Com Sci mod 3 Flashcards

1
Q

Explain the main functions of Operating Systems

A

An operating system is a piece of software that manages files, manages memory, manages processes, handles input and output, and controls peripheral devices like disk drives and printers, resource manager, interface among other things.

eg. Apple macOS, Microsoft Windows, Google’s Android OS, Linux Operating System, and Apple iOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how Operating Systems have evolved from primitive batch systems to sophisticated multi user systems

A

Batch Systems: Single job at a time, no user interaction.
• Multi-Programming: Multiple jobs in memory, better resource use.
• Time-Sharing: Multiple users interact simultaneously, sharing CPU time.
• Multi-User Systems: Multiple users run applications simultaneously with advanced resource management.
• Modern OS: Comprehensive systems with GUIs, security, networking, and multi-tasking.

In essence, operating systems have evolved from processing one job at a time with no user interaction to sophisticated platforms supporting multiple users and applications concurrently with robust security and user interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Batch Systems

A

a type of operating system that allows multiple users to use it at the same time, without direct communication between them. This is done by having the users submit their jobs to the operating system, which then processes them one at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Multi-Programming Systems

A

On a single processor computer, a multiprogramming OS can run many programs. In a multiprogramming OS, if one program must wait for an input/output transfer(blocked), the other programmes are ready to use the CPU. As a result, different jobs may have to split CPU time.

eg. Google Chrome browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Time Sharing

A

Time-sharing is a method of allowing multiple individuals at different terminals to access the same computer system simultaneously. In a time-sharing operating system, for each process, a time slot of 5 nanoseconds is allocated. Once a process is executed and completed (if it is not completed in its allocated timeshare it will be moved to the rear of the queue), the next process will be executed for the next 5 nanoseconds.

eg. round robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Multi-User Systems

A

allows multiple users on different computers or terminals to access a single system with one OS on it.

Examples: Linux, Ubuntu, Unix, Mac OS X, Windows 1010 etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bootstrap Process

A

The process involves a chain of stages, in which at each stage, a relatively small and simple program loads and then executes the larger, more complicated program of the next stage.

  • It is in this sense that the computer “pulls itself up by its bootstraps”; i.e., it improves itself by its own efforts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process Management

A

Process management in an operating system (OS) is the way the OS handles running programs. Think of it as a manager in a company ensuring that each employee (process) gets the resources they need (like CPU time, memory, etc.) and that they work efficiently without interfering with each other. Here are the key points in simple terms:

  1. Process Creation and Termination
  2. Scheduling
  3. Resource Allocation
  4. Inter-Process Communication (IPC)
  5. Synchronization

Overall, process management ensures that all running programs (processes) operate smoothly and efficiently, maximizing the performance and stability of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process States
Running

A

Running State: When the CPU is allocated to a process, it enters the running state. In this state, the process executes its instructions and uses system resources such as memory, CPU, and I/O devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Process States
Ready

A

After the creation of a process, the process enters the ready state i.e. the process is loaded into the main memory. The process here is ready to run and is waiting to get the CPU time for its execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Process States
Blocked

A

A blocking call is where the OS decides that it needs to wait for a certain operation to complete before allowing the program to continue execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the interrupt mechanism work?

A

An interrupt is an event that occurs to stop the current execution of the current process and notify the operating system to service an interrupt service routine (ISR).

  • The ISR is responsible for identifying the software or hardware that caused the interrupt and notifying the CPU of it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Interrupt
Interrupt generated by the running process

A

An interrupt is a signal emitted by a device attached to a computer or from a program within the computer. It requires the operating system (OS) to stop and figure out what to do next. An interrupt temporarily stops or terminates a service or a current process.
-stops the running process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of Interrupt
Input/Output Interrupt

A

Interrupt I/O is a way of controlling input/output activity whereby a peripheral or terminal that needs to make or receive a data transfer sends a signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Interrupt
External Interrupt

A

An external interrupt is a computer system interrupt that happens as a result of outside interference, whether that’s from the user, from peripherals, from other hardware devices or through a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Interrupt
Input/Output vs External Interrupt

A

Purpose: I/O is about the ongoing communication between the computer and external devices, while external interrupts are about signaling the CPU to handle urgent tasks.
• Operation: I/O can involve continuous or periodic data transfer, managed by the CPU or dedicated controllers. External interrupts, on the other hand, are sporadic signals that demand immediate CPU action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of Interrupt
Restart Interrupt

A

These interrupts occur when the operator selects the restart function at the console or when a restart SIGP (signal processor) instruction is received from another processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Deadlock?

