DictionaryForumContacts

Terms for subject Microsoft containing Protocols | all forms
EnglishFinnish
Address Resolution Protocolosoitteentulkintaprotokolla (In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned Internet Protocol version 4 (IPv4) address to its physical hardware or media access control (MAC layer address). In asynchronous transfer mode (ATM), ARP is used two different ways. For classical IPv4 over ATM (CLIP), ARP is used to resolve addresses to ATM hardware addreses. For ATM LAN emulation (LANE), ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses)
AppleTalk Protocol suiteAppleTalk-protokollasetti (The set of network protocols on which AppleTalk network architecture is based. The AppleTalk Protocol is installed with Services for Macintosh to help users access resources on a network)
application protocolsovellusprotokolla (A protocol that normally resides on top of the transport layer. For example, HTTP, TELNET, FTP and SMTP are all application protocols)
Authenticated Internet ProtocolTodennettu IP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements)
bootstrap protocolBOOTP-protokolla (A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service)
control protocol plug-inohjausprotokollalaajennus (A type of plug-in that enables a Windows Media server to communicate with clients and other servers through different network protocols)
DRT protocolDRT-protokolla (The protocol used to exchange cache information and find routes in the DRT mesh)
Dynamic Host Configuration ProtocolDHCP (A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network)
Health Certificate Enrollment ProtocolKuntovarmenteen rekisteröintiprotokolla (The protocol used by the NAP agent to request health certificates from the Health Registration Authority (HRA) and to prove the health of a client computer)
Host Credentials Authorization ProtocolIsännän tunnistetietojen todennusprotokolla (A protocol used by Access Control Server (ACS) to send and receive statements of health to and from other NAP infrastructure components. HCAP is installed on NPS so that it can function with Access Control Server (ACS))
Hypertext Transfer ProtocolHTTP (The Internet protocol used to deliver information over the World Wide Web)
Internet Control Message ProtocolICMP (A required maintenance protocol in the TCP/IP suite that reports errors and allows simple connectivity. ICMP is used by the Ping tool to perform TCP/IP troubleshooting)
Internet Group Management ProtocolIGMP (A protocol used by Internet Protocol version 4 (IPv4) hosts to report their multicast group memberships to any immediately neighboring multicast routers)
Internet ProtocolIP-protokolla (A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets)
Internet Protocol multicastingIP-monilähetys (The extension of local area network multicasting technology to a TCP/IP network. Hosts send and receive multicast datagrams, the destination fields of which specify IP host group addresses rather than individual IP addresses. A host indicates that it is a member of a group by means of the Internet Group Management Protocol (IGMP))
Internet Protocol securityIP-suojaus (A set of industry-standard, cryptography-based services and protocols that help to protect data over a network)
Internet Protocol version 4IPv4 (An Internet Protocol that has 32-bit source and destination addresses. IPv4 is the predecessor of IPv6)
Kerberos V5 authentication protocolKerberos V5 -todennusprotokolla (An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPsec) can use the Kerberos protocol for authentication)
Lightweight Directory Access ProtocolLDAP-protokolla (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3)
Lightweight Directory Access ProtocolLDAP-protokolla (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3)
network protocolverkkoprotokolla (A set of rules and parameters that defines and enables communication through a network)
NWLink IPX/SPX/NetBIOS Compatible Transport ProtocolNWLink IPX/SPX/NetBIOS -yhteensopiva kuljetusprotokolla (The Microsoft implementation of the Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) protocol used on NetWare networks. NWLink allows connectivity between Windows-based computers and NetWare networks running IPX/SPX. NWLink also provides network basic input/output system (NetBIOS) functionality and the Routing Information Protocol (RIP))
Peer Name Resolution ProtocolVertaiskoneen nimenselvitysprotokolla (A standard set of formats and procedures which enables secure and dynamic publication, registration and resolution of computer names and IP addresses including the ability to register multiple names on a single computer, multiple computers to a single name, and have names registered by applications)
Point-to-Point Protocol over EthernetPoint-to-Point over Ethernet (A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server)
Point-to-Point Tunneling ProtocolPPTP (Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637)
Post Office Protocol version 3POP3 (An Internet standard protocol that allows a user to download e-mail from his or her inbox on a server to the client computer where messages are managed. This protocol works well for computers that are unable to maintain a continuous connection to a server)
PXE protocolPXE-protokolla (An extension to the DHCP protocol that enables information to be sent to network-bootable systems and enables these systems to find RIS servers)
Real-Time Streaming ProtocolRTSP (A network protocol, defined in RFC 2326, for controlling one or more digital media streams or a presentation (the aggregate of related media streams))
Remote Desktop ProtocolRDP-etäkäyttöprotokolla (A proprietary protocol to provide remote display and input capabilities over network connections for Windows®-based applications between two computers)
Secure Hypertext Transfer ProtocolHTTPS-protokolla (A protocol that provides a secure Hypertext Transfer Protocol (HTTP) connection)
security protocolsuojausprotokolla (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system)
server-to-server protocolpalvelimesta-palvelimeen-protokolla (An authentication protocol between two servers or services)
S2S protocolS2S-protokolla (An authentication protocol between two servers or services)
Transmission Control Protocol/Internet ProtocolTCP/IP-protokolla (A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic)
Voice over Internet ProtocolVoIP-protokolla (The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet)
WebSocket protocolWebSocket-protokolla (A feature of Internet Information Services (IIS) that lets the server establish a long-running, full-duplex, bidirectional TCP connection to the client and that lets the server push data to the client)

Get short URL