• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Applications of Neural Networks in Telecommunications
Applications of Neural Networks in Telecommunications

... antenna system will prove to be an advantage. Adaptive antennas can also offer capacity enhancements or allow higher bit-rates to be used. Consumer products will soon have the capability of high-speed communications. This requires low cost and low power electronics. However, the domestic environmen ...
How to bypass the firewall
How to bypass the firewall

... (2). Circuit-Level Gateway: Circuit-level gateway (as shown in Figure 4), which is described in [Tom(2001)], offers a controlled network connection between the internal and external systems. It works on the Transport Layer. This kind of firewall applies security mechanisms when a TCP or UDP connecti ...
Measurement Projects Overview
Measurement Projects Overview

... • architecture; metrics for traffic flows • language to describe flows • MIB to control meter & gather measurements ...
TSACC Test Area - 한국정보통신기술협회(TTA)
TSACC Test Area - 한국정보통신기술협회(TTA)

... node on the path transmits the packet to the next hop identified in the source route. • Each node maintains a Route Cache to store the source routes it has learned. When a node needs to send a data packet, it first checks its route cache for a route to the destination. If no route is found, it attem ...
15-744: Computer Networking
15-744: Computer Networking

... • If intermediate node receives RR for destination and has entry for destination in route cache, it responds to RR and does not propagate RR further ...
William Stallings Data and Computer Communications
William Stallings Data and Computer Communications

... Management Information Base MIB Representation of network resources as objects Each object a variable representing one aspect of managed object MIB is collection of access points at agent for management of station Objects standardized across class of system ...
Storage
Storage

... single sided, double layer: 9GB double sided, single layer: 10GB double sided, double layer: 18GB ...
01_03E IP-BTS
01_03E IP-BTS

... *14 FTP: A protocol that is generally used for transferring files over a TCP/IP network such as the Internet or an intranet. *15 IPSec: A protocol for highly secure communication that involves encryption of IP packets and ...
Link Layer
Link Layer

...  seldom used on low bit-error link (fiber, some twisted pair)  wireless links: high error rates • Q: why both link-level and end-end reliability? ...
Week Nine
Week Nine

... Header Error Control HEC can also be used for providing synchronization Apply error-checking method using 40 consecutive bits. If it does not generate a result consistent with the last 8 bits, shift one bit and try again. Repeat above step until a consistent result is found. Could it be a coinciden ...
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)

... network called NoC. The sending resource can use different paths through the switches to send its messages to the desired destination. The crossbar switch designed as shown in fig3 helps in routing the traffic effectively. These messages can be considered as traffic between this sender/target pair[2 ...
E43032231
E43032231

... settings across multiple layers. At the network layer, fault-tolerant routing protocols, such as local rerouting [16] or multipath routing [17], allow for flow reconfiguration to meet the QoS constraints by exploiting path diversity. However, they consume more network resources than a link reconfigu ...
FCoE Overview - IEEE Entity Web Hosting
FCoE Overview - IEEE Entity Web Hosting

...  Lossless fabrics are prone to congestion spreading (congestion trees).  Ethernet-FC gateways with their different port speeds (10 GbE; 8 Gbps) are natural bottlenecks.  ETS Work Conservation model adds fuel to fire.  Solution: switches/endpoints notify traffic sources of incipient congestion, v ...
On Demand Routing - UCLA Computer Science
On Demand Routing - UCLA Computer Science

... message with a unique request ID • The Route Request packet “picks up” the node ID numbers • Route Reply message containing path information is sent back to the source either by – the destination, or – intermediate nodes that have a route to the destination ...
Networking Terms Glossary - Beijer Electronics, Inc.
Networking Terms Glossary - Beijer Electronics, Inc.

OSPF - Suraj @ LUMS
OSPF - Suraj @ LUMS

ppt - Suraj @ LUMS
ppt - Suraj @ LUMS

... the link state record was first advertised ...
Factors that influence TCP performance
Factors that influence TCP performance

Traffic Measurements for Link Dimensioning
Traffic Measurements for Link Dimensioning

... four factors that determine which time granularity is practical for our specific measurement setup. A first factor is that the switch should copy all traffic from the ports to be monitored to the port to which the measurement device is connected. This switch, like all network devices, contains buffers t ...
SEMESTER 1 MODULE 1
SEMESTER 1 MODULE 1

... What is the definition of a dynamic routing protocol? What happens when a router receives information about changes in routes? What are 3 common routing protocols? What are the 2 costs listed with using a dynamic protocol? What advantages are listed for static routing? ...
Games and the Impossibility of Realizable Ideal Functionality
Games and the Impossibility of Realizable Ideal Functionality

... If attacker knows initial seq # and amount of traffic sent, can estimate likely current values Send a flood of packets with likely seq numbers Attacker can inject packets into existing ...
Chapter 7 Local Area Networks: The Basics Data
Chapter 7 Local Area Networks: The Basics Data

Routing in LEO-Based Satellite Networks.
Routing in LEO-Based Satellite Networks.

... following this strategy to route all kinds of data may result in congestion in some parts of the network. This may result in low throughput of the network. The problem can be alternatively thought of as a multicommodity flow problem [2,6,9,11,14]. The aim of the multi-commodity flow problem is to ma ...
VoIP Analysis Fundamentals with Wireshark…
VoIP Analysis Fundamentals with Wireshark…

... The #1 Result of Excessive Delay - Jitter • Occurs when packets do not arrive at a constant rate that exceeds the buffering ability of the receiving device to compensate for ...
Lecture 1: Course Introduction and Overview
Lecture 1: Course Introduction and Overview

... » Reordering among connections normally doesn’t matter ...
< 1 ... 269 270 271 272 273 274 275 276 277 ... 465 >

IEEE 1355

IEEE Standard 1355-1995, IEC 14575, or ISO 14575 is a data communications standard for Heterogeneous Interconnect (HIC).IEC 14575 is a low-cost, low latency, scalable serial interconnection system, originally intended for communication between large numbers of inexpensive computers.IEC 14575 lacks many of the complexities of other data networks. The standard defined several different types of transmission media (including wires and optic fiber), to address different applications.Since the high-level network logic is compatible, inexpensive electronic adapters are possible. IEEE 1355 is often used in scientific laboratories. Promoters include large laboratories, such as CERN, and scientific agencies.For example, the ESA advocates a derivative standard called SpaceWire.
  • studyres.com © 2026
  • DMCA
  • Privacy
  • Terms
  • Report