How to reverse engineer a subnet
Alright.. Alright! everbody have their own method to reverse engineer a subnet… Here is a technic and way that works for me and might work for you. Let’s take a random private ip. IP: 192.168.1.95/27...
View ArticleMathis Equation and TCP performance
As simple as possible laid off, the Mathis equation goes as follow Rate <= (MSS/RTT)*(1 / p) MSS This is the Maximum Segment Size, which is the MTU excluding the TCP/IP headers. MSS = MTU – TCP/IP...
View ArticleEthernet flow control and IGMP snooping
It is important to note that TCP flow control mechanism as well as Ethernet flow control mechanism are completely 2 different mechanism, which strive to achieve the same unique goal but when in used,...
View ArticleThe Nagle’s algorithm and TCP throughput
Who talks about about TCP throughput unfortunately can’t step away from the congestion problem that often occurs in TCP session connections. There are many TCP Congestion Algorithms, from Window...
View ArticleQinQ Vlan tagging and S-Vlans
Pre-requiste: Understanding of the 802.1Q Protocol The purpose of this post is to shed a light on how QinQ Vlan takes place in a bridged network environment. Before continuing, it is important to keep...
View ArticleRPS and RFS – Kernel Network Stack
If you have been following the latest improvement in the release of the 2.6.35 kernel, you have probably noted 2 major network stack improvement which have create some buzz in the geek community. Ok...
View ArticlePadhye et. al. Equation and TCP performance
If you are not familiar with the Mathis Equation, I recommend you quickly go over my post article Mathis Equation and TCP Performance. This is necessary since the Padhye et. al. Equation is an...
View ArticleThe so-called Skype SDK IP leaks
For the last few days, there has been a buzzing news in the community, following the recent discovery of a so-called information leak in the skype SDK. zhovner@github, published a python code sample...
View Article
More Pages to Explore .....