Gotowa bibliografia na temat „Wide Local Area Network”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Wide Local Area Network”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Wide Local Area Network"

1

Sánchez-García, Jaime, Luis A. Villaseñor-González, Mario E. Vaquera-Flores i Raúl Aquino-Santos. "Handoff Between a Wireless Local Area Network (WLAN) and a Wide Area Network (UMTS)". Ingeniería, investigación y tecnología 10, nr 2 (1.04.2009): 167–84. http://dx.doi.org/10.22201/fi.25940732e.2009.10n2.016.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

BAYRAK, TUNCAY, i MARTHA R. GRABOWSKI. "SAFETY-CRITICAL WIDE AREA NETWORK PERFORMANCE EVALUATION". International Journal of Information Technology & Decision Making 02, nr 04 (grudzień 2003): 651–67. http://dx.doi.org/10.1142/s0219622003000823.

Pełny tekst źródła
Streszczenie:
There has been a considerable amount of research in the area of network performance evaluation. However, little of the research is focused on the evaluation of real-time safety-critical WANs, a need that motivated this research. Over the years, networks have been evaluated by different disciplines from different perspectives. Many of these evaluations focus on network technical performance, or an organization's performance when using a network, or individual users' performance when using a network. In this study, network performance was measured using empirical data from an operational WAN and by utilizing well-defined and well-known network performance metrics such as reliability, availability, and response time. In general, increased use of a real-time WAN in this study was associated with negative impacts on WAN performance and increased redundancy was generally associated with positive impacts, allowing greater system usage and higher network workload, as intended. The impacts of increasing redundancy on MTBF were mixed, as were the MTTR impacts; availability values varied considerably by port. The network performance data thus shows mixed empirical results from increases in network usage and redundancy, which highlights the importance of managing and measuring network performance at both the system and the local level.
Style APA, Harvard, Vancouver, ISO itp.
3

Alani, Talah Oday, i Ameer Mosa Al-Sadi. "Survey of optimizing dynamic virtual local area network algorithm for software-defined wide area network". TELKOMNIKA (Telecommunication Computing Electronics and Control) 21, nr 1 (1.02.2023): 77. http://dx.doi.org/10.12928/telkomnika.v21i1.24249.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Schosser, R., C. Weiss i K. Messmer. "A Local Area Network for Medical Research; Planning, Realization and Experience". Methods of Information in Medicine 30, nr 01 (1991): 53–64. http://dx.doi.org/10.1055/s-0038-1634811.

Pełny tekst źródła
Streszczenie:
This report focusses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing “official” (e.g., IEEE 802.3) and “de facto” standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users’ demands.
Style APA, Harvard, Vancouver, ISO itp.
5

Malaney, Gary D. "The Design and Implementation of Local and Wide Area Networks in Student Affairs". Journal of Educational Technology Systems 20, nr 3 (marzec 1992): 231–39. http://dx.doi.org/10.2190/alwd-c6r0-q8mm-8cbb.

Pełny tekst źródła
Streszczenie:
Local and wide area networks on college campuses in general and in student affairs in particular still represent a relatively new technology. Accordingly, literature on the design and operation of these computer systems is just beginning to appear in the academic computing journals. The purpose of this article is to contribute to the literature on networks by describing the design and implementation of a wide area network within a large division of student affairs at a major research university.
Style APA, Harvard, Vancouver, ISO itp.
6

Hyeon Kim, Ki, Dongkyun Kim, Yong Hwan Kim i Joobum Kim. "Performance measurement using dpdk in software-defined local and wide area networks". International Journal of Engineering & Technology 7, nr 2.12 (3.04.2018): 119. http://dx.doi.org/10.14419/ijet.v7i2.12.11105.

Pełny tekst źródła
Streszczenie:
Background/Objectives: For data center-based enterprises, the use of data traffic continues to increase. As a result, the increasingly efficient processing of increasing data traffic is becoming a major issue. Effective processing of traffic can be performed through the addition of physical network equipment, but this requires considerable costs.Methods/Statistical analysis: To solve this problem, researches on server virtualization and network virtualization technology are being actively conducted. However, while network virtualization is a cost-effective solution, open-source virtual switches used in network virtualization technologies have the performance penalty because they handle packets at the kernel of server's operating system. As a result, the Intel has developed the Data Plane Development Kit (DPDK) technology to address the performance degradation of the operating system.Findings: In this paper, we propose the DPDK performance test environment based on Open Virtual Switch (OVS) to verify the stability and performance of the DPDK-oriented virtualization technology, in association with a new KREONET-S project which aims tothe softwarization of the Korea Research Environment Open Network (KREONET) infrastructure.Improvements/Applications: We perform conducted experiments on Software-Defined Local Area Network (LAN) and Wide Area Network (WAN) environment using KREONET-S show the result.
Style APA, Harvard, Vancouver, ISO itp.
7

Sharifullina, Albina Y., Roman R. Galyamov i Rimma S. Zaripova. "TECHNICAL PRINCIPLES FOR CREATING A WIRELESS LOCAL NETWORK WI-FI". T-Comm 15, nr 7 (2021): 28–33. http://dx.doi.org/10.36724/2072-8735-2021-15-7-28-33.

Pełny tekst źródła
Streszczenie:
This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.
Style APA, Harvard, Vancouver, ISO itp.
8

Cohen, Jeffrey, i Kyusang Lee. "DIGITAL EEG VIA LOCAL AND WIDE AREA NETWORKS". Journal of Clinical Neurophysiology 16, nr 2 (marzec 1999): 178. http://dx.doi.org/10.1097/00004691-199903000-00042.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ogbimi, Voke, i Emuejevoke Francis. "An Improved Error Control Model in Packet Switched Wide Area Networks". Transactions on Networks and Communications 7, nr 4 (8.11.2019): 01–18. http://dx.doi.org/10.14738/tnc.74.7263.

Pełny tekst źródła
Streszczenie:
Error is an important problem in communication that occurs in shared networks when a packet fails to arrive at the destination or it arrives at the destination but some of the bits are in error or have been altered. In typical packet switched wide area networks, this can occur quite easily when output links are slower than inputs and multiple traffic sources competing for same output link at the same time. Typical for packet switched WAN, the packet transmit input/output buffer and queue of the network devices in their way towards the destination. Moreover, these networks are characterized by the fact that packets often arrive in “burst”. The buffers in the network devices are intended to assimilate these traffic hosts until they can be processed. Nevertheless, the available buffers in the network nodes may fill up rapidly if the network traffic is too high which in turn may lead to discarded packets. The situation cannot be avoided by increasing the size of the buffers, since unreasonable buffer size will lead to excessive end-to-end (e2e) delay. A typical scenario for congestion occurs where multiple incoming link feed into single outgoing link (e.g several Local Area Networks connected to Wide Area Networks). The routers of the networks are highly susceptible for traffic congestion because they are too small for the amount of traffic required to handle. This paper presented general concepts of Error Control and its mechanisms and its application to packet switched wide area networks An improved model was proposed with reduced error while transmitting packets from one channel to the other. Simulating the model for reducing error control in packet switched wide area networks increased the number of messages, reduced response time used in transmitting and receiving packets, reduced network utilization.
Style APA, Harvard, Vancouver, ISO itp.
10

Levins, Jess W. "Converting Remote Distribution Centers to a Frame Relay Based Wide Area Network". Project Management Journal 29, nr 1 (marzec 1998): 44–52. http://dx.doi.org/10.1177/875697289802900109.

Pełny tekst źródła
Streszczenie:
This case study reviews a project that involved the selection and installation of a new information system for unifying four auto parts distribution centers within an overall corporate system. The system consists of local area networks joined together in a wide area network utilizing Fractional T1s and frame relay technology. The project included the implementation of a warehouse management system with radio frequency bar code scanners integrated with inventory, operating and other software for enhancing overall warehouse management.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Wide Local Area Network"

1

Robeson, Bridget M. "A local area network & wide area network design". Master's thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-12232009-020117/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Voelker, Geoffrey Michael. "Cooperative caching in local-area and wide-area networks /". Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/7010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hill, Kevin Carlos. "Design of a local area network and a wide area network to connect the US Navy's training organization". Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020032/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Yang, Yue Carleton University Dissertation Engineering Electrical. "Performance evaluation of an integrated FDDI-ATM-FDDI network". Ottawa, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Laird, Daniel, i Kip Temple. "INSTRUMENTING AN AIRBORNE NETWORK TELEMETRY LINK". International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604244.

