Defining High-Speed Protocols: Five Challenges and an Example that Survives the Challenges
نویسنده
چکیده
The First IEEE Gigabit Networking (GBN) Workshop defined a set of characteristics of “interesting” high-speed applications. The GBN criteria ensure that the application addresses a significant problem, and that it actually requires a gigabit network. This paper presents five challenges that augment the GBN criteria. These challenges ask whether gigabit applications require new research into different protocols, or can be supported by existing protocols that merely run faster.
منابع مشابه
Environmental challenges in the Caspian Sea and international responsibility of its littoral states
The main challenges facing the environment of the Caspian Sea include the water level rise, environmental pollutions, the entrance of exotic species to the Caspian Sea, loss of the flora reservoirs and eutrophication. These challenges forced the coastal states to conclude the Framework Convention on the Protection of the Marine Environment of the Caspian Sea in 2003. The long duration of time t...
متن کاملEthical Challenges in Viral Marketing
Since the use of internet has been identified as a necessity in today’s world, businesses benefit from different aspects of this technology especially for marketing and advertisements so that the owners of businesses are searching for effective high speed and low costs ways of marketing such as viral marketing. Despite of its high efficiency and effectiveness, viral marketing creates various et...
متن کاملNetwork Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment
Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...
متن کاملIEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملChallenges and Defining of Four Generations in Medical Laboratories
Many of the conflicts occurring in the Medical Labs could be directly linked to the presence of multiple generations. There have been three generations in the workplace at any given time. We are at a unique time where there are four generations all coexisting in the labs. The article describes generalized behaviors of each generation and the correlation of these unique trails on medical lab pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Journal on Selected Areas in Communications
دوره 13 شماره
صفحات -
تاریخ انتشار 1995