点击切换搜索课件文库搜索结果(990)
文档格式:PDF 文档大小:2.67MB 文档页数:48
■Describe the functions of the Neighbor Discovery(ND)protocol. ■List and describe the function and format of ND options. ■List and describe the function and format of ND messages. ■Describe which ND messages use which ND options. Describe the details of the address resolution,neighbor unreachability detection, duplicate address detection,router discovery,and redirect processes. Describe the host sending algorithm in terms of host data structures and ND messages
文档格式:PDF 文档大小:2.56MB 文档页数:42
■Define the address format,encapsulation,and intended use of the Intra-Site Auto- matic Tunnel Addressing Protocol (ISATAP)IPv6 transition technology. ■Describe how the IPv6 protocol in Windows Server2008 and Windows Vista supports ISATAP as a host and router. ■List and describe the routes on ISATAP hosts,ISATAP routers,and IPv6 routers that make ISATAP-based communication possible. Describe how ISATAP communication works between ISATAP hosts and native IPv6 hosts on an intranet. ■Describe how to configure a computer running Windows Server2O08 or Windows Vista as an ISATAP router
文档格式:PDF 文档大小:23.84MB 文档页数:627
1 INTRODUCTION 2 IP ADDRESS LOOKUP 3 PACKET CLASSIFICATION 4 TRAFFIC MANAGEMENT 5 BASICS OF PACKET SWITCHING 6.1 Linked List Approach 7 INPUT-BUFFERED SWITCHES 8 BANYAN-BASED SWITCHES 9 KNOCKOUT-BASED SWITCHES 10 THE ABACUS SWITCH 11 CROSSPOINT BUFFERED SWITCHES 11.2 Combined Input and Crosspoint Buffered Switches with VOQ 13 MULTI-PLANE MULTI-STAGE BUFFERED SWITCH 14 LOAD-BALANCED SWITCHES 15 OPTICAL PACKET SWITCHES 16 HIGH-SPEED ROUTER CHIP SET
文档格式:PDF 文档大小:1.81MB 文档页数:33
■Describe the IPv6 address space,and state why the address length of128 bits was chosen. ■Describe IPve6 address syntax,including zero suppression and compression and prefixes. ■Enumerate and describe the function of the different types of unicast IPve6 addresses. ■Describe the format of multicast IPv6 addresses. ■Describe the function of anycast IPve6 addresses. ■Describe how IPve6 interface identifiers are determined. Describe how to perform bit-level subnetting on the subnet identifier portion of a unicast IPv6 address prefix
文档格式:DOC 文档大小:146KB 文档页数:9
United Nations Criminal Justice Information Network The United Nations Criminal Justice Information Network (UNCJIN)was created in 1989 pursuant to Economic and Social Council resolution 1986/11 of 21 May 1986, in which the Secretary-General was invited to establish, in cooperation with the United Nations institutes and other entities concerned, a global crime and criminal justice information network, including a mechanism for the centralizatio of inputs from non-
文档格式:PPT 文档大小:307.5KB 文档页数:79
一、电子商务的安全威胁 1、信息在网络的传输过程中被截获 2、传输的文件可能被篡改 3、伪造电子邮件 4、假冒他人身份 5、不承认已经做过的交易,抵赖
文档格式:PPT 文档大小:307.5KB 文档页数:79
第一章电子商务安全概述 一、电子商务的安全威胁 二、信息在网络的传输过程中被截获 三、传输的文件可能被篡改 四、伪造电子邮件 五、假冒他人身份 六、不承认已经做过的交易,抵赖
文档格式:PPT 文档大小:792KB 文档页数:34
信息沟通含义及特点 信息沟通过程 信息沟通 信息沟通分类 信息沟通网络 信息沟通障碍及改善 激励理论 激励概述 领导 领导理论 领导品质理论 领导行为理论 领导权变理论 领导概述
文档格式:DOC 文档大小:40.5KB 文档页数:15
4.1电子支付概述 4.1.1电子支付的概念和特点 任何交易,都会包含一个最基本的环节,就是资金的转移即支付。随着越 来越多的商家进入电子商务领域,支付问题就显得越来越突出:如何配套世界 范围内的电子商务活动的支付问题?如何处理每日通过信息技术网络产生的成 千上万个交易流的支付问题?只有一个答案:利用电子支付
文档格式:PPT 文档大小:334.5KB 文档页数:35
第一节数据结构基本概念 一、信息、数据与信息载体 信息:用来刻划现实世界中各种事物的一些 特征及事物之间的关系。 数据:由计算机加工过的信息。 信息载体:承载信息的各种数码、符号、文字、 图像及电、磁、光、声音等
首页上页6364656667686970下页末页
热门关键字
搜索一下,找到相关课件或文库资源 990 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有