of articles that list different types or classifications of communication protocols used in computer networks. List ofnetwork buses List ofnetwork scientists...
Bitcoin protocol is the set of rules that govern the functioning of Bitcoin. Its key components and principles are: a peer-to-peer decentralized network with...
routing protocol. Routing protocols, according to the OSI routing framework, are layer management protocols for the network layer, regardless of their transport...
Vehicle Area Network (VAN) UAVCAN - a lightweight protocol for in-vehicle communication over CAN or Ethernet ListsofnetworkprotocolsProtocol converter...
Bluetooth uses a variety ofprotocols. Core protocols are defined by the trade organization Bluetooth SIG. Additional protocols have been adopted from other...
This article lists communication protocols that are designed for file transfer over a telecommunications network. Protocols for shared file systems—such...
This is a list of the IP protocol numbers found in the field Protocolof the IPv4 header and the Next Header field of the IPv6 header. It is an identifier...
similar computer networks according to functional criteria. The foundational protocols in the suite are the Transmission Control Protocol (TCP), the User...
following is a list of web service protocols. BEEP - Blocks Extensible Exchange Protocol CTS - Canonical Text Services Protocol E-Business XML Hessian...
The following is a comparison of instant messaging protocols. It contains basic general information about the protocols. One-to-many/many-to-many communications...
This is a list of TCP and UDP port numbers used by protocols for operation ofnetwork applications. The Transmission Control Protocol (TCP) and the User...
purpose. The following is a list of some ad hoc network routing protocols. This type ofprotocols maintains fresh listsof destinations and their routes...
This is a list ofprotocol stack architectures. A protocol stack is a suite of complementary communications protocols in a computer network or a computer...
based on a list of well-defined protocols. Although FIX protocol has grown significant market share, the exchange specific protocols (also called "Native"...
privacy (AuthPriv). Definition of different authentication and privacy protocols – MD5, SHA and HMAC-SHA-2 authentication protocols and the CBC_DES and CFB_AES_128...
Lists of country codes List of filename extensions Listsof locomotive classes ListsofnetworkprotocolsListsof North American area codes Listsof nuclear...
files over a computer network much like local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure...
ProtocolNetwork Control Program (ARPANET), the software which implements the Network Control Protocolof the ARPANET This disambiguation page lists articles...
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP...
computer network is a set of computers sharing resources located on or provided by network nodes. Computers use common communication protocols over digital...
add a server to the network. As the number of servers and their addresses change frequently, client programs update their server lists regularly. Files on...
(TACACS, /ˈtækæks/) refers to a family of related protocols handling remote authentication and related services for network access control through a centralized...
about the topology of the network immediately around it. The construction of routing tables is the primary goal of routing protocols. Static routes are...
as protocols, the written record of a meeting Protocol, a news website owned by Capitol News Company Proprietary protocol, a communications protocol owned...
GPRS Tunnelling Protocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS, LTE...