A

a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

  • The earliest computer operating systems ran only one program at a time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the Process Control Block?

A

a data structure used by an operating system (OS) to manage and control the execution of processes. It contains all the necessary information about a process, including the process state, program counter, memory allocation, open files, and CPU scheduling information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Scheduling Algorithms
What are Preemptive Scheduling Algorithms?

A

Preemptive scheduling is used in real-time systems where the tasks are usually configured with different priorities and time critical tasks are given higher priorities. A higher priority task can stop a lower priority one and grab and use the CPU until it releases it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Scheduling Algorithms
What are Non-Preemptive Scheduling Algorithms?

A

Non-preemptive algorithms are designed so that once a process enters the running state, it cannot be preempted until it completes its allotted time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Scheduling Algorithms
Preemptive
Shortest Job First (SJF)
(can also be nonpreemptive)

A
  1. Definition: SJF selects the process with the shortest execution time to run next.
  2. Process: When multiple processes are waiting to be executed, the operating system looks at each one’s estimated execution time and picks the one that will take the least time to complete.
  3. Benefit: By choosing the shortest job first, SJF aims to minimize the average waiting time for all processes, making the system more efficient.
  4. Types:
    • Non-preemptive SJF: Once a process starts running, it continues until it finishes.
    • Preemptive SJF (also known as Shortest Remaining Time First, SRTF): If a new process arrives with a shorter remaining time than the current one, the current process is paused, and the new process is executed first.
  • Fairness: SJF is fair in terms of reducing waiting time but can cause longer jobs to wait significantly (known as the “starvation” problem).
  • Optimality: SJF is optimal for minimizing average waiting time if all process times are known in advance.
  • Usage: SJF is best suited for environments where job durations are predictable and small, such as batch processing systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Scheduling Algorithms
Preemptive
Round Robin

A

time slices (also known as time quanta) are assigned to each process in equal portions and in circular order, handling all processes without priority

  • Round-robin algorithm is a pre-emptive algorithm as the scheduler forces the process out of the CPU once the time quota expires.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Scheduling Algorithms
Non- Preemptive
First Come First Serve FCFS

A

FCFS Scheduling algorithm automatically executes the queued processes and requests in the order of their arrival. It allocates the job that first arrived in the queue to the CPU, then allocates the second one, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Memory Management
Virtual Memory

A

a method that computers use to manage storage space to keep systems running quickly and efficiently.

  • Using the technique, operating systems can transfer data between different types of storage, such as random access memory (RAM), also known as main memory, and hard drive or solid-state disk storage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Memory Management
Paging

A

a storage mechanism used in OS to retrieve processes from secondary storage to the main memory as pages. The primary concept behind paging is to break each process into individual pages. Thus the primary memory would also be separated into frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Memory Management
Thrashing

A

the system spends an excessive amount of time swapping data between physical memory (RAM) and virtual memory (disk storage) due to high memory demand and low available resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

File Management
Directories/Folders

A

A directory is a unique type of file that contains only the information needed to access files or other directories. As a result, a directory occupies less space than other types of files.

  • File systems consist of groups of directories and the files within the directories.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

File Management
Files

A

used for all input and output (I/O) of information in the operating system, to standardize access to both software and hardware.

  • Input occurs when the contents of a file is modified or written to.
  • Output occurs when the contents of one file is read or transferred to another file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Security of Files:

A
  1. User IDs
  2. Passwords
  3. Access Control List
  4. File Encryption
  5. File Compression
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Interface (user)
Types of Interfaces:

A
  1. Menu
  2. Command Prompt
  3. GUI (Graphical User Interface)
  4. the manipulation of the interface 😟❓
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Device Management
Device Drivers

A

a piece of software that enables communication between an operating system or application and hardware or peripheral devices. It serves as a bridge between the different components of a computer, allowing them to interact with each other.

