Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 68 of 94

TCP Reno with Example

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

TCP Reno is a congestion control algorithm used by the Transmission Control Protocol (TCP) in computer networking. It plays a crucial role in managing data transmission between devices on the internet, ensuring that packets are delivered efficiently while preventing network congestion that could lead to packet loss or connection failures. TCP Reno uses feedback from packet acknowledgments to dynamically adjust transmission rates, maintaining network stability during high traffic periods and optimizing throughput based on available bandwidth. How TCP Reno Works The basic principle behind TCP Reno is to adjust the transmission rate based on how quickly packets ...

Read More

TCP Retransmission

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

TCP Retransmission is an essential mechanism in network communication that ensures reliable data transfer between sender and receiver. When data packets are lost or corrupted during transmission, TCP automatically retransmits them until they are successfully received. This process is fundamental to maintaining data integrity and reliability across the Internet. Definition of TCP Retransmission TCP Retransmission refers to the process of resending data packets that have not been acknowledged by the receiving end within a specific timeframe. This occurs when packets are lost or corrupted due to network congestion, faulty equipment, poor signal quality, or other transmission issues. The ...

Read More

TCP with Explicit Link Failure Notification (TCP-ELFN)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 575 Views

Transmission Control Protocol (TCP) is a standard protocol for transmitting data over the internet. It is one of the main protocols in the TCP/IP suite, along with Internet Protocol (IP). TCP provides reliable, ordered and error-checked delivery of data between applications running on hosts communicating via an IP network. It manages the transmission control part of the communication by dividing data into smaller packets, numbering them in sequence to ensure proper reassembly at the receiving end, and acknowledging receipt of each packet. TCP is widely used in client-server architecture where a server provides services to multiple clients. Examples ...

Read More

Telecom Networks

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

Telecom networks form the backbone of modern communication, enabling the exchange of voice, data, and video signals across vast distances. These networks comprise interconnected hardware and software components that facilitate real-time communication between devices worldwide, from simple phone calls to complex internet services. Telecommunications has evolved from basic telegraph systems to sophisticated digital networks that support billions of connected devices, fundamentally transforming how we communicate, work, and access information. What are Telecom Networks? A telecom network is a comprehensive infrastructure system that enables communication between devices over long distances. It consists of transmission media (cables, radio waves), ...

Read More

TELNET and SSH on Adaptive Security Appliance (ASA)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 584 Views

In today's world where cyber attacks are becoming more frequent and complex, network security is a top priority for businesses. One of the most common ways to manage network security is through the use of firewalls, with Cisco Adaptive Security Appliance (ASA) being one of the most popular firewalls used in enterprise networks. In this article, we will focus on two protocols that are commonly used to manage ASA: TELNET and SSH. Definition of TELNET and SSH TELNET (TErminal NETwork) is a protocol used for remote access to devices over a network. It allows users to connect to ...

Read More

The CIA Triad in Cryptography

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

The CIA Triad is a foundational model in information security that defines three core principles: Confidentiality, Integrity, and Availability. In cryptography, this triad serves as the cornerstone for designing secure communication systems that protect sensitive data from unauthorized access, tampering, and service disruption. Modern cryptographic systems must balance all three principles to provide comprehensive security. While encryption primarily addresses confidentiality, effective cryptographic implementations must also ensure data integrity and system availability to create robust security solutions. The Three Pillars of the CIA Triad CIA Triad in Cryptography ...

Read More

Time Access List

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 254 Views

A Time Access List (TAL) is a security mechanism that provides access control to resources based on specific time periods. It allows administrators to specify which users can access particular resources during designated time windows, such as allowing employees access to sensitive data only during working hours. TAL enhances security by restricting access to resources at specific times or dates, ensuring that only authorized users are granted entry when appropriate. This temporal control is particularly valuable for organizations with multiple users requiring varying levels of access throughout different periods. How Time Access List Works TAL operates by ...

Read More

Time Based Access-List

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 797 Views

A time-based access list is a network security feature that enables administrators to control traffic flow based on specific time parameters such as time of day, day of week, or date. This advanced filtering mechanism enhances traditional access control lists by adding temporal restrictions to network access policies. How Time-Based Access Lists Work A Time-Based Access Control List (ACL) extends standard ACL functionality by incorporating date and time parameters into traffic filtering decisions. While traditional ACLs filter traffic based solely on source IP, destination IP, protocol, and port numbers, time-based ACLs add temporal conditions to these rules. ...

Read More

CATA protocol in Computer Network

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 763 Views

Computer networks require efficient protocols to manage address assignments and prevent conflicts as they grow in complexity. The Common Address Table Algorithm (CATA) protocol is designed to centralize IP address management and provide redundancy mechanisms for network stability. CATA builds upon existing address resolution protocols to create a distributed yet coordinated approach to IP address assignment, reducing conflicts and improving network reliability through its redundancy features. How CATA Protocol Works The CATA protocol operates through a distributed address table system where multiple nodes maintain synchronized copies of address assignments. When a device requests an IP address, the ...

Read More

Challenge Handshake Authentication Protocol (CHAP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

Challenge Handshake Authentication Protocol (CHAP) is a widely used authentication method that provides an added layer of security to network connections. This protocol is commonly used in Point-to-Point Protocol (PPP) connections, such as those used for dial-up internet access or virtual private network (VPN) connections. The basic principle of CHAP is that it challenges the connecting client to prove their identity by providing a specific response to a unique challenge. This challenge-response mechanism is designed to prevent unauthorized access and protect against replay attacks. How CHAP Works CHAP uses a three-step process to authenticate a client: ...

Read More
Showing 671–680 of 937 articles
« Prev 1 66 67 68 69 70 94 Next »
Advertisements