Satish Kumar has Published 1032 Articles

Calculation of TCP Checksum

Satish Kumar

Satish Kumar

Updated on 08-Feb-2023 20:51:26

17K+ Views

The Transmission Control Protocol (TCP) checksum is a method used to detect errors in TCP packets. The checksum is calculated by taking the binary value of all the fields in the TCP header and the data, treating them as a large integer, and then performing a bit-wise ones complement on ... Read More

Calling Web Service Using Curl With Telnet Connection

Satish Kumar

Satish Kumar

Updated on 08-Feb-2023 20:50:08

8K+ Views

What is Curl? curl is a command-line tool for transferring data using various protocols. It was designed to work without user interaction, so it is ideal for use in scripts and other automated tasks. curl supports a wide variety of protocols, including HTTP, HTTPS, FTP, SFTP, and many more. With ... Read More

CAN Protocol

Satish Kumar

Satish Kumar

Updated on 08-Feb-2023 20:45:00

26K+ Views

The Controller Area Network (CAN) protocol is a communication protocol that was developed for use in the automotive industry, but has also been used in other industries such as industrial automation and medical equipment. It is a serial communication protocol that uses a multi-master, distributed control system. This means that ... Read More

Can Two IP Addresses Be Same

Satish Kumar

Satish Kumar

Updated on 08-Feb-2023 20:39:22

5K+ Views

No, two IP addresses cannot be the same in a single network as each IP address serves as a unique identifier for a device connected to a network. In IPv4, an IP address is a 32-bit binary number, typically represented in dotted-decimal notation, that uniquely identifies a device on a ... Read More

Caesar Cipher in Cryptography

Satish Kumar

Satish Kumar

Updated on 08-Feb-2023 20:31:16

7K+ Views

The Caesar Cipher is a simple substitution cipher named after Julius Caesar, who reportedly used it to communicate with his officials. The technique involves shifting each letter in a message by a fixed number of positions in the alphabet. For example, with a shift of 3, A would be replaced ... Read More

Basics of NS2 and Otcltcl script

Satish Kumar

Satish Kumar

Updated on 06-Feb-2023 21:05:26

4K+ Views

NS2 (Network Simulator version 2) is a discrete event network simulator that is widely used to simulate and analyze the behavior of computer networks. It is open-source software and is written in C++ and Otcl (Object-oriented Tool Command Language). The Otcl (Object-oriented Tool Command Language) is an extension of Tcl ... Read More

Basic Network Attacks in Computer Network

Satish Kumar

Satish Kumar

Updated on 06-Feb-2023 21:04:15

5K+ Views

A network attack is any attempt to disrupt, compromise or gain unauthorized access to a computer network or its resources. Network attacks can be classified into several categories, depending on the method used, the target and the intent of the attacker. One way to classify network attacks is by their ... Read More

Basic Frame Structure of SDLC

Satish Kumar

Satish Kumar

Updated on 06-Feb-2023 21:03:28

593 Views

The SDLC, or Software Development Life Cycle, is a process used by organizations to plan, design, build, test, and deploy software. The SDLC provides a framework for managing the entire software development process, and it typically consists of several distinct phases. The basic frame structure of the SDLC is as ... Read More

Basic configuration of Adaptive Security Appliance (ASA)

Satish Kumar

Satish Kumar

Updated on 06-Feb-2023 21:00:57

467 Views

The Cisco Adaptive Security Appliance (ASA) is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. The basic configuration of an ASA involves setting up basic networking, defining security policies, and configuring any desired VPN connections. Basic networking − Before configuring the ASA, you ... Read More

Basic concept of TCP-Vegas

Satish Kumar

Satish Kumar

Updated on 06-Feb-2023 20:59:41

750 Views

TCP Vegas is a variation of the Transmission Control Protocol (TCP) congestion control algorithm that aims to improve network performance by more accurately detecting and responding to network congestion. In standard TCP, the sender uses the number of packets that have been acknowledged by the receiver (the "congestion window") to ... Read More

Advertisements