• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
TESI DOCTORAL Àlex Vallejo Blanxart
TESI DOCTORAL Àlex Vallejo Blanxart

... It is true, a thesis is a very long and lonely journey, but not all the way. It would have been impossible to carry out this thesis without the collaboration of many people. Some of them just helped a bit at some crucial points, some have been around transversally, some we have never met in real lif ...
Scheduler
Scheduler

... Band. Management CLASSIFICATION Band. Management ...
NION CobraNet Hardware Manual  Version 1.7.1.0 July 23, 2014
NION CobraNet Hardware Manual Version 1.7.1.0 July 23, 2014

... rain or moisture, does not operate normally, or has been dropped. Never break off the ground pin. Write for our free booklet Shock Hazard and Grounding. Connect only to a power supply of the type marked on the unit adjacent to the power supply cord. If this product is to be mounted in an equipment r ...
Finding Topk Shortest Path Distance Changes in an
Finding Topk Shortest Path Distance Changes in an

... Outlier Subsequences in a Test Time Series • [Keogh et al., 2002] define a soft match version of the problem where the frequency of pattern p in the database D is defined using the largest number l such that every subsequence of p of length l occurs at least once in D • Another form of soft match is ...
Next Generation NP Solutions - ENUM
Next Generation NP Solutions - ENUM

Cryptography and Network Security
Cryptography and Network Security

... — MD5-Challenge: Analogous to the PPP CHAP protocol with MD5 as the specified algorithm, RFC 1994. The Request contains a "challenge" message to the peer. — One-Time Password (OTP): Defined in "A One-Time Password System," RFC 1938. The Request contains a displayable message containing an OTP challe ...
Single Packet IP Traceback in AS-level Partial Deployment Scenario
Single Packet IP Traceback in AS-level Partial Deployment Scenario

... techniques to derive paths which packets traversed. This approach has the potential to track a single IP packet. In order to decrease the required storage space, logging should be done in a space-efficient manner. Source Path Isolation Engine (SPIE) [2] is an architecture implementing log-based IP t ...
PowerSum ELFEXT
PowerSum ELFEXT

... Because of the fact that the transmission speed is depending on the encoding technique, we do not use the term Mbps to compare cables to each other, but we use MHz which is the parameter expressing the bandwidth of the cable. ...
T2S General Technical Specifications
T2S General Technical Specifications

Chapter 1 - Introduction
Chapter 1 - Introduction

... for a given datagram is called forwarding • The mask field in a forwarding table entry is used to extract the network portion of an address during lookup • When a router encounters a datagram with destination IP address D – the forwarding function must find an entry in the forwarding table that spec ...
Chapter 1 - Introduction
Chapter 1 - Introduction

... for a given datagram is called forwarding • The mask field in a forwarding table entry is used to extract the network portion of an address during lookup • When a router encounters a datagram with destination IP address D – the forwarding function must find an entry in the forwarding table that spec ...
Sniffer University 1-3
Sniffer University 1-3

... Resolves differences between subnets ...
Supporting Differentiated Service Classes: Queue Scheduling
Supporting Differentiated Service Classes: Queue Scheduling

... different queue scheduling disciplines, each attempting to find the correct balance between complexity, control, and fairness. The queue scheduling disciplines supported by router vendors are implementation-specific, which means that there are no real industry standards. However, a vendor sometimes ...
PDF
PDF

... for critical applications. Application optimization technologies such as Cisco WAAS can improve performance with data-reduction techniques, but fluctuating network performance can still affect applications. Cisco Performance Routing (PfR) addresses network performance problems by allowing the networ ...
Chapter 2 Mobility Management for GPRS and UMTS
Chapter 2 Mobility Management for GPRS and UMTS

... z Other Routing Information includes NSAPI, TI, TEID for Gn/Gp, GGSN address in use, and VPLMN address allowed. Network Layer Service Access Point Identifier (NSAPI) is used by LLC (in GPRS) or RLC (in UMTS) to route the N-PDUs to appropriate higher layer protocols such as signaling, SMS, or packet ...
Wireless Security
Wireless Security

... There are also many configuration weaknesses since some companies are not using the security features of WLANs on all their equipment. Many devices are shipped with default administrator passwords. ...
TCP/IP Diagnosis Guide - z/VM
TCP/IP Diagnosis Guide - z/VM

... How Numbers Are Used in This Book In this book, numbers over four digits are represented in metric style. A space is used rather than a comma to separate groups of three digits. For example, the number sixteen thousand, one hundred forty-seven is written 16 147. ...
S9700 Series Terabit Routing Switches
S9700 Series Terabit Routing Switches

... developed by Huawei to meet the demand for high-bandwidth access and Ethernet multi-service aggregation. Based on cutting-edge hardware and Huawei Versatile Routing Platform (VRP) software, the S5700 provides a large switching capacity and high-density GE ports to accommodate 10 Gbit/s upstream tra ...
Ethernet
Ethernet

... You can create static summary routes. Dynamic routes can be summarised. Classless routing protocols can forward both. Classful routing protocols do not because the ...
PPT Version
PPT Version

... – Needed since SCTP and IB start their RCP stream mode at connection time ...
ICMP.pptx
ICMP.pptx

downloading
downloading

... - 1 km of optic fiber - Via satellite with a distance of 30 km between the base and the satellite ...
Overview of Scalable Networks
Overview of Scalable Networks

... • Whatever value is specified with the bandwidth command, EIGRP always takes 50% of it (by default). • Remember: The bandwidth command is only used by routing protocols—it has no effect on user traffic when the protocol is EIGRP. The router does not use this command for any other purpose. • For exam ...
PDF - ZTE Deutschland GmbH
PDF - ZTE Deutschland GmbH

Performance Evaluation of a QoS-Aware Handover Mechanism Steffen Sroka , Holger Karl
Performance Evaluation of a QoS-Aware Handover Mechanism Steffen Sroka , Holger Karl

... is competitive with standard Hierarchical Mobile IPv6 regarding the amount of carried traffic, and that it outperforms Hierarchical Mobile IPv6 in arranging traffic within the network, resulting in a superior efficiency especially for mixed QoS/non-QoS traffic. ...
< 1 ... 5 6 7 8 9 10 11 12 13 ... 465 >

IEEE 1355

IEEE Standard 1355-1995, IEC 14575, or ISO 14575 is a data communications standard for Heterogeneous Interconnect (HIC).IEC 14575 is a low-cost, low latency, scalable serial interconnection system, originally intended for communication between large numbers of inexpensive computers.IEC 14575 lacks many of the complexities of other data networks. The standard defined several different types of transmission media (including wires and optic fiber), to address different applications.Since the high-level network logic is compatible, inexpensive electronic adapters are possible. IEEE 1355 is often used in scientific laboratories. Promoters include large laboratories, such as CERN, and scientific agencies.For example, the ESA advocates a derivative standard called SpaceWire.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report