protocol configuration 中文意思是什麼

protocol configuration 解釋
協議配置
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  • configuration : n. 1. 結構;構造;圓形,外形。2. 組合,布置;配置。3. 地形;【天文學】(行星等的)相對位置,方位;【化學】(分子中原子的)組態,排列;【物理學】位形;組態。
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Facilitating the configuration of protocol parameters, optimization of protocol operations, and more exact estimation of protocol performance, etc. basing on combinatorial theory and asymptotic method, we analyzed the properties of manets with nodes uniformly distributed in rectangular region. mathematical formulas of some basic properties of manets are obtained, such as the expected number of wireless links, mean node degree, the relation between network connectivity and radio range

    因此本文第二章基於組合學方法和極限思想研究了矩形區域內節點均勻分佈的無線自組網的幾項基本屬性,網路中鏈路總數的期望值,網路中節點度數分佈情況,以及網路連通性與無線信號傳輸半徑的關系等,得出了其解析描述。
  4. On basis of the development of modern control technology and apply of the network technology and locale bus - mastering technology , this text analyzes the essential element for produce of wire - roll mill : principle of assign for speed ; expatiates in detail on the network structure and communication protocol of ethernet and profibus - dp ; concretely describes the forms of control system configuration , the function and features of its software and hardware designs ; also, introduces mainly control function of control system, , for example , sequence control 、 loop control 、 fly shear control and operation and monitor function etc

    基於現代控制技術的發展、網路技術以及現場總線技術的應用,本文分析了線材生產的基本要素:速度的分配原則;分析了工業以太網ethernet和現場總線profibus - dp的結構和通訊協議。主要說明plc控制系統的組織結構形式,系統的軟硬體設計的功能和特點。同時,詳細介紹了控制系統的主要控制功能,如邏輯控制、活套控制、飛剪控制以及操作監控功能等等。
  5. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  6. On basis of the development of modern control technology and apply of the network technology and locale bus - mastering technology , the paper analyzes the essential element of slab caster system : casting speed ; expatiates in detail on the network structure and communication protocol of ethernet and profibus - dp ; mainly describes the forms of control system configuration , the function and features of its software and hardware designs ; also, introduces mainly control function of control system, for example , sequence control, tracking system and operation and monitor function etc. and analyzed and settled the problems of control system in debugging and producing

    根據傳統的控制系統存在的一些不完善的問題,基於現代控制技術的發展、網路技術以及現場總線技術的應用,從多方面考慮,決定控制層採用siemens的s7 - 400plc ,現場採用遠程i / o單元,很好的解決了信號量大而又分散的問題。針對生產工藝和機械設備的控制要求,設計了齊全的操作模式和方式,分析了板坯連鑄系統的基本要素:拉矯速度(澆鑄速度) ;根據控制功能的分配及實現,主要說明了plc控制系統的組織結構形式,系統的軟硬體設計的功能和特點。
  7. In this paper we integrate the theoretical analysis with opnet modeling and simulation to analyze the key factors that affect the throughput performance metric of the aos protocol. with the throughput curve we optimize the protocol configuration to direct the applications of the protocol to space missions

    本文採用理論分析與opnet軟體建模模擬相結合的方式分析影響aos協議包業務吞吐量性能指標的關鍵因素,並根據得到的吞吐量曲線優化協議配置參數,得到的結論可以指導協議在空間任務中的應用。
  8. Connection parameters - - the parameters associated with the connection address for the network protocol configuration

    連接參數- -與用於網路協議配置的連接地址關聯的參數。
  9. Service discovery technology tries to approach zero administration overhead and thus free users from tedious administrative and configuration work. hence, service discovery protocol is critical to the success of high dynamic manets. researching on analytical descriptions of properties of manets is helpful to research works on manets, e. g

    研究無線自組網基本性質的準確的閉合的解析描述對包括服務發現協議在內的無線自組網協議設計工作具有重要意義,如用於指導協議參數的設置、針對性地優越協議操作、估算協議的性能等。
  10. First introduces hardware platform of mine monitoring system that adopt embedded pcm - 3350 to be as main controller, big - capability memorizer cf card as memories, 10. 4 inch lcd liquid crystal screen as display, pcm - 3612 as communication extend cell ; rs232 and keyboard as i / o interface to realize data dispose, storage and transport function, and so on. then introduces some basic concept and core character about embedded operating system windows ce. at the same time, the paper has a detailed introduction about platform - configured tool platform builder of mbedded operating system windows ce and a detailed narration abut the whole process of configuring the embedded operating system base on yanhua pcm - 3350, then the paper depletes the characteristic function and system framework of embedded configuration software mcgs generally and introduces the design process about configuration software of mine monitoring - control system ; at last, the paper introduces main function of rk512 communication protocol that can ensure reliable communication with controller plc of bottom machine

