Switching methods

Xem 1-20 trên 44 kết quả Switching methods
  • (BQ) Part 2 book "Ethernet networks" has contents: Bridging and switching methods and performance issues, routers, wireless ethernet, managing the network, the future of ethernet, security.

    pdf307p bautroibinhyen20 06-03-2017 7 4   Download

  • Battery chargers are employed for charging starter, traction, and stationary batteries as well as for supplying stand-by power. The demands for these devices are dependent on the operation conditions. Charging starter and traction batteries is mainly conducted during recesses. Hereby the consumers are disconnected for charging batteries (Figure 13.1). Charging for stationary batteries allows an ensured stand-by power supply for parallel and switch operation for DC consumers.

    pdf18p congdat261 08-11-2010 67 12   Download

  • Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection is idle Data rate is fixed Both ends must operate at the same rate

    ppt51p doanhung_dtvtk10 19-03-2013 42 7   Download

  • In a prior edition of this book the preface commenced with the paraphrase of an old adage in an era of evolving local area networking technology: Ethernet is dead—long live Ethernet! Although advances in communications technology continue to occur at a rapid pace, that paraphrase continues to be valid. Within the past decade, the bandwidth of 10 Mbps Ethernet was advanced by a factor of one thousandwith the introduction of a series of enhancements to the original Ethernet specification. First, Fast Ethernet resulted in the bandwidth of Ethernet increasing by a factor of 10 to 100 Mbps.

    pdf599p nhungmon 19-03-2009 2467 1799   Download

  • Ladder Diagram Fundamentals 1-5. Machine Control Terminology There are some words that are used in machine control systems that have special meanings. For safety purposes, the use of these words is explicit and can have no other meaning. They are generally used when naming control circuits, labeling switch positions on control panels, and describing modes of operation of the machine. A list of some of the more important of these terms appears below. ON This is a machine state in which power is applied to the machine and to the machine control circuits. The machine is ready to RUN. This is...

    pdf20p balanghuyen 13-01-2010 96 35   Download

  • OSI, TCP/IP model o IP, TCP packet architecture o Protocols: HTTP, DNS… Network devices, router, switch, firewall, … Wireless network: AP, wave,… Overview of network security o o o o o o o Definitions Tasks of Network Security Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security 3 .OSI model 4 .TCP/IP model 5 .

    pdf49p muathu_102 28-01-2013 59 19   Download

  • This lab will focus on the ability to connect a PC to a router or a switch in order to establish a console session and observe the user interface. A console session allows the user to check or change the configuration of the switch or router and is the simplest method of connecting to one of these devices. This lab should be performed twice, once with a router and once with a switch to see the differences between the user interfaces. Start this lab with the equipment turned off and with cabling disconnected. Work in teams of two with one for the router and one for...

    pdf6p thanhha 27-08-2009 90 8   Download

  • Network Layer (OSI Layer 3) The network layer is concerned with the routing of information and methods to determine paths to a destination. Information at this layer is called packets. Specifications include routing protocols, logical network addressing, and packet fragmentation. Routers operate in this layer. The CCIE lives and dies in this layer. Examples of network layer specifications are the following:

    pdf10p thachsaudoi 23-12-2009 55 8   Download

  • What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide methods and techniques to help your business engage in a transparent and productive ethical inquiry into your current data practices.

    pdf79p goshop_123 26-04-2013 31 8   Download

  • Spreading Sequences Overview In this chapter we study the structures and properties of orthogonal and pseudoorthogonal sequences. Firstly, we examine several types of pseudo-orthogonal (PN) and Quasi-Orthogonal (QO) sequences, and present their cross-correlation properties under synchronous and asynchronous conditions. Secondly, we survey basic methods of constructing orthogonal code sets. Orthogonal binary (Hadamard) codes may exist for lengths 1, 2 and 4k (for k = 1, 2, 3, ...). Methods for generating all lengths up to 256 are presented.

    pdf28p goixanh 22-09-2010 43 5   Download

  • Approximately 860 utilities, or more than 25% of utilities nationally, offer green power programs to customers. These programs allow customers to purchase some portion of their power supply as renewable energy—almost always at a higher price—or to contribute funds for the utility to invest in renewable energy development, such as solar installations at local schools. The term “green pricing” is typically used to refer to these utility programs offered in regulated or noncompetitive electricity markets.

    pdf166p lenh_hoi_xung 21-02-2013 24 5   Download

  • Secondary diamond sources are deposits that have been removed from the primary source (a kimberlite or lamproite pipe) by natural erosion and eventually deposited in riverbeds, along shorelines, in glaciers and on the ocean floor. They are also known as alluvial deposits. Although alluvial deposits account for only 10-15 percent of the world’s diamonds, they are generally higher-quality stones given that they retain more volume after polishing; they therefore command a higher price. The location of the diamond deposits determines the mining method that producers use (see.

    pdf116p lenh_hoi_xung 21-02-2013 15 5   Download

  • The projectors currently on sale in the market switch to default mode if the temperature in the projector exceeds around 37°C. This switching to a degraded mode may be indicated in a number of ways, from a simple warning message to a complete stop of the projection in case of excessively high temperatures. The manufacturers recommend a temperature in the booth not exceeding 30°C during operation. This digital projection system consisting of numerous electronic cards ...

    pdf0p hongphuocidol 03-04-2013 25 5   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành y học dành cho các bạn tham khảo đề tài: Switching to smokeless tobacco as a smoking cessation method: evidence from the 2000 National Health Interview Survey

    pdf7p panasonic04 19-12-2011 21 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article An Efficient Segmental Bus-Invert Coding Method for Instruction Memory Data Bus Switching Reduction

    pdf10p sting07 18-02-2012 23 2   Download

  • Waste incinerators fall somewhere between the two categories of incidental and deliberate emissions. Similar to a coal plant, they burn a feedstock — in this case garbage — and mercury is released as an incidental emission. The difference is that most of the incidental emissions from waste incinerators are a result of mercury that is deliberately put into products. These may include fluorescent lamps, old batteries, dental office waste, electrical switches or thermostats.

    pdf55p yeurauxanh88 01-10-2012 28 2   Download

  • From this table of the functional groups one recognizes that any transformation between columns must involve a redox process whereas transformations between rows can be accomplished by acid/base processes. It forms a scaffolding on to which we can hang our knowledge of reactivity, and at the same time it prepares us to think of yet unseen transformations on the basis of how those transformations might be effected.

    pdf22p cao_can 02-01-2013 21 2   Download

  • The documentation is not only to aid the further education programme, but is also suitable for self study. The theory presented covering the fundamental physical principles, method of operation, type and possible uses of the sensors has been designed for use with the training case but could be used independently to study the application of sensors in automaticcontrol.

    pdf128p dangkhoa1612 18-04-2014 20 1   Download

  • Ecodial Advance Calculation 4.2 Technical help .Ecodial Advanced Calculations 4.

    pdf44p vanbinh_21 19-12-2012 268 73   Download

  • Control engineering has evolved over time. In the past humans were the main method for controlling a system. More recently electricity has been used for control and early electrical control was based on relays. These relays allow power to be switched on and off without a mechanical switch. It is common to use relays to make simple logical control decisions. The development of low cost computer has brought the most recent revolution, the Programmable Logic Controller (PLC). The advent of the PLC began in the 1970s, and has become the most common choice for manufacturing controls....

    pdf30p balanghuyen 13-01-2010 126 26   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản