Regular Languages, Expressions, and Automata
Item 2 – Regular Languages
2.1 – Languages on Literacy
Consider the alphabet = {a, b}. For all natural numbers n, there are only a finite number of words whose length is n. These strings can be ordered lexicographically, numbered 0, 1, 2… For example, for length 1: 0 is a, 1 is b. For length 2: 0 is aa, 1 is ab, and so on. So, assuming an arbitrary alphabet Q, since all alphabets are finite, we can assign an arbitrary order to the characters. Without loss of generality, we can write Q = {a0, a1,
Read MoreSemantics, Typing, and Paradigms in Programming Languages
Operational Semantics
Describes the meaning of a program in terms of its execution on an abstract machine or step-by-step behavior. It is concerned with how a program executes (correctness).
Denotational Semantics
Maps programs to mathematical objects (functions, sets, etc.) to describe their meaning. It focuses on what a program computes, abstracting away how it executes.
Axiomatic Semantics
Specifies the behavior of programs using logical assertions (preconditions and postconditions). It is used to
Read MoreOperating Systems: Core Concepts and Mechanisms
Distributed and Parallel Operating Systems
Distributed Operating Systems:
- Manages a group of independent computers and makes them appear as a single system to the user.
- Focuses on resource sharing, fault tolerance, and transparency.
- Examples: Network OS, Cloud OS.
Parallel Operating Systems:
- Manages multiple processors in a single system to perform tasks simultaneously.
- Aims to enhance computation speed and resource utilization.
- Examples: Symmetric Multiprocessing (SMP), Cluster systems.
Critical Section
Read MoreKey Network Protocols: IPv4, DHCP, SMTP, DNS, UDP, TCP, FTP, HTTP
Internet Protocol Version 4 (IPv4)
Internet Protocol version 4 (IPv4) is a network layer protocol in the TCP/IP suite used to uniquely identify devices and route packets across networks. It provides a logical addressing mechanism and ensures data delivery between devices on different networks.
Key Features of IPv4
- 32-bit Addressing: IPv4 uses 32-bit addresses, providing approximately 4.3 billion unique addresses. Example:
192.168.1.1
. - Packet-Based Communication: Data is broken into packets for transmission
System Reliability, Security, and Access Control in Computing
What is a System?
A system is a set of organized elements that interact.
System Failure Tolerance
What does it mean to be tolerant to system failure? It allows a system to continue operating properly in case of a failure. This is achieved by doubling every system component.
Reliability
Attributes:
- Reliability: Continuity of service.
- Availability: Percentage of time the service is operational.
- Safety: Avoidance of catastrophic consequences.
- Security: Prevention of unauthorized access or intrusion.
System Reliability
- Fault
Network Security: Firewalls, Viruses, and Encryption
What is a Firewall?
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (like the internet), helping to prevent unauthorized access.
Types of Firewalls
- Packet-Filtering Firewall:
- It inspects each packet of data and checks the source, destination, port number, and protocol against a set of rules.
- Simple and fast but not very