Replacing the Ethernet access mechanism with the real-time access mechanism of Twentenet
نویسنده
چکیده
The way in which a Local Area Network access mechanism (,Medium Access Control protocol) designed for a specific ~pe of physical service can be used on top of another type of physical service is discussed using a particular example. In the example, an Ethernet physical layer is used to provide service to the Twentenet real-time access mechanism. Relevant Ethernet and Twentenet concepts are explained, the approach taken is introduced, and problems encountered, along with the actual synthesis of both networks, are described.
منابع مشابه
حق دسترسی به اطلاعات و کپیرایت در فضای مجازی
Copyright or author’s right and right to access to information have become common discourses in cyberspace. There is an apparent or real tension between the two, since copyright grants to its holder's exclusive rights to control access to information contained in their works while everyone’s right to access to information as a manifestation of the fundamental right of freedom of exp...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملSolving the Governing Equations of Sea Waves Nonlinearly and Designing A CETO Mechanism for Energy Extraction from the Waves of Larak and Faror Islands
In this paper, the governing equations of sea waves are analyzed nonlinearly and the energy extraction from the waves in the Lark and Faror islands in the Persian Gulf is determined. According to the data in the last 31 years, the waves of these two islands have the most incidence for the height of 0-0.4 m and 0.4-0.8 m corresponding for the time periodicity of 2.4-3 s and 3-3.6 s, respectively...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Communications
دوره 12 شماره
صفحات -
تاریخ انتشار 1989