首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
文章重点介绍了上海热线的用户接入平台,使用的接入设备的特性以及普通电话接入、ISDN接入和DDN专线接入的特点。最后还简单介绍了PHONEDOUBLE的接入方式。通过文章的介绍,读者可以对互连网的接入方式有一个大致的了解。  相似文献   

2.
本文讨论了DDN网的特点、功能和用户接入方式,并具体介绍利用DDN网建立专用的湖北省农行综合业务网络的实例以及相关技术  相似文献   

3.
通过介绍ISDN和Internet的协议,引出了通过ISDN接入Internet的业务,说明ISDN接入Internet比传统的接入方法更为优越。  相似文献   

4.
本文从威海DDN本地网的实际制世与配置出发,面向网络建设介绍DDN本地网规划 、建设、发展的策略,以及威海DDN本地网、公用DDN网提供的业务功能和用户层终端接入方式。  相似文献   

5.
ISDN与公用分组交换网的互通(下)□张国宏赵慧玲杜森2ISDN与PSPDN互通的实现方法2.1两种实现方法前面介绍了分组方式终端接入ISDN的两种方式,即方式A和方式B。对于方式B,PH的实现有两种方法:一种方法是PH模块驻留在ISDN交换机内部,...  相似文献   

6.
黄勇军 《电信科学》1997,13(6):24-29
本文介绍了广东省邮电管理局宽带数据通信实用试验网中采用的几种高速数据接入技术,包括N-ISDN接入,ADSL接入和Cablemodem接入,并对其关键技术进行简要介绍。  相似文献   

7.
江宝昆 《电信科学》1995,11(7):35-39
本文从我国公用DDN的实际制式与配置出发,面向专线或专网建设的决策者介绍公用DDN提供的业务功能和用户层终端接入方式。  相似文献   

8.
介绍AN-2000是一个比较完善的综合接入系统,现已能提供POTS,DDN、2/4W E&M,ISDN接口(2B+D,308+D),子速率复用等综合业务接入,同时新的业务接入模块也正在不断推出;并且将AN-2000与交换机远端模块的几个方面进行了比较。最后简介AN-2000与F-150、S-1240的对接实验。  相似文献   

9.
CATV有能力提供电话和数据服务,有线电视分配与电视ISDN接入集合到户是实现宽带综合网络的便利途径,本文考虑了CATV/ISDN结合的方法,ISDN主速率时分多址接入方式以及用户接口的规格。  相似文献   

10.
文章简述了ISDN的概念及中兴ISDN数据通信网组成,介绍了通过中兴ISDN接入Intrnet分组网及DDN等数据通信业务的方法。  相似文献   

11.
马可尼的全面接入解决方案包括4个主要部分:Deep Fiber‘Advanced Copper、Skyband无线产品和ServiceOn接入管理系统。马可尼公司在接入领域的领先地位得益于它在过去一段时间内的成功收购以及在固定和无线技术方面各界的丰富经验。  相似文献   

12.
无线接入技术可分为模拟无一接入技术和数字无线接入技术,数字无线接入系统又有多种解决方案,包括数字直接扩频技术、GSM、CDMA、DECT、PHS和SCDMA等。  相似文献   

13.
杨列永 《世界电信》2006,19(9):51-54
“光进铜退”是固网发展的趋势,FTTH是固网发展的终极目标,xPON技术是实现“光进铜退”和综合业务接入的最佳选择。自上而下的网络融合不断推进,“后网络智能化时代”接入层网络演进将是部署的重点。描述了面向“光进铜退”的中兴通讯新一代FTTx光接入平台在新通信环境下的应用优势。  相似文献   

14.
Update-Based Cache Access and Replacement in Wireless Data Access   总被引:1,自引:0,他引:1  
Cache has been applied for wireless data access with different replacement policies in wireless networks. Most of the current cache replacement schemes are access-based replacement policies since they are based on object access frequency/recency information. Access-based replacement policies either ignore or do not focus on update information. However, update information is extremely important since it can make access information almost useless. In this paper, we consider two fundamental and strongly consistent access algorithms: poll-per-read (PER) and call-back (CB). We propose a server-based PER (SB-PER) cache access mechanism in which the server makes replacement decisions and a client-based CB cache access mechanism in which clients make replacement decisions. Both mechanisms have been designed to be suitable for using both update frequency and access frequency. We further propose two update-based replacement policies, least access-to-update ratio (LA2U) and least access-to-update difference (LAUD). We provide a thorough performance analysis via extensive simulations for evaluating these algorithms in terms of access rate, update rate, cache size, database size, object size, etc. Our study shows that although effective hit ratio is a better metric than cache hit ratio, it is a worse metric than transmission cost, and a higher effective hit ratio does not always mean a lower cost. In addition, the proposed SB-PER mechanism is better than the original PER algorithm in terms of effective hit ratio and cost, and the update-based policies outperform access-based policies in most cases  相似文献   

15.
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies.  相似文献   

16.
The cognitive access process based on different access schemes of the primary user in the spectrum sharing system of cognitive radio is studied. In the cognitive system with finite user population, the primary users access the licensed channels through random access, real-reservation access, pseudo-reservation access and non-random access. The cognitive users access the licensed channels without interfering the primary users. Their access process is modeled using the three-dimensional continuous Markov model. The performance analysis is presented with variation of the number of cognitive users. It is known from the simulated results that the handoff probability, the blocking probability and the forced termination probability of the cognitive users increase with the increase of the number of cognitive users. It is also found that the random access scheme has the highest handoff probability. And the real-reservation access scheme has the highest blocking probability and forced termination probability. In addition, the non-random access scheme has the maximum channel utilization.  相似文献   

17.
对用户接入网技术和基本结构进行了讨论,并在此基础上对天津市用户接入网的建设方案提出了建议。  相似文献   

18.
为解决其他访问控制机制向基于属性的访问控制机制迁移过程中所面临的策略生成问题,该文提出一种基于访问控制日志的访问控制策略生成方法,利用基于机器学习分类器的递归属性消除法实现策略属性的选择,基于信息不纯度从日志记录中提炼出蕴含的属性-权限关系,结合实体属性选择的结果,构建策略结构树,实现基于属性的访问控制(ABAC)策略...  相似文献   

19.
无线接入技术及宽带IP无线移动接入网   总被引:2,自引:1,他引:1  
介绍几种主要的无线接入技术。阐述宽带IP无线移动接入技术。  相似文献   

20.
Analytical techniques for performance evaluation of synchronous random access packet switching in code division multiple access (CDMA) systems are presented. Steady-state throughput characteristics using several packet generation models are obtained. A number of example random access CDMA systems are compared in terms of their throughput versus offered traffic and utilization-delay characteristics. Numerical results indicate that appropriate use of multiaccess coding can provide utilization-delay characteristics superior to that of ALOHA. System stability is evaluated using a general finite user model, and the dynamic behavior of some example random access CDMA schemes is investigated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号