Packet loss

Results: 622



#Item
311Internet standards / Routing protocols / Internet protocols / Border Gateway Protocol / Routing / Router / Packet loss / IP hijacking / Internet / Network architecture / Computing

Eliminating Packet Loss Caused by BGP Convergence Nate Kushman rfePohgiH ecnarm

Add to Reading List

Source URL: www.nanog.org

Language: English - Date: 2008-07-25 09:04:29
312Network architecture / Computing / Data / Explicit Congestion Notification / Transmission Control Protocol / TCP congestion avoidance algorithm / Packet loss / Congestion window / Fast retransmit / Network performance / Flow control / TCP/IP

ECN Implementations in the NS Simulator Sally Floyd and Kevin Fall Lawrence Berkeley National Laboratory One Cyclotron Road, Berkeley, CA[removed]removed], [removed] December 30, 1998

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 1998-12-30 23:32:47
313Data / Explicit Congestion Notification / Network congestion / TCP global synchronization / Transmission Control Protocol / Packet loss / Random early detection / Throughput / Sliding window protocol / Network performance / Computing / Network architecture

IEEE/ACM TRANSACTIONS ON NETWORKlNG, VOL. 6, NO. 4, AUGUST[removed]Explicit Allocation of Best-Effort Packet Delivery Service David D. Clark, Fellow, IEEE, and Wenjia Fang

Add to Reading List

Source URL: nms.lcs.mit.edu

Language: English - Date: 2002-09-03 07:12:04
314Network architecture / Active queue management / Network congestion / Throughput / Queuing delay / Packet loss / Explicit Congestion Notification / Robust random early detection / Leaky bucket / Network performance / Management / Computing

Adaptive RED: An Algorithm for Increasing the Robustness of RED’s Active Queue Management Sally Floyd, Ramakrishna Gummadi, and Scott Shenker AT&T Center for Internet Research at ICSI August 1, 2001, under submission

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-08-01 17:31:39
315Computer network security / Time to live / Overt channel / Firewall / Channel / Packet loss / Data transmission / Cyberwarfare / Computing / Covert channel / Steganography

An Empirical Evaluation of IP Time To Live Covert Channels Sebastian Zander, Grenville Armitage, Philip Branch {szander,garmitage,pbranch}@swin.edu.au http://caia.swin.edu.au/cv/pbranch

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2010-09-09 01:11:41
316Data / TCP congestion avoidance algorithm / Network congestion / Transmission Control Protocol / Packet loss / Throughput / TCP tuning / Fast retransmit / Slow-start / Network performance / Computing / Network architecture

The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc. Abstract Packet reordering in the Internet is a well-known phenomenon. As the delay and

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-10-11 11:53:45
317Network performance / Internet protocols / Internet standards / Akamai Technologies / Content delivery network / TCP/IP / Packet loss / Network congestion / Throughput / Computing / Network architecture / Internet

White Paper Improving Online Video Quality and Accelerating Downloads The FastTCP Network Enhancement

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-01-08 08:32:01
318System software / Round-trip delay time / Packet loss / Measuring network throughput / TCP congestion avoidance algorithm / Ping / OWD / Network address translation / Traffic flow / Computing / Network architecture / Network performance

Minimally-Intrusive Frequent Round Trip Time Measurements Using Synthetic Packet-Pairs – Extended Report∗ Sebastian Zander, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 130730A Swin

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2013-07-29 07:03:47
319Computer security / Packet capture / Network security / Denial-of-service attack / Firewall / Splunk / Threat / Intrusion prevention system / Pcap / Computer network security / Cyberwarfare / Computing

WHITEPAPER Prepare for the Inevitable: Managing the Risk of Data Loss and Unplanned Downtime from a Successful Security Breach

Add to Reading List

Source URL: www.emulex.com

Language: English
320Computer network security / Jitter / Synchronization / Network processor / Packet loss / Transmission Control Protocol / Geode / Firewall / Packet Processing / Computing / Electronics / Electronic engineering

Networked Embedded Systems: a Quantitative Performance Comparison Alessio Botta,Walter de Donato, Antonio Pescap`e, and Giorgio Ventre University of Napoli “Federico II” (Italy) {a.botta,walter.dedonato,pescape,giorg

Add to Reading List

Source URL: wpage.unina.it

Language: English - Date: 2012-02-09 16:21:39
UPDATE