end-to-end protocol 中文意思是什麼

end-to-end protocol 解釋
點到點傳輸協議
  • end : n 1 端,尖,末端,終點。2 邊緣;極點,極限。3 結局,結果。4 目的。5 最後,死。6 【紡織;印染】經...
  • to : adv 到某種狀態;〈特指〉到停止狀態;關閉。 ★也常和動詞結合,略去其後賓語,而構成成語: The door i...
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. This essay set forth the exploitive ways about web application system base on. net framework, particular discuss the problems from hereinafter five aspects : ( 1 ) proceed from present software design direction, the paper probed in details the development trend in the future, and demonstrate the strategy which was held by microsoft on july 2000, at the same time compared it with some other advanced technology. the. net platform is a brand - new development framework, in which it supply some windows service and a brand - new api programming interface of cooperation and integrated much back - end technology of 1990s of microsoft. the elements that. net merged into include : com + componet service, the web developing framework, xml and ood, the support to new web service protocol ( such as soap, wsdl and uddi ), and the idea taking internet as the centre

    Net平臺是一個全新的開發框架,它具有與windows服務和api合作的全新編程介面,集成了microsoft公司20世紀九十年代後期的許多技術。 . net中融合的元素包括: com +組件服務、 web開發框架、 xml和面向對象設計,對新的web服務協議(如soap , wsdl和uddi )的支持,以及以internet為中心的理念。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Based on this algorithm, an end - to - end rate - based transport protocol named the trinomial protocol is developed, in terms of individual performance and capacities, the trinomial protocol provides much better transmission service than current tcp or udp protocols : it minimizes transmission delays and delay jitter by omitting re - transmission ; in the steady state, its transmission rate is smooth ; and when available network bandwidth increases / decreases, it adapts to the change quickly

    基於該機制,開發了基於速率的點對點三項式協議。在個體性能和容量方面,三項式協議提供了比當前tcp和udp協議更好的傳輸服務;在穩態,它的傳輸速率是平滑的,並且當可用的網路帶寬增加或減小時,能迅速而自適應地進行改變。
  4. The goal of the wae micro browser is to converge the http with wsp protocol stack, and supports many kinds of uri schemes, and adopts xml parser to parse the pages written in xhtml basic, wml, chtml, etc. the browser implements an efficient dom api. and it provides security support to protect the privacy of the end users and the information transmitted through the network. by the way, it adopts css, script and vm to enhance the presentation of the markup languages

    0瀏覽器的實現是以原有無線通信協議集成http協議,支持多種url解析;使用xml語言技術解析如: xhtmlbasic 、 wml 、 chtml等多種標記語言編寫的頁面;設計實現高效的dom介面;並且集成網路安全技術,使得個人信息可以安全的在網路上安全的傳送;電子科技大學研究生學位論文採用css 、腳本語言和虛擬機技術增強標記語言的表現力。
  5. ' l need someone on their end to confirm the access protocol. '

    必須有人在那裡批準我的訪問
  6. If there is a node need to communicate the other node, it has to calculate the other node ’ s scan channel which will be it ’ s call channel. the call synchronization protocol will be implement to fulfill the end - to - end link establishment

    網內若有節點需要和其他節點建立點到點連接,主叫節點便使用同步呼叫協議在呼叫通道上實現點到點的鏈路建立。
  7. Rate - based end - to - end transport protocol for internet teleoperation

    用於網際網路遙操作的基於速率的點對點傳輸協議的研究
  8. We give a outlook to the difference of the two protocols. then we dwell on the h. 323 protocol. at the end of the section we give the simplified video / audio conference model based on h. 323

    323協議的簡化視頻會議原型。我們認為,基於rtp實時數據傳送的視頻會議,視頻電話系統是未來若干年的應用系統的耀眼亮點,值得高度重視。
  9. In order to protect the anonymity of consumers in change - making deals, a new method is proposed, that is, the change - making protocol is processed direct to the bank not to the merchant. in the end the merchant ' s anonymity is discussed

    為了保護在商家找零的問題上顧客的匿名性,本文基於已有零錢的解決方法上,對可變匿名性的電子現金系統的中的兩種電子現金的零錢問題提出了一種新的解決辦法,就是直接通過銀行而不是商家進行處理。
  10. Secondly, it proposes the “ mixed route protocol lmrp ” adaptive in dynamic and complicated environment, which cuts in the design of unicast with multipul notes ’ reply, based on the summarization and analyses of the technology and performance used in manet. thirdly, the thesis introduces the complete design plan of this protocol, including method design, specific design, data structure in lmrp, router discovery algorithm, router maintenance protocal, router optimization protocal, logistic layered method, mtu solution, robusticity policy, etc. finally, the thesis simulate protocals in lmrp and compare it with aodv by opnet emulator, which shows that the protocol has advantages in several domains, including end - to - end delay, throughput, etc

    本文首先對manet中的路由演算法和路由協議進行了深入分析研究;提出了一種新的適合於動態復雜環境使用的「局部-全局混合路由協議lmrp 」 ,該協議以多點回復的點播方式的設計思想入手,詳細描述了lmrp的設計方法、實現細節,設計了lmrp的數據結構,路由發現演算法,路由維護協議,路由優化協議,邏輯分層方法, mtu解決方案,魯棒性策略等。
  11. The directional routing protocol ds _ dsr put forward by the author is the improvement of the current protocol dsr, complete routine discovery and maintenance by directional neighbor nodes routing table, source routing and directional steering. the research discovers the application of the directional antenna, compare the omnidirectional antenna can increases the networks " total throughput, obviously reduces the co _ channel interference ( cci ), multiple access interference ( mai ), enlarges the nodes " signal and interference to noise ratio ( sinr ), and because of the high gain of directional antenna can realize the communication with farther distance and less jump, end to end delay can decrease deeply, simultaneously, security of networks can be improved partially, the node energy also can be saved easily by power control

    本文提出的定向路由協議ds _ dsr是基於對現有協議dsr的改進下實現的,通過定向鄰節點路由表、定向源路由和定向搜索來完成路由發現與維護。研究發現,定向天線的應用,相比全向天線可明顯提高網路的總的吞吐量,減少通道干擾、多址干擾,提高信干噪比,且由於定向天線的高增益可實現較遠距離、較少跳數的通信,減少了路由發現時間,這樣大大減小了傳輸時延,網路的整體性能得到了不同程度的提高,同時部分地解決安全問題,通過功率控制還可較容易的實現節能的目的。
  12. First researches the system of ipsec security protocol deeply, then discusses the problems of security in end - to - end communication, advances the idea of resolving problems in end - to - end security communication using ipsec

    論文首先對ipsec安全協議體系進行了深入分析,討論了端到端通信中的安全問題,提出了利用ipsec實現端到端安全通信的思想。
  13. Intserv / rsvp reserves the end - to - end bandwidth and buffers with rsvp signaling protocol to guarantee qos. as the most promising technology at present. diffserv aggregates the data streams of the same type to supply all kinds of services for clients

    Intserv rsvp利用rsvp信令協議在端到端之間預留帶寬和緩沖區等資源,從而確保所需的服務質量;而作為目前最有發展前途的ip網路qos支持技術的diffserv ,將具有相同特性的數據流聚合,以向用戶提供若干種類的服務。
  14. Is security in the communications infrastructure acceptable, for example, in the use of secure socket layer mutual authentication between eai middleware servers, or in the use of the https protocol ? is individual, point - to - point security acceptable between participating systems, or is an end - to - end model required

    是否可以接受通信基礎架構中的安全性,例如,是否在eai中間件服務器之間使用安全套接字層( secure socket layer , ssl )互相驗證,或者是否在使用https協議?
  15. The main contributions of the thesis are : ( 1 ) we present an end - to - end transport architecture using the rtp / udp / ip protocol stack and employ an efficient and robust packetization algorithm for mpeg - 4 video bit - streams at the sync layer for internet transport. ( 2 ) we study the congestion control mechanism based on aimd algorithm, and make improvement in order to reduce the oscillation of transimition rate due to tremendous contrast of packet loss ratio caused by dynamical change of the network load

    論文的主要貢獻在於:提出了基於rtp的mpeg - 4視頻傳輸模型並充分利用mpeg - 4的videoobjectplane ( vop )特性,採用適用於mpeg - 4視頻傳輸的rw載荷格式及組包演算法,同時具有傳輸的高效性和丟包的魯棒性。
  16. Rtf provides end - to - end network transport functions suitable for applications transmitting real - time data, such as audio, video or simulation data, over multicast or unicast network services. rtcp monitors the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. h. 323 and sip use the real - time transport protocol to transmit real - time data. at the end of this section, we provide the guidelines for writting of rtf payload format specifications

    這兩個協議的內容是非常重要的,實現原理都是採用組播方式,我們在互連網上傳輸視頻音頻將使用這兩個協議,而對于更高層次的協議框架h 323 , sip ,在其底層傳輸視頻音頻通常也是採用rtp rtcp協議。 rtp靈活地支持對眾多視音頻編解碼的負載格式,這一部分的最後給出了就如何將視頻音頻數據進行rtp包封裝的一般原則。
  17. A new hvia architecture based on via ( virtual interface architecture ) is put forwardo hvia shortens the delay of remote memory access by 24. 5 % compared with via architecture, and the end - to - end bandwidth is increased by 80. 5 % because of the implementation of zero - copy protocol compared with non - via architecture o 2

    在via虛擬介面結構的基礎上,提出了一種硬體虛擬介面結構( hvia ) 。與via相比, hvia結構平均減小遠程訪問延遲24 . 5 ;與非via結構相比,由於實現了「零拷貝」協議,帶寬平均提高80 . 5 。
  18. The real - time transport protocol ( rtp ) drawn by ietf is a protocol worked on the top of transport protocol. rtp provides end - to - end real - time multimedia data transmission. rtcp, one of its components, can effectively control and monitor the transmission

    Ietf制訂的實時傳輸協議rtp是一個基於傳輸層的協議,它提供端到端的實時數據傳輸服務,其中的實時傳輸控制協議rtcp提供的控制功能可以有效的監控視頻信息的傳輸。
  19. Secondly, by the research on load balance method of distributed sip system, a new distributed architecture is present which apply to the end - to - end signal characteristic of the sip protocol. theoretically, this architecture can lead to ideal load balance result

    2 、深入研究了sip分散式系統的負載均衡方案,提出了新的負載均衡體系架構,該架構適用於了sip同時作為接入及網路側信令的特點,可以達到理想的負荷分擔效果。
  20. Transmission control protocol ( tcp ) is a reliable, robust and end - to - end transmission protocol designed for internet

    傳輸控制協議tcp是專門設計用於在internet上提供可靠的、健壯的、端到端的通訊協議。
分享友人