Pełny tekst źródła
Streszczenie:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California
The Central Test and Evaluation Investment Program (CTEIP) Integrated Network Enhanced Telemetry (iNET) program is currently testing a wireless local area networking (WLAN) in an L-band telemetry (TM) channel to evaluate the feasibility and capabilities of enhancing traditional TM methods in a seamless wide area network (WAN). Several advantages of networking are real-time command and control of instrumentation formats, quick-look acquisition, data retransmission and recovery (gapless TM) and test point real-time verification. These networking functions, and all others, need to be tested and evaluated. The iNET team is developing a WLAN based on 802.x technologies to test the feasibility of the enhanced telemetry implementation for flight testing.
Style APA, Harvard, Vancouver, ISO itp.
6

Lungaro, Pietro. "Self-organization, cooperation and control distribution in wide and local area networks". Licentiate thesis, KTH, Communication Systems, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4533.

Pełny tekst źródła
Streszczenie:

To support the future requirements on wireless systems in an affordable manner it is commonly believed that multiple radio access technologies have to be combined. These technologies can be deployed by a single operator or, even, be managed by different competing operators. In order to cope with the increased complexity of such a multifaced wireless environment it has been argued that a transfer of Radio Resource Management (RRM) functionalities towards the network edges (access ports and, ultimately, user terminals) may be beneficial. In addition to detecting varying system conditions in a faster manner this would also allow a more responsive service adaptation. In this thesis we evaluate a set of self-organizing regimes, all with the purpose of supporting the distribution of control at the edge node.

Particular emphasis is put on the design of a mechanism for dynamically establishing cooperation between different network entities whether these are access ports or user terminals.

Terminal cooperation by means of multihopping is considered in the context of service provision in cellular access systems. Previously the opportunity cost associated with sharing own bandwidth, and energy loss have been seen as a major obstacle for relaying other users’ traffic. To mitigate the effects of this selfish behavior the concept of resource delegation is introduced and evaluated in combination with a rewarding scheme designed for compensating the energy losses induced by forwarding. The results show that our proposed schemes not only are capable of fostering significant cooperation among users, but also to create a simultaneous improvement in user utility, data rates as well as in operator revenues.

Opening up networks of user-deployed Access Points (APs) for service provision is considered a means to radically lower the cost of future wireless services. However, since these networks are deployed in an uncoordinated manner, only discontinuous coverage will be provided. The question of how dense these networks need to be, to deliver acceptable user perception, is investigated in this thesis for a set of archetypical services. The results show that already at moderate AP densities the investigated services can be provided with sufficient quality. Epidemic exchange of popular content and inter-AP cooperation are also shown to further decrease the required infrastructure density and improve the APs’ utilization respectively.

As last contribution, “Word-of-Mouth”, a distributed reputation-based scheme, is investigated in the context of access selection in multi-operator environments. By exchanging information concerning the Quality of Service (QoS) associated with the different networks, terminal agents can collectively reveal the capabilities of individual networks. For a vertical handover scenario we show that our proposed scheme can reward access providers capable of ensuring some degrees of QoS. By introducing a model for collusion, between low performing APs and terminal agents, we show that our proposed scheme is also robust to the dissemination of false information.

Style APA, Harvard, Vancouver, ISO itp.
7

Topol, Brad Byer. "A framework for the development of wide area distributed applications". Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/8300.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Chew, Zhen Bob. "Modelling message-oriented-middleware brokers using autoregressive models for bottleneck prediction". Thesis, Queen Mary, University of London, 2013. http://qmro.qmul.ac.uk/xmlui/handle/123456789/8832.

