Name Binding Protocol - определение. Что такое Name Binding Protocol
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое Name Binding Protocol - определение

COMPUTER NETWORK PROTOCOL SUITE
Apple Address Resolution Protocol; AARP probe packets; AARP probe packet; AppleTalk Address Resolution Protocol probe packet; Apple Address Resolution Protocol probe packet; Apple Address Resolution Protocol probe packets; AppleTalk Address Resolution Protocol probe packets; AppleTalk address resolution protocol; AppleTalk Transport Protocol; AppleTalk Address Resolution Protocol; AppleTalk Session Protocol; Name Binding Protocol; Routing Table Maintenance Protocol; TokenTalk; EtherTalk; AppleTalk Echo Protocol; Appletalk; Zone Information Protocol; Apple talk; AppleNet; AppleBus
  • Farallon PhoneNET adapter
Найдено результатов: 8132
Name binding         
COMPUTER PROGRAMMING CONSTRAINT ALLOWING TO BIND A SYMBOLIC NAME TO AN OBJECT, VALID IN A WELL-DEFINED SCOPE, AND TO RESOLVE IT AS A REFERENCE BY A STATIC OR DYNAMIC LINKING PROCESS
Static binding; Deep binding; Shallow bindings; Dynamic polymorphism; Binding time; LateBinding; Early-bound; Late-bound; Late static binding; Compile-time binding
In programming languages, name binding is the association of entities (data and/or code) with identifiers. An identifier bound to an object is said to reference that object.
ARPA Host Name Server Protocol         
LONG-OBSOLETE HOSTNAME LOOKUP PROTOCOL
DARPA Host Name Server Protocol; IEN 116; IEN116; Tnamed
The ARPA Host Name Server Protocol (NAMESERVEROFFICIAL INTERNET PROTOCOLS (see "IEN 116" at top of page 31)), is an obsolete network protocol used in translating a host name to an Internet address. IANA Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) port 42 for NAMESERVER; this port is more commonly used by the Windows Internet Name Service (WINS) on Microsoft operating systems.
Protocol (science)         
PREDEFINED WRITTEN PROCEDURAL METHOD IN THE DESIGN AND IMPLEMENTATION OF EXPERIMENTS IN NATURAL SCIENCES
Clinical trial protocol; Clinical protocol; Clinical protocols; Protocol (Natural Sciences); Scientific protocol; Scientific protocal; Protocol (natural sciences); Protocol (Science); Lab protocol
In natural and social science research, a protocol is most commonly a predefined procedural method in the design and implementation of an experiment. Protocols are written whenever it is desirable to standardize a laboratory method to ensure successful replication of results by others in the same laboratory or by other laboratories.
Protocol (diplomacy)         
ETIQUETTE OF DIPLOMACY AND AFFAIRS OF STATE OR INTERNATIONAL AGREEMENT THAT SUPPLEMENTS OR AMENDS A TREATY
Diplomatic protocol; EU protocol; Protocol Officer
In international politics, protocol is the etiquette of diplomacy and [of state]. It may also refer to an international agreement that supplements or amends a treaty.
Communication protocol         
  • Figure 2. The TCP/IP model or Internet layering scheme and its relation to some common protocols.
  • Figure 3. Message flows using a protocol suite. Black loops show the actual messaging loops, red loops are the effective communication between layers enabled by the lower layers.
  • Figure 5: Protocol and software layering. The software modules implementing the protocols are represented by cubes. The information flow between the modules is represented by arrows. The (top two horizontal) red arrows are virtual. The blue lines mark the layer boundaries.
SYSTEM FOR EXCHANGING MESSAGES BETWEEN COMPUTING SYSTEMS
Network protocol design principles; Data transmission protocol; Networking protocol; Protocol (computing); Protocol (computer science); Protocol (communication); Protocol (communications); Network protocols; Communication protocols; Communications protocols; Internetwork protocol; Protocol (networks); Protocol (network); Networking protocols; Protocols (computing); Protocol set; Data communication protocol; Protocol testing; Network Protocols; Binary protocol; Protocol (computer); Protocol versioning; Computer protocol; Protocol layer; Network protocol; Protocol design; Internetworking Protocol; Text-based protocol; Plain text protocol; Web protocol; Communications protocol; Universal protocols; Telecommunication protocol; Telecommunications protocol; Transmission protocol; History of communication protocols; Binary protocols; Wire image (networking)
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchronization of communication and possible error recovery methods.
binding site         
  • [[Activation energy]] is decreased in the presence of an enzyme to catalyze the reaction.
  • Methotrexate inhibits dihydrofolate reductase by outcompeting the substrate folic acid. Binding site in blue, inhibitor in green, and substrate in black.
  • Competitive and noncompetitive enzyme binding at active and regulatory (allosteric) site respectively.
  • Sigmoidal versus hyperbolic binding patterns demonstrate cooperative and noncooperative character of enzymes.
REGION ON A PROTEIN OR PIECE OF DNA OR RNA TO WHICH LIGANDS MAY FORM A CHEMICAL INTERACTION
Binding sites; Binding site (biology); Enzyme binding site; Receptor saturation; Binding saturation
¦ noun Biochemistry a location on a macromolecule or cellular structure at which chemical interaction with a specific active substance takes place.
Cryptographic protocol         
