Node feature discovery for Kubernetes
-
Updated
May 24, 2024 - Go
Node feature discovery for Kubernetes
Cybersecurity content (YouTube videos) | (1) Deep packet inspection analyses - why the typical approach is not enough | (2) Remcos RAT threat analysis on Windows including IEC 60870-5-104 traffic
This is a simple reliable data transfer protocol implemented over UDP. The protocol is based on the Go-Back-N protocol.
A (obsolete) open-source project created to reverse-engineering some Resident Evil 3 files.
Planning algorithms projects repository
A remix shadcn starter with navbar, sidebar and theming.
The client/server pair allows the client to transfer a single file to a server's local directory. The client/server communication runs over UDP on a very unreliable network.
Implement an application level RDT protocol.
Repository for CENG435 - Data Communications and Networking homeworks.
📁 RDT File Transfer Program using Java
Implementation of a reliable transfer service on top of the UDP/IP protocol. In other words, a service that guarantees the arrival of datagrams in the correct order on top of the UDP/IP protocol, along with congestion control.
Implementation of a multihomed and pipelined Reliable Data Transfer Protocol (RDT) over UDP on a network topology
Add a description, image, and links to the rdt topic page so that developers can more easily learn about it.
To associate your repository with the rdt topic, visit your repo's landing page and select "manage topics."