TOFFEE (and TOFFEE-DataCenter) optimized Wireless Mesh-Networks – B.A.T.M.A.N [open-mesh.org (Open Mesh)]
TOFFEE/TOFFEE-DataCenter can be used to optimize Ad-Hoc Mobile Wireless Mesh-Networks
a Linux and Tech Youtube Channel for advance Linux users, systems and network software programmers and tech enthusiasts
TOFFEE/TOFFEE-DataCenter can be used to optimize Ad-Hoc Mobile Wireless Mesh-Networks
If you are a SD-WAN provider you may have an efficient SDN-Cloud based SD-WAN infrastructure, but the real challenge is the connectivity between your clients (SD-WAN subscribers/users Branch Office Edge…
TOFFEE/TOFFEE-DataCenter can be used to optimize Satellite Networks (Satellite based Internet Networks, VoIP, Data, private leased-links)
Deploy TOFFEE along with your existing VPN devices you can do the same as shown below. This will allow your VPN devices to encrypt your TOFFEE WAN Optimized network data
Deploy TOFFEE along with a web-proxy cache (such as Squid Proxy) you can deploy the discussed in this article. TOFFEE does not cache files. TOFFEE does packet level network optimization
A circular buffer, circular queue, cyclic buffer or ring buffer is a data structure is a fixed-size buffer as if it were connected end-to-end or can be a dynamic one…
libpcap is a very popular user-space networking library, with which you can capture and or generate packets. libpcap is the underlying framework for many popular packet capture tools such as…
At times you may come across some old or legacy kernel source-code which could be something you stumbled across online open-source code or it could be your organization proprietary code…
Usually as a part of network software development you do socket programming. But this is typically done in user-space, where the user-space socket APIs takes the instructions (via socket API…
A GPS receiver uses satellites to pinpoint locations, so as long as you have a GPS receiver and a clear view of the sky, you'll never be lost again. So…
Every VPN stack is architecture is done in a specific way to accomplish fundamental VPN specifications, requirements and goals. As a part of VPN Network stack architecture quite often we…
When you architect and implement a VPN deployment as a part of standalone setup or leveraging VPN technologies as one of your building blocks of your SD-WAN product architecture, one…
Many viewers and even sometimes my students ask me how I can become a kernel programmer or just device driver developer and so on. So here is my YouTube video…
If you allocate any global variables and when you access them (i.e read or write) at different parts of the code you are supposed to use locks such as Spinlocks,…
If you are a student you may come across a term called structured programming. Which actually means you write a smooth flow of code and whenever required you steer the…