源網路地址 的英文怎麼說

中文拼音 [yuánwǎngdezhǐ]
源網路地址 英文
sna source network address
  • : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : 名詞(建築物的位置; 地基) location; site; ground; foundation
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Designers worldwide are working on local - access approaches using time - division multiple - access ( tdma ) technology. examples include using passive optical networks ( pons ) to realize fiber to the home, fiber to the curb. with the advent of the interactive services such as vod ( video on demand ), the communication traffic from subscriber to central office are increasing significantly

    各國的設計人員都在進行使用時分多( tdma )技術的本接入方式的研究工作,例如在本接入方式中,利用工作于突發模式的無( pon )實現光纖到用戶、光纖到邊的連接。
  2. Abstract : the continually increase in digitized information resour ces such as disc publications and on - line databases, which put forward new task s for the collection construction of library, requires that the libraries of coll eges and universities shoud reestablish the new purchase criteria for the collec tion of library and incerase the devoted proportion of the digitized information resources. directed by the new purchase criteria, the libraries should optimize t heir local collection and take full advantage of the virtual collection in compu ter network and collect and manage more efficiently the importand collection re sources in network era, network addresses and digitized publications

    文摘:光盤出版物、聯機數據庫等數字化信息資的不斷增長,給圖書館的館藏建設提出了新的任務.這就要求高校圖書館必須重新制定館藏采購標準,適當加大數字化信息資的投入比例,並在新的采購標準指導下,不斷優化本館藏,充分利用計算機上的虛擬館藏,同時做好時代圖書館的重要館藏資? ?及數字化出版物的收集與管理工作
  3. Today, numbers are on the wane thanks to the ease with which mobiles can store and retrieve names and the ubiquity of e - mail addresses and other internet - based identity tags, such as skype names

    現在,由於移動設備存取名字十分方便、再加上無處不在的電子郵件及其它的身份標識,數字在生活中正變得越來越少見。
  4. Use an ingress filter on your network to ensure that no packets enter your outside boundary with a source address of your internal network

    中使用入口過濾器來確保沒有使用你的內部的包進入你的外界。
  5. Facing the information age, the marine environmental information systems should also absorb the article intelligence technology and virtual reality technology to serve as a decision - making support system and export system for the ocean environment study and development. thirdly, based on maplnfo ( gis software ) platform and development languages ( vb and mapbasic ), marine environment information system in luoyuan bay was designed and development, then relied on gps and rs, ocean environment information in luoyuan bay was collected and managed effetely, its aim is to provide a reasonable opinion for decision - maker on how to utilize resources and protect environment in luoyuan bay. lastly, marine environmental quality of aquafanns in luoyuan bay was assessed relied on marine environmental information system and mathematics model ( fuzzy cluster ), and corresponding countermeasures were presented to protect ocean environment in

    本文首先通過對海洋環境信息系統的特點和國內外研究現狀的分析,探討了時代海洋環境信息系統的發展趨勢;接著以mapinfo ( gis軟體)為開發平臺,以vb和mapbasic為開發語言,面向管理和決策層,進行羅灣海洋環境信息系統的設計與開發,並結合遙感( rs )和全球定位系統( gps )建立模型庫,收集和管理羅灣海洋環境信息,旨在為羅灣的海洋建設項目的立項、選、規劃和海洋污染事故的應急提供決策支持,從而有效保護羅灣海洋生態環境;最後運用羅灣海洋環境信息系統並結合數學模型(模糊聚類)對羅灣養殖區水環境現狀進行評價,從而使得羅灣各海水養殖區的水質現狀評價變得生動、形象和直觀,並針對羅灣海洋污染狀況和污染現狀,提出了保護羅灣海洋生態環境相應的對策。
  6. In addition, compallng of anplementaton, security flexibility scalability and support of qos between these two models is provided. at the saxne time, mels vpn - - - - a solution for integrated model is discussed in detail, including network components of mpls vpn and its operation mode. there are also some problems that must be solved to build a mpls vpn, such as customer address space overapping, network accessibility constraini, vpn route updating, saving of backbone bandwidth, reducing of complexity of pe rooters and accessing internet from vpn, etc. mpls vpn can solve all the problems, as well as bring us some values in scalability, implemotation and maintenance

