data flow control protocol 中文意思是什麼

data flow control protocol 解釋
數據流控制協議
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • flow : vi 1 流,流動。2 (血液等)流通,循環。3 流過;川流不息;(時間)飛逝;(言語等)流暢。4 (衣服、...
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. Finally, this dissertation studies the transaction processing and mechanism of data flow of the usb host controller. the usb host controller was designed in five aspects : clock generating, serial data management in protocol layer, protocol regular translation, data fifo and predominated control

    最後,研究了usb主控制器的事務處理和數據傳輸機制,並從時鐘產生、協議層的串列數據處理、協議規范翻譯、數據fifo和主控制五個方面對其進行了結構設計與詳細設計。
  2. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  3. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  4. To supply the gap of current network protocol used in tele - medical monitoring systems, according to a complete life signal monitoring system based on mobile platform, this dissertation presents life signal wearable monitoring protocol. firstly, designing the proper format of data packet and control packet on the basis of life signal ’ s specialty to enhance the transmitting efficiency. secondly, describing the protocol in the method of formalization, designing the flow of the protocol and implementing it by coding. thirdly, analyzing the performance of the protocol on both local machine and lan, debugging and modifying the software to meet the require

    首先,根據生命信號的特點,本著提高傳輸效率的原則,設計了生命信號數據報文和控制報文的合理格式;其次,採用形式化方法對協議進行了描述,設計了協議的工作流程並編碼實現;再次,在單機和網路環境下進行了性能分析,調試修改軟體並使其達到設計要求。
  5. This paper analyzed p - persistent csma / cd protocol and proposed a new adaptive algorithm for the adjustment of the coefficient p by real - time channel traffic sensing based on the feedback control theory, i. e., changing the value of p dynamically through the analysis of networks " flow to control the behavior of the stations sending data frames in the same collision domain, to keep the media channel in an optimal state and to enhance the channel transmission efficiency

    該演算法基於對網路流量的分析,在osi物理層通過通道信息量的在線實時檢測,根據反饋控制的原理,在數據鏈路層動態地調整控制輸入參數p ,從而控制站點發送分組數據幀的行為,使通道處于最佳的傳輸狀態,提高通道的效率。
分享友人