Spelling suggestions: "subject:"land.""
41 |
Étude électroencéphalographique des premiers processus syntaxiques impliqués lors de la compréhension de la phrase en français québécoisMartel, Guillaume January 2007 (has links)
Mémoire numérisé par la Division de la gestion de documents et des archives de l'Université de Montréal.
|
42 |
The Performance of a Linux NFS ImplementationBoumenot, Christopher M 20 May 2002 (has links)
NFS is the dominant network file system used to share files between UNIX-derived operating system based hosts. At the onset of this research it was found that the tested NFS implementations did not achieve data writing throughput across a Gigabit Ethernet LAN commensurate with throughput achieved with the same hosts and network for packet streams generated without NFS. A series of tests were conducted involving variation of many system parameters directed towards identification of the bottleneck responsible for the large throughput ratio between non-NFS and NFS data transfers for high speed networks. Ultimately it was found that processor, disk, and network performance are not the source of low NFS throughput but rather it is caused by an avoidable NFS behavior, the effects of which worsen with increasing network latency.
|
43 |
Timed power line data communicationAckerman, Kevin W 17 February 2005
<p>With the ever increasing demand for data communication methods, power line communication has become an interesting alternative method for data communication. Power line communication falls into two categories: one for data transmission between sites in the power grid and the other for home or office networking. When considering home or office networking, existing methods are either too slow for tasks other than simple automation, or are very fast with a higher cost than necessary for the desired function. The objective in this work is to develop a lower cost communication system with an intermediate data transmission rate.</p><p>At first glance, power line communication looks like a good option because of the availability of power outlets in every room of a building. However, the power conductors were installed solely for the purpose of distributing 60 Hz mains power and, for data signals, they exhibit very high attenuation, variable impedance and there is radio frequency shielding. Furthermore, many of the 60 Hz loads produce radio frequency interference that impedes data communication. Previous research has shown that much of the noise is time synchronous with the 60 Hz mains frequency and that the majority of data errors occur during these periods of high noise.</p><p>
This work develops a power line communication protocol that coordinates transmissions and uses only the predictable times of lower noise. Using a central control strategy, the power line 60 Hz mains signal is divided into 16 timeslots and each timeslot is monitored for errors. The central controller periodically polls all stations to learn which timeslots have low noise and it then controls all transmissions to make the best use of these good timeslots. The periodic polling allows the system to adapt to changes in electrical loading and noise. This control strategy has been achieved with modest complexity and laboratory measurements have shown throughput approaching 70% of the modem bit rate.</p>
|
44 |
Design comparison between HiperLAN/2 and IEEE802.11a services / Design comparison between HiperLAN/2 and IEEE802.11a servicesEdbom, Emil, Henriksson, Henrik January 2001 (has links)
This paper is a study and comparison between the two Wireless LAN (WLAN) standards HiperLAN/2 and IEEE 802.11a. WLANs are used instead or together with ordinary LANs to increase mobility in for example an office. HiperLAN/2 is an European standard developed by ETSI and the IEEEs standard is American. A WLAN-card consists roughly of a Medium Access Control (MAC), Physichal layer (PHY) and an antenna. The antenna is the same for the different standards. Both standards operates at 5.4 GHz with a maximum transmission rate at 54 Mbit/s and they use OFDM to modulate the signal. This means that the physical layer in the two standards is similar. The differences between the standards are in the Medium Access Control (MAC) layer. HiperLAN/2 has a much more complex MAC since it is developed with the starting point in cellular phones. Therefore this MAC is not very similar to ETHERNET that is the protocol used by regular network. On the other hand it is built to be compatible with cellular phones and other applications. The 802.11a MAC is very much the same as in the 802.11b standard that is the most used standard at present. The difference is that 802.11a can send at much higher data rates. This MAC is build with starting point in ETHERNET so it has a similar interface to the computer. This makes it less complex. The different MACs can provide different services. The greatest difference is that 802.11a can use a distributed send mode where any STA can send if the medium is idle. This reminds a lot of ETHERNET but they use different methods to sense if the medium is idle. In HiperLAN/2 are all transmissions scheduled by the AP. 802.11a can operate in a similar way but at the moment this mode is not as fully developed as in HiperLAN/2. There are working groups in IEEE that works toward an improvement of 802.11a so it can use queues with different priorities, this is already implemented in HiperLAN/2. Another important issue in wireless environment is security. Both standards use encryption to protect their messages. The difference is that HiperLAN/2 changes their encryption key for every connection where 802.11a uses the same key the whole time. This gives HiperLAN/2 a better security with todays standard but thereare working groups dealing with implementing key-exchange functions and Kerberos use in 802.11a. Chapter 8 is a description of a program that we developed in C++. The program is used to monitor the different registers and ports a WLAN-card use. It is written for a 802.11b card and should be used together with Windows 2000. The source code can be found in appendix C.
