Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Data Access Layer

The next three layers reside on an application middleware server, although in some systems, there is a further physical separation between the presentation layer, which runs on a different hardware from the domain and data access layers. If EJB is used in a J2EE application, the presentation layer runs on a Web container and the domain layer runs on an EJB container. With the EJB local interface in J2EE 1.3, the separation becomes unnecessary, which eliminates the network overhead between the two. [Pg.45]

Data access services, a layer that centralizes services to access the databases... [Pg.520]

Data storage and access This is the database access layer along with a logical layer above it to coordinate shared access to the data. [Pg.669]

The IEEE 802 standards were designed primarily for enhancements to the bottom three layers of the OSI model. The IEEE 802 model breaks the Data Link layer into two sublayers a Logical Link Control (LLC) sublayer and a Media Access Control (MAC) sublayer. In the Logical Link Control sublayer, data link communications are managed. The Media Access Control sublayer watches out for data collisions, as well as assigning physical addresses. [Pg.321]

For the computer to use the network interface card, it is very important to install the proper device drivers. These drivers communicate directly with the network redirector and adapter. They operate in the Media Access Control sublayer of the Data Link layer of the OSI model. [Pg.330]

Finally, project area C Mapping onto New and Existing Platforms summarizes unification, generalization, and use of different tool platform approaches. The result is a generalized layer for data access and computing processes being developed by the two subprojects Cl and C2. [Pg.63]

The media access layer protocol elements of ethernet form data packets for transmission over the shared media according to a standardized format. This ethernet packet format is nearly equivalent to the IEEE 802.3 standard, and the two terms are often used interchangeably. [Pg.2130]

Network adapter cards, also known as network interface cards are the physical link between a client or server PC and the shared media of the network. Providing this interface between the network and the PC or workstation requires that the network adapter card have the ability to adhere to the access methodology (CSMA/CD or token passing) of the network architecture to which it is attached. These software rules, implemented by the network adapter card which control the access to the shared network media, are known as media access control (MAC) protocols and are represented on the MAC sublayer of the data link layer (layer 2) of the OSI 7-layer reference model. [Pg.2134]

There are seven layers in the OSI model, starting with the physical layer handling the raw data transmission over a physical medium. The most common transmission media are twisted pair (copper wires), coaxial cable, and fiber optics. The data link layer, usually implemented in the network adaptors, is above the physical layer and is concerned with the organization of data into frames and the reliable transportation of these frames over a direct link. The specific problems of multi-access links such as channel allocation and collision detection are handled by the data link sub-layer called medium access control (MAC). Reliable frame delivery, frame ordering, and frame retransmission are provided in the layer by sliding window protocols. This is a set of protocols for full-duplex data frame transmission, in which the sender and the receiver both keep windows of frame acknowledgements and send frames only if a certain number of already sent frames were acknowledged by the receiver. The data link layer also includes some error detection and correction functions such as parity bit code and cyclic redundancy code (CRC). [Pg.43]

EN 12795 2002 Dedicated Short-Range Communication (DSRC)—DSRC Data link layer Medium Access and Logical Link Control (review). [Pg.114]

Variables can be grouped into a dataset. The goal of the dataset is to group data related to one simulation task and to simplify the handling of values. It is also very important to make data accessible and usable for nonexperts. For each dataset more profiles can be assigned. Each profile represents a particular combination of physical data sources but it must contain exactly the same group of variables as defined in the related dataset. Datasets and profiles create an abstract layer which is built on top of a physical layer. The overview of the data architecture is illustrated in Rg. 10.5. [Pg.267]

Hurst (19) discusses the similarity in action of the pyrethrins and of DDT as indicated by a dispersant action on the lipids of insect cuticle and internal tissue. He has developed an elaborate theory of contact insecticidal action but provides no experimental data. Hurst believes that the susceptibility to insecticides depends partially on the cuticular permeability, but more fundamentally on the effects on internal tissue receptors which control oxidative metabolism or oxidative enzyme systems. The access of pyrethrins to insects, for example, is facilitated by adsorption and storage in the lipophilic layers of the epicuticle. The epicuticle is to be regarded as a lipoprotein mosaic consisting of alternating patches of lipid and protein receptors which are sites of oxidase activity. Such a condition exists in both the hydrophilic type of cuticle found in larvae of Calliphora and Phormia and in the waxy cuticle of Tenebrio larvae. Hurst explains pyrethrinization as a preliminary narcosis or knockdown phase in which oxidase action is blocked by adsorption of the insecticide on the lipoprotein tissue components, followed by death when further dispersant action of the insecticide results in an irreversible increase in the phenoloxidase activity as a result of the displacement of protective lipids. This increase in phenoloxidase activity is accompanied by the accumulation of toxic quinoid metabolites in the blood and tissues—for example, O-quinones which would block substrate access to normal enzyme systems. The varying degrees of susceptibility shown by different insect species to an insecticide may be explainable not only in terms of differences in cuticle make-up but also as internal factors associated with the stability of oxidase systems. [Pg.49]

For example, initially MBP and PLP exhibit half-lives of 2-3 weeks, but later their half-lives are too long to be calculated accurately. A possible interpretation of these data is that some of the newly formed myelin remains in outer layers or near cytoplasmic pockets (incisures and lateral loops) where it is accessible for catabolism - thus accounting for the rapidly turning-over pool. The more stable metabolic pool would consist of deeper layers of myelin less accessible for metabolic turnover. [Pg.70]

A simple example of the first method is to screen requests to ensure that they come from an acceptable (i.e., previously identified) domain name and Internet protocol address. Firewalls may also use more complex rules that analyze the application data to determine if the traffic should be allowed through. For example, the firewall may require user authentication (i.e., use of a password) to access the system. How a firewall determines what traffic to let through depends on which network layer it operates at and how it is configured. Some of the pros and cons of various methods to control traffic flowing in and out of the network are provided in table 9.12. [Pg.209]


See other pages where Data Access Layer is mentioned: [Pg.46]    [Pg.186]    [Pg.46]    [Pg.186]    [Pg.26]    [Pg.371]    [Pg.165]    [Pg.517]    [Pg.511]    [Pg.159]    [Pg.149]    [Pg.1097]    [Pg.78]    [Pg.287]    [Pg.904]    [Pg.32]    [Pg.40]    [Pg.187]    [Pg.241]    [Pg.238]    [Pg.239]    [Pg.239]    [Pg.597]    [Pg.216]    [Pg.403]    [Pg.102]    [Pg.425]    [Pg.448]    [Pg.224]    [Pg.201]    [Pg.73]    [Pg.121]    [Pg.417]    [Pg.260]    [Pg.276]    [Pg.267]    [Pg.330]   
See also in sourсe #XX -- [ Pg.17 , Pg.46 ]




SEARCH



Accessing data

© 2024 chempedia.info