English | Swedish |
AppleTalk Protocol suite | AppleTalk Protocol Suite (The set of network protocols on which AppleTalk network architecture is based. The AppleTalk Protocol is installed with Services for Macintosh to help users access resources on a network) |
Authenticated Internet Protocol | Autentiserat Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements) |
bandwidth allocation protocol | Bandwidth Allocation Protocol (A Point-to-Point Protocol (PPP) control protocol that is used on a multiprocessing connection to dynamically add and remove links) |
bootstrap protocol | bootstrap-protokoll (A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service) |
control protocol plug-in | plugin-program för kontrollprotokoll (A type of plug-in that enables a Windows Media server to communicate with clients and other servers through different network protocols) |
Digest Access protocol | Digest Access Protocol (A lightweight authentication protocol for parties involved in communications that are based on Hypertext Transfer Protocol (HTTP) or Simple Authentication and Security Layer (SASL)) |
DRT protocol | DRT-protokoll (The protocol used to exchange cache information and find routes in the DRT mesh) |
IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices | IEEE-standardprotokoll för autentisering i värdbilagor för tillfälliga lagringsenheter (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments) |
Internet Protocol multicasting | Internet Protocol-multicast (The extension of local area network multicasting technology to a TCP/IP network. Hosts send and receive multicast datagrams, the destination fields of which specify IP host group addresses rather than individual IP addresses. A host indicates that it is a member of a group by means of the Internet Group Management Protocol (IGMP)) |
Kerberos V5 authentication protocol | autentiseringsprotokollet Kerberos V5 (An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPsec) can use the Kerberos protocol for authentication) |
Layer Two Tunneling Protocol An industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. For IP networks, L2TP traffic is sent as User Datagram Protocol (UDP) messages. In Microsoft operating systems, L2TP is used in conjunction with Internet Protocol security (IPSec) as a virtual private network (VPN) technology to provide remote access or router-to-router VPN connections. L2TP is described in RFC 2661 | L2TP (Layer Two Tunneling Protocol) |
logical link control and adaptation protocol | logisk länkkontroll och adaptionsprotokoll (A protocol used in personal wireless network applications that provides connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability, segmentation and reassembly operation, and group abstractions) |
network protocol | nätverksprotokoll (A set of rules and parameters that defines and enables communication through a network) |
Online Certificate Status Protocol responder | OCSP Online Certificate Status Protocol Responder (A computer on which the Online Responder service and Online Responder web proxy are running) |
Post Office Protocol version 3 | Post Office Protocol 3 (An Internet standard protocol that allows a user to download e-mail from his or her inbox on a server to the client computer where messages are managed. This protocol works well for computers that are unable to maintain a continuous connection to a server) |
PXE protocol | PXE-protokoll (An extension to the DHCP protocol that enables information to be sent to network-bootable systems and enables these systems to find RIS servers) |
security protocol | säkerhetsprotokoll (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system) |
server-to-server protocol | server-till-server-protokoll (An authentication protocol between two servers or services) |
S2S protocol | S-till-S-protokoll (An authentication protocol between two servers or services) |
WebSocket protocol | WebSocket-protokoll (A feature of Internet Information Services (IIS) that lets the server establish a long-running, full-duplex, bidirectional TCP connection to the client and that lets the server push data to the client) |