3. ProNet architecture
The functional structuring of a DMS service and its interaction with the resource(s) to be protected are not detailed in this article.
ProNet architecture can be deployed in a variety of contexts. For example :
the DMS service is managed by the administrator of the network infrastructure to be protected;
the DMS service is managed by an entity other than the administrator of the network infrastructure to be protected;
the DMS service is activated within the network infrastructure to be protected;
the DMS service is activated outside the network infrastructure to be protected (typically, an access provider, a transit operator, a service operator, a provider of cloud services and resources);
...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
ProNet architecture
Article included in this offer
"Networks and Telecommunications"
(
170 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - BOUCADAIR (M.), Ed, REDDY (T.K.), Ed - Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification. - RFC 8783, DOI 10.17487/RFC8783, https://www.rfc-editor.org/info/rfc8783 (2020).
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!