Search results

11 – 20 of over 114000
Article
Publication date: 1 February 1984

Mel Collier and David Piper

The Polytechnic of Central London has developed and installed a wide area network connecting libraries on six sites. The network is linked to SWALCAP for circulation control, and…

Abstract

The Polytechnic of Central London has developed and installed a wide area network connecting libraries on six sites. The network is linked to SWALCAP for circulation control, and cataloguing services will be added in 1984. Two local area network (LAN) projects are planned. An analysis of the telecommunications options considered is presented, with costs for the system adopted for the wide area network.

Details

Program, vol. 18 no. 2
Type: Research Article
ISSN: 0033-0337

Article
Publication date: 1 August 2000

Bert J. Dempsey

Every user of the World Wide Web understands why the WWW is often ridiculed as the World Wide Wait. The WWW and other applications on the Internet have been developed with a…

Abstract

Every user of the World Wide Web understands why the WWW is often ridiculed as the World Wide Wait. The WWW and other applications on the Internet have been developed with a client‐server orientation that, in its simplest form, involves a centralized information repository to which users (clients) send requests. This single‐server model suffers from performance problems when clients are too numerous, when clients are physically far away in the Network, when the materials being delivered become very large and hence stress the widearea bandwidth, and when the information has a real‐time delivery component as with streaming audio and video materials. Engineering information delivery solutions that break the single‐site model has become an important aspect of next‐generation WWW delivery systems. Intends to help the information professional understand what new directions the delivery infrastructure of the WWW is taking and why these technical changes will impact users around the globe, especially in bandwidth‐poor areas of the Internet.

Details

The Electronic Library, vol. 18 no. 4
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 June 1997

R. William Maule

Discusses strategies for implementing modern knowledge management curricula in academic programs for adult professionals. References the perspectives of multidisciplinary…

Abstract

Discusses strategies for implementing modern knowledge management curricula in academic programs for adult professionals. References the perspectives of multidisciplinary curricula covering information and society; multimedia and hypermedia; electronic information design and presentation; and infrastructure development and implementation. The analysis assumes the increasing involvement of highly trained professionals in adult education programs; the continuing growth of corporate universities in scope and breadth; the integration of corporate programs with traditional colleges and universities; and the increasing use of the Internet as a mechanism to coordinate, supplement, support, and integrate learning experiences. Advances historical and pedagogical methodologies as a means to provide perspective and structure for program development and future research. References an information technology (IT) program for mid‐career information managers in Northern California and serving the high‐technology area known as Silicon Valley.

Details

Internet Research, vol. 7 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Abstract

Details

Smart Cities
Type: Book
ISBN: 978-1-78769-613-6

Article
Publication date: 1 February 1989

Clifford A. Lynch

Over the past eight years, the MELVYL catalog has become one of the largest public access catalogs in the world, and now plays a central role in providing access to the library…

Abstract

Over the past eight years, the MELVYL catalog has become one of the largest public access catalogs in the world, and now plays a central role in providing access to the library resources of the University of California. Currently, under heavy load, the MELVYL catalog supports many hundreds of simultaneous terminal connections, servicing over a quarter of a million queries a week and displaying more than two million records a week to its user community. This article discusses the history of the network that has supported the MELVYL catalog from the early days of its prototype to the present. It also describes both the current technical and policy issues that must be addressed as the network moves into the 1990s, and the roles that the network is coming to play in integrating local automation, the union catalog, access to resource databases, and other initiatives. Sidebars discuss the TCP/IP protocol suite, internet protocol gateways, and Telenet and related inter‐operability problems.

Details

Library Hi Tech, vol. 7 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 21 November 2008

Luiz Angelo Steffenel, Maxime Martinasso and Denis Trystram

The purpose of this paper is to explain one of the most important collective communication patterns used in scientific applications which is the complete exchange, also called…

Abstract

Purpose

The purpose of this paper is to explain one of the most important collective communication patterns used in scientific applications which is the complete exchange, also called All‐to‐All. Although efficient algorithms have been studied for specific networks, general solutions like those available in well‐known MPI distributions (e.g. the MPI_Alltoall operation) are strongly influenced by the congestion of network resources.

Design/methodology/approach

In this paper we present an integrated approach to model the performance of the All‐to‐All collective operation, which consists in identifying a contention signature that characterizes a given network environment, using it to augment a contention‐free communication model.

Findings

This approach, assessed by experimental results, allows an accurate prediction of the performance of the All‐to‐All operation over different network architectures with a small overhead.

Practical implications

The paper discusses the problem of network contention in a grid environment, studying some strategies to minimize the impact of contention on the performance of an All‐to‐All operation.

Originality/value

The approach used, assessed by experimental results, allows an accurate prediction of the performance of the All‐to‐All operation over different network architectures with a small overhead. Also discussed is the problem of network contention in a grid environment and some strategies to minimize the impact of contention on the performance of an All‐to‐All operation.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 1988

Larry L. Learn

This article provides a broad overview of telecommunications and network‐related technologies. Topics covered include identification and review of network elements, analog and…

214

Abstract

This article provides a broad overview of telecommunications and network‐related technologies. Topics covered include identification and review of network elements, analog and digital signals, synchronous and asynchronous transmission formats, transmission media and equipment, transmission techniques and characteristics, multiplexing, network types, access technologies, network architectures and topologies, local‐area network technologies and attributes, protocols and protocol issues, gateways, internetworking, local networking alternatives, equipment certification, and various aspects of network management. It is intended to provide the practicing professional in the field of library and information science with a broad, up‐to‐date technical review that might serve to support and facilitate further investigation of current developments in networks and networking. Although the broad range of topics is not treated in depth, numerous references are provided for further investigation.

Details

Library Hi Tech, vol. 6 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1990

Leslie (Southwick) Wilhelm

Like Rome, the University of Michigan's campus‐wide fiber optic network was not built in a day. During an intense three‐week period in May 1988, Pradeep Patel, Transmission…

Abstract

Like Rome, the University of Michigan's campus‐wide fiber optic network was not built in a day. During an intense three‐week period in May 1988, Pradeep Patel, Transmission Engineer at University Telecommunications, managed to squeeze in 210 hours to complete the detailed engineering plans for the campus‐wide fiber optic network. Prior to this period, Patel and other UMTel and Information Technology Division employees were involved in every stage of network specification and implementation. Designing a practical, workable cable layout for a network covering 25 miles and connecting 72 buildings was no small job.

Details

Library Hi Tech, vol. 8 no. 2
Type: Research Article
ISSN: 0737-8831

Open Access
Article
Publication date: 4 September 2017

Jun Lin, Zhiqi Shen, Chunyan Miao and Siyuan Liu

With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow…

10740

Abstract

Purpose

With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow Band IoT (NB-IoT) and long range (LoRa) are two main leading competitive technologies. Compared with NB-IoT networks, which are mainly built and managed by mobile network operators, LoRa wide area networks (LoRaWAN) are mainly operated by private companies or organizations, which suggests two issues: trust of the private network operators and lack of network coverage. This study aims to propose a conceptual architecture design of a blockchain built-in solution for LoRaWAN network servers to solve these two issues for LoRaWAN IoT solution.

Design/methodology/approach

The study proposed modeling, model analysis and architecture design.

Findings

The proposed solution uses the blockchain technology to build an open, trusted, decentralized and tamper-proof system, which provides the indisputable mechanism to verify that the data of a transaction has existed at a specific time in the network.

Originality/value

To the best of our knowledge, this is the first work that integrates blockchain technology and LoRaWAN IoT technology.

Details

International Journal of Crowd Science, vol. 1 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Article
Publication date: 1 April 1990

Ray Denenberg

The upper three OSI layers support the communication requirements of applications, while the lower four layers provide reliable transmission of data. This article describes the…

Abstract

The upper three OSI layers support the communication requirements of applications, while the lower four layers provide reliable transmission of data. This article describes the lower four layers. First, though, a brief overview of the layered model is presented including a summary of the upper three layers. Then a description of the lower three layers is followed by a discussion of data communication standards associated with specific layers. Architectural concepts are then explored: hierarchy and abstraction within the layers, levels of dialogue, internetworking, end‐to‐end communication, analysis of layer four, and a discussion of connection‐oriented, connectionless, and message‐oriented protocols and applications. The article concludes with a comparison of OSI and the de facto industry protocols, TCP/IP, which are currently used within the Internet.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

11 – 20 of over 114000