transparent protocol 中文意思是什麼

transparent protocol 解釋
傳輸協議
  • transparent : adj 透明的,可為(X光等)透射的;明了的,明白的(文體等);透徹的;坦率的,開朗的(性格等);顯而...
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. An integrated trust evaluation mechanism to support secure and transparent services across security domains is developed, and implemented in sip protocol. 3. partly design and code sso feature in sip which integrated simplized trust model including protocol sequences, relative data structure, and xml message format

    3 ) 、擴展sip協議,設計並部分實現了採用該信任評估模型而實現的sso策略:包括sip協議流程的擴展、相關數據結構和xml消息編碼格式。
  3. Firstly, unlike other technologies that verify security at high - level protocol, verifying security at ip level is transparent to applications and end - users that don " t have to be modified even if there is any change at ip level. secondly, another conspicuous advantage is that it can be used on any machine that uses ip protocol to communicate. no matter ipsec runs on routers, on firewall machines, on various application servers, and on end - user desktop or laptop machines, it can verify security of network transmission

    首先,在通信協議底層對數據傳輸提供安全保護與其它在高層協議中提供安全保護的技術不同,在ip層提供安全性保護對應用程序和終端用戶都是透明的,不需要應用程序、其它通信層次和網路部件做任何改動;其次, ipsec的另一個顯著特點是它幾乎可以運行在使用ip協議進行通信的任何機器上,不論是運行在路由器、防火墻主機、各種各樣的應用服務器上,還是運行在終端用戶的個人計算機或筆記本電腦上,它都能提供一定的安全保障;最後,利用ipsec實現虛擬專用網是目前通過internet實現企業內部網的主要解決方案之一。
  4. This is to help reduce network traffic by allowing implementations to use more efficient data encoding, such as a binary protocol between the device and the wireless gateway, as long as such encoding is transparent to both the web service consumer and the producer

    這樣做是通過允許執行程序使用更有效的數據編碼方法來幫助減少網路傳輸,例如在設備和無線網關間使用二進制協議(只要這樣編碼對消費者和生產者是透明的) 。
  5. These lemmas together with spanning tree protocol and local address forwarding information for transparent bridges are taken to fulfil physical topology discovery in subnet finely

    以引理為基礎,利用生成樹協議和地址轉發表,解決了對于網內物理拓撲的正確發現,更細致地顯示整個網路拓撲。
  6. Transparent model realization built in ip rebuilding, one course of rebuild, check and forward of ip data gram base mac frame and under united structure, and the method to realize stream filter base tcp datagram assorting management and special protocol rebuilding, and tcp datagram rebuilding have nothing to do with application protocol completely transparent for application have some innovations

    保留mac地址,同一數據結構下的ip報文重組、檢查、轉發過程一氣呵成,將透明模式融合在ip重建過程中實現;在對tcp報文採取分類處理的指導思想下,通過重建專用tcp來實現流過濾;這些均為本文創新之處。
  7. Theoretical source of transparent model " s advantages is discussed, and then solutions of its key technology, last a programming realization - setting network card promsic to receive packets, keeping mac address, and checking packets base mac frame to realize transparent model in ip protocol rebuilding. the key technologies of firewall are packet filter and application proxy both of which can " t keep in step with network attack development

    鑒於此,本文從透明模式防火墻的特徵和功能出發,探討了其本質、技術實現要點及可行性方案,給出有別于上述兩方案的實現:網卡置於混雜模式,保留mac地址, ip重組、檢查、轉發過程一氣呵成,將透明模式的實現融合在ip重建中,使得整個防火墻體系結構更加緊湊,提高了效率。
  8. Epics / ca supports tcp / ip protocol, ca software package are both setup on high level clients and servers. users can read data from ioc databases on different node by transparent communication by epics / ca tools, so that data sharing is realized. epics / opi on the clients provides ioc database creating tools and gui developing tools and device monitor software package

