Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security

mycnis.weebly.com
from mycnis.weebly.com More from this publisher
22.07.2013 Views

The Holy Grail A one-size-fits-all solution Perhaps using an adaptive/hybrid approach that can adapt to situation at hand Difficult problem Many solutions proposed trying to address a sub-space of the problem domain 18

Assumption Unless stated otherwise, fully symmetric environment is assumed implicitly all nodes have identical capabilities and responsibilities 19

Assumption<br />

Unless stated otherwise, fully symmetric environment<br />

is assumed implicitly<br />

all nodes have identical capabilities and responsibilities<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!