在 英语 中使用 Network protocols 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
Instead, operational technology(OT) and information technology(IT) systems were isolated, using separate network protocols.
Higher-level network protocols like TCP/IP can be configured with a maximum packet size, a parameter independent of the physical layer MTU over which TCP/IP runs.
It was used to define various network protocols, and its binary encoding(DER) is still used to encode SSL certificates(X.509), for example[28].
This article defines all of the registry parameters that are used to configure the protocol driver, Tcpip. sys, that implements the standard TCP/IP network protocols.
Java ME consists of flexible user interfaces, tough security, built-in network protocols, and support for networked and offline applications which could be downloaded enthusiastically.
Ultimately, silicon photonics could support other data transfer and networking protocols.
The terms are borrowed from the IEEE 802 networking protocol model.
Posted in NETWORK PROTOCOLS.
Establishment of satellite-based Internet and other networking protocols.
This standard set of networking protocols allows devices, such as PCs, printers, and Wi-Fi access points, to communicate and discover each other's presence.
These things are coordinated through networking protocols used to move information and, ultimately, monetary value.
This consensus algorithm combined with the exclusive Smilo Network Protocol(SNP) ensures secure, scalable, quick, and sustainable transactions.
The Ripple network protocol, together with the xCurrent application, implement such and even more complex interbank transactions in seconds.
Wireshark is the world' s foremost network protocol analyzer, and is the de facto(and often de jure) standard across many industries….
Launched IEEE1888.4"green intelligent household and community control network protocol standard" the President of the international standard and the standard units.
Linux and Windows both support a number of networking protocols, such as TCP/IP, NetBIOS, and IPX.
UDP(User Datagram Protocol) A network protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent.
SSH, or secure shell, is a network protocol that provides a secure, encrypted way to communicate with and administer your servers.
Variety of mobile operator networks protocols, such as GSM, CDMA, and FOMA, and varying operating conditions affecting parameters like signal strength and available bandwidth.
At present, two key factors affect the development of the network protocol stack, one is performance and efficiency, and the other is development and debugging.