33
Q

Protocol
What are the layers of the OSI Model?
(Open System Interconnection)

A
  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application.
34
Q

Device Management
Interrupt Handling (PCB)

A
  • Interrupt handling is a key function in real-time software, and comprises interrupts and their handlers. Only those physical interrupts which of high enough priority can be centered into system interrupt table. The software assigns each interrupt to a handler in the interrupt table
  • contains information about the interrupts that a process may have generated and how they were handled by the operating system
35
Q

Device Management
Input/Output Control

A

manages the flow of information between the central processing unit (CPU) and various external devices.

36
Q

Device Management
Peripheral Control

A

Data is often acted on by instructions. To achieve this, the operating system uses a program called a device driver that controls and communicates with peripherals. Device drivers contain instructions on how to control a device.

  • Each connected device has its own driver.
37
Q

Device Management
Polling

A

a method where a device continuously checks the status of another device to determine if it needs attention. This involves sending requests or queries to the device, waiting for a response, and repeating this process in a loop until the desired condition or data is obtained.

38
Q

Device Management
Buffering

A

The buffer is a section of main memory used to store or hold data temporarily. In other words, a buffer holds data that is sent from one location to another, such as between two devices or an application. Buffering is the process of temporarily storing data in a buffer.

39
Q

Device Management
Spooling

A

the temporary storage of data for usage and execution by a device, program, or system. Data is transmitted to and held in memory or other volatile storage until the software or computer asks for it to be executed.

  • SPOOL stands for Simultaneous Peripheral Operations On-Line.
40
Q

Device Management
Spooling vs Buffering

A
  • Spooling overlaps the input and output of one job with the computation of another job.
  • Buffering overlaps the input and output of one job with the computation of the same job.
41
Q

Network Management
Access Logs

A

An access log is a log file that records all events related to client applications and user access to a resource on a computer. Examples can be web server access logs, FTP command logs, or database query logs.

42
Q

Network Management
User Accounts

A

they allow different users to access and customize the system according to their needs and preferences. User accounts also provide security and privacy, as they can limit the access and permissions of each user to certain files, applications, and settings.

43
Q

Networking Protocols
TCP

Transmission Control Protocol

A

a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

44
Q

Networking Protocols
IP

A

An Internet Protocol (IP) address is the unique identifying number assigned to every device connected to the internet.

  • An IP address definition is a numeric label assigned to devices that use the internet to communicate
45
Q

What are packets?

A

In networking, a packet is a small segment of a larger message. Data sent over computer networks, such as the Internet, is divided into packets. These packets are then recombined by the computer or device that receives them.

46
Q

Network Architecture
Ethernet

A

Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).It enables devices to communicate with each other via a protocol, which is a set of rules or common network language.

47
Q

Network Architecture
FDDI
Fiber Distributed Data Interface

A

a network standard that uses fiber optic connections in a local area network (LAN)

  • can extend in range up to 200 kilometers (124 miles).
  • The FDDI protocol is based on the token ring protocol.
  • A FDDI LAN can support thousands of users.
48
Q

Network Topology
Star

A

A star network is a local area network (LAN) topology in which all nodes – personal computers (PCs), workstations or other devices – are directly connected to a common central computer that is often referred to as a hub. Therefore, a star network is often referred to as a hub-and-spoke network topology.

Advantage:
- Its speed is very high
- The network is highly scalable.

Disadvantage:
- Maintenance cost is very high
- Central device dependency

49
Q

Network Topology
Ring

A

a type of network configuration in which each device on the network is connected to two other devices, forming a “ring.” Data travels around the ring in one direction only, from device to device, until it reaches its destination.

Advantage:
- In this data flows in one direction which reduces the chance of packet collisions.
- In this topology additional workstations can be added after without impacting performance of the network.
- Equal access to the resources.

Disadvantage:
- Due to the Uni-directional Ring, a data packet (token) must have to pass through all the nodes.
- If one workstation shuts down, it affects whole network or if a node goes down entire network goes down.
- It is slower in performance as compared to the bus topology

50
Q

Network Topology
Bus

A

a type of network topology in which all devices are connected to a single cable called a “bus.” This cable serves as a shared communication medium, allowing all devices on the network to receive the same signal simultaneously.

Advantage:
- Ease of Installation
- Network Scalability

Disadvantage:
- Limited Length
- Collision Domain
- Signal Degradation

51
Q

Network Topology
Hybrid

A

a network structure that combines two or more different types of topologies, such as star, ring, bus, or mesh. It’s designed to leverage the strengths and minimize the weaknesses of the individual topologies it incorporates.

