Tiyachate, 2004 - Google Patents
Protection in survivable WDM grooming network.Tiyachate, 2004
- Document ID
- 11916731484802191805
- Author
- Tiyachate R
- Publication year
External Links
Snippet
Optical networks have been widely expected to fill the need for tomorrow's backbone networks because of the high bandwidth and highly predictable performance they promise. However, in recent years, the downturn of the economy has made the deployment of costly …
- 230000004224 protection 0 title abstract description 789
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30182—File system types
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tiyachate | Protection in survivable WDM grooming network. | |
Jun | Capacity estimation of wireless mesh networks | |
Mahalati | Reconfiguration of sub-wavelength groomed wavelength routed optical networks | |
Seshadri | Power-aware routing: Grooming traffic for reduction of power consumption in wire-line networks | |
Jaikumar | Differential capacity p-cycles | |
Iyer | The complexity of traffic grooming in optical path networks with egress traffic | |
Yoon | Power management in wireless sensor networks | |
Gupta | Joint scheduling, routing and power control for single-channel wireless mesh networks | |
Sridharan | Fair Queueing Algorithms for QOS support in Packet Switched Networks | |
Butry | Estimating the efficacy of wildfire management using propensity scores | |
Kohler | Improving Webs of Trust Through Predetermined Graph Structure | |
Boloor | Multi-point to single-point service traffic shaping | |
Rai | A feasibility study on the application of stream architectures for packet processing applications | |
Allen | An Integer Programming Approach to Selecting Individuals for Transfer in Pedigreed Populations | |
Prasad | Dynamically Reconfigurable Intrusion Detection System | |
Lin | Tabu Search and Genetic Algorithm for Phylogeny Inference | |
Bowden | Recent and projected climate variability during the seasonal rains of the Greater Horn of Africa | |
Varma | Scalable, Fault-Tolerant Membership for Group Communication on HPC Systems | |
Vijaychand | Time-step Control in Transient Circuit Analysis | |
Oruganti | Performance of Robust Active Queue Management Schemes and Window Adaptation Schemes in IP Network | |
Pyun | A Super-Peer Topology for Scalable P2P Systems | |
Hagewen | A Study of Infraction Specialization: Validating a Typology of Infraction Behavior Using Prisonization, Importation and Social Control Theory | |
Xia | Effects of Medium Access Control on the Capacity of mobile ad hoc networks | |
Poteat | To the Last Man and the Last Dollar': Governor Henry Toole Clark and Civil War North Carolina, July 1861 to September 1862. | |
Onder | The Fear of Floating and the Turkish Experience |