Mithlesh Upadhyay

Mithlesh Upadhyay

40 Articles Published

Articles by Mithlesh Upadhyay

40 articles

Operating System Based Virtualization

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 3K+ Views

Operating System-based Virtualization is a virtualization technique where virtualization software runs on top of a host operating system, creating isolated environments called containers. This approach allows multiple applications or services to run independently on the same physical hardware while sharing the underlying OS kernel. The virtualization layer creates abstraction between the hardware and applications, enabling better resource utilization and isolation. Unlike traditional virtualization that creates complete virtual machines, OS-based virtualization shares the host kernel among containers, making it more lightweight and efficient. Operating System-Based Virtualization Architecture Physical Hardware ...

Read More

Options Field in IPv4 Header

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 6K+ Views

The Options Field in the IPv4 header is a variable-length field that provides additional functionality and control over packet processing. While optional, it allows network administrators to customize packet handling for specific requirements such as routing control, security measures, and network diagnostics. The options field is located after the fixed 20-byte header and can extend up to 40 bytes. Its presence is indicated by the Header Length field value exceeding 5 (which represents the standard 20-byte header). Structure of IPv4 Header with Options IPv4 Header Structure ...

Read More

Outdoor Mobility Model | Gauss-Markov

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 865 Views

Mobility models simulate the movements of mobile nodes in wireless networks and are essential for ad-hoc network research. They significantly affect the performance and behavior of various network protocols. Mobility models are classified into two main categories: entity mobility models (where nodes move independently) and group mobility models (where node movements are correlated). The Gauss-Markov mobility model is an entity mobility model originally proposed for simulating personal communication service networks. This model captures realistic characteristics of outdoor mobility such as randomness, correlation, and variation in movement patterns. It uses a single tuning parameter to adjust the degree of randomness, ...

Read More

Overview of Application Delivery Network (ADN)

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 732 Views

Today, everyone uses digital devices to access websites and applications on the Internet. This has increased the need for cost-effective networks and better application delivery. To meet this demand, the Application Delivery Network (ADN) concept was developed. ADN reduces load times, solves IT problems faster, and ensures secure access to applications with proper visibility and availability. What is Application Delivery Network? An Application Delivery Network (ADN) is a network architecture that improves the delivery of web applications to end users across different locations and devices. It consists of three main components: Application Delivery Controllers (ADCs), WAN Optimization Controllers ...

Read More

Overview of Desk Area Network (DAN)

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 716 Views

A Desk Area Network (DAN) is a specialized network architecture designed for multimedia workstations that enables direct connection of multimedia devices and peripherals to the network. DAN uses Asynchronous Transfer Mode (ATM) technology to provide high-speed, reliable communication between multimedia devices, workstations, and peripheral equipment without requiring data to pass through the central workstation. Before DAN, multimedia devices like cameras, audio equipment, and displays had to communicate through the workstation, creating bottlenecks and reducing performance. DAN eliminates this limitation by allowing devices to connect directly to the network infrastructure. Architecture of DAN The DAN architecture consists of ...

Read More

Options Field in TCP Header

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 16-Mar-2026 3K+ Views

The TCP header contains essential information for reliable data transmission, including source and destination ports, sequence numbers, and control flags. One important component is the options field, which provides flexibility for protocol enhancements and optimizations. Options Field in TCP Header The options field is a variable-length component in the TCP header that allows for protocol extensions and enhancements. This field can range from 0 to 320 bits (0-40 bytes), depending on the data offset field size. The options field enables TCP to negotiate features, optimize performance, and adapt to varying network conditions during connection establishment and data transfer. ...

Read More

Overview of Dynamic Partition in Hive

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 14-Mar-2026 893 Views

Apache Hive is a data warehousing system built on Hadoop for analytics and MapReduce jobs. Partitioning divides large datasets into smaller parts for faster queries. Dynamic partitioning automatically determines partition values from the data being inserted, unlike static partitioning where values are manually specified. Static vs Dynamic Partitioning Feature Static Partitioning Dynamic Partitioning Partition values Manually specified per insert Automatically derived from data Best for Few known partitions Many or unknown partitions WHERE clause Required Not required Flexibility Low High Enabling Dynamic Partitioning ...

Read More

Oracle Label-Based Security

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 14-Mar-2026 1K+ Views

Oracle Label-Based Security (OLS) provides fine-grained, row-level access control based on security labels. Each row of data is assigned a sensitivity label (e.g., Confidential, Secret, Top Secret), and each user is assigned a clearance level. Users can only access data where their clearance meets or exceeds the data's sensitivity. How OLS Works User Clearance: SECRET ...

Read More

Operations on table in Cassandra

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 14-Mar-2026 1K+ Views

Cassandra uses CQL (Cassandra Query Language) to perform operations on tables. CQL is similar to SQL but designed for Cassandra's distributed, NoSQL architecture. The main table operations are CREATE, INSERT, UPDATE, DELETE, SELECT, ALTER, and DROP. CREATE TABLE CREATE TABLE sample_table ( id INT PRIMARY KEY, name TEXT, age INT, email TEXT ); INSERT Data INSERT INTO sample_table (id, name, age, email) VALUES (1, 'John Doe', 35, 'john@example.com'); INSERT INTO sample_table (id, name, age, email) VALUES ...

Read More

Operations on Files

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 14-Mar-2026 2K+ Views

When working with files in a DBMS, two fundamental types of operations are performed: retrieval (finding and reading records) and update (inserting, deleting, or modifying records). Both use selection conditions to identify target records. Selection Conditions A selection condition specifies criteria that records must meet. Conditions can be − Simple − Uses one field (e.g., Ssn = '123-45-6789') Complex − Combines multiple fields with comparison operators (e.g., Department = 'Sales' AND Salary ≥ 30000) File Operations The typical sequence of file operations − 1. Open file 2. Find first record matching ...

Read More
Showing 1–10 of 40 articles
« Prev 1 2 3 4 Next »
Advertisements