نتایج جستجو برای: alternative process routing

تعداد نتایج: 1617517  

2011
Kevin C. Webb Alex C. Snoeren Ken Yocum

Emerging data-center network designs seek to provide physical topologies with high bandwidth, large bisection capacities, and many alternative data paths. Yet, existing protocols present a one-size-fits-all approach for forwarding packets. Traditionally, the routing process chooses one “best” route for each end-point pair. While some modern protocols support multiple paths through techniques li...

Journal: :Nano Comm. Netw. 2017
Ageliki Tsioliaridou Christos Liaskos Eugen Dedu Sotiris Ioannidis

Packet routing in nanonetworks requires novel approaches, which can cope with the extreme limitations posed by the nano-scale. Highly lossy wireless channels, extremely limited hardware capabilities and non-unique node identifiers are among the restrictions. The present work offers an addressing and routing solution for static 3D nanonetworks that find applications in material monitoring and pr...

2003
GERARD J. M. SMIT PAUL J. M. HAVINGA

In this paper, we present a routing mechanism and buffer allocation mechanism for an ATM switching fabric. Since the fabric will be used to transfer multimedia traffic, it should provide a guaranteed throughput and a bounded latency. We focus on the design of a suitable routing mechanism that is capable of fulfilling these requirements and is free of deadlocks. We will describe two basic concep...

Journal: :Inf. Sci. 1995
Gerard J. M. Smit Paul J. M. Havinga Walter H. Tibboel

In this paper2 we present a routing mechanism and buffer allocation mechanism for an ATM switching fabric. Since the fabric will be used to transfer multimedia traffic it should provide a guaranteed throughput and a bounded latency. We focus on the design of a suitable routing mechanism that is capable to fulfil these requirements and is free of deadlocks. We will describe two basic concepts th...

Journal: :RFC 2004
Joseph D. Touch Lars Eggert Yu-Shun Wang

IPsec can secure the links of a multihop network to protect communication between trusted components, e.g., for a secure virtual network (VN), overlay, or virtual private network (VPN). Virtual links established by IPsec tunnel mode can conflict with routing and forwarding inside VNs because IP routing depends on references to interfaces and next-hop IP addresses. The IPsec tunnel mode specific...

Nowadays, in highly competitive global markets and constant pressure to reduce total costs, enterprises consider group technology and Supply Chain Management (SCM) accordingly and usually separately as the key elements for intra and inter facilities improvement. Simultaneous consideration of the elements of these two disciplines in an integrated design can result in higher efficiency and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید