| violation of the | 0.25 |
| refer as network | 0.43 |
| allow two or more compu… | 0.41 |
| share information | 0.40 |
| comprise shared medium | 0.40 |
| share resource | 0.36 |
| differ in the transmiss… | 0.34 |
| allocate transmission r… | 0.34 |
| use statistical multipl… | 0.34 |
| use dynamic bandwidth a… | 0.34 |
| link other devices | 0.34 |
| More » |
| a plurality of nodes | 0.25 |
| accessible | 0.45 |
| classified | 0.32 |
| secure | 0.25 |
| efficient | 0.25 |
| reliable | 0.25 |
| fast | 0.16 |
| local area network | 0.55 |
| digital telecommunicati… | 0.48 |
| private network | 0.45 |
| wide area network | 0.40 |
| system | 0.38 |
| connected | 0.66 |
| connected via cable | 0.47 |
| embodied as an ethernet… | 0.36 |
| embodied as a fibre cha… | 0.36 |
| connected to communicat… | 0.34 |
| interconnected by router | 0.32 |
| used by business | 0.29 |
| connected to navigation | 0.29 |
| characterized by their … | 0.29 |
| hacked | 0.26 |
| More » |