The Desktop Computer as a Network Participant

نویسندگان

  • Jerome H. Saltzer
  • David D. Clark
  • John Romkey
  • Wayne Gramlich
چکیده

A desktop personal computer can be greatly extended in usefulness by attaching it to a local area network and implementing a full set of network protocols, just as one might provide for a mainframe computer. Such protocols are a set of tools that allow the desktop computer not just to access data elsewhere, but to participate in the computing milieu much more intensely. There are two challenges to this proposal. First, a personal computer may often be disconnected from the network, so it cannot track the network state and it must be able to discover and resynchronize with that state very quickly. Second, full protocol implementations have often been large and slow, two attributes that could be fatal in a small computer. This paper reports a network implementation for the IBM Personal Computer that uses several performance-oriented design techniques with wide applicability: an upcall/downcall organization that simplifies structure; implementation layers that do not always coincide with protocol specification layers; copy minimization; and tailoring of protocol implementations with knowledge of the application that will use them. The size and scale of the resulting package of programs, now in use in our laboratory for two years, is quite reasonable for a desktop computer and the techniques developed are applicable to a wider range of network protocol designs. © IEEE 1985. This paper was originally prepared using the word processor FinalWord on an IBM personal computer. To produce this version It has been transcribed into pages.app for the Macintosh. Paragraph and page flow are thus slightly different from the original. 1 Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, and Laboratory for Computer Science. Address: M.I.T. Room NE43-513, 545 Technology Square, Cambridge, Massachusetts, 02139.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A study of operators’ computing efficiency with special focus on the readability under different viewing angles of a desktop

The main objective of this work is to determine the reading performance of operators’ under different viewing angles of a desktop computer. The effects of text/background color, viewing distance and character size on the speed of reading were investigated. The text and/or the background color combination were varied, with constant luminance contrast. Performance was recorded in terms of words p...

متن کامل

Desktop Teleconferencing for Broadband Networks1

This paper describes a desktop teleconferencing system running between UNIX workstations using TCP/IP and UDP/IP protocols on ethernet, 2-Mbit/s router-connected ethernets and Fastpac-connected ethernets (10-Mbit/s). Throughput and error statistics are presented for the networks along with a subjective assessment of audio and video quality, delay, jitter and the effects of these network artefac...

متن کامل

Impact of Network Quality Deterioration on User’s Perceived Operability and Live-migration of Virtual Machines in Remote Desktop Environments

The remote desktop environment (Virtual Desktop Infrastructure) is attracting interest as a way to strengthen security and support mobile access or telework. To realize the remote desktop environments, a remote desktop protocol is required to transfer information via a network about the user’s operations made on the keyboard and mouse on a terminal to the remote server. The growing popularity o...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Neuron Mathematical Model Representation of Neural Tensor Network for RDF Knowledge Base Completion

In this paper, a state-of-the-art neuron mathematical model of neural tensor network (NTN) is proposed to RDF knowledge base completion problem. One of the difficulties with the parameter of the network is that representation of its neuron mathematical model is not possible. For this reason, a new representation of this network is suggested that solves this difficulty. In the representation, th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Journal on Selected Areas in Communications

دوره 3  شماره 

صفحات  -

تاریخ انتشار 1985