UDP hole punching

Results: 9



#Item
1

Symmetric NAT に対する UDP Multi Hole Punching の技法 A New Method for Symmetric NAT Traversal with UDP Multi Hole Punching 1G03R033-9 Yuan Wei 魏

Add to Reading List

Source URL: www.goto.info.waseda.ac.jp

Language: Japanese - Date: 2007-04-29 01:15:57
    2Data / User Datagram Protocol / Transmission Control Protocol / Transport layer / Network congestion / Traffic flow / Port / UDP Lite / UDP hole punching / Internet protocols / Computing / Network architecture

    Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

    Add to Reading List

    Source URL: an.kaist.ac.kr

    Language: English - Date: 2012-03-19 08:45:11
    3Computer architecture / UDP hole punching / Network address translation / STUN / Firewall / Reverse connection / Hole punching / Port forwarding / IP address / Computer network security / Network architecture / Computing

    figs/timeout_with_ping.eps

    Add to Reading List

    Source URL: pds.twi.tudelft.nl

    Language: English - Date: 2011-04-15 05:29:52
    4Internet / User Datagram Protocol / Transport layer / Traffic flow / Transmission Control Protocol / Network congestion / Port / UDP Lite / UDP hole punching / Internet protocols / Network architecture / Computing

    Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

    Add to Reading List

    Source URL: an.kaist.ac.kr

    Language: English - Date: 2012-01-03 03:52:20
    5Computer network security / Internet protocols / Internet standards / Tunneling protocols / Network protocols / Network address translation / UDP hole punching / Port / IPsec / Network architecture / Computing / Internet

    Secure Networking with NAT Traversal for Enhanced Mobility.

    Add to Reading List

    Source URL: dl.ifip.org

    Language: English - Date: 2014-08-10 19:38:23
    6Network Address Translation / Network protocols / Internet / Internet protocols / Tunneling protocols / NAT traversal / UDP hole punching / STUN / Traversal Using Relays around NAT / Network architecture / Computing / Computer network security

    A New Method for Symmetric NAT Traversal in UDP and TCP Yuan Wei

    Add to Reading List

    Source URL: zieckey-study-code.googlecode.com

    Language: English - Date: 2011-01-11 22:01:11
    7Internet protocols / Internet / Network Address Translation / Network protocols / UDP hole punching / TCP hole punching / NAT traversal / STUN / Hole punching / Computer network security / Network architecture / Computing

    Peer-to-Peer Communication Across Network Address Translators Bryan Ford Massachusetts Institute of Technology

    Add to Reading List

    Source URL: pdos.csail.mit.edu

    Language: English - Date: 2005-03-31 18:02:48
    8Network Address Translation / Network protocols / Internet / Internet protocols / Tunneling protocols / NAT traversal / UDP hole punching / STUN / Traversal Using Relays around NAT / Network architecture / Computing / Computer network security

    PDF Document

    Add to Reading List

    Source URL: www.goto.info.waseda.ac.jp

    Language: English - Date: 2008-10-16 08:26:40
    9Internet protocols / Internet / Network Address Translation / Network protocols / UDP hole punching / TCP hole punching / NAT traversal / STUN / Hole punching / Computer network security / Network architecture / Computing

    PDF Document

    Add to Reading List

    Source URL: www.brynosaurus.com

    Language: English - Date: 2010-09-29 09:18:52
    UPDATE