路由層網路 的英文怎麼說

中文拼音 [yóucéngwǎng]
路由層網路 英文
router level network
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : causereason
  • : i 量詞1 (用於重疊、積累的東西 如樓層、階層、地層) storey; tier; stratum 2 (用於可以分項分步的...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Cebus - eib router network layer

    Cebus - eib
  2. Being the complexity of the industrial ethernet technology, at present it still be in its first phase of development, and it has several different forms. compare with other forms, the traditional multi - protocal converting form has the simplest realization. it is realized by gateway or agent server to transform information between ethernet and field bus, actually to be a sort of realization that the network is comparted into different layers

    於工業以太技術的復雜性,目前還處于起步階段,有多種組形式。相對來說傳統的跨協議轉換方法實現最簡單,它通過關或代理服務器進行以太與現場總線的信息轉換,實際上是一種分的實現機制。
  3. High - speed, muti - services and economy have become the major issues of the future ip backbone technology as far as thes poiflt is concerned, thes paper explores layer 3 switdrig technology which separates control component and forward compontal in the traditional roulers. two forwarding al gori thms - - - - d ata - driven mo d el and top olo gy driven model are also compared, a next generation ip backbone echno l o gy - - - - multiproto co l label switching is developed, with its operation and its deployinent in traffic engineering, c1ass - ofservce and virtual private network

    本文從未來ip骨幹技術所要求的高速化、多業務支持、經濟性出發,介紹了在傳統器基礎上將控制部件和轉發部件分離的第三交換技術,比較了數據驅動模型和控制驅動(拓撲驅動)模型兩種轉發演算法,並此引出下一代ip骨幹技術? ?多協議標記交換,闡述了其工作原理以及在流量工程、服務等級區分和虛擬專用中的應用。
  4. According to this objective, drawing on the viewpoints of neo - institution economics, the first part of this thesis emphasizes on expatiating the meanings of institution and its evolution laws, the characters and habitudes of network economy, as well as the institution evolution in society, domain and enterprise arrangements ; the second part of this thesis analysis the infection and its mechanism of the before - mentioned institution evolution on enterprise competition while summing up the new principia, characters and patterns of enterprise competition in network economy ; the final part of this thesis argues the enterprise competing stratagem in different domain evolution phrases hi network economy as the conclude of whole paper

    有鑒於此,本文第一部分中吸收了新制度經濟學的理論觀點,著重闡述了制度的含義與變遷規律,經濟的特點和性質,以及經濟所帶來的社會次、產業次和企業次的制度變遷;在本文的第二部分則分析了上述三個次的制度的變遷對企業競爭行為分別產生的影響及其機制,歸納出經濟下企業競爭的新的特點,新的模式和新的競爭原則;在文章的第三部分則討論了經濟引發的不同演化階段的產業的特點,並分析了其中企業的競爭戰略。
  5. In tranditional ip network, only the “ best effort ” service is provided, but the quality of service can not be guaranteed. though the interserv, deffserv and mpls are presented afterward to guarantee the qos for the ip network. but as a layer network, the realization of the qos function need span different layers ( such as rsvp protocol ) in the ip network, which may result in the function iterance and chaos

    多媒體和實時業務的出現要求能夠提供足夠的qos保證,在傳統的ip中只能提供「盡量傳輸」的服務而不能保證服務質量,后來提出的綜合服務模型( interserv )以及區分服務模型( deffserv )以及mpls技術保證了ip上的服務質量,但於ip次結構的,因此對qos的支持需要跨(如rsvp協議) ,這就可能引起功能的重復和混亂,而微通信元系統是無次結構的系統,就克服了這些的問題,變得簡單,效率更高。
  6. Second, proposing a hybrid recommendation strategy which used multi - agent system, collaborative filtering, and top - n together to generate right recommendations for customers in different profitability tiers. in the first part, we have defined customer value from two categories : intrinsic value and network value. based on customer ' s historical behavior, segment them with considering their recency, frequency, and monetary

    明確指出高價值客戶可體現在兩個方面:一是具有高自身價值的客戶,二是具有高價值(客戶的影響力)的客戶;其次,顧客的歷史和當前行為,特別是從recency (最近訪問時間) 、 frequency (訪問頻度) 、 mon6t8ry (購買投人)因素出發,進行顧客內部價值挖掘:並通過形式化顧客的價值,給出完整的分演算法和相應實驗。
  7. As the simple structure of ring net, optical recovery can achieve good recovery rate

    於光的環形結構相對簡單,光恢復機制可以達到很好的恢復效率。
  8. Client supplies complete graphic user interface, accomplishing the management of jobflow and system ; communication agent accomplishes complete communication between client and server by tcp / ip network communication protocol and platform independent data communication protocol ; server supplies full support of jobflow, the superstratum are the jobflow definition subsystem and jnwengine, which are responsible for the definition and execution of jobflow ; the understratum is the network queue system, which realized the schedule and execution of job, thus all kinds of sources in computer network system can be utilized in order to improve execution efficiency and reduce job cost

    客戶端提供完全的gui用戶界面,完成用戶對作業流的管理及對系統的管理功能;通訊代理採用tcp ip通信協議以及與平臺無關的數據通訊協議來實現客戶與服務器之間的完全通訊;服務器端提供對作業流的全面支持,上作業流定義子系統和作業流引擎負責完成對作業流的定義與執行,底使用隊列系統( nqs )來實現對作業的調度與執行,使用戶能夠最大限度地利用計算機系統中的各種資源,以提高執行效率、降低作業成本。
  9. Server supplies full support of jobflow. the superstratums are the jobflow definition subsystem and jnwengine, which are responsible for the definition and execution of jobflow. the understratum is the network queue system ( nqs ), which realizes the schedule and execution of job, thus all kinds of resources in computer network system can be utilized in order to improve execution efficiency and reduce job cost

