源端口

  • 网络Source Port;srcport
源端口源端口
  1. 如果源端口类型中至少有一个元素没有被复制,那么将抛出异常,并显示错误消息Duplicatesarenotallowed。

    If at least one element in the source port type is not duplicated , the drop happens and the error message Duplicates are not allowed is displayed .

  2. 当应用软件向另一主机发送数据时,UDP协议生成一个数据头,包括源端口,目的地端口。这些端口提供为送达信息所需要的地址。

    When an application wants to send data to another host , UDP builds a header that includes a source port , a destination port which provides an address for delivering messages .

  3. 将源端口类型的所有元素复制到该目标中。

    All the elements from the source port type are copied to the target .

  4. 个字节的源端口(换句话说,即数据包所使用的源地址上的端口)

    2 bytes of source port ( in other words , the port on source that the packet used )

  5. name属性是操作的名称,originalPortTyQName是包含该操作的源WSDL端口类型的名称。

    The name attribute is the name of the operation , and originalPortTyQName is the name of the source WSDL port type that contains that operation .

  6. 针对油田电网呈树型分布的特点,运用模拟电路故障诊断理论,研究了利用外加音频信号源的端口比值分支定位法及侧距算法,实现对油田电网短路故障的自动诊断。

    The algorithm for calculating ratio of port voltages in the sound signal source and side circuit is used to diagnosing short circuit malfunction of electric net in oilfield by using the analogue diagnosis theory .

  7. 您不想访问所有类型的站点,只是想访问同一个源的不同端口,但是SOP就是拦着您。

    You don 't want to access all kind of sites ; you just want to access a different port at the same origin , but SOP won 't let you .

  8. INDX字段指出数据包离开源交换机的端口索引。

    The INDX field indicates the port index of the source of the packet as it exits the switch .

  9. 是源或临时端口,并且仅对这个连接有意义。

    40379 is the source , or ephemeral port , and is only significant for this connection .

  10. 用节点电压法分析含源线性一端口网络的等值条件

    Analyzing the Equivalent Qualification of One - port Network with Linear Source by Using Node Voltage Method

  11. 采用节点电压法对含源线性一端口网络进行分析,给出并证明了等值条件,并用该等值条件对实际电路进行了分析,结论正确。

    Analysis is made on the one-port network with linear source . The rdated equivalent qualification , which is proved to be correct for the real electrocircuit , is given in this paper .

  12. 数据源服务器通过双端口1GB的以太网连接到es7000/oneServer数据库服务器。

    The Source servers were connected to the ES7000 / one server database server with private dual port1Gb Ethernet connections .

  13. 其目的是为本地应用层服务端口设置允许访问的源IP地址和端口号信息。

    Local port access authority management policy offers information of source IP addresses and ports which are allowed to access the local application layer service ports . We set access authority for local ports , which allowed specific source IP address and port to access .

  14. tcpdump的主要好处是可以指定过滤器,这样您就可以仅选择特定的协议、源、目标和端口等。

    The main benefit of tcpdump is that you can specify filters so that you can select only particular protocols , sources , destinations , ports and other combinations .

  15. 该方法是以含有受控源的线性m端口网络的混合矩阵方程为依据的,它能分析包括VCVS和CCVS器件的电路。

    This method , is based on the hybrid matrix equation of the linear m-port network with controlled sources . It can be used for the circuits containing VCVS and CCVS .

  16. 可得到的信息为:源地址,源端口,目的地址,目的端口

    The information available is the source address , the source port , the destination address , and the destination port

  17. 对于不包含独立源的线性一端口网络,受控源支路能去耦等效为电阻(在相量电路中为阻抗)。

    It is shown that a dependent source can be equivalent to a real source or a resistance in the linear resistant circuit ( an impedance in the sinusoid steady-sate circuit ) .

  18. 它具备控制端口转发的任意一个细节的能力,你可以基于目标地址、目标端口、协议、网卡和源地址来设置端口转发。

    With the ability to control every facet of forwarding a port , you can forward based on things like Destination Address , Destination Port , Protocol , Source Interface , and Source Address .

  19. 因为每个通信都包含源IP地址和源端口,所以主机能够区分这三个不同的连接。

    Because every communication contains the source IP address and source port , the mainframe can distinguish between those three different connections .

  20. 然后对源IP地址和源端口进行统计,分别采用均匀随机采样、AMS算法以及本文提出的算法分别估算网络信息熵。

    Then , network information entropy is evaluated using the uniform random sampling , AMS algorithm and the proposed hybrid algorithm respectively .

  21. 由于大多数这种攻击总是用假冒的源地址和随机的源端口来产生攻击包,因此这种防范模型比入侵检测系统的检测-修改防火墙策略模型更为有效。

    This defense model is more effective than IDSs model which detectes attacks and changes firewall policies , because most attacks of these types always generate packets with spoof source address and random port .

  22. 然后分析IP报文的4个字段:源IP、宿IP、源端口和宿端口的特性,由此提出相关的哈希算法;

    Thirdly , this paper analyzes the four fields of IP packet , such as source IP , destination IP , source port , and destination port , and a hash algorithm named XOR_SHIFT is provided based on the analysis .

  23. facade和所有备用源都使用首选源的接口(端口类型)。

    The facade and all alternate sources use the preferred source 's interface ( port type ) .

  24. 本文根据受控源的既有电源性又有电阻性的本质,介绍一种可以大为简化求解含受控源的一端口网络等值电阻的系统方法&化有源(不含独立源)为无源的方法。

    On the basis of nature of source and resistance of dependent source , this paper introduces a systematic method transfering the active network ( not contains independent source ) to the passive network for calculating the equivalent resistance of one-port network with dependent source .