The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).

Size: px
Start display at page:

Download "The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand)."

Transcription

1 Research Commons at the University of Waikato Copyright Statement: The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). The thesis may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use: Any use you make of these documents or images must be for research or private study purposes only, and you may not make them available to any other person. Authors control the copyright of their thesis. You will recognise the author s right to be identified as the author of the thesis, and due acknowledgement will be made to the author where appropriate. You will obtain the author s permission before publishing any material from the thesis.

2 "# $%%&

3

4 " #$% #$ & '

5

6

7 $ $ # $

8

9 $ $ # # # $ ' $ $ # $ $ $ $ " # $ "% $ $

10 & $ $ $ " # $ # # $ $ $ $ # $ $ $ % $ $ # $

11 & & $ $ # # # $ $ % # #$ # $ # $ # $ $ " # & $$% " #$% $ " #$% " #$% & " #$% # "

12 ' # $ ' '# $ ' ' # # # # # & $$ $ $ # $ # $ #$ " # $ % " #$% " #$% #$ " $ # $ % #$ $ " $ % # $ & $' $ # #$ #$ $ ' $ & # &

13 $ $ $ #$ $ #$ $ $ $ $ & & # $ # $ # $ " #$% #$ # $ # % & ' %

14 # # $ # $ $ # # & $ $ # $ # # $ $ # $ # $ # #$ & #$ & & & '

15 $ $ & '

16 $ # #$ $ # $ '

17 $

18 ' & & & " & %

19

20 " % " % $$

21 $ $ # $ & " %

22 User handle Client Server handle descriptor file descriptor file File System Centralised System Distributed System # # " % & $ #$ #$ " %

23 PA R2 PA R2 PB PB R1 R3 R4 R1 R3 R4 PC PD PE PC PE (a) No Deadlock (b) Deadlock KEY Resource Process Process has locked resource Process is waiting for resource # # $ # $

24 $ # ' $ $ #

25 # & $ "

26 % $ $ $ $ & ' $ # & & $ & $ & & # #$

27 & $ & & " % & $ # " % $ " % & # &

28 $ & & $ $ # " & $ %

29

30 $ " #$%

31 # " % System A Network System B End System functions End System functions Distribution Interface Communications Protocols # $ #

32 " % $ $ # &

33 $ # # & $$ #$

34 #$ $# # $ " ' % $ " % ' " & % #$ #

35 $

36 " ' % " % " % #$ " % " $ % #

37 " % #$ # #$ #$ #$ " #$ % & " % & " % $ #$ $ $ #$

38 $ $ #$ # # " % & $ # " %

39 Client Data Server 1 Server 2 Server 3 # $ $ " % $ # " % & " %

40 " % $ $ $ # $ " $ $% # #

41

42 # " % " % #$

43 " % & & " %

44 & " & % ' &

45 " % " % $ & & & " %

46 Application Client DFS Server DFS Disk Application Client DFS Server DFS Disk Request Request Data Ack Disk Request Reply Disk Request Sliding Window Whole File Transfer # # Block Based File Transfer # " % " % $ $

47 Application Client Server Disk DFS DFS Request Disk Request Reply Disk Reply # # " % $

48 ' $ " % $ # & #

49 " % " % $ & &

50 $ $

51

52 $ " % # " %

53 $ Client A Server Client B copy block copy block time set bit write block set bit write block # & " %

54 S $2,000,000 C $500,000 Read S $2,000,000 Subtract $1,000,000 $1,000,000 Write Result Read C Add $1,000,000 Write result $500,000 $500,000 S $1,000,000 C $500,000 S $1,000,000 C $1,500,000 S $1,000,000 C $500,000 SUM= $1,500,000 # " % Read S Read C Print Sum Read $2,000,000 $2,000,000 Modify $1,000,000 Customer moves to another site Delay $2,000,000 Read Print Write $1,000,000 #

55 & " %

56 $ " % # " % #$ " % $

57 Client 1 Client 2 Client 1 Client 2 read Cache 5 data item Cache Cache 5 Cache 5 Cache 5 Cache Server Server Client 1 has a copy cached Client 2 reads data and caches it Client 1 Client 2 Client 1 Client 2 Cache 5 write read Cache 6 Cache 5 Cache 6 Cache 5 5 Cache 5 5 Server Server Client 2 modifies the data # $ Client 1 reads stale data CPU cache CPU cache CPU cache Storage Controller Main Memory # $

58 $ $ # $ # # $

59 & $ $ & & & $ $ " % " %

60 $# #$ #$ $ #$

61 ' '

62 $ " % $ $ $ '

63 ' " % " % ' &

64 $ $ $ $ #$

65 #$ #$ & # $

66 # # & $$ $ " % $ $ $ " % #

67 " % $ " % # $ #

68 & " % $

69 # $ # $ #$ # $ " #$% & #$ #$ #$ #$ $ # "$#% ' #$

70 #$ #$ #$ #$ #$ # #$ # #$ ' & $

71 V r i t u e. V r i t u e. V r. i t u e VICE V r i t u e. V r. i t u e Virtue. # #$ $ # $ #$ " %

72 #$ $ #$

73 $ $ " % #$ #$ & & & " % " % & $ " %

74 #$ $ #$ #$ #$ & $

75 Disk Descriptor Inode 1 Inode 2 Inode 3 Inode Table... Inode N File 2 free File 1 Files and Holes free File 3 Free # " %

76 # ' # $ # #$

77 & $ " %

78 object entry points Distributed Object Space (persistent virtual Memory) Thread execution path Thread execution path Stack Stack # " % # # $ '

79 $ " % $ # " %

80 # " % " % " % " %

81 # & # # # # #

82 vol=6 r1.h3 r2.h7 r4.h5 Volume with parent directory is replicated twice sub-volume is replicated three times # # # # # # ' ' " % # #

83 # $ # " % ' # " % # $ $ & # #$ #$ # # # # # # &

84 # # #$ #$ " %

85 File System Calls (Local) File System Calls disk Local Local Unix File System cache Local or Remote? Remote NFS cache NFS Local Unix File System cache disk Client # #$ Server #$ $ $ # $ $ #$ #$ #$

86 #$ # $ & #$ " % #$ #$ #$ #$ $ " % " %

87 & & ' $' " % $ & ' #$ " % ' ' ' ' ' ' ' ' ' ' " % $ ' $ #$ #$

88 #$ $ #$ " #$ #$% $ #$ #$ #$ $ & $ #$ $ #$ & $ # $ $ $ #$ " % " %

89 $ $ & & & $ & ' & & " % # $ # $

90 $ " # $%& '(& )*+ %& & *, ' -./ *

91 # # $ " %

92 $ & #$ " $ #$ % $ #$ # $ #$ #$ #$ $ " % $

93 & $ #$ #$ # # $ $ $ #$ $ $ " $ %

94 Client Server 1 Applications A C B A D file time order File System Server 2 File Log A A C B D Server 3 File Manager #

95 $ ' $ # " % " % " %

96 " " # $ % # $ % & # $ " " # $ " " ' " " % " ( # )( *++,-&. ++,-& ( ( ( ( /0

97 /$ + - $ # User Client User Client User Client User files file system blocks Client User User Distributed Block Service blocks block server sectors Server Disk Server Disk Server Disk - $ ++ % " * $. $ " " ( ( " " #$%&#' ( %# ) *)%+&,-.+ " # $ / 0 * $ # 6 "

98 / 3 " " " ( " " ' " ( ( 2 # % # $ #%+ &' $%+( *)%+&,-.+ ) % " # $ 3 " " 3 * /* 0 $0. % +3,$/1-

99 / -. #) # * $$ # $. * 1. % # " * $. + ( ( " ' # ( ( -. + ) $#$%+ ).' # " ( " " # 6 ( " - ( "( 6 # * $. " " % # " 6 " % /0 + + ( " ( # " "

100 / - $ 6 " 6 " 6 " ( " " ( # *. ", - % ( 6 % ( " 6 " " " *& / 0 ) # $. " ( ( 6 &+.( &#%' + "( & + " "( "

101 / % 5 $0 # $ " " " " " " " "( " " " " + 3 ( " + 3 " 3 *. 53 " " " " " ) " " 6( + %#.-%# ) " # $ / 0 *. 3 " " 3 3

102 /) ( " - % + " " ( 6 # &-%# ) - ) - ( #) % ( " ( " 3 "( ( 6 6 " " " ( ( "( 6 " " (, ( ( ( ( ( % % " ( " " " % " (

103 /1 * ". " ( " % % " % 4 ( ( 4 # $ * / 0 1. " ( " " - "( ( ( " 3 ( " ),$ 1-( " &( ( ( - &' " # + ",

104 //, * $$. * $. * $. * $. * $. * $). ) " 2 *. * ). ( ( " *. ( + + * ). + * $. " *. " *. 2 *., 3 & * $. " 2 5 *. * $1. +3 *. * $/. - *. " #* + * $. *. " " * $. - & 6 - ", 6 # $ "

105 $ # " 2 6 ( " & " 3 " " 3 # * /) 0 /). # " 6 # % " ( # 1( ( # / /

106 0 &+ & #.+ # " " +3 &0,-&( 6 ++,-& + ++,-&( " ", 6 ++,-& " " + 3 % ( ( " ( " ( " 6 * " %

107 $ Minix Minix Minix User Client User Client User Client files file system blocks User User Unix server Server application Unix OS Disk - )$ % & Ethernet LAN )3( ++,-& +3 1 * 3 +. % " " ( ( " " 3 # * /0. " # *( %+ ( + )%-%# ) - $+ - )$ 3 " ++,-& ) 3, $ ) 3 " " " % " 3 # *. ) 3 " * $$0. 3 0(000 ) ) )3,$ 1- )3 %+) *# % *# $) + 0 /) $)) * $000

108 5, ) 3 " " + 3 " * 3,5 +&. 3 " ' +3 +&,- " " 3( +3 & & " - )3( ( 3 " #$%&#' ( %# ) *)%+&,-.+ 3 " " " + ( * /. ( "

109 % 6 " ( 3 +, 3 ( " 6 % " % " ( 6 " 6 " " 2-3( ( " )$ 3 * $0). -. #) # ) ) " % ( ( " 6 " % * 1 3 " ".

110 * *. # +,, * + *.,+ - # +,, * + + *. # +,, * + *. & - -,+ - + # +,, * + + *. & +,, *. # * + ) *. *. )$ %

111 6 * ( $00. )3 ( ( ( ( $+ $ 3 & * /% 0 ). % # *. 0 " " 3 + " " + " "( " " 3 " + "( " " 6 *. 3 " ) % " (

112 ) client server client 1 client 2 server Lease Request Lease Request Lease Granted Lease Granted Lease Request Lease Returned T lease timer Lease Revoke Lease Returned Lease Granted T lease timer Lease Request Lease Granted lease lapses (block no longer locked) T lease timer - ) +

113 1 " " ( " " " 6 5 " " 6 ( " # 1( " ( 6 3 " 3 " / 0 $0 # 1 2 % 6 ( 6 ( 3 % ( " " " 6 " " 3 6 ( " " % * ". " % " " "

114 / & % +3 ( 6 4 % " " " " " " *. 6( " " " " " 3 " ( *. % " ( 3 % ( ( ( ) " * " 1 $. " $ " 6 " " " " " + 6 " 6 " & " " - 3 " ( ( " ( " ( " ( %

115 ( " 3 + $) / 0 ) " * # ( 1. " 1 " # * / 0 /. /" 0 " $ * 1. " 5 ( " 5 6 ( ( " 5 ( " % " ( " "( ( % ( ( " " " *" /0. " 6 " 53 " ++,-& "

116 $00 System Calls data structures File System Cache IO IO Disk - ) - & " " " - ) )3 6 % ( ( ( 3 ( 6 % ( 2 - ) " " ++,-& )3 " 2 ( 0 " " " %

117 $0$ System Calls key data structures File System Cache copied at start of transaction first write to block Write to server at end of transaction Server copy original copy blocks - ) + - & % % " ( " " 2

118 $0 ( " " ( ( " 6 " " " % " 2 " " " % ", 6 4 % ) 3 ++,-& *. ( 3 4 ( " 3 " ( " ++,-& 4 2 " " % "

119 $0 3 " " " 6 " +3 "( "( #* #* + * $. 3 ' 6 3 #*+ 6 " -%- ' %. $ (,-&( * /# #0 / #. " " ( "( # ) $#$%+ ).' 3 % 3 " 3 " "

