<--- Back to Details
First PageDocument Content
Computer architecture / Virtual Telecommunications Access Method / IBM Systems Network Architecture / IBM Advanced Peer-to-Peer Networking / Data-Link Switching / Internet protocol suite / Z/OS / Link layer / Gateway / Network protocols / Network architecture / Computing
Date: 2009-09-24 08:59:44
Computer architecture
Virtual Telecommunications Access Method
IBM Systems Network Architecture
IBM Advanced Peer-to-Peer Networking
Data-Link Switching
Internet protocol suite
Z/OS
Link layer
Gateway
Network protocols
Network architecture
Computing

Introduction to the New Mainframe: Networking

Add to Reading List

Source URL: www.redbooks.ibm.com

Download Document from Source Website

File Size: 4,67 MB

Share Document on Facebook

Similar Documents

Contribution Number: OIF2002Working Group: Physical and Link Layer (PLL) Working Group Title: SFI-4 Phase 2: 64b/66b Line Code Update Source: Rick Walker Agilent Labs

DocID: 1tWgq - View Document

On the design of lightweight link-layer security mechanisms in IoT systems S. Sciancalepore∗ , A. Capossele† , G. Piro∗ , G. Boggia∗ and G. Bianchi‡ ∗ Dep. of Electrical and Information Engineering (DEI), Po

DocID: 1sQcI - View Document

Computing / Ethernet / Networking hardware / Internet protocol suite / Network architecture / Transmission Control Protocol / Network interface controller / Maximum transmission unit / Computer network / Link layer / Embedded system / Network switch

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1rgL1 - View Document

Universal identifiers / Identification / Computing / Language / IEEE 802.11 / Station / MAC address / Universally unique identifier / Wi-Fi / Unique identifier

Trackingstations without relying on the link layer identifier Mathy Vanhoef† , C´elestin Matte‡ , Mathieu Cunche‡ , Leonardo S. Cardoso‡ , Frank Piessens† †

DocID: 1rdWs - View Document

Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

DocID: 1r6fl - View Document