Operating system abstractions, Operating System

Assignment Help:

When we download a movie from the Internet, we don't care about, say, packet sizes. However, even ifwe are not aware of howlow-level details of networks are implemented, our data is actually being sent as lots of small packets, some of which might be lost or arrive out of order. Therefore, it is important that the protocols we use guarantee that we won't have to deal with any of these problems. In other words, all we want is a simple interface that solves our problem; this interface for network programming will be provided by the operating system. Some of these abstractions are:

process-to-process communication

remote function calls

security

hosts have human-readable names

ordered, reliable communication

streams of bytes, instead of discrete packets

support for large messages

routing to ?nal destination

independence from the low-level network and hardware details


Related Discussions:- Operating system abstractions

#network OS, what are the design issues of network OS

what are the design issues of network OS

Major differences between capability lists and access lists, Q. What are th...

Q. What are the major differences between capability lists and access lists? Answer: An access list is a list for each object consisting of the domains with a nonempty set of

Protection, protection in operating system

protection in operating system

Socket, socket based fortune teller sever.your program should create a serv...

socket based fortune teller sever.your program should create a server that listens to a specific port when a client receives a connection the server should respond with a random fo

What is low-level formatting, What is low-level formatting? Before a di...

What is low-level formatting? Before a disk can kept data, it must be required into sectors that the disk controller can read and write. This procedure is called low-level form

What are batch systems, What are batch systems? Batch systems are quite...

What are batch systems? Batch systems are quite appropriate for implementing large jobs that need little interaction. The user can submit jobs and return later for the results.

10 marks, Differentiate between sequential access and direct access method?...

Differentiate between sequential access and direct access method?

Locks - mutexes, Locks (also known as mutexes, short for mutual exclusion l...

Locks (also known as mutexes, short for mutual exclusion locks) provide mutual exclusion to shared data inside a critical session. They are implemented by means of two atomic routi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd