TheP10protocol is an extension to theInternet Relay Chatprotocol (IRC) for server to server communications. It is similar in purpose toIRCXand EFnet TS5/TS6 protocols and implements nick and channel timestamping for handling nick collisions and netsplit channel riding, respectively.
Pando is a file sharing software that allows the clients to stream download and share media. Pando is based on peer to peer and client server architecture. It uses BitTorrent protocol to transfer files therefore; the underlying protocols for Pando are SSL and HTTP.
Pandora Internet Radio (also referred to as Pandora Radio or simply Pandora) is an automated music recommendation service and custodian of the Music Genome Project available only in the United States. The service plays musical selections similar to song suggestions entered by a user. The user provides positive or negative feedback for songs chosen by the service, which are taken into account for future selections.
PassGo Technologies Service is a service used by PassGo. PassGo is a product manufactured by PassGo Technologies, a company that developed software for web access management, privilege management and one-time password token products. In 2008 they were aquired by Quest Software Inc.
PassGo Technologies Service is a service used by PassGo. PassGo is a product manufactured by PassGo Technologies, a company that developed software for web access management, privilege management and one-time password token products. In 2008 they were aquired by Quest Software Inc.
The Change Password service is a protocol provider that services Kerberos Change Password and Set Password Protocol requests. Change Password is a request-reply protocol that uses Kerberos infrastructure to allow users to securely set initial passwords or to change existing passwords. The Change Password protocol interoperates with the original Kerberos Change Password protocol, while adding the ability for an administrator to set a password for a new user.
pcAnywhere lets users connect to another computer for remote desktop access. The protocol uses UDP for control, typically on port 5361 and a TCP connection for transferring the data, typically on port 5362.
PCoIP is the display compression technology for connecting desktops and transmits it pixels only across IP network to stateless PCoIP zero clients or software VMware View clients.
Perforce is a commercial proprietary Revision Control (RC) system. The Perforce system is based on a client/server model with the server managing the collection of source versions in one or more depots.
Port File Transfer Program (PFTP) is a file transfer protocol that transfers files, directories and data from standard input to any host on the net running PFTP.
Pragmatic General Multicast (PGM) is a reliable multicast transport protocol. PGM provides a reliable sequence of packets to multiple recipients simultaneously, making it suitable for applications like multi-receiver file-transfer.
Photuris is a session-key management protocol intended for use with the IP Security Protocols (AH and ESP). Photuris establishes short-lived session-keys between two parties, without passing the session-keys across the Internet.
Protocol-Independent Multicast (PIM) is a family of multicast routing protocols for Internet Protocol (IP) networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet. It is termed protocol-independent because PIM does not include its own topology discovery mechanism, but instead uses routing information supplied by other traditional routing protocols.
Ping is a computer network administration utility used to test the reachability of a host on a network and to measure the round-trip time for messages sent from the host to the destination. Ping operates by sending ICMP echo request packets to the target host and waiting for an ICMP response. In the process it measures the round-trip time and records any packet loss. It prints a statistical summary when finished. Note that Ping will not classify any ICMP packet, only those used for echo.
Private IP Encapsulation within IP (PIPE) is a protocol enabling the encapsulation of an IP packet within another IP packet. This method is is used to change the routing of an IP packet by sending it through an intermediate destination that would not have been reached with the originial packet's IP destination address.
The Public Information Retrieval Protocol (PIRP) gives Internet hosts a simple, uniform, efficient, extensible, easily implemented method of publishing information.
The Time-Stamp Protocol (TSP, PKIX-TimeStamp) is a cryptographic protocol for certifying timestamps using X.509 certificates and public key infrastructure. The timestamp is the signer's assertion that a piece of electronic data existed at or before a particular time.
Private Network-to-Network Interface (PNNI) is a suite of network protocols that can be used to discover an ATM network topology, create a database of topology information, and route calls over the discovered topology.
Poco is a peer-to peer client popular in China. The protocol is based on GnucDNA library and uses Gnutella network architecture. Typically, Poco uses TCP port 5354 to download files, UDP ports 9099 9091 to login and chat respectively.
Post Office Protocol 3 is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP3 usually uses TCP port 995.
PostgreSQL is an object-relational database management system (ORDBMS) available for many platforms including Linux, FreeBSD, Solaris, Microsoft Windows and Mac OS X. It is a free and open source software.
Persistence of Vision Raytracer (POV-Ray) is a ray tracing program available for a variety of computer platforms. It was originally based on DKBTrace. There are also influences from the earlier Polyray raytracer. POV-Ray is freeware with the source code available.
PPStream is a Chinese peer-to-peer (P2P) streaming video network software that broadcasts TV programs to broadband users. Compared to traditional stream media, PPStream adopts P2P streaming technology and supports full-scale visits with tens of thousands of users online.
Point-to-Point Tunneling Protocol (PPTP) uses a control channel over TCP and a GRE (Generic Routing Encapsulation) tunnel operating to encapsulate PPP packets.
Adobe PostScript is the worldwide printing and imaging standard. Used by print service providers, publishers, corporations, and government agencies around the globe
The Prospero Resource Manager (PRM) is a scalable resource allocation system that supports the allocation of processing resources in large networks and on multiprocessor systems.
The Prospero Resource Manager (PRM) presents a uniform and scalable model for scheduling tasks in parallel and distributed systems. PRM provides the mechanisms through which nodes on multiprocessors can be allocated to jobs running within an extremely large distributed system. The system manager is one (out of three) type of managers that manages the full set of resources that exist in a system.
The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems.
The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems.
Performance Transparency Protocol (PTP) is a means to efficiently retrieve performance related information from a path of routers between the sender and the receiver. For example, a single PTP packet could be used to determine the bottleneck bandwidth along such a path.
The Packet Video Protocol (PVP) is a set of extensions to the Network Voice Protocol (NVP-II) and consists mostly of a data protocol for transmission of video data. No specific changes to the NVP-II protocol are necessary for the PVP.
The PWDGEN Service provides a set of six randomly generated eight-character CRLF-delimited "words" with a reasonable level of pronounceability, using a multi-level algorithm. An implementation of the algorithm is available in FORTRAN-77 for examination and possible implementation by system administrators only.