52
Q

Network Devices
Modem

A

the device that allows your computers, smartphones, tablets, and other devices to connect to the internet. It does this by converting digital signals from these devices into analog signals that can be transmitted over telephone lines or cable networks.

53
Q

Network Devices
Switches

A

A network switch is equipment that allows two or more IT devices, such as computers, to communicate with one another. Connecting multiple IT devices together creates a communications network.

54
Q

Network Devices
Routers

A

a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.

  • Just as a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network.
55
Q

Network Devices
Bridges

A

a network device that connects multiple subnetworks to create a single network. It provides interconnection with other computer networks that use the same protocol. Through a bridge, multiple LANs can be connected to form a larger and extended LAN.

56
Q

Network Devices
Network Interface Cards (NIC)

A

an add-in/expansion card for a PC desktop or laptop computer. It provides a hardware connection that enables the device to be plugged into the network (meaning the internet, in most cases). The connection may be via either Wi-Fi or fast Ethernet.

57
Q

Network Devices
Hubs

A

A hub is a networking device that serves as a central connection point within a local area network (LAN).

  • Its primary function is to receive data signals from connected devices and broadcast them to all other connected devices, regardless of the intended recipient.
58
Q

Transmission Media
Wired
Twisted Pair

A

Twisted pair wires are a type of cabling used to transmit data. They consist of pairs of insulated copper wires twisted together.

Advantages:
- Cost-Effective
- Easy Installation
- Widely Used

Disadvantages:
- Limited Distance
- Bandwidth Limitations
- Physical Damage

59
Q

Transmission Media
Wired
Fiber-Optics

A

Compared to copper wired cables, fiber optic cables provide higher bandwidth and can transmit data over longer distances.
- Fiber optic cables support much of the world’s internet, cable television, and telephone systems.

Advantages:
- It is thinner and light weighted
- Bandwidth is above copper cables
- Optical fibers have a long lifespan
- Distance

Disadvantages:
- Fragility
- Can’t be bent at sharp angles

60
Q

Transmission Media
Wired
Coaxial

A

Coaxial cable is used as a transmission line for radio frequency signals.

Advantages:
- easy to install
- very durable
- Excellent over short distances

Disadvantages:
- Signal loss over long distances
- Expensive
- has multiple layers so it is very bulky.

61
Q

Transmission Media
Wireless
Satellite

A

Satellites looking toward Earth provide information about clouds, oceans, land and ice. They also measure gases in the atmosphere, such as ozone and carbon dioxide, and the amount of energy that Earth absorbs and emits. And satellites monitor wildfires, volcanoes and their smoke.
Advantages:
- it offers a wide scope
- high-speed communication
- adaptability

Disadvantages:
- cost to manufacture and launch
- maintenance
- signal delay
- signal interference.

62
Q

Transmission Media
Wireless
Microwave

A

a line-of-sight wireless communication, uses specialized equipment to transmit and receive radio frequency (RF) over long distances without the use of wires or cables. Specific RF allows information to be transmitted through extreme weather conditions such as rain, hail, snow, dust, or even smoke.

Advantages:
- very large information-carrying capacity
- a bandwidth 30 times that of all the rest of the radio spectrum below it

Disadvantages:
- The cost of equipment or installation cost is high
- Susceptible to weather conditions
- Eavesdropping

63
Q

Transmission Media
IEE1394 (Firewire)

A

Because of its fast and reliable transfer rate, IEEE 1394 was frequently used in professional video editing and real-time video transmissions. It was also commonly used to connect electronic appliances in automobiles, such as DVD players, stereo sound systems, and GPS (global positioning system) navigators.

Advantages:
- Cheap standardised cable and plug technology.
- The digital image transmission provides a loss-free signal transfer and therefore a better image than analogue image transfer
- In general, FireWire devices support a higher bandwidth than USB 2.0, and therefore can send more data faster

Disadvantages:
- most modern PCs do not have FireWire ports built-in
- chipset incompatibility

64
Q

Protocol
File Transfer Protocol
FTP

A

a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet. FTP works by opening two connections that link the computers trying to communicate with each other.

