Knowledge in computer science information technology

Introduction to Eyegaze Technology

The Eye gaze System is a direct-select vision-controlled communication and control system. It was developed in FAIRFAX, Virginia by LCTechnologies. This system is mainly used for the people with complex physical disabilities. Its users are adults and children with cerebral palsy, spinal cord injuries, brain injuries, ALS, multiple sclerosis, brainstem strokes. Good control of one eye Adequate vision Ability to maintain a position in front of the Eye gaze monitor. Mental abilities that improve the probability for successful Eyegaze use: Cognition Ability to read Memory

Multiple Access -Data Communications

It consists of typed notes of Multiple Access. It is shared with me by a student studying at FCRIT, Vashi, and I thought of uploading it here so that the students of first and second-year IT Engineering would benefit a lot from it. Thank You! Enjoy learning.

Memory Organisation- W. Stallings and B. Govindarajalu

Contents:- Introduction to Memory Memory parameters Classifications of memories. Types of RAM and ROM Allocation policies ( First, best, next, worst fit policies ) Memory hierarchy and characteristics. Cache memory: Concept, architecture (L1, L2, L3), mapping techniques Cache Coherency, Interleaved and Associative memory

Data Representation and Arithmetic Algorithms

It consists of typed notes of Data representation and Arithmetic Algorithms. It is shared with me by a student studying at FCRIT, Vashi, and I thought of uploading it here so that the students of first and second-year ITE and CSE would benefit a lot from it. Thank You! Enjoy learning. To understand : 1. Different data ( number ) representation systems like: Binary Data representation Two’s Complement representation Floating Pointing representation IEEE 754 floating-point number representation 2. Different techniques for performing arithmetic operations on Integer and Floating point numbers. Integer Data Computation : Addition Subtraction Multiplication: Signed Multiplication, Booth’s Algorithm Division: Restoring and Non-Restoring division Floating-Point Arithmetic : Addition Subtraction

Input/Output - Organisation

Content: Input Output systems I / O modules and 8089 processor Types of data transfer techniques : Programmed I/O Interrupt driven I/O DMA FAQs covered in this PDF:- Frequently asked University questions : (10M) 1. Explain DMA based data transfer techniques for I/O devices. 2. Write detailed notes on ( All three very important) : 1. Programmed I/O 2. DMA 3. Interrupt driven I/O 3. What are the major requirements of an I/O module? 4. Explain the structure of an I/O module.

Entity-Relationship Model

Entity-Relationship Model ● Design Process ● Modeling ● Constraints ● E-R Diagram ● Design Issues ● Weak Entity Sets ● Extended E-R Features ● Design of the Bank Database ● Reduction to Relation Schemas ● Database Design ● UML Useful for the students who are learning the Database Management System and its a basic introduction to the topic of SQL and MongoDB. In this, we understand the need of the client and make the data base according to his needs.

Network Layer: Logical Addressing

Responsibilities of the Network layer 1. Host to Host (source to destination delivery of message)  To deliver packets from source to destination across multiple links (networks). Or Network layer works for the transmission of data from one host to the other located in different networks. 2. Logical Addressing  In order to identify each device on internetwork uniquely, the network layer defines an addressing scheme. The sender & receiver’s IP address is placed in the header by the network layer. Such an address distinguishes each device uniquely and universally. - Segment in the Network layer is referred to as Packet.  - Network layer is implemented by networking devices such as routers 3. Routing The network layer protocols determine which route is suitable from source to destination. This function of the network layer is known as routing. 4. Fragmentation and Reassembly The network layer must send data down to the data link layer for transmission. The data or information that the network layer receives is in the form of a packet and the data that data link layer forwards is called a frame. The network layer has the responsibility of Fragmentation and reassembly because some data link layer technologies have limits on the length of any message that can be sent. If the packet of data that the network layer has to send is too large, the network layer must break the packet up, send each packet to the data link layer, and then have pieces reassembled once they arrive at the network layer on the destination system.

Delivery, Forwarding, and Routing

The network layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Topics discussed in this section: Direct Versus Indirect Delivery

Process-to-Process Delivery: UDP, TCP, and SCTP

The transport layer is responsible for process-to-process delivery—the delivery of a packet, part of a message, from one process to another. Two processes communicate in a client/server relationship, as we will see later. The transport layer is responsible for process-to-process delivery.

Transmission Media -with types of Cables

Guided media, which are those that provide a conduit from one device to another, include twisted-pair cable, coaxial cable, and fiber-optic cable. Topics discussed in this section:- Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable

Congestion Control and Quality of Service

The main focus of congestion control and quality of service is data traffic. In congestion control, we try to avoid traffic congestion. In quality of service, we try to create an appropriate environment for the traffic. So, before talking about congestion control and quality of service, we discuss the data traffic itself. • Congestion occurs when a switch or router receives data faster than it can send it.