Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
On the Internet, data is transmitted in the form of network packets.
And without having to wait for additional network packets.
Cascade does its work through a combination of capturing network packets.
A network packet is the fundamental building block for packet-switched networks.
A network packet that in theory is a broadcast to every machine in the universe.
In computer networks, the data is encapsulated in network packets.
In sniffer mode, the program will read network packets and display them on the console.
An attacker can gain important information by monitoring the frequency and timing of network packets.
Large network packets are broken into small pieces called flits (flow control digits).
This is sensitive to network packet loss, jitter and clock synchronization.
A flood ping can also be used as a diagnostic for network packet loss and throughput issues.
The receiving system had to be configured to accept those network packets and agree to have their system process them.
In this method a long-term and short-term statistical profile was created from information in the network packets.
A network packet of maximum size.
What is a network packet?
For high-speed network packet traffic generation, trafgen.
Transmit network packets on all slave network interfaces.
Network packet loss or excessive packet times have dramatic effects on redirector operation and must be avoided.
Subnet directed broadcasts are treated as normal network packets until processed by the final (local) router.
Port mirroring - the switch sends a copy of network packets to a monitoring network connection.
In the case of IP, network packets could be sent in round-robin mode between each separate link.
Wireshark network packet logger, visualizer, inspector, some analyses.
Here, the switching of network packets occurs at a lower level, namely the data link layer rather than the traditional network layer.
In the various pages linked from the project page, Langley argues that additional network packets to negotiate encryption are no good, which severely complicates matters.
The outgoing network packet traffic is distributed according to the current load (computed relative to the speed) on each network interface slave.