网络安全(Security)
发表于
What is network security
- confidentiality(机密性): only sender, intended receiver should “understand” message contents
- sender encrypts message
- receiver decrypts message
authentication(身份验证): sender, receiver want to confirm identity of each other
message integrity(完整性): sender, receiver want to ensure message not altered (in transit, or afterwards) without detection
access and availability(可用性): services must be accessible and available to users
多媒体网络(Multimedia Networking)
发表于
multimedia networking applications
Multimedia: audio
- analog audio signal sampled at constant rate
- telephone: 8,000 samples/sec
- CD music: 44,100 samples/sec
each sample quantized, i.e., rounded
- e.g., 2^8=256 possible quantized values
- each quantized value represented by bits, e.g., 8 bits for 256 values
- example: 8,000 samples/sec, 256 quantized values: 64,000 bps
- 1 byte per sample, 8 bit * 8000 = 64,000 bps
- receiver converts bits back to analog signal:
- some quality reduction
无线网络和移动网络(Wireless and Mobile Networks)
发表于
Background
number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers (5-to-1)!
number of wireless Internet-connected devices equals number of wireline Internet-connected devices
- laptops, Internet-enabled phones promise anytime untethered Internet access
two important (but different) challenges
- wireless: communication over wireless link
- mobility: handling the mobile user who changes point of attachment to network
分布式系统的容错技术(下)
发表于
分布式系统的容错技术(上)
发表于
动态规划题目
发表于
[转]整理自http://www.cppblog.com/menjitianya/archive/2015/10/23/212084.html
递推
[例题1]在一个3 X N的长方形方格中,铺满1X2的骨牌(骨牌个数不限制),给定N,求方案数(图一 -1-1为N=2的所有方案),所以N=2时方案数为3。
二维状态
状态转移方程
f[i][0] = f[i-2][0] + f[i-1][1] + f[i-2][2]
f[i][1] = f[i-1][2]
f[i][2] = f[i][0] + f[i-1][1]
- 边界条件 :
f[0][0] = f[1][1] = f[0][2] = 1
数据链路层和局域网(The Link Layer and LANs)
发表于