Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 68 of 94

TCP and UDP Server using Select

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 1K+ Views

When it comes to server-client communication, two protocols are commonly used: TCP and UDP. Transmission Control Protocol (TCP) is a connection-oriented protocol that ensures reliable delivery of data packets between network devices. On the other hand, User Datagram Protocol (UDP) is a connectionless protocol that offers faster data transmission but with no guarantee of delivery or order. In this article, we will explore how to build a server using both protocols in Python programming language. We will also discuss the use of select() function in handling multiple client connections efficiently without the overhead of threading. Setting up the ...

Read More

TCP Flags

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

When we think about the internet, we often think of websites and social media platforms. However, beneath the surface of these applications lies a complex network of protocols and technologies that communicate data between devices. One such technology is TCP (Transmission Control Protocol), which is responsible for ensuring reliable data transmission over the internet. Within TCP are a set of flags that play a critical role in facilitating communication between devices. These flags act as control signals that manage connection states and data flow between network endpoints. What are TCP Flags? TCP flags are single-bit control fields ...

Read More

TCP Reno with Example

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

TCP Reno is a congestion control algorithm used by the Transmission Control Protocol (TCP) in computer networking. It plays a crucial role in managing data transmission between devices on the internet, ensuring that packets are delivered efficiently while preventing network congestion that could lead to packet loss or connection failures. TCP Reno uses feedback from packet acknowledgments to dynamically adjust transmission rates, maintaining network stability during high traffic periods and optimizing throughput based on available bandwidth. How TCP Reno Works The basic principle behind TCP Reno is to adjust the transmission rate based on how quickly packets ...

Read More

TCP Retransmission

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 5K+ Views

TCP Retransmission is an essential mechanism in network communication that ensures reliable data transfer between sender and receiver. When data packets are lost or corrupted during transmission, TCP automatically retransmits them until they are successfully received. This process is fundamental to maintaining data integrity and reliability across the Internet. Definition of TCP Retransmission TCP Retransmission refers to the process of resending data packets that have not been acknowledged by the receiving end within a specific timeframe. This occurs when packets are lost or corrupted due to network congestion, faulty equipment, poor signal quality, or other transmission issues. The ...

Read More

TCP with Explicit Link Failure Notification (TCP-ELFN)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 586 Views

Transmission Control Protocol (TCP) is a standard protocol for transmitting data over the internet. It is one of the main protocols in the TCP/IP suite, along with Internet Protocol (IP). TCP provides reliable, ordered and error-checked delivery of data between applications running on hosts communicating via an IP network. It manages the transmission control part of the communication by dividing data into smaller packets, numbering them in sequence to ensure proper reassembly at the receiving end, and acknowledging receipt of each packet. TCP is widely used in client-server architecture where a server provides services to multiple clients. Examples ...

Read More

Telecom Networks

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

Telecom networks form the backbone of modern communication, enabling the exchange of voice, data, and video signals across vast distances. These networks comprise interconnected hardware and software components that facilitate real-time communication between devices worldwide, from simple phone calls to complex internet services. Telecommunications has evolved from basic telegraph systems to sophisticated digital networks that support billions of connected devices, fundamentally transforming how we communicate, work, and access information. What are Telecom Networks? A telecom network is a comprehensive infrastructure system that enables communication between devices over long distances. It consists of transmission media (cables, radio waves), ...

Read More

TELNET and SSH on Adaptive Security Appliance (ASA)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 597 Views

In today's world where cyber attacks are becoming more frequent and complex, network security is a top priority for businesses. One of the most common ways to manage network security is through the use of firewalls, with Cisco Adaptive Security Appliance (ASA) being one of the most popular firewalls used in enterprise networks. In this article, we will focus on two protocols that are commonly used to manage ASA: TELNET and SSH. Definition of TELNET and SSH TELNET (TErminal NETwork) is a protocol used for remote access to devices over a network. It allows users to connect to ...

Read More

The CIA Triad in Cryptography

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 4K+ Views

The CIA Triad is a foundational model in information security that defines three core principles: Confidentiality, Integrity, and Availability. In cryptography, this triad serves as the cornerstone for designing secure communication systems that protect sensitive data from unauthorized access, tampering, and service disruption. Modern cryptographic systems must balance all three principles to provide comprehensive security. While encryption primarily addresses confidentiality, effective cryptographic implementations must also ensure data integrity and system availability to create robust security solutions. The Three Pillars of the CIA Triad CIA Triad in Cryptography ...

Read More

Time Access List

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 265 Views

A Time Access List (TAL) is a security mechanism that provides access control to resources based on specific time periods. It allows administrators to specify which users can access particular resources during designated time windows, such as allowing employees access to sensitive data only during working hours. TAL enhances security by restricting access to resources at specific times or dates, ensuring that only authorized users are granted entry when appropriate. This temporal control is particularly valuable for organizations with multiple users requiring varying levels of access throughout different periods. How Time Access List Works TAL operates by ...

Read More

Time Based Access-List

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 813 Views

A time-based access list is a network security feature that enables administrators to control traffic flow based on specific time parameters such as time of day, day of week, or date. This advanced filtering mechanism enhances traditional access control lists by adding temporal restrictions to network access policies. How Time-Based Access Lists Work A Time-Based Access Control List (ACL) extends standard ACL functionality by incorporating date and time parameters into traffic filtering decisions. While traditional ACLs filter traffic based solely on source IP, destination IP, protocol, and port numbers, time-based ACLs add temporal conditions to these rules. ...

Read More
Showing 671–680 of 937 articles
« Prev 1 66 67 68 69 70 94 Next »
Advertisements