Finally, a Use for Componentized Transport Protocols

نویسندگان

  • Tyson Condie
  • Joseph M. Hellerstein
  • Petros Maniatis
  • Sean Rhea
  • Timothy Roscoe
چکیده

This paper argues a new relevance for an old idea: decomposing transport protocols into a set of resuable building blocks that can be recomposed in different ways depending on application requirements. We conjecture that point-to-point applications may well be adequately served by the existing suite of monolithic protocol implementations, but widely-distributed peer-to-peer systems such as overlays are not: the design space of transport protocols between nodes in a large, highly coordinated system is much larger. We provide several examples of existing systems that have implemented a diverse range of transport protocols, and show how a building-block approach covers these systems well, enabling simple specification of hybrids and variants of the protocols. In particular, we show how all of our examples can be implemented in the networking stack of P2, a multipurpose system for building overlay networks from declarative specifications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An architecture for componentized, network-based media services

We present MSA (Media Services Architecture), a flexible, general architecture for requesting, configuring, and running services that operate on streaming audio and video as it flows through the network. MSA decomposes requested media services into modular processing components that may be distributed to servers throughout the network and which intercommunicate via standard streaming protocols....

متن کامل

بررسی میزان‌ CTDIwوDLP در پروتکل‌های معمول CT دربیمارستان شهید بهشتی کاشان درسال 1393 ومقایسه آن با ‌میزان دز مرجع

The use of computed tomography (CT) as a diagnostic tool has been considerably increased. Therefore, the controlled and protection-based use of the CT scan is necessary to reduce the detrimental effects of radiation. This study was carried out to determine patient dose level in routine CT protocols and measure CTDIW and DLP in routine CT protocols among adult patients in Kashan Shahid Beheshti ...

متن کامل

The importance of exercise and the use of masks on the immune system during the coronavirus pandemic

Abstract With the onset of a new wave of coronavirus in Iran, athletes and ordinary people are still looking for high-intensity exercise or the use of masks, so researchers have suggested doing exercise in accordance with health protocols. In this review study, researchers examine the effect of different training intensities on the immune system and the importance of masked exercise. Finally, ...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

6 Example of a Transport Bridge Implementation

The need for transport gateways derives from the existance of incompatible transport protocols. In this paper we describe di erent existing approachs to build transport bridges. We present a method based on looking for routing information in the NSAP addresses without making use of the \transport selectors" as the previous solutions did. We also propose an extension of the transport protocol to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005