Examples of using Loopback in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Loopback attenuators.
Also see loopback test.
The loopback address is usually shown as:: 1.
With IPv6 there is only one loopback address,:: 1.
LoopBack WEB is an open source Node.
For proper operation, INN requires the loopback interface.
See Loopback transport and function controls.
In our example configuration, we use the loopback IP address.
The loopback or localhost IPv6 address is output as[: :1].
VolanoMark can be run in two modes: loopback and network.
TRACE Performs a loopback test for the path to the target resource.
For proper operation on Linux, INN requires the loopback interface.
The most common cause of loopback textures is that you are trying to print too fast.
The source address can belong to a physical orvirtual interface(loopback).
Find more information what is serial loopback test and how to perfom it.
Presented in Figure 2 are the VolanoMark benchmark results for loopback mode.
In IPv4, a designated address known as a loopback address points to the local machine.
Loopback address: All packets destined for this type of address should be loop back.
The number 127 in aclass A address is reserved for internal loopback functions.
The IPv4 address for each loopback interface must be unique and unused by any other interface.
This section will familiarize you with various areas of the Loopback interface.
The RS-485 loopback feature offered by the software is particularly useful for sessions comparison.
For the graphical edition of the application, Loopback uses StrongLoop Arc.
Loopback API's can connect devices and integrate with Android, iOS and AngularJS SDKs to create client apps.
You can alsocreate a new data source with sic loopback: datasource.
The loopback interface is useful in testing and managing a Cisco IOS device because it ensures that at least one interface will always be available.
Like cramfs,you can use SquashFS on a standard Linux system with mksquashfs and the loopback device.
Loopback is another mature framework with a lot of built-in features, including authentication with token and connectors to any kind of database.
Windows XP SP2 andWindows Server 2003 SP1 include a loopback check security feature that is designed to help prevent reflection attacks on your computer.