快好知 kuaihz


tcp造句
61. Although TCP was a reliable transport mechanism ; packet reordering aff ected its performance. 62. In the bandwidth asymmetric network, the deficiency of the bandwidth on backward path will limit the return of the feedback information, resulting in the degradation of the TCP performance. 63. In order to improve the authenticity of the application simulation, the flow control services have been added for the TCP agent, which make the analog network closer to the real network. 64. Applications and regular users should never use or specify a network service by its TCP/IP address, and they should only use a symbolic name. 65. The small - signal stability analysis of fluid - flow congestion TCP model is discussed. 66. This paper puts forward a simple and feasible security strategy that aims at the limitations of the TCP/IP protocol suite. It builds a safety authentication model on datalink layer. 67. In this paper, we first discuss how to set up a half duplex model in NS, and then study the performance of TCP/IP protocol running on half-duplex channel. 68. This method constructs a socket targeted to the TCP server on the localhost at a host number known both to the client and server through URIConstants. 69. UDP is very similar to TCP, but is simpler and less reliable. 70. The sysctl variable net.ipv4.tcp_sack can be set to 0 to disable SACK in the TCP stack. 71. A passive round trip time (RTT) estimate algorithm called PRE (passive RTT estimate) is proposed for the traffic monitor devices to estimate RTT of TCP connections in the broadband network. 72. The actual application programs transmit data using either User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) transport layer protocols. 73. True network emulation also provides flexibility to filter network packets that are based on IP addresses or protocols such as TCP, UDP, and ICMP. 74. The virtual subject" is the executor of the fictitious or hypothetic network acts on the base of TCP/IP contracts." 75. The Bi - RSVP provides resource reservation for ACK packets to improve TCP performance. 76. TCP data transmission. Simple connection oriented mode of data transmission. 77. If the monitor Web Service box was checked during the WSDL-to-Java generation, the SOAP invocation request should appear in the TCP/IP tunneller with an empty SOAP response (see Figure 23). 78. If left uncapped, a continuous barrage of TCP connection requests and subsequent consumption of TCP resources by these network services will eventually use up all the available system resources. 79. The smooth handover and TCP optimization in mobile network environments were studied. 80. As for software, considering the network agreement efficiency, we should apply the TCP/IP and NETBEUI, or NETBEUI. 81. Methods: The scaffolds were prepared by freeze-drying and cross-linking a mixtare of chitosan solution with TCP. 82. Cerf, along with colleague Dr. Robert Kahn, developed the networking protocol, TCP/IP, which has become the underlying foundation for the Internet. 83. The chief responsibility of TCP is to ensure reliable end - to - end connectivity. 84. Based on media access control(MAC) protocol and transport control protocol(TCP) performance analysis of IEEE 802.11 WLAN, a novel MAC protocol, BDCF, is proposed in this paper. 85. By using the SSL layer embedded between the application layer and TCP layer, the TCP mode of real-time data transmission is accomplished. 86. Complete range of optional devices such as push-pull torch, TCP control devices, joint finding and tracking sensors, wire cutter, etc. 87. In networks based on TCP/IP, the problem of address resolution ( and re ? address resolution ) is very important . 88. Recall that the Internet Protocol (IP) is the core network layer protocol that sits below the transport protocol (most commonly the Transmission Control Protocol, or TCP). 89. As we have explained, the registry and batch file handle launching the TCP client. 90. Using MODBUS/TCP application layer protocol, this chapter designed the format of data frame, and the communication between monitoring instrument and upper computer was realized.