data access protocol 中文意思是什麼

data access protocol 解釋
數據存取協議
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. Second, based on integrating networks of mobile management, the thesis modifies the access protocols of umts ps to build the transmission bearer cannel of data and signaling and guarantee the seamless connection of maent and umts. then, using adov routing protocol with mip, the thesis builds the emulation model of integration network and analyzes the throughput of network in ns

    然後,在ns ( networksimulation )模擬環境中,利用基於移動網際網路絡協議( mobileinternetprotocol , mip )的按需距離向量路由協議( adhocon - demanddistancevectorrouting , aodv )對整合通信網路模擬建模,並對整合通信網路的網路吞吐量進行了分析。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Active directory application mode adam is a new mode of the active directory directory service that is designed to meet the needs of line - of - business applications that require a dedicated lightweight directory access protocol ldap data store, e - commerce applications that require simple ldap authentication support, and enterprise environments that require an application directory that is separate from their network operating system infrastructure directory

    Active directory應用程序模式( adam )是active directory目錄服務的新模式,設計用於滿足以下應用程序或環境的需要:需要專用輕型目錄訪問協議( ldap )數據存儲的行業應用程序,需要簡單ldap身份驗證支持的電子商務應用程序,以及需要獨立於網路操作系統( nos )結構目錄的應用程序目錄的企業環境。
  4. Ais works on the marine vhf, use the sotdma ( self organized time division multiple access ) data chain protocol to transfer data of ships. the ais can help the limits of the current services, and decrease the collide case of ships, and improve the value of the safe action in marine, and make the content of the radar and the vts more stronger

    船舶自動識別系統( automaticidentificationsystem ,簡稱ais )工作在海上vhf頻段,運用sotdma方式發射船舶數據,具有補充現有船舶導航存在的缺陷,減少船舶碰撞事故;提高搜救船舶海上救助的速度;增強雷達、船舶交通管理系統vts的功能。
  5. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    在數據鏈路層的設計中針對水下聲通道的特點,對于介質訪問控制協議採用了maca協議,它使用rts - cts控制報文握手機制來解決uan中的隱蔽終端、暴露終端以及功率控制問題。
  6. Broadband radio access networks bran - hiperlan type 2 ; conformance testing for the data link control protocol - part 1 : basic data transport function ; sub - part 3 : abstract test suite specification endorsement of the english version en

    數字表示法;出版物;出版;數字;文獻摘要本標準規定了出版物在涉及數字表示時間長度質量面積容積等量值和數字代碼時使用漢字和阿拉伯數字的體例。
  7. The medium access control ( mac ) layer protocol of the airlink interface between the mobile data base station ( mdbs ) and mobile end systems ( m - ess ) in cellular digital packet data ( cdpd ) is studied firstly. the access method of slotted non - persistent digital sense multiple access with collision detection ( dsma / cd ) is described mainly

    本文首先研究了蜂窩數字分組數據( cdpd )空中介面中的介質接入控制層( mac )協議,詳細論述了基於時隙的非堅持的、帶沖突檢測的數字載波偵聽多址接入協議( dsma cd ) 。
  8. This system makes people fell convenient in looking for data, try my best to our environment protection. the following problems and related solutions are given in this paper : data structure suitable for web computing multi - user access and concurrent control mechanism in webgis network protocol and intelligent information agent of spatial information spatial information security in web computing environment web integration strategy of spatial information based on metadata architecture of webgis at last, the development trend of webgis is discussed

    通過論文工作提出了以下幾個問題並給出了相應的解決方案適合web計算的數據模型webgis中的多用戶訪問與並發控制機制空間信息的網路計算策略與實施方案及關鍵演算法空間信息的網路傳輸協議與智能空間信息代理web計算環境下的空間信息安全性問題基於metadata的空間信息web集成方案與智能空間搜索引擎webgis體系結構最後,論文對webgis發展趨勢進行了探討。
  9. This card largely depends on three integrate chips to fulfill its function : 1 ) nic control main chip, corresponding the mac sublayer of ethernet, to realize csma / cd media access protocol, manage the sending and receiving buffers integrated on the chip and provide motherboard pci interface. 2 ) serdes ( serializing and deserializing ) chip, corresponding pcs and pma sublayers in ethernet, mainly to complete 8b / 10b coding and convert 10 bits parallel data to serial data, and convert them again at the receiving end. 3 ) fibre transceiver unit, completing light - electrical conversion of seri

    該網卡主要由3塊集成的晶元完成其功能,分別是i )網路控制主晶元,對應于以太網的mac子層,主要完成csmaicd介質訪問協議,管理片上集成的發送和接收緩沖區,並提供和主板p0總線的介面: b ) s rd s (串列解串列化器)晶元,對應于以太同的pcs和pma子層,主要完成sb lob編碼並將10位并行的數據轉換為串列數據,在接收端完成相反的功能:涌)光纖收發器,完成串列數據的光電轉換功能。
  10. Lightweight data access protocol