    客戶端提供完全的gui用戶界面,完成用戶對作業流的管理及對系統的管理功能;通訊代理採用tcp ip通信協議以及與平臺無關的數據通訊協議來實現客戶與服務器之間的完全通訊;服務器端提供對作業流的全面支持,上作業流定義子系統和作業流引擎負責完成對作業流的定義與執行,底使用隊列系統( nos )來實現對作業的調度與執行,使用戶能夠最大限度地利用計算機系統中的各種資源,以提高執行效率、降低作業成本。
  10. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是位於各個終端的晶元模擬實驗系統應用程序為前臺;中間為dcom應用程序服務器,負責處理前臺應用程序與后臺數據庫的通信和數據傳輸,並執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連接,在中間操作數據即可,與后臺數據庫的連接和操作應用程序服務器來統一管理操作。后臺數據庫只負責數據的存取操作。本論文實施的晶元模擬實驗系統模擬了主要的邏輯電器件, 8088cpu ,存儲器,寄存器,數據總線,地址總線和控制總線,及其它相關晶元。
  11. It is hard to get the important parameters such as link delay and loss rate directly, because the internet has becomes massive, distributed and heterogeneous. network tomography is now a hotspot for inference the internal link delay and loss rate with the end - to - end measurement data. we call current network tomography as unconstraint network tomography for its not adding any constraint condition and all of them nearly are based on some likelihood algorithm

    日益向著大型化、異構化、分佈化發展,通過直接進行測量的方法,來獲得內部鏈的時延和丟包率參數就變得越來越困難,析成像方法作為一種通過端到端的測量數據來推斷性能參數的技術正成為研究的熱點之一。
  12. The article particularly discusses ethernet technologies, virtual lans technology, layer3 switching technology, voice over ip technology, and active server pages technology, and introduces technologic details such as topological structure of the whole network, assignment of ip address, choice and configuration of routers and switchers, and the concrete accomplishment and configuration of layer3 switching

    本文詳細介紹了整個的拓撲結構, ip地址的分配,器和交換機的選擇和配置, vlan劃分的原則和配置,第三交換的具體實現和配置等技術細節,從而揭示了整個對這些技術的運用和開創性的工作。
  13. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的來和優點之後,詳細闡述了虛擬專用的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對ip數據包的安全保護。
  14. In the paper, the protocol adopt special route optimize algorithm and tdma time slot assigning algorithm, make node enter low consumption or sleep state in order to reduce the consumption ; aiming at choice the mechanism of cluster head, multi - hop routing and the mechanism of mac, the existing leach protocol is improved

    本文的協議是採用特殊的優化演算法和tdma時隙分配演算法,使節點進入低功耗或睡眠狀態以降低功耗。協議主要在簇頭的選擇機制、多跳、 mac通信機制等方面,對已有的leach協議進行了改進。
  15. Since we value the learning effect of neural networks by cumulative error, the paper pay direct attention to it to study the bp algorithm

    於評價人工神經最終學習效果是通過累積誤差來進行的,從而我們直接瞄準累積誤差來研究多人工神經快速學習的演算法。
  16. Hong kong, may 1 - 5, 2001, pp. 221 - 229. 13 jiang y, fang b x, hu m z. techniques in mapping router - level internet topology from multiple vantage points. in lecture notes in computer science 3320, liew k m, shen h, see s et al

    通常,可以認為internet選原理部署實施的次結構以及經濟約束有助於輔助推斷器的地理位置,因此,這里所提出的9條輔助推斷規則就是基於這些因素來推斷器的地理位置。
  17. It is an extreme challenge research subject for such network due to the dynamical topology change, bandwidth limitation and power constraint. the state - of - the - art of the manet technology in 5 layer : physical layer, mac layer protocols, routing protocols, transport protocol and application and middle ware issuses are summarized in this thesis. five typical routing protocols dsdv, dsr, tora, aodv and zrp are studied

    本文介紹了移動自組的起源、特徵和當前的發展狀況,並歸納了其主要的應用領域;分別從物理、 mac、傳輸、中間件和應用等5個次分析和介紹了當前manet採用的技術和協議,尤其對協議( dsdv 、 dsr 、 tora 、 aodv和zrp )進行了詳細的研究。
  18. Hrms added a little extension to the network layer of the multicast routers, which made the logical recovery fusion tree consistent with the multicast transmission tree, at the same time, it employed an efficient recovery multicasting mode named subcasting, all these eliminated the problems conc erned with implosion and exposure

    它採用tmtp中基於次的概念,通過對一些簡單的擴展,使差錯恢復聚集樹與組播傳送樹保持一致性,同時採用一種高效的差錯恢復方式? ?局部組播,有效地解決了反饋風暴與重復接收的問題。
  19. Rtl8019as belong to the physical layer and the mac layer. the driver of rtl8019as belong to the llc layer

    參考模型中的物理和數據鏈的mac子rtl8019as介面晶元來完成的。
  20. Finally, in order to resolve the problem that energies of nodes near the sink deplete too fast, the influence of redundant sensor nodes distribution is researched. layered network architecture based on regular hexagonal cells is introduced. taking cells as the minimum working units instead of sensor nodes, optimal distribution of redundant nodes is investigated so that network lifetime can be prolonged as much as possible

    介紹了基於正六邊形格的分結構;以格作為的最小工作單元,研究了如何分配無線傳感器的冗餘節點來延長壽命;通過對壽命的分析,獲得了格的冗餘節點倍數向量rn 、 1 - n節點倍增值rt和分配剩餘冗餘節點的概率密度函數f ( k )共同構成的冗餘節點最優分佈條件。
分享友人