Rethinking Network Management Solutions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rethinking durable solutions

It is not acceptable, former High Commissioner Ruud Lubbers said in 2001, that refugees spend years of their lives in confined areas. Yet the political failure to find durable solutions for refugees leads to precisely the kinds of protracted situations that degrade the displaced. Unable to return to their homeland, settle permanently in their country of first asylum or move to a third state, ma...

متن کامل

Rethinking Malahat Solutions

This paper evaluates various options for addressing traffic problems on the Malahat highway corridor, north of Victoria, British Columbia. A combination of transit and vanpool service improvements, support strategies, and incremental roadway improvements is by far the most cost effective and beneficial option. Current planning tends to undervalue this approach by ignoring some costs of highway ...

متن کامل

FlexNIC: Rethinking Network DMA

We propose FlexNIC, a flexible network DMA interface that can be used by operating systems and applications alike to reduce packet processing overheads. The recent surge of network I/O performance has put enormous pressure on memory and software I/O processing subsystems. Yet even at high speeds, flexibility in packet handling is still important for security, performance isolation, and virtuali...

متن کامل

Rethinking IP Mobility Management

IP Mobility Management allowing for handover and location management to be handled by the network layer has been around for a couple of 20 years or so now. A number of protocols have been proposed including the GPRS Tunneling Protocol (GTP), Mobile IP, Proxy Mobile IP, and the Locator/Identifier Split Protocol (LISP) being the best known and most discussed in the research literature. This paper...

متن کامل

Rethinking De-perimeterisation: Problem Analysis and Solutions

For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed security border, trusting the inside, and distrusting the outside. However, as technologies and business processes change, this model looses its attractiveness. In a networked world, “inside” and “outside” can no longer be clearly distinguished. The Jericho Forum an in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IT Professional

سال: 2006

ISSN: 1520-9202

DOI: 10.1109/mitp.2006.144