<--- Back to Details
First PageDocument Content
Internet protocols / Internet / Network Address Translation / Network protocols / UDP hole punching / TCP hole punching / NAT traversal / STUN / Hole punching / Computer network security / Network architecture / Computing
Date: 2005-03-31 18:02:48
Internet protocols
Internet
Network Address Translation
Network protocols
UDP hole punching
TCP hole punching
NAT traversal
STUN
Hole punching
Computer network security
Network architecture
Computing

Peer-to-Peer Communication Across Network Address Translators Bryan Ford Massachusetts Institute of Technology

Add to Reading List

Source URL: pdos.csail.mit.edu

Download Document from Source Website

File Size: 880,76 KB

Share Document on Facebook

Similar Documents

Symmetric NAT に対する UDP Multi Hole Punching の技法 A New Method for Symmetric NAT Traversal with UDP Multi Hole Punching 1G03R033-9 Yuan Wei  魏

Symmetric NAT に対する UDP Multi Hole Punching の技法 A New Method for Symmetric NAT Traversal with UDP Multi Hole Punching 1G03R033-9 Yuan Wei 魏

DocID: 1k34N - View Document

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea  Abstract. Transmission control protocol (TCP) has been the dominating protocol

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

DocID: 13F4r - View Document

figs/timeout_with_ping.eps

figs/timeout_with_ping.eps

DocID: YAZn - View Document

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea  Abstract. Transmission control protocol (TCP) has been the dominating protocol

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

DocID: QaPH - View Document

Secure Networking with NAT Traversal for Enhanced Mobility.

Secure Networking with NAT Traversal for Enhanced Mobility.

DocID: NJuk - View Document