//Basic packet sending test at the MAC level, used for internal testing only. //This packet test has one node sending out a variety of //differently formatted packets to two assumed destination nodes.
标签: packet test internal sending
上传时间: 2014-08-21
上传用户:CSUSheep
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to destination File * Delete the Source File * Rename destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
An AHB system is made of masters slaves and interconnections. A general approach to include all possible "muxed" implementation of multi layered AHB systems and arbitrated AHB ones can be thought as an acyclic graph where every source node is a master, every destination node is a slave and every internal node is an arbiter there must be one and only one arc exiting a master and one or more entering a slave (single slave verus multi-slave or arbitrated slave) an arbiter can have as many input and output connections as needed. A bridge is a special node that collapses one or more slave nodes and a master node in a new "complex" node.
标签: interconnections approach general include
上传时间: 2015-12-12
上传用户:lyy1234
Contains source to demonstrate how to copy/delete files and folders with HFS+ APIs. It also demonstrates a technique to rename an object if an object of the same name exists in the destination. This sample shows how to perform these operations in an MP-safe way.
标签: demonstrate Contains demonstr folders
上传时间: 2016-01-14
上传用户:我们的船长
D169 Demo - DMA0 Repeated Burst to-from RAM, Software Trigger Description A 32 byte block from 220h-240h is transfered to 240h-260h using DMA0 in a burst block using software DMAREQ trigger. After each transfer, source, destination and DMA size are reset to inital software setting because DMA transfer mode 5 is used. P1.0 is toggled durring DMA transfer only for demonstration purposes. ** RAM location 0x220 - 0x260 used - always make sure no compiler conflict ** ACLK= n/a, MCLK= SMCLK= default DCO ~ 800k
标签: Description Repeated Software to-from
上传时间: 2014-01-09
上传用户:thinode
/* 例子二没有什么特别的。与例子一让大家学习如何默认设置session会话属性 session.SetDefaultPayloadType(96) session.SetDefaultMark(false) session.SetDefaultTimestampIncrement(160) 这里port与destination的端口号设的不一样。 例子的中文解释都由hanyuejun添加,有任何疑问请发hanyuejun2006@163.com */
标签: session SetDefaultPayloadType SetDefaultMar 96
上传时间: 2014-12-08
上传用户:LouieWu
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
标签: fault-tolerant algorithms redundant underlyin
上传时间: 2013-12-18
上传用户:jkhjkh1982
Approche de routage optimal avec comme parametres les matrices de liens, de capacit茅 ainsi que la direction des flots (origine destination)
标签: parametres Approche de matrices
上传时间: 2017-05-19
上传用户:com1com2
I implemented a perfect file transfer OCX client/server. I created a perfect function to parse and split the data. The source file size is equal to destination. NO LOSS OF DATA in the packets!
标签: perfect implemented function transfer
上传时间: 2014-01-19
上传用户:R50974
A routing scheme for content based networking. Content-based network is a network which does nt make use of the source or the destination address to forward a message. This network is quite different from the traditional network.
标签: network Content-based networking routing
上传时间: 2013-11-25
上传用户:lizhen9880