intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Communication architecture

Xem 1-20 trên 43 kết quả Communication architecture
  • This presentation will introduce the smart urban formation process with ideas and operational models. At the same time, we will introduce a smart city rating system based on the role of urban government and the community; thus, we will find the existing and building of the development orientation. Finally, we will present a case study to applying smart city model in Hanoi capital, Vietnam in the trend of sustainable development in the future.

    pdf8p vibecca 01-10-2024 6 2   Download

  • Over the past decade virtual reality (VR), augmented reality (AR), and mixed reality (MR) technologies have been applied to the construction industry. In this paper, examples of the application of MR technology will be introduced to further clarify how this technology changed the geotechnical industry.

    pdf4p vibecca 01-10-2024 1 1   Download

  • This study, which focuses on vocabulary teaching methods, is going to investigate the application of multimodality to the vocabulary learning of students from the perspectives of using images in some communicative activities to enhance students‟ vocabulary retention. The major aim of the research is to investigate whether the use of images in vocabulary teaching can help improve students‟ vocabulary retention. The participants in the study are students at Hanoi Architectural University.

    pdf86p closefriend09 16-11-2021 31 6   Download

  • Architecting the T elecommunication Evolution: T oward Converged Network Services Vijay K.

    pdf334p nt18104 30-05-2013 56 7   Download

  • Trường Đại học Bách Khoa Hà Nội Hanoi University of Science and Technology Hệ thông Thông tin Hàng Không TS. Đỗ Trọng Tuấn Bộ môn Kỹ thuật thông tin © HUST 2012 .Trường Đại học Bách Khoa Hà Nội Hanoi University of Science and Technology Hệ thống Thông tin Hàng Không © HUST 2012 .Teminologies ATN: Aeronautical Telecommunications Network AFTN: Aeronautical Fix Telecommunications Network AMHS: Air Traffic Service Message Handling System 3 .Development Trends .

    pdf27p hanampro91 10-05-2013 107 7   Download

  • Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication between devices. A communication architecture, therefore, defines a standard for the communicating hosts. A programmer formats data in a manner defined by the communication architecture and passes it on to the communication software. Separating communication functions adds flexibility, for example, we do not need to modify the entire host software to include more communication devices....

    ppt18p doanhung_dtvtk10 19-03-2013 67 5   Download

  • Establishing a network performance baseline requires collecting key performance data from the ports and devices that are essential to network operation.1 Gather symptoms - Troubleshooting begins with the process of gathering and documenting symptoms from the network, end systems, and users. Stage 2 Isolate the problem - The problem is not truly isolated until a single problem, or a set of related problems, is identified.

    pdf66p mrdvad11 12-03-2013 170 55   Download

  • Static NAT – Mapping an unregistered IP address to a registered IP address on a one-to-one basis. Particularly useful when a device needs to be accessible from outside the network.Dynamic NAT – Maps an unregistered IP address to a registered IP address from a group of registered IP addresses. Dynamic NAT also establishes a one-to-one mapping between unregistered and registered IP address, but the mapping could vary depending on the registered address available in the pool, at the time of communication....

    pdf81p mrdvad11 12-03-2013 148 53   Download

  • The Data-over-Cable Service Interface Specification (DOCSIS)is an international standard developed by CableLabs, a non-profit research and development consortium for cable-related technologies. • DOCSIS specifies the OSI Layer 1 and Layer 2 requirements: Physical layer-For data signals that the cable operator can use, DOCSIS specifies the channel widths (bandwidths of each channel) as 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, 3.2 MHz, and 6.4 MHz. DOCSIS also specifies modulation techniques (the way to use the RF signal to convey digital data).

    pdf47p mrdvad11 12-03-2013 136 54   Download

  • Limit network traffic to increase network performance. For example, if corporate policy does not allow video traffic on the network, ACLs that block video traffic could be configured and applied. This would greatly reduce the network load and increase network performance. 2. Provide traffic flow control. ACLs can restrict the delivery of routing updates. If updates are not required because of network conditions, bandwidth is preserved. 3. Provide a basic level of security for network access.

    pdf67p mrdvad11 12-03-2013 145 55   Download

  • The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn’t stake my life on it….An open security model is the easiest to implement . Simple passwords and server security become the foundation of this model. If encryption is used, it is implemented by individual users or on servers.

    pdf143p mrdvad11 12-03-2013 156 59   Download

  • Frame Relay has become the most widely used WAN technology in the world. Large enterprises, governments, ISPs, and small businesses use Frame Relay, primarily because of its price and flexibility. •Moreover, Frame Relay provides greater bandwidth, reliability, and resiliency than private or leased lines. •Frame Relay reduces network costs by using less equipment, less complexity, and an easier implementation.

    pdf57p mrdvad11 12-03-2013 116 52   Download

  • Computers make use of relatively short parallel connections between interior components, but use a serial bus to convert signals for most external communications.In a parallel connection, it is wrong to assume that the 8 bits leaving the sender at the same time arrive at the receiver at the same time. Rather, some of the bits get there later than others. This is known as clock skew.

    pdf65p mrdvad11 12-03-2013 102 50   Download

  • An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Managament agent Management information base Network Management protocol Get, Set and Notify

    ppt20p muathu_102 28-01-2013 71 3   Download

  • Client-Server Application Connection Oracle Net enables a network connection between a client and an Oracle database server. Oracle Net is a software component that resides on both the client and on the Oracle database server. It is layered on top of the network protocol. When a connection is initiated from a client to the Oracle database server, data is passed down a stack on the client, over the network, and up a similar stack to the Oracle database server.

    ppt18p trinh02 28-01-2013 67 6   Download

  • Two-Tier Networks In a two-tier network, a client communicates directly with a server. This is also known as a client-server architecture. A client-server network is an architecture that involves client processes that request services from server processes. The client and server communicate over a network using a given protocol, which must be installed on both the client and the server. A common error in client-server network development is to prototype an application in a small, two-tier environment and then scale up by adding more users to the server.

    ppt26p trinh02 28-01-2013 56 5   Download

  • Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries

    pdf0p doilan 25-01-2013 58 5   Download

  • Firewall (construction), a barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse Firewall (automobile), the part of the vehicle that separates the engine from the driver and passengers Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts

    pdf0p doilan 25-01-2013 60 5   Download

  • Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity of the network Congestion control aims to keep number of packets below level at which performance falls off dramatically Data network is a network of queues Generally 80% utilization is critical Finite queues mean data may be lost

    ppt45p trada85 18-01-2013 37 4   Download

  • Source generates data to be transmitted Transmitter Converts data into transmittable signals Transmission System Carries data Receiver Converts received signal into data Destination Takes incoming data

    ppt41p trada85 18-01-2013 59 7   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2