Computer Networks (1976)最新文献

筛选
英文 中文
Inhouse versus public videotex systems 内部视频系统和公共视频系统
Computer Networks (1976) Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90044-2
H.A Maurer, I Sebestyen
{"title":"Inhouse versus public videotex systems","authors":"H.A Maurer,&nbsp;I Sebestyen","doi":"10.1016/0376-5075(83)90044-2","DOIUrl":"10.1016/0376-5075(83)90044-2","url":null,"abstract":"<div><p>The aim of this paper is to analyse the relation between inhouse and public videotex systems and show that these systems are and should not be independent of each other and that they can and should complement each other rather than complete.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 329-342"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90044-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75128862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PTC'83 — Pacific telecommunications conference 太平洋电信会议
Computer Networks (1976) Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90048-X
{"title":"PTC'83 — Pacific telecommunications conference","authors":"","doi":"10.1016/0376-5075(83)90048-X","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90048-X","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 359-368"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90048-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137441284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The DoD internet architecture model 国防部互联网架构模型
Computer Networks (1976) Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90042-9
Vinton G Cerf, Edward Cain
{"title":"The DoD internet architecture model","authors":"Vinton G Cerf,&nbsp;Edward Cain","doi":"10.1016/0376-5075(83)90042-9","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90042-9","url":null,"abstract":"<div><p>This paper outlines the principles on which the U.S. Department of Defense packet internet architecture is based and characterizes some of the protocols which implement the architecture. Major factors which influenced the development of this architectural model include experimental and operational experience with a large number of interconnected packet networks, assessments and evaluations of military requirements for national and international interoperability and multiple jurisdiction operation, and specific concerns regarding security, survivability and operation under crisis conditions.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 307-318"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90042-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Military requirements for packet-switched networks and their implications for protocol standardization 分组交换网络的军事要求及其对协议标准化的影响
Computer Networks (1976) Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90041-7
Vinton G Cerf, Robert E Lyons
{"title":"Military requirements for packet-switched networks and their implications for protocol standardization","authors":"Vinton G Cerf,&nbsp;Robert E Lyons","doi":"10.1016/0376-5075(83)90041-7","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90041-7","url":null,"abstract":"<div><p>This paper outlines the nature of the military requirements for packet-switched data communications and contrasts these requirements with those of commercial, industrial and private users served by common carrier public packet-switched data networks. Current US Department of Defense policy on the use of commercial standards in defense systems is reviewed. Deficiencies in existing standards for military applications are identified and implications for the development of a suitable military data communications architecture are drawn. A strategy of military standardization is outlined which adopts commercial standards where they apply and supplements these with special military standards as needed to satisfy unique military requirements. The thesis of this paper is illustrated by a discussion of the applicability of the CCITT X.25 protocol standard to military communications.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 293-306"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90041-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The department of defense data protocol standardization program 国防部数据协议标准化计划
Computer Networks (1976) Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90043-0
Philip S Selvaggi
{"title":"The department of defense data protocol standardization program","authors":"Philip S Selvaggi","doi":"10.1016/0376-5075(83)90043-0","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90043-0","url":null,"abstract":"<div><p>The US Department of Defense (DoD) has, for some years now, been pursuing the objective of implementing a new data communications system responsive to its requirements. In consonance with this goal, it has also been heavily involved in developing data communications protocol standards. It has participated in related research, test, and development of a Transmission Control Protocol and an Internet Protocol and has plans for developing other protocols in layers 4–7 of the OSI model.</p><p>This paper is essentially structured into two parts. The first part will provide background information for the DoD protocol standardization program, which describes policy issues, status, and problems inherent in the development of such a program. This background description is then followed by an outline of current DoD planning for future work in this area. The point being made here is that the DoD by virtue of its needs, investigations, and accomplishments to date, is eminently qualified to contribute significantly to the development of data protocol standards. The second part of the paper describes the actual current DoD activities for developing data protocol standards, as well as its efforts to coordinate with NATO, the National Bureau of Standards (NBS), and commercial standards groups.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 319-328"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90043-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Local area networks and the practical aspects of interworking 局域网和互连的实际方面
Computer Networks (1976) Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90045-4
Kenneth S Heard
{"title":"Local area networks and the practical aspects of interworking","authors":"Kenneth S Heard","doi":"10.1016/0376-5075(83)90045-4","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90045-4","url":null,"abstract":"<div><p>The potential for cost-effective distribution and coordinated sharing of information processing systems is substantially enhanced by the recent emergence of comparatively cheap, very reliable, high speed local area networks (LANs). The lack of common interface specifications is however a major impediment to progress. The benefits to be gained by ensuring that the user accessible interface to a local area network provides identical functionality to that offered over a long haul network argue for a subset of features common to both types. This need for commonality argues against exploitation of some of the more novel features intrinsic to certain styles of technologically advanced systems. By this means, the enormous investment in existing (wide area) networked applications can be applied within a local context and, perhaps even more importantly, applications mounted in a LAN environment will also be accessible from, and be able to communicate with, other more remote systems.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 343-348"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90045-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EUTECO European Teleinformatics Conference 欧洲电信信息学会议
Computer Networks (1976) Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90021-1
{"title":"EUTECO European Teleinformatics Conference","authors":"","doi":"10.1016/0376-5075(83)90021-1","DOIUrl":"10.1016/0376-5075(83)90021-1","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 283-286"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90021-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"95357806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why a ring? 为什么是戒指?
Computer Networks (1976) Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90015-6
J.H Saltzer , K.T Pogran , D.D Clark
{"title":"Why a ring?","authors":"J.H Saltzer ,&nbsp;K.T Pogran ,&nbsp;D.D Clark","doi":"10.1016/0376-5075(83)90015-6","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90015-6","url":null,"abstract":"<div><p>In a world increasingly populated with Ethernets and Ethernet-like nets there nevertheless continues to be a strong interest in rings of active repeaters for local data communication. This paper explores some of the engineering problems involved in designing a ring that has no central control. It then compares one ring design with the Ethernet on several different operational and subtle technical points of design, maintainability, and future prospects. On each of these points the ring possesses important or interesting advantages. At the same time, the most commonly cited advantage of a ring, “deterministic access time,” is shown to be illusory. The paper concludes that the data communication ring is a sound idea that will prove its value on operational rather than theoretical issues.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 223-231"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90015-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134667647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access strategies in packet mobile radio data networks 分组移动无线数据网络中的接入策略
Computer Networks (1976) Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90014-4
J.S. Riordon, S.A. Mahmoud, S.E. Aidarous, M. Niktash
{"title":"Access strategies in packet mobile radio data networks","authors":"J.S. Riordon,&nbsp;S.A. Mahmoud,&nbsp;S.E. Aidarous,&nbsp;M. Niktash","doi":"10.1016/0376-5075(83)90014-4","DOIUrl":"10.1016/0376-5075(83)90014-4","url":null,"abstract":"<div><p>This paper examines alternative shared channel access procedures for mobile packet radio data/voice systems. Natural pauses in speech allow the possibility of bandwidth savings through interleaving of talkspurts from many sources, as is done in packet data systems. The acceptability of such schemes lies in the resulting performance level; inevitable degradation through delay and blocking should be small. Access procedures are outlined for a two hop virtual circuit in which a fixed base station acts as a relay transmitter. Analysis shows that a reduction of 30–35% in bandwidth requirements can be obtained without serious performance loss.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 211-221"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90014-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89682670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protection and synchronisation in a message-switched system 消息交换系统中的保护和同步
Computer Networks (1976) Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90017-X
Jon Livesey, Eric Manning
{"title":"Protection and synchronisation in a message-switched system","authors":"Jon Livesey,&nbsp;Eric Manning","doi":"10.1016/0376-5075(83)90017-X","DOIUrl":"10.1016/0376-5075(83)90017-X","url":null,"abstract":"<div><p>In any computer system it is valuable to have methods for enforcing expected behaviour at runtime. (Capabilities and object-oriented architectures are mechanisms commonly used to address the problem.) In a message-switched system, all inter-process communication is done by the transmission of messages, and the problem of enforcing expected behaviour can be reduced to the problem of enforcing expected patterns of message transmission.</p><p>In this paper we give a method, called the <em>Task Graph Language</em>, for expressing expected patterns (policy) of message transmission. Such an expression is quite independent of the actual programs which pass messages, and can be used at runtime to check the validity of observed behaviour. The <em>mechanism</em> we provide to perform the runtime checking of observed <em>vs.</em> expected behaviour is called <em>Token Lists</em>.</p><p>This mechanism requires no esoteric hardware support and it can be used in both distributed and centralized systems. From another perspective, the user is provided with two independent, hence mutually redundant, ways to express his intent (the programs which pass messages and the Task Graph Language description), and the two expressions of intent are compared or matched at runtime as a checking mechanism. From still another perspective, the Task Graph Language and Token Lists permit a centralized representation of distributed control.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 253-268"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90017-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117932253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信