    首先介紹了硬體平臺的搭建:採用嵌入式pcm - 3350作為主控制器;大容量的存儲器cf卡作為存儲設備;採用10 . 4寸lcd液晶屏作為顯示設備; pcm - 3612作為通信擴展單元;用rs232和鍵盤作為i o介面來實現數據的處理、存儲和傳輸等功能;然後又介紹了嵌入式操作系統windowsce的一些基本概念、核心特性,同時對嵌入式操作系統windowsce的平臺定製工具platformbuilder做了一些介紹並詳細敘述了使用platformbuilder定製基於研華pcm - 3350的windowsce操作系統的過程;接著概括敘述了可運行在windowsce上的嵌入版組態軟體mcgs的特點、功能、體系結構並詳細介紹了礦山檢測系統的組態軟體設計過程;最後介紹了能夠與下位控制器plc可靠通訊的rk512通訊協議的主要函數。
  11. Industrial automation systems and integration - product data representation and exchange - application protocol - configuration controlled design

    工業自動化系統和集成.產品數據表述和交換.第203部分:應用協議:配置控制設計
  12. Industrial automation systems and integration - product data representation and exchange - part 203 : application protocol : configuration controlled design

    工業自動化系統與集成產品數據的表達與交換第203部分:應用協議:配置控制設計
  13. The fault management, configuration management, performance management and account management for cable modem have been realized. at the beginning, the thesis discusses the management functions of the hfc network based on the analysis to the architecture and the protocol stack of hfc

    基本實現了cablemodem的配置管理、性能管理、故障管理和記帳管理,使網路管理者能夠實施基於用戶的管理,進行遠程控制,提供多種業務,提高服務質量和網路性能,從而使hfc網路穩定運行,發揮更大的效益和作用。
  14. The detailed functional modules consist of pci protocol conversion module 、 driver and magnifying module 、 control logic 、 clock circuit and configuration circuit

    具體的功能模塊包括pci協議轉換模塊、驅動放大模塊、控制邏輯、時鐘電路fifo電路和配置電路。
  15. Secondly ndis ( network driver interface specification ) technology in windows2000 and three kinds of network drivers : protocol driver, intermediate driver and miniport driver in ndis structure are narrated in detail. the whole structure of miniport driver for the wireless card and the design of all modules are described, the layered i / o technology in network stack and the configuration module based on this technology are introduced in succession

    第二部分詳細敘述了windows2000下的ndis (網路驅動介面規范)技術和ndis框架下的三類網路驅動程序:協議驅動程序、中間驅動程序和小埠驅動程序,並描述了所開發的ndis小埠驅動程序的整體架構和各模塊的設計,接著介紹了網路協議棧中的層次i o技術和基於此技術的配置模塊。
  16. Telnet is one of the most classical and the most powerful remote network configuration and control tool. telnet protocol provides one of the important ways to transfer data and control information on the internet that set up on a lot of different kinds of platforms

    Telnet是最傳統、最強大的遠程網路設備配置與控制工具, telnet協議提供了在internet上異質網之間傳遞數據和控制信息的重要方法。
  17. Change the tcp / ip protocol configuration to the correct subnet mask

    大概的意思就是你的子網掩碼配置錯誤,正確的配置子網掩碼即可。
  18. If it is used, authentication takes place before the network layer protocol configuration phase begins

    如果使用驗證,驗證工作在進入網路層協定階段之前就開始。
  19. When the gsm based gate - way is designed and realized, the paper emphasizes the short message communication technique used in transmitting location data, involves short message actualization unit, protocol configuration, receiving / transmitting process, data pdu encapsulation, data coding, and so on

    在系統gsm通信網關的設計與實現中,重點對系統中採用的短消息數據傳輸技術做了詳細的分析,包括短消息的實施單元、協議結構、收發過程以及信息傳輸過程中數據的pdu封裝等。
  20. In this paper, we create the network, node and process model using opnet software to simulate throughput performance of aos packet service, and choose various combinations of source packet length, transfer frame length and channel error rate to form different simulation scenarios. by analyzing the throughput - packet length, throughput - frame length simulation curves at different channel ber we get the optimal packet length and frame length configurations, and give some advice for the optimization of protocol configuration parameters according to throughput performance metric ; the complete node and process model of aos protocol have been built by opnet software, and a simple network scenario has been built to simulate and verify the validation of the protocol model

    本文在建模模擬方面,用opnet軟體建立模擬aos協議包業務吞吐量性能的網路、節點、進程模型,選取不同的包長、幀長與通道誤比特率組合建立模擬場景進行模擬,得到不同誤比特率條件下吞吐量-包長、吞吐量-幀長關系曲線,經過分析得出最大吞吐量對應的最佳幀長、包長配置,給出以吞吐量性能為指標優化協議配置參數的建議;用opnet軟體搭建aos協議封裝節點模型和各個進程模型,建立簡單網路場景進行模擬驗證協議封裝節點模型的有效性。
分享友人