71 relations: Accounting software, Application layer, Bit, Bootstrapping, Byte, Checksum, Client (computing), Communication channel, Computer network, Connectionless communication, Database, Datagram, David P. Reed, Domain Name System, Dynamic Host Configuration Protocol, Email, Encapsulation (networking), Ephemeral port, Handshaking, Internet Assigned Numbers Authority, Internet Protocol, Internet protocol suite, IP address, IP tunnel, IPTV, IPv4, IPv6, Jumbogram, List of IP protocol numbers, List of TCP and UDP port numbers, Micro Transport Protocol, Multicast, Multiplexing, Network congestion, Network File System, Network socket, Network Time Protocol, Octet (computing), Ones' complement, Online game, OpenVPN, Operating system, Point of sale, Port (computer networking), Protocol stack, Quality of service, Real Time Streaming Protocol, Real-time computing, Registered port, Reliability (computer networking), ..., Reliable Data Protocol, Reliable User Datagram Protocol, Remote procedure call, Retransmission (data networks), Routing Information Protocol, Server (computing), Service discovery, Simple Network Management Protocol, Stream Control Transmission Protocol, Streaming media, Superuser, Transmission Control Protocol, Transport layer, Trivial File Transfer Protocol, UDP flood attack, UDP Helper Address, UDP-based Data Transfer Protocol, UDP-Lite, Unix, Virtual private network, Voice over IP. Expand index (21 more) » « Shrink index
Accounting software describes a type of application software that records and processes accounting transactions within functional modules such as accounts payable, accounts receivable,journal, general ledger, payroll, and trial balance.
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.
The bit (a portmanteau of binary digit) is a basic unit of information used in computing and digital communications.
In general, bootstrapping usually refers to a self-starting process that is supposed to proceed without external input.
The byte is a unit of digital information that most commonly consists of eight bits, representing a binary number.
A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.
A client is a piece of computer hardware or software that accesses a service made available by a server.
A communication channel or simply channel refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networking.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
Connectionless communication, often referred to as CL-mode communication,Information Processing Systems - Open Systems Interconnection, "Transport Service Definition - Addendum 1: Connectionless-mode Transmission", International Organization for Standardization, International Standard 8072/AD 1, December 1986.
A database is an organized collection of data, stored and accessed electronically.
A datagram is a basic transfer unit associated with a packet-switched network.
David Patrick Reed (born January 31, 1952) is an American computer scientist, educated at the Massachusetts Institute of Technology, known for a number of significant contributions to computer networking and wireless communications networks.
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.
In computer networking, encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects.
An ephemeral port is a short-lived transport protocol port for Internet Protocol (IP) communications.
In telecommunications, a handshake is an automated process of negotiation between two communicating participants (example "Alice and Bob") through the exchange of information that establishes the protocols of a communication link at the start of the communication, before full communication begins.
The Internet Assigned Numbers Authority (IANA) is a function of ICANN, a nonprofit private American corporation that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS), media types, and other Internet Protocol-related symbols and Internet numbers.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
An IP tunnel is an Internet Protocol (IP) network communications channel between two networks.
Internet Protocol television (IPTV) is the delivery of television content over Internet Protocol (IP) networks.
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP).
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.
In packet-switched computer networks, a jumbogram (portmanteau of jumbo and datagram) is an Internet layer packet exceeding the standard maximum transmission unit (MTU) of the underlying network technology.
Below are the Assigned Internet Protocol Numbers found in the Protocol field of the IPv4 header and the Next Header field of the IPv6 header.
This is a list of TCP and UDP port numbers used by protocols of the application layer of the Internet protocol suite for the establishment of host-to-host connectivity.
Micro Transport Protocol or µTP (sometimes also uTP) is an open UDP-based variant of the BitTorrent peer-to-peer file sharing protocol intended to mitigate poor latency and other congestion control issues found in conventional BitTorrent over TCP, while providing reliable, ordered delivery.
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously.
In telecommunications and computer networks, multiplexing (sometimes contracted to muxing) is a method by which multiple analog or digital signals are combined into one signal over a shared medium.
Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node or link is carrying more data than it can handle.
Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a computer network much like local storage is accessed.
A network socket is an internal endpoint for sending or receiving data within a node on a computer network.
Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.
The octet is a unit of digital information in computing and telecommunications that consists of eight bits.
The ones' complement of a binary number is defined as the value obtained by inverting all the bits in the binary representation of the number (swapping 0s for 1s and vice versa).
An online game is a video game that is either partially or primarily played through the Internet or any other computer network available.
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
The point of sale (POS) or point of purchase (POP) is the time and place where a retail transaction is completed.
In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.
The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family.
Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network.
The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.
In computer science, real-time computing (RTC), or reactive computing describes hardware and software systems subject to a "real-time constraint", for example from event to system response.
A registered port is a network port (a sub-address defined within the Internet Protocol, in the range 1024–49151) assigned by the Internet Assigned Numbers Authority (IANA) (or by Internet Corporation for Assigned Names and Numbers (ICANN) before March 21, 2001, or by USC/ISI before 1998) for use with a certain protocol or application.
In computer networking, a reliable protocol provides notifications to the sender as to the delivery of transmitted data, as opposed to an unreliable protocol, which does not provide assurance of the delivery of data to the intended recipient(s).
The Reliable Data Protocol (RDP) is a network transport protocol defined in RFC 908 and was updated in RFC 1151.
In computer networking, the Reliable User Datagram Protocol (RUDP) is a transport layer protocol designed at Bell Labs for the Plan 9 operating system.
In distributed computing, a remote procedure call (RPC) is when a computer program causes a procedure (subroutine) to execute in a different address space (commonly on another computer on a shared network), which is coded as if it were a normal (local) procedure call, without the programmer explicitly coding the details for the remote interaction.
Retransmission, essentially identical with Automatic repeat request (ARQ), is the resending of packets which have been either damaged or lost.
The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric.
In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".
Service discovery is the automatic detection of devices and services offered by these devices on a computer network.
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol which operates at the transport layer and serves a role similar to the popular protocols TCP and UDP.
Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a provider.
In computing, the superuser is a special user account used for system administration.
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.
In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the OSI model.
Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.
A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol.
A UDP Helper Address is a special router configuration used to forward broadcast network traffic from a client machine on one subnet to a server in another subnet.
UDP-based Data Transfer Protocol (UDT), is a high-performance data transfer protocol designed for transferring large volumetric datasets over high-speed wide area networks.
UDP-Lite (Lightweight User Datagram Protocol, sometimes UDP Lite) is a connectionless protocol that allows a potentially damaged data payload to be delivered to an application rather than being discarded by the receiving station.
Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.