综合搜索课件包文库(72)
文档格式:PPT 文档大小:694.5KB 文档页数:42
Summary of mac protocols What do you do with a shared media? Channel Partitioning by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning dynamic
文档格式:PPT 文档大小:1.99MB 文档页数:53
Assignment: read Part I: Introduction chapter 1 in text ur goa Overview: get contex↑ what's the Internet overview.\feel\of what's a protocol?
文档格式:PPT 文档大小:1.27MB 文档页数:129
《计算机网络与通讯》课程教学资源(PPT课件讲稿,英文版)Chapter 3 Transport Layer
文档格式:PPT 文档大小:700.5KB 文档页数:81
7.1 What is network security? 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key Distribution and certification 7.6 Access control: firewalls 7.7 Attacks and counter measures 7.8 Security in many layers
文档格式:PPT 文档大小:461KB 文档页数:37
IP datagram format IP protocol version 32 bits Imber total datagram header lenath lver/head pe length(bytes) (bytes) Hlen service
文档格式:PPT 文档大小:512KB 文档页数:30
Link Layer: setting the context actual PDu flow Router r1 applicatio pp lication transport trar sport network net vork data link
文档格式:PPT 文档大小:1.11MB 文档页数:37
Chapter Overview: understand principles transport layer services behind transport layer 0multiplexing/demultiplexing services: 0connectionless transport: UDP multiplexing/demultiplex
文档格式:PPT 文档大小:1.42MB 文档页数:76
Introduction This chapter describes the general concept of remote file access and reviews the concepts underlying a particular remote access mechanism Because the remote file access mechanism derives many ideas and details from the underlying OS, the chapter reviews the Linux file system and the semantics of file operations
文档格式:PPT 文档大小:860KB 文档页数:23
Introduction X Presents the sequence of steps a programmer takes to first create a conventional program and then divide the program into local and remote components w Uses an example application to show the output from rpcgen and additional code required to create the client and server components of a distributed program that uses rpc
文档格式:PDF 文档大小:52.98MB 文档页数:1061
Chapter 0. Reader's Guide Chapter 2. Classical Encryption Techniques Chapter 3. Block Ciphers and the Data Encryption Standard Chapter 4. Finite Fields Chapter 5. Advanced Encryption Standard Chapter 6. More on Symmetric Ciphers Chapter 7. Confidentiality Using Symmetric Encryption Chapter 8. Introduction to Number Theory Chapter 9. Public-Key Cryptography and RSA Chapter 10. Key Management; Other Public-Key Cryptosystems Chapter 11. Message Authentication and Hash Functions Chapter 12. Hash and MAC Algorithms Chapter 13. Digital Signatures and Authentication Protocols Chapter 14. Authentication Applications Chapter 15. Electronic Mail Security Chapter 16. IP Security Chapter 17. Web Security Chapter 18. Intruders Chapter 19. Malicious Software Chapter 20. Firewalls
上页12345678下页
热门关键字
搜索一下,找到相关课件或文库资源 72 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有