You are welcome to search the collection of free essays and research papers. Thousands of coursework topics are available. Buy unique, original custom papers from our essay writing service.

17 results found, view free essays on page:

  • Application Of Fuzzy Logic On Neural Networks
    2,489 words
    Technology has traditionally evolved as the result of human needs. Invention, when prized and rewarded, will invariably rise-up to meet the freemarket demands of society. It is in this realm that Artificial Intelligence research and the resultant expert systems have been forged. Much of the material that relates to the field of Artificial Intelligence deals with human psychology and the nature of consciousness. Exhaustive debate on consciousness and the possibilities of consciousness ness in mac...
  • Packets In The Tcp Dump Format
    1,627 words
    Introduction If you " ve ever been a network administrator, the call you dread the most might be one you receive in the middle of the night by some panicked employee stating that a portion of your critical network has gone down. What troubleshooting options are available to provide answers to your network problem? Besides having a proactive help desk that can "read" the mind of your network, an important part of troubleshooting involves using a network protocol analyzer. If you " ve done your re...
  • Assignment Of A Network Number
    2,402 words
    November 13, 2000 TCP-IP TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP / IP (along with other protocols) on a ...
  • Bus Topology The Nodes
    2,167 words
    Networks and Connectivity Trying to give a definition to the term COMMUNICATIONS we can say that 'Communications is the dispatch of a message from one point to another and the confirmation of the complete, right and conceivable receiving of the message by the authorized addressee'; . As we can see from the history there was a huge try to achieve the communication between people. The signals of smoke, the sounds of the drum, the fire were some of the basic ways for the transfer of a message in a ...
  • Delivery Of Voice Transmissions Over A Packet
    989 words
    Concept of Voice over Internet Protocol (VoIP) Voice over Internet Protocol, commonly known as VoIP, is a technology used for the transmission of voice information using the Internet Protocol (IP). VoIP allows the sending of voice information in a digital form using packets as opposed to the traditional circuit-committed protocols of the Public Switched Telephone network (PSTN). Traditionally when one wishes to make a phone call, a call is placed using a telephone that is connected to a circuit-...
  • Network Address Translation And Filter Tables
    1,974 words
    Decision Support Systems Used in Network Hardware How does data pass through the internet? If you said decision support systems, you are correct. In an indecisive world, network hardware devices uses decision support systems (DSS) to efficiently and effectively route data, in a local area network, with the least amount of errors and inconsistencies. Decision support systems are the brains behind network hardware, and would be near impossible for them to work without the intelligent core of each ...
  • Network Interface Card
    730 words
    NIC: The Unsung Hero The Network Interface Card, or NIC for short, is the most important peripheral when it comes to operating on a network. Many people think the most important item in a network is the cabling, or maybe the network software, or even the computer or server being used. While each of these items is important they are worthless without a Network Interface Card, for successful network operation. The NIC has taken most of the legwork out of the way we do business. No more does Bob, i...
  • Transmission Of Multimedia Data Over Wireless Ad
    1,692 words
    Transmission of Multimedia Data over Wireless Ad-Hoc networ sA. Berk BarutluAbstractAd-how networking has been of increasing interest and therefore recognized as an important research area in recent years. This paper is about transmission of multimedia data over wireless ad-how networks, the problems and the related issues. 1. Introduction 1.1 Ad-Hoc Networks An ad-how network is a collection of wireless mobile nodes that will dynamically form a temporary network without the use of any existing ...
  • 1 3 Neural Network Intrusion Detection Systems
    4,714 words
    Abstract: Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity ba...
  • Adsl The Signal On Your Line
    688 words
    Does the humble telephone lines play a major role in shaping the third millennium Can a mere pair of thin copper wires twisted around each other transmit Internet data reliably and securely at blazing fast speed, making it possible to view high-quality moving images, sound and vast amounts of data on your personal computer screen or television The answer is yes, as the growing success of DSL (digital subscriber line) technology abundantly demonstrates. The capacity of a communications channel de...
  • Network Database Model Of The Hierarchical Database
    1,185 words
    A Comparison of the Hierarchical, Network and Relational, Database Models Database models continue to evolve as the information management needs of organizations become more complex. From flat files to relational databases, the growing demands on data integrity, reliability and performance of database management systems (DBMS), has shaped the design of databases and their underlying models. In this document, three database models are discussed comparing and contrasting their major features. The ...
  • Digital To Analogue Signals Modulation As Pstn
    692 words
    Introduction to the PSTN The Public Switched Telephone Network (PSTN) was designed to enable analogue (sound) communication between telephones. It is a well-established network with extensive infrastructure providing universal coverage. PSTN is a circuit switched network. When a customer requests a service path, an electronic connection is established between their telephone connection and the local switching exchange (the local loop). The local exchange is interconnected to a network of main ci...
  • Network Layer
    1,700 words
    Methods of sharing transmission media CSMA / CD is short for Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks use CSMA / CD. This standard enables devices to detect a collision. After detecting a collision, a device waits a random delay time and then attempts to re-transmit the message. If the device detects a collision again, i...
  • Hard Drive In The File Server
    1,164 words
    Bus Topology A Bus Topology is the oldest and most simple method of networking a group of workstations. The computers are set up in series from a single server in a straight line. Although easy to implement it is prone to problems as the network connection once broken separates all the other workstations, beyond that connection, redundant as well. So if the first link from server to computer were to break the whole system would go down. Therefore for those companies requiring failsafe systems, w...
  • Wireless Lan Cards
    351 words
    A wireless LAN, as the name implies, is a LAN without any wires to connect different nodes in the network, because in these LAN's wireless media or unguided media is used for this purpose. Most wireless LAN's today work either on Infra-red (IR) or Radio Frequencies (RF). Infra-red devices have a problem of "line of sight", while radio frequencies are more immune to noise etc. Just like any network a wireless LAN also has to follow a standard, some protocol, some handshaking mechanism. The standa...
  • Station On The Traditional Lan
    560 words
    Traditional local area networks, such as Ethernet and Token Ring, use a connectionless or unreliable approach when sending information across the network. Each client is connected to the network by an adapter card, which has a driver, and above that driver is a protocol driver, such as TCP / IP. The protocol driver bundles information into frames of varying size, and gives each bundle an appropriate header. Then, when the wire is available, the data packets are shipped off to be individually rou...
  • Network Management Atm
    2,145 words
    The Asynchronous Transfer Mode has been chosen as the standard system concept for integrated broadband communication networks by the ITU T. The system is predicted to grow rapidly as soon as it becomes widely accepted by network operators and users. Why has communications evolved in history towards the ATM concept and why has it been chosen as the broadband solution? In the late 1800's public telephone networks capable of transmitting analogue voice signals were established. The users were conne...

17 results found, view free essays on page: