ICMP

小编 分享 时间:
ICMP是什么意思
英式音标:英式读音
美式音标:美式读音
词汇分类:网络协议
词义:

abbr.

Internet Control Messages Protocol 网间控制报文协议;Internet 信报控制协议;

用法:

权威例句

Stateless IP/ICMP Translation Algorithm (SIIT)

Stateless IP/ICMP Translation Algorithm (SIIT)

ICMP Traceback Message

ICMP Traceback Messages

On design and evaluation of "intention-driven"ICMP traceback

On design and evaluation of "intention-driven"ICMP traceback

ICMP Router Discovery Messages

P~fc 1256: icmp router discovery messages

ICMP Router Discovery Messages

ICMP with IP routing instance information
造句:

1. Next I'll show you two ICMP attacks.

接下来我将向您介绍两种ICMP攻击。

youdao

2. Define how ICMP packets should be handled.

定义如何处理ICMP数据包。

youdao

3. ICMP USES the basic support of IP as if it were a higher level protocol.

ICMP使用IP的基本支持,就好象是更高级别的协议。

youdao

4. The ICMP timestamp message type is designed to help alleviate this problem.

ICMP时间戮记讯息类型被设计来帮助解决此问题。

youdao

5. The remote host USES an ICMP timestamp reply message to respond to the request.

远端主机使用一个ICMP时间戮记回复讯息以反应请求。

youdao

6. ICMP message: ICMP is a protocol designed to report and diagnose network problems.

ICMP消息:ICMP是用来报告和诊断网络问题的协议。

youdao

7. This page explains how ICMP timestamps are used to solve clock synchronization issues.

本页解释ICMP时间戮记如何使用来解决时序同步化议题。

youdao

8. ICMP provides a service that enables hosts to communicate control information to each other.

ICMP提供服务,使主机能够彼此交流控制信息。

youdao

9. For example, ICMP will send a source quench message when traffic becomes congested at a router.

例如,当某一路由器发生通信拥塞时,ICMP会发出一个源抑制信息。

youdao

10. Internet Control Message Protocol (ICMP) is an integral part of IP, but it USES some of IP's services.

网际控制报文协议(ICMP)是IP的组成部分,但它使用某些IP服务。

youdao

11. The parts of ICMP that can be translated are also required to work across a translation solution.

ICMP可以被转换的部分同样也需要一个转换方案。

youdao

12. ICMP is used by IP as well as some higher level protocols, such as Transmission Control protocol (TCP).

icmp由ip和一些更高级别的协议使用,如传输控制协议(TCP)。

youdao

13. Typically, ICMP is used to report errors in datagram processing on a host. Some functions of ICMP include.

通常,ICMP用来报告主机上数据报处理中的错误。

youdao

14. Making use of Internet Control message Protocol (ICMP) message for the diagnosis carries out low efficiency.

程序采用网际控制报文协议(ICMP)方式对网络进行诊断执行效率低。

youdao

15. These are not the only message types employed by ICMP, but they should give you an idea what ICMP is used for.

以上这些并不是ICMP所使用的全部消息类型,但它们能使您大致了解ICMP的用途。

youdao

16. The most common command that generates an ICMP message is ping, used to test if there is connectivity to a certain device.

生成ICMP消息的最常见命令是ping,它用来测试是否能连接到某个设备上。

youdao

17. Function inet_init also initializes the various inet modules, such as the ARP, ICMP, the IP modules, and the TCP and UDP modules.

函数inet _ init也会对各个inet模块进行初始化,例如ARP、ICMP和IP模块,以及TCP和UDP模块。

youdao

18. The IP layer, in turn, provides services used by the Internet Control Message Protocol (ICMP) and Transmission Control Protocol (TCP).

反过来,ip层又提供由网际控制报文协议(ICMP)和传输控制协议(TCP)使用的服务。

youdao

19. This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.

阐述了网络协议欺骗的一般原理,详细分析了ICMP协议及其存在的漏洞。

youdao

20. Examples of protocols are TCP, UDP, ICMP, comma-delimited list of any combination of these three protocols and all (for all protocols).

协议示例有tcp、UDP、ICMP、用逗号分隔的任何这三种协议的组合列表以及ALL(用于所有协议)。

youdao

21. In the following sections you will find more detailed information about ICMP and TCP as well as some interesting attacks using these protocols.

在以下几节中,您将找到关于ICMP和TCP的更详细的信息以及一些使用这些协议的有趣的攻击。

youdao

22. For example, you can route the network traffic that supports the virtual network over native IP, HTTP (including through a proxy), DNS and ICMP.

例如,您可以通过本地IP、HTTP(包括通过代理)、DNS和icmp来路由支持虚拟网络的网络流量。

youdao

23. If problems are encountered during routing, the Internet Control message Protoccol or ICMP sends messages and reports errors to the source host.

如果在安排路径的过程中遇到问题,互联网控制信息协议(ICMP)就把信息和错误报告向源主机发送。

youdao

24. Once discovery discovers a node (typically through ICMP ping), it will ask the capability daemon (capsd) to determine what services that node supports.

一旦discovery发现一个节点(通常通过ICMPping),它会请能力守护程序(capsd)来确定该节点支持什么服务。

youdao

25. The ICMP echo request failed because the source address and destination address that are specified in an ICMP echo message are not in the same scope.

由于ICM P回送消息中指定的源地址和目标地址不在同一范围内,ICM P回送请求失败。

youdao

26. ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.

ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。

youdao

27. While I won't cover any IP-level attacks in this article, I do want to discuss IP in a little more detail as it is the underlying protocol of ICMP and TCP.

尽管我将不在本文中介绍任何IP级别的攻击,但我确实需要稍微详细地讨论IP,因为它是ICMP和TCP的底层协议。

youdao

28. There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.

本论文研究的入侵攻击类型主要有三大类,它们分别是:与HTTP协议相关的典型入侵攻击,与TCP协议相关的典型入侵攻击以及与ICMP协议相关的典型入侵攻击。

youdao

29. There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.

本论文研究的入侵攻击类型主要有三大类,它们分别是:与HTTP协议相关的典型入侵攻击,与TCP协议相关的典型入侵攻击以及与ICMP协议相关的典型入侵攻击。

youdao

ICMP

将本文的Word文档下载到电脑,方便收藏和打印
推荐度:
点击下载文档文档为doc格式