120 $0 % 3 *. ( *. ( 4 " % ++,-& - 3 ( " " ( 2 ( " ( " " " & $ ,-& " %( " # " ( % ( " " 6 ( " ( " ) 3 & % /0 " 6 % % " ( "

121 $0 & - 3 ( *. +3 % ( " " + 3 " " ( ( ( ( " ( ( " " " 4 " " " ( ) 3 " " " ++,-& 6( 4 ( % ( 4 6

122 $0) Request size in bytes Type [1] Position Size Sequence Partition Piggyback Reserved [4] [2] Number [1] [1] leases [80] [1] Data [1024] Reply Flags [1] Reserved [4] Reserved [2] Sequence Number [1] Reserved [1] Reserved [80] - ) ) - Result [1] Data [1024] ( ( ( ) #.-%# ) % # " " *. % " " " ( "( " + * %* #* %* " " "" % " ++,-& " ) " " " ++,-& 6, 0-6 "

123 $01 DFS BB-NFS UDP IP MAC Physical TCP/IP Ethernet - )) -& +* %* 3 ( 3 % 6 3 " + + " & + + $$$ " ( " 3 % " 6 " 6 " % +*,$1- %*,$11- + %* +* 6 ( " 3 " #,( %*( + * * +

124 $0/ size in bytes Ethernet Header (14) IP Header (20) UDP Header (8) DFS Header (90) File System block (1024) - )1 -& " +* %* " +* ( " " %* ( ( ( 5 * )1. *+ " ( " *+ " )1 " ++,-& + +* ( +*( %* 5 ++,-& 3 # */* 0. $) + ( ( * + 6( 5 5 ( %*( + * + ++,-& ( 5( %* + * *+ %* +* ( 5 " % #* %* #* %* 6 ++,-& %" " 3, "," ( " (," " + & 3 " ++,-& ( ( " " " $0(000 5

125 $0 " 3 " * * ) $) 5 /) #*+ /. 3 " %* + * * 5. " 5 " " " " " " 3 %( 3 ( 5 ( " 6 " " 6 %* %* " % %* +* ++,-& 6 %#) *,$1)- *,$1 - +,1- % ( %#) * * % # ) *. 6 %* % " %* ( * * *. 5 %* + * *+ *. " %* +. + &' 6 " 3 # $ *. ++,-& " + 4 % ( "( 2 " ( " 3

126 $$0 " + ( ( " " " 3 " 3 0 " % ( " " ( " ( 3 - " " " 2 3 " 3 $0 % ( " ' $0 " 0 5 0( 3," " 2 ( " " " " 6 % 0 " " " 6 % " % " " " ( + +

127 $$$ " 3 ( - " " +3 " " " 3 " " " " " " ++,-& ( " " 0,$ 0-( " + + ( " " " % " " * ". % " ( ( " " " " 0 + " /0 % ( " " % " " ( 3 % +

128 $$ Client write 1 Server Quarantine Disk write 2 read 1 Block 1 Block 2 Block 3 write 3 End of Transaction (replies have been omitted for simplicity) - )/ + + % ",$ 0- "( 6 3 " " " " " 2 *-. ++,-& ' + + " " + + ( " " " #$.+ %%- ) + ( $ ) 3 " ' "

129 $$ & + 3,$1 -, 0-,$00- " # ) +3 % 6 ( **%. ( + *% 6( " " % ( *% 6 +3 " ( % % " ( & 0,-&( " " ++,-& 5 3 " ++,-& 4 * 4 3, - " " 3 4 " " &,$$- 4 ++,-& % " 2 6 #

130 $$ Index Data Block in Write Time Order bit map (used to indicate block is original or changed) - ) 4 * + " ( " 2 ",$/- " ( " 3 " ) 6 ( % " 4 ( ' " " % " ( " ( # " "

131 $$ ( 2 " ( & $ * 3. 3( % ) 3 ( 6 2 ) 3 " " ( ( *. - " % " 0( " " " " " ( %+ #%' ) " ++,-& 3 " ) 2 " 6 " 3 " " " ( " 5

132 $$) - & $ # / # & 0 ) / 5 $ 1 + * $ * $0 %#) * / / 4 $$$ 5 # $$1 $$/ )$/ ) # # + $%#) ++,-& ( 3 " + ) 3 " 3 "( " " " 6 " % " " 2 " " " " " ++,-& 6 & ( ( ( " " 3

133 $$1 &( ( ( - &' ++,-& " " " 3 " ++,-& " " ' 2 " 3 % " + ( " ++,-& '

134 - " " " 2 " 2 2 " " ,-& #*+ " * / 0 #. $00)%*& #*+ (000(000 3 " 5 % ++,-& 2 ++,-&0 # ) " ++,-& *. 6 $ % 6 % 6 " " 3 6 $$/

135 $$ ( " "( " - 1$ # + *( &%- ).+, % + +- $ ,-& " 6 " " 6-1$ " ++,-& ", " $/ 6 2 " 6-1 " 2 " 6 3 " * / " #. 5 * $0 1) " # +-$+ % #) #( + 2( " ( ( "

136 $ Transactions Lease Holding Time (s) " (

137 $ $ 2 " % ( * ".( " ( " % " 6 3 ) 3 * " ++,-& " ( 6 0 % 2( ( 3 2 " - 1 " 6 3 " " " " " * $ ) 4 *# /) $00 *# "

138 $ " 6 3 " +

139 $, # 53 3 $ / $ $0/)1 / $ ) 1 1$ 53 6 ) # 5 3 & " ( " 3 * $. " " " 5 " 0 ( ( 3 ( " 1 2 " $0 ++,-& + $%, %. ) $#$%+ ).' " $0 6 " + % 6 3 " ( 4( 4 " " *. " " " - " $/)0/ % 1$ " 3 6 *" $0. " 1$ 3 " " " " 3 " 6 " *.

140 $ " 6 3 " +(

141 $ " " 3 3 " % " " + " & ), 0/-,-& " " + % ( ( " ( / * $ )$ )( ) +,-& " $ ",$ -,$ - * 4. " 2 % ) " " 2 " " % ++,-& "

142 ) " % ( ( ) ( 3 " " 3 & % $ )

143 $ 1 # " " " "( " ' ( " " ( 0 ",)- # % + 3 " ( " ++,-& " " ++,-& % " % " $( &% + & & " " ++,-& " ++,-&

144 $ / - " " " ++,-& " (,-& " " ++,-& ++,-& " " " " # " +( " ( 6 " +", -, $- 3 6 * / 50 #. 3 6 " " " # ++,-& " % *" 1$ $. " % " " # " * / 0 #. ++,-& " % "

145 $ ++,-& " ++,-& " 3 " ' ++,-& " * /). " % " + " " 4 " " % " 2 % 3 " " # $( %( &+ + $+-&. ++,-& " " " " " " " 4 " %

146 $ 0 " " #*+ " 2 * /0( " " " % " " 6 + " " ( % " " "( ( " & #*+ * " % " " " #( " ( " % " "

147 $ $ ).%( $# ) 2 3 " " "

148 3 " ' % 6 " 3 " " & " 3. &) % " ',)- $

149 $ # % #) + % " # " " " 3 3 ", /- *,$ )-. ( + ' - %+ $+ & #.+ $ & & 2 + 3,$ )-, ) & *-+&&. + & -+&& +, $1-,$ 1-, 0-, $/-, -, )-, -, -, -, 0-,$ -,$ -,10-,$ )- *,$ /-,$0/-,$ -,$ -, $ -, -,$ -, )-, 1-. ) &+ $ & " " " ",/- ) " +3 & #,$00-,$ 1-,$ /- *,$ -, )-,/-, -,$ )-,/1-,$ -. " " " ",$00-,$ -, 0/- - " " # ( %% ( - #) ( ' % ' ' % " %

150 $ " ",$ -,$ - *,$ -,$$$-, )-,$ -, 1-. % + ) - " ( % +3,-&( -& ( ( ( *" " " '. ", )- $%&'. + + % " ( ",$ )- ( %%+% + *. + ( + " " (, - *, 0-, -,$ -. - # ( / - ( ' &# + " & # *

151 $ " " %* & #*+,) -,1/-,$/)- *,$0)-,$ -,$ -, $ -,$ )-, $ -. - &) + #+ + %% ).+ )%&- % %+ $' $%+ ( $ & #-& " # ) # & $ /0 #-& " /0 % ( % " " # " % *. *". - & #-& " ) % %# " # ), -*,$ 1-,$ $ + & # % " # " % # " # 5, 1- # + - & $ & # # -,/$-, 1-, 00- *,$ -, /-, 0$-,$$$-, 1-.

152 $ ) - &% %%+ ( + 3 " " ", )-,1 -,$0- #.+$ # ' ( " " * ( ", -, -,$ -*,$ -, 1-. &( $ # " +3 % - ( 3 ( ( *". 4 - # ", -,/)-,$-, -,$ - *, -, 1-. % ( $ # ' % ( ( ( ) " ' ( " ' ' ",-, -,)0-,)$-

153 $ 1 - # ( )$.- ) +% ) # # %5 " " "( " ( " " ",$ $- - # 6 " " 3 +3 ( ( " " " *" ' ". *. " " # ",$$ - *, -, -,$ -. ).( &&+ )% %+ $' $%+ ( $ & $& ( *)%+% #-& " * %. % +3 # % # % - /0( %

154 $ / 6,1- *, 1-. # $( $ # " " " ( ' ' ' #,$ -,$-, - # " -.) $ #, & % % *,. " ( &% #* %* * -. " 6 - *. - ",1 - # # " - $ ( " #* + *$0 $00 ". *00$ $.( " * 0 0 " " ( %*# " " 3 " % " ",)-,1-*, )-.

155 $ # " $ & #5 -& &" - # 5 % " 5 # " +. &( ( &" - 0 * &-. # 5 *#5. - & % " ( * " 3.( 5 * #5 -&. & 5 * &% & 5,$$0-, -,$ - # " ( ) # " /0 *. * ( " ( ( " " " +% +% " - " +% " " " 3 ) &,$ - # + ) 5 ' " ' ' & + ' 5

156 $ 0 5 5, -*, $ -. # $ & 5-& *53 - & % % " 5-3 " 3 *. 5-& + 3 *. /0, - # ( + &- % 5 ' 5 ' " 5 ' ' ' ( " " ',$ 1-, - # #$ + 5 &" - 0 * &-. # 5 *#5. % ( "( - " ", -,$$0-*,$ -. $+ %# -3 " % %

157 $ $ 4 *,1)-. % +% -3 " 3,11-,1)-*,11-. $ #.( $ " 6 ( ( ( 3 " 3 ( ( ( " 3 " + - % * #. - " 6 % ",/1-,$) -,$/ -, -, -*,$/-. - # ( ) # $& %#. - ( " (,/ - % " " " " " - 2 3,$) -,$ - $ - ( ) *- ). % & *%&. & % * &%. % " # " - )

158 $ * " ( " * # & 5 #&5. " &% )( (,$0 -,) -,)1- $ & & -+&& -+&& - " % 4 " +3, 0-,$ )- - +$ 2 " --5& " " - "( " ( & " # " *. - " " - 3 ",/ - + ( #) # +3 " " "( + 3 ( " " " ( " +3 3

159 $ ( " ( ", 0- *,/1-. &- + #) + ( (, *. " 2 $00 " " # %-& *% - &., -*, )-,$ )-. ( - & #- ),& % ( ( # " " * " *. ( - 2 " % ( " " " ", - & & +3 # & " " " & *# #* 6 & ", 0-

160 $ - & +3 - ( " 6 " & 6 " +*& " " " " * -&. ",-& ",$ /- & #& " ' # & ( " 6 " #& *# " " ( 3 #& - & * -&. + " ( *.,$1-,$1 -*, )-. # + %# 3 ' %, /0 ' ' " ' " '( * %. ' ' #,11- $ & -& #& *.

161 $ # # % * -&. / 0 3 $0 6 " ) ",$$ -*, -,$1/-. ' &- *$ 1. ' - ' ', )- * ( &#. + $+- &. - ' $ $ #%+ &' $%+ ( %+) %* & % %+) *# " 1 %+) 0 &, % " " #,$0)- *' #$ % 3 +3( % & - * ". % 6 *. " ", -*,$ )-.

