{"id":84801,"date":"2024-12-18T02:54:25","date_gmt":"2024-12-18T02:54:25","guid":{"rendered":"https:\/\/www.essaybishops.com\/dissertations\/the-synchronous-and-asynchronous-communication-information-technology-essay\/"},"modified":"2024-12-18T02:54:25","modified_gmt":"2024-12-18T02:54:25","slug":"the-synchronous-and-asynchronous-communication-information-technology-essay","status":"publish","type":"post","link":"https:\/\/www.homeworkacetutors.com\/assessments\/the-synchronous-and-asynchronous-communication-information-technology-essay\/","title":{"rendered":"The Synchronous And Asynchronous Communication Information Technology Essay"},"content":{"rendered":"<div class=\"content position-relative mb-4\">\n<p>Problems Stealing or copying a users files- One user can copy another users program \/ memory space. This could be very detrimental if, for example, an administrator was running a decryption protocol, and another user stole the decryption program and key.\u00a0<\/p>\n<p>Writing over another program\u2019s (belonging to another user or to the OS) area in memory; Using system resources (CPU, disk space) without proper accounting; Causing the printer to mix output by sending data while some other user\u2019s file is printing.<\/p>\n<h2>b) Can we ensure the same degree of security in a time shared machine as in a dedicated machine? Explain your answer.<\/h2>\n<p>b) No, since any protection scheme devised by humans can inevitably be broken by a human, and the more complex the scheme, the more difficult it is to feel confident of its correct implementation. Time-shared machines are far less secure, and are very easy to overload the buffers. Also they are much slower to catch a virus.<\/p>\n<h2>2. Under what circumstances would a user be better off using a time sharing system rather than a PC or single user workstation?<\/h2>\n<p>Ans2. The benefits of time sharing are the same as you are using right now reading this page. A time-sharing system (what we call a server nowdays) provides many people the opportunity to use the system. Technically, even a standard PC is a time-sharing system, because you can run many different programs on it at a time (think Browser, Anti-Virus, etc.). When there are few other users, the\u00a0task\u00a0is large, and the hardware is fast, time-sharing makes sense .<\/p>\n<p>Since the mainframe has more computing power than a\u00a0personal\u00a0computer and that full computing power can be brought to bear on the user\u2019s problem. Using a time-sharing\u00a0system would also be appropriate if that system has expensive resources (e.g., a color\u00a0laser printer) that are not available on the personal computer. Finally, if the user needs to \u201crun\u201d multiple tasks simultaneously, the time-sharing system would also be most appropriate, as most personal computer\u00a0operating\u00a0systems\u00a0don\u2019t support multiprocessing very well. (A personal computer, in contrast, would be better when the\u00a0job\u00a0is small enough to be reasonably executed on it.<\/p>\n<h2>3. In the designing of the operating system there are two approaches modular kernel and layered approach? How are they different?<\/h2>\n<p>Ans3. In the desingning of the operating system the layered kernel imposes a strict ordering of subsystems such that subsystems at the lower layers are not allowed to invoke operations corresponding to the upper-layer subsystems. There are no such restrictions in the modular-kernel approach, where in modules are free to invoke each other without any constraints.<\/p>\n<h2>Part B<\/h2>\n<h2>4. There is guest operating system and a host operating system like VMware? List all the factors in choosing the host operating system?<\/h2>\n<p>Ans4. The factors in choosing the host operating system as follows:<\/p>\n<p>PC Hardware<\/p>\n<p>Memory<\/p>\n<p>Display<\/p>\n<p>Disk Drives<\/p>\n<p>Local Area Networking (Optional)<\/p>\n<p>Host Operating System<\/p>\n<h2>5. The kernel is responsible for a action with the processes. Search through the action of kernel and describe what is the action?<\/h2>\n<p>Ans5. Through the action of kernel action is described as State of current process is Saved and Restore State of incoming process.<\/p>\n<h2>6.Considering both the system level and the programmer level.<\/h2>\n<h2>Consider the advantage and disadvantage of the following structure.<\/h2>\n<h2>Synchronous and asynchronous communication.<\/h2>\n<h2>Automatic and explicit buffering.<\/h2>\n<h2>Send by copy and send by reference<\/h2>\n<h2>Fixed-sized and variable-sized messages.<\/h2>\n<p>Ans6. a). Asynchronous communication utilizes a transmitter, a receiver and a wire without coordination about the timing of just how long the transmiter leaves the signal at a certain level to represent a single digital bit. Each device uses a clock to measure out the \u2018length\u2019 of a bit.