Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz
Intel(R) Celeron(R) CPU N3050 @ 1.60GHz
a Linux and Tech Youtube Channel for advance Linux users, systems and network software programmers and tech enthusiasts
Intel(R) Celeron(R) CPU N3050 @ 1.60GHz
When you choose to use your Raspberry Pi device as your IoT based remote weather station or if you are building Linux kernel (like kernel compilation) within the same, you…
Intel(R) Celeron(R) CPU N3050 @ 1.60GHz
RockChip RK3566-ROC-PC Firefly (Quad-core 64-bit Cortex-A55)
Introducing TOFFEE-Fudge - Network Packet Generator
The objective of this research is to assess the system performance overheads of user-space sockets (in this case UDP sockets) vs Message queues. So that this can be used as…
In the case of user-space programs, we use third-party libraries (explicit or implicit), but that cannot happen when you code in kernel space. The libraries share the same address space…
The fundamental aspect of a programming language compiler is to translate code written from language to other. But most commonly compilers will compile code written in high-level human friendly language…
In the past I discussed in depth about Architecture and big-picture of Circular Ring buffers and its significance which you can go through over HERE. Here I did a live…
A circular buffer, circular queue, cyclic buffer or ring buffer is a data structure is a fixed-size buffer as if it were connected end-to-end or can be a dynamic one…
libpcap is a very popular user-space networking library, with which you can capture and or generate packets. libpcap is the underlying framework for many popular packet capture tools such as…
At times you may come across some old or legacy kernel source-code which could be something you stumbled across online open-source code or it could be your organization proprietary code…
Usually as a part of network software development you do socket programming. But this is typically done in user-space, where the user-space socket APIs takes the instructions (via socket API…
A GPS receiver uses satellites to pinpoint locations, so as long as you have a GPS receiver and a clear view of the sky, you'll never be lost again. So…
Every VPN stack is architecture is done in a specific way to accomplish fundamental VPN specifications, requirements and goals. As a part of VPN Network stack architecture quite often we…