Category Archives: ComputerScience

Infix to Postfix conversion using stack algorithm

Infix to postfix conversion algorithm

To understand the concept of infix to postfix conversion concept you need to know the know the meaning of the infix, prefix and postfix. Please go through this article to understand the concept better.

Infix to postfix conversion algorithm
Infix to postfix conversion algorithm
READ  Infix Prefix postfix expressions - datastructures

Before we dive in we need to be aware of a few basic concept used in this algorithm. Continue reading Infix to Postfix conversion using stack algorithm

File system Vs database systems (advantages database )

File system Vs Database systems

file system vs database system
file system vs database system

File system: In computing, a file system or filesystem is used to control how data is stored and retrieved. Without a file system, information placed in a storage medium would be one large body of data with no way to tell where one piece of information stops and the next begins. Continue reading File system Vs database systems (advantages database )

Types of databases and database applications – tutorial 2

Database Types and database applications

database types and applications
Database types and applications
  • Numeric and Textual Databases – Traditional database systems.
  • Multimedia Databases – store pictures, video clips, and sound images.
  • Geographic Information Systems (GIS) – store and analyze maps, weather data, and satellite images.
  • Data Warehouses and OLAP – extract and analyze useful information from very large databases for decision making .
  • Real – time and Active Databases – used in controlling industrial and manufacturing processes.

Continue reading Types of databases and database applications – tutorial 2

Block diagram Tutorial 1 Introduction to computer networks-

Network / networking & block diagram

  • Two or more systems which are connected through
    which communication can take place .
  •  Connection may be point to point
  •  All systems are connected by some means
  •  No man is an island – Same for computer
  •  Communication between two points

A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.

Block diagram

block diagram
Block diagram

Continue reading Block diagram Tutorial 1 Introduction to computer networks-

Singly Linked list creation -Data Structure

Singly Linked List Creation

Title

Concept

Singly linked list also called as ‘Linked List‘ consists of a list of items linked together. Each element of a list is a node and each node has something to store data and a next pointer which connects with the other list elements. The first element has  a head pointer pointing to it and the last element in the list points to NULL which is the end of the list. Continue reading Singly Linked list creation -Data Structure

Implement an Echo UDP server in C

Implement an Echo UDP server in C

The Echo Protocol is a service in the Internet Protocol Suite defined in RFC 862. … A host may connect to a server that supports the Echo Protocol using the Transmission Control Protocol (TCP)( echo UDP) or the User Datagram Protocol (UDP) on the well-known port number 7. Continue reading Implement an Echo UDP server in C

Message transfer from client to server using UDP in C

Implement a message transfer from client to server process using UDP.

 

  • UDP is a simple transport-layer protocol. The application writes a message to a UDP socket, which is then encapsulated in a UDP datagram, which is further encapsulated in an IP datagram, which is sent to the destination.

Title

Continue reading Message transfer from client to server using UDP in C

TCP program to authenticate client’s Username Password

TCP based server program to authenticate the client’s Username and Password.

Title

Concept authenticate

Also known as basic password authentication Name-and-password authentication, uses a basic challenge/response protocol to ask users for their names and passwords and then verifies the accuracy of the passwords by checking them against a secure hash table of the password stored in Person documents in the Domino Directory. Continue reading TCP program to authenticate client’s Username Password

C program for file transfer using TCP

File transfer using TCP

 

Concept of file transfer

There are three steps in file transfer

a)Connection Establishment,

b)Data Transfer,

c)Connection Termination

Now here a client is sending a file to a server, over a TCP socket.

The server does some processing on the file and sends it back to the client. Continue reading C program for file transfer using TCP