Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Network Articles
Found 655 articles
Cyber System Security
The Cyber System generally means the word related to a group of computers or Information Technology. Cyber security means the security of cyber systems. It provides a wide range of functions namely Information Technology, Networking, Computer systems, and mainly cyber security operations. Cyber System Security secures the computer system from cyber-attacks. It protects the system and the personal data, credentials, and passwords. Due to the developments in technology, the risks, and the cost to retain the services becoming higher. Cyber System A system that utilizes cyberspace is referred to as a cyber system. Information infrastructures, as well as individuals ...
Read MoreDifference Between GAGAN and GPS
GPS is a navigation system that is based on satellite and users can use it to reach their destination as they will be able to know the location and route of the place where they have to go. GAGAN is developed by ISRO which helps to make the GPS signals accurate. In this article, we will discuss the difference between GAGAN and GPS. What is GPS? The full form of GPS is Global Positioning System. This is a system in which a network of satellites is used in space to know the location of a certain place all over the ...
Read MoreDifference between IP address and Port Number
Computers can communicate with each other over a network through port numbers and IP addresses. In this article, we will discuss the difference between IP Address and Port Number. What is an IP Address? IP Address can be expanded to Internet Protocol Address. This is an address which is used by a computer to receive data and information from other computers through the Internet. Billions of IP addresses are being used to make a connection between computers. These computers use either IPv4 or IPv6 addresses for making a connection. Previously IPv4 was used for networking as the number of users ...
Read MoreExplain the functions of a Physical Layer
The physical layer meets all these requirements out. The set of rules and procedures for interaction between physical layers are called Physical layer protocols. The layer provides a physical connection different from the physical transmission path because it is at the bit level while the transmission path is at the electrical signal level. This physical connection can be a point to point physical connection or point to the multi-point physical connection, as shown in the figure − The physical layer provides its services to the data link layer, the next higher layer of the OSI model. The ...
Read MoreWhat are Computer Registers in Computer Architecture?
Computer registers are high-speed memory storing units. It is an element of the computer processor. It can carry any type of information including a bit sequence or single data.A register should be 32 bits in length for a 32-bit instruction computer. Registers can be numbered relies upon the processor design and language rules.The instructions in a computer are saved in memory locations and implemented one after another at a time. The function of the control unit is to fetch the instruction from the memory and implement it. The control does the similar for all the instructions in the memory in ...
Read MoreWhat are Instruction Formats?
Instruction includes a set of operation codes and operands that manage with the operation codes. Instruction format supports the design of bits in an instruction. It contains fields including opcode, operands, and addressing mode.The instruction length is generally preserved in multiples of the character length, which is 8 bits. When the instruction length is permanent, several bits are assigned to opcode, operands, and addressing modes.The function of allocating bits in the instruction can be interpreted by considering the following elements −Number of addressing modesNumber of operandsNumber of CPU registersNumber of register setsNumber of address linesThe figure displayed the general IA-32 ...
Read MoreWhat are Instruction Codes and Operands in Computer Architecture?
A computer instruction is a binary code that determines the micro-operations in a sequence for a computer. They are saved in the memory along with the information. Each computer has its specific group of instructions.They can be categorized into two elements as Operation codes (Opcodes) and Address. Opcodes specify the operation for specific instructions. An address determines the registers or the areas that can be used for that operation. Operands are definite elements of computer instruction that show what information is to be operated on.It consists of 12 bits of memory that are required to define the address as the ...
Read MoreWhat is Direct Mapping Process in Computer Architecture?
Direct mapping is a procedure used to assign each memory block in the main memory to a particular line in the cache. If a line is already filled with a memory block and a new block needs to be loaded, then the old block is discarded from the cache.The figure shows how multiple blocks from the example are mapped to each line in the cache.Just like locating a word within a block, bits are taken from the main memory address to uniquely describe the line in the cache where a block can be stored.Example − Consider a cache with = ...
Read MoreWhat is Congestion Control Algorithm?
Congestion causes choking of the communication medium. When too many packets are displayed in a method of the subnet, the subnet's performance degrades. Hence, a network's communication channel is called congested if packets are traversing the path and experience delays mainly over the path's propagation delay. There is two congestion control algorithm which is as follows: Leaky Bucket The leaky bucket algorithm discovers its use in the context of network traffic shaping or rate-limiting. The algorithm allows controlling the rate at which a record is injected into a network and managing burstiness in the data rate. ...
Read MoreWhat is Hardwired Control Unit?
A hardwired control is a mechanism of producing control signals using Finite State Machines (FSM) appropriately. It is designed as a sequential logic circuit. The final circuit is constructed by physically connecting the components such as gates, flip flops, and drums. Hence, it is named a hardwired controller.The figure shows a 2-bit sequence counter, which is used to develop control signals. The output obtained from these signals is decoded to generate the required signals in sequential order.The hardwired control consists of a combinational circuit that outputs desired controls for decoding and encoding functions. The instruction that is loaded in the ...
Read More