Operating System Articles

Page 166 of 171

What is Asynchronous Transmission?

Ginni
Ginni
Updated on 16-Mar-2026 1K+ Views

A transmission system is classified as asynchronous if it enables the physical channel to remain idle for arbitrary periods between transmissions. Asynchronous communication is well-suited for applications that generate data randomly, such as a user typing on a keyboard or browsing web pages with unpredictable intervals. The main challenge of asynchronous transmission stems from the lack of coordination between sender and receiver when the channel is idle. Since the receiver cannot predict when new data will arrive, additional synchronization mechanisms are required. How Asynchronous Transmission Works Asynchronous technologies typically require the sender to transmit extra bits before ...

Read More

What is Code Division Multiplexing?

Ginni
Ginni
Updated on 16-Mar-2026 2K+ Views

Code Division Multiplexing (CDM) is an advanced multiplexing technique used in cellular telephone systems and satellite communications. The specific version used in cell phones is called Code Division Multiple Access (CDMA). Unlike other multiplexing methods that rely on physical properties like frequency or time, CDM uses a mathematical concept based on orthogonal vector spaces. This allows multiple signals to be combined and separated without interference. How CDM Works In CDM, each sender is assigned a unique binary code called a chip sequence (Ci). These chip sequences are chosen to be orthogonal vectors, meaning the dot product of ...

Read More

What is the architecture of Asynchronous Transfer Mode?

Ginni
Ginni
Updated on 16-Mar-2026 8K+ Views

Asynchronous Transfer Mode (ATM) is a connection-oriented network technology where sender devices, known as end-points, connect through a User-to-Network Interface (UNI) to network switches. These switches communicate with each other through Network-to-Network Interfaces (NNI). ATM uses a hierarchical approach to organize traffic flow through virtual paths and virtual channels, providing efficient bandwidth utilization and Quality of Service (QoS) guarantees for different types of data transmission. ATM Network Architecture End Point A ATM ...

Read More

Difference Between Virtual and Physical Addresses

Pradeep Kumar
Pradeep Kumar
Updated on 16-Mar-2026 5K+ Views

Modern computing systems rely on computer memory to store data and instructions that the processor executes. Programs access memory using addresses that identify specific data locations. Two fundamental types of memory addresses exist: physical addresses and virtual addresses. Physical addresses point directly to specific locations in physical memory, while virtual addresses are logical addresses that the operating system maps to physical addresses. This mapping enables memory protection between processes and allows systems to use more memory than is physically available. Virtual to Physical Address Translation Virtual Address ...

Read More

ifconfig vs ip What\'s Difference and Comparing Network Configuration?

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

As network administrators or anyone working with network troubleshooting, you will often encounter the commands ifconfig and ip. Both these commands are used in Unix-based operating systems for network interface configuration, but they have significant differences in capabilities, syntax, and maintenance status. Introduction to Ifconfig Ifconfig (Interface Configuration) is a system administration utility in Unix and Unix-like operating systems to configure, control, and query TCP/IP network interface parameters. It is part of the net-tools package which has been present since the early days of Linux. Let's examine a basic ifconfig command: $ ifconfig ...

Read More

Private Bytes, Virtual Bytes, Working Set

Way2Class
Way2Class
Updated on 16-Mar-2026 1K+ Views

Memory management is a critical aspect of computer systems that directly impacts their performance and stability. Understanding key memory metrics such as private bytes, virtual bytes, and working set is essential for system administrators and developers to effectively monitor and optimize memory usage across processes and applications. These three memory metrics provide valuable insights into how applications consume memory resources. Each metric represents a different perspective on memory utilization, helping administrators identify memory-intensive processes, detect memory leaks, and optimize system performance. Memory Metrics Relationship Private Bytes ...

Read More

What are the elements of Transport Protocol?

Ginni
Ginni
Updated on 16-Mar-2026 80K+ Views

To establish a reliable service between two machines on a network, transport protocols are implemented, which somehow resembles the data link protocols implemented at layer 2. The major difference lies in the fact that the data link layer uses a physical channel between two routers while the transport layer uses a subnet. Transport protocols must address several critical elements to ensure reliable data communication across networks. These elements work together to provide end-to-end communication services between processes running on different machines. Transport Protocol Elements Service Types ...

Read More

What are the services provided by the transport layer?

Ginni
Ginni
Updated on 16-Mar-2026 45K+ Views

The services provided by the transport layer ensure reliable end-to-end data delivery between applications running on different hosts. These services hide the complexities of the underlying network and provide a uniform interface to the session layer. Address Mapping Address mapping involves translating transport addresses to network addresses. When a session entity requests to send a Transport Service Data Unit (TSDU) to another session entity, it provides its transport service access point address for identification. The transport entity then determines the corresponding Network Service Access Point (NSAP) address to establish proper routing. Assignment of Network Connection The ...

Read More

What is the TCP Connection Establishment?

Ginni
Ginni
Updated on 16-Mar-2026 38K+ Views

TCP Connection Establishment is the process by which two hosts create a reliable, connection-oriented session before transmitting data. This process ensures both sides are ready to communicate and agree on initial parameters for data exchange. To make transport services reliable, TCP uses a three-way handshake mechanism to establish connections. This mechanism synchronizes both ends of a network by enabling both sides to agree upon original sequence numbers and confirm readiness for data transmission. How the Three-Way Handshake Works The three-way handshake prevents packets from being shared or retransmitted during session establishment. Each host randomly selects a sequence ...

Read More

Explain the functions of a Physical Layer

Ginni
Ginni
Updated on 16-Mar-2026 5K+ Views

The physical layer is the lowest layer in the OSI model that handles the actual transmission of raw bits over a physical communication channel. It establishes, maintains, and terminates physical connections between devices, converting digital data into electrical, optical, or radio signals. The physical layer provides services to the data link layer and operates at the bit level, managing the electrical signal transmission over the physical medium. It can establish either point-to-point or point-to-multipoint physical connections. Physical Layer Connection Types Point-to-Point ...

Read More
Showing 1651–1660 of 1,707 articles
« Prev 1 164 165 166 167 168 171 Next »
Advertisements