21
6-1 © 2001 by Prentice Hall Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

© 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

Embed Size (px)

Citation preview

Page 1: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-1© 2001 by Prentice Hall

Local Area Networks, 3rd EditionDavid A. Stamper

Part 3: Software

Chapter 6

Software Introduction

Page 2: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-2© 2001 by Prentice Hall

Chapter Preview

• The distinction between the different classes of software

• The generic requirements of workstation software• The generic requirements of server software• Software requirements for shared access• How software can be protected on a LAN• Some of the standards covering LAN software• The need for and general provisions of software

license agreements

In this chapter you will study:

Page 3: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-3© 2001 by Prentice Hall

Classes of Software

• Application Software• Operating System Software

– Memory management• The OS manages memory and allocates it among itself and the

requesting processes according to a memory management scheme adopted by the OS designers

– File management• The OS provides the ability to organize bits into files, files into

directories, and so on

– User interface• Creating user environments is an OS function

– I/O interfaces• The OS and file management system translate the request to access a

file into an address the disk can act on

Page 4: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-4© 2001 by Prentice Hall

Classes of Software (cont.)

– Resource allocation• The OS has an algorithm that determines which ready

process gets access to the CPU and the conditions under which a running process maintains control of the CPU

– Accounting• CPU usage

• Lines printed

• Disk space used

• Transactions submitted (by type)

• Data communications medium usage

• bytes read from and written to disk

Page 5: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-5© 2001 by Prentice Hall

Classes of Software (cont.)

– Protection/Security• The OS provides the base on which security is established. We expect

the OS to prevent user programs from crashing the system and to eliminate the intrusion of one program onto the memory occupied by another program’s data.

• Database Management– A database management system (DBS) extends the OS file management

capabilities. A DBMS provides software that allows the user or database administrator to:• Define records, files, and file relationships• Access, update, and delete data in the database• Set up security• Establish, maintain, and use a data dictionary• Use host language interfaces that allow the database to be

manipulated by standard programming languages

Page 6: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-6© 2001 by Prentice Hall

Classes of Software (cont.)

• Utility Software– Utilities augment the function of the OS or other subsystem, such as the database

management system or the data communications subsystem.

• Development Software– Development software includes text editors, text formatters, compilers, interpreters,

link editors, cross-reference programs, testing utilities, and related programs and utilities

• Network Management Software– Network management includes a variety of activities such as backups, problem

resolution, capacity planning, and establishing user environments

• Network Access Software– Network access software for a LAN includes the components that allow us to access

LAN resources from directly attached workstations and remote workstations

Page 7: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-7© 2001 by Prentice Hall

Generic Functions of LAN System Software

• LAN system software is essentially an extension of the OS. It carries out hardware-oriented LAN tasks, such as interfacing to the medium, and I/O-oriented tasks such as directing print jobs and disk read/write requests to a server.

• The purpose of system software is to insulate applications from hardware details such as I/O and memory management. System software provides an interface through which the applications can request hardware services without needing to know the details of how the services are carried out.

Page 8: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-8© 2001 by Prentice Hall

LAN System Software in Server and Workstation

ApplicationProgram

A1Network

Redirector

MediumInterfaceSoftware

OperatingSystem

DiskDrive

ServerOperating

System

MediumInterfaceSoftware

ServerSystem

SoftwareDiskDrive

LAN Medium

Page 9: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-9© 2001 by Prentice Hall

LAN Redirector Functions

ApplicationProgram

A1

NetworkRedirector

MediumInterfaceSoftware

OperatingSystem

LAN Medium

Disk

RedirectorinterceptsI/O requestand routes toappropriate softwaremodule.

NetworkRequest

Page 10: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-10© 2001 by Prentice Hall

LAN Server Request Queue

ServerOperating

System

LANSystem

Software

Database ReadWrite to Printer

Download ApplicationDatabase ReadWrite to PrinterWrite to Printer

Queueof

WaitingRequests

ServerDisk

Page 11: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-11© 2001 by Prentice Hall

User Configuration Options

Default disk drive

Default disk directory

Disk drive mappings

Disk drive/directory search paths

Printer mappings

Initial program/menu

Page 12: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-12© 2001 by Prentice Hall

