protocol (computing) wikipedia - EAS

About 42 results
  1. Post Office Protocol - Wikipedia

    https://en.wikipedia.org/wiki/Post_Office_Protocol

    In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use, and along with IMAP the most common protocols for …

  2. Two-phase commit protocol - Wikipedia

    https://en.wikipedia.org/wiki/Two-phase_commit_protocol

    In transaction processing, databases, and computer networking, the two-phase commit protocol (2PC) is a type of atomic commitment protocol (ACP). It is a distributed algorithm that coordinates all the processes that participate in a distributed atomic transaction on whether to commit or abort (roll back) the transaction. This protocol (a specialised type of consensus …

  3. Gossip protocol - Wikipedia

    https://en.wikipedia.org/wiki/Gossip_protocol

    A gossip protocol or epidemic protocol is a procedure or process of computer peer-to-peer communication that is based on the way epidemics spread. Some distributed systems use peer-to-peer gossip to ensure that data is disseminated to all members of a group. Some ad-hoc networks have no central registry and the only way to spread common data is to rely on each …

  4. Preemption (computing) - Wikipedia

    https://en.wikipedia.org/wiki/Preemption_(computing)

    In computing, preemption is the act of temporarily interrupting an executing task, with the intention of resuming it at a later time.This interrupt is done by an external scheduler with no assistance or cooperation from the task.: 153 This preemptive scheduler usually runs in the most privileged protection ring, meaning that interruption and resuming are considered highly secure …

  5. Independent Computing Architecture - Wikipedia

    https://en.wikipedia.org/wiki/Independent_Computing_Architecture

    Independent Computing Architecture (ICA) is a proprietary protocol for an application server system, designed by Citrix Systems. The protocol lays down a specification for passing data between server and clients, but is not bound to any one platform. Citrix's ICA is an alternative to Microsoft's Remote Desktop Protocol (RDP).

  6. List of TCP and UDP port numbers - Wikipedia

    https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers

    This is a list of TCP and UDP port numbers used by protocols for operation of network applications.. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need one port for duplex, bidirectional traffic.They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned …

  7. Remote Desktop Protocol - Wikipedia

    https://en.wikipedia.org/wiki/Remote_Desktop_Protocol

    Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. Clients exist for most versions of Microsoft Windows (including …

  8. Bitcoin network - Wikipedia

    https://en.wikipedia.org/wiki/Bitcoin_network

    The bitcoin network is a peer-to-peer payment network that operates on a cryptographic protocol.Users send and receive bitcoins, the units of currency, by broadcasting digitally signed messages to the network using bitcoin cryptocurrency wallet software. Transactions are recorded into a distributed, replicated public database known as the blockchain, with consensus …

  9. Peer-to-peer - Wikipedia

    https://en.wikipedia.org/wiki/Peer-to-peer

    Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer network of nodes.. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly …

  10. User Datagram Protocol - Wikipedia

    https://en.wikipedia.org/wiki/User_Datagram_Protocol

    In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths.. UDP uses a …



Results by Google, Bing, Duck, Youtube, HotaVN