You are on page 1of 2

Virtual memory is a feature of an operating system that enables a process to use a memory (RAM) address space that is independent

of other
processes running in the same system, and use a space that is larger than the actual amount of RAM present
In a system using virtual memory, the physical memory is divided into equally-sized pages. The memory addressed by a process is also divided
into logical pages of the same size. When a process references a memory address, the memory manager fetches from disk the page that
includes the referenced address, and places it in a vacant physical page in the RAM.
virtual memory is a memory management technique that is implemented using both hardware and software. It maps memory
addresses used by a program, called virtual addresses, into physical addresses in computer memory
A Virtual Memory system has the advantage of allowing more processes to run than the allowed memory size. This
is achieved by only including parts of processes that are necessary to run in memory, and the rest on disk
Virtual Memory can be implemented in one of two ways:- Paging,-Segmentation
Paging: During memory referencing, the consecutive addresses in the virtual address space that are referenced
are called pages. The corresponding range of consecutive addresses in the real, physical memory are called page
frames. Each page and its corresponding page frame must have the same size. The area on a Hard Disk that
stores page frames (or memory images) is usually called thepaging file or the swap file.
Deadlock is a situation in which two or more competing actions are each waiting for the other to finish, and thus
neither ever does.
a deadlock happens when two processes each within its own transaction updates two rows of information but in the
opposite order. For example, process A updates row 1 then row 2 in the exact timeframe process B updates row 2
then row 1. Process A can't finish updating row 2 until process B is finished, but it cannot finish updating row 1
until process A finishes. No matter how much time is allowed to pass, this situation will never resolve itself
EG: Traffic signal.
There are four conditions that are necessary to achieve deadlock:
Mutual Exclusion, Hold and Wait, No preemption, Circular Wait
HOW TO AVOID DEADLOCK-Mutual Exclusion,no premaption.
Port:When referring to a network or to the Internet, a software or network port is a location where information is
sent through. A commonly used and accessed port is port 80, which is the http port.we can get access to port from
netstat command/block from firewall.
When referring to a physical device, a hardware port is a hole or connection found on the back of a computer.
Hardware ports allow computers to have access to externaldevices such as computer printers.(USB PORT)
A port is associated with an IP address of the host, as well as the type of protocol used for
communication. The purpose of ports is to uniquely identify different applications or processes running on
a single computer.

transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP).
Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to
deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH,
FTP, Telnet.

The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the
names we type in our Web browser address bar to the IP addresses of Web servers hosting those
sites.
DNS implements a distributed database to store this name and address information for all public hosts
on the Internet. DNS assumes IP addresses do not change (are statically assigned rather than
dynamically assigned).


Whether you're accessing a Web site or sending e-mail, your computer uses a DNS server to look up the
domain name you're trying to access. The proper term for this process is DNS name resolution, and you
would say that the DNS server resolves the domain name to the IP address. For example, when you
enter "http://www.howstuffworks.com" in your browser, part of the network connection includes resolving
the domain name "howstuffworks.com" into an IP address, like 70.42.251.42, for HowStuffWorks' Web
servers.
You can always bypass a DNS lookup by entering 70.42.251.42 directly in your browser (give it a try).
However, you're probably more likely to remember "howstuffworks.com" when you want to return later. In
addition, a Web site's IP address can change over time, and some sites associate multiple IP addresses
with a single domain name.

You might also like