Describe the differences between CSMA/CD and CSMA/CA. Provide one real life example where CSMA/CD is used. Provide one real life example where CSMA/CA is used.

1. Chapter 9. Question 1

Answer the two video case study questions for this assignment. Use an MS Word document with your name, the module number, and title of the assignment on the page. Your answers must be 300-500 words in length, in paragraph form, grammatically sound, and free of spelling errors.

2. Chapter 9. Question 21

Describe the differences between CSMA/CD and CSMA/CA. Provide one real

life example where CSMA/CD is used. Provide one real life example where

CSMA/CA is used.

3. Chapter 10. Question 4

Several levels of file access were discussed in this chapter, including read/

write, read-only, execute-only, and no access. Assume you maintain a

database containing confidential patient information and need to restrict

UPDATE to only 5 individuals, allow only 15 others to view the database,

and disallow any database access to all other users. Which access level would

you assign to the 20 individuals in the first two groups and to the remaining

users? For each of the three groups, describe every type of access granted to

each one.

4. Chapter 10. Question 8

Deadlocks are discussed in Chapter 5. Describe how a DO/S Processor

Manager could attempt to avoid them in a real-life network. Then describe

how it could try to recover gracefully if one should occur.

5. Chapter 10. Question 14

Describe the top 10 critical duties of a network administrator for a distributed

operating system. Identify which level of access would be needed by the

administrator for each duty and explain why.

6. Chapter 11. Question 1

Imagine that you are the manager of a small business computing center. List at

least three techniques that you would use to convince a busy, reluctant night

operator to perform regular backups. Explain the best and worst possible

technique to assure your success.

7. Chapter 11. Question 4

Describe the advantages and disadvantages of password generator software.

Would you recommend the use of such software for your own system? Explain

why or why not.

8. Chapter 11. Question 7

Given multi-network access, it’s not unusual for users to have multiple

user identifications and passwords. How would you manage these multi-

password situations? Describe both the advantages and disadvantages of

your solution.

9. Chapter 12. Question 6

Review the system with one CPU and four drives below:

• CPU W = 4 ms (the average time to execute 1,000 instructions)

• Drive A = 45 ms (average data access speed)

• Drive B = 3 ms (average data access speed)

• Drive C = 17 ms (average data access speed)

• Drive D = 10 ms (average data access speed)

Calculate I/O access speed using this CPU and each of the four disk drives as

they evaluate the following track requests in this order: 0, 31, 20, 15, 20, 31, 15.

Then, in each case, calculate the access speeds after the track requests are

reordered and rank the four disk drives before and after reordering.

10. Chapter 12. Question 11

Calculate the reliability of a hard disk drive with an MTBF of 2,499 hours

during the last 40 hours of this month. Assume e = 2.71828 and use the

formula:

Reliability(t) =e -(1/MTBF)(t)

6 years ago

24.10.2014
30