Tagged articles
10 articles
Page 1 of 1
Architects' Tech Alliance
Architects' Tech Alliance
Oct 8, 2025 · Artificial Intelligence

What Is UALink? The Open High‑Performance Interconnect Shaping AI Accelerator Clusters

UALink is an open, high‑performance interconnect standard designed to link thousands of AI accelerators, offering NVLink‑level bandwidth, low latency, scalability, cost efficiency, and flexible topologies to meet the demanding communication needs of modern AI workloads.

AI interconnectHigh‑Performance NetworkingProtocol Stack
0 likes · 8 min read
What Is UALink? The Open High‑Performance Interconnect Shaping AI Accelerator Clusters
大转转FE
大转转FE
Aug 12, 2025 · Fundamentals

How Does a Simple Chat Message Travel Across the Internet? Inside the OSI Model

Using a familiar chat example, this article walks through the OSI seven‑layer model, illustrating each layer’s role—from the application’s HTTP request to the physical bitstream—through analogies with parcel delivery, complete with data format transformations and visual diagrams.

OSI modelProtocol Stackcomputer networking
0 likes · 15 min read
How Does a Simple Chat Message Travel Across the Internet? Inside the OSI Model
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Sep 30, 2022 · Information Security

Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)

The article examines three Android Bluetooth stack flaws—CVE‑2020‑27024 in the SMP pairing protocol, CVE‑2021‑0918 in GATT notifications, and CVE‑2021‑39805 in L2CAP signaling—detailing their out‑of‑bounds memory errors, underlying code issues, and implications for future Rust‑based stack security.

AndroidBluetoothCVE
0 likes · 15 min read
Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)
OPPO Amber Lab
OPPO Amber Lab
Jun 29, 2022 · Information Security

Inside Android Bluetooth: Three Critical CVEs and Their Exploits

This article examines the complexity of the Bluetooth protocol stack, focusing on Android’s Host layer vulnerabilities, and provides detailed analyses of three critical CVEs—CVE‑2020‑27024 (SMP), CVE‑2021‑0918 (GATT), and CVE‑2021‑39805 (L2CAP)—including protocol overviews, code excerpts, and exploitation paths.

AndroidBluetoothCVE
0 likes · 13 min read
Inside Android Bluetooth: Three Critical CVEs and Their Exploits
Liangxu Linux
Liangxu Linux
Nov 28, 2020 · Fundamentals

Unraveling TCP/IP: From Its Origins to the Full Packet Journey

This article explains the history, standards, layered architecture, and step‑by‑step packet transmission of the TCP/IP suite, detailing each protocol’s role from the physical link up to the application layer and illustrating how data traverses the network.

Internet ProtocolNetworkingOSI model
0 likes · 13 min read
Unraveling TCP/IP: From Its Origins to the Full Packet Journey
Efficient Ops
Efficient Ops
Jul 15, 2020 · Fundamentals

How Does a Web Request Travel? Unpacking the Full HTTP/TCP/IP Journey

This article walks through the complete lifecycle of a web request, from entering a URL and DNS resolution, through HTTP and TCP processing, IP routing, ARP resolution, and Ethernet framing, explaining each protocol layer's role in encapsulation and de‑encapsulation.

EncapsulationHTTPNetworking
0 likes · 26 min read
How Does a Web Request Travel? Unpacking the Full HTTP/TCP/IP Journey
Architects' Tech Alliance
Architects' Tech Alliance
Jan 13, 2019 · Fundamentals

Overview of InfiniBand Technology and Its Protocol Stack

This article provides a comprehensive overview of InfiniBand technology, covering its open‑standard architecture, history, OFED software stack, protocol layers, performance advantages over traditional storage networks, and its primary use cases in high‑performance computing and data‑center environments.

High-Performance ComputingInfiniBandNetworking
0 likes · 11 min read
Overview of InfiniBand Technology and Its Protocol Stack
Java Captain
Java Captain
Mar 5, 2018 · Fundamentals

Understanding the Internet Protocol Suite: A Five‑Layer Model Overview

This article explains how the Internet works by breaking the Internet Protocol Suite into a simplified five‑layer model, covering the physical, link, network, transport, and application layers, their protocols, addressing schemes, and how data moves from hardware to user applications.

Computer NetworksInternetNetworking
0 likes · 16 min read
Understanding the Internet Protocol Suite: A Five‑Layer Model Overview