65
Q

Protocol
Hypertext Transfer Protocol
HTTP

A

HTTP is an application layer protocol designed to *£transfer information between networked devices** and runs on top of other layers of the network protocol stack.

66
Q

Protocol
Hypertext Transfer Protocol Secure Sockets Layer
HTTPS

A

Internet communication protocol used to encrypt and securely transmit information between a user’s web browser and the website they are connected to.

67
Q

Protocol
IEEE 802.11a/b vs IEEE 802.16g

A

802.11g offers wireless transmission over distances of 150 feet and speeds up to 54Mbps compared with the 11Mbps of the 802.11b standard. Like 802.11b, 802.11g operates in the 2.4GHz range and therefore is compatible with it

68
Q

Protocol
Characteristics of Voice Over Internet Protocol
VOIP

A

Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.

  • call recording
  • custom caller ID
  • voicemail to email.

eg. WhatsApp
Advantages:
- Lower costs
- Increased accessibility
- Complete portability
- Higher scalability
- Clearer voice quality

Disadvantages:
- Reliable internet connection required
- Susceptible to network jitter

69
Q

Access Methods for Mobile Networks
CDMA
Code Division Multiple Access

A

cellular network technologies used to transmit voice and data between mobile devices and cell towers.

With a CDMA phone, it’ll be locked to a carrier and won’t use a SIM card. Instead of an actual SIM card a CDMA phone will be linked to the network via a phone number.

70
Q

Access Methods for Mobile Networks
TDMA
Time Division Multiple Access

A

TDMA has the advantage in that it enables allocation of different numbers of time slots per frame to different users. Thus, bandwidth can be supplied on demand to different users by concatenating or reassigning time slots based on priority

71
Q

Access Methods for Mobile Networks
GSM
The Global System for Mobile Communications

A

an open and digital cellular technology used for mobile communication. It uses 4 different frequency bands of 850 MHz, 900 MHz, 1800 MHz and 1900 MHz . It uses the combination of FDMA and TDMA.

The standard is not only used for the transmission of telephony, but also for data transmissions or for the transmission of short messages.

72
Q

l
Access Methods for Mobile Networks
GPRS
General Packet Radio Service

A

2G enhancement added to 2G GSM networks to offer basic mobile data services at much lower data rates.

A GSM/GPRS modem is a class of wireless modems, designed for communication over the GSM and GPRS network. It requires a SIM (Subscriber Identity Module) card just like mobile phones to activate communication with the network.

73
Q

Networking Considerations

A
  • Cost
  • Security
  • Management
  • Expandability
  • Interconnectivity
  • wired vs wireless
74
Q

Network Configuration
Multi-user

A

Multi-user network configuration enables multiple users to access shared resources and collaborate efficiently while maintaining security and control over network access and permissions. It’s like having a communal workspace where everyone can work together and share resources, but with proper measures in place to protect privacy and security.

75
Q

Network Configuration
Clint Sever

A

Certainly! In a client-server network setup:

  1. Client: A client is a device or software application that requests services or resources from a server. This can be a computer, smartphone, or any other device that interacts with the server.
  2. Server: A server is a powerful computer or software application that provides services or resources to clients. Servers are designed to handle multiple client requests simultaneously.
  3. Communication: Clients and servers communicate with each other over a network, typically using protocols like HTTP, FTP
  4. Roles:
    • Client: Initiates requests for services or resources. For example, a web browser (client) requests web pages from a web server.
    • Server: Listens for incoming requests from clients and processes them. It responds to client requests by providing the requested services or resources.
  5. Examples:
    • Web Browsing: When you use a web browser to access a website, your computer (client) sends a request to the web server hosting the site. The server then responds by sending the requested web page back to your browser.
    • Email: When you send an email, your email client (like Outlook or Gmail) acts as the client, while the email server (like Gmail’s server) stores and delivers your emails.
  1. Scalability: Servers can handle multiple client requests simultaneously, allowing the system to scale to accommodate more users.
  2. Centralized Management: Centralizing resources and services on servers makes it easier to manage and maintain them.
  3. Resource Sharing: Servers can provide shared resources such as files, printers, and databases to multiple clients, facilitating collaboration and efficiency.
  4. Security: Centralized control over resources allows for better security management, such as access control and encryption.
  1. Single Point of Failure: If the server fails, all clients relying on its services may be affected.
  2. Cost: Setting up and maintaining servers can be expensive, especially for small-scale deployments.
  3. Network Dependency: Clients rely on network connectivity to access server resources. Network issues can disrupt service availability.
  4. Complexity: Designing and implementing client-server applications can be complex, especially for distributed systems with multiple servers and clients.
76
Q

