intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Using network communications

Xem 1-20 trên 21 kết quả Using network communications
  • This study explores the use of teacher reflective practice, teacher networking and teacher collaboration, beyond formal ICT training, through blog-based professional development of English teachers in the Mumbai region of India. Using data collected from 32 teachers in three private schools of Mumbai, through ICT interactive workshop observations, questionnaires, interviews and blog comments, the case study explains whether and why blogging, as a learning community, has potential to add significant value to existing professional development of English teachers in Mumbai.

    pdf187p runthenight05 01-03-2023 10 3   Download

  • In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.

    pdf185p runthenight04 02-02-2023 7 2   Download

  • The research focuses on consumer intentions for eWOM and purchase in the period of internet connection. Therefore, targeted objects are identified as individual consumers from over 18 years of age, who are currently using social networks or online communication platforms, and can independently making purchase decision (called for connected spenders).

    pdf24p trinhthamhodang1217 14-01-2021 34 3   Download

  • In this thesis, we investigate the problem of IoT services deployment in Cloud-Fog system to provide IoT services with minimal resource usage cost. We for-mulate the problem using a Mixed-Integer Linear Programming model taking into account the characteristics of computing and transmission resources in Cloud-Fog system as well as the IoT services specific requirements.

    pdf55p tamynhan0 04-07-2020 13 3   Download

  • Chapter summary: DHCP assigns IP addresses by using automatic, manual, or dynamic allocation; DNS resolves host and domain names into IP addresses; WINS resolves NetBIOS names into IP addresses; ping tests whether one computer running TCP/IP can communicate with another computer on the network;...and other contents.

    pdf10p tangtuy08 21-04-2016 44 3   Download

  • Nowadays, information technology is applied in large range of real life from economics, education, healthcare, agriculture to geotechnical, military, Astronomers. It helps people not only in communication but also solve complicated problems. Power of information technology is uncompromising. Trying to use benefit of information technology is always making more benefits. In higher education, on the last year at university, most of students must find internship address to practice as a required subject.

    pdf50p vietnt 20-06-2013 73 14   Download

  • IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997 and has had subsequent amendments. These standards provide the basis for wireless network products using the Wi-Fi brand.

    ppt18p muathu_102 28-01-2013 57 5   Download

  • Part of an overall Firewall strategy Sits between the local network and the external network Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance Primary mission is now to insure anonymity of internal users Still used for caching of frequently requested files Also used for content filtering Acts as a go-between, submitting your requests to the external network Requests are translated from your IP address to the Proxy’s IP address E-mail addresses of internal users are removed from request headers Cause an actual brea...

    ppt15p muathu_102 28-01-2013 79 4   Download

  • Used to communicate IP status and error messages between hosts and routers Uses IP to route its messages between hosts Must be implemented with IP remember, IP is just a packet delivery system transmits and routes datagrams from sources to destinations through a series of interconnected networks it has a checksum in the IP header to detect lost bits no error detection on the datagram payload though but has no native mechanism for source host notification This is where ICMP comes in its used to report IP errors to the source host ICMP data is carried as the payload of an IP datagram specifie...

    ppt19p muathu_102 28-01-2013 51 3   Download

  • Although allostery plays a central role in driving protein–DNA interac-tions, the physical basis of such cooperative behavior remains poorly understood. In the present study, using isothermal titration calorimetry in conjunction with site-directed mutagenesis, we provide evidence that an intricate network of energetically-coupled residues within the basic regions of the Jun-Fos heterodimeric transcription factor accounts for its allosteric binding to DNA.

    pdf15p cosis54 05-01-2013 34 3   Download

  • Tuyển tập các báo cáo nghiên cứu về y học được đăng trên tạp chí y học quốc tế cung cấp cho các bạn kiến thức về ngành y đề tài: Using an agent-based model to analyze the dynamic communication network of the immune response...

    pdf25p toshiba17 28-10-2011 40 4   Download

  • Regardless of their basic purpose, virtually all e-commerce sites rest on the same network structures, communication protocols, and Web standards. This infrastructure has been under development for over 30 years. This appendix briefly reviews the structures, protocols and standards underlying the millions of sites used to sell to, service, and chat with both customers and business partners. It also looks at the infrastructure of some newer network applications, including streaming media and peer-to-peer (P2P)....

    doc14p bttanh4084857 19-12-2010 102 20   Download

  • This chapter describes the joint application of two soft computing methods – evolutionary algorithms and fuzzy reasoning – to the problem of adaptive distributed routing control in packet-switched communication networks. In this problem, a collection of geographically distributed routing nodes are required to adaptively route data packets so as to minimise mean network packet delay. Nodes reach routing decisions locally using state measurements which are delayed and necessarily only available at discrete sampling intervals. ...

    pdf14p tienvovan 11-09-2010 68 5   Download

  • The telecommunications access network is the section of the network that connects the local exchange to the customers. At present most of the access network is composed of low bandwidth copper cable. Electronic communications are becoming an essential feature of life both at home and at work. The increasing use of applications that require larger bandwidths (such as the internet and video on demand) are making the copper infrastructure inadequate. These demands could be met using optical fibre technologies....

    pdf19p tienvovan 11-09-2010 85 6   Download

  • THE HISTORY OF TELECOMMUNICATIONS According to UNESCO statistics, in 1997, there were 2.4 billion radio receivers in nearly 200 countries. The figure for television was 1.4 billion receivers. During the same year, it was reported that there were 822 million main telephone lines in use world-wide. The number of host computers on the Internet was estimated to be 16.3 million [1]. In addition to this, the military in every country has its own communication network which is usually much more technically sophisticated than the civilian network. ...

    pdf16p tienvovan 11-09-2010 89 14   Download

  • Trafic Monitoring and Forecasting Having explained the underlying principles of electrical communication and the statistical ‘laws’ oftelecommunicationstraffic, we cannowconsiderthepracticaldesignandoperationof networks. A prime concern is to ensure that there are adequate resources to meet the traffic demand, or to prioritize the use of resources when shortfalls are unavoidable. Two things have to be done to keep abreast of demand.

    pdf16p huggoo 20-08-2010 87 3   Download

  • Wireless protocols A MAC protocol for a wireless LAN provides two types of data-transfer Service Access Points (SAP): network and native. The network SAP offers an access to a legacy network protocol (e.g., IP). The native SAP provides an extended service interface that may be used by custom network protocols or user applications capable of fully exploiting the protocol specific Quality of Service (QoS) parameters within the cell service area. Broadband Radio Access Integrated Network (BRAIN) is used for millimeter wave band multimedia communications....

    pdf17p huggoo 20-08-2010 88 4   Download

  • Summary and Introduction Broadband wireless communications have gained an increased interest during the last few years. This has been fuelled by a large demand on high frequency utilisation as well as a large number of users requiring simultaneous high data rate access for the applications of wireless mobile Internet and e-commerce.

    pdf9p doroxon 18-08-2010 86 7   Download

  • An Ad-hoc network or Independent Basic Service Set (IBSS) is a simple network where communications are established between two or more wireless nodes or Stations ( STAs) in a given coverage area without the use of an Access Point (AP) or server. The STAs recognize each other and communicate directly with each other on a peer-to-peer level.

    pdf19p longmontran 15-01-2010 118 16   Download

  • This term describes the use of an alternative communications path, such as a telephone connection, when the primary one is not available.

    pdf10p thachsaudoi 23-12-2009 79 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1474 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
9=>0