端對端協議 的英文怎麼說

中文拼音 [duānduìduānxié]
端對端協議 英文
[計算機] end-to-end protocol
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 端對 : end on端對耦合 end-on coupling
  1. In the remote desktop control system developing process, i designed a remote desktop control protocol, which enable the client to monition and share the recourse of the remote desktop control system completely

    在遠程監控軟體的開發過程中,本人設計了遠程桌面控制,它使得客戶能夠遠程服務器的桌面進行完全的共享和監控。
  2. The paper describes the implementation method of the software and hardware in detail ; explains the sulphuration technology in production of rubber and how to control sulphuration machine by plc ; discusses the principle, current situation and development trend of the dcs ; recommends the serial communication in industrial and how to realize it in delphi ; analyzes the communication protocols of series of lg ' s master - k10 plc and on the base of which, realized the communication between upper - computer and low computer ; discusses the realization flows of control system on upper - computer in detail, the software and hardware of module every design ; introduces the functions and realization of query software on client computer

    詳細論述了控制系統硬體及軟體的實現方法;闡述了橡膠生產中的硫化工藝以及如何用plc硫化機進行程序控制;討論了集散控制系統的原理、研究現狀及發展趨勢;介紹了工業控制領域中的串列通信以及如何在delphi中實現串口通信;分析了lg公司master - k10系列plc的通信,並在此基礎上實現了上位機與下位機的通信;詳細討論了上位機控制系統的實現流程、各模塊的軟硬體設計;詳細介紹了客戶查詢軟體的功能及實現。
  3. Client supplies complete graphic user interface, accomplishing the management of jobflow and system ; communication agent accomplishes complete communication between client and server by tcp / ip network communication protocol and platform independent data communication protocol ; server supplies full support of jobflow, the superstratum are the jobflow definition subsystem and jnwengine, which are responsible for the definition and execution of jobflow ; the understratum is the network queue system, which realized the schedule and execution of job, thus all kinds of sources in computer network system can be utilized in order to improve execution efficiency and reduce job cost

    客戶提供完全的gui用戶界面,完成用戶作業流的管理及系統的管理功能;通訊代理採用tcp ip網路通信以及與平臺無關的數據通訊來實現客戶與服務器之間的完全通訊;服務器提供作業流的全面支持,上層由作業流定義子系統和作業流引擎負責完成作業流的定義與執行,底層使用網路隊列系統( nqs )來實現作業的調度與執行,使用戶能夠最大限度地利用計算機網路系統中的各種資源,以提高執行效率、降低作業成本。
  4. Server supplies full support of jobflow. the superstratums are the jobflow definition subsystem and jnwengine, which are responsible for the definition and execution of jobflow. the understratum is the network queue system ( nqs ), which realizes the schedule and execution of job, thus all kinds of resources in computer network system can be utilized in order to improve execution efficiency and reduce job cost

    客戶提供完全的gui用戶界面,完成用戶作業流的管理及系統的管理功能;通訊代理採用tcp ip網路通信以及與平臺無關的數據通訊來實現客戶與服務器之間的完全通訊;服務器提供作業流的全面支持,上層由作業流定義子系統和作業流引擎負責完成作業流的定義與執行,底層使用網路隊列系統( nos )來實現作業的調度與執行,使用戶能夠最大限度地利用計算機網路系統中的各種資源,以提高執行效率、降低作業成本。
  5. By far, microsoft ’ s teredo is the only tunnel mechanism that supports nat users in a certain extent, but meanwhile has many limits such as not supporting symmetric nat, not being able to provide bidirectional ipv6 connections, having poor security, etc. silkroad exploits the client - server tunnel mode and makes use of the stateful characteristic of tunnel servers to resolve the teredo ’ s problems

    目前已有的隧道機制中,只有微軟公司提出的teredo在一定程度上支持nat 。然而, teredo實際上不能為nat用戶提供雙向的ipv6連接,不支持稱類型的nat ,並且存在安全隱患。 silkroad採用客戶-服務器模式的系統結構,利用隧道服務器的有狀態特性,解決了teredo存在的問題。
  6. In this part, many protocols are analyzed ( from datalink layer to network layer ) and some important data structures are also presented to describe the detail of this module. 3

    從鏈路層到傳輸層的多個網路完成了相關解析引擎的設計與實現,為後檢測引擎提供了必要的數據介面以提高其檢測效率。
  7. This thesis elucidates and analyses the key techniques and rules of aolr in detail, and introduces its simulation modeling of the integrated system infrastructure and each function modules. through systematic simulation of aolr in the performance of packet delivery rate, average end - to - end delay, average route set - up delay, routing overhead, and etc, the key techniques and algorithms are testified and can provide reference for practical system design and application

    通過基於蟻群優化的負載均衡路由系統的模擬,從數據分組成功遞交率、平均時延、平均路由建立時延、路由開銷等性能的模擬數據和曲線上,分別驗證了該系統中的幾項關鍵技術和演算法。
  8. As a crucial embedded development tool, the embedded system debugger is usually used to debug and test embedded software 。 a embedded system debugger consists of a cross debugger and a debugger agent, which characteristic lies in the separation of running environments between the cross debugger and the debuggee and the dependence on the gdb agent in the debug session 。 with the development of embedded technique, various embedded debug techniques continuously advance and all kinds of embedded system debuggers are playing a more and more important role in the embedded software development 。 the gnu debugger, gdb as a tool in the gnu toolkits, is an extremely powerful source - level debugger 。 among gdb ’ s many noteworthy features, its ability to debug programs “ remote ” is fascinating 。 this capability is not only essential when porting gnu tools to a new operation system or microprocessor, but it ’ s also useful for developers who need to debug an embedded system based on a processor that gnu already supports 。 gdb is the preferred solution in embedded development because it provides portable, sophisticated debugging over a broad rang of embedded systems 。 this paper discusses the status quo of various embedded system debuggers ; deeply analyses the overall structure of gdb and the debugging mechanism of gdb based on its source codes ; introduces the gdb ’ s remote debug technique and gdb / mi, which are usually used to develop the gdb - based embedded system debugger 。 then dwells on how to use gdb / mi to develop a gui front and how to use rsp 、 stub and gdbserver to design a debug agent, in order to expatiate on the design method of the gdb - based embedded system debugger 。 in the end, provides a concrete implementation of the gdb - based embedded system debugger of “ embedded simulation development platform ”, the project of the innovation fund for technology based firms 。

    這個特性不僅在將gnu工具移植到一個新的操作系統和微處理器的時候很有用,于想調試一個基於gnu支持的晶元的嵌入式系統的開發人員來說,也是非常有用的。由於gdb提供了在大多數嵌入式系統上的可移植的、復雜的調試功能,它已成為嵌入式開發的首選解決方案。本文討論了當前的各種嵌入式調試器的現狀,結合源代碼詳細分析了gdb的結構和調試原理,介紹了開發基於gdb的嵌入式系統調試器常用的遠程調試技術和gdb / mi介面;然後詳細闡述了如何使用gdb / mi開發gdb的圖形前和怎樣使用rsp、 stub和gdbserver設計一個調試代理,從而較深入地討論了基於gdb的嵌入式調試器的設計方法;最後,結合國家中小型企業創新基金項目「嵌入式模擬開發平臺」 ,給出了一個基於gdb的嵌入式系統調試器具體實現。
  9. These experts spoke mainly on the agreements on agriculture, the progress of agricultural negotiations, the quarantine of animals and plants, other trade and technical barriers, the settlement of disputes, the national support policy, as well as the adjustment of agricultural policy after chinas entry into wto and its impacts on women of ethnic minorities in the farming and herding areas

    中加專家將主要介紹農業農業談判進展動植物檢疫和其他貿易技術壁壘爭解決國內支持政策中國入世后農業政策的調整,以及入世農牧地區少數民族婦女的影響。
  10. New and consistent competition advantages all result from custom ' s satisfactory and changing innovations. a thorough procedural reproduction contains three phrases. first of all, by market researching, inter - communication and other methods, we need to find problems and begin to rearrange all procedures ; secondly, by reorganizing the management procedure of valued customers, the structure of luzhou telecom corp., front and back sla service protocol and kpi performance evaluation items, it support, we can correct problems after segmental test

    一個完整的流程再造工作包括三個階段:第一,通過市場調研、內部訪談等所有流程進行梳理,找出問題,確定重點優化流程;第二,設計瀘州電信新的大客戶管理流程和組織結構、前後sla服務水平和kpi績效考核指標、 it支撐,通過局部試用,發現問題,重新調整;第三,設計計費與賬務處理流程、網路資源調配流程、滾動性網路投資流程、 it支撐,內部推廣,全面推進企業的流程再造工作。
  11. Terminal equipment. syntax - based videotex. common end - to - end protocols

    設備.基於句法的圖文錄像.通用端對端協議
  12. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    安全通信的研究中,本文分析了diffie - hellman密鑰交換中易受攻擊的地方,提出了基於端對端協議及cookie機制的密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文的安全通信。
  13. It ' s well known that the project documentations " storage and management have an very important effect on the development of all kinds of project, and as the information age is coming, network technology has been applied to this procedure gradually. this article mainly introduces the study and realization of a internet - based project documentation storage and management system which application programming frame is built with delphi6. 0 and sql server2000. based on the tcp / ip protocol, the system try to establish a c / s model with connection - oriented, dependable stream sockets and multithread technology to complete some especial data communications by networks, such as the files of project, directory of user, all self - defined commands or messages and their parameters, and so on

    本文所研究的《基於internet的項目文檔存儲管理系統》通過delphi6 . 0和visualc + + 6 . 0相結合的開發平臺,結合sqlserver2000 ,將client server模式的數據庫技術和windowssocket網路通信技術進行集成,遵循tcp ip,同樣採用c s結構運行於internet ,通過服務器將處于各個不同物理位置的客戶機連接起來,形成一個交流平臺;其中,引入了目前國際上流行的先進的安全管理控制方法? ?角色控制理論用戶進行權限分配,使擁有相應角色的人具有相應權限;然後系統自動根據組織部門或用戶的設立在服務器生成相應的網路「虛擬文件櫃」 ,使擁有相應權限的人可以相應文件櫃中的文檔進行整理;再通過多線程技術和windows套接字通信機制在tcp ip上實現了單個文件及目錄的傳輸。
  14. Then it presents the researches of protocols of wap : wdp ( wireless datagram protocol ), wtp ( wireless transaction protocol ) and wsp ( wireless session protocol ), and analyze their characteristics of performance. the designing methods and process of remote terminal control system based on wap are introduced, too. finally, this paper analyzes the existing problems of wap applications and predicts the development of wap applications in the future

    本論文首先wap棧以及wap應用模型做了介紹;其次著重研究了wap其中的三層: wdp ( wirelessdatagramprotocol ) , wtp ( wirelesstransactionprotocol )和wsp ( wirelesssessionprotocol ) ,並分析了它們性能和特點;然後創建了一個基於wap的遠程終控制系統,並且詳細闡述了設計過程與方法;最後,于wap目前應用中存在的問題做了分析並預測了wap的發展前景。
  15. Information systems interconnection. virtual terminal. basic class. a - mode x. 3. virtual terminal protocol check list

    信息系統互連.虛擬終.基礎級. a模式x . 3 .虛擬終
  16. Information systems interconnection. virtual terminal. basic class. a - mode telnet. virtual terminal protocol check list

    信息系統交換.虛擬終.基礎級. a模式電信網.虛擬終
  17. Protocol software of ms is very significant for the development of mobile telephone with our own property right

    移動終軟體于開發具有自主知識產權的國產手機具有重要的意義。
  18. And most of security measures are not effective in bt net, too. so how to protect bt net, how to improve the security of bt, is becoming more and more important. at first, the analysis of bt protocol and client codes illuminates the distributing and equity feature of bt net

    本文首先bittorrent和客戶代碼進行了詳細分析,在分析中,歸納出了bt網路等性,分佈性的特點,同時系統地闡述了bt網路從架設到運作的機制和過程,隨著bt研究的不斷深入,逐漸引出了bt網路可能存在的一些薄弱環節和安全隱患。
  19. Based on the description of main functions and relationships among the layers, the author aimed at voice information related protocols through the interface of pstn in ums, and proposed to supply ums service by two application - oriented protocols, called the trdp ( telephone related dialogue request protocol ) and the takp ( telephone related protocol between layer a and k ). in this project, the author was mainly involved in specification and implementation of the trdp and the takp

    通過各層的主要功能及層間關系的描述,針ums涉及的pstn介面中的語音類信息,提出通過trdp (服務請求, telephonerelateddialoguerequestprotocol )和takp (輔助層與核心層間的通信, telephonerelatedprotocolbetweenlayeraandk )這兩個專用應用來實現ums電話類終的服務。
  20. The article exploit the meaning of the 13th article by explanation provided by the panel of eu v. us on the 110 ( 5 ) article of us copyright law

    本文首先通過在美國與歐共體就美國版權法第110 ( 5 )條所產生的爭中專家小組trips第13條的解釋,著力透析trips第13條的涵義。
分享友人