162 $ ) *$ & + & *)%+ &#( $ #%+ &+& + & %-& # % " " - " %-& %-& " "( " $) " *,/$-, /-, 00-. * %# " ' & " - + " " % 4( ( - " 6 " ",$/0- ( ) # + & + & " $ & " $ & * 3 -& - &. 3 % " % 3 %, /- " ", 0 -, /-,$ -.

163 $ 1 # $ & &%&(.%( &+ $ $ #%+ &' $%+ ( -& & & - & & & -&.( $ " % +3 2 " ( ( " #3 " 3 " 2 *. * #&&. " " " 3 #&& %,$1 -, -, 0-*, )-,$ -,$ )-,/1-. (.- $$ & -& " ( ) # *. " " ) -& " ( ( 5 ( - " " 44, - & ) & " % + 3 * 1. * ( " ( ( " " 5 ' * *#. 3 3

164 $ / ) &, - ( ) # ) ) 6 ' % ( " '( " ' ( 3 *, )- " ) +% & #$,& ( &( ), % " ", & "( " +% - &+," )& &( & + 3,",-&, % " ",",$ $%%+. ) ) +.%# )," # * ," # *. " " +3 3," # " " + 3 *#, -*,$ )-.

165 $ + ( $,3 ' % 3 +3 & " ' ' ', - $ &,-& " " % (,-& ",-& " (,-& " % % 6 3 / / +,$ $-,$ -,$ -*,$01-,/$-,$ -, 0/-,$$$-, )-, 0 -,/-,$ )-, 01-,/1-,$ -. - # ( )/ # %- ) * " % 3 " +3 & * + 3 % " " * $0) ",. + " " *" )00. * # *. * " " - 3 *. *. & -

166 $0 % " - ) " # ",$1 $-,$1 -,$10- & *+&5 +3, *+&5 " " *+&5 + " # " % " +3 " 3, - ( #. &#% + & & 3 & ' 5 ' *. ( " ( & 4 ( " " ' ( " " " ( " % *. &, - $ - &

167 $$ $ & - & * -&. & +3 -& +3 ( +3 ( & # /0 " " % ( " "( % # ",$-,$//-*, 0/-,$ -. $ &,-& & 0,-& ",-& % %&%& %0 # 6 " 6 " " " ( "" 6 6,$ -*, ( ( " - # " ",1$-*, $ -.

168 $ & &# 5 " # /0 " - " & " ( ", 0)- " *. ", + ", )- $)%*& #*+ * 3 $$ ", )-, )- & ) # - ) $ ) # & *. +3 " " " -+ 3 & ,$ 0- # &- ( - & & % ( & " # " ( 2 & *. &

169 $ % & &#%+ & & - & & 2 " " + 3 " " & % * ( "( (. 3-6 " *. " * + 3. & ' & & " " " ",$ -,$$-, -,$ -*, # ( 1 & &#%+ $ & & -& & & " " " 6 " % % " ) -& &0,$/ -,$ 0-*,$/-,$$ -. & &#%+ %' $ & 3 ( &,-& & &,-& % " (,-& 6 + &,-& ",-&

170 $, 0/-, 01- &% & & " - " 4 " 6,$))-*,$ )-. & - %% &"" ' % -& 5 - &"",$ 0- ' &"" ( " ",$/ - &"",$/ -*,$ )-,/$-. & #,% &" %,$)/- % ( 5 +3 # - * ( ( ". *. 3, $- * & %* & # & %* & % #* +

171 $ & # &,$/)-,$0)-*, $ -. &( +$ 3 - * 5 ) **5)., $- & - -,$/- ) # ) #% ," # &," # # +3 - % ( " * %5 ( # " " % ( % +%, 1- ( " " ( "" " ", ( ) ( " ( ", /-, -*, $ -. -.%( $%+& 5# 0 )& - / +%( " $) 6 -

172 $) ( " ( )& ), 0- " ( 3 * 2 " # #% *. " 10), 5 &",$$ -,$ -,/ -, 0-,$$-,$ /- + + &$# ) +% & $ #%+ &' $%+ ( /," - & +3 * /. " + /," - & +3 *#, - $ & -& - ) -& -&, $ -*,$) -,$ -. + & " #$%&#' ( %+ $ #%+ &' $%+ ( " $ & -& & $ & 3-& " " % ( 3 ",

173 $1 " ( " ( " " " " 6 &,$/ - " 2, - +' &- *-&. & % ( " ) *. " ( ( ", -, $-, 0-,/ - - # ( 1)

174 *)%& (.%# ) % *5 %, & &5)& % *" ) 3 +. " " ) " % " " )%,% 1 +,% *3., $- )3 %+) *# )/000 % " " " 3 # )3 + " )3 * $$0 * ". 000 # 000 ( " " )3 '( 100 # % ) 3 " " % *. $/

175 $ User Process User Process Memory Manager User Process File System system call interface Server Processes Disk task TTY Task Clock Task System Task IO Tasks Process Management ( - +$ )3 * - ), $-. # $ #%+ &' $%+ ( - %%$ ) ,-& " # " # # "( # " 3 % # " # / 0 # 0 # " ( " 4 ) "

176 $)0 Boot Block Super Block Inode Bit map Zone Bit map Inodes - + )3 * - 0, $-. Data Blocks ) & & # # " # & & *. & & # " #$ -' ( % ) 3 3 " + " 3 *# " " " " % 4 *. & " " " " 4 " 5 "

177 $)$ File name inode number cs201 cs412 comp-org inode owner permission size dates file data (file system blocks) dead old pointers to storage for file directory other inodes - + )3 & " #&+.% &#+ $ ) 3 " 5 " ( 3 % * " *". *) + $ % 3 *. ( " + 5 " +

178 $) 3 2 B y t e s Mode UID File Size Time of last modification Links GID Zone 0 number Zone 1 number Zone 2 number Zone 3 number Zone 4 number Zone 5 number Zone 6 number Indirect Double Indirect File type and RWX bits Identifies the user who owns the file Number of bytes in the file In seconds since Jan, 1, 1970 The number of directory entries for this file and the files group number Zone numbers for the first 7 data zones in the file Only used for files larger then 7 zones - + )3 % * -, $-. #% - $ " ) 3 % " 0 " " " " ( " ( 0 $ " 6 " % )3 % - 3 " " " "

179 $) Hash table MRU LRU - + )3 # & * -, $-. " 6 % % " 6 " +

180 " "# $ %%&'() *+,-./ :;<35 8= >276 7;?@3;39>A>789 8= >23 BC?58>8D8@E $ F $ $G H IJK 123 L39M>2 8= >23 BC N3AO35E P() $ $# $ $ "# Q RST+ / U+,V W3LO D89>A796 A 63> 8= 8?>7896 >2A> 79X:39D3 >23?57857>Y A9O 8?>7;76A>789 8= >23 OA>AM5A; >5AZDE P() $ [ G \$ ] G $ $ #^ # _ G G & $ $ $ " _$ _ F # ] $[$ $ # _ )F R/` a K+0b` 1 23 L39M>2 8= >23 BC OA>AM5A;E ] P() Pc de # eqf # $^ $ $ $ " # # g " [ $ " # $# # [ $ " hh

181 hq 4 bits Version Header Length Type of Service Identification Time to Live Protocol Flags Source Address Destination Address Options (if any) Total Length Fragment Offset Header Checksum Padding Data I +0`. `./0 ( 9;<35 >2A> 7O39>7W36 A =5AM;39> 7>2 A?A5>7D LA5 BC OA>AM5A;E % P() Pc G^ $ G $"g $ # Qee #^ _G$ $ $ [ " ] $[$ "# $"g $ _ P() " $ cp $ ^ " _G$ $ $ $ $ $ $ $$ $ ^ $ $ c)]^ ] $ '" $ a b- 7> O A9O ; 6> <3 E 7> 6?3D7W36 23>235 =5AM;39>A> ALL83OE 7> 76 63> >8 79O7DA>3 >23 > >23 LA6> =5AM;39>E % _G$ $ $ [ e

182 hh, b+0` -+` 27D2 =5AM;39> 8= >23 857M79AL OA>AM5A; 76 DA5573O <Y >276?AD3>E % _G$ $ $ [ "# e R.+ `/ K.V+ 28? D89> 63O >8 L7;7> >23 9;<35 8= 98O36 >2A> A9 BC OA>AM5A; DA9?A66 >258M2E W3LO 76 A 6A=3MA5O AMA796> OA>AM5A;6 L88?79M = ;AL=85;3O 93> 856E ( $ F _ he $ $ $ #G F " $,/`/ /a M235 LAY35?58>8D8L >2A> >276 OA>AM5A; 76 DA55Y79ME 85;ALLY 37>235 1 C 85 CE ^ _# $ cp J+ +, + - % _ ^ $^ $$^ gg _ " \$ $ G $ G GG$ $ " $ $ $ " F# $# $ $ $ gg $ $ $ GG# " _ cp $ P() Pc GG # _" U/, +, BC AOO5366 8= >23 639O79M 98O3E +-`.0 `./0, BC AOO5366 >23 OA>AM5A; 76 79>39O3O =85E T`./0-4A57A<L3 L39M>2 W3LO 79DLO79M O3<MM79M?35=85;A9D3 A9O 63D57>Y 8?>7896E ' $ cp $ $ _" $ f U/, + /,`

183 h 16 bits 16 bits Source Port Length Destination Port Checksum Data ( f cp Destination Address Source Address Protocol Data 6 bytes 6 bytes 2 bytes ( d $ >23 C?85> 9;<35 >2A> >23 D8;;97DA> M79A>36 =58;E $G $ _ P() fee +-`.0 `./0 /,` >23 C?85> 9;<35 >2A> >23 D8;;97DA> O753D>3O >8E $G $ _ P() fee K+0b` 123 L39M>2 8= >23 C OA>AM5A; 79DLO79M >23 23AO35E ( P() ehf^ _ g g $ # G d _ $ g g $ D23D6 ; W3LO 76 8?>789ALE B= 7> 2A6 >23 4AL3 98 D23D6 ; 76 D8;?>3O A> >23 53D37479M ;AD2793E P() gg _ # _ $# $ $"g $ $[$# cp gg e ( d " _G _ $ _G _G _" $ U/, +,+--

184 h 1 23 <Y>3 >23593> AOO5366 8= >23 639O79M O347D3E AD2 93> 85 79>35=AD3 DA5O 76 ALL8DA>3O A 97 3 AOO5366E +-`.0 `./0, <Y>3 >23593> AOO5366 8= >23 53D37479M O347D3E ( $ "$ $ $ F $ $ $ $ $ "$ $ GG# "$ $ $,/`/ /a 123 7O39>7>Y 8= >23 27M235 LAY35?58>8D8L <379M DA5573O <Y >276 =5A;3E 123?53639D3 8= >276 W3LO ALL86 A 679ML3 >23593> >8 DA55Y ;7 3O >5AZD =85 A 9;<35 8= 27M235 L343L?58>8D8L 3EME >23 BC?58>8D8L =58; 1 C BC A9O 843L6 BC?58>8D8L E %%&'() $ F $ G % $ $ "#

185 $ _ $ " G _ % _ $ $ $ _ $ $ ( _ G $ $ _$ "" # $ I0-`, +0` `./0% ] $G$ $ $ $ $" #G $ $ &a/ T-% 'g g G g $ $ g _ $ $ $ &a/ U` `-% %g $ g F $ $ $ $ $ # $ $G$ g $^ #^ $G$ $ $ U` a+ &a/ -% %g _ $ $ $ G " $ $$&$ $ $ $ K+ -+ (+V/+% )$ Fg F^ $ GG # _ $ $ $ $ $ K/ +% ]" g g $ ^ $ g $ g _G #$ "$ Fg F $.a+ US-`+ R, 0- `./0-% * # _ $ g $ $# $ g +F _ g $ GG$ ] g # $ $G _ $ $ $ $ P # G $ _ g " g _ #G $ $ ] g h,

186 e 'G c $ $G _ [ $ $ $ %g [ _G " $ $$ g " 'G _ $g $ " F $ g %g $ g %g [ _G [ $ # " $ 'G _ " [ $ $ g " c$g $ " "$ g $ $ $ $ g ' [ # " %g " $ g & $ _ #G % c$ ]G c _ $ " ^ " $ "$ $ %g _G # de $ $ $ $ $ # & _ c$ #G &_ $G _ g & P g [ _ $^ # $ $ #$ F G _ $ hh %g _ $ $ G$ G $g Fg %g Fg [ F P $G$ $ $

