STUN

Results: 111



#Item
101Network Address Translation / IPv6 / NAT64 / Carrier-grade NAT / STUN / Traversal Using Relays around NAT / Private network / Application-level gateway / IPv6 transition mechanisms / Network architecture / Internet Protocol / Internet

NAT Tutorial Dan Wing, [removed] IETF78, Maastricht

Add to Reading List

Source URL: www6.ietf.org

Language: English - Date: 2010-09-14 15:19:28
102Internet protocols / Internet / Network Address Translation / Network protocols / UDP hole punching / TCP hole punching / NAT traversal / STUN / Hole punching / Computer network security / Network architecture / Computing

Peer-to-Peer Communication Across Network Address Translators Bryan Ford Massachusetts Institute of Technology

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2005-03-31 18:02:48
103Skype / Videotelephony / Internet protocols / Computer network security / Skype protocol / Network Address Translation / Transmission Control Protocol / User Datagram Protocol / STUN / Computing / Software / Voice over IP

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2005-05-09 00:13:12
104Computer network security / Network protocols / Electronics / Videotelephony / Internet protocols / NAT traversal / Interactive Connectivity Establishment / Traversal Using Relays around NAT / STUN / Computing / Network architecture / Network Address Translation

NAT Traversal for VoIP and Internet Communications using STUN, TURN and ICE

Add to Reading List

Source URL: www.voiptraversal.com

Language: English - Date: 2012-03-12 17:55:07
105Technology / Firearms unit / Excited delirium / Taser safety issues / Electroshock weapon / Law enforcement / Non-lethal weapons / Taser

Electrical stun weapons - opinion

Add to Reading List

Source URL: www.bradford.ac.uk

Language: English - Date: 2006-01-17 06:46:22
106Videotelephony / Network Address Translation / VoIP phone / STUN / Session Initiation Protocol / Proxy server / KPhone / Traversal Using Relays around NAT / Comparison of VoIP software / Voice over IP / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.linux-magazine.com

Language: English - Date: 2006-06-23 13:22:15
107Network Address Translation / Network protocols / Internet / Internet protocols / Tunneling protocols / NAT traversal / UDP hole punching / STUN / Traversal Using Relays around NAT / Network architecture / Computing / Computer network security

PDF Document

Add to Reading List

Source URL: www.goto.info.waseda.ac.jp

Language: English - Date: 2008-10-16 08:26:40
108Internet protocols / Internet / Network Address Translation / Network protocols / UDP hole punching / TCP hole punching / NAT traversal / STUN / Hole punching / Computer network security / Network architecture / Computing

PDF Document

Add to Reading List

Source URL: www.brynosaurus.com

Language: English - Date: 2010-09-29 09:18:52
109Skype / Videotelephony / Internet protocols / Computer network security / Skype protocol / Network Address Translation / Transmission Control Protocol / User Datagram Protocol / STUN / Computing / Software / Voice over IP

PDF Document

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2004-12-04 22:37:01
110Skype / Videotelephony / Internet protocols / Computer network security / Skype protocol / Network Address Translation / Transmission Control Protocol / User Datagram Protocol / STUN / Computing / Software / Voice over IP

PDF Document

Add to Reading List

Source URL: www1.cs.columbia.edu

Language: English - Date: 2004-12-04 22:37:01
UPDATE