共查询到20条相似文献,搜索用时 78 毫秒
1.
现代通信技术的ATM交换方式 总被引:1,自引:0,他引:1
本文简述了ATM技术的基本原理及其发展情况,还介绍了ATM技术在现代通信中的应用.提出了商务移动通信ATM网络.商务移动通信ATM网络是为了使ATM网络技术能够应用于商业领域,使之成为可能是依靠ATM技术高速分组交换技术,不仅如此,ATM还可以允许建立一时多连接.ATM技术可作为支持多媒体应用和服务器访问平台以及主干网络技术的最佳选择. 相似文献
2.
简要阐述了 ATM网络及技术现状 ,着重分析比较了 ATM与 IP的合作竞争关系及 ATM技术的发展和中国 ATM的未来 ,指出 ATM技术是互联网最有效的、最容易扩展的组网技术。 相似文献
3.
4.
本文先回顾了对ATM发展起推动作用的传统连网技术,通过总结传统网络中心问题,解释了ATM技术的特点,文中着重描述了构成ATM网络的三大基本元素:ATM单元,ATM交换机和ATM虚连接。 相似文献
5.
本文通过对远程数据通信使用X.25通信协议、帧中继技术、信元中继通信技术的讨论,引出ATM网络的概念,分析了ATM网络的异步传输过程,以及尽量地减少ATM传输中空载信源的数目以及如何最大限度地利用ATM网络的带宽问题,从ATM网络技术的性能特点总结出五项优点;并对ATM网络和设备的连接以及网络技术工程应用作了探讨。 相似文献
6.
本文摘要介绍了ATM技术的基本原理和ATM与传统网络的互连技术,如局域网仿真。ATM上的国际协议IP、多协议MPOA和ATM上的IP交换机等。每种技术均有其优点和不足,选用何种技术完全取决于用户的应用需求。ATM技术可作为支持多媒体应用和服务器访问平台以及主干网络技术的最佳选择。 相似文献
7.
8.
9.
10.
11.
本文结合作者在参加我国第一个ATM示范网建设的工作经验,阐述了我国第一个ATM示范网的具体组成,重点介绍有关ATM网的应用业务,给出了作者对研制ATM网络应用业务产品的体会。期望对有关从事ATM网络及应用业务设备研制的工程师以参考。 相似文献
12.
The purpose of this paper is to present an overview of the ATM technique. The basic principles of the ATM transfer technique, the B-ISDN layered protocol reference model, as well as the architecture and the main functions of the ATM network, are described in this tutorial. In particular, we present the main characteristics of the ATM technique, the structure of the ATM cell, the functions which deal with the protection from errored cells (HEC procedure) and the identification of the boundaries of the ATM cells (cell delineation and scrambling). The VP/VC concept is explained in detail, and the main principles and functions of the three lowest layers (Physical, ATM and Adaptation) of the B-ISDN layered protocol reference model are surveyed. The issue of Quality of Service parameters in ATM networks is reviewed, and the problem of the allocation of the network resources in response to user demands, as well as the problems of congestion control, Usage Parameter Control (UPC) and traffic modelling in ATM networks, are assessed. Finally, we present ‘possible’ sets of traffic characterization parameters, and show how possible B-ISDN sources can be modelled according to the basic on-off ATM traffic source model. 相似文献
13.
针对目前银行系统中ATM自动柜员机存在的不安全因素,在现有的ATM自动柜员机上增加人脸识别、指纹识别、第二代身份证识别等识别方式,同时安装传感器视频监控系统,以增强ATM自动柜员机的自动识别及安全监控能力;该系统将生物识别技术与ATM系统相结合,设计中以实用性、可操作性、人性化设计为主,确保ATM系统的鲁棒性和安全可靠,且该系统可随着ATM系统软件进行升级;人脸识别率、指纹识别的准确度不低于90%,第二代身份证的识别率不低于99%。 相似文献
14.
15.
《Computer Networks》1999,31(6):541-558
The IBM 8265 ATM Backbone Switch is the latest switch in the family of IBM ATM switches, designed for building large scale and reliable ATM network backbones. Two articles on the IBM 8265 ATM Backbone Switch are provided in this journal, describing the hardware architecture and the software architecture separately. This article describes the functions of the ATM Operating System and the ATM Multi-protocol Switched Services that run inside the IBM 8265 ATM switch. The focus is given to issues that are not addressed by the ATM Forum, and extensions that are needed when building ATM networks. 相似文献
16.
《Computer Communications》1999,22(15-16):1512-1525
Asynchronous Transfer Mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed networks. ATM is able to support a variety of applications including voice, video, image and data with different quality of service requirements. This paper addresses the design and implementation of security services and mechanisms in ATM networks. The paper examines the various design options for the placement of security services within the ATM protocol reference model and considers their advantages and disadvantages. The option of placing the security layer between the ATM Adaptation Layer (AAL) and the ATM layer is selected and the design of security services such as confidentiality, integrity and data origin authentication services in the user plane are described. The paper then presents an authentication scheme and key establishment protocol. This protocol is integrated with the existing ATM signaling protocols as part of the call setup procedures in the control plane. Then the paper discusses a public key infrastructure for the ATM environment and considers the design of public key management protocols between ATM nodes and Certification Authority for initializing, retrieving and distributing public key certificates. Finally, the paper considers the design of access control service for ATM networks and discusses the issues involved in the provision of access control mechanisms both at the connection setup phase and during the user data transfer phase. It seems that the developed security design can be transparently integrated to secure ATM networks. 相似文献
17.
18.
DiffServ在ATM上的映射及实现 总被引:1,自引:0,他引:1
分析了DiffServ和ATM的服务质量分类和相关参数,介绍了IP和ATM的融合工作方式,对DiffServ在ATM上的映射进行了深入细致的探讨,并提出了一个解决方案.最后利用以上内容.详细分析了一个在IP和ATM融合网上,使用VoMPLS技术进行应用的工作过程. 相似文献
19.
ATM网络平台的仿真程序设计及初步流量分析 总被引:1,自引:1,他引:0
ATM网络是由一系列通过点对点ATM链路或接口相互连接的ATM交换机构成的网络。考虑到ATM网络中流量与拥塞控制的需要及QOS,特别需要有一个平台对其进行理论分析,文中设计了一个种基于微机上的ATM网络仿真平台,该ATM网络平台仿真主要是为分析ATM网络流量而设计的一个模拟整个ATM环境及各个设备行为的程序,可以较好地对ATM的流量与拥塞控制进行理论分析。 相似文献
20.
一种高安全性的ATM身份认证机制 总被引:1,自引:0,他引:1
身份认证是信息安全领域的一个重要部分。首先对现有的ATM应用中的安全性进行分析,提出了一个将生物识别技术、USBKEY和ATM相结合的身份认证机制。该方式解决了现有ATM应用中存在的安全漏洞,极大地提高了ATM身份认证的安全性。 相似文献