SYS驱动设置以太网接口卡为混杂模式,用来捕获所有网络上的数据包。
SYS driver to place the Ethernet Interface Card in promiscuous mode to capture all the packets that travel through the network.
对于接入点,我们真正需要的是一个简单的网桥;来自一个网络的数据包出现在另一个网络上,没有什么特别用途。
What we really want, for an access point, is a simple bridge; packets from one network show up on the other network, nothing special.
基本上,ping从您的服务器向目标服务器发送Internet控制消息协议(Internet Control Message Protocol,ICMP)数据包,然后接收来自目标服务器的响应。
Basically, ping sends Internet Control Message Protocol (ICMP) packets from your server to the destination server, and then receives a response from the destination server.
这实际上是可选的;网桥并不需要有自己的IP地址,因为它将透明地把数据包从一个接口转发到另一个接口。
That's actually optional; the bridge doesn't need to have its own IP address, since it will transparently forward packets from one interface to the other.
互联网在开放式的技术标准上建立,从用来传输数据包的互联网协议到定义网页外观的超文本链接语言都是如此。
The Internet is built on open technical standards, from Internet protocol to move packets of data around to hypertext mark-up language to define the appearance of web pages.
安全产品经常提供很多的重要的分析价值,它们经常提供比跟踪/状态数据包更好的信息来理解站点上发生的事情。
The products often provide great analytics value because they are sometimes better than normal tracking/stats packages for understanding what's going on with your site.
RSCT实际上探测跨所有网络发送的心跳数据包是否丢失并判断准确的丢失(网络、NIC或节点故障)。
RSCT detects the loss of heartbeat packets that are sent across all the networks and determines the exact loss (network, NIC or node failure).
因为ami命令行工具在Ubuntu上极为易用,在Ubuntu上您可用apt安装的数据包已经可用,所以非常简单。
This is simply because the AMI command-line tools are extremely easy to use on Ubuntu, where a package that you can install using apt is already available.
这种情况的一个例外是有些应用程序可能会喜欢更小的数据包,这样的应用程序包括Internet上的一些web应用程序,原因是大多数Internet连接都不支持极大帧。
An exception to this is if your application prefers smaller packets, and this includes web applications on the Internet, since most Internet connections do not support jumbo frames.
在大多数机器上都可以使用ping,包括客户机和服务器,只要它们已经配置为对 ping 工具发送给设备的ICMP数据包做出响应。
Ping should work with most machines, both clients and servers, providing they have been configured to respond to the ICMP packets that the ping tool sends to the device.
尽管您可以非法打开rt . jar并将您的定制实现或新数据包移入其中,但从技术上您就违反了您下载JDK时同意的协议了。
While you could crack open rt.jar and slide your custom implementation or new package into it, that would technically violate the license you agreed to when you downloaded the JDK.
这是一个以太网术语,用来描述这样的网络情景,即网段上某个特定设备发送出一个数据包,迫使同网段上其他的设备就必须注意到这一点。
This is an Ethernet term used to describe a network scenario wherein one particular device sends a packet on a network segment, forcing every other device on that same segment to pay attention to it.
在硬件上介绍了RTL8019AS网卡芯片的硬件结构和内部存储器结构,以及其收发数据包的方法。
It also introduce the hardware structure, the memory structure and the method of receiving and delivering datum bundle of RTL8019AS chip.
当网络接口层从它的上一层收到一个数据包时,它就加上一个前同步信号以及循环冗余校验(CRC)。
When the network interface receives a packet from the layer above, it adds a preamble and CRC.
在同时考虑网络诱导时延和数据包丢失的基础上,研究了动态输出反馈网络控制系统指数稳定性和控制器设计问题。
Exponential stability and controller design problem for dynamical output feedback networked control systems (NCSs) with network-induce delay and data packet dropout is studied.
在微电子中,使用电线将数据包的引线与芯片上的结合区相连接的过程。装配过程的一部分。
In microelectronics, the process of connecting wires from the leads on the package to the bonding pads on the chip. Part of the assembly process.
然后在介绍了分层网络数据包的类型及结构的基础上,给出数据包分析处理类的设计。
Then, It introduces the types and structures of packets and presents the design of packet analysis class.
攻击包括有一个客户端多次发送SYN数据包(同步)服务器上的每个端口,使用假的IP地址。
The attack involves having a client repeatedly send SYN (synchronization) packets to every port on a server, using fake IP addresses.
它们的基本功能分别是:在网关服务器上监控流量异常的用户数据包和按照自定的策略设置网络路由。
Their basic functions are: monitoring the unusual data stream and setting up network route according to some tactics at gateway server.
在协议分析的基础上,采用IP数据包分片重组、TCP数据流还原等技术,降低漏报率,减少误报率。
On the base of protocol analysis, the system USES the technology of the fragment reassembly of IP packet, TCP data flow reverting, etc. It reduces leak and mistake alert of the intrusion.
我们研究这样一类权重网络的优化生长模式,在其上每两个节点之间的数据包的传送沿着优化路径进行。
We study an optimal growing mode for a class of weighted transportation networks on which data packets are exchanged between every pair of vertices along the optimal paths (OPs) connecting them.
另外,采用基于流级的基础上对数据包进行分类,基本上不会产生数据包的乱序问题。
Moreover, we categorize data packets at the flow level, and it decreases packet disorder.
分析和排除网络上数据包传送的问题。
Analyzes and troubleshoots packets of data transferred over the network.
进而,得到数据包载荷长度在给定的区间上服从一定的分布条件下,RTS门限和终端发送一个数据包所需消耗能量的平均值之间的关系。
The relation of RTS threshold and average energy consumption per frame is produced in the assumption that the frame payload's length is distributed in a given interval.
在此基础上,提出了一种基于排除的串匹配算法,该算法能快速而准确地排除负载中不包含匹配模式串的数据包。
On the base of this, an exclusion-based matching algorithm is presented. It can exclude the packets whose load doesn't include intrusion stri…
现在你看看盘片数据包的头房- 盘片上间隔环的铺设。
Now you see how platters packet has room for heads - platters laying on spacer rings.
网桥监视在每个网络上传的所有数据包,当它发现一个网络上的包到另一网上的主机时,就将其传送过去。
The bridge looks at all the packets flying by on each of the networks and when it sees a packet on one network destined for a host on the other the bridge copies it over.
光缓存是OPS网络必需的器件,用以实现数据包的存储功能,解决信号时间上的冲突;
The most important and indispensable component in OPS network is the optical buffer, which is used for storing the data packet to solve the time conflict of signals.
传统上,解决冲突的方法是采用MAC协议控制数据包接入信道和冲突后的重传管理。
Traditionally, MAC protocols are used to control channel accessing and manage retransmissions after collision.
传统上,解决冲突的方法是采用MAC协议控制数据包接入信道和冲突后的重传管理。
Traditionally, MAC protocols are used to control channel accessing and manage retransmissions after collision.
应用推荐