數據包封 的英文怎麼說

中文拼音 [shǔbāofēng]
數據包封 英文
data envelope
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 數據 : data; record; information
  1. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、、網上鄰居名字列表等的讀寫操作,從而很方便的根控管規則實現了對網路的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  2. This scheme firstly determined the operating mode of coded video stream in nal layer according to the current channel state before they were packed. the coded video stream operated under ssm in error - free channel so as to reduce the packing tradeoff and increase the coding efficiency. while in error - prone channel, they operated under dpm combined with improved unequal error protection ( uep ) scheme based on human eyes characteristic in order to elevate their robustness to channel error

    該方案中編碼視頻信息在進行打裝前,首先根當前通道狀態信息自適應地確定其在nal層中的工作模式,在無丟通道中採用單片模式以降低編碼視頻流的打開銷,提高編碼效率;而在丟通道中採用分區模式以提高編碼視頻流對通道誤碼的魯棒性能,同時基於人眼視覺特性,提出了一種改進的uep策略。
  3. But just as we can use the number 23 without binding it to any name in other words, as a function argument, we can use the function object we created with

    就象是fp的jekyll對于oop的hyde (角色或者也可能對調) 。閉類似對象示例,是一種將一大批和功能裝在一起的一種方式。
  4. Making use of the packet data service and short data service of tetra, the mcs system enables front - line officers to use their portable radios and in - vehicle mobile data terminals mdts to exchange data messages with rcccs

    流動電腦信息系統利用地面集群無線電的服務和簡短服務,令前線警務人員可以使用手提無線電通訊機和車上的流動終端機與總區指揮及控制中心交換信息。
  5. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip的安全保護。
  6. Thirdly, according to the evaluation system, we analyze the performance of some close - end investment funds in 2002, calculate all the indexes and sort the relative performance of all funds on the basis of comprehensive index

    然後,根建立的評價體系,實證分析了2002年中國部分閉式投資基金的業績表現,對基金的各類指標進行了考察,並用絡分析方法對基金相對業績進行綜合評價、排序。
  7. A reference type that encapsulates data constants and fields and behavior methods, properties, indexers, events, operators, instance constructors, static constructors, and destructors, and can contain nested types

    一種引用類型,它和行為,並可以含嵌套類型,其中括常和欄位,行為括方法、屬性、索引器、事件、運算符、實例構造函、靜態構造函和析構函
  8. The function of the communication program is that packing data into pdu format, or reverse

    通信程序設計主要結合gsm模塊支持的at指令、 pdu裝、拆過程進行功能分析。
  9. Considering regional characteristic and involved equipments, mpls vpn is a huge system actually. this paper focuses on its mechanism, implementing process of encrypting data at the customer edge ( ce ) router and encapsulating at provider edge ( pe ) router. some particulars are implemented with c + + builder 5. 0 : creating and sending of ip package, encrypting of ip packet, encapsulating of encrypted ip packet, sending encapsulated ip packet to mpls backbone

    不管是從其地域特性、還是從其所涉及到的設備來看, mplsvpn實際上是一個比較龐大的系統,本文主要側重於討論其系統結構以及在客戶路由器端加密和在服務提供商邊緣路由器端裝的實現過程,並用c + + builder5 . 0實現了其中的幾個細節: ip的產生與發送, ip的加密,加密后ip裝,裝后發送至mpls骨幹網。
  10. The necessary analyze is presented also. and i will come up with my one - chip solution of ethernet over sdh

    經過hdlc / laps裝以後的具有一定的網路管理功能和一定的糾錯能力。
  11. It analyses in details the interplay of all the components, the essential concepts such as security association, security association database and security policy database, the process of the package handling, the two security protocol encapsulating security payload and authentication header it concerns not only the regulations of the protocols themselves but also the implementation schemes

    對于ipsec各個組件之間的交互關系、涉及的重要概念(安全關聯、安全關聯庫和安全策略庫) 、處理過程、兩個安全協議(裝安全載荷和認證頭)的協議本身規范和一般實現方法都進行了較為詳細的討論。
  12. A packet with an incorrect type or version was encountered during marshaling

    送過程中遇到類型或版本不正確的
  13. Checking to see if packets destined for restricted network segments are blocked / passed as expected

    檢查看看受限網段發送的是否如期被鎖/通過。
  14. Besides, we integrated the transfer functions on im server, they certified the transport between datagram encapsulated in icq protocol format or msn protocol format and message encapsulated in proposed jabber protocol format, that means it implemented the im interaction between clients and other icq or msn users

