Found 1627 Articles for Computer Network

Time Based Access-List

Satish Kumar
Updated on 12-Jul-2023 10:06:13

298 Views

Introduction A time−based access list is a feature in network security tools that enables network administrators to control the traffic through a network based on the time of day, week or month. This type of access list allows administrators to increase security by only permitting specific users or devices to access the network during certain times, while blocking others. Definition of Time−Based Access-List A Time-Based Access−List (ACL) is a set of rules used to filter traffic passing through a router or switch based on date and time parameters. It is an extended version of an Access Control List ... Read More

Time Access List

Satish Kumar
Updated on 12-Jul-2023 10:04:01

51 Views

Introduction A Time Access List (TAL) is a security mechanism that provides access control to resources based on time. Essentially, it lets an administrator or system owner specify a list of users who can access particular resources during specified periods. For example, a company might use a TAL to allow employees access to sensitive data only during working hours. The TAL works by restricting access to specific resources at particular times or dates, making sure that only authorized users are granted entry. This process can be incredibly useful for organizations with multiple users who require varying levels of ... Read More

The CIA Triad in Cryptography

Satish Kumar
Updated on 12-Jul-2023 09:57:07

1K+ Views

Introduction Cryptography is the practice of securing information and communication through the transformation of messages into unintelligible formats for unauthorized access. In modern communication, cryptography plays a vital role in ensuring that sensitive data transmitted over networks remains secure. Advances in technology have made it easier to store, transmit and disseminate information making cybersecurity more important than ever before. Definition of Cryptography Cryptography is derived from the Greek word kryptos meaning hidden or secret, and graphia meaning writing. It is the process of securing communication by converting plain text into code or cipher text using encryption algorithms so ... Read More

Test Case Prioritization in Software Testing

Satish Kumar
Updated on 12-Jul-2023 09:53:11

863 Views

Introduction Software testing is an essential aspect of software development that ensures the quality and reliability of a software product. Testing involves executing test cases, which are designed to verify the functionality and behavior of the software. However, in reality, it is not always possible to execute all the test cases due to time and resource constraints. This is where test case prioritization comes into play. Definition of Test Case Prioritization Test case prioritization is a technique used in software testing to determine the order in which test cases should be executed based on their relative importance. ... Read More

TELNET and SSH on Adaptive Security Appliance (ASA)

Satish Kumar
Updated on 12-Jul-2023 09:49:25

193 Views

Introduction In today's world where cyber attacks are becoming more frequent and complex, network security is a top priority for businesses. One of the most common ways to manage network security is through the use of firewalls, with Cisco Adaptive Security Appliance (ASA) being one of the most popular firewalls used in enterprise networks. In this article, we will focus on two protocols that are commonly used to manage ASA: Telnet and SSH. Definition of TELNET and SSH Telnet (TErminal NETwork) is a protocol used for remote access to devices over a network. It allows users to connect ... Read More

Telecom Networks

Satish Kumar
Updated on 12-Jul-2023 09:47:40

278 Views

Introduction In today's world, communication is an integral part of our daily lives. We rely on telecommunication networks to connect with people from different parts of the world, access information and conduct businesses. Telecommunications refers to the exchange or transmission of information between two or more devices through a medium such as wires, cables, or airwaves. The process involves sending and receiving data and voice signals through complex networks that span across cities and countries. In this article, we will take a deep dive into telecommunication networks. Definition of Telecom Networks Telecom Networks refer to the infrastructure ... Read More

Technical Challenges of Mobile Computing

Satish Kumar
Updated on 12-Jul-2023 09:45:10

2K+ Views

Introduction Mobile computing refers to the use of portable computing devices such as smartphones, tablets, and laptops that are designed to be easily transported and used while on the go. The rise of mobile computing has been a game−changer in today's world. It has transformed the way people communicate, access information, and perform tasks. With mobile devices becoming increasingly powerful and ubiquitous, it's no surprise that businesses such as Apple and Samsung have invested significantly in this area. The Definition of Mobile Computing Mobile computing is defined as any technology that allows wireless communication between devices or ... Read More

TCP with Explicit Link Failure Notification (TCP-ELFN)

Satish Kumar
Updated on 12-Jul-2023 09:39:10

155 Views

Introduction Transmission Control Protocol (TCP) is a standard protocol for transmitting data over the internet. It is one of the main protocols in the TCP/IP suite, along with Internet Protocol (IP). TCP provides reliable, ordered and error−checked delivery of data between applications running on hosts communicating via an IP network. It manages the transmission control part of the communication by dividing data into smaller packets, numbering them in sequence to ensure proper reassembly at the receiving end, and acknowledging receipt of each packet. TCP is widely used in client−server architecture where a server provides services to multiple clients. ... Read More

TCP Timers

Satish Kumar
Updated on 12-Jul-2023 09:36:44

4K+ Views

Introduction TCP (Transmission Control Protocol) is a crucial protocol in network communication, responsible for ensuring reliable data transfer between devices over the Internet. However, due to the unpredictable nature of networks and the fact that it relies on underlying IP (Internet Protocol) for data transmission, TCP cannot guarantee that all packets will be delivered successfully. This is where TCP timers come into play. Definition of TCP Timers TCP timers are mechanisms used by the protocol to manage and control various aspects of the data transmission process. Essentially, these timers are implemented by a device's operating system and are ... Read More

TCP Tahoe and TCP Reno

Satish Kumar
Updated on 11-Jul-2023 18:59:30

2K+ Views

Introduction The Transmission Control Protocol (TCP) is one of the most widely used protocols in computer networking. It provides a reliable, ordered, and error−checked delivery of data between applications running on hosts communicating over an IP network. TCP has been used in a wide range of applications, including web browsing, email, file transfer, and real−time communication. Understanding TCP Tahoe Definition and Origin of TCP Tahoe TCP Tahoe is one of the earliest congestion control algorithms developed for the Transmission Control Protocol (TCP) for use in computer networks. The algorithm was first implemented in 1988 by Van Jacobson, a ... Read More

Advertisements