Fault tolerance/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
m (Text replacement - "{{r|Terrorism and U.S. Intelligence}}" to "")
No edit summary
 
(One intermediate revision by one other user not shown)
Line 14: Line 14:
Auto-populated based on [[Special:WhatLinksHere/Fault tolerance]]. Needs checking by a human.
Auto-populated based on [[Special:WhatLinksHere/Fault tolerance]]. Needs checking by a human.


{{r|Anycasting}}
{{r|Clandestine cell system}}
{{r|Common student exercises in computer science}}
{{r|Common student exercises in computer science}}
{{r|Computer network}}
{{r|Computer network}}
Line 27: Line 25:
{{r|Safety of Life at Sea}}
{{r|Safety of Life at Sea}}
{{r|Sinkhole (computers)}}
{{r|Sinkhole (computers)}}
{{r|Span of control}}
{{r|Unicasting}}
{{r|Unicasting}}
{{r|Unicast}}
{{r|Unicast}}
Line 34: Line 30:
{{Bot-created_related_article_subpage}}
{{Bot-created_related_article_subpage}}
<!-- Remove the section above after copying links to the other sections. -->
<!-- Remove the section above after copying links to the other sections. -->
==Articles related by keyphrases (Bot populated)==
{{r|John Edwards}}
{{r|Database}}
{{r|Firewall}}

Latest revision as of 17:00, 15 August 2024

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Fault tolerance.
See also changes related to Fault tolerance, or pages that link to Fault tolerance or to this page or whose text contains "Fault tolerance".

Parent topics

Subtopics

Other related topics

Bot-suggested topics

Auto-populated based on Special:WhatLinksHere/Fault tolerance. Needs checking by a human.

  • Common student exercises in computer science [r]: Add brief definition or description
  • Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]
  • Ingress filtering [r]: A class of network security measures based on the assumption that a packet entering a network must be forged, if the network has no return route to its source address [e]
  • Internet Protocol [r]: Highly resilient protocol for messages sent across the internet, first by being broken into smaller packets (each with the endpoint address attached), then moving among many mid-points by unpredictable routes, and finally being reassembled into the original message at the endpoint. IP version 4 (IPv4) is from 1980 but lacked enough addresses for the entire world and was superseded by IP version 6 (IPv6) in 1998. [e]
  • Internet Service Provider [r]: A business, or possibly an internal support organization, that manages connectivity among end user workstations, local area networks, servers, and the public Internet using Internet Protocol version 4, Internet Protocol version 6, or both. [e]
  • Multicasting [r]: In networking, the transmission of a piece of information such that its destination address is recognized by multiple targets of a multicast group. Broadcasting is a special case of the multicast group, when the group contains all addresses. [e]
  • Multihoming [r]: A wide range of techniques for providing multiple communications paths among logical or physical points in computer networks, primarily for fault tolerance but also for load distribution or traffic engineering [e]
  • Routing Policy Specification Language [r]: An IETF-standardized description language that allows the precise specification of relationships involved in the routing policies of the global Internet [e]
  • Routing [r]: The process of receiving a packet on one interface of a router, validating the packet and forwarding it out the appropriate interface. [e]
  • Safety of Life at Sea [r]: International convention defining safety requirements for ships [e]
  • Sinkhole (computers) [r]: A network element, or set of network elements, to which suspect or confirmed attacking traffic is diverted, both for protecting the production network and for planning and executing a specific defense [e]
  • Unicasting [r]: In computer networks, the transmission of a frame, packet, or message, which has a destination address that maps to one and only one target [e]
  • Unicast [r]: A computer protocol message that is addressed to one and only one destination [e]

Articles related by keyphrases (Bot populated)

  • John Edwards [r]: American lawyer, Senator, vice-presidential and presidential candidate. [e]
  • Database [r]: A collection of computer-readable records, at one or more location, that are organized in some meaningful way beyond simple sequence of creation [e]
  • Firewall [r]: A set of functions, implemented on one or more computers, which implement a security policy for access to a trusted network from an untrusted one [e]