6th Asia-Pacific Symposium on Information and Telecommunication Technologies 2005
DOI: 10.1109/apsitt.2005.203686
|View full text |Cite
|
Sign up to set email alerts
|

A secure and easy remote access technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…In particular, an underlay network may enforce a traffic control policy that is not desirable for overlay networks, for example, when a P2P file sharing program generates an elephant flow [17], the flow is restricted within the underlay network. The typical applications that fall into this category are CDN, Internet VPN, GRID and softether [18], [19], the file search of P2P file sharing, and the data transfer of Freenet-type P2P file sharing [20]. (3) Processing on overlay node Only some overlay network applications process relayed data.…”
Section: Characteristics and Categories Of Overlay Networkmentioning
confidence: 99%
“…In particular, an underlay network may enforce a traffic control policy that is not desirable for overlay networks, for example, when a P2P file sharing program generates an elephant flow [17], the flow is restricted within the underlay network. The typical applications that fall into this category are CDN, Internet VPN, GRID and softether [18], [19], the file search of P2P file sharing, and the data transfer of Freenet-type P2P file sharing [20]. (3) Processing on overlay node Only some overlay network applications process relayed data.…”
Section: Characteristics and Categories Of Overlay Networkmentioning
confidence: 99%