Operating system abstractions, Operating System

Assignment Help:

When we download a movie from the Internet, we don't care about, say, packet sizes. However, even ifwe are not aware of howlow-level details of networks are implemented, our data is actually being sent as lots of small packets, some of which might be lost or arrive out of order. Therefore, it is important that the protocols we use guarantee that we won't have to deal with any of these problems. In other words, all we want is a simple interface that solves our problem; this interface for network programming will be provided by the operating system. Some of these abstractions are:

process-to-process communication

remote function calls

security

hosts have human-readable names

ordered, reliable communication

streams of bytes, instead of discrete packets

support for large messages

routing to ?nal destination

independence from the low-level network and hardware details


Related Discussions:- Operating system abstractions

Linux os, Introduction of linux

Introduction of linux

Essential properties of operating system, Essential Properties of Operating...

Essential Properties of Operating System 1. Batch: Jobs with similar needs are batched together and run through the computer as a group by an operator or automatic job sequen

Process, what common event leads to the creation of a process?

what common event leads to the creation of a process?

Fundamental of operating system, An operating system provides the environme...

An operating system provides the environment within that programs are executed. Internally operating systems differ greatly in their makeup because they are organized along many di

What are the different accessing methods of a file, What are the different ...

What are the different accessing methods of a file? The different types of accessing a file are: Sequential access: Information in the file is accessed sequentially

Explain what is file structure, Problem 1. List out the conditions that...

Problem 1. List out the conditions that result in Deadlock situations. Illustrate deadlock situation with a simple graphical notation Listing conditions for deadlock occu

Peer to peer network and a client server network, Question : a) Describ...

Question : a) Describe the difference between the authentication of a user account on a peer to peer network and a client server network. b) Compare an end user account with

How does user specify block to be fetched in direct access, How does user s...

How does user specify block to be fetched in direct access? By specifying the relative block number, relative to first block in file, which is block 0.

Linux operation system, wat are the commands used for creating the file hie...

wat are the commands used for creating the file hierarchy

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd