標(biāo)題: Titlebook: Computer Communications and Networks; John R. Freer Book 1988 J R Freer 1988 Counter.LAN.Modem.Modulation.Multiplexer.Switching.analog.com [打印本頁] 作者: 喝水 時(shí)間: 2025-3-21 19:43
書目名稱Computer Communications and Networks影響因子(影響力)
書目名稱Computer Communications and Networks影響因子(影響力)學(xué)科排名
書目名稱Computer Communications and Networks網(wǎng)絡(luò)公開度
書目名稱Computer Communications and Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Communications and Networks被引頻次
書目名稱Computer Communications and Networks被引頻次學(xué)科排名
書目名稱Computer Communications and Networks年度引用
書目名稱Computer Communications and Networks年度引用學(xué)科排名
書目名稱Computer Communications and Networks讀者反饋
書目名稱Computer Communications and Networks讀者反饋學(xué)科排名
作者: Indict 時(shí)間: 2025-3-21 21:57 作者: hypotension 時(shí)間: 2025-3-22 00:53
Network topologies, switching and access control,viewed by the user as one large computer system which allocates jobs without user intervention. A computer communication network is viewed as a collection of several computer systems from which the user can select the service required and communicate with any computer as a local user.作者: Blasphemy 時(shí)間: 2025-3-22 05:37 作者: intricacy 時(shí)間: 2025-3-22 08:52 作者: 婚姻生活 時(shí)間: 2025-3-22 15:10
Computing and software issues, at high speed over long distances first made remote computer terminals possible and later led to distributed data processing. The needs of distributed data processing systems with satellite processors determined the architecture of many communications networks.作者: 婚姻生活 時(shí)間: 2025-3-22 17:10
Threats to communications security,m, is vulnerable only to the entry of unauthorised users and users gaining access to information which they are not authorised to receive. These security risks may be reduced by an efficient means of user identification and control on access to the computer room, plus a system of access controls for作者: Arthropathy 時(shí)間: 2025-3-23 00:30 作者: 材料等 時(shí)間: 2025-3-23 02:00 作者: ANTH 時(shí)間: 2025-3-23 08:49
https://doi.org/10.1007/978-1-0716-3629-9ive needles which pointed to the letters of the alphabet. The first machine to use serial binary data communication was the teleprinter, developed by Emil Baudot in 1874. The Baudot Code uses five bits to represent the letters of the alphabet and a figures shift character, after which code combinati作者: 蚊子 時(shí)間: 2025-3-23 11:05 作者: 鍍金 時(shí)間: 2025-3-23 17:56
Scott A. Yuzwa,David J. Vocadloviewed by the user as one large computer system which allocates jobs without user intervention. A computer communication network is viewed as a collection of several computer systems from which the user can select the service required and communicate with any computer as a local user.作者: Feature 時(shí)間: 2025-3-23 21:42 作者: 知道 時(shí)間: 2025-3-23 23:30
Tag-Free Semi-Synthesis of the Tau Proteinommunications application because without an agreement on the electrical (or optical) signal characteristics, communication of any form is impossible. Without an agreed physical interface specification, manufacturers of communications equipment, such as modems, cannot make their equipment operate wi作者: 投射 時(shí)間: 2025-3-24 05:58 作者: 譏諷 時(shí)間: 2025-3-24 07:47
Manuel González,Antonio Martínez-Abejónm, is vulnerable only to the entry of unauthorised users and users gaining access to information which they are not authorised to receive. These security risks may be reduced by an efficient means of user identification and control on access to the computer room, plus a system of access controls for作者: coddle 時(shí)間: 2025-3-24 12:58
Manuel González,Antonio Martínez-Abejónhority or by user representatives. Information systems are often extremely complex and the communications system may be a relatively small part. The more complex systems may not be controlled by one department so it may not be possible for one department to take authority for the definition of the s作者: 高射炮 時(shí)間: 2025-3-24 15:30
Taubeschlagsstudien im AuflichtmikroskopA Local Area Network is a data communication system which allows a number of independent devices in moderate geographic proximity to communicate with each other.作者: 羞辱 時(shí)間: 2025-3-24 20:53 作者: 歸功于 時(shí)間: 2025-3-25 00:57 作者: 征服 時(shí)間: 2025-3-25 07:23 作者: 植物群 時(shí)間: 2025-3-25 10:03
Wide area network standards,A wide area network may be arbitrarily defined as a network which interconnects computers, terminals and local area networks at a national or international level. The most significant standards which apply to wide area networks are concerned with:作者: Irrepressible 時(shí)間: 2025-3-25 14:22
Performance prediction,A point-to-point communication link may be procured with a fair amount of confidence that the link circuitry and protocol will meet the design objectives. To estimate the line throughput (number of information bits correctly received divided by the time taken for transmission) several factors must be taken into account including:作者: Albinism 時(shí)間: 2025-3-25 16:52
Data communication concepts and alternatives,ive needles which pointed to the letters of the alphabet. The first machine to use serial binary data communication was the teleprinter, developed by Emil Baudot in 1874. The Baudot Code uses five bits to represent the letters of the alphabet and a figures shift character, after which code combinations are interpreted as numbers.作者: 斜坡 時(shí)間: 2025-3-25 22:56
Network topologies, switching and access control,viewed by the user as one large computer system which allocates jobs without user intervention. A computer communication network is viewed as a collection of several computer systems from which the user can select the service required and communicate with any computer as a local user.作者: Self-Help-Group 時(shí)間: 2025-3-26 03:46
Layered network architectures,ols and logical structures for the functions which provide effective communication between data processing systems connected to the network. Layering separates the functions into distinct levels which communicate individually with like levels in distant nodes.作者: PRISE 時(shí)間: 2025-3-26 08:03 作者: 恩惠 時(shí)間: 2025-3-26 08:32 作者: Oration 時(shí)間: 2025-3-26 16:40
https://doi.org/10.1007/978-1-0716-3629-9ive needles which pointed to the letters of the alphabet. The first machine to use serial binary data communication was the teleprinter, developed by Emil Baudot in 1874. The Baudot Code uses five bits to represent the letters of the alphabet and a figures shift character, after which code combinations are interpreted as numbers.作者: accomplishment 時(shí)間: 2025-3-26 20:53 作者: HALL 時(shí)間: 2025-3-26 23:29 作者: Stable-Angina 時(shí)間: 2025-3-27 03:33
Modern Approaches in Geophysics at high speed over long distances first made remote computer terminals possible and later led to distributed data processing. The needs of distributed data processing systems with satellite processors determined the architecture of many communications networks.作者: prosthesis 時(shí)間: 2025-3-27 06:07 作者: abracadabra 時(shí)間: 2025-3-27 13:21 作者: 施舍 時(shí)間: 2025-3-27 16:56
rofession should be familiar. Computer communications and networks is an introduction to communications technology and system design for practising and aspiring computer professionals. The subject is described from the computer system designer‘s point of view rather than from the communications engi作者: prodrome 時(shí)間: 2025-3-27 17:59 作者: bronchodilator 時(shí)間: 2025-3-28 00:18 作者: REIGN 時(shí)間: 2025-3-28 03:14
Communications media,t. When designing a communications network it is therefore necessary to give much thought to the selection of the combination of data transmission media used and the cost change trends which are always present.作者: 權(quán)宜之計(jì) 時(shí)間: 2025-3-28 08:53 作者: LUMEN 時(shí)間: 2025-3-28 13:30
Manuel González,Antonio Martínez-Abejóns chapter is concerned with security threats which arise when the computer is connected to external terminals or peripherals and to communications networks which provide remote access or file transfers with other computers. Computer and communications security are considered in greater detail in reference 11.1.作者: ingrate 時(shí)間: 2025-3-28 15:06 作者: 積習(xí)已深 時(shí)間: 2025-3-28 20:28 作者: 六邊形 時(shí)間: 2025-3-29 01:34
Book 1988ng and highly complex subject. Sufficient practical knowledge of the subject is not usually gained at university or college but is generally developed over a period of several years by trial and error, attending courses, reading reference books and journals; this book attempts to simplify and speed 作者: 品牌 時(shí)間: 2025-3-29 05:07
dly changing and highly complex subject. Sufficient practical knowledge of the subject is not usually gained at university or college but is generally developed over a period of several years by trial and error, attending courses, reading reference books and journals; this book attempts to simplify and speed 978-1-4612-8305-8978-1-4613-1041-9作者: 發(fā)出眩目光芒 時(shí)間: 2025-3-29 10:45 作者: Respond 時(shí)間: 2025-3-29 12:53
,über Typenbildung in der Psychopathie,t?ndigenkonferenz aufstellte, hatte sie nicht die Absicht, da? eine . von Psychopathentypen gegeben werden sollte. Sie sah die Aufgabe dieses Referats vielmehr in einer Darstellung der Stellungnahme des Psychiaters zu den Grunds?tzen der Typenbildung, zu ihrer Bedeutung und ihrer Notwendigkeit.作者: 慢慢沖刷 時(shí)間: 2025-3-29 19:26
Introduction,ing people have a new understanding of the micro quantum world, and it has been applied to chemistry, biology, engineering electronics and other fields. Many new disciplines based on quantum science have also emerged from the developments. Over the past few decades, the combination of quantum mechan作者: murmur 時(shí)間: 2025-3-29 19:46
Book 2017fic literacy from the perspective of different stakeholders in Germany. The analyses show in which areas changes are necessary so that science education can better fulfill its claim to contribute to students’ general education and literacy..