Information Technology Reference
In-Depth Information
b. To what extent would it be helpful to have both?
c. What might happen if the client machine did not have a
disk and its memory was small?
d. Do you think it matters if a file server had only a small amount
of memory? Briefly explain your answer. (Of course, the server
must have a reasonablesized disk to serve as a file server!)
2. Consider the following list of applications. In each case, con
sider whether locking is likely to be needed in maintaining a
file. If a lock seems advisable, consider whether the lock
should be associated with an entire file or with specified parts
of the file (and specify which parts).
a. A wordprocessing file for a student's term paper
b. A wordprocessing file for a group's term paper, in which
the group has divided the paper into sections with each
person responsible for one section
c. A wordprocessing file for a group's term paper, in which
the group has divided the paper into sections, one person is
responsible for writing each section, and another person is
responsible for editing the section once it is written
d. A database file to keep track of prices of items in a grocery
store
e. A database file to keep track of patient records in a hospital
f. A database file to keep track of tickets and seats for a theater
3. In the party game of telephone, participants are arranged in a
line. A message is given to the person at one end of the line.
Then each participant, in turn, whispers the message to the
next person. Messages are repeated only once from one person
to the next, so each person must try to make sense of whatever
he or she has heard without benefit of clarification. Eventually,
the person at the far end of the line proclaims the message as
received, and that message is compared to the original.
a. Determine some possible similarities and differences between
the message passing used in this party game and in TCP/IP.
b. Identify various pitfalls that might go wrong with commu
nication during this party game.
c. How might the various layers of the ISO OSI model help
avoid or overcome the pitfalls mentioned in b?
Search WWH ::




Custom Search