Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Data router

Communications through the "hub" system (serving as a data router or switch) can permit integration of data from different test stations and perform more thorough and more sophisticated analysis of the labs data. [Pg.10]

The critical information infrastructure (CII) is a subset of the critical infrastructure, composed of the totality of interconnected computers and networks and their critical information flows [8]0, comprising therefore a vast range of components and systems, extending from hardware (satellites, routers), to software (operating systems, Internet protocols, databases), to data (DNS tables), to the processes and operations applied for running them [16]0. The CII includes typical information systems and telecommunications services, but increasingly now industrial systems (as for instance, the remote control of installations). [Pg.64]

The collection system provides comprehensive coverage of the customer network. We estimate that more than 95% of the traffic that flows between the customer network and the internet is captured, however, we are aware of a small number of uninstrumented routers and occasional failures of parts of the collection system. The volume of traffic captured is some tens of gigabytes per day with some tens of terabytes currently available for analysis. This requires a large computational and storage facility to support historical analysis. Note that there are a number of sources of delay in the collection process and flow records do not arrive at the collection facility in temporal order. The data set consists of hourly files as described in the next section. In general, the data for one hour may not be complete until well into the next hour and real time analysis is not feasible. [Pg.211]

Figure 1 shows the general collection setup at a typical border location. Note that inbound and outbound traffic is handled by separate routers. Access Control Lists (ACLs) are routinely used at the border to block sources or protocols deemed malicious by the customer. This data is also captured, but is segregated from the data that is routed. [Pg.211]

Data acquisition is presented in the upper left comer of Figure 1. The information is read from multiple heterogeneous sources and transformed in our standard format. The acquisition mechanism understands the IDMEF format, our private database format, and several dedicated log sources such as firewall logs (Cisco, Netscreen, Checkpoint, IPtables), access control mechanisms (TCP-wrappers, login), VPN concentrators, IDS sensors and routers. [Pg.353]

In order to successfully send data on the network, you need to make sure the network cards are of the same type (i.e., all Ethernet, all Token Ring, all ARCNet, etc.) and they are connected to the same piece of cable. If you use cards of different types (for example, one Ethernet and one Token Ring), neither of them will be able to communicate with the other (unless you use some kind of gateway device, such as a router). [Pg.329]

Routers are highly intelligent devices that connect multiple network types and determine the best path for sending data. They can route packets across multiple networks and use routing tables to store network addresses to determine the best destination. Routers operate at the Network layer of the OSI model. [Pg.334]

The single-photon pulses of the detectors are fed into a router (see Sect. 3.1, page 29). Por each photon detected in any of the detectors, the router delivers a single-photon pulse and the number of the detector that detected the photon. The TCSPC module determines the time of the photon in the laser pulse sequence ( micro time ) and the time from the start of the experiment ( macro time ). The detector number, the micro time, and the macro time are written into a first-in-first-out (PlPO) buffer (see Sect. 3.6, page 43). The output of the PlPO is continuously read by the computer, and the photon data are written in the main memory of the computer or on the hard disc. [Pg.178]

Several deteetors are eonneeted via a router to the same TCSPC module. The photon pulses from the seeond deteetor are delayed by more than the dead time of the TCSPC module. More than two detectors ean be used if their delay lines are different by more than the module dead time. The stop pulses for the TCSPC module come from the pulsed laser, or, if a CW laser is used, from an external eloek generator. Due to the different delay of the deteetor signals, photons deteeted simultaneously do not arrive simultaneously at the router inputs. Therefore, photons detected in the same laser pulse period are reeorded at different times and stored in the FIFO data file with a macro time offset. The differenees in the maero times caused by the delay lines in front of the router are known and ean easily be corrected when the photons are correlated. [Pg.189]

The data sheet of the R5900-L16 specifies a channel crosstalk of only 3%. There is certainly no reason to doubt this value. However, in a real optical setup it is almost impossible to reach a crosstalk this small. If crosstalk is an issue, the solution is to use only each second channel of the R5900-L16. If the PML-16 is used with only 8 channels, the data of the unused channels should simply remain unused. If the R5900-L16 is used with an external router, the unused anodes should be grounded via 50 Q resistors. [Pg.254]

The coordinator node receives the information from the router nodes over the wireless, meanwhile, it converges and deal with the data. Then, the data is transmitted to the host computer over the ground. The coordinator is the important node in the system. The coordinator which is the full functional device (FFD) builds the networks and receives the data from the router nodes or end nodes. The coordinator node can also control the router nodes or end nodes. [Pg.132]

The host computer with the monitoring software deals with the data from the mine. The data can be analyzed and stored. Then it can also be shown by the LCD screen or be printed in real time. The data is transmitted between the host computer and the coordinators by the CAN bus. The CAN bus adapts the non-destructive arbitration technique, which can avoid the bus collision. It ensures the capacity and the rate of the data. From Figure 2, we see that the data is transmitted between the coordinator node and the router node or the end node over the wireless. It is flexible to install the node underground over the wireless. Further more, it avoids the dangers of the cables such as the aging, the breakage and the corrosion... [Pg.132]

Because flash-OFDM is data-oriented technology, base stations are access routers designed to connect directly into the edge routers of a managed, all-IP network with all standard components and no special wireless-specific boxes. In contrast, 3G data systems require many expensive, wireless-specific, non-IP boxes in a circuit-oriented access network to manage mobility. [Pg.76]

Linksys (2005) WRT54GL wireless router technical data http //www.linksys.com. Accessed 13th Jan 2011... [Pg.182]

In order to meet the real-time transfer of the signal, stringent service quality parameters are defined over the data transfers down the supply chain. This chapter provides techniques to meet these requirements with minimal resources. Intime flow of the commodities to the end user is the basic requirement in a supply chain. The tools and techniques used to meet this goal are different in different supply chains. The example of realtime transfer of information for the end user is eonsidered throughout this ehapter. The supply ehain involves various routers, switehes, and media in between. The goal is to getthe real-time performanee in the ehain with minimal retransmissions. The concepts may be easily extended to any other form of supply chain. [Pg.253]

The monthly sales data for the year 2011 for Datastream, Inc., which produces network routers for small companies, are given in Table 2.18. [Pg.86]

Once a suitable T1 node is found, the apphcation node sends a subscription request to that node using the T2 nodes as routers. The T1 node accepts the subscription and transmits the requested data to the apphcation node. [Pg.643]

The transport layer controls the connection-oriented flow of data by sending acknowledgments to data senders once the recipient has received data and also makes sure that segments of data are retransmitted if they do not reach the intended recipient. A router is one of the fundamental devices that works in this layer, and it is used to connect two or more networks together physically hy providing a high degree of security and traffic control. [Pg.402]

Data corruption may be a result of illegitimate data modification on behalf of an attacker. Furthermore, we assume that attackers are not oirmipresent and take over a small fraction of peers. The target of data corruption attacks may be any RTU or router in the SCADA system which we assume to be IP based. We do not consider attacks directed against sensors, actuators, or high-level stations. Consequent on a data integrity attack is the provision of incorrect data to the SCADA system which results in an inconsistent system state. The introduced fault and attack classes endanger both safety-critical and operational-critical control loops. [Pg.164]

Protecting SCADA from Data Integrity Attacks. PeSCADA is able to discover data corruption attacks, if the location of corruption is between source and destination. We consider corruptions that occur after initial message replication in the overlay, i.e., the corruption occurs on a compromised router. PeSCADA operates as follows Whenever a SCADA message arrives at an MTU through the conventional SCADA communication channel, the MTU requests the same message via the P2P overlay from q different replica locations and... [Pg.169]


See other pages where Data router is mentioned: [Pg.21]    [Pg.21]    [Pg.1160]    [Pg.210]    [Pg.210]    [Pg.212]    [Pg.220]    [Pg.354]    [Pg.41]    [Pg.475]    [Pg.316]    [Pg.334]    [Pg.835]    [Pg.305]    [Pg.333]    [Pg.382]    [Pg.104]    [Pg.108]    [Pg.540]    [Pg.238]    [Pg.133]    [Pg.15]    [Pg.21]    [Pg.75]    [Pg.64]    [Pg.383]    [Pg.419]    [Pg.1070]    [Pg.171]   
See also in sourсe #XX -- [ Pg.21 ]




SEARCH



Routering

© 2024 chempedia.info