Beruflich Dokumente
Kultur Dokumente
Consider a student table below. The key value here is STUDENT_ID. And each record contains the
details of each student along with its key value and the index/pointer to the next value. In a B+ tree it
can be represented as below.
Please note that the leaf node 100 means, it has name and address of student with ID 100, as we
saw in R1, R2, R3 etc above.
There is one main node called root of the tree 105 is the root here.
There is an intermediary layer with nodes. They do not have actual records stored. They are
all pointers to the leaf node. Only the leaf node contains the data in sorted order.
The nodes to the left of the root nodes have prior values of root and nodes to the right have
next values of the root. i.e.; 102 and 108 respectively.
There is one final node, called leaf node, which has only values. i.e.; 100, 101, 103, 104, 106
and 107
All the leaf nodes are balanced all the leaf nodes at same distance from the root node.
Hence searching any record is easier.
Searching any record is linear in this case. Any record can be traversed through single path
and accessed easily.
Since the intermediary nodes have only pointers to the leaf node, the tree structure is of
shorter height. Shorter the height, faster is the traversal and hence the retrieval of records.
Advantages of B+ Trees
Since all records are stored only in the leaf node and are sorted sequential linked list,
searching is becomes very easy.
Using B+, we can retrieve range retrieval or partial retrieval. Traversing through the tree
structure makes this easier and quicker.
As the number of record increases/decreases, B+ tree structure grows/shrinks. There is no
restriction on B+ tree size, like we have in ISAM.
Since it is a balance tree structure, any insert/ delete/ update does not affect the
performance.
Since we have all the data stored in the leaf nodes and more branching of internal nodes
makes height of the tree shorter. This reduces disk I/O. Hence it works well in secondary
storage devices
To understand it clearly, consider a table with Subject, Lecturer who teaches each subject and
recommended Books for each subject.
If we observe the data in the table above it satisfies 3NF. But LECTURER and BOOKS are two
independent entities here. There is no relationship between Lecturer and Books. In the above
example, either Alex or Bosco can teach Mathematics. For Mathematics subject , student can refer
either 'Maths Book1' or 'Maths Book2'. i.e.;
SUBJECT-->BOOKS
This is a multivalued dependency on SUBJECT. If we need to select both lecturer and books
recommended for any of the subject, it will show up (lecturer, books) combination, which implies
lecturer who recommends which book. This is not correct.
Now if we want to know the lecturer names and books recommended for any of the subject, we will
fire two independent queries. Hence it removes the multi-valued dependency and confusion around
the data. Thus the table is in 4NF.
It builds on the first three normal forms (1NF, 2NF and 3NF) and the Boyce-Codd Normal Form
(BCNF). It states that, in addition to a database meeting the requirements of BCNF, it must not
contain more than one multivalued dependency.
SEQUENCES
CREATING SEQUENCES
START WITH 1
INCREMENT BY 1
MINVALUE 1
MAXVALUE 100/NOMAXVALUE
CYCLE/NOCYCLE
CACHE 10/NOCACHE;
The above statement creates a sequence bills it will start with 1 and increment by 1.
Its MAXVALUE is 100 i.e. after 100 numbers are generated it will stop if you say
NOCYCLE, otherwise if you mention CYCLE then again it will start with no. 1. You can
also specify NOMAXVALUE in that case the sequence will generate infinite numbers.
The CACHE option is used to cache sequence numbers in System Global Area (SGA). If
you say CACHE 10 then oracle will cache next 10 numbers in SGA. If you access a
sequence number then oracle will first try to get the number from cache, if it is not
found then it reads the next number from disk. Since reading the disk is time
consuming rather than reading from SGA it is always recommended to cache
sequence numbers in SGA. If you say NOCACHE then Oracle will not cache any
numbers in SGA and every time you access the sequence number it reads the
number from disk.
Accessing Sequence Numbers.
To generate Sequence Numbers you can use NEXTVAL and CURRVAL for example to
get the next sequence number of bills sequence type the following command.
BILLS
-----
NEXTVAL gives the next number in sequence. Whereas, CURRVAL returns the
current number of the sequence. This is very handy in situations where you have
insert records in Master Detail tables. For example to insert a record in SALES master
table and SALES_DETAILS detail table.
values (bills.nextval,Sami,2300);
(bills.currval,Onida,10,13400);
ALTERING SEQUENCES
To alter sequences use ALTER SEQUENCE statement. For example to alter the bill
sequence MAXVALUE give the following command.