    Epics的ca支持tcp ip協議, ca軟體包分別安裝在高層客戶機和作為服務器的前端機上,使用epics ca工具,用戶可以從客戶機上以透明通訊方式直接讀取駐留在網路不同節點上ioc數據庫中的實時數據,實現了網上的數據共享。
  9. Secondly, based on the ftoum computing model, the thesis presents a new fault tolerance algorithm, oraml, using both checkpointing and module replication, which employs flexible configuration management mechanisms to implement dynamic replication, imports the fault tolerance policies on the client side to make the clients take part in the fault tolerance process actively, and enables the fault tolerance process transparent to the clients completely while separating the replication protocol from the communication protocol

    2 、現有的分散式容錯演算法大多缺乏對客戶方容錯策略的支持,並且很難做到既對客戶透明,又能將復制協議和通信協議有效分離,本文基於ftoum計算模型,並採取檢查點設置和模塊復制相結合的方法,提出了一種新的動態容錯演算法oraml 。 oraml演算法採用靈活的配置管理機制實現動態復制;引入客戶方容錯策略,使得客戶方可以主動參與容錯;實現了復制協議與可靠通信協議的分離;並且演算法所採用的容錯機制對用戶完全透明。
  10. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、訪問協議、數據服務流程以及基於webservices 、 xml等技術的實現策略,重點研究數據庫網格中的元服務、數據統一訪問和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和數據訪問服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、數據對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的數據庫數據進行了統一命名,實現了相應的名字映射機制和全局的用戶數據視圖服務,提供了數據庫資源的虛擬組織與管理方式;數據訪問服務通過提供可擴展的統一數據訪問和支持多種數據共享訪問模式,屏蔽了數據庫資源的分佈性和異構性,為用戶提供了統一透明的數據服務。
  11. These basic switches conform to the open systems interconnection layer 2 protocol and operate as fast bridges, meaning they are transparent to network layer protocols

    這些基本的交換機符合開放系統互連模型第二層協議,並作為快速網橋工作,這意味著它們對網路層協議是透明的。
  12. We give a new algorithm for dynamic process migration after comparing the existing algorithms ; offer the system users a transparent distributed - os interface by modifying linux kernel and adding a global operation module ; design a migrate protocol so that the client and server can give the consistent view of process and transparent remote execution, and handle link failure and node failure

    通過對linux核心的修改,和globaloperation模塊的增添,為用戶提供了一個「透明」的具有進程遷移功能的分散式操作系統介面。設計了一套遷移協議,使客戶機與服務器能提供一致的進程觀點和透明的遠程執行,並處理了網路失敗和節點失敗兩類錯誤。
  13. The automation of electric power system is developing toward open, standardization and distribution. the problem caused by the disunity of communication protocol in electric system, is becoming standing out more and more. the demand for standardization of the protocol and the desirability of constructing a transparent data environment are more urgent. it has become a common problem that realizing data communication and data sharing in different protocol systems

    電力系統自動化正朝著標準化、分散式和開放性的方向發展。在電力系統通信中由於規約不統一而引起的問題顯得日益突出,人們對網路協議標準化的要求和建立透明的數據環境的願望也越來越來迫切。在不同的協議體系中實現數據通信和數據共享成為了一個普遍問題。
  14. We designs a communication protocol on this model, implementing many functions between host computer and radio, such as data transmission, radio management and control, status advertisement, etc. this paper uses the interface protocol, designs a radio link layer protocol, and implements the driver for the radio in linux operating system. after testing and measurement, we conclude that this interface protocol can be a model which uses ethernet interface as a transparent data channel

    本文使用了此介面協議,設計了無線鏈路協議,並且在linux操作系統中以電臺驅動程序的方式實現了介面和鏈路協議,通過對驅動程序運行情況的測試,說明該介面協議對網路層協議而言屏蔽了以太網作為透明通道的事實,此協議介面模型的可以實現和完成既定的功能和目標。
分享友人