查询词典 internet protocol address
- 与 internet protocol address 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Key words:Reverse Address Resolution Protocol Reverse Address Resolution Protocol discovers the identity of the IP address for diskless machines by sending out a packet that includes its MAC address and a request for the IP address assigned to that MAC address.
逆向地址解析协议可以通过发送一个包含有无盘主机MAC地址的数据包,来询问与此MAC地址相对应的IP地址。
-
To further investigate the influence of the Internet on the students, a further research is conducted by breaking the students into three groups -frequent Internet users, occasional Internet users and non-internet users. The result indicates that the self-harmony of frequent Internet users shows a sharp difference in terms of school and grade, the self and the unharmony of show a sharp difference in terms of school, grade and sex, and that the self-esteem and the two dimension - the flexibility and rigidity of self-harmony show no difference in terms of school, age and sex; the self-harmony and all dimensions of occasional Internet users show no significant difference, the self-esteem of occasional Internet users show no significant difference in terms of school and grade but show significant difference in terms of sex; the self-harmony and all dimensions of the non-Internet users show no significant difference, the self-esteem of the non-Internet users show no significant difference in terms of grade and sex, and the self-esteem of the non-Internet users show significant difference in terms of school.
为了进一步研究网络对学生的影响,又将学生分为经常上网、偶尔上网、不上网三类分别来研究:经常上网学生自我和谐在学校、年级都存在极显著差异,自我与经验的不和谐在学校、年级、性别存在极显著差异,自尊和自我和谐的灵活性和刻板性两个维度在学校、年龄、性别都没有差异;偶尔上网学生,自我和谐及各维度都不存在显著性差异,自尊在学校和年级不存在显著性差异,在性别上有显著性差异;不上网学生自我和谐及各维度都不存在显著性差异,自尊在年级和性别不存在显著性差异,自尊在学校上有显著性差异。
-
This paper discusses Internet Protocol, User Data Protocol, Internet Control Message Protocol and Address Resolution Protocol mostly.
在协议方面主要讨论了网际协议IP、用户数据报协议UDP、Internet控制报文协议ICMP、物理地址解析协议ARP。
-
This invention discloses one data regroup method, which is based on the original independent and redundant RAID system high address to preserve one block disk space as regroup area and to repeat the following steps: a, determining the current regroup data low address and to regroup the data from high address to low address into new RAIN type of data; writing the regroup data from initial address into the new RAID type data; using the current regroup data of low address as the next regroup data high address as the next second initial address of the data.
本发明公开了一种数据重组方法,在原独立冗余磁盘阵列系统高地址侧尾部预留一块磁盘空间作为重组区域,将该预留重组区域的高地址作为写入数据的起始地址,并将原RAID系统中存有数据的高地址作为重组数据的起始高地址;数据重组完之前重复执行以下步骤:确定当前要重组数据的低地址,并将当前要重组数据高地址到低地址之间的数据重组为新RAID类型数据;将重组后的数据从写入数据的起始地址向低地址方向,顺序写入新RAID系统中;当前要重组数据低地址的邻接低地址作为下次要重组数据的高地址,当前写入数据低地址的邻接低地址作为下次写入数据的起始地址。
-
The Internet switching service method for providing an Internet switching service to a subscriber connected to the Internet (214) to make an Internet telephone call by using an ID of a receiver are achieved by inputting the ID of a receiver who the subscriber wishes to communicate with, searching a data base (202) where a plurality of IDs and communications address data of the IDs are previously stored, for communications address data corresponding to the IDs, sending the searched communications address data to the subscriber, and the subscriber performing a telephone call, a fascimile transmission or sending a post by using the searched communications address data.
