Uses of computer networks

Xem 1-20 trên 1166 kết quả Uses of computer networks
  • Uses of computer networks, network hardware, network software, reference models, example networks, example networks,... As the main contents of the document "Computer networks". Invite you to consult the document for more documents serving the academic needs and research.

    pdf962p thuyhuynh1702 08-12-2015 36 8   Download

  • Bài giảng Computer Networks 1 (Mạng Máy Tính 1): Lecture 1 - Introduction to Computer Networks bao gồm những nội dung về Uses of Computer Networks, Business Applications of Networks, Home Network Applications, Mobile Network Users, Network Hardware.

    pdf58p cocacola_17 09-12-2015 61 1   Download

  • Lecture "Computer networks 1 - Lecture 1: Introduction to computer networks" has contents: Uses of computer networks, business applications of networks, home network applications, mobile network users, metropolitan area networks,... and other contents.

    pdf58p larachdumlanat 27-10-2020 5 0   Download

  • The use of neural networks is permeating every area of signal processing. They can provide powerful means for solving many problems, especially in nonlinear, real-time, adaptive, and blind signal processing. The Handbook of Neural Network Signal Processing brings together applications that were previously scattered among various publications to provide an up-to-date, detailed treatment of the subject from an engineering point of view.

    pdf50p ken333 28-06-2012 88 12   Download

  • After you read chapter 8 you should be able to: Discuss the purpose of the components required for successful communications; describe these uses of computer communications: wireless messaging services, wireless Internet access points, cybercafés, global positioning systems, collaboration, groupware, voice mail, and Web services; differentiate among types of networks: LANs, MANs, and WANs;...

    pdf46p kiepnaybinhyen_04 15-12-2015 36 4   Download

  • Discovering Computers - Chapter 9: Communications and Networks includes Communications, Uses of Computer Communications, Networks, Network Communications Standards, Communications Software, Communications Over the Telephone Network.

    pdf49p maiyeumaiyeu25 16-12-2016 24 1   Download

  • In this paper, we propose a Learnable Model for Anomaly Detection (LMAD), as an ensemble real-time intrusion detection model using incremental supervised machine learning techniques. Such techniques are utilized to detect new attacks. The proposed model is based on making use of two different machine learning techniques, namely, decision trees and attributional rules classifiers.

    pdf9p byphasse043256 21-03-2019 21 0   Download

  • Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.[1] Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves. This implementation takes place at the physical level (layer) of the OSI model network structure....

    ppt47p acxelopanh 01-12-2009 277 160   Download

  • Welcome to Wireless Home Networking For Dummies. Wireless networking for personal computers is not really a new idea; it’s been around for at least five years. The emergence of an industry standard, however, has caused the use of wireless networking technology to explode. One of the most appealing things about the current crop of wireless networking equipment is the ease with which you can set up a home network, but its reasonable price might be the most attractive aspect of all. Setting up a wireless home network can be both inexpensive and easy.

    pdf387p tailieuvip13 19-07-2012 77 14   Download

  • The Little Black Book of Computer Viruses has seen five good years in print. In those five years it has opened a door to seriously ask the question whether it is better to make technical information about computer viruses known or not. When I wrote it, it was largely an experiment. I had no idea what would happen. Would people take the viruses it contained and rewrite them to make all kinds of horrificly destructive viruses? Or would they by and large be used responsibly?

    pdf0p huyhoang 06-08-2009 115 13   Download

  • A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we’d like people to use our book!) If you post any slides in substantially unaltered form on a www...

    ppt70p lovewateruni 10-08-2012 99 11   Download

  • This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems. The authors propose a comprehensive mathematical construction of the foundations of stochastic network theory: Markov chains, continuous time Markov chains are extensively studied using an original martingale-based approach.

    pdf385p titatu_123 01-03-2013 53 8   Download

  • Tham khảo tài liệu 'linux device drivers-chapter 10 :judicious use of data types', công nghệ thông tin, hệ điều hành phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf23p kaka 29-07-2010 70 7   Download

  • (bq) computational network science seeks to unify the methods used to analyze these diverse fields. this book provides an introduction to the field of network science and provides the groundwork for a computational, algorithm-based approach to network and system analysis in a new and important way.

    pdf46p bautroibinhyen19 02-03-2017 27 4   Download

  • Objective: Describe the role of dynamic routing protocols and place these protocols in the context of modern network design. Identify several ways to classify routing protocols. Describe how metrics are used by routing protocols and identify the metric types used by dynamic routing protocols.

    ppt31p xaydungk23 19-04-2016 30 3   Download

  • The objectives of this chapter: Describe the background and basic features of OSPF. Identify and apply the basic OSPF configuration commands. Describe, modify and calculate the metric used by OSPF. Describe the Designated Router/Backup Designated Router (DR/BDR) election process in multiaccess network. Describe the uses of additional configuration commands in OSPF.

    ppt45p xaydungk23 19-04-2016 36 3   Download

  • Tham khảo tài liệu 'notes on the use of hand-held test devices for installation of the krone cat.6 km8 products', công nghệ thông tin, phần cứng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf9p thanhha 27-08-2009 62 2   Download

  • The purpose of current study is presenting a framework for implementation of wireless networks in hospitals to use in nursing care. In the proposed framework, implementation key aspects that include the purpose, application domains, and the functions of wireless terminals, network technology, mobile devices, user interface and the information structure of the system have described in the logical framework. Because, the framework has presented based on scientific principles and the experiences of other countries, it can be an appropriate framework for future efforts in this field.

    pdf9p byphasse043256 21-03-2019 19 0   Download

  • In the case of wireless networks the scheduling decisions are made using counters called shadow queues. The results are also extended to the case of networks that employ simple forms of network coding. In that case, our algorithm provides a low-complexity solution to optimally exploit the routing–coding tradeoff.

    pdf5p byphasse043256 21-03-2019 10 0   Download

  • The conventional methods such as firewalls, encryption is no longer adequate. In this paper, we identify three types of threats against AODV which influence the routing message in MANET. Our solution is based on the use of Time based Finite State Machine to identify correct and malicious behavior in AODV. The TFSM have been modelled using JFLAP and simulated in MANET environment using C#.

    pdf8p byphasse043256 22-03-2019 20 0   Download



p_strKeyword=Uses of computer networks

nocache searchPhinxDoc


Đồng bộ tài khoản