Xem 1-13 trên 13 kết quả Tunneling devices
  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Circular polarization in a non-magnetic resonant tunneling device

    pdf7p sting05 10-02-2012 13 4   Download

  • I first want to thank my collaborator, Collins Hemingway, for his help in synthesizing and developing the material in this book and for his overall management of this project. The tunnel propagation hypothesis, as part of the set of mechanisms operating during defibrillation, is expected to shed light on possible strategies for lowering DFT as well as for developing new defibrillation devices.

    pdf392p byrainiu 05-01-2010 333 86   Download

  • This volume includes papers presented at the XXII Solvay Conference on Physics, which took place from the 24 to 29 November 2001 in the European Culture Centre of Delphi. The Castle of Lamia hosted the events of the last day. The Physics of Communication was the selected theme of the conference. The 5 sessions reflected present challenging issues, namely Decoherence and Irreversibility, Non-locality and Superluminosity, Photonics, Quantum Information and Communication, Quantum Computation.

    pdf0p camnhung_1 13-12-2012 18 3   Download

  • What is a VPN? Cisco Documentation on VPN • A VPN is a Virtual Private Network • Now, as more and more companies need access for remote users, mobile users or remote offices, your current architecture can be augmented with a VPN • A Virtual Private Network is a network that’s created by encryption (Tunneling) across another unsecured medium, like the Internet • What is great about Cisco and VPN’s is that all Cisco devices can be configured as a VPN enabled device solely by the IOS feature set itself. There is a concentrator series, but...

    pdf21p phongthinh 07-08-2009 496 172   Download

  • This document provides information about using X.509 digital certificates issued by a Cisco IOS CA server to authenticate VPN tunnels between Cisco routers. It provides design considerations, step-by-step configuration instructions, and basic management options for VPN crypto devices using X.509 digital certificates. This document is written for Cisco system engineers and assumes that you have a working knowledge of Cisco IOS routers, as well as a basic understanding of IPSec, ISAKMP/IKE, and X.509 digital certificates....

    pdf62p duypha 11-08-2009 215 64   Download

  • 1.Connect devices that are separated by a broader geographical area. 2.Use the services of carriers, such as telephone companies, network providers… 3.Use serial connections.A VPN is an encrypted connection between private networks over a public network such as the Internet. Instead of using a dedicated Layer 2 connection such as a leased line, a VPN uses virtual connections called VPN tunnels, which are routed through the Internet from the private network of the company to the remote site or employee host.

    pdf39p mrdvad11 12-03-2013 65 49   Download

  • A wide range of techniques have been identified and implemented, basically falling into three categories: Dual-stack techniques, to allow IPv4 and IPv6 to co-exist in the same devices and networks. Tunneling techniques, to avoid dependencies when upgrading hosts, routers, or regions. Translation techniques, to allow IPv6-only devices to communicate with IPv4-only devices. Expect all of these to be used, in combination

    pdf94p nammo0168 15-05-2011 68 19   Download

  • PIX Firewall version 6.2 lets you use PIX Firewall as an Easy VPN Remote device when connecting to an Easy VPN Server, such as a Cisco VPN 3000 Concentrator or a PIX Firewall. This functionality, sometimes called a “hardware client,” allows the PIX Firewall to establish a VPN tunnel to the Easy VPN Server. Hosts running on the LAN behind the PIX Firewall can connect through the Easy VPN Server without individually running any VPN client software.

    pdf12p thutrang 27-08-2009 73 17   Download

  • Bhushan, B. “Introduction - Measurement Techniques and Applications” Handbook of Micro/Nanotribology. Ed. Bharat Bhushan Boca Raton: CRC Press LLC, 1999 Part I Basic Studies © 1999 by CRC Press LLC Introduction — Measurement Techniques and Applications Bharat Bhushan 1.1 1.2 1.3 History of Tribology and Its Significance to Industry Origins and Significance of Micro/Nanotribology Measurement Techniques Scanning Tunneling Microscope • Atomic Force Microscope • Friction Force Microscope • Surface Force Apparatus • Vibration Isolation 1 1.4 1.

    pdf80p medinova 26-10-2010 40 9   Download

  • The advances in ultra-large-scale integration (ULSI) technology mainly have been based on downscaling of the minimum feature size of complementary metal-oxide semiconductor (CMOS) transistors. The limit of scaling is approaching and there are unsolved problems such as the number of electrons in the device’s active region. If this number is reduced to less than 10 electrons (or holes), quantum fluctuation errors will occur and the gate insulator thickness will become too small to block quantum mechanical tunneling, which may result in unacceptably large leakage currents....

    pdf0p chuyenphimbuon 21-07-2012 28 8   Download

  • How can you minimize the effect of core migration to MPLS for regular IP traffic? Use conditional label advertising. n Can you allocate labels only to PE loopback addresses if you are using an ATM core? Yes, with conditional label advertising. n What are the benefits of edge-first migration toward MPLS infrastructure? It is easier and quicker to implement. It enables clear separation of migration issues. It does not involve any IP reconfiguration of core devices in the network.

    pdf1p trungha 28-08-2009 87 6   Download

  • In 2009, more than 370,000 patients were treated with maintenance hemodialysis in the United States.1 Hemodialysis patients require a vascular access, which can be a catheter or a graft or enlarged blood vessel that can be punctured to remove and replace blood. Bacteremias and localized infections of the vascular access site are an important cause of morbidity and mortality in hemodialysis patients.

    pdf6p giamdocamnhac 06-04-2013 28 4   Download

  • There are presently two ways that BACnet can be “spoken” over the public network, and these two methods are prescribed in the BACnet standard in Annex H and Annex J (BACnet/IP). For Annex H communication, a BACnet message destined for a remote BACnet network that must traverse a public network is sent by a tunneling mechanism.

    pdf11p khongmuonnghe 04-01-2013 18 2   Download

Đồng bộ tài khoản