Control Stack in Compiler Design Tutorial
Control Stack in Compiler Design Tutorial Control Stack The flow of the control in a program corresponds to a depth first traversal f the activation tree that Starts at the root, Visits a node before its children, Recursively visits children at each node and a left-to-right order. A slack calledContinue Reading
Activation Tree in Compiler Design Tutorial with Examples
Activation Tree in Compiler Design Tutorial with Examples Activation Tree We can create a tree (known as activation tree) to show the way control enters and leaves activation. In an activation tree Each node represents an activation of a procedure. The root represents the activation of the main program. TheContinue Reading
Implementation of Symbol Table in Compiler Design Tutorial with Examples
Implementation of Symbol Table in Compiler Design Tutorial with Examples Symbol Tables Symbol table is a data structure meant to collect information about names appearing in the source program. It keeps track about the scope/binding information about names. Each entry in the symbol table has a pair of the formContinue Reading
Syntax Directed Translation in Compiler Design Tutorial with Examples
Syntax Directed Translation in Compiler Design Tutorial with Examples Syntax Directed Translation Grammar symbols are associated with attributes to associate information with the programming language constructs that they represent. Values of these attributes are evaluated by the semantic rules associated with the production rules. Evaluation of the semantic rules are asContinue Reading
Compiler Design Tutorial Notes Study Material with Examples
Compiler Design Tutorial Notes Study Material with Examples Compiler Design Compiler A compiler is a program written in one language (i.e., source language) and translate it into an equivalent program in a target language. This translation process could also report the errors in the source system, if any. Major PartsContinue Reading
RSA Algorithm in Cryptography and Network Security Tutorial
RSA Algorithm in Cryptography and Network Security Tutorial RSA Algorithm RSA is an algorithm for public key cryptography RSA (RIvest Shamir Adleman) Algorithm was publicly described in 1977. Mathematical Background of RSA Algorithm Extended Euclidean algorithm Given x, find y, such that x.y=1 mod m. The extended Euclidean algorithm can efficiently findContinue Reading
Cryptography and Network Security Tutorial for Beginners with Examples
Cryptography and Network Security Tutorial for Beginners with Examples Cryptography It is a science of converting a stream of text into coded form in such a way that that only the sender and receiver of the coded text can decode the text. Can decode the text. Now a days, computerContinue Reading
Security Services in Computer Network Security Tutorial with Examples
Security Services in Computer Network Security Tutorial with Examples Security Services These are two main categories of security services RFC 2828: It defines as a processing or communication service provided by a system to give a specific kind of protection to system resources. X.800: It defines as a service providedContinue Reading
Domain Name System Security Extensions Tutorial Notes with Examples
Domain Name System Security Extensions Tutorial Notes with Examples Domain Name System (DNS) To identify an entity, TCP/IP protocol uses the IP address which uniquely identifies the connection of a host to the Internet. However, people refer to use names instead of address. Therefore, we need a system that canContinue Reading
Routing and Switching Basics for Cyber and Network Security Tutorial
Routing and Switching Basics for Cyber and Network Security Tutorial Routing and Network Security Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for man y kinds of network, including the telephone network, electronic data networks and transportation networks RoutingContinue Reading