Tuesday, January 24, 2023

Tips for NS3 simulator

 Some tips:

  1. You need to be good at C++. Have to understand the basic concepts such as smart pointer, class, object, struct. Have to know how to create classes so that later we can design your own custom class and extend or add some new features in the class.
  2. In our life, sometimes it is better to know our own limitations so that we can work on it. Similarly, we also have to understand the limitations of NS-3 code.

Tuesday, January 10, 2023

What is the difference between persistent and non-persistent HTTP

 In non-persistent HTTP, a brand new TCP connection must be established and maintained for each requested object. When a user requests a Web page (for example clicks on a hyperlink). Suppose the web page consists of a base HTML file and 10 JPEG images. So in case of non-persistent HTTP, 11 TCP connections are generated.

In case of persistent HTTP, the server leaves the TCP connection open after sending a response. Subsequent requests and responses between the same client and server can be sent over the same connection. So, the entire web page (11 objects) can be sent over a single persistent connection.

Thursday, January 5, 2023

What are some computer science job interview questions?

 Question 1: Difference between network security and cyber security?

Question 2: What is degree of multiprogramming?

Question 3: Difference bandwidth and throughput?

Question 4: What is context switching?

Question 5: What is multihoming? 

Answer: Multihoming is the practice of connecting a host or a computer network to more than one network structure in order to increase reliability or performance.

Question 6: What is inside a router?

Question 7: Difference between #include<> and #include” ” in C/C++ with Examples.

Question 8: In which header file, we can find the definition of malloc function?

Answer:  stdlib.h

What is the difference between CAM and TCAM in networking?

 

TCAM is a special version of CAM. The main characteristic of both CAM and TCAM is that it is able to search all its entries in parallel. So the content search takes only one clock cycle. Though speed is high, it is expensive.
Main difference between CAM and TCAM
i) CAM requires an exact match on the key stored in its table whereas TCAM allows partial match.
In TCAM data are stored and queried using 0, 1 and X unlike 0 and 1 in case of CAM. X can be referred don’t care or wild card state. The name Ternary comes from the use of three states.
ii) From usage point of view in networking devices:
CAM is used in Ethernet switch (MAC table look up )whereas in TCAM is used in router (router prefix look up).

Sunday, December 4, 2022

What is the difference between a hostname and an IP address?

 A human being can be identified differently: name on a birth certificate and Aadhaar card number. Similarly, an Internet host (e,g., any device that is connected to the Internet, e.g., laptop, mobile phone etc.) can be identified using hostname or IP address. Within a given context, one identification may be more appropriate than another. Host names are mnemonic, and therefore, we can remember them easily. But it has some disadvantages: (i) From the hostname, we can not accurately locate the host on the Internet (ii) Since a hostname consists of variable length alphanumeric characters, they would be difficult to process by routers.

Example of hostname: http://www.quora1.com

and the IP address is 127.7.106.83. An IP address is hierarchical. As we scan an IP address from left to right, we obtain more and more specific information about where the host is located in the Internet. It is analogous to a postal address, where we get specific information about where the address is located by scanning a postal address from bottom to top. Due to this, it is better to identify a host by IP address.

Saturday, December 3, 2022

What are some things you realised when you got mature?


  1. Don’t mind on what others thinking about you. It just wastes your time, not theirs.
  2. Updating skill is more important than your degrees.
  3. Dealing with people has a major role in your success along with your technical knowledge.
  4. Making the best of current situation is necessary.
  5. We can start afresh at any time without wasting time on thinking what happened in past.
  6. We think ourselves as smarter compared to others. But, there are a lot of people smarter than us. Just we have not met them yet.
  7. Forgive others and yourself for the mistakes that happened in the past.
  8. If you are success today, there is a greater probability that you will be failure next day. Similarly, if you are failure today, there is a higher chance, you will be successful next time. Life is full of challenges and one day we are going to die, so embrace all challenges with a happy smile.
  9. We are in denial of bad/unfortunate events that had already happened to others/your neighbours. So, be compassionate to them as one day you may find yourself in that situation.
  10. A person should not judged by their behaviour as different person’s upbringings are different. Each person’s history, experience shape their behaviour.
  11. It is okay to seek help from others since it is not possible to become expert on every domain. But you should try your own multiple times before seeking help.

Profile photo for Madhurima Buragohain
Madhurima Buragohain
80 followers
205 following

I am a good learner and want to improve the lives of others.

Profile photo for Madhurima Buragohain

Both hostname and IP address are used for identification of Internet hosts. Just like a human being is identified by a name in birth certificate and driving license number. Within a given context, one identification may be more appropriate than another. Host names are mnemonic and therefore, we can remember it easily. But it has some disadvantages: (i) We can not infer accurately the location of the host in the Internet (ii) Since a hostname consists of variable length alphanumeric characters, they would be difficult to process by routers. Due to this it is better to identify a host by IP address.

Example of host name: http://www.quora1.com

and IP address is: 127.7.106.83. An IP address is hierarchical. As we scan an IP address from left to right, we obtain more and more specific information about where the host is located in the Internet. It is analogous to a postal address, where scanning a postal address from bottom to top, we get specific information about where the address is located.

