6 Results for:SCTP

  • Sort by: 

Intro to encapsulation and decapsulation in networking

By David Jacobs 26 Jan 2022

Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data. Read More

Sidecarless eBPF service mesh sparks debate

By Beth Pariseau 20 Apr 2023

As cloud-native service meshes expand beyond Kubernetes, open source community members raise concerns about the security and suitability of eBPF in sidecarless architectures. Read More

RDMA over Fabrics: a big step for SSD access

By Randy Kerns 22 Jul 2016

Shared storage access for servers has been the most basic requirement for storage networks. Performance demands for multiple systems accessing data continually increase due to improvements in ... Read More

Bridging the gap between WebRTC, VoIP and phones

By George Lawton 22 Apr 2015

The WebRTC protocol has shown great promise for integrating telephony capabilities into modern enterprise applications. But challenges remain. Read More

VoIP security -- Free IP telephony fuzzing tools

By Gary Audin 06 May 2007

Protect your organization's VoIP security with free VoIP security tools designed to test IP telephony vulnerability. Read More

Network session data analysis with Snort and Argus

By Richard Bejtlich 01 Apr 2008

This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network ... Read More