network protocol Guest User network protocol Guest User

How to Streamline Your Protocol Testing Process for Improved Efficiency

Protocol testing is a critical step in the development of any network product, as it ensures that the product conforms to industry standards and interoperates reliably in real-world scenarios. However, the protocol testing process can be time-consuming and resource-intensive. This paper explores options and alternatives for making the protocol testing process more efficient, requiring less times, resources, and staff.

Read More
network protocol, network emulation Guest User network protocol, network emulation Guest User

Network Slowdown, by Design

How are you measuring your network’s performance? One can have a very fast network, but get very little throughput, with very high perceived delays…If you are using a tool, such as iperf, to measure throughput, the results can be quite deceptive. That's because iperf displays effective throughput of data at the transport layer, and thus masks what is actually going on underneath …

Read More
network protocol Guest User network protocol Guest User

Log4j Vulnerability

IWL Products are NOT Affected by Log4j Vulnerability, disclosed by Apache. Log4j allows attackers to execute code remotely on a target computer, meaning that they can steal data, install malware or take control …

Read More
network protocol Guest User network protocol Guest User

Diagnosing SIP Issues - Hints & Tips

A SonicWall user recently came to us for help; the user felt the problem was within SIP and UDP. Here are some thoughts and ideas we provided to help him with his SIP diagnosis.

SIP is a somewhat troublesome protocol. The basic SIP transactions flow with a well known UDP port number. That makes it relatively easy for a firewall to allow (or disallow) the SIP protocol itself …

Read More

You may also search for blog posts:

By Date

By Topic