Synchronous Transfer Mode
the purposes of the present document, the following terms and definitions apply:
token:- right to use a slot for transmitting data on a physical interface for
a certain number of bypass hops
Address, DTM address:- 64 bit numerical value
that uniquely identifies a node in a DTM network
Allocation domain:- same as
a bypass chain where, if the topology is point-to-point or bus, the last node
is not counted as member of the AD.
Chain (BC):- series of concatenated physical links, where data can be transported
end-to-end using bypass switching.
switching:- space switching of slots from a receiver to a transmitter on the same
physical interface on a per slot basis.The DTM Resource Management Protocol (DRMP)
handles control of transmission resources over bypass chains.
Management handles the right to use a time slot for transmission and the right
to administer usage rights. The latter function is referred to as slot ownership.
A physical interface owns a set of time slots on the bypass chain. The owner of
a time slot has the right to use it for transmission, but can also lend the right
to another physical interface if it is in greater need. Ownership can either be
statically configured on a bypass chain, or dynamic. In the latter case, the Dynamic
Ownership part of DRMP, distributes ownership along the physical interfaces on
the bypass chain according to a configured policy. Typically the physical interfaces
are configured to own an equal share that exhausts the capacity of the bypass
The right to transmit on a time slot can be limited spatially, so as to
cover only as many physical links as is needed on a bypass chain for the intended
transmission. On the next physical link downstream of the receiver, and the next
physical link upstream of the transmitter, the same time slot can be used again
for other data transmissions. This spatial reuse of time slots is referred to
as slot scoping.
You may also like this : Self Defending Networks, Semantic Web, Computer Intelligence Application, Cooperative Linux, Longhorn, Mesh Radio, Parallel Virtual Machine, Linux Virtual Server, Location Independent Naming, PHANToM, Multiprotocol Label Switching, Next Generation Secure Computing Base, NGSCB, Reconfigurable computing, Sky X Technology, Smart Client Application Development using .NET, Spawning Networks, SPCS, Speed protocol processors, Strata flash Memory, Swarm Intelligence, The Callpaper Concept, IP spoofing, Internet Access via Cable TV Network, Face Recognition Technology, FireWire, Param 10000, The Deep Web, Virtual Campus, VoiceXML, Wireless USB, Refactoring, On-line Analytical Processing (OLAP), Pivot Vector Space Approach in Audio-Video Mixing, MPEG-7, Adding Intelligence to Internet, Silverlight,DNA chips, Remote Administration Trojan's, Thermography, AJAX , Alternative Models Of Computation, Amorphous Computing and Swarm Intelligence, Windows DNA, Laptop Computer, Intelligent Software Agents, Self-Managing Computing, Hurd, Intel Centrino Mobile Technology, Computer Seminars Reports and PPT
Labels : Software Engineering Seminar Topics, General Seminar Topics for Computer Science(CSE), Advanced Seminar Topics Computer Science(CSE), Computer Science(CSE) Seminar Topics Full Reports Presentations, Computer Science(CSE) IEEE Seminar Topics, Computer Science(CSE) Seminar Topics with Abstract, Computer Science(CSE) Seminar Topics 2011|2010|2012|2009, Computer Science(CSE) Paper Presentations 2011, Computer Science(CSE),IT and MCA Seminar Topics|Reports|PPT|PDF, MCA Seminar Topics Latest, Latest MCA Seminar Topics 2012|2011|2010|2009, MCA Seminar Topics Free Download, MCA Seminar Topics with Abstract, MCA Seminar Topics 2009|2010|2011|2012, Advanced MCA Seminar Topics