Profile photo for Madhurima Buragohain

Profile photo for Madhurima Buragohain
1. Difference between network security and cyber security? 2. What is degree of multiprogramming? 3. Difference bandwidth and throughput? 4. What is context switching? 5. What is multihoming? 6. What is inside a router?
Profile photo for Madhurima Buragohain
If the application developer chooses UDP as transport layer protocol, then there is no handshaking between sending and receiving transport layer entities before sending a segment.
Profile photo for Madhurima Buragohain
IPSec is a standard set of protocol for network layer used by both IPv4 and IPv6. It is used to provide (i) confidentiality: (ii) authentication and integrity: (iii) replay attack protection: It is a collection of protocols: (i) Encapsulating Security Payload (ESP) protocol : Provides encryption and secu…
Profile photo for Madhurima Buragohain
First we have to understand the concept of layers. Suppose you doing an online transaction through SBI net banking in your mobile. There are different types of functions running in your mobile and SBI server to make the transaction work. For easy understanding/visualisation, we group those functions…
Profile photo for Madhurima Buragohain
First we have to understand the concept of layers. Suppose you are doing an online transaction through SBI net banking in your mobile. There are different types of functions running in your mobile and SBI server to make the transaction work. For easy understanding/visualisation, we group those funct…
Profile photo for Madhurima Buragohain
best website for online Pdf compressor Compress PDF - Compress your PDF document online
Profile photo for Madhurima Buragohain
Samir Ahmed
· Sep 19
What is Machine Learning? Algorithms that learn from data are the focus of the field of machine learning. The goal of machine learning is to teach computers to make forecasts, judgments, and advancements on their own without human input. Artificial intelligence (AI) in the form of machine learning (ML…
Profile photo for Madhurima Buragohain
Kurt Guntheroth
· 3y
There are two answers to this question 1. Struct and class are pretty much the same, except that the members of a struct are public by default, while the members of a class are private by default. So you’d pick whichever one made the coding task easy. 2. You should only use a struct for a simple data record…
Profile photo for Madhurima Buragohain
Data mining is the process of extracting valuable information from large datasets.
Profile photo for Madhurima Buragohain
In non-persistent HTTP, a brand new TCP connection must be established and maintained for each requested object. When a user requests a Web page (for example clicks on a hyperlink). Suppose the web page consists of a base HTML file and 10 JPEG images. So in case of non-persistent HTTP, 11 TCP connec…
Profile photo for Madhurima Buragohain
Mathematics is a subject in which concepts are chained in sequences of dependencies. When you have long chains, there are very few starting points, very few things to memorize. In mathematics, you have very few things to memorize and the rest you deduce as you go through. The chain of deductions is…
Profile photo for Madhurima Buragohain
Does not guarantee the delivery of data.
Profile photo for Madhurima Buragohain
IP is not a reliable protocol. IP’s service model is best-effort delivery service. It means IP makes its best effort to deliver packets between communicating hosts, but it makes no guarantees. In particular, IP does not guarantee (i) packet delivery (ii) orderly delivery of packets (iii) integrity i…
Profile photo for Madhurima Buragohain
Classes are a way to group data and functionality together. For example, you can think of a computer game where we need the representation of a player. So, what are the things we need to represent a player. We definitely want some kind of data for example, the position of a player, some attributes o…
Profile photo for Madhurima Buragohain
How to color and make a hyperlink clickable in latex \href{\color{blue}{https://scholar.google.com/citations?user=\\E9bb5RsAAAAJ&hl=en}}
Profile photo for Madhurima Buragohain
Removal of date in document in latex \documentclass{article} \usepackage{xcolor} \title{Suggested List of Potential Referees} \date{\vspace{-5ex}} \begin{document} … \end{document}
Profile photo for Madhurima Buragohain
Reduce the font size of a table in latex \begin{table*}[h!] \caption{State Transitions of PIT} \begin{center} \fontsize{8pt}{8.25pt}\selectfont \begin{tabular}{ |p{5cm}|c|c|c| } … \end{tabular} \end{center} \end{table*}
Profile photo for Madhurima Buragohain
How to write one algorithm in two page in latex \clearpage \setcounter{algocf}{3} \begin{algorithm} \setcounter{AlgoLine}{28}
Profile photo for Madhurima Buragohain
How to refer a figure as a table in latex? \begin{figure}[htb] \centering \captionof{table}[foo]{Table Name} \includegraphics[width=1.0\linewidth]{tableA.png} \label{img:foobar} \end{figure}
Profile photo for Madhurima Buragohain
\newcommand{\quotes}[1]{``#1''} ... \quotes{Hello World!}
Profile photo for Madhurima Buragohain
To determine the ‘good paths /routes’ (having least cost) from senders to receivers, through the network of routers.
Profile photo for Madhurima Buragohain
Rohit Virmani
· Oct 4
First picture: Ratan Tata 25 years 2nd picture: Ratan Tata 84 years When Indian billionaire Ratanji Tata was asked by a radio presenter in a telephone interview: "Sir, what do you remember when you found happiness in life"? Ratanji Tata said: "I have gone through four stages of happiness in life, and…
Access this answer and support the author as a Quora+ subscriber
Profile photo for Madhurima Buragohain
Figure: Inside view of a router There are four router components: (i) Input port: A lookup function is performed at input port. The forwarding table is consulted to determine the router output port to which an arriving packet will be forwarded via Switching fabric. Control packets (for example, the pa…
Profile photo for Madhurima Buragohain
Amit Goyal
· 5y
Nash equilibrium is an outcome in which every player is doing the best he possibly can given other players’ choices. So, no player can benefit from unilaterally changing his choice. Pareto optimal is an outcome from which any attempt to benefit someone by deviating to some other outcome will necessar…
