Examples of using Protocol uses in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
The key-management protocol uses X.
This protocol uses encryption of 160 bits to 256 bits, which makes it very safe.
The X Display Manager Control Protocol uses UDP port 177.
The protocol uses a form of perfect forward secrecy where a new unique key is generated for each transfer.
As we will see, the Carrier protocol uses its own methods for reliable data transfer over UDP.
The protocol uses off-chain data to catalyze the transaction speed and also decreases the associated charges.
To achieve these goals, each protocol uses a different consensus algorithm and a different governance model.
The protocol uses very narrow channel widths of 500 kHz or less and a maximum transmit power of 20 dBm(50 mW).
The Microsoft implementation of the L2TP protocol uses IPSec encryption to protect the data stream from the VPN client to the VPN server.
The protocol uses already-approved medications, and the US Food and Drug Administrationdoesn't police specific dosing schedules.
The OVSDB management protocol uses JSON[RFC4627] for its wire format and is based on JSON-RPC version 1.0[JSON-RPC].
The protocol uses an upper-layer network already existing on existing switching devices to create an inclusive and free Internet.
By default, the WebSocket Protocol uses port 80 for regular WebSocket connections and port 443 for WebSocket connections tunneled over Transport Layer Security(TLS)[RFC2818].
HTTPS protocol uses HCC's trusted TCP/IP stack and verifiable TLS module to create a highly secure data environment for embedded IoT applications.
The TCP/IP protocol uses a 16-bit number, called a port, to differentiate connections to multiple network applications that run on the same computer.
The CSRmesh protocol uses Bluetooth Smart to send messages to other Bluetooth Smart devices in the network, which in turn relay them onward.
The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server(and vice versa) across an insecure network connection.
The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server(and vice versa) across an insecure network connection.
Anti-replay protocol uses a unidirectional security association in order to establish a secure connection between two nodes in the network.
The WebSocket protocol uses the HTTP upgrade system(which is normally used for HTTP/SSL) to"upgrade" an HTTP connection to a WebSocket connection.
The internet protocol uses four key mechanisms in providing its service: Type of Service, Time to Live, Options, and Header Checksum.
The key-management protocol uses X. 509 digital certificates, RSA public key encryption, and Triple DES encryption to secure key exchanges between the wireless modem and the WMTS.
Ocean Protocol uses blockchain technology, smart contracts, and tokens to enable safe and secure sharing of data, guaranteeing control and auditability while protecting privacy.
The protocol uses so-called approval voting to designate validators, whereby each wallet can“approve” up to 30 validators and those approvals will determine the 21“supernodes.”.
The protocol used for this is typically MQTT.
Principal protocol used to stream data across an IP network.
The protocol used by ham radios is called AX.