快好知 kuaihz订阅看过栏目

 


incoming traffic造句
1. Routers take incoming traffic from the Internet and route the traffic to the correct system inside the network. 2. Another technique reallocates existing servers to defuse overwhelming incoming traffic. 3. How is incoming traffic? 4. Each tower facility receives incoming traffic, boosts the signal strength, and sends the signal to the next station. 5. Each tower facility receives incoming traffic, boosts the signal strength, and sends thethe next station. 6. When the light is green or yellow for incoming traffic, the computer ignores the triggers and does not activate the cameras. 7. Google brings as much as 14 percent of incoming traffic to News Corp's U.S. news websites, including the New York Post and Fox News, Bernstein analyst Jeffrey Lindsay estimated. 8. How is incoming traffic? Major spike? Are you watching analytics? More traffic means more server resources, so you'll need to watch things like your memory usage. 9. Point through which the incoming traffic flow enters a switching stage. 10. The NPU takes the reference frequency from any incoming traffic interface at any speed. 11. Install multiple intrusion - detection systems and multiple routers for incoming traffic to reduce choke points. 12. Buses crowded with locals go in any weather, and try to incoming traffic to the curves. 13. Buses crowded with locals go in any weather, and try to beat the incoming traffic to the curves. 14. These types of affinity mechanisms are fine if all incoming traffic is routed consistently on every request. 15. For instance, most corporations already employ a "DMZ" firewall policy that allows a set of protected servers to receive incoming traffic on HTTP or HTTPs but over no other protocols. 16. If there is not enough CPU assigned to a given application, managing the incoming traffic will not let you to meet the assigned goal. 17. You could, for example, set auto scaling to fire up new instances based on some metric, such as incoming traffic. 18. These decisions are based on dynamic analysis of the incoming traffic, the available server capacity, and the service goals defined by the user. 19. On Windows Vista and Windows 2008, Windows Firewall, by default, blocks all incoming traffic unless it is solicited or it matches a configured rule. 20. It tracks the state of each network connection and determines whether the unsolicited incoming traffic should be allowed or dropped. 21. If the arrival rate of a network prefix exceeds a threshold, ACC regards all traffic to this network prefix as DDOS attack traffic and responds to all incoming traffic sent to this network prefix.