
Quote: | “we realize that for some of the Clients – UDP just doesn’t work because of some weird firewall between Client and Server” |
Another Quote: | “there is nothing to block us (so head-of-line blocking doesn’t apply)” |
[→] |
analytics for those Senior Software Developers, Team Leads, Architects, and Project Managers who're Able to Think
posted by "No Bugs" Hare
Quote: | “we realize that for some of the Clients – UDP just doesn’t work because of some weird firewall between Client and Server” |
Another Quote: | “there is nothing to block us (so head-of-line blocking doesn’t apply)” |
[→] |
posted by "No Bugs" Hare
Quote: | “Nagle’s algorithm aims to deal with those [CENSORED] developers who’re trying to send data over TCP in really small chunks (like 1 byte each time)” |
Another Quote: | “it seems that “proportional rate reduction” (PRR, reportedly used by Linux kernels by default starting from 3.2) performs for gaming purposes a little bit better than the alternatives” |
[→] |
posted by "No Bugs" Hare
Quote: | “the best we can hope when using a single TCP connection over 5%-loss channel – is having 1.5-second “lag spike” every 5 or so minutes, and a 3-second “lag spike” every 2 hours.” |
Another Quote: | “we may already have the-information-we-need on the receiving host – but this information is hidden from us by layers of abstraction on receiving side” |
[→] |
posted by "No Bugs" Hare
Quote: | “All the routers, switches (actually – pretty much each and every device which forms Internet infrastructure) – are allowed to drop each and every packet.” |
Another Quote: | “TCP, when it observes a dropped packet, interprets it as an indication of congestion – and slows down.” |
[→] |
posted by "No Bugs" Hare
posted by "No Bugs" Hare
Abstract: | The choice of TCP over UDP (or vice versa) might not always be obvious. In a sense, replacing TCP with UDP is trading off reliability for interactivity. |
Quote: | “The most critical factor in selection of TCP over UDP or vice versa is usually related to acceptable delays” |
[→] |
posted by "Sergeant Major" Hare
Abstract: | Delayed-Message Attacks can Represent a Real Threat if Left Unchecked |
Quote: | “Prevention/mitigation of the Attack is easy, but it needs to be taken into account at the application level.” |
[→] |