• The B protocol, or CIS B, is a file transfer protocol developed for the CompuServe Information Service, and implemented in 1981. The protocol was later...
    10 KB (1,467 words) - 19:19, 24 March 2022
  • This article lists communication protocols that are designed for file transfer over a telecommunications network. Protocols for shared file systems—such as...
    63 KB (3,195 words) - 07:02, 24 March 2024
  • Thumbnail for Protocol stack
    The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably...
    7 KB (904 words) - 15:36, 8 July 2024
  • In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It can, for example...
    15 KB (1,910 words) - 15:07, 15 June 2024
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,009 words) - 22:25, 21 March 2024
  • The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries...
    21 KB (2,071 words) - 03:57, 18 July 2024
  • A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of...
    65 KB (8,217 words) - 02:23, 22 June 2024
  • Kermit is a computer file transfer and management protocol and a set of communications software tools primarily used in the early years of personal computing...
    18 KB (1,990 words) - 02:49, 31 May 2024
  • A routing protocol specifies how routers communicate with each other to distribute information that enables them to select paths between nodes on a computer...
    7 KB (738 words) - 18:33, 29 April 2024
  • Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure...
    27 KB (3,053 words) - 22:13, 7 May 2024
  • distance-vector routing protocol in data networks determines the best route for data packets based on distance. Distance-vector routing protocols measure the distance...
    20 KB (1,645 words) - 09:17, 16 March 2024
  • The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice...
    29 KB (3,365 words) - 16:00, 24 June 2024
  • The Secure Remote Password protocol (SRP) is an augmented password-authenticated key exchange (PAKE) protocol, specifically designed to work around existing...
    28 KB (3,404 words) - 18:54, 9 July 2024
  • The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer...
    36 KB (4,332 words) - 11:23, 22 June 2024
  • Thumbnail for CompuServe
    CompuServe B protocol, a file-transfer protocol, allowing users to send files to each other. This was later expanded to the better-performance B+ version...
    62 KB (7,251 words) - 14:43, 17 July 2024
  • Thumbnail for The Protocols of the Elders of Zion
    The Protocols of the Elders of Zion is a fabricated text purporting to detail a Jewish plot for global domination. Largely plagiarized from several earlier...
    84 KB (9,318 words) - 20:10, 9 July 2024
  • XMODEM (category BBS file transfer protocols)
    XMODEM is a simple file transfer protocol developed as a quick hack by Ward Christensen for use in his 1977 MODEM.ASM terminal program. It allowed users...
    27 KB (3,869 words) - 03:30, 2 April 2024
  • Thumbnail for Kyoto Protocol
    The Kyoto Protocol (Japanese: 京都議定書, Hepburn: Kyōto Giteisho) was an international treaty which extended the 1992 United Nations Framework Convention on...
    154 KB (13,694 words) - 02:58, 16 July 2024
  • Thumbnail for Needham–Schroeder protocol
    The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and...
    13 KB (2,192 words) - 08:04, 20 March 2024
  • An Internet Protocol address (IP address) is a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses...
    35 KB (4,203 words) - 18:21, 9 July 2024
  • Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications...
    179 KB (17,630 words) - 08:54, 20 July 2024
  • The Signal Protocol (formerly known as the TextSecure Protocol) is a non-federated cryptographic protocol that provides end-to-end encryption for voice...
    35 KB (3,035 words) - 01:24, 2 June 2024
  • foundational protocols in the suite are the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), and the Internet Protocol (IP). Early...
    57 KB (6,302 words) - 08:57, 6 July 2024
  • Routing Protocol (OLSR) RFC 3626, RFC 7181. Babel RFC 6126 Destination Sequence Distance Vector (DSDV) DREAM B.A.T.M.A.N. This type of protocol finds a...
    6 KB (718 words) - 01:05, 15 September 2023
  • Thumbnail for Montreal Protocol
    The Montreal Protocol on Substances That Deplete the Ozone Layer is an international treaty designed to protect the ozone layer by phasing out the production...
    63 KB (6,265 words) - 20:09, 11 July 2024
  • The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities...
    8 KB (719 words) - 11:59, 20 July 2024
  • The Internet Group Management Protocol (IGMP) is a communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group...
    11 KB (1,321 words) - 20:49, 16 July 2024
  • The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP...
    52 KB (4,932 words) - 10:04, 28 June 2024
  • which B is unavailable. Alice and Bob Kerberos (protocol) Needham–Schroeder protocol Neuman–Stubblebine protocol Otway–Rees protocol Yahalom (protocol) Schneier...
    3 KB (427 words) - 10:42, 23 May 2019
  • computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported...
    24 KB (2,717 words) - 16:45, 8 June 2024