Profile photo for Madhurima Buragohain
Phillip Remaker
· 4y
Throughput is how the rate of raw data you can stuff down a transmission medium without error. Goodput is the rate of ”good data” absorbed and processed by applications, essentially meaning the throughput minus the rate of useless junk arriving. “Useless junk” includes superfluous retransmissions, pa…
Profile photo for Madhurima Buragohain
Harry Ven
· 4y
Why a compelling abstract is essential? Because an abstract is one of the most read sections of a paper. Many researchers decide if they want to continue reading based on the abstract. An abstract is where you state the idea, and give reasons on why your research is compelling enough. The purpose of a…
Profile photo for Madhurima Buragohain
Exact algorithms guarantee (100%) to produce an optimal (the best) solution for a given problem if we do not limit time or memory.
Profile photo for Madhurima Buragohain
Heuristic approach/algorithm does not guarantee finding the best solution. However, they produce good answers quickly
Profile photo for Madhurima Buragohain
Ransomware is a type of malware that restricts access to the computer system and demands the user to pay a ransom to the malware operators to remove the restriction. Email is the most common delivery mechanism for ransomeware, Users fall prey to phishing email or clicking a malicious web link.…
Profile photo for Madhurima Buragohain
DNS is an application layer protocol since (1) It runs between communication end systems using the client-server paradigm. (2) It relies on an underlying end-to-end transport protocol to transfer DNS messages between communicating end systems.…
Profile photo for Madhurima Buragohain
Finite set of steps/instructions to solve a problem.
Profile photo for Madhurima Buragohain
‘internet ’ refers to any network of interconnected networks. ‘Internet’ (with capital I) refers to the global system of interconnected networks that we use in our day-to-day lives.
Profile photo for Madhurima Buragohain
Akshay Chopra
· 5y
If we go by the definition provided by Wikipedia, it states the following: “In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software. In general terms, it is a set of clearly defined methods of commu…
Profile photo for Madhurima Buragohain
Link for history of radio waves: The Discovery of Radio Waves
Profile photo for Madhurima Buragohain
Wireless communication allows the transfer of information between a transmitter and a receiver, without a physical medium. The same device typically acts as both a transmitter and a receiver, by using antennas. The communication link uses radio frequency signals to transfer information.…
Profile photo for Madhurima Buragohain
First download Eclipse from Eclipse downloads - Select a mirror | The Eclipse Foundation Commands: tar -xvzf eclipse-inst-jre-linux64.tar.gz cd eclipse-installer/ ./eclipse-inst Reference: HOWTO configure Eclipse with ns-3
Profile photo for Madhurima Buragohain
serialization is the process of translating a data structure or object state into a format that can be stored (for example, in a file or memory data buffer) or transmitted (for example, over a computer network) and reconstructed later. As you can see in the first Figure, there is some object state in…
Profile photo for Madhurima Buragohain
Jacob Rothstein
· 11y
\usepackage{verbatim} %In the preamble \begin{comment} multi line comment here \end{comment}
Profile photo for Madhurima Buragohain
No one knows whether or not efficient algorithms exist for NP-complete problems. The set of NP-complete problems has the remarkable property that if an efficient algorithm exists for any one of them, then efficient algorithms exists for all of them.…
Profile photo for Madhurima Buragohain
Video series: NS3 Network Simulator
Some tips: 1. You need to be good at C++. Have to understand the basic concepts such as smart pointer, class, object, struct. Have to know how to create classes so that later we can design your own custom class and extend…
Profile photo for Madhurima Buragohain
Reference: ML_For_AWID/Traditional ML on AWID Dataset.ipynb at master · Diwash15/ML_For_AWID
PS: Any doubt you can contact me.
Profile photo for Madhurima Buragohain
Reference: Machine Learning: 101 (Assamese)
Profile photo for Madhurima Buragohain
a[i]= Base adress + (i-LB)*S S= Size of an array element LB= Lower bound PS: for a[0…5], lower bound is 0 and for a[1..4], lower bound is 1 for a[-3…4], lower bound is -3
Profile photo for Madhurima Buragohain
An array is a data structure which can be defined as a finite ordered set of homogeneous elements.
Profile photo for Madhurima Buragohain
Martin O'Shea
· 5y
A data structure is a particular way of organising data in a computer so that it can be used efficiently. See Data Structure and Algorithms (DSA) Tutorial for further information.
Profile photo for Madhurima Buragohain
Machine learning is about abstracting and extracting knowledge from data and then applying that data algorithmically to make inference and to make decisions right.
Profile photo for Madhurima Buragohain
Write the following colored line in forwarder.cpp file. The output is shown in second image. …
Profile photo for Madhurima Buragohain
When we use shaping we will buffer the traffic to a certain bitrate, policing will drop the traffic when it exceeds a certain bitrate. …
Profile photo for Madhurima Buragohain
Suppose, in a network as shown above, Harry wants to send a message to Ron. If we use Hub, the same message will be transferred to all the devices connected to hub. That means, the message that was sent to Ron will be seen by Hermione and Malfoy as well. If we use switch, the message is not sent to a…
Profile photo for Madhurima Buragohain
Following are some good videos for learning networking from scratch. NetworkChuck
Profile photo for Madhurima Buragohain
Rittik Kumar
· Feb 24
I am 23 years (will turn 24 this March) old Software Engineer (SDE1 - Mobile) in Bangalore. I started my career as an intern in May 2019 where I used to get 15K in hand every month for up to 6 months. After that, I used to get 22k per month for another 6 months. I worked for a total of 1 year as an…
Access this answer and support the author as a Quora+ subscriber
Profile photo for Madhurima Buragohain
Profile photo for Madhurima Buragohain

