Results 211 to 220 of about 1,234,327 (265)
Some of the next articles are maybe not open access.
Multiple access communications networks
IEEE Communications Magazine, 1987An introduction is provided to multiple-access communications networks in which the terminals share common communications channels. These networks include satellite networks, local area networks, and packet radio networks. Various multiple-access protocols are described, and it is shown how some of them are used in different multiple-access networks.
openaire +2 more sources
2014 16th International Conference on Transparent Optical Networks (ICTON), 2014
Access networks have stringent requirements on many vectors, including cost and flexibility, due to the plurality of end user types that use in the network. In this work we will address potential paths for the optimization of the access requirements and potential parameters for functional virtualization.
Antonio Teixeira +3 more
openaire +1 more source
Access networks have stringent requirements on many vectors, including cost and flexibility, due to the plurality of end user types that use in the network. In this work we will address potential paths for the optimization of the access requirements and potential parameters for functional virtualization.
Antonio Teixeira +3 more
openaire +1 more source
2013
At the heart of the P2P or, more accurately, fair use battles lay two distinct conceptions of information regulation. Copyright law resulted from the desire of political authorities (be they absolute or, in varying shades, representative) and private interests (first publishers, then others) to control the supply of information for political or ...
Benedict Atkinson, Brian Fitzgerald
openaire +1 more source
At the heart of the P2P or, more accurately, fair use battles lay two distinct conceptions of information regulation. Copyright law resulted from the desire of political authorities (be they absolute or, in varying shades, representative) and private interests (first publishers, then others) to control the supply of information for political or ...
Benedict Atkinson, Brian Fitzgerald
openaire +1 more source
Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76, 1976
The computer industry's ability to serve a diverse and expanding user community is evidenced by the rapid growth of computer network services. Computer service providers design and market their own offerings as they deem best, given their own market and their own set of resources. This has led to a proliferation of similar resources requiring different
openaire +1 more source
The computer industry's ability to serve a diverse and expanding user community is evidenced by the rapid growth of computer network services. Computer service providers design and market their own offerings as they deem best, given their own market and their own set of resources. This has led to a proliferation of similar resources requiring different
openaire +1 more source
1997
Cordless technology began to crash the personal mobile communications party in the late 1980s. It brought with it a new way of designing wireless networks, one that derived from its varied roots in the wireless PABX, telepoint and domestic business, which contrasted with the stately, well integrated traditions of the cellular telephony business. One of
openaire +1 more source
Cordless technology began to crash the personal mobile communications party in the late 1980s. It brought with it a new way of designing wireless networks, one that derived from its varied roots in the wireless PABX, telepoint and domestic business, which contrasted with the stately, well integrated traditions of the cellular telephony business. One of
openaire +1 more source
2004
This chapter considers the deployment of network management systems to support the access network. It considers some of the key drivers for the integration of network management systems (NMS) and discusses the technology and standards that can be used to achieve this integration.
openaire +1 more source
This chapter considers the deployment of network management systems to support the access network. It considers some of the key drivers for the integration of network management systems (NMS) and discusses the technology and standards that can be used to achieve this integration.
openaire +1 more source
2014
In this chapter, you’ll learn all there is to know about networking in SLES. We’ll cover the required information about manual network configuration, which makes clear which commands to use and which not to. Then you’ll read how to perform configuration automated from YaST. You’ll also learn which configuration files are related.
openaire +1 more source
In this chapter, you’ll learn all there is to know about networking in SLES. We’ll cover the required information about manual network configuration, which makes clear which commands to use and which not to. Then you’ll read how to perform configuration automated from YaST. You’ll also learn which configuration files are related.
openaire +1 more source

