• cấu trúc vi xử lý

    cấu trúc vi xử lý

    System & Program Developments of 8051 Program Structure and Design Introduction Advantages and Disadvantages of Structured Programming The Three Structures: statements, loops, choice Pseudo Code Syntax Assembly Language Programming Tools & Techniques for Program Development The Development Cycle Integration and Verification Command and Environments 2011/12/7 T. L. Jong, Dept. of E.E., NTHU 1 Introduction Structured Programming: Organizing...

     48 p dtu 15/04/2013 165 3

  • WAN Technologies - POINT–TO-POINT

    WAN Technologies - POINT–TO-POINT

    WAN technologies are based on serial transmission at the physical layer. This means that the bits of a frame are transmitted one at a time over the physical medium. The bits that make up the Layer 2 frame are signaled one at a time by physical layer processes onto the physical medium. The signaling methods include Nonreturn to Zero Level (NRZ-L), High Density Binary 3, (HDB3), and Alternative Mark Inversion (AMI). These are examples of...

     36 p dtu 18/12/2012 128 2

  • WAN Technologies - WAN Technologies

    WAN Technologies - WAN Technologies

    A WAN is a data communications network that operates beyond the geographic scope of a LAN. A company or organization must subscribe to an outside WAN service provider in order to use WAN carrier network services. Devices on the subscriber premises are called customer premises equipment (CPE). A copper or fiber cable connects the CPE to the service provider’s nearest exchange or central office (CO). This cabling is often called the local...

     33 p dtu 18/12/2012 137 1

  • Router and Routing Basics - Access Control List

    Router and Routing Basics - Access Control List

    ACLs are lists of conditions that are applied to traffic traveling across a router's interface.  These lists tell the router what types of packets to accept or deny. Acceptance and denial can be based on specified conditions. ACLs enable management of traffic and secure access to and from a network. ACLs can be created for all routed network protocols, such as Internet Protocol (IP) and Internetwork Packet Exchange (IPX). ACLs can be...

     47 p dtu 18/12/2012 146 1

  • Switching Basics and Intermediate Routing

    Switching Basics and Intermediate Routing

    Redundant topologies eliminate single points of failure. If a path or device fails, the redundant path or device can take over the tasks of the failed path or device. A redundant switched topology may cause broadcast storms, multiple frame copies, and MAC address table instability problems.

     22 p dtu 18/12/2012 141 1

  • Switching Basics and Intermediate Routing - VIRTUAL LANs

    Switching Basics and Intermediate Routing - VIRTUAL LANs

    VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless of the physical location or connections to the network. All workstations and servers used by a particular workgroup share the same VLAN, regardless of the physical connection or location. Configuration or reconfiguration of VLANs is done through software. Physically connecting or moving cables and equipment is...

     26 p dtu 18/12/2012 147 1

  • Networking Basics - TCP/IP TRANSPORT

    Networking Basics - TCP/IP TRANSPORT

    The primary duties of the transport layer, Layer 4 of the OSI model, are to transport and regulate the flow of information from the source to the destination, reliably and accurately. End-to-end control and reliability are provided by sliding windows, sequencing numbers, and acknowledgments To understand reliability and flow control, think of someone who studies a foreign language for one year and then they visit the country where that...

     40 p dtu 18/12/2012 140 1

  • Routing and Router Basics - CONFIGURING

    Routing and Router Basics - CONFIGURING

    In order to use host names to communicate with other IP devices, network devices such as routers must be able to associate the host names with IP addresses. A list of host names and their associated IP addresses is called a host table.

     19 p dtu 18/12/2012 118 1

  • Router and Routing Basics - INTRODUCTION TO ROUTERS

    Router and Routing Basics - INTRODUCTION TO ROUTERS

    The startup process of the router normally loads into RAM and executes one of these operating environments. The configuration register setting can be used by the system administrator to control the default start up mode for the router. The ROM monitor performs the bootstrap process and provides low-level functionality and diagnostics. It is used to recover from system failures and to recover a lost password. The ROM monitor cannot be accessed...

     22 p dtu 18/12/2012 128 1

  • Routing and Router Basics - WANs AND ROUTERs

    Routing and Router Basics - WANs AND ROUTERs

    A wide-area network (WAN) is a data communications network spanning a large geographic area such as a state, province, or country. WANs often use transmission facilities provided by common carriers, for example, telephone companies. These are the major characteristics of WANs: They connect devices that are separated by wide geographical areas. They use the services of carriers such as the Regional Bell Operating Companies (RBOCs),...

     21 p dtu 18/12/2012 148 1

  • Router and Routing Basics - TCP/IP Suite Error

    Router and Routing Basics - TCP/IP Suite Error

    IP is an unreliable method for delivery of network data. It is known as a best effort delivery mechanism. It has no built-in processes to ensure that data is delivered in the event that problems exist with network communication. If an intermediary device such as a router fails, or if a destination device is disconnected from the network, data cannot be delivered. Additionally, nothing in its basic design allows IP to notify the sender that a...

     28 p dtu 18/12/2012 140 1

  • Switching Basics and Intermediate Routing - Single Area OSPF

    Switching Basics and Intermediate Routing - Single Area OSPF

    Link-state routing protocols perform in a very different way from distance vector protocols. Understanding the difference between distance vector and link-state protocols is vital for network administrators. One essential difference is that distance vector protocols use a simpler method of exchanging routing information. Figure outlines the characteristics of both distance vector and link-state routing protocols. Link-state routing...

     76 p dtu 18/12/2012 142 1

Hướng dẫn khai thác thư viện số

Thống Kê