Network packet

Results: 2869



#Item
661Computing / OpenFlow / Virtual LAN / Forwarding plane / Virtual Routing and Forwarding / Forwarding information base / Network switch / Reverse path forwarding / Packet forwarding / Network architecture / Routing / Computer architecture

Microsoft Word - TR_Multiple Flow Tables and TTPs.docx

Add to Reading List

Source URL: www.opennetworking.org

Language: English - Date: 2015-03-23 13:11:37
662Vulnerability / Deep packet inspection / IPv6 deployment / Teredo tunneling / Internet Protocol / Network architecture / IPv6

Cyber Security Solutions - Assure6TM Assure6 provides total protection for your network today and tomorrow TM

Add to Reading List

Source URL: www.salientfed.com

Language: English - Date: 2013-11-22 13:44:47
663Deep packet inspection / Computing / Cisco Wireless Control System / Cisco IOS / Network security / Electronic engineering / Electronics / Videotelephony / Wi-Fi / Cisco Systems

Customer Case Study Hospital Delivers Nonstop Network Availability Children’s Mercy Hospital uses Cisco CleanAir technology to rapidly isolate radio interference in “noisy” environment.

Add to Reading List

Source URL: www.aha-solutions.org

Language: English - Date: 2014-05-28 12:55:14
664Computer security / Deep packet capture / FireEye /  Inc. / Packet capture / Netflow / Network forensics / Pcap / Security information and event management / Computing / Software / Computer network security

CUSTOMER STORY Government Agency Reconstructs Attack LifeCycle Using the FireEye Network Forensics Platform

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-05-01 03:38:45
665Base station subsystem / Electronic engineering / Electronics / General Packet Radio Service / Telecom network protocol analyzer / Technology

Resilience in Computing Systems and Information Infrastructures: A Research Agenda Diversity

Add to Reading List

Source URL: www.resist-noe.org

Language: English - Date: 2007-10-22 04:46:20
666Computing / Cisco Systems / Deep packet inspection / Electronic engineering / Cisco Catalyst / Wireless LAN controller / Computer network security / Cisco Career Certifications / Cisco Wireless Control System / Videotelephony / Technology / Wireless networking

Interconnecting Outdoor WLAN with Internet of Things Customer Case Study Schmitz Cargobull accelerates business processes by networking production sites, improving

Add to Reading List

Source URL: www.cisco.com

Language: English
667Internet standards / Internet protocols / Units of information / Transmission Control Protocol / Traffic flow / Pcap / User Datagram Protocol / IPv4 / Network packet / Computing / Network architecture / Internet

Analysis of Unidirectional IP Traffic to Darkspace with an Educational Data Kit Tanja Zseby Alistair King

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-07 19:26:07
668Network architecture / OSI protocols / Additive increase/multiplicative decrease / TCP congestion avoidance algorithm / Taxonomy of congestion control / Network congestion / Congestion window / TCP Vegas / FAST TCP / Network performance / TCP/IP / Computing

22 JOURNAL OF INTERNET ENGINEERING, VOL. 1, NO. 1, JANUARY 2007 Approaches to Congestion Control in Packet Networks

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2010-04-26 14:44:20
669Internet / Internet protocols / Teletraffic / Flow control / Internet standards / Network congestion / Transmission Control Protocol / Packet loss / TCP Vegas / Network architecture / Network performance / Computing

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2006; 19:381–405 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: dac.789 Assessment of Internet voice transport wit

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2010-04-26 14:42:00
670Computer security / Deep packet capture / FireEye /  Inc. / Packet capture / Netflow / Network forensics / Pcap / Security information and event management / Computing / Software / Computer network security

CUSTOMER STORY Government Agency Reconstructs Attack LifeCycle Using the FireEye Network Forensics Platform

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-05-01 06:23:41
UPDATE