Chena Lee

42%
Flag icon
Usually, corrupted packets are caught by the checksums built into TCP and UDP, but sometimes they evade detection
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
Rate this book
Clear rating
Open Preview