• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
SCADA in electrical power delivery
SCADA in electrical power delivery

... Control server, hosts software to communicate with lower level control devices Communication routers Could be connected to other regional control centers (desired for large networks) ...
Development of Neural Network Model of Disc Brake Operation
Development of Neural Network Model of Disc Brake Operation

... performance 1, 2, 3, and 4 (ii) fade performance 1 and 2 (iii) recovery performance 1 and 2. At the beginning, the tested disc brake has been subjected to burnishing process (see Table 1). To develop the best neural network model, able to predict a complex synergy of influences of disc brake operati ...
PDF
PDF

... When multiple routers are used in interconnected networks, the routers exchange information about destination addresses, using a dynamic routing protocol. Each router builds up a table listing the preferred routes between any two systems on the interconnected networks. A router has interfaces for di ...
Chelsio Delivers 10/25/40/50/100GbE Unified Wire Line of Protocol
Chelsio Delivers 10/25/40/50/100GbE Unified Wire Line of Protocol

... “The Terminator 6 adapter product line is an important evolutionary step for Chelsio, bringing all the offload, virtualization, and switching capabilities of the existing T5 product line to 100Gbps performance levels,” said Bob Wheeler, Principal Analyst at The Linley Group. “The introduction of int ...
Chapter 3: Internetworking
Chapter 3: Internetworking

... single switch, large networks can be built by interconnecting a number of switches We can connect switches to each other and to hosts using pointto-point links, which typically means that we can build networks of large geographic scope Adding a new host to the network by connecting it to a switch do ...
The Network Domain - Centre for Wireless Communications
The Network Domain - Centre for Wireless Communications

... of the recent wireless systems • Much of the work considering new technologies must be done by oneself • OPNET can be used as a research tool or as a network design/analysis tool (end user) • The threshold for the usage is high for the developer, but low for the end user ...
Assuring Secure Collaboration for High
Assuring Secure Collaboration for High

... of very large data flows while mitigating security risks in high-performance computing environments. Juniper products deliver the operational and security capabilities needed to optimize and fortify Science DMZ operations, including: • Flexible routers and switches that leverage the robust features ...
OPNET - Centre for Wireless Communications
OPNET - Centre for Wireless Communications

... of the recent wireless systems • Much of the work considering new technologies must be done by oneself • OPNET can be used as a research tool or as a network design/analysis tool (end user) • The threshold for the usage is high for the developer, but low for the end user ...
ExtremeFabric - Extreme Forum 2017
ExtremeFabric - Extreme Forum 2017

... ​A Fabric wide LAG is dynamically formed to each host that attaches to the ExtremeFabric network with LACP ensbled. All ExtremeFabric nodes use the same chassis MAC so hosts running LACP will form a single LAG with the entire Fabric, as each host views the network of ExtremeFabric nodes as a single ...
Regulation on the technical implementation and ensuring of
Regulation on the technical implementation and ensuring of

... according to the routing data and that is agreed by the emergency services authority and telecommunications operators. The area code the user has possibly dialled must not affect the routing data formed in the network. The telecommunications operator must document in a technology-specific manner the ...
Broadband with NGN enabling Convergences
Broadband with NGN enabling Convergences

... Definition of NGN and IPTV Definition of NGN a packet-based network able to provide telecommunication services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It enab ...
HP Education Services Course Overview This course teaches
HP Education Services Course Overview This course teaches

...  Configure a volume group or disk group that can be used on multiple systems and a basic package to run in a Serviceguard environment  Configure and maintain a Serviceguard cluster  Configure and implement an application monitor  Replace a failed LVM lock disk  Change the cluster configuration ...
eeboas.cecil.edu
eeboas.cecil.edu

... • Define the new types of network applications and how they can be secured ...
Optimizing Multiple Distributed Stream Queries Using Hierarchical Network Partitions
Optimizing Multiple Distributed Stream Queries Using Hierarchical Network Partitions

... Our research is primarily motivated by enterprise-level data streaming systems such as the Operational Information System (OIS) [17] employed by our collaborators, Delta Air Lines. An OIS is a large scale distributed system that provides continuous support for a company or organization’s daily opera ...
9781305105430_PPT_ch03
9781305105430_PPT_ch03

... is represented by a pulse of electricity or light – Sent at a single fixed frequency and no other frames can be sent along with it • Broadband uses analog techniques to encode binary 1s and 0s across a continuous range of values – Signals flow at a particular frequency and each frequency represents ...
EMC Solution for Silver Peak NX Appliances with EMC Symmetrix Remote Data
EMC Solution for Silver Peak NX Appliances with EMC Symmetrix Remote Data

Document
Document

... • A list of groups of nodes along the explicit route (generically called "source route") • Thinking: source routing is better for calls than hop-by-hop routing as it can take into account loading conditions • Constrained shortest path first (CSPF) algorithm executed at the first node to compute end- ...
Malicious Threats of Peer-to-Peer Networking
Malicious Threats of Peer-to-Peer Networking

... For example, in Microsoft Networking you can allow for Full Control, meaning that a remote user can not only download, but also upload and modify data stored in the shared space. Imagine departmental groups in a corporation who need to share and update each other’s files. A peer-to-peer networking m ...
Lab 2
Lab 2

... network card. Internal cards will probably not work with virtualization methods. In other words Aircrack-ng suite cannot detect and switch the network interface into monitor mode unless it is an external network card. If you connect an external wireless card, ensure that that the card is enabled for ...
Pros and Cons of TETRA vs. P25 and the Benefits of a
Pros and Cons of TETRA vs. P25 and the Benefits of a

...  P25 is an open architecture, user-driven suite of system standards that define digital radio communications system architectures capable of serving the needs of Public Safety and Government organizations.  The P25 standard exists in the public domain, allowing any manufacturer to produce a P25 co ...
Q4 Objectives
Q4 Objectives

... Active Auto Fiber Harness (embedded Electronics and/or optics in cables/connectors) Drive by Wire; In Car network. ...
ECMA: A Novel Technique for Implementing Digital Evidence
ECMA: A Novel Technique for Implementing Digital Evidence

... implementation architecture facilitates dynamic interface with OpenFlow hardware to create a flexible security decisions. Their work proposed a security foundation for next-generation enterprise-grade cloud computing. Clearly, efforts have been made by various researchers to deal with the issue of f ...
GN2211621167
GN2211621167

... incoming calls appropriately to the called mobile roaming from place to place [6]. The handoff, on which we focus in this paper, is an essential function for permitting users to move from cell to cell with an ongoing call. There are two major engineering issues concerning handoff. WMNs have been loo ...
BlackDiamond® 10808 - Smart Technologies
BlackDiamond® 10808 - Smart Technologies

... incorporates programmable ASIC technology. This programmability ensures that the platform will support emerging protocols with out costly hardware upgrades—thus offering great investment protection. These applications require high-performance, scalability and the highest level of resiliency. Even mo ...
CYP Cy Fi Presentation - Silica
CYP Cy Fi Presentation - Silica

... Should a node detect that its power output is excessive, it will dynamically reduce its power output to conserve power ...
< 1 ... 182 183 184 185 186 187 188 189 190 ... 662 >

Airborne Networking

An Airborne Network (AN) is the infrastructure that provides communication transport services through at least one node that is on a platform capable of flight.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report