共查询到20条相似文献,搜索用时 31 毫秒
1.
Jesper Nilausen 《International Journal of Network Management》1995,5(1):13-18
This article, which is the fifth in the series on Token Ring Network Management, will discuss selected aspects of Change Management that are relevant in today's Token Ring networking environment. 相似文献
2.
Jesper Nilausen 《International Journal of Network Management》1994,4(4):211-217
In this fourth article in the series on Token Ring Network Management we will discuss selected areas of relevance to today's Token Ring networking environment. 相似文献
3.
Jesper Nilausen 《International Journal of Network Management》1993,3(4):207-212
Following the tutorial ‘Token Ring Network Management’ article in the previous issue of the International Journal of Network Management, this article takes us through some more detailed Problem Management scenarios. 相似文献
4.
5.
6.
Jesper Nilausen 《International Journal of Network Management》1993,3(3):125-131
This article on Token Ring network management describes general aspects of this important area and gives a brief introduction to the various disciplines, which will be covered in more detail in following articles. 相似文献
7.
8.
Bengt Beyer-Ebbesen Mark Cowtan Sharam Hakimi Robert D. Love 《International Journal of Network Management》1997,7(4):221-239
This article considers the problems caused by ever increasing traffic on Token Ring LANs. It shows how the new IEEE 802.5 standard for DTR addresses this problem, outlining scenarios and providing a migration strategy for evolving networks, using this new standard. © 1997 John Wiley & Sons, Ltd. 相似文献
9.
T.V. Gopal G. Karthikeya Raja D.K. Vijaykumar V. Sankaranarayanan 《Microelectronics Reliability》1996,36(5):707-710
Token Ring Networks have gained popularity due to their simplicity and ease of maintenance. However, the functioning of the entire network is dependent on the well being of an entity called “token”. The network ceases to function if the token is lost. There are algorithms suggested for improving the fault tolerant capabilities of the network with respect to the token.This paper proposes an algorithm to achieve fault tolerance. The algorithm is implemented on a simulated token ring network. 相似文献
10.
An approximation technique is presented to evaluate the dependability of FDDI networks. This technique, based on the most likely paths to failure concept, is simple and practical. It may be applied easily to evaluate and compare the dependability of different FDDI network configurations. The effects of various network parameters on the network availability are examined. We conclude that, in order to guarantee high availability, an FDDI network backbone should be interconnected using dual-attachment concentrators. Furthermore, dual-homing configurations are required for high-availability paths between end stations and the backbone. For less stringent availability requirements, single-attachment concentrator trees with single attachment stations may suffice. We also discuss how the technique may be extended easily to more general heterogeneous networks including Token Ring and Ethernet 相似文献
11.
移动Ad hoc网络轮询接入控制协议 总被引:4,自引:0,他引:4
该文对Ad hoc网络的MAC层协议进行了研究,通过对无线令牌环协议(WTRP)进行改进,提出了一种新的具有QoS保障的无竞争的分布式并行无线轮询访问协议(DPWPAP),并采用嵌入Markov链和概率母函数的分析方法,用限定服务规则进行了系统建模,在系统模型的基础上得到了系统的平均排队队长以及平均等待时间的解析结果.理论分析和仿真结果是一致的,表明该协议的排队等待延迟和平均等待队列长度均比WTRP有很大降低,稳定性大大增强,更加适用于对时延要求较高的业务. 相似文献
12.
The Institute of Electrical and Electronics Engineers began working on a transmission standard for multimedia networking almost a decade ago. Since the standard's recommendation in December 1994, it has taken little more than a year to capture the attention of manufacturers, vendors, resellers, systems integrators, and network users. The IEEE standard for multimedia in a local area network (LAN) is based on ISLAN-1GT, or isochronous Ethernet. Better known as isoEthernet, the standard incorporates an integrated services digital network phone system with LAN-based Ethernet for mixed data transmission. The IEEE standard, designated 802.9a for LANs and metropolitan area networks, is simply a physical layer standard-just like Ethernet 802.3/ISO 8802-3 and Token Ring 802.5-in that it defines the standard's media access control and physical layer 相似文献
13.