Pełny tekst źródła
Streszczenie:
Message brokers are the backbone of modern publish subscribe messaging systems. These brokers can degrade or fail for a variety of reasons. This research specifically looks at the detection, prediction and mitigation of bottlenecks in brokers. The message-oriented-middleware framework here uses either a cluster of brokers on a Local Area Network (LAN) or a federation of brokers on a Wide Area Network (WAN) to route messages, facilitate multicasting and ameliorate demand surges and geographically related faults. Sensors have been constructed to monitor brokers and controllers to run the bottleneck detection algorithms. An overlay manager controls broker and topic pairing. Each topic is assigned a primary and secondary broker. When a failure is predicted, the overlay manager routes messages from the failing broker by switching topics to its secondary broker(s). The application for bottleneck forecasting is to allow us to pre-empt a broker failure and hence reroute messages to other brokers to increase resilience and reliability. The key contributions of this research are an abstract model of message-oriented-middleware broker based on the Apache Qpid message broker coupled with the use of analytical autoregressive exogenous (ARX) models that describes the broker behaviour during bottleneck conditions. The Apache Qpid message broker is a message broker that implements the Advanced Message Queuing Protocol (AMQP) for publish-subscribe messaging. ARX models are autoregressive models where the output depends on the previous output as well as external stimuli. These components are integrated to produce a generalised technique for calibrating broker performance and detection of bottlenecks in the broker. This research show how models were initially constructed using a complete range of input data. As bottlenecks occur only when the broker is heavily loaded, input data during idle periods can cause corruption to the model fit. Models were constructed with segmented input data, with each segment covering the range of one peak period. The segmented input allows the modelling of the broker behaviour only when it is experiencing a bottleneck. The result of this is a much-improved fit of the predictive models. The work here is compared against previous work using Markov-chains for creating predictive models. The results of both approaches are compared and reported.
Style APA, Harvard, Vancouver, ISO itp.
9

Sun, Zhaohui, i n/a. "Improving Security in WLAN With the Use of Smart Antennas". Griffith University. School of Engineering, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070115.143811.

Pełny tekst źródła
Streszczenie:
Wireless communication systems are increasingly deployed by family, businesses, government and SOHO users because of the freedom wireless communications afford, simplicity of installation and ease of use. Along with its rapid development, the security problem in wireless communication network has attracted more and more attention. It has been estimated that the IEEE 80.211 standard is susceptible to attacks both on data content and user authentication, such as eavesdropping, spoofing and Denial of Service. These attacks are due to the standard's inherent flaws and space signal sharing caused by the omni-directional antenna it usually uses. In recent years, few studies have been undertaken which examine the use of the smart directional antenna to mitigate the security risks in mobile wireless computing networks. One of the major reasons is the antenna size, as portability is a key requirement. Due to the dielectric-material embedding and FDTD optimal design technology, a smart antenna with controllable directionality can now achieve an overall volume reduction of 80%. This has promise for application in the wireless security realm. This thesis provides a conventional background in wireless computing networks and security theory. In addition, security level definition, program in Matlab™ and corresponding experimental results are provided. To show the effectiveness of improving security in WLAN with the use of a smart directional antenna, this thesis proposes a model for predicting electromagnetic environments using a directional transmission antenna based on the Finite Element method. To validate the numerical results, a new experimental method (using Network Stumbler software) to measure the signal strength in different locations is introduced. Results from experiments using the two methods are consistent. The latter method gives the users the possibility of using a laptop (with an appropriate wireless card, software and roguing around) to detect the real-time signal strength in different locations instead of using expensive measure apparatus. Such an advantage can be valuable for the efficient implementation of indoor wireless networks for security purposes. Finally, it contributes a security solution using DE-ESMB and DE-ESPAR smart antennas in WLAN. Through these simulated and experimental results, one can conclude that the security performance in WLAN can be greatly improved by using smart directional antenna. There are five chapters in this thesis: Chapter 1 introduces the wireless communication network. Information about architecture, topology and popular wireless standards is presented in this chapter. Chapter 2 investigates the security problem in IEEE 802.11 Standards. Recent improvements in security, and their limitations, are also included. This problem is investigated by performing laboratory experiments, including a real attack on 802.11 Standards and packet capture experiments using AiroPeek NX software. Chapter 3 describes the useful parameters of smart directional antennas, and then presents the security level definition in WLAN. Simple software in Matlab™ to determine the security level according to the beamwidth of the adopted antenna is also introduced. Chapter 4 is the important part of this thesis. Simulation results of signal strength in different locations using FEMLAB™ are presented, which are consistent with the follow-up experimental results carried out in a typical office area. This chapter also describes the final security solution using the newly-designed DE-ESMB and DE-ESPAR directional antennas. Chapter 5 is a summary of the thesis. It presents the conclusions and suggests area of future research for improving the security level using smart antennas in WLAN.
Style APA, Harvard, Vancouver, ISO itp.
10

Sun, Zhaohui. "Improving Security in WLAN With the Use of Smart Antennas". Thesis, Griffith University, 2006. http://hdl.handle.net/10072/366543.

