介面層網路 的英文怎麼說

中文拼音 [jièmiàncéngwǎng]
介面層網路 英文
network interface layer
  • : Ⅰ名詞1 (頭的前部; 臉) face 2 (物體的表面) surface; top 3 (外露的一層或正面) outside; the ri...
  • : i 量詞1 (用於重疊、積累的東西 如樓層、階層、地層) storey; tier; stratum 2 (用於可以分項分步的...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 介面 : joggle; nozzle; mouthpiece; [計算機] interface
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方:第一部分主要分析了windows的體系結構,剖析了驅動規范( ndis )的編程,紹了低數據的主要的捕獲方案:然後紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和過濾的的結構。
  2. We designed concise web file system, and the interface between embedded node controller and remote browser using cgi technology. so the work of updating system parameter and gathering bottom data with html form can be done breezily

    設計了簡潔的文件系統,採用cgi技術實現了嵌入式節點控制器與遠程瀏覽器之間的,在瀏覽器下使用html表單可以遠程修改系統參數,實時採集底數據。
  3. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別紹各個關鍵部分的具體實現要點,解釋了相互間的關系,列出了主要數據結構和實現流程。
  4. This paper addresses how to introduce the corba techologies into the tmn, meanwhile, it also addresses the possible applicatioin of corba in tmn. finally, this paper also introduces the detail design of how to apply a corba middleware tao into alcatel ' s forth generatioin project, using corba as the network management interface between the qaf and nef, the functions in tmn. this paper especially pays attention to the detail design of the netowrk management ' s softweare framework, managed object class and notifciation management, try to find a more elegant design pattern in network management development

    隨著電信技術的不斷發展,各種新業務的日新月異,傳統的基於osi協議棧的電信管理tmn在開放性,分散式,互操作性和實現的復雜程度上都日漸不能滿足需求,為了解決這樣的問題,國際電信聯盟itu - t將corba技術引入電信管理中,本文就如何在tmn電信管理中引入corba技術,引入后的實際設計問題,以及corba技術在tmn中可能的應用做了一定程度的探討,並結合alcatel4g管子項目紹了如何將基於corba的中間件tao ,應用在管系統中,作為q適配qaf和元功能nef的標準管理
  5. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前描述的典型訪問控制模型基礎上,給出了一個化製造系統的綜合訪問控制模型,包括化製造系統的用戶和資源次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的化製造系統的訪問控制描述語言。
  6. There are two series interface installed on the os in advance, the one is called bsd socket designed by berkeley software, with the working mode of blocking synchronization, nonblocking asynchronization and polling, the other is named winsock designed by microsoft, worked via the way of windows message driven. as the foundation of process socket seizing technologies under microsoft windows, api ( application program interface ) hook technology is the core to achieve

    Windows進程套接字數據劫持技術的基礎部分, windows應用程序api掛接技術,該技術是實現操作系統不支持的特殊功能的應用程序的核心,有相當難度,與傳統的基於設備規范( ndis )的包過濾技術相比,該技術的不同之處在於它可以在應用上對任意進程的輸入和輸出數據進行捕獲。
  7. Telecommunications - b - isdn signaling atm adaptation layer - service specific coordination function for support of signaling at the user - to - network interface sscf at the uni

    電信. b - isdn信令atm適配.支持用戶與信令的服務專用協調功能
  8. Nni sscf telecommunications - b - isdn signaling atm adaptation layer - service specific coordination function for support of signaling at the network node interface sscf at the nni

    電信. b - isdn信令atm適配.支持節點信令發送的業務特定協調功能
  9. Escalators available in the lobby, 2 large function rooms, 8 break out rooms, 1 executive boardroom, large pre function area, latest audio visual equipment, simultaneous translation facilities, non - smoking rooms, hair and beauty salon, bistro atrium : 24 hour all day dinining international restaurant, four season : chinese cantonese and sichuan restaurant, robata - tei : japanese barbeque restaurant, rumours bar : cocktail bar with entertainment, le cafe : lobby lounge delicatessen and bar, 24 hour in - room dinining, undercover parking, gift and souvenir shop

    酒店擁有394間客房,包括30間套房,設施完善,功能備,每間客房均設有快速, 3部電話帶語音信箱,多用途電源插座,可移動的寬大寫字臺及舒適的辦公座椅,可連接個人電腦的數據。行政樓提供特別的入住登記服務和小型會議室。商務中心設有獨立的工作間,配備電腦, 24小時免費及電子郵件服務,並提供文秘服務。
  10. This thesis has introduced the development of the traditional wireless sensor network and current situation at first, then analyzed the principle an framework of the wireless sensor network, and the challenge to the traditional wireless sensor network technology for environmental monitoring, put forward the novel environmental monitoring system based on wireless sensor network technology, have recommended a kind of brand - new wireless node design plan of framework of wireless sensor network and node hardware to be designed and realized, then based on ieee 802. 15. 4 standard, this thesis analysed the design faces the wireless communication protocol stack used in environmental monitoring, have introduced the realize of physics layer, data chain layer, network layer, application layer. have solved the wireless sensor network data sampling, systematic energy - conservation optimize, this thesis summarized the preceding work finally, have looked forward to the development, application and commoditization in the future