Profile photo for Madhurima Buragohain
Recursion is for an algorithm and starts at a finite value N and goes back to a base value (say 1). Induction starts at 1, and then starting at N shows you how to go to N+1, and uses a “leap” to conclude something for all natural numbers.
Profile photo for Madhurima Buragohain
Profile photo for Anonymous
Anonymous
· 6y
All of these are sequences of vertices and edges. They have the following properties : 1. Walk : Vertices may repeat. Edges may repeat (Closed or Open) 2. Trail : Vertices may repeat. Edges cannot repeat (Open) 3. Circuit : Vertices may repeat. Edges cannot repeat (Closed) 4. Path : Vertices cannot repeat. Edges ca…
Profile photo for Madhurima Buragohain
Relations are more general than functions. In a function, each element of the domain has exactly one associated element in the range. In a relation, there may be several such elements in the range. PS: f: S1->S2 If f is a function, then the first set is called the domain of f and the second set is its…
Profile photo for Madhurima Buragohain
TryHackMe | Cyber Security Training https://www.hackers-arise.com/
Hack The Blog | All Things Hacking & Cyber RangeForce | Team Cyber Readiness Platform Hackers | Bugcrowd HackerOne | #1 Trusted Security Platform and Hacker Program Expert IT Training for Networking, Cyber Security and Cloud | INE
Profile photo for Madhurima Buragohain
Michael Huang
· 3y
The short answer is that they are loose terms with their differences largely lost now. The long answer follows. In the past, computer architecture vs organization is somewhat similar to architecture vs civil engineering. The former is about the design of the system and the latter the implementation o…
Profile photo for Madhurima Buragohain
Cryptocurrency is a type of digital asset which can be used to exchange value between parties. It uses cryptography to secure how it is transferred and to control the creation of new units of that currency.
Profile photo for Madhurima Buragohain
Hashing is one way function. We can generate a hash from a text but there is no way to get back the original text from the hash. This is different from encryption. When we encrypt a message using a key, we can use the same key for decryption and get the original. A hash generates a unique fingerprin…
Profile photo for Madhurima Buragohain
A cryptographic hash is basically a digest or digital fingerprint of a certain amount of data. You can use the following link to get a hash of a particular message you want and you will observe for each new character added, there is always a new hash. https://demoblockchain.org/hash SHA256 Hash in the…
Profile photo for Madhurima Buragohain
Jim Gao
· 7y
There are 2 big differences between adjacency list and matrix. One is space requirement, and the other is access time. Space Needed Recall that adjacency matrix is a N by N array, either filled with true/false (if unweighted), or the weight of the edge. This requires O(N^2) space complexity. This is…
Profile photo for Madhurima Buragohain
David Joyce
· Feb 4
You asked who defined mathematics that way. Lots of people have characterized mathematics with words like that, and that characterization is a pretty good one. Google finds the first use of the precise wording of your first sentence “Mathematics is the science and study of quality, structure, space,…
Profile photo for Madhurima Buragohain
Hotte Shen
· 2y
Definitely yes. * Type annotations improve the code readability, which is Python’s key advantage. * It also helps us to create a more correct and meaningful code. * In most cases, type annotations are just enough for API doc Let’s look at the following code. The getImageList() method is intended to return a li…
Profile photo for Madhurima Buragohain
CompTIA Security+ , OSCP
Profile photo for Madhurima Buragohain
GoLang is short form of Go Programming Language. It is crazy fast, it has so much concurrency (ability to do multiple things at once). It gives the same expressiveness the python does, but the same power and core functionality that c or C++, some of those lower languages do. It can cross compile and…
Profile photo for Madhurima Buragohain
Python is a scripting language which means it is interpreted. That means there is another kind of program waiting in the background reading your code as if it were a script to act out on stage and then performing those actions and going and doing those things.…
Profile photo for Madhurima Buragohain
* Find the research area you are Interested in by discussing with peers and PhD Guide. * Start reading survey papers and white papers published by some organisation related to the topic : Good survey paper in CS is: IEEE Communications Surveys and Tutorials. For example, white paper for D2D communication…
Profile photo for Madhurima Buragohain
We can use a password for each transaction, which should be used once and discarded. Thus, we encryption and decryption can help protecting against replay attacks.
Profile photo for Madhurima Buragohain
RSA (Rivest-Shamir-Adleman), ElGamal encryption, AES (Advanced Encryption Standard), DES (Data Encryption Standard).
Profile photo for Madhurima Buragohain
Presentation Layer.
Profile photo for Madhurima Buragohain
Simply, “break” helps to jump outside of the current loop. “continue” means stop this particular iteration right here and execute the next iteration. In real life also, we use break and continue while reading a book/novel. Suppose, you are reading a book. for (pag_number=0;page_number<=100;page_number+…
Profile photo for Madhurima Buragohain
Now-a-days, we use Internet for services like net banking, e-health (your health record in hospital database), military (secret talk among high level officials). These services use sensitive information. To secure us from malicious persons, we use cryptography in Internet communication so that no on…
Profile photo for Madhurima Buragohain
