Products & Services

See also: Categories | Featured Products | Technical Articles | More Information

Conduct Research Top

  • High Security Network Appliance - Essential Devices to Protect Your Data
    Even as the internet network expanded its footprint and the government and private organizations created their own local area networks (LAN) and wide area networks (WAN), the concept of protecting the data that flows through these networks has assumed a great significance.
  • Network Appliances
    The term "network appliance" brings to mind a concept of simplicity. Like a household appliance, the network appliance is easy to set up and performs a specific function with little or no user operation required. When a consumer buys a household appliance - a toaster, for example - he or she simply
  • Testing Inter-Operability Between 2G 3G 4G Wireless Networks
    Gbps) mobile traffic (stateful HTTP/PCAP) generation per MAPS TM PacketLoad appliance. CSV database system for massive number of subscriber profiles. The various test scenarios that can be simulated using GL's Wireless Network Simulation Test Suite are discussed further below: Roaming Scenarios
  • LIN 2.0 Compliant Driver Using the PIC18XXXX Family Microcontrollers
    is familiar with the previous versions of the LIN specification. Only key additions and modifications of the LIN specification 2.0, the most current specification available to date, will be highlighted. LIN (Local Interconnect Network) provides a low-cost bus communication for many networks, including
  • VPN Appliances
    A Virtual Private Network (VPN) creates a private tunnel over public infrastructure. VPN has become the preferred way to securely link branch offices, traveling employees and clients with the main office over the public Internet. The main advantage of VPN is that it eliminates the need
  • VPN Appliances
    A Virtual Private Network (VPN) creates a private tunnel over public infrastructure. VPN has become the preferred way to securely link branch offices, traveling employees and clients with the main office over the public Internet. The main advantage of VPN is that it eliminates the need
  • EETimes.com | Electronics Industry News for EEs & Engineering Managers
    Taiwan chip makers negotiating fab plans in China Cirrus' Maverick chip powers Internet audio appliance Are benchmarks for network processors feasible? SSMC purchases $33 million of Lam metal-etch tools Samsung orders SVG's ProCell cluster tool Commerce tariff review drastically reduces Winbond's
  • LIN 2.0 Compliant Driver Using the PIC16FXXX Family Microcontrollers
    for many networks, including * LIN product identification for each node is automotive and appliance. The LIN protocol provides standardized. system development guidelines for the data transmission, the transmission medium, the * A node capability language specification is added. development tools

More Information Top

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire

  • Encyclopedia of Social Network Analysis and Mining
    • It describes social network applications to knowledge mining and discovery ranging from web mining algorithms to health informatics and epidemiology to antiterrorism strategies.
  • Handbook of Optimization in Telecommunications
    Case studies are given for dynamic routing protocol design for a) real-time network routing, a state-dependent dynamic routing method used in practice in a very large-scale applica- tion, and b) integrated voice/data routing in an IP/MPLS network application .
  • The Art of Wireless Sensor Networks
    During the early years of the twenty-first century, wireless sensor net- work applications have evolved from small demonstrations with a lifetime of only a few hours to complete systems made up of hundreds of tiny wireless nodes deployed in a wide…
  • Information Technology Applications in Industry, Computer Engineering and Materials Science
    Location awareness of wireless nodes is increasingly common in many wireless network applications .
  • Handbook of Peer-to-Peer Networking
    Designing Structured Peer-to-Peer Overlays as a Platform for Dis- tributed Network Applications in Mobile Ad Hoc Networks.
  • Network-Embedded Management and Applications
    Network-attached devices can typically be considered as in-between remote and embedded management, because they are partly a stand-alone application and partly a network application .
  • Network Performance Engineering
    Finally, the maximum entropy methods, ME and ME-O, for closed open networks apply to the more general class of networks with arbitrary topol- ogy, generalized exponential service time distribution, and RS-RD blocking.
  • Guide to Wireless Sensor Networks
    Although 100% reliability is not a concern for some sensor network ap- plications , especially in which colocated sensors collect redundant information [1], there is a class of sensor network applications that requires 100% reliability.