Replacing the Ethernet access mechanism with the real-time access mechanism of Twentenet

نویسنده

  • Aiko Pras
چکیده

The way in which a Local Area Network access mechanism (,Medium Access Control protocol) designed for a specific ~pe of physical service can be used on top of another type of physical service is discussed using a particular example. In the example, an Ethernet physical layer is used to provide service to the Twentenet real-time access mechanism. Relevant Ethernet and Twentenet concepts are explained, the approach taken is introduced, and problems encountered, along with the actual synthesis of both networks, are described.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

حق دسترسی به اطلاعات و کپی‌رایت در فضای مجازی

Copyright or author’s right and right to access to information have become common discourses in cyberspace. There is an apparent or real tension between the two, since copyright grants to its holder's exclusive rights to control access to information contained in their works while everyone’s right to access to information as a manifestation of the fundamental right of freedom of exp...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Solving the Governing Equations of Sea Waves Nonlinearly and Designing A CETO Mechanism for Energy Extraction from the Waves of Larak and Faror Islands

In this paper, the governing equations of sea waves are analyzed nonlinearly and the energy extraction from the waves in the Lark and Faror islands in the Persian Gulf is determined. According to the data in the last 31 years, the waves of these two islands have the most incidence for the height of 0-0.4 m and 0.4-0.8 m corresponding for the time periodicity of 2.4-3 s and 3-3.6 s, respectively...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 12  شماره 

صفحات  -

تاریخ انتشار 1989