Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ess layer, and a management interface. Related standards use the physical layer (e.g. [[Internet Protocol]] over S-FSK), but not the higher layers.<ref>ADD The physical layer synchronizes a small packet of tones to the zero-crossing of the power line ...
    7 KB (1,079 words) - 21:46, 16 August 2021
  • ...e [[routing metric]]. This assumes packets are retransmitted at the [[link layer]]. Routes with a lower metric are preferred. In a route that includes mult ...with smaller ETX. This kind of forwarding is common to many algorithms and protocols in wireless sensor networks. ...
    3 KB (479 words) - 05:38, 20 November 2023
  • ...an [[Asynchronous Transfer Mode]] (ATM) [[ATM adaptation layer|adaptation layer]], used primarily in [[telecommunications]]; for example, it is used for th ...re named Service Specific Convergence Sub-layer (SSCS) and Common Part Sub-layer (CPS). ...
    7 KB (1,180 words) - 21:19, 9 June 2023
  • ...cols such as [[Internet Protocol|IP]] on top of uni-directional [[physical layer]]s such as [[DVB-S2]], [[DVB-T2]] and [[DVB-C2]]. * Transparency to network layer functions, including [[Internet Protocol|IP]] [[encryption]] and IP [[Van J ...
    12 KB (1,692 words) - 15:36, 13 August 2024
  • ...rcome the shortcoming of [[Client Puzzle Protocol|computation-based puzzle protocols]], in which [[Client (computing)|clients]] are required to compute hard CPU == Comparison to other puzzle protocols == ...
    10 KB (1,646 words) - 22:41, 18 January 2024
  • {{Short description|Neural network working on two input vectors}} ...' (sometimes called a '''twin neural network''') is an [[artificial neural network]] that uses the same weights while working in tandem on two different input ...
    12 KB (1,778 words) - 17:55, 8 October 2024
  • ...otocol designed for traffic safety applications. As other computer network protocols, it is also subject to several attacks that can have fatal consequences due ...specially to address network issues that come with high mobility and high network overhead. ...
    14 KB (2,173 words) - 20:35, 20 February 2025
  • ...thumb|upright=0.4|right|alt=vertical stacking of layers|Connection between layer stacks and transformation compositions]] ...t language to express such designs. Elementary algebra fit the bill: each layer was a function (a [[program transformation]]) that added new code to an exi ...
    18 KB (2,792 words) - 00:02, 2 February 2024
  • '''LoRaWAN''' (Long Range [[Wide Area Network]]) defines the communication protocol and system architecture. LoRaWAN is a ...lectronics|low power]], low bit rate, and IoT use distinguish this type of network from a [[wireless WAN]] that is designed to connect users or businesses, an ...
    21 KB (2,805 words) - 10:28, 18 February 2025
  • ...www.covid-watch.org/news}}</ref> and was followed by similar decentralized protocols in early April 2020 like [[Decentralized Privacy-Preserving Proximity Traci ...en-US|access-date=2020-04-18}}</ref> The major distinction between TCN and protocols like BlueTrace is the fact the central reporting server never has access to ...
    26 KB (3,619 words) - 06:12, 18 August 2024
  • ..., [[X448]], and [[Ed448]] algorithms.<ref>{{cite IETF |title=The Transport Layer Security (TLS) Protocol Version 1.3 |rfc=8446 |author=E Rescorla|date=Septe * [[Network Security Services|NSS]] since version 3.28<ref>{{Cite web|url=https://devel ...
    21 KB (2,850 words) - 01:51, 13 February 2025
  • ...gazine=Wired|access-date=2020-04-18|language=en|issn=1059-1028}}</ref> The protocols differ in their reporting mechanism, with PEPP-PT requiring clients to uplo ...contact log of any client in the network. This is in contrast to competing protocols like PEPP-PT, where the central reporting server receives and processes cli ...
    23 KB (3,262 words) - 08:15, 8 January 2025
  • '''CAN FD''' (Controller Area Network Flexible Data-Rate) is a [[Communication protocol|data-communication protoc The primary difference between the classical CAN (Controller Area Network) and CAN FD is the Flexible Data (FD). Using CAN FD, Electronic Control Uni ...
    16 KB (2,394 words) - 01:23, 30 January 2025
  • ...ta into the connection. It affects the [[HTTPS]], [[SMTPS]], and [[IMAPS]] protocols, among others. The authors needed several thousand [[CPU]] cores for a week [[Category:Transport Layer Security]] ...
    12 KB (1,625 words) - 17:17, 5 July 2024
  • ...snd}} Bridges and Bridged Networks, which describes [[virtual LAN]]s and [[network switch]]es.<ref>{{cite web|url=https://1.ieee802.org/maintenance/802-1q-201 ...transport layer, but there are no means to prevent congestion at the link layer. Data can be lost when the buffers are too small or the bandwidth is insuff ...
    60 KB (8,598 words) - 20:49, 10 February 2025
  • ...iders the situation where each job can visit multiple service nodes in the network. It is an extension of [[max-weight scheduling]] where each job visits onl ...sensor network|sensor networks]], mobile ad hoc networks ([[Mobile ad hoc network|MANETS]]), and heterogeneous networks with wireless and wireline components ...
    43 KB (6,480 words) - 08:48, 10 July 2023
  • ...n": a kind of value that acts as a resource manager. This is often used in network servers, where each connection is dealt with in a new custodian, making it ...e, it is not possible to access the [[file system]] from this REPL, create network connection, run subprocesses, or use too much time or memory. (In fact, thi ...
    26 KB (3,661 words) - 00:58, 8 January 2024
  • ...ssn=1558-156X}}</ref> As the coordinator is a single point of failure, the network is currently{{As of when|date=July 2021}} centralized.<ref name=":197">{{Ci ...TA 2.0, was deployed in late 2020, with the aim of releasing a distributed network that no longer relies on the coordinator for consensus in 2021.<ref name=": ...
    48 KB (6,045 words) - 01:34, 19 February 2025
  • ...ability to compromise modern cryptographic protocols (such as [[Transport Layer Security|TLS/SSL]]) has prompted the development of post-quantum cryptograp ...t have a strict space requirement, such as [[Bitcoin]] or [[Tor (anonymity network)|Tor]]. Tor's data cells must be less than 517 bytes in length, so they can ...
    25 KB (3,825 words) - 01:30, 30 December 2023
  • ...chieved by encapsulating multiple virtual connections ("tunnels") of other protocols, such as USB 3.x, [[DisplayPort]] and [[PCI Express]]. ...to how [[USB 3.0|USB 3.x]] specifications defined the new SuperSpeed(Plus) protocols for faster signaling rates, they also mandated that USB 3.x physically and ...
    75 KB (10,611 words) - 16:16, 28 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)