subnet 中文意思是什麼

subnet 解釋
通信子網
  1. After studying the relation between connected subnet numbers and the cutest of the network, this paper presents a method for computing the cutest numbers and a formula of the coefficient bounds of reliability polynomial

    本文分析了網路的連通子網數與網路割集以及斷集數的關系后,給出一種網路斷集數的計算方法以及網路全端可靠性多項式系數上下界的公式,適用於任何網路。
  2. Furthermore, this paper introduces three different network architectures which are single system, bastion firewall screening subnet and the net work with dmz ( demilitarized zone ) defending network, elaboratess theories of nat ( network address translation ) and dmz ( demilitarized zone ), with the practical examples based on dns ( domain name service )

    文中針對單系統、堡壘防火墻屏蔽子網、帶dmz (非軍事化區)防禦帶三種不同網路拓撲結構加以說明,闡述nat (網路地址轉換)的原理和dmz工作原理以及它們的相應網路拓撲結構。同時給出基於dns服務的相關腳本。
  3. If the route table lookup shows that the packet is destined for a nonlocal subnet, the router forwards the packet to the next - hop router using the next - hop router ' s mac address

    如果查找路由表顯示包的目的地不在本地子網,路由器就利用下一跳路由器的mac地址把包轉發給下一跳路由器。
  4. The lip is suitable for the case that the uncontrollable subnet is cascade petri net and all cascade subnets are either acyclic petri nets or state graphs, and control laws can be calculated using some standardized mathematical tools

    線性整數規劃法適用於不可控子網是序狀petri網, _且.各序狀子網要麼是無環網,要麼是狀態圖的場合,該方法的優點在於在數學上有一標準的求解工具。
  5. Interface the representation of a physical or logical attachment of a node to a subnet

    介面節點與子網的物理或邏輯連接的表示形式。
  6. An abstract model of secure subnet is put forward based on channel model of vpn and secure subnet model of enterprise in charpter three. and double - way authentication access control mechanism of secure subnet is analyzed in detail in charpte four

    首先以「虛擬專用網路」 ( vpn )隧道模型和企業級安全子網結構模型為基礎,提出安全子網的抽象模型,然後詳細討論了安全子網的雙向認證訪問控制機制。
  7. A combined network which consists of four subnets is put forward. every subnet is trained using the data of one portion of arch - ring elements, and the outputs from all subnets give the whole damage information of the arch - ring

    構造了一個由四個子網組成的組合網路,每個子網分別針對拱肋中的部分單元進行訓練,然後由各子網的輸出共同給出整個拱肋的損傷狀態。
  8. In this paper, for the maximal uncontrollable loop - in subnet with a special form, the maximal permissive control policy is obtained through applying the lip to the loop - free subnet that is equivalent to the maximal uncontrollable loop - in subnet

    本文針對一類最大不可控子網有環的petri網,通過把有環的最大不可控子網等價為無環不可控子網進而應用lip方法來得到最大容許控制律。
  9. Liveness analysis of synthesis of petri nets shared subnet

    網共享子網合成活性分析
  10. Ip multicast traffic transmitted from the server is now distributed via the designated router to the client ' s subnet

    此時ip群播流量經由被指定的路由器從伺服器傳送至客戶端所在網段。
  11. To accord with the hierarchical organization of army, the its is organized with a 3 - layerd network structure. each layer is made up of several wireless self - organized subnets ( the top - level layer has only one subnet )

    為了適應部隊的分級編制,信息傳輸分系統採用三層組網結構,每一層由若干個(頂級網路只有一個)無線自組織子網組成。
  12. The creativity of the work in the paper can be shown as the following four aspects : ( 1 ) for single subnet, the condition of simple link judgement is added into the ptda, so the algorithm is improved well ; ( 2 ) for multiple subnets, the ptda becomes more effective, benefited from use of breadth - first - search algorithm of graph, port - deletion method etc ; ( 3 ) due to suitable adoption of the three protocols stp, snmp and arp, the ptda based on spanning tree protocol can get very effective and correct ; ( 4 ) owing to the employment of ieee802. 1 q, the ptda of vlan is all - purpose to some extent

