answersLogoWhite

0

ll

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What is IMAP Internet Message Access Protocol is a mail retrieval protocol that was developed as a more sophisticated alternative to?

IMAP is short for Internet Message Access Protocol. IMAP is a mail retrieval protocol that was developed as a more sophisticated alternative to POP3 . POP3 Stands for post office protocol and was used earlier.


What is random access protocol?

In this protocal more than one number of station tries to send, by which collision arise. in this no station is superior to another station and no control over another


Why LDAP is called lightweight?

LDAP, Lightweight Directory Access Protocol, is considered lightweight because it is a simpler protocol compared to its predecessor, DAP (Directory Access Protocol). LDAP is designed to be more efficient in terms of network bandwidth and system resources, making it suitable for directory services like user authentication and access control. The "lightweight" designation reflects its streamlined design and ease of implementation.


Why is ssh protocol used to access security devices?

SSH protocol which is also referred as Secure Shell is a secure remote login method to login to computers at a different or remote location. It provides strong authentication method and also secures the communications and integrety between the two with strong encryptions. It is a very secured option to the unprotected login protocols and FTP methods. This is the main reason for using this for accessing security devices so that they remain secured. Visit the official website of Foxpass to know more on SSH Key Security.


What type of protocol is IMAP?

IMAP stands for Internet message access protocol. It is form of an alternative protocol.It provides the user more capabilities for retaining e-mail on server and for organizing it in folders on the server .


What is a common protocol used on the internet?

IP, the Internet Protocol. It handles routing and package transfer between internet participants. The http- hyper text transfer protocol may be used to view websites. This part of the internet is called the "world wide web" or "www".


Which are the two protocols associated with layer 4 of the OSI model?

There are actually more than two protocols associated with Layer 4. According to Wikipedia, there are Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Stream Control Transport Protocol (SCTP), Datagram Congestion Control Protocol (DCCP), and Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).


What is tcp or ip in e - commerce?

networks and the internet are governed by protocols. protocols are a set of rules that determine how two components communicate with one another over a network. types of protocols: TCP/IP (transmission control protocol/internet protocol) is the basic communication language or protocol of the internet.it is the common name for more than 100 protocols used to connect computers and networks. the actual name tcp/ip comes from 2 important protocols: -transmission control protocol -internet protocol


What is BACnet protocol or Modbus protocol. Does this all types of protocols will manged by any central body?

BACnet is an building automation and control networking protocol. It was developed by ASHRAE. BACnet was designed specifically to meet the communication needs of building automation and control systems. Typical applications include: heating, ventilating, and air-conditioning control, lighting control, access control, and fire detection systems. BACnet International has reached an agreement to establish a test lab for BACnet products at SoftDEL systems www.softdel.com. Modbus is a data transfer protocol used mainly in the building and industrial automation industry. It was one the first open protocols and consequently an overwhelming number of vendors implemented Modbus interfaces. Modbus can only carry scalar data. For more information on these articles, free Modbus software tools and a free download of a BACnet explorer try www.chipkin.com. We have converters for Modbus, Bacnet, Lonworks, Metasys N2, Rockwell, DH+, Profibus, DeviceNet, SNMP and many more. Over 110 in fact.


Which SNMP version uses weak community string-based access control and supports bulk retrieval?

SNMP version 2c uses weak community string-based access control and supports bulk retrieval through its GetBulkRequest protocol. This version improves upon SNMPv1 by allowing more efficient data retrieval, particularly for large datasets. However, it still lacks the security features found in later versions like SNMPv3.


How did the Krypto Protocol come about?

The Krypto Protocol emerged from the need for secure and decentralized communication in the digital age. Recognizing the vulnerabilities in existing systems, a group of developers and cryptography experts collaborated to create a protocol that emphasizes privacy, security, and user control. Drawing on advancements in blockchain technology and cryptographic techniques, the Krypto Protocol aims to facilitate trustless interactions while minimizing the risks associated with data breaches and centralized control. Its development reflects a growing demand for more resilient and transparent digital communication solutions.


Network running more than one protocol?

multiprotocol networks