单词 | Router |
例句 | 1. At the low end, configuring the router will probably cost staff time. 2. Lastly, if the screening router is circumvented by a hacker, the rest of the network is open to attack. 3. For example, a router might send all addresses beginning with 213 in one direction, and the rest in another. 4. A new multiprotocol router has also been added to the ScaNet range. 5. Useful machines are an electric drill, a small router to make mortises and mouldings, and a small bandsaw. 6. Router E has to recompute the network topology. 7. Device that functions as both a router and bridge. 8. Cisco already has one IP router in space. 9. What determines the IOS that the router will load? 10. Communication system, communication terminal, routing control method, and router. 11. What command will disable CDP on a router interface? 12. The design and implementation of IP router is introduced. 12. try its best to collect and create good sentences. 13. The radio system makes very efficient use of router resources in the system by creating Multicast IP groups only for the duration of a group call. 14. The IP router card supports two configuration modes: Console command line configuration and network command line configuration. 15. Within a LAN environment the router contains broadcasts, provides local address resolution services, such as ARP and RARP, and may segment the network using a subnetwork structure. 16. A wireless router was hooked up to the mobile phone to give it the extra antenna power needed to send the coordinates down. 17. The invention discloses a multi - autonomous system router level topological treatment system and a method. 18. But Proteon has gone one stage further than 3Com by bundling both router and hub into a pre-configured chassis. 19. A worthwhile accessory for the home woodworker aiming to make the best use of a router. 20. Hands on Shimming up During last year I came into possession of a large quantity of 1/4in router bits. 21. The simplest firewall is a packet-filtering gateway or screening router. 22. As the stylus is moved over a pattern, the router duplicates the original. 23. The client sends an IGMP join message to its designated multicast router. 24. First, the computer sends about it's data request to a router. 25. Did design the testing project the emulate of algorithm, the IS-IS protocol consistency and performance by using the Terabit router as the test platform, and do analyze the result of the test. 26. By adopting the fair queueing instead of the traditional FCFS service discipline, router is able to isolate and protect leaky-bucket controlled network connections. 27. For example, ICMP will send a source quench message when traffic becomes congested at a router. 28. The topological properties of the XD network indicate that it is a more effective approach to fabrics in the terabit router, compared with existing networks. 29. The IPX protocol cannot dial - in on the port because the IPX router is not installed. 30. The customer connects a customer premises equipment (CPE) device, such as a router or frame relay access device, into the NTU using a V. 35 or RS-232 serial interface. 31. A gateway is a device that performs functions similar to router. 32. Many engineers believe that the use of a router provides better protection against hacking than a software firewall, because no computer Internet Protocol address are directly exposed to the Internet. 33. Cisco and 3 Com have focused on the LAN and WAN -- specifically, router and switch requirements. 34. Since the NAT router now has the computer's source address and source port saved to the address translation table, it will continue to use that same port number for the duration of the connection. 35. One is that the rest queue scheduling algorithm takes place of FIFO (First In First Out) scheduling algorithm on the router, enhancing differential service for different sort data flows. 36. The packet is then checked to see if it is actually destined for the router, or if it is to be routed to another device in the internetwork. 37. The hostname on one router must match the username the other router has configured. 38. CNC router has many new progresses in universal process, among them the obvious characteristic is that to change the gantry structure into cantilever structure. 39. The ThinkPad has a built-in Ethernet port, and we added another Ethernet PCMCIA card so it could act as a router. 40. In those cases, administrators may opt to use a stand - alone packet filter behind the router. 41. On the basis of the estimated packet arrival rate and the status of network congestion in router, the buffer was managed using rate-based random early detection(RED). 42. The callback router answers the initial call and makes the return call to the client based on its configuration statements. 43. ZRP is a hierarchical routing protocol, which can control the router spending, cut the delay and improve the efficiency,[http:///router.html] while setting the best radius. 44. Guitars can be made by a single luthier in a small shop, using hand tools, and maybe a small router and a band saw. 45. The on demand router sends these requests to dynamic clusters, which represent a pool of resource that application servers and application instances can consume. 46. Is there any space to place the router in the control room? 47. On which types of network will OSPF elect a backup designated router? 48. By adopting the fair queuing instead of traditional FCFS service discipline, the router is able to isolate and protect leaky-bucket controlled network connections. 49. To filter network traffic, ACLs determine if routed packets are forwarded or blocked at the router interfaces. 50. Electro-spindle drilling and milling, including ADX , ADM the two series, with the CNC drilling, CNC milling, engraving machine, woodworking router and milling machine tools, such as matching. 51. The DTE, which is generally a router, is the DTE. 52. Tunable Laser is an ideal optical source in WDM Optical Networks. It is important components in Optical Packet Switching and it is also used in router of access networks. 53. In a MANET, each network node operates as a router capable of forwarding traffic and forming a network free of any fixed infrastructure. 54. The router has a unique IP address given to the company by IANA. 55. Network management system is the important part of Terabit Router system, It takes charge of operation, administration and maintenance of the network devices. 56. If the economic conditions allow the best use of the router. 57. If the sending endstation determines that the destination address is not local, the packet goes to a first-hop router, typically one that is close and has been preassigned to the sender. 58. After routing and verifying the packet for translation, the router saves the computer's non-routable IP address and port number to an address translation table. 59. Based on an example of router with multiple input queues, construction of formal testing model of router is introduced and testing and analysis of this model are researched. 60. All routers in the OSPF area will learn a default route provided that the interface of the border router to the default gateway is active. 61. The Pontus desk (image below) is a generously proportioned partner desk combining walnut, oak and painted finish with cable management system and hidden router/hard drive storage built-in. 62. An off-the-shelf mobile router and PC card could essentially duplicate the networking setup of UConnect Web and at a cost far less than the $495 plus installation fees that Chrysler will charge. 63. Which command will configure a default route on a router? 64. Passive traffic measurement was realized through configured Multi Router Traffic Grapher (MRTG), and the method was used in the test network environment. 65. Then it obtains the destination hardware address of the next router and finally. 66. A router routes an enable signal based on the activation of the capacitive switch. 67. The machines have The machines have three types of functional heads:vibration cutting head, creasing wheels, V-Cutter, high speed milling Router, with drawing pen. 68. A NIC is a special hardware card within any networked device (computer, printer, router, etc.) that handles all the technical aspects of sending and receiving data packets over a computer network. 69. A message splitter can be used to break down an outgoing message into parts and dispatch those parts over different endpoints configured on the router. 70. But since a typical entry in the address translation table only takes about 160 bytes, a router with 4 MB of DRAM could theoretically process 26,214 simultaneous translations! 71. With DHCP and NAT functions, multi PCs could freely share Internet connection wired or wirelessly through this Broadband Router. 72. If this is a live system, plan time to repair any damage a test may cause,[http:///router.html] such as a failed router or hard disk. 73. Disconnect the router from UTP cables ( not the power cable ). 74. The ordinary router just checks the destination address of the data packet and chooses the best path to get to the destination address. 75. When using the pass-through router, if you want to return a response, you must set synchronous to "true" on the outbound endpoint. 76. The AXP module is a hardware module that is connected to an ISR router taking power from it and is accessing its network interface. 77. If you're behind a firewall / router that blocks the incoming POP port (955), you can install TOR and then use it as a SOCKS proxy in the Thunderbird settings. 78. Update packets are used when a router discovers a new neighbor. 79. You route on this and any other message header content using a message filter (router). 80. The IPX dial - in on the port because the IPX router is not installed. 81. Finally, based on the forementioned analysis and according to the system structure of 863 Terabit router and other factors, a scheme of implementing VPLS in terabit router system is presented. 82. The NAT router translates the inside global address of the packet to the inside local address and then checks the routing table before it sends it to the destination computer. 83. Thus, priority queueing systems are usually adopted in the performance analysis of a router. 84. With dedicated access, the computer is directly connected to the Internet via a router, or the computer is part of a network linked to the Internet. 85. This allows laptops to autonomously route packets between themselves in a peer-to-peer network (without the need for a separate router). 86. Each node in MANET acts as both terminal and router, which collects routes and forwards packets. 87. If wireless coverage throughout your house is hit or miss, your best bet is to do a little DIY router upgrading. 88. While adding the default route to the router you should be aware of having two addresses. 89. Router generates and checks every OSPF packet. Router authenticates the source of each routing update packet that it receives. 90. Follow the wizard. In the field "Printer Name or IP Address", enter the IP address of your router. 91. The IPX protocol cannot dial-out on the port because the computer is an IPX router. 92. To read statistics from a network router, a collector might use Simple Network Management Protocol (SNMP) or Telnet. 93. To exchange routing updates, each router in the EIGRP network must be configured with the same autonomous system number. 94. Due to the technology development disproportion of optical fiber transmission and electronics, the core router as network node has become the main bottleneck in the progress of modern networks. 95. In this paper, we propose architecture called the capable IP Router ( PQIR ). 96. The device needs to support the same security type that is set on the router. 97. Router should be able to generate alert SMS to defined phone nos. on (a ) communication failure and (b ) hangup. 98. Otherwise, a malicious eavesdropper on any router between your server and the end user can very easily sniff the sensitive information out of the network packets. 99. After checking the routing table and the verification process for translation to occur, the router saves the computer's non-routable IP address to an address translation table . 100. The router can be connected to the Internet via a high-speed (T-1 or faster) WAN interface. 101. Ancillary Current Router now specifies that the bonus is in percentage. 102. Using a discovery mechanism, IPv6 clients can discover an IPv6 address by a broadcast from an IPv6 router./router.html 103. Release the reset button and give the router about 10 secs resettle. 104. To configure a route from an ISP router into a corporate network. 105. Main stream productspresentlyused in IP bearer network include core router, service router, core route switch, broadband access server, firewall, user service gateway, etc. 106. The thesis is just about the design and implementation of Gigabit Ethernet Interface Card in Core Router. 107. A: This is normal if you're behind a firewall or a router. 108. Design a polynomial algorithm to resolve the problem based on current and mature algorithm, only in this way, can the router not be overloaded. 109. With an industry standard bolt-hole pattern and router base diameter along with removable handles for insert plate clearance, the 5625-20 readily converts any existing table or production jig set-up. 110. An ISDN option that alerts a Terminal Adapter ( TA ) or ISDN-capable router that a second call is coming in over a given Bearer (B) channel. 111. The IPX protocol cannot dial - in on port because the IPX router is not installed. 112. Terabit router will play a more important role in the future broadband network. 113. With the embedded CPU's flexibility and micro engine's high throughput on packet processing, the evolutionary router can achieve nearly linear speed throughput. 114. Each router that the packet encounters along the way is called a hop. The hop count is the distanced traveled. 115. The router updates its cache, installs the new MAC address into the packet header and launches the packet. 116. As the number of VLANs increases on a network, the physical approach of having one router interface per VLAN quickly becomes unscalable . 117. The entire encrypted payload can traverse a router - based IP network as is. 118. To overcome this obstacle, the parallel and programmable network processors have been involved into the design of router. 119. Passive traffic measurement was realized through configured Multi Router Traffic Grapher (MRTG), and the method was used in the test n. 120. Wireless Tips - Does your wireless router keep disconnecting or dropping the connection? 121. Each router maintaining a routing table, and regularly with its neighbor routers exchange routing information, according to the smallest vector routing update their routing table. 122. So any external network sees the NAT Router's IP address and the port number assigned by the router as the source computer information on each packet. 123. But SRED algorithm's early drop probability function curve changes suddenly which will result in the instability of queue length in router and dropping packets unnecessarily. 124. This command enables the router to pass routing updates to other routers over the asynchronous interface. 125. Taking on route switchover between LAN and High-Frequency channel and as a key component of HF IP network, HF IP router would be a development direction for future HF communication. 126. One day it is a frame relay switch, the next it is your ISDN router. 127. The kernel of NAT Router is Network Address Translation technique that distributes packets into different places. 128. In a MANET, each network node operates as a router capable of forwarding traffic and forming a network free of any fixed infrastructure. Each network mode also operates as an end-system, as well. 129. A workflow model central node controls the nodes participating in a distributed state machine and two router models; the entire system is implemented with DEBA. 130. You decide to implement secure authentication of users accessing the EXEC mode prompt on the router. 131. With integrated router, SPA9000 Internet connection can be directly connected to or in connection with your network router connected to another. 132. If you want an OSPF-enabled router to generate a default route even if it doesn't have a default route itself[http:///router.html], use the command default-information originate always. 133. A new solution to port general operating systems and their routing software to switch router is presented. 134. Imagine opening a consumer product—a mobile phone, an electric toothbrush, a wireless router—and finding a part that was snapped on or glued into place. 135. When a packet comes back from the destination computer, the router checks the destination address on the packet. 136. The switch or router is more than just a gateway to translate SS7 messages for the network access switch. 137. With the IP protocol, the packets to be carried move from router to router, without any preconceived plan, until they reach their destination point. 138. The router LAN interface is being assigned a broadcast address. 139. The IP router is responsible for "routing" the packet to its destination, directly or via another router. 