The specification assumes HTTP is the underlying network protocol.
该规范假定HTTP是底层网络协议。
SFTP is a network protocol that enables files to be transferred securely.
SFTP是一个安全传输文件的网络协议。
Wireshark, formerly known as Ethereal, is a multiplatform network protocol analyzer.
Wireshark(以前称为Ethereal)是一个多平台网络协议分析器。
SSH, or Secure SHell, is a network protocol for remote administration of UNIX computers.
SSH或SecureSHell是用于远程管理UNIX计算机的一个网络协议。
Wireshark is one such tool that supports a vast array of network protocol decoding and analysis.
Wireshark就是其中一个工具,它支持大量的网络协议解码和分析。
The server kernel sends the message to the client machines using the network protocol, such as TCP.
服务器内核使用网络协议(如 TCP)将消息发送到客户端计算机。
The default network protocol is not installed correctly. It cannot be supported properly by the system.
默认的网络协议没有被正确安装。系统无法正确地支持该协议。
The specified network protocol is not one of the default protocols. Ensure that it is installed correctly.
所指定的网络协议不是默认协议之一。请确保安其安装正确。
So get your network protocol hats on, and get ready to learn about the inner workings of the language of the web.
所以,带好安全帽,我带你去看看web语言的内部原理了!
Software design mainly includes the driver program design for the chips and CAN-BUS protocol and network protocol.
软件编程方面,主要是各芯片的驱动程序设计,以及CAN总线协议和网络协议的实现。
Servers run instances of the memcache daemon, which allocates a block of RAM that's accessible over a simple network protocol.
服务器运行memcache守护进程的实例,这些进程分配一块可以通过一种简单的网络协议访问的RAM。
You are asking DNS for the lsid service record for pdb.org with TCP as the network protocol. The response should look like this.
您正在向DNS询问使用TCP作为网络协议的pdb.org的lsid服务记录。
A secure network protocol technology such as IPSec might be used to secure the communication channel between computers on a network.
可以使用一些安全网络协议技术,例如IPSec,来保证网络上计算机间通信信道的安全性。
Verifying new network protocol and algorithm through extension of NS2 can improve efficiency, reduce cost, and be more flexible.
通过扩展NS2来验证新的网络协议和算法,大大提高了效率、降低了成本,并更具灵活性。
This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.
阐述了网络协议欺骗的一般原理,详细分析了ICMP协议及其存在的漏洞。
Before dialing, to avoid data loss, either close all files using these connections or uncheck IPX on this entry's Network Protocol Settings.
在拨号之前,为避免数据丢失,请关闭所有使用这些连接的文件或在此项目的“网络协议”设置中不选IPX。
SOAP messages typically travel over an HTTP transport, the standard network protocol for Web applications, which is what you'll use in this book.
SOAP消息通常通过HTTP传输协议传递,HTTP是用于网络应用程序的标准网络协议,您在本文中就将使用这一协议。
The operations and messages are described abstractly, but they are bound to a concrete network protocol and message format to define an endpoint.
操作和消息是抽象描述的,但它们绑定到具体的网络协议和消息格式上,用来定义终端。
Synthesizing the structure of computer network protocol and network virtual instrument, the concept of network virtual instrument was presented.
综合计算机网络协议与网络化虚拟仪器的层次结构,阐述了网络化虚拟仪器的概念内涵。
Logically, the UNET low level library is a network protocol stack built on top of the UDP, containing a "network" layer and a "transport" layer.
从逻辑上看,UNET低级库是一个建立在UDP之上的网络协议栈。它包括一个“网络”层和一个“运输”层。
Protocol independence: Protocol independence refers to the idea that clients can access services without regard to the communication/network protocol.
协议独立性:协议独立性指客户机在不考虑通信/网络协议的情况下访问服务。
In other words, the programming model that you use to invoke a Web service usually determines the synchrony of the call, and not the network protocol.
换句话说,用来调用Web服务的编程模型通常确定调用的同步性,而不是网络协议。
Furthermore, we divide the system into the network protocol module and the contents processing module to meet with browser's function requirements.
通过网络协议模块和内容处理模块来实现浏览器的功能性需求,并划分为不同任务来提高并发度。
NDIS is a kind of network protocol standard which supports the network drivers of three kinds: NIC drivers, intermediate drivers and protocol drivers.
NDIS是一种网络协议规范,它支持三种类型的网络驱动程序:网卡驱动程序、中间驱动程序、协议驱动程序。
Partly runtime binding: As in the previous case, the signatures of the service operations are known at the development time as well as the network protocol.
部分运行时绑定:与前述情况一样,在开发时就已经知道服务操作的签名和网络协议。
And then, it introduced this research, the control network protocol of XMAP, constructed the model of achieving control network based on this research.
然后概括介绍了本研究—XMAP控制网络协议,构建了基于本研究的控制网络实现模型。
Strategies above are applied to classical Contract Network Protocol, and then cooperation flow chart of improved Contract Network Protocol is pictured.
将以上策略赋于经典合同网协议中,给出改进的合同网协议的协作流程。
This method not only merely limited to the verifications of the network protocol, but also popularized it in any model related to process communications.
此方法不仅限于网络协议的证明,也能够将其推广到任何与进程通信相关的模型当中。
The operating system of workstations is widely based on UNIX system V, and STREAMS mechanism is adopted in the implement of their network protocol stack.
而现有工作站中又广泛采用的UNIX系统都是基于系统V,它们的网络协议栈采用流(treams)制实现。
The operating system of workstations is widely based on UNIX system V, and STREAMS mechanism is adopted in the implement of their network protocol stack.
而现有工作站中又广泛采用的UNIX系统都是基于系统V,它们的网络协议栈采用流(treams)制实现。
应用推荐