router造句1. At the low end, configuring the router will probably cost staff time.
2. Lastly, if the screening router is circumvented by a hacker, the rest of the network is open to attack.
3. For example, a router might send all addresses beginning with 213 in one direction, and the rest in another.
4. A new multiprotocol router has also been added to the ScaNet range.
5. Useful machines are an electric drill, a small router to make mortises and mouldings, and a small bandsaw.
6. Router E has to recompute the network topology.
7. Device that functions as both a router and bridge.
8. Cisco already has one IP router in space.
9. What determines the IOS that the router will load?
10. Communication system, communication terminal, routing control method, and router.
11. What command will disable CDP on a router interface?
12. The design and implementation of IP router is introduced.
12.try its best to collect and create good sentences.
13. The radio system makes very efficient use of router resources in the system by creating Multicast IP groups only for the duration of a group call.
14. The IP router card supports two configuration modes: Console command line configuration and network command line configuration.
15. Within a LAN environment the router contains broadcasts, provides local address resolution services, such as ARP and RARP, and may segment the network using a subnetwork structure.
16. A wireless router was hooked up to the mobile phone to give it the extra antenna power needed to send the coordinates down.
17. The invention discloses a multi - autonomous system router level topological treatment system and a method.
18. But Proteon has gone one stage further than 3Com by bundling both router and hub into a pre-configured chassis.
19. A worthwhile accessory for the home woodworker aiming to make the best use of a router.
20. Hands on Shimming up During last year I came into possession of a large quantity of 1/4in router bits.
21. The simplest firewall is a packet-filtering gateway or screening router.
22. As the stylus is moved over a pattern, the router duplicates the original.
23. The client sends an IGMP join message to its designated multicast router.
24. First, the computer sends about it's data request to a router.
25. Did design the testing project the emulate of algorithm, the IS-IS protocol consistency and performance by using the Terabit router as the test platform, and do analyze the result of the test.
26. By adopting the fair queueing instead of the traditional FCFS service discipline, router is able to isolate and protect leaky-bucket controlled network connections.
27. For example, ICMP will send a source quench message when traffic becomes congested at a router.
28. The topological properties of the XD network indicate that it is a more effective approach to fabrics in the terabit router, compared with existing networks.
29. The IPX protocol cannot dial - in on the port because the IPX router is not installed.
30. The customer connects a customer premises equipment (CPE) device, such as a router or frame relay access device, into the NTU using a V. 35 or RS-232 serial interface.