Pełny tekst źródła
Streszczenie:
Wireless communication systems are increasingly deployed by family, businesses, government and SOHO users because of the freedom wireless communications afford, simplicity of installation and ease of use. Along with its rapid development, the security problem in wireless communication network has attracted more and more attention. It has been estimated that the IEEE 80.211 standard is susceptible to attacks both on data content and user authentication, such as eavesdropping, spoofing and Denial of Service. These attacks are due to the standard's inherent flaws and space signal sharing caused by the omni-directional antenna it usually uses. In recent years, few studies have been undertaken which examine the use of the smart directional antenna to mitigate the security risks in mobile wireless computing networks. One of the major reasons is the antenna size, as portability is a key requirement. Due to the dielectric-material embedding and FDTD optimal design technology, a smart antenna with controllable directionality can now achieve an overall volume reduction of 80%. This has promise for application in the wireless security realm. This thesis provides a conventional background in wireless computing networks and security theory. In addition, security level definition, program in Matlab™ and corresponding experimental results are provided. To show the effectiveness of improving security in WLAN with the use of a smart directional antenna, this thesis proposes a model for predicting electromagnetic environments using a directional transmission antenna based on the Finite Element method. To validate the numerical results, a new experimental method (using Network Stumbler software) to measure the signal strength in different locations is introduced. Results from experiments using the two methods are consistent. The latter method gives the users the possibility of using a laptop (with an appropriate wireless card, software and roguing around) to detect the real-time signal strength in different locations instead of using expensive measure apparatus. Such an advantage can be valuable for the efficient implementation of indoor wireless networks for security purposes. Finally, it contributes a security solution using DE-ESMB and DE-ESPAR smart antennas in WLAN. Through these simulated and experimental results, one can conclude that the security performance in WLAN can be greatly improved by using smart directional antenna. There are five chapters in this thesis: Chapter 1 introduces the wireless communication network. Information about architecture, topology and popular wireless standards is presented in this chapter. Chapter 2 investigates the security problem in IEEE 802.11 Standards. Recent improvements in security, and their limitations, are also included. This problem is investigated by performing laboratory experiments, including a real attack on 802.11 Standards and packet capture experiments using AiroPeek NX software. Chapter 3 describes the useful parameters of smart directional antennas, and then presents the security level definition in WLAN. Simple software in Matlab™ to determine the security level according to the beamwidth of the adopted antenna is also introduced. Chapter 4 is the important part of this thesis. Simulation results of signal strength in different locations using FEMLAB™ are presented, which are consistent with the follow-up experimental results carried out in a typical office area. This chapter also describes the final security solution using the newly-designed DE-ESMB and DE-ESPAR directional antennas. Chapter 5 is a summary of the thesis. It presents the conclusions and suggests area of future research for improving the security level using smart antennas in WLAN.
Thesis (Masters)
Master of Philosophy (MPhil)
School of Engineering
Full Text
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Wide Local Area Network"

1

Networking fundamentals: Wide, local, and personal area communications. Chichester, West Sussex, U.K: Wiley, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Chappell, Laura A. Novell's guide to LAN/WAN analysis: IPX/SPX. San Jose: Novell Press, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

1947-, Bracker William E., i Sarch Ray, red. Cases in network implementation: Enterprise networking. New York: Van Nostrand Reinhold, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Enterprise-wide networking. Carmel, Ind: Sams, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Madron, Thomas William. Enterprise-wide computing: How to implement and manage LANs. New York: Wiley, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Mark, Miller. Internetworking: A guide to network communications LAN to Lan, LAN to WAN. Wyd. 2. New York: M&T Books, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Mark, Miller. Internetworking: A guide to network communications : LAN to LAN, LAN to WAN. Redwood City, Calif: M&T Books, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Muller, Nathan J. LANs to WANs: Network management in the 1990s. Boston: Artech House, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Guide to building high-speed networks. Berkeley, Calif: Osborne/McGraw-Hill, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Held, Gilbert. High speed networking with LAN switches. New York: Wiley, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Wide Local Area Network"