187 $ ^ _ ^ $ $ G # " _ $ $ ] GG $ ] g $ $ $# $ $ $ $ $ G $ )$ #G ^ $# g $ $ $ [ & $ $ F^ F $# g F $ G _G ^ _ $ $^ $^ $ $ _G $ $ G _G # $ $ F F $ _G " g # _ $ $ $ $ $ $ $ F $$ _G # $ g g " # $ "$ # _ $^ G $$# " $ $#"# $ 0-` a+ `/. T `+% $ $ $ $ # #$ g$" "$ $ $ $ $ #$ _ $ [ $ #$ $ g " ^ $ $ $ Gg $ _ #G $ $ "$ " $ $ "$ #$ $ ] G $ " #G $ #$ ( G "$ _G " $ #G ^ $ " g F $ $ $ F G "$ $ $ $ / +,+0 +% 'g "# _G F $ # g ] ' c) g g $ ] $ G $" g ^ _# " $" g g $F g "$ $ _ Gg $ " $ g g F$ _ G GF _G $ 0a/ aa -S-`+ aa% ] #G $ _ $ \ _ g $.bbs a+ -+,+`,0-% ] # $ $ $ g P# $ $ G $ F $ U /,` R+, K+ -+-% G $ $ G^ "$ Fg F _ $ $ $ $ ] $ G G $ # $ $ _ $ $

188 f $ / 0. `./0-% ] # $ $ $ G ] G F F " F G _G G $ F $G^ $ $ G $ $ G P ^ $# #&g g " $ $^ $ $ G $ g ) _ # _G $ g $ g " $ $ G $ _ G _ $ # _ $ # _ G^ $ G F F $ $ $ _ # F^ g _ Fg $ # $ G _ Fg^ $ $ $ " _ $ G # $ K/b +-- b+-% ] g$ G _G $ F fe $ $ F ]$# " F $ I0/ + / +,+0 +% 'g $ $g $ 'g g $ $ $ g $ $ $ # g $ g^ _ ^ $ &g ] $ g "$ _ $ $g $ _ $ $ ) $ g _ $# $g $ $ # G# F _ $ $ $ G # F g $^ $ $ $ $g $ $ `.+% G G$G$ $ $^ "$ $ $ $" _ G $ $ $ g $ G $ $& $ _ " # $ $ (+/`+ +a+`+% ] $ $G _ $g "$ $ $ $ $ $ $ $ $ "$ $ $ $ [ c$ G$ $ G "$ $ " $ ()* $,,/,- /,,+ `+ 0.0/, 0b+-% $ g $ $ $ $ " g G F $ " GF $$# $^ $ "$ $ # $# _ $ $ GF _G $ $ $ $ G$ G $ &.` T-% ] # _ G g $ GG# )$ $" g ^ G _ g " _ G G " $ $ _$^ g _ G g^ Gg $ $

189 d $ g $ $ _ $ g _^ g % ^ G g $ $ $ g $ GG# # $ $ $ _G $$ $ &//` / +% G$ G " G ^ $ F _ $ $ $ _ F & $ " _ F $ $ G $ U+,V+,% c$ F $ $ $ F " $ GG$ G $ $

190 ] GF $ $ F GG# G$G$ _ $ #G g$ $ " #$ %^ fd+ dh^ ' g^ ] $^ c)] ^ PG,, f ] GF^ ^ $ $ GG# G$G$ $ $ &'" #$ $ &'" $$ ^ % $^ ],, ) $ d ]^ $^ )#$#$$^ $ G$ $ _ $"g $ #G $ c&)& e&dh^ G ) $ PG$^ $ &G$ c$ F #^ ], e H ]G^ ] %g^ '"g^ $ ( P ' $ #G ] $ F " )*** +$$,$ *^ Hd+Q,^ ($#, Q Q ]$$$#$$^ ) $$^ ] $^ $ c G$$ $ $ $ $ GG# " F GG# G$G$ )-# #$./,^ fhd H+fh^ (#,,f h P ]$$ $ P ( P]) ]$ FF " $ c%&)p& &HeQ^ G ) $ P F $^ c$ F # $ ^ %g#^ %g#^ _$ ^,Hfe^ (#, P ]$$ $ )&0 P]) g$ $ c%&)p& &Hhd^ G ) $ P F $^ c$ F # $ ^ %g#^ %g#^ _$ ^,Hfe^ 'FG, ]$$^ P P $^ ( '_^ P ] $^ P ) ^ $ 0 )$ )F $"g #G +$$ " ^ H H+,^ (#,,h, ( ]G$^ $^ ( G$$^ $ F $, $ c$ $ g $ F $ )1 &,&dh^ H

191 Q )# G^ ( '^ ('^ c)] ^,, % $ _ )g $ $ " % $ P $ )#G e 0 ]# $ ( $g P $ $ G $ _ # $ )*** "^ ff, H+Qh^ )G,, ) ]# / " $ $ " ^,,e f %$ $ G $ $ #& #G ] # $ $ -$ $$%%% ^, h d %$ P $ $ GG$ $ _ Gg " ^ f dq+ Q ^, H %$^ * ^ $ ] ) $$G $ $ _ ]G $ $ G $ )-# +,$ * ^ H Q+ff^ 'FG,, Q ( %^ ) ' ^ ] ) G^ $ * 0 ] G& _ () $ * ) " ^ fd+f,^ $ ^ ] $^ c)]^ ($, c) ' h %g^ ( G$^ P *_^ * ) ) \^ $ (* G$ _ #G $ " #$ %^ F^ _$ ^ c)] ^,, ] %^ ( *g^ $ ] ) $$G ] GG$ $ _ & G $ * ) *. *, "% &'" $ "% ^ +,^ ( ' (' c)]^,, c) ' % $ ] ) $$G P GG $ " $ )*** " $"$^ f+, ^,, %^ F$ $^ $ ] ) $$G GG$ $ & G $ G $ $$% " ^ H,,+QeQ ]G $ ( $ _ $_G $ $ ) & ^, fe ] % $ ' )_$ ] *0) + ] $" $"g #G $ * - "" ^ hd+d^ $^ c*^ )G, h $ c$ c

192 h f P %$$ F# $$G$ _ $$ $ G & $ ( Hf&HfH^ $$ )$^ (#,,d % "'% $ &* +$% ff ] %g $ ] ' G$ ) ] G G $ #G,$ $ $ *^ Q fq+d ^ ], Q fd ( ( % ] '$) g$ )-# #$./,^ QQ ff+f,^ PG, fh ( %$ ^ ) ^ 0 ] * ^ ( ]G^ ) ( ]^ P^ ( '%$^ $ c G$$ _ ] g$ _ $ &)& 1fQ^ ) _ $_G $ $ G ) $^ $ _ $#^ ]$^ c)] ^, fq ] %$ $ $ ' G$ $$# $ $ #G " "/^ df Q+ff^ ($, fh * % G$ $ ] ( $ $ $ &,^ PG$ _ G ) $^ $ c$ F #^ ^ '0 ^ c)] ^ ($, f * % G$ $ * ] _ FF " _ )) G& G $ g $ $ #G $ ^ $ c$ F #^ '0 ^ c)]^,, f * % G$ $ * )) GG $ g $ $ #G " +%^,e+ eh^ GG,, f, ] P % ^ 'F $^ 'G ^ $ P ) F $ ]$ $ G $ "$ ^ fq fhe+fd^ ], f de ] P % $ % ( '$ GG$ $ G +$ $ " ^ f d,+q,^ (#, H d % " $ * * Gg $$ ( $ _ ]1 ) $F & $G$ $ + )$$% &'" " ^ ff+fdh^ ^ ( ]' ^ #,,e df % "^ * * Gg $$^ P "#^ $ * $ _G$ $& _ $$&F $ #G $ c&)&,,h&e,^ G ) $ PG$^ c$ F # _ ^ ]G^ ]^,,H

193 dd ] %g^ ' $$^ (^ $ 'F# P $ $ # $ G )*** +$$,$ *^ d + h^ ($#, dh ) % ^ ( $^ ( ' ^ $ P ) ] g$"& $ #G + " "$%^ ded,d+fee^ ($, dq P %"^ ( P %^ P ' #^ ) G $$^ % %$g^ $ '"G$ $ ' ^ G $ #G _ &e "$ ^ Qd dq+hd^,f dh c %\ $ * '&* P #G ] G$ F F# $ c&,e,^ $ c$ F $^ $ ^ G$#^ 'FG,, d %"$^ ^ $ ' )g P%) ] G $# $ )$$% $$ &$$^ feq+f ] ^ ], d %"$^ * ' * $^ $ ] _ ] $ #G +$ $ " ^ dh fh+f,d^ 'FG, Q d, P %"$ ^ ' ^ $ % $ '" $$ $ c' _ " $,$ $ $ *^ ff H+ hf^ PG, f He ) ] %g^ % $^ $ (&( G $ #G & $ + )$ & $$ *^ HH+H ^ (#, H '&( $ P P '$ )" _ c $ g $ 1 " ^ HH HeQ+Hdh^,, Hf G^ ' G ^ $ $# ^ _G"g $ $G$ " ^ Qd f+fq ^,,f Hd G^ ' G ^ P ^ $ $# P $ $ $ GG$ $ ]$ & $ #G $ "$ ^ dh, + fh^ )G,,d HH ( ' ^ P P^ $ P '$ %g&f $ $# _ $ + )$$% &'" " ^ Hh+Qd ^,

194 HQ ' $ $ ( ] $" $ $ G $ G #G )*** +$$ "^ f f f+ ^ PG, Hh ] G $ $ P ]$ G #G )*** "^ He+Qe^ )G,,e H P $ c ] $ _G 1 $ #G +$$ " ^ Q f+hh^ (#, H P $ #G "$ ^ dd dh+ ddd^, H, P $ $ ) "$ g$ $ _G$ _ g "g $ $ " #$ %^ f,+he^ %$ )^ ' c)]^, d ] Qe ) 0 $^ ]G^ $ ]GG & G$ $ F $ ] $& G _ GG$ $ #$$ $ $ #G $ + )$$% &'" " ^ dhf+dh,^ ^ ( ]' ^ #,,e Q )# G $ FF " _ c) #G $ $ _ & G^ $ $ c$ $ )1 &,&efe^ )# G^ ) ^ ' ] ^,, Qf ) $ ^ ]$$^ ' *^ % ) 'F^ ) ] $^ $ ' ) G #G $ * ) ^ Hd+he c) ' ^ ($#,,f Qd ^ % ( $$^ $ ]% ] ]$ GG$ $ _ $ $ #G _ c$ $ " ^ d+ H,^ $^ ($, Q c$ QH P G ),, +) %" ) $ ^,,Q QQ P G ),, +) %" ))) $ ^,,Q Qh ^ ( P G^ $ * $ &'" & ] $&)#^,,H $ Q % _ $ ( G % % $ (,Q^ $$ )$^ )G, Q

195 , Q P P $^ ( ^ )$^ 0 ]$$^ $ P ] $ ] [$ F $# $"g #G $ c%11)p&,h&, ^ c$ F # $ ^ %g#^ %g#^ _$,Hfe^ (#,,d Q, P P $^ 0 )$^ ]$$^ $ P ] $ F $ c $ G $ GG# GF #G _G$ $ " #$ & $ ) % $^,,H he P^ $^ ) $$^ $^ ]$$$#$$^ c & G$$^ ]G^ ( '%$^ ) ( ]^ ( %$ &] $^ ) ^ 0 ] * ^ $ ( ) g$ $ $ GG$ $ _ $ #G * ) " "$%^ d^,,e h P $ ( '%$ $ #G )*** "^ 'FG,,f hf ( PF G $ _G GG$ $ $ _ F " /$ "^ e e,+ f ^,e hd ( P P# $ GGG$$ ) _$ G )***^ f ddh+ dhq^ PG, d hh ) ($^ ( *g^ $ ) ' g ] G $" GF $ #G _G$ $ 1')1 & Qhh^ '# _ G ) $^ ],,d hq ' P ] F _ $"g _ " $ G G,$ $ $ *^ f eq+ eh ^, f hh P P$$ $ $ ) GG $ g# $ "$ ^ fh Qdd+Qdh^ ], h P g$ $ ] '# # ) " "$ $$ $ -#) *%$ $ ^,,f h ) P g & $ [$ $ $# (^ ^ $ $"$^ Hd+ f ]G ^ '" 0g^,h h, ( P $ G ( )F )-# #$./,^ HH fh+dq^, e

