传输控制协议和网际协议的研究与应用计算机系毕业论文中英文翻译对照内容摘要:
oss the room or around the world via TCP/IP. The routing process begins with an IP address that is unique to the sending end station .End stations may be assigned permanent IP addresses or they may borrow them as needed from a Dynamic Host Configuration Protocol(DHCP)server or other service. Each packet carries a source address, which under current(IPv4)specifications is 32 bits long .In its header, each packet also carries the IP address of the final destination. If the sending end station determines that the destination address is not local, the packet goes to a first- hop router, typically one that is close and has been press signed to the sender. The router inspects the packet/39。 s IP address and performs a route table lookup to see if the destination end station resides on the local(physically connected)work, typically called an IP sub .An IP sub usually is assigned to each of the router/39。 s work interfaces. If the destination IP address is local, the router searches an internal store of IP addresses and local- device Media Access Control(MAC)addresses. This store is known as the Address Resolution Protocol(ARP)cache. ARP is the universal tool for matching IP addresses to MAC addresses. If the destination39。 s MAC address appears, the router installs that MAC address in the packet header(removing its own MAC address because that/39。 s no longer needed)and sends the packet to the destination end XV station. In the event that the destination MAC address does not appear in the ARP cache ―it might have timed out, for instance― the router must broadcast an ARP request to the sub referenced by the packet/39。 s destination IP address. The end station with that IP address responds, sending back its MAC address .The router updates its cache, installs the new MAC address into the packet header and launches the packet. If the route table lookup shows that the packet is destined for a nonlocal sub, the router forwards the packet to the next- hop router using the next- hop router39。 s MAC address. Routing tables are continuously built and rebuilt by intelligent discovery protocols, such as Routing Information Protocol or Open Shortest Path First(OSPF). Each router/39。 s routing table shows the best route to the destination address。 for addresses that may be several hops away, it shows the best next- hop router. For a TCP/IP wide area work (WAN) to work efficiently as a collection of works, the routers that pass packets of data between works do not know the exact location of a host for which a packet of information is destined. Routers only know what work the host is a member of and use information stored in their route table to determine how to get the packet to the destination host39。 s work. After the packet is delivered to the destination39。 s work, the packet is delivered to the appropriate host. For this process to work, an IP address has two parts. The first part of an IP address is used as a work address, the last part as a host address. If you take the example and divide it into these two parts you get the following: (,.132Host)or(,st address). XVI Three) Sub mask Which is required for TCP/IP to work, is the sub mask. The sub mask is used by the TCP/IP protocol to determine whether a host is on the local sub or on a remote work. In TCP/IP, the parts of the IP address that are used as the work and host addresses are not fixed, so the work and host addresses above cannot be determined unless you have more information. This information is supplied in another 32bit number called a sub mask. In this example, the sub mask is . It is not obvious what this number means unless you know that 255 in binary notation equals 11111111。 so, the sub mask is: . Lining up the IP address and the sub mask together, the work and host portions of the address can be separated: address() mask() The first 24 bits (the number of ones in the sub mask) are identified as the work address, with the last 8 bits (the number of remaining zeros in the sub mask) identified as the host address. This gives you the following: address() address() So now you know, for this example using a sub mask, that the work ID is , and the host address is . When a packet arrives on the sub (from the local sub or a remote work), and it has a destination address of , your puter will receive it from the work and process it. Almost all decimal sub masks convert to binary numbers that are all ones on the left and all zeros on the right. Some other mon sub masks are: XVII Decimal Binary Inter RFC 1878 describes the valid subs and sub masks that can be used on TCP/IP works. XVIII Four) Network classes Inter addresses are allocated by the InterNIC the anization that administers the Inter. These IP addresses are divide。传输控制协议和网际协议的研究与应用计算机系毕业论文中英文翻译对照
相关推荐
用) 经费来源:商家赞助 滨州学院首届大学生体育文化节 组委会 2020年 10月 6 日 14 附件三: 滨州学院首届大学生体育文化节 会徽吉祥物 征集方案 滨州学院首届大学生体育文化节 将于 2020 年 11 月隆重举行。 为做好首届体育文化节会徽、吉祥物(以下称会徽、吉祥物)的设计工作,经首届体育文化节组委会(以下简称组委会)批准,现以组委会的名义,特向全校公开征集会徽、吉祥物设计作品。
定;延时、过电压、欠电压、缺相、谐波超标等保护定值设置。 投切延时时间和切投间隔时间可在线更改, 显示功能:实时显示电容分组投退情况,三相电压、电流值,有功无功电量值,电压合格率值,谐波超标值,开关断路等告警等信息。 自检复归功能:每次接通电源应进行自检并复归输出回路,使输出回路处于在断开状态。 延时功能:输出回路应具有延时特性,使控制物理量超出设定范围一定时间后才动作。 切投闭锁功能
7 端口调度中可以模糊在树节点定位网元 8 在端口调度时丌能选在存在通道的端口,需要也将此被通道占用的通道也迚行呈现,可供选择。 9 释放电路路由,再添加此端口,在释放电路路由,就可能连续选择出现问题。 10 同一机房转接时,无法识别通道 方向。 电路路由: AB CZ 如果 AB 在同一机房,在重新排序时路由无法对 AB 迚行排序,可能将路由重置为: BA CZ 11 调单 EXCEL
目对话框中输入项目名称,注意此处无须添加后缀名,软件会自动将后缀名设成“ .PRJ”。 按保存键将项目存在与你的源程序相同的文件夹下。 如图 7 所示。 图 7 仿真器设置,选择菜单 [设置 |仿真器设置 ],在弹出的“仿真器设置”对话框中,按图 8设置,选择“使用伟福软件模拟器”。 图 8 双击项
port= 5) 响应的文本表示将包含数字状 态码和相关的方法。 例如 : 415 INVITE 6) SDP 信息描述将包含多行文本 ,形式如下 : YD/T XXXX- 200X 3 类型 =值 此处的 类型 由一个字符表示 ,例如 : s= (会话名 ), m= (媒体名和传送地址 ),等等;〈值〉为结构化的文本,其格式依赖于〈 类型〉。 例如 : s=SDP seminar,
已安排接机人员准时持标有您姓名的粉色纸在机场安检出口等候您,接机人员王 **,电话 18755556666。 如有变化,请随时联系,期待您的光临,祝您旅途愉快。 如果是接站,抵达前短信告知即可,但一定注明哪个出站口。 内容如 李老师,您好,我是北京飞天伟业会务张 **,我的手机号是 15811112222,负责本次会议接待。 您乘坐的动车 D124 将于今天下午五点四十分抵达郑州火车站