Search results

Jump to navigation Jump to search

Page title matches

  • There are numerous classifications of '''network''' but, essentially, a network is a system of interconnected elements.
    132 bytes (17 words) - 12:05, 13 January 2024
  • 156 bytes (18 words) - 16:02, 23 April 2010
  • ...ections may be of short duration. A given element may move from network to network, or belong to several self-organizing networks.
    1 KB (160 words) - 12:12, 1 May 2024
  • #REDIRECT [[Network topology]]
    30 bytes (3 words) - 00:16, 8 September 2008
  • ...mmunications]] is pushing the concepts of telecommunication and [[computer network]] to be interchangeable. ...communications network, although if one allows restrictions of information network, the set of public and private networks using the [[Internet Protocol Suite
    1 KB (147 words) - 17:26, 8 January 2009
  • ...elecommunications provider that sells deregulated telephone service, under network neutrality, could not block or degrade a competitive [[voice over Internet ...le with the public Internet, although some could also be local to the FiOS network. <ref name=NW2010-08-08>{{citation
    15 KB (2,199 words) - 09:37, 5 August 2023
  • A '''social network''' is, technically, an abstract or formal structure of serial social relati
    191 bytes (27 words) - 02:48, 14 January 2024
  • ...ture''', applicable to both [[telecommunications network]]s and [[computer network]]s as well as their continuing modern [[convergence of communications|conve #The separation of network functions into smaller pieces, which may be abstract [[layer (networking)|l
    607 bytes (83 words) - 09:46, 20 September 2009
  • ...data encoding|data is encoded]], how [[medium access control|access to the network]] is handled, and how errors are [[acknowledgment schemes|reported]] and co ...t sensors or actuators that are very small and specialized computers. The network itself does not always require physical connections between participating d
    15 KB (2,278 words) - 05:21, 8 March 2024
  • #REDIRECT [[Computer network]]
    30 bytes (3 words) - 09:29, 16 March 2010
  • #REDIRECT [[Network topology]]
    30 bytes (3 words) - 02:42, 1 April 2007
  • 72 bytes (8 words) - 17:00, 19 April 2010
  • ...ng how the actual hardware is interconnected) or logical (meaning how that network is implemented by protocols in software). There are numerous different basic network topologies (and many variations). Here are several examples, with diagrams
    6 KB (923 words) - 12:40, 11 June 2009
  • ...ceptable use policy. It also may be a precursor to external attacks on the network. ...ity monitoring when performed inside the boundaries of the network. Some [[network intrusion detection system]]s have difficulty in determining if a reconnais
    2 KB (356 words) - 05:49, 8 April 2024
  • ...networks. A very similar concept applies in the Public Switched Telephone Network, where end office switches know how to reach directly connected telephones, ...ere is only one other network. The same rules apply on the 192.168.1.0/24 network.
    3 KB (465 words) - 07:36, 18 March 2024
  • A '''network medium''' is the physical medium to which devices connect in order to trans Network media have [[network topology|network topologies]] ranging from simple point-to-point to the any-to-any exchanged
    885 bytes (138 words) - 07:40, 25 February 2009
  • 38 bytes (5 words) - 10:41, 25 July 2009
  • '''Diaspora''' is a [[social network]]ing software that aims to establish an open source alternative to commerci ...erest and support received by the project shows strong demand for a social network that gives users control,
    1 KB (212 words) - 17:12, 18 September 2010
  • ...etwork|networks of computers]], a '''host''' is a term for computers, on a network that do not forward traffic destined for other nodes. That is, nodes that
    742 bytes (101 words) - 21:31, 2 February 2009
  • '''Portable Network Graphics''' (abbreviated '''PNG''') is an extensible image file format for
    507 bytes (73 words) - 06:36, 22 September 2013

Page text matches

  • ...hile [[Simple Network Management Protocol]] and [[syslog]] look inside the network elements
    286 bytes (37 words) - 10:15, 12 June 2009
  • {{r|Public Switched Telephone Network}} {{r|Computer network}}
    341 bytes (42 words) - 14:19, 1 December 2010
  • ...on the assumption that a packet entering a network must be forged, if the network has no return route to its source address
    203 bytes (33 words) - 00:13, 26 October 2009
  • ...onfirmed attacking traffic is diverted, both for protecting the production network and for planning and executing a specific defense
    236 bytes (34 words) - 09:56, 12 June 2009
  • ...n of technology-independent functions to be carried out by a specific real network
    331 bytes (37 words) - 09:49, 20 September 2009
  • ...ture''', applicable to both [[telecommunications network]]s and [[computer network]]s as well as their continuing modern [[convergence of communications|conve #The separation of network functions into smaller pieces, which may be abstract [[layer (networking)|l
    607 bytes (83 words) - 09:46, 20 September 2009
  • {{r|Computer network}} {{r|Telecommunications network}}
    331 bytes (41 words) - 22:45, 1 October 2009
  • ...political entrepreneurship; board member, [[Progressive Legislative Action Network]]
    250 bytes (28 words) - 19:05, 1 December 2009
  • There are numerous classifications of '''network''' but, essentially, a network is a system of interconnected elements.
    132 bytes (17 words) - 12:05, 13 January 2024
  • ...com/hijackers.html Social Network Analysis] of the [[9/11|9/11]] Terrorist Network
    115 bytes (14 words) - 08:06, 23 February 2024
  • ...lvis Presley]], released on 22 November 1968, as the soundtrack to the NBC network's ''Elvis'' TV special.
    167 bytes (21 words) - 06:47, 23 March 2014
  • ...spended in November 2010 for making campaign contributions in violation of network policy
    225 bytes (29 words) - 19:06, 5 November 2010
  • ==Computer network security== ...ptable use policy]]. It also may be a precursor to external attacks on the network.
    1 KB (176 words) - 04:40, 26 September 2013
  • ...ss of [[network reconnaissance]] techniques that may be part of legitimate network operations, or a probing to find vulnerabilities to attack
    182 bytes (25 words) - 09:55, 4 February 2009
  • {{r|Computer network}} ===Routed network design===
    388 bytes (44 words) - 15:18, 31 October 2008
  • ...mmunications]] is pushing the concepts of telecommunication and [[computer network]] to be interchangeable. ...communications network, although if one allows restrictions of information network, the set of public and private networks using the [[Internet Protocol Suite
    1 KB (147 words) - 17:26, 8 January 2009
  • {{r|Local area network}} {{r|Network topology}}
    932 bytes (116 words) - 11:20, 9 December 2009
  • ...ay be a legitimate operational function or a precursor to an attack on the network
    207 bytes (32 words) - 09:10, 4 February 2009
  • ...that allows only one-way transmission, based on the number of users of the network.
    179 bytes (27 words) - 16:22, 8 January 2009
  • {{r|Network architecture}} {{r|Repeater (local area network)}}
    425 bytes (53 words) - 10:00, 20 September 2009
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)