《Spectrum, IEEE》1991,28(1):48-51
Significant developments during 1990 are examined, and future trends are delineated. Two major events were the rapid acceptance by end users of the 10BASE-T standard for Ethernet interconnections using unshielded twisted-pair wiring and the widespread acceptance of the fiber distributed data interface (FDDI) by corporate planners and MIS (management information system) people, as well as government planners, as the way to wire the corporate backbone. 1990 also saw commercialization begin of the FDDI interface by which data is transmitted on an optical-fiber network at 100 Mb/s rates. The development of twisted-pair wiring for Ethernet and FDDI will lead to integration of Ethernet. Token Ring, and FDDI local networks in one concentrator in one wiring closet, while the pace of growth of the LAN market continues to accelerate. The seven layers of the Open Systems Interconnection (OSI) protocol received a big boost last year from the US government, and it is likely to become the routine way of organizing data networks worldwide 相似文献
14.
The telecommunication equipments suffer more damages, dues to lightning and power lines induction, than other type of appliances. The cause is that they have direct connections with wires or cables that are exposed to transients, and usually the affected components have direct connections with external lines, but sometimes the mechanism is more subtle and can affect circuits without contact with exposed connections.This paper treats about failures on data interfaces circuits induced by voltage transients on the earth protection wire. It is based on a study of modems failures connected to remotes data terminals through RS-232 interfaces. Other data interface could also be damaged by this mechanism of failure (RS-422, Ethernet, Token Ring, etc.).On this type of failure the failed circuits (drivers and receivers RS-232) are not located nearly the transient entry gate (telephone line and VAC inputs). They are in an interface between two equipments, and usually the only failed components are the drivers and receivers. 相似文献
15.
分析比较了传统的局域网中以太网和令牌网的性能和QoS保障特性,说明令牌网的支持QoS的特点可用于多媒体通信网络和实时控制系统的协议设计,并阐明其算法在最新的AdHoc网络QoSMAC协议改进的作用,最后介绍了一种将以太网和令牌网不同特性网络的分层实现技术和综合互连的方案。 相似文献
16.
17.
One-time Password (OTP) Token has become one of the main stream security products during the past few years. OTP Token can
automatically generate a random password. It is especially popular to be used with the Two-factor Authentication (2FA) system.
OTP Token has proliferated into many different form factors such as standalone token, PC, PDA, cellular phone and Cloud-based
token. But most of the implementation has their short comings with high token cost, not easy to carry and high supporting
or deployment cost. Certain implementations may also compromise the network security when the token is lost or stolen. Moreover,
most of the tokens can be broken-in by Man-in-the-Middle Seed-tracing and Shoulder-surfing security attacks. To overcome such
aforementioned issues, we propose a secure encryption algorithm – Rubbing Encryption Algorithm (REAL). We use REAL to implement
a Mobile-based and a Cloud-based OTP Token as design examples. Both of them are of high security level, lower total token
cost and can resist the aforementioned security attacks as well. 相似文献
18.
Barzilai T.P. Kandlur D.D. Mehra A. Saha D. 《Selected Areas in Communications, IEEE Journal on》1998,16(3):397-413
The Internet Engineering Task Force (IETF) is currently in the process of overhauling the architecture of the Internet to meet new challenges and support new applications. One of the most important components of that venture is the enhancement of the Internet service model from a classless best effort service architecture to an integrated services architecture supporting a multitude of classes and types of services. This paper presents the design, implementation, and experiences with a protocol architecture for the integrated services Internet. It is based on the emerging standards for resource reservation in the Internet, namely, the RSVP protocol and the associated service specifications defined by the IETF. Our architecture represents a major functional enhancement to the traditional TCP/IP protocol stack. It is scalable in terms of performance and number of network sessions, and supports a wide variety of network interfaces ranging from legacy LAN interfaces, such as Token Ring and Ethernet, to high-speed ATM interfaces. The paper also describes the implementation of this architecture on the IBM AIX platform and our experiences with the system. We then present a performance analysis of the system which quantifies the overheads imposed by all components of the QoS support, such as traffic policing, traffic shaping, and buffer management 相似文献
19.
20.
本文主要介绍了虚拟令牌传递方式在控制系统中的应用 ,重点介绍了虚拟环形网令牌传递方式控制数据传输的机制 相似文献