The Synchronous And Asynchronous Communication Information Technology Essay

Problems Stealing or copying a users files- One user can copy another users program / memory space. This could be very detrimental if, for example, an administrator was running a decryption protocol, and another user stole the decryption program and key. 

Writing over another program’s (belonging to another user or to the OS) area in memory; Using system resources (CPU, disk space) without proper accounting; Causing the printer to mix output by sending data while some other user’s file is printing.

b) Can we ensure the same degree of security in a time shared machine as in a dedicated machine? Explain your answer.

b) No, since any protection scheme devised by humans can inevitably be broken by a human, and the more complex the scheme, the more difficult it is to feel confident of its correct implementation. Time-shared machines are far less secure, and are very easy to overload the buffers. Also they are much slower to catch a virus.

2. Under what circumstances would a user be better off using a time sharing system rather than a PC or single user workstation?

Ans2. The benefits of time sharing are the same as you are using right now reading this page. A time-sharing system (what we call a server nowdays) provides many people the opportunity to use the system. Technically, even a standard PC is a time-sharing system, because you can run many different programs on it at a time (think Browser, Anti-Virus, etc.). When there are few other users, the task is large, and the hardware is fast, time-sharing makes sense .

Since the mainframe has more computing power than a personal computer and that full computing power can be brought to bear on the user’s problem. Using a time-sharing system would also be appropriate if that system has expensive resources (e.g., a color laser printer) that are not available on the personal computer. Finally, if the user needs to “run” multiple tasks simultaneously, the time-sharing system would also be most appropriate, as most personal computer operating systems don’t support multiprocessing very well. (A personal computer, in contrast, would be better when the job is small enough to be reasonably executed on it.

Read also  Examining The Importance Of Requirement Elicitation Information Technology Essay

3. In the designing of the operating system there are two approaches modular kernel and layered approach? How are they different?

Ans3. In the desingning of the operating system the layered kernel imposes a strict ordering of subsystems such that subsystems at the lower layers are not allowed to invoke operations corresponding to the upper-layer subsystems. There are no such restrictions in the modular-kernel approach, where in modules are free to invoke each other without any constraints.

Part B

4. There is guest operating system and a host operating system like VMware? List all the factors in choosing the host operating system?

Ans4. The factors in choosing the host operating system as follows:

PC Hardware

Memory

Display

Disk Drives

Local Area Networking (Optional)

Host Operating System

5. The kernel is responsible for a action with the processes. Search through the action of kernel and describe what is the action?

Ans5. Through the action of kernel action is described as State of current process is Saved and Restore State of incoming process.

6.Considering both the system level and the programmer level.

Consider the advantage and disadvantage of the following structure.

Synchronous and asynchronous communication.

Automatic and explicit buffering.

Send by copy and send by reference

Fixed-sized and variable-sized messages.

Ans6. a). Asynchronous communication utilizes a transmitter, a receiver and a wire without coordination about the timing of just how long the transmiter leaves the signal at a certain level to represent a single digital bit. Each device uses a clock to measure out the ‘length’ of a bit.

Asynchronous systems do not send separate information to indicate the encoding or clocking information. The receiver must decide the clocking of the signal on it’s own. This means that the receiver must decide where to look in the signal stream to find ones and zeroes, and decide for itself where each individual bit stops and starts.

Read also  Analytics, Interfaces, and Cloud Technology

In short, the two ends do not synchronize the connection before communicating. Asynchronous communication is more efficient when there is low loss and low error rates over the transmission medium because data is not retransmitted. In addition, there is no time spent setting up the connection at the beginning of transmission–you just transmit and let the end your computer’s keyboard and mouse.

Asynchronous is a faster means of connecting, but less reliable.

Synchronous systems negotiate the connection at the data-link level before communication begins. Basic synchronous systems will synchronize two clocks before transmission, and reset their numeric counters for errors etc. More advanced systems may negotiate things like error correction and compression.

It is possible to have both sides try to synchronize the connection at the same time. Usually, there is a process to decide which end should be in control. Both sides can go through a lengthy negotiation cycle where they exchange communications parameters and status information. Once a connection is established, the transmitter sends out a signal, and the receiver sends back data regarding that transmission, and what it received. This takes longer on low error-rate lines, but is highly efficient in systems where the transmission medium itself (an electric wire, radio signal or laser beam) is not particularly reliable.

b) Automatic buffering provides a queue with indefinite length; thus ensuring the sender will never have to block while waiting to copy a message. There are no specifications how automatic buffering will be provided; one scheme may reserve sufficiently large memory where much of the memory is wasted. Automatic makes programming easier but is a harder system to build.  Explicit buffering specifies how large the buffer is. In this situation, the sender may be blocked while waiting for available space in the queue. However, it is less likely memory will be wasted with explicit buffering.

Read also  Local Area Networks Interconnection

c) Send by copy and send by reference – Send by copy does not allow the receiver to alter the state of the parameter; send by reference does allow it. Send by copy is better for network generalization and synchronization issues. Send by reference is more efficient for big data structures but harder to code because of the shared memory implications.A benefit of send by reference is that it allows the programmer to write a distributed version of a centralized application. 

d) Fixed-sized and variable-sized messages – The implications of this are mostly related to buffering issues; with fixed-size messages, a buffer with a specific size can hold a known number of messages. The number of variable-sized messages that can be held by such a buffer is unknown. Consider how Windows 2000 handles this situation: with fixed-sized messages (anything < 256 bytes), the messages are copied from the address space of the sender to the address space of the receiving process. Larger messages (i.e. variable-sized messages) use shared memory to pass the message. Variable sized makes programming easier but is a harder system to build.

 

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)