首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The paper addresses the topic of long-haul optical networking for the provision of large-bandwidth IP services. A class of optical packet switching architectures is considered which adopts an arrayed wavelength grating device as packet router. The architecture performs slotted packet switching operations and fully exploits the wavelength routing capabilities by allowing multi-wavelength switching. Fiber delay lines are used to perform optical packet buffering, which accomplishes either input queueing or shared queueing. Here a thorough performance evaluation is carried out with different buffering configurations and the effect of various switch parameters on traffic performance is studied.  相似文献   

2.
BB84协议采用四种极化态来进行密钥分发,但在传输的过程中极化态受磁光效应的影响将会发生一定角度的偏转,这将对密钥分发产生非常不利的影响,因此为了顺利得进行量子密钥分发,必须要维持极化态.首先简要介绍了BB84模型以及模型中使用的四种极化态,然后分析了极化态偏转后对量子密钥分发的影响,同时用Matlab进行了仿真,结果表明严重情况下磁光效应将会使通信双方持有的原始密钥不一致.最后给出了一种可行的解决方案.  相似文献   

3.
A previously proposed contention-based TDMA protocol is modified to remain operational for a channel which is not noise free. The protocol is a mixture of random accessing and time division multiplexing and is suitable for data transmission through a channel which is characterized by non-negligible round-trip signal propagation delay. The effect of channel errors on the performance of the protocol is studied. Through numerical calculation it is observed that for the bit-error-rates encountered in practice the protocol remains stable. When the channel becomes rather noisy, error correcting codes can be imbedded to improve the performance. The validity of analysis has been verified by computer simulation.  相似文献   

4.
The main purpose of this paper is to study the influence of the mechanical effect of respiration over the T-wave end delineation. We compared the performance of an automatic delineation system based on the wavelet transform (WT), considering single lead (SL), global delineation locations obtained from SL annotations (SLR), and multilead (ML) approaches. The linear relation between the variations on T-wave end locations obtained with each of the methods and the mechanical effect of respiration was quantified using spectral coherence and ARARX modeling both in simulated signals and in real data. We also explored the evolution of the vectorcardiographic spatial loop using the projection on the main direction of the WT in the region close to the T-wave end ( T(e)) and its relation with respiration. The dispersion of the additional T-wave end location error due to respiration was reduced by 15% using SLR with respect to SL, while ML allows for a reduction of around 40%. The percentage of that error correlated with respiration was in average 99% using SL while 82% and 72% using SLR and ML, respectively. Thus, results suggest that ML is the most adequate strategy for T-wave delineation, allowing the reduction of the instability of T-wave end location caused by respiration.  相似文献   

5.
For a single network switch allocating link bandwidth to connections of a single class, an optimal call admission control (CAC) policy is found by the solution of a linear programming (LP) problem. Our optimization differs from previous work in that we include the effect of an output buffer in the switch for the temporary storage of packets bound for transmittal across the link. We find a policy that is optimal in the sense of minimizing call blocking subject to a packet level quality of service (QoS) requirement that limits the packet loss ratio. Such a policy's call blocking probability, if it is small enough to satisfy a call level QoS requirement, then establishes the feasibility of satisfying both the packet and call level QoS requirements for a given call request rate. We show with a previously described example that the addition of even a small output buffer can significantly increase the range of call request rates for which there exists a feasible policy, i.e. one that satisfies both QoS requirements. Also presented is an upper bound, valid for any fixed buffer size, on the range of call request rates for which there exists a feasible CAC policy. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   

6.
The wide deployment of wavelength-division multiplexing technology and new transmission techniques have resulted in significant increases in the transmission capacity in optical fibers, both in the number of wavelengths and the bandwidth of each wavelength channel. Meanwhile, the fast growth of the Internet demands more data switching capacity in the network in order to deliver high bandwidth to end users. Although the capacity of electronic routers has been increasing consistently in the past, optical switching appears to be a more cost-effective way to switch individual wavelengths. As the bit rate per wavelength channel continues to grow, optical subwavelength switching emerges as a new paradigm capable of dynamically delivering the vast bandwidth WDM offers. This article discusses one of such techniques, namely optical packet switching, and its performance perceived by end users in optical mesh networks. Specifically, our investigation reveals the benefit of using electrical ingress buffering and traffic aggregation to reduce packet-loss rate of optical packet-switched networks. Through simulation experiments, we present an evaluation of the network's TCP-level performance based on the proposed architecture  相似文献   

