<--- Back to Details
First PageDocument Content
Computer architecture / UDP hole punching / Network address translation / STUN / Firewall / Reverse connection / Hole punching / Port forwarding / IP address / Computer network security / Network architecture / Computing
Date: 2011-04-15 05:29:52
Computer architecture
UDP hole punching
Network address translation
STUN
Firewall
Reverse connection
Hole punching
Port forwarding
IP address
Computer network security
Network architecture
Computing

figs/timeout_with_ping.eps

Add to Reading List

Source URL: pds.twi.tudelft.nl

Download Document from Source Website

File Size: 124,27 KB

Share Document on Facebook

Similar Documents

Symmetric NAT に対する UDP Multi Hole Punching の技法 A New Method for Symmetric NAT Traversal with UDP Multi Hole Punching 1G03R033-9 Yuan Wei 魏

DocID: 1k34N - View Document

Data / User Datagram Protocol / Transmission Control Protocol / Transport layer / Network congestion / Traffic flow / Port / UDP Lite / UDP hole punching / Internet protocols / Computing / Network architecture

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

DocID: 13F4r - View Document

Computer architecture / UDP hole punching / Network address translation / STUN / Firewall / Reverse connection / Hole punching / Port forwarding / IP address / Computer network security / Network architecture / Computing

figs/timeout_with_ping.eps

DocID: YAZn - View Document

Internet / User Datagram Protocol / Transport layer / Traffic flow / Transmission Control Protocol / Network congestion / Port / UDP Lite / UDP hole punching / Internet protocols / Network architecture / Computing

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

DocID: QaPH - View Document

Computer network security / Internet protocols / Internet standards / Tunneling protocols / Network protocols / Network address translation / UDP hole punching / Port / IPsec / Network architecture / Computing / Internet

Secure Networking with NAT Traversal for Enhanced Mobility.

DocID: NJuk - View Document