Computer Network Articles

Page 91 of 122

Bandwidth Allocation Protocol (BAP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 779 Views

Bandwidth Allocation Protocol (BAP) is a network management protocol used to dynamically allocate bandwidth resources to different devices or applications within a network. The primary goal of BAP is to ensure efficient utilization of network resources while guaranteeing that high-priority traffic receives adequate bandwidth for optimal performance. BAP operates by implementing various traffic management techniques including Quality of Service (QoS) marking, traffic shaping, and priority-based scheduling. This enables networks to handle diverse traffic types efficiently, from real-time multimedia applications to standard data transfers. Bandwidth Allocation Protocol Flow Traffic Analysis ...

Read More

Basic concept of TCP-Vegas

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 851 Views

TCP Vegas is a variation of the Transmission Control Protocol (TCP) congestion control algorithm that aims to improve network performance by more accurately detecting and responding to network congestion through proactive measurement techniques. Unlike standard TCP algorithms that rely on packet loss as a congestion signal, TCP Vegas uses round-trip time (RTT) measurements and throughput analysis to detect congestion before packets are dropped, making it a more proactive approach to congestion control. How TCP Vegas Works TCP Vegas operates by continuously monitoring the connection's performance metrics and comparing expected versus actual throughput: RTT Monitoring ...

Read More

Basic configuration of Adaptive Security Appliance (ASA)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 600 Views

The Cisco Adaptive Security Appliance (ASA) is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. The basic configuration of an ASA involves setting up fundamental networking parameters, defining security policies, and configuring administrative access controls. Cisco ASA Configuration Overview Basic Networking IP, Subnet, Gateway Security Policies ACLs, Firewall Rules Admin Access Passwords, Management VPN Configuration IPsec, SSL VPN ...

Read More

Basics of NS2 and Otcltcl script

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 5K+ Views

NS2 (Network Simulator version 2) is a discrete event network simulator widely used to simulate and analyze computer network behavior. It is open-source software written in C++ and Otcl (Object-oriented Tool Command Language). Otcl is an extension of Tcl (Tool Command Language) used to create and control network entities and configure network scenarios in NS2. NS2 has a dual-language architecture: the C++ part provides the underlying simulation engine for scheduling events, maintaining network state, and handling low-level packet processing, while the Otcl part provides the user interface for creating and configuring network entities like nodes and links, and specifying ...

Read More

Can Two IP Addresses Be Same

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 5K+ Views

No, two IP addresses cannot be the same within a single network as each IP address serves as a unique identifier for a device. In IPv4, an IP address is a 32-bit binary number typically represented in dotted-decimal notation. In IPv6, an IP address is a 128-bit binary number represented in hexadecimal notation. IP Address Structure An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: host identification and location addressing. There are two versions of IP addresses ...

Read More

Calling Web Service Using Curl With Telnet Connection

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 8K+ Views

Curl is a powerful command-line tool for transferring data using various network protocols. It was designed to work without user interaction, making it ideal for scripts and automated tasks. Curl supports numerous protocols including HTTP, HTTPS, FTP, SFTP, Telnet, and many more. With curl, you can send HTTP requests, receive responses, upload and download files, and even handle email using SMTP and IMAP protocols. It provides extensive command-line options to control request behavior, set headers, specify request methods, and handle authentication. What is Curl? Curl is available on most operating systems and comes pre-installed on Linux and ...

Read More

Calculation of TCP Checksum

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 18K+ Views

The TCP checksum is a 16-bit error detection mechanism used to verify the integrity of TCP segments during transmission. It ensures that data has not been corrupted or altered while traveling across the network. The checksum calculation involves creating a pseudo-header that includes parts of the IP header, the entire TCP header (with checksum field set to zero), and the TCP data. This approach provides end-to-end error detection across both network and transport layers. TCP Checksum Calculation Process 1. Pseudo-Header IP addresses + Protocol ...

Read More

Breaking Cryptography

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 1K+ Views

Breaking cryptography refers to the process of attempting to decrypt encrypted data without authorized access to the secret key. This involves exploiting weaknesses in cryptographic algorithms, implementations, or systems to recover plaintext from ciphertext. Cryptanalysis encompasses various attack methods, each targeting different aspects of cryptographic systems. Understanding these techniques is crucial for both security professionals and system administrators to implement robust encryption practices. Common Cryptographic Attack Methods Brute Force Attack − Systematically trying all possible secret keys until the correct one is found. The effectiveness depends on key length and computational resources. Ciphertext-Only ...

Read More

Bootstrap Protocol (BOOTP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 5K+ Views

The Bootstrap Protocol (BOOTP) is a legacy computer networking protocol used to automatically assign IP addresses to devices on a network. BOOTP was developed in the 1980s as a way to assign IP addresses to diskless workstations without the need for manual configuration. BOOTP operates by allowing a device to broadcast a request for an IP address on the network. The BOOTP server, which is typically a router or a dedicated server, receives the request and assigns a static IP address to the device based on its MAC address. The device then uses the assigned IP address to communicate ...

Read More

Birman Schiper Stephenson Protocol

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 1K+ Views

The Birman-Schiper-Stephenson (BSS) Protocol is a distributed computing protocol designed to maintain consistent shared state across a group of computers despite potential failures. First described by Michael Birman, Roger Schiper, and Tom Stephenson in 1985, this protocol provides a robust foundation for distributed systems requiring fault tolerance and consistency guarantees. In the BSS Protocol, each computer acts as a replica maintaining a copy of the shared state. The replicas communicate through message passing operations, coordinated by a circulating token that serves as a marker for the current state. This token-based approach ensures orderly state updates and maintains consistency across ...

Read More
Showing 901–910 of 1,219 articles
« Prev 1 89 90 91 92 93 122 Next »
Advertisements