Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
NAT is transparent to the source and to destination computers.
The destination computers have only been identified by their IP addresses.
The destination computer thinks that the proxy server IS the source computer, and deals with it directly.
When a packet comes back from the destination computer, the router checks the destination address on the packet.
The company uses Electronic TV Host as the program guide in its Destination computers, which are combined with television receivers.
In 1996 Gateway Computer unveiled the Destination computer that included a tuner card and video card.
In computer networking, multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source.
The NAT router translates the inside global address of the packet to the inside local address, and sends it to the destination computer.
A computer program downloads (retrieves) different portions of the file from various sources simultaneously, and assembles the file on the destination computer data storage device.
Requires destination computer MAC address (also may require a SecureOn password)
Flow control is important because it is possible for a sending computer to transmit information at a faster rate than the destination computer can receive and process it.
Instead of opening a direct connection with the destination computer, messages are sent willy-nilly, chopped up into little packets that are reassembled when they get to their destination.
Each message passing through the computer on its way around the global network contains the sender's user identification, secret password and other information needed to gain access to the destination computer.
What this means is that a packet from a computer with an unregistered address could reach a registered destination computer, but the reply would be discarded by the first router it came to.
The passive sniffer grabbed the first 128 characters of every message that passed through the computer, including the identity of the user, his or her password and the identity of the destination computer.
Firewalls often block access to ports based on the network address and port of the source or destination computer, or the program using the port (if the firewall is running on the same computer).
In computer science, a mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer.
Each piece of information sent through the network would be given a sequence number, to ensure that they were dealt with in the right order at the destination computer, and to detect the loss of any of them.
A computer which sent information to another computer would know that it was successfully received when the destination computer sent back a special packet, called an acknowledgement (ACK), for that particular piece of information.
That is, data packets are routed across the network to a specific destination IP address, and then, upon reaching the destination computer, are further routed to the specific process bound to the destination port number.
When the client program on the destination computer receives them, the TCP layer (Transport Layer) reassembles the individual segments and ensures they are correctly ordered and error free as it streams them to an application.
When large chunks of data are to be sent over a computer network, they need to be first broken down to smaller segments that can pass through all the network elements like routers and switches between the source and destination computers.
Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
The destination computer verifies the correctness of the data in each packet (using information in the trailer), reassembles the original item using the packet number information in the header, and presents the item to the receiving application or user.
The magic packet contains the MAC address of the destination computer, an identifying number built into each network interface card ("NIC") or other ethernet device in a computer, that enables it to be uniquely recognized and addressed on a network.