- protocol function
- n.协议功能
English-Chinese dictionary of mining (英汉矿业大词典). 2013.
English-Chinese dictionary of mining (英汉矿业大词典). 2013.
Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… … Wikipedia
protocol — pro·to·col / prō tə ˌkȯl/ n 1: an original draft, minute, or record of a document or transaction 2 a: a preliminary memorandum often formulated and signed by diplomatic negotiators as a basis for a final convention or treaty b: the records or… … Law dictionary
Protocol data unit — In telecommunications, the term protocol data unit (PDU) has the following meanings: #Information that is delivered as a unit among peer entities of a network and that may contain control information, address information, or data. #In layered… … Wikipedia
Protocol on Blinding Laser Weapons — The Protocol on Blinding Laser Weapons, Protocol IV of the 1980 Convention on Certain Conventional Weapons, was issued by the United Nations on 13 October 1995. It came into force on 30 July 1998.Fact|date=December 2007TextArticle 1It is… … Wikipedia
Communications protocol — For other senses of this word, see Protocol. A communications protocol is a system of digital message formats and rules for exchanging those messages in or between computing systems and in telecommunications. A protocol may have a formal… … Wikipedia
Three-pass protocol — In cryptography, the three pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys. This message protocol should not be… … Wikipedia
X Window System core protocol — The X Window System logo The X Window System core protocol[1][2][3] is the base protocol of the X Windo … Wikipedia
Voice over Internet Protocol — (VoIP, IPAEng|vɔɪp) is a protocol optimized for the transmission of voice through the Internet or other packet switched networks. VoIP is often used abstractly to refer to the actual transmission of voice (rather than the protocol implementing… … Wikipedia
Secure Real-time Transport Protocol — The Secure Real time Transport Protocol (or SRTP) defines a profile of RTP (Real time Transport Protocol), intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast… … Wikipedia
Dining cryptographers protocol/Rewrite — Problem Statement Dining Cryptographers A group of cryptographers is enjoying dinner at a local restaurant. Upon requesting their bill, the cryptographers are surprised to learn from their host that payment for the dinner has already been… … Wikipedia
PME Aggregation Function — (PAF) is a mechanism defined in Clause 61 of IEEE 802.3, which allows one or more Physical Medium Entities (PMEs) to be combined together to form asingle logical Ethernet link.The PAF is located in the Physical Coding Sublayer (PCS), between the… … Wikipedia