Routing protocol

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 5 of 27 - About 262 Essays
  • Improved Essays

    Protect Yourself from Social Networking Nicola Formichetti once said, “ The dark side of social media is that, Within seconds, anything can be blown out of proportion and taken out of context. And it’s Very difficult not get swept up in it all”. In Social media thing get swept out of proportion so we need to protect ourself from this from happening. In the article “ The Dangers of Social Networking” by Robin Olsen Suggest ways on how to protect yourself from social networking. Robin Olsen is…

    • 769 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Though the use of chemical weapons was ostensibly banned in the international community by the Geneva Protocol in 1925, the research and development of biological and chemical weapons was permissible until the Protocols were amended in 1975. However, a lack of enforceability by any international governing body allowed a nation like South Africa to secretly create its own such program, one that operated unchecked and actively employed its toxins and agents throughout the 1980s. With apartheid as…

    • 1442 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Climate Change is a worldwide phenomenon, that affects the regular conditions of the environment. Historically, there have been several conventions, as the Kyoto Protocol, in order to address this problem. However, only until the Paris Agreement, countries have committed to take actions to mitigate this issue. In fact, Canada did not demonstrate any interest in the subject, but rather the provinces took the initiative and started to use regulations to reduce CO2 emissions. By 2015, Canada has…

    • 2135 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    The extent and causes of global warming have become an issue of argumentative political debate in major countries, for instants, China, the United State, India, and Russia who produced most of greenhouse gases (Brander, 2014). The temperature on earth has increase dramatically that caused by greenhouse gas or CO2 emission (Carbon dioxide emission is the greenhouse gas produced by human activities) is a negative externality problem that affects the world. Not only it damaged the atmosphere and…

    • 737 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Evaluating the Feasibility: Should Cities Have City-Wide Wi-Fi Many cities around the world have considered implementing a form of public city-wide free Wi-Fi, whether it is in the better interest of the city is another topic. Implementing a city-wide Wi-Fi network is a logistics nightmare, the amount of planning and men required to do such a task is impressive. If done properly, this task is an impressive feat. Some cities have managed to accomplish it, and along with the wonder and awe of…

    • 703 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    A traditional traffic model for circuit switched data as well as packet data is the Poisson process in which the number of incoming packets per time is according to Poisson distribution. It is one of the most widely used and oldest traffic models. In this model the length of each packet is based on exponential distribution and the number of simultaneously ongoing packets is according to Erlang distribution [16]. The Poisson process is characterized as a renewal process. In a Poisson process the…

    • 710 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In 1992, Tanzania had its first national energy policy and the latest national energy policy was published in 2003. The national policy 2003 mainly focused on the national energy needs in Tanzania, and in the policy, to develop domestic cost effective energy resources, to improve energy reliability, efficiency and security, and to reduce deforestation were also highlighted as the subsidiary objectives. 2003 national energy policy put climate change concept in its content, and it is the first…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    the help of splitter. For instance, A 1:8 splitting ratio will have : a. Number of users: 8 b. Power: 12.50 c. Insertion Loss : -9 Activity 3 To analyze the OLT Unit we were supposed to use putty.exe for the serial console using Telnet as a protocol and U2000 Client as a graphical user interface (GUI). 1. To go to the user mode first we need to login as the following step : • Username: user04 • Password: user1234 • The User Mode • To enter the privilege mode from user mode type…

    • 1575 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Inspite of its conceptual elegance, RPC (Remote Procedure Call) have a few problems. Discuss any 3 of those in brief. Often times it is unclear who the client is and who the server is in certain situations, in these types of situations RPC would not be suitable. RPC also makes unexpected messages hard or impossible to send if the receiver of the message is not expecting the message. Also RPC does not allow multi-threaded servers even when one would be appropriate(Tanenbaum & Renesse, n.d.).…

    • 412 Words
    • 2 Pages
    Decent Essays
  • Page 1 2 3 4 5 6 7 8 9 27