MAXVALUE 200;
Except Starting Value, you can alter any other parameter of a sequence. To change
START WITH parameter you have to drop and recreate the sequence.
DROPPING SEQUENCES
To drop sequences use DROP SEQUENCE command. For example to drop bills
sequence give the following statement
To see how many sequences are there in your schema and what are there settings
give the following command.
PUBLIC SYNONYM
PRIVATE SYNONYM
If you a create a synonym as public then it can be accessed by any other user with
qualifying the synonym name i.e. the user doesnt have to mention the owner name
while accessing the synonym. Nevertheless the other user should have proper
privilege to access the synonym. Private synonyms needs to be qualified with owner
names.
CREATING SYNONYMS
To create a synonym for SCOTT emp table give the following command.
A synonym can be referenced in a DML statement the same way that the underlying
object of the synonym can be referenced. For example, if a synonym
named EMPLOYEE refers to a table or view, then the following statement is valid:
select * from employee;
Suppose you have created a function known as TODAY which returns the current
date and time. Now you have granted execute permission on it to every other user of
the database. Now these users can execute this function but when the call they have
to give the following command:
select scott.today from dual;
Now if you create a public synonym on it then other users dont have to qualify the
function name with owners name. To define a public synonym give the following
command.
Now the other users can simply type the following command to access the function.
Dropping Synonyms
To drop a synonym use the DROP SYNONYM statement. For example, to drop
EMPLOYEE synonym give the statement
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact untill the source and destination
machines were functioning.
The overall idea was to allow one application on one computer to talk to(send data packets) another
application running on different computer.
2. Protocol is used to connect to the host, so that the packets can be sent over it.
4. Order in which packets are received is different from the way they are sent.
2. Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.
5. Transport layer breaks the message (data) into small units so that they are handled more
2. FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users
3. SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport electronic mail
4. DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
1. It operated independently.
2. It is scalable.
3. Client/server architecture.
4. Supports a number of routing protocols.
Demerits of TCP/IP
The term wireless communication was introduced in the 19th century and wireless
communication technology has developed over the subsequent years. It is one of the
most important mediums of transmission of information from one device to other
devices. In this technology, the information can be transmitted through the air without
requiring any cable or wires or other electronic conductors, by using electromagnetic
waves like IR, RF, satellite, etc. In the present days, the wireless communication
technology refers to a variety of wireless communication devices and technologies
ranging from smart phones to computers, tabs, laptops, Bluetooth Technology, printers.
This article gives an overview of wireless communication and types of wireless
communications.
Types of Wireless Communciation
Satellite Communication
Infrared Communication
Infrared Communication
For a successful infrared communication, a photo LED transmitter and a photo diode
receptor are required. The LED transmitter transmits the IR signal in the form of non
visible light, that is captured and saved by the photoreceptor. So the information
between the source and the target is transferred in this way. The source and
destination can be mobile phones, TVs, security systems, laptops etc supports wireless
communication.
Broadcast Radio
The first wireless communication technology is the open radio communication to seek
out widespread use, and it still serves a purpose nowadays. Handy multichannel radios
permit a user to speak over short distances, whereas citizens band and maritime radios
offer communication services for sailors. Ham radio enthusiasts share data and function
emergency communication aids throughout disasters with their powerful broadcasting
gear, and can even communicate digital information over the radio frequency spectrum.
Broadcast Radio
Mostly an audio broadcasting service, radio broadcasts sound through the air as radio
waves. Radio uses a transmitter which is used to transmit the data in the form of radio
waves to a receiving antenna(Different Types of Antennas). To broadcast common
programming, stations are associated with the radio N/Ws. The broadcast happens
either in simulcast or syndication or both. Radio broadcasting may be done via cable
FM, the net and satellites. A broadcast sends information over long distances at up to
two megabits/Sec (AM/FM Radio).
Radio waves are electromagnetic signals, that are transmitted by an antenna.These
waves have completely different frequency segments, and you will be ready to obtain an
audio signal by changing into a frequency segment.
