• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
a sequence preserving efficient packet scheduler using
a sequence preserving efficient packet scheduler using

Technology Directions for IP Infrastructure
Technology Directions for IP Infrastructure

... • ATM was seen as the switching technology of choice for many • Last mile technology was all about making 56K modems more reliable • The fuss about the online economy was often seen as either too much enthusiasm or too much skepticism, or even a mix of both • IPv6, VPNs, vLANs, VOIP, QoS, Mobility, ...
- IEEE Mentor
- IEEE Mentor

... • Monitoring provided by accounting and performance management is a relevant building block for security solutions, because security management and incident mitigation depend entirely on information about the network’s state. • An application of security analysis can import the accounting records an ...
Heather Ames Chuan-Heng Chsiao Chaitanya Sai Gaddam 13
Heather Ames Chuan-Heng Chsiao Chaitanya Sai Gaddam 13

... The 1999 edition of the Knowledge Discovery in Databases (KDD) Cup, an annual competition organized by an ACM special interest group, looked specifically at the issue of network intrusion. The data used for the contest is from the two month log of the US Air Force, and has been classified as 24 diff ...
Dirk Trossen: PSIRP - Pub/Sub in the Net!
Dirk Trossen: PSIRP - Pub/Sub in the Net!

... • PRO: Increase scalability due to decreased false positives, which could be combined with lower-layer optical techniques • CON: Additional state in the forwarding nodes ...
pptx - Brown CS
pptx - Brown CS

Intraplex® IP Link
Intraplex® IP Link

... Product Details The IP LINK family of audio codecs was designed to provide unprecedented level of reliability from ground up. At the hardware level, the N+1 redundancy with built in control for both audio routers and data switches provide automatic synchronization of configuration and switch over c ...
Multiprotocol Lambda Switching
Multiprotocol Lambda Switching

... When a call comes to a MPLambdaS network, the ingress node calculates the explicit route using LS information stored in the local LS database. If the local LS information accurately reflects the current state of the network and there is not enough resource in the network, then the ER computation alg ...
Glossary
Glossary

... Data Link control (DLC) – A network protocol used mainly by HewlettPackard printers and IBM Mainframes attached to a network. Data Link Layer – Layer 2 in the OSI reference model. This layer is responsible for managing access to the networking medium and for ensuring error-free delivery of data fram ...
GigaVUE-420 // Data Sheet
GigaVUE-420 // Data Sheet

... The GigaVUE-420 fabric node supports 1Gb and 10Gb connections ...
The Edge of Smartness - University of Calgary
The Edge of Smartness - University of Calgary

... Department of Computer Science University of Calgary ...
paper
paper

... often difficult. Thus, allowing traffic that does not need to be routed through switches to bypass switches avoids unnecessary costs and disruptions caused by switch upgrades. Use the optical layer to provide recovery. Our routing is well suited to packet-switched traffic, but does not rely on a spe ...
Document
Document

... • MM server maintained 2 simultaneous RTP video sessions with client: VS1 and VS2 – Video data emitted in unprotected form – NIProxy had its FEC service loaded • Parity coding per 3 or per 6 input packets ...
Emulex OCe11102-FX Dual Port 10Gb CNA
Emulex OCe11102-FX Dual Port 10Gb CNA

... Wokingham, United Kingdom +44 (0) 118 977 2929 ...
mcrz.de
mcrz.de

... communication medium for all the connected devices For example: 10Base2 10Base5 Backbone ...
SITLine-detailed - Gulf IT
SITLine-detailed - Gulf IT

... signals switches ...
MIS 533
MIS 533

... • Record must be in first normal form first ...
Chapter 7 Part 2 Networks
Chapter 7 Part 2 Networks

... – Network navigation devices facilitate and control the flow of data through a network. Data is sent over transmission media in bundles. Each bundle is called a packet. – Router – transfers packets of data between two or more networks. (example: home network and the internet would be 2 networks) – S ...
Internet
Internet

... bandwidth usage; ratio between peek and average rate is 3:1 for audio, and 15:1 for data traffic ...
Group 13 and 14 Summary of Threats and Defenses Honeynets and
Group 13 and 14 Summary of Threats and Defenses Honeynets and

... script performs other operations such as: deleting, copying, moving files, etc. ...
Chapter 2 (cont..)
Chapter 2 (cont..)

... • Used to connect to port # of other servers and to interact with Serverthem using command line process ...
Week13_1 - FSU Computer Science Department
Week13_1 - FSU Computer Science Department

... 1. When the third duplicate ACK is received, set ssthresh to no more than the value given in equation 3. 2. Retransmit the lost segment and set cwnd to ssthresh plus 3*SMSS. This artificially "inflates" the congestion window by the number of segments (three) that have left the network and which the ...
united nations world food programme
united nations world food programme

Multimedia, QoS and Multicast
Multimedia, QoS and Multicast

... • High-speed, stateless core routers – 1-bit determines forwarding behavior ...
Secure Data Retrieval for Decentralized
Secure Data Retrieval for Decentralized

< 1 ... 348 349 350 351 352 353 354 355 356 ... 465 >

IEEE 1355

IEEE Standard 1355-1995, IEC 14575, or ISO 14575 is a data communications standard for Heterogeneous Interconnect (HIC).IEC 14575 is a low-cost, low latency, scalable serial interconnection system, originally intended for communication between large numbers of inexpensive computers.IEC 14575 lacks many of the complexities of other data networks. The standard defined several different types of transmission media (including wires and optic fiber), to address different applications.Since the high-level network logic is compatible, inexpensive electronic adapters are possible. IEEE 1355 is often used in scientific laboratories. Promoters include large laboratories, such as CERN, and scientific agencies.For example, the ESA advocates a derivative standard called SpaceWire.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report