网络协议分析是网络入侵检测中的一项关键技术。
The network protocol analysis is an essential technique in network intrusion detection.
程序的主要功能包括网络数据包捕获和常用网络协议分析。
It has a rich feature set which includes capturing network packets and analyzing popular network protocols on Internet.
Wireshark(以前称为Ethereal)是一个多平台网络协议分析器。
Wireshark, formerly known as Ethereal, is a multiplatform network protocol analyzer.
计算机网络基础课程是高等院校计算机相关专业的重点课程,网络协议分析是计算机网络教学体系当中的一个重要环节。
Computer network course is the key lesson in relative speciality of higher schools, and protocol analysis is a main link in the teaching system of computer.
Wireshark就是其中一个工具,它支持大量的网络协议解码和分析。
Wireshark is one such tool that supports a vast array of network protocol decoding and analysis.
对于网络互连协议(如telnet),在结果和提示符之间实际上并没有什么区别;您可以作为一个观察者对这些内容的含义进行分析。
For a networking protocol such as Telnet, though, there's really no distinction between results and prompts; those are meanings you impute as an observer.
需要更好的管理网络冲突的国际条例是分析师之间少有达成的协议之一。
And, the need for better international norms for governing cyber conflict is one of the few points of agreement between analysts.
通过分析DICOM协议模型及其运行机制提出了一种DICOM网络通信模型。
By analyzing DICOM protocol architecture model and its working mechanism, we design a DICOM network communication model.
网络流量发生器在网络性能分析和协议实现中具有重要的作用。
Network traffic generator plays an important role in analyzing the performance of network and implementing network protocols.
文中对这种网络的网络结构、频谱划分、双向通信、低层协议以及网络管理进行了分析研究。
Network configuration, spectrum allocation, two-way communication, protocol at lower layer and network management for HFC are analysed and studied.
本文对路由协议的成胁行为进行了分类,并分析了各种威胁行为可能给网络带来的影响。
In this paper, the threat actions to the routing protocol are classied into serven kinds accorting to their manners.
研究DHCP协议的漏洞,分析采用DHCP技术的网络中DHCP所面临的威胁,并针对不同的威胁提出消除威胁的解决方案。
It will research the holes of DHCP protocol, analyze DHCP threats in network applying DHCP technology and design the solution to eliminate them according to different threats.
首先本文简要描述了LEACH协议的网络模型以及能量模型,随后介绍了利用OPNET进行LEACH协议建模的步骤,最后给出并分析了仿真结果。
Firstly the network model and energy model of LEACH are briefly described, then modeling steps of LEACH based on OPNET are introduced, lastly the simulation result is presented and analyzed.
本文主要讨论了在虚拟专用网络系统中协议分析模块、异步加密模式和SADB的实现。
Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.
分析表明,本协议可以保证网络在线支付交易的安全性、原子性、可确认性和公平性。
Analysis shows that this protocol guarantees the security, atomicity, accountability and impartiality of network online payment.
结果表明,利用符号模型检验方法分析检验网络协议是可行的。
This result shows that it is effective analyzing and checking the property of network protocols by symbol model checker.
通过分析WAP的协议和网络结构,探讨了多层结构下基于WAP的手机铃声下载实施方案。
WAP protocol and network architecture are analyzed, and schemes of downloading cell rings based on WAP are studied in the multi-tier architecture.
分析了网络协议测试仪的串行通信接口功能,设计了一种可编程多协议串行接口电路。
The function of serial communication port in protocol tester was analyzed and a programmable multi-protocol serial communication interface circuit was designed.
本文介绍了网络时间协议的基本工作原理,简要分析了在网络路径对称和不对称两种情况下的网络时延问题。
The basic working principle of network time protocol is introduced, and the network time delay is analyzed simply in the case of symmetrical and dissymmetric network path.
分析了网络管理协议和网络管理的一般模型,给出了集中式、分层式和分布式三种网络管理体系结构。
Network management protocol and the general model of network management have been analyzed. The centralized, hierarchical and distributed system structure of network management have been put forward.
分析了现有网络协议测试系统中适配层实现方式的不足,提出了面向对象的解决方案。
Based on the deficiency of current implementation of adaptation layer for network protocol test system, a new approach base on object-oriented methodology was proposed.
其次,文章对现有的一些传感器网络传输控制协议进行了分析。
Secondly, some existing transport control protocols for wireless sensor networks are classified and compared with each other.
介绍了BICC协议在NGN网络中的应用,分析了BICC协议的消息结构,提出了BICC协议解码模块的设计方案。
The application of BICC protocol in NGN network was introduced, the message structure of BICC protocol was analyzed, and the design project of decoding module of BICC protocol was proposed.
分析了该技术的协议构架和网络拓扑结构。
The protocol frame and the network topology structure of this technology is analyzed.
当前主要方法是对网络层和传输层协议进行分析。
The existing techniques mainly analyze network layer protocols and transport layer protocols.
从时间同步着手,分析了时间同步技术—网络时间协议(NTP)和直接连接时间技术,比较了几种分布式系统的时间同步化策略。
The technology of time synchronization including Network Time Protocol(NTP) and Direct time Connection are analyzed, and some time synchronization strategies of distributing systems are compared.
介绍并分析了一个互联网标准协议—网络时间协议的系统结构与工作原理。
The architecture and working mechanism of an Internet standard protocol which is named network time protocol is introduced and analyzed.
当你使用协议分析仪来诊断网络异常时,这点有助于分辨问题。
This AIDS in problem resolution when you're using your protocol analyzer to troubleshoot network anomalies.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
文章介绍了OBS技术的优越性,分析实现LOBS的网络结构和控制协议,探讨LOBS流量工程和网络生存性。
This paper begins with advantages of OBS technology, analyzes the networking architecture and controlling protocol of LOBS, and discusses LOBS traffic engineering and survivability.
应用推荐