Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Routering

J. Slobodnik, A. J. H. Router, J. J. Vreuls, I. Eiska and U. A. Th Brinkman, Monitoring of organic micropollutants in surface water by automated on-line trace-enrichment liquid and gas cliromatographic systems with ultraviolet diode-array and mass spectro-metric detection , J. Chromatogr. 768 239-258 (1997). [Pg.373]

Mirrors BBMCA rule (e), and its rotated equivalents, allows groups of particles to be built up to form stable configurations. Such configurations can then be used as mirrors to reflect balls, and thereby to act as signal routers. Figure 6.15, for example, shows the smallest possible fixed configuration consisting of four particles. Since adjacent squares remain uncoupled from one another, mirrors of arbitrary size can be built up from this basic four-particle mirror. [Pg.321]

Such systems can reside on the organization s intranet or over the Internet. Various types of hardware and software are needed to host a website. The hardware includes switches, gateways, and routers. Software includes, among others, application servers, database servers, web servers, authentication servers, and firewalls. On the other hand, the only hardware and software... [Pg.611]

You should clearly define the vocabulary of element types that can be used to describe an architecture processes, replicators, buffers, caches, and events. The same is true of the roles played by the different components controllers, mediators, routers, and so on. A good architecture exhibits a coherence and simplicity by being based on a small number of such elements and patterns that are used consistently throughout the design. [Pg.505]

I Digital Cameras I LCD Displays iNetwork Hubs iBridnes. Routers... [Pg.455]

D. T. Shears makes loaf sugar at once cn boiling down the juice purifies sugar by alkaline liquids and sulphurous acid gas uses also lime and a tyest Indian plant called waseama, Puts a router in the vacuum pan for stirring round. [Pg.1003]

Our communications infrastructure relies heavily on advanced materials chemistries. From the manufacturing processes used to fabricate optical fiber cables to molecular beam epitaxy techniques for the creation of nanoscale heterostructures that enable many optical devices, innovations in materials chemistry have played a role. An example of a recent technological achievement that relates to optical communications systems is the MEMS-based (microelectromechanical system) Lambda Router. The Lambda Router is an optical system developed at Lucent Technologies for switching narrowly focused... [Pg.31]

Elsa Reichmanis I have read a lot about start-ups and smaller companies having a faster pace and being the innovators of the future. I don t entirely buy into that. I think you can have that same rapid time to market if you have the right environment in a large company. For example, Lucent s MEMS Lambda Router took only 18 months from idea to delivery of product, and I don t think of Lucent as a small company. [Pg.34]

The critical information infrastructure (CII) is a subset of the critical infrastructure, composed of the totality of interconnected computers and networks and their critical information flows [8]0, comprising therefore a vast range of components and systems, extending from hardware (satellites, routers), to software (operating systems, Internet protocols, databases), to data (DNS tables), to the processes and operations applied for running them [16]0. The CII includes typical information systems and telecommunications services, but increasingly now industrial systems (as for instance, the remote control of installations). [Pg.64]

First router process the datagram, delete it and sends it back an ICMP (Internet Control Message Protocol) message reporting that packet lifetime has been exceeded. This is way to determine an address of the first router ... [Pg.195]

Then traceroute sends datagram with TTL=2 that allows determine an IP-address of the next router ... [Pg.195]

The collection system provides comprehensive coverage of the customer network. We estimate that more than 95% of the traffic that flows between the customer network and the internet is captured, however, we are aware of a small number of uninstrumented routers and occasional failures of parts of the collection system. The volume of traffic captured is some tens of gigabytes per day with some tens of terabytes currently available for analysis. This requires a large computational and storage facility to support historical analysis. Note that there are a number of sources of delay in the collection process and flow records do not arrive at the collection facility in temporal order. The data set consists of hourly files as described in the next section. In general, the data for one hour may not be complete until well into the next hour and real time analysis is not feasible. [Pg.211]

