90 relations: AppleTalk, Asynchronous circuit, Asynchronous transfer mode, ATM Adaptation Layer 5, Authentication, Challenge-Handshake Authentication Protocol, Checksum, Communication protocol, Computer network, Cyclic redundancy check, Data compression, Data link layer, Datagram, DECnet, Dial-up Internet access, Diameter (protocol), Digital subscriber line, Domain Name System, Duplex (telecommunications), Encryption, Ethernet, EtherType, Extensible Authentication Protocol, Fiber-optic communication, File Transfer Protocol, Frame check sequence, Generic Routing Encapsulation, Hayes command set, High-Level Data Link Control, Hypertext Transfer Protocol, IEEE 802.1aq, Internet, Internet Protocol, Internet Protocol Control Protocol, Internet protocol suite, Internet service provider, Internetwork Packet Exchange, IPsec, IPv4, IPv6, IPX/SPX, LAPB, Layer 2 Tunneling Protocol, Link Access Procedure for Modems, Link aggregation, Link Control Protocol, Linux, Magic number (programming), Maximum transmission unit, Microsoft Point-to-Point Compression, ..., Microsoft Point-to-Point Encryption, Mobile phone, Modem, MPEG transport stream, Multiprotocol Encapsulation, NetBIOS, NetBIOS Frames protocol, Network address, Network interface, Network layer, Node (networking), Octet (computing), Packet over SONET/SDH, Password Authentication Protocol, Pearson Education, Physical layer, Point-to-Point Protocol daemon, Point-to-Point Protocol over ATM, Point-to-Point Protocol over Ethernet, Point-to-Point Tunneling Protocol, PPPoX, Protocol stack, RADIUS, RS-232, Secure Shell, Serial cable, Serial communication, Serial Line Internet Protocol, Simple Mail Transfer Protocol, Synchronous circuit, Synchronous optical networking, Telephone line, Transmission Control Protocol, Transport Layer Security, TRILL (computing), Tunneling protocol, Unidirectional Lightweight Encapsulation, User Datagram Protocol, W. Richard Stevens, X.25. Expand index (40 more) » « Shrink index
AppleTalk was a proprietary suite of networking protocols developed by Apple Inc. for their Macintosh computers.
An asynchronous circuit, or self-timed circuit, is a sequential digital logic circuit which is not governed by a clock circuit or global clock signal.
Asynchronous transfer mode (ATM) is, according to the ATM Forum, "a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals".
ATM Adaptation Layer 5 (AAL5) is an ATM adaptation layer used to send variable-length packets up to 65,535 octets in size across an Asynchronous Transfer Mode (ATM) network.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity.
A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.
In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.
In signal processing, data compression, source coding, or bit-rate reduction involves encoding information using fewer bits than the original representation.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking.
A datagram is a basic transfer unit associated with a packet-switched network.
DECnet is a suite of network protocols created by Digital Equipment Corporation.
Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line.
Diameter is an authentication, authorization, and accounting protocol for computer networks.
Digital subscriber line (DSL; originally digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
A duplex communication system is a point-to-point system composed of two or more connected parties or devices that can communicate with one another in both directions.
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
EtherType is a two-octet field in an Ethernet frame.
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.
Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.
A frame check sequence (FCS) refers to the extra error-detecting code added to a frame in a communications protocol.
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.
The Hayes command set is a specific command language originally developed by Dennis Hayes for the Hayes Smartmodem 300 baud modem in 1981.
High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO).
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.
Shortest Path Bridging (SPB), specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
In computer networking, Internet Protocol Control Protocol (IPCP) is a Network Control Protocol (NCP) for establishing and configuring Internet Protocol over a Point-to-Point Protocol link.
The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet.
Internetwork Packet Exchange (IPX) is the network layer protocol in the IPX/SPX protocol suite.
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP).
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.
IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange.
Link Access Procedure, Balanced (LAPB) implements the data link layer as defined in the X.25 protocol suite.
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.
Link Access Procedure for Modems (LAPM) is part of the V.42 error correction protocol for modems.
In computer networking, the term link aggregation applies to various methods of combining (aggregating) multiple network connections in parallel in order to increase throughput beyond what a single connection could sustain, and to provide redundancy in case one of the links should fail.
