Xem 1-20 trên 251 kết quả Network mechanisms
  • Development of packet-switched data communication networking technologies has been rapid in recent years, a phenomenon made possible by the open standardization process and the potential new territories for intellectual property creation. As a consequence, new ways of creating services have been devised, bringing more flexibility as compared to traditional telecommunications schemes.

    pdf355p vinhnghi 17-08-2009 77 13   Download

  • A specialized transition network mechanism, the interruptable transition n e t w o r k (ITN) is used to p e r f o r m the last of three stages in a m u l t i p r o c e s s o r s y n t a c t i c parser. This approach can be seen as an exercise in implementing a parsing procedure of the active chart parser family. Most of the ATN parser implementations use the left-to-right top-down chronological backtracking control structure (cf. Bates, 1978 for discussion).

    pdf5p bungio_1 03-05-2013 22 1   Download

  • Administering Cisco QoS in IP Networks discusses IP Quality of Service (QoS) and how it applies to Enterprise and Service Provider environments. It reviews routing protocols and quality of service mechanisms available today on Cisco network devices (routers, switches, etc.).This guide provides examples and exercises for a hands-on experience to give you the background and necessary details to implement these capabilities in your network today.

    pdf561p daokim 10-08-2009 294 83   Download

  • OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPSec VPN implementations. It uses the secure and stable TLS/SSL mechanisms for authentication and encryption. This book is an easy introduction to this popular VPN application.

    pdf270p mikeng 08-12-2010 138 63   Download

  • This document is intended to guide customers in their planning or deployment of IPv6 in branch networks. This document is not meant to introduce you to branch design fundamentals and best practices, IPv6, transition mechanisms, or IPv4 and IPv6 feature comparisons. The user must be familiar with the Cisco branch design best practices recommendations and the basics of IPv6 and associated transition mechanisms. For information about the enterprise design architecture, refer to the following documents...

    pdf88p minhthanh 11-08-2009 172 37   Download

  • Insider attacks pose an often neglected threat scenario when devising security mechanisms for emerging wireless technologies. For example, traffic safety applications in vehicular networks aim to prevent fatal collisions and preemptively warn drivers of hazards along their path, thus preserving numerous lives. Unmitigated attacks upon these networks stand to severely jeopardize their adoption and limit the scope of their deployment.

    pdf158p ptng13 16-05-2012 96 31   Download

  • Telecommunications is one of the fastest growing business sectors of modern information technologies. A couple of decades ago, to have a basic understanding of telecommunications, it was enough to know how the telephone network operated. Today, the field of telecommunications encompasses a vast variety of modern technologies and services. Some services, such as the fixed telephone service in developed countries, have become mature, and some have been exploding (e.g., cellular mobile communications and the Internet).

    pdf393p thaudiennhe 10-07-2010 88 30   Download

  • This document guides customers in their planning or deployment of IPv6 in campus networks. This document does not introduce campus design fundamentals and best practices, IPv6, transition mechanisms, or IPv4-to-IPv6 feature comparisons. Document Objectives, page 3 provides additional information about the purpose of this document and references to related documents.

    pdf136p minhthanh 11-08-2009 92 28   Download

  • OSI Transport Layer. In this chapter, we examine the role of the Transport layer. The Transport layer also encompasses these functions: Enables multiple applications to communicate over the network at the same time on a single device. Ensures that, if required, all the data is received reliably and in order by the correct application. Employs error handling mechanisms. Learning Objectives–Upon completion of this chapter, you will be able to: Explain the need for the Transport layer.

    pdf47p thanhtung_hk 03-11-2010 84 26   Download

  • Wireless Sensor Networks hold the promise of delivering a smart communication paradigm which enables setting up an intelligent network capable of handling applications that evolve from user requirements. With the recent technological advances of wireless sensor network, it is becoming an integral part of our lives. However, due to the nature of wireless sensor networks, researchers face new challenges related to the design of algorithms and protocols.

