end$24779$ - definizione. Che cos'è end$24779$
Diclib.com
Dizionario ChatGPT
Inserisci una parola o una frase in qualsiasi lingua 👆
Lingua:

Traduzione e analisi delle parole tramite l'intelligenza artificiale ChatGPT

In questa pagina puoi ottenere un'analisi dettagliata di una parola o frase, prodotta utilizzando la migliore tecnologia di intelligenza artificiale fino ad oggi:

  • come viene usata la parola
  • frequenza di utilizzo
  • è usato più spesso nel discorso orale o scritto
  • opzioni di traduzione delle parole
  • esempi di utilizzo (varie frasi con traduzione)
  • etimologia

Cosa (chi) è end$24779$ - definizione

DESIGN PRINCIPLE FOR COMPUTER NETWORKING
End-to-end connectivity; End-to-end argument; End-to-end arguments in system design; End to end principle; End-end principle; End to end argument; End-to-end connection; End-to-end communication
  • According to the end-to-end principle, the network is only responsible for providing the terminals with best-effort connections. Features such as reliability and security must be provided by mechanisms and protocols located at the terminals.

End (gridiron football)         
  • [[Don Hutson]] catches a pass.
  • The old single wing formation showing ends labeled
POSITION IN AMERICAN AND CANADIAN FOOTBALL
End (football); End (American football); End (Canadian football); End (American and Canadian football); Offensive end
An end in American and Canadian football is a player who lines up at either end of the line of scrimmage, usually beside the tackles. Rules state that a legal offensive formation must always consist of seven players on the line of scrimmage and that the player on the end of the line constitutes an eligible receiver.
End-to-end auditable voting systems         
VOTING SYSTEM
End-to-End Auditable Voting Systems; Cryptographic voting system; End-to-end verification
End-to-end auditable or end-to-end voter verifiable (E2E) systems are voting systems with stringent integrity properties and strong tamper resistance. E2E systems often employ cryptographic methods to craft receipts that allow voters to verify that their votes were counted as cast, without revealing which candidates were voted for.
back-end         
WIKIMEDIA DISAMBIGUATION PAGE
Backend; Back-end; Back end (disambiguation); Back End
<programming> Any software performing either the final stage in a process, or a task not apparent to the user. A common usage is in a compiler. A compiler's back-end generates machine language and performs optimisations specific to the machine's architecture. The term can also be used in the context of network applications. E.g. "The back-end of the system handles socket protocols". Contrast front end. (1996-04-09)

Wikipedia

End-to-end principle

The end-to-end principle is a design framework in computer networking. In networks designed according to this principle, guaranteeing certain application-specific features, such as reliability and security, requires that they reside in the communicating end nodes of the network. Intermediary nodes, such as gateways and routers, that exist to establish the network, may implement these to improve efficiency but cannot guarantee end-to-end correctness.

The essence of what would later be called the end-to-end principle was contained in the work of Paul Baran and Donald Davies on packet-switched networks in the 1960s. Louis Pouzin pioneered the use of the end-to-end strategy in the CYCLADES network in the 1970s. The principle was first articulated explicitly in 1981 by Saltzer, Reed, and Clark. The meaning of the end-to-end principle has been continuously reinterpreted ever since its initial articulation. Also, noteworthy formulations of the end-to-end principle can be found before the seminal 1981 Saltzer, Reed, and Clark paper.

A basic premise of the principle is that the payoffs from adding certain features required by the end application to the communication subsystem quickly diminish. The end hosts have to implement these functions for correctness. Implementing a specific function incurs some resource penalties regardless of whether the function is used or not, and implementing a specific function in the network adds these penalties to all clients, whether they need the function or not.