-
61 LAN emulation
"A group of software components that allows asynchronous transfer mode (ATM) to work with legacy networks and applications. With LANE, you can run your traditional local area network (LAN)-aware applications and protocols on an ATM network without modification. LANE makes the ATM protocol layers appear to be an Ethernet or Token Ring LAN to overlying protocols and applications. LANE provides an intermediate step between fully exploiting ATM and not using ATM at all." -
62 Advanced Program-to-Program Communication
"An IBM Systems Network Architecture communications method that uses the LU 6.2 protocol to establish, manage, and terminate network communication between programs in a distributed computing environment."English-Arabic terms dictionary > Advanced Program-to-Program Communication
-
63 APPC
"An IBM Systems Network Architecture communications method that uses the LU 6.2 protocol to establish, manage, and terminate network communication between programs in a distributed computing environment." -
64 confidentiality
"A basic security function of cryptography that ensures that only authorized users can read or use confidential or secret information. Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network traffic and intercept valuable proprietary information. For example, an Internet Protocol security service ensures that a message is disclosed only to intended recipients by encrypting the data."السرّية -
65 management console
A network-enabled host running Simple Network Management Protocol (SNMP) management software. This software requests information from SNMP agents. -
66 management system
A network-enabled host running Simple Network Management Protocol (SNMP) management software. This software requests information from SNMP agents. -
67 superscope
"An administrative grouping feature that supports a DHCP server's ability to use more than scope for each physical interface and subnet. Superscopes are useful under the following conditions: If more DHCP clients must be added to a network than were originally planned, if an Internet Protocol (IP) network is renumbered, or if two or more DHCP servers are configured to provide scope redundancy and fault-tolerant design DHCP service for a single subnet. Each superscope can contain one or more member scopes (also known as ""child scopes"")." -
68 iSCSI initiator
A logical entity that enables a server to communicate with an iSCSI device over an Internet Protocol (IP) network. Each iSCSI initiator can have one or more network adapters through which communication is established. -
69 absolute URL
"The full Internet address of a page or other World Wide Web resource. The absolute URL includes a protocol, such as ""http,"" network location, and optional path and file name — for example, http://example.microsoft.com/.""مطلق ""URL""" -
70 ACK
"A message transmitted to indicate that data has been received correctly. The Transmission Control Protocol (TCP) requires that the recipient acknowledge successful receipt of data. Such acknowledgments (ACKs) generate additional network traffic, decreasing the rate at which data passes but increasing reliability. To reduce the impact on performance, most hosts send an acknowledgment for every other segment or when a specified time interval has passed." -
71 acknowledgement
"A message transmitted to indicate that data has been received correctly. The Transmission Control Protocol (TCP) requires that the recipient acknowledge successful receipt of data. Such acknowledgments (ACKs) generate additional network traffic, decreasing the rate at which data passes but increasing reliability. To reduce the impact on performance, most hosts send an acknowledgment for every other segment or when a specified time interval has passed." -
72 agent
An application that runs on a Simple Network Management Protocol (SNMP) managed device. The agent application is the object of management activities. A computer running SNMP agent software is also sometimes referred to as an agent. -
73 authentication method
"The authentication protocol (such as CHAP, PAP, EAP etc.) used when authenticating access to resources on a network." -
74 broadcast address
An Internet Protocol version 4 (IPv4) address that is destined for all hosts on a particular network segment. -
75 NAT
An Internet Protocol (IP) translation process that allows a network with private addresses to access information on the Internet. -
76 ODS library
A set of C functions that makes an application a server. ODS library calls respond to requests from a client in a client/server network. Also manages the communication and data between the client and the server. ODS library follows the tabular data stream (TDS) protocol. -
77 peer
Any of the devices on a layered communications network that operate on the same protocol level. -
78 PPPoE
"A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server." -
79 PPTP
"Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637." -
80 RADIUS
A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link.
См. также в других словарях:
network protocol — tinklo protokolas statusas T sritis informatika apibrėžtis ↑Protokolas, nustatantis duomenų mainų tarp dviejų arba daugiau tinkle esančių kompiuterių formatus ir procedūras, visuma. Pagal ↑lygmeninio tinklų modelio schemą – trečiojo lygmens… … Enciklopedinis kompiuterijos žodynas
network protocol — method of communication between computers in a local area network … English contemporary dictionary
List of network protocol stacks — Computer networks may be implemented using a variety of protocol stack architectures, computer buses or combinations of media and protocol layers, incorporating one or more of:* ARCNET * AppleTalk * ATM * Bluetooth * DECnet * Ethernet * FDDI *… … Wikipedia
TV Network Protocol — The TV Network Protocol or TVNP as it is more commonly referred to is an open network protocol developed to enable CCTV systems from any manufacturer to be integrated into an existing CCTV network. It provides high levels of support for audio… … Wikipedia
Connectionless Network Protocol — (CLNP) ist ein Netzwerkprotokoll und wird in RFC 994 und ISO 8473 spezifiziert. Es arbeitet auf der Vermittlungsschicht nach dem OSI Modell und bietet grundsätzlich die gleichen Dienste wie das Internet Protocol (IP) an. Es ist jedoch für den… … Deutsch Wikipedia
Connection-Oriented Network Protocol — Pile de protocoles 7. Application 6. Présentation 5. Session 4. T … Wikipédia en Français
ConnectionLess Network Protocol — Pile de protocoles 7 • Application 6 • Présentation 5 • Session 4 • … Wikipédia en Français
Connectionless Network Protocol — Pile de protocoles 7. Application 6. Présentation 5. Session 4. T … Wikipédia en Français
Microcom Network Protocol — [Abk. MNP, dt. »Netzwerkprotokoll von (der Firma) Microcom«], ein von Microcom Inc. entwickeltes, asynchrones Verfahren zur Fehlerkorrektur und Datenkompression bei Modemverbindungen. Die Stufen MNP 1 bis MNP 4 dienen der Fehlerkorrektur, MNP 5 … Universal-Lexikon
Order One Network Protocol — The OrderOne MANET Routing Protocol is an algorithm for computers communicating by digital radio in a mesh network to find each other, and send messages to each other along a reasonably efficient path. It was designed for, and promoted as working … Wikipedia
ExOR (wireless network protocol) — Extremely Opportunistic Routing (ExOR) is a combination of routing protocol and media access control for a wireless ad hoc network, invented by Sanjit Biswas and Robert Morris of the MIT Artificial Intelligence Laboratory, and described in a 2005 … Wikipedia