期刊文献+

新一代网络QoS研究 被引量:36

Research on QoS in Next Generation Network
下载PDF
导出
摘要 随着网络技术和应用的飞速发展,互联网的接入形式以及网络应用日益呈现出复杂、异构和泛在等特点,当前的网络已经暴露出诸多不足,在很多方面无法满足用户对服务质量(QoS)的要求.当前互联网的QoS体系结构及相关技术已经不能适应新一代网络应用的进一步发展.文章着眼于未来互联网的发展方向,从网络QoS体系结构、实时QoS保证、融合QoP的QoS控制以及QoS性能评价理论等几个方面论述新一代网络QoS面临的挑战和解决思路,探讨了新一代网络QoS的发展方向. With rapid development of the network technology and application, Internet access and network application form become increasingly complex, heterogeneous and ubiquitous. The current network has revealed many inadequacies. And it is unable to satisfy Quality of Service (QoS) requirements. The current QoS architecture of Internet and related technologies can not adapt to the further development of the next generation of network applications. This paper focu- ses on the future direction of development of Internet, researches the challenges and the solving ideas of next generation network QoS from the network QoS architecture, real-time QoS, the integration Quality of Protection(QoP) and QoS, and the theory of QoS performance evaluation.
出处 《计算机学报》 EI CSCD 北大核心 2008年第9期1525-1535,共11页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(2006CB708301) 教育部科技创新培育重点项目(707005) 国家自然科学基金(60673187 60773138) 国家自然科学基金委员会与香港研究资助局合作基金(60218003) 微软清华联合实验室基金 诺基亚研究生科研创新基金资助~~
关键词 服务质量(QoS) 网络QoS体系结构 实时QoS 保护质量(QoP) 性能评价 Quality of Service (QoS) network QoS architecture real-time QoS Quality of Protection (QoP) performance evaluation
  • 相关文献

参考文献21

  • 1Braden R, Clark D, Shenker S. Integrated services in the Internet architecture: An overview. RFC1633, June 1994
  • 2Blake S, Black D, Carlson M, Davies E, Wang Z,Weiss W. An architecture for differentiated services. RFC2475, December 1998
  • 3Rosen E, Viswanathan A, Callon R. Multiprotocol label switching architecture. RFC 3031, January 2001
  • 4Bell. Failure to thrive: QoS and the culture of operational networking//Proceedings of the ACM SIGCOMM Workshop on Revisiting IP QoS (RIPQoS'03). New York, NY, USA, 2003:115-120
  • 5Crowcroft et al. QoS's downfall; At the bottom or not at all//Proeeedings of the ACM SIGCOMM. Germany, 2003: 109-114
  • 6Srivastava V. Cross-layer design: A survey and the road ahead. IEEE Communications Magazine, 2005, 43(12): 112-119
  • 7Ong C S, Nahrstedt K, Yuan W. Quality of protection for mobile multimedia applieations//Proeeedings of the International Conference on Multimedia and Expo(ICME'03). Baltimore, Maryland, 2003, 2:137-140
  • 8林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 9林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 10ISO/IEC 17799:2005 