host to network 中文意思是什麼

host to network 解釋
主機到網路
  • host : n 〈常 H 〉【宗教】聖餅,聖餐用麵包。n 1 主人 (opp guest)。2 (廣播、電視的)節目主持人。3 旅館...
  • to : adv 到某種狀態;〈特指〉到停止狀態;關閉。 ★也常和動詞結合,略去其後賓語,而構成成語: The door i...
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  1. An operator arrives at the host stadium with the network ' s video crew one or two days before game time and proceeds to digitally map the gridiron, calibrate the three main game cameras at the 25, 50 and 25 yard lines, and customize the video - graphics software so that the golden apparition will appear on every play from scrimmage

    在正式比賽的一、兩天前,特效操作員會和電視網的攝影工作人員一起來到球賽場地,開始以數位的方式勘測球場,調整設置在25碼、 50碼和25碼線的三架主要球賽攝影機,並訂做影像圖形軟體,以便讓金黃色的幻影在每場比賽並列爭球時出現。
  2. The content hosts are defined to form a load - balanced cluster, and one of the network interfaces of the load balancer machine is assigned a host name and ip address dedicated to the cluster

    內容主機被定義用來組成負載均衡集群( load - balanced cluster ) ,給負載均衡器機器中的一個網路介面分配主機名稱和ip地址,供集群使用。
  3. Due to the continuous progress of techlnology and fast increment of information capacit } r, especially the development of network technology and multi - media technolog } r. data process has transformed from the traditional rnode to a nex ' ! - stvle mode. for instance svstematic structure transformed from terminal host computer rnode to client / server struct - ure mode, network circumstance transformed from lan to internet

    隨著技術的不斷進步和信息量成倍地增加,特別是網路技術和多媒體技術的發展,使信息處理從傳統模式向新型模式轉變,如體系結構從終端主機方式到客戶服務器結構方式、網路環境從局域網到internet等開放網、信息結構從結構化到非結構化等,這些變化必將促使信息檢索技術的研究和不斷發展,以滿足人們對提高信息獲取能力的需要。
  4. These data proide eidence that neuroimmune regulation of the cytokine network and host inflammatory cells functions to promote resistance against p. aeruginosa corneal infection

    這些資料證明神經免疫系統調節細胞因子網路和炎癥細胞的功能,以促進角膜對綠膿桿菌的感染。
  5. The purpose of this subject is to implement a transparent proxy server based on linux os which can provide intranet host network security

    本課題目標是完成一套基於linux操作系統的透明代理型防火墻軟體,為在內部網的主機提供安全保護。
  6. Soft client server is secretly installed on isp, wan, host computer of important and sensitive part needed to be controlled to collect network data. after transmitting in real - time to email monitor center, pop3, information such as smtp and web - mail from these data are analysis and retrievable, password intercepted, classified and alert, mean wile the center can monitor in real - time on over 1000 nodes by controlling working status and filter condition and software refreshment etc. the system occupies less than 4 percent of system recourse under the condition of without losing package

    客戶端採用隱蔽式安裝方式在需要控制的敏感地區的isp 、局域網、網吧以及上網主機上安裝,對進出的網路數據進行採集,然後將採集的數據實時發送至電子郵件監控中心,電子郵件監控中心對這些數據中的pop3 、 smtp以及web - mail電子郵件信息進行分析還原、口令截獲、歸類及報警,並根據情況對客戶端的工作狀態、過濾條件、軟體更新等進行控制操作,從而實現了對高速網路( 100mbps以上) 、 10000個監控節點以上網路數據的實時有效監控。
  7. Computing method has changed from host - centralized to network - centralized

    計算方式也從以主機為中心轉變為以網路為中心。
  8. For the former, you simply insert the host address. for the latter, you need to specify a network address and a netmask or a bitmask for all hosts in the group

    前一種情況,只需要插入主機地址;后一種情況則需要指定網路地址和網路地址掩碼或比特掩碼。
  9. The host computer system ' s functions are as follows : duplex communicate with automatic station data poll gather to each automatic station save and handle the data format and print diagram based on the gathered data download the parameter to automatic station and adjust the clock dial - up to network and long - distance control automatic rainfall station consists of outer garment, meet rain bucket, water input and output electromagnetic valve, measure bucket, storage battery and circuit control

    可以與自動站進行雙向通訊,完成對各個自動站數據輪詢採集並進行存儲、處理,並生成圖表,根據採集的數據形成圖表、列印,可以向自動雨量下載參數、時鐘校準以及遠程聯網撥號和控制。自動雨量站包括外罩、接雨桶、進放水電磁閥、測量桶、蓄電池以及電控部分等部分組成。
  10. San shares the storage device through the fibre channel, and breaks up the limitation on distance and capability ; host and storage device can exchange data with each other through the storage network directly, by which it makes lan free its treasure resources to other applications

    存儲區域網( storageareanetwork )以光纖通路( fc )為基礎,實現了存儲設備的共享;突破了現有的距離限制和容量限制,服務器通過存儲網路直接同存儲設備交換數據,釋放了寶貴的lan資源。
  11. Other nodes randomly to test, then he can conclude that the length from the source host to any other host will be at most as twice as the diameter of the underlay network. in other words, the rh is equal to 2

    個不同的其它主機,就能保證從發送源到任意主機的路徑長度最多是相應底層網路直徑的2倍(即根跳距為2 ) 。
  12. Converts a long value from host byte order to network byte order

    將長值由主機位元組順序轉換為網路位元組順序。
  13. After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper

    綜上原因,本文將「網路安全」和「防火墻技術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己理解基礎上寫成的,主要內容為:網路安全含義及特徵、計算機網路所面臨的威脅和攻擊、保障網路安全的一般措施;網路安全技術的簡介、分類及關系;防火墻概論、防火墻關鍵技術(包過濾技術、代理技術、 nat技術等) ;防火墻的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;防火墻的構建應用舉例;防火墻技術的未來發展趨勢及產品等。
  14. To make the transplanted cells functionally and efficiently integrate into the host nervous network, the high viability and correct differentiation of the donor cells must be obtained

    Nscs的移植效果取決于移植后細胞的存活情況,及其能否正確整合遷移等許多因素。
  15. Moreover, this new architecture enable ids to enhance detection capability and adaptability to intricate network environment through self - study and evolution. to achieve better accuracy, the architecture adopts security audit data gathered from both host and network. to enable ids to detect both known and unknown intrusion model, the architecture adopts a blend frame that makes use of both misuse detection approach and anomaly detection approach

    該體系結構是一種混合形結構:一方面,該結構同時利用基於主機和基於網路的數據源,使得ids能收集到更加全面的信息;另一方面,該結構同時使用了異常檢測技術和誤用檢測技術,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  16. If an intruder gained access to a host in network 10. 1. 0. 0, he could broadcast a " destination unreachable message " stating that gateway g is not reachable to all hosts in the network he is in

    如果入侵者獲得了網路10 . 1 . 0 . 0中一臺主機的訪問權,那麼,他可以廣播一條「目的地不可到達消息」 ,聲明網關g對於他所在網路的所有主機是不可到達的。
  17. Singapore played host to the fourth asian crisis management conference of the asian network of major cities 21 anmc21

    新加坡主辦了亞洲主要都市網21 anmc21第四屆危機管理大會。
  18. Converts a value from host byte order to network byte order

    將值由主機位元組順序轉換為網路位元組順序。
  19. Converts a short value from host byte order to network byte order

    將短值由主機位元組順序轉換為網路位元組順序。
  20. Converts an integer value from host byte order to network byte order

    將整數值由主機位元組順序轉換為網路位元組順序。
分享友人