منابع مشابه
Outsourcing and the Increased Dangers of Dial Up Access
IT outsourcing is becoming increasingly popular. The recent Holway Report into the UK IT services industry found spending on outsourcing last year grew by 15% compared with 5% the previous year. Also the value of outsourcing deal s doubled between 1999 and 2000 from #713 million to #1.8 billion. The main advantages of outsourcing are clear. Firstly, it allows a business to fix the price of supp...
متن کاملUsing dial-up lightpaths for high-speed access
AbstractWe propose a dial-up optical access architecture that allows an end host to dynamically request and receive a high-speed circuit for connection to its Internet Service Provider’s router. We carry out an analytical comparison of the current leased-line architecture and our proposed dial-up architecture for access networks. It shows significant capacity savings, for example, savings of 39...
متن کاملthe relationship between multiple intelligences and english proficiency of efl learners at payame noor university
این پژوهش برای بررسی پیوند احتمالی میان هوش های چندگانه – پیشنهاد شد? هاوارد گاردنر، 1983– (هم به گونه یکپارچه و هم به گونه بند بند) از یک سو و توانش انگلیسی دانشجویان ایرانی دانشگاه پیام نور در رشته زبان انگلیسی از سوی دیگر انجام گرفت. برای این کار، تافلpbt و پرسش نامه هوش های چندگانه میان 102 دانشجو در دانشگاه پیام نور شهریار پخش شد. نتایج بررسی داده ها نشان می دهد که در اندازه معنا داری 5 در...
15 صفحه اولAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملInternet User Access via Dial-up Networks - Traffic Characterization and Statistics
|Understanding network traÆc from operational networks is critical to the design and evaluation of network protocols. We present analysis of a data set comprised of eight months of RADIUS authentication data taken from a large national dial-up Internet Service Provider (ISP). We present basic statistics, including session counts based on time-of-day, session length distribution, session inter-a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IALLT Journal of Language Learning Technologies
سال: 2019
ISSN: 1050-0049,1050-0049
DOI: 10.17161/iallt.v5i1.8786