首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
基于802.11e草案中EDCF机制的区分服务和多队列技术,提出对时延敏感性业务设置时延界限,并根据队列中包的剩余生命时间进行调度。仿真结果表明,此方案减少语音业务端到端的时延,并且有效抑制了移动和多跳引起的队列拥塞现象,提高了Ad Hoc网络的整体性能。  相似文献   

2.
利用计算机对某一管道的二维层状切片图形进行分析处理.利用多媒体著作工具MultimediaToolBook[1~3]找出图形中最大的内切圆,内切圆圆心的轨迹就是管道中心轴线的轨迹,编制程序计算出半径数值,在确定管道中心轴过程中,采用圆弧上两点的角平分线与圆弧的交点进行插值;运用Origin工具作出管道的三维图和三视图;使用Visio工具将三视图修改成光滑的曲线.  相似文献   

3.
城域以太网体系标准、业务模型和新技术剖析   总被引:2,自引:1,他引:1  
蔡鸣 《电信科学》2004,20(3):12-17
本文从市场和用户需求出发,剖析了传统以大网作为城域网建网模式的优点及不足.通过对城域以大网体系架构和标准草案进展的阐述,重点介绍了城域以太网业务模型、基于VPLS/VPWS的城域以大网技术以及相应的解决方案.  相似文献   

4.
A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.  相似文献   

5.
软交换设备如何在局域网间互通,目前还没有应用标准,而现有实现方案的复杂性、不易兼容性,也限制了其应用。通过对目前几种解决NAT(Network Address Translation)/防火墙穿透方案的分析,提出了一种较易实现的穿透方案,并给出具体实现。  相似文献   

6.
自动交换光网络的分层路由体系及其路由实现方法   总被引:4,自引:0,他引:4  
本基于国际电信联盟电信标准化组织(ITU-T)相关标准及光互联论坛(OIF)有关草案,阐述了路由域分层的一般原则,给出了层次路由体系下实现路由功能的一般性原理,提出了分层路由体系下路由的实现方法。  相似文献   

7.
基于软交换的NAT/防火墙穿透技术研究   总被引:1,自引:0,他引:1  
通过对目前几种解决NAT(network addres stranslation)/防火墙穿逢方案的分析,提出了一种较易实现的穿透技术,并给出具体实现方案。  相似文献   

8.
WLAN Mesh网络安全接入技术研究   总被引:1,自引:0,他引:1  
朱近丹  吴越 《通信技术》2009,42(10):180-182
WLANMesh网络是当前主流的新型动态自组织网络。为了在适应多跳和自组织特性的条件下提供可靠安全能力,IEEE802.11S标准草案提出了全新的安全框架-Mesh安全关联(MSA)。将结合标准草案介绍MSA架构,包括新的密钥体系以及建立部署该密钥体系使用的协议的交互,并对协议安全特性进行简要安全分析。最后针对架构过于复杂的弱点提出一个试验性Kerberos风格的简化方案。  相似文献   

9.
Given the favorable support for organized labor by the government, understanding the legal ramifications of written documents is important. In this paper, the authors review the more significant ways organizations communicate with employees in writing, and provide some current practical guidelines managers can follow to prepare communications that are more effective and more positive. Where appropriate, the legal implications of poorly written communication are addressed and guidelines are provided based on current legal trends. The author noted that nothing in this article should be construed as legal advice, and that employers should seek the advice of a knowledgeable attorney when attempting to resolve potential legal issues associated with any type of employee communication.  相似文献   

10.
儒家理想人格是以儒家思想为基础, 追求理想的人生境界和终极目标的一种理想人格, 其基本内涵包括仁、 义、礼、智、信。儒家代表人物孔子和孟子所提倡的“仁者爱人”、“义礼为先”、“智信合一”的思想, 不仅于当世有益, 也对当代法律人的品格塑造具有重要的启示。当代法律人的品格塑造既要继承历史, 又要 尊重现实。为此, 必须注意以下三点:其一, 当代法律人的品格塑造要与建设法治强国相统一;其二, 当代法 律人品格塑造是一项系统的工程;其三, 当代法律人品格塑造要在实践中完成。  相似文献   

11.
Journalistic uses of collective memory   总被引:2,自引:1,他引:1  
It has become clichéd to assert that journalists write the first draft of history. Far less attention has been paid to who does the rewrites. Frequently, second drafts of history are also written by journalists. The typology developed her describes the ways journalists use our public past and offers some insights about the process of collective memory development in the news media. Commemorative journalism seems to offer the best chance to reexamine our past, but may offer little incentive to do so. Historical analogies may not encourage us to contest the meaning of the past due to the simple, dramatic narratives of news reporting. Historical contexts may not encourage us to look closely at the meanings we ascribe to the past either, because they are presented as facts rather than interpretations.  相似文献   

