Arushi

Arushi

86 Articles Published

Articles by Arushi

86 articles

zipapp - Manage executable Python zip archives

Arushi
Arushi
Updated on 25-Mar-2026 791 Views

The zipapp module was introduced in Python 3.5 to manage executable Python zip archives. This module allows you to package Python applications into a single executable .pyz file that can be run directly by the Python interpreter. Creating a Basic Executable Archive To create an executable archive, you need a directory containing Python code with a main function. Let's create a simple example ? First, create a directory called myapp and add an example.py file: def main(): print('Hello World') if __name__ == '__main__': main() ...

Read More

Access to the underlying platform's identifying data in Python

Arushi
Arushi
Updated on 25-Mar-2026 342 Views

The platform module in Python provides functions to access information about the underlying system's hardware, operating system, and interpreter version. This is useful for system administration, debugging, and creating platform-specific code. Basic System Information architecture() This function queries the given executable (defaults to the Python interpreter executable) for various architecture information − import platform print(platform.architecture()) ('64bit', '') machine() This function returns the machine type, e.g. 'i386'. An empty string is returned if the value cannot be determined − import platform print(platform.machine()) x86_64 ...

Read More

Connectionless Services

Arushi
Arushi
Updated on 16-Mar-2026 5K+ Views

A Connectionless service is a data communication method between two nodes where the sender transmits data without establishing a dedicated connection or ensuring the receiver's availability. In this model, each data packet contains complete destination addressing information and is routed independently of other packets through the network. Unlike connection-oriented services, connectionless communication requires no initial handshake or connection setup. Data packets, called datagrams, may take different paths to reach their destination, with the network making routing decisions independently for each packet. Connectionless Service - Independent Packet Routing Sender ...

Read More

The Host-to-Network Layer in TCP/IP Model

Arushi
Arushi
Updated on 16-Mar-2026 6K+ Views

The host-to-network layer is the lowest layer of the TCP/IP model and is concerned with the physical transmission of data. It is also called a network interface layer or link layer. It can be considered as the combination of physical layer and data link layer of the OSI model. Functions of Host-to-Network Layer Bit encoding − It defines how bits are to be encoded into optical or electrical pulses. Frame encapsulation − It accepts IP packets from the network layer and encapsulates them into frames. It synchronizes the transmission of the frames as well ...

Read More

Examples of Existing Networks

Arushi
Arushi
Updated on 16-Mar-2026 694 Views

Some of the prominently used networks in today's world are examples that showcase different networking technologies and their applications in various domains. Internet The Internet is a global collection of interconnected networks that use the TCP/IP protocol suite to communicate. It represents the largest wide area network, connecting billions of devices worldwide through a decentralized architecture. The Internet encompasses private, public, academic, commercial, and government networks, but no single organization controls it entirely. This distributed control model ensures resilience and global accessibility. Internet - Global Network of Networks ...

Read More

Collision-Free Protocols

Arushi
Arushi
Updated on 16-Mar-2026 21K+ Views

In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled. This event is called collision. The Medium Access Control (MAC) layer of the OSI model is responsible for handling collision of frames. Collision-free protocols are devised so that collisions do not occur. Protocols like CSMA/CD and CSMA/CA nullify the possibility of collisions once the transmission channel is acquired by any station. However, collision can still occur during the contention period if more than one station starts to transmit at the same time. Collision-free protocols resolve collision in the ...

Read More

Reservation Protocols in Computer Network

Arushi
Arushi
Updated on 16-Mar-2026 6K+ Views

Reservation protocols are a class of protocols where stations wishing to transmit data announce their transmission intent before actual data transfer. These protocols operate in the medium access control (MAC) layer and transport layer of the OSI model to ensure collision-free communication. In these protocols, there is a contention period prior to transmission. During this period, each station broadcasts its desire for transmission. Once all stations announce themselves, one or more of them get the desired network resources based upon agreed criteria. Since each station has complete knowledge of whether every other station wants to transmit, all possibilities of ...

Read More

Home Networks

Arushi
Arushi
Updated on 16-Mar-2026 2K+ Views

A home network is a small-sized LAN that is used to connect devices within the small area of a home. It facilitates sharing of files, peripheral devices, programs, and Internet access among the computers in a home. Home networks may be wired, i.e., connections within devices are done with cables; or wireless, i.e., connections are provided using Wi-Fi and Bluetooth. Most modern home networks use a combination of both wired and wireless connections. A typical setup involves an Internet Service Provider (ISP) connection coming into a modem, which connects to a wireless router that distributes the network to all ...

Read More

Why do we use the novalidate attribute in HTML?

Arushi
Arushi
Updated on 16-Mar-2026 6K+ Views

The novalidate attribute in HTML is a Boolean attribute that disables the browser's built-in form validation when a form is submitted. When applied to a element, it allows users to submit forms even if required fields are empty or contain invalid data according to HTML5 validation rules. This attribute is particularly useful when you want to implement custom client-side validation using JavaScript, save form progress for later completion, or handle validation entirely on the server side. Syntax Following is the syntax for the novalidate attribute − ...

Read More

How to automatically redirect a Web Page to another URL?

Arushi
Arushi
Updated on 16-Mar-2026 46K+ Views

Page redirection is a technique where visitors clicking on a URL are automatically directed to a different page than originally intended. This happens seamlessly in the background and is commonly used for moving content, temporary maintenance pages, or directing users to updated URLs. To redirect from an HTML page, use the meta tag with the http-equiv attribute. This attribute provides an HTTP header for the value of the content attribute, which specifies the number of seconds to wait before redirecting and the destination URL. Syntax Following is the syntax for HTML page redirection using the meta tag ...

Read More
Showing 1–10 of 86 articles
« Prev 1 2 3 4 5 9 Next »
Advertisements