The HTTP 1.1 protocol has it’s own tracing method implemented called TRACE which provides route tracing on request. Of course many people simply use traceroute commands which are available …
As the administrator of any internet facing network knows, there are certain essentials in allowing your clients access to the internet. Most networks employ a proxy server to help …
In brief, the protocol functions as follows. An HTTP message is passed by an ICAP client to the ICAP server. The server processes the message and sends a reply …
Google was the very first search engine to introduce sitemaps with the Google XML sitemap format in 2005. As the internet evolved, so the standard evolved with all the …
We all think of programmers as relatively the same thing. Young white men, who sit behind their desk all day without a clue about what goes on in the …
Lost packets is one of the biggest difficulties for any transport protocol. Sending data across a variety of platforms, switches, hubs and routers is bound to end up with …
The BGP protocol is one used by gateways and routers based in different systems. It’s predecessor was called EGP, this protocol actually was used on the ARPANET – the …
Many high tech Japanese rice cookers now use fuzzy logic technology to cook superior rice. This is a computing approach that does not use traditional Boolean logic but instead …
Circuit level tunneling for instance perhaps SOCKS or SSL tunneling allows a proxy server to pass any protocol it requires. Of course at this level the gateway may not …
The role of checksums in IP headers is actually very important. THey are used to make sure that data is not corrupted during it’s journey from the source address …