对与因特网(214)连接的用户提供因特网交换业务以利用接收方ID进行因特网电话呼叫的因特网交换业务方法,通过下列步骤实现:输入该用户想与之通信的接收方ID,对先前存储有多个ID和这些ID的通信地址数据的数据库(202)搜索与该ID对应的通信地址数据,将搜索到的通信地址数据送给用户,以及该用户通过用搜索到的通信地址数据进行电话呼叫、传真发送或发送邮件。
-
Router#show ip int s1/0 Serial1/0 is up, line protocol is up Internet address is 10.1.1.1/30 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is not set Inbound access list is not set Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is disabled IP fast switching on the same interface is disabled IP Flow switching is disabled IP Fast switching turbo vector IP multicast fast switching is disabled IP multicast distributed fast switching is disabled Router Discovery is disabled IP output packet accounting is disabled IP access violation accounting is disabled TCP/IP header compression is disabled RTP/IP header compression is disabled Probe proxy name replies are disabled Policy routing is disabled Network address translation is disabled WCCP Redirect outbound is disabled WCCP Redirect exclude is disabled BGP Policy Mapping is disabled
路由器#显示IP的诠释中一/零 serial1 / 0了,线议定书是(连互联网地址是10.1.1.1/30 广播地址是255.255.255.255 地址确定的安装程序命令 MTU是1500字节助理地址是未设置定向广播转发的存款保险计划即将离任的访问列表中没有设置的入站访问,名单没有设置代理ARP是启用的安全级别是预设分裂的视野是启用 ICMP的重定向总是发出的ICMP unreachables都是发送ICMP的面具,现答复从未发送的IP快速切换是残疾人士 IP的快速切换在同一界面上是残疾人士的IP流的开关是残疾人士的IP快速切换的Turbo矢量IP组播快速切换是残疾人士 IP组播的分布式快速切换是残疾人士的路由器发现是残疾人士的IP数据包输出的会计是残疾人士的IP接入违反会计是残疾人士 TCP / IP报头压缩是残疾人士的RTP / IP报头压缩是残疾人士的探针Proxy名称的答复是残疾人士的政策,路由是残疾人士网络地址转换是残疾人士wccp重定向外,是残疾人wccp重定向排除是残疾人士的BGP政策映射是残疾人士
-
We do research on the transitions between states of network protocol,the protocol misusage detection model based on Markov chain,the framework of the IDS technology and protocol anormity after we discuss the current technology. The main research contents of this paper include: research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on Markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on.
在分析了现有入侵检测系统的基础上,本文围绕典型网络协议状态转换、基于马尔可夫链的检测模型、入侵检测技术框架、以及协议异常等几个方面展开深入研究,主要工作内容包括:典型网络协议转换状态的分析和会话过程的研究;基于马尔可夫链的网络异常检测模型;分布式的检测架构;针对网络流量特征而提出了精确的检测模型等。
-
If two parties want to sign a contract C over a communication network, they must "simultaneously" exchange their commitments to C Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchange partial commitments in a piece by piece manner The party of secondly sending commitments may have a slight advantage; a "fair" protocol must keep this advantage within acceptable limits The protocol for signing a contract is improved based on the research result of secure multiparty computation In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub protocol, but he can't gain more information about the whole signature by accumulating the signed bit or the committed bit After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information Finally, it is proved that this protocol is quit fairness
作者中文名:曲亚东;侯紫峰;韦卫摘要:在网络环境中解决合同签订问题需要保证信息交换的同时性,以前提出的协议都会给第2个发送者部分计算特权,利用不经意传输协议则可以解决这个问题。在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别宣布承诺,并得到对方对合同的完整签名;在宣布承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议。在文章的最后利用多方安全计算的结论证明了该协议满足终止公平性。
-
If two parties want to sign a contract C over a communication network, they must "simultaneously" exchange their commitments to C Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchange partial commitments in a piece by piece manner The party of secondly sending commitments may have a slight advantage; a "fair" protocol must keep this advantage within acceptable limits The protocol for signing a contract is improved based on the research result of secure multiparty computation In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub protocol, but he cant gain more information about the whole signature by accumulating the signed bit or the committed bit After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party At this moment, the party doesnt care about the advance quit of the other party, because he has gained the whole signed information Finally, it is proved that this protocol is quit fairness
在网络环境中解决合同签订问题需要保证信息交换的同时性,以前提出的协议都会给第 2个发送者部分计算特权,利用不经意传输协议则可以解决这个问题在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别宣布承诺,并得到对方对合同的完整签名;在宣布承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议在文章的最后利用多方安全计算的结论证明了该协议满足终止公平性1 引言两个参与者A和B想要通过网络协商签订合同C 为了保证公平性,参与者必须同时交换自己对合同的签名,然而在实际的网络环境中,想要完全同时地交换对合同的签名是不可能的,他们必须将签名分成若干块依次地执行,以保证大致的同时性但是这种方法依然存在着问题
-
In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.
本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。
- 相关中文对照歌词
- Internet Thugs Attack
- The World's Address
- The World's Address (Joshua Fried Remix)
- My Internet Girl
- You've Got Mail Enhancement
- Internet Connection
- Internet Going Nutz
- I've Changed My Address
- Girl Directions
- Protocol
- 推荐网络例句
-
But this is impossible, as long as it is engaging in a market economy, there are risks in any operation.
但是,这是不可能的,只要是搞市场经济,是有风险的任何行动。
-
We're on the same wavelength.
我们是同道中人。
-
The temperature is usually between 300 and 675 degrees Celsius.
温度通常在摄氏300度到675度之间。