Tutorials to .com

Tutorials to .com » Software » Engineering » Software Testing

Software Testing Articles


1: Office in a single area OSPF configuration
Third, in a single area OSPF configuration do OSPF is a link state-based technology, such as Routing Information Protocol (RIP) this relative distance vector technology. Agreement OSPF routing protocol algorithm for the two major functions: routing...

2: Router types and methods of test
With the rapid development of information industry, computer network technology has been widely used computer networks of modern working life has become an indispensable part. Router as the core of computer network equipment, the network correspondi...

3: Test Category
Third, the assessment and classification Integrated content of the above tests, the router testing can generally be divided into the following categories: functional testing, performance testing, stability, reliability testing, conformance testing,...

4: On the basis of routing knowledge (a)
I. What is the routing Routing information is to pass from the source to the destination through the network behavior, on the road, or at least an intermediate node encountered. Routing is usually to compare with the bridge, in the carelessness of ...

5: On the basis of routing knowledge (b)
2, the exchange of Exchange of relatively simple algorithm, for the majority of routing protocol is the same, in most cases, the decision of a host to another host to send data, obtained through the router's address, the source host to send to ...

6: Knowledge on the basis of routing - routing algorithm
Routing algorithm based on a number of characteristics can be distinguished. First of all, the algorithm designer affect the specific objectives of the operation of the routing protocol; Secondly, there are a variety of routing algorithm, each algor...

7: What is a router
What is the network linked up with each other? Is the router. Router is the hub of the Internet, "Traffic Police." The current router has been widely used in all walks of life, all kinds of different grades of products have become the back...

8: The role of a router
Router is a different network connectivity, and the other role is to select the line messaging. Smooth and quick shortcut options, can greatly increase the communication speed, communication network system to reduce load and save network resources, ...

9: Router structure
Router architecture from the architecture point of view, the router can be divided into the first generation of single-bus single-CPU structure router, the second-generation single-bus structure of the main router from the CPU, the third generation ...

10: The type of router
Various levels of the Internet you can see the network router. Access network allows families and small businesses can connect to an Internet service provider; enterprise network router to connect an enterprise campus or hundreds of thousands of com...

11: Router's configuration and debugging
Router in the computer network has a pivotal position is a bridge between the computer network. It not only can be connected through different networks, but also to choose the path of data transmission and access barrier illegal. Router configurati...

12: Router based on configuration and data transmission of (a)
In the current era of rapid development of network, the router plays an important role. Because the router as a network layer relay system to provide a third layer in between the data network routing and forwarding. Therefore, the router function, r...

13: CISCO routers use to establish the enterprise network security mechanisms
In recent years, computer networks, in particular the very rapid development of the Internet, ATM and IP OVER DWDM technology allows network a rapid increase in transmission bandwidth. And network security and management technology development has l...

14: Talk router security (a)
For hackers, the use of router vulnerability to attack is usually relatively easy. Router attacks will be a waste of CPU cycles, misleading information flow, so that the network came to a standstill. Good router itself will take a good security mech...

15: Router's basic agreement with the technical
VPN VPN (Virtual Private Network-VPN) solution is a router, one of the important features. Its solution is as follows: 1. Access Control Generally be divided into the PAP (Password Authentication Protocol) and CHAP (Password Authentication Protoc...

16: LAN proxy server, router configuration case
The rapid development of network technology to enable enterprises to share INTERNET LAN access more and more resources, on the majority, DDN line with its stable performance and scalability advantages of a good way to become widely used, DDN way con...

17: A comprehensive understanding of ADSL / Cable router to share
Preface: ADSL / Cable router usage and penetration of broadband Internet access with the popularization of and price decline, a growing number of small and medium-sized and family use of ADSL or Cable Modem to the Internet. In this case, in order to...

18: Switches and routers how to improve the security of six major law
 traditional focus on network security technology intrusion detection system, anti-virus software or firewall. How internal security? Security structure in the network, the switches and routers is very important to each of the seven layer network...

19: DIY simple router
1. On the router Router (Route) is a routing system is responsible for the interconnection network path from a number of traffic at least to find a network path to provide communication to users. Routing protocol it uses to obtain network informati...

20: Edge / access switches and routers, design of high-flow management techniques outlined in
Edge and access equipment business in the continuously upgrade the quality (QoS) level, it is also a huge need for the type of data and processing flow. To meet the QoS requirements, network design must be in its edge / access switches and routers i...


Page 1 of 5
[1]   [2]   [3]   [4]   [5]