共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
3.
通过介绍ISDN和Internet的协议,引出了通过ISDN接入Internet的业务,说明ISDN接入Internet比传统的接入方法更为优越。 相似文献
4.
本文从威海DDN本地网的实际制世与配置出发,面向网络建设介绍DDN本地网规划 、建设、发展的策略,以及威海DDN本地网、公用DDN网提供的业务功能和用户层终端接入方式。 相似文献
5.
ISDN与公用分组交换网的互通(下)□张国宏赵慧玲杜森2ISDN与PSPDN互通的实现方法2.1两种实现方法前面介绍了分组方式终端接入ISDN的两种方式,即方式A和方式B。对于方式B,PH的实现有两种方法:一种方法是PH模块驻留在ISDN交换机内部,... 相似文献
6.
本文介绍了广东省邮电管理局宽带数据通信实用试验网中采用的几种高速数据接入技术,包括N-ISDN接入,ADSL接入和Cablemodem接入,并对其关键技术进行简要介绍。 相似文献
7.
本文从我国公用DDN的实际制式与配置出发,面向专线或专网建设的决策者介绍公用DDN提供的业务功能和用户层终端接入方式。 相似文献
8.
介绍AN-2000是一个比较完善的综合接入系统,现已能提供POTS,DDN、2/4W E&M,ISDN接口(2B+D,308+D),子速率复用等综合业务接入,同时新的业务接入模块也正在不断推出;并且将AN-2000与交换机远端模块的几个方面进行了比较。最后简介AN-2000与F-150、S-1240的对接实验。 相似文献
9.
CATV有能力提供电话和数据服务,有线电视分配与电视ISDN接入集合到户是实现宽带综合网络的便利途径,本文考虑了CATV/ISDN结合的方法,ISDN主速率时分多址接入方式以及用户接口的规格。 相似文献
10.
文章简述了ISDN的概念及中兴ISDN数据通信网组成,介绍了通过中兴ISDN接入Intrnet分组网及DDN等数据通信业务的方法。 相似文献
11.
马可尼的全面接入解决方案包括4个主要部分:Deep Fiber‘Advanced Copper、Skyband无线产品和ServiceOn接入管理系统。马可尼公司在接入领域的领先地位得益于它在过去一段时间内的成功收购以及在固定和无线技术方面各界的丰富经验。 相似文献
12.
陈勇 《电信工程技术与标准化》1999,(4)
无线接入技术可分为模拟无一接入技术和数字无线接入技术,数字无线接入系统又有多种解决方案,包括数字直接扩频技术、GSM、CDMA、DECT、PHS和SCDMA等。 相似文献
13.
“光进铜退”是固网发展的趋势,FTTH是固网发展的终极目标,xPON技术是实现“光进铜退”和综合业务接入的最佳选择。自上而下的网络融合不断推进,“后网络智能化时代”接入层网络演进将是部署的重点。描述了面向“光进铜退”的中兴通讯新一代FTTx光接入平台在新通信环境下的应用优势。 相似文献
14.
Hui Chen Yang Xiao Xuemin Shen 《Mobile Computing, IEEE Transactions on》2006,5(12):1734-1748
Cache has been applied for wireless data access with different replacement policies in wireless networks. Most of the current cache replacement schemes are access-based replacement policies since they are based on object access frequency/recency information. Access-based replacement policies either ignore or do not focus on update information. However, update information is extremely important since it can make access information almost useless. In this paper, we consider two fundamental and strongly consistent access algorithms: poll-per-read (PER) and call-back (CB). We propose a server-based PER (SB-PER) cache access mechanism in which the server makes replacement decisions and a client-based CB cache access mechanism in which clients make replacement decisions. Both mechanisms have been designed to be suitable for using both update frequency and access frequency. We further propose two update-based replacement policies, least access-to-update ratio (LA2U) and least access-to-update difference (LAUD). We provide a thorough performance analysis via extensive simulations for evaluating these algorithms in terms of access rate, update rate, cache size, database size, object size, etc. Our study shows that although effective hit ratio is a better metric than cache hit ratio, it is a worse metric than transmission cost, and a higher effective hit ratio does not always mean a lower cost. In addition, the proposed SB-PER mechanism is better than the original PER algorithm in terms of effective hit ratio and cost, and the update-based policies outperform access-based policies in most cases 相似文献
15.
Chi-Lun Liu 《电子科技学刊:英文版》2013,11(2):176-180
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies. 相似文献
16.
Weng-jiang Feng Rong Jiang Peipei Han Wanli Liao Haochen He 《Wireless Personal Communications》2014,75(1):309-324
The cognitive access process based on different access schemes of the primary user in the spectrum sharing system of cognitive radio is studied. In the cognitive system with finite user population, the primary users access the licensed channels through random access, real-reservation access, pseudo-reservation access and non-random access. The cognitive users access the licensed channels without interfering the primary users. Their access process is modeled using the three-dimensional continuous Markov model. The performance analysis is presented with variation of the number of cognitive users. It is known from the simulated results that the handoff probability, the blocking probability and the forced termination probability of the cognitive users increase with the increase of the number of cognitive users. It is also found that the random access scheme has the highest handoff probability. And the real-reservation access scheme has the highest blocking probability and forced termination probability. In addition, the non-random access scheme has the maximum channel utilization. 相似文献
17.
18.
19.
20.
Analytical techniques for performance evaluation of synchronous random access packet switching in code division multiple access (CDMA) systems are presented. Steady-state throughput characteristics using several packet generation models are obtained. A number of example random access CDMA systems are compared in terms of their throughput versus offered traffic and utilization-delay characteristics. Numerical results indicate that appropriate use of multiaccess coding can provide utilization-delay characteristics superior to that of ALOHA. System stability is evaluated using a general finite user model, and the dynamic behavior of some example random access CDMA schemes is investigated. 相似文献