In a network, a router can not quickly process packets if the rate of incoming packets is more than outgoing packets. So, to avoid packet loss, packets are inserted in a queue. As a network designer, you can make different designs of the queue. The most simple design is drop tail where a packet will…
Profile photo for Madhurima Buragohain
Tezpur university Computer Science (if you are interested in CSE). In CSE, you should always keen to learn new things/technologies, otherwise you can not excel.
Profile photo for Madhurima Buragohain
To manage and centrally administer a large number of wireless access points, network use Wireless LAN controller.
Profile photo for Madhurima Buragohain
Jessica Su
· 9y
These refer to how long it takes a program to run. Problems in class P can be solved with algorithms that run in polynomial time. Say you have an algorithm that finds the smallest integer in an array. One way to do this is by iterating over all the integers of the array and keeping track of the sma…
Profile photo for Madhurima Buragohain
Following flag bits in the TCP header are used for TCP connection management. * SYN: we use this for the initial three-way handshake and it’s used to set the initial sequence number. * FIN: this finish bit is used to end the TCP connection. TCP is full-duplex so both parties will have to use the FIN bit t…
Profile photo for Madhurima Buragohain
You can use ping command.
Profile photo for Madhurima Buragohain
I am going to explain your question from real life: We normally say the person has a good network. That means he is in connection to many other people through different means like phone, email, etc. Similarly, a networking device such as a laptop, router, your smartwatch (which we generally term as ho…
Profile photo for Madhurima Buragohain
TCP achieve reliability in data transmission by flow control, sequence numbers, acknowledgements, and timers.
Profile photo for Madhurima Buragohain
Physical layer
Profile photo for Madhurima Buragohain
A bitcoin is a type of digital asset that can be bought, sold or transferred between parties securely over the Internet. Because of this, bitcoin can be used to store value, much like buying gold, silver and other types of investments. But unlike those other types of investments, Bitcoin also serves…
Profile photo for Madhurima Buragohain
A blockchain is a constantly growing ledger that keeps a permanent record of all transactions that have taken place, in a secure, chronological and immutable way.
Profile photo for Madhurima Buragohain
Transport Layer Security (TLS) protocol.
Profile photo for Madhurima Buragohain
Some tips for writing a good research paper (from my own experience) 1. Try to develop a curiosity to read your paper. Like in a movie, we want to know what will happen next. 2. State clearly what is the problem you are going to solve. 3. State the challenges you face to solve this problem. 4. State how…
Profile photo for Madhurima Buragohain
It depends on application requirements. If your application does not require security, then you can use it.
Profile photo for Madhurima Buragohain
Suppose you are given a pipe through which 10-litre water flows. Now, in context to network, suppose your computer (laptop) downloads a video from YouTube server. There are many links between your laptop and Youtube server, which are connected through routers. Each link has its own capacity to carry…
Profile photo for Madhurima Buragohain
In a circuit-switched network, to provide communication between the end systems, the resources that are required along the path are reserved for the duration of the communication session. The example of resources are buffers and link transmission rate. PS: It is analogous to reserving the table befor…
Profile photo for Madhurima Buragohain
The purpose of 3-way handshaking is to validate the authenticity of each party (client and server) and to establish the encryption key and options that will secure subsequent communications. Suppose you want some help from a unknown person. So before asking help, you will say a “Hi” and you will wait…
Profile photo for Madhurima Buragohain
If we consider a single queue, there may be a possibility that a packet with a very less delay requirement may be inserted in the queue already having a large number of packets in it. Thus waiting in a queue will significantly affect the delay constrained applications like VOIP, VIDEO. To address th…
Profile photo for Madhurima Buragohain
Convergence time is more.
Profile photo for Madhurima Buragohain
Yes. By necessity, Facebook sees your IP address every time you connect.
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)
Studied at Tezpur University
Add location credential
67.2K content views4.6K this month
Joined October 2017
Icon for Jorhat Engineering College
Don’t mind on what others thinking about you. It just wastes your time, not theirs.
Updating skill is more important than your degrees.
Dealing with people has a major role in your success along with your technical knowledge.
Making the best of current situation is necessary.
We can start afresh at any time without wasting time on thinking what happened in past.
We think ourselves as smarter compared to others. But, there are a lot of people smarter than us. Just we have not met them yet.
Forgive others and yourself for the mistakes that happened in the past.
If you are success today, there is a greater probability that you will be failure next day. Similarly, if you are failure today, there is a higher chance, you will be successful next time. Life is full of challenges and one day we are going to die, so embrace all challenges with a happy smile.
We are in denial of bad/unfortunate events that had already happened to others/your neighbors. So, be compassionate to them as one day you may find yourself in that situation.
A person should not judged by their behavior as different person’s upbringings are different. Each person’s history, experience shape their behavior.
Profile photo for Madhurima Buragohain
Madhurima Buragohain
80 followers
205 following

I am a good learner and want to improve the lives of others.

Profile photo for Madhurima Buragohain

Both hostname and IP address are used for identification of Internet hosts. Just like a human being is identified by a name in birth certificate and driving license number. Within a given context, one identification may be more appropriate than another. Host names are mnemonic and therefore, we can remember it easily. But it has some disadvantages: (i) We can not infer accurately the location of the host in the Internet (ii) Since a hostname consists of variable length alphanumeric characters, they would be difficult to process by routers. Due to this it is better to identify a host by IP address.

Example of host name: http://www.quora1.com

and IP address is: 127.7.106.83. An IP address is hierarchical. As we scan an IP address from left to right, we obtain more and more specific information about where the host is located in the Internet. It is analogous to a postal address, where scanning a postal address from bottom to top, we get specific information about where the address is located.

Profile photo for Madhurima Buragohain

Profile photo for Madhurima Buragohain
1. Difference between network security and cyber security? 2. What is degree of multiprogramming? 3. Difference bandwidth and throughput? 4. What is context switching? 5. What is multihoming? 6. What is inside a router?
Profile photo for Madhurima Buragohain
If the application developer chooses UDP as transport layer protocol, then there is no handshaking between sending and receiving transport layer entities before sending a segment.
Profile photo for Madhurima Buragohain
IPSec is a standard set of protocol for network layer used by both IPv4 and IPv6. It is used to provide (i) confidentiality: (ii) authentication and integrity: (iii) replay attack protection: It is a collection of protocols: (i) Encapsulating Security Payload (ESP) protocol : Provides encryption and secu…
Profile photo for Madhurima Buragohain
First we have to understand the concept of layers. Suppose you doing an online transaction through SBI net banking in your mobile. There are different types of functions running in your mobile and SBI server to make the transaction work. For easy understanding/visualisation, we group those functions…
Profile photo for Madhurima Buragohain
First we have to understand the concept of layers. Suppose you are doing an online transaction through SBI net banking in your mobile. There are different types of functions running in your mobile and SBI server to make the transaction work. For easy understanding/visualisation, we group those funct…
Profile photo for Madhurima Buragohain
best website for online Pdf compressor Compress PDF - Compress your PDF document online
Profile photo for Madhurima Buragohain
Samir Ahmed
· Sep 19
What is Machine Learning? Algorithms that learn from data are the focus of the field of machine learning. The goal of machine learning is to teach computers to make forecasts, judgments, and advancements on their own without human input. Artificial intelligence (AI) in the form of machine learning (ML…
Profile photo for Madhurima Buragohain
Kurt Guntheroth
· 3y
There are two answers to this question 1. Struct and class are pretty much the same, except that the members of a struct are public by default, while the members of a class are private by default. So you’d pick whichever one made the coding task easy. 2. You should only use a struct for a simple data record…
Profile photo for Madhurima Buragohain
Data mining is the process of extracting valuable information from large datasets.
Profile photo for Madhurima Buragohain
In non-persistent HTTP, a brand new TCP connection must be established and maintained for each requested object. When a user requests a Web page (for example clicks on a hyperlink). Suppose the web page consists of a base HTML file and 10 JPEG images. So in case of non-persistent HTTP, 11 TCP connec…
Profile photo for Madhurima Buragohain
Mathematics is a subject in which concepts are chained in sequences of dependencies. When you have long chains, there are very few starting points, very few things to memorize. In mathematics, you have very few things to memorize and the rest you deduce as you go through. The chain of deductions is…
Profile photo for Madhurima Buragohain
Does not guarantee the delivery of data.
Profile photo for Madhurima Buragohain
IP is not a reliable protocol. IP’s service model is best-effort delivery service. It means IP makes its best effort to deliver packets between communicating hosts, but it makes no guarantees. In particular, IP does not guarantee (i) packet delivery (ii) orderly delivery of packets (iii) integrity i…
Profile photo for Madhurima Buragohain
Classes are a way to group data and functionality together. For example, you can think of a computer game where we need the representation of a player. So, what are the things we need to represent a player. We definitely want some kind of data for example, the position of a player, some attributes o…
Profile photo for Madhurima Buragohain
How to color and make a hyperlink clickable in latex \href{\color{blue}{https://scholar.google.com/citations?user=\\E9bb5RsAAAAJ&hl=en}}
Profile photo for Madhurima Buragohain
Removal of date in document in latex \documentclass{article} \usepackage{xcolor} \title{Suggested List of Potential Referees} \date{\vspace{-5ex}} \begin{document} … \end{document}
Profile photo for Madhurima Buragohain
Reduce the font size of a table in latex \begin{table*}[h!] \caption{State Transitions of PIT} \begin{center} \fontsize{8pt}{8.25pt}\selectfont \begin{tabular}{ |p{5cm}|c|c|c| } … \end{tabular} \end{center} \end{table*}
Profile photo for Madhurima Buragohain
How to write one algorithm in two page in latex \clearpage \setcounter{algocf}{3} \begin{algorithm} \setcounter{AlgoLine}{28}
Profile photo for Madhurima Buragohain
How to refer a figure as a table in latex? \begin{figure}[htb] \centering \captionof{table}[foo]{Table Name} \includegraphics[width=1.0\linewidth]{tableA.png} \label{img:foobar} \end{figure}
Profile photo for Madhurima Buragohain
\newcommand{\quotes}[1]{``#1''} ... \quotes{Hello World!}
Profile photo for Madhurima Buragohain
To determine the ‘good paths /routes’ (having least cost) from senders to receivers, through the network of routers.
Profile photo for Madhurima Buragohain
Rohit Virmani
· Oct 4
First picture: Ratan Tata 25 years 2nd picture: Ratan Tata 84 years When Indian billionaire Ratanji Tata was asked by a radio presenter in a telephone interview: "Sir, what do you remember when you found happiness in life"? Ratanji Tata said: "I have gone through four stages of happiness in life, and…
Access this answer and support the author as a Quora+ subscriber
Profile photo for Madhurima Buragohain
