Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. TCP hole punching - Wikipedia

    en.wikipedia.org/wiki/TCP_hole_punching

    TCP hole punching. TCP NAT traversal and TCP hole punching (sometimes NAT punch-through) in computer networking occurs when two hosts behind a network address translation (NAT) are trying to connect to each other with outbound TCP connections. Such a scenario is particularly important in the case of peer-to-peer communications, such as Voice ...

  3. Traffic shaping - Wikipedia

    en.wikipedia.org/wiki/Traffic_shaping

    Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired traffic profile. [1] [2] Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds.

  4. Port Control Protocol - Wikipedia

    en.wikipedia.org/wiki/Port_Control_Protocol

    Port Control Protocol ( PCP) is a computer networking protocol that allows hosts on IPv4 or IPv6 networks to control how the incoming IPv4 or IPv6 packets are translated and forwarded by an upstream router that performs network address translation (NAT) or packet filtering. By allowing hosts to create explicit port forwarding rules, handling of ...

  5. NAT traversal - Wikipedia

    en.wikipedia.org/wiki/NAT_traversal

    NAT traversal. Network address translation traversal is a computer networking technique of establishing and maintaining Internet Protocol connections across gateways that implement network address translation (NAT). NAT traversal techniques are required for many network applications, such as peer-to-peer file sharing and voice over IP. [1]

  6. Private VLAN - Wikipedia

    en.wikipedia.org/wiki/Private_VLAN

    Private VLAN. Private VLAN, also known as port isolation, is a technique in computer networking where a VLAN contains switch ports that are restricted such that they can only communicate with a given uplink. The restricted ports are called private ports. Each private VLAN typically contains many private ports, and a single uplink.

  7. Peer-to-peer - Wikipedia

    en.wikipedia.org/wiki/Peer-to-peer

    A peer-to-peer (P2P) network in which interconnected nodes ("peers") share resources amongst each other without the use of a centralized administrative system. A network based on the client–server model, where individual clients request services and resources from centralized servers. Peer-to-peer ( P2P) computing or networking is a ...

  8. MikroTik - Wikipedia

    en.wikipedia.org/wiki/MikroTik

    MikroTik (officially SIA "Mikrotīkls") is a Latvian network equipment manufacturing company. MikroTik develops and sells wired and wireless network routers, network switches, access points, as well as operating systems and auxiliary software. The company was founded in 1996, and as of 2022, it was reported that the company employed 351 employees.

  9. Label Distribution Protocol - Wikipedia

    en.wikipedia.org/wiki/Label_Distribution_Protocol

    The Label Distribution Protocol (LDP) is a protocol defined by the IETF (RFC 5036) for the purpose of distributing labels in an MPLS environment. LDP relies on the underlying routing information provided by an IGP in order to forward label packets. The router forwarding information base, or FIB, is responsible for determining the hop-by-hop ...