7.
We describe the practical and fundamental limitations of the more prominent optical buffering approaches. The architectural implementation and needs of an optical packet switch are used as a foundation for the study. We also present initial results for a buffered, all-optical, 40 Gb/s packet switch.  相似文献   

8.
The core-assisted mesh protocol   总被引:20,自引:0,他引:20  
The core-assisted mesh protocol (CAMP) is introduced for multicast routing in ad hoc networks. CAMP generalizes the notion of core-based trees introduced for internet multicasting into multicast meshes that have much richer connectivity than trees. A shared multicast mesh is defined for each multicast group; the main goal of using such meshes is to maintain the connectivity of multicast groups even while network routers move frequently, CAMP consists of the maintenance of multicast meshes and loop-free packet forwarding over such meshes. Within the multicast mesh of a group, packets from any source in the group are forwarded along the reverse shortest path to the source, just as in traditional multicast protocols based on source-based trees. CAMP guarantees that within a finite time, every receiver of a multicast group has a reverse shortest path to each source of the multicast group. Multicast packets for a group are forwarded along the shortest paths front sources to receivers defined within the group's mesh. CAMP uses cores only to limit the traffic needed for a router to join a multicast group; the failure of cores does not stop packet forwarding or the process of maintaining the multicast meshes  相似文献   

9.
10.
邱剑  刘莉丽 《信息技术》2006,30(6):84-87
组播技术对Internet发展至关重要,它以高效、可扩展的方式发送单点到多点、多点到多点数据,很多专家认为它必然成为下一代互联网的关键技术之一。现就其中组播路由协议对网络性能的影响进行了研究。  相似文献   

11.
网络通信技术的迅速发展,电子设备要求远程数据传输功能越来越普遍。现在对于智能仪表的通信,都是通过个工业总线、串口通信来完成的,以后网络通信就会完全替代这些成为唯一的通信方式。为了推动产品的网络化,本文在LwIP协议栈的基础上,提出PCP协议的应用。  相似文献   

12.
主动监听中协议欺骗的研究   总被引:15,自引:0,他引:15  
贺龙涛  方滨兴  胡铭曾 《通信学报》2003,24(11):146-152
提出了基于协议欺骗的主动监听框架,大大扩展了网络监听的适用范围。分析了网络访问的具体过程,将其中存在的映射关系分为四种:服务器域名到IP地址、IP到MAC地址、远程服务器的IP地址到本地路由器IP地址、以及客户端界面显示到应用服务器的处理。依据破坏的映射关系不同,本文将能够实现主动监听的协议欺骗分为四大类:ARP欺骗、路由欺骗、DNS欺骗和应用层欺骗,并详细分析了这四类协议欺骗攻击原理、实现方式及其防范策略。  相似文献   

13.
程敏敏  宋家友  张汉 《电视技术》2012,36(15):108-111
针对大多数无线传感器网络路由协议在分簇过程中仅考虑能量作为权值的不足,在EAMCT -G协议的基础上进行改进,不仅考虑了节点的剩余能量,还考虑了节点的邻居节点个数以及与周围节点之间距离的均值,这些量的综合作为选取簇头的权值标准.该协议中同时还引入了梯度的思想,保证了节点在进行数据传送时具有方向性和针对性,还提出了基于该协议的路由算法.通过NS2实验仿真分析,该协议在端到端的延时、丢包率、网络吞吐量以及生存期都有所改善.  相似文献   

14.
杨茜  吴海锋  曾玉 《通信学报》2014,35(7):26-222
在被动式RFID系统中,当多个标签同时向阅读器发射信号时,捕获效应能使阅读器成功接收其中一个标签信号。为提高捕获效应下的识别效率,本文提出一种名为CATPE (capture-aware and tag-population estimation)的RFID标签防冲突协议。该协议可同时估计标签数和捕获效应的发生概率,并在非等长时隙下设置最优帧长。CATPE协议的优点在于不需搜索极值,仅一步计算就能完成估计,从而降低了计算复杂度。计算机仿真显示,该协议与已有协议的识别效率相近,但计算复杂度得到了降低。  相似文献   

