Router

Results: 3042



#Item
871Routing / Computer network security / Internet protocols / Deep packet inspection / Stonesoft Corporation / Border Gateway Protocol / Router / Multihoming / Load balancing / Computing / Network architecture / Internet

Whitepaper ISP Redundancy A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2014-01-20 13:04:21
872Internet protocols / Routing protocols / Routing / Internet standards / Border Gateway Protocol / Route reflector / Router / Peering / IP hijacking / Network architecture / Internet / Computing

BGP Feed Configuration Memo Akihiro Nakao Princeton University Larry Peterson Princeton University

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2009-06-12 12:01:19
873Computer network security / Network performance / Data / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Traffic flow / Network congestion / Transmission Control Protocol / Denial-of-service attacks / Computing / Network architecture

A Source Router Approach to DDoS Defense Jelena Mirkovic, Peter Reiher and Gregory Prier Computer Science Department University of California, Los Angeles Abstract

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-10 19:15:44
874Computer networking / Virtual firewall / Hypervisor / Hyper-V / Network virtualization / Xen / Router / VM / Network address translation / System software / Software / Virtual machines

Isolation of Shared Network Resources in XenoServers Andrew Warfield Cambridge University Steve Hand Cambridge University

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2009-06-12 12:01:19
875Routing / Internet protocols / Internet standards / Reverse path forwarding / Router / Forwarding information base / IP multicast / Routing table / Distance Vector Multicast Routing Protocol / Network architecture / Internet / Computing

SAVE: Source Address Validity Enforcement Protocol† Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia Zhang Computer Science Department University of California, Los Angeles AbstractForcing all IP packe

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2002-08-27 17:57:39
876Routing protocols / Internet protocols / Networking hardware / Router / Server appliance / Internet standards / Hot Standby Router Protocol / Netflow / Network architecture / Computing / Internet

Internet-Scale Alias Resolution with MIDAR Ken Keys Young Hyun

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:08
877Routing / Computer networking / Tunneling protocols / Internet standards / Forwarding plane / Router / Forwarding information base / Internet Protocol / Computer network / Network architecture / Internet / Computing

Named Data Networking Lixia Zhang Alexander Afanasyev Jeffrey Burke Van Jacobson

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-07 19:26:24
878Modem / Router / Voice over IP / Electronic engineering / Network architecture / Computing / Logical Link Control

Argus Technologies Argus Technologies WSC Self Help Guide Argus Technologies Solutions Pty Ltd Ph:Building 2, 7 Anzed Court, Mulgrave Victoria, 3170 PO Box 551 Hampton Park 3976

Add to Reading List

Source URL: www.argustechnologies.com.au

Language: English - Date: 2014-12-22 23:03:26
879Network architecture / Ethernet extender / Router / Internet access / Electronic engineering / Computing / Local loop / Ethernet / Broadband

CRITICAL INFORMATION SUMMARY EARLY TERMINATION Information about the service. It covers things like the length of your contract and how much you need to pay each month.

Add to Reading List

Source URL: www.trendcommunications.com.au

Language: English - Date: 2013-09-16 02:23:27
880Networking hardware / Tunneling protocols / Router / Server appliance / Transmission Control Protocol / IPv4 / Netfilter / Point-to-point protocol over Ethernet / IPsec / Network architecture / Computing / Internet

Using fastpath software to boost performance of Linux-based home network routers Dec 04, 2013 By Anton Mikanovich Editor’s Note: Anton Mikanovich of Promwad describes how to use a fast path

Add to Reading List

Source URL: www.promwad.com

Language: English - Date: 2014-01-24 09:01:57
UPDATE