You are on page 1of 4

A network protocol is an established set of rules that determine how data is transmitted

between different devices in the same network.

Eg: TCP, IP, HTTP

Network topologies : – Bus – Star – String – Extended Star – Ring – Tree – Mesh

Circuit switching is a type of network configuration in which a physical path is


obtained and dedicated to a single connection between two endpoints in the
network for the duration of a dedicated connection.

In Time Division Multiplexing technique, the total time available in the channel is
distributed among different users

Frequency Division Multiplexing is a technique in which the available bandwidth of a


single transmission medium is subdivided into several channels.

statistical multiplexing : bandwidth shared on demand . – Resource sharing is better


– Better link utilization - Simpler, no call setup

Layering : explicit structure allows identification, relationship of complex system’s


pieces.

Presentation and session in iso


Application : It allows a user to access, retrieve and manage files in a remote computer

HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to
access the data over the world wide web.Readable text-based commands, unlike
binary or code-based commands, and information are used for communication

Non persistent HTTP Uses separate TCP connections for each object

a cache is a hardware or software component that stores data so that future


requests for that data can be served faster.

A cookie is a piece of data from a website that is stored within a web browser
that the website can retrieve at a later time.

Applications use Network APIs for accessing network services.


computer architecture is a set of rules and methods that describe the functionality,
organization, and implementation of computer systems.

Bus : A communication pathway connecting two or more devices

In computer architecture, a control bus is part of the system bus and is used by CPUs for
communicating with other devices within the computer.

Random Access Memory (RAM) –

● It is also called read-write memory or the main memory or the primary memory.
● The programs and data that the CPU requires during the execution of a program
are stored in this memory
● ROM
● Stores crucial information essential to operate the system, like the
program essential to boot the computer.
● It is not volatile.
● Always retains its data.

Aloha is a packet switching system. Aloha is a random access technique.

In pure ALOHA, the nodes transmit frames whenever there is data to send.

In pure ALOHA, the sender will expect acknowledgement from the receiver.

If acknowledgement is not received within specified time, the sender node assumes
that the frame has been destroyed and the node waits for a random amount of time
and sends it again.
Slotted ALOHA was introduced to improve the efficiency of pure ALOHA, because in
pure ALOHA there is a high chance of collision.

Step 2 − In this protocol, the time of the shared channel is divided into discrete
intervals called as slots.

Step 3 − The stations can send a frame only at the beginning of the slot and only
one frame is sent in each slot.

RISC stands for Reduced Instruction Set Computers. RISC is a microprocessor and as the name
indicates, it performs a smaller number of computer instructions.

CICS stands for Complex Instruction Set Computer. CISC is the kind of chip that can be easily
programmed and makes the best and efficient use of memory.

It has a large number of complex instructions that range from simple to very
complex and specialized in the assembly language level

Pipelining is a technique where multiple instructions are overlapped during execution.

You might also like