• TCP (Transmission Control Protocol)

    TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet.

    ITKE344,740 pointsBadges:
  • DWDM vs. SONET networks for connecting to the virtual world

    We live in a virtual world where most of us have network access in our homes -- the Internet -- which is a virtual network...

    SteveBige012,945 pointsBadges:
  • The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference

    This chapter describes some of the key operating fundamentals of TCP beginning with a discussion of how TCP handles data and introduces the concepts of streams, segments, and sequences. Further it describes the most important applications that use TCP and what ports they use for server applications.

    ITKE344,740 pointsBadges:
  • Open the TCP receive window

    Increase the window size to increase performance.

    Chunter321,155 pointsBadges:
  • Secure remote Linux logging with rsyslog

    The rsyslog daemon allows a choice between UDP, TCP and RELP logging protocols for your Linux system. TCP and RELP offer guaranteed log messaging, for more secure logs.

    svanvugt805 pointsBadges:
  • TCP offload’s promises and limitations for enterprise networks

    TCP offload products free up limited CPU resources in network-intensive data centers. But TCP offload is no panacea and can introduce more problems.

    editor13,335 pointsBadges:
  • Using TCP stack, segmentation, receive side scaling or checksum offload

    Smart network adapters offload RSS, checksum and other tasks from the server's CPU and noticeably improve performance if you choose features wisely.

    editor13,335 pointsBadges:
  • Why TCP traffic spikes with source port zero should sound an alarm

    Are spikes in TCP traffic with source port zero warning signs that future attacks are imminent? Discover why enterprises should be concerned.

    searchsecurity20,880 pointsBadges:
  • Snort’s Stream5 and TCP overlapping fragments

    Stream5 is a critical aspect of the inspection and detection equation of IDS Snort. It performs based on its specific configuration and thus must be configured correctly. Learn how this powerful Snort preprocessor addresses several aspects of network-centric traffic inspection in this edition of...

    searchsecurity20,880 pointsBadges:
  • Deep packet inspection: Who needs it for network traffic management?

    Using deep packet inspection (DPI) is a great way to analyze Internet traffic and bandwidth use beyond the TCP headers, when its use doesn't violate network traffic management regulations. Carriers may find that if they don't embrace DPI, their competitors may use it to their own advantage.

    SearchEnterpriseWAN1,040 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following