from an external
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Spring 2018 Lecture 22 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Disk Structure Disk can
More informationC1098 JPEG Module User Manual
C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command
More informationCS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University
Frequently asked questions from the previous class survey CS 370: SYSTEM ARCHITECTURE & SOFTWARE [FILE SYSTEMS] Interpretation of metdata from different file systems Error Correction on hard disks? Shrideep
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 25 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 FAQ Q 2 Data and Metadata
More informationChallenge managing memory
INF16: Introduction to Operating Systems and Data Communication Operating Systems: Memory Thursday 6 October 16 Challenge managing memory 1 Overview Hierarchies Multiprogramming and memory management Addressing
More informationOutline. Operating Systems. File Systems. File System Concepts. Example: Unix open() Files: The User s Point of View
Operating Systems s Systems (in a Day) Ch - Systems Abstraction to disk (convenience) The only thing friendly about a disk is that it has persistent storage. Devices may be different: tape, IDE/SCSI, NFS
More informationPE PIPE & FITTINGS LDPE PIPE
LDPE PIPE All LDPE pipe is made with 100% virgin material ECO LDPE is made with 100% re-grind virgin material Pipes rated at 4 bar at 20 0 C No 2 for years All LDPE pipe is made and tested in our own factory
More informationCS 550 Operating Systems Spring File System
1 CS 550 Operating Systems Spring 2018 File System 2 OS Abstractions Process: virtualization of CPU Address space: virtualization of memory The above to allow a program to run as if it is in its own private,
More information!"!#$%&'()'%*%"&' $! + + )"( $! +!* %"%, $!- &"4+ %5!%"4+)'6$76)"%8)' 9+!()"(%#)"4!+!:!: ;!#"4+ :!'! %#4)"+<" $!9!#+6)"%= 4& )#=>!
!"!#$%&'()'%*%"&' $! + + )"( $! +!* %"%, $!-./ 0 /. 123 &"4+ %5!%"4+)'6$76)"%8)' 9+!()"(%#)"4!+!:!: ;!#"4+ :!'! %#4)"+! (#&: 1?@ AB )#);'!+!: %#+!'!4#): +)*C8)#(4')"*!+$% ()"*!+)#):
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators
More informationCS435 Introduction to Big Data FALL 2018 Colorado State University. 11/7/2018 Week 12-B Sangmi Lee Pallickara. FAQs
11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.0.0 CS435 Introduction to Big Data 11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.1 FAQs Deadline of the Programming Assignment 3
More informationCase ast Doc 284 Filed 11/07/14 Entered 11/07/14 17:54:43 IN THE UNITED STATES BANKRUPTCY COURT FOR THE EASTERN DISTRICT OF NEW YORK
IN THE UNITED STATES BANKRUPTCY COURT FOR THE EASTERN DISTRICT OF NEW YORK ) In re: ) Chapter 11 ) LONG BEACH MEDICAL CENTER, ) et al., 1 ) STATE OF ILLINOIS ) ) ss COUNTY OF COOK ) Case No. 14-70593-ast
More informationFile System Internals. Jo, Heeseung
File System Internals Jo, Heeseung Today's Topics File system implementation File descriptor table, File table Virtual file system File system design issues Directory implementation: filename -> metadata
More information!"#$%!&'#()#*+,-. %/ %70/89
!"$%!&'()*+,-. %/012345657%70/89 F90$(/'4(0).!!%+!&'()*+,-%% '!"$%M%!(4!3/ % 85H90>4>%C6L>4:%4%M+'$%'$(',*0$'4($*!, % 01L4%058N%0()3.(0'$(')*+$!,(-(.' *./0'$%'2.(-(+$'$(/'&.%/',!&$!+"'%&&'*))!4(+$*,,9'M(+'
More information! Design constraints. " Component failures are the norm. " Files are huge by traditional standards. ! POSIX-like
Cloud background Google File System! Warehouse scale systems " 10K-100K nodes " 50MW (1 MW = 1,000 houses) " Power efficient! Located near cheap power! Passive cooling! Power Usage Effectiveness = Total
More informationPacket Header Formats
A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used
More informationMidterm II December 3 rd, 2007 CS162: Operating Systems and Systems Programming
Fall 2007 University of California, Berkeley College of Engineering Computer Science Division EECS John Kubiatowicz Midterm II December 3 rd, 2007 CS162: Operating Systems and Systems Programming Your
More informationSegmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS)
Review Segmentation Segmentation Implementation Advantage of Segmentation Protection Sharing Segmentation with Paging Segmentation with Paging Segmentation with Paging Reason for the segmentation with
More informationCS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1
CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1 This exam is closed book, closed notes. All cell phones must be turned off. No calculators may be used. You have two hours to complete
More informationCS 537 Fall 2017 Review Session