    pdf320p greengrass304 18-09-2012 57 18   Download

  • OSI, TCP/IP model o IP, TCP packet architecture o Protocols: HTTP, DNS… Network devices, router, switch, firewall, … Wireless network: AP, wave,… Overview of network security o o o o o o o Definitions Tasks of Network Security Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security 3 .OSI model 4 .TCP/IP model 5 .

    pdf49p muathu_102 28-01-2013 51 18   Download

  • Over the past decade, there has been a prolific increase in the research, development and commercialisation of Wireless Sensor Networks (WSNs) and their associated technologies (see Figure 1). This rise has been a result of a number of contributing factors, including continued miniaturisation (leading towards an era of truly ‘pervasive’ and ‘invisible’ computing); low-power circuits, devices and computation (for example, the ultra-low-power sleep states now found in microcontrollers); and efficient short-range communication (such as ZigBee and Bluetooth).

    pdf504p 123859674 04-07-2012 94 17   Download

  • No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system without written permission from Thomson Course Technology PTR, except for the inclusion of brief quotations in a review. The Thomson Course Technology PTR logo and related trade dress are trademarks of Thomson Course Technology PTR and may not be used without written permission. Network+™ is a trademark of The Computing Technology Industry Association, Inc. (CompTIA). All rights reserved.

    pdf30p kupload 10-12-2010 49 12   Download

  • Specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating the physical link between end systems. Examples of physical link characteristics include voltage levels, data rates, maximum transmission distances, and physical connectors.

    ppt96p nguyenthucanh 03-05-2010 61 11   Download

  • Programming Neural Networks in Java will show the intermediate to advanced Java programmer how to create neural networks. This book attempts to teach neural network programming through two mechanisms. First the reader is shown how to create a reusable neural network package that could be used in any Java program. Second, this reusable neural network package is applied to several real world problems that are commonly faced by IS programmers. This book covers such topics as Kohonen neural networks, multi layer neural networks, training, back propagation, and many other topics. ...

    pdf298p trasua_123 04-01-2013 44 11   Download

  • A comprehensive introduction to the most popular class of neural network, the multilayer perceptron, showing how it can be used for system identification and control. The book provides readers with a sufficient theoretical background to understand the characteristics of different methods, and to be aware of the pit-falls so as to make the correct decisions in all situations. This is a very application-oriented text that gives detailed and pragmatic recommendations to guide users through the plethora of methods suggested in the literature.

    pdf38p o0_mrduong_0o 30-03-2013 46 11   Download

  • Tham khảo tài liệu 'information in this document is subject to change without notice. the names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. complying with all applicable copyright laws is the responsibility of the user. no part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any pu

    pdf24p trungha 03-09-2009 96 10   Download

  • Wireless Sensor Networking is one of the most important new technologies of the century and has been identified to see significant grow in the next decades. Wireless sensor networks are power-efficient, small-size and communicate wirelessly among each other to cooperatively monitor and access the properties of their targeted environments. Applications reach from health monitoring, through industrial and environmental monitoring to safety applications.

    pdf278p 123859674 04-07-2012 37 9   Download

  • Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small-sized sensors with limited power deployed in large numbers over an area to monitor different phenomenon. The sole motivation of a large portion of research efforts has been to maximize the lifetime of the network, where network lifetime is typically measured from the instant of deployment to the point when one of the nodes has expended its limited power source and becomes in-operational – commonly referred as first node failure....

    pdf0p 123859674 04-07-2012 75 8   Download

  • It’s fair to say that the array of commercially available vehicles is beginning to catch up with the technological advances made available by science during the past decade. With a lot of eff ort being employed by manufactures to provide cars with advanced networking capabilities, we can mainly distinguish the connectivity topologies in two very diff erent groups: the Vehicular Ad-hoc Networks (VANETs), which make use of the scientifi c contributions provided by the Mobile Ad-Hoc Networks (MANETs), and the Vehicle Infrastructure Integration (VII) based networks....

    pdf0p ktcn_1 10-07-2012 25 8   Download

Đồng bộ tài khoản