首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
DiffServ在ATM上的映射及实现   总被引:1,自引:0,他引:1  
分析了DiffServ和ATM的服务质量分类和相关参数,介绍了IP和ATM的融合工作方式,对DiffServ在ATM上的映射进行了深入细致的探讨,并提出了一个解决方案.最后利用以上内容.详细分析了一个在IP和ATM融合网上,使用VoMPLS技术进行应用的工作过程.  相似文献   

2.
通过开发支持LANE的ATM交换机仿真模型,对利用OPNET仿真工具进行二次开发作了初步探讨。分析了所开发模块的仿真模型结构和仿真运行流程,介绍了实现ATM交换机中LANE服务器功能的仿真模块的开发和整合工作,最后将所开发模块加入到ATM网络仿真模型中进行仿真验证,通过对仿真结果的分析比较,证实了开发模块的正确性和可靠性。  相似文献   

3.
ATM网络的局域网仿真技术   总被引:2,自引:0,他引:2  
本文讨论了ATM网络上局域网仿真的模型以及局域网仿真相关的多协议转换服务组件的功能.ATM局域网仿真技术使用户既能利用ATM的高速数据链路,又能保护现有的软硬件投资,并简化了网络管理工作量。  相似文献   

4.
利用计算机仿真分析MPLS网络的性能是深入研究MPLS技术的有效途径。该文通过分析基于ATM的MPLS技术,在借鉴OPNET仿真软件中MPLS模型的基础上,实现了基于ATM的标签交换路由器模型,构建了基于ATM的MPLS网络仿真模型。利用该仿真模型建立的MPLS仿真试验网络,数据传输性能明显优于非MPLS网络。该模型的开发对于MPLS网络的性能分析具有一定的意义。  相似文献   

5.
ATM作为革命性的传输模式,它在技术上的优势已令世人瞩目。本文介绍了ATM的三层结构模型,并对各层功能进行了论述,分析了ATM技术的特点,预测了ATM技术的发展趋势。  相似文献   

6.
本文从计算机网络体系结构角度出发,阐述了ATM与异种计算机网络互连的基本原理,提出了两种ATM网络互连的结构模型,并利用这两种模型分析了现有协议对ATM网络互连的支持,最后在总结了现有协议不足的基础上,讨论了IPV6对ATM互连网络的支持。  相似文献   

7.
文章首先建立了描述ATM交换网络的模型,然后分析了在有限缓存容量下交换网的时延和信元丢失率。笔者把各个站点的缓冲区划分为输入缓存和输出缓存,系统时延和信元丢失率是评判系统的指标,根据模型可求出具有输入和输出队的ATM交换的时延和丢失率。  相似文献   

8.
衷尔豪 《微机发展》1997,7(1):43-45
本文首先叙述了目前建立企业ATM网络的必要性,接着讨论了企业ATM网络所具有的一些特点和建立企业ATM网络所应注意的一些事项.最后介绍了目前建立ATM网络的实用技术.  相似文献   

9.
本文基于离散事件系统仿真原理,对ATM交换机不同的业务模型和三种缓存策略建立了仿真模型,并开发出仿真软件,得到ATM交换机的性能数据。为ATM交换机在不同业务模型下的性能分析提供了有效的途径。  相似文献   

10.
本文分析了威胁ATM网络安全的攻击种类,指出了VLIP存在的安全漏洞,在此基础上提出了一种基于CLIP方式的ATM网络安全系统的设计模型。  相似文献   

11.
本文提出了一种基于动态加权组合模型的智能现金预测方法, 可以对银行ATM设备的日常现金用量进行精准预测, 为日常现金调拨管理提供决策依据. 与以往使用的单算法预测不同, 本文对银行业务、交易流水与设备等特性进行分析, 据此组合4种单一机器学习模型, 提出并实现基于动态加权组合模型的智能算法. 该算法可以为银行现金用量管理提供更智能、更精准、更高效的预测手段, 有效压降现金库存总量与回钞率, 提升现金运用率. 此方法已在广东、重庆、江西、山西、北京等地区使用, 并取得良好效果.  相似文献   

12.
曹素娥  杨泽民 《软件》2014,(1):1-3,31
精神分析学理论告诉我们:当人的精神欲求得不到基本满足时,就会逐渐产生精神饥渴.  相似文献   

13.
The automated teller machine (ATM) system is the well-known system in E-society that provides us with easy access to banking activities, e.g. money transfers between a user's accounts. This article focuses on the security issues of ATM systems. We examine a criminal case concerning large-scale fraudulent cash withdrawals at ATMs around Taiwan. The common tricks used by criminals are copies of cards as well as the use of tiny cameras to record the personal identification numbers of card users. With continued advances in technology, the criminal case can be handled easily. We also discuss security policies to prevent fraudulent cash withdrawals.  相似文献   

