網關主機 的英文怎麼說

中文拼音 [wǎngguānzhǔ]
網關主機 英文
gateway host
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : Ⅰ動詞1 (使開著的物體合攏) close; shut 2 (圈起來) shut in; lock up 3 (倒閉; 歇業) close down...
  • : machineengine
  1. Special organization developed mechanism of jiangsu public security safety of network of information of key internet unit is checked greatly, check key internet information to serve an unit in all 2627, hidden danger of next safety of hairnet sth resembling a net rectify and reform advice note 104, still rent to mandatory lead plane and fictitious space safety administration has repair, outstanding to 4 problems internet data center is executed hang out one ' s shingle supervise and direct, the course is rectified and reform, delete bawdy pornography information in all 2570

    江蘇公安專門組織開展了重點路單位信息路安全大檢查,共檢查重點路信息服務單位2627家,下發路安全隱患整改通知書104份,還對託管和虛擬空間出租安全治理進行整治,對4家問題突出的路數據中心實行掛牌督辦,經過整改,共刪除淫穢色情信息2570條。
  2. For this reason bridging the communications gap between serial - only devices to tcp / ip network hosts is a very important research topic. the thesis starts from the three research methods about gateway equipment, talks about the each characteristics, finally brings forward the material method how to implement the tcp / ip stack on the 51 mcu. at the same time, it uses the format of the callback function implementing the application layer protocol facing industrial real - time communication ( modbus protocol )

    論文從目前國內要的三種設備的研究方法談起,討論了各個方法的特點,提出了在常規的51單片硬體上實現簡化的tcp / ip協議棧設計方法和具體實現,並利用回調函數的形式實現了面向工業實時通訊的應用層協議( modbus協議) 。
  3. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於卡設備的安全認證,認證過程與,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的密性,完整性。
  4. The systems of century ck security locks and automatic alarm lock security have special features, when the larcener were seen breaking a lock, the setbar of door lock shock, it automatically switches touch alarm, it quickly issued a warning signal, alarm and transmitted to the mainframe, telecommunications company by phone or sent to the terminal, it can be 110 and the security alarm centers, community policing, the residential quarters network security departments, the police realized the linkage

    世紀西科防盜鎖具及自動報警防盜鎖具系統在防盜方面有獨到之處,一旦盜竊者有撬門或破壞鎖具,門鎖的鎖栓震動,能自動觸動報警開,迅速的發出報警信號,並傳送到報警上,通過電信公司發送至手或電話終端;可以與公安110報警中心,社區治安聯防,住宅小區保安部門聯,實現了聯動報警。
  5. Marine diesel union fuzzy neural network model can not only reflect the fuzzy character and logicality of main engine, but also avoid the joints between irrelevant parameters, simplify the network structure, and decrease the calculation. 2

    船舶柴油組合模糊神經路模型可以反映系統的模糊特性和邏輯特性,簡化了路結構,避免了無性能參數之間的連接,減少了計算量; 2
  6. Based on the detailed analysis on the current main ha technologies and the ha architecture in wacos gateway, which is a typical soft switch network device, and considered the characteristics of trillium ' s implementation of ha and protocols, the dissertation presents a warm - standby ha design based on psf ( protocol - specific - function ) information update mechanism

    在詳細分析了當前要的ha技術及一種典型軟交換設備? wacos中ha體系實現的基礎上,結合trillium公司megaco協議棧產品及其ha的實現特點,本文提出了基於psf ( protocol - specific - function )信息刷新制的溫備份( warm - standby )的ha設計方案。
  7. The major meaning provided in this thesis is that it provides a ha design and implementation based on psf information update mechanism, and implement the fault tolerance function of megaco protocol stack, complete the integration of trillium ' s megaco product, which is a typical distributed telecom software, and wacos ha manager

