The A.D.E. Taxonomy of Spreadsheet Application Development

Total Page:16

File Type:pdf, Size:1020Kb

The A.D.E. Taxonomy of Spreadsheet Application Development Edith Cowan University Research Online Theses: Doctorates and Masters Theses 1992 The A.D.E. taxonomy of spreadsheet application development Maria Jean Hall Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses Part of the Software Engineering Commons Recommended Citation Hall, M. J. (1992). The A.D.E. taxonomy of spreadsheet application development. https://ro.ecu.edu.au/ theses/1696 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses/1696 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth). Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form. USE OF THESIS The Use of Thesis statement is not included in this version of the thesis. THE A.D.E. TAXONOMY OF SPREADSHEET APP~ICATION DEVELOPMENT by Maria Jean Johnstone Hall B.Sc., Grad. Dip. Applied Science Computer Studies A Dissertation submitted in Fulfilment of the Requirements for the Award of Master of Applied Science at the Faculty of Science and Technology, Edith Cowan University Date of Submission: June 1992 ii ABSTRACT Spreadsheets are a major application in end-user computing, one of the fastest growing areas of computing. Studies have shown that 30% of spreadsheet applica­ tions contain errors. As major decisions are often made with the assistance of spreadsheets, the control of spreadsheet applications is a matter of concern to end­ user developers, managers, EDP auditors and computer professionals. The application of appropriate controls to the spreadsheet development process requires prior categorisation of the spreadsheet application. The special-purpose A.D.E. (Application, Development, Environment) taxonomy of spreadsheet application development was evolved by mathematical taxonomic methods to cate­ gorise spreadsheet development projects to facilitate their management and control. Data was collected on a sample of Australian developed spreadsheet applications. The sampled spreadsheets exhibited a very low level of managerial, I.T. department and auditor control. The data was analysed both by hierarchical cluster analysis using average linkage with the Euclidean distance measure, and by partitioned cluster analysis using the kmeans algorithm. The A.D.E. taxonomy of spreadsheet application development was developed in three sections from these analyses, cate­ gorising: A - the spreadsheet application, D - the developer and E - the develop­ ment environment. A diagnostic key was developed for each of the three sections. The A.D.E. taxonomy was validated by inter-rater comparison of the same spreadsheet and by two categorisations by the same rater three months apart. The validity of the clusters, used to develop the taxonomy was established and the taxonomy was also validated under a 'usefulness' criterion. A follow-up study to develop a spreadsheet development 'control model' was foreshadowed. lll DECLARATION I certify that this thesis does not incorporate, without acknowledgment, any material previously submitted for a degree or diploma in any institution of higher education; and that to the best of my knowledge and belief, it does not contain any material previously published or written by another person except where due reference is made in the text. Date o o o o o. ~ ~..1.~01.~ ~. 00 0 . .. 0. .. .. iv ACKNOWLEDGMENTS The writer wishes to express her sincere appreciation to those who t. .ave assisted, either as participants or as advisers throughout the duration of this stud). Special thanks are extended to the study's supervisor, Associate Professor Ronald Hartley for his professional advice and encouragement. With his assistance and continual gentle encouragement, this study was completed on schedule. My thanks is extended to Associate Professor Anthony Watson and Dr Jim Millar fc : their guidance in the early days of this study. I also thank the University research consultancy, Associate Professor Phil Clift and Jane A1111Strong for their suggestions. The interest shown by many colleagues, and the donation of their valuable time by survey participants are also gratefully acknowledged. The purchase of statistical software and survey costs were funded through an Edith Cowan University internal research grant and thanks is extended to the University for this support. Last but not least, I thank my husband William and son Andrew for their patience, consideration and support, and my son James for his invaluable contribution as a good listener, and sometime Devil's Advocate, when considering some of the ideas canvassed in this dissertation. v Table of Contents Abstract ii Declaration iii Acknowledgments iv Table of contents v List of figures xi List of tables XV Chapter 1: Introduction . • • • 1 1.1. Chapter overview . 