14.
This paper tackles the issue of bandwidth allocation in asynchronous transfer mode (ATM) networks using recently developed tools of computational intelligence. The efficient bandwidth allocation technique implies effective resources utilization of the network. The fluid flow model has been used effectively among other conventional techniques to estimate the bandwidth for a set of connections. However, such methods have been proven to be inefficient at times in coping with varying and conflicting bandwidth requirements of the different services in ATM networks. This inefficiency is due to the computational complexity of the model. To overcome this difficulty, many approximation-based solutions, such as the fluid flow approximation technique, were introduced. Although such solutions are simple, in terms of computational complexity, they nevertheless suffer from potential inaccuracies in estimating the required bandwidth. Soft computing-based bandwidth controllers, such as neural networks- and neurofuzzy-based controllers, have been shown to effectively solve an indeterminate nonlinear input-output (I-O) relations by learning from examples. Applying these techniques to the bandwidth allocation problem in ATM network yields a flexible control mechanism that offers a fundamental tradeoff for the accuracy-simplicity dilemma.  相似文献   

15.
为了提高电子现金在开放的网络环境中应用的安全性,提出了一种新的具有高安全性的多银行电子现金方案.对椭圆曲线代理签名进行了改进,并将改进后的方案应用于多银行电子现金方案中.该方案分为初始化过程,委托协议,开户协议,提款协议,支付协议,存款协议6个过程,其安全性是建立在椭圆曲线离散对数问题(ECDLP)的难解性和Hash函数的安全性的基础上的.最后对方案进行了安全性分析,表明了该方案具有很高的安全性.  相似文献   

16.
A general purpose engineering economy problem solving package has been created. This software allows the user to type in equations involving compound interest factors and unknown variables and will calculate the results or solve for the unknowns. The program is also able to compare alternative sets of cash flows using PEX, AEX, and ROR methodology. The program also includes interactive graphics features. This paper describes those features.

For graphical output the program includes the capability to graph up to six equations with respect to one independent variable. This allows for the display of PEX vs. I graphs and breakeven graphs. The program will also draw cash flow diagrams and network diagrams.

Cash flow data can be input graphically, using a mouse, by selecting a cash flow pattern (single amount, uniform series, or gradient series) and pointing to the position on the cash flow time line where the pattern should be placed. The program can calculate the net equivalent worth of the cash flows at any point in time given an interest rate, or find an interest rate at which the equivalent net cash flow is zero.

This software is written in FORTRAN and can be linked to available graphics libraries on various computers. The author currently has versions for the VAX minicomputer, and IBM PC compatibles.  相似文献   


17.
运用RCM理论的分析方法——FMEA方法,研究探讨了ATM维护管理策略。以某品牌ATM作为研究的对象,确定ATM吐钞机模块为关键模块,对吐钞机模块进行分析,列出故障等级,制定维护策略。根据FMEA的分析结果,制定维护计划,调整维护大纲。通过对比07年和08年的检验数据,对实施效果进行了评估,得出结论:效果改善明显。  相似文献   

18.
This paper presents a congestion control scheme for ATM traffic using a minimal radial basis function neural network referred to as Minimal Resource Allocation Network (MRAN). Earlier studies have shown that MRAN is well suited for online adaptive control of nonlinear time varying systems as it can adjust its size by adding and pruning the hidden neurons based on the input data. Since ATM traffic is nonlinear and time varying performance of MRAN as a congestion controller is investigated here. These studies are carried out using OPNET to model the ATM traffic. The ATM traffic model consists of bursty, Variable Bit-Rate (VBR) and custom traffic in a multiplexed form so as to generate a heavily congested traffic situation. For this scenario, the controller has to minimize the congestion episodes and maintain the Quality of Service (QoS) requirements. This paper compares the performance of the MRAN congestion controller with that of a modified Explicit Rate Indication with Congestion Avoidance (ERICA) scheme and a Back-Propagation (BP) neural controller. Simulation results indicate that MRAN controller performs better than the modified ERICA and BP controller in reducing the congestion episodes and maintaining the desirable QoS.  相似文献   

19.
The objective of this paper is to extend the classical discounted cash flow (DCF) model by developing a fuzzy logic system that takes vague cash flow and imprecise discount rate into account. In order to explicitly discuss a more appropriate valuation model, uncertain information will be fuzzified as triangular fuzzy numbers to quantify and evaluate the intrinsic value of a company's financial asset under the framework of DCF approach. We will find that the fuzzy discounted cash flow (FDCF) model proposed in this paper is one extension of classical (crisp) model and should be more suitable to capture the elements of valuation than non-fuzzy models.  相似文献   

20.
金融科技企业推出了以小额现金贷为主导产品的一种新型金融模式:P2P网络借贷模式。现金贷产品自推出以来,在很短的时间内就积累了大量的客户。如何制定快速有效的金融风控策略,提高客户信息数据处理效率,及时预测防范业务中信用及欺诈风险,成为金融企业亟待解决的问题。对此,本文提出基于规则引擎的金融风控模型,实现风控规则策略和程序硬编码的解耦,在此基础上进行特征因子以及特征模型的设计,对于实现金融科技企业信贷体系中的自动化审批将起到很大的推动作用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号