• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Creating a Peer-to
Creating a Peer-to

... 1. Obtain Serial Cables, Console Cables, Ethernet cables, etc.. 2. Connect Serial Cables  Be careful to not which end of connection is the DCE end. 3. Connect Ethernet Cables (Straight-thru cables from router to hub) ...
TIA-921 and ITU-T G.NIMM Statistically Based IP Network
TIA-921 and ITU-T G.NIMM Statistically Based IP Network

Chapter 1. Introduction to Data Communications
Chapter 1. Introduction to Data Communications

... – Most data communications consists of short burst of data – Packet switching takes advantage of this burstiness • Interleaving bursts from many users to maximize the use of the shared network ...
Building a Reliable Ethernet/IP Network: GSFC Prototype
Building a Reliable Ethernet/IP Network: GSFC Prototype

... • LLC – “Logical Link Control” offers a IEEE standardized datalink layer reliability protocol, adding a 3 byte header to the ethernet frame ...
Media Streaming over Power-Controlled Wireless Links
Media Streaming over Power-Controlled Wireless Links

... (p,r) = system controls in current time slot (n,i,b, r’) = system state in current time slot n = remaining packets at Tx i = channel interference b = available packets at Rx r’ = playout rate in previous slot ...
Establish bounds on the total rate of data exfiltration
Establish bounds on the total rate of data exfiltration

Secure Routing and Intrusion Detection in Ad-Hoc
Secure Routing and Intrusion Detection in Ad-Hoc

... hoc networks to enable a more secure network structure and better performance • Designing routing protocols for ad hoc networks that adapt to both network topology and traffic ...
Emergency Communication - dumbo-isif
Emergency Communication - dumbo-isif

Control System For The Waterjet Cutting Machine
Control System For The Waterjet Cutting Machine

... successful implementations using Real-Time Linux, with the creation of a commercial version and the filling of a controversial patent the support of the community dropped. Furthermore, the use of Real-Time Linux is not always justified in technical terms [19]: lack of determinism for existing Linux ...
Slide 1
Slide 1

... • Explain the 802.1X/EAP framework. – Be able to explain all of the components of an 802.1X solution and the EAP authentication protocol. Understand that dynamic encryption key generation is a by-product of mutual authentication. ...
Internetworking I
Internetworking I

... Length Datagram length (max 64K B) ID Unique datagram identifier Flags xxM (more fragmented packets) Offset Fragment offset TTL Time to Live Protocol Higher level protocol (e.g., TCP) ...
empirical analysis of classifiers and feature selection techniques on
empirical analysis of classifiers and feature selection techniques on

... by one, at each step adding the one that decreases error the most, until any further addition does not significantly decrease the error, or ii) second one is backward selection, that starts with all the variables and remove them one by one, at each step removing the one that decreases error the most ...
Presentation ( format)
Presentation ( format)

... 802.11 - CSMA with RTS/CTS • Sending unicast packets – station can send RTS with reservation parameter after waiting for DIFS (reservation declares amount of time the data packet needs the medium) – acknowledgement via CTS after SIFS by receiver (if ready to receive) – sender can now send data at o ...
TR41.4-05-08-008-M-TIA-921PerformanceEvaluation
TR41.4-05-08-008-M-TIA-921PerformanceEvaluation

... Types of Access Links QoS controlled Edge Routing MTU Size Packet Loss (Frame Loss) ...
IMT-2000 NW, OSS & Service
IMT-2000 NW, OSS & Service

... PDC: Personal Digital Cellular ...
networking hardware (networking devices)
networking hardware (networking devices)

... Subdivide a network into smaller logical pieces.  Switches operate at the Data Link layer (layer 2) of the OSI model.  Can interpret address information.  Switches resemble bridges and can be considered as a high speed multiport bridge. Replacing repeaters & hubs in UTP Switches maintain a swit ...
UNIT name: IP protocol
UNIT name: IP protocol

... sometimes as friends etc. Communication uses some kind of language (as transport layer), and of course it needs partners who communicate (as network layer). You already understand that there must be some kind of physical phenomenon to transport this communication to the partner (as physical layer, i ...
Evaluating the impact of RTS-CTS in OLPC`s XOs` Mesh Networks
Evaluating the impact of RTS-CTS in OLPC`s XOs` Mesh Networks

... XOs have one single radio and therefore one physical layer (PHY). Nevertheless, the wireless driver implements two interfaces: eth0, the main interface which is used for infrastructure traffic and msh0, for mesh traffic. Therefore XOs can perform as STAs or MPs. They can also perform the MPP role an ...
Ch05-2 - LINK@KoreaTech
Ch05-2 - LINK@KoreaTech

...  examine incoming frame’s MAC address, selectively forward frame to one-or-more outgoing links when frame is to be forwarded on segment, uses CSMA/CD to access segment transparent  hosts are unaware of presence of switches plug-and-play, self-learning  switches do not need to be configured ...
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

... Bosch GmbH, Germany in 1986 when they were requested to develop a Communication system between three ECU’s in a vehicle Mercedes.In 1993 CAN protocol standardized is ISO 11898 standards “Road vehiclesInterchange of Digital Information Controller Area Network (CAN) for high speed Communication. CAN O ...
Transport Protocols
Transport Protocols

... else {if (segment carries no data & doesn’t change WIN) increment count of dup ACKs received for y if (count of dup ACKs received for y = 3) { { resend segment with sequence number y count of dup ACKs received for y = 3 } ...
Optical Network Infrastructure for GRID
Optical Network Infrastructure for GRID

... o The minimum flow duration will define the requirements for switching timescales. For optical networking at 10-40 Gb/s, switching times at the nanosecond scale may be required Optical burst switching o The technology to detect large data transfers and route them over an optical link to reduce load ...
Information-Centric Networking for Machine-to
Information-Centric Networking for Machine-to

... These operations are significantly improved if the system state is known. In RTSE, large volumes of raw synchrophasor measurement data are collected by geographically distributed PMUs, strategically deployed in the power grid infrastructure to ensure full grid state observability. The UTCsynchroniz ...
Nefflow based intrusion detection system
Nefflow based intrusion detection system

... office. Most user connect to the Internet at home does not provide enough protection to their computer. Once the mobile computer is being infected by a virus, it may initiate attack as soon as being connected to the network at office. Our goal is to propose an infrastructure that uses existing facil ...
Ricoh Aficio MP2250/3350/2250B/3350B brochure
Ricoh Aficio MP2250/3350/2250B/3350B brochure

... As office demands increase, so does your need for a highly productive partner. The Aficio™MP 2550/MP 2550B and Aficio™MP 3350/MP 3350B help you work smarter and faster. They produce output at a rapid 25/33 pages per minute, with equal duplex speeds. Waiting time is further reduced with a fast 14-sec ...
< 1 ... 219 220 221 222 223 224 225 226 227 ... 465 >

IEEE 1355

IEEE Standard 1355-1995, IEC 14575, or ISO 14575 is a data communications standard for Heterogeneous Interconnect (HIC).IEC 14575 is a low-cost, low latency, scalable serial interconnection system, originally intended for communication between large numbers of inexpensive computers.IEC 14575 lacks many of the complexities of other data networks. The standard defined several different types of transmission media (including wires and optic fiber), to address different applications.Since the high-level network logic is compatible, inexpensive electronic adapters are possible. IEEE 1355 is often used in scientific laboratories. Promoters include large laboratories, such as CERN, and scientific agencies.For example, the ESA advocates a derivative standard called SpaceWire.
  • studyres.com © 2026
  • DMCA
  • Privacy
  • Terms
  • Report