Traffic shaping

Results: 156



#Item
21Electronics / Energy / Streaming media / Transmission Control Protocol / Traffic shaping / Delay-tolerant networking / IEEE 802.11 / ANT / Interplanetary Internet / Computing / Network performance / Concurrent computing

JOURNAL OF INTERNET ENGINEERING, VOL. 5, NO. 1, JUNEEnergy-efficient internetworking with DTN Dimitris Vardalis1 and Vassilis Tsaoussidis2

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2013-04-17 11:49:06
22Comcast / Latency / Internet service provider / Technology / Engineering / Electronics / Broadband / Network performance / Traffic shaping

Residential Broadband Networks: Characteristics and Implications Marcel Dischinger, Andreas Haeberlen, Krishna P. Gummadi, and Stefan Saroiu† Max-Planck-Institute for Software Systems, †University of Toronto 1. Moti

Add to Reading List

Source URL: broadband.mpi-sws.org

Language: English - Date: 2007-11-15 11:53:17
23Streaming / Computer network security / Network architecture / Electronic engineering / Deep packet inspection / Policy charging and rules function / Traffic shaping / Quality of service / Traffic flow / Computing / Telecommunications engineering / Network performance

Application Note Intel® Architecture Processors Qosmos* DPI Technology Policy Enforcement in SDN and NFV- based Telco Infrastructure

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:29
24Voice over IP / Videotelephony / Computer network security / Internet privacy / Broadband / Skype protocol / Deep packet inspection / Tor / Traffic shaping / Software / Computing / Skype

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-08-25 10:47:50
25Network architecture / Network congestion / Differentiated services / Router / Rate limiting / Denial-of-service attack / Traffic shaping / Random early detection / IP traceback / Network performance / Computing / Internet

Implementing Pushback: Router-Based Defense Against DDoS Attacks John Ioannidis AT&T Labs Research Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:30:53
26Traffic shaping / Router / Internet / Asynchronous Transfer Mode / Teletraffic / Streaming / Network performance / Computing / Network architecture

“Zero Shell” Implementation Scenarios JuneBy the time that this document was written, the latest ZS version was 1.0.14b In this Document you may find some of the Implemented but not thoroughly tested Scenario

Add to Reading List

Source URL: www.artfiles.org

Language: English - Date: 2011-12-28 16:46:15
27Data / Network congestion / Throughput / Transmission Control Protocol / Transport layer / Packet loss / Traffic shaping / Traffic flow / Measuring network throughput / Network performance / Computing / Network architecture

1 Aggregate Congestion Control for Distributed Multimedia Applications David E. Ott, Travis Sparks, and Ketan Mayer-Patel Department of Computer Science

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2004-11-23 15:51:27
28Network performance / ARPANET / Networking hardware / Pluribus / Content delivery network / Network switch / Denial-of-service attack / Ethernet / Traffic shaping / Computing / Concurrent computing / Distributed computing

Pluribus_Logo_transparent_CMYK

Add to Reading List

Source URL: www.pluribusnetworks.com

Language: English - Date: 2014-12-03 06:37:57
29Internet protocols / Data / Xpress Transport Protocol / Transmission Control Protocol / Transport layer / Slow-start / Goodput / Bandwidth-delay product / Traffic shaping / Network performance / Computing / Network architecture

On the Performance of Transport Protocols Over ATM Networks  M. Ajmone Marsan, A. Bianco, R. Lo Cigno, M. Munaf`o Dipartimento di Elettronica — Politecnico di Torino

Add to Reading List

Source URL: netgroup.polito.it

Language: English - Date: 2007-11-05 06:22:54
30Cyberwarfare / Virtual private network / Kerio Control / Cisco PIX / Computer network security / Computing / Computer security

Security Gateway F500 Series Amaranten SSP™ Security Services Platform firewall • VPN termination • intrusion prevention • anti-virus anti-spam • content filtering • traffic shaping • authentication

Add to Reading List

Source URL: www.amaranten.com

Language: English - Date: 2012-03-31 05:45:29
UPDATE