控制信息協議 的英文怎麼說

中文拼音 [kòngzhìxìnxié]
控制信息協議 英文
icmp internet
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. In chapter one, we ' ve briefly introduced field bus, the advanced industrial control network. contrapose to the problems exsist in field bus, we ' ve discussed the application and status of industrial ethernet in chapter two. combined with the development of ethernet, in chapter three, we ' ve brought forward a kind of ethernet structure and a design project for ethernet controller, the key equipment in ethernet. we ' ve also analysed how to resolve the uncertainty of the traditional ethernet which affected its industrial application. in chapter four we ' ve talked about how to realize network management system based on snmp and web technology, which includes its structure, function and programming model. we ' ve discussed the technology of ethernet integrating with other network in chapter five, which consisted of both integrating with information network and control network. in the last chapter we ' ve analyzed the application project of ethernet in control field through practical case

    第三章結合以太網技術的發展提出了一種以太網路的體系結構和其中的關鍵設備? ?嵌入式以太網器的設計方案,還對傳統以太網中影響其在工業上應用的「非確定性」問題的解決辦法作了分析。第四章討論了基於snmp和web技術的網路管理系統的實現,包括結構、功能和編程模型。第五章討論了工業以太網和其他網路的集成技術,分為與網路和網路集成兩方面,最後一章通過實例來分析以太網在領域的應用方案。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. In this model, the information sub - model reveals some abstract facets in general systems, which can be reified by means of reflection, the representation sub - model decides how to represent the meta - information, while the controlling sub - model consists of some key elements to manipulate meta - level system, such as : meta - object protocol declaration, meta - object association and management

    其中,子模型指示出系統中可以通過反省揭示的抽象內容;表示子模型處理元的表達問題;子模型則包括元對象聲明、元對象關聯和管理等操縱元級系統的重要方法。
  4. Detailed introduction on sip is made firstly, then, based on the knowledge of it, a solution named " sip application level gateway ( sip alg ) " is brought forward. the resolution tries to resolve the problem by modifying sip messages in application level when they traverse nat / fw, and controlling some behaviors of the nat / fw

    文章首先對sip進行詳細的介紹,然後在此基礎上提出了「 sip應用層網關」的解決方案,該方案試圖在sip令消通過nat fw時,在應用層上對其進行修改,並nat fw的某些行為來實現sip應用對nat fw的穿越。
  5. Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules

    本文對戰術系統中的數據鏈介面技術進行研究:分析了數據鏈介面在戰術系統中的功能需求;採用面向對象的方法,分析無人機任務問題,建立了無人機任務模型,並基於該模型設計了數據鏈介面通,包括報文格式和傳輸機;基於嵌入式linux系統設計了數據鏈介面模塊,實現了數據鏈標準介面與無人機數據鏈私有介面之間的相互轉換;結合實時corba中間件及其事件通道,研究了數據鏈介面模塊組件技術,並給出了實現方案;通過戰術原理實驗系統的演示實驗,驗證了數據鏈介面通和嵌入式數據鏈介面模塊的有效性。
  6. Identifier of the protocol control information compression

    使用的壓縮演算法標識
  7. Icmp internet control message protocol

    因特網控制信息協議
  8. Icmp : internet control message protocol

    控制信息協議
  9. The data processing part includes fft, filter and averaging, calibration algorithm, smith chart designing, s - parameter algorithm, transmission and reflection caculating, etc. the hardware interface consists of control information protocol, data transfer protocol, status information protocol and the synchronization protocol of the transfer of all the above information

    數據處理部分包括快速傅里葉變換、濾波與平均、用s參數表示的傳輸反射特性演算法、表示阻抗特性的史密斯圓圖演算法、校準補償演算法、以及實時測量的實現演算法等。介面部分包括控制信息協議、數據傳輸、狀態以及上述各種傳輸的同步
  10. Gets the number of internet control message protocol version 6 icmpv6 error messages sent

    獲取發送的internet版本6 ( icmpv6 )錯誤數。
  11. Gets the number of internet control message protocol version 6 icmpv6 error messages received

    獲取接收的internet版本6 ( icmpv6 )錯誤數。
  12. Many network users use tcp / ip protocols that were composed of a series of protocol layers to finish their communication tasks. the user ' s data information is divided into a great many of data blocks. when the data blocks are transported through the layers of the protocols, they are added the controlled information in their headers

