paper 3 dk Flashcards
(32 cards)
Outline the purpose of the Link layer in the TCP / IP protocol suite.
- To ensure correct network protocols are followed
- To enable the upper layers to access the physical medium // enables connection/ communication with the internet / network layer
- To be responsible for transporting data within the network/local segments
- To format the data into frames for transmission
- Maps IP addresses to MAC/Physical addresses.
State the reasons for including exception handling routines when writing a program.
- To trap (some) runtime errors
- To prevent a program halting unexpectedly
- To produce meaningful error messages for these errors
State how a digital certificate is obtained.
- enquiry made to Certificate Authority (CA)
- enquirer’s details checked by CA
- if enquirer details verified by CA then public key is agreed
- CA creates/issues certificate that includes the enquirers public key
- encrypting data sent to/by CA with the CA’s public/private key
Describe the purpose of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.
- The SSL and TLS protocols provide communications security over the internet / network
- … they provide encryption
- They enable two parties to identify and authenticate each other
- … and communicate with confidentiality and integrity.
Explain how SSL/TLS protocols are used when a client-server communication is initiated.
- An SSL/TLS connection is initiated by an application
- … which becomes the client
- The application which receives the connection becomes the server
- Every new session begins with a handshake
- The client requests the digital certificate from the server
- The client verifies the server’s digital certificate
- …and obtains the server’s public key
- The encryption algorithms are agreed
- The symmetric … session keys are generated / defined
insertion sort pseudocode
FOR index<- 1 TO LENGTH(Array)
temp <- Array[index]
count <- index -1
IF MyArray[count] >temp:
WHILE index >=0 AND Array[count]>temp
temp <- Array[count +1]
Array[count +1] <- Array[count]
Array[count] <- temp
Array[count] <- Array[count-1]
count <- count -1
END WHILE
Array[count+1] <- temp
NEXT index
Describe what is meant by a declarative programming language.
- Instructs a program on what needs to be done instead of how to do it
- … using facts and rules
- … using queries to satisfy goals.
- Can be logical or functional
- Logical - states a program as a set of logical relations
- Functional – constructed by applying functions to arguments / uses a mathematical style
why use user defined data types
built in types arent sufficient to represent data
store data of same or diff types (flexible)
can be encapsulated which ensures consistency and uniformity
Can be reused
HTTP process - how its used to request resources
- User types URL
- HTTP transmits request from application to transport (TCP)
- TCP creates packet and sends to destination ports
- DNS server uses domain name to look up IP address
- Server TCP sends back acknowledgement
- Now communication has been established the web server sends the web page back in HTML to the browser
- Browser displays page
FTP
- Used to transfer files from one device to another via internet/ networks
- Anonymous ftp - allows the user to access without identifying themself
- Ftp commands - a user can carry out actions that change files on an ftp server eg delete, close, rename
- Ftp server - where files are stored
components of ethernet data
- Destination - MAC address of the destination computer
- Source - MAC address of the source computer
- Ethernet type or length
- Frame check - includes a checksum to allow checking of data integrity
cluster
a number of computers with SIMD that are networked together
each processor performs a larger pseudo parallel system acting like a super computer
use of JK
several can produce shift registers in a comp
simple binary counter can be made by linking JK circuits
benefits of intermediate code (code generation)
supports
- use of relocatable code so program can be stored anywhere in main memory
- addition of library routines to minimise storage size
- linking of programs to run together
direct memory access controller (DMA)
allows hardware to access main memory independently of CPU
frees up the CPU to allow it to do other tasks while slower I/O operations take place
initiates data transfers - CPU does other tasks at same time
once data transfer is done an interrupt is sent to the CPU from the DMA
kernel
central component of OS
responsible for communication between hardware, software and memory
how OS hides complexity of hardware
using GUI interfaces
using device drivers (simplifies the complexity of hardware interfaces)
simplifying saving/ retrieving data from memory and storage
carrying out background utilities eg virus scanning
page replacement algorithms
first in first out
optimal page replacement
least recently used page replacement
second chance page replacement
AI
a machine with cognitive abilities eg problem solving and learning
split into:
- narrow
- general
- strong
ML vs DL
ML enables machine to make decisions based on past data - DL uses an ANN
ML only needs a little data to train - DL needs lots
ML identifies most features in data in advance - DL learns features of data from the data itself
ML uses modular approach - DL solves as one entity
ML takes long to test - DL testing is short
ML has clear rules explaining why each models stage was made - DL makes decisions based in its own reasoning - hard to understand (black box)
types of back propagation
static
- maps static inputs to static input
- mapping is instantaneous
- training is easier
recurrent
- activation is fed forward until a fixed value is achieved
- not instantaneous mapping
- training is harder
regression
way of analysing data before it is input into a system or model
used to make predictions from given data by learning some relationship between the input and the output
used in prediction eg weather forecasting
in ML used to predict the outcome of an event based on any relationship between variables
segmentation
space is broken into varying sized blocks called segments
Each segment has a name and size.
During execution segments from logical / virtual memory are loaded into physical memory.
The address is specified by the user
Segments are numbered
… and this number is used as an index in the segment map table.
A segment map table maps logical / virtual addresses to physical addresses
Outline how the kernel of an OS acts as an interrupt handler
the kernel receives a signal when an interrupt is generated
the kernel checks the priority and reviews the status/priority of the current interrupts
system enters kernel mode if the type of interrupt is of higher priority than the current process
saves the state of the interrupted process on the kernel stack
the kernel restores the process state e.g. contents of registers once the interrupt is serviced