packets data-flow 中文意思是什麼

packets data-flow 解釋
包式數據流
  • packets : 數據包
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • flow : vi 1 流,流動。2 (血液等)流通,循環。3 流過;川流不息;(時間)飛逝;(言語等)流暢。4 (衣服、...
  1. 1 ) realization of software packet embedded in m - es and md - is respectively to accomplish main function of mdlp, including assignment of tei ( temporary equipment identifier ), establishment of multiple frame operation, framing, flow control and error - free transmission of packets, is detailed. 2 ) a test model is established to evaluate the robustness and stability of mdlp and verify the validity of software packets. 3 ) according to the design of radio modem construction used in m - es, the modules of interface between data terminal equipment and radio modem are achieved to enable transmission of short message and continuous pseudo - random bit stream via rs232 uart

    本文首先概述了蜂窩數字分組數據網的結構和空中協議,詳細分析了移動數據鏈路協議,並在此基礎上,重點敘述了以下方面的工作: 1 )設計並完成了分別應用於m - es和md - is端無線控制器的兩套程序實現數據鏈路層的主要功能,包括分配臨時設備號、建立鏈路、組幀和面向連接的服務保證分組正確無誤地傳輸,並進行適當的流控; 2 )建立測試模型測試移動數據鏈路協議的可靠性和穩定性,證明了程序包的效用; 3 )根據cdpd系統無線數據機的軟硬體總體設計方案,完成了介面模塊,實現了rs232異步串口通信,使用戶可以根據需要發送短消息或連續的偽隨機比特流; 4 )在tms320c54x的軟體、硬體模擬平臺上,建立了cdpd試驗模型,實現了cdpd系統的mdlp基本功能。
  2. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據的特徵和網路設備運行狀態數據,分析了校園網網路異常攻擊、蠕蟲病毒和網路濫用行為的特點,基於大多數的網路流異常必然反映在網路網路流量數據特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態的異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函數中的權重。
  3. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
分享友人