PROTOCOL THAT PERFORMS A SECURITY-RELATED FUNCTION
Cyptographic protocol; Security protocol; Protocol (cryptography); Cryptographic protocols; Cryptographic token; Encryption protocol; Encryption protocols; Encrypted connection; Secure connection; Cryptographic protocol analysis; Formal verification of cryptographic protocols
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol describes how the algorithms should be used and includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program.
protocol layer         
  • Figure 2. The TCP/IP model or Internet layering scheme and its relation to some common protocols.
  • Figure 3. Message flows using a protocol suite. Black loops show the actual messaging loops, red loops are the effective communication between layers enabled by the lower layers.
  • Figure 5: Protocol and software layering. The software modules implementing the protocols are represented by cubes. The information flow between the modules is represented by arrows. The (top two horizontal) red arrows are virtual. The blue lines mark the layer boundaries.
SYSTEM FOR EXCHANGING MESSAGES BETWEEN COMPUTING SYSTEMS
Network protocol design principles; Data transmission protocol; Networking protocol; Protocol (computing); Protocol (computer science); Protocol (communication); Protocol (communications); Network protocols; Communication protocols; Communications protocols; Internetwork protocol; Protocol (networks); Protocol (network); Networking protocols; Protocols (computing); Protocol set; Data communication protocol; Protocol testing; Network Protocols; Binary protocol; Protocol (computer); Protocol versioning; Computer protocol; Protocol layer; Network protocol; Protocol design; Internetworking Protocol; Text-based protocol; Plain text protocol; Web protocol; Communications protocol; Universal protocols; Telecommunication protocol; Telecommunications protocol; Transmission protocol; History of communication protocols; Binary protocols; Wire image (networking)
<networking> The software and/or hardware environment of two or more communications devices or computers in which a particular network protocol operates. A network connection may be thought of as a set of more or less independent protocols, each in a different layer or level. The lowest layer governs direct host-to-host communication between the hardware at different hosts; the highest consists of user application programs. Each layer uses the layer beneath it and provides a service for the layer above. Each networking component hardware or software on one host uses protocols appropriate to its layer to communicate with the corresponding component (its "peer") on another host. Such layered protocols are sometimes known as peer-to-peer protocols. The advantages of layered protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication systems. Examples of layered protocols are TCP/IP's five layer protocol stack and the OSI seven layer model. (1997-05-05)
Binding site         
  • [[Activation energy]] is decreased in the presence of an enzyme to catalyze the reaction.
  • Methotrexate inhibits dihydrofolate reductase by outcompeting the substrate folic acid. Binding site in blue, inhibitor in green, and substrate in black.
  • Competitive and noncompetitive enzyme binding at active and regulatory (allosteric) site respectively.
  • Sigmoidal versus hyperbolic binding patterns demonstrate cooperative and noncooperative character of enzymes.
REGION ON A PROTEIN OR PIECE OF DNA OR RNA TO WHICH LIGANDS MAY FORM A CHEMICAL INTERACTION
Binding sites; Binding site (biology); Enzyme binding site; Receptor saturation; Binding saturation
In biochemistry and molecular biology, a binding site is a region on a macromolecule such as a protein that binds to another molecule with specificity. The binding partner of the macromolecule is often referred to as a ligand.
Token Binding         
IS A PROPOSED STANDARD FOR A TRANSPORT LAYER SECURITY (TLS) EXTENSION
Token Binding Protocol
Token Binding is a proposed standard for a Transport Layer Security (TLS) extension that aims to increase TLS security by using cryptographic certificates on both ends of the TLS connection. Current practice often depends on bearer tokens, which may be lost or stolen.

Википедия

AppleTalk

AppleTalk is a discontinued proprietary suite of networking protocols developed by Apple Computer for their Macintosh computers. AppleTalk includes a number of features that allow local area networks to be connected with no prior setup or the need for a centralized router or server of any sort. Connected AppleTalk-equipped systems automatically assign addresses, update the distributed namespace, and configure any required inter-networking routing.

AppleTalk was released in 1985 and was the primary protocol used by Apple devices through the 1980s and 1990s. Versions were also released for the IBM PC and compatibles and the Apple IIGS. AppleTalk support was also available in most networked printers (especially laser printers), some file servers, and a number of routers.

The rise of TCP/IP during the 1990s led to a reimplementation of most of these types of support on that protocol, and AppleTalk became unsupported as of the release of Mac OS X v10.6 in 2009. Many of AppleTalk's more advanced autoconfiguration features have since been introduced in Bonjour, while Universal Plug and Play serves similar needs.