协议的
- 与 协议的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In the remote monitor and control system,we have to face different equipments with distinct protocol ,and so the communications efficiency of these protocol s is low.
针对计算机监控中的被控设备来源于不同地区和不同的厂家,所使用的通信协议各异的特点,通过对计算机监控中的协议的剖析,提取了该类型通信协议的主要特征,提出了一种计算机监控中通用的协议管理方法。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
Therefore,it need to formalize BAPC protocol for guarantee of its correctness.
因此在BAPC协议的软件实施中,迫切需要对BAPC协议进行形式化分析,以保证协议的正确性。
-
2In this paper ,we analyze some popular authentication protocols in the world now,such as Needham-Schroeder, Otway-Rees and Kerberos.The designing principles of electronic commerce protocols are introduced,such as Anonymity, Non-Reputation, Fairness and so on.The payment protocols for elcectronic commerce are introduced too.
对目前的一些典型的安全认证协议,如:Needham-Schroeder、Otway-Rees、Kerberos等进行了简要的分析,阐述了电子商务协议的设计原则,如匿名性、不可否认性、公平性、安全性等,介绍了相关的电子支付协议,并讨论了安全协议设计和分析中所要注意的一些问题。
-
The designing and analyzing of security protocols remains a challenge for the subtlety of security goals, the uncertainty of penetrator model, the complexity of the running environment, and the high concurrency of protocol sessions.
由于协议安全属性的多样性和微妙性、攻击者模型的不确定性、协议运行环境的复杂性和协议会话的高并发性,安全协议的设计与分析至今仍是一项具有挑战性的工作。
-
This is a point for the sip, it introduces the protocol of sip, it can help for programer for understanding ...
这是一份介绍SIP协议的PPT,详细介绍了SIP协议,可以帮助SIP开发人员理解SIP协议各个消息中的头域,以及应用流程。
-
The principles for designing electronic commerce protocols such as security, anonymity, atomicity, nonrepudiation and transaction size are introduced.
对电子商务协议研究进行综述,包括电子商务协议设计的原则(如安全性、匿名性、原子性、不可否认性和交易规模)以及对若干著名电子商务协议的描述和分
-
In the event that any court shall deem any part of this Agreement to be void or unenforceable, that part shall be deemed severable and shall not affect the validity or enforceability of the remainder.
在任何情况下,任何法院不应该视本协议的任何部分为无效或者没有可执行力,该部分协议应该被视为是可拆分并且不应该影响协议其余部分的效力或者可执行力。
-
First of all, this paper concludes the general research routine and procedures in wireless mesh networks and introduces related research methods and results of different procedures: firstly, it makes classification and comparison of the classic routing protocols in mobile ad hoc networks; secondly, it introduces several ways in which the classic ad hoc routing protocols can be modified to be used in the wireless mesh networks; thirdly, it makes detailed explanations of some typical routing protocols in each way above.
首先本文总结了无线Mesh网络路由协议的一般性研究路线,并按该研究路线的各阶段分析和总结了相关的研究方法与研究成果:先对移动Ad hoc网络的经典路由协议进行分类和比较;在此基础上总结了将Ad hoc路由协议应用于无线Mesh网络的几种主流的改进思路;最后对各种改进思路的代表性路由协议进行了分析和讨论。
-
In addition, software module solution and realization of the gateway is the point in this article. This charpter, according to the software architecture, discribs the realization of three important module—CGI,voice process module and SIP stack module. Then the realization of voice process and SIP stack are discussed in detail.
其中网关软件模块解决方案及其实现是本论文的重点,在该部分根据所设计的软件架构,分别进行了图形用户接口、语音处理模块以及SIP协议栈模块的设计,详细论述了语音编解码和语音传输过程的实现,并对SIP协议栈的选取进行了重点分析和设计,通过开源SIP协议栈的比较,给出本系统的SIP协议的实现方案。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。