Search results
Jump to navigation
Jump to search
Page title matches
- Auto-populated based on [[Special:WhatLinksHere/Computer networking end-to-end protocols]]. Needs checking by a human.642 bytes (79 words) - 15:37, 11 January 2010
- 462 bytes (55 words) - 13:43, 13 May 2008
- '''End-to-end protocols''' are responsible for the transfer of data from a source to one or more ne The basic end-to-end protocols send information between two true endpoints, or to a '''midbox''' that acts8 KB (1,172 words) - 16:22, 30 March 2024
- 118 bytes (18 words) - 14:54, 29 December 2008
- 12 bytes (1 word) - 17:59, 9 May 2008
- ...l-Time Control Protocol]] (RTCP). While RTP/RTCP do have the attributes of end-to-end protocols, they are encapsulated in UDP for transmission. RTP is used for best-effort837 bytes (108 words) - 14:33, 16 January 2010
- #Redirect [[Computer networking end-to-end protocols]]54 bytes (5 words) - 19:31, 18 May 2008
- #Redirect [[Computer networking end-to-end protocols]]54 bytes (5 words) - 19:31, 18 May 2008
- #REDIRECT [[Computer networking end-to-end protocols]]54 bytes (5 words) - 17:44, 17 May 2008
Page text matches
- {{rpl|End-to-end protocols}}167 bytes (21 words) - 05:43, 26 September 2013
- ...l-Time Control Protocol]] (RTCP). While RTP/RTCP do have the attributes of end-to-end protocols, they are encapsulated in UDP for transmission. RTP is used for best-effort837 bytes (108 words) - 14:33, 16 January 2010
- An [[end-to-end protocols|end-to-end control (i.e., signaling) protocol]] used to reserve bandwidth f203 bytes (28 words) - 13:50, 15 August 2008
- #Redirect [[Computer networking end-to-end protocols]]54 bytes (5 words) - 19:31, 18 May 2008
- #REDIRECT [[Computer networking end-to-end protocols]]54 bytes (5 words) - 17:44, 17 May 2008
- #Redirect [[Computer networking end-to-end protocols]]54 bytes (5 words) - 19:31, 18 May 2008
- {{r|Computer networking end-to-end protocols}} {{r|End-to-end protocols}}662 bytes (82 words) - 20:00, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Computer networking end-to-end protocols]]. Needs checking by a human.642 bytes (79 words) - 15:37, 11 January 2010
- {{r|Computer networking end-to-end protocols}}544 bytes (68 words) - 15:37, 11 January 2010
- {{r|End-to-end protocols}}206 bytes (23 words) - 15:03, 16 January 2010
- {{r|End-to-end protocols}}680 bytes (84 words) - 19:33, 31 July 2008
- ...mputer networking application protocols''' travel over computer networking end-to-end protocols to provide services meaningful to application programs residing in the endp3 KB (360 words) - 16:21, 30 March 2024
- {{r|Computer networking end-to-end protocols}}847 bytes (104 words) - 21:34, 11 January 2010
- {{r|End-to-end protocols}}361 bytes (42 words) - 23:40, 13 September 2008
- {{r|End-to-end protocols}}385 bytes (43 words) - 00:44, 20 July 2008
- {{r|Computer networking end-to-end protocols}}407 bytes (47 words) - 06:31, 17 March 2024
- {{r|Computer networking end-to-end protocols}}553 bytes (70 words) - 06:31, 17 March 2024
- {{r|Computer networking end-to-end protocols}}673 bytes (87 words) - 17:59, 11 January 2010
- {{r|Computer networking end-to-end protocols}}715 bytes (90 words) - 11:54, 31 December 2022
- ...California}}</ref> the '''Resource Reservation Protocol (RSVP)''' is an [[end-to-end protocols|end-to-end control protocol]] for path setup, as distinct from data transfe2 KB (257 words) - 13:50, 15 August 2008
- {{r|End-to-end protocols}}2 KB (248 words) - 05:56, 17 March 2024
- '''End-to-end protocols''' are responsible for the transfer of data from a source to one or more ne The basic end-to-end protocols send information between two true endpoints, or to a '''midbox''' that acts8 KB (1,172 words) - 16:22, 30 March 2024
- ...direct user service. Alternatively, some, such as RSVP, are more properly end-to-end protocols, which roughly correspond to OSI Transport.8 KB (1,226 words) - 12:37, 30 March 2024
- The '''User Datagram Protocol''' is one of the two original end-to-end protocols of the Internet; it has lower overhead than the Transmission Control Protoc5 KB (740 words) - 16:23, 30 March 2024
- End-to-end protocols above IPv4 use the same checksum algorithm, but they look at the overall da9 KB (1,543 words) - 16:22, 30 March 2024
- :*Methods for moving bytes from network endpoint to network endpoint, using end-to-end protocols such as the Transmission Control Protocol (TCP)18 KB (2,694 words) - 16:22, 30 March 2024
- The fundamental Internet End-to-end protocols| end-to-end protocol for implementing reliable delivery that accounts for p13 KB (1,980 words) - 16:23, 30 March 2024
- * [[Computer networking end-to-end protocols/Definition]]28 KB (2,875 words) - 16:19, 7 April 2024
- * [[Computer networking end-to-end protocols/Related Articles]]36 KB (4,044 words) - 16:22, 7 April 2024
- * [[Template:Computer networking end-to-end protocols/Metadata]]39 KB (4,231 words) - 05:22, 8 April 2024