• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
TCP Congestion Control
TCP Congestion Control

... could ping. You could get a UDP packet through. Telnet and FTP would fail after a while. And it depended on where you were going (some hosts were just fine, others flaky) and time of day (I did a lot of work on weekends in the late 1980s and the network was wonderfully free then). Around 1pm was bad ...
MiceTrap: Scalable traffic engineering of datacenter mice flows
MiceTrap: Scalable traffic engineering of datacenter mice flows

... revenue for operators [5]. Moreover, variation in link utilization leads to hot-spots, while at the same time other links may be underutilized [6]. The latter could be used to offload traffic from the hot-spot links, thus avoiding congestion. Because of the short lifetime of mice flows, if considere ...
CSC271 Database Systems
CSC271 Database Systems

Lecture - 13
Lecture - 13

... » The network layer may offer connectionoriented service which may be unreliable » The users have no control over the subnet, so the only possibility to improve the quality of service is to put another layer on top of the network layer » The transport service interface for the higher layer can be de ...
High Speed Network Traffic Analysis with Commodity Multi
High Speed Network Traffic Analysis with Commodity Multi

Network Correlated Data Gathering With Explicit
Network Correlated Data Gathering With Explicit

... When the data measured at nodes are statistically independent, the problem becomes separable: because of the statistical independence, the choice of transmission structure does not affect the rate at each node. Namely, first, each node simply encodes its own data independently; then, well developed ...
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

... CDMA thought into the optical domain was in 1986 by [4]. Then Salehi employed CDMA techniques in optical systems and analyzed their performances [5, 6].Up till now, interest in applications of OCDMA has been constantly rising during recent decades [7].The nature of OCDMA in security has been concern ...
No Slide Title - IEEE-SA
No Slide Title - IEEE-SA

... Classification • Each device broadcasts periodically information about its availability for the others by sending id_info PDU • With this PDU the broadcasting device informs that it can be contacted during the next e.g. 1ms – The PDU contains IEEE address and 8-bit device service field – Mini device ...
[cic] [cic ends] I
[cic] [cic ends] I

Sample
Sample

...  often requires special bit patterns to signal boundaries  may have to deal with possibility of pattern appearing in data Among the key issues dealt with are:  error handling (e.g. corrupted frame)  flow control  providing various qualities of service For Broadcast networks a key issue is contr ...
MODBUSr TCP/IP for H2--EBC100
MODBUSr TCP/IP for H2--EBC100

... The function code field of a message contains 8 bits. Valid function codes are in the range of 1 -- 255 decimal. The function code instructs the slave what kind of action to take. Some examples are to read the status of a group of discrete inputs; to read the data in a group of registers; to write t ...
Error Messages
Error Messages

... – Host multicasts/broadcasts a router solicitation message – Identifier + Sequence number not used. ...
Mobile IPv6 and Firewalls: Problem Statement
Mobile IPv6 and Firewalls: Problem Statement

... Issue 1:The Binding Updates and Acknowledgements should be protected by IPsec ESP according to the MIPv6 specifications. Issue 2:The packet is intercepted by the MN’s home agent, which tunnels it to the MN’s . The packet may be dropped since the incoming packet may not match any existing state. Issu ...
the errata - Pearson IT Certification
the errata - Pearson IT Certification

... connector is an older connector used for low speed asynchronous serial communications, such as a PC to a serial printer, PC to a console port of a router or switch, or PC to an external modem. Updated 04/19/2017 ...
HotSDN`12 ~ Revisiting Routing Control Platforms with the Eyes and
HotSDN`12 ~ Revisiting Routing Control Platforms with the Eyes and

... large operator’s perspective. In contrast to the complex distribution of BGP configuration across many routers, RCPs allow an individual AS to easily deploy new, customer-facing (and revenue-generating) services [24]. Moreover, such approach also provides a very good perspective on network effectivene ...
Lab 1.1.4 Calculating VLSM Subnets
Lab 1.1.4 Calculating VLSM Subnets

... The solution to this VLSM lab is provided in the steps themselves. Students should take the recommended subnetting in each step and build a diagram of the network, showing routers, LANs and WAN links. Each LAN and WAN link should be labeled with the appropriate subnet address and slash number. A sug ...
Chapter 6
Chapter 6

... TCP/IP Internet Layer Protocols • PING is one of the most useful network tools available because it tests the most basic function of an IP network • Traceroute was originally developed for the Unix operating system but is used for many operating systems and most routers • It is used to track the pa ...
Ethernet - ECE Users Pages
Ethernet - ECE Users Pages

... Each interface must wait until there is no signal on the channel, then it can begin transmitting. If some other interface is transmitting there will be a signal on the channel, which is called carrier. All other interfaces must wait until carrier ceases before trying to transmit, and this process is ...
SoC_CIGRE2014_140821
SoC_CIGRE2014_140821

... System-on-Programmable-Chip (SoPC) Solution: Zynq SoC Extensible Platform: Smart Device for Substation Automation Systems External Memory ...
Interior Routing Protocols Note: exterior
Interior Routing Protocols Note: exterior

... an old one fails, the routing topology may not stabilize to match the changed network topology because information propagates slowly from one router to another and while it is propagating, some routers will have incorrect routing information. Another disadvantage is that each router has to send a co ...
to Pdf - International Journal of Modern Electronics and
to Pdf - International Journal of Modern Electronics and

... RREQ it concatenates the source route in a Route Reply packet (RREP) and replies on the same path as in RREQ. In the RREQ process, intermediate nodes update their routing tables to each of the nodes along the source route. In the route discovery phase each node uses route cache to store all multiple ...
Why Big Data Needs Big Buffer Switches
Why Big Data Needs Big Buffer Switches

... With a single small-buffer switch, this effect can lead to differences of 10:1 in bandwidth seen per flow. In a network with multiple switching tiers, the bandwidth allocation per flow can vary by 100:1. This wide range of bandwidth as seen by different flows can lead to highly variable completion t ...
DSL - Digital Subscriber Line An Overview
DSL - Digital Subscriber Line An Overview

...  Technical Description  Evaluation  A View to the Future ...
Document
Document

... 3)Carrier Ethernet has a) been around a long time and is now being phased out b) in the prime of it’s existence c) Only just beginning to be implemented by carriers 4)What does MEF stand for? a) Metro Ethernet Framework b) Metro Ethernet Forum c) Model Ethernet Forum 5)By the end of this presentatio ...
CDM-625 IEEE 1588v2 Precision Time Protocol (PTP) Performance
CDM-625 IEEE 1588v2 Precision Time Protocol (PTP) Performance

... The CDM-625 Advanced Satellite Modem is the first satellite modem to provide hardware support for PTP, thereby significantly improving the synchronization accuracy when backhauling over satellite. Based on satellite test results, the CDM-625 with hardware PTP support can improve timing accuracy by a ...
< 1 ... 115 116 117 118 119 120 121 122 123 ... 465 >

IEEE 1355

IEEE Standard 1355-1995, IEC 14575, or ISO 14575 is a data communications standard for Heterogeneous Interconnect (HIC).IEC 14575 is a low-cost, low latency, scalable serial interconnection system, originally intended for communication between large numbers of inexpensive computers.IEC 14575 lacks many of the complexities of other data networks. The standard defined several different types of transmission media (including wires and optic fiber), to address different applications.Since the high-level network logic is compatible, inexpensive electronic adapters are possible. IEEE 1355 is often used in scientific laboratories. Promoters include large laboratories, such as CERN, and scientific agencies.For example, the ESA advocates a derivative standard called SpaceWire.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report