"Computer architecture and networks" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 33 of 50 - About 500 Essays
  • Powerful Essays

    Wsn Network

    • 12936 Words
    • 52 Pages

    1 Multi-Channel Scheduling and Spanning Trees: Throughput-Delay Trade-off for Fast Data Collection in Sensor Networks ¨ Amitabha Ghosh‚ Ozlem Durmaz Incel‚ V. S. Anil Kumar‚ and Bhaskar Krishnamachari Two primary factors that affect the data collection rate (throughput) and timeliness (delay) are: (i) efficiency of the link scheduling protocol‚ and (ii) structure of the routing tree in terms of its node degrees and radius. In this paper‚ we utilize multiple frequency channels and design an

    Premium Graph theory Wavelength Tree

    • 12936 Words
    • 52 Pages
    Powerful Essays
  • Better Essays

    Social Networks

    • 1256 Words
    • 6 Pages

    spite of the advantages afforded by social networking sites they can have potentially harmful effects. It is undeniable that social networks have a lot of advantages; still they also have several disadvantages. It is common knowledge that many people‚ especially young people‚ have heard about or belong to at least one social networking site. Social networks’ users rely on these sites to maintain their social relations and entertain themselves. It seems that these networking sites offer many advantages

    Premium Interpersonal relationship Friendship Social network aggregation

    • 1256 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Network Security

    • 1344 Words
    • 6 Pages

    CSFI All Rights Reserved 2011. The Cyber Security Forum Initiative (CSFI) http://www.csfi.us/ and NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) http://www.ccdcoe.org/ will be presenting a unique workshop on the online recruitment of volunteers for enhancing the instruments of cyber power of nations and organizations. This is a great opportunity to learn more about methodologies‚ lessons learned‚ deliverables‚ coordination and volunteerism in cyberspace. The workshop will take

    Premium National security Security Information security

    • 1344 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    Network Hardening Unit 8 Assignment 1 It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for

    Premium Operating system Unix Personal computer

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    social network

    • 900 Words
    • 3 Pages

    TECHNOLOGICAL UNIVERSITY OF THE PHILLIPINES Ayala Boulevard‚ Ermita Manila‚ Philippines “THE IMPACT OF SOCIAL NETWORK IN OUR EVERYDAY LIFE” SUBMITTED TO: PROF. JONATHAN CAIÑA SUBMITTED BY: Bunsol‚ John Paul Coruna‚ Mark Lorenz Ello‚ Zharlene Nolasco‚ Kaiz Tamayo‚ Rem Raymond INTRODUCTION Background of the Study Social networking sites were already part of our life since we are using it every day. These sites enable us to have a direct interaction between individuals

    Free Social network service Social network aggregation Facebook

    • 900 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    computer

    • 1223 Words
    • 5 Pages

    indicate that the method suggested has an ideal level of security. With development of computer networks and the increasing use of Internet‚ the discussion of security in transferring data has been put forward as one of important subjects. The reason for it is the accessibility of data in Internet‚ and their easy access by authorized and unauthorized people. Data packets in Internet pass several intermediate public networks before they reach the target; this makes it easy that other people access data.

    Premium Encryption Randomness Cryptography

    • 1223 Words
    • 5 Pages
    Better Essays
  • Good Essays

    network topology

    • 751 Words
    • 6 Pages

    FACULTY OF MEDIA‚ INFORMATION & COMMUNICATION TECHNOLOGY HIGHER CERTIFICATE IN INFORMATION TECHNOLOGY NETWORK ENGINEERING 511 1ST SEMESTER ASSIGNMENT Name & Surname: ____________________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________ ASSESSMENT CRITERIA MARK ALLOCATION EXAMINER MARKS MODERATOR MARKS QUESTION 1 INTRODUCTION Outlines the subject

    Premium OSI model Citation Parenthetical referencing

    • 751 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Network Management

    • 5813 Words
    • 24 Pages

    Models Network Management: Principles and Practice © Mani Subramanian 2000 1 Chapter 4 Case Histories • AT&T Network Management Centers • Network Operations Center • Network Control Centers • Monitors the network status • Self-healing • CNN World Headquarters • Performance Management • Fault Management • Monitoring alarms • Determines causes of failures (Artificial Intelligence) • Centralized troubleshooting of NIC (remotely) • Performance degradation due to NMS • Network may come down

    Premium IP address Data type

    • 5813 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    Network Security

    • 637 Words
    • 3 Pages

    Network Security Some DoS attacks can be avoided by applying vendor patches to the software that has been compromised. Another way to deal with DoS attacks in the case of an attack coming from a number of known IP addresses is to put up a rule to drop all incoming traffic from those known attackers. Yet another way to deal with these types of attacks is to set up packet filters. This will act as a proxy for connections. Once the handshake is validated it will be forwarded to the correct destination

    Premium IP address

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    rate of more than one instruction per cycle is difficult to achieve. This case study uses multi bit scoreboard architecture to handle data conflicts for out of order execution and completion of instructions. The paper analyses the performance of the superscalar microprocessor by using two stimulation models which uses benchmark programs and one calculation model which uses queuing networks to derive the formula for data deficiencies from the peak performance. Introduction The single bit scoreboard

    Premium Central processing unit

    • 1541 Words
    • 7 Pages
    Good Essays
Page 1 30 31 32 33 34 35 36 37 50