共查询到20条相似文献,搜索用时 0 毫秒
1.
PSTN(公用交换电话网)将逐渐向分组化和宽带化的方向演变,在演变过程中,PSTN的网络简化与采用多业务交换平台,将起重要的作用。文中对这两方面作一简要介绍,说明网络简化的目标和应考虑的实际问题,包括远端交换模块和转接局、网关局的合理配置,以及大容量交换系统的选用。并以E-Cube多媒体交换系统为例,说明窄带STM(同步传送模式)和宽带ATM(异步传送模式)的综合交换,窄带业务与IP的结合,以及ATM与IP的结──MPLS(多协议标记交换)。这种多业务交换平台用在ATM/IP骨干网的边缘级,将有利于PSTN与各种新型网络互通。 相似文献
2.
3.
This paper discusses the services provided by a systems network architecture (SNA) network and design aspects related to these services. Both the basic transmission services and higher level network services are discussed. The first section describes the structure of SNA. The second section describes SNA's transmission services and sketches in the other aspects of SNA's structure. The next section describes services provided to users and managers of the network and the distribution of these services throughout the various nodes of the network. A concluding section discusses several potential extensions. 相似文献
4.
复杂线性系统建模化简的矩阵方法 总被引:1,自引:0,他引:1
根据各组成部分的特性求出系统特性是贯穿在信控类专业许多课程中的核心内容,如信号与系统中的信号流图,数字信号处理中的滤波器计算及控制系统中的结构图化简等.讲解其理论和实际计算在各门课程中都是难点.本文导出了具有普遍意义矩阵建模公式,并可藉软件的帮助快速准确地解决这个问题,比起各课程中原有的方法有很大的优越性. 相似文献
5.
6.
HFC网络前端设备的网管主要针对安装在前端机房内的有源设备,包括各种光接收机、光发射机、前置放大器等进行监测管理,对网络设备故障的及时预警、查找、处理起到至关重要的作用,改进被动抢修为主动防御,保证系统的稳定运行,为安全播出提供强有力的保障。介绍ANTEC网管系统的硬件组成和软件配置,以及网管软件的安装和使用。 相似文献
7.
When analyzing reliability of large systems, the great number of states require much computing time and a large memory, neither of which are readily available. This paper describes a method of partitioning a set of possible states into subsets. An algorithm may be devised on the basis of this method requiring much less memory as compared to other well known methods. 相似文献
8.
赵晓东 《信息安全与通信保密》2006,(12):164-166
随着IT系统规模和用户范围的扩大,在大中型企业和组织中,授权管理仍然是复杂和具有挑战性的工作。论文概述了授权管理基础设施(PMI)在大型应用系统中的应用和建设问题,以及PMI对应用系统授权管理和访问控制模式的影响。 相似文献
9.
10.
大型工业机器在欧洲销售需要有CE标记.机械安全和电气安全的评估可以在生产公司进行,但是电磁兼容(EMC)怎么办呢?您不可能将五吨重的产品运到当地实验室去进行测试.对于这些不能运到实验室进行测试的系统,本文将介绍它们的EMC测试过程. 相似文献
11.
本文主要依据一例大型集会开幕式的实际优化策略为基础,对CDMA优化中常见的大型集会的优化策略进行了深入的探讨,总结了这类场景下的优化思路和方法。 相似文献
12.
《Reliability, IEEE Transactions on》2007,56(1):167-168
This book is primarily a reference book, not an introductory textbook. It goes beyond the static or average reliability calculations which are typically considered. Instead, it works with functions to provide the reliability functions of large systems, which are extremely useful, when applicable. The book requires the reader to become familiar with its non-standard terminology and notation in order to apply the results. The book is useful for users who have a need for large systems reliability calculation methods, but for those seeking more common system reliability problems, there are more general. introductory references available. 相似文献
13.
由大量音箱组成的大型扩声系统,音箱本身和音箱之间存在大量的干涉,导致音色难于保证,阐述了音箱结构和音箱系统的组成及合理布局,以及多功能声学预测软件对扬声器系统合理性的快速前期预测功能。 相似文献
14.
连续神经网络学习过程的动态特性研究 总被引:1,自引:0,他引:1
本文研究了连续神经网络在学习过程中结构摄动情况下网络的动态特性.首先提出一般连续神经网络的时变非线性微分方程模型,给出了结构摄动情况下网络在平衡点处线性化处理方法.并主要针对联想神经网络,研究了网络结构不变情况下和网络结构有界缓变的动态特性. 相似文献
15.
简要阐述了在全业务运营时代,运营商的传输网络规模将迅速扩大,传统的由多个网管共管的管理模式存在的问题;较详细地介绍了由烽火通信研发的面向超大型网络的S-EMS网管解决方案OTNM2000子网管理系统的软件设计、硬件配置、备份方式、发展方向及其应用等有关问题。 相似文献
16.
17.
本文介绍了DOCSIS网络系统保证网络安全的方法,从功能上分析了该安全系统的3个安全组件。同时,重点给出了3个关键的具体实现,阐述了各部分和各步骤之间的运作方式和相互作用。 相似文献
18.
本文阐述异步传递模式通信技术 (ATM )在我国某大型企业网络中的实际应用 ,并探讨我国大型企业网络的技术发展途径。 相似文献
19.
Controlled Flooding Search in a Large Network 总被引:1,自引:0,他引:1
In this paper, we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching for a destination node in a mobile ad hoc network, querying for a piece of desired data in a wireless sensor network, and searching for a shared file in an unstructured peer-to-peer network. We consider the class of controlled flooding search strategies where query/search packets are broadcast and propagated in the network until a preset time-to-live (TTL) value carried in the packet expires. Every unsuccessful search attempt, signified by a timeout at the origin of the search, results in an increased TTL value (i.e., larger search area) and the same process is repeated until the object is found. The primary goal of this study is to find search strategies (i.e., sequences of TTL values) that will minimize the cost of such searches associated with packet transmissions. Assuming that the probability distribution of the object location is not known a priori, we derive search strategies that minimize the search cost in the worst-case, via a performance measure in the form of the competitive ratio between the average search cost of a strategy and that of an omniscient observer. This ratio is shown in prior work to be asymptotically (as the network size grows to infinity) lower bounded by 4 among all deterministic search strategies. In this paper, we show that by using randomized strategies (i.e., successive TTL values are chosen from certain probability distributions rather than deterministic values), this ratio is asymptotically lower bounded by e. We derive an optimal strategy that achieves this lower bound, and discuss its performance under other criteria. We further introduce a class of randomized strategies that are sub-optimal but potentially more useful in practice 相似文献