-
1 authentication method
"The authentication protocol (such as CHAP, PAP, EAP etc.) used when authenticating access to resources on a network." -
2 discovery method
A procedure that detects and acquires information about resources on the network. -
3 direct synchronization
A method used to synchronize data between replicas that are connected directly to the local area network and are available through shared network folders. -
4 Advanced Program-to-Program Communication
"An IBM Systems Network Architecture communications method that uses the LU 6.2 protocol to establish, manage, and terminate network communication between programs in a distributed computing environment."English-Arabic terms dictionary > Advanced Program-to-Program Communication
-
5 APPC
"An IBM Systems Network Architecture communications method that uses the LU 6.2 protocol to establish, manage, and terminate network communication between programs in a distributed computing environment." -
6 manual caching
A method of manually designating network files and folders so they are stored on a user's hard disk and accessible when the user is not connected to the network. -
7 affinity
"For Network Load Balancing, the method used to associate client requests to cluster hosts. When no affinity is specified, all network requests are load balanced across the cluster without respect to their source. Affinity is implemented by directing all client requests from the same IP address to the same cluster host." -
8 Wi-Fi Protected Access
A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network. -
9 WPA
A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network. -
10 push-button configuration
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
11 PBC
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
12 NetBEUI
"A network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. NetBEUI can use Token Ring source routing as its only method of routing. NetBEUI is the Microsoft implementation of the NetBIOS standard." -
13 NetBIOS Extended User Interface
"A network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. NetBEUI can use Token Ring source routing as its only method of routing. NetBEUI is the Microsoft implementation of the NetBIOS standard."English-Arabic terms dictionary > NetBIOS Extended User Interface
-
14 streaming
"A method of delivering digital media across a network in a continuous flow. The digital media is played by client software as it is received. Typically, streaming makes it unnecessary for users to download a file before playing it." -
15 NAP enforcement server
"A component of the NAP architecture that enforces restricted network access for noncompliant NAP clients. Depending on the NAP enforcement method, the NAP enforcement server can be a component of a NAP enforcement point." -
16 NAP ES
"A component of the NAP architecture that enforces restricted network access for noncompliant NAP clients. Depending on the NAP enforcement method, the NAP enforcement server can be a component of a NAP enforcement point." -
17 encapsulation
The method used to pass data from one protocol over a network within a different protocol. Data from one protocol is wrapped with the header of a different protocol. Encapsulation is described in RFC 1483. -
18 Digest authentication
"An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems."
См. также в других словарях:
Network synthesis filters — Network synthesis is a method of designing signal processing filters. It has produced several important classes of filter including the Butterworth filter, the Chebyshev filter and the Elliptic filter. It was originally intended to be applied to… … Wikipedia
Network planning and design — is an iterative process, encompassing topological design, network synthesis, and network realization, and is aimed at ensuring that a new network or service meets the needs of the subscriber and operator.[1] The process can be tailored according… … Wikipedia
Network Improvement — is a large subject that encompasses all actions that can be taken to improve computer or digital networks. Network Traffic Control A network traffic controller is a mechanism to control the flow of traffic on the network. The controller may be… … Wikipedia
Network-centric emergency notification — is a method for turning an internet protocol (IP) network and its connected devices into a highly effective alarm system in times of emergency. Emergency alerts are created in a web based console, and once triggered, are disseminated across the… … Wikipedia
Network coding — is a technique where, instead of simply relaying the packets of information they receive, the nodes of a network will take several packets and combine them together for transmission. This can be used to attain the maximum possible information… … Wikipedia
Network performance — refers to the service quality of a telecommunications product as seen by the customer. It should not be seen merely as an attempt to get more through the network. The following list gives examples of Network Performance measures for a circuit… … Wikipedia
Network-Centric Service-Oriented Enterprise (NCSOE) — is a new generation enterprise capable of conducting collaboration and management of internal and external information. Using Network Centric Enterprise Services (NCES) , the enterprise can now enforce information and decision superiority in a… … Wikipedia
Network neutrality in Canada — Network Neutrality Related issues and topics Automatic telephone exchange Data discrimination End to end principle Internet Protocol Tiered Internet Bandwidth Throttling … Wikipedia
Network congestion avoidance — is a process used in computer networks to avoid congestion.The fundamental problem is that all network resources are limited, including router processing time and link throughput. Eg.: *today s (2006) Wireless LAN effective bandwidth throughput… … Wikipedia
Network booting — is the process of booting a computer from a network rather than a local drive. This method of booting can be used by routers, diskless workstations and centrally managed computers (thin clients) such as public computers at libraries and schools.… … Wikipedia
Method & Red — Method Red Method Red est une série américaine diffusée par la Fox Broadcasting Network en 2004. Les acteurs principaux sont les rappeurs Method Man et Redman. La série a été arrêtée au bout de 9 épisodes, au lieu des 13 initialement prévus, en… … Wikipédia en Français