Blog>>Networks

BLOG / Networks

details

The networks category covers networking protocols, data transmission methods, network addressing, and network security. Understanding network fundamentals is crucial for designing, implementing, and managing reliable and secure communication systems.

Thumbnail of an article about Linux network troubleshooting — commands and examples
NETWORKS

Linux network troubleshooting — commands and examples

Linux is a popular and powerful operating system that is widely used in both personal and professional settings. One of the key features of Linux is its robust networking capabilities, which make it an excellent choice for a wide range of networking tasks. The Linux network stack has grown significantly throughout the years and currently supports not only basic functionalities but also advanced and complex features (e.g. network namespaces allowing the creation of different and isolated network stack instances).
Thumbnail of an article about Traditional Internet vs. SCION Architecture
NETWORKS

Traditional Internet vs. SCION Architecture

Almost everyone knows and uses the Internet but almost nobody knows about its most modern and secure architecture- it's called SCION (SCALABILITY, CONTROL, AND ISOLATION ON NEXT-GENERATION NETWORKS). Read this blog article to learn more about it and how it compares to traditional internet architecture. The Internet is a world-wide global system of interconnected computer networks. Using the Internet, we can share data and information across the globe instantly. The Internet has made the world a smaller place to live in.
Thumbnail of an article about Berkeley Packet Filter (BPF) — general overview
NETWORKS

Berkeley Packet Filter (BPF) — general overview

At CodiLime, we believe that sharing knowledge with both our external and internal communities creates an organizational culture founded on innovation. That is why we organize regular online events during which our coworkers share their first-hand experiences and know-how on particular network and software development cases. Our latest event was held around the topic of the Berkeley Packet Filter, introduced by our senior software engineer, Łukasz Kszonowski. During his presentation, Łukasz covered the following topics:
Thumbnail of an article about Introduction to network telemetry
OBSERVABILITY
NETWORKS

Introduction to network telemetry

You may have already heard about network telemetry, but you are not sure you understand well enough what exactly is behind it. If that's the case, you'll find the right explanation in this article. The term "network telemetry" can be understood in different ways. Over the years, it was not completely clear for everyone. Following the RFC 9232, you will come across the following understanding of the terms "network telemetry" and "telemetry data"- “Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management.
Thumbnail of an article about What is Policy Based Routing (PBR)?
NETWORKS

What is Policy Based Routing (PBR)?

Nowadays, network traffic nature becomes very complicated in terms of the mixture of applications and their connectivity requirements. Achieving these requirements by means of traditional routing mechanisms may become cumbersome or even impossible and requires special dedicated solutions. Additionally, organizations need to focus on operational costs more strictly than in the past. One good direction to achieve this goal is the optimization of resource usage within different domains. Networking is one such domain, where the objective is to rationally maximize the usage of existing infrastructure rather than making an investment in increasing its capacity.
Thumbnail of an article about VLAN vs. VXLAN — what’s the difference and is one better than the other?
NETWORKS

VLAN vs. VXLAN — what’s the difference and is one better than the other?

VM, VDI, VIM, NFVI, VLAN, VXLAN, VNF - the famous ‘V’ that dominates today’s IT world stands, of course, for ‘Virtual’. Every day we use virtualized servers, storage, desktop or networks without even realizing it. The convenience, cost-saving, enhanced features and security are just some of the reasons why we start using virtualization and often never look back. The same is true for computer networking, where a single physical network can host multiple separated, logical (virtual) networks that may have different topologies and feature sets or even carry traffic of different customers without interfering with each other.
Thumbnail of an article about HTTP/3 Protocol — Performance and Security Implications
NETWORKS

HTTP/3 Protocol — Performance and Security Implications

Web browsers use various protocols to deliver to users what they need. The best-known internet protocol is called HTTP. And just like any other technology, it is not immune to change. Read the article to learn about the HTTP protocol's history and compare its newest versions. The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web and is used to load web pages using hypertext links. HTTP is an application-layer protocol designed to transfer information between devices and runs on top of other layers of the network protocol stack.
arrow
12...678...1213

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix