destination ip 中文意思是什麼

destination ip 解釋
目的地址
  • destination : n. 1. 〈罕用語〉指定,預定,註定。2. 目的地,指定地。3. 目的,目標。
  • ip : 1. initial point 起點。2. Internet Protocol 【計算機】網際協議。
  1. With the swish swash destination ip address and port number

    用swish swash (目的地址)的ip地址和埠號來分配
  2. Finding a feasible and efficient load balanced strategy for the ultra - scalable multi - plane multi - stage switch architecture is a top of nowadays research. the dissertation proposes a two - stage load balanced scheme for the ultra - scalable multi - plane multi - stage switch architecture based self - routing and non - blocking permutation benes network. the approach uses reasonable and efficient logical queueing strategy and schedule scheme in ingress traffic managers and switch planes to realize the two - stage load balancing of ip traffic which for different destination addresses

    本文提出一種適用於基於完全可重排無阻塞benes拓撲構建的多平面多路徑(多級)超大容量交換結構的兩級負載均衡策略,通過在輸入流量管理器和benes交換平面內部實施合理而高效的隊列組織調度方法,有效實現了基於不同目的地址的ip流量在兩個層次上的負載均衡,較好彌補了ciscocrs - 1系統在平面選擇和中間級選擇時所採用的簡單隨機或輪循方案的不足。
  3. In its header, each packet also carries the ip address of the final destination

    在報頭中,每個包也攜帶最終目的地的ip地址。
  4. When ddos happens, the flood presents some characteristics, such as the statistical distributing. although an attacker can forge any field in the ip header, he or she cannot falsify the numbers of hops an ip packet takes the reach its destination, which is solely determined by the internet routing infrastructure

    Tcpsynflood攻擊發生時,在路由器會引起某些異常情況,如流量異常(可能會流量猛增) ,報文流一些特徵的統計分佈特性發生改變(如源ip地址的隨機分佈特性, ttl欄位的分佈特性)等。
  5. Round robin would distribute connection attempts evenly among the channels, while hashing would use the client s ip address to determine the destination channel

    輪流調度方式會將連接嘗試均勻地分佈到各個通道上,而散列方法則使用客戶機的ip地址來確定目標通道。
  6. This is roughly how it works : gpass wraps the network traffic of your internet applications in various formats, and tunnels the wrapped packets through various dynamic channels to its servers. the gpass servers un - wrap the packets and forward them to their destination on your behalf, but hiding your identity i. e., ip address

    世界通的基本工作原理是:將您上網的數據加以特殊包裝,然後通過不同形式的動態隧道加密傳輸到位於世界各地的世界通服務器,這些服務器再將您的數據解包后傳輸到您想去的地方。
  7. Subnet, in which case the sending host will forward the datagram to a gateway - an ip host that connects two subnets - which will then try to deliver the datagram to the destination host if the destination host is in one of the subnets connected to the gateway

    子網,這種情況下發送主機將把數據報轉發到網關(連接兩個子網的ip主機) ,然後,如果目的地主機在一個與網關相連的子網中,則網關會嘗試將數據報傳遞到目的地主機。
  8. A host is typically the source and the destination of ip traffic

    通常,主機是ip通信量的源和目標。
  9. The icmp echo request failed because the destination ip address cannot receive icmp echo requests or should never appear in the destination address field of any ip datagram

    由於目標ip地址無法收到icmp回送請求或者永遠都不應當出現在任何ip數據報的目標地址欄位中, icmp回送請求失敗。
  10. Section one, we illuminate the conception of multicast. ip multicasting is the transmission of an ip datagram to a " host group ", the datagram is not guaranteed to arrive intact at all members of the destination group or in the same order relative to other datagrams

    第一部分介紹組播相關概念。組播是基於udp數據報方式的,非面向連接的一種網路數據發送方式,組播是rtp rtcp數據傳輸的基礎。
  11. The ip router is responsible for " routing " the packet to its destination, directly or via another router

    Ip路由器是直接或間接路徑,將目標文件的信息包發送至指定路徑。
  12. This new, readable header is simply the ip address of the security device belonging to the destination site

    這個新的可讀報頭只是屬于終點站上安全裝置的ip地址。
  13. With the eblade destination ip address and port number

    用eblade (目的地址)的ip地址和埠號來分配
  14. Networks use the tcp ip protocol to route information based on the ip address of the destination

    各種網路會使用tcp ip通訊協定,依據目的端的ip位址轉送資訊。
  15. The source and destination nodes are identified by ip addresses

    源和目的地節點都用ip地址標識。
  16. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議棧指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
分享友人