TCP hole punching

Results: 10



#Item
1Data / User Datagram Protocol / Transmission Control Protocol / Transport layer / Network congestion / Traffic flow / Port / UDP Lite / UDP hole punching / Internet protocols / Computing / Network architecture

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2012-03-19 08:45:11
2Network architecture / Computing / Transmission Control Protocol / Internet standards / Computer network security / T/TCP / SYN cookies / TCP hole punching / TCP/IP / Internet / Internet protocols

Network Working Group Request for Comments: 1644 Category: Experimental R. Braden ISI

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:14:37
3Computer architecture / STUN / NAT traversal / Transmission Control Protocol / TCP hole punching / Traffic flow / IPv6 transition mechanisms / Ping / Firewall / Computer network security / Computing / Network architecture

Characterization and Measurement of TCP Traversal through NATs and Firewalls ∗ Saikat Guha Paul Francis Cornell University Ithaca, NY 14853

Add to Reading List

Source URL: nutss.gforge.cis.cornell.edu

Language: English - Date: 2005-09-15 16:38:02
4Internet / User Datagram Protocol / Transport layer / Traffic flow / Transmission Control Protocol / Network congestion / Port / UDP Lite / UDP hole punching / Internet protocols / Network architecture / Computing

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2012-01-03 03:52:20
5Network Address Translation / Network protocols / Internet / Internet protocols / Tunneling protocols / NAT traversal / UDP hole punching / STUN / Traversal Using Relays around NAT / Network architecture / Computing / Computer network security

A New Method for Symmetric NAT Traversal in UDP and TCP Yuan Wei

Add to Reading List

Source URL: zieckey-study-code.googlecode.com

Language: English - Date: 2011-01-11 22:01:11
6Network mapping / Traceroute / Ping / Routing / Tor / Internet Control Message Protocol / Network topology / TopBT / TCP hole punching / Computing / Software / Internet

Mapping the Internet Arman Danesh and Ljiljana Trajkovic Simon Fraser University

Add to Reading List

Source URL: www2.ensc.sfu.ca

Language: English - Date: 2001-07-24 01:34:35
7Internet protocols / Internet / Network Address Translation / Network protocols / UDP hole punching / TCP hole punching / NAT traversal / STUN / Hole punching / Computer network security / Network architecture / Computing

Peer-to-Peer Communication Across Network Address Translators Bryan Ford Massachusetts Institute of Technology

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2005-03-31 18:02:48
8Data security / Transmission Control Protocol / Traffic flow / Comcast / Sandvine / Firewall / Idle scan / TCP hole punching / Computer network security / Computing / Cyberwarfare

Detecting Forged TCP Reset Packets Nicholas Weaver ICSI

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2009-02-24 04:40:49
9Data security / Transmission Control Protocol / Traffic flow / Comcast / Sandvine / Firewall / Idle scan / TCP hole punching / Computer network security / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2009-01-06 03:42:41
10Internet protocols / Internet / Network Address Translation / Network protocols / UDP hole punching / TCP hole punching / NAT traversal / STUN / Hole punching / Computer network security / Network architecture / Computing

PDF Document

Add to Reading List

Source URL: www.brynosaurus.com

Language: English - Date: 2010-09-29 09:18:52
UPDATE