1

Dimond, David, Robert Burgess i James Marra. "Local Area Networks and Wide Area Networks". W Health Informatics, 3–16. New York, NY: Springer New York, 1999. http://dx.doi.org/10.1007/978-1-4612-0521-0_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Higginson, P. L. "Chapter 13 Wide area internetworking". W Local Area Networks: An Advanced Course, 428–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-15191-5_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Budrikis, Z. L. "Wide Area Connectionless IEEE 802.6 MAN Services". W High-Capacity Local and Metropolitan Area Networks, 23–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-76484-4_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Eberhardt, R., C. Rueß i R. Sigle. "Performance measurements in local and wide area ATM networks". W Broadband Communications, 312–23. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35378-4_25.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Mathew, Alex, i Vijayan K. Asari. "Local Histogram Based Descriptor for Tracking in Wide Area Imagery". W Wireless Networks and Computational Intelligence, 119–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31686-9_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Nikolaidis, Ioanis. "On the Feasibility of Time-Parallel Discrete Event Simulations Over Local and Wide Area Networks". W The Kluwer International Series in Engineering and Computer Science, 39–59. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0849-6_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Weik, Martin H. "wide area network". W Computer Science and Communications Dictionary, 1921. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_21101.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Weik, Martin H. "local area network". W Computer Science and Communications Dictionary, 915. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_10451.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Weik, Martin H. "satellite wide area network". W Computer Science and Communications Dictionary, 1515. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16606.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Freer, John R. "Wide area network standards". W Computer Communications and Networks, 243–77. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1041-9_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Wide Local Area Network"

1

Angwin, A. J. "Wireless local and wide area network computing". W IEE Colloquium on Wireless Technology. IEE, 1996. http://dx.doi.org/10.1049/ic:19961120.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Freitas, Christopher J., Derrick B. Coffin i Richard L. Murphy. "Characterization of Wide Area Network Computing". W ASME 2000 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/imece2000-2110.

Pełny tekst źródła
Streszczenie:
Abstract Distributed parallel computing using message-passing techniques on Networks of Workstations (NOW) has achieved widespread use in the context of Local Area Networks (LAN). Recently, the concept of Grid-based computing using Wide Area Networks (WAN) has been proposed as a general solution to distributed high performance computing. The use of computers and resources at different geographic locations connected by a Wide Area Network and executing a real application introduces additional variables that potentially complicate the efficient use of these resources. Presented here are the results of a study that begins to characterize the performance issues of a WAN-based NOW, connecting resources that span an international border.
Style APA, Harvard, Vancouver, ISO itp.
3

Guzman, A., D. Tziouvaras, E. Schweitzer i K. Martin. "Local- and Wide-Area Network Protection Systems Improve Power System Reliability". W 2006 Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources. IEEE, 2006. http://dx.doi.org/10.1109/psamp.2006.285387.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Guzmin, A. "Local- and wide-area network protection systems improve power system reliability". W 3rd IEE International Conference on Reliability of Transmission and Distribution Networks (RTDN 2005). IEE, 2005. http://dx.doi.org/10.1049/cp:20050030.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Katsaros, Konstantinos, i George C. Polyzos. "Optimizing Operation of a Hierarchical Campus-wide Mobile Grid for Intermittent Wireless Connectivity". W 2007 15th IEEE Workshop on Local & Metropolitan Area Networks. IEEE, 2007. http://dx.doi.org/10.1109/lanman.2007.4295984.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Hamdan, Osama Abu, Scotty Strachan i Engin Arslan. "Bandwidth and Congestion Aware Routing for Wide-Area Hybrid Networks". W 2022 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). IEEE, 2022. http://dx.doi.org/10.1109/lanman54755.2022.9819986.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Yarita, Kodai, Yusuke Nakajima, Akira Yamashita, Jun Matsumoto, Satoru Okamoto i Naoaki Yamanaka. "Cache retention time change method to reduce address resolution response time in wide area Layer 2 network". W 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). IEEE, 2017. http://dx.doi.org/10.1109/lanman.2017.7972157.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Poltz, Stphen M., Scott W. Smith i David W. Ballowe. "A suppport strategy for users of a campus-wide local area network". W the 16th annual ACM SIGUCCS Conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/62548.62663.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Miao, Lihua, Wei Ding i Jian Gong. "A real-time method for detecting internet-wide SYN flooding attacks". W 2015 IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN). IEEE, 2015. http://dx.doi.org/10.1109/lanman.2015.7114740.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Eghbal, Nooshin, i Paul Lu. "Low-Variance Latency Through Forward Error Correction on Wide-Area Networks". W 2021 IEEE 46th Conference on Local Computer Networks (LCN). IEEE, 2021. http://dx.doi.org/10.1109/lcn52139.2021.9524966.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Wide Local Area Network"