    在此基礎上,詳細闡述了集成模型的解決方案? ? mplsvpn的工作原理,包括mplsvpn的構成和運行模式,對實現虛擬專用所面臨的問題:用戶空間重疊、連通性約束、 vpn由信息更新、節省骨幹帶寬資、降低pe由器處理的復雜性以及如何在虛擬專用內訪問internet等提出了解決方案,並對mplsvpn在擴展性、可實現性、可維護性方面的優勢進行了說明。
  7. The directional routing protocol ds _ dsr put forward by the author is the improvement of the current protocol dsr, complete routine discovery and maintenance by directional neighbor nodes routing table, source routing and directional steering. the research discovers the application of the directional antenna, compare the omnidirectional antenna can increases the networks " total throughput, obviously reduces the co _ channel interference ( cci ), multiple access interference ( mai ), enlarges the nodes " signal and interference to noise ratio ( sinr ), and because of the high gain of directional antenna can realize the communication with farther distance and less jump, end to end delay can decrease deeply, simultaneously, security of networks can be improved partially, the node energy also can be saved easily by power control

    本文提出的定向由協議ds _ dsr是基於對現有協議dsr的改進下實現的,通過定向鄰節點由表、定向由和定向搜索來完成由發現與維護。研究發現,定向天線的應用,相比全向天線可明顯提高的總的吞吐量,減少通道干擾、多干擾,提高信干噪比,且由於定向天線的高增益可實現較遠距離、較少跳數的通信,減少了由發現時間,這樣大大減小了傳輸時延,的整體性能得到了不同程度的提高,同時部分解決安全問題,通過功率控制還可較容易的實現節能的目的。
  8. Common network attacks such as ip spoofing, source route spoofing, icmp redirect deception and ip hijack are analyzed and protected by filter manage module. ip hijack protection is implemented through injecting a hook function into protocol stack in detail

    針對常見的ip欺騙、 ip由欺騙、 icmp重定向欺騙、 ip劫持等攻擊給予了分析並在過濾管理模塊中給出了防禦的方法,其中ip劫持防禦是用一個鉤子函數注入協議棧中來實現的。
  9. Socket function mainly realizes setting up and initializing service unit socket, initializing service unit and service unit serial and so on. bind funcion primarily binds local address and port for the socket. listen function is to evaluate the max length of server ’ s listening queue. connect function and accept function set aside rate ahead, infrom user ’ s request of establishing virtual circuit to suna, cooperate with suna to establish the connection between client and server, return the result. we make use of three handshake with data protocol and virtual circuit mode, in this way, when we translate data, we can look up communication course according to virtual circuit number, at the same time, there aren ’ t source ip address and port, end ip address and port in the head of data package, the speed of translating data advances in a certain extent. send function and recv function is to send data collaborating with suna, and copy data from the receiving queue of socket to user ’ s buffer. close function cooperate

    Socket ( )函數實現創建、初始化服務元套接字,初始化服務元及服務元序列等。 bind ( )函數為套接字綁定本和埠號。 connect ( )和accept ( )函數主要是根據用戶要求預留帶寬,將用戶的建立虛電請求轉達給服務元體系,協作服務元體系採用捎帶數據的三次握手協議建立虛電,並告訴用戶處理結果,一方面,捎帶數據的三次握手協議在一定程度上可提高數據傳輸速度;另一方面,採用虛電方式,使得數據通信可直接根據虛電號查找相應的通信進程,而且數據包的包頭中省去了ip、埠號和目的ip、埠號,提高了數據傳輸速率。
  10. Article 6 china internet information center is responsible for the management of internet addresses, domain names and catalogues of network resources and shall provide relevant information services