    本文工作的要意義在於提供了一種基於psf信息刷新制的ha方案,在此基礎上實現了megaco的系統容錯功能,完成了trillium的megac0協議棧這種典型的分散式大型電信軟體與wacosha管理模塊的集成。
  8. Based on the above - mentioned situation, it is therefore suggested that the fixed telecom network company will focus on how to add voice service on ip man, and to increase value added service, i. e. to develop the pure sip packet voice on the broadband man, and to boundle instant messageand user presence business ; to promote mgcph. 248 mode and sip mode on the newly established community using broadband lan access ; the big media gateway in the soft switching will mainly suitable for the broadband ip man voice service and pstn interconnection

    根據以上情況的分析,建議固定路電信公司將發展的重點放在如何在寬帶ip城域上增加話音業務,提高增值收入方面。即在寬帶城域上發展純sip分組話音方式,綁定即時消息和用戶狀態( presence )業務;在新建寬帶lan接入小區推廣mgcph . 248話和sip話方式;軟交換中大媒體方式要用作寬帶ip城域上話音業務與pstn互通方面。
  9. This can be seen in the enhancement of exchanging capacity, the replacement of 2mbits trunking interface by sdh stm - 1 or the integration of data processing module with the data voice gateway and the dial - in access server with the adsl module. it is also no surprise to see the co - existence of ps and cs modules or an all - round ps layout on the exchanging part

    Pstn交換發展的要方向是:提高交換處理能力,直接提供sdhstm - 1介面來取代2mbits中繼介面,集成數據業務處理模塊及數據話音,集成撥號接入服務器及adsl模塊,加入分組交換模塊與電路交換共存或者用分組交換完全替代電路交換等。
  10. On the basis of familiar with can bus and gsm communication, considering hev ( hybrid electric vehicle ) battery administrative system ' s demand for the host pc monitoring system, i have designed can - rs232 converter gateway to realize transmission the real - time data from can node to rs232 serial port, which is carried out by the project of at89c52 mcu + sja1000 can controller + 82c250 can controller interface. host monitoring software has accomplished real - time datas display, storage, historical datas graph analysis and storage fashion change from access to excel, at the same time, realized important datas transmission remotely with tc35 short message module. system software programs in assembly and vb

    Can - rs232轉換採用at89c52微處理器+ sja1000can控制器+ pca82c250can控制器介面實現對can總線節點通訊的監聽,並將其轉換成rs232串口電平發送到pc串口,同時用siemens公司的tc35模塊和at指令實現現場採集系統重要數據和錯誤信息的短消息通訊。在上位pc監控系統中,要完成的是對串口設置的選擇控制、現場採集數據的實時刷新顯示、歷史數據的圖表分析及數據的access數據庫存儲和excel電子表格的轉換。系統軟體採用匯編語言和vb實現。
  11. The first chapter surveys the state - of - the - art of intrusion detection and the related problems. the second chapter provides the details of intrusion detection techniques, in particularly, it introduces two concepts ( network - based ids ( nids ) and host - based ids ( hids ) ), and the distributed ids. besides, this chapter proposes three intrusion detection methods ( misuse detection, anomaly detection and integrality test ), and discusses the applications of the artificial neural network technology 、 expert system technology 、 and pattern reasoning technology in the ids

    第二章討論入侵檢測技術基礎,介紹了基於路的入侵檢測系統( ndis )和基於的入侵檢測系統( hdis )的概念,對分散式入侵檢測系統也進行了相介紹;討論了三種入侵檢測辦法,包括誤用檢測( misusedetection ) 、異常檢測( anomalydetection )和完整性檢測,介紹了人工神經路技術、專家系統技術以及模式推理技術在ids中的應用。
  12. The latter ptda discusses the related theorems and rules ofjudgeing the root bridge and root port as well as specifing the bridge and port, makes use of many protocols such as stp, snmp and arp, eventually determines the conjunction relation between router, switches and host in the network

