Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Satish Kumar
Page 67 of 94
Synchronous Data Link Control (SDLC) Loop Operation
Synchronous Data Link Control (SDLC) is a layer 2 protocol developed by IBM that provides reliable, error-free data transmission between devices in a network. SDLC operates in various topologies, with loop operation being one of its most distinctive configurations where stations are connected in a circular ring topology. In SDLC loop operation, data frames circulate around the ring, allowing multiple stations to share a single communication channel efficiently. This configuration is particularly useful in environments where multiple remote terminals need to communicate with a central host system. SDLC Loop Topology The SDLC loop topology consists of stations ...
Read MoreSystem Scaling - Optimization Trade offs
System scaling is the process of adjusting infrastructure resources to accommodate changing demands while maintaining optimal performance. As businesses grow and technology evolves, understanding the optimization trade-offs involved in scaling decisions becomes critical for long-term success. System scaling involves adding or removing resources such as servers, storage, or network capacity based on business requirements. Organizations must carefully balance performance improvements against costs, complexity, and future scalability needs. Types of System Scaling There are two primary approaches to system scaling, each with distinct advantages and trade-offs: Horizontal vs Vertical Scaling ...
Read MoreTACACS+ Protocol
TACACS+ (Terminal Access Controller Access Control System Plus) is a network protocol that provides centralized authentication, authorization, and accounting (AAA) services for network devices. Developed by Cisco Systems as an enhancement to the original TACACS protocol, TACACS+ separates AAA functions into distinct processes, offering greater security and flexibility for network access control. Unlike protocols that combine multiple functions, TACACS+ treats authentication, authorization, and accounting as independent services. This separation allows administrators to configure granular access policies and provides better control over user permissions on network infrastructure devices like routers, switches, and firewalls. How TACACS+ Works TACACS+ operates ...
Read MoreTag Identification Message Formats
Tag identification is the process of identifying and tracking physical objects or people using electronic tags. These tags contain unique identifiers that can be read by special devices, enabling businesses to locate, monitor, and manage their assets more efficiently. Tag identification technologies have revolutionized many industries by providing real-time data on parameters such as location, temperature, humidity, and movement. Types of Tag Identification Message Formats Tag identification message formats refer to the various ways through which tags or labels can be identified and their information transmitted from one device to another. Two primary tag identification message formats are ...
Read MoreTask Assignment Approach in Distributed System
Distributed systems are a fundamental aspect of modern computing where multiple independent computers work together as a single entity to achieve a common goal. These computers are connected through a communication network and coordinate by exchanging messages to distribute workloads and resources across different nodes rather than centralizing them in one location. The task assignment approach determines how computational tasks are distributed among nodes in a distributed system. The choice of approach significantly impacts system performance, fault tolerance, and resource utilization. Types of Task Assignment Approaches Centralized Task Assignment Approach In the centralized approach, a single ...
Read MoreTCL script to create FTP traffic over TCP
TCL (Tool Command Language) is a robust, open-source scripting language used for a wide range of applications. It's known for its flexibility, ease of use, and ability to control complex systems across multiple platforms. With TCL, you can automate repetitive tasks, implement various network protocols, and create custom tools and applications. The power of TCL lies in its simplicity that even beginners can start writing scripts in just a few minutes. Understanding FTP and TCP FTP and TCP Protocol Overview FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host ...
Read MoreTCL Script to Demonstrate Recursive Procedures
A TCL script is a program written in the Tool Command Language that demonstrates how recursive procedures can solve complex problems by breaking them into smaller, manageable parts. TCL (Tool Command Language) is a high-level scripting language widely used in networking, automation, and testing applications. Understanding Recursive Procedures A recursive procedure is a function that calls itself repeatedly until it reaches a base case — the terminating condition that stops the recursion and returns a result. This approach is particularly useful for problems involving data structures like trees, mathematical sequences, or any problem that can be divided into ...
Read MoreTCL Script to Simulate Link State Routing in NS2
Network simulation has become essential for evaluating routing protocols and network behaviors in controlled environments. NS2 (Network Simulator 2) is a widely-used discrete event simulator that employs TCL (Tool Command Language) scripts to automate network simulations. This article demonstrates how to implement a TCL script for simulating Link State Routing in NS2, enabling researchers to study routing protocol performance and network topology behaviors. Link State Routing Link State Routing is a routing protocol where each node maintains complete network topology information in a Link State Database (LSDB). Nodes exchange link state advertisements to build this database and ...
Read MoreTCP and UDP Server using Select
When it comes to server-client communication, two protocols are commonly used: TCP and UDP. Transmission Control Protocol (TCP) is a connection-oriented protocol that ensures reliable delivery of data packets between network devices. On the other hand, User Datagram Protocol (UDP) is a connectionless protocol that offers faster data transmission but with no guarantee of delivery or order. In this article, we will explore how to build a server using both protocols in Python programming language. We will also discuss the use of select() function in handling multiple client connections efficiently without the overhead of threading. Setting up the ...
Read MoreTCP Flags
When we think about the internet, we often think of websites and social media platforms. However, beneath the surface of these applications lies a complex network of protocols and technologies that communicate data between devices. One such technology is TCP (Transmission Control Protocol), which is responsible for ensuring reliable data transmission over the internet. Within TCP are a set of flags that play a critical role in facilitating communication between devices. These flags act as control signals that manage connection states and data flow between network endpoints. What are TCP Flags? TCP flags are single-bit control fields ...
Read More