Tcp checksum offload

Tcp checksum offload

TCP Checksum Offload is an option for a network adapter. If enabled, the adapter would be responsible of computing the checksum of the incoming or outcoming TCP messages, resulting the calculation reduce of the CPU. With the option enabled, the system would give a random value to fill the field of checksum in the TCP header before the message reaches the adapter.

However, based on ref.2, in some circumstances, some adapters can not calculate the checksum as fast as the CPUs faster than 400MHz.

Reference

# Wireshark, TCP Checksum Offload, [http://wiki.wireshark.org/TCP_checksum_offload http://wiki.wireshark.org/TCP_checksum_offload]
# IBM, TCP Checksum Offload, [http://publib.boulder.ibm.com/infocenter/systems/index.jsp?topic=/com.ibm.aix.prftungd/doc/prftungd/tcp_checksum_offload.htm http://publib.boulder.ibm.com/infocenter/systems/index.jsp?topic=/com.ibm.aix.prftungd/doc/prftungd/tcp_checksum_offload.htm]


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • TCP Offload Engine — or TOE is a technology used in network interface cards to offload processing of the entire TCP/IP stack to the network controller. It is primarily used with high speed network interfaces, such as gigabit Ethernet and 10 gigabit Ethernet, where… …   Wikipedia

  • Windows Vista networking technologies — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features …   Wikipedia

  • Proxy server — For Wikipedia s policy on editing from open proxies, please see Wikipedia:Open proxies. Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. In …   Wikipedia

  • IPsec — Internet Protocol Security (IPsec) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each in a data stream. IPsec also includes protocols for cryptographic key establishment.… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”