Multi-layer Virtual Transport Network management
نویسندگان
چکیده
منابع مشابه
Multi-layer virtual transport network management
Nowadays there is an increasing need for a general paradigm which can simplify network management and further enable network innovations. Software Defined Networking (SDN) is an efficient way to make the network programmable and reduce management complexity, however it is plagued with limitations inherited from the legacy Internet (TCP/IP) architecture. In this paper, in response to limitations...
متن کاملTransport Layer Network Layer Data Link Layer Physical Layer Application
The OMEGA architecture provides end-to-end quality of service (QoS) guarantees for distributed applications. QoS parameters are translated between application and network requirements by the QoS Broker, thus integrating media and network QoS management into a single entity. Admission control uses a schedulability test derived from application requirements. A novel task priority and precedence b...
متن کاملNew full adders using multi-layer perceptron network
How to reconfigure a logic gate for a variety of functions is an interesting topic. In this paper, a different method of designing logic gates are proposed. Initially, due to the training ability of the multilayer perceptron neural network, it was used to create a new type of logic and full adder gates. In this method, the perceptron network was trained and then tested. This network was 100% ac...
متن کاملRethinking Multi-Layer Multi-Domain Network Monitoring
Accurate and efficient network fault localisation based on monitoring is obviously one of the vital but also formidable tasks for successful network operations. With proliferations of large-scale network services, e.g. Géant E2E links, monitoring and fault localisation across multiple domains with data obtained from different network layers are becoming unprecedentedly important. Many efforts h...
متن کاملTowards Multi–Layer Trusted Virtual Domains
We address the fine-grained control of information flow between distributed applications to protect transactions. Confining transactions in distributed untrusted environments is crucial for Web services, distributed computing, and most e-commerce applications relying on those technologies. Applications must be protected from rogue peer applications but at the same time applications need to comm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Communications
سال: 2018
ISSN: 0140-3664
DOI: 10.1016/j.comcom.2018.08.011