โพHANDWRITTEN NOTES โ๏ธโพ๏ธ
๐บDATA STRUCTURE SHORT NOTES
๐บDATA STRUCTURE
INTERVIEW SERIES ๐น(PART - 1)
๐บDATA STRUCTURE
INTERVIEW SERIES ๐น(PART - 2)
๐บDATA STRUCTURE
INTERVIEW SERIES ๐น(PART - 3)
๐บDBMS (DATABASE MANAGEMENT SYSTEM)NOTES
๐บC PROGRAMMING SHORT NOTES
๐บDATA STRUCTURE SHORT NOTES
๐บDATA STRUCTURE
INTERVIEW SERIES ๐น(PART - 1)
๐บDATA STRUCTURE
INTERVIEW SERIES ๐น(PART - 2)
๐บDATA STRUCTURE
INTERVIEW SERIES ๐น(PART - 3)
๐บDBMS (DATABASE MANAGEMENT SYSTEM)NOTES
๐บC PROGRAMMING SHORT NOTES
โค1
๐ง Quick Linux tip:
The diff command is a useful tool for finding differences between files in the Linux terminal. However, icdiff offers an even better side-by-side comparison with colorized output.
The output will display both files side-by-side with any differences highlighted in red and green, making it easy to spot the difference.
The diff command is a useful tool for finding differences between files in the Linux terminal. However, icdiff offers an even better side-by-side comparison with colorized output.
$ icdiff config-dev.ini config-prod.iniThe output will display both files side-by-side with any differences highlighted in red and green, making it easy to spot the difference.
๐ 7 Layers of the OSI Model vs TCP/IP Model Visual Guide:
The OSI model (Open Systems Interconnection) is a seven-layer theoretical stack that can be used to explain how a network works.
The concept was established to standardize networks in a way that permitted multi-vendor systems; before this, you could only have a single-vendor network because the devices could not communicate with one other.
๐ข๐ฆ๐ ๐ ๐ผ๐ฑ๐ฒ๐น ๐๐ฎ๐๐ฒ๐ฟ๐
As I have mentioned above, the OSI model consists of 7 layers. These layers work together to make the network work properly.
๐ป ๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป (๐น๐ฎ๐๐ฒ๐ฟ ๐ณ)
This is the layer closest to the end user. This is the layer through which the application and the user communicate.
For communication between web browsers and web servers, application-specific protocols such as HTTP (Hyper Text Transfer Protocol) are utilized at this layer.
๐ ๐ฃ๐ฟ๐ฒ๐๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป (๐น๐ฎ๐๐ฒ๐ฟ ๐ฒ)
This layer formats the data so that it may be understood by the receiving application. This layer can also encrypt data as it is sent and decrypt it as it is received, ensuring that only the intended recipient can read it.
๐ช ๐ฆ๐ฒ๐๐๐ถ๐ผ๐ป (๐น๐ฎ๐๐ฒ๐ฟ ๐ฑ)
This layer controls host-to-host communication (sessions). It creates, manages, and destroys connections between a local application (such as your web browser) and a remote application (for example, YouTube).
๐ ๐ง๐ฟ๐ฎ๐ป๐๐ฝ๐ผ๐ฟ๐ (๐น๐ฎ๐๐ฒ๐ฟ ๐ฐ)
To ensure that no data is lost, the transport layer is employed for error handling and sequencing. This layer also provides host-to-host communication also know as end-to-end communication.
๐ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ (๐น๐ฎ๐๐ฒ๐ฟ ๐ฏ)
The Network layer connects end hosts on different networks (i.e outside of your LAN). This layer handles logical addressing using IP addresses.
๐ ๐๐ฎ๐๐ฎ ๐๐ถ๐ป๐ธ (๐น๐ฎ๐๐ฒ๐ฟ ๐ฎ)
This layer facilitates node-to-node communication and data transfer (for example, PC to switch, switch to router, and router to router).
The physical address (MAC Address) is appended to the data at this layer, this includes the source and destination MAC addresses.
๐ ๐ฃ๐ต๐๐๐ถ๐ฐ๐ฎ๐น (๐น๐ฎ๐๐ฒ๐ฟ ๐ญ)
The physical layer is the OSI model's bottom layer. It specifies the physical properties of a medium that is used to carry data between devices. For example, Voltage levels, maximum transmission distances, physical connectors, and so forth.
Digital bits are transformed into electrical signals for wired connections and radio signals for wireless transmission at this layer.
The OSI model (Open Systems Interconnection) is a seven-layer theoretical stack that can be used to explain how a network works.
The concept was established to standardize networks in a way that permitted multi-vendor systems; before this, you could only have a single-vendor network because the devices could not communicate with one other.
๐ข๐ฆ๐ ๐ ๐ผ๐ฑ๐ฒ๐น ๐๐ฎ๐๐ฒ๐ฟ๐
As I have mentioned above, the OSI model consists of 7 layers. These layers work together to make the network work properly.
๐ป ๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป (๐น๐ฎ๐๐ฒ๐ฟ ๐ณ)
This is the layer closest to the end user. This is the layer through which the application and the user communicate.
For communication between web browsers and web servers, application-specific protocols such as HTTP (Hyper Text Transfer Protocol) are utilized at this layer.
๐ ๐ฃ๐ฟ๐ฒ๐๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป (๐น๐ฎ๐๐ฒ๐ฟ ๐ฒ)
This layer formats the data so that it may be understood by the receiving application. This layer can also encrypt data as it is sent and decrypt it as it is received, ensuring that only the intended recipient can read it.
๐ช ๐ฆ๐ฒ๐๐๐ถ๐ผ๐ป (๐น๐ฎ๐๐ฒ๐ฟ ๐ฑ)
This layer controls host-to-host communication (sessions). It creates, manages, and destroys connections between a local application (such as your web browser) and a remote application (for example, YouTube).
๐ ๐ง๐ฟ๐ฎ๐ป๐๐ฝ๐ผ๐ฟ๐ (๐น๐ฎ๐๐ฒ๐ฟ ๐ฐ)
To ensure that no data is lost, the transport layer is employed for error handling and sequencing. This layer also provides host-to-host communication also know as end-to-end communication.
๐ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ (๐น๐ฎ๐๐ฒ๐ฟ ๐ฏ)
The Network layer connects end hosts on different networks (i.e outside of your LAN). This layer handles logical addressing using IP addresses.
๐ ๐๐ฎ๐๐ฎ ๐๐ถ๐ป๐ธ (๐น๐ฎ๐๐ฒ๐ฟ ๐ฎ)
This layer facilitates node-to-node communication and data transfer (for example, PC to switch, switch to router, and router to router).
The physical address (MAC Address) is appended to the data at this layer, this includes the source and destination MAC addresses.
๐ ๐ฃ๐ต๐๐๐ถ๐ฐ๐ฎ๐น (๐น๐ฎ๐๐ฒ๐ฟ ๐ญ)
The physical layer is the OSI model's bottom layer. It specifies the physical properties of a medium that is used to carry data between devices. For example, Voltage levels, maximum transmission distances, physical connectors, and so forth.
Digital bits are transformed into electrical signals for wired connections and radio signals for wireless transmission at this layer.
๐ง Quick Linux tip:
Got log files compressed as .gz? You donโt need to extract them to read or search through the content.
Use the 'z' tools directly:
โข zcat - view the file
โข zless - scroll through it
โข zgrep - search inside it
โข zegrep - search with extended regex
โข zfgrep - search for fixed strings
โข zcmp/zdiff - compare files
These commands let you inspect compressed logs without unpacking them first, perfect for quick troubleshooting sessions.
Got log files compressed as .gz? You donโt need to extract them to read or search through the content.
Use the 'z' tools directly:
โข zcat - view the file
โข zless - scroll through it
โข zgrep - search inside it
โข zegrep - search with extended regex
โข zfgrep - search for fixed strings
โข zcmp/zdiff - compare files
These commands let you inspect compressed logs without unpacking them first, perfect for quick troubleshooting sessions.