The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
Network data packets are captured by NDIS Intermediate driver; A rule-based filtering algorithm is presented in this paper, and a layered filtering framework is included in the algorithm.
本文介绍了NDIS驱动程序结构,给出NDIS中间驱动程序实现网络数据包的拦截方法;并实现了一个基于规则的过滤算法,在过滤算法中引入了一个分层框架。
Combined with the high-speed ability of ASIC and the flexibility of RISC processors, the high - performance of multi-core network processor can process network data packets in high-speed specified.
这种专用于处理高速网络数据分组的多核并行可编程嵌入式微处理器,结合了ASIC处理器的高速性能和RISC处理器的可编程所展现出的灵活性。
If the data transfer is on the same machine, it could still go through the network protocol and includes all the processing required to manipulate the packets.
如果数据是在同一机器上传送的,它可能仍然要通过网络协议,并且包括操作数据包所需的所有处理。
When information is transmitted, it is broken into packets at the sender of that data, labeled with information about the source and destination computers, and sent over the network.
当传输信息的时候,它被数据发送者分成包,并标有源和目标电脑的信息,然后通过网络发送。
Network traffic is made up of IP packets or simply packets — small chunks of data traveling in streams from a source system to a destination system.
网络流量由IP信息包(或,简称信息包)—以流的形式从源系统传输到目的地系统的一些小块数据—组成。
This obtains a number of data points from a specified SNMP agent, including the IP address, description, uptime, and network statistics (packets sent/received, and IP packets sent/received).
这将从指定的SNMP代理获得许多数据点,包括IP地址、描述、正常运行时间和网络统计数据(已发送/接收的数据包和已发送/接收的 IP 数据包)。
In addition, much of this information is also sent encoded in binary format, and capturing pure raw packets off of the network requires a significant amount of work to pick out the data that you need.
此外,大部分信息也会经过二进制编码后再发送,从网络捕捉完全原始的数据包需要进行大量的操作才能捕捉您需要的数据。
This led to the idea of a "simple" network that did only one thing – take in data packets at one end and do its best to deliver them to their destinations.
这就导致了一个“简单”网络的想法,只有一件事情可做——在网络一端获取数据包,尽量好的递送到目的端。
For example, if the number of data packets is staying constant, but the number of interrupts is increasing, increase the volume of the network note to emphasize attention on that aspect.
例如,如果信息包的数目保持不变,但中断次数不断增加,则需要增加网络通知的音量以强调对这方面的注意力。
To start, first you need to create a binary record of the packets going past on the network by writing out the data to a file using either snoop or tcpdump.
要开始处理,您首先需要使用snoop或tcpdump将数据写到一个文件,而创建一个通过网络的数据包的二进制记录。
This queue holds data that the application has sent but has not been acknowledged by the remote end (and may not have even been sent on the network depending on how many packets are unacknowledged).
这个队列保存应用程序已经发送,但是还没有得到远程端确认的数据(根据未确认数据包的数量,一些数据可能还未发送到网络)。
In these networks, the data is transmitted in labeled cells, frames, or packets through a packet - switched network.
在这些网路中,资料以标记的细胞,讯框或封包中经过一个分封交换的网路被传输。
Cellular network, method for transmitting cellular data packets in cellular network, method for data packet routing, and cellular modem.
蜂窝网络,在蜂窝网络内传送蜂窝数据分组的方法,选择数据分组路由的方法以及蜂窝调制解调器。
Virtual Network Interface(VNI)plays an important role in processing data packets for special-purpose.
网络虚接口对特殊数据包的处理起着很大的作用。
MPLS multicast networks can forward the data packets fast and efficiently, and the mechanism of path recovery in MPLS multicast networks ensures the persistence of network services.
MPLS组播网络能快速有效地传输数据,其中的路径恢复机制确保提供持续的网络服务。
On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
在因特网上,包猴是指一类人,他们故意用数据包淹没网站或网络,对受攻击的网站或网络的用户而言,造成拒绝服务的情景。
These routing protocols are divided into single-copy and multiple copy algorithms, which rely on whether to allow data packets in the network is several-fold increase.
这些路由协议分成单复制和多复制算法,这种算法依靠是否允许数据包在网络中被多倍增加。
By analyzing packets of the transport layer and the traffic characteristic in the P2P system, TLI can identify whether or not the network data flow belongs to the P2P system.
TLI通过对传输层数据包进行分析并结合P 2 P系统所表现出来的流量特征,来识别某个网络流是否属于P 2 P。
Analyzes and troubleshoots packets of data transferred over the network.
分析和排除网络上数据包传送的问题。
The reliability checks allow to check whether resources meeting the requirements to transmission of a group of data packets of a priority class are available in the network.
通过按照本发明进行的许可性复查将审核,在网络中是否有与在传输一组优先级别数据包时的要求相对应的资源提供使用。
A barrier on a network device to filter or block data packets based on such criteria as type, source, or destination.
根据各种标准(如类型、来源或目标)过滤或阻止数据包的网络设备屏障。
The design process can capture IP packets in the network, parse the contents of the packet, showing the contents of data packets and also written to the log file.
所设计程序能够捕获网络中的IP数据包,解析数据包的内容,显示数据包内容并同时写入日志文件。
Active network is a paradigm for data networks in which the network is designed not only to forward packets, but also to be dynamically programmed in order to support per-user services.
主动网络是一种可编程的网络,用户可以对网络进行个性化的编程和设置。
Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures.
由通信与网络相关的网络协议传输层处理的数据包进行扫描,从使用的签名库签名。
The first data packets are switched from each of a plurality of network switch input ports to a dedicated output port of the network switch.
将来自各个网络交换机输入端口的第一数据包交换到该网络交换机的专用输出端口。
Active Network is a paradigm for data networks in which the network is designed not merely to forward packets, but also to be dynamically programmed in order to support per-user services.
主动网络是一种可编程的网络,用户可以对网络进行个性化的编程和设置。主动网络与传统的网络仅仅被动地传送字节流不同,它是“运行时刻可扩展的”。
With an increasing scale of the network and the development of the application technology, more and more services need data packets classification and filter for real time and speediness.
随着网络规模的不断扩大与应用技术的不断进步,越来越多的业务需要对数据包进行实时、快速的分类过滤。
It is that IP data packets on the network is very likely being stolen by hackers, resulting in a serious consequence that part of voice is lost or tapped.
因此,IP语音在网络上的安全传输是一个非常重要的问题,已成为研究和应用的热点。
It is that IP data packets on the network is very likely being stolen by hackers, resulting in a serious consequence that part of voice is lost or tapped.
因此,IP语音在网络上的安全传输是一个非常重要的问题,已成为研究和应用的热点。
应用推荐