User datagram protocol News
March 20, 2014
Spotting unusual network traffic, like large amounts of encrypted data headed to suspicious domains, is key to better banking botnet detection.
October 22, 2004
This excerpt from "The administrator shortcut guide to patch management" describes how to restrict traffic by only allowing it through certain firewall ports.
June 06, 2003
This chapter excerpt explains the layers of the OSI model, switching, TCP, UDP, and VRRP.
User datagram protocol Get Started
Bring yourself up to speed with our introductory content
TCPView is a Windows network monitoring utility that shows a graphical representation of all currently active TCP and UDP endpoints on a system. Continue Reading
A datagram is, to quote the Internet's Request for Comments 1594, "a self-contained, independent entity of data carrying sufficient information to be routed from the source to the destination computer without reliance on earlier exchanges between this source and destination computer and the transporting network." Continue Reading
Learn what makes up a VoIP packet, how headers work, what protocols transport voice traffic over the Internet and how this traffic uses network bandwidth. Continue Reading
Evaluate User datagram protocol Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The benefits of the ODL SDN platform are promising, but what about the recent Netdump flaw it experienced? Expert Kevin Beaver discusses why you may not want to pass on OpenDayligh just yet. Continue Reading
Expert Michael Cobb discusses how developing a response plan in conjunction with service providers can help enterprises better thwart DoS attacks. Continue Reading
The top 10 tools to protect your network against security breaches. Continue Reading
Manage User datagram protocol
Learn to apply best practices and optimize your operations.
Attackers have discovered new ways to conduct DDoS attacks. Expert Nick Lewis explains how they work, and what enterprises can do about them. Continue Reading
Find out how to use Wireshark VoIP and UC packet capture, and learn from three main use cases why they are valuable to VoIP administrators. Continue Reading
In this tip, learn how to measure wireless networking performance with iPerf -- a tool that calculates TCP/UDP, throughput, loss and delay. Eliminate jitter, isolate bottlenecks of traffic, or monitor Wi-Fi or AP performance using this open source testing tool. Continue Reading
Problem Solve User datagram protocol Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Microsoft's Remote Desktop Protocol improves the user experience with the release of RDP 8.0 in Windows Server 2012, but there are some limitations. Continue Reading
Expert Chris Partsenidis explains what iPerf can do to help you measure your network's bandwidth, delay, jitter and potential for data loss. Continue Reading
TCP optimization is crucial when traffic using TCP/IP to traverse the WAN performs too slowly. Use these three tips to optimize TCP. Continue Reading