Network traffic control

Results: 798



#Item
231Network architecture / Network performance / Streaming / Delay-tolerant networking / Fair queuing / Traffic flow / Transmission Control Protocol / Bufferbloat / Queuing delay / Computing / Network protocols / Computer architecture

Effective Buffer and Storage Management in DTN Nodes Stylianos Dimitriou, and Vassilis Tsaoussidis Dept. of Electrical and Computer Engineering Democritus University of Thrace Xanthi, Greece

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2010-04-26 14:46:58
232WAN optimization / System software / Anti-spam / Content filtering / Spam filtering / Traffic shaping / Security appliance / Management / Proxy server / Network performance / Computing / Server appliance

Hospitality Visibility. Security. Control. HOW CONTENTWATCH CAN HELP YOU The CP Security Appliance FEATURES: VISIBILITY

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 14:31:26
233Server appliance / Computer security / System software / Deep packet inspection / Security appliance / Traffic shaping / Firewall / Content filtering / Content-control software / Computing / Computer network security / Network performance

content_protect_secapp_logo

Add to Reading List

Source URL: www.netnanny.com

Language: English - Date: 2013-07-02 15:01:09
234Information / Computer networking / Network socket / Transmission Control Protocol / Internet protocol suite / Traffic flow / STREAMS / Communications protocol / Winsock / Computing / Inter-process communication / Data

Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and Sockets Anonymous Paper 190

Add to Reading List

Source URL: www.lochan.org

Language: English - Date: 2005-03-28 17:16:12
235Computing / OSI protocols / Traffic flow / Goodput / Slow-start / Network architecture / Flow control / TCP congestion avoidance algorithm / Network performance / TCP/IP / Transmission Control Protocol

On the Properties of an Adaptive TCP Minimum RTO Ioannis Psaras ∗, Vassilis Tsaoussidis Democritus University of Thrace Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2010-04-26 14:42:46
236Computing / OSI protocols / Goodput / Fast retransmit / Traffic flow / Network architecture / Flow control / TCP congestion avoidance algorithm / Network performance / Transmission Control Protocol / TCP/IP

The TCP Minimum RTO Revisited Ioannis Psaras and Vassilis Tsaoussidis Dept. of Electrical and Computer Engineering Demokritos University of Thrace, Xanthi, Greece {ipsaras,vtsaousi}@ee.duth.gr http://comnet.ee.duth.gr

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2010-04-26 14:44:36
237Internet privacy / Server appliance / Proxy servers / Internet / New media / Scientific revolution / Security appliance / Tor / Network traffic measurement / Computing / System software / Software

Legal Services Visibility. Security. Control. The CP Security Appliance FEATURES: VISIBILITY • Complete Traffic Visibility™

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 14:30:36
238Air traffic control / Security / Civil Aviation Authority of the Fiji Islands / Airport security / Transport / Airport / Aviation

NB: Unofficial translation, legally binding only in Finnish and Swedish Finnish Transport Safety Agency Act on the Airport Network and Airport Charges; amendments up toincluded)

Add to Reading List

Source URL: finlex.fi

Language: English
239Security appliance / Internet / Technology / Proxy server / Network traffic measurement / Server appliance / Computing / Digital media

Education Visibility. Security. Control. The CP Security Appliance FEATURES: VISIBILITY • Complete Traffic Visibility™

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 14:28:34
240Noise / Internet / Traffic flow / Transmission Control Protocol / Computer network security / User Datagram Protocol / TCP reset attack / UDP Lite / Computing / Network architecture / Internet background noise

One-way Traffic Monitoring with iatmon Nevil Brownlee CAIDA, UC San Diego, and The University of Auckland, New Zealand,

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-07 19:25:44
UPDATE