CS Theory

Word Break Problems

Solutions for Word Break problems including dynamic programming approaches and memoized recursion to determine if strings can be segmented using dictionary words.

February 5, 2026

Word Ladder Problems

Solutions to word ladder problems including finding minimum transformations and all shortest paths. Covers standard BFS, bidirectional BFS, and graph construction techniques with detailed code examples.

February 5, 2026

How DNS Works

When you type a domain name in your browser, it first checks your local hosts file. If not found, it queries your configured DNS server, which either has the mapping cached or asks the root servers for resolution through recursive lookup.

January 29, 2026

Protocol Headers

Understanding network protocol headers from MAC frames to HTTP. Covers MAC frame structure, IP header fields, TCP and UDP headers, and HTTP header types with their practical length constraints.

January 29, 2026

SSL Protocol

SSL adds a security layer between applications and sockets. The process involves negotiating encryption algorithms, server authentication through certificates, calculating session keys with random secrets encrypted by server public keys, and secure data transmission.

January 29, 2026

UDP Protocol

UDP provides connectionless communication without complex control mechanisms. Unlike TCP it offers no reliability guarantees but has minimal overhead and supports multicast applications. Learn when to use UDP versus TCP and how to build reliability on top.

January 29, 2026

Big Data Special Topic

Comprehensive guide to big data processing techniques including data scale estimation memory optimization topK problems sorting algorithms real-time ranking systems and deduplication methods for handling large datasets efficiently.

January 27, 2026

Consistent Hashing Algorithm

Consistent hashing algorithm solves cache invalidation problems caused by server changes in clusters. It distributes keys on a hash ring from 0 to 2^32, places servers using IP addresses, and adds virtual nodes to prevent data skew and reduce query distances.

January 27, 2026

Distributed Hash Table DHT

Technical overview of distributed hash table protocols including Chord based on consistent hashing ring structure, Kad using binary tree mapping with XOR distance calculation, and BEP-09 for BitTorrent file downloads through TCP connections.

January 27, 2026

Fundamentals of Distributed Theory

Comprehensive guide to distributed system fundamentals including Byzantine General Problem solutions, CAP theorem trade-offs, ACID principles, BASE theory, and consensus algorithms like Paxos for building reliable distributed systems.

January 27, 2026