Figure: Inside view of a router There are four router components: (i) Input port: A lookup function is performed at input port. The forwarding table is consulted to determine the router output port to which an arriving packet will be forwarded via Switching fabric. Control packets (for example, the pa…
Profile photo for Madhurima Buragohain
Amit Goyal
· 5y
Nash equilibrium is an outcome in which every player is doing the best he possibly can given other players’ choices. So, no player can benefit from unilaterally changing his choice. Pareto optimal is an outcome from which any attempt to benefit someone by deviating to some other outcome will necessar…
Profile photo for Madhurima Buragohain
Phillip Remaker
· 4y
Throughput is how the rate of raw data you can stuff down a transmission medium without error. Goodput is the rate of ”good data” absorbed and processed by applications, essentially meaning the throughput minus the rate of useless junk arriving. “Useless junk” includes superfluous retransmissions, pa…
Profile photo for Madhurima Buragohain
Harry Ven
· 4y
Why a compelling abstract is essential? Because an abstract is one of the most read sections of a paper. Many researchers decide if they want to continue reading based on the abstract. An abstract is where you state the idea, and give reasons on why your research is compelling enough. The purpose of a…
Profile photo for Madhurima Buragohain
Exact algorithms guarantee (100%) to produce an optimal (the best) solution for a given problem if we do not limit time or memory.
Profile photo for Madhurima Buragohain
Heuristic approach/algorithm does not guarantee finding the best solution. However, they produce good answers quickly
Profile photo for Madhurima Buragohain
Ransomware is a type of malware that restricts access to the computer system and demands the user to pay a ransom to the malware operators to remove the restriction. Email is the most common delivery mechanism for ransomeware, Users fall prey to phishing email or clicking a malicious web link.…
Profile photo for Madhurima Buragohain
DNS is an application layer protocol since (1) It runs between communication end systems using the client-server paradigm. (2) It relies on an underlying end-to-end transport protocol to transfer DNS messages between communicating end systems.…
Profile photo for Madhurima Buragohain
Finite set of steps/instructions to solve a problem.
Profile photo for Madhurima Buragohain
‘internet ’ refers to any network of interconnected networks. ‘Internet’ (with capital I) refers to the global system of interconnected networks that we use in our day-to-day lives.
Profile photo for Madhurima Buragohain
Akshay Chopra
· 5y
If we go by the definition provided by Wikipedia, it states the following: “In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software. In general terms, it is a set of clearly defined methods of commu…
Profile photo for Madhurima Buragohain
Link for history of radio waves: The Discovery of Radio Waves
Profile photo for Madhurima Buragohain
Wireless communication allows the transfer of information between a transmitter and a receiver, without a physical medium. The same device typically acts as both a transmitter and a receiver, by using antennas. The communication link uses radio frequency signals to transfer information.…
Profile photo for Madhurima Buragohain
First download Eclipse from Eclipse downloads - Select a mirror | The Eclipse Foundation Commands: tar -xvzf eclipse-inst-jre-linux64.tar.gz cd eclipse-installer/ ./eclipse-inst Reference: HOWTO configure Eclipse with ns-3
Profile photo for Madhurima Buragohain
serialization is the process of translating a data structure or object state into a format that can be stored (for example, in a file or memory data buffer) or transmitted (for example, over a computer network) and reconstructed later. As you can see in the first Figure, there is some object state in…
Profile photo for Madhurima Buragohain
Jacob Rothstein
· 11y
\usepackage{verbatim} %In the preamble \begin{comment} multi line comment here \end{comment}
Profile photo for Madhurima Buragohain
No one knows whether or not efficient algorithms exist for NP-complete problems. The set of NP-complete problems has the remarkable property that if an efficient algorithm exists for any one of them, then efficient algorithms exists for all of them.…
Profile photo for Madhurima Buragohain
Video series: NS3 Network Simulator
Some tips: 1. You need to be good at C++. Have to understand the basic concepts such as smart pointer, class, object, struct. Have to know how to create classes so that later we can design your own custom class and extend…
Profile photo for Madhurima Buragohain
Reference: ML_For_AWID/Traditional ML on AWID Dataset.ipynb at master · Diwash15/ML_For_AWID
PS: Any doubt you can contact me.
Profile photo for Madhurima Buragohain
Reference: Machine Learning: 101 (Assamese)
Profile photo for Madhurima Buragohain
a[i]= Base adress + (i-LB)*S S= Size of an array element LB= Lower bound PS: for a[0…5], lower bound is 0 and for a[1..4], lower bound is 1 for a[-3…4], lower bound is -3
Profile photo for Madhurima Buragohain
An array is a data structure which can be defined as a finite ordered set of homogeneous elements.
Profile photo for Madhurima Buragohain
Martin O'Shea
· 5y
A data structure is a particular way of organising data in a computer so that it can be used efficiently. See Data Structure and Algorithms (DSA) Tutorial for further information.
Profile photo for Madhurima Buragohain
Machine learning is about abstracting and extracting knowledge from data and then applying that data algorithmically to make inference and to make decisions right.
Profile photo for Madhurima Buragohain
Write the following colored line in forwarder.cpp file. The output is shown in second image. …
Profile photo for Madhurima Buragohain
When we use shaping we will buffer the traffic to a certain bitrate, policing will drop the traffic when it exceeds a certain bitrate. …
Profile photo for Madhurima Buragohain
Suppose, in a network as shown above, Harry wants to send a message to Ron. If we use Hub, the same message will be transferred to all the devices connected to hub. That means, the message that was sent to Ron will be seen by Hermione and Malfoy as well. If we use switch, the message is not sent to a…
Profile photo for Madhurima Buragohain
Following are some good videos for learning networking from scratch. NetworkChuck
Profile photo for Madhurima Buragohain
Rittik Kumar
· Feb 24
I am 23 years (will turn 24 this March) old Software Engineer (SDE1 - Mobile) in Bangalore. I started my career as an intern in May 2019 where I used to get 15K in hand every month for up to 6 months. After that, I used to get 22k per month for another 6 months. I worked for a total of 1 year as an…
Access this answer and support the author as a Quora+ subscriber
Profile photo for Madhurima Buragohain
Profile photo for Madhurima Buragohain

