Friday 13 October 2017

Everything you Should Know About an IP-Addresses

                                          index
You have heard of this term IP Address many times in day-to day life if you belong to IT sector, yes as soon as you heard about the term IP only one thing that stucks in your mind is the IP of a computer which you people might have seen. But what this IP actually is….??
IP address, or “internet protocol address”, is a unique identifying number given to every single computer on the Internet. Like a car license plate, an IP address is a special serial number used for identification.
NOTE:- An IP Address is different from a MAC Address or an Domain Name address
Any machine connected to the Internet has an IP address  Xbox games, cell phones, fax machines, and even soda pop dispensers have IP addresses. In every case, the IP address acts both like a car license plate and like a telephone number: it shows ownership, allows the machine to be located by other machines, and empowers authorities to track and protect people’s safety, if need be.

How IP addresses look:

IP addresses have two common formats. IP version 4 addresses are comprised of four numbers-only segments separated by dots:
  • e.g. 127.0.0.1
  • e.g. 253.16.44.22
  • e.g. 72.48.108.101
IP version 6 addresses are more complex. IPv6 addresses are comprised of 8 segments:
  • e.g. 3ffe:1900:4545:3:200:f8ff:fe21:67cf
  • e.g. 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A
Related: Read more about how IPv6 is different from IPv4.

IP address is not the same as www domain name addresses:

For nearly every web server, the IP address is invisibly translated into a natural English “domain name” for ease of use. But technically speaking, the IP address is the true identifier of a web server…the domain name is simply a redirector pointer to help people find the web server.
Here are three IP addresses, with their corresponding domain names. Both the IP address and domain name URL can be used to connect to the same web server:
Your ISP has a block of IP addresses to lend:
Internet authorities allot large bundles of IP address numbers to regional internet service providers. Those ISP’s, in turn, assign the IP addresses to every server and every internet user who logs on. Yes, there are millions of IP addresses active at any instant.

More about IP addresses:

  • Trivia point 1: before the World Wide Web became popular in the 1990’s, every computer was assigned a fixed (“static” IP address). But with so many millions of internet users today, ISP’s now choose to “lend” IP addresses from a pool of numbers. This is much like dealer license plates being shared amongst test drive vehicles at a car dealership. This loaning of IP addresses is called “dynamic IP addressing”, and is proven to work better for individual users.
  • Trivia point 2: often, it is possible to identify where a user is in the world by their IP address. Web sites like www.whatismyipaddress.com/ can read your computer’s IP address, compare it to its database of ISP’s, and attempt to guess your location on the planet.
  • Trivia point 3: it is possible to mask or digitally alter the appearance of your computer’s IP address. You would do this for the sake of privacy or to avoid authorities tracking your online habits.
  • Trivia point 4: within office networks, each office computer is given an “internal IP address”. As soon as an office computer accesses the internet, it then borrows the office’s main IP address. This works much like office telephone numbers: a unique internal extension number is assigned to every user, but as soon as any person dials out of the office, call display will only show the office’s main phone number. This is known as internal vs. external IP addressing, and is a necessary technique to reduce the number of IP addresses on the internet.
  • Trivia point 5: as of April 2013, the internet is switching from IP addressing standard Version 4 (aka “IPv4”) to a new generation of addresses called IPv6. The biggest change is in the number of available addresses. Instead of 4.3 billion possible IP addresses, IPv6 will bring us 34,000,000,000,000,000,000 billion possible IP addresses.

How Cloud Computing Works.

                               A typical cloud computing system. See more computer networking pictures.
Let’s say you’re an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for everyone isn’t enough — you also have to purchase software or software licenses to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It’s so stressful that you find it difficult to go to sleep on your huge pile of money every night.
Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you’d only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It’s called cloud computing, and it could change the entire computer industry.
There’s a good chance you’ve already used some form of cloud computing. If you have an e-mail account with a Web-based e-mail service like Hotmail, Yahoo! Mail or Gmail, then you’ve had some experience with cloud computing. Instead of running an e-mail program on your computer, you log in to aWeb e-mail account remotely. The software and storage for your account doesn’t exist on your computer — it’s on the service’s computer cloud.
Cloud Computing Architecture
When talking about a cloud computing system, it’s helpful to divide it into two sections: the front end and the back end. They connect to each other through a network, usually the internet. The front end is the side the computer user, or client, sees. The back end is the “cloud” section of the system.
The front end includes the client’s computer(or computer network) and the application required to access the cloud computing system. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverage existing Web browsers like Internet Explorer or Firefox. Other systems have unique applications that provide network access to clients.On the back end of the system are the various computers, servers and data storage systems that create the “cloud” of computing services. In theory, a cloud computing system could include practically any computer program you can imagine, from data processing to video games. Usually, each application will have its own dedicated server.
A central server administers the system, monitoring traffic and client demands to ensure everything runs smoothly. It follows a set of rules called protocols and uses a special kind of software called middleware. Middleware allows networked computers to communicate with each other. Most of the time, servers don’t run at full capacity. That means there’s unused processing power going to waste. It’s possible to fool a physical server into thinking it’s actually multiple servers, each running with its own independent operating system. The technique is called server virtualization. By maximizing the output of individual servers, server virtualization reduces the need for more physical machines.
If a cloud computing company has a lot of clients, there’s likely to be a high demand for a lot of storage space. Some companies require hundreds of digital storage devices. Cloud computing systems need at least twice the number of storage devices it requires to keep all its clients’ information stored. That’s because these devices, like all computers, occasionally break down. A cloud computing system must make a copy of all its clients’ information and store it on other devices. The copies enable the central server to access backup machines to retrieve data that otherwise would be unreachable. Making copies of data as a backup is called redundancy.
Cloud Computing Applications
The applications of cloud computing are practically limitless. With the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system.
Why would anyone want to rely on another computer system to run programs and store data?
  • Clients would be able to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data wouldn’t be confined to a hard drive on one user’s computer or even a corporation’s internal network.
  • It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware on the client side. You wouldn’t need to buy the fastest computer with the most memory, because the cloud system would take care of those needs for you. Instead, you could buy an inexpensive computer terminal. The terminal could include a monitor, input devices like a keyboard and mouse and just enough processing power to run the middleware necessary to connect to the cloud system. You wouldn’t need a large hard drive because you’d store all your information on a remote computer.
  • Corporations that rely on computers have to make sure they have the right software in place to achieve goals. Cloud computing systems give these organizations company-wide access to computer applications. The companies don’t have to buy a set of software or software licenses for every employee. Instead, the company could pay a metered fee to a cloud computing company.
  • Servers and digital storage devices take up space. Some companies rent physical space to store servers and databases because they don’t have it available on site. Cloud computing gives these companies the option of storing data on someone else’s hardware, removing the need for physical space on the front end.
  • Corporations might save money on IT support. Streamlined hardware would, in theory, have fewer problems than a network of heterogeneousmachines and operating systems.
  • If the cloud computing system’s back end is a grid computing system, then the client could take advantage of the entire network’s processing power. Often, scientists and researchers work with calculations so complex that it would take years for individual computers to complete them. On a grid computing system, the client could send the calculation to the cloud for processing. The cloud system would tap into the processing power of all available computers on the back end, significantly speeding up the calculation. 
Cloud Computing Concerns
Perhaps the biggest concerns about cloud computing are security and privacy. The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because they can’t keep their company’s information underlock and key.
The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all its clients. It’s in their interest to employ the most advanced techniques to protect their clients’ data.
Some questions regarding cloud computing are more philosophical. Does the user or company subscribing to the cloud computing service own the data? Does the cloud computing system, which provides the actual storage space, own it? Is it possible for a cloud computing company to deny a client access to that client’s data? Several companies, law firms and universities are debating these and other questions about the nature of cloud computing.
How will cloud computing affect other industries? There’s a growing concern in the IT industry about how cloud computing could impact the business of computer maintenance and repair. If companies switch to using streamlined computer systems, they’ll have fewer IT needs. Some industry experts believe that the need for IT jobs will migrate to the back end of the cloud computing system.
Another area of research in the computer science community is autonomic computing. An autonomic computing system is self-managing, which means the system monitors itself and takes measures to prevent or repair problems. Currently, autonomic computing is mostly theoretical. But, if autonomic computing becomes a reality, it could eliminate the need for many IT maintenance jobs.

What are Virtual Machines..?

index
A virtual machine uses a combination of software and your existing computer to emulate additional computers, all within one physical device.
Virtual machines provide the ability to emulate a separate operating system (the guest), and therefore a separate computer, from right within your existing OS (the host). This independent instance appears in its own window and is typically isolated as a completely standalone environment, although interactivity between guest and host is often permitted for tasks such as file transfers.

Everyday Reasons For Using a Virtual Machine

There are many reasons why you may want to run a VM, including developing or testing software on various platforms without actually utilizing a second device. Another purpose could be gaining access to applications that are native to an operating system different than your own. An example of this would be wanting to play a game exclusive to Windows when all you have is a Mac.
EntSennheiser CX 180 Street II In-Ear Headphone (Black)er a caption

In addition, VMs provide a level of flexibility in terms of experimenting that is not always feasible on your main, host operating system. Most VM software allows you to take snapshots of the guest OS, which you can later revert back to if something were to go wrong such as key files becoming corrupted or even a malware infection taking place.

Why Businesses Might Use Virtual Machines

On a grander, non-personal scale, many organizations deploy and maintain several virtual machines.
Rather than having a large number of individual computers running at all times, companies opt to have a bunch of VMs hosted on a much smaller subset of powerful servers, saving money not only on physical space but also on electricity and maintenance. These VMs can be controlled from a single administrative interface and made accessible to employees from their own remote workstations, often spread out across multiple geographical locations.
Because of the isolated nature of the virtual machine instances, companies can even allow users to access their corporate networks via this technology on their own personal computers—adding to both flexibility and cost savings.
Full control is another reason that they are an attractive alternative for admins, as each VM can be manipulated, started and stopped instantly with just a simple mouse click or command line entry. Couple that with real-time monitoring ability and advanced security oversight and virtual machines become quite a viable option.

Common Limitations of Virtual Machines

While VMs are certainly useful, there are notable limitations that need to be understood beforehand so that your performance expectations are realistic. Even if the device hosting the VM contains powerful hardware, the virtual instance itself may run significantly slower than it would on its own independent computer. Advancements in hardware support within VMs have come a long way in recent years, but the fact remains that this limitation will never be completely eliminated.
Another obvious limitation is cost. Aside from the fees associated with some virtual machine software, installing and running an operating system – even within a VM – still requires a license or other authentication method in some instances, depending on the particular OS.

Enter Amazon Fire TV Stick with Voice Remote | Streaming Media Playera caption

For example, running a guest instance of Windows 10 requires a valid license key just as it would if you were installing the operating system on an actual PC. While a virtual solution is typically cheaper in most cases than having to purchase additional physical machines, the costs can add up when you require a larger-scale rollout.
Other potential limitations to consider would be lack of support for certain hardware components as well as possible network constraints. With all of that said, as long as you do your research and have realistic expectations going in, implementing virtual machines in your home or business environment could be a real game changer.

Details about Java Virtual Machine you mus know.


                             javajava-virtual-machine-5-728
JVM is an specification that provides run-time environment in which java byte-code can be executed.
JVMs are available for many hardware and software platforms (i.e. JVM is platform dependent).

What is JVM

It is:
  1. A specification where working of Java Virtual Machine is specified. But implementation provider is independent to choose the algorithm. Its implementation has been provided by Sun and other companies.
  2. An implementation Its implementation is known as JRE (Java Runtime Environment).
  3. Runtime Instance Whenever you write java command on the command prompt to run the java class, an instance of JVM is created.

What it does

The JVM performs following operation:
  • Loads code
  • Verifies code
  • Executes code
  • Provides runtime environment
JVM provides definitions for the:
  • Memory area
  • Class file format
  • Register set
  • Garbage-collected heap
  • Fatal error reporting etc.

Internal Architecture of JVM

Let’s understand the internal architecture of JVM. It contains classloader, memory area, execution engine etc.
                                 Jvm Internal

1) Classloader

Classloader is a subsystem of JVM that is used to load class files.

2) Class(Method) Area

Class(Method) Area stores per-class structures such as the runtime constant pool, field and method data, the code for methods.

3) Heap

It is the runtime data area in which objects are allocated.

4) Stack

Java Stack stores frames.It holds local variables and partial results, and plays a part in method invocation and return.
Each thread has a private JVM stack, created at the same time as thread.
A new frame is created each time a method is invoked. A frame is destroyed when its method invocation completes.

5) Program Counter Register

PC (program counter) register. It contains the address of the Java virtual machine instruction currently being executed.

6) Native Method Stack

It contains all the native methods used in the application.

7) Execution Engine

It contains:
1) A virtual processor
2) Interpreter: Read bytecode stream then execute the instructions.
3) Just-In-Time(JIT) compiler: It is used to improve the performance.JIT compiles parts of the byte code that have similar functionality at the same time, and hence reduces the amount of time needed for compilation.Here the term ?compiler? refers to a translator from the instruction set of a Java virtual machine (JVM) to the instruction set of a specific CPU.