Resource - Sharing Computer Communications Networks
نویسنده
چکیده
communications,” presented at the Ass. Comput. Mach. Symp. Operating Systems, Gatlinburg, Tenn., 1967. [45] -, “A forward look,” Signal, vol. 25, pp. 77-81, Aug. 1971. 1461 -, ‘Resource sharing networks,’ presented at the IEEE Int. Conv., New York, N. Y., Mar. 1969. [47] L. G. Roberts and B. Wessler, “The ARP.4 computer network development to achieve resource sharing, in Spring Joint Compztfer
منابع مشابه
Adaptive rate scheduling for 3G networks with shared resources using the generalized processor sharing performance model
In current and next 3G and beyond wideband code-division with multiple access (WCDMA) cellular networks, sharing the radio access network has become an important issue for 3G mobile operators. 3G and beyond network rollout is a very costly and time consuming process. Therefore, sharing of network infrastructure among operators offers an alternative solution to reducing the investment in the cov...
متن کاملBandwidth allocation in peer-to-peer file sharing networks
We present a model of bandwidth allocation in a stylized peer-to-peer file sharing network. Given an arbitrary population of peers composed of sharers and freeriders, where all peers interconnect to maximize their allocated bandwidth, we derive the expected bandwidth obtained by sharers and freeriders. We show that sharers are always better off than freeriders and that the difference decreases ...
متن کاملAdaptive radio resource with borrowing for multi-operators 3G+ wireless networks with heterogeneous traffic
Recently, sharing the radio access network (RAN) has become an important issue for 3G and beyond mobile wireless operators. In addition to user and service considerations, there are economic and technical advantages to 3G and beyond shared networks. This is driving optimizations in the deployment and development of national 3G and 4G rollouts. However, shared 3G and 4G networks exhibit many of ...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملService Outsourcing and Billing in Inter-domain IMS Scenarios
Abstract— Resource sharing in commercial mobile networks may present operators with options to cut costs and prevent network churn. In resource sharing, when the network experiences resource constraints, the operator can negotiate with other reachable networks to outsource the provision of network access serveices. The revenue earned from user payments will be shared by the home operator and th...
متن کامل