Examples of using Data packets in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
The Initialization Vector is used to ensure that subsequent data packets are encrypted with different key streams, despite using the same secret key.
Latency- the temporal delay caused by signal transmission, storage or processing of data packets- is compensated for by the system.
The tool essentially captures data packets moving within a network and displays them back to the end user in a human-readable form.
Besides data packets that went missing in transmission, signal integrity can also affect the content of a data packet. .
Network sniffing is the process of intercepting data packets sent over a network. This can be done by the specialized software program or hardware equipment.
It assesses and prioritizes data packets and initiates their processing in the fastest possible time.
Also, data packets may be lost, which further reduces the useful data throughput.
There is a need for a protocol that can distribute data packets as fast as possible, without worrying as much about stability and packet loss.
The IoT slice sends very few data packets to the network but requires a large capacity to register millions of devices.
It transmits and receives 1394-formatted data packets and supports asynchronous or isochronous data transfers.
Data packets, in general, should not be prioritized on neutral networks unless they are disruptive, malicious, or relate to emergency communications.
The VMware NAT device identifies incoming data packets that are intended for each virtual machine and sends them to the correct destination.
Once the data packets have arrived at the correct destination, another protocol Transmission Control Protocol(TCP)- puts them in the right order.
FRR- In TCP/IP, fast retransmit and recovery(FRR) is a congestion control algorithm that makes it possible to quickly recover lost data packets.
Low Orbit Ion Cannon is a simple application that allows users to send UDP, HTTP, or TCP data packets to any IP address.
Reportedly, Zcoin used the InterPlanetary File System(IPFS) to store encrypted data packets which contained identifying documents and voting numbers.
L2CAP permits higher level protocols and applications to transmit and receive L2CAP data packets up to 64 kilobytes in length.
Contrary to TCP, UDP just keeps sending data packets without any error-checking.