|
45 |
Timed power line data communicationAckerman, Kevin W 17 February 2005 (has links)
<p>With the ever increasing demand for data communication methods, power line communication has become an interesting alternative method for data communication. Power line communication falls into two categories: one for data transmission between sites in the power grid and the other for home or office networking. When considering home or office networking, existing methods are either too slow for tasks other than simple automation, or are very fast with a higher cost than necessary for the desired function. The objective in this work is to develop a lower cost communication system with an intermediate data transmission rate.</p><p>At first glance, power line communication looks like a good option because of the availability of power outlets in every room of a building. However, the power conductors were installed solely for the purpose of distributing 60 Hz mains power and, for data signals, they exhibit very high attenuation, variable impedance and there is radio frequency shielding. Furthermore, many of the 60 Hz loads produce radio frequency interference that impedes data communication. Previous research has shown that much of the noise is time synchronous with the 60 Hz mains frequency and that the majority of data errors occur during these periods of high noise.</p><p>
This work develops a power line communication protocol that coordinates transmissions and uses only the predictable times of lower noise. Using a central control strategy, the power line 60 Hz mains signal is divided into 16 timeslots and each timeslot is monitored for errors. The central controller periodically polls all stations to learn which timeslots have low noise and it then controls all transmissions to make the best use of these good timeslots. The periodic polling allows the system to adapt to changes in electrical loading and noise. This control strategy has been achieved with modest complexity and laboratory measurements have shown throughput approaching 70% of the modem bit rate.</p>
|
46 |
Lan-Yu Amateur Writer ¡V Siyapenjipengaya and His CompositionsChen, Ching-Yu 23 July 2012 (has links)
Abstract
In recent years, studies of Taiwanese aboriginal literature have been given attentions due to the trend of localization in literature. Japanese scholars are the pioneers who are interested in and study Taiwanese aboriginal literature. They spend lots of efforts on studying Yami tribe much more than on other aborigines in Taiwan. The Yami did not have written language. They orally passed their culture on generation by generation. Therefore, they have abundant literature of oral tradition. Siyapenjipengaya, a Yami, worried that the Yami culture would be lost because of the assimilation to the Han nationality. He, therefore, recorded the culture features in literation. Yami is one of the Austronesian tribes, and they are the only aborigine who live near coasts in Taiwan. Their culture is much different from the other aborigines in Taiwan, and they are the only aborigine who do not have the tradition of headhunting and wine making.
This study focused on the features of tribalism and cultural heritages in the works of Siyapenjipengaya. The works displaying tribalism were classified as the origins of the tribe, the spirits in traditional stories, life stories, and Anito¡¦s stories. The works displaying cultural heritages were classified as the knowledge of seas and oceans, cultural heritages, and Yami songs. By studying the folk stories and songs in the works of Siyapenjipengaya, the purpose of this study was to comprehend the custom and tradition of Yami culture.
|
47 |
A Modified Distributed Coordination Function for Real-Time Traffic in IEEE 802.11 WLANLin, An-Tai 01 September 2003 (has links)
The Distributed Coordination Function (DCF) which uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and binary slotted exponential backoff scheme is the basis of the IEEE 802.11 Medium Access Control (MAC) protocol. However, the DCF is not suitable for real-time traffic control since the backoff scheme may cause huge frame delay and jitter. We propose a modified DCF which uses a forward backoff scheme to remedy this disadvantage. In addition, a call admission control (CAC) is also proposed. Our protocol can guarantee service qualities such as the network throughput, frame delay, and jitter for real-time traffics. Besides, the modified DCF is still compliant with the IEEE 802.11 standard. Simulation results have shown that our method performs better than other DCF disciplines.
|
48 |
Development of IEEE 802.11b RF Transceiver ModulesHan, Fu-Yi 10 July 2003 (has links)
This thesis consisted of three parts. Part 1 introduced the design procedure of an RF transceiver modules for IEEE 802.11b WLAN system. It contained the selection of RF architectures, frequency planning, and the receiver link budget analysis flow. Part 2 focused on the implementation of each stage in the whole RF link. The design considerations of choosing passive elements and the parasitic effect of the evaluation board are discussed. Part 3 integrated the whole RF transceiver module and estimated the performance of this module through the link budget analysis method. Furthermore, a complete specification measurement was accomplished by using the standard test signals. The test results confirmed with the budget results, and also pass the specification of IEEE 802.11b WLAN system.
|
49 |
Datakommunikation vid vetenskapliga konferenserGustafsson, Jonas January 2002 (has links)
<p>Under konferenser distribueras det ut mycket material mellan konferensarrangörerna och deltagarna. Idag sker det mesta av denna distribuering i pappersform. Genom att utnyttja den tekniken som finns inom datakommunikation kan datanätverk användas för att underlätta denna informationsspridning. I denna rapport har två olika nätverkstopologier undersökts för att se hur dessa kan användas för att tillgodose de önskemål som finns på kommunikation vid en konferens. De topologier som undersökts är trådbundna LAN samt spontana nätverk. Lösningen blev en hybrid av de olika tjänster som dessa båda topologier kan erbjuda.</p>
|
50 |
Design comparison between HiperLAN/2 and IEEE802.11a services / Design comparison between HiperLAN/2 and IEEE802.11a servicesEdbom, Emil, Henriksson, Henrik January 2001 (has links)
<p>This paper is a study and comparison between the two Wireless LAN (WLAN) standards HiperLAN/2 and IEEE 802.11a. WLANs are used instead or together with ordinary LANs to increase mobility in for example an office. HiperLAN/2 is an European standard developed by ETSI and the IEEEs standard is American. </p><p>A WLAN-card consists roughly of a Medium Access Control (MAC), Physichal layer (PHY) and an antenna. The antenna is the same for the different standards. </p><p>Both standards operates at 5.4 GHz with a maximum transmission rate at 54 Mbit/s and they use OFDM to modulate the signal. This means that the physical layer in the two standards is similar. </p><p>The differences between the standards are in the Medium Access Control (MAC) layer. HiperLAN/2 has a much more complex MAC since it is developed with the starting point in cellular phones. Therefore this MAC is not very similar to ETHERNET that is the protocol used by regular network. On the other hand it is built to be compatible with cellular phones and other applications. </p><p>The 802.11a MAC is very much the same as in the 802.11b standard that is the most used standard at present. The difference is that 802.11a can send at much higher data rates. This MAC is build with starting point in ETHERNET so it has a similar interface to the computer. This makes it less complex. </p><p>The different MACs can provide different services. The greatest difference is that 802.11a can use a distributed send mode where any STA can send if the medium is idle. This reminds a lot of ETHERNET but they use different methods to sense if the medium is idle. In HiperLAN/2 are all transmissions scheduled by the AP. 802.11a can operate in a similar way but at the moment this mode is not as fully developed as in HiperLAN/2. There are working groups in IEEE that works toward an improvement of 802.11a so it can use queues with different priorities, this is already implemented in HiperLAN/2. </p><p>Another important issue in wireless environment is security. Both standards use encryption to protect their messages. The difference is that HiperLAN/2 changes their encryption key for every connection where 802.11a uses the same key the whole time. This gives HiperLAN/2 a better security with todays standard but thereare working groups dealing with implementing key-exchange functions and Kerberos use in 802.11a. Chapter 8 is a description of a program that we developed in C++. The program is used to monitor the different registers and ports a WLAN-card use. It is written for a 802.11b card and should be used together with Windows 2000. The source code can be found in appendix C.</p>
|
Page generated in 0.0457 seconds