点击切换搜索课件文库搜索结果(532)
文档格式:PPT 文档大小:3.34MB 文档页数:92
1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure and ISPs 1.6 Delay & loss in packet-switched networks 1.7 Protocol layers, service models 1.8 History
文档格式:PDF 文档大小:11.58MB 文档页数:170
深度学习简介 Neural Network Goodness of Function Pick the Best Function 前馈神经网络 Tips for Deep Learning 卷积神经网络(Convolutional Neural Network, CNN) 循环神经网络(Recurrent Neural Network, RNN) Keras CNN in Keras RNN in Keras
文档格式:PDF 文档大小:1.07MB 文档页数:13
Network Development of Network First measurements made in July 1992; just after start of International GPS Serviceigs). Since then measurements each year and often multiple campaigns per year. -The current network has over 1000 sites, many of them being recovery marks for the main
文档格式:PPT 文档大小:5.05MB 文档页数:82
1.1 What is the Internet? 1.2 Network edge ❑ end systems, access networks, links 1.3 Network core ❑ circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
文档格式:PPT 文档大小:2.5MB 文档页数:85
1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
文档格式:PPTX 文档大小:59.08KB 文档页数:6
安徽理工大学:《网络与信息安全 Network and Information Security》课程教学资源(PPT课件讲稿)Part 1 Introduction to Network & Information Security Section 1-3 the objectives of network and info security
文档格式:PPT 文档大小:3.02MB 文档页数:127
8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity and Digital Signature 8.4 End point authentication 8.5 Securing e-mail 8.6 Securing TCP connections: SSL 8.7 Network layer security: IPsec 8.8 Securing wireless LANs 8.9 Operational security: firewalls and IDS
文档格式:PPT 文档大小:15.5KB 文档页数:1
In this chapter we first introduce some of the basic definitions most often used in network graph theory and then implement some of the results of introductory graph theory to obtain general laws (KCL and KVL) which apply to any network
文档格式:PPTX 文档大小:6.56MB 文档页数:74
18.1 INTRODUCTION 18.2 NETWORK DESIGN AND IMPLEMNETION PROCESS 18.3 Requirements Phase 18.4 Investigate Alternatives 18.5 Network Design 18.6 SELECTION OF EQUIPMENT AND VENDORS 18.7 PREPARATION FOR IMPLEMENTATION 18.8 IMPLEMENTATION 18.9 CUTOVER 18.10 POST-IMPLEMENTATION AUDIT 18.11 CONSIDERATION FOR WAN DESIGN
文档格式:PPT 文档大小:681KB 文档页数:29
Network layer functions transport packet from sending to receiving hosts network layer protocols in physical every host, router data link physical data link
上页12345678下页末页
热门关键字
搜索一下,找到相关课件或文库资源 532 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有