    第六條中國絡信息中心提供、域名、目錄管理和有關的信息服務。
  11. Conventional tcp / ip network suffers some problems, such as simplex services, source address spoofing and implosion of negative acknowledgement in multicast, in the course of its development

    傳統的tcp / ip在發展過程中遇到了一些難以克服的問題,比如服務單一、欺騙、多播中否定應答風暴等。
  12. Use an egress filter on your network to ensure that no packets leave your network with a source address that isn ' t a part of your internal network

    中使用出口過濾器來確保沒有使用不屬於你的內部的包離開你的
  13. Iv by using the domain name, you have intentionally attempted to attract, for commercial gain, internet users to your web site or other on - line location, by creating a likelihood of confusion with the complainant s mark as to the source, sponsorship, affiliation, or endorsement of your web site or location or of a product or service on your web site or location

    ( iv )通過使用該域名來造成與競爭對手商標類似的混淆,如你方站或或你方站或上的產品或服務的資、贊助,聯系或批註,你方有意企圖為了商業利潤吸引用戶到你方的站或其他在線
  14. Then referring to the distribution projects of ip address in existing gprs network, the author analyzed and compared relative merits of deferent projects and brought up a new project : because both chinese gprs network and exterior data network are actually the same physical network, considering the gprs network security which is ensured by invisibility relative to exterior network, gprs network facilities try their best to employ private address in order to detach logically gprs core - net from exterior network through packet filtration of firewall and router ; because of the deficiency of public ip address recourses, the employment of public ip address should be minimized

    隨后參照現有gprsip的分配方案,通過分析、比較各種方案的優缺點,提出了一個新的分配方案:由於中國gprs和外部數據合二為一的現實,出於對安全性的考慮,設備盡量採用私有,通過防火墻和由器進行包過濾,使gprs核心在邏輯上與外部分開,使其對外部不可見以保證gprs的安全性;同時,由於公有ip不足,盡可能減少用戶對公有ip的佔用。
  15. And issues related to ip addresses, number resources, network safety and interconnection and interworking between networks need to be solved. 2 ) compatibility and standardization

    還有像ip、號碼資安全、之間互通互連這樣跨技術和政策領域的問題需要解決。
  16. This information, compiled and analyzed on both a personal and an aggregated basis, may include the uniform resource locator " url " of the web site you visited just prior to accessing our site, the url you go to after leaving our site, what browser you are using, and your internet protocol " ip " address

    此等資訊將被個別或整體進行綜合化和分析。此等資訊包括了您在訪我們的站前剛到的一致資器" url "的資料,在剛離開我們的站后訪問的url ,您使用的瀏覽器,和您的協定" ip "
  17. We gather this information each time you access our site. this information, compiled and analyzed on both a personal and an aggregated basis, may include the uniform resource locator ( " url " ) of the web site you visited just prior to accessing our site, the url you go to after leaving our site, what browser you are using, and your internet protocol ( " ip " ) address

    您每次取存我們的站時,我們都會收集此等資訊。此等資訊將被個別或整體進行綜合化和分析。此等資訊包括了您在訪我們的站前剛到的一致資器( " url " )的資料,在剛離開我們的站后訪問的url ,您使用的瀏覽器,和您的協定( " ip " )
  18. Furthermore, a standard safety management and monitoring information system was developed, including the subsystem of major hazard identification, safety evaluation and gradation, remote real - time monitoring, e - maps based on gis, gps positioning, emergency plan and command, site locating and safety planning etc, which provided an advanced tool for establishing the information system of major hazard control based on internet

    該系統主要包括重大危險辨識、安全評價與分級、遠程實時監控、 gis電子圖、 gps定位、應急救援預案及指揮、選與安全規劃等子系統,為我國建立全國重大危險監控信息系統提供了一個標準的、先進的信息化平臺。
  19. If, according to the gateway s routing tables, the destination address specified in the datagram to be forwarded is not reachable, it will return a

    如果根據關的由表,數據報中指定的要轉發的目的是不可到達的,則關會向主機返回icmp的
分享友人