article thumbnail

How Precision Time Protocol is being deployed at Meta

Engineering at Meta

Implementing Precision Time Protocol (PTP) at Meta allows us to synchronize the systems that drive our products and services down to nanosecond precision. Network card Our ultimate goal is to make protocols such as PTP propagate over the packet network.

article thumbnail

Open sourcing h3i: a command line tool and library for low-level HTTP/3 testing and debugging

CloudFaire

Internet protocol specifications are instructions designed for engineers to build things. Protocol designers take great care to ensure the documents they produce are clear. HTTP/3 is an application protocol that maps HTTP semantics to QUIC, such as defining how HTTP requests and responses are assigned to individual QUIC streams.

Protocol 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CCNA: TCP/IP Stack

The Network DNA

CCNA: TCP/IP Stack TCP/IP Stack is the most widely used protocol stack. TCP/IP stack is a conceptual model consisting of network communication protocols. It specifies how data should be packetized, addressed, transmitted, and routed across the network. TCP/IP networks use TCP or UDP protocol at this layer.

TCP 52
article thumbnail

Secure Your Azure VNET Using Network Security Groups

Akins IT

Although theres more than one way to control cross network communication, this blog will cover the method of using Network Security Groups (NSG) to achieve this goal. NSGs can be deployed through the Azure Marketplace and associated to either a subnet, VM network interface or both.

article thumbnail

Multi-Path TCP: revolutionizing connectivity, one path at a time

CloudFaire

Enter Multi-Path TCP (MPTCP), which exploits the presence of multiple interfaces on a device, such as a mobile phone that has both Wi-Fi and cellular antennas, to achieve multi-path connectivity. It's a major extension to the TCP protocol, and historically most of the TCP changes failed to gain traction.

TCP 137
article thumbnail

NetFlow vs. sFlow

Kentik

Flow-based network monitoring relies on collecting information about packet flows (i.e. a sequence of related packets) as they traverse routers, switches, load balancers, ADCs, network visibility switches, and other devices. IPFIX is an IETF standards-based protocol that is largely modeled on NetFlow v9. Interface Counters.

article thumbnail

IoT has an identity problem. Here’s how to solve it

CATO Networks

In most cases, these patterns are evaluated on a single network packet, rather than a sequence of flows between a client host and a server. There exist several protocols, from different network layers that can be used for OS fingerprinting. Figure 1 displays these protocols, based on the Open Systems Interconnection (OSI) model.

IoT 52