Network Articles

Page 2 of 66

What are Instruction Formats?

Ginni
Ginni
Updated on 04-Nov-2023 33K+ Views

Instruction includes a set of operation codes and operands that manage with the operation codes. Instruction format supports the design of bits in an instruction. It contains fields including opcode, operands, and addressing mode.The instruction length is generally preserved in multiples of the character length, which is 8 bits. When the instruction length is permanent, several bits are assigned to opcode, operands, and addressing modes.The function of allocating bits in the instruction can be interpreted by considering the following elements −Number of addressing modesNumber of operandsNumber of CPU registersNumber of register setsNumber of address linesThe figure displayed the general IA-32 ...

Read More

What are Instruction Codes and Operands in Computer Architecture?

Ginni
Ginni
Updated on 03-Nov-2023 52K+ Views

A computer instruction is a binary code that determines the micro-operations in a sequence for a computer. They are saved in the memory along with the information. Each computer has its specific group of instructions.They can be categorized into two elements as Operation codes (Opcodes) and Address. Opcodes specify the operation for specific instructions. An address determines the registers or the areas that can be used for that operation. Operands are definite elements of computer instruction that show what information is to be operated on.It consists of 12 bits of memory that are required to define the address as the ...

Read More

What is Direct Mapping Process in Computer Architecture?

Ginni
Ginni
Updated on 03-Nov-2023 33K+ Views

Direct mapping is a procedure used to assign each memory block in the main memory to a particular line in the cache. If a line is already filled with a memory block and a new block needs to be loaded, then the old block is discarded from the cache.The figure shows how multiple blocks from the example are mapped to each line in the cache.Just like locating a word within a block, bits are taken from the main memory address to uniquely describe the line in the cache where a block can be stored.Example − Consider a cache with = ...

Read More

What is Congestion Control Algorithm?

Ginni
Ginni
Updated on 01-Nov-2023 66K+ Views

Congestion causes choking of the communication medium. When too many packets are displayed in a method of the subnet, the subnet's performance degrades. Hence, a network's communication channel is called congested if packets are traversing the path and experience delays mainly over the path's propagation delay. There is two congestion control algorithm which is as follows: Leaky Bucket The leaky bucket algorithm discovers its use in the context of network traffic shaping or rate-limiting. The algorithm allows controlling the rate at which a record is injected into a network and managing burstiness in the data rate. ...

Read More

What is Hardwired Control Unit?

Ginni
Ginni
Updated on 01-Nov-2023 52K+ Views

A hardwired control is a mechanism of producing control signals using Finite State Machines (FSM) appropriately. It is designed as a sequential logic circuit. The final circuit is constructed by physically connecting the components such as gates, flip flops, and drums. Hence, it is named a hardwired controller.The figure shows a 2-bit sequence counter, which is used to develop control signals. The output obtained from these signals is decoded to generate the required signals in sequential order.The hardwired control consists of a combinational circuit that outputs desired controls for decoding and encoding functions. The instruction that is loaded in the ...

Read More

What is Vector Processing in Computer Architecture?

Ginni
Ginni
Updated on 01-Nov-2023 63K+ Views

Vector processing is a central processing unit that can perform the complete vector input in individual instruction. It is a complete unit of hardware resources that implements a sequential set of similar data elements in the memory using individual instruction.The scientific and research computations involve many computations which require extensive and high-power computers. These computations when run in a conventional computer may take days or weeks to complete. The science and engineering problems can be specified in methods of vectors and matrices using vector processing.Features of Vector ProcessingThere are various features of Vector Processing which are as follows −A vector ...

Read More

Difference between Private Key and Public Key

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 01-Nov-2023 47K+ Views

Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ...

Read More

What is Stack Organization?

Ginni
Ginni
Updated on 31-Oct-2023 69K+ Views

Stack is also known as the Last In First Out (LIFO) list. It is the most important feature in the CPU. It saves data such that the element stored last is retrieved first. A stack is a memory unit with an address register. This register influence the address for the stack, which is known as Stack Pointer (SP). The stack pointer continually influences the address of the element that is located at the top of the stack.It can insert an element into or delete an element from the stack. The insertion operation is known as push operation and the deletion ...

Read More

NMAP Cheat Sheet

Ajay yadav
Ajay yadav
Updated on 31-Oct-2023 99K+ Views

Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ...

Read More

What is Microprogrammed Control Unit?

Ginni
Ginni
Updated on 31-Oct-2023 72K+ Views

A control unit whose binary control values are saved as words in memory is called a microprogrammed control unit.A controller results in the instructions to be implemented by constructing a definite collection of signals at each system clock beat. Each of these output signals generates one micro-operation including register transfer. Thus, the sets of control signals are generated definite micro-operations that can be saved in the memory.Each bit that forms the microinstruction is linked to one control signal. When the bit is set, the control signal is active. When it is cleared the control signal turns inactive. These microinstructions in ...

Read More
Showing 11–20 of 655 articles
« Prev 1 2 3 4 5 66 Next »
Advertisements