EBK ESSENTIALS OF MIS
EBK ESSENTIALS OF MIS
12th Edition
ISBN: 8220101459305
Author: LAUDON
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 7, Problem 1RQ

Explanation of Solution

Features of simple network:

  • The client computers, server computer, network operating system software, network interfaces, hub, and a connection medium are the entities of a simple network.
  • The basic responsible for network operating system software is controlling the network and its functions.
  • One client computer is connected to another client computer within the same network.
  • Hubs and switches function is sending packets of data to all other linked devices.
  • The network helping up web pages to storing data and network operating system.
  • The switch has the capability to select a particular destination while the hub sends a packet to all other linked devices.
  • The network components links with the connection mediums such as coaxial cables, radio signals or telephone wires.
  • The Microsoft Window Server, Linux and Novell Open Enterprise Server are the most commonly used network operating system software.

    Features of the Network Infrastructure for a large company:

  • The large companies have many employees and several locations, the collection of hundreds of small LANs needs to be joined into a corporate-wide networking infrastructure.
  • The infrastructure also has the capability to support mobile sales by using mobile employees connecting to the company website, smartphones, interior company networks using Wi-Fi networks and videoconferencing systems to provide efficient communication between managers on a global scale.
  • The infrastructure is included many small LANs that are connected to other LANs and to corporate networks.
  • Overall, the large company network infrastructure includes the use of a wide variety of technologies like corporate data networks to internet service, ordinary telephone service, wireless internet and cell phones.

Explanation of Solution

Principal technologies and trends:

  • Client/ Server computing
  • Packet switching
  • TCP/ IP and Connectivity

    Client/ Server computing:

  • Client/ Server computing is defined as a distributed computing model where a part of the processing power is placed within cheap client computers and exist in laptops, handled devices or desktops.
  • It also allows for computing to departments, factory floors, workgroups and other parts of a business that couldn’t be worked by a centralized architecture.
  • The clients are linked to other clients through networks that is controlled by a network server computer.
  • It has replaced by centralized mainframe computer.
  • The process of the client/ server computing has no longer take place on a central large mainframe computer.

Packet Switching:

  • Messages transferring in the internet are divide into fixed size unit of data called packet.
    • Messages are divided into packets to increase the performance and reliability of the internet.
    • Ιt also improves the effectiveness of the communication line in the internet.
  • Packets travel through several routers before it reaches the destination.
    • Router is a device that provides a path for the packet to reach the destination.
    • If there is a failure in one path, the router will provide an alternative route.
  • Packets are directed based on the destination address present within each packet.
  • Packets reach the destination in the different order. So, it is collected and rearranged in the destination to get the original message, referred to as packet switching.

TCP/IP (Transmission Control Protocol/Internet protocol) and Connectivity:

  • TCP (Transmission Control Protocol)/IP (Internet Protocol) is a protocol suite used to connect the host from the different networks.
  • It is a protocol stacked with five layers. They are physical layer, data link layer, network layer, transport layer, and application layer.
  • In TCP/IP, the lower layer protocols supports higher layer protocols.
  • TCP/IP also supports low-level communication.
  • TCP can integrate with IP to provide additional functionalities such as failure recovery, optimize data transmission etc.
  • TCP is located at the transport layer and IP (Internet Protocol) is located at the network layer.
  • TCP is responsible for dividing the message into one or more packets in source and reassemble the packet in destination.
  • IP is responsible for transmitting of packets from source to destination.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
3.) File Encryption and DecryptionWrite a program that uses a dictionary to assign “codes” to each letter of the alphabet. For example: codes = { ‘A’ : ‘%’, ‘a’ : ‘9’, ‘B’ : ‘@’, ‘b’ : ‘#’, etc . . .}Using this example, the letter A would be assigned the symbol %, the letter a would be assigned the number 9, the letter B would be assigned the symbol @, and so forth. The program should open a specified text file, read its contents, then use the dictionary to write an encrypted version of the file’s contents to a second file. Each character in the second file should contain the code for the corresponding character in the first file. Write a second program that opens an encrypted file and displays its decrypted contents on the screen.
Returns an US standard formatted phone number, in the format of      (xxx) xxx-xxxx           the AreaCode, Prefix and number being each part in order.           Testing Hint: We be exact on the format of the number when      testing this method. Make sure you think about how to convert      33 to 033 or numbers like that when setting your string format. Reminder      the %02d - requires the length to be 2, with 0 padding at the front if a single      digit number is passed in.
The next problem concerns the following C code: /copy input string x to buf */ void foo (char *x) { char buf [8]; strcpy((char *) buf, x); } void callfoo() { } foo("ZYXWVUTSRQPONMLKJIHGFEDCBA"); Here is the corresponding machine code on a Linux/x86 machine: 0000000000400530 : 400530: 48 83 ec 18 sub $0x18,%rsp 400534: 48 89 fe mov %rdi, %rsi 400537: 48 89 e7 mov %rsp,%rdi 40053a: e8 d1 fe ff ff 40053f: 48 83 c4 18 add callq 400410 $0x18,%rsp 400543: c3 retq 0000000000400544 : 400544: 48 83 ec 08 sub $0x8,%rsp 400548: bf 00 06 40 00 mov $0x400600,%edi 40054d: e8 de ff ff ff callq 400530 400552: 48 83 c4 08 add $0x8,%rsp 400556: c3 This problem tests your understanding of the program stack. Here are some notes to help you work the problem: • strcpy(char *dst, char *src) copies the string at address src (including the terminating '\0' character) to address dst. It does not check the size of the destination buffer. You will need to know the hex values of the following characters:
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning