Next generation operating systems architecture

Author(s):  
Michel Gien
2009 ◽  
Vol 2 ◽  
Author(s):  
Anastasia Marie Salter

The classic adventure games—part of the earliest traditions of interactive narrative—have not disappeared, although they no longer occupy space on the shelves at the local computer store. Even as changing hardware and operating systems render these games of the 1980s and 1990s literally unplayable without emulating the computer systems of the past, fans are keeping these stories alive. Authorship of these games has changed hands: it is now under the control of the fans, the former and current players. Through the online sharing of fan-created game design tool sets and of the fan-created games themselves, these new coauthors create a haven to revisit these decades-old games using fresh eyes and fresh systems. The products of these folk art–reminiscent efforts also offer a venue to reconsider video game fandom in light of genres. They also allow us to understand these "personal games," productions of one or more people that are not intended for commercial sale, as carrying the heritage of the classic era forward into the next generation of gaming.


Author(s):  
Abdellah Jamali ◽  
Najib Naja ◽  
Driss El Ouadghiri

IPv6 is a next-generation Internet layer protocol designed by the IETF (Internet Engineering Task Force) to solve the problem of IP address depletion under the current Internet layer protocol. It has been developed to replace the current Internet Protocol version 4 (IPv4). Various operating systems support IPv6 protocol stacks and network infrastructures are currently being deployed to support the functions of IPv6. During the course of the deployment of IPv6 protocol, the authors found several critical implementation and operational issues which distract user and possibly prevent wide deployment of IPv6. Among the problems identified are the stateless IP auto-configuration, which provides for each node connected to the network an IP address. The authors have previously examined the problem in Fedora Core operating system, and in this work, they make a slight modification on the same method using Red Hat operating system. The proposed method is independent of rebooting NIC. This method ensures the establishment of addresses if problems occur.


Sign in / Sign up

Export Citation Format

Share Document