Figure 1 shows the general collection setup at a typical border location. Note that inbound and outbound traffic is handled by separate routers. Access Control Lists (ACLs) are routinely used at the border to block sources or protocols deemed malicious by the customer. This data is also captured, but is segregated from the data that is routed. [Pg.211]

Scale free networks are common in nature, human relations, economy and technology. The Internet and WWW are important examples of scale-free networks. A possible reason for popularity of scale-free nets in nature may be their robustness in the presence of random node failures. Computer experiments have shown that Internet would not fall apart even if 80% of all routers fail [7]. [Pg.326]

Data acquisition is presented in the upper left comer of Figure 1. The information is read from multiple heterogeneous sources and transformed in our standard format. The acquisition mechanism understands the IDMEF format, our private database format, and several dedicated log sources such as firewall logs (Cisco, Netscreen, Checkpoint, IPtables), access control mechanisms (TCP-wrappers, login), VPN concentrators, IDS sensors and routers. [Pg.353]

A generic solution that has been proposed for these issues is to systematically trace the route between a known point inside our network and the victim/source host. We could then retrieve the location of the last router or switch, than is fixed and known in the inventory, and thus strongly reduce the physical search space for the machine. [Pg.361]

We have not implemented this solution, as traceroute is filtered on most internal routers. If the reference point is external, then it may be an interesting alternative solution for identifying machines that are not within our realm. We believe that this solution would provide an interesting solution for tracing intruders at least to the peering point where they enter our networks, thus allowing us to push back countermeasures as far away from our systems as possible. [Pg.362]

The reason is simply that these schemes can be printed and delivered to customers who do not possess 3-D piping visualization facilities. Nevertheless, plastic models formerly also used for the visualization of complex chemical plants certainly belong to the past. Today, a virtual reality plant allows the inspection of a plant in form of a 3-D virtual walk . Obstacles will be visualized space for inspection and service can be checked. In the past, 3-D planning happened to be a manual CAE-assisted procedure. Since a few years automated 3-D pipe routers have also existed [135]. [Pg.601]

For a long time, these auto-routers have been a standard tool in the electronics industry. They are applied in the design phase of electronic printed boards. An electronic router calculates the most efficient layout of an electronic pathway considering obstacles and predefined constraints. [Pg.601]

Almost immediately after Mills and Huber published their analysis, scientists at Lawrence Berkeley National Laboratory examined the underlying numbers in detail and found that the estimates of electricity used by the Internet were too high by a factor of eight.11 Major overestimates were found in every category, including the authors calculations of energy used by major dotcom companies, by the country s Web servers, by telephone companies central offices, by Internet routers and local networks, and by personal computers used in business and at home. The Internet did not consume 8 percent of U.S. electricity in 1998—it was closer to 1 percent. Computers, office equipment, and semiconductor manufacturers do not consume 13 percent of electricity—it is only 3 to 4 percent. [Pg.57]

Inter-leaving different colours, chamfering, engraving, routering, and sand blasting may be applied to give unusual decorative effects with solid-colour laminates. [Pg.124]


See other pages where Routering is mentioned: [Pg.2853]    [Pg.862]    [Pg.375]    [Pg.535]    [Pg.537]    [Pg.825]    [Pg.297]    [Pg.298]    [Pg.323]    [Pg.228]    [Pg.95]    [Pg.473]    [Pg.280]    [Pg.47]    [Pg.1160]    [Pg.1160]    [Pg.1160]    [Pg.32]    [Pg.240]    [Pg.82]    [Pg.210]    [Pg.210]    [Pg.212]    [Pg.220]    [Pg.354]    [Pg.364]    [Pg.602]    [Pg.41]    [Pg.113]   
See also in sourсe #XX -- [ Pg.113 , Pg.124 ]




SEARCH



Data router

Dual-axis torsional mirror Lucent lambda router optical switch

Lucent lambda router

MIDI Router

Routers

Routers, computer

Virtual MIDI Router

© 2024 chempedia.info