    該演算法討論了確定根橋、根埠、指定橋和指定埠的相規則和定理,正確運用了stp 、 snmp 、 arp等協議,成功地確定了路中路由器、交換之間的連接系。
  13. This article first analyzes a paradoxical phenomenon that is predominant in campus lan settings where there is a large amount of idle cpu cycles available while at the same time the computing needs from many researchers ca n ' t be met. it proposes an idea of setting up a campus computing grid with a detailed plan for its implementation, discusses the challenges of upscaling a campus computing grid into an internet computing grid and suggests possible solutions. gram ( grid resource allocation manager ) of globus toolkit 3. 2 and relative technology on it is studied, and the solutions to extend gram to support task rescheduling and the cooperation type task are proposed. the design and implement of the gram client based on web that is the kernel part of the task anagement module are discussed, and the design of resource discovery module and task transfer module are gived

    本文首先分析了校園環境中存在大量計算資源閑置與科研人員科學計算需要得不到滿足之間的矛盾,給出了建立校園計算格的構想及具體的設計方案,並提出了校園計算格推廣到internet計算格存在的問題及解決方案;研究了globustoolkit3 . 2中的資源分配管理器gram及其相技術,並給出了擴展gram對任務再調度和協作型任務支持的解決方案;設計實現了校園計算格中任務管理模塊的核心部分基於web的gram客戶端,並介紹了資源發現與任務遷移模塊的設計;然後在分析min - min調度演算法基礎上,借鑒qosguidedmin - min演算法的思想,並利用資源分類的思想,給出了在負載平衡和時間跨度都有較大改善的balance - qosguidedmin - min演算法模型的思想與實現;最後設計實現了調度演算法驗證模塊,並在此模塊上對比了改進的演算法balance - qosguidedmin - min與min - min演算法的調度性能。
  14. The subject recommends the sending and receiving sms through smg network and ismg network, explains the main content of cmpp, sgip and the network game ( games developed on the basis of brew and j2me ) on the whole, mostly, the subject introduces the main content of message paradise, including overall design, structure design, database design and all respects, it can make us clear about the framework and development of the cell phone message game, it has offered the overall solution for the thing that the cell - phone receives and dispatches messages and plays games, which makes us able to realize the sending and receiving of message, the game reminding, public information sending, statistics of the web page report, message charge ( including according to piece charge, real - time monthly payment, non - real - time monthly payment ), customer service support, game ' s control and a series of functions of the game

    本課題介紹了通過聯通或者移動發送簡訊的過程,闡述了cmpp協議和sgip協議的要內容以及路游戲(要是基於brew和j2me開發的游戲)的大體內容,最要的是,本課題介紹了簡訊樂園的要內容,包括總體設計、結構設計、數據庫設計等各個方面,可以讓我們清楚的了解手簡訊游戲的架構和開發過程,本課題為手收發簡訊、玩游戲提供了全面的解決方案,使我們可以實現簡訊游戲的發送和接收、游戲下發提醒、公共信息的群發、頁報表的統計、簡訊游戲的收費(包括按條收費、實時包月記費、非實時包月記費) 、客服支持、系統監控等一系列功能。
  15. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上資格審查;針對路安全審計,重點研究了路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於的防病毒檢測思想,在客戶端進行病毒防護。
  16. The author introduces mainly sgip ( short message gateway interface protocol ), the interface protocol of chinese unit communication campany, and discusses the application of mobile telephone short messages incremental business based on sgip

    本文要介紹了sgip協議,即中國聯合通信公司短消息系統介面協議,討論了基於該協議的手短消息增值業務應用程序的開發。
  17. This paper mainly introduced switcher realization scheme. and this paper traversed store - and - forward technology, medium access control and physics sublayer technology, which are the keys technologies of fast ethernet switcher

    論文要介紹了快速以太交換的實現方案,並詳細講述了實現快速以太交換的存儲轉發技術、介質訪問控制技術和物理層技術等鍵技術。
  18. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  19. If it s not, the gateway will forward the datagram to another gateway

    如果目的地不在與相連的子中,將會把數據報轉發到另一個
  20. Prints the path route for a connection to a network host through a series of routers and gateways, identifying the latency between each hop

    列印某個連接到所經過的包括一系列路由器和的路徑(路由) ,從而確定每個hop之間的延時。
分享友人