Most people who have written networking software are familiar with the TCP and UDP protocols. These are used to connect distributed applications and allow messages to flow between them. These ...
In two previous articles [in the September and October 2007 issues of LJ], I looked at the basics of SCTP, how you can use SCTP as a replacement for TCP and how you can use SCTP to process multiple ...
A serious vulnerability in the TCP implementation in Linux systems can be used identify hosts communicating over the protocol and attack that traffic. A serious vulnerability in the TCP implementation ...
Bob Briscoe (Chief researcher at the BT Network Research Centre) is on a mission to tackle one of the biggest problems facing the Internet. He wants the world to know that TCP (Transmission Control ...
One of the most impactful changes in the 7.0 networking stack is the optimization of the IPv6 TCP output path to cache flow ...
When working with Linux, understanding how TCP ports behave is an important technical skill. TCP ports control how applications communicate over a network and determine which services are accessible ...