    本文首先紹了傳統無線傳感器的發展概況及現狀,然後分析了無線傳感器的原理與架構及其在環境監測對傳統無線傳感器技術的挑戰,接著本文提出了新穎的基於無線傳感器技術的環境監測系統架構設計,紹了一種針對大氣環境監測的全新的無線傳感器節點的構架設計方案以及節點的硬體設計和實現,然後本文以ieee802 . 15 . 4標準為基礎分析設計了向環境監測應用的無線通信協議棧,從工程角度紹了物理、數據鏈、應用的設計實現,解決了無線傳感器節點的數據採集、節點互聯以及系統節能優化等問題,最後本文總結了前的工作,展望了基於無線傳感器技術的環境監測系統在未來的發展方向和應用方式等幾個方的發展遠景。
  11. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻、物理鏈、干擾情況、拓撲結構以及核心協議等;然後紹了通信安全的基礎知識,討論了osi系統中的四安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  12. In the system design, this article has considered and utilized various security technologies, and has formed an integrated multi - level security control strategy that covers application level, communication level, network level, systematic level security technologies. this system has adopted the netbank application development platform based on j2ee technology, and implemened the transaction interfaces to the intermediary business platform system ( ibps ), to perform data exchange between the multi - systems

    在系統設計中,重點考慮和綜合運用了多方的安全技術,形成了一套從應用、通訊、系統的多次控制的安全技術方案;系統採用netbank開發平臺和j2ee技術進行開發,用中間業務平臺交易通訊的技術,實現了多系統間的數據交換。
  13. Secondly ndis ( network driver interface specification ) technology in windows2000 and three kinds of network drivers : protocol driver, intermediate driver and miniport driver in ndis structure are narrated in detail. the whole structure of miniport driver for the wireless card and the design of all modules are described, the layered i / o technology in network stack and the configuration module based on this technology are introduced in succession

    第二部分詳細敘述了windows2000下的ndis (驅動規范)技術和ndis框架下的三類驅動程序:協議驅動程序、中間驅動程序和小埠驅動程序,並描述了所開發的ndis小埠驅動程序的整體架構和各模塊的設計,接著紹了協議棧中的次i o技術和基於此技術的配置模塊。
  14. Based on the simple introduction of profibus protocol and other kinds of fieldbus, this paper brought forward the truss of fieldbus control systems based on profibus, then discussed the main parts of profibus - slave interface master interface config and monitor software and network detailedly

    本文在對profibus協議及其它現場總線簡單紹的基礎上,提出了基於profibus的現場總線控制系統的整體構架,並針對基於profibus的現場總線控制系統的主要組成部分? ?從站、主站、上位機軟體以及底的設計和開發進行了詳細的論述。
  15. Realizing the uniform net communication protocol is the other emphases in this thesis., which includes ethernet frame r & t protocol, net protocol, credible transmission protocol and http data dispose protocol. slide window, timeout retransmission and acknowledgement mechanism are used to make sure of the credibility of tcp

    論文的另一重點在於實現統一的通信協議,包括的以太數據幀接收協議、 ip的數據轉發協議、 tcp的可靠流式數據報傳輸協議以及應用http數據處理協議。
  16. Integrated services digital network ; user - network interface layer 3 ; specifications for basic call control ; specification description language diagrams ; english version ets 300102 - 2 : 1990

    綜合業務數字.用戶--3 .基本呼叫控制規
  17. Integrated services digital network ; user - network interface layer 3 ; specification for basic call control ; english version ets 300102 - 1 : 1990

    綜合業務數字.用戶--3 .基本呼叫控制用
  18. In this paper, to realize a low - level network of a control system, we study the technology of fieldbus control system and analyze the architecture and the communication model of pcs. and then, a widely used fieldbus - control area network ( can ) is discussed in the paper. after the discussion from theory layer, we introduce the design and implementation of a can bus based control system

    本文圍繞一個生產現場的底控制應用系統的設計開發,展開了對控制系統底?現場總線技術的研究,著重研究了其體系結構及通信模型等方,而後對一個在實際應用中較有影響的現場總線? can現場總線做了詳細紹,在基於理論論述后,結合研究內容詳細紹該應用系統的具體的設計與實現,最後對控制的發展趨勢進行了總結。
  19. The text commenced from the technique background of the firewall, which introduced the ixa architecture of the network processor first, including the total architecture characteristics, internal technique, hardware etc. ; then described the whole hardware structure and the software structure of the firewall, and development environment ; after that introduced the conception of network security and firewall technique, and gave analysis of characteristics of ipv6 protocol in detail ; with the firewall design immediately after at every step thorough, put forward the requirement of the ipv6 firewall project first, including design target, technique innovation, application situation etc., described software and hardware architecture of the whole system, the internal connection and total flow later on, elaborated function and realization of six modules of control plane, including vpn, packet filter core, application proxy, configuration and management, url filter, log, and referred to the database that the

    正文開始從防火墻的技術背景入手,先紹了處理器的ixa架構,包括總體的架構特點、內部技術、具體型號硬體等;接著描述了防火墻的整個硬體結構和軟體結構,以及開發環境;然後紹了安全的概念和防火墻技術,並對ipv6協議特點作了較為詳細的分析;接著按著防火墻設計的步步深入,先提出了ipv6防火墻的需求,包括設計目標、技術創新點、應用場合等,隨后描述了系統整體的軟硬體結構、內部聯系及總體流程,而後著重詳細闡述上vpn 、包過濾核心、應用代理、配置管理、 url過濾、日誌六個控制平子模塊的功能和實現,並提及系統實現中使用的數據庫。
  20. We designs a communication protocol on this model, implementing many functions between host computer and radio, such as data transmission, radio management and control, status advertisement, etc. this paper uses the interface protocol, designs a radio link layer protocol, and implements the driver for the radio in linux operating system. after testing and measurement, we conclude that this interface protocol can be a model which uses ethernet interface as a transparent data channel

    本文使用了此協議,設計了無線鏈協議,並且在linux操作系統中以電臺驅動程序的方式實現了和鏈協議,通過對驅動程序運行情況的測試,說明該協議對協議而言屏蔽了以太作為透明通道的事實,此協議模型的可以實現和完成既定的功能和目標。
分享友人