快好知 kuaihz


datagram造句
1. The frame data area contains a datagram. 2. Creates either a stream or a datagram socket. 3. A datagram delivery protocol ( DDP ) in local internet environment is analyzed in the paper. 4. Such a datagram receiver makes good groundwork for the Profibus low level development. 5. Packed with IPSec protocol, the datagram of L 2 TP is to be secured. 6. Whereas NBT ran on TCP and User Datagram Protocol (UDP) ports 137-139, direct hosting uses TCP and UDP port 445. 7. To remedy the defect of User Datagram Protocol(UDP) transmission in reliability, this paper proposes a design method using Finite State Machine(FSM) to control UDP transmission data. 8. For NetBIOS domain names, the datagram is implemented as a mailslot message. 9. Because of the special format of MPLS Datagram and its special application, more and more applications based on MPLS are going though the Information Monitoring System. 10. Two ways in Winsocket technology: datagram socket and stream socket were dicussed. 11. The time the datagram remains on the Internet is measured in hops, where one hop represents one gateway on the datagram's path to the destination node. 12. Datagram congestion control protocol ( DCCP ) is a new transport protocol put forward by IETF. 13. If User Datagram Protocol (UDP) was used as transport protocol, we can get even fewer file download response time and thereby network performance was improved. 14. Classify the datagram on LANs can provide some evidences of NID ( network intrusion detect ). 15. It is used with multicasting: sending a UDP datagram to multiple hosts. 16. The theoretic basis and the datagram format of the newly propounded RTS method are presented. 17. The FRAG field indicates whether or not this datagram is one of a number of fragments. 18. Clustering technologies often make use of a fast communication protocol, such as User Datagram Protocol (UDP) or Multicast protocols. 19. Network, which includes checks and information on outbound and inbound traffic, TCP version, interface, IP and User Datagram Protocol (UDP). 20. Gets the number of local endpoints that are listening for User Datagram Protocol (UDP) datagrams. 21. The paper chiefly introduces a cryptographic solution about key recovery and key recovery capability by adding key recovery information to an IP datagram. 22. Audio and video streams are preferably transmitted through the User Datagram Protocol (UDP). 22.try its best to collect and create good sentences. 23. The actual application programs transmit data using either User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) transport layer protocols. 24. Unlike the connection-oriented protocol, which requires source and destination addresses, the datagram only requires a destination address. 25. For traditional IP network, the currently deployed routing scheme is focused on constructing end-to-end connectivity which usually supports only one type of datagram service. 26. Signals that an ICMP Port Unreachable message has been received a connected datagram. 27. This error does not relate to the state of the destination host or network but still prevents the datagram from being processed and delivered, and because of that, the datagram is discarded. 28. This paper emphasizes on the implementation of CCB and its strategy of tasks assignment, discusses the system datagram protocol related to the implementation of CCB. 29. Part of the firewall contains three applications: Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and ICMP. 30. According to software structure, G. 729 speech coding as well as the choice of UDP (User Datagram Protocol) transport protocols and realization on TMS320C5402 are given.