Internet Protocol Control Protocol

Results: 2856



#Item
861Internet protocols / Units of information / Datagram Congestion Control Protocol / Network performance / Flow control / Network congestion / Transmission Control Protocol / Datagram / Network packet / Data / Information / Computing

A Congestion-Controlled Unreliable Datagram API Junwen Lai∗ ∗ Eddie Kohler†

Add to Reading List

Source URL: www.read.cs.ucla.edu

Language: English - Date: 2006-04-03 23:47:15
862Building automation / Industrial Ethernet / Modbus / Industrial automation / Network protocols / CAN in Automation / CANopen / Communications protocol / Internet protocol suite / Technology / Automation / Control engineering

FOR IMMEDIATE RELEASE For further information, contact: Lenore Tracey, +Modbus-IDA and CAN in Automation Announce CiA DSP 309: Interfacing CANopen with TCP/IP Part 2: Modbus/TCP Mapping

Add to Reading List

Source URL: modbus.org

Language: English - Date: 2005-06-22 17:21:29
863Internet protocols / Network performance / Flow control / TCP/IP / Datagram Congestion Control Protocol / Explicit Congestion Notification / Data transmission / Transport layer / Transmission Control Protocol / Computing / Network architecture / Data

Designing DCCP: Congestion Control Without Reliability Eddie Kohler Mark Handley Sally Floyd

Add to Reading List

Source URL: www.read.cs.ucla.edu

Language: English - Date: 2006-04-03 23:47:15
864Data / User Datagram Protocol / Transmission Control Protocol / Transport layer / Network congestion / Traffic flow / Port / UDP Lite / UDP hole punching / Internet protocols / Computing / Network architecture

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2012-03-19 08:45:11
865Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / IP address spoofing / Transmission Control Protocol / Traffic flow / SYN flood / Computer network security / Denial-of-service attacks / Cyberwarfare

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
866Internet protocols / Internet / Computer network security / Virtual private networks / Internet standards / Point-to-Point Tunneling Protocol / Layer 2 Tunneling Protocol / OpenVPN / Internet Protocol Control Protocol / Computing / Tunneling protocols / Network architecture

Npppd: easy vpn with OpenBSD Giovanni Bechis Institute of Biostructures and Bioimaging, Napoli, Italy

Add to Reading List

Source URL: www.snb.it

Language: English - Date: 2013-04-06 13:07:24
867Internet protocol suite / Loopback / Transmission Control Protocol / IP address / Default gateway / Internet protocols / TCP offload engine / Windows Vista networking technologies / Network architecture / Internet / Computing

Keep TCP/IP alive - install a Microsoft TCP/IP Loopback Adaptor © RedTitan Technology 2006 The RedTitan nQ system provides various TCP/IP services for printing files and processing data. Programs can be controlled by co

Add to Reading List

Source URL: www.pclviewer.com

Language: English - Date: 2006-09-04 20:00:00
868Internet / Network management / Computer network security / Tunneling protocols / System administration / Simple Network Management Protocol / TACACS / Port / Access control / Computing / Internet protocols / Network architecture

ComView IPm ComView IPm is an integrated, multi-functional device designed for remote equipment access, control, and alarm monitoring applications ComView IPm integrates a 10-port intelligent console server, a 3-port 10

Add to Reading List

Source URL: www.csstel.com

Language: English - Date: 2014-06-20 16:22:44
869Internet / Computer security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Proxy server / Transmission Control Protocol / IP traceback / Computer network security / Computing / Denial-of-service attacks

1 An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks Vern Paxson AT&T Center for Internet Research at ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-06-26 22:54:56
870Internet governance / Request for Comments / Internet Draft / Uniform resource identifier / Internet Engineering Steering Group / Internet Engineering Task Force / Transmission Control Protocol / Internet Standard / Internet / Internet standards / Computing

RFC Editor Reporting MarchMonthly Summary The following numbers represent the March 2012 statistics for documents moving through the RFC Editor queue. Submitted

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2013-04-23 17:52:41
UPDATE