快好知 kuaihz


router造句
91. The IPX protocol cannot dial-out on the port because the computer is an IPX router. 92. To read statistics from a network router, a collector might use Simple Network Management Protocol (SNMP) or Telnet. 93. To exchange routing updates, each router in the EIGRP network must be configured with the same autonomous system number. 94. Due to the technology development disproportion of optical fiber transmission and electronics, the core router as network node has become the main bottleneck in the progress of modern networks. 95. In this paper, we propose architecture called the capable IP Router ( PQIR ). 96. The device needs to support the same security type that is set on the router. 97. Router should be able to generate alert SMS to defined phone nos. on (a ) communication failure and (b ) hangup. 98. Otherwise, a malicious eavesdropper on any router between your server and the end user can very easily sniff the sensitive information out of the network packets. 99. After checking the routing table and the verification process for translation to occur, the router saves the computer's non-routable IP address to an address translation table . 100. The router can be connected to the Internet via a high-speed (T-1 or faster) WAN interface. 101. Ancillary Current Router now specifies that the bonus is in percentage. 102. Using a discovery mechanism, IPv6 clients can discover an IPv6 address by a broadcast from an IPv6 router./router.html 103. Release the reset button and give the router about 10 secs resettle. 104. To configure a route from an ISP router into a corporate network. 105. Main stream productspresentlyused in IP bearer network include core router, service router, core route switch, broadband access server, firewall, user service gateway, etc. 106. The thesis is just about the design and implementation of Gigabit Ethernet Interface Card in Core Router. 107. A: This is normal if you're behind a firewall or a router. 108. Design a polynomial algorithm to resolve the problem based on current and mature algorithm, only in this way, can the router not be overloaded. 109. With an industry standard bolt-hole pattern and router base diameter along with removable handles for insert plate clearance, the 5625-20 readily converts any existing table or production jig set-up. 110. An ISDN option that alerts a Terminal Adapter ( TA ) or ISDN-capable router that a second call is coming in over a given Bearer (B) channel. 111. The IPX protocol cannot dial - in on port because the IPX router is not installed. 112. Terabit router will play a more important role in the future broadband network. 113. With the embedded CPU's flexibility and micro engine's high throughput on packet processing, the evolutionary router can achieve nearly linear speed throughput. 114. Each router that the packet encounters along the way is called a hop. The hop count is the distanced traveled. 115. The router updates its cache, installs the new MAC address into the packet header and launches the packet. 116. As the number of VLANs increases on a network, the physical approach of having one router interface per VLAN quickly becomes unscalable . 117. The entire encrypted payload can traverse a router - based IP network as is. 118. To overcome this obstacle, the parallel and programmable network processors have been involved into the design of router. 119. Passive traffic measurement was realized through configured Multi Router Traffic Grapher (MRTG), and the method was used in the test n. 120. Wireless Tips - Does your wireless router keep disconnecting or dropping the connection?