Data Transmission Network

Results: 1754



#Item
991Information / OSI protocols / Network architecture / Protocol stack / OSI model / Internet protocol suite / Encapsulation / Communications protocol / Transmission Control Protocol / Computing / Data / Network protocols

Introduction to Computer Networks Protocols and Layering (§1.3) David Wetherall ([removed]) Professor of Computer Science & Engineering Networks Need Modularity

Add to Reading List

Source URL: d19vezwu8eufl6.cloudfront.net

Language: English - Date: 2013-01-07 17:16:11
992GÉANT / National research and education network / SURFnet / Renater / PIONIER / Multicast / FUNET / UbuntuNet Alliance for Research and Education Networking / SANReN / Computing / Internet / Data transmission

GÉANT : e-Infrastructure connectivity for the “data deluge” Richard Hughes-Jones, Maria Minaricova & Vincenzo Capone DANTE

Add to Reading List

Source URL: www.biomedbridges.eu

Language: English - Date: 2014-05-15 12:05:55
993Network protocols / Inter-process communication / Flow control / Computer network security / Network performance / Transmission Control Protocol / Server Message Block / TCP congestion avoidance algorithm / NetBIOS / Computing / Data / Network architecture

Microsoft Word - troubleshootingtcpipnetworks-h.doc

Add to Reading List

Source URL: wiresharkbook.com

Language: English - Date: 2014-01-22 15:55:06
994Networking hardware / Ethernet / Transmission Control Protocol / Jumbo frame / Ethernet frame / Communications protocol / Zero-copy / Network packet / Internet Protocol / Computing / Data / Information

To appear in: Proceedings of the 9th International Symposium on High Performance Distributed Computing HPDC, Pittsburgh, Pennsylvania, August 1-4, 2000 Eidgenössische Technische Hochschule Zürich

Add to Reading List

Source URL: www.cs.inf.ethz.ch

Language: English - Date: 2000-05-16 07:56:59
995Load / Transmission Control Protocol / Computing / System software / Network performance / Computer architecture / Load balancing / Network management / Routing

Performance Study of a Packet Load Balancer for High-Speed Data Links prepared for the lecture \Computer System Performance Analysis and Benchmarking" by Prof. Thomas Stricker, Laboratory for Computer Systems, Swiss Inst

Add to Reading List

Source URL: www.cs.inf.ethz.ch

Language: English - Date: 2001-03-22 09:13:03
996Data / Streaming / Computer networking / Packet loss / Low Latency Queuing / Computing / Network architecture / Transmission Control Protocol

Microsoft Word - troubleshootingtcpipnetworks-h.doc

Add to Reading List

Source URL: wiresharkbook.com

Language: English - Date: 2014-01-22 15:54:51
997Internet / Computer security / Data security / TCP/IP / Port scanner / Open port / Firewall / Transmission Control Protocol / User Datagram Protocol / Computer network security / Computing / Internet protocols

IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms Rob VandenBrink June 2009

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:53
998Internet protocols / Information / Internet standards / Computer network security / Malware / HTTP cookie / Transmission Control Protocol / Network packet / Data URI scheme / Computing / Internet / Internet privacy

Command and Control in the Fifth Domain Command Five Pty Ltd February 2012 ABSTRACT This paper presents the findings of an extensive investigation into

Add to Reading List

Source URL: www.commandfive.com

Language: English - Date: 2012-02-09 20:15:40
999Data / Information / Picture Transfer Protocol / PictBridge / Internet protocol suite / Universal Serial Bus / Universal Plug and Play / Communications protocol / Transmission Control Protocol / Network protocols / Digital photography / Computing

Standard of Camera & Imaging Products Association CIPA DCG[removed]Implementation Guidelines for DPS over IP (White paper)

Add to Reading List

Source URL: www.cipa.jp

Language: English - Date: 2012-02-06 21:50:59
1000Computer network security / Internet / Network performance / Proxy server / Data transmission / Proxy list / Internet censorship circumvention / Open proxy / Computer networking / Computing / Internet privacy

Detecting Anonymous Proxy Usage John Brozycki March 2008 GIAC GPEN, GCIH, GSEC, GCIA, GCFW, GCFA, GREM [removed]

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:54
UPDATE