Xem 1-20 trên 1356 kết quả Network data
  • “Network infrastructure is directly tied to the ability to gain competitive advantage in the marketplace, today and in the future.”Data communications technologies are evolving and expanding at an unparalleled rate. The growth in demand for Internet access and intranet services continues to fuel rapid technical adaptation by both implementers and developers. Unfortunately,...

    pdf53p orchid 18-03-2009 99 30   Download

  • Wireless sensor nodes are small, embedded computing devices that interface with sensors/ actuators and communicate using short-range wireless transmitters. Such nodes act autonomously, but cooperatively to form a logical network, in which data packets are routed hop-by-hop towards management nodes, typically called sinks or base stations. A Wireless Sensor Network (WSN) comprises of a potentially large set of nodes that may be distributed over a wide geographical area, indoor or outdoor

    pdf369p nghiasimon 22-09-2012 39 19   Download

  • Huaqun Guo has introduced the emerging areas of vehicular networks in the forms of Intra-Vehicle, Vehicleto- Vehicle, and Vehicle-to-Infrastructure communications and edited this new book to reflect the advance information technologies that shape the modern automobiles. These new technologies on automotive informatics and communicative systems will enable a variety of applications for safety, traffic efficiency, driver assistance, as well as infotainment to be incorporated into modern automobile designs...

    pdf50p 123859674 02-07-2012 74 16   Download

  • Grid Networks describes the convergence of advanced networking technologies and Grid technologies, with special focus on their symbiotic relationship and the resulting new opportunities. Grid technology is applicable to many implementations, Computational Grids, Data Grids, Service Grids, and Instrumentation Grids. The authors cover a breadth of topics including recent research, featuring both theoretical concepts and empirical results. Beginning with an overview of Grid technologies, an analysis of distinguishing use cases and architectural attributes, and emerging standards.

    pdf375p beobobeo 01-08-2012 50 16   Download

  • In the last two years, optical networking has risen into the public consciousness in many different ways. It has become the next great technological thing — businesses want it, service providers want to sell it, device manufacturers want to provide equipment, and component manufacturers are scrambling to supply pieces and parts to all of them. At the time of this writing, an 18-month backlog on optical fiber and some optical amplifiers exists because of the enormous and unanticipated demand for highbandwidth optical connectivity.

    pdf289p taurus23 02-08-2012 42 8   Download

  • As one of the fastest growing technologies in our culture today, data communications and networking presents a unique challenge for instructors. As both the number and types of students are increasing, it is essential to have a textbook that provides coverage of the latest advances, while presenting the material in a way that is accessible to students with little or no background in the field. Using a bottom-up approach,

    pdf0p muathu_102 28-01-2013 32 6   Download

  • Abstract.The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry will have to develop novel ways to acquire, store, process, and deliver information to customers - wherever, however, and whenever they need it. An ”Intelligent IT Infrastructure,” which can deliver extremely high performance, adaptability and security - will be the backbone of these develop ments.

    pdf538p namde04 02-05-2013 36 6   Download

  • Exploring privacy risks in information networks is analysing the dangers and hazards that are related to personal information about users of a network. It is about investigating the dynamics and complexities of a setting where humans are served by technology in order to exploit the network for their own good. In the information network, malicious activities are motivated by commercial factors in that the attacks to privacy are happening, not in the name of national security, but in the name of the free market together with technological advancements.

    pdf118p monkey68 13-03-2009 52 4   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Network Modulation: An Algebraic Approach to Enhancing Network Data Persistence

    pdf15p dauphong15 16-02-2012 15 2   Download

  • Personal computer LANs Low cost Limited data rate Back end networks and storage area networks Interconnecting large systems (mainframes and large storage devices) High data rate High speed interface Distributed access Limited distance Limited number of devices

    ppt72p trada85 18-01-2013 18 2   Download

  • ECE/CS 372 Introduction to Computer Networks Lecture 1: Chapter 5 The Data Link Layer with goald understand principles behind data link layer services, instantiation and implementation of various link layer technologies.

    ppt32p dunglh2013 05-04-2014 11 1   Download

  • GSM

    GSM (Global System for Mobile Communications), is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation digital cellular networks. Developed as a replacement for first generation analog cellular networks, the GSM standard originally described a digital, circuit switched network optimized for full duplex voice telephony. The standard was expanded over time to include first circuit switched data transport, then packet data transport via GPRS (General Packet Radio Services)....

    pdf67p huemanvdoc 25-11-2009 439 248   Download

  • Tham khảo bài thuyết trình 'accessing data with ado.net', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    ppt40p kiditer 28-09-2009 449 165   Download

  • Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls

    ppt96p 0985448637 08-09-2010 229 123   Download

  • Networks are currently one of the fastest growing and most important developments in the computer industry. Not only are more and more PCs becoming parts of networks, but networked PCs are being incorporated into larger enterprise-wide applications so that everyone in a company can access and share data. With the expanding technology of networking comes the terminology to describe it. This Dictionary of Networking provides definitions for all the terms you will encounter when dealing with networks of any type....

    pdf465p emilynguyen 08-08-2009 198 120   Download

  • Orion Network Performance Monitor (Orion NPM) delivers comprehensive fault and network performance management that scales with rapid network growth and expands with your network monitoring needs, allowing you to collect and view availability and realtime and historical statistics directly from your web browser. While monitoring, collecting, and analyzing data from routers, switches, firewalls, servers, and any other SNMP-enabled devices, Orion NPM successfully offers you a simple-to-use, scalable network monitoring solution for IT professionals juggling any size network....

    pdf360p caothang2609 19-06-2010 349 112   Download

  • Perl provides direct access to the C library routines for socket communication. Often, arguments and return values are constants defined in the C header files, or are data structures which Perl will pass in a packed binary format. The Socket module provides these constants and also many functions for packing and unpacking these data structures

    pdf79p duypha 07-08-2009 298 107   Download

  • The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential. Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that integrates traditional telecommunications and the technology of the Internet.

    pdf673p dieutan 17-05-2010 161 80   Download

  • Tham khảo tài liệu 'module 1: introduction to data warehousing and olap', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf48p trungha 03-09-2009 194 75   Download

  • Tham khảo tài liệu 'module 3: using ado.net to access data', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf56p trungha 03-09-2009 129 61   Download

Đồng bộ tài khoản