英语人>网络例句>internet protocol address 相关的网络例句
internet protocol address相关的网络例句

查询词典 internet protocol address

与 internet protocol address 相关的网络例句 [注:此内容来源于网络,仅供参考]

SNMPv1 operates over protocols such as User Datagram Protocol, Internet Protocol, OSI Connectionless Network Service, AppleTalk Datagram-Delivery Protocol, and Novell Internet Packet Exchange.

SNMPv1运行在协议之上,如UDP,IP,开放式系统互联参考模型无连接网络服务,AppleTalk数据报投递协议,和Novell网络数据报交换。

Short for Bootstrap Protocol, an Internet protocol that enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine.

Bootstrap Protocol 的缩写,一个允许无盘工作站了解到自己的IP地址、BOOTP服务器的IP地址然后装载一个文件到内存以引导系统。

Aiming at the complexity of DSRC (Dedicated Short-Range Communication) protocol, the fuzziness and ambiguousness resulted from the natural language of the protocol, the protocol engineering method is adop ted to guarantee the integrality, correctness, security, portability and standardization of the protocol.

针对专用短程通信协议的复杂性以及协议本身由自然语言承载、存在模糊性和二义性的特点,采用协议工程方法来保证协议的完整性、正确性、安全性、可移植性和标准化,并采用SDL对DSRC协议进行形式化描述,在此基础上提出了DSRC协议验证的步骤和实现方法,并对所开发的协议SDL模型进行验证,结果表明了协议的逻辑正确性。

Electronic-Commerce is one of the hottest topic in the world now. As the gate keeper of the Electronic-Commerce, the application and recommendation of SET Protocol (Secure Electronic Transfer Protocol) become the commen target of merchant and financial institution. The idea of SET Protocol is the secure protocol what is based on the smart card, the security of information and non-repudiation are the emphasis what they pay attention to .

电子商务是当今世界最热门的话题之一,作为电子商务的守护神,SET协议的使用和推广是商家和金融机构的共同目标,SET协议的思想是建立在智能卡基础上的安全协议,信息的保密性和不可否认性是其关注的重点。

In chapter 6, an authentication protocol is proposed and the logical verification is done to it. It is proved that this protocol can satisfy the security requirement of Diffie's identity authentication protocol [37] and Janson and Tsuduk's key distributior protocol [39] . In addition, its ability of resisting the replaying attack has been discussed.

本文第六章中提出了一种鉴别协议,并对该协议进行了逻辑验证,证明它可以满足Diffie的身份鉴别协议的安全需求〓,以及Janson和Tsuduk的密钥分发协议的安全条件〓,另外还着重讨论了它是可以抵抗伪造攻击的。

The reauthentication protocol in POD copy protectionspecification can not defend the protocol against a simplest replay attack. The AKE protocol in the specification has unwelcome security attributes on implementation. The AKE protocol in DTCP specification has the sender mismatching or receiver mismatching attributes, which can threat the integrity goal of DTCP system and may affect possible application scenarios.

指出配置点拷贝保护系统中的重新认证协议不能抵抗简单的重放攻击,其中的认证密钥交换协议具有实现上不受欢迎的安全属性;指出数字电视拷贝保护规范中的完全认证协议具有发送者失配或者接收者失配属性,这些属性会威胁该规范的完整性目标,并影响该规范可能的应用场景。

Companies for faster and better development of the cause of flower protocol, we conclude the Protocol on the flower market success abroad, the development and promotion of the concept of protocol in combination with the current domestic flower industry and confusion inferior products, for which the Company decided to our high quality and low price The South Flower Product licensing protocol comprehensively push the domestic market, let · Yen tease pyridaben bad Mei Wan Street, as the spouse happy Bo Mu Mu addiction al-contracting small-minded ¨ú noise penalty Dy fat gray eyes addiction ¨ú back satisfied small-minded Mikasa Island úú properly wood pigeon Mok blown addiction ¨ small-minded exploration helter-skelter to make meal times ¤§ addiction drunk camel small-minded Tam Yiu-mortem veranda Donowaki coarse meal Yong Jue addiction ¨ú small-minded Kang persimmon head back to downtown Terrier turbulent Metaplexis stauntoni enzyme ü meal is cheap · Mu Yen addiction ¨ garrulous small-minded circle back to head-gap ú¨?

公司为了更快更好的发展礼宾花事业,我们总结对国外礼宾花市场成功发展和推广的理念并结合目前国内礼宾花行业产品的低劣和混乱,为此本公司决定把我公司质优价廉的中南牌礼宾花产品全面推向国内市场,让颜哒嬲芄坏玫街视偶哿⒊菩姆判牡睦癖龌ú罚颐窍嘈胖灰癖龌ú返纳笠岛妥鹁吹睦癖龌ㄉ探缤使餐次ず驼湎Ю癖龌ㄕ庑胁担餐粗厥永癖龌ú返闹柿亢头⒄梗湍芄餐酶嗟睦癖龌ㄏ颜叨圆返目隙ā?

This thesis discusses firstly the IGMP, describes the specification of the protocol and explains the differences between the three different versions of protocol. Then the RPF rule used by the router to forward multicast packets and the multicast forwarding tree are discussed. The process of building SPT and RPT is also illustrated. In this thesis, we also discuss the mechanism of Flooding and Pruning in Dense-Mode multicast routing protocol and the process of switch from RPT to SPT in Sparse-Mode routing protocol.

本论文讨论了实现IP组播的IGMP协议,对IGMP协议的协议规范进行了描述,并对IGMP三个版本的不同点作了详细说明;讨论了进行组播数据包进行转发的RPF基本原理、组播转发树的类型,并对SPT树和RPT树的建立过程进行了探讨;并分别对密集模式组播路由协议的扩散和剪枝机制、稀疏模式组播路由协议中的RPT树到SPT树的切换过程进行了详细的探讨。

The invention discloses an elastic sectionalization ring address binding method in the network transmission technological domain, which is characterized by the following: realizing the binding of RRP ring node MAC address and IP address through ATD frame in the extended RPR protocol; without adding extra system resource consumption; converging rapidly for topology after the RPR looped network occurs switching; providing address binding information for over three layered report to transfer and utilize.

本发明涉及传输网络技术,公开了一种弹性分组环地址绑定方法,使得在不增加额外系统资源消耗的情况下实现RRP环节点MAC地址和IP地址的绑定,并且在RPR环网发生倒换后,拓扑可快速收敛。本发明中,通过扩展RPR协议中的ATD帧,在广播ATD帧的同时携带MAC地址和IP地址绑定的信息,实现所有RPR环节点的MAC地址和IP地址的绑定,该地址绑定信息可供三层以上报文转发使用。

An IP Address control is a control that allows you to enter, view and edit an address in Internet Protocol address format.

一个IP地址的控制是控制,允许您输入,查看和编辑在Internet协议地址的地址格式。

第3/500页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Internet Thugs Attack
The World's Address
The World's Address (Joshua Fried Remix)
My Internet Girl
You've Got Mail Enhancement
Internet Connection
Internet Going Nutz
I've Changed My Address
Girl Directions
Protocol
推荐网络例句

But this is impossible, as long as it is engaging in a market economy, there are risks in any operation.

但是,这是不可能的,只要是搞市场经济,是有风险的任何行动。

We're on the same wavelength.

我们是同道中人。

The temperature is usually between 300 and 675 degrees Celsius.

温度通常在摄氏300度到675度之间。