Wednesday, September 18, 2013

The purpose programming language design

0 komentar
A good language should be easy to compile. Not complicate the compilation process. Complexity can arise because of the symbol have different meanings. Example signs parenthesis (brackets open / close): Grouping sub-expression Restricted arguments in the function / procedureIndex on the arrays (in VB) Expression of mathematics and logic Examples of simple...

What Role Did She Play in Miley-Liam Split? : January Jones

0 komentar
At least one tabloid has said Hemsworth was caught cheating with Eiza Gonzalez over the weekend, a Mexican singer/actress with whom he hooked up in Las Vegas. But other reports have claimed tension between Liam and Miley for weeks, dating back to the latter's lewd Video Music Awards performance and continuing when Cyrus went naked for her "Wrecking Ball" video. Then there's January Jones. Rumors first surfaced in...

Hamming code

0 komentar
Hamming code Richard Hamming invented at Bell Labs in 1950 Error detection mechanisms by adding a data word (D) with a code, usually a parity check bit (C). The data stored in length D + C. Known errors by analyzing the data and parity bits # Data Bits # Bit Paritas SEC # Bit Paritas DEC 8 4 5 16 5 6 32 6 7 64 7 ...

Query for checking

0 komentar
/*before running this script run the report from backoffice first to store the data to table itemsales*/ /*this query will find out variance between sales after tax/gross sales and collected*/ --1.run this script to group all item per salesno SELECT salesno,splitno, Sum(([ItemSales].[Quantity]*[ItemSales].[ItemAmount])*case when ([ItemSales].[TransMode]='REG') then 1 else -1 end *case when ((FunctionID)=26) then 1 else 0 end...

Tuesday, August 24, 2010

Duplex Settings

2 komentar
There are two types of duplex settings used for communications on an Ethernet network: half duplex and full duplex. The figure shows the two duplex settings available on modern network equipment. Half Duplex: Half-duplex communication relies on unidirectional data flow where sending and receiving data are not performed at the same time. This is similar to how walkie-talkies or two-way radios function in that only one person can...

key elements ethernet 802.3 networks

0 komentar
In this topic, you will learn about key components of the Ethernet standard that play a significant role in the design and implementation of switched networks. You will explore how Ethernet communications function and how switches play a role in the communication process. CSMA/CD Ethernet signals are transmitted to every host connected to the LAN using a special set of rules to determine which station can access the network....

Thursday, August 5, 2010

LOGIC GATE

0 komentar
Computer system architecture is composed of a series of logic 1 (true) and 0 (false) combined with a number of logic gates are AND, OR, NOT, NOR, XOR, NAND.The computer program running on the basic structure of good reasoning from a solution to the problems with the help of the program component that is if-then, if - then-else and o...

Friday, July 23, 2010

Access Layer Switch Features

0 komentar
Now that you know which factors to consider when choosing a switch, let us examine which features are required at each layer in a hierarchical network. You will then be able to match the switch specification with its ability to function as an access, distribution, or core layer switch.Access layer switches facilitate the connection of end...

Switch Features

0 komentar
Switch Form FactorsWhat are the key features of switches that are used in hierarchical networks? When you look up the specifications for a switch, what do all of the acronyms and word phrases mean? What does "PoE" mean and what is "forwarding rate"? In this topic, you will learn about these features.When you are selecting a switch, you need...

Sunday, July 18, 2010

Considerations for Hierarchical Network Switches

1 komentar
Traffic Flow AnalysisTo select the appropriate switch for a layer in a hierarchical network, you need to have specifications that detail the target traffic flows, user communities, data servers, and data storage servers.Companies need a network that can meet evolving requirements. A business may start with a few PCs interconnected so that they can share data. As the business adds more employees, devices, such as PCs, printers,...

what is converged network

0 komentar
Small and medium-sized businesses are embracing the idea of running voice and video services on their data networks. Let us look at how voice and video over IP (VoIP) affect a hierarchical network.Legacy EquipmentConvergence is the process of combining voice and video communications on a data network. Converged networks have existed for a while now, but were only feasible in large enterprise organizations because of the network...

Friday, June 11, 2010

Basic VTP Configuration

1 komentar
Learning ObjectivesPerform basic switch configurations Configure the Ethernet interfaces on the host PCs Configure VTP and security on the switches Configuration Switch 1Switch>enableSwitch#configure terminalSwitch(config)#hostname S1S1(config)#enable secret classS1(config)#no ip domain-lookupS1(config)#line console 0S1(config-line)#password...

Configuring STP

0 komentar
Task 1: Examine the STP Default StateStep 1. Examine link lights.When STP is fully converged, the following conditions exist:All PCs have green link lights on the switched ports.Access layer switches have one forwarding uplink (green) to a distribution layer switch and a blocking uplink (amber) to a core layer switch.Distribution layer switches...
 
Trends K N A Copyright © 2009
Fresh Girly Blogger Template Designed by Herro | Powered By Blogger