控制報文協議 的英文怎麼說

中文拼音 [kòngzhìbàowénxié]
控制報文協議 英文
control message protocol
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ動詞1 (告知; 報告) report; declare; announce 2 (回答) reply; respond; reciprocate 3 (答謝)...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴等。最後,對事故處理和事後分析提供策略,如何告安全事故,如何調解決安全事故,如何避免安全事故再次發生。總之,本對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules

    對戰術系統中的數據鏈介面技術進行研究:分析了數據鏈介面在戰術系統中的功能需求;採用面向對象的方法,分析無人機任務問題,建立了無人機任務信息模型,並基於該模型設計了數據鏈介面通信,包括格式和傳輸機;基於嵌入式linux系統設計了數據鏈介面模塊,實現了數據鏈標準介面與無人機數據鏈私有介面之間的相互轉換;結合實時corba中間件及其事件通道,研究了數據鏈介面模塊組件技術,並給出了實現方案;通過戰術原理實驗系統的演示實驗,驗證了數據鏈介面通信和嵌入式數據鏈介面模塊的有效性。
  3. Internet control message protocol icmp

    網際控制報文協議( icmp )
  4. The ip layer, in turn, provides services used by the internet control message protocol icmp and transmission control protocol

    反過來, ip層又提供由網際控制報文協議( icmp )和傳輸( tcp )使用的服務。
  5. So, a way based on icmp is putted forward to solve this problem for achieving the full one. lastly, the tendency of nms in future is disserted

    針對這一個問題,論提出了基於icmp ( internetcontrolmessagesprotocol ,網間控制報文協議的方法,來得到完整的子網結構。
  6. It considers the every application facets for the entire network, focuses on center of network security. it describes the most important conceptions and minds in designing firewall. at the same time, it also introduces what is input packet, output packet, their ideas based on firewall as well

    介紹tcp ip (傳輸網際以及防火墻常用的ip消息類型tcp (傳輸) 、 udp (用戶數據) 、 icmp (網際控制報文協議)及其在網路傳輸中的作用、介紹數據輸出包、數據輸入包的概念及其基於防火墻中的思想。
  7. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    在數據鏈路層的設計中針對水下聲通道的特點,對于介質訪問採用了maca,它使用rts - cts握手機來解決uan中的隱蔽終端、暴露終端以及功率問題。
  8. This paper will study under layered real - time scheduling problem, which is based on the theory of mas ( multi - agent system ). first, we research the structure model of mars, then an uniform model based on han ( hierarchical agent networks ) is proposed, which can unify all sorts of model ; second, the communication model of mars has been studied, then we propose high level communication model and under layered network topology model, and they are the same with mars ; three, ground on above, a real - time cimunication protocol for mars - - - - - rtcmr has been presented. in this paper, we study the under layered real - time scheduling protocol of rtcmr, which include real - time process scheduling and real - time message scheduling

    首先研究了多智能體機器人系統結構模型,提出了多層次智能體網路一體化模型,該模型對各種結構模型分類進行了統一;然後對多智能體機器人系統的通信模型進行了研究,提出了適用於mars的高層通信模型和底層網路拓撲;在此基礎上,提出了基於多智能體機器人系統的實時通訊? ? rtcmr ,本對rtcmr的底層調度進行了研究,包括實時任務調度和實時調度,提出了sp ts系統,建立了sp ts演算法的數學理論模型, sp ts系統在實現了實時任務的絕對時限保證的同時也實現了底層實時傳輸的絕對時限保證,實現了實時任務調度和實時調度的統一,最後,提出了基於sp ts的spp tsp統一結構,並給出了該結構的統一調度petri網模型。
  9. I selected the user datagram protocol as transport protocol, and formulated application protocol, so that the server can receive the orders from the client and do anything ordered by the client. data is transported by " stream " that is object - oriented abstract data between the client and the server in the lan, and i also use tumudp to transmit and receive " stream ". many api functions are used in my paper in order to control the keyboard and the mouse of the remote computer, and also control its system ability ( such as turn off or reset it )

    位於同一局域網內的服務器和客戶機之間採用用戶數據( udp )作為運輸層通信,論作者還定了功能編碼,使得服務器能夠解釋客戶機通過網路發送的命令,並根據命令進行操作;論以建立在面向對象基礎上的抽象數據類型「流」作為傳送數據的載體,通過delphi提供的nmudp項進行「流」的發送和接收以實現服務器和客戶機之間的交互。
  10. The paper introduce the usage and importance of the icmp protocol in the tcp / ip protocol stack. it is designed for meeting the needs of working well of network devices in the non - link network system, it provides the mechanism for routers ( hosts ) to send back error messages

    本論試圖說明icmp差錯與在tcp / ip族中的地位和作用,它為了滿足在一個無連接系統中各網路設備調運行的目的,提供了自治運行路由器(主機)發出錯誤告或意外情況信息的機
  11. Common data interfaces used in radio include rs - 232, etc. as the rapid growth of data speed in data radio, asynchronous serial port does not meet the need of data transmission of high - speed data radio. data radio is gradually using ethernet interface as high - speed data radio ’ s data interface, to function as a high - speed data channel between host computer and data radio. this paper brings forward a universal radio interface protocol model, whose core is taking ethernet as a high speed data channel in network protocol stack