    網路用戶終端大多使用tcp / ip通完成的傳輸任務, tcp / ip是層次結構的通,用戶數據被劃分成一個個的數據分段,經過各層時,添加上各層,作為數據分段的頭部,這個頭部說明了各相應層通的規則,數據分段經各層封裝后最終形成物理數據幀通過物理鏈路送到通網路上傳輸。
  13. Bridge protocol data unit : a message type used by bridges to exchange management and control information

    橋接數據單元:網橋使用這種類型進行管理和交換。
  14. This scheme can meet with the general control precision ; the purpose of obtaining the field control information that is to transform the field control information between the tcp / ip and the field bus protocol

    這種簡單解決方案能夠滿足工業現場通用性能要求,達到現場網路內共享的目的,在tcp ip與現場總線之間對現場進行互相轉換,以滿足遠程瀏覽和操作的要求。
  15. The mpls technology was raised just in order to make the most of the switching technology in the core of the network and the ip routing technology on the edge of the network. before presenting the solution of the mpls, there are many integration model, the basic method adopted by them were all carry the control information from the ip router, and combine it with the transmition capability and the label switching of the atm switching machine, accordingly constructing a high speed and economic multi layer switching router. but, all these solutions can not communicate and just suit for adapting the atm as the second layer transmiting link, can n ' t work on other interface ( fr, ppp, and ethernet ), this is obviously conflict with the developing way of the based on packet of the internet

    標簽交換( mpls )技術就是為了綜合利用網路核心的交換技術和網路邊緣的ip路由技術各自的優點而產生的。在mpls技術方案提出之前已有的各種集成模型解決方案所採取的基本方法都是從ip路由器獲取,將其與atm交換機的轉發性能和標簽交換方式相結合,從而構建成一個高速而經濟的多層交換路由器。但是,各種方案彼此不能互通,而且僅適用於以atm作為第2層的傳輸鏈路,不能工作在其他多種媒體(如幀中繼、點對點、以太網)中,這與internet基於分組的發展方向相矛盾。
  16. Telnet is one of the most classical and the most powerful remote network configuration and control tool. telnet protocol provides one of the important ways to transfer data and control information on the internet that set up on a lot of different kinds of platforms

    Telnet是最傳統、最強大的遠程網路設備配置與工具, telnet提供了在internet上異質網之間傳遞數據和的重要方法。
  17. Vpls consists of two planes : control plane and forwarding plane. the control plane is the key component of vpls

    平面的為vpls數據轉發提供,是vpls模塊中的關鍵部分。
  18. As the information era proceeds, highly developed digital image processing technique and communication technique make multimedia communication possible, and it is now on the way of progress. video conference have received more attention as an example of multimedia. in this paper we first describe the construction and characteristic of the video conference system and analyze the theory of protocol with itu - t h. 323 recommendation which inculde video and audio codec standard, communication control protocol h. 245. call signalling protocol h. 225, as well as procedures within these protocols define how these components communicate. also an experimental video conferencing system is designed and some relating key technologies are studied, which include multithread programming, transmission technology, mcu technology, qos mechanism and so on. especially, a video codec based on h. 263 recommendation with high fram rate as well as high compression ratio is researched and implemented because of importance of video application, which solves the bad image reconstrction quality problem existed in the most present video systems that adopt h. 261 video compression algorithm. by using these technologies. a video conferencing system is implemented based on lan. the system that the paper provides is easy to implement and the results of exmperiment is good. such system can be widely used in the fields such as business conference, distance education etc. and it is of good practical value

    隨著時代的前進,數字圖像處理技術和通技術的高度發展,多媒體通已成為可能並已初具規模,視頻會作為它的一個具體應用實例受到普遍關注。本文首先對國際電聯盟itu - t定的基於分組交換的多媒體通h . 323系列建進行了闡述,其中包括ip網路視頻會系統的結構組成、視頻傳輸標準、音頻傳輸標準、系統的碼流、通h . 245和呼叫h . 225以及會系統的進行過程。在此基礎上給出了ip視頻會的實現的整體框架,為系統的軟體實現進行了模塊的劃分和整體設計,分析了各個模塊的功能、作用。
  19. Identifier of the protocol control information compression algorithm used for the n - pdu pcomp

    使用的壓縮演算法標識
  20. Thesaurus should be coded with xml while classification should follow is02788 and iso5964. marc can be converted to xml / rdf. http will continue to play the main role on the protocol level while z39. 50 can be used to construct thesaurus database with zthes profile

    Xml格式用於處理和交換敘詞表,用marc格式來表示分類法,並建立marc和xml rdf的轉換機。受語言在層以http為主, z39 . 50通過zthes擴展構建敘詞數據庫, whois + +的檢索路由實現整合檢索。
分享友人