    本文的創新之處主要體現在以下四個方面:在單子網物理拓撲發現演算法中,增加了判斷簡單連接的條件,使演算法更加完善;在多子網物理拓撲發現演算法中採用圖的廣度優先遍歷方法、埠刪除方法等,該演算法更加有效;在生成樹協議物理拓撲發現演算法中,正確使用stp 、 snmp和arp三種協議,物理拓撲發現非常準確;在vlan物理拓撲發現演算法中,正確運用了ieee802 . 1q協議,該演算法具有通用性。
  13. First, it gives a snapshot of some typical self - organized routing protocols in manet. then the design of self - organized routing algorithm based on ktrp is elaborated as the main part of this dissertation, including the choosing of key nodes, the main algorithm modification of ktrp to accommodate with the interior routing in subnet, the access flow between two layers, primary packet formats, tables, and ip routing algorithm. at last, the simulation model of the self - organized routing algorithm

    本文首先分析了現有的manet自組織路由協議;然後針對本信息傳輸分系統的網路結構,詳細分析了基於ktrp的子網內部以及相鄰層間的自組織路由演算法的設計,包括對多個關鍵節點的選取、為適應本課題子網內路由通信而對ktrp做出的主要演算法更改、相鄰層間接入互連的流程、自組織路由演算法中涉及的主要報文格式和表,並且舉例說明了ip選路演算法;最後對所設計的自組織路由演算法進行了模擬,以驗證演算法的有效性。
  14. The subnet mask helps your computer define the difference between the two addresses

    子網路遮罩幫助你的計算機定義在這二個位址之間的差。
  15. Firstly, the structure and function of prn, subnet node and gate node was outlined, and the hardware component of prn - node - controller was introduced in detail with emphasis on the design of prn - node - controller with the interface of pcmcia. secondly, the hardware and software platform of the driver for prn - node - controller was presented. the important dispatched of the driver was explained in details, which complete the interconnection between the prn and internet

    接著分析了分組無線網節點控制器驅動程序的功能、結構和軟硬體平臺,詳細說明了分組無線網節點控制器驅動程序的各個常式,實現了分組無線網節點控制器驅動軟體的設計,使分組無線網的網路協議與標準的tcp ip高層協議相連,實現了分組無線網與internet的互聯。
  16. The primary design goal is to limit the amount of traffic that requires routing in order to increase performance and reduce routing administration costs while maintaining wire - speed switching between end systems on the same logical subnet

    其主要的設計目標是當在同一邏輯子網上保持終端系統之間的高速交換時,為了提高性能和減少路由的管理成本,限制需要路由的流量。
  17. These lemmas together with spanning tree protocol and local address forwarding information for transparent bridges are taken to fulfil physical topology discovery in subnet finely

    以引理為基礎,利用生成樹協議和地址轉發表,解決了對于網內物理拓撲的正確發現,更細致地顯示整個網路拓撲。
  18. In recent years, it has been attracted considerable attention for a mass of researchers on networks in world, and become the hot research area of computer networks, in particular, has been widely used in network fault - location, performance measurement and count expense etc. based on careful analysis on related theory, technique and application of the topology discovery in world, the author first proposes a new physical topology discovery algorithm ( ptda ) for single subnet, next introduces the new algorithm into multi - subnet case, as a result, puts forward a new ptda for multiple subnets

    拓撲發現廣泛應用於網路故障定位、性能測試和計費管理等方面。本文在深入分析國內外拓撲發現相關理論、技術和應用的基礎上,提出了單子網物理拓撲發現演算法,將單子網物理拓撲發現演算法擴展到多子網中,並提出多子網物理拓撲發現演算法。在研究單子網和多子網物理拓撲發現演算法的基礎上,提出了基於生成樹協議的物理拓撲發現演算法。
  19. Subnet, in which case the sending host will forward the datagram to a gateway - an ip host that connects two subnets - which will then try to deliver the datagram to the destination host if the destination host is in one of the subnets connected to the gateway

    子網,這種情況下發送主機將把數據報轉發到網關(連接兩個子網的ip主機) ,然後,如果目的地主機在一個與網關相連的子網中,則網關會嘗試將數據報傳遞到目的地主機。
  20. Y. bejerano, y. breitbart, m. garofalakis, and r. rastogi, “ physical topology discovery for large multi - subnet networks ”, july 2002, bell labs tech. memorandum

    鄭海,張國清, 「物理網路拓撲發現演算法的研究」 ,計算機研究與發展, 2002年3月,第39卷3期。
分享友人