Next: , Previous: Use as a library, Up: Hacker's guide


3.10 Network protocol