资源列表
OOAD-using-UML
- Object oriented analysis and design using UML
General-Guidelines-for-Coding
- General guidelines for coding
wireless-network-setting
- 一种安全性较强的无线网络设置,基于TPLink-A strong security wireless network settings, based TPLink
TFT
- TFT设计文档和程序,比较好的资料,修改后可以使用!-tft driver ,it s document manual!you can modify it by youslef!
nios_hello_PWM
- nios的pwm源程序例程,修改后,测试可用。欢饮大家修改后使用!-it is nios for vrilog fpag,it s can modify to you learing nois!
47297039-SCTP-Application-Guide
- This document is the application guide for Nokia Linux kernel SCTP implementation. The instructions herein are meant for the developers of SCTP user applications in. This document was originally written by members of the noklksctp team at NRC Bei
ytNet
- 西门子PLC s7-1200 以太网通讯文档-this is siemens PLC s7-1200 Communication document
53604110-SCTP-Tutorial
- We will first do a detailed look at the actual protocol mechanisms We will point out reference material along the way as appropriate We expect you to ask questions if you get lost We will cover a lot of ground in a limited time so hold on to yo
58285522-SCTP-Technical-Tutorial
- Next Generation Networks TCP – Transmission Control Protocol SCTP – Stream ControlUser Adaptation Layers for SCTP Transmission Protocol SCTP Packets Establishing the Connection (Association) Data Transmission Closing the Connection (Assoc
89922296-SCTP-Packet-Structurel
- The (SCTP) has a simpler basic packet structure than. Each consists of two basic sections: 1. The common header, which occupies the first 12 bytes. In the diagram to the right, this header is highlighted in blue. 2. The data chunks, which for
98420542-SCTP-Tutorial-IP-Multi-Homing
- The (SCTP) has a simpler basic packet structure than. Each consists of two basic sections: 1. The common header, which occupies the first 12 bytes. In the diagram to the right, this header is highlighted in blue. 2. The data chunks, which for
sctp.net-computing
- The transport layer’s primary role is to provide end-to-end communications service between two or more applications running on different hosts. It isolates the applications from the specifics of the underlying network connecting the hosts and pro
