- end-to-end protocol
-
протокол сквозной передачи (сообщений)
Англо-русский словарь технических терминов. 2005.
Англо-русский словарь технических терминов. 2005.
Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… … Wikipedia
End-to-end connectivity — is a property of the Internet that allows all nodes of the network to send packets to all other nodes of the network, without requiring intermediatenetwork elements to further interpret them. It was for the first time implemented in the CYCLADES… … Wikipedia
Protocol of Corfu — Signed 17 May 1914 Location Corfu, Greece Signatories Principality of Albania … Wikipedia
Protocol Independent Multicast — (PIM) is a family of multicast routing protocols that can provide one to many and many to many distribution of data over the Internet. The protocol independent part refers to the fact that PIM does not include its own topology discovery mechanism … Wikipedia
End-to-end — has various meanings.*In e commerce, end to end marketing describes methods or services directly connecting people who want to sell and buy. This practice eliminates middlemen from the trade. *In computer communication, end to end refers to end… … Wikipedia
End-to-end principle — The end to end principle is one of the central design principles of the Transmission Control Protocol (TCP) widely used on the Internet as well as in other protocols and distributed systems in general. The principle states that, whenever possible … Wikipedia
Protocol converter — A Protocol Converter is a device used to convert standard or proprietary protocol of one device to the protocol suitable for the other device or tools to achieve the interoperability. There are varieties of protocols used in different fields like … Wikipedia
Protocol-based intrusion detection system — A protocol based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system. A PIDS will monitor the… … Wikipedia
Protocol (computing) — In computing, a protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax,… … Wikipedia
End-to-end auditable voting systems — Election technology Certification of voting machines Independent Testing Authority (ITA) NVLAP VVSG End to end auditable voting systems Help America Vote Act Indepen … Wikipedia
Protocol of Sèvres — The Protocols of Sèvres (French, Protocoles de Sèvres ) was a secret agreement reached between the governments of Israel, France and Great Britain during discussions held in Sèvres, France between 22 and 24 October 1956, regarding a joint… … Wikipedia