网络侦听是网络安全和网络管理中的重要技术。
Network interception and analysis is one of the important ways used in network security.
在这种场景中,网络层通知所有的网络侦听程序:离线的请求已发布。
In this scenario, the network layer notifies all network listeners that a request has been issued to go offline.
重获网络连接之后,就会通知侦听程序,而此timeclient则再次会从Web服务器检索时间。
After network connectivity is regained, the listener is notified, and the time client again retrieves times from the Web server.
通常,应用程序可以通过多个连接端口用事件处理程序创建事件侦听程序,但是这在网络资源和维护方面花费较大。
Generally, an application can create event listeners with event handlers through multiple connection ports, but this is costly in terms of network resources and maintenance.
一旦网络感知框架获悉网络故障,它就会将故障分类并在其他应用程序遇到相同的故障之前通知所有其他的侦听程序。
Once informed of a network fault, the network awareness framework categorizes it and notifies all other listeners before other applications encounter the same error.
图5显示了典型网络状态;每个侦听程序都有自己的通信端口。
Figure 5 shows the typical network status; each listener has its own communication port.
服务器连接性侦听程序的如下实现与我们为本地网络感知特性所创建的那个侦听程序稍有不同。
The following implementation of the server connectivity listener is slightly different from the listener you just created for local network awareness.
注意:您也可以在port属性中修改网络服务器所侦听的端口。
Note: You can also modify the port that the network server listens on, in the port property.
网络感知框架随后会通知所有注册该服务器上下文的侦听程序,包括通过调用reconnected方法已经注册的那些侦听程序。
The network awareness framework then notifies all listeners registered with that server context, including the listener that you have registered, by calling the reconnected method.
相反,反应器(reactor)是实际侦听网络的类(它利用其协议的工厂实例来进行侦听)。
Instead, a reactor is a class that actually listens on a network (utilizing a factory instance for its protocol).
嗅探是一种常见的网络数据采集和侦听方式,恶意嗅探对网络安全具有极大的危害。
Sniffing is a common way in gathering and intercepting network data, but malicious sniffing often does great harm to network security.
根据网络联接方式和侦听点设置的不同,设计出了相应的合法侦听模型。
According to the difference of network joint way and intercepts setting, designed corresponding model of legitimately intercepts.
而且,无线网络不具备有线网络上天然的冲突检测和信道侦听能力,这使得协议设计更具有难度。
Moreover, the wireless network is not able to detect collision and monitor the channel status as is the wireline network, which makes it more difficult to design the management scheme.
分析了符合传感器网络MAC算法中节点周期性侦听要求的节点寿命估算问题。
The lifetime estimation issue is analyzed with consideration to the periodical listen required by common WSN media access control (MAC) algorithms.
而不是不必两个PXE侦听器(每个都有其自己的应用程序逻辑)在网络上可以使用两个或多个应用程序逻辑的网络上有一个pxe监听器。
Rather than having two PXE listeners on the network (each with its own application logic), you can have one PXE listener on the network with two or more sets of application logic.
本文主要根据欧洲电信标准(etsi)的有关侦听标准,对无线通信系统、基于SIP的VOIP系统和IP网络的合法侦听进行了研究。
The article, depending on the interception standard of ETSI standard, studies the interception of the wireless telecommunications, VOIP system based on SIP and IP network.
摘要:在IEEE802.11基础型网络中,站点通过侦听接入点的工作过程,可以实时获得足够信息来判定是否存在隐藏站点。
Abstract: in IEEE802.11 infrastructure networks, stations sensing access point workflow can acquire enough information to judge whether there are hidden terminals.
本文在对不同类型MAC协议进行了介绍,并分析了MAC层的能耗原因,如网络串音、空闲侦听、碰撞冲突及控制信息过多。
After introducing some different MAC protocols in this thesis, and analyzing energy factors of MAC layer, such as overhearing, idle listening, collision conflict and excessive information of control.
本文在对不同类型MAC协议进行了介绍,并分析了MAC层的能耗原因,如网络串音、空闲侦听、碰撞冲突及控制信息过多。
After introducing some different MAC protocols in this thesis, and analyzing energy factors of MAC layer, such as overhearing, idle listening, collision conflict and excessive information of control.
应用推荐