tcp造句31. Whereas NBT ran on TCP and User Datagram Protocol (UDP) ports 137-139, direct hosting uses TCP and UDP port 445.
32. WebSphere Message Broker V6.1 provided six new nodes that let flow developers access the TCP/IP input and output stream.
33. In this paper, we present the design of a general data telecommunication channel for electric power system using TCP/IP protocol as an example.
34. You should now be able to connect your mobile devices to large existing P2P communities through any TCP/IP-enabled wireless network.
35. These limitations cause TCP can not work well for complex network.
36. Simulation results show the model can improve the performance of TCP in satellite network.
37. The SMB protocol uses port 139 through NetBIOS over TCP, which is the way many older clients use SMB/CIFS.
38. Another example is that the Java MQ client supports only the TCP/IP transport and does not read any of the MQ environment variables at startup.
39. In a scenario that involves encapsulation, decapsulation and TCP/IP through software, performing these functions on the host processor requires many CPU cycles to process the data and SCSI commands.
40. We use sequence number of TCP to realize the FIFO order.
41. Ability to redirect all TCP traffic to the user - mode service.
42. In this paper, the implementation of MHS based on TCP/IP Network Environment is presented.
43. Study of the transmission that about aural signal realized by digital signal, at embedded system based on the TCP/IP protocol.
44. Discussed the specific agreement in the embedded TCP/IP protocol Ethernet, ARP, IP, TCP protocol software and system software flow method and so on.
45. It can maintain TCP fairness only when all the nodes in TCP flows are in the sensing or interference range.
46. This chapter has been a whirlwind tour of the TCP/IP protocol suite, introducing many of the terms and protocols that we discuss in detail in later chapters.
47. As discussed above, when Host A wants to establish a TCP connection to destination Host D, it sends a TCP segment with the SYN flag set first.
48. On the premise of compatibility with protocol standard, some changes are made to traditional algorithm, and then the implemented embedded TCP/IP protocol stack is tested.
49. The protocol informsIP at the destination host whether to pass the packet up to TCP or UDP.
50. The results of the simulation experiment show that TCP/IP protocol can absolutely run on a half-duplex channel, if the data collision problem of half-duplex channel could be solved.
51. With respect to the data transmission, STL utilized the theory of TCP/IP five-level model, which could assure the data validity and quality during the encapsulating process.
52. Network, which includes checks and information on outbound and inbound traffic, TCP version, interface, IP and User Datagram Protocol (UDP).
53. When TCP application is used in 3G wireless packet data service, its data transmission performance is badly influenced by the frame error rate (FER) of physical layer.
54. Therefore, the dynamic routing method in TCP/IP network is becoming more and more important.
55. The full text explain in detail with principle of the TCP connection, principle of the WINSOCK, the basic principle of the port scan and the scan method .
56. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
57. A set of networked sensor based on TCP/IP protocol was designed. The structure of its hardware and software and its application on remote bridge health monitoring system were presented.
58. Based on the character of TCP, The article enhances a three- layer net application, which includes the Logical Link Control and Session Layer, to raise the reliability of communication.
59. This can easily be changed to a membership service that uses TCP or Unicast instead, without changing the rest of the clustering logic.
60. The networks which emerged from this research became the basis for what we know as the Internet, and the protocols developed during this time became known as the TCP/IP Protocol Suite.