Search results
Jump to navigation
Jump to search
- ...ion address analogous to a letter, which can be efficiently forwarded by [[router]]s183 bytes (26 words) - 06:09, 18 July 2008
- ...in which not only the hosts move, sometimes at supersonic speed, but the [[router]]s and other devices organizing them into networks also move218 bytes (33 words) - 14:36, 27 August 2008
- * http://tools.ietf.org/html/rfc4191 Default Router Preferences and More-Specific Routes626 bytes (93 words) - 11:28, 8 August 2008
- ''For the device used in [[computer network]]s, see [[router]]''<br /> ...speed than the bit in most [[drill (tool)|drills]], as the purpose of the router is not principally for cutting holes, but rather for cutting grooves or com3 KB (546 words) - 14:31, 2 May 2010
- ...information when needed to forward to more than one next hops from a given router276 bytes (40 words) - 11:25, 22 August 2010
- {{r|Router (tool)}} {{r|Router (tool)}}750 bytes (104 words) - 22:03, 21 March 2010
- The process of receiving a packet on one interface of a router, validating the packet and forwarding it out the appropriate interface.170 bytes (25 words) - 15:15, 8 June 2008
- ...of the router's forwarding decision, but the source address is needed so a router or host can send error messages back to the originator of the datagram. One1 KB (217 words) - 15:19, 28 September 2008
- [[Router]]s in the '''default-free zone''' (DFZ) have no [[default route]]s in their283 bytes (38 words) - 15:00, 20 March 2024
- ''For the tool, see [[router (tool)]]''<br /> A '''router''' is a physical device that performs [[routing]]. Routing itself can be lo6 KB (985 words) - 12:34, 30 March 2024
- ...rizon rule''' states that a [[router]] must not readvertise a route to the router from which a route was first learned. It is a means of preventing loops fr1 KB (162 words) - 15:00, 20 March 2024
- ...4) must establish a [[TCP connection]] and a [[BGP session]] between two [[router]]s before it can begin exchanging exterior routing information. All BGP speakers must have a basic set of capabilities. The BGP router initiating the connection, however, can use the BGP capabilities advertisem3 KB (426 words) - 15:00, 20 March 2024
- ...ten used from an ingress Border Gateway Protocol customer or interprovider router, to the nearest sinkhole. When an attack on a network resource is detected, on a BGP-speaking router, the human or operator creates a host route to the anycast address, and inj3 KB (490 words) - 05:49, 8 April 2024
- ...ters]] are subsets of "nodes"; it is common to speak of individual host or router nodes.300 bytes (48 words) - 14:46, 7 February 2009
- {{r|Router}}242 bytes (28 words) - 14:59, 20 March 2024
- {{r|Router}}274 bytes (36 words) - 10:40, 22 May 2024
- ...ith people. My first thought was that it was about physical protection for router and transmission systems. [[User:Howard C. Berkowitz|Howard C. Berkowitz]]382 bytes (53 words) - 15:25, 3 December 2009
- {{r|Router}}305 bytes (36 words) - 14:59, 20 March 2024
- ...purposes of Neighbor Discovery (a bit of recursive naming there, sorry!), Router Discovery and Neighbor Unreachability Detection (NUD). The actual act of N ===Router Discovery===5 KB (862 words) - 05:49, 17 March 2024
- {{r|Router (tool)}}452 bytes (65 words) - 21:38, 4 June 2009