196 e e ( P ^ ( *g^ ( * ^ $ ] ) $$G ] G $ _ " #G ]G $ ) $ ),^ c$ F # $ )$ ^ )$ ^ )G,, ) $ ] (# #G $ ".%$'% &'",$ $ & $$'$ ^ +,^ " %^ ( ^ c)]^, d f 0 $ $ )G _ $&g$ $ $ &dh&,h^ $ _ $ G $ $#^ F c$ F #^ G ^ ^ PG,,H d * "$^ ( ' #^ ] ' ^ $ ' $ $ _ $ $# $ g $ #G "$ ^, hfh+ hdd^ 'FG,h H ( $g^ )G$^ P P" ^ $ ' '$" $ #G _ $ # $ Qef^ G ) $^ c$ F # _ ) $ $^ $^ c)] ^ (#, d Q ( ($^ ) ^ $ P _G$ GG$ _ $$ #G _ $ )1f # "$% $$%%% $ &'" "^ &f Q+ f^ ($ $ (,,d h ( $ ) ( F )-# #$./,^ QQ d+hh^ PG, ( $ ) ' _ #G $ + )$$% &'" " ^ Hff+ Hd ^, H ' $ $ 'G ]$ #$$ _ G ( )F )-# #$./,^ HH dh+he^, e, * $ c F $ P]' ) "$ ^ ddh Hd,+HH ^ ],,e e P * \ ) F $ _ $ " #$ %^ Qe+ hf^ ] G^ _$ ^ c)]^,, ] P * \^ 'G ^ $ P ) #G "$ ^ dd f +f, ^,

197 f P ) ^ ) ^ $ ) )$ ] # _ #G "g $ & #G $ ) &f,h^ G )#G $ ^ $ c$ F #^ $^ ' ^ Q) ]H^,,H % ) ) #,,H $ d ] $ $ $ GG$ $ _ #G &)- ) + +$% "$%^ Q HQ+QQ^ )G, H ] $ ^ #^ ) *F^ ^ $$^ $G ^ ) )& ^ ) F$^ $ P # ](( ) $ _ # #G $ c%1)p1 1dh^ c$ F # $ ^ %g#^ ($, Q # $ P $ ' ]$ $ _&$ G$ G _ & )-# #$./,^ fdq fef+fe^ P& G,, % $ _ f ] )#G G $ $ )#G $ h G$ G $ G $ $F $G$ $ )1 &,e&hqe^ #G^ ) ^ ' ] ^ PG,,e # ( ] F# #G $ )P&,ee ^ G ) $^ c$ F # $ ^ ' ]$^ ($,, ( & $$ "$ ", $ # ] $& )#^,,f, ( G$ $ ( * $"g #G & $ c%1)p&,d&hh^ )P ^ c$ F # $ ^ %g#^ %g#^ _$,Hfe^ c)]^,,d,e ( G$ $ ( * $"g #G )-# #$./,^ f Q f,+hd^ PG,,d, ( G$ $ ( * $"g #G )*** +$$ " ^ dd fh+de^ ],,Q,f ( G$ $ (* ] $"g #G $ * ) % c) ' ^ #,,f,d ( ) G$$ $ GG$ $ (#,,h

198 f,h ( ) G$$^ ) ^ #^ $ ( g G # $$ $ $ " ( $ $$.%$ &$$ ^ 'FG,,f,Q ( ) G$$ $ ( g ( &#G FG$ " g # +$$ " ^ f Q +,^ (#,,H,h ^ * $$^ ) ^ $ ( $ ] $ & $ #G $ )) &,dh^ ) _ G ) $ $ $ $ $^ c$ F # _ '" ) )^ 'FG,,d, ] $^ ] % ^ $$^ )^ $ )" ]F # $ $ $# \ $ #G $ $ #$ ^ H,+Qd^ F^ ] ^ c)]^ )G,,, ] $ ]$ $ #G $ $ "$ ^ e QH,+QQ^,H,, )G g _ G #G " "/^ Hd,+,Q^ )G,f ee ( "^ ' *^ ) $^ P] ' ^ )#$#$$^ ' ) G ^ $ ( ) ) $ _G$ $ #G +$$ " ^ h Q+ ^ (#, e $ $ * ' $& $ #$G F $ G _ #G $ + )$$% &'" " ^ Q,+Q h^ '" %^ ] c)]^ ($,, ef ] #G$ $% $''$ " _ c$ F # ^, f ed ) ( $_^ $ G$G$ (] $ ) Q^ ) ^, &,d eh c $_G $ $# & $ #G $$$ $ & $ $ $ $ $ ffh^ $$ $ GG$ $ c$ $^ ' $^ f $F fe^ )" $^ ],,Q eq c $_G $ $# & $ #G $$$ $ & $ $ F $ $ $ fh^ $$ $ GG$ $ c$ $^ ' $^ f $F fe^ )" $^ ],,Q

199 d eh ($$^ ' )FF^ $ ( $ $ $ $ F $ $"g $ & $$ "$ " ^ f+f, ^, d e (g GF $ _G$ $ $ _ $ '() F $ * ) ^ Qd+hd^ )$ P ^ (#,, c) ' e ( *g^ ] ) $$G ^ ) (#$$ GG^ $ % ]$ $ )-# #$./,^ fd Q+,^,, e, ( *g^ F$ $^ F$ )F$^ $ ] $$G (' ]$ $$"g _ $ #G +$$ " ^ Q+ eh^,,d e ' *^ % ) 'F^ ]$$^ ] ^ % ] %^ ) $ ^ ( F^ ) ] $^ )& ^ $ # P & G #G FF " $ " ^ Q+hH^ ]$ G ^ _$ ^ c)]^ ($,,e c) ' ] *$ $ $ #G $ 1H^ P )$ '#^ ]^ _$ ^ c)]^ PG, f ( ( * $ )#$#$$ P $$ $ $ #G +$$ " ^ e d+fq^ (#,,f d ( * $ ) $ ' c $ & #G _ # G $G$ $ * ) ^ HdQ+ HH^ )$ P ^ ]^ c)]^ ($#,,d c) ' % c% $ )f*&,f&h H ' *$$^ 'F#^ $ ) )g ] ] #& & #G +$$ " ^ Hf de+ Hh^ #, h Q ' *$$^ 'F#^ ) P )g^ $ ( " ] $ ]$ FF " _ #G &)-) + +$% "$%^ Q +f^ )G, h *G $ )#$#$$ '& # $ $ #G $ c&)&,&hh^ $ $ c$ F #^ ) _ G ) $^ $ $ c$ F #^,,

200 H *$ $ ( $$ $ G G _ $$# $ +$$ & $$'$ ^ hf fd+ffh^ ($, ' 'G G^ g^ $ $ _ F$ $ #G "$ ^ f QQ +QhQ^ (#,, ' 'G^ )g^ $ %#$ $ $ G +$$ $ $"$ $ ^ H d d f+he^, f fe % ) 'G$ ]G $ $ " " '" " $ ) % $^ eq fhh+fhq^, f % ) 'G$ $ _ G #G $ )-# #$./,^ QQ dd+h ^, d ff % ) 'G$ $ ( ) ]$ $ $ #G _ $& G& $ $ " #$ %^, +eq^ ] G^ _$ ^ c)]^ PG,, ] fd ( ' cp $$ $G $ #G $ " % &'" "^ dh+h ] ^, f fh ( ' _ $ $ $"g )*** % $$ "$^ Q Hf+ Qh^ 'FG, d fq 'F c $ P() " P 1'() $ &,H&f^ $ _ $_G $ $#^ c$ F # _ $^ Q, ) ) G )^ ]$$ ]^ H ed&h,hd^ ($#,,H fh 'F# $ ] ) P #G $ $ G " "/^ ffh df+dh^ PG,,e f ( 'F#^ ' $$^ $ ] %g ( $& $ G # $ G #G +$$ " ^ h e,+ dd^ (#, % $ _ )#G G $ $ )#G $ ] ] $ 'F, f % ' gf^ ) G"^ ^ ($$^ ) '^ $ ) G & $ $ #G )-# #$./,^ fqq ffh+ fd ^,, f, ] ' G$ Pc' +] c$ #G )-# #$./,^ ff Hf+Qe^ ($#, &

201 Q de ) '^ ^ ( #^ ] * ^ $ ) ] c$ #G $ F " )-# #$./,^ QQ he+ h ^ PG, d % '#$ $ $ $ $ $ ^ )$ & #G $^ $ $ "^ ]^ c)]^, H % (eh df % '#$ )$ G $ $ ^ )$ #& G $^ $ $ "^ ]^ c)]^, H % (eqe dd gg HH%)P '() GG$ $ & ^,,d % " $ dh ) $#^ G^ ^ $ P '#$ ] # _ $ G& $ #G $ * ## ^ d+df ^ ' $G ^ c*^,, dq P ^ $^ $ * " ]$ FF " _ '" $ #G $ * ) ^ dqq+df^ %g# _$ c)]^ ($#,,H c) ' dh $$^ ] $^ $ )" ]$ ] G _ P $ $ Hh^ P [ G$ $ )#G $^ ($,, d ^ ' *$$ ^ % $ $ ^ $ ' ) c $ G G $ _ $ $ &GG# #G $,H QdQ^ c$ F #^ ($,,H d ) ( $^ ( $$^ $ P $ PFG$ _ ] $G F &)-) + +$% "$%^,,+ Q^ ($,, d, * $ ( )Gg )# $ F # " $ $"g #G $ + )$$% &'" " ^ HH+HQd^ )$ (^ ]^ d& ($, He _ $ P % $ g " $ _ G $"g "$ ^, eq+ ^ (#,h H )$ #G ( e,h '() '"g #G $ $ ^ $$ )$^,, Hf ( $ ( P $ ] G $ _ " $"g& F $ " #$ %^ F^ _$ ^ c)]^ PG, ]

202 h Hd ] $ $ c G$$ ] F# _ GG# $ #& #G $ &&,1e^ _ G $^ $ _ $#^ ]$^ ] ^ c)] ^ ($#,, HH ] ) $ #G $ #G G$ $ ] G $ _ F $"g G$ $ " _ g$ $G$ $ $ [ ^ $ c$ F #^,,Q HQ ] ) ^ ] ( ^ $ ( ) %$ ] G $ _ #G G$ $ G^ F $"g G$ $ $ g$ $G$ $ )-# #$./,^ de h+d ^ ($#,,h Hh ) $ $ ] $$G ] F $ G $$# $ $ #^ PG, Q H ) ( $^ F$ G ^ ] ) $$G ^ F$ $^ $ F$ )F$ ]G +] $ #G _,,e )*** "^ fdq HH+Qd^ #,,e H )( $ P $ #G &_&& $ _ & $ $ * +* # ^ Q+hh^ $$^ ] ^, '& $ H, 'G $ P ) c $ $# $ _ $ $ $ $"g _ G "$ ^ ff,,d+,,,^ PG, Qe 'G $ P ) ]$ $ F )-# #$./,^ f ^ ($#, Q ' '$ $ ( * #&$&" _ ) $ " ^ +fe^ )$ ($ ^ ] c)] ^ ($, c) ' Qf ' '$^ % % )^ $ ( * $ $ ) $"g #G +$$ " ^ h dh+qh^ (#, Qd ) ' $ ( ) G P $ $ GG$ $ _ ] F &)-) + +$% "$%^, h+f ^ ($,, QH ( ' ^ % ^ $ ( ) $ #G $ " )-# #$./,^ f +,^ ($#,

203 QQ ( ' ^ % ^ ( g^ $ ( ) ) ) ]$ _ GG $ $F $G$ " "$^ fd H+ Q ^,, Qh % ' $ ' P ) G# ] F# _ $ & G )*** "^ fh Qf+he^ ],, Q P 'g $^ ] %g^ P '"g^ 'F#^ ( )$ ^ $ ( $ $$$ $ $ G #G "$ ^ dd fq +fd^, Q ( $ ( P % $ 1 $g ] _ & #G )-# #$./,^ fd +f ^ ($#,, Q, ( * ) $"g $ #G )*** "^ ff fd+ dh^ (#, he ( * )# $ $ #G $ & " $ * ) " ^ ]$ G ^ _$ ^ c)]^ ($,,e c) ' h ( * ^ P ^ P $^ *$ (]^ *_ ^ $ G$ ( ] & F$ $# _ c$ Hf %)P #G $ " #$ %^ Q+fH^ $^ )]^ c)]^ PG, Q ] hf ) ^ #^ $ ( g ] _ ( & #G $ )P&,eeeQ^ PG$ _ G ) $^ c$ F # $ ' ]$^,, hd ( 0 $^ P ) ^ $ ) GG$ $ $ _G$ _ & $ $ & #G $ ) & fh^ G ) $ $ ^ c$ F # _ $^ $^ $ ^ $^ Q) ]^ ],,f hh (&( $ " " $ ] $ $# G _ $ + )$$% &'" " ^ heh+hf^ %$^ ^ #, h hq (&( $ " #$ $ + )$$% & '" " ^ d,h+he^ '" %^ ] c)] ^ ($,,

