Computer Science Articles

Page 9 of 53

TCP Flags

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

When we think about the internet, we often think of websites and social media platforms. However, beneath the surface of these applications lies a complex network of protocols and technologies that communicate data between devices. One such technology is TCP (Transmission Control Protocol), which is responsible for ensuring reliable data transmission over the internet. Within TCP are a set of flags that play a critical role in facilitating communication between devices. These flags act as control signals that manage connection states and data flow between network endpoints. What are TCP Flags? TCP flags are single-bit control fields ...

Read More

TCP Reno with Example

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

TCP Reno is a congestion control algorithm used by the Transmission Control Protocol (TCP) in computer networking. It plays a crucial role in managing data transmission between devices on the internet, ensuring that packets are delivered efficiently while preventing network congestion that could lead to packet loss or connection failures. TCP Reno uses feedback from packet acknowledgments to dynamically adjust transmission rates, maintaining network stability during high traffic periods and optimizing throughput based on available bandwidth. How TCP Reno Works The basic principle behind TCP Reno is to adjust the transmission rate based on how quickly packets ...

Read More

TCP Retransmission

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 5K+ Views

TCP Retransmission is an essential mechanism in network communication that ensures reliable data transfer between sender and receiver. When data packets are lost or corrupted during transmission, TCP automatically retransmits them until they are successfully received. This process is fundamental to maintaining data integrity and reliability across the Internet. Definition of TCP Retransmission TCP Retransmission refers to the process of resending data packets that have not been acknowledged by the receiving end within a specific timeframe. This occurs when packets are lost or corrupted due to network congestion, faulty equipment, poor signal quality, or other transmission issues. The ...

Read More

TCP with Explicit Link Failure Notification (TCP-ELFN)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 590 Views

Transmission Control Protocol (TCP) is a standard protocol for transmitting data over the internet. It is one of the main protocols in the TCP/IP suite, along with Internet Protocol (IP). TCP provides reliable, ordered and error-checked delivery of data between applications running on hosts communicating via an IP network. It manages the transmission control part of the communication by dividing data into smaller packets, numbering them in sequence to ensure proper reassembly at the receiving end, and acknowledging receipt of each packet. TCP is widely used in client-server architecture where a server provides services to multiple clients. Examples ...

Read More

Telecom Networks

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

Telecom networks form the backbone of modern communication, enabling the exchange of voice, data, and video signals across vast distances. These networks comprise interconnected hardware and software components that facilitate real-time communication between devices worldwide, from simple phone calls to complex internet services. Telecommunications has evolved from basic telegraph systems to sophisticated digital networks that support billions of connected devices, fundamentally transforming how we communicate, work, and access information. What are Telecom Networks? A telecom network is a comprehensive infrastructure system that enables communication between devices over long distances. It consists of transmission media (cables, radio waves), ...

Read More

The CIA Triad in Cryptography

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

The CIA Triad is a foundational model in information security that defines three core principles: Confidentiality, Integrity, and Availability. In cryptography, this triad serves as the cornerstone for designing secure communication systems that protect sensitive data from unauthorized access, tampering, and service disruption. Modern cryptographic systems must balance all three principles to provide comprehensive security. While encryption primarily addresses confidentiality, effective cryptographic implementations must also ensure data integrity and system availability to create robust security solutions. The Three Pillars of the CIA Triad CIA Triad in Cryptography ...

Read More

Time Access List

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 268 Views

A Time Access List (TAL) is a security mechanism that provides access control to resources based on specific time periods. It allows administrators to specify which users can access particular resources during designated time windows, such as allowing employees access to sensitive data only during working hours. TAL enhances security by restricting access to resources at specific times or dates, ensuring that only authorized users are granted entry when appropriate. This temporal control is particularly valuable for organizations with multiple users requiring varying levels of access throughout different periods. How Time Access List Works TAL operates by ...

Read More

Time Based Access-List

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 823 Views

A time-based access list is a network security feature that enables administrators to control traffic flow based on specific time parameters such as time of day, day of week, or date. This advanced filtering mechanism enhances traditional access control lists by adding temporal restrictions to network access policies. How Time-Based Access Lists Work A Time-Based Access Control List (ACL) extends standard ACL functionality by incorporating date and time parameters into traffic filtering decisions. While traditional ACLs filter traffic based solely on source IP, destination IP, protocol, and port numbers, time-based ACLs add temporal conditions to these rules. ...

Read More

Hierarchical Database Model

Samual Sam
Samual Sam
Updated on 14-Mar-2026 18K+ Views

A hierarchical model represents data in a tree-like structure where each record has a single parent. A sort field keeps sibling nodes in order. This model was designed for early mainframe systems like IBM's Information Management System (IMS), supporting one-to-one and one-to-many relationships. Data is structured as an inverted tree − a single root table at the top, with other tables as branches. Records are accessed by navigating down through the structure using pointers combined with sequential accessing. Agents Database Example The following diagram shows a typical hierarchical database ? ...

Read More

One-to-Many Relationship Model

karthikeya Boyini
karthikeya Boyini
Updated on 14-Mar-2026 5K+ Views

In a "class roster" database, a teacher may teach zero or more classes, while a class is taught by one (and only one) teacher. In a "company" database, a manager manages zero or more employees, while an employee is managed by one (and only one) manager. In a "product sales" database, a customer may place many orders, while an order is placed by one particular customer. This kind of relationship is known as one-to-many. Why One-to-Many Cannot Be Represented in a Single Table If we begin with a table called Teachers and try to store classes taught, we ...

Read More
Showing 81–90 of 521 articles
« Prev 1 7 8 9 10 11 53 Next »
Advertisements