12.
文章对SMuG草案之一的基于单向函数树(OFT)的密钥管理方案的安全性进行了详细分析,指出OFT方案在实现前向安全和后向安全上的漏洞,提出了可以实现完整的前向安全和后向安全的OFT改进方案。  相似文献   

13.
融合多种网络可满足用户长日寸间连接和尽可能获得较高数据传输速率的需要,但融合后的网络也将各种网络的安全缺陷带进融合网络中。这不但给融合网络的运行带进各种原有的安全问题,而且增加了一些新的安全问题。对此,文章提出了基于恢复的多重防护解决方案,并使用公钥加密算法鉴权。使用私钥对通信数据进行加密。该方案可以为系统提供可靠的安全性,并实现用户对服务的不可抵赖性。该方案还处于研究起步阶段,下一步还需要明确各层的正确行为,以及出现多个恶意节点对某个合法节点诬陷时所应采取的行动。  相似文献   

14.
增强的无线局域网安全技术分析   总被引:1,自引:0,他引:1  
文章介绍了无线局域网安全技术的现状,对IEEE802.11i草案中有关认证、密钥管理、加密等方面的增强的无线局域网安全技求进行了分析。提出了基于IPsec(IP安全)的VPN安全解决方案。  相似文献   

15.
MPLS-TP网络保护机制前瞻   总被引:1,自引:0,他引:1  
为研究MPLS-TP数据传送网的自愈功能,在总结相关国际标准草案的基础上,从框架要求、保护触发机制、各种网络拓扑保护原理等方面对MPLS-TP的保护机制进行了分析和探讨.通过引入保护机制,MPLS-TP将大大提高网络生存性能,满足电信级传送网络的要求.  相似文献   

16.
We achieved our target to win the youth for a partnership for the future very well in the first attempt. The works of youth distinguish themselves through creativity, professionalism and a strong intuition in thinking with the sun. The Youth Award was given to five groups in the fields: common initiative of teachers and pupils, total energy concept for Ladakh, electric energy for Nepal, architectural drafts for a school and solar containers.  相似文献   

17.
该文研究在采用波束赋形和人工噪声的物理层安全方案中利用人工噪声提高合法接收端性能。发送端根据发送符号和信道系数,判断人工噪声是否对合法接收端的信号检测有益,并针对有益噪声和无益噪声分别设计不同的噪声波束赋形矢量。通过利用有益噪声,在不改变窃听端接收信噪比的条件下,合法接收端的信噪比有较明显的提高。对误比特率和保密容量进行理论分析和仿真,结果显示,与传统的人工噪声方案相比,所提方案可提高合法接收端的性能,改善保密容量。  相似文献   

18.
Storage media such as digital optical discs, PROM's, or punched cards consist of a number of write-once bit positions (WIT's); each WIT initially contains a "0" that may later be irreversibly overwritten with a "r'. Rivest and Shamir have shown that such write-once memories (WOM's) can be reused very efficiently. Generalized WOM's are considered, in which the basic storage element has more than two possible states and the legal state transitions are described by an arbitrary directed acyclic graph. The capabilities of such memories depend on the depth of the graphs rather than on their size, and the decision problem associated with the generalized WOM's in NP-hard even for3-ary symbols rewritten several times or multiple values rewritten once.  相似文献   

19.
Several key issues affect the development and standardization of Packet Transport Networks (PTN) and Multiprotocol Label Switching Transport Profile (MPLS-TP). These include the end-to-end Quality of Service (QoS) mechanism, layered network architecture,introduction of layer-3 functions, and data-plane loopback functions. This paper introduces several views on the construction and maintenance of PTN, and on the requirements of PTN services. After an analysis of Traffic Engineering (TE) based on Multiprotocol Label Switching (MPLS) and Differentiated Service (DiffServ), a service-oriented end-to-end QoS guarantee mechanism is proposed. An alternative to introducing layer-3 functions into PTN is also proposed, based on PTN layered architecture defined in the available MPLS-TP standards and drafts. Requirements of data-plane loopback functions are discussed in conclusion.  相似文献   

20.
Beyond a narrow conception of usability testing   总被引:2,自引:0,他引:2  
The author points out that construed narrowly, `usability testing of documentation' can be limited to validating the usability of a nearly completed draft. She explores ways that technical communication can take a broader view of usability and then situate new approaches and studies. She argues that this broader interpretation can given technical communicators ways to talk with others interested in usability and can build a platform for an understanding of usability research that looks beyond the testing of drafts for usability to the tough issues driving usability research  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号