Romanian | English |
comutare protocol | protocol rollover (A procedure that enables switching from one protocol to another when a Windows Media server fails to make a connection using a particular protocol) |
control legătură logică și protocol de adaptare | logical link control and adaptation protocol (A protocol used in personal wireless network applications that provides connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability, segmentation and reassembly operation, and group abstractions) |
insert cu protocol de control | control protocol plug-in (A type of plug-in that enables a Windows Media server to communicate with clients and other servers through different network protocols) |
lightweight directory access protocol | Lightweight Directory Access Protocol (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3) |
Post Office Protocol versiunea 3 | Post Office Protocol version 3 (An Internet standard protocol that allows a user to download e-mail from his or her inbox on a server to the client computer where messages are managed. This protocol works well for computers that are unable to maintain a continuous connection to a server) |
Protocol de alocare a lărgimii de bandă | bandwidth allocation protocol (A Point-to-Point Protocol (PPP) control protocol that is used on a multiprocessing connection to dynamically add and remove links) |
Protocol de configurare dinamică a gazdei | Dynamic Host Configuration Protocol (A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network) |
Protocol de control al transmisiei | Transmission Control Protocol (The protocol within TCP/IP that governs the breakup of data messages into packets to be sent via IP, and the reassembly and verification of the complete messages from packets received by IP) |
Protocol de control al transmisiei/Protocol internet | Transmission Control Protocol/Internet Protocol (A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic) |
Protocol de control apelare inversă | Callback Control Protocol (The Network Control Protocol that negotiates the use of callback over PPP links) |
Protocol de control legătură | Link Control Protocol (A PPP control protocol that negotiates link and PPP parameters to dynamically configure the data-link layer of a PPP connection) |
Protocol de tunel pe nivel 2 | Layer Two Tunneling Protocol An industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. For IP networks, L2TP traffic is sent as User Datagram Protocol (UDP) messages. In Microsoft operating systems, L2TP is used in conjunction with Internet Protocol security (IPSec) as a virtual private network (VPN) technology to provide remote access or router-to-router VPN connections. L2TP is described in RFC 2661 (L2TP) |
Protocol de tunel punct la punct | Point-to-Point Tunneling Protocol (Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637) |
protocol DRT | DRT protocol (The protocol used to exchange cache information and find routes in the DRT mesh) |
Protocol IKE | IKE (A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec)) |
Protocol informații de rutare | Routing Information Protocol (An industry standard, distance vector routing protocol used in small- to medium-sized Internet Protocol (IP) and Internetwork Packet Exchange (IPX) internetworks) |
Protocol internet | Internet Protocol (A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets) |
Protocol Internet Key Exchange | Internet Key Exchange (A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec)) |
Protocol Internet Message Access | Internet Message Access Protocol (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer) |
protocol IP versiunea 6 | Internet Protocol version 6 (A revised version of the Internet Protocol (IP) designed primarily to address growth on the Internet. IPng is compatible with, but an evolutionary successor to, the current version of IP, IPv4 (IP version 4), and was approved as a draft standard in 1998 by the IETF (Internet Engineering Task Force). It offers several improvements over IPv4 including a quadrupled IP address size (from 32 bits to 128 bits), expanded routing capabilities, simplified header formats, improved support for options, and support for quality of service, authentication, and privacy) |
protocol IPsec | Internet Protocol security (A set of industry-standard, cryptography-based services and protocols that help to protect data over a network) |
protocol Online Certificate Status Protocol | Online Certificate Status Protocol (A protocol that allows real-time validation of a certificate's status by having the CryptoAPI make a call to an OCSP responder and the OCSP responder providing an immediate validation of the revocation status for the presented certificate. Typically, an OCSP responder responds with the revocation status check request based on the certificate revocation list (CRL) or other forms of revocation status it retrieves from the certification authorities) |
protocol pentru comenzi de inițiere a încărcării sistemului | bootstrap protocol (A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service) |
Protocol PNRP | PNRP (A standard set of formats and procedures which enables secure and dynamic publication, registration and resolution of computer names and IP addresses including the ability to register multiple names on a single computer, multiple computers to a single name, and have names registered by applications) |
Protocol punct la punct | Point-to-Point Protocol (A set of industry-standard framing and authentication protocols that are included with Windows to ensure interoperability with other remote access software. PPP negotiates configuration parameters for multiple layers of the Open Systems Interconnection (OSI) model. The Internet standard for serial communications, PPP defines how data packets are exchanged with other Internet-based systems using a modem connection. PPP is documented in RFC 1661) |
protocol PXE | PXE protocol (An extension to the DHCP protocol that enables information to be sent to network-bootable systems and enables these systems to find RIS servers) |
Protocol Remote Desktop | Remote Desktop Protocol (A proprietary protocol to provide remote display and input capabilities over network connections for Windows®-based applications between two computers) |
protocol SCP | Simple Control Protocol (A lightweight protocol that enables small devices to communicate with each other over low-speed networks) |
protocol server-la-server | server-to-server protocol (An authentication protocol between two servers or services) |
Protocol simplu de acces la obiecte | Simple Object Access Protocol (A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging) |
protocol SIP | Session Initiation Protocol (A standard signaling protocol for establishing multi-media communications sessions between two or more users over an IP network) |
protocol S2S | S2S protocol (An authentication protocol between two servers or services) |
protocol TLS | Transport Layer Security (A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol) |
Protocol transfer fișiere | File Transfer Protocol (A member of the TCP/IP suite of protocols, used to copy files between two computers on the Internet. Both computers must support their respective FTP roles: one must be an FTP client and the other an FTP server) |
Protocol VoIP | Voice over Internet Protocol (The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet) |
Protocol WEP | Wired Equivalent Privacy (An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options) |
Real Time Streaming Protocol | Real-Time Streaming Protocol (A network protocol, defined in RFC 2326, for controlling one or more digital media streams or a presentation (the aggregate of related media streams)) |