140. In a VPN, there are security exposures everywhere along an end-to-end path: on the dial-up link, in an ISP's access box, in the Internet, in the firewall or router, and even in the corporate intranet. 141. High - speed router: 4.5 KW main spindle, vacuum absorption, DSP control, fit table for Large - scale processing. 142. The router then checks the address translation table to find if there is an entry existing for the inside local address with a corresponding inside global address. 143. In communicated industry, embedded system is applied in communicated machine, such as router and switcher etc. 144. The use of a crosspoint switching engine makes the design a true multigigabit router. 145. The router has a range of unique IP addresses given to the company by IANA. 146. Since multicast may have many receivers, for effective transmission, the router needs a tree to join multiple IP members, with Multicast RIP and its data packet forwarding function. 147. Each router is a special-purpose computer that connects to two or more networks. 148. A switch interconnects segments that belong to the same logical network or subnetwork. For non-local hosts, the switch forwards the frame to the router based on the destination MAC address. 149. The network faults may be divided into physical faults and logic faults according to its nature, and also may be divided into the line fault, router faults and faults of main processor. 150. If the router has a U interface, it also has a built-in NT1. 151. The paper discusses the work principle of the router in network correspondence, and introduces the path choice problem for routers in communication. 152. In this paper, we first contrast the pros and cons of rate-based and credit-based flow control patterns, and get the conclusion that the latter is more suitable for the IP router design. 153. On the basis of obstruction information on a routing plane, this router has a high efficiency in time and and space by using the heuristic technique in artificial intelligence. 154. When the packet arrives on the outside network, the NAT router looks at the address translation table and determines that the destination address is in there, mapped to a computer on the stub domain. 155. MRTG (Multi Router Traffic Grapher) is the most widely used tool to measure the amount of communication traffic today. 156. In this paper, the implementation of distributed routing protocol BGP 4 in high performance router developed by Tsinghua University is presented. 157. Such connections are maintained by an interconnecting router, known as area border router (ABR). 158. To avoid this problem, we adopt a deterministic routing method based on Black-Bus technology and then we design the router node. 159. Using router architecture this paper compares the realization of diagram processing between communication processor and network processor. 160. Rate limiting is the function that allows a router to control the transmission rate of a specific traffic flow. 161. Using an inside global address, the router sends the packet on to its destination. 162. I will test the router in your apartment this afternoon. 162. try its best to gather and create good sentences. 163. Connect your printer to your wireless network, or to your router with Ethernet cable. 164. With the frequent developing of Internet, Cisco router have been used widely, it has the 80 % of quotient. 165. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. 166. Shop equipment and hand tools, such as router, templates and hole saws, heat blankets and thermocouples, vacuum bags and caul plates, measuring devices, conversion of metric and inch system. 167. VEGA Grid gave the concept of Grid router: a fully distributed information service component which works similar to IP router. 168. The router, whose code you'll see shortly (see Listing 2), exposes an operation called process that accepts two parameters. 169. F . A Router is commonly considered a DCE device. 170. For security purposes, users can be denied or permitted virtual terminal access to the router but denied access to destinations from that router. 171. Participants who wish to join a multicast session send a request to join the session to their local MBONE router. 172. CGMP router starts by sending a Join packet with the Group Destination MAC Address set to all zeros (meaning all multicast groups) and the source address as its own MAC address. 173. As you can see, the NAT router stores the IP address and port number of each computer in the address translation table. 174. Today the scale of internet is expanding and many big traffic are appearing , which result in the desire to the packet delivery capacity of router be higher. 175. The invention relates to quick heavy-route method and label switching router. 176. Customers want to be able to move seamlessly from diagnosing a router problem to a helpdesk scenario to user management to a disk problem scenario, all by navigating around. 177. In WebSphere Extended Deployment, the On Demand Router (ODR), which I will discuss shortly, tracks the incoming demand in terms of arrival rate. 178. After the test of hardware and software, Router completes primarily partial ruction. 179. Gigabit Ethernet line-card, as one of the most important line-cards supported by Terabit Router, its design and implementation is an important content for research. 180. As core router may be used in all kinds of environments, it must implement multiple routing protocols, including RIP, OSPF, IS-IS, BGP and other Interior or Exterior routing protocols. 181. ARMER is a reliable multicast algorithm that active router carry out error recovery with replier assisted. 182. It'started in 2005 as a fork of Fokus Fraunhofer SIP Express Router SER project. 183. A brouter is a network bridge combined with a router. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。