Learn about the common causes of packet drops and how to troubleshoot them.
Also find me here:
Baeldung Author
Sandip Roy
My area of specialization is Emerging Platforms and Services, IT Managed Service (SAAS, PAAS, IAAS), digital communication, and computer and IT technology fundamentals. The special focus is on the integration of technologies such as Bioinformatics, Artificial Intelligence (ML, DL), Location & Mobility with modern-day devices and applications.
Here's what I've written (so far):
Baeldung on Linux
- >All
- Network Monitoring (1)
Baeldung on Computer Science
- >All
- Networking (17)
- Security (13)
- Web (3)
- OS (3)
- Programming (2)
- Concurrency (2)
- Core Concepts (1)
Clock Offset vs Clock Skew in Distributed Networks
Filed under Networking
Learn about clock skew and offset, why they happen, and how to synchronize clocks.
What Are the Differences Between Streams and Datagrams in Network Programming?
Filed under Networking
Streams and TCP allow for the sequential transmission one byte at a time, while UDP datagrams are packets transferred over a network without establishing a direct connection between the parties.
Network Time Protocol: Security and Authentication
Filed under Security
NTP is a network protocol that keeps clocks synchronized across devices. Learn about associated security issues and how authentication techniques improve time synchronization’s dependability and integrity.
Which HTTP Error Status Codes Should Not Be Retried?
Filed under Web
Learn which client-side, server-side, and redirection HTTP codes are a no-go for retries.
Do Routers Change the MAC Address of Packets When Forwarding?
Filed under Networking
Learn why packet forwarding plays a crucial role in networking by guaranteeing dependable and effective data transfer across networks.
What Is the PKCS7 File Format?
Filed under Security
Learn about the role of PKCS7 in data security and software applications.
Is There a Standard That Defines Valid SSIDs and Passwords?
Filed under Networking
Learn what makes an SSID and a password valid and secure.
Differences Between an Electronic Signature and a Digital Signature
Filed under Security
Find out the differences between electronic and digital signatures.
What Is Identity and Access Management?
Filed under Security
Learn about identity and access management (IAM) and why it’s implementation is important for online security.
Baeldung on SQL
- >All
- Database Access (2)
- Security (1)
Viewing Roles and Permissions Granted to Users of Azure SQL Server Instance
Filed under Database Access
Learn to view roles and permissions in Azure SQL Server.
Fixing MySQL ‘Host Not Allowed’ Error: A Simple Guide
Filed under Database Access, Security
Learn how to fix this MySQL connection error.