protocol stack
A set of network protocol layers that work together. The OSI Reference Model that defines seven protocol layers is often called a stack, as is the set of TCP/IP protocols that define communication over the internet.
The term stack also refers to the actual software that processes the protocols. So, for example, programmers sometimes talk about loading a stack, which means to load the software required to use a specific set of protocols. Another common phrase is binding a stack, which refers to linking a set of network protocols to a network interface card (NIC). Every NIC must have at least one stack bound to it.
In Windows, the TCP/IP stack is implemented by the Winsock DLL.
Read Also:
- prototype
1) An original type, form, or instance serving as a basis or standard for later stages. 2) An original, full-scale, and usually working model of a new product or new version of an existing product. 3) An early, typical example.
- Provisioning
(n.) (1) The process of providing users with access to data and technology resources. The term typically is used in reference to enterprise-level resource management. Provisioning can be thought of as a combination of the duties of the human resources and IT departments in an enterprise, where (1) users are given access to data repositories […]
- proximity operator
A type of operator used by some search engines to improve search constraints by instructing the search to look for words that are within a short distance of each other in a document. For example, using a search engine that supports proximity operators, querying the phrase “cable NEAR modem” will instruct the search engine to […]
- proxy cache
(pro´ksē cash) (n.) Also referred to as a Web proxy cache, a function of a proxy server that caches retrieved Web pages on the server’s hard disk so that the page can be quickly retrieved by the same or a different user the next time that page is requested. The proxy cache eases bandwidth requirements […]
- Pseudocode
An outline of a program, written in a form that can easily be converted into real programming statements. For example, the pseudocode for a bubble sortroutine might be written: while not at end of list compare adjacent elements if second is greater than first switch them get next two elements if elements were switched repeat […]