204 hh (&( $ ) ( # ) * ]$ G$ G $ #G _ G $"g $ )*** ) ## ^ h + Q^ )$ P ^ ]^ c)]^ ], d h P ) ( g^ g^ $^ )$ P ]^ )g % (^ )$ ^ " ( ^ " P^ * )^ $ * $ P $ _ G $$ $# $ #G )*** +$$,$ *^,d fhe+fh ^ #, d h P ] $^ $^ $ * ] _ $$ # _ $& $ F g ]P $ $$ &$$ )- #& ^ e,+h^ ^ '^ c)]^ ($, ] h, ) $ ] $ $ $ #G G $ $ $ # $ " #$ %^ + fd^ ] G^ _$ ^ c)]^ PG,, ] e g^ P ^ g^ * G$^ g#^ $ ) $G _ $G $ $, $,f&&e^ ] % '^ # ^ '" (# e,h^ c)] ^ ($#,,f g^ P ^ * G$^ $ g# $, _G % ' $ * - ^ Q+f^ '$$^ ], $ c$ c f % $g$^ P '"g^ P 'g $^ $ ( $ ] $ & #G $ + )$$% &'" " ^ HfH+Hd^ ^ ( ]' ^ #,,e d P GG $ $ $F $ $"g & H & $ _ $G $ $ $ " $ ( fh^ $$ )$^ 'FG, f H g^ % )g^ ( "^ P "^ * $^ $^ $ ' c) ] $"g $$^ # #G $ " #$ %^ h,+ ^ F^ _$ ^ c)]^ PG, ] Q ( c G $ (h ^ P] ]^ ], e h ( $$ $ G $ (,f^ P] ] ^ )G,

205 , ( $$ $ (,^ P] ]^ )G, ) g^ P ]"^ ] ] ^ $ ] ) $ # & $ $ _ $ $ )&,h&f^ G ) $^ c$ F # $ ^ )$ %^ )$ %^ ],deh^ c)]^,,h, P ^ g^ * G$^ $ g# $,^ #G $ *"# ^ Hd+Qe^ #,, e $ ' $ ] $ $ $ $$ ( ( )#G )*** +$$,$ *^,h hd+hfh^ ($,,d ( $ ( $ $ _ F GG# $ $ GG$ $ $ ]$ +$$ " ^ Hf H+^ #, h f P 'G $ $ #$$ $ $ $ G #G & $ 1')1 &feq^ ^, d P $ ' )FF # &'" &$$ $ $ $%, ^ dqq+dd '& $^, H ^ ( ) G$$^ P $^ )g $$^ $ g ( F $ $ $ ( #G $ + * ) ^ ($,,H Q ^ ^ g^ ( g^ $ ) g +] F _ " $ $ /$ $ ".$ -", $ &'" "^,,H h ^ ] ]#"^ %$^ F$^ $ % *$ ) ] $ #G _ G $ &G,$ $ $ *^, Qd+ Qfh^ (#,, P $ * G$ c$ G& $ #G "$ ^ dhq+dq^ (#,H ] _g $^ (^ ' G $^ ) ^ ) )^ $ * 0 () FF " $ " * ) ^ fh +fq,^ ]$ ^ ($, h c) ', $G $ ( * '() G$ $ + * ) " ^ dq+dfh^ ]$ G ^ _$ ^ c)]^ ($,,e c) '

206 ,e,e $G $ ( * $ $ GG$ $ _ & #G $ " #$ %^ F^ _$ ^ c)] ^ PG,, ], ' " $ * % G$ ] $"g $ c$ $ #G )*** +$$,$ *^ f d+ Hh^, f,f ^ ] GF^ ( ]G$^ %^ $^ G$^ ( & G$$^ * ^ ) '$ ^ ' $ ^ $ ' ) FF " _ c) $ #G $ )1 &,e&fq^ )# G^ ) ^ ' ] ^ ],,e,d ( )^ P ^ $ PP g $&&$ G$ $ #G $ +$$ " ^ fh f+f ^ 'FG, H,H )$^ P ^ ) * G$^ P )^ $ % '#$ P $ $ G& G$ $ _ )$ $"g #G $ " * ) +$% ^,+ de^ $^ $^ c)] ^ ($, Q c) ',Q ) )$ $ ) & $ $ & #G $ )-* +.) $ $ ] ^ ],,f % G )#G $ ^ c$ F # _ $ $ ) &fqq^ ($,,f,h ] )$ ] F $ F # $ #G # #$G # & $ $ $ $ + )$$% &'" " ^ Hdf+Hd,^ ^ ( ]' ^ #,,e, )#$#$^ "^ ( ' ^ ' ) G ^ ] )^ $ ( ) #G $ $ $ $ " #$ %^ dd+qe^ $^ ) $$^ c)] ^ PG, Q ], )#$#$$ $ $ # $ #G +$ $ " ^ d fh+f e^ ],,,, )#$#$$ &'" % ^ dqd+d d ] ^,,d fee )^ P \^ $ 'G ] $ #G _ GG "g $ $ + + " #$ %^ fq+dh ] ^ PG, Q

207 , fe ] )" $ #G "$ ^ dd fqq+fq^, fef % )$ G$ P G$ $ ] #$ GG $ $ )*** "^ h Q+h,^ ], d fed ] ) P ] #G $,&ehf^ PG$ _ G ) $^ $ c$ F #^ ^ '0 ^ c)] ^ 'FG,, feh ] ) $ %'% &'" % P ^ $ c$ F #^ #,,f % $ &,f&fhh feq ) )$G$ $ P ) ]1 ) g G$ &)-) + +$% "$%^ Q f,+hh^ )G, feh )G$ $ ] ( $g ) $ #G $ " #$ %^ e + H^ F^ _^ P,, ] fe ) $ F$ $ ( ) # '() G$ " &$ $# )-# #$./,^ fdq HQ+Q ^ PG, fe ) $ F$ $ ( ) # '() GG$ $ $ _G$ _ &$ $# $,1Q^ P )$ '#^ ]^ _$ ^ c)] ^ #,, fe, ) ^ ( ^ $ ( $ $ $ _ F )-# #$./,^ H d QQ+h,^ (#, e fe )$ )g ] G$&G $ GG$ $ #G $ ) ^ df,+dhh^,hd f ' )FF ( F _ $"g& #G " "/^ hh dqd+d, ^ PG, H ff P )" $^ P$ ^ $ P % ) () ] G #G _ $F $G$ $ " #$ %^,+^ ] G^ _$ ^ c)]^ PG,, ] fd P $ [ _ $ # F #G & $ c)&h,& ^ G c$ F # PG$ _ G ) $^ '" 0g^ '0 eef c)]^,,e

208 ,f fh ] ) $$G ' ] c$ $ " _ % % ^ ff d+,^, fq ] ) $$G #$ & $ ) % $ $ & ^, fh ] ) $$G ", $ & ^,, f ] ) $$G $ ) ( $ ]$ $ $ ]G $ #* %% $^ H+ e^ ]GG ^ '$^,, PG$ _ G $ G ) $^ c$ F f ] ) $$G ^ ) ( $^ $ F$ $ c $ $ $ #G $ + )$$% &'" " ^ QQ +Qhd^ %$^ ^ #, h f, ] ) $$G $ F$ $ P $ #G " "/^ H H,+Hh,^ PG, Q ffe ] ) $$G ^ F$ $^ F$ )F$^ ) (^ $ )(^ ($$ ](^ $ F$ G $ " ]G & $ #G $ &,H^ PG$ _ G $ G ) $^ c$ F ^ ]GG ^ '$^ (#,, ff * $ #G $ $ # G #G $ $$% " ^ H,+Qd ]()^,h fff G^ ' ^ $ ( )# g) F _ $ ^ # #G $ + )$$% &'" " ^ f +dq^ '" %^ ] c)] ^ ($,, ffd G ] G # $$ $$# $ _ G # +$$ & $$'$ ^ Hf e+fe,^ ($,, ffh ) ( # $ $ " #G $ " * ) +$% ^ +, ^ ) 'g #^ c^ c)]^ GG, H c) ' ffq G $$^ P *_^ )$^ $ ] ( ) $ c') #G,$ $ $ *^ Q e + e^ 'FG, Q

209 ,d ffh ) %g# c$ $ eee "g $ ]$ $ Hd%)P $ ^ P^ ^ c)] ^ (#, c) ' ff ] $ ' *$ g $ $ G $ & $ #G $ ^ PG$ _ G ) $ c$ F # _ $$^ $$ ' QQHQQ^,,Q ff ) ) $ %$ +" ) \^ G ^,Q, ff, * c^ #"^ * 0GG^ ) $^ $ ] _G"g _ G $ $ _ $ ' #G $,H&H^ PG$ _ $_G $ ) $^ c$ F # _ g#^ &d& $^ %$g#&* g#^ d ($^ PG,,H fde ' ( F$ ^ %^ *g^ F$ $^ ( )^ F$ )F$^ $ ] $$G ]G $ G $ & feh^ PG$ _ G $ G ) $^ c$ F ^ ]G& G ^ '$^,, fd F$ $ $ ] ) $$G $ " $ + )$$% &'" " ^ HQh+Hh^ )$ (^ ] ^ d& ($, fdf F$ $^ ] ) $$G ^ $ F$ )F$ $$ $ & #G $ " & $"g $ + )$$% &'" " ^ f +dh ^, fdd F$ $^ ] ) $$G ^ $ ] ) $ _ & _G$ F $ + )$$% &'" " ^ ff+f^ '" %^ ] c)]^ ($,, fdh F$ $ $ F$ )F$ ) & GG$ $ $ ]G $ &^ PG$ _ G $ G ) $^ c$ F ^ ]GG ^ '$^ PG, h fdq F$ $^ F$ )F$^ $ ] ) $$G _G$ _ ]G $ #G,$ $ $ *^, ffd+fdh^,, fdh F$ G ]' +] & $ $ _ ]G $ *, &'" ^ ( _ G$#^ )G,, ) $

210 ,H fd ( $^ ' %^ ] P^ $^ $ % $ $ " ^ Qd dd+dq,^ )GG,,f fd ' #g $ ) *$ ) # G$ G $ &F $"g " "/^ Qf dq+ ^ ($, d fd, % )g^ g^ $ ^ * $^ $ ' c) $ #G )-# #$./,^ Q H,+e^, d fhe % ( )g P c$ $$# ^ $ $ ( G ) $^ H+de^ (#,, fh )$ $_G $ F /$ "^ h +de^,hq fhf 0 )$ $ ]$$ () ] " G #G $ c%11)p&,h& d^ c$ F # $ ^ %g#^ %g#^ _$,Hfe^ PG,,d fhd ( ) $ F $ $"g #G $ " * ) +$% ^ h^ ) 'g #^ c^ c)]^ GG, H c) ' fhh % % ) 'G $^ G$G$^ $ &F $ $ $ ) #G $ c%1)p,e1qh^ )^ c$ F # $ ^ %g#^ _$,Hfe^ ],,e fhq ( )_ G$ G $ G ] $ g $G$ G )-* +.)^ +e^ #,, fhh ) )_^ $^ ) " $^ ] ($^ 'F $^ $^ $ ( g # g$ _ G $ #G "$ ^ h dd+dhq^ ($,H

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS

More information

SPARE CONNECTORS KTM 2014

SPARE CONNECTORS KTM 2014 SPAREPARTSCATALOG: // ENGINE ART.-NR.: 3208201EN CONTENT CONNECTORS FOR WIRING HARNESS AA-AN CONNECTORS FOR WIRING HARNESS AO-BC CONNECTORS FOR WIRING HARNESS BD-BQ CONNECTORS FOR WIRING HARNESS BR-CD

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

Jason Manley. Internal presentation: Operation overview and drill-down October 2007

Jason Manley. Internal presentation: Operation overview and drill-down October 2007 Jason Manley Internal presentation: Operation overview and drill-down October 2007 System overview Achievements to date ibob F Engine in detail BEE2 X Engine in detail Backend System in detail Future developments

More information

UNIX File Systems. How UNIX Organizes and Accesses Files on Disk

UNIX File Systems. How UNIX Organizes and Accesses Files on Disk UNIX File Systems How UNIX Organizes and Accesses Files on Disk Why File Systems File system is a service which supports an abstract representation of the secondary storage to the OS A file system organizes

More information

! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+)

! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+) ! "#! # $ %& #! '!!!( &!)'*+' '(,-. +) /,*+), 01/-*+) + 01/.*+) ) 05,-. +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+,3 4 +. 6*! ) ) ) ) 5 ) ) ) ) + 5 + + ) ) ) 5 9 + ) ) + 5 4 ) ) + ) 5, ) )

More information

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total

More information

https://support.industry.siemens.com/cs/ww/en/view/

https://support.industry.siemens.com/cs/ww/en/view/ Support Packages for TIA Portal V13 March 2018 https://support.industry.siemens.com/cs/ww/en/view/72341852 Siemens Industry Online Support This entry is from the Siemens Industry Online Support. The general

More information

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 24 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Questions from last time How

More information

Advanced Operating Systems

Advanced Operating Systems Advanced Operating Systems File Systems: File Allocation Table, Linux File System, NTFS Lecture 10 Case Studies of File Systems File Allocation Table (FAT) Unix File System Berkeley Fast File System Linux

More information

Course Contents. The TCP/IP protocol Stack

Course Contents. The TCP/IP protocol Stack Course Contents PART 1 Overview and Introduction PART 2 Communication Reference Models PART 3 Data Communication Fundamentals and Physical Layer PART 4 Datalink Layer and Emerging Network Technologies

More information

Frequently asked questions from the previous class survey

Frequently asked questions from the previous class survey CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [FILE SYSTEMS] Shrideep Pallickara Computer Science Colorado State University L27.1 Frequently asked questions from the previous class survey How many choices

More information

File Systems. What do we need to know?

File Systems. What do we need to know? File Systems Chapter 4 1 What do we need to know? How are files viewed on different OS s? What is a file system from the programmer s viewpoint? You mostly know this, but we ll review the main points.

More information

" ## $ %& * +,-& . )&/#& 3 /#& ) # ) ) 6 $ 1< ' =85;197<) . ) 3!1 4 91>

 ## $ %& * +,-& . )&/#& 3 /#& ) # ) ) 6 $ 1< ' =85;197<) . ) 3!1 4 91> ! " ## $ %& '!#()%& * +,-&. )&/#& 0 )12&() 3 /#& 4 5%)/#& ) # ) ) 6 5 789:6)%&! " 5 789:6/95;! $ 1< ' =85;197 1 1?8!1@A7)1># 1?8!1@ AB C " 1?8!17@A!)) $ 1?8!17@A!C) ' 1?8!17@1A6

More information

Customer Maintenance Parts List

Customer Maintenance Parts List C US R MODEL SUFFIX Customer Maintenance Parts List Model 0 R0000 dot recorder Made in China RECORDER STYLE FREQUENCY NO. SUPPLY N00 0 TAG NO. Note: Parts marked with a symbol are Customer Maintenance

More information

ECE 598 Advanced Operating Systems Lecture 18

ECE 598 Advanced Operating Systems Lecture 18 ECE 598 Advanced Operating Systems Lecture 18 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 5 April 2016 Homework #7 was posted Project update Announcements 1 More like a 571

More information

MC68705U3 Bootstrap ROM

MC68705U3 Bootstrap ROM MC68705U3 Bootstrap ROM ;This is a listing of the Bootstrap ROM which resides in Motorola's MC68705U3 single chip ;micros. Its sole purpose is to program its own EPROM by copying the data from an external

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Spring 2018 Lecture 22 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Disk Structure Disk can

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

CS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University

CS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University Frequently asked questions from the previous class survey CS 370: SYSTEM ARCHITECTURE & SOFTWARE [FILE SYSTEMS] Interpretation of metdata from different file systems Error Correction on hard disks? Shrideep

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 25 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 FAQ Q 2 Data and Metadata

More information

Challenge managing memory

Challenge managing memory INF16: Introduction to Operating Systems and Data Communication Operating Systems: Memory Thursday 6 October 16 Challenge managing memory 1 Overview Hierarchies Multiprogramming and memory management Addressing

More information

Outline. Operating Systems. File Systems. File System Concepts. Example: Unix open() Files: The User s Point of View

Outline. Operating Systems. File Systems. File System Concepts. Example: Unix open() Files: The User s Point of View Operating Systems s Systems (in a Day) Ch - Systems Abstraction to disk (convenience) The only thing friendly about a disk is that it has persistent storage. Devices may be different: tape, IDE/SCSI, NFS

More information

PE PIPE & FITTINGS LDPE PIPE

PE PIPE & FITTINGS LDPE PIPE LDPE PIPE All LDPE pipe is made with 100% virgin material ECO LDPE is made with 100% re-grind virgin material Pipes rated at 4 bar at 20 0 C No 2 for years All LDPE pipe is made and tested in our own factory

More information

CS 550 Operating Systems Spring File System

CS 550 Operating Systems Spring File System 1 CS 550 Operating Systems Spring 2018 File System 2 OS Abstractions Process: virtualization of CPU Address space: virtualization of memory The above to allow a program to run as if it is in its own private,

More information

!"!#$%&'()'%*%"&' $! + + )"( $! +!* %"%, $!- &"4+ %5!%"4+)'6$76)"%8)' 9+!()"(%#)"4!+!:!: ;!#"4+ :!'! %#4)"+<" $!9!#+6)"%= 4& )#=>!

!!#$%&'()'%*%&' $! + + )( $! +!* %%, $!- &4+ %5!%4+)'6$76)%8)' 9+!()(%#)4!+!:!: ;!#4+ :!'! %#4)+< $!9!#+6)%= 4& )#=>! !"!#$%&'()'%*%"&' $! + + )"( $! +!* %"%, $!-./ 0 /. 123 &"4+ %5!%"4+)'6$76)"%8)' 9+!()"(%#)"4!+!:!: ;!#"4+ :!'! %#4)"+! (#&: 1?@ AB )#);'!+!: %#+!'!4#): +)*C8)#(4')"*!+$% ()"*!+)#):

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators

More information

CS435 Introduction to Big Data FALL 2018 Colorado State University. 11/7/2018 Week 12-B Sangmi Lee Pallickara. FAQs

CS435 Introduction to Big Data FALL 2018 Colorado State University. 11/7/2018 Week 12-B Sangmi Lee Pallickara. FAQs 11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.0.0 CS435 Introduction to Big Data 11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.1 FAQs Deadline of the Programming Assignment 3

More information

Case ast Doc 284 Filed 11/07/14 Entered 11/07/14 17:54:43 IN THE UNITED STATES BANKRUPTCY COURT FOR THE EASTERN DISTRICT OF NEW YORK

Case ast Doc 284 Filed 11/07/14 Entered 11/07/14 17:54:43 IN THE UNITED STATES BANKRUPTCY COURT FOR THE EASTERN DISTRICT OF NEW YORK IN THE UNITED STATES BANKRUPTCY COURT FOR THE EASTERN DISTRICT OF NEW YORK ) In re: ) Chapter 11 ) LONG BEACH MEDICAL CENTER, ) et al., 1 ) STATE OF ILLINOIS ) ) ss COUNTY OF COOK ) Case No. 14-70593-ast

More information

File System Internals. Jo, Heeseung

File System Internals. Jo, Heeseung File System Internals Jo, Heeseung Today's Topics File system implementation File descriptor table, File table Virtual file system File system design issues Directory implementation: filename -> metadata

More information

!"#$%!&'#()#*+,-. %/ %70/89

!#$%!&'#()#*+,-. %/ %70/89 !"$%!&'()*+,-. %/012345657%70/89 F90$(/'4(0).!!%+!&'()*+,-%% '!"$%M%!(4!3/ % 85H90>4>%C6L>4:%4%M+'$%'$(',*0$'4($*!, % 01L4%058N%0()3.(0'$(')*+$!,(-(.' *./0'$%'2.(-(+$'$(/'&.%/',!&$!+"'%&&'*))!4(+$*,,9'M(+'

More information

! Design constraints. " Component failures are the norm. " Files are huge by traditional standards. ! POSIX-like

! Design constraints.  Component failures are the norm.  Files are huge by traditional standards. ! POSIX-like Cloud background Google File System! Warehouse scale systems " 10K-100K nodes " 50MW (1 MW = 1,000 houses) " Power efficient! Located near cheap power! Passive cooling! Power Usage Effectiveness = Total

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

Midterm II December 3 rd, 2007 CS162: Operating Systems and Systems Programming

Midterm II December 3 rd, 2007 CS162: Operating Systems and Systems Programming Fall 2007 University of California, Berkeley College of Engineering Computer Science Division EECS John Kubiatowicz Midterm II December 3 rd, 2007 CS162: Operating Systems and Systems Programming Your

More information

Segmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS)

Segmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Review Segmentation Segmentation Implementation Advantage of Segmentation Protection Sharing Segmentation with Paging Segmentation with Paging Segmentation with Paging Reason for the segmentation with

More information

CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1

CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1 CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1 This exam is closed book, closed notes. All cell phones must be turned off. No calculators may be used. You have two hours to complete

More information

CS 537 Fall 2017 Review Session

CS 537 Fall 2017 Review Session CS 537 Fall 2017 Review Session Deadlock Conditions for deadlock: Hold and wait No preemption Circular wait Mutual exclusion QUESTION: Fix code List_insert(struct list * head, struc node * node List_move(struct

More information

ELEC5616 COMPUTER & NETWORK SECURITY

ELEC5616 COMPUTER & NETWORK SECURITY ELEC5616 COMPUTER & NETWORK SECURITY Lecture 17: Network Protocols I IP The Internet Protocol (IP) is a stateless protocol that is used to send packets from one machine to another using 32- bit addresses

More information

Table 12.2 Information Elements of a File Directory

Table 12.2 Information Elements of a File Directory Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For

More information

Google Disk Farm. Early days

Google Disk Farm. Early days Google Disk Farm Early days today CS 5204 Fall, 2007 2 Design Design factors Failures are common (built from inexpensive commodity components) Files large (multi-gb) mutation principally via appending

More information

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 Product Introduction. Purpose of use, Features TDH-940 is a Test Disc designed for confirmation of operation of DVD

More information

Technical Specification. Third Party Control Protocol. AV Revolution

Technical Specification. Third Party Control Protocol. AV Revolution Technical Specification Third Party Control Protocol AV Revolution Document AM-TS-120308 Version 1.0 Page 1 of 31 DOCUMENT DETAILS Document Title: Technical Specification, Third Party Control Protocol,

More information

The Netwok Layer IPv4 and IPv6 Part 2

The Netwok Layer IPv4 and IPv6 Part 2 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok Layer IPv4 and IPv6 Part 2 Jean Yves Le Boudec 2014 1 Contents 6. ARP 7. Host configuration 8. IP packet format Textbook Chapter 5: The Network Layer

More information

File Systems Management and Examples

File Systems Management and Examples File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size

More information

Digital Projector X30N/X35N

Digital Projector X30N/X35N Digital Projector X30N/X35N Operator's Guide TECHNICAL Warranty 3M warrants that when the 3M Product is used according to 3M s Intended Use Statement (www.3m.com/meetings), it will perform satisfactorily

More information

CS370: Operating Systems [Spring 2017] Dept. Of Computer Science, Colorado State University

CS370: Operating Systems [Spring 2017] Dept. Of Computer Science, Colorado State University Frequently asked questions from the previous class survey CS 370: OPERATING SYSTEMS [FILE SYSTEMS] Shrideep Pallickara Computer Science Colorado State University If you have a file with scattered blocks,

More information

CS 4284 Systems Capstone

CS 4284 Systems Capstone CS 4284 Systems Capstone Disks & File Systems Godmar Back Filesystems Files vs Disks File Abstraction Byte oriented Names Access protection Consistency guarantees Disk Abstraction Block oriented Block

More information

TCSS 422: OPERATING SYSTEMS

TCSS 422: OPERATING SYSTEMS TCSS 422: OPERATING SYSTEMS File Systems and RAID Wes J. Lloyd Institute of Technology University of Washington - Tacoma Chapter 38, 39 Introduction to RAID File systems structure File systems inodes File

More information

(32 KB) 216 * 215 = 231 = 2GB

(32 KB) 216 * 215 = 231 = 2GB The Microsoft FAT 16 file system (supported by all of Microsoft's operating systems from latter versions of MS-DOS through Windows8, as well as all Linux versions) is an example of a file allocation table

More information

Hong Kong Polytechnic University Department of Electronic and Information Engineering. Experiment On DOS File system

Hong Kong Polytechnic University Department of Electronic and Information Engineering. Experiment On DOS File system DOSFS/CC/v1 Hong Kong Polytechnic University Department of Electronic and Information Engineering Experiment On DOS File system Objectives : To study how an OS manages its file system in a floppy disk.

More information

Network File System (NFS)

Network File System (NFS) Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 14 th October 2015 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent

More information

Network File System (NFS)

Network File System (NFS) Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th October, 2009 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent

More information

File Systems. CS170 Fall 2018

File Systems. CS170 Fall 2018 File Systems CS170 Fall 2018 Table of Content File interface review File-System Structure File-System Implementation Directory Implementation Allocation Methods of Disk Space Free-Space Management Contiguous

More information

Lecture 19: File System Implementation. Mythili Vutukuru IIT Bombay

Lecture 19: File System Implementation. Mythili Vutukuru IIT Bombay Lecture 19: File System Implementation Mythili Vutukuru IIT Bombay File System An organization of files and directories on disk OS has one or more file systems Two main aspects of file systems Data structures

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1 Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Storage Subsystem in Linux OS Inode cache User Applications System call Interface Virtual File System (VFS) Filesystem

More information

Supported modules System 300S Version:

Supported modules System 300S Version: Supported modules System 300S Version: 29.08.2011 Description Siemens Modul Speed7 C+Eco ext. K-Bus Digital input SM321 Speed7 (318er) int. K-Bus DI16xDC24V 6ES7 321-1BH00-0AA0 yes yes yes DI16xDC24V 6ES7

More information

Motivation. Operating Systems. File Systems. Outline. Files: The User s Point of View. File System Concepts. Solution? Files!

Motivation. Operating Systems. File Systems. Outline. Files: The User s Point of View. File System Concepts. Solution? Files! Motivation Operating Systems Process store, retrieve information Process capacity restricted to vmem size When process terminates, memory lost Multiple processes share information Systems (Ch 0.-0.4, Ch.-.5)

More information

This is a closed-book exam. You may use two double-sided 8.5x11 sheets of notes.

This is a closed-book exam. You may use two double-sided 8.5x11 sheets of notes. FINAL EXAMINATION SPRING 2003 CSC 262 OPERATING SYSTEMS NICHOLAS R. HOWE This is a closed-book exam. You may use two double-sided 8.5x11 sheets of notes. All answers to this exam should be written in your

More information

Memory management. Knut Omang Ifi/Oracle 10 Oct, 2012

Memory management. Knut Omang Ifi/Oracle 10 Oct, 2012 Memory management Knut Omang Ifi/Oracle 1 Oct, 212 (with slides from V. Goebel, C. Griwodz (Ifi/UiO), P. Halvorsen (Ifi/UiO), K. Li (Princeton), A. Tanenbaum (VU Amsterdam), and M. van Steen (VU Amsterdam))

More information

Troubleshooting Communication in WebSphere MQ

Troubleshooting Communication in WebSphere MQ IBM Software Group Troubleshooting Communication in WebSphere MQ Rick Armstrong (rickied@us.ibm.com) Advisory Software Engineer 27 October 2010 WebSphere Support Technical Exchange Agenda TCP/IP networking

More information

Operating Systems. Week 9 Recitation: Exam 2 Preview Review of Exam 2, Spring Paul Krzyzanowski. Rutgers University.

Operating Systems. Week 9 Recitation: Exam 2 Preview Review of Exam 2, Spring Paul Krzyzanowski. Rutgers University. Operating Systems Week 9 Recitation: Exam 2 Preview Review of Exam 2, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 March 27, 2015 2015 Paul Krzyzanowski 1 Exam 2 2012 Question 2a One of

More information

Deadlock Revisited. CS439: Principles of Computer Systems April 23, 2018

Deadlock Revisited. CS439: Principles of Computer Systems April 23, 2018 Deadlock Revisited CS439: Principles of Computer Systems April 23, 2018 Last Time Distributed File Systems Remote Procedure Calls (RPC) Consistency Models Coherence, Staleness, Consistency Network File

More information

Chapter 11: File System Implementation

Chapter 11: File System Implementation Chapter 11: File System Implementation File System Structure File System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery Log-Structured

More information

The ZCPR3 INSTALLATION WORKBOOK. by Richard Conn. First Revision, 8 March 1985 Original Draft, 20 February 1985

The ZCPR3 INSTALLATION WORKBOOK. by Richard Conn. First Revision, 8 March 1985 Original Draft, 20 February 1985 The ZCPR3 INSTALLATION WORKBOOK by Richard Conn First Revision, 8 March 1985 Original Draft, 20 February 1985 About this Workbook This workbook takes you through the eight steps of ZCPR3 installation.

More information

File Systems: Fundamentals

File Systems: Fundamentals File Systems: Fundamentals 1 Files! What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks)! File attributes Ø Name, type, location, size, protection, creator,

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

VIRTUAL FILE SYSTEM AND FILE SYSTEM CONCEPTS Operating Systems Design Euiseong Seo

VIRTUAL FILE SYSTEM AND FILE SYSTEM CONCEPTS Operating Systems Design Euiseong Seo VIRTUAL FILE SYSTEM AND FILE SYSTEM CONCEPTS 2016 Operating Systems Design Euiseong Seo (euiseong@skku.edu) File Layout An entity that separates and isolates data Files have meanings only to applications

More information

File Systems: Fundamentals

File Systems: Fundamentals 1 Files Fundamental Ontology of File Systems File Systems: Fundamentals What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type,

More information

File Layout and Directories

File Layout and Directories COS 318: Operating Systems File Layout and Directories Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics File system structure Disk

More information

" # $! " # $! %" %& ' %% ( ) %*

 # $!  # $! % %& ' %% ( ) %* ! " # $! " # $! %" %& ' %% ( ) %* + $ % &, # $"&*"-&&. ). ) /. /. 0 / 1 234. 0 ). 0. 0.! 5 6! 7!. 8 2.., 4 7! 2# +9 ) 4 7:. 2# +9 ) 4 78. 7(. 2# +9 ) 4 77 2# +9 ) 4 7.! 2# +9 ) 4 7!;. 2# +9 ) 4 6 7 #

More information

COMMUNICATION M-BUS PROTOCOL PR 118

COMMUNICATION M-BUS PROTOCOL PR 118 COMMUNICATION M-BUS PROTOCOL PR 118 CE4DT CONTO D4 Pd 03/01/2017 Pag. 1/27 CONTENTS 1. Standard M-Bus telegrams (Mb2) 2 1.1 Request for Data (REQ_UD2 ) 2 1.2 Details of telegrams 1,2,3 6 1.2.1 Telegram

More information

Ch. 22 Bootstrap And Autoconfiguration (DHCP, NDP or IPv6-ND)

Ch. 22 Bootstrap And Autoconfiguration (DHCP, NDP or IPv6-ND) CSC521 Communication Protocols 網路通訊協定 Ch. 22 Bootstrap And Autoconfiguration (DHCP, NDP or IPv6-ND) 吳俊興國立高雄大學資訊工程學系 Internetworking With TCP/IP, Vol I: Sixth Edition, Douglas E. Comer Outline 1 Introduction

More information

CME341 Dec. 16, 2014 Final Exam

CME341 Dec. 16, 2014 Final Exam 1 CME341 Dec. 16, 2014 Final Exam Time: 3.0 hours, Text Books, Notes and Computer Files Only NO CELL PHONES or LAPTOPS All questions are independent. Each assumes you are starting with the microprocessor

More information

MC68705P3 Bootstrap ROM

MC68705P3 Bootstrap ROM MC68705P3 Bootstrap ROM ;This is a listing of the Bootstrap ROM which resides in Motorola's MC68705P3 single chip ;micros. Its sole purpose is to program its own EPROM by copying the data from an external

More information

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know: CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,

More information

Da-Wei Chang CSIE.NCKU. Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University

Da-Wei Chang CSIE.NCKU. Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University Chapter 11 Implementing File System Da-Wei Chang CSIE.NCKU Source: Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University Outline File-System Structure

More information

CSE 451: Operating Systems. Section 10 Project 3 wrap-up, final exam review

CSE 451: Operating Systems. Section 10 Project 3 wrap-up, final exam review CSE 451: Operating Systems Section 10 Project 3 wrap-up, final exam review Final exam review Goal of this section: key concepts you should understand Not just a summary of lectures Slides coverage and

More information

Google File System. Arun Sundaram Operating Systems

Google File System. Arun Sundaram Operating Systems Arun Sundaram Operating Systems 1 Assumptions GFS built with commodity hardware GFS stores a modest number of large files A few million files, each typically 100MB or larger (Multi-GB files are common)

More information

The Netwok Layer IPv4 and IPv6 Part 2

The Netwok Layer IPv4 and IPv6 Part 2 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok Layer IPv4 and IPv6 Part 2 Jean Yves Le Boudec 2015 1 Contents 6. ARP 7. Host configuration 8. IP packet format Textbook Chapter 5: The Network Layer

More information

M-Bus protocol CALEC energy master

M-Bus protocol CALEC energy master M-Bus protocol CALEC energy master Manufacturer: Device: Firmware version: INTEGRA METERING AG CALEC energy master 1.03.XX or higher Manufacturer code: 05B4h Device version: D0 (inactive), D1(Flow), D2

More information

PERSISTENCE: FSCK, JOURNALING. Shivaram Venkataraman CS 537, Spring 2019

PERSISTENCE: FSCK, JOURNALING. Shivaram Venkataraman CS 537, Spring 2019 PERSISTENCE: FSCK, JOURNALING Shivaram Venkataraman CS 537, Spring 2019 ADMINISTRIVIA Project 4b: Due today! Project 5: Out by tomorrow Discussion this week: Project 5 AGENDA / LEARNING OUTCOMES How does

More information

Final Exam Preparation Questions

Final Exam Preparation Questions EECS 678 Spring 2013 Final Exam Preparation Questions 1 Chapter 6 1. What is a critical section? What are the three conditions to be ensured by any solution to the critical section problem? 2. The following

More information

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1 Introduction to OS File Management MOS Ch. 4 Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Introduction to OS 1 File Management Objectives Provide I/O support for a variety of storage device

More information

9/26/2017 Sangmi Lee Pallickara Week 6- A. CS535 Big Data Fall 2017 Colorado State University

9/26/2017 Sangmi Lee Pallickara Week 6- A. CS535 Big Data Fall 2017 Colorado State University CS535 Big Data - Fall 2017 Week 6-A-1 CS535 BIG DATA FAQs PA1: Use only one word query Deadends {{Dead end}} Hub value will be?? PART 1. BATCH COMPUTING MODEL FOR BIG DATA ANALYTICS 4. GOOGLE FILE SYSTEM

More information

Specifcations. Highlights - Rilled cans withstand high shock and vibration. - 2 times the ripple-current capability - High capacitance per can

Specifcations. Highlights - Rilled cans withstand high shock and vibration. - 2 times the ripple-current capability - High capacitance per can click here to see hardware and mounting options Type 388 85 C Best Value, Screw Terminal, Aluminum Type 388 has twice the life of the 386 and twice the ripple-current capability. While the standard encasement

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

Read this before starting!

Read this before starting! Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 3 for Fall Semester,

More information

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems File system internals Tanenbaum, Chapter 4 COMP3231 Operating Systems Architecture of the OS storage stack Application File system: Hides physical location of data on the disk Exposes: directory hierarchy,

More information

CSE 120 PRACTICE FINAL EXAM, WINTER 2013

CSE 120 PRACTICE FINAL EXAM, WINTER 2013 CSE 120 PRACTICE FINAL EXAM, WINTER 2013 For each question, select the best choice. In the space provided below each question, justify your choice by providing a succinct (one sentence) explanation. 1.

More information

File System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University File System Case Studies Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics The Original UNIX File System FFS Ext2 FAT 2 UNIX FS (1)

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information