Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Mithlesh Upadhyay
40 articles
Operating System Based Virtualization
Operating System-based Virtualization is a virtualization technique where virtualization software runs on top of a host operating system, creating isolated environments called containers. This approach allows multiple applications or services to run independently on the same physical hardware while sharing the underlying OS kernel. The virtualization layer creates abstraction between the hardware and applications, enabling better resource utilization and isolation. Unlike traditional virtualization that creates complete virtual machines, OS-based virtualization shares the host kernel among containers, making it more lightweight and efficient. Operating System-Based Virtualization Architecture Physical Hardware ...
Read MoreOptions Field in IPv4 Header
The Options Field in the IPv4 header is a variable-length field that provides additional functionality and control over packet processing. While optional, it allows network administrators to customize packet handling for specific requirements such as routing control, security measures, and network diagnostics. The options field is located after the fixed 20-byte header and can extend up to 40 bytes. Its presence is indicated by the Header Length field value exceeding 5 (which represents the standard 20-byte header). Structure of IPv4 Header with Options IPv4 Header Structure ...
Read MoreOutdoor Mobility Model | Gauss-Markov
Mobility models simulate the movements of mobile nodes in wireless networks and are essential for ad-hoc network research. They significantly affect the performance and behavior of various network protocols. Mobility models are classified into two main categories: entity mobility models (where nodes move independently) and group mobility models (where node movements are correlated). The Gauss-Markov mobility model is an entity mobility model originally proposed for simulating personal communication service networks. This model captures realistic characteristics of outdoor mobility such as randomness, correlation, and variation in movement patterns. It uses a single tuning parameter to adjust the degree of randomness, ...
Read MoreOverview of Application Delivery Network (ADN)
Today, everyone uses digital devices to access websites and applications on the Internet. This has increased the need for cost-effective networks and better application delivery. To meet this demand, the Application Delivery Network (ADN) concept was developed. ADN reduces load times, solves IT problems faster, and ensures secure access to applications with proper visibility and availability. What is Application Delivery Network? An Application Delivery Network (ADN) is a network architecture that improves the delivery of web applications to end users across different locations and devices. It consists of three main components: Application Delivery Controllers (ADCs), WAN Optimization Controllers ...
Read MoreOverview of Desk Area Network (DAN)
A Desk Area Network (DAN) is a specialized network architecture designed for multimedia workstations that enables direct connection of multimedia devices and peripherals to the network. DAN uses Asynchronous Transfer Mode (ATM) technology to provide high-speed, reliable communication between multimedia devices, workstations, and peripheral equipment without requiring data to pass through the central workstation. Before DAN, multimedia devices like cameras, audio equipment, and displays had to communicate through the workstation, creating bottlenecks and reducing performance. DAN eliminates this limitation by allowing devices to connect directly to the network infrastructure. Architecture of DAN The DAN architecture consists of ...
Read MoreOptions Field in TCP Header
The TCP header contains essential information for reliable data transmission, including source and destination ports, sequence numbers, and control flags. One important component is the options field, which provides flexibility for protocol enhancements and optimizations. Options Field in TCP Header The options field is a variable-length component in the TCP header that allows for protocol extensions and enhancements. This field can range from 0 to 320 bits (0-40 bytes), depending on the data offset field size. The options field enables TCP to negotiate features, optimize performance, and adapt to varying network conditions during connection establishment and data transfer. ...
Read MoreOverview of Dynamic Partition in Hive
Apache Hive is a data warehousing system built on Hadoop for analytics and MapReduce jobs. Partitioning divides large datasets into smaller parts for faster queries. Dynamic partitioning automatically determines partition values from the data being inserted, unlike static partitioning where values are manually specified. Static vs Dynamic Partitioning Feature Static Partitioning Dynamic Partitioning Partition values Manually specified per insert Automatically derived from data Best for Few known partitions Many or unknown partitions WHERE clause Required Not required Flexibility Low High Enabling Dynamic Partitioning ...
Read MoreOracle Label-Based Security
Oracle Label-Based Security (OLS) provides fine-grained, row-level access control based on security labels. Each row of data is assigned a sensitivity label (e.g., Confidential, Secret, Top Secret), and each user is assigned a clearance level. Users can only access data where their clearance meets or exceeds the data's sensitivity. How OLS Works User Clearance: SECRET ...
Read MoreOperations on table in Cassandra
Cassandra uses CQL (Cassandra Query Language) to perform operations on tables. CQL is similar to SQL but designed for Cassandra's distributed, NoSQL architecture. The main table operations are CREATE, INSERT, UPDATE, DELETE, SELECT, ALTER, and DROP. CREATE TABLE CREATE TABLE sample_table ( id INT PRIMARY KEY, name TEXT, age INT, email TEXT ); INSERT Data INSERT INTO sample_table (id, name, age, email) VALUES (1, 'John Doe', 35, 'john@example.com'); INSERT INTO sample_table (id, name, age, email) VALUES ...
Read MoreOperations on Files
When working with files in a DBMS, two fundamental types of operations are performed: retrieval (finding and reading records) and update (inserting, deleting, or modifying records). Both use selection conditions to identify target records. Selection Conditions A selection condition specifies criteria that records must meet. Conditions can be − Simple − Uses one field (e.g., Ssn = '123-45-6789') Complex − Combines multiple fields with comparison operators (e.g., Department = 'Sales' AND Salary ≥ 30000) File Operations The typical sequence of file operations − 1. Open file 2. Find first record matching ...
Read More