Satish Kumar

Satish Kumar

937 Articles Published

Articles by Satish Kumar

Page 74 of 94

Backing up Cisco IOS Router image

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 3K+ Views

A Cisco IOS (Internetwork Operating System) image is the software that runs on a Cisco router, containing essential system files, routing protocols, management tools, and security features needed for network operations. Backing up the Cisco IOS image is a critical maintenance task that protects against image corruption, accidental deletion, or hardware failure. A proper backup strategy ensures minimal downtime and quick recovery when issues arise. Cisco IOS Backup Methods TFTP Server Network-based Remote storage USB Flash Local storage ...

Read More

Bandwidth Allocation Control Protocol (BACP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 674 Views

Bandwidth Allocation Control Protocol (BACP) is a protocol used in Asynchronous Transfer Mode (ATM) networks to control the allocation of bandwidth among different virtual channels. It ensures that bandwidth is allocated fairly among competing traffic streams and prevents any single traffic stream from monopolizing the network. BACP operates at the edge of the ATM network, in the ATM Adaptation Layer (AAL). When a virtual channel is established between two endpoints, BACP negotiates the amount of bandwidth allocated to that channel. It also monitors channel usage and adjusts the allocated bandwidth as necessary to ensure fair allocation among all channels. ...

Read More

Bandwidth Allocation Protocol (BAP)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 782 Views

Bandwidth Allocation Protocol (BAP) is a network management protocol used to dynamically allocate bandwidth resources to different devices or applications within a network. The primary goal of BAP is to ensure efficient utilization of network resources while guaranteeing that high-priority traffic receives adequate bandwidth for optimal performance. BAP operates by implementing various traffic management techniques including Quality of Service (QoS) marking, traffic shaping, and priority-based scheduling. This enables networks to handle diverse traffic types efficiently, from real-time multimedia applications to standard data transfers. Bandwidth Allocation Protocol Flow Traffic Analysis ...

Read More

3D passwords-Advanced Authentication Systems

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 626 Views

As the world continues to grow more digital, the need for secure and robust authentication systems becomes increasingly important. Traditional passwords have been the standard method of authentication, but with the rise of hacking and cybercrime, new authentication methods are needed. One such method is 3D passwords, an advanced authentication system that combines multiple factors for enhanced security. What are 3D Passwords? 3D passwords are an advanced authentication system that adds multiple layers of security beyond traditional password-based systems. They are based on the concept that humans can recognize and remember three-dimensional interactions more intuitively than conventional text ...

Read More

Basic concept of TCP-Vegas

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 855 Views

TCP Vegas is a variation of the Transmission Control Protocol (TCP) congestion control algorithm that aims to improve network performance by more accurately detecting and responding to network congestion through proactive measurement techniques. Unlike standard TCP algorithms that rely on packet loss as a congestion signal, TCP Vegas uses round-trip time (RTT) measurements and throughput analysis to detect congestion before packets are dropped, making it a more proactive approach to congestion control. How TCP Vegas Works TCP Vegas operates by continuously monitoring the connection's performance metrics and comparing expected versus actual throughput: RTT Monitoring ...

Read More

4G Mobile Communication Technology

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 1K+ Views

4G (Fourth Generation) mobile communication technology represents a significant leap in wireless communication, offering high-speed data transmission, enhanced network capacity, and improved user experience compared to previous generations. First commercially deployed in 2010, 4G technology has transformed how we connect, communicate, and consume digital content on mobile devices. 4G networks utilize advanced technologies like LTE (Long Term Evolution) and WiMAX to deliver internet speeds up to 100 Mbps for mobile users and up to 1 Gbps for stationary users, making it suitable for bandwidth-intensive applications like video streaming, online gaming, and cloud services. 4G ...

Read More

Basic configuration of Adaptive Security Appliance (ASA)

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 602 Views

The Cisco Adaptive Security Appliance (ASA) is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. The basic configuration of an ASA involves setting up fundamental networking parameters, defining security policies, and configuring administrative access controls. Cisco ASA Configuration Overview Basic Networking IP, Subnet, Gateway Security Policies ACLs, Firewall Rules Admin Access Passwords, Management VPN Configuration IPsec, SSL VPN ...

Read More

5 Layer Architecture of Internet of Things

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 6K+ Views

The Internet of Things (IoT) has emerged as one of the most transformative technological innovations of the modern era, enabling interconnectivity of devices and machines that we use in our daily lives. IoT has revolutionized the way we interact with technology and the world around us, paving the way for new business models, improved efficiency, and greater convenience. To enable interconnectivity of devices and machines, a robust and scalable architecture is necessary. The 5-layer architecture of IoT is a widely accepted framework that provides a structured approach to IoT system design and implementation. This layered approach ensures seamless data ...

Read More

6 Best Books to Learn Computer Networking

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 2K+ Views

Computer networking is a critical aspect of modern technology. In today's connected world, almost every organization relies on networking to share data and resources. Networking involves connection of multiple devices, such as computers, servers, printers, and other hardware devices, to facilitate communication and data transfer. Aspiring network engineers and IT professionals must have a solid understanding of principles and practices of computer networking to build and maintain efficient network infrastructures. Essential Networking Learning Paths Fundamentals OSI Model Basic Concepts Architecture ...

Read More

Basics of NS2 and Otcltcl script

Satish Kumar
Satish Kumar
Updated on 16-Mar-2026 5K+ Views

NS2 (Network Simulator version 2) is a discrete event network simulator widely used to simulate and analyze computer network behavior. It is open-source software written in C++ and Otcl (Object-oriented Tool Command Language). Otcl is an extension of Tcl (Tool Command Language) used to create and control network entities and configure network scenarios in NS2. NS2 has a dual-language architecture: the C++ part provides the underlying simulation engine for scheduling events, maintaining network state, and handling low-level packet processing, while the Otcl part provides the user interface for creating and configuring network entities like nodes and links, and specifying ...

Read More
Showing 731–740 of 937 articles
« Prev 1 72 73 74 75 76 94 Next »
Advertisements