Skip to main content

Posts

Showing posts from 2015

Python Subprocess Module

Subprocess A running program is called a  process . Each process has its own system state, which includes memory, lists of open files, a program counter that keeps track of the instruction being executed, and a call stack used to hold the local variables of functions. Normally, a process executes statements one after the other in a single sequence of control flow, which is sometimes called the main thread of the process. At any given time, the program is only doing one thing. A program can create new processes using library functions such as those found in the os or subprocess modules such as  os.fork() ,  subprocess.Popen() , etc. However, these processes, known as  subprocesses , run as completely independent entities-each with their own private system state and main thread of execution. Because a subprocess is independent, it executes concurrently with the original process. That is, the process that created the subprocess can go on to work on other things while the subproc

How To Manage Packages In Ubuntu and Debian With Apt-Get & Apt-Cache

What is Apt-Get? Apt is a command line frontend for the dpkg packaging system and is the preferred way of managing software from the command line for many distributions. It is the main package management system in Debian and Debian-based Linux distributions like Ubuntu. While a tool called "dpkg" forms the underlying packaging layer, apt-get and apt-cache provide user-friendly interfaces and implement dependency handling. This allows users to efficiently manage large amounts of software easily. In this guide, we will discuss the basic usage of apt-get and apt-cache and how they can manage your software. We will be practicing on an Ubuntu 12.04 cloud server, but the same steps and techniques should apply on any Debian-based distribution. How To Update the Package Database with Apt-Get Apt-get operates on a database of known, available software. It performs installations, package searches, and many other operations by referencing this database. Due to this fact,

MPLS Explained :)

The key thing to remember about MPLS is that it’s a technique, not a service — so it can be used to deliver anything from IP VPNs to metro Ethernet services, or even to provision optical services. So although carriers build MPLS backbones, the services that users buy may not be called “MPLS”. They could be called anything from “IP VPN” to “metro Ethernet”—or whatever the carriers’ marketing departments dream up next. The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network, each  router  makes an independent forwarding decision for each packet based solely on the packet’s network-layer header. Thus, every time a packet arrives at a router, the router has to “think through” where to send the packet next. With MPLS, the first time the packet enters a network, it’s assigned to a specific forwarding equivalence class (FEC), indicated by appending a short bit sequence (the label) to the packet. Each router in the network has a table indicat

How communication happens across ..? (Explained from the scratch)

okay.. in this article I am going to explain how communication happens between the systems from the scratch. For this, first we need to understand the basic of network hardware in the computer system. Network hardware is the main crucial thing that makes a computer system to communicate with the other computers. The hardware that I was talking about is nothing but an NETWORK ADAPTER. Network adapter is also called network card or  network interface card (NIC). Network adapter is fixed to the hardware of the computer which consists of ports that makes the computer to connect to the network. The ports in network adapter are RJ-45 ports. RJ means Registered Jack. RJ is standardized physical network interface. The standard designs are RJ-11,RJ-45..etc. RJ-45  just looks like a port that is used by the landline telephone port. But, that is different from RJ-45 port. The port used by the telephone is RJ-11, RJ-11 is smaller than RJ-45. The cable used to connect the port is twisted pair

All you need is RIGHT Data Structures at RIGHT implementation.

So, lets erase the confusion of what, which, when the data structure to be used through this article. As part of academic we are well known that, data structures are classified into Linear and Non-Linear Data Structures. Linear are the Data Structures like Array, Sorted Array, Stack, Queue, Linked List. Non-Linear are the Data Structures Like Binary Tree, Red-Black Tree, 2-3-4 Tree, Graph, Hash Table, Heap Array: Advantages: 1. Quick Insertion 2. Quick Access of any element in the array Disadvantages: 1. Slow Deletion 2. Slow Search Sorted Array: Advantages: 1. Quick Search 2. Quick Access of any element Disadvantages: 1. Slow Deletion, Insertion Stack: Advantages: 1. Last In First Out access Disadvantages: 1. Slow Access, Search for remaining elements Queue: Advantages: 1. First In First Out Access Disadvantages: 1. Slow Access, Search for other elements Linked List: Advantages: 1. Quick Insertion, Deletion Disadvantages: 1. Slow Search Binary T