CS 537 Fall 2017 Review Session Deadlock Conditions for deadlock: Hold and wait No preemption Circular wait Mutual exclusion QUESTION: Fix code List_insert(struct list * head, struc node * node List_move(struct
More informationELEC5616 COMPUTER & NETWORK SECURITY
ELEC5616 COMPUTER & NETWORK SECURITY Lecture 17: Network Protocols I IP The Internet Protocol (IP) is a stateless protocol that is used to send packets from one machine to another using 32- bit addresses
More informationTable 12.2 Information Elements of a File Directory
Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For
More informationGoogle Disk Farm. Early days
Google Disk Farm Early days today CS 5204 Fall, 2007 2 Design Design factors Failures are common (built from inexpensive commodity components) Files large (multi-gb) mutation principally via appending
More informationTEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940
TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 Product Introduction. Purpose of use, Features TDH-940 is a Test Disc designed for confirmation of operation of DVD
More informationTechnical Specification. Third Party Control Protocol. AV Revolution
Technical Specification Third Party Control Protocol AV Revolution Document AM-TS-120308 Version 1.0 Page 1 of 31 DOCUMENT DETAILS Document Title: Technical Specification, Third Party Control Protocol,
More informationThe Netwok Layer IPv4 and IPv6 Part 2
ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok Layer IPv4 and IPv6 Part 2 Jean Yves Le Boudec 2014 1 Contents 6. ARP 7. Host configuration 8. IP packet format Textbook Chapter 5: The Network Layer
More informationFile Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
More informationDigital Projector X30N/X35N
Digital Projector X30N/X35N Operator's Guide TECHNICAL Warranty 3M warrants that when the 3M Product is used according to 3M s Intended Use Statement (www.3m.com/meetings), it will perform satisfactorily
More informationCS370: Operating Systems [Spring 2017] Dept. Of Computer Science, Colorado State University
Frequently asked questions from the previous class survey CS 370: OPERATING SYSTEMS [FILE SYSTEMS] Shrideep Pallickara Computer Science Colorado State University If you have a file with scattered blocks,
More informationCS 4284 Systems Capstone
CS 4284 Systems Capstone Disks & File Systems Godmar Back Filesystems Files vs Disks File Abstraction Byte oriented Names Access protection Consistency guarantees Disk Abstraction Block oriented Block
More informationTCSS 422: OPERATING SYSTEMS
TCSS 422: OPERATING SYSTEMS File Systems and RAID Wes J. Lloyd Institute of Technology University of Washington - Tacoma Chapter 38, 39 Introduction to RAID File systems structure File systems inodes File
More information(32 KB) 216 * 215 = 231 = 2GB
The Microsoft FAT 16 file system (supported by all of Microsoft's operating systems from latter versions of MS-DOS through Windows8, as well as all Linux versions) is an example of a file allocation table
More informationHong Kong Polytechnic University Department of Electronic and Information Engineering. Experiment On DOS File system
DOSFS/CC/v1 Hong Kong Polytechnic University Department of Electronic and Information Engineering Experiment On DOS File system Objectives : To study how an OS manages its file system in a floppy disk.
More informationNetwork File System (NFS)
Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 14 th October 2015 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent
More informationNetwork File System (NFS)
Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th October, 2009 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent
More informationFile Systems. CS170 Fall 2018
File Systems CS170 Fall 2018 Table of Content File interface review File-System Structure File-System Implementation Directory Implementation Allocation Methods of Disk Space Free-Space Management Contiguous
More informationLecture 19: File System Implementation. Mythili Vutukuru IIT Bombay
Lecture 19: File System Implementation Mythili Vutukuru IIT Bombay File System An organization of files and directories on disk OS has one or more file systems Two main aspects of file systems Data structures
More informationFilesystem. Disclaimer: some slides are adopted from book authors slides with permission 1
Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Storage Subsystem in Linux OS Inode cache User Applications System call Interface Virtual File System (VFS) Filesystem
More informationSupported modules System 300S Version:
Supported modules System 300S Version: 29.08.2011 Description Siemens Modul Speed7 C+Eco ext. K-Bus Digital input SM321 Speed7 (318er) int. K-Bus DI16xDC24V 6ES7 321-1BH00-0AA0 yes yes yes DI16xDC24V 6ES7
More informationMotivation. Operating Systems. File Systems. Outline. Files: The User s Point of View. File System Concepts. Solution? Files!