    針對電臺的以太網介面,經過對各種電臺的功能分析,提出了一種通用的在以太網通信中適用的介面模型,其核心思想是將以太網作為網路棧中內部的高速數據傳輸通道來使用,作為鏈路層和物理層之間的內部介面,同時提供電臺和數據傳輸兩大功能模塊。
  12. This paper ' s main task include : in the aspect of the network communication and database application, to satisfy the demands of the works, the software of sustaining dde is worked out, which realizes the dde with the configure software, so the problem that the instruments " protocols do not match to the configure software ' s is solved ; we work out the software of collecting datum information from the instruments on the rs - 485 bus ; the software of transferring information by the telephony network is worked out, and the software of alarm by beep - pager is work out too ; the software of database report with the performance of supporting com, by which the engineers can visit the field database everywhere in the world ; the software that the two servers are redundant mutually is developed ; some ladder program of plc is developed and the megabasic software is developed which collects datum information from the instruments on the rs - 485 bus

    本論研究工作主要包括: 1在網路通訊和數據庫方面,開發了支持dde通訊方式的軟體組件,實現和組態軟體cimplicity的dde通訊,基於rs _ 485總線的採集智能儀表數據的軟體組件,解決了設計院所提供的智能儀表和cimplicity在通訊方面不一致的問題;公用電話網數據傳送的軟體組件,和尋呼機警的軟體組件;基於access數據庫列印表的軟體組件和與internetexplore軟體兼容的數據表,使用戶可以在任何地方,通過internet訪問現場數據庫的內容;上位機雙機冗餘的軟體組件;開發了plc器的部分梯形圖,利用plc的pcm模塊採集rs - 485儀表數據的megabasic軟體。 2
  13. In order to solve this problem, a reliable multica st communication model for conference control is designed specially. we firstly study the requirements of multicast - based conference control, then analysis the main factors to the performance of reliable multicast. subsequently we present a new reliable multicast protocol named hsrm ( hierarchical scalable and reliable multicast ) according to the receivers " packet loss probabilities

    從分散式組播會對網路通信的要求出發,在對影響可靠組播性能的因素進行深入分析基礎上,融合現有可靠組播的優秀思想,提出了一個新的基於接收方丟失概率分組的層次化可擴展可靠組播通信模型hsrm ( hierarchicalscalablereliablemulticast ) 。
  14. In this dissertation the author firstly gives a brief report on development of mobile ip and research on mobile ip, then analyses mobile ipv4 and mobile ipv6 in detail, such as function - based constituents, working process and control messages. in addition, we discuss the commons and difference between mobile ipv4 and mobile ipv6. finally the thesis make a deep research on all kinds of invasion in mobile ip network, then author employs the " routing mechanism security " standpoint to provide a new security solution

    最後深入地分析了移動ip在安全方面所面臨的威脅與對策,並從移動ip路有機安全的角度提出了一種新的移動ip擴展方法,對中的三個進行了擴展,引入了新的擴展項,使之即可已提供強的認證服務,同時又具有較高的效率和擴展性。
  15. To supply the gap of current network protocol used in tele - medical monitoring systems, according to a complete life signal monitoring system based on mobile platform, this dissertation presents life signal wearable monitoring protocol. firstly, designing the proper format of data packet and control packet on the basis of life signal ’ s specialty to enhance the transmitting efficiency. secondly, describing the protocol in the method of formalization, designing the flow of the protocol and implementing it by coding. thirdly, analyzing the performance of the protocol on both local machine and lan, debugging and modifying the software to meet the require

    首先,根據生命信號的特點,本著提高傳輸效率的原則,設計了生命信號數據的合理格式;其次,採用形式化方法對進行了描述,設計了的工作流程並編碼實現;再次,在單機和網路環境下進行了性能分析,調試修改軟體並使其達到設計要求。
  16. 3. a new method of hierarchical mobility management ( ltmip ) is presented, which introduces buffer management and link triggering mechanism. simulation results show substantial performance improvements in terms of throughput, registration overhead, loss and duplicate packets during a handoff. 4

    分析了hmip信令方面的開銷,提出了一種基於鏈路觸發和緩存機的分層移動管理lthmip ,計算機模擬結果說明該具有更高的吞吐率、更低的注冊開銷,以及切換過程中更少的丟失。
  17. Article 9 the investor, with the intention to substantially control the listed company by means of contract transfer, after having received the approval in accordance with item ( 1 ), item ( 2 ), item ( 3 ) and item ( 4 ) in article 8, shall submit the acquisition statement and the related documents to china securities regulatory commission, and after the check and approval by china securities regulatory commission, conduct stock transfer confirmation procedures, transact registration transfer procedure in securities registration and clearing institutions

    第九條投資者擬通過轉讓方式構成對上市公司的實際,按照第八條第(一) 、 (二) 、 (三) 、 (四)項的程序獲得批準后,向中國證監會送上市公司收購告書及相關件,經中國證監會審核無異後向證券交易所辦理股份轉讓確認手續、向證券登記結算機構申請辦理登記過戶手續。
分享友人