Internet Articles

Page 48 of 88

The DNS Name Space

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 27K+ Views

The DNS name space is the complete set of all domain names organized in a hierarchical tree structure within the Domain Name System (DNS). This hierarchical organization enables efficient name resolution and scalable management of internet resources. The DNS namespace starts with a root domain at the top and branches down through top-level domains (TLDs) like .com, .net, and .org, followed by second-level domains and subdomains. Each domain name corresponds to resource records containing information such as IP addresses, mail servers, and other network services. DNS Namespace Hierarchy ...

Read More

Internet Corporation for Assigned Names and Numbers (ICANN)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 555 Views

The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit organization that coordinates the Internet's unique identifier systems, ensuring global connectivity and stability. Established in 1998, ICANN manages critical Internet resources including domain names, IP addresses, and protocol parameters that enable seamless worldwide communication. ICANN operates under a multi-stakeholder governance model, bringing together governments, private sector, technical community, and civil society to make consensus-based decisions about Internet infrastructure management. Core Functions of ICANN ICANN performs three primary functions essential to Internet operations: Domain Name System (DNS) Management − Oversees the global DNS ...

Read More

What is a User Agent (UA)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 6K+ Views

A User Agent (UA) is an identification string that client software sends to web servers with each HTTP request. This string contains information about the browser, operating system, device type, and capabilities, enabling servers to deliver optimized content tailored to the specific client. When you visit a website, your browser automatically sends its user agent string in the HTTP header. Web servers analyze this information to determine how to respond — whether to serve mobile-optimized layouts, specific stylesheets, or content in the appropriate language. User Agent Communication Flow Client ...

Read More

RFC 5322 Internet Message Format

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 6K+ Views

RFC 5322 is an Internet standard that defines the format and structure of Internet messages, particularly email messages. Published by the Internet Engineering Task Force (IETF) in 2008, it specifies how email messages should be formatted, including headers, message body, and encoding rules to ensure interoperability across different email systems. This standard serves as the foundation for modern email communication, enabling consistent message exchange between different email clients, servers, and platforms worldwide. Message Structure Components RFC 5322 defines four main components of an Internet message: Envelope − Contains routing information including sender and recipient ...

Read More

Extended Simple Mail Transfer Protocol (ESMTP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

Extended Simple Mail Transfer Protocol (ESMTP) is an enhanced version of the standard Simple Mail Transfer Protocol (SMTP) that provides additional functionality and flexibility for email transmission between servers. While SMTP handles basic email delivery, ESMTP adds commands and features to support modern email requirements such as attachments, authentication, and encryption. ESMTP maintains backward compatibility with SMTP while introducing extensions that allow servers to negotiate capabilities and handle complex email formats. This makes it the primary protocol used by email servers worldwide for reliable message delivery. ESMTP Email Flow ...

Read More

SMTP Service Extension Parameters

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 848 Views

SMTP (Simple Mail Transfer Protocol) is a protocol for transmitting email messages. An SMTP service extension is a feature or capability that can be added to the base SMTP protocol to provide additional functionality. These extensions are defined in the form of parameters that can be included in the SMTP command stream to indicate support for a particular extension or to provide additional information needed to use the extension. SMTP Extension Negotiation Flow Client ...

Read More

Supporting outbound SMTP extensions

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 426 Views

Outbound SMTP (Simple Mail Transfer Protocol) extensions are optional features that enhance email functionality beyond basic message delivery. These extensions are negotiated between sending and receiving mail servers during the SMTP conversation using the EHLO command, which advertises supported capabilities. SMTP Extension Negotiation Process Client (Sender) Server (Receiver) EHLO domain.com 250-PIPELINING 250-8BITMIME 250 DSN Server advertises supported extensions ...

Read More

Attacks against 3G mobile networks

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

3G mobile network attacks are security threats specifically targeting third-generation mobile communication networks. These networks provide wireless data and voice services to mobile devices through cellular infrastructure. Understanding these attacks is crucial as 3G networks, while largely superseded by 4G and 5G, still serve as fallback networks and remain vulnerable to various security exploits. Attackers exploit weaknesses in 3G protocol design, network infrastructure, and device implementations to compromise user privacy, steal sensitive data, or disrupt network services. 3G Network Attack Vectors Mobile Device User ...

Read More

Backing up Cisco IOS Router image

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

A Cisco IOS (Internetwork Operating System) image is the software that runs on a Cisco router, containing essential system files, routing protocols, management tools, and security features needed for network operations. Backing up the Cisco IOS image is a critical maintenance task that protects against image corruption, accidental deletion, or hardware failure. A proper backup strategy ensures minimal downtime and quick recovery when issues arise. Cisco IOS Backup Methods TFTP Server Network-based Remote storage USB Flash Local storage ...

Read More

Bandwidth Allocation Control Protocol (BACP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 670 Views

Bandwidth Allocation Control Protocol (BACP) is a protocol used in Asynchronous Transfer Mode (ATM) networks to control the allocation of bandwidth among different virtual channels. It ensures that bandwidth is allocated fairly among competing traffic streams and prevents any single traffic stream from monopolizing the network. BACP operates at the edge of the ATM network, in the ATM Adaptation Layer (AAL). When a virtual channel is established between two endpoints, BACP negotiates the amount of bandwidth allocated to that channel. It also monitors channel usage and adjusts the allocated bandwidth as necessary to ensure fair allocation among all channels. ...

Read More
Showing 471–480 of 874 articles
« Prev 1 46 47 48 49 50 88 Next »
Advertisements