This site works best with JavaScript enabled
Sign In
Discussions
Activity
Sign In
005.01.04. Resource Allocation
Drivers allocate and manage memory addresses required by processes ensuring that devices do not conflict over memory space. Memory is allocated using kmalloc and vmalloc functions in kernel and user space.
Challenges of cross communication of da…
by
nirmalpg124
May 8
005.01.Introduction To Device Drivers
permalink
Virtual memory in Linux kernel
Virtual memory is a memory management technique that enables programs to operate under the assumption that they have access to a large, contiguous block of memory, even though physical memory may be limited. It allows programs to utilize disk space …
by
mohdmohsinkhanee
April 10
Pravjot Sir Classes
permalink
Implementing Merge Sort in C
Hi Mohsin,
Thanks for breaking down the merge sort Implementation.
Merge Sort shines in a few key areas compared to other sorting algorithms:
Efficiency for large datasets: Merge Sort boasts a time complexity of O(n log n) in all cases, includ…
by
sumacangadi
March 28
Pravjot Sir Classes
permalink
Implementing Merge Sort in C
OUTPUT->./a.out Enter size of Array -> 10Enter Value -> 15Enter Value -> 34Enter Value -> 21Enter Value -> 13Enter Value -> 6Enter Value -> 38Enter Value -> 57Enter Value -> 69Enter Value -> 27Enter Value -> 10
O…
by
mohdmohsinkhanee
March 26
Pravjot Sir Classes
permalink
6.how is an IPv6 address breakdown
IN IPv6 Subnets are denoted using CIDR notation . For the end user, they cover half of the available bits in the address space(/64) but there are instances where fewer are used. Interface id of each host is unique as there are different interfaces c…
by
akashbhandari
March 20
014.01.24.IPv6 Addresses And Networks
permalink
5.significance of the subnet and interface ID
The significance of the subnet and interface id in IPv6 it's tells the user about the family of hosts being used, and interface id helps in differentiating the addresses since they are unique for each host. For average end user, they often cove…
by
akashbhandari
March 20
014.01.24.IPv6 Addresses And Networks
permalink
3.Where does application layer processing occur?
Application layer processing occur in User Space .Application layer protocol that is often combined with another is TLS(Transport Layer Security) .TLS(Transport Layer Security) is often combined with HTTP(hyper Text Transfer Protocol) to form HTTPS .
by
akashbhandari
March 18
014.01.16.NetworkLayers
permalink
7.How does breaking messages into smaller units aid in error detection and compensa
Breaking messages into smaller units provide aid in error detection and compensation during transmission because sending a large chunk of message all at once may not be delivered as we want or single transmission line might not to be able to handled…
by
akashbhandari
March 15
014.01.14.Packets-IQs
permalink
5.Why is it possible for several hosts to communicate simultaneously in a network?
It is possible for several hosts to communicate simultaneously in a network because A Host can send and receive packets in any order regardless of where they come from or where they're going which make it possible for several host to communicat…
by
akashbhandari
March 15
014.01.14.Packets-IQs
permalink
Understanding Static Behavior in C: Beyond Variables
In our previous discussion, we delved into the behavior of static variables in C, with a focus on Example 1. Now, let's continue our exploration by diving into Example 2 to further understand the nuances of static elements.
Example 2
// main.…
by
mohdmohsinkhanee
February 24
Pravjot Sir Classes
permalink
6. Explain the significance of the init process in the Linux boot process.
The init process, marked by PID 1, is the initial user-space process. In modern Linux distributions, it is commonly known as systemd. The systemd plays a vital role in handling both the initiation of the system and the management of services and pro…
by
mohdmohsinkhanee
February 17
009.01.Linux Boot Process
permalink
3. Explain role of Linux in development of router software. what steps did they take to adapt
Manufacturers chose Linux as the foundation for router software. They leveraged Linux by incorporating essential kernel features, streamlining user-space software, and developing GUI-based administration interfaces to adapt it specifically for route…
by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
permalink
4. Describe the sequence of events during kernel initialization in the Linux boot process
On power button on the firmware runs at first which loads the bootloader for loading the kernel in RAM, the bootloader then loads the kernel.Nex init process having PID 1 is started. Then other user space applications are started. Finally the login …
by
nirmalpg124
February 12
009.01.Linux Boot Process
permalink
6. Explain the significance of the init process in the Linux boot process.
Init process initalises the first user space application on startup of the linux kernel.
by
nirmalpg124
February 12
009.01.Linux Boot Process
permalink
6. Explain the significance of the init process in the Linux boot process.
The init process is the first user-space process. It has a PID 1. In modern Linux distribution, it is known as systemd . System d manages system initialization and management of system services and processes.
by
gaurav133232
February 11
009.01.Linux Boot Process
permalink
5.Linux utilities iw and wpa_supplicant in the context of configuring wireless networks.
iw utility helps in viewing and changing the kernel space device and network configuration. To use iw, one needs to know about the network interface for the device. wpa_supplicant manages both authentication and encryption for the wireless network i…
by
gaurav133232
February 8
014.01.64.Wireless Ethernet
permalink
1. What is the role of transport layer protocols in networking
Transport layer protocols play a crucial role in networking by acting as a bridge between the raw packets handled by the internet layer and the specific requirements of applications. They are essential for user-space programs because dealing directl…
by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
permalink
10.significance of the loopback interface (lo) in network configuration
The loopback interface (lo) is a virtual network interface designed to loop back to the machine itself. Connecting to 127.0.0.1 (or ::1 in IPv6) establishes a connection to the local machine. Notably:The netmask for the loopback interface is /8 (255…
by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
permalink
3. Explain role of Linux in development of router software. what steps did they take to adapt
Linux was the solution decided by the manufacturers to power the routers. Linux was leveraged by adding the necessary kernel features, stripping down the user space software, and creating GUI-based administration interfaces.
by
gaurav133232
February 3
014.01.54.Routers And Linux
permalink
17.traffic goes through the router at the link-local address rather than its global IP address
The default route in IPv6, often denoted as ::/0, is configured to direct traffic through the router's link-local address. The router is primarily concerned with the destination of the traffic rather than its source. Utilizing the link-local ad…
by
mohdmohsinkhanee
February 1
014.01.24.IPv6 Addresses And Networks
permalink
More Results
Powered by
Vanilla
Howdy, Stranger!
It looks like you're new here. If you want to get involved, click one of these buttons!
Sign In
Apply for Membership