Computers Articles

Page 4 of 100

Difference between Deadlock Prevention and Deadlock Avoidance

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 13K+ Views

Deadlock prevention and avoidance are crucial techniques in operating systems to ensure continuous operation without system-wide halts. Deadlocks can cause data loss, system downtime, and reduced productivity, making these techniques essential for maintaining system availability and reliability. What is Deadlock? A deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources. This creates a circular dependency where processes remain stuck in a waiting state, causing a system-wide halt. Deadlock occurs when four conditions are met simultaneously: mutual exclusion, hold and wait, no preemption, and circular ...

Read More

Deadlock, Starvation & LiveLock

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 4K+ Views

In operating systems, there are some common types of "blocking" situations that can severely impact system performance. Among these, Deadlock, Starvation, and Livelock are three well-known synchronization problems. Understanding these concepts is crucial for designing and implementing correct and efficient concurrent systems. Types of Synchronization Problems Synchronization Problems in Operating Systems Process Blocking Deadlock Starvation Livelock Circular waiting for resources ...

Read More

Difference between Cluster Computing and Grid Computing

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 11K+ Views

A cluster computer refers to a network of same type of computers whose target is to work as one collaborative unit. Such a network is used when a resource-hungry task requires high-computing power or memory. Two or more same types of computers are clubbed together to make a cluster and perform the task. Grid computing refers to a network of same or different types of computers whose target is to provide an environment where a task can be performed by multiple computers together on need basis. Each computer can work independently as well. Cluster ...

Read More

TACACS+ Protocol

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 799 Views

TACACS+ (Terminal Access Controller Access Control System Plus) is a network protocol that provides centralized authentication, authorization, and accounting (AAA) services for network devices. Developed by Cisco Systems as an enhancement to the original TACACS protocol, TACACS+ separates AAA functions into distinct processes, offering greater security and flexibility for network access control. Unlike protocols that combine multiple functions, TACACS+ treats authentication, authorization, and accounting as independent services. This separation allows administrators to configure granular access policies and provides better control over user permissions on network infrastructure devices like routers, switches, and firewalls. How TACACS+ Works TACACS+ operates ...

Read More

TCP and UDP Server using Select

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 1K+ Views

When it comes to server-client communication, two protocols are commonly used: TCP and UDP. Transmission Control Protocol (TCP) is a connection-oriented protocol that ensures reliable delivery of data packets between network devices. On the other hand, User Datagram Protocol (UDP) is a connectionless protocol that offers faster data transmission but with no guarantee of delivery or order. In this article, we will explore how to build a server using both protocols in Python programming language. We will also discuss the use of select() function in handling multiple client connections efficiently without the overhead of threading. Setting up the ...

Read More

TELNET and SSH on Adaptive Security Appliance (ASA)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 605 Views

In today's world where cyber attacks are becoming more frequent and complex, network security is a top priority for businesses. One of the most common ways to manage network security is through the use of firewalls, with Cisco Adaptive Security Appliance (ASA) being one of the most popular firewalls used in enterprise networks. In this article, we will focus on two protocols that are commonly used to manage ASA: TELNET and SSH. Definition of TELNET and SSH TELNET (TErminal NETwork) is a protocol used for remote access to devices over a network. It allows users to connect to ...

Read More

Joint Photographic Experts Group (JPEG)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

JPEG (Joint Photographic Experts Group) is a standardized image compression technique commonly used for digital photographs. Developed by the Joint Photographic Experts Group in the early 1990s, JPEG is designed to reduce file sizes of digital images while maintaining reasonable image quality through lossy compression. JPEG uses a lossy compression algorithm, meaning some data is permanently lost during compression. The compression level can be adjusted − higher compression yields smaller files but lower quality, while lower compression maintains better quality at the cost of larger file sizes. This flexibility makes JPEG ideal for web usage and digital photography. ...

Read More

Motion Picture Experts Group (MPEG)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 9K+ Views

Motion Picture Experts Group (MPEG) is a family of international standards for audio and video compression and transmission, developed by a working group of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). MPEG standards enable efficient storage and transmission of multimedia content by significantly reducing file sizes while maintaining acceptable quality. MPEG uses lossy compression, meaning some data is discarded during the compression process to achieve smaller file sizes. The compression level can be adjusted to balance between file size and quality based on specific requirements. MPEG Compression Process ...

Read More

what is web hosting and how does it work?

Om Sharma
Om Sharma
Updated on 16-Mar-2026 444 Views

Web Hosting is a service that allows companies and individuals to establish a website or web page on the Internet. A web hosting service provider, or web host, is a business that offers the technologies and services required for a website or webpage to be viewed whenever a user accesses it through the Internet. When you create a website, all the files, images, databases, and content need to be stored somewhere accessible 24/7. Web hosting providers maintain powerful servers in data centers that store your website files and make them available to visitors worldwide. ...

Read More

What is bus arbitration in computer organization?

yashwanth sitamraju
yashwanth sitamraju
Updated on 16-Mar-2026 28K+ Views

Bus arbitration is a critical mechanism in computer organization that determines which device gets control of the system bus when multiple devices need to access it simultaneously. A bus master is any device that initiates data transfers on the bus. In modern computer systems, multiple bus masters exist, including the CPU, DMA controllers, graphics cards, and network adapters. Since only one device can control the bus at any given time, a systematic approach is needed to manage access. How Bus Arbitration Works When multiple devices request bus access, the arbitration mechanism decides which device gets priority based ...

Read More
Showing 31–40 of 993 articles
« Prev 1 2 3 4 5 6 100 Next »
Advertisements