Network Configuration
Centralized vs Distributed System

A

Certainly! Let’s break down centralized and distributed systems in simple terms:

  • Concept: In a centralized system, all resources and decision-making authority are concentrated in a single location or entity.
  • Characteristics:
    1. Single Point of Control: There is one central entity that controls and manages all resources and operations.
    2. Resource Concentration: All resources (such as data, processing power, and storage) are located in one place.
    3. Scalability Challenges: Scaling the system may be limited by the capacity of the central entity.
  • Example: A traditional office where all data, applications, and servers are housed within a single on-premises data center controlled by the IT department.
  • Concept: In a distributed system, resources and decision-making authority are spread across multiple interconnected nodes or locations.
  • Characteristics:
    1. Decentralized Control: Resources and operations are distributed across multiple nodes, each with its own degree of autonomy.
    2. Resource Distribution: Resources are distributed geographically or logically across multiple nodes, which can be located anywhere.
    3. Scalability: Distributed systems can scale more easily by adding more nodes or resources as needed.
  • Example: Cloud computing platforms like AWS or Google Cloud, where data and applications are hosted on servers distributed across multiple data centers worldwide.
  • Advantages:
    1. Easier management and control.
    2. Lower initial setup costs.
    3. Simpler architecture.
  • Disadvantages:
    1. Single point of failure.
    2. Limited scalability.
    3. Network congestion and performance issues.
  • Advantages:
    1. Redundancy and fault tolerance.
    2. Scalability and flexibility.
    3. Geographic distribution for improved performance and reliability.
  • Disadvantages:
    1. Complex design and management.
    2. Higher initial setup and maintenance costs.
    3. Synchronization and consistency challenges.
  • Centralized System: All resources and control are concentrated in one location, which can be simpler to manage but may suffer from scalability and reliability issues.
  • Distributed System: Resources and control are spread across multiple locations or nodes, offering scalability, fault tolerance, and improved performance, but requiring more complex design and management.
77
Q

Network Configuration
Peer to Peer

A

Certainly! Peer-to-peer (P2P) is a network architecture where computers, called peers, communicate directly with each other without the need for a central server. Here’s a simplified explanation:

Peer-to-Peer (P2P) Network:

•	Concept: In a peer-to-peer network, every computer (or node) can act as both a client and a server. Peers share resources directly with each other, without relying on a central server.
•	Characteristics:
1.	Decentralized: There is no central server controlling the network. Each peer has equal status and can communicate directly with other peers.
2.	Resource Sharing: Peers share resources such as files, processing power, and bandwidth with each other.
3.	Self-Organization: Peers dynamically join and leave the network without centralized control.
•	Examples:
•	File Sharing: Platforms like BitTorrent enable users to share files directly with each other without a central server.
•	Messaging Apps: Some messaging apps, like WhatsApp or Signal, use a peer-to-peer architecture for sending messages directly between users.
•	Advantages:
1.	Decentralization: No single point of failure, making the network more resilient.
2.	Scalability: Can easily scale as more peers join the network.
3.	Efficiency: Direct communication between peers can be faster and more efficient than going through a central server.
4.	Privacy: Data stays within the peer network, reducing the risk of third-party surveillance.
•	Disadvantages:
1.	Security Risks: P2P networks can be vulnerable to security threats like malware and unauthorized access.
2.	Dependency on Peers: Relies on the availability and reliability of other peers in the network.
3.	Content Control: Difficult to enforce content control and copyright protection in decentralized file-sharing networks.

Summary:

Peer-to-peer (P2P) networks allow computers to communicate directly with each other without relying on a central server. They offer decentralization, scalability, and efficiency but come with security risks and challenges in content control. It’s like a group of friends sharing resources and helping each other directly without needing a leader or coordinator.

78
Q

Network Security
Firewalls

A

A firewall is a security system that acts as a barrier between your computer or network and the internet, monitoring and controlling traffic to protect against unauthorized access and cyber threats. It’s like having a vigilant security guard protecting your digital space from intruders.