Datagram

Results: 328



#Item
191Internet Protocol / Tunneling protocols / Internet protocols / Cryptographic protocols / Teredo tunneling / IPsec / User Datagram Protocol / Internet Key Exchange / Network architecture / Internet / IPv6

Xbox One Technical information on P2P Networking Behavior Version 1.0 Last updated: October 6, 2013 Many gaming and app scenarios on Xbox® One rely on low-latency peer-to-peer (P2P) networking capabilities. The platfor

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-10-07 13:27:07
192Computing / Internet protocols / Network socket / Multihoming / Stream Control Transmission Protocol / Streaming / Transport layer / User Datagram Protocol / Ip / Network architecture / Internet / Internet standards

SCTP: What is it, and how to use it? Randall Stewart Michael T¨uxen Peter Lei

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:18
193Science / Internet standards / EPICS / Hypertext Transfer Protocol / Server / User Datagram Protocol / Port / Internet protocols / Computing / Internet

Channel Access Servers Kenneth Evans, Jr. October 8, 2004 Part of the EPICS “Getting Started” Lecture Series Argonne National Laboratory

Add to Reading List

Source URL: aps.anl.gov

Language: English - Date: 2007-06-25 17:44:04
194Internet standards / IPv6 packet / Transmission Control Protocol / IPv4 / Ip / Ping / Octet / User Datagram Protocol / Network packet / Network architecture / Computing / Internet

2ping protocol Line protocol version: 2.0 Document version: [removed]Introduction The 2ping protocol is a bi-directional ping system. This allows for several features, such as 3way ping (akin to SYN, SYN/ACK, ACK), and t

Add to Reading List

Source URL: www.finnie.org

Language: English - Date: 2012-04-22 19:23:27
195Cross-platform software / DSSI / LADSPA / LV2 / Qtractor / Ardour / Audio plugin / Rosegarden / Datagram Congestion Control Protocol / Software / Application programming interfaces / Internet protocols

Network distribution in music applications with Medusa Fl´ avio Luiz SCHIAVONI and Marcelo QUEIROZ Computer Science Department University of S˜ao Paulo S˜ao Paulo

Add to Reading List

Source URL: lac.linuxaudio.org

Language: English - Date: 2012-03-04 21:54:14
196IPv6 / 6to4 / Anycast / IPv4 / Network address translation / User Datagram Protocol / Traceroute / IP address / NAT traversal / Internet Protocol / Network architecture / Internet

Observations of IPv6 Traffic on a 6to4 Relay Pekka Savola CSC/FUNET, Finland [removed]

Add to Reading List

Source URL: www.6net.org

Language: English - Date: 2005-02-09 08:26:31
197Pump / Emergency power system / Construction / Engineering / Physics / Consolidated Edison / Thomas Edison / Basement

Datagram Inc. Page 1 of 6 Due to widespread outages from Verizon, ATT & Paetec (Windstream) our phones are not currently working, but our

Add to Reading List

Source URL: www.aspectra.ch

Language: English - Date: 2012-11-02 05:25:34
198Calorimeter / Technology / Geography of Germany / Science / Datagram Congestion Control Protocol / RWTH Aachen University / Aachen

D0 Status Summary ● Have been in supervised access all week, until Sunday evening ● Intermittent trips (low airflow) of west platform rack 

Add to Reading List

Source URL: d0server1.fnal.gov

Language: English - Date: 2003-12-15 18:35:37
199Internet / User Datagram Protocol / Transport layer / Traffic flow / Transmission Control Protocol / Network congestion / Port / UDP Lite / UDP hole punching / Internet protocols / Network architecture / Computing

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2012-01-03 03:52:20
200Internet protocols / Network architecture / Computer network security / Internet privacy / Secure communication / Datagram Transport Layer Security / Virtual private network / Transport Layer Security / Cisco Systems / Computing / Internet / Cryptographic protocols

AnyConnect VPN Client FAQ Document ID: [removed]Questions Introduction What level of rights is required for the AnyConnect client?

Add to Reading List

Source URL: www.lrz.de

Language: English - Date: 2014-04-02 09:42:25
UPDATE