networking
The server is on a Gbit link. ethtool confirms 1000 Mbps on the interface. And yet every SFTP transfer caps out somewhere around 800 KB/s. Not 80 MB/s — 800 kilobytes per second. Less than 1% of the theoretical capacity. The problem isn't bandwidth. It's a stack of bad defaults: a congestion control algorithm designed for year-2000 networks, microscopically small NIC ring buffers, and application…
Published: April 25, 2026 When the past answer becomes the present problem, we call it Path Dependency. TCP was designed in 1981. It solved the right problems for its time. By the time HTTP was carrying the modern web, that 40-year-old foundation was starting to show its age. Keep-Alive solved the contract problem. One connection, many requests. Cheaper by design. But the queue was still single-f…
Setting up a WireGuard server in 2026 is trivial. AI writes the wg0.conf , docker compose up and wg-easy is running in a minute, generating peers takes one click. The hard part hasn't been setup for years. The hard part is what happens after the second server. The moment you have two, the friction shifts. It's no longer about commands or configs. The questions change. Who has access to what? When…
iSCSI is a protocol from the era when “the network” meant a rack-scale fibre channel replacement. Initiators and targets trusted each other, CHAP was optional theatre, and a packet from an initiator carried the implicit assumption “we’re on the same L2 segment.” scsipub serves iSCSI targets to arbitrary clients on the public internet. That’s a different set of assumptions. This post is the decisi…
10Gb/s Ethernet: what I actually did to get it working in my home Having learned enough about 10Gb/s Ethernet to be comfortable about setting it up in my house, it was time to bite the bullet: order it from the ISP, buy some kit, and get started. I already had 2.5Gb/s working. The apartment has structured cabling -- each room has one or more RJ45 sockets in the wall, and there's a patch panel dow…
Ethernet delivers stable, speedy, secure wired connections to the internet and between devices.
Today we are looking at the TP-Link TL-SG108, an 8 port Gigabit Ethernet plug-and-play desktop switch. It is a little less capable and cheaper than the usual fare here, but it does hide some interesting surprises! Removing the two small screws on the bottom allows us to remove the top cover and see that the switch is based on the Realtek RTL8370N. The RTL8370N is a low-cost Gigabit Ethernet switc…
How VeilShift™ Works — The Protocol That Bypasses DPI Blocking If you've ever tried using a VPN in Turkey, UAE, or Indonesia and found it suddenly stopped working, you've run into Deep Packet Inspection. This article explains what DPI is, why it defeats most commercial VPNs, and how VeilShift™ approaches the problem differently. What is Deep Packet Inspection? Deep Packet Inspection (DPI) is a me…
Here are a couple of communication protocols I learned today on a system at work. SNMP SNMP stands for Simple Network Management Protocol. It runs over UDP (User Datagram Protocol: a lightweight method of sending data that doesn’t require a back-and-forth connection handshake) on ports 161 and 162 (specific numbered channels that network services listen on) and is used to discover and monitor dev…
The General Assembly is the nucleus around which EGU’s community gathers and connects, providing a week of opportunity to meet new people and reaffirm old bonds. Progress within science and its impact on society rises from the confluence of ideas and a diversity of voices; to facilitate meeting and discussion at the Assembly, #EGU26 offers a number of paths for building your network. Networking e…
2017-08-10 » The world in which IPv6 was a good design Last November I went to an IETF meeting for the first time. The IETF is an interesting place; it seems to be about 1/3 maintenance grunt work, 1/3 extending existing stuff, and 1/3 blue sky insanity. I attended mostly because I wanted to see how people would react to TCP BBR, which was being presented there for the first time. (Answer: mostly…
Internet Protocol Version 8 (IPv8) is a managed network protocol suite that transforms how networks of every scale -- from home networks to the global internet -- are operated, secured, and monitored. Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens served from a local cache. Every service a device requires is delivered in a single DHCP8 lease response. Every packet…
Your network is running fine today. But what happens when you onboard twenty new remote employees next quarter? When that new video conferencing rollout doubles your bandwidth demand? When a new branch office comes online and nobody thought to account for the traffic? If the answer is “we’ll deal with it when it happens,” you are already behind. Network capacity planning is the discipline that pr…
Poor VoIP call quality and frozen video feeds are not random. In most cases, a single measurable network variable is responsible: jitter. IT professionals and MSPs who understand how to identify, measure, and fix network jitter can resolve real-time communication problems faster and prevent them from coming back. This guide covers what network jitter is, why it disrupts VoIP and video conferencin…
Every network has a shape. That shape, whether it is a simple direct connection between two devices or a complex web of redundant paths across dozens of sites, determines how traffic flows, where failures propagate, how easy the network is to troubleshoot, and how well it will scale as your organization grows. That shape is network topology. For IT professionals managing real infrastructure, netw…
Network congestion is one of the most common performance problems in modern IT environments, yet it remains one of the most misdiagnosed. Users complain that things are slow. Applications time out. Video calls break up. And the network team scrambles to find the cause without always having the visibility to pinpoint it quickly. This guide explains exactly what network congestion is, how to recogn…
21 min Network loops can bring down an entire network in seconds. This guide compares the top 10 network loop detection tools for 2026 — covering automated topology mapping, STP monitoring, broadcast storm detection, and pricing — to help IT teams and MSPs choose the right solution. The post Top 10 Network Loop Detection Tools for 2026 appeared first on MSP Blog - Domotz blog for MSPs .
Accenture has entered into an agreement to acquire Ookla, a global leader in network intelligence, competitive benchmarking and customer experience analytics.
What's a computer network? You probably use one everyday, but you might not know how it works. This quick guide explains. The post What is a Computer Network? A Easy Overview appeared first on ReHack .
research.ioSign up to keep scrolling
Create your feed subscriptions, save articles, keep scrolling.