Profile photo for Madhurima Buragohain
Recursion is for an algorithm and starts at a finite value N and goes back to a base value (say 1). Induction starts at 1, and then starting at N shows you how to go to N+1, and uses a “leap” to conclude something for all natural numbers.
Profile photo for Madhurima Buragohain
Profile photo for Anonymous
Anonymous
· 6y
All of these are sequences of vertices and edges. They have the following properties : 1. Walk : Vertices may repeat. Edges may repeat (Closed or Open) 2. Trail : Vertices may repeat. Edges cannot repeat (Open) 3. Circuit : Vertices may repeat. Edges cannot repeat (Closed) 4. Path : Vertices cannot repeat. Edges ca…
Profile photo for Madhurima Buragohain
Relations are more general than functions. In a function, each element of the domain has exactly one associated element in the range. In a relation, there may be several such elements in the range. PS: f: S1->S2 If f is a function, then the first set is called the domain of f and the second set is its…
Profile photo for Madhurima Buragohain
TryHackMe | Cyber Security Training https://www.hackers-arise.com/
Hack The Blog | All Things Hacking & Cyber RangeForce | Team Cyber Readiness Platform Hackers | Bugcrowd HackerOne | #1 Trusted Security Platform and Hacker Program Expert IT Training for Networking, Cyber Security and Cloud | INE
Profile photo for Madhurima Buragohain
Michael Huang
· 3y
The short answer is that they are loose terms with their differences largely lost now. The long answer follows. In the past, computer architecture vs organization is somewhat similar to architecture vs civil engineering. The former is about the design of the system and the latter the implementation o…
Profile photo for Madhurima Buragohain
Cryptocurrency is a type of digital asset which can be used to exchange value between parties. It uses cryptography to secure how it is transferred and to control the creation of new units of that currency.
Profile photo for Madhurima Buragohain
Hashing is one way function. We can generate a hash from a text but there is no way to get back the original text from the hash. This is different from encryption. When we encrypt a message using a key, we can use the same key for decryption and get the original. A hash generates a unique fingerprin…
Profile photo for Madhurima Buragohain
A cryptographic hash is basically a digest or digital fingerprint of a certain amount of data. You can use the following link to get a hash of a particular message you want and you will observe for each new character added, there is always a new hash. https://demoblockchain.org/hash SHA256 Hash in the…
Profile photo for Madhurima Buragohain
Jim Gao
· 7y
There are 2 big differences between adjacency list and matrix. One is space requirement, and the other is access time. Space Needed Recall that adjacency matrix is a N by N array, either filled with true/false (if unweighted), or the weight of the edge. This requires O(N^2) space complexity. This is…
Profile photo for Madhurima Buragohain
David Joyce
· Feb 4
You asked who defined mathematics that way. Lots of people have characterized mathematics with words like that, and that characterization is a pretty good one. Google finds the first use of the precise wording of your first sentence “Mathematics is the science and study of quality, structure, space,…
Profile photo for Madhurima Buragohain
Hotte Shen
· 2y
Definitely yes. * Type annotations improve the code readability, which is Python’s key advantage. * It also helps us to create a more correct and meaningful code. * In most cases, type annotations are just enough for API doc Let’s look at the following code. The getImageList() method is intended to return a li…
Profile photo for Madhurima Buragohain
CompTIA Security+ , OSCP
Profile photo for Madhurima Buragohain
GoLang is short form of Go Programming Language. It is crazy fast, it has so much concurrency (ability to do multiple things at once). It gives the same expressiveness the python does, but the same power and core functionality that c or C++, some of those lower languages do. It can cross compile and…
Profile photo for Madhurima Buragohain
Python is a scripting language which means it is interpreted. That means there is another kind of program waiting in the background reading your code as if it were a script to act out on stage and then performing those actions and going and doing those things.…
Profile photo for Madhurima Buragohain
* Find the research area you are Interested in by discussing with peers and PhD Guide. * Start reading survey papers and white papers published by some organisation related to the topic : Good survey paper in CS is: IEEE Communications Surveys and Tutorials. For example, white paper for D2D communication…
Profile photo for Madhurima Buragohain
We can use a password for each transaction, which should be used once and discarded. Thus, we encryption and decryption can help protecting against replay attacks.
Profile photo for Madhurima Buragohain
RSA (Rivest-Shamir-Adleman), ElGamal encryption, AES (Advanced Encryption Standard), DES (Data Encryption Standard).
Profile photo for Madhurima Buragohain
Presentation Layer.
Profile photo for Madhurima Buragohain
Simply, “break” helps to jump outside of the current loop. “continue” means stop this particular iteration right here and execute the next iteration. In real life also, we use break and continue while reading a book/novel. Suppose, you are reading a book. for (pag_number=0;page_number<=100;page_number+…
Profile photo for Madhurima Buragohain
Now-a-days, we use Internet for services like net banking, e-health (your health record in hospital database), military (secret talk among high level officials). These services use sensitive information. To secure us from malicious persons, we use cryptography in Internet communication so that no on…
Profile photo for Madhurima Buragohain
In a network, a router can not quickly process packets if the rate of incoming packets is more than outgoing packets. So, to avoid packet loss, packets are inserted in a queue. As a network designer, you can make different designs of the queue. The most simple design is drop tail where a packet will…
Profile photo for Madhurima Buragohain
Tezpur university Computer Science (if you are interested in CSE). In CSE, you should always keen to learn new things/technologies, otherwise you can not excel.
Profile photo for Madhurima Buragohain
To manage and centrally administer a large number of wireless access points, network use Wireless LAN controller.
Profile photo for Madhurima Buragohain
Jessica Su
· 9y
These refer to how long it takes a program to run. Problems in class P can be solved with algorithms that run in polynomial time. Say you have an algorithm that finds the smallest integer in an array. One way to do this is by iterating over all the integers of the array and keeping track of the sma…
Profile photo for Madhurima Buragohain
Following flag bits in the TCP header are used for TCP connection management. * SYN: we use this for the initial three-way handshake and it’s used to set the initial sequence number. * FIN: this finish bit is used to end the TCP connection. TCP is full-duplex so both parties will have to use the FIN bit t…
Profile photo for Madhurima Buragohain
You can use ping command.
Profile photo for Madhurima Buragohain
I am going to explain your question from real life: We normally say the person has a good network. That means he is in connection to many other people through different means like phone, email, etc. Similarly, a networking device such as a laptop, router, your smartwatch (which we generally term as ho…
Profile photo for Madhurima Buragohain
TCP achieve reliability in data transmission by flow control, sequence numbers, acknowledgements, and timers.
Profile photo for Madhurima Buragohain
Physical layer
Profile photo for Madhurima Buragohain
A bitcoin is a type of digital asset that can be bought, sold or transferred between parties securely over the Internet. Because of this, bitcoin can be used to store value, much like buying gold, silver and other types of investments. But unlike those other types of investments, Bitcoin also serves…
Profile photo for Madhurima Buragohain
A blockchain is a constantly growing ledger that keeps a permanent record of all transactions that have taken place, in a secure, chronological and immutable way.
Profile photo for Madhurima Buragohain
Transport Layer Security (TLS) protocol.
Profile photo for Madhurima Buragohain
Some tips for writing a good research paper (from my own experience) 1. Try to develop a curiosity to read your paper. Like in a movie, we want to know what will happen next. 2. State clearly what is the problem you are going to solve. 3. State the challenges you face to solve this problem. 4. State how…
Profile photo for Madhurima Buragohain
It depends on application requirements. If your application does not require security, then you can use it.
Profile photo for Madhurima Buragohain
Suppose you are given a pipe through which 10-litre water flows. Now, in context to network, suppose your computer (laptop) downloads a video from YouTube server. There are many links between your laptop and Youtube server, which are connected through routers. Each link has its own capacity to carry…
Profile photo for Madhurima Buragohain
In a circuit-switched network, to provide communication between the end systems, the resources that are required along the path are reserved for the duration of the communication session. The example of resources are buffers and link transmission rate. PS: It is analogous to reserving the table befor…
Profile photo for Madhurima Buragohain
The purpose of 3-way handshaking is to validate the authenticity of each party (client and server) and to establish the encryption key and options that will secure subsequent communications. Suppose you want some help from a unknown person. So before asking help, you will say a “Hi” and you will wait…
Profile photo for Madhurima Buragohain
If we consider a single queue, there may be a possibility that a packet with a very less delay requirement may be inserted in the queue already having a large number of packets in it. Thus waiting in a queue will significantly affect the delay constrained applications like VOIP, VIDEO. To address th…
Profile photo for Madhurima Buragohain
Convergence time is more.
Profile photo for Madhurima Buragohain
Yes. By necessity, Facebook sees your IP address every time you connect.
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)
Studied at Tezpur University
Add location credential
67.2K content views4.6K this month
Joined October 2017