Network Time Protocol

Results: 810



#Item
111Internet protocols / Internet standards / Routing protocols / Border Gateway Protocol / Network protocols / Router / Peering / Telnet / Route Views / Network architecture / Internet / Computing

Real-­‐Time  BGP  Data  Access   Dan  Massey                  Colorado  State  University     Real-­‐Time  BGP  Data  Access  

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:39:47
112Routing / IP address / Subnetwork / Default gateway / Default route / Private network / Network switch / File Transfer Protocol / Firewall / Network architecture / Internet / Computing

IP Networking Exam Winter 2001 Time allowed: Two hours Answer three out of these four questions! MSc Computer Systems January 20, 2002

Add to Reading List

Source URL: herbert.the-little-red-haired-girl.org

Language: English - Date: 2009-07-29 03:21:47
113IEEE 802 / Wireless sensor network / Synchronization / Clocks / Clock synchronization / Sensor node / IEEE 802.15.4 / Communications protocol / Message authentication code / Technology / Computing / Telecommunications engineering

TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
114GPS / Navigation / Clocks / Electronic test equipment / Atomic clock / Global Positioning System / Utility frequency / Selective availability anti-spoofing module / Precision Time Protocol / Technology / Horology / Measurement

Modular Equipment and Network Enclosures, Modular Consoles / Security Consoles, EMI/RFI Shielded, Bellcore Qualified Seismic Racks, DataCom Server Cabinets and Racks, and Wall Mount Racks Cesium Clocks

Add to Reading List

Source URL: www.wa-brown.com

Language: English - Date: 2015-04-20 09:28:03
115Network performance / Covert channel / Steganography / Overt channel / Measuring network throughput / Transmission Control Protocol / IPv4 / Network packet / Time to live / Computer architecture / Computing / Network architecture

CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1 Sebastian Zander {} May 21, 2008 Abstract Communication is not necessarily made secure by the use of encryption alone. The mere ex

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2008-05-20 22:39:30
116Analysis of algorithms / Human communication / Complexity classes / Gossip protocol / Network architecture / Randomized algorithm / Consensus / Time complexity / Distributed computing / Theoretical computer science / Computational complexity theory / Applied mathematics

Meeting the Deadline: On the Complexity of Fault-Tolerant Continuous Gossip ∗ † Chryssis Georgiou

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2011-11-17 23:45:09
117Smartphones / Cloud clients / IP camera / Internet Protocol / Surveillance / Video / Network Video Recorder / 1080p / IPhone / Computer hardware / Computing / Electronic engineering

DATA/ SPEC SHEET HDEXPRESS SERIES NETWORK VIDEO RECORDER (NVR) • 1080P/60 Hzxreal-time recording and display The HDExpress™ is a plug-and-play Network Video Recorder

Add to Reading List

Source URL: www.sourcesecurity.com

Language: English - Date: 2014-05-12 05:43:18
118Network Time Protocol / IRIG timecode / Computing / Time server / Dynamic Host Configuration Protocol / Internet standards / Internet / Network architecture

Microsoft Word - Network Time Display.doc

Add to Reading List

Source URL: www.brandywinecomm.com

Language: English - Date: 2009-08-10 20:33:24
119Telephony / Voice over IP / Media gateway / Real-time Transport Protocol / Media Gateway Control Protocol / H.323 / Public switched telephone network / Signaling gateway / IP Multimedia Subsystem / Electronic engineering / Electronics / Videotelephony

CHAPTER 4 Multimedia over IP The idea of multimedia communications is very appealing—text, graphics, sound, and video all combined to enrich the ways in which we communicate and to transform communications from a one-

Add to Reading List

Source URL: www.3g-wireless.net

Language: English - Date: 2012-03-15 00:38:05
120Middleware / Data distribution service / Message-oriented middleware / Computer network security / Real-Time Innovations / SCADA / Service-oriented architecture / Access control / Communications protocol / Computing / Technology / Security

WHITEPAPER Four Keys to Securing Distributed Control Systems Executive Summary At the core of critical infrastructure and industrial applications, control systems drive today’s power grid,

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
UPDATE