Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Operating System Articles
Page 166 of 171
What is Asynchronous Transmission?
A transmission system is classified as asynchronous if it enables the physical channel to remain idle for arbitrary periods between transmissions. Asynchronous communication is well-suited for applications that generate data randomly, such as a user typing on a keyboard or browsing web pages with unpredictable intervals. The main challenge of asynchronous transmission stems from the lack of coordination between sender and receiver when the channel is idle. Since the receiver cannot predict when new data will arrive, additional synchronization mechanisms are required. How Asynchronous Transmission Works Asynchronous technologies typically require the sender to transmit extra bits before ...
Read MoreWhat is Code Division Multiplexing?
Code Division Multiplexing (CDM) is an advanced multiplexing technique used in cellular telephone systems and satellite communications. The specific version used in cell phones is called Code Division Multiple Access (CDMA). Unlike other multiplexing methods that rely on physical properties like frequency or time, CDM uses a mathematical concept based on orthogonal vector spaces. This allows multiple signals to be combined and separated without interference. How CDM Works In CDM, each sender is assigned a unique binary code called a chip sequence (Ci). These chip sequences are chosen to be orthogonal vectors, meaning the dot product of ...
Read MoreWhat is the architecture of Asynchronous Transfer Mode?
Asynchronous Transfer Mode (ATM) is a connection-oriented network technology where sender devices, known as end-points, connect through a User-to-Network Interface (UNI) to network switches. These switches communicate with each other through Network-to-Network Interfaces (NNI). ATM uses a hierarchical approach to organize traffic flow through virtual paths and virtual channels, providing efficient bandwidth utilization and Quality of Service (QoS) guarantees for different types of data transmission. ATM Network Architecture End Point A ATM ...
Read MoreDifference Between Virtual and Physical Addresses
Modern computing systems rely on computer memory to store data and instructions that the processor executes. Programs access memory using addresses that identify specific data locations. Two fundamental types of memory addresses exist: physical addresses and virtual addresses. Physical addresses point directly to specific locations in physical memory, while virtual addresses are logical addresses that the operating system maps to physical addresses. This mapping enables memory protection between processes and allows systems to use more memory than is physically available. Virtual to Physical Address Translation Virtual Address ...
Read Moreifconfig vs ip What\'s Difference and Comparing Network Configuration?
As network administrators or anyone working with network troubleshooting, you will often encounter the commands ifconfig and ip. Both these commands are used in Unix-based operating systems for network interface configuration, but they have significant differences in capabilities, syntax, and maintenance status. Introduction to Ifconfig Ifconfig (Interface Configuration) is a system administration utility in Unix and Unix-like operating systems to configure, control, and query TCP/IP network interface parameters. It is part of the net-tools package which has been present since the early days of Linux. Let's examine a basic ifconfig command: $ ifconfig ...
Read MorePrivate Bytes, Virtual Bytes, Working Set
Memory management is a critical aspect of computer systems that directly impacts their performance and stability. Understanding key memory metrics such as private bytes, virtual bytes, and working set is essential for system administrators and developers to effectively monitor and optimize memory usage across processes and applications. These three memory metrics provide valuable insights into how applications consume memory resources. Each metric represents a different perspective on memory utilization, helping administrators identify memory-intensive processes, detect memory leaks, and optimize system performance. Memory Metrics Relationship Private Bytes ...
Read MoreWhat are the elements of Transport Protocol?
To establish a reliable service between two machines on a network, transport protocols are implemented, which somehow resembles the data link protocols implemented at layer 2. The major difference lies in the fact that the data link layer uses a physical channel between two routers while the transport layer uses a subnet. Transport protocols must address several critical elements to ensure reliable data communication across networks. These elements work together to provide end-to-end communication services between processes running on different machines. Transport Protocol Elements Service Types ...
Read MoreWhat are the services provided by the transport layer?
The services provided by the transport layer ensure reliable end-to-end data delivery between applications running on different hosts. These services hide the complexities of the underlying network and provide a uniform interface to the session layer. Address Mapping Address mapping involves translating transport addresses to network addresses. When a session entity requests to send a Transport Service Data Unit (TSDU) to another session entity, it provides its transport service access point address for identification. The transport entity then determines the corresponding Network Service Access Point (NSAP) address to establish proper routing. Assignment of Network Connection The ...
Read MoreWhat is the TCP Connection Establishment?
TCP Connection Establishment is the process by which two hosts create a reliable, connection-oriented session before transmitting data. This process ensures both sides are ready to communicate and agree on initial parameters for data exchange. To make transport services reliable, TCP uses a three-way handshake mechanism to establish connections. This mechanism synchronizes both ends of a network by enabling both sides to agree upon original sequence numbers and confirm readiness for data transmission. How the Three-Way Handshake Works The three-way handshake prevents packets from being shared or retransmitted during session establishment. Each host randomly selects a sequence ...
Read MoreExplain the functions of a Physical Layer
The physical layer is the lowest layer in the OSI model that handles the actual transmission of raw bits over a physical communication channel. It establishes, maintains, and terminates physical connections between devices, converting digital data into electrical, optical, or radio signals. The physical layer provides services to the data link layer and operates at the bit level, managing the electrical signal transmission over the physical medium. It can establish either point-to-point or point-to-multipoint physical connections. Physical Layer Connection Types Point-to-Point ...
Read More