Network protocols

Results: 10979



#Item
711Computing / Internet protocols / NIS+ / Character Generator Protocol / Discard Protocol / Rlogin / MAPI / Data Access in Real Time / Network File System

/network/rarp /platform/sun4u/sf880drd /network/slp /network/dns/client

Add to Reading List

Source URL: www.boydadamson.com

Language: English - Date: 2013-08-02 08:16:20
712Computing / Software / Internet protocols / NIS+ / Network management / MAPI / Network file systems / Data Access in Real Time / Network File System

/system/svc/restarter /application/font/stfsloader /application/x11/xfs

Add to Reading List

Source URL: www.boydadamson.com

Language: English - Date: 2013-08-02 08:17:02
713Computing / Network architecture / Computer networking / Networking hardware / Internet protocols / Cryptographic protocols / 6WIND / Data Plane Development Kit / Open vSwitch / IPv6 / Network function virtualization / Virtual Router Redundancy Protocol

S P E E DS E R I E S TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2015-12-18 16:04:59
714Software / File sharing / Applied mathematics / Formal sciences / Structure / Peer-to-peer / Artificial neural network / Data mining / Algorithm / Social peer-to-peer processes / Tribler

QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable D2.3.1 Report on the deployment of protocols in living lab environ

Add to Reading List

Source URL: qlectives.eu

Language: English - Date: 2012-02-01 09:40:00
715Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
716Distributed data storage / Tapestry / Routing / Overlay network / Pastry / Dynamic routing / Peer-to-peer / Chord / Distributed hash table / Content addressable network

Appears in Proceedings of the 11th IEEE International Conference on Network Protocols (ICNPExploiting Routing Redundancy via Structured Peer-to-Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D.

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2004-07-18 15:32:23
717Internet / Computing / Internet protocols / Internet Standards / Domain name system / Network architecture / WHOIS / Domain registration / Domain name registry / Domain name / Prefix WhoIs / WHOIS++

Radix - WHOIS Access Policy 1.1 Dissemination of Domain Registration Information: Radix FZC (“Registry Operator”) is required to collect and provide domain name registration information ("Whois Data") for a variety o

Add to Reading List

Source URL: radix.website

Language: English - Date: 2014-08-25 01:33:34
718Computing / Network architecture / Routing / Computer architecture / Computer networking / Network protocols / Emerging technologies / OpenFlow / Forwarding information base / Software-defined networking / Forwarding / Packet forwarding

IGP-as-a-Backup for Robust SDN Networks Olivier Tilmans Stefano Vissicchio Universit´e catholique de Louvain

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2016-03-05 12:03:17
719Computing / Virtual private networks / Computer network security / Network architecture / Tunneling protocols / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / SoftEther VPN / OpenVPN

ITServ Request for VPN Access Every field is mandatory Name: ______________________________________ ID. ___________ Tel. ___________ School/Department/Unit: _________________________Email: _____________________ Period Re

Add to Reading List

Source URL: itserv.ait.ac.th

Language: English - Date: 2012-10-23 04:58:00
720Computing / Network architecture / Internet / Routing / Computer networking / Internet Standards / Internet protocols / Border Gateway Protocol / Route reflector / Router / Control plane / Distance-vector routing protocol

Using Routers to Build Logic Circuits: How Powerful is BGP? Marco Chiesa? Luca Cittadini? ?

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2013-08-22 11:30:09
UPDATE