Network protocols

Results: 10979



#Item
201Computing / Network architecture / Routing protocols / Networking hardware / Router / Communications protocol

Page 1 of 2 Application NoteControlling the Z-Systems z-16.16r Digital Detangler Pro Routers Inputs to are designated as sources and outputs are designated as destinations. The

Add to Reading List

Source URL: www.z-sys.com

Language: English - Date: 1999-11-05 11:20:25
202Computing / Internet / Network architecture / Internet protocols / Trex / Tampere Region Exchange / Peering / Border Gateway Protocol / IP multicast

Map of This Site members services workshops about

Add to Reading List

Source URL: www.trex.fi

Language: English - Date: 2016-06-09 09:58:45
203Computing / Network architecture / Network protocols / Web development / World Wide Web / Internet protocols / Stateless protocol / Hypertext Transfer Protocol / Clientserver model / Web server / Internet protocol suite / Transmission Control Protocol

HTTP - OVERVIEW http://www.tutorialspoint.com/http/http_overview.htm Copyright © tutorialspoint.com The Hypertext Transfer Protocol HTTP is an application-level protocol for distributed, collaborative,

Add to Reading List

Source URL: www.tutorialspoint.com

Language: English - Date: 2015-09-30 15:33:43
204Computing / Internet / Network architecture / Routing / Internet Standards / Internet protocols / Software-defined networking / Internet exchange point / Border Gateway Protocol

Software Defined Internet Exchange Points Arpit Gupta

Add to Reading List

Source URL: www.nanog.org

Language: English - Date: 2013-10-08 09:36:03
205Technology / Mobile technology / Wireless / Mobile telecommunications / Network protocols / Code division multiple access / Videotelephony / Packet data serving node / 3GPP / GPRS Tunnelling Protocol / GERAN / 3rd Generation Partnership Project 2

Review Exercises Chapter 2 1. What are the four major functional building blocks in the core network of 3GPP Release 5? 2. What are GERAN and UTRAN in 3GPP? What are the major components in GERAN and UTRAN?

Add to Reading List

Source URL: people.cs.nctu.edu.tw

Language: English
206Medical research / Clinical data management / Health / Clinical research / Computing / Network protocols / Electronic common technical document / Pharmaceutical industry / EudraPharm / Change request / Change control board / RDM

EU Change Control Process for Change Requests in the Entire Area of Electronic Submissions for Human Medicinal Products Version 2.1 May 2011

Add to Reading List

Source URL: esubmission.ema.europa.eu

Language: English - Date: 2016-08-19 03:14:47
207Computing / Internet Standards / Network booting / Network protocols / Unified Extensible Firmware Interface / Dynamic Host Configuration Protocol / Network service / Trivial File Transfer Protocol / File Transfer Protocol / Preboot Execution Environment

PVS Boot Process Poster v1-5.pdf

Add to Reading List

Source URL: support.citrix.com

Language: English
208Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
209Wireless networking / Computing / Routing algorithms / Wireless / Network management / Routing protocols / Wireless ad hoc network / Optimized Link State Routing Protocol / Link-state routing protocol / Mobile ad hoc network / Peer-to-peer / Routing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-27 07:14:54
210Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
UPDATE