期刊文献+

通信服务质量术语与通用QoS模型 被引量:1

Quality of service terminology in communication network and the general QoS model
下载PDF
导出
摘要 服务质量(QoS)这一术语在电信领域里得到了广泛的使用,然而,人们在使用QoS术语时,术语本身却经常没有被有效地定义,使用也往往不够严谨,甚至出现错误.文章通过构建通用的QoS模型,对QoS的基本定义进行了较为全面的讨论,并详细地介绍了通信QoS的框架和QoS的4个视角等多个方面的问题. The term of QoS has been widely used in the telecommunication field, but generally it hadn't been effectively defined when it was used, and sometimes was used inaccuracy. This paper discusses the basic definition of QoS with the help of constructing a common QoS model, introduces the framework of communication QoS and its four views.
作者 张继军
机构地区 华中科技大学
出处 《光通信研究》 北大核心 2004年第3期33-36,共4页 Study on Optical Communications
关键词 服务质量 QOS模型 性能参数 视角 分组网络 通信网 quality QoS QoS performance parameter QoS model QoS view
  • 相关文献

参考文献3

  • 1ITU-T Rec.E.800-1994,Terms and definitions related to quality of service and network performance including dependability[S].
  • 2ITU-T Rec.G.1000-2001,Communications quality of service:A framework and definitions[S].
  • 3Janusz Gozdecki,Andrzej Jajszczyk,Rafal Stankiewicz.Quality of service terminology in IP network[J].IEEE Communication Magazine,2003 (3): 153-159.

同被引文献15

  • 1孙玉方.开放系统的国际标准化[J].计算机工程与应用,1994,30(9):27-31. 被引量:1
  • 2王怀民.开放系统的概念[J].计算机工程与科学,1995,17(3):105-113. 被引量:3
  • 3胡贯荣,刘键.开放系统技术的探讨[J].计算机工程与设计,1995,16(3):37-40. 被引量:1
  • 4宋普选,应锦鑫.入侵检测技术研究综述[J].军民两用技术与产品,2005(7):38-40. 被引量:2
  • 5杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 6张可翔,谢冬青,冷健.一种基于属性证书和角色的访问控制模型[J].微电子学与计算机,2006,23(11):143-145. 被引量:6
  • 7REN Shang-ping, YU Yue, CHEN Nian-en, et al. Actotrs, roles and coordinators: a coordination model for open distributed and embedded systems [ C ] // 8th International Conference on Coordination Models and Languages, Bologna, June 14-16, 2006 : 247-265.
  • 8LEE S C, HEINBUCH D V. Training a neural- network based intrusion detector to recognize novel attacks [ J ]. IEEE Transactions on Systems, Man and Cybernetics: Part A, 2001, 31(4): 294-299.
  • 9SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[ J]. Computer, 1996, 29(2) : 38-47.
  • 10KWIAT K, REN Shang-ping. A coordination model for improving software system attack-tolerance and survivability in open hostile environments [ C ] // IEEE International Conference on Sensor Network, Ubiquitous, and Trustworthy Computing, Taiwan, June 5- 7, 2006: 1-9.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部