Motivation Operating Systems Process store, retrieve information Process capacity restricted to vmem size When process terminates, memory lost Multiple processes share information Systems (Ch 0.-0.4, Ch.-.5)
More informationThis is a closed-book exam. You may use two double-sided 8.5x11 sheets of notes.
FINAL EXAMINATION SPRING 2003 CSC 262 OPERATING SYSTEMS NICHOLAS R. HOWE This is a closed-book exam. You may use two double-sided 8.5x11 sheets of notes. All answers to this exam should be written in your
More informationMemory management. Knut Omang Ifi/Oracle 10 Oct, 2012
Memory management Knut Omang Ifi/Oracle 1 Oct, 212 (with slides from V. Goebel, C. Griwodz (Ifi/UiO), P. Halvorsen (Ifi/UiO), K. Li (Princeton), A. Tanenbaum (VU Amsterdam), and M. van Steen (VU Amsterdam))
More informationTroubleshooting Communication in WebSphere MQ
IBM Software Group Troubleshooting Communication in WebSphere MQ Rick Armstrong (rickied@us.ibm.com) Advisory Software Engineer 27 October 2010 WebSphere Support Technical Exchange Agenda TCP/IP networking
More informationOperating Systems. Week 9 Recitation: Exam 2 Preview Review of Exam 2, Spring Paul Krzyzanowski. Rutgers University.
Operating Systems Week 9 Recitation: Exam 2 Preview Review of Exam 2, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 March 27, 2015 2015 Paul Krzyzanowski 1 Exam 2 2012 Question 2a One of
More informationDeadlock Revisited. CS439: Principles of Computer Systems April 23, 2018
Deadlock Revisited CS439: Principles of Computer Systems April 23, 2018 Last Time Distributed File Systems Remote Procedure Calls (RPC) Consistency Models Coherence, Staleness, Consistency Network File
More informationChapter 11: File System Implementation
Chapter 11: File System Implementation File System Structure File System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery Log-Structured
More informationThe ZCPR3 INSTALLATION WORKBOOK. by Richard Conn. First Revision, 8 March 1985 Original Draft, 20 February 1985
The ZCPR3 INSTALLATION WORKBOOK by Richard Conn First Revision, 8 March 1985 Original Draft, 20 February 1985 About this Workbook This workbook takes you through the eight steps of ZCPR3 installation.
More informationFile Systems: Fundamentals
File Systems: Fundamentals 1 Files! What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks)! File attributes Ø Name, type, location, size, protection, creator,
More information4. Specifications and Additional Information
4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control
More informationVIRTUAL FILE SYSTEM AND FILE SYSTEM CONCEPTS Operating Systems Design Euiseong Seo
VIRTUAL FILE SYSTEM AND FILE SYSTEM CONCEPTS 2016 Operating Systems Design Euiseong Seo (euiseong@skku.edu) File Layout An entity that separates and isolates data Files have meanings only to applications
More informationFile Systems: Fundamentals
1 Files Fundamental Ontology of File Systems File Systems: Fundamentals What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type,
More informationFile Layout and Directories
COS 318: Operating Systems File Layout and Directories Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics File system structure Disk
More information" # $! " # $! %" %& ' %% ( ) %*
! " # $! " # $! %" %& ' %% ( ) %* + $ % &, # $"&*"-&&. ). ) /. /. 0 / 1 234. 0 ). 0. 0.! 5 6! 7!. 8 2.., 4 7! 2# +9 ) 4 7:. 2# +9 ) 4 78. 7(. 2# +9 ) 4 77 2# +9 ) 4 7.! 2# +9 ) 4 7!;. 2# +9 ) 4 6 7 #
More informationCOMMUNICATION M-BUS PROTOCOL PR 118
COMMUNICATION M-BUS PROTOCOL PR 118 CE4DT CONTO D4 Pd 03/01/2017 Pag. 1/27 CONTENTS 1. Standard M-Bus telegrams (Mb2) 2 1.1 Request for Data (REQ_UD2 ) 2 1.2 Details of telegrams 1,2,3 6 1.2.1 Telegram
More informationCh. 22 Bootstrap And Autoconfiguration (DHCP, NDP or IPv6-ND)
CSC521 Communication Protocols 網路通訊協定 Ch. 22 Bootstrap And Autoconfiguration (DHCP, NDP or IPv6-ND) 吳俊興國立高雄大學資訊工程學系 Internetworking With TCP/IP, Vol I: Sixth Edition, Douglas E. Comer Outline 1 Introduction
More informationCME341 Dec. 16, 2014 Final Exam
1 CME341 Dec. 16, 2014 Final Exam Time: 3.0 hours, Text Books, Notes and Computer Files Only NO CELL PHONES or LAPTOPS All questions are independent. Each assumes you are starting with the microprocessor
More informationMC68705P3 Bootstrap ROM
MC68705P3 Bootstrap ROM ;This is a listing of the Bootstrap ROM which resides in Motorola's MC68705P3 single chip ;micros. Its sole purpose is to program its own EPROM by copying the data from an external
More informationCIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:
CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,
More informationDa-Wei Chang CSIE.NCKU. Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University
Chapter 11 Implementing File System Da-Wei Chang CSIE.NCKU Source: Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University Outline File-System Structure
More informationCSE 451: Operating Systems. Section 10 Project 3 wrap-up, final exam review
CSE 451: Operating Systems Section 10 Project 3 wrap-up, final exam review Final exam review Goal of this section: key concepts you should understand Not just a summary of lectures Slides coverage and
More informationGoogle File System. Arun Sundaram Operating Systems
Arun Sundaram Operating Systems 1 Assumptions GFS built with commodity hardware GFS stores a modest number of large files A few million files, each typically 100MB or larger (Multi-GB files are common)
More informationThe Netwok Layer IPv4 and IPv6 Part 2
ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok Layer IPv4 and IPv6 Part 2 Jean Yves Le Boudec 2015 1 Contents 6. ARP 7. Host configuration 8. IP packet format Textbook Chapter 5: The Network Layer
More informationM-Bus protocol CALEC energy master
M-Bus protocol CALEC energy master Manufacturer: Device: Firmware version: INTEGRA METERING AG CALEC energy master 1.03.XX or higher Manufacturer code: 05B4h Device version: D0 (inactive), D1(Flow), D2
More informationPERSISTENCE: FSCK, JOURNALING. Shivaram Venkataraman CS 537, Spring 2019
PERSISTENCE: FSCK, JOURNALING Shivaram Venkataraman CS 537, Spring 2019 ADMINISTRIVIA Project 4b: Due today! Project 5: Out by tomorrow Discussion this week: Project 5 AGENDA / LEARNING OUTCOMES How does
More informationFinal Exam Preparation Questions
EECS 678 Spring 2013 Final Exam Preparation Questions 1 Chapter 6 1. What is a critical section? What are the three conditions to be ensured by any solution to the critical section problem? 2. The following
More informationIntroduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1
Introduction to OS File Management MOS Ch. 4 Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Introduction to OS 1 File Management Objectives Provide I/O support for a variety of storage device
More information9/26/2017 Sangmi Lee Pallickara Week 6- A. CS535 Big Data Fall 2017 Colorado State University
CS535 Big Data - Fall 2017 Week 6-A-1 CS535 BIG DATA FAQs PA1: Use only one word query Deadends {{Dead end}} Hub value will be?? PART 1. BATCH COMPUTING MODEL FOR BIG DATA ANALYTICS 4. GOOGLE FILE SYSTEM
More informationSpecifcations. Highlights - Rilled cans withstand high shock and vibration. - 2 times the ripple-current capability - High capacitance per can
click here to see hardware and mounting options Type 388 85 C Best Value, Screw Terminal, Aluminum Type 388 has twice the life of the 386 and twice the ripple-current capability. While the standard encasement
More informationJuly Registration of a Cyrillic Character Set. Status of this Memo
Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet
More informationRead this before starting!
Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 3 for Fall Semester,
More informationFile system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems
File system internals Tanenbaum, Chapter 4 COMP3231 Operating Systems Architecture of the OS storage stack Application File system: Hides physical location of data on the disk Exposes: directory hierarchy,
More informationCSE 120 PRACTICE FINAL EXAM, WINTER 2013
CSE 120 PRACTICE FINAL EXAM, WINTER 2013 For each question, select the best choice. In the space provided below each question, justify your choice by providing a succinct (one sentence) explanation. 1.
More informationFile System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
File System Case Studies Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics The Original UNIX File System FFS Ext2 FAT 2 UNIX FS (1)
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More information