    另外我們在im服務器端集成了icq 、 msn協議格式的轉換功能,使得icq協議、 msn協議格式裝的與類jabber協議格式裝的報文信息進行互相轉換,也就實現了客戶端用戶能夠與外部的icq 、 msn用戶進行im信息交互。
  15. In this article, i will discuss several popular types of encapsulation and virtual concatenation of eos ( ethernet over sdh )

    本論文設計採用hdlc / laps作為裝協議,它可以很好的實現裝和速率適配。
  16. According to my reference, there are many schemes for the personal firewall technology and each has its own advantages and disadvantages. a new double filtering packet based on kernel and user mode scheme is presented in this paper with the development of the personal firewall technology : in the kernel mode, we develop the network driver program to implement the raw net packet capturing through the ndis hook technology, and also we accomplish the net packet filtering according to the control canal rules, in the user mode, we develop the dll program to implement the services based on socket capturing and filtering through the winsock2 spi technology, thereby we overcome the shortcoming during caputuring packet by kernel mode or user mode only, greatly improve the system security nature

    通過參考目前市場上多種個人防火墻的設計方案,並且分析比較各個設計方案的優缺點,結合目前個人防火墻技術的發展趨勢,提出一種基於內核態和用戶態雙重過濾的設計方案:在內核態採用ndishook技術開發ndis網路驅動程序實現對通過網路的原始截獲,並且通過訪問控管規則完成對的過濾;在應用態採用winsock2spi技術開發動態鏈接庫( dll )程序實現了對基於socket網路連接通信的服務截獲和過濾,從而克服了單方面從用戶態或核心態截獲的缺點,極大提高了系統的安全性能。
  17. According to the basic principle of tcp / ip and the analysis results, the smtp protocol filtering, the port filtering, the address filtering and the kinds filtering can be achieved. e - mails can beattained by the analysis of the smtp protocol and pop3 protocol. the control on the visiting target address can be implemented by using the filtering system on the e - mails and the analysis on the http protocols

    通過利用winpcap開發,實現了網路的捕獲,利用tcp / ip協議的裝理論,通過自下而上的分析,實現了地址過濾、類型過濾、協議過濾與埠過濾,通過對smtp協議、 pop3協議通信分析,提取了郵件,並通過過濾系統對郵件進行過濾,通過對http協議分析,實現基於目標地址的訪問控制。
  18. At the same time j2ee platform technologies are discussed deeply, such as j2ee platform technologies, communication technologies, ejb component technologies and so on. the design model based on the mvc frame is applied in the system development, so that the separation between the present logic and the business logic in the application is realized. finally, according to the problems found in the development process, the paper explains particularly the kay technologies in the realization : the uniform naming service is realized by realizing the service locator partten using the value object pattern, all the status data is encapsulated into a serializable object, then transferred among the client, sessionbean and entitybean in order to decrease the potential network traffic caused by reference of entitybean ; in order to improve the performance of data storing and taking, we introduce the facade model to escapsulate the ejbs which delegate the data model

    本論文結合了杭州市財政局的會計人員從業資格管理系統的升級項目,研究了基於j2ee的ejb組件模型的多層分散式體系結構的設計與實現:深入探討了三種分散式處理技術( rmi , corba , com )的區別,將j2ee平臺的ejb技術與windowsdna體系的com +技術從多個角度進行了比較;詳細闡述了在系統開發過程中j2ee平臺的幾項核心技術(如: j2ee平臺的服務技術、通信技術、 ejb組件技術等)的應用;引入了源於mvc三部件框架的設計模式,實現了應用中表現邏輯與業務邏輯的分離;最後,結合在開發過程中遇到的問題,詳細解釋了開發過程中實現的關鍵點:用servicelocator模式實現了統一的命名服務管理;運用valueobject模式將所有狀態裝成一個可序列化對象vo ,然後在客戶機、 sessionbean與entitybean之間傳遞,減少了使用實體bean造成的潛在網路通信量;以及引入sessionfacade模式,用sessionbean裝了entitybean ,改善了存取的性能。
  19. Packet placed in frame

    裝入幀
  20. When you communicate through a tcp socket, the data are chopped into blocks so that they fit within the tcp payload for the given connection

    在通過tcp socket進行通信時,都拆分成了塊,這樣它們就可以裝到給定連接的tcp payload (指tcp中的有效負荷)中了。
分享友人