In computer networking, the Link Control Protocol (LCP) forms part of the Point-to-Point Protocol (PPP), within the family of Internet protocols.
Linux is a family of free and open-source software operating systems built around the Linux kernel.
In computer programming, the term magic number has multiple meanings.
In computer networking, the maximum transmission unit (MTU) is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction.
Microsoft Point-to-Point Compression (MPPC; described in RFC 2118) is a streaming data compression algorithm based on an implementation of Lempel–Ziv using a sliding window buffer.
Microsoft Point-to-Point Encryption (MPPE) encrypts data in Point-to-Point Protocol (PPP)-based dial-up connections or Point-to-Point Tunneling Protocol (PPTP) virtual private network (VPN) connections.
A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.
A modem (modulator–demodulator) is a network hardware device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information.
MPEG transport stream (transport stream, MPEG-TS, MTS or TS) is a standard digital container format for transmission and storage of audio, video, and Program and System Information Protocol (PSIP) data.
Multiprotocol Encapsulation, or MPE for short, is a Data link layer protocol defined by DVB which has been published as part of ETSI EN 301 192.
NetBIOS is an acronym for Network Basic Input/Output System.
NetBIOS Frames or NBF protocol is a non-routable network- and transport-level data protocol most commonly used as one of the layers of Microsoft Windows networking in the 1990s.
A network address is an identifier for a node or host on a telecommunications network.
In computing, a network interface is a system's (software and/or hardware) interface between two pieces of equipment or protocol layers in a computer network.
In the seven-layer OSI model of computer networking, the network layer is layer 3.
In telecommunications networks, a node (Latin nodus, ‘knot’) is either a redistribution point or a communication endpoint.
The octet is a unit of digital information in computing and telecommunications that consists of eight bits.
Packet over SONET/SDH, abbreviated POS, is a communications protocol for transmitting packets in the form of the Point to Point Protocol (PPP) over SDH or SONET, which are both standard protocols for communicating digital information using lasers or light emitting diodes (LEDs) over optical fibre at high line rates.
Password Authentication Protocol (PAP) is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users.
Pearson Education (see also Pearson PLC) is a British-owned education publishing and assessment service to schools and corporations, as well as directly to students.
In the seven-layer OSI model of computer networking, the physical layer or layer 1 is the first and lowest layer.
PPPD is the Point-to-Point Protocol daemon which is used to manage network connections between two nodes on Unix-like operating systems.
In computer networking, the Point-to-Point Protocol over ATM (PPPoA) is a layer 2 data-link protocol typically used to connect domestic broadband modems to ISPs via phone lines.
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames.
The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues.
PPPoX (PPP over X) designates a family of encapsulating communications protocols implementing Point-to-Point Protocol.
The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family.
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.
In telecommunications, RS-232, Recommended Standard 232 is a standard introduced in 1960 for serial communication transmission of data.
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
A serial cable is a cable used to transfer information between two devices using a serial communication protocol.
In telecommunication and data transmission, serial communication is the process of sending data one bit at a time, sequentially, over a communication channel or computer bus.
The Serial Line Internet Protocol (also SLIP) is an encapsulation of the Internet Protocol designed to work over serial ports and router connections.
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.
A synchronous circuit is a digital circuit in which the changes in the state of memory elements are synchronized by a clock signal.
Synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) are standardized protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs).
A telephone line or telephone circuit (or just line or circuit within the industry) is a single-user circuit on a telephone communication system.
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.
Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.
TRILL ("TRansparent Interconnection of Lots of Links") is an IETF Standard implemented by devices called RBridges (routing bridges) or TRILL Switches.
In computer networks, a tunneling protocol is a communications protocol that allows for the secure movement of data from one network to another.
The Unidirectional Lightweight Encapsulation (ULE) is a Data link layer protocol for the transportation of network layer packets over MPEG transport streams.
In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite.
William Richard (Rich) Stevens (February 5, 1951September 1, 1999) was a Northern Rhodesia-born American author of computer science books, in particular books on UNIX and TCP/IP.
X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication.
Compression Control Protocol, MLPPP, Multilink PPP, Multilink Protocol, P2PP, PPP connection, PPPOI, Point To Point Protocol, Point to Point Protocol, Point to point protocol, Point-to-point protocol, Pppoi.