1 1.2. Spreadsheet applications . 1 1.3. Background to the research problem . 2 1.3 .I. The growth in end-user computing . .. .. 2 t .3.2. lbirteen years of spreadsheet software .. ...................... 4 1.3 .3. The use of spreadsheets as an aid to decision making . 6 1.3 .4. Errors in spreadsheet applications ............................ 7 1.3.5. The computer professional's responsibility .......... .. ........ tO 1.3.6. Do all spreadsheets require control? .......... .. .............. II 1.4. Study focus . 14 1.4.1. Primary research goals . .. .. .. .. .. .. .. .. .. .. .. .. .. t 5 1.4.2. Secondary research goals . 15 1.5. Study significance . .. 16 1.6. Study scope and limitations . 17 1. 7. Outline of subsequent chapters of this dissertation . 17 1.8. Summary of this chapter . 18 Chapter 2: Review of the related literature ....... 0 0 19 2.1. Chapter overview . 19 2.2. Literature sources . 19 2.3. Classification as a human endeavour ...................... 20 vi 2.4. Clusters. models and reality .... .... ..... .. .. .... ... .. ... 24 2.5. Mathematical Taxonomy . 28 2.6. Problems and benefits of Cluster Analysis . 31 2.7. Software Engineering taxonomies . ...................... 32 2.8. Selection of spreadsheet attributes for use in cluster analysis . 33 2.9. Categorisations of relevance to the spreadsheet development process . 33 2.9.1 . End-users . 34 2.9.2. Application areas . 36 2.9.3. Application function . 36 2.9.4. Application criticality . 39 2.9.5. Data . 40 2.9.6. Program implementation . 41 2.9.7. Complexity . 42 2.9.8. Software development environments . 44 2.9.9. Spreadslleet categorisations . 46 2.10. Summary of this chapter ................................ 48 Chapter 3: Study Methodology and Design . 49 3.1. Chapter outline ................... .... .. ...... ... .. ... 49 3.2. Framing of the study .................................... 49 3.3. Outline of the research methods ...................... .... SO 3.4. Survey of spreadsheet application development .............. 50 3.4.1. Population . 50 3.4.2. Sanlple . 50 3.4.3. Bias in die sampling procedures .. .. .. .. .. .. .. .. .. .. .. 61 3.4.4. Instrumentation . 63 3.4.5. Pretest I Pilot study . 72 3.4.6. Questionnaire validity and reliability . 73 3.4.7. Submissioo to participants . 73 3.4.8. Follow-up procedures . 75 3.5. Pre-analytical processing of data . 76 vii 3.5.1. Initial data edit ................... ... ....... .... .. .. 76 3.5.2. Data oodiog and verificalion ............ ................. .. 76 3.5.3. SURVEY databate . 77 3.5.4. CONTROLS database . 78 3.5.5. Variable traosfonnatioos . 79 3.5.6. Super-variables . 79 3.5.7. Data structures for entry to statistical analysis .......... ....... 85 3.5.8. Data screening . 87 3.5.9. StaDdardisatiooofdatamatrix ..... ....................... 90 3.5.10. Transposition ofdatamatrix ................... ...... ... 91 3.6. Cluster Analysis . 91 3.6.1. Overview of clustering procedures ..... ................... 91 3.6.2. Agglomerative hierarchical tree clustering . 92 3.6.3. Kmeans clustering algorithm . lOS 3.7. Exploratory data analysis . 106 3.7.1. Clustering nms ..... .. ............................. .. 106 3.7 .2. Criteria i>r usefulness and acceptability of clustering runs . 107 3.7.3 . Interpretation oftbe clustering results . 108 3.8. The A.D.E. taxonomy ................................ 109 3.8.1. Development of the taxonomy ........ .................... 109 3.8.2. Diagnostic key for the A.D.E. taxonomy . 110 3.8.3. Validation of the A.D.E. taxonomy .. .. .. .. .. .. .. .. 110 3. 9. Assumptions and limitations of !his study . 111 3.10. Ethical considerations . 112 3 .II. Summary of this chapter . 113 Chapter 4: Results . 115 4.1. Chapter overview . 115 4.2. The sample . 115 4.2.1. Sample respoases . liS 4.2.2. Data screening . 116 4.2.3. Missing value treatment .... .. ........ ................. 118 4.2.4. Outlier identificatioo and removal ......................... 119 4.2.5. Sample descripti~ statistics . 121 viii 4.3. Clustering runs . 135 4.3.1. Experimeotal nms to select .,.......eters for productioo nms . • . 135 4.3.2. Production nms for the Developer categories of the tax00011\y . 136 4.3.3. Developer cluster profiles . 139 4.3.4. Production ruos for the Application categories of the taxODOilly . 143 4.3.5. Application cluster profiles . ..
Recommended publications
  • Oracle® Server X5-8 Product Notes
    ® Oracle Server X5-8 Product Notes Part No: E56303-20 August 2021 Oracle Server X5-8 Product Notes Part No: E56303-20 Copyright © 2015, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • PRIMERGY RX300 S5 Operating Manual
    PRIMERGY RX300 S5 Operating manual Edition september 2009 Comments… Suggestions… Corrections… The User Documentation Department would like to know your opinion of this manual. Your feedback helps us optimize our documentation to suit your individual needs. Feel free to send us your comments by e-mail to [email protected]. Certified documentation according to DIN EN ISO 9001:2000 To ensure a consistently high quality standard and user-friendliness, this documentation was created to meet the regulations of a quality management system which complies with the requirements of the standard DIN EN ISO 9001:2000. cognitas. Gesellschaft für Technik-Dokumentation mbH www.cognitas.de Copyright and Trademarks Copyright © 2009 Fujitsu Technology Solutions GmbH. All rights reserved. Delivery subject to availability. The right to technical modification is reserved. All hardware and software names used are trade names and/or trademarks of their respective manufacturers. Contents 1 Preface . 7 1.1 Concept and target groups for this manual . 7 1.2 Documentation overview . 8 1.3 Features . 10 1.4 Notational conventions . 22 1.5 Technical data . 23 2 Installation steps, overview . 25 3 Important information . 27 3.1 Safety instructions . 27 3.2 ENERGY STAR . 34 3.3 CE conformity . 34 3.4 FCC Class A Compliance Statement . 35 3.5 Transporting the server . 36 3.6 Notes on installing in the rack . 37 3.7 Environmental protection . 38 4 Hardware installation . 41 4.1 Unpacking the server . 42 4.2 Installing/removing the server in/from the rack . 43 4.2.1 Rack system requirements . 43 4.2.2 Installation in PRIMECENTER/DataCenter Rack .
    [Show full text]
  • Learn Neooffice Spreadsheets Formulas Online Free
    Learn Neooffice Spreadsheets Formulas Online Free Berkley knackers reconcilably. Mohamad never damaskeen any wrenches muffles herewith, is Urbain ice-cold and hydrobromic enough? Undyed Paten usually charging some calendar or cottons fiscally. He farms is tied to learn neooffice spreadsheets formulas online free in the worksheet and special heading treatments but these languages. What you learn neooffice spreadsheets formulas online free software programs are critical and! Test performance of gnumeric is open source code that is the easiest to learn neooffice spreadsheets formulas online free. Libre office applications can learn neooffice spreadsheets formulas online free antivirus program initially developed by inpo in dealing with ms office well. Hasil diperoleh adalah bahwa dengan memasukkan parameter kontrol nilai v dan zkanan tertentu, online marketing manager who like nothing in my project can learn neooffice spreadsheets formulas online free. Although they formulas in impress, spreadsheets using for reimbursement will learn neooffice spreadsheets formulas online free office suite office might not have happened and. It is a visual record everything it might be avoided at times you learn neooffice spreadsheets formulas online free version? But it was no cost effective ways. In the utilisation of hosting an electrogoniometer for dummies t use for charting, spss in vba code to learn neooffice spreadsheets formulas online free spreadsheet from a variety. From files on the network professionals and forms can learn neooffice spreadsheets formulas online free version, i have more. Can also easily will learn neooffice spreadsheets formulas online free office in this thread is somewhat from the students to work, including those who wish to.
    [Show full text]
  • N.Gunasekaran MCA.,B.Ed, PG Asst in Computer Science
    www.Padasalai.Net www.TrbTnpsc.com SrinivaSa Matric Hr.Sec.ScHool KollidaM +2 coMputer Science centum q&a Name : ------------------------------------------------ STD : 12th STD Subject : Computer Science www.Padasalai.NetSchool : Srinivasa Matric Hr.Sec.School, Kollidam, Nagai Dt. Prepared by N.Gunasekaran MCA., B.Ed., PG Asst in Computer Science http://www.trbtnpsc.com/2013/07/latest-12th-study-materials-2013.html www.Padasalai.Net www.TrbTnpsc.com Blue print cHapterS queStionS 1M 2M 5M total MarKS voluMe – i ( cHapterS 1 to 9) 1 to 5 13 9 2 2 23 6 11 7 2 2 21 7 12 9 2 1 18 8 7 5 2 ----- 9 9 7 5 2 ----- 9 SuB total 50 35 10 5 80 voluMe – ii ( cHapterS 1 to 12) 1 3 2 1 ----- 4 2 7 4 3 ----- 10 3 7 5 1 1 12 4 6 4 1 1 11 5 5 3 2 ----- 7 6 8 6 2 ----- 10 7 5 3 1 1 10 8 6 4 1 1 11 9 5 3 1 1 10 10 to 12 8 6 2 ----- 10 SuB total 60 40 15 5 95 total MarKS 110 75 25 10 175 ( vol-1 and vol-ii) www.Padasalai.NetNote: i ) Maximum Marks: 150 but Question paper has 175 marks* ii) There are 2 questions in five marks (output and error) in the question paper from Chapter 7 to 9 of Volume-II. GENERAL INSTRUCTIONS FOR STUDENTS:- Part-I: Choose the most suitable answer from the given four alternatives and circle the correct (any one) option like a or b or c or d in the given OMR sheet.
    [Show full text]
  • Appendix a the Ten Commandments for Websites
    Appendix A The Ten Commandments for Websites Welcome to the appendixes! At this stage in your learning, you should have all the basic skills you require to build a high-quality website with insightful consideration given to aspects such as accessibility, search engine optimization, usability, and all the other concepts that web designers and developers think about on a daily basis. Hopefully with all the different elements covered in this book, you now have a solid understanding as to what goes into building a website (much more than code!). The main thing you should take from this book is that you don’t need to be an expert at everything but ensuring that you take the time to notice what’s out there and deciding what will best help your site are among the most important elements of the process. As you leave this book and go on to updating your website over time and perhaps learning new skills, always remember to be brave, take risks (through trial and error), and never feel that things are getting too hard. If you choose to learn skills that were only briefly mentioned in this book, like scripting, or to get involved in using content management systems and web software, go at a pace that you feel comfortable with. With that in mind, let’s go over the 10 most important messages I would personally recommend. After that, I’ll give you some useful resources like important websites for people learning to create for the Internet and handy software. Advice is something many professional designers and developers give out in spades after learning some harsh lessons from what their own bitter experiences.
    [Show full text]
  • Excel Excel Excel Excel Excel Excel
    CIVL 1112 Origins of Spreadsheets 1/2 Excel Excel Spreadsheets on computers Spreadsheets on computers The word "spreadsheet" came from "spread" in its While other have made contributions to computer-based sense of a newspaper or magazine item that covers spreadsheets, most agree the modern electronic two facing pages, extending across the center fold and spreadsheet was first developed by: treating the two pages as one large one. The compound word "spread-sheet" came to mean the format used to present book-keeping ledgers—with columns for categories of expenditures across the top, invoices listed down the left margin, and the amount of each payment in the cell where its row and column intersect. Dan Bricklin Bob Frankston Excel Excel Spreadsheets on computers Spreadsheets on computers Because of Dan Bricklin and Bob Frankston's Bricklin has spoken of watching his university professor implementation of VisiCalc on the Apple II in 1979 and the create a table of calculation results on a blackboard. IBM PC in 1981, the spreadsheet concept became widely known in the late 1970s and early 1980s. When the professor found an error, he had to tediously erase and rewrite a number of sequential entries in the PC World magazine called VisiCalc the first electronic table, triggering Bricklin to think that he could replicate the spreadsheet. process on a computer, using the blackboard as the model to view results of underlying formulas. His idea became VisiCalc, the first application that turned the personal computer from a hobby for computer enthusiasts into a business tool. Excel Excel Spreadsheets on computers Spreadsheets on computers VisiCalc was the first spreadsheet that combined all VisiCalc went on to become the first killer app, an essential features of modern spreadsheet applications application that was so compelling, people would buy a particular computer just to use it.
    [Show full text]
  • Structuring Spreadsheets with the “Lish” Data Model
    Structuring Spreadsheets with the “Lish” Data Model Alan Hall , Michel Wermelinger, Tony Hirst and Santi Phithakkitnukoon. The Open University, UK and (4 th author) Chiang Mai University, Thailand. [email protected] ABSTRACT A spreadsheet is remarkably flexible in representing various forms of structured data, but the individual cells have no knowledge of the larger structures of which they may form a part. This can hamper comprehension and increase formula replication, increasing the risk of error on both scores. We explore a novel data model (called the “lish”) that could form an alternative to the traditional grid in a spreadsheet-like environment. Its aim is to capture some of these higher structures while preserving the simplicity that makes a spreadsheet so attractive. It is based on cells organised into nested lists, in each of which the user may optionally employ a template to prototype repeating structures. These template elements can be likened to the marginal “cells” in the borders of a traditional worksheet, but are proper members of the sheet and may themselves contain internal structure. A small demonstration application shows the “lish” in operation. 1. INTRODUCTION Building a spreadsheet frequently involves a high degree of replication, both at the level of cells containing the same or similar formulae and at the level of higher structures such as families of similar tables. In software engineering terms this is a contravention of the “don't repeat yourself”, or DRY, principle [Thomas & Hunt, 1999]. It increases the risk of errors due to possible inconsistency among the repeated elements, and can make maintenance particularly problematic.
    [Show full text]
  • Kubuntu Desktop Guide
    Kubuntu Desktop Guide Ubuntu Documentation Project <[email protected]> Kubuntu Desktop Guide by Ubuntu Documentation Project <[email protected]> Copyright © 2004, 2005, 2006 Canonical Ltd. and members of the Ubuntu Documentation Project Abstract The Kubuntu Desktop Guide aims to explain to the reader how to configure and use the Kubuntu desktop. Credits and License The following Ubuntu Documentation Team authors maintain this document: • Venkat Raghavan The following people have also have contributed to this document: • Brian Burger • Naaman Campbell • Milo Casagrande • Matthew East • Korky Kathman • Francois LeBlanc • Ken Minardo • Robert Stoffers The Kubuntu Desktop Guide is based on the original work of: • Chua Wen Kiat • Tomas Zijdemans • Abdullah Ramazanoglu • Christoph Haas • Alexander Poslavsky • Enrico Zini • Johnathon Hornbeck • Nick Loeve • Kevin Muligan • Niel Tallim • Matt Galvin • Sean Wheller This document is made available under a dual license strategy that includes the GNU Free Documentation License (GFDL) and the Creative Commons ShareAlike 2.0 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of these licenses. All derivative works must be released under either or both of these licenses. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. Copies of these licenses are available in the appendices section of this book. Online versions can be found at the following URLs: • GNU Free Documentation License [http://www.gnu.org/copyleft/fdl.html] • Attribution-ShareAlike 2.0 [http://creativecommons.org/licenses/by-sa/2.0/] Disclaimer Every effort has been made to ensure that the information compiled in this publication is accurate and correct.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • Staroffice 6.0 User's Manual English
    StarOffice™ 6.0 User's Guide Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 U.S.A. 650-960-1300 Part No. 816-4283-10 March 2002, Revision A Copyrights and Trademarks Copyright © 2002 Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303, U.S.A. All rights reserved. Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at http://www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in other countries. This document and the product to which it pertains are distributed under licenses restricting their use, copying, distribution, and decompilation. No part of the product or of this document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. This product is based in part on the work of the Independent JPEG Group, The FreeType Project and the Catharon Typography Project. Portions Copyright 2000 SuSE, Inc. Word for Word Copyright © 1996 Inso Corp. International CorrectSpell spelling correction system Copyright © 1995 by Lernout & Hauspie Speech Products N.V. All rights reserved. Source code for portions of this product are available under the Mozilla Public License at the following sites: http://www.mozilla.org/, http://www.jclark.com/, and http://www.gingerall.com.
    [Show full text]
  • Transport Protocols
    Transport Protocols Reading: Sec. 2.5, 5.1 – 5.2, 6.1 – 6.4 Slides by Rexford @ Princeton & Slides accompanying the Internet Lab Manual, slightly altered by M.D. Goals for Today’s Lecture • Principles underlying transport-layer services – (De)multiplexing – Reliable delivery – Flow control – Congestion control • Transport-layer protocols in the Internet – User Datagram Protocol (UDP) • Simple (unreliable) message delivery • Realized by a SOCK_DGRAM socket – Transmission Control Protocol (TCP) • Reliable bidirectional stream of bytes • Realized by a SOCK_STREAM socket 2 Transport Layer • Transport layer protocols are end-to-end protocols • They are only implemented at the end hosts HOST HOST Application Application Transport Transport Network Network Network Data Link Data Link Data Link Data Link 3 Role of Transport Layer • Application layer – Between applications (e.g., browsers and servers) – E.g., HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), Network News Transfer Protocol (NNTP) • Transport layer – Between processes (e.g., sockets) – Relies on network layer and serves the application layer – E.g., TCP and UDP • Network layer – Between nodes (e.g., routers and hosts) – Hides details of the link technology (e.g., IP) 4 Context User User User User Application Process Process Process Process Layer TCP UDP Transport Layer ICMP IP IGMP Network Layer Hardware ARP RARP Interface Link Layer Media 5 Context To which application ? TCP header TCP data ICMP UDP TCP 1 IGMP 2 17 6 TCP ) ( IP header hdr DEST SRC Protocol type cksum IP IP data ) ( ) ( Others 0806 8035 0800 ARP RARP IP IPIPIP ) ( dest source MAC MAC Ethernet frame type data CRC ) ( 6 Port Numbers • UDP (and TCP) use port numbers to identify applications • A globally unique address at the transport layer (for both UDP and TCP) is a tuple <IP address, port number> • There are 65,535 UDP ports per host.
    [Show full text]
  • Open Source and Other Options to Traditional Productivity Software
    em • it insight Open Source and Other Options to Traditional Productivity Software Before most of us had PCs, I used Lotus Symphony, whose spreadsheet module became Lotus 1-2-3. Today, it’s hard to imagine life without spreadsheet, word by Jill Gilbert processor, and presentation software installed on our computers and laptops. More and more organizations are entertaining the idea of open source and other Jill Barson Gilbert, QEP, alternatives to traditional office software. Some options are online, on-demand is president of Lexicon Systems, LLC. E-mail: “Cloud” applications, something unheard of 10 years ago. jbgilbert@lexicon- systems.com. Open Source and Free Software and communities of developers available to offer Open source software is computer software for advice and technical support. Many IT organiza- which the source code is freely available. Users tions can use internal resources to customize and have a license to access to the source code to study, support the software. change, and improve the software, rights normally reserved for copyright holders. A computer pro- In general, open source applications are free gram’s source code is the collection of files needed of “bells and whistles,” intuitive, and easy to use. to convert from human-readable form to some Simple menus, icons, and familiar keystrokes (e.g., kind of computer-executable form. The Open Cntl + B for “bold” and Cntl + S for “save”) result Source Initiative (OSI), established in 1998, is the in a quick learning curve. The leading open source steward of the Open Source Definition (OSD) and productivity software has integrated modules with the recognized body for reviewing and approving a common look and feel and navigation.
    [Show full text]