Network traffic control

Results: 798



#Item
121Internet protocols / Data / Xpress Transport Protocol / Transmission Control Protocol / Transport layer / Slow-start / Goodput / Bandwidth-delay product / Traffic shaping / Network performance / Computing / Network architecture

On the Performance of Transport Protocols Over ATM Networks  M. Ajmone Marsan, A. Bianco, R. Lo Cigno, M. Munaf`o Dipartimento di Elettronica — Politecnico di Torino

Add to Reading List

Source URL: netgroup.polito.it

Language: English - Date: 2007-11-05 06:22:54
122Air safety / NTT Data / Air traffic control / Aviation / Economy of Asia / Economy of Japan / Nippon Telegraph and Telephone / Technology

CASE 01 OUR MISSION Utilizing IT to Support Air Network Safety in Many Countries A flight route is a “highway in the sky” around an airfield that has been set up to enable all aircraft to land

Add to Reading List

Source URL: www.nttdata.com

Language: English - Date: 2014-12-09 04:32:26
123Cyberwarfare / Virtual private network / Kerio Control / Cisco PIX / Computer network security / Computing / Computer security

Security Gateway F500 Series Amaranten SSP™ Security Services Platform firewall • VPN termination • intrusion prevention • anti-virus anti-spam • content filtering • traffic shaping • authentication

Add to Reading List

Source URL: www.amaranten.com

Language: English - Date: 2012-03-31 05:45:29
124Information technology management / Netflow / Transmission Control Protocol / Traffic flow / Simple Network Management Protocol / Network packet / Computing / Network management / Network architecture

Solutions: Network Device, NetFlow & DHCP Description:

Add to Reading List

Source URL: www.heroix.com

Language: English - Date: 2010-06-18 16:16:29
125Data / Transmission Control Protocol / Traffic flow / Asynchronous Transfer Mode / Transport layer / Packet switching / Packet loss / Network congestion / Goodput / Computing / Network performance / Network architecture

Switch Buffer Occupancy (Bytes) Fig. 9 shows how much switch buffer space is used when one TCP sends into a slow link with credit flow control turned on, for the configuration depicted in Fig. 2 (a). The flow control sy

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-15 17:11:59
126System software / Kerio Control / Comparison of firewalls / Computer network security / Computing / Computer security

Security Gateway 500NP Series Amaranten SSP™ Security Services Platform firewall • VPN termination • intrusion prevention • anti-virus anti-spam • content filtering • traffic shaping • authentication

Add to Reading List

Source URL: www.amaranten.com

Language: English - Date: 2012-03-31 05:45:33
127Network architecture / Ethernet / Data security / Transmission Control Protocol / Network switch / Internetwork Packet Exchange / Firewall / Network packet / Stateful firewall / Computer network security / Computing / OSI protocols

Sepehr S. T. Co. Ltd GateMAN 4000FL GateMAN 4000FL is a Network Content Monitoring System to record all traffic passing a 100Mbps Ethernet line. It acts as an Ethernet bridge (2-ports switch) in pass-through mode. In th

Add to Reading List

Source URL: www.sepehrs.com

Language: English - Date: 2005-10-29 04:40:48
128Computer network security / Cyberwarfare / Computer networking / Transmission Control Protocol / Firewall / Transport layer / Packet loss / Packet Processing / Communications protocol / Data / Computing / Information

Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks Antonis Papadogiannakis*, Michalis Polychronakis†, Evangelos P. Markatos* * Institute of Computer Science, Foundation for Research and Techn

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:30:49
129Network performance / Digital photography / Digital watermarking / Network architecture / Audio watermark detection / Traffic flow / Watermark / Jitter / Transmission Control Protocol / Watermarking / Computing / Electronics

Tracing Traffic through Intermediate Hosts that Repacketize Flows Young June Pyun∗ , Young Hee Park∗ , Xinyuan Wang† , Douglas S. Reeves∗ and Peng Ning∗ ∗ Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:09
130Cloud storage / Data center / Data management / Distributed data storage / Networks / MapReduce / Network switch / Transmission Control Protocol / Cloud computing / Concurrent computing / Computing / Distributed computing

Network Traffic Characteristics of Data Centers in the Wild Theophilus Benson∗ , Aditya Akella∗ and David A. Maltz† ∗ University of Wisconsin–Madison †

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2010-09-27 15:43:07
UPDATE