-
41 detectable
"Pertaining to a state in which computers on a network can be located by other computers and devices on the same network in order to communicate. This state is determined by a firewall setting, which also affects access to shared files and printers." -
42 absolute URL
"The full Internet address of a page or other World Wide Web resource. The absolute URL includes a protocol, such as ""http,"" network location, and optional path and file name — for example, http://example.microsoft.com/.""مطلق ""URL""" -
43 ACK
"A message transmitted to indicate that data has been received correctly. The Transmission Control Protocol (TCP) requires that the recipient acknowledge successful receipt of data. Such acknowledgments (ACKs) generate additional network traffic, decreasing the rate at which data passes but increasing reliability. To reduce the impact on performance, most hosts send an acknowledgment for every other segment or when a specified time interval has passed." -
44 acknowledgement
"A message transmitted to indicate that data has been received correctly. The Transmission Control Protocol (TCP) requires that the recipient acknowledge successful receipt of data. Such acknowledgments (ACKs) generate additional network traffic, decreasing the rate at which data passes but increasing reliability. To reduce the impact on performance, most hosts send an acknowledgment for every other segment or when a specified time interval has passed." -
45 backup designated router
An OSPF router that forms adjacencies with all other routers on a multiple access network and becomes the designated router when the designated router becomes unavailable. -
46 bandwidth throttling
"The process of setting the maximum portion of total network capacity that a service is allowed to use. An administrator can deliberately limit a servers Internet workload by not allowing it to receive requests at full capacity, thus saving resources for other programs, such as e-mail." -
47 binding
"A process by which software components and layers are linked together. When a network component is installed, the binding relationships and dependencies for the components are established. Binding allows components to communicate with each other." -
48 device
"Any piece of equipment that can be attached physically or wirelessly to a network or computer, for example, printers, keyboards, external disk drives, or other peripheral equipment." -
49 dial-up connection
A connection to other computers or to the Internet using a device that uses the telephone network. -
50 designated router
An OSPF router that forms adjacencies with all other routers on a multiple access network. -
51 domain
"In the Internet and other networks, the highest subdivision of a domain name in a network address, which identifies the type of entity owning the address (for example,.com for commercial users or.edu for educational institutions) or the geographical location of the address (for example,.fr for France or.sg for Singapore). The domain is the last part of the address (for example, www.acm.org)." -
52 gateway
A device that connects networks using different communications protocols so that information can be passed from one to the other. A gateway both transfers information and converts it to a form compatible with the protocols used by the receiving network. -
53 nickname
"A user-friendly name displayed in place of a network location, e-mail address, contact name, or other, more formal name." -
54 PBX
"A private telephone network in an organization. Individual telephone numbers or extension numbers are supported, and calls are automatically routed to them. Users can call each other using extensions. They can also place calls to outside numbers." -
55 Private Branch Exchange
"A private telephone network in an organization. Individual telephone numbers or extension numbers are supported, and calls are automatically routed to them. Users can call each other using extensions. They can also place calls to outside numbers." -
56 Point-to-Point Tunneling Protocol
"Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637."English-Arabic terms dictionary > Point-to-Point Tunneling Protocol
-
57 PPTP
"Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637." -
58 publish
"To make a form, view, device or other resource available over a network." -
59 shared folder
A folder on another computer that has been made available for other people to use on the network. -
60 sign
"To bind an identity, such as a network login, hardware ID, or certificate, to a message, file, or other piece of digitally encoded information."يوقّع
См. также в других словарях:
Network science — is a new and emerging scientific discipline that examines the interconnections among diverse physical or engineered networks, information networks, biological networks, cognitive and semantic networks, and social networks. This field of science… … Wikipedia
Network interface controller — Network Interface Card (NIC) A 1990s Ethernet network interface controller card which connects to the motherboard via the now obsolete ISA bus. This combination card features both a (now obsolete) bayonet cap BNC connector (left) for use in… … Wikipedia
Network tomography — is the study of a network s internal characteristics using information derived from end point data. The word tomography is used to link the field, in concept, to other processes that infer the internal characteristics of an object from external… … Wikipedia
Network congestion avoidance — is a process used in computer networks to avoid congestion.The fundamental problem is that all network resources are limited, including router processing time and link throughput. Eg.: *today s (2006) Wireless LAN effective bandwidth throughput… … Wikipedia
Network utilities — are small software utilities designed to analyze and configure various aspects of computer networks. The majority of them originated on Unix systems, but several later ports to other operating systems exist. The most common tools (found on most… … Wikipedia
Network Agility — is an architectural discipline for computer networking. It can be defined as: The ability of network software and hardware to automatically control and configure itself and other network assets across any number of devices on a network. With… … Wikipedia
Network neutrality — This article is about the general principle of network neutrality. For its specific application to Canada, see Network neutrality in Canada. For its application to the U.S., see Network neutrality in the United States. Network Neutrality Related… … Wikipedia
Network tap — A network tap is a hardware device which provides a way to access the data flowing across a computer network. In many cases, it is desirable for a third party to monitor the traffic between two points in the network. If the network between points … Wikipedia
Network analysis (electrical circuits) — Linear Network Analysis Elements … Wikipedia
Network congestion — In data networking and queueing theory, network congestion occurs when a link or node is carrying so much data that its quality of service deteriorates. Typical effects include queueing delay, packet loss or the blocking of new connections. A… … Wikipedia
Network operations center — Overview of a typical NOC. Lot of monitors (front), backbone overview (back) and news broadcast on TV set (right) A network operations center (or NOC, pronounced like the word knock ) is one or more locations from which control is exercised over… … Wikipedia