Alternatives for providing highly reliable access to X . 25 networks

نویسندگان

  • RICHARD J. CHUNG
  • A. M. RYBCZYNSKI
چکیده

Public and private packet-switching networks (PSNs) are being developed or planned throughout the world-for example in Canada (DATAPAC), the U.S. (TELENET), France (TRANSPAC), the U.K. (EPSS), Japan (DDX), Spain, Netherlands and others. 7 Such an explosive development of data communications services is one of the means for attaining the near-perfect availability required from future distributed information processing systems. 9 The reasons for this requirement are the increasing size, complexity and geographic dispersion of information processing systems, and the increasing real-time dependence of users on these critical, distributed systems for the timely and effective operation of their businesses. As a result, there is a sustained incentive towards improving the reliability and availability of PSNsl1 on the one hand and of information processing systems on the other. Both improvements use similar techniques, namely components of high reliability and redundancy of components. However, the reliability of the access path between the information system and the PSN is in some cases the weakest link in the overall reliability of distributed teleprocessing systems. lO Using the same reliability techniques for the access path (namely redundant, reliable physical circuit configurations) is not sufficient as the access path connects two dissimilar logical entities, and the implementation of the access protocol governing their inter-communication has to be considered. This paper is concerned with the reliability of access from synchronous packet-mode Data Terminal Equipments (DTEs) through multiple physical circuits to X.25 packetswitching networks offering virtual circuit services. The techniques discussed in this paper are also generally appli-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bicl Based Communication Mechanism in Vehicular Active Networks

In this paper we proposed a novel mechanism (BICL)for communication, coordination and a protocol is designed for vehicular active networks . BICL permits each sensor node to autonomously determine its next-hop selection and channel access strategy using bioinspired next-hop selection and channel access profitability measures. Based on these profitability measures, BICL provides optimal performa...

متن کامل

A method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things

With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...

متن کامل

Decision Support System for Age-Related Macular Degeneration Using Convolutional Neural Networks

Introduction: Age-related macular degeneration (AMD) is one of the major causes of visual loss among the elderly. It causes degeneration of cells in the macula. Early diagnosis can be helpful in preventing blindness. Drusen are the initial symptoms of AMD. Since drusen have a wide variety, locating them in screening images is difficult and time-consuming. An automated digital fundus photography...

متن کامل

Reliable Architectures for Next-Generation Broadband Access Networks (RANGBAN) [Invited Paper]

Future access network architectures should exhibit reliability while providing broadband Internet services. Progress on research and development of reliable wired and wireless access networks is discussed in this paper. Some emerging access network architectures and their reliability issues are explained.

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010