Search
  • dalilasalaza524xbi

Distributed Computing Sunita Mahajan Seema Shah Pdf Download Isadlau







1). The basis of computing. • All the computers talk together to find an answer. 2). All the computers are interconnected. 3). There is a one-way communication from one computer to all the other computers connected to it. • Similarly, there is a one-way communication from one computer to the user. • The remote computers and the user belong to different organisations and communicate using a protocol. A series of mathematical algorithms that carry out the task of converting a string of 0’s and 1’s into a string of the ASCII characters. 4.1.1 The conversion is done on the basis of the ASCII character table. 4.1.2 The transition from binary to ASCII is done by the use of four basic operations: the bit-swap (called byte-swap in IBM-PC computers), XOR, addition, and the multiplication of the bits. • The byte-swap, XOR and addition functions are used to to convert a byte from binary to ASCII. 4.1.3 The multiplication of bits is used to convert a byte from ASCII to binary. 4.1.4 The multiplication of bits is used to convert a character from binary to ASCII. 4.1.5 The multiplication of bits is used to convert a character from ASCII to binary. 4.2 CPU can work in two states: the first state is called the real mode and second state is called the protected mode. 4.3 The protected mode: 4.3.1 Is an extended mode of operation. 4.3.2 (1) Subroutines can be executed at a very high speed. 4.3.3 (2) The 8086 instruction set support a protected mode. 4.3.4 (3) The 8086 processor is a 32-bit (4-byte) architecture. 4.3.5 (4) Only one segment can be used in protected mode. 4.3.6 (5) Each segment is identified with a unique number. 4.3.7 (6) Segments can be switched by software.


Related links:

0 views0 comments