<\/p>\n<p>Asynchronous systems do not send separate information to indicate the encoding or clocking information. The receiver must decide the clocking of the signal on it\u2019s own. This means that the receiver must decide where to look in the signal stream to find ones and zeroes, and decide for itself where each individual bit stops and starts.<\/p>\n<p>In short, the two ends do not synchronize the connection before communicating. Asynchronous communication is more efficient when there is low loss and low error rates over the transmission medium because data is not retransmitted. In addition, there is no time spent setting up the connection at the beginning of transmission\u2013you just transmit and let the end your computer\u2019s keyboard and mouse.<\/p>\n<h2>Asynchronous is a faster means of connecting, but less reliable.<\/h2>\n<p>Synchronous systems negotiate the connection at the data-link level before communication begins. Basic synchronous systems will synchronize two clocks before transmission, and reset their numeric counters for errors etc. More advanced systems may negotiate things like error correction and compression.<\/p>\n<p>It is possible to have both sides try to synchronize the connection at the same time. Usually, there is a process to decide which end should be in control. Both sides can go through a lengthy negotiation cycle where they exchange communications parameters and status information. Once a connection is established, the transmitter sends out a signal, and the receiver sends back data regarding that transmission, and what it received. This takes longer on low error-rate lines, but is highly efficient in systems where the transmission medium itself (an electric wire, radio signal or laser beam) is not particularly reliable.<\/p>\n<p>b) Automatic buffering provides\u00a0a queue with indefinite length; thus ensuring the sender will never\u00a0have to block while waiting to copy a message. There are no specifications\u00a0how automatic buffering will be provided; one scheme\u00a0may reserve sufficiently large memory where much of the memory\u00a0is wasted. Automatic makes programming easier but is a harder system to build.\u00a0\u00a0Explicit buffering specifies how large the buffer\u00a0is. In this situation, the sender may be blocked while waiting for\u00a0available space in the queue. However, it is less likely memory\u00a0will be wasted with explicit buffering.<\/p>\n<p>c)\u00a0Send by copy and send by reference\u00a0\u2013 Send by copy does not\u00a0allow the receiver to alter the state of the parameter; send by reference\u00a0does allow it. Send by copy is better for network generalization and synchronization issues. Send by reference is more efficient for big data structures but harder to code because of the shared memory implications.A benefit of send by reference is that it allows\u00a0the programmer to write a distributed version of a centralized application.\u00a0<\/p>\n<p>d)\u00a0Fixed-sized and variable-sized messages\u00a0\u2013 The implications of\u00a0this are mostly related to buffering issues; with fixed-size messages,\u00a0a buffer with a specific size can hold a known number\u00a0of messages. The number of variable-sized messages that can be\u00a0held by such a buffer is unknown. Consider how Windows 2000\u00a0handles this situation: with fixed-sized messages (anything\u00a0&lt;\u00a0256\u00a0bytes), the messages are copied from the address space of the\u00a0sender to the address space of the receiving process. Larger messages\u00a0(i.e. variable-sized messages) use shared memory to pass\u00a0the message. Variable sized makes programming easier but is a harder system to build.<\/p>\n<h2>\u00a0<\/h2>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Problems Stealing or copying a users files- One user can copy another users program \/ memory space. This could be very detrimental if, for example, an administrator was [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9729],"tags":[9772,9719,9711,9720],"class_list":["post-84801","post","type-post","status-publish","format-standard","hentry","category-information-technology","tag-write-harbor-research-paper-assistance-for-graduates","tag-need-help-writing-a-masters-thesis-paper-us","tag-custom-1500-words-assessment-brief-writing","tag-complete-my-essay-in-300-400-words-today"],"_links":{"self":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/posts\/84801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/comments?post=84801"}],"version-history":[{"count":0,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/posts\/84801\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/media?parent=84801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/categories?post=84801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/tags?post=84801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}