1

Holmberg, David G. BACnet wide area network security threat assessment. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.7009.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Farrell, S., red. Low-Power Wide Area Network (LPWAN) Overview. RFC Editor, maj 2018. http://dx.doi.org/10.17487/rfc8376.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Makpangou, Mesaac, i Ken Birman. Designing Application Software in Wide Area Network Settings. Fort Belvoir, VA: Defense Technical Information Center, październik 1990. http://dx.doi.org/10.21236/ada228255.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Schug, Klaus. Satellite Local Area Network Inter-Satellite Link. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2000. http://dx.doi.org/10.21236/ada387200.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Wilcox, D. R. Local Area Network Distributed Realtime Clock Synchronization. Fort Belvoir, VA: Defense Technical Information Center, listopad 1991. http://dx.doi.org/10.21236/ada245177.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Bowles, David, Michael Williams, Hope Dodd, Lloyd Morrison, Janice Hinsey, Tyler Cribbs, Gareth Rowell, Michael DeBacker, Jennifer Haack-Gaynor i Jeffrey Williams. Protocol for monitoring aquatic invertebrates of small streams in the Heartland Inventory & Monitoring Network: Version 2.1. National Park Service, kwiecień 2021. http://dx.doi.org/10.36967/nrr-2284622.

Pełny tekst źródła
Streszczenie:
The Heartland Inventory and Monitoring Network (HTLN) is a component of the National Park Service’s (NPS) strategy to improve park management through greater reliance on scientific information. The purposes of this program are to design and implement long-term ecological monitoring and provide information for park managers to evaluate the integrity of park ecosystems and better understand ecosystem processes. Concerns over declining surface water quality have led to the development of various monitoring approaches to assess stream water quality. Freshwater streams in network parks are threatened by numerous stressors, most of which originate outside park boundaries. Stream condition and ecosystem health are dependent on processes occurring in the entire watershed as well as riparian and floodplain areas; therefore, they cannot be manipulated independently of this interrelationship. Land use activities—such as timber management, landfills, grazing, confined animal feeding operations, urbanization, stream channelization, removal of riparian vegetation and gravel, and mineral and metals mining—threaten stream quality. Accordingly, the framework for this aquatic monitoring is directed towards maintaining the ecological integrity of the streams in those parks. Invertebrates are an important tool for understanding and detecting changes in ecosystem integrity, and they can be used to reflect cumulative impacts that cannot otherwise be detected through traditional water quality monitoring. The broad diversity of invertebrate species occurring in aquatic systems similarly demonstrates a broad range of responses to different environmental stressors. Benthic invertebrates are sensitive to the wide variety of impacts that influence Ozark streams. Benthic invertebrate community structure can be quantified to reflect stream integrity in several ways, including the absence of pollution sensitive taxa, dominance by a particular taxon combined with low overall taxa richness, or appreciable shifts in community composition relative to reference condition. Furthermore, changes in the diversity and community structure of benthic invertebrates are relatively simple to communicate to resource managers and the public. To assess the natural and anthropo-genic processes influencing invertebrate communities, this protocol has been designed to incorporate the spatial relationship of benthic invertebrates with their local habitat including substrate size and embeddedness, and water quality parameters (temperature, dissolved oxygen, pH, specific conductance, and turbidity). Rigid quality control and quality assurance are used to ensure maximum data integrity. Detailed standard operating procedures (SOPs) and supporting information are associated with this protocol.
Style APA, Harvard, Vancouver, ISO itp.
7

Barford, Paul. Coordinated Anomaly Detection and Characterization in Wide Area Network Flows. Fort Belvoir, VA: Defense Technical Information Center, listopad 2005. http://dx.doi.org/10.21236/ada440956.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Grigoriev, M. Wide Area Network Monitoring System for HEP Experiments at Fermilab. Office of Scientific and Technical Information (OSTI), listopad 2004. http://dx.doi.org/10.2172/839914.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Eldridge, John M., i Ronald R. Olsberg. An evaluation of Access Tier local area network switches. Office of Scientific and Technical Information (OSTI), czerwiec 2004. http://dx.doi.org/10.2172/919188.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Meagher, Nancy. ALC LAN (Air Logistics Center Local Area Network) Network Interface Unit System Performance Report. Fort Belvoir, VA: Defense Technical Information Center, sierpień 1989. http://dx.doi.org/10.21236/ada215505.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii