Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Arushi
86 articles
zipapp - Manage executable Python zip archives
The zipapp module was introduced in Python 3.5 to manage executable Python zip archives. This module allows you to package Python applications into a single executable .pyz file that can be run directly by the Python interpreter. Creating a Basic Executable Archive To create an executable archive, you need a directory containing Python code with a main function. Let's create a simple example ? First, create a directory called myapp and add an example.py file: def main(): print('Hello World') if __name__ == '__main__': main() ...
Read MoreAccess to the underlying platform's identifying data in Python
The platform module in Python provides functions to access information about the underlying system's hardware, operating system, and interpreter version. This is useful for system administration, debugging, and creating platform-specific code. Basic System Information architecture() This function queries the given executable (defaults to the Python interpreter executable) for various architecture information − import platform print(platform.architecture()) ('64bit', '') machine() This function returns the machine type, e.g. 'i386'. An empty string is returned if the value cannot be determined − import platform print(platform.machine()) x86_64 ...
Read MoreConnectionless Services
A Connectionless service is a data communication method between two nodes where the sender transmits data without establishing a dedicated connection or ensuring the receiver's availability. In this model, each data packet contains complete destination addressing information and is routed independently of other packets through the network. Unlike connection-oriented services, connectionless communication requires no initial handshake or connection setup. Data packets, called datagrams, may take different paths to reach their destination, with the network making routing decisions independently for each packet. Connectionless Service - Independent Packet Routing Sender ...
Read MoreThe Host-to-Network Layer in TCP/IP Model
The host-to-network layer is the lowest layer of the TCP/IP model and is concerned with the physical transmission of data. It is also called a network interface layer or link layer. It can be considered as the combination of physical layer and data link layer of the OSI model. Functions of Host-to-Network Layer Bit encoding − It defines how bits are to be encoded into optical or electrical pulses. Frame encapsulation − It accepts IP packets from the network layer and encapsulates them into frames. It synchronizes the transmission of the frames as well ...
Read MoreExamples of Existing Networks
Some of the prominently used networks in today's world are examples that showcase different networking technologies and their applications in various domains. Internet The Internet is a global collection of interconnected networks that use the TCP/IP protocol suite to communicate. It represents the largest wide area network, connecting billions of devices worldwide through a decentralized architecture. The Internet encompasses private, public, academic, commercial, and government networks, but no single organization controls it entirely. This distributed control model ensures resilience and global accessibility. Internet - Global Network of Networks ...
Read MoreCollision-Free Protocols
In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled. This event is called collision. The Medium Access Control (MAC) layer of the OSI model is responsible for handling collision of frames. Collision-free protocols are devised so that collisions do not occur. Protocols like CSMA/CD and CSMA/CA nullify the possibility of collisions once the transmission channel is acquired by any station. However, collision can still occur during the contention period if more than one station starts to transmit at the same time. Collision-free protocols resolve collision in the ...
Read MoreReservation Protocols in Computer Network
Reservation protocols are a class of protocols where stations wishing to transmit data announce their transmission intent before actual data transfer. These protocols operate in the medium access control (MAC) layer and transport layer of the OSI model to ensure collision-free communication. In these protocols, there is a contention period prior to transmission. During this period, each station broadcasts its desire for transmission. Once all stations announce themselves, one or more of them get the desired network resources based upon agreed criteria. Since each station has complete knowledge of whether every other station wants to transmit, all possibilities of ...
Read MoreHome Networks
A home network is a small-sized LAN that is used to connect devices within the small area of a home. It facilitates sharing of files, peripheral devices, programs, and Internet access among the computers in a home. Home networks may be wired, i.e., connections within devices are done with cables; or wireless, i.e., connections are provided using Wi-Fi and Bluetooth. Most modern home networks use a combination of both wired and wireless connections. A typical setup involves an Internet Service Provider (ISP) connection coming into a modem, which connects to a wireless router that distributes the network to all ...
Read MoreWhy do we use the novalidate attribute in HTML?
The novalidate attribute in HTML is a Boolean attribute that disables the browser's built-in form validation when a form is submitted. When applied to a element, it allows users to submit forms even if required fields are empty or contain invalid data according to HTML5 validation rules. This attribute is particularly useful when you want to implement custom client-side validation using JavaScript, save form progress for later completion, or handle validation entirely on the server side. Syntax Following is the syntax for the novalidate attribute − ...
Read MoreHow to automatically redirect a Web Page to another URL?
Page redirection is a technique where visitors clicking on a URL are automatically directed to a different page than originally intended. This happens seamlessly in the background and is commonly used for moving content, temporary maintenance pages, or directing users to updated URLs. To redirect from an HTML page, use the meta tag with the http-equiv attribute. This attribute provides an HTTP header for the value of the content attribute, which specifies the number of seconds to wait before redirecting and the destination URL. Syntax Following is the syntax for HTML page redirection using the meta tag ...
Read More