DictionaryForumContacts

Terms for subject Microsoft containing Protocols | all forms
EnglishSwedish
AppleTalk Protocol suiteAppleTalk Protocol Suite (The set of network protocols on which AppleTalk network architecture is based. The AppleTalk Protocol is installed with Services for Macintosh to help users access resources on a network)
Authenticated Internet ProtocolAutentiserat Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements)
bandwidth allocation protocolBandwidth Allocation Protocol (A Point-to-Point Protocol (PPP) control protocol that is used on a multiprocessing connection to dynamically add and remove links)
bootstrap protocolbootstrap-protokoll (A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service)
control protocol plug-inplugin-program för kontrollprotokoll (A type of plug-in that enables a Windows Media server to communicate with clients and other servers through different network protocols)
Digest Access protocolDigest Access Protocol (A lightweight authentication protocol for parties involved in communications that are based on Hypertext Transfer Protocol (HTTP) or Simple Authentication and Security Layer (SASL))
DRT protocolDRT-protokoll (The protocol used to exchange cache information and find routes in the DRT mesh)
IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage DevicesIEEE-standardprotokoll för autentisering i värdbilagor för tillfälliga lagringsenheter (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments)
Internet Protocol multicastingInternet Protocol-multicast (The extension of local area network multicasting technology to a TCP/IP network. Hosts send and receive multicast datagrams, the destination fields of which specify IP host group addresses rather than individual IP addresses. A host indicates that it is a member of a group by means of the Internet Group Management Protocol (IGMP))
Kerberos V5 authentication protocolautentiseringsprotokollet Kerberos V5 (An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPsec) can use the Kerberos protocol for authentication)
Layer Two Tunneling Protocol An industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. For IP networks, L2TP traffic is sent as User Datagram Protocol (UDP) messages. In Microsoft operating systems, L2TP is used in conjunction with Internet Protocol security (IPSec) as a virtual private network (VPN) technology to provide remote access or router-to-router VPN connections. L2TP is described in RFC 2661L2TP (Layer Two Tunneling Protocol)
logical link control and adaptation protocollogisk länkkontroll och adaptionsprotokoll (A protocol used in personal wireless network applications that provides connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability, segmentation and reassembly operation, and group abstractions)
network protocolnätverksprotokoll (A set of rules and parameters that defines and enables communication through a network)
Online Certificate Status Protocol responderOCSP Online Certificate Status Protocol Responder (A computer on which the Online Responder service and Online Responder web proxy are running)
Post Office Protocol version 3Post Office Protocol 3 (An Internet standard protocol that allows a user to download e-mail from his or her inbox on a server to the client computer where messages are managed. This protocol works well for computers that are unable to maintain a continuous connection to a server)
PXE protocolPXE-protokoll (An extension to the DHCP protocol that enables information to be sent to network-bootable systems and enables these systems to find RIS servers)
security protocolsäkerhetsprotokoll (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system)
server-to-server protocolserver-till-server-protokoll (An authentication protocol between two servers or services)
S2S protocolS-till-S-protokoll (An authentication protocol between two servers or services)
WebSocket protocolWebSocket-protokoll (A feature of Internet Information Services (IIS) that lets the server establish a long-running, full-duplex, bidirectional TCP connection to the client and that lets the server push data to the client)

Get short URL