A Contention Problem

Record A

Karen readsRecord A with lock

Juan issues a readrequest for Record A

Record A is locked byKaren so Juan must wait

Record A

Karen's Application

Juan's Application

ReadRecord A

PendingRequest

Database

Page 13: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-13© 2001 by Prentice Hall

Exclusive, Protected, and Shared Open Combinations

Exclusive

Protected

Shared, update

Shared, read-only

Denied

Denied

Denied

Denied

Denied

Denied

Denied

Granted

Denied

Denied

Granted

Granted

Denied

Granted

Granted

Granted

Open Mode Requested Exclusive Protected

Shared Update Shared Read-only

Currently Opened As

Page 14: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-14© 2001 by Prentice Hall

Waiting for Lock Release

Record A

Application 1 readsRecord A with lock

Application 2 issues a readrequest to Record A

Record A is locked byApplication 1, so Application 2 must wait

Record A

Application 1

Application 2

ReadRecord A

PendingRequest

Database

Page 15: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-15© 2001 by Prentice Hall

Deadlock Situation

Record A

Record BLocked by A2

Application 1 has readand locked Record A

Application 2 has readand locked Record B

Application 1 is waitingfor Application 2to release Record B

Application 2 is waitingfor Application 1to release Record A

Application 1 and 2 aredeadlocked andwill wait forever

Record A

Application 1

Application 2

ReadRecord A

PendingRequest

Database

Record B

Page 16: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-16© 2001 by Prentice Hall

Software Standards

• Most of the LANs in operation today are called open networks, meaning that they adhere to a set of standards formulated by organizations such as ISO, ANSI, IEEE, and EIA. These standards are placed in the public domain and are called open standards.

Page 17: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-17© 2001 by Prentice Hall

Software Protection

• Software is protected in seven basic ways:– The code is kept secret so other software houses cannot use special

algorithms developed by the company to write a competing system.– The code is copyrighted to prevent another company from copying the

code and writing a competing system.– Legislation penalizing those who do not adhere to the copyright and

license restrictions is enforced.– The software is copy-protected to deter someone from making an illegal

copy.– License agreements are used to establish the terms of ownership and use.– The software requires WAN/Internet verification before it is activated.– The software requires a special hardware device to run.

Page 18: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-18© 2001 by Prentice Hall

Software License Agreements

• The license agreement states the conditions under which you are allowed to use the product.

• In general, license agreements take one of the following forms:

– Single-user, single-workstation licenses• A single-user, single-workstation license agreement is the most

restrictive. It specifies that the software is to be used on one workstation only and by only one person at a time.

– Single-user, multiple-workstation licenses• The constraints of the single-user, single-workstation agreement are

relaxed by the single-user, multiple-workstation license agreement. It usually relies on the honor system for enforcement. The purchase of a single copy of the software allows the owner to install it on several systems.

Page 19: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-19© 2001 by Prentice Hall

Software License Agreements (cont.)

– Restricted number of concurrent users licenses• Most LAN-compatible software is designed for multiple

users; however, some software vendors limit the number of concurrent users with a restricted number of concurrent users license agreement. The main idea behind this strategy is to charge by the number of users.

– Server licenses• A server license allows an application to be installed on

one server. All users attached to that server may use the application. If a company has several servers, say three, and wants to use the application on each of them, the company must purchase three licenses or three copies of the software.,

Page 20: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-20© 2001 by Prentice Hall

Software License Agreements (cont.)

• Site licenses– A site license gives the user unlimited rights to use the

software at a given site. The site may be a single LAN or multiple LANs at one location.

• Corporate licenses– A corporate license gives the corporation unlimited use

of the software at all locations. Some companies restrict a corporate license to all locations within one country. Sometimes, the right to reproduce documentation is also granted.

Page 21: © 2001 by Prentice Hall6-1 Local Area Networks, 3rd Edition David A. Stamper Part 3: Software Chapter 6 Software Introduction

6-21© 2001 by Prentice Hall

License Agreement Owners’ Rights

• The license agreement is intended primarily to protect the rights of the manufacturer. However, the owner of a license agreement also has certain rights:– The owner can transfer or assign the license to another user.– The owner can get a refund if the product is defective or does not work as

stated.– The owner has legal rights granted by certain states or countries

regarding the exclusion of liability for losses or damage resulting from the use of the software.

– The owner can terminate the license by destroying the software and documentation.