Topology

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 7 of 20 - About 198 Essays
  • Improved Essays

    Bluetooth technology is a fast-growing technology, being adopted in all forms of technology from mobile phones, headsets, laptops, handhelds, even watches and children’s toys. The frequency of a Bluetooth device is 2483.5 MHz. That is really high compared to an FM radio at 108 MHz. Are Bluetooth devices important? To some people, yes, to some the answer is no. Other devices use wires or cables to transmit information. Bluetooth devices don't use anything other than radio waves. Bluetooth…

    • 746 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Network Design Paper

    • 1236 Words
    • 5 Pages

    Network Design Paper Background: Your small business received a contract award to upgrade the network of the UMUC branch office located in Mannheim, Germany. Currently, each department has its own network with its own DSL connection. Students and faculty members have to access each department through the Internet to access resources. Also, each department has added computers by using switches and repeaters. Some of the major problems of the networks are: High rate of collisions Slow…

    • 1236 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    boost converter. In this thesis, a boost converter operating all the switching devices under Zero Voltage Transition is studied and a model converter which can supply a load of 250W is designed and is used in a PV energy system. In this converter topology, a part of the circuit resonates for a small portion of the switching cycle of the converter, known as the auxiliary circuit that enhances the soft transition from ON state to OFF state and vice versa, thus improving the converter efficiency by…

    • 1335 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    control levels and data levels between two routers. Cisco IOS software also offers a mechanism for protecting transmitted data between two routers using a new tunnel type that uses IPv6 IPsec. IKEv1 is used to manage the key. Figure 5.3 shows the topology in which this option is used between two routers A and…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    HIPAA Case Study Answers

    • 2168 Words
    • 9 Pages

    First and foremost, I agree with the conclusion of part 6.1. As someone currently employed in the field of Information Technology, Security is very critical to ensuring that HIPAA is not breached with any of our clients. The biggest subsets as laid out in this case study are Information Privacy, Risk Management, Access Controls, Firewalls, Intrusion Detection, and VPN’s. Again, as someone who works within the medical field performing IT, Privacy is incredibly important for not only my end users,…

    • 2168 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Because of the variety of mathematical activities Poincaré employed, many of his creations have contributed central works in “almost all spheres of mathematics.” Some of the mathematical ideas Poincaré took so far as to publish dealt with, “topology, automorphic functions, theory of differential equations, integral equations, non-Euclidean geometry, and the relative theory, the theory of numbers, celestial mechanics, physics, and philosophy of mathematics and philosophy of science,” (Henri…

    • 1388 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Leonhard Euler was born on 15 April 1707. In a town call Basel located in Switzerland. His father Paul Euler was a pastor of the Reformed church. Leonhard Euler had two younger sisters called Anna Maria and Maria Magdalena. Later on the Euler’s moved from basal to the town of Riehen, where Euler spent most of his child hood. Leonhard Euler formal education started in Basel where he was sent to live with maternal grandmother. When Leonhard Euler was thirteen he enrolled at the University of Basel…

    • 301 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    MANET Case Study

    • 890 Words
    • 4 Pages

    There are many pros and cons when it comes to the use and creation of a MANET. A brief background highlighting what MANETs are; the key features in MANETs; as well as the possible vulnerabilities that MANETs are prone to, will be given below. Once this has been provided, the concept of a Black Holes in MANETs will be introduced and described. The rest of this paper then seeks to explain how Black Holes can affect and compromise MANETs. 4.1 Background Kaushik and Dureja (2013) define mobile…

    • 890 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Qa Analysis Sample

    • 875 Words
    • 4 Pages

    Network Topology Analysis (NTA) examines the local positioning of significantly altered metabolites within the pathways annotated by KEGG. NTA estimates a Pathway Impact index using a measure of the centrality (Relative Betweeness Centrality) of detected metabolites…

    • 875 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    MFO Method Case Study

    • 791 Words
    • 4 Pages

    The application of MFO method has been examined on two different test cases of MAED problems with different dimension and complexity level related to power system. The code used for study has been developed and implemented in MATLAB 7 and executed on 2.80GHz dual core processor with 2GB RAM. The description of test cases and simulation results obtained by MFO are presented as below. Main control parameters used for MFO are search agent size as 50 and shape factor equal to1. Test case I:…

    • 791 Words
    • 4 Pages
    Improved Essays
  • Page 1 4 5 6 7 8 9 10 11 20