Designing issues in a network -transparency, Operating System


  • Users must be able to access remote resources as though these resources were local. Transparency should as well promote user mobility.
  • Users must be allowed to log into any machine in the system rather than be forced to use a specific machine.


Posted Date: 6/21/2013 6:35:35 AM | Location : United States

Related Discussions:- Designing issues in a network -transparency, Assignment Help, Ask Question on Designing issues in a network -transparency, Get Answer, Expert's Help, Designing issues in a network -transparency Discussions

Write discussion on Designing issues in a network -transparency
Your posts are moderated
Related Questions
Placement algorithms :calculate where in available real-memory to execute a program. Common functions are next-fit, first-fit, and best-fit. Replacement algorithms :are

about error detection in operating system and how does it take place?

Which is most common phase structured grammar? Most common phase structured grammar is Context – Sensitive

What is a process? A process is a program in implementation. It is an active entity and it contains the process stack, having temporary data and the data section includes globa

Computing uses three number bases:- Binary (base 2), Octal (base 8) and Hexadecimal (base 16). Binary has been described before, although various catchphrases are used to describe

Locks (also known as mutexes, short for mutual exclusion locks) provide mutual exclusion to shared data inside a critical session. They are implemented by means of two atomic routi

Additional-reference-bits algorithm We can keep an 8-bit byte for every page in a table in memory. The operating system shifts the reference bits right 1 bit, discarding the lo

A Unix shell is a shell or command-line interpreter that gives a traditional user interface for the Unix-likesystems and for Unix operating system. Users operates the operation of

List disadvantages of using a single directory. Users have no privacy. Users must be careful in choosing file names, to avoid names used by others. Users may destroy each othe

breifly write a note on about evolution of operating system?