Xem 1-20 trên 268 kết quả Access area
  • Content: LAN Features & Purposes, Topology, Layered Model of LAN, Media Access Control: CSMA/CD | Ethernet, LAN Devices. References: Data- Computer Communication handbook- William Stallings, TCP/IP Illustrated, Volume I - W.R. Stevens, CCNA- semester1-2-3-4.

    pdf13p dmptit 02-11-2010 68 16   Download

  • During the last decades, the usage of telecommunications systems has increased rapidly. Because of a permanent necessity for new telecommunications services and additional transmission capacities, there is also a need for the development of new telecommunications networks and transmission technologies. From the economic point of view, telecommunications promise big revenues, motivating large investments in this area.

    pdf292p ptng13 06-06-2012 52 13   Download

  • The three chapters of this report cover an assessment on the impacts of China ’s accession to the WTO (World Trade Organization), an analysis on Free Trade Areas in China, Japan and Korea, and an analysis on the perspectives and issues of Japanese and Korean direct investment in China, with a focus on technology transfer. These three areas represent the major issues related to the trend toward liberalized trade and investment in Northeast Asia.

    pdf47p truongdoan 10-11-2009 114 11   Download

  • Development of efficient and effective road network is the most important policy agenda for sustainable urban area development and growth in the study area. Urban area has been quickly expanding towards the outer areas along major roads. Dramatic population increase expected in the future requires a huge amount of urban areas for housing and other socio-economic activities. In order to support and guide these development demands properly, well articulated road network is the must.

    pdf282p tuanhung_vn 18-04-2015 19 6   Download

  • We have looked at protocols for distributing and establishing keys used for authentication and confidentiality But who should you give these keys to? Who should you trust? What are the rules governing when to and not to give out security credentials In this lecture, we will look at the broad area of secure and trusted systems We will focus on access control models These methods are often used to abstract the requirements for a computer system But, they hold for general systems where security is a concern (e.g. networks, computers, companies…) ...

    ppt35p muathu_102 28-01-2013 13 2   Download

  • This paper addresses recent progress in speaker-independent, large vocabulary, continuous speech recognition, which has opened up a wide range of near and mid-term applications. One rapidly expanding application area is the processing of broadcast audio for information access. At L IMSI, broadcast news transcription systems have been developed for English, French, German, Mandarin and Portuguese, and systems for other languages are under development.

    pdf8p bunrieu_1 18-04-2013 12 1   Download

  • Zn the past decade, a number of natural language database access systems have been constructed (e.g. Hendrix 1976; Waltz et e l . 1976; Sacerdoti 1978; Harris 1979; Lehner~ and Shwartz 1982; Shvartz 1982). The level of performance achieved by natural language database access systems varies considerably, with the sore robust systems o p e r a t i n g v i t h t n a narrow domain ( i . e . , content area) and r e l y i n g heavily on domain-specif i c knowledge to guide the language understanding process. Transporting...

    pdf3p bungio_1 03-05-2013 16 1   Download

  • This choice was made by popular demand for this date, due to the massive influx of new students and a new paper publication. Our normal choice would be not to release two reference texts in the same month other than for this demand, which appears to be in an extreme position at the moment as we are also receiving requests for zip and area code directories.

    pdf274p coicoi155 10-09-2009 337 192   Download

  • An invaluable confusion-lifting tutorial on Bluetooth, the personal area wireless networking standard that enables seamless communication of voice, e-mail, internet access, etc., between mobile phone, desktop PCs, and PDAs. *Details the pros and cons of the Bluetooth approach, taking readers through what kinds of services are ideally suited to Bluetooth. *A must for telecom engineers, managers, technicians, ISPs, and employees of the 1000+ Bluetooth Special Interest Group (SIG) companies, this guide also features sweeping coverage of applications and forthcoming products...

    pdf405p trannhu 05-08-2009 409 115   Download

  • I f you are like the rest of the networking community, you probably have many certifications. Certification is one of the best things you can do for your career in the computer or networking field. It proves that you know what you’re talking about when it comes to the area in which you are certified. In this book, you’ll find out what the Network+ exam is all about. Each chapter covers a part of the exam. At the end of each chapter, there are review questions to help you prepare for the exam....

    pdf586p maiphuong 11-08-2009 221 80   Download

  • Data Analysis and Presentation Skills: An Introduction for the Life and Medical Sciences is an invaluable text allowing students to develop appropriate key skills when designing experiments, generating results, analysing data and ultimately presenting findings to academics and referees. Taking a hands-on approach, each of these key areas is introduced clearly and carefully, showing how to access and evaluate information using a variety of resources. Basic analytical theory is gradually introduced alongside practical applications to enhance student understanding.

    pdf190p beobobeo 01-08-2012 84 37   Download

  • “Network infrastructure is directly tied to the ability to gain competitive advantage in the marketplace, today and in the future.”Data communications technologies are evolving and expanding at an unparalleled rate. The growth in demand for Internet access and intranet services continues to fuel rapid technical adaptation by both implementers and developers. Unfortunately,...

    pdf53p orchid 18-03-2009 99 30   Download

  • Network security spans a large number of disciplines, ranging from management and policy topics to operating system kernel fundamentals. Historically, the coverage of these and the other network security areas was presented in multiple, specialized publications or given a high-level treatment that was not suited to the practitioner. Network Security Bible approaches network security from the view of the individual who wants to learn and apply the associated network security best practices without having to sort through a myriad of extraneous material from multiple sources.

    pdf697p vinhnghi 17-08-2009 108 30   Download

  • Data communications technologies are evolving and expanding at an unparalleled rate. The growth in demand for Internet access and intranet services continues to fuel rapid technical adaptation by both implementers and developers. Unfortunately, creating an information resource such as the Internetworking Technology Overview requires a certain recognition by its authors that some information is likely to be obsolete the day it appears in print.

    pdf446p minhthanh 10-08-2009 131 24   Download

  • OSPF (Single Area OSPF). Purpose of Hello Packet: Discover OSPF neighbors & establish adjacencies, Advertise parameters on which routers must agree to become neighbors, Used by multi-access networks to elect a Designated Router and a Backup Designated Router.

    pdf71p thanhtung_hk 05-11-2010 64 24   Download

  • The economic insecurity and deprivation is looking up on the fact that whether elderly are in a position to maintain a minimum living slandered in terms of access to economic resources which is measured in terms poverty either as income poverty, subsistence poverty in terms of basic need, capability poverty in terms of dependency. The income poverty is measured in terms of ability of the aged to maintain minimum income level on which physical efficiency is maintained and is considered a parameter of deprivation among the aged. (Rowntree. 1941).

    pdf100p ut_hai_can 26-12-2012 50 14   Download

  • This document provides design recommendations, configuration examples, and scalability test results for implementing a next-generation WAN for Voice and Video Enabled IPsec VPN (V3PN) based on a service provider WAN interface handoff using Ethernet at the enterprise campus and branch locations. This document provides the enterprise network manager with configuration and performance guidance to successfully implement or migrate to a WAN architecture using Ethernet as an access technology to a service provider network....

    pdf73p batoan 11-08-2009 99 13   Download

  • Remote Access Technologies Trước đó trong cuốn sách này, bạn đã học về Ethernet LAN, WAN điểm-to-point liên kết, và Frame Relay. Tất cả các công nghệ này có thể được sử dụng để kết nối một trang web của công ty Internet. Tuy nhiên, không ai trong số các tùy chọn này là chi phí-hiệu quả để kết nối người sử dụng nhà tiêu biểu dựa trên Internet. Trong chương này, bạn sẽ tìm hiểu về một số công nghệ khác nhau được sử dụng để truy cập Internet từ nhà.

    pdf50p doquyenhong 27-10-2011 49 13   Download

  • Sarbanes-Oxley: Section 404 There are many elements to the SOX legislation, but Section 404: Management Assessment of Internal Controls is the part that addresses the internal control over financial reporting, where IAM’s related IT controls need to be carefully considered. Section 404 is creating a challenge for management and is one area where budget for addressing control issues is typically being directed.

    pdf13p duypha 06-08-2009 53 9   Download

  • Rural development policy is one important component of the Common Agricultural Policy (CAP) of the European Community. This policy encourages sustainable development in rural areas to address issues of economic, social and environmental. LEADER program is one of the rural development approach very innovative and is considered one of the successful test of the rural development approach in the region.

    pdf8p thulanh2 07-09-2011 36 8   Download

Đồng bộ tài khoản