    簡易數據存取協議
  11. With wmi, system administrators and management application developers can use a single interface for local and remote access to win32, system monitor, wmi for windows driver model ( wdm ), registry, event logs, desktop management interface ( dmi ), simple network management protocol ( snmp ), and any other data wmi generates

    使用wmi ,系統管理員和管理應用程序的開發人員使用單一的界面即可從本地和遠程訪問win32 、系統監視器、 wmiforwindows驅動程序模型( wdm ) 、注冊表、事件日誌、桌面管理介面( dmi ) 、簡單網路管理協議( snmp )和任何其他wmi生成的數據。
  12. Then paper focuses on how to implement an interface between subscribe management system and conditional access system. it adopts xml techonology to represent the data exchanged. and the xml data wiii be sent by tcp protocol to ensure stability and efficient

    用戶管理系統與ca系統的介面對sms系統尤為重要,我們對該介面採用xml來描述被傳遞的內容,達到易表達、易讀、易分析的目的,將xml格式的數據放在tcp協議層上傳輸來保證介面的高效穩定。
  13. Hf manet is a kind of manet that uses short wave channel as the physics medium. mac layer protocols are the core of hf manet to become a network. link layer protocols mainly research on medium access protocol, mac address, automatic link establishment technologies, protocol data structure and data transmission protocol

    鏈路層協議是短波自組織網技術的核心,其主要研究為通道接入協議、鏈路層地址標識、自動鏈路建立、協議幀格式及數據幀傳輸協議等。
  14. The protocol opnet models built here could be reused for the simulation of throughput performance of aos bitstream, virtual channel access and other services, for the simulation of delay, channel utilization, and other aos protocol performance metrics, or for the simulation of the performances of high layer protocols ( space network layer, transport layer ) based on the aos space data link protocol

    可以在本課題建立的協議opnet模型基礎上進行aos協議位流、虛擬通道接入等其它業務吞吐量性能模擬,或進行延遲、通道利用率等協議其它性能模擬,或將模型應用於基於aos數據鏈路層的高層協議(空間網路層、傳輸層)性能模擬。
  15. The problem lies in how the receiving side is able to understand the serialized simple object access protocol soap messages that contain the weakly - typed object elements and native data types

    該問題是接收方如何能理解被序列化了的簡單對象訪問協議( simple object access protocol , soap )消息,這些消息中包含弱類型對象元素及本地數據類型。
  16. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、訪問協議、數據服務流程以及基於webservices 、 xml等技術的實現策略,重點研究數據庫網格中的元服務、數據統一訪問和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和數據訪問服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、數據對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的數據庫數據進行了統一命名,實現了相應的名字映射機制和全局的用戶數據視圖服務,提供了數據庫資源的虛擬組織與管理方式;數據訪問服務通過提供可擴展的統一數據訪問和支持多種數據共享訪問模式,屏蔽了數據庫資源的分佈性和異構性,為用戶提供了統一透明的數據服務。
  17. If sql native client or a microsoft data access components mdac client is already installed, the protocol settings are preserved

    如果已安裝了sql native client或microsoft數據訪問組件( mdac )客戶端,則將保留協議設置。
  18. Firstly, inttoduce and analysis the reservation random access protocol ( rra ), which is fit to the data services. then the packet reservation multiple access ( prma ) protocol is introduced, which is fit to the integrated voice / data services

    首先介紹和分析了針對數據業務的預約隨機接入( rra ) ,然後介紹了支持話音和數據綜合業務的多址接入方法prma 。
  19. Based on deeply understanding of the research level at home and abroad and the architecture of the shared platform of heterogeneous databases, the author studies directory service technology, especially ldap ( lightweight directory access protocol ), and then designs directory databases, provides a system framework of multi - directory databases including dic ( directory information collector ) of heterogeneous data, and then shows a one - time update policy to maintain the consistency of the data and directory and their copies according to the practice demand of the research task

    作者認真了解國內外的研究現狀以及異構信息共享平臺的體系結構的基礎上,深入研究目錄服務技術特別是ldap ( lightweightdirectoryaccessprotocol ) v3 ,並根據本課題的實際需要,進行了目錄數據庫的設計,給出了多目錄數據庫的系統框架,包括異構數據的智能目錄信息收集器dic ( directoryinformationcollector )的設計和分散式目錄的分析,提出了一次性更新策略以實現數據和目錄的主副本一致性問題。
  20. Exemplified by the business between retailer possessing of inventory management system and logistics enterprise, application programs of the designed system have also been fulfilled, while automatic transferring and processing of data among application programs are realized by simple object access protocol ( soap )

    本文還完成了該系統設計方案的應用程序,以擁有庫存管理系統的零售商和物流公司間業務為例,利用簡單對象訪問soap協議實現應用程序間數據自動傳輸和處理。
分享友人