15.
在交换机内部,通过改进IEEE802.1P协议,为硬实时数据开辟一条"绿色通道",是提高其实时性的一种解决方案。针对这种方案中出现的丢包问题,提出了一种调度保障机制,利用反馈的方法控制硬实时数据的流向,避免新到的硬实时数据帧打断交换机对当前硬实时数据帧的处理。最后利用OPNET仿真软件,对该改进算法进行仿真验证。仿真结果表明,新的调度保障机制可以有效地克服丢包问题,保证硬实时数据的实时性。  相似文献   

16.
在二十一世纪全球网络连接的时代,网络已经渐渐成为人们生活中的必需品。与此同时,由于网络世界里的通信双方无法直接面对,使得我们无时无刻不在面临各种电脑病毒、黑客、电子窃听,以及电子诈骗等的威胁。在这种开放式的网络里,为了能正确的识别使用者与攻击者,就需要对互相传送的信息进行加密保护。目前解决这个问题的最有效的方法就是为通信双方分配一把共享对话密钥(sessionkey),同时还要验证对方的身份,然后以此对话密钥来加密传送的信息,以防止被攻击。早在1976年,面对不安全的通信网络,W.Diffie和M.E.Hellman就依据离散代数(DLP:D…  相似文献   

17.
InfiniBand体系结构和协议规范   总被引:1,自引:0,他引:1  
随着计算机网络和计算机技术的高速发展,传统I/O(输入/输出)技术导致了新的瓶颈,市场上迫切需要新的宽带I/O技术,目前的主流体系统结构有InfiniBand和RapidI/O。文中介绍了InfiniBand技术的产生,InfiniBand的结构,物理拓扑,协议分层结构及主要技术,最后对InfiniBand与传统的I/O技术如PCI进行了比较。  相似文献   

18.
THE MILITARY requirement for computer communications between heterogeneous computers on heterogeneous networks has driven the development of a standard suite of protocols to permit such communications to take place in a robust and flexible manner. These protocols support an architecture consisting of multiple packet switched networks interconnected by gateways. The DARPA experimental internet system consists of satellite, terrestrial, radio, and local networks, all interconnected through a system of gateways and a set of common protocols.  相似文献   

19.
A new technology needs to offer more than just 100 Mb/s. To succeed in the LAN marketplace, a new LAN technology must be very cost competitive with the established LANs, such as Ethernet and Token Ring, while also providing backwards compatibility with existing network software. We describe a new 100-Mb/s LAN technology that has these characteristics This technology is being defined as an open standard within the IEEE Project 802.12 Demand Priority group. Two important objectives were established for this LAN technology: first, it should be able to use the unshielded twisted pair (UTP) wiring found in a large number of installations and, in particular, to use the same wiring as defined for use in 1OBase-T. This objective was later extended to encompass support for the shielded twisted pair (STP) used for IEEE 802.5. This will enable the majority of current LAN users to benefit from their enormous investment in cable plant. The second objective was that the network should support new applications, such as video conferencing and remote training, while also providing backwards compatibility with the massive installed software base. Both objectives have been met. The Demand Priority MAC protocol currently being standardized in IEEE 802.12, offers substantial benefits over the CSMA/CD protocol of IEEE 802.3. By preserving both the current wiring infrastructure and investment in software, and by using the very simple Demand Priority MAC protocol, 100 Mb/s LANs could soon be as low-cost as 10Base-T is today  相似文献   

20.
Pragmatic general multicast (PGM) is a reliable multicast transport protocol that runs over a best effort datagram service, such as IP multicast. PGM obtains scalability via hierarchy, forward error correction, NAK elimination, and NAK suppression. It employs a novel polling scheme for NAK delay tuning to facilitate scaling up and down. This article describes the architecture of PGM, and discusses performance and security issues. We show that PGM supports asymmetric networks, achieves high network utilization, and is capable of high-speed (> 100 Mb/s) operation. PGM is currently an IETF experimental RFC that has been implemented in both commercial and academic settings.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号