Satish Kumar

Satish Kumar

936 Articles Published

Articles by Satish Kumar

Page 77 of 94

Bit Stuffing error detection technique using Java

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 1K+ Views

Bit stuffing is a technique used in data communication systems to detect and correct errors that may occur during the transmission of data. It works by adding extra bits to the data being transmitted in order to flag when an error has occurred. One common way to implement bit stuffing in Java is to use a flag byte (such as 0x7E) to indicate the start and end of a frame, and to use a special escape byte (such as 0x7D) to indicate that the next byte is a stuffed bit. For example, the sender would add a stuffed bit before ...

Read More

Bootstrap Protocol (BOOTP)

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 5K+ Views

The Bootstrap Protocol (BOOTP) is a legacy computer networking protocol used to automatically assign IP addresses to devices on a network. BOOTP was developed in the 1980s as a way to assign IP addresses to diskless workstations without the need for a DHCP server. BOOTP works by allowing a device to broadcast a request for an IP address on the network. The BOOTP server, which is typically a router or a dedicated BOOTP server, receives the request and assigns an IP address to the device. The device then uses the assigned IP address to communicate with other devices on the ...

Read More

Breaking Cryptography

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 1K+ Views

Breaking cryptography typically involves attempting to discover the secret key that was used to encrypt a message. Once the secret key is discovered, it can be used to decrypt the original message, making it readable. There are a variety of methods that can be used to try to break a cryptographic system, including − Brute force − Trying all possible secret keys until the correct one is found. Ciphertext-only attack − Attempting to decrypt a message without knowing the key, but only having access to the ciphertext (the encrypted message). Known plaintext attack − Attempting to decrypt a message ...

Read More

Calculation of TCP Checksum

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 18K+ Views

The Transmission Control Protocol (TCP) checksum is a method used to detect errors in TCP packets. The checksum is calculated by taking the binary value of all the fields in the TCP header and the data, treating them as a large integer, and then performing a bit-wise ones complement on that integer. To calculate the TCP checksum, the following steps are performed − The checksum field in the TCP header is set to zero. The binary values of the source and destination IP addresses, the reserved field, the protocol field (set to 6 for TCP), the TCP length, and ...

Read More

Calling Web Service Using Curl With Telnet Connection

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 8K+ Views

What is Curl? curl is a command-line tool for transferring data using various protocols. It was designed to work without user interaction, so it is ideal for use in scripts and other automated tasks. curl supports a wide variety of protocols, including HTTP, HTTPS, FTP, SFTP, and many more. With curl, you can send HTTP and HTTPS requests, receive and display HTTP and HTTPS responses, upload and download files, and even send and receive email using the SMTP and IMAP protocols. curl also supports various options and command-line arguments that allow you to control the behavior of the request, such ...

Read More

CAN Protocol

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 32K+ Views

The Controller Area Network (CAN) protocol is a communication protocol that was developed for use in the automotive industry, but has also been used in other industries such as industrial automation and medical equipment. It is a serial communication protocol that uses a multi-master, distributed control system. This means that any device on the network, called a node, can initiate communication and all other nodes on the network can participate in the communication. The protocol provides a way for devices to share information and synchronize their actions without the need for a central controller. The protocol uses a collision detection ...

Read More

Can Two IP Addresses Be Same

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 5K+ Views

No, two IP addresses cannot be the same in a single network as each IP address serves as a unique identifier for a device connected to a network. In IPv4, an IP address is a 32-bit binary number, typically represented in dotted-decimal notation, that uniquely identifies a device on a TCP/IP network. In IPv6, an IP address is a 128-bit binary number, represented in hexadecimal notation, that also uniquely identifies a device on a TCP/IP network. IP Address Structure An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol ...

Read More

Basics of NS2 and Otcltcl script

Satish Kumar
Satish Kumar
Updated on 06-Feb-2023 5K+ Views

NS2 (Network Simulator version 2) is a discrete event network simulator that is widely used to simulate and analyze the behavior of computer networks. It is open-source software and is written in C++ and Otcl (Object-oriented Tool Command Language). The Otcl (Object-oriented Tool Command Language) is an extension of Tcl (Tool Command Language) and is used to create and control network entities and configure network scenarios in NS2. NS2 has two parts: the C++ part, which provides the underlying simulation engine, and the Otcl part, which provides the user interface and interaction between the user and the C++ part. The ...

Read More

Basic configuration of Adaptive Security Appliance (ASA)

Satish Kumar
Satish Kumar
Updated on 06-Feb-2023 575 Views

The Cisco Adaptive Security Appliance (ASA) is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. The basic configuration of an ASA involves setting up basic networking, defining security policies, and configuring any desired VPN connections. Basic networking − Before configuring the ASA, you should make sure that the device has a valid IP address, subnet mask, and default gateway. You can configure these settings using the device's command-line interface (CLI). Security policies − The ASA uses access control lists (ACLs) to define security policies that control traffic flow. You can use the CLI ...

Read More

Basic concept of TCP-Vegas

Satish Kumar
Satish Kumar
Updated on 06-Feb-2023 830 Views

TCP Vegas is a variation of the Transmission Control Protocol (TCP) congestion control algorithm that aims to improve network performance by more accurately detecting and responding to network congestion. In standard TCP, the sender uses the number of packets that have been acknowledged by the receiver (the "congestion window") to control the rate at which it sends data. If the congestion window is large, the sender can send data more quickly, and if the congestion window is small, the sender sends data more slowly. However, this approach can be prone to errors, because the sender may not always accurately detect ...

Read More
Showing 761–770 of 936 articles
« Prev 1 75 76 77 78 79 94 Next »
Advertisements