• The Commercial Internet Protocol Security Option (CIPSO) is a mechanism for attaching security labels to Internet Protocol traffic. It was supported by...
    2 KB (121 words) - 06:33, 3 April 2025
  • There are a number of optional parameters that may be present in an Internet Protocol version 4 datagram. They typically configure a number of behaviors...
    5 KB (343 words) - 14:53, 2 April 2025
  • The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP...
    54 KB (5,082 words) - 09:25, 13 June 2025
  • In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure...
    44 KB (5,337 words) - 05:26, 23 July 2025
  • Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is...
    178 KB (17,513 words) - 18:36, 23 July 2025
  • Constrained Application Protocol (CoAP) is a specialized UDP-based Internet application protocol for constrained devices, as defined in RFC 7252 (published...
    22 KB (1,813 words) - 02:51, 27 June 2025
  • Thumbnail for IPv6
    Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification...
    60 KB (8,190 words) - 13:33, 9 July 2025
  • Thumbnail for HTTPS
    network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets...
    42 KB (4,314 words) - 11:28, 25 July 2025
  • Thumbnail for Internet of things
    Transmission Control Protocol (TCP), Internet Engineering Task Force, retrieved 20 December 2022 User Datagram Protocol, Internet Engineering Task Force...
    188 KB (20,188 words) - 12:52, 23 July 2025
  • Thumbnail for History of the Internet
    history of the Internet originated in the efforts of scientists and engineers to build and interconnect computer networks. The Internet Protocol Suite, the...
    200 KB (22,250 words) - 21:40, 6 June 2025
  • The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer...
    34 KB (3,976 words) - 15:37, 23 July 2025
  • SIP is used in Internet telephony, in private IP telephone systems, as well as mobile phone calling over LTE (VoLTE). The protocol defines the specific...
    29 KB (3,366 words) - 10:53, 31 May 2025
  • The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries...
    22 KB (2,595 words) - 11:54, 22 July 2025
  • clarifies aspects of the protocol and intended use in a more detailed and clearer explanation. A new edition of the Generic Security Services Application...
    27 KB (3,023 words) - 15:26, 31 May 2025
  • language for security assertions (statements that service providers use to make access-control decisions). SAML is also: A set of XML-based protocol messages...
    25 KB (3,230 words) - 18:06, 19 April 2025
  • issue of which communication protocol would result in the best and most robust networks. This culminated in the Internet–OSI Standards War in the 1980s...
    123 KB (13,567 words) - 00:25, 10 July 2025
  • Trusted Solaris (category Operating system security)
    communication, through the Commercial Internet Protocol Security Option (CIPSO) standard. CIPSO is used to pass security information within and between...
    5 KB (506 words) - 14:59, 9 May 2025
  • has UDT available as a data transfer protocol. Over the commodity Internet, UDT has been used in many commercial products for fast file transfer over...
    11 KB (1,477 words) - 11:47, 29 April 2025
  • Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol...
    88 KB (10,327 words) - 16:10, 10 July 2025
  • system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various information with domain...
    69 KB (9,812 words) - 11:03, 15 July 2025
  • Thumbnail for Border Gateway Protocol
    information among autonomous systems (AS) on the Internet. BGP is classified as a path-vector routing protocol, and it makes routing decisions based on paths...
    65 KB (7,976 words) - 14:34, 25 May 2025
  • RADIUS (category Internet protocols)
    access via the RADIUS protocol. This request includes access credentials, typically in the form of username and password or security certificate provided...
    33 KB (2,792 words) - 14:22, 16 September 2024
  • Registration Data Access Protocol (RDAP) is a computer network communications protocol standardized by a working group at the Internet Engineering Task Force...
    16 KB (1,767 words) - 00:07, 2 July 2025
  • The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most...
    41 KB (4,510 words) - 11:00, 20 July 2025
  • Internet Small Computer Systems Interface (iSCSI; /aɪˈskʌzi/ eye-SKUZ-ee) is an Internet Protocol-based storage networking standard for linking data storage...
    26 KB (3,240 words) - 21:24, 23 June 2025
  • Thumbnail for Internet service provider
    in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned. Internet services...
    57 KB (5,059 words) - 13:30, 23 July 2025
  • captioning, HTML5 full screen, and is the first Internet Explorer to support WebGL and Google's protocol SPDY (starting at v3). This version of IE has features...
    83 KB (7,909 words) - 03:40, 20 July 2025
  • Data Systems (CCSDS) to improve performance of Internet protocols in space environments. The SCPS protocol stack consists of: SCPS-FP—A set of extensions...
    2 KB (245 words) - 04:25, 25 September 2024
  • Port Control Protocol (PCP) is a computer networking protocol that allows hosts on IPv4 or IPv6 networks to control how the incoming IPv4 or IPv6 packets...
    23 KB (2,643 words) - 02:05, 17 July 2025
  • Thumbnail for Spamming
    Spamming (redirect from Internet spam)
    network. VoIP spam is VoIP (Voice over Internet Protocol) spam, usually using SIP (Session Initiation Protocol). This is nearly identical to telemarketing...
    64 KB (7,011 words) - 03:14, 7 July 2025