Radio
For example, you can take a radio station. When the RJ says you are listening to 92.7
BIG FM, what he really means is that signals are being broadcasted at a frequency of
92.7megahertz, that successively means the transmitter at the station is periodic at a
frequency of 92.700,000 Cycles/second.
When you would like to listen to 92.7 BIG FM, all you have to do is tune the radio to just
accept that specific frequency and you will receive perfect audio reception.
Microwave Communication
Microwave Communication
Wherein satellite method, the data can be transmitted though a satellite, that orbit
22,300 miles above the earth. Stations on the earth send and receive data signals from
the satellite with a frequency ranging from 11GHz-14GHz and with a transmission
speed of 1Mbps to 10Mbps. In terrestrial method, in which two microwave towers with a
clear line of sight between them are used, ensuring no obstacles to disrupt the line of
sight. So it is used often for the purpose of privacy. The frequency range of the
terrestrial system is typically 4GHz-6GHz and with a transmission speed is usually
1Mbps to 10Mbps.
Channel Capacity or Maximum Data rate the maximum rate (in bps) at which data can
be transmitted over a given communication link, or channel
Local loop
n telephony, the local loop (also referred to as a local tail, subscriber line, or in the aggregate as
the last mile) is the physical link or circuit that connects from the demarcation point of the customer
premises to the edge of the common carrier or telecommunications service provider's network.
At the edge of the carrier access network in a traditional public telephone network, the local loop
terminates in a circuit switch housed in an incumbent local exchange carrier or telephone exchange.
Trunks
narrowband describes a channel in which the bandwidth of the message does not significantly
exceed the channel's coherence bandwidth.
In the study of wired channels, narrowband implies that the channel under consideration is
sufficiently narrow that its frequency response can be considered flat. The message bandwidth will
therefore be less than the coherence bandwidth of the channel. That is, no channel has perfectly flat
fading, but the analysis of many aspects of wireless systems is greatly simplified if flat fading can be
assumed.
Narrowband can also be used with the audio spectrum to describe sounds which occupy a narrow
range of frequencies.
In telephony, narrowband is usually considered to cover frequencies 3003400 Hz.
Broadband phone service enables voice telephone calls to work over your high-speed
Internet connection. A broadband phone (also known as a VoIP or Internet phone) utilizes the
same IP network as your Internet service
A low Earth orbit (LEO) typically is a circular orbit about 160 to 2,000 kilometres (99 to 1,243 mi)
above the earth's surface[citation needed] and, correspondingly, a period (time to revolve around the earth)
of about 90 minutes.
Because of their low altitude, these satellites are only visible from within a radius of roughly 1,000
kilometres (620 mi) from the sub-satellite point. In addition, satellites in low earth orbit change their
position relative to the ground position quickly. So even for local applications, a large number of
satellites are needed if the mission requires uninterrupted connectivity.
Low-Earth-orbiting satellites are less expensive to launch into orbit than geostationary satellites and,
due to proximity to the ground, do not require as high signal strength (Recall that signal strength falls
off as the square of the distance from the source, so the effect is dramatic). Thus there is a trade off
between the number of satellites and their cost
A geosynchronous satellite is a satellite in geosynchronous orbit, with an orbital period the same
as the Earth's rotation period. Such a satellite returns to the same position in the sky after
each sidereal day, and over the course of a day traces out a path in the sky that is typically some
form of analemma. A special case of geosynchronous satellite is the geostationary satellite, which
has a geostationary orbit a circular geosynchronous orbit directly above the Earth's equator.
Another type of geosynchronous orbit used by satellites is the Tundra elliptical orbit.
Geosynchronous satellites have the advantage of remaining permanently in the same area of the
sky, as viewed from a particular location on Earth, and so permanently within view of a given ground
station
A hub, also called a network hub, is a common connection point for devices in a
network. Hubs are devices commonly used to connect segments of a LAN.
the gateway is the computer that routes the traffic from a workstation to the
outside network that is serving the Web pages. In homes, thegateway is the ISPthat connects
the user to the internet. In enterprises, thegateway node often acts as a proxy server and a
firewall
Tunneling, also known as "port forwarding," is the transmission of data intended for use only
within a private, usually corporate network through a public network in such a way that the
routing nodes in the public network are unaware that the transmission is part of a
private network
The packet fragmentation problem in computer networks is that of breaking a packet into
smaller pieces (fragments) due to packet size limitations along the packet's route. This is a
typical internetworking problem
Definition. Routing is the process of moving packets across a networkfrom one host to a
another. It is usually performed by dedicated devices calledrouters. Packets are the
fundamental unit of information transport in all moderncomputer networks, and increasingly in
other communications networks as well
Virtual Circuits-
1. It is connection-oriented simply meaning that there is a reservation of resources like buffers, CPU,
bandwidth,etc. for the time in which the newly setup VC is going to be used by a data transfer
session.
2. First packet goes and reserves resources for the subsequent packets which as a result follow the
same path for the whole connection time.
3. Since all the packets are going to follow the same path, a global header is required only for the first
packet of the connection and other packets generally dont require global headers.
4. Since data follows a particular dedicated path, packets reach inorder to the destination.
5. From above points, it can be concluded that Virtual Circuits are highly reliable means of transfer.
6. Since each time a new connection has to be setup with reservation of resources and extra
information handling at routers, its simply costly to implement Virtual Circuits.
Datagram Networks :
1. It is connectionless service. There is no need of reservation of resources as there is no dedicated
path for a connection session.
2. All packets are free to go to any path on any intermediate router which is decided on the go by
dynamically changing routing tables on routers.
3. Since every packet is free to choose any path, all packets must be associated with a header with
proper information about source and the upper layer data.
4. The connectionless property makes data packets reach destination in any order, means they need
not reach in the order in which they were sent.
5. Datagram networks are not reliable as Virtual Circuits.
6. But it is always easy and cost efficient to implement datagram networks as there is no extra
headache of reserving resources and making a dedicated each time an application has to
communicate.
Routing Algorithms
The routing algorithms are as follows:
Flooding
Flooding is simplest method packet forwarding. When a packet is received,
the routers send it to all the interfaces except the one on which it was
received. This creates too much burden on the network and lots of duplicate
packets wandering in the network.
Time to Live (TTL) can be used to avoid infinite looping of packets. There
exists another approach for flooding, which is called Selective Flooding to
reduce the overhead on the network. In this method, the router does not
flood out on all the interfaces, but selective ones.
Shortest Path
Routing decision in networks, are mostly taken on the basis of cost between
source and destination. Hop count plays major role here. Shortest path is a
technique which uses various algorithms to decide a path with minimum
number of hops.
Dijkstra's algorithm
Network congestion in data networking and queueing theory is the reduced quality of service
that occurs when a network node is carrying more data than it can handle. Typical effects
include queueing delay, packet loss or the blocking of new connections
Congestion Control refers to techniques and mechanisms that can either prevent
congestion, before it happens, or remove congestion, after it has happened. Congestion
control mechanisms are divided into two categories, one category prevents the
congestion from happening and the other category removes congestion after it has taken
place.
These two categories are:
1. Open loop
2. Closed loop
3. Implicit Signaling
In implicit signaling, there is no communication between the congested node or nodes
and the source.
The source guesses that there is congestion somewhere in the network when it does
not receive any acknowledgment. Therefore the delay in receiving an acknowledgment is
interpreted as congestion in the network.
On sensing this congestion, the source slows down.
This type of congestion control policy is used by TCP.
4. Explicit Signaling
In this method, the congested nodes explicitly send a signal to the source or
destination to inform about the congestion.
Explicit signaling is different from the choke packet method. In choke packed method,
a separate packet is used for this purpose whereas in explicit signaling method, the
signal is included in the packets that carry data .
Explicit signaling can occur in either the forward direction or the backward direction .
In backward signaling, a bit is set in a packet moving in the direction opposite to the
congestion. This bit warns the source about the congestion and informs the source to
slow down.
In forward signaling, a bit is set in a packet moving in the direction of congestion. This
bit warns the destination about the congestion. The receiver in this case uses policies
such as slowing down the acknowledgements to remove the congestion.
Cryptography deals with the actual securing of digital data. It refers to the
design of mechanisms based on mathematical algorithms that provide
fundamental information security services. You can think of cryptography as the
establishment of a large toolkit containing different techniques in security
applications.
What is Cryptanalysis?
