- Network Configuration Process
- Telecommunications: NCP (NORTEL)
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Network File System (protocol) — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Network-Centric Service-Oriented Enterprise (NCSOE) — is a new generation enterprise capable of conducting collaboration and management of internal and external information. Using Network Centric Enterprise Services (NCES) , the enterprise can now enforce information and decision superiority in a… … Wikipedia
Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer … Wikipedia
Network Centric Product Support — (NCPS) is an emerging computer architecture that was developed to leverage new information technology and global networks to assist in managing maintenance, support and supply chain of mobile complex products made up of one or more systems, such… … Wikipedia
Network booting — is the process of booting a computer from a network rather than a local drive. This method of booting can be used by routers, diskless workstations and centrally managed computers (thin clients) such as public computers at libraries and schools.… … Wikipedia
Network Agility — is an architectural discipline for computer networking. It can be defined as: The ability of network software and hardware to automatically control and configure itself and other network assets across any number of devices on a network. With… … Wikipedia
Network architecture — is the design of a communications network. It is a framework for the specification of a network s physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in… … Wikipedia
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Configuration management — Top level Configuration Management Activity model Configuration management (CM) is a field of management that focuses on establishing and maintaining consistency of a system or product s performance and its functional and physical attributes with … Wikipedia
Network address translation — NAT redirects here. For other uses, see Nat (disambiguation). In computer networking, network address translation (NAT) is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. The… … Wikipedia
Network switch — A network switch or switching hub is a computer networking device that connects network segments. The term commonly refers to a multi port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches… … Wikipedia