Protocol Layering and Internet Policy
نویسندگان
چکیده
منابع مشابه
Misunderstanding the Layered Model(s)
INTRODUCTION ................................................................................... 299 I. THE LAYERED MODEL............................................................ 302 A. Original Intent of the SMC Layered Policy Model........... 302 B. Current Regulatory Structure -A Review ......................... 302 C. Layered Model Description................................................
متن کاملTowards Self-optimizing Protocol Stack for Autonomic Communication: Initial Experience
The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are undermining its original design principles. The mobile Internet demands a level of optimum that is hard to achieve with a strictly-layered protocol stack. Questioning if layering is still an adequate foundation for autonomic protocol stac...
متن کاملDDT - A Versatile Tunneling Technology
Current internet technology doesn't solve the following three con guration problems for corporate networks: insulating a network located in the depths of a private network from the Internet, wasting Internet address space behind a rewall, and the lack of security in communication between corporations. This paper proposes a versatile tunneling model called \DDT" in order to give solutions for th...
متن کاملModel Based Protocol Fusion for MANET-Internet Integration
With the wide adoption of wireless communication technologies, the current networking design of the Internet architecture has shown some limitations. Restricted by inherent layering constraints, valuable networking information cannot flow freely inside the network stack and potential operational optimizations are impossible to achieve. To overcome these limitations, we extend the current trend ...
متن کاملDesign of a Flexible Cross-Layer Interface for Ad Hoc Networks
Cross layering has recently emerged as a new trend to cope with performance issues of mobile ad hoc networks. The concept behind this technique is to exploit local information produced by other protocols, so as to enable optimizations and deliver better network performance. However, the need for a new interaction paradigm inside the protocol stack has to face with the legacy aspects of classica...
متن کامل