The art and science of breaking the cipher text is known as cryptanalysis.
With the spread of more unsecure computer networks in last few decades, a
genuine need was felt to use cryptography at larger scale. The symmetric
key was found to be non-practical due to challenges it faced for key
management. This gave rise to the public key cryptosystems.
Different keys are used for encryption and decryption. This is a property which
set this scheme different than symmetric encryption scheme.
The Domain Name System (DNS) is a hierarchical decentralized naming system for
computers, services, or other resources connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating entities
1 Architecture :
The message transport agents use the envelope for routing. The
message inside the envelope consists of two major sections:
The Header:
Body:
2 Header format
Date: The local time and date when the message was originally
sent.
3 User agents:
The display may look something like that is shown in figure 8.4.
Each line of the display contains several fields extracted from the
envelope or header of the corresponding message. In a simple e-
mail system, the choice of fields is built into the program. In
more sophisticated system, user can specify which fields are to
be displayed by providing a user profile.
4 E-mail Services
Basic services:
1. Composition:
2. Transfer:
It refers to moving messages from the originator to the recipient.
This requires establishing a connection to the destination or some
intermediate machine, outputting the message, and finally
releasing the connection. E-mail does it automatically without
bothering the user.
3. Reporting:
4. Displaying
5. Disposition
It is the final step and concerns what the recipient does with the
message after receiving it. Possibilities include throwing it away
before reading, throwing it away after reading, saving it, and so
on. It should be possible to retrieve and reread saved messages,
forward them or process them in other ways.
Operating System
Fragmentation
Refers to the condition of a disk in which files are divided into pieces scattered around the
disk. Fragmentation occurs naturally when you use a disk frequently, creating, deleting, and
modifying files. At some point, the operating system needs to store parts of a file in
noncontiguous clusters.
Input/output (I/O) scheduling is the method that computer operating systems use to decide in
which order the block I/O operations will be submitted to storage volumes. I/O scheduling is
sometimes called disk scheduling
resource scheduling
UNIX
SYNOPSIS
pr [OPTION]... [FILE]...
DESCRIPTION
SYNOPSIS
head [OPTION]... [FILE]...
DESCRIPTION
head by default, prints the first 10 lines of each FILE to standard output.
With more than one FILE, it precedes each set of output with a header
identifying the file name. If no FILE is specified, or when FILE is specified as
a dash ("-"), head reads from standard input.
DESCRIPTION
Print the last 10 lines of each FILE to standard output. With more than one FILE,
precede each with a header giving the file name. With no FILE, or when FILE is -,
read standard input.
SYNOPSIS
cut [OPTION]... [FILE]...
DESCRIPTION
cur writes to standard output selected parts of each line of each input file,
or standard input if no files are given or for a file name of '-'.
SYNOPSIS
paste [OPTION]... [FILE]...
DESCRIPTION
Write lines consisting of the sequentially corresponding lines from each FILE,
separated by TABs, to standard output. With no FILE, or when FILE is -, read
standard input.
SYNOPSIS
uniq [OPTION]... [INPUT [OUTPUT]]
DESCRIPTION
Discard all but one of successive identical lines from INPUT (or standard input),
writing to OUTPUT (or standard output)
SYNOPSIS
tr [OPTION]... SET1 [SET2]
DESCRIPTION
Translate, squeeze, and/or delete characters from standard input, writing to standard
output.
SYNOPSIS
join [OPTION]... FILE1 FILE2
DESCRIPTION
For each pair of input lines with identical join fields, write a line to standard output.
The default join field is the first, delimited by whitespace. When FILE1 or FILE2 (not
both) is -, read standard input
SYNOPSIS
grep [options] PATTERN [FILE...]
grep [options] [-e PATTERN | -f FILE] [FILE...]
DESCRIPTION
Grep searches the named input FILEs (or standard input if no files are named, or the
file name - is given) for lines containing a match to the given PATTERN. By
default, grep prints the matching lines.
SYNOPSIS
sed [OPTION]... {script-only-if-no-other-script} [input-file]...
DESCRIPTION
Sed is a stream editor. A stream editor is used to perform basic text transformations
on an input stream (a file or input from a pipeline). While in some ways similar to an
editor which permits scripted edits (such as ed), sed works by making only one pass
over the input(s), and is consequently more efficient. But it is seds ability to filter
text in a pipeline which particularly distinguishes it from other types of editors.
SYNOPSIS
awk 'Program' input-file1 input-file2 ... awk -f PROGRAM-FILE input-file1 input-file2 ...
DESCRIPTION
awk command searches files for text containing a pattern. When a line or text matches, awk
performs a specific action on that line/text. The Program statement tells awk what operation to
do; Program statement consists of a series of "rules" where each rule specifies one pattern to
search for, and one action to perform when a particular pattern is found. A regular expression
enclosed in slashes (/) is an awk pattern to match every input record whose text belongs to that
set
process management in unix
When you execute a program on your Unix system, the system creates a
special environment for that program. This environment contains everything
needed for the system to run the program as if no other program were
running on the system.
Pids eventually repeat because all the possible numbers are used up and
the next pid rolls or starts over. At any point of time, no two processes with
the same pid exist in the system because it is the pid that Unix uses to
track each process.
Starting a Process
When you start a process (run a command), there are two ways you can
run it
Foreground Processes
Background Processes
Foreground Processes
By default, every process that you start runs in the foreground. It gets its
input from the keyboard and sends its output to the screen.
You can see this happen with the ls command. If you wish to list all the files
in your current directory, you can use the following command
$ls ch*.doc
This would display all the files, the names of which start with ch and end
with .doc
ch01-1.doc ch010.doc ch02.doc ch03-2.doc
ch04-1.doc ch040.doc ch05.doc ch06-2.doc
ch01-2.doc ch02-1.doc
Background Processes
A background process runs without being connected to your keyboard. If
the background process requires any keyboard input, it waits.
The advantage of running a process in the background is that you can run
other commands; you do not have to wait until it completes to start
another!
This displays all those files the names of which start with ch and end
with .doc
Here, if the ls command wants any input (which it does not), it goes into a
stop state until we move it into the foreground and give it the data from the
keyboard.
That first line contains information about the background process - the job
number and the process ID. You need to know the job number to
manipulate it between the background and the foreground.
Press the Enter key and you will see the following
[1] + Done ls ch*.doc &
$
The first line tells you that the ls command background process finishes
successfully. The second is a prompt for another command.
Bourne Shell
Bourne Again Shell (Bash) is the free version of the Bourne shell distributed
with Linux systems. Bash is similar to the original, but has added features such
as command line editing. Its name is sometimes spelled as Bourne Again SHell,
the capitalized Hell referring to the difficulty some people have with it.
Zsh was developed by Paul Falstad as a replacement for both the Bourne and C
shell. It incorporates features of all the other shells (such as file name completion
and a history mechanism) as well as new capabilities. Zsh is considered similar
to the Korn shell. Falstad intended to create in zsh a shell that would do whatever
a programmer might reasonably hope it would do. Zsh is popular with advanced
users.
Along with the Korn shell and the C shell, the Bourne shell remains among the
three most widely used and is included with all UNIX systems. The Bourne shell
is often considered the best shell for developing scripts.
Shell variables
Shell Variables
Name Meaning
$PATH List of directories to search for commands.
$USER Your user name.
$SHELL Absolute pathname of your login shell.
$TERM The type of your terminal
NAME
stat, fstat, lstat - get file status
SYNOPSIS
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
DESCRIPTION
These functions return information about a file. No permissions are required on the
file itself, but in the case of stat() and lstat() execute (search) permission is
required on all of the directories in path that lead to the file.
lstat() is identical to stat(), except that if path is a symbolic link, then the link itself is
stat-ed, not the file that it refers to.
fstat() is identical to stat(), except that the file to be stat-ed is specified by the file
descriptorfiledes
NAME
SYNOPSIS
#include <sys/types.h>
#include <sys/stat.h>
mode_t umask(mode_t mask);
DESCRIPTION
umask() sets the calling processs file mode creation mask (umask) to mask & 0777.
The umask is used by open(2), mkdir(2), and other system calls that create files to
modify the permissions placed on newly created files or directories. Specifically,
permissions in the umask are turned off from the mode argument to open(2)
and mkdir(2)
NAME
SYNOPSIS
#include <sys/types.h>
#include <sys/stat.h>
DESCRIPTION