Examples of using IP packet in English and their translations into Spanish
{-}
-
Colloquial
-
Official
only the payload of the IP packet is usually encrypted or authenticated.
In order to allow two labels on top of a 1500 byte IP packet, you must.
sufficient to contain a maximum-sized IP packet for Ethernet, would take 77.42 µs to transmit.
by authenticating and/or encrypting every IP packet in a data stream.
is a suite of protocols for securing IP communications by authenticating and encrypting each IP packet in a data stream.
the Deep Packet Inspection method is used to analyze and report the actual data contents in the IP packet, in some cases even encrypted traffic.
This utility captures all IP packets in the local area network.
Different qos fields in IP packets, mpls packets,
The authentication header(AH) signs IP packets and ensures integrity.
You limit the logging of IP packets with the IPFIREWALL_VERBOSE_LIMIT option.
Looking for a way to analyze your IP packets?
The MNA decoders reconvert these raw IP packets to DVI video signals
The MNA decoder reconverts these raw IP packets to DVI video signals
The System uses IP packets via existing or commercially available network equipment
Its main purpose is the transmission of IP packets in the Personal Area Networking Profile.
is a technology protocol suite for securing IP communications by authenticating and encrypting each of the IP packets of a communication session.
Layer 2 Tunneling Protocol is a non-proprietary protocol created by the Internet Task Force for encrypting IP packets for transmission through the Internet.
Brian May wondered what the best way with Debian would be to monitor IP packets sent/received over an external i.e.
their digital data are encapsulated in IP packets.