Network architecture

Results: 18731



#Item
731Computer networking / OpenDaylight Project / Network protocols / Linux Foundation / Emerging technologies / Network architecture / OpenFlow / Open Platform for NFV / Linux / Big Switch Networks / Red Hat / Juniper Networks

CASE STUDY OpenDaylight becomes Industry Standard through Collaborative Development OpenDaylight Background

Add to Reading List

Source URL: www.linuxfoundation.org

Language: English - Date: 2016-07-18 16:20:09
732Network architecture / Computer security / Internet protocol suite / Communications protocol / Ethernet / Configure script / Access control / Troubleshooting / Information technology specialist

Unit/Standard Number High School Graduation Years 2016, 2017 and 2018 Computer System Networking and Telecommunications CIP

Add to Reading List

Source URL: www.cpavts.org

Language: English - Date: 2015-09-25 21:45:51
733Network architecture / Network function virtualization / Genband / Wind River Systems / WebRTC Gateway / Cloud computing / Session border controller / VNF / 6WIND

TITANIUM CLOUD GENBAND AND WIND RIVER Joint NFV Solution Delivers Virtual SBC with Carrier Grade Reliability

Add to Reading List

Source URL: www.wrs.com

Language: English - Date: 2016-08-16 04:01:12
734Network architecture / Delay-tolerant networking / Internet / Service-oriented architecture / Gateway / Wireless ad hoc network

SCANDEX: Service Centric Networking for Challenged Decentralised Networks Arjuna Sathiaseelan,1 ,Liang Wang,1 Andrius Aucinas,1 , Gareth Tyson,2 Jon Crowcroft1 1

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-08-24 06:29:24
735Fiber-optic communications / Broadband / Network architecture / Telephony / Local loop / Fiber to the x / Passive optical network / Cable television / Optical networking / Synchronous optical networking / Public switched telephone network / Hybrid fibre-coaxial

Microsoft Word - FTTP System Architecture _Exhibit 2_.doc

Add to Reading List

Source URL: www.ripuc.org

Language: English - Date: 2009-10-20 14:18:23
736Computer network security / Cyberwarfare / Computing platforms / NetBSD / Kerberos / Kernel / Firewall / HP-UX / Linux / Computer security / Unix / Pkgsrc

Roland Dowdeswell Address elided for online version Phone elided for online version Positions Director, Dowdeswell Security Architecture, Ltd

Add to Reading List

Source URL: www.imrryr.org

Language: English - Date: 2013-08-15 06:56:10
737Internet protocols / Internet protocol suite / Network architecture / Z/OS / Transmission Control Protocol / MVS / ACF2 / Telnet / Resource Access Control Facility / CICS / Virtual Storage Access Method / IPsec

CEF Connector Configuration Guide This document is provided for informational purposes only, and the information herein is subject to change without notice. Please report any errors herein to HP. HP does not provide any

Add to Reading List

Source URL: correlog.com

Language: English - Date: 2014-04-16 10:21:27
738Broadband / Local loop / Network architecture / Fiber-optic communications / Fiber to the x / Telephony / Issaquah Highlands / Internet access / Issaquah /  Washington / Free / Home network / Fiber to the premises by country

FTTH Case Study Fiber to the Home In a Planned Community Issaquah Highlands was one of the first master-planned communities to have a fiber-to-the-home network. More than a decade later, the network is still going stron

Add to Reading List

Source URL: www.bbcmag.com

Language: English - Date: 2014-08-27 17:25:03
739Telecommunications engineering / Network architecture / Network performance / Streaming / Teletraffic / Computer network / Routing / Quality of service

ISSN No: Volume No: 1(2014), Issue No: 1(January) Implementation of Survivability Techniques by Using Point-To-Point Approach

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-10-01 07:59:03
740Computer access control / Computer network security / Virtual private networks / ESET / Internet privacy / Network architecture / Multi-factor authentication / Password / Authentication / One-time password / RADIUS / SoftEther VPN

Protect your VPN in 10 Minutes Looking to secure your VPN access in no time? ESET Secure Authentication gives your people super easy, secure access to your company network - from anywhere. Run The Installer ◆ Run the

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-19 03:58:22
UPDATE