Finally, a Use for Componentized Transport Protocols
نویسندگان
چکیده
This paper argues a new relevance for an old idea: decomposing transport protocols into a set of resuable building blocks that can be recomposed in different ways depending on application requirements. We conjecture that point-to-point applications may well be adequately served by the existing suite of monolithic protocol implementations, but widely-distributed peer-to-peer systems such as overlays are not: the design space of transport protocols between nodes in a large, highly coordinated system is much larger. We provide several examples of existing systems that have implemented a diverse range of transport protocols, and show how a building-block approach covers these systems well, enabling simple specification of hybrids and variants of the protocols. In particular, we show how all of our examples can be implemented in the networking stack of P2, a multipurpose system for building overlay networks from declarative specifications.
منابع مشابه
An architecture for componentized, network-based media services
We present MSA (Media Services Architecture), a flexible, general architecture for requesting, configuring, and running services that operate on streaming audio and video as it flows through the network. MSA decomposes requested media services into modular processing components that may be distributed to servers throughout the network and which intercommunicate via standard streaming protocols....
متن کاملبررسی میزان CTDIwوDLP در پروتکلهای معمول CT دربیمارستان شهید بهشتی کاشان درسال 1393 ومقایسه آن با میزان دز مرجع
The use of computed tomography (CT) as a diagnostic tool has been considerably increased. Therefore, the controlled and protection-based use of the CT scan is necessary to reduce the detrimental effects of radiation. This study was carried out to determine patient dose level in routine CT protocols and measure CTDIW and DLP in routine CT protocols among adult patients in Kashan Shahid Beheshti ...
متن کاملThe importance of exercise and the use of masks on the immune system during the coronavirus pandemic
Abstract With the onset of a new wave of coronavirus in Iran, athletes and ordinary people are still looking for high-intensity exercise or the use of masks, so researchers have suggested doing exercise in accordance with health protocols. In this review study, researchers examine the effect of different training intensities on the immune system and the importance of masked exercise. Finally, ...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کامل6 Example of a Transport Bridge Implementation
The need for transport gateways derives from the existance of incompatible transport protocols. In this paper we describe di erent existing approachs to build transport bridges. We present a method based on looking for routing information in the NSAP addresses without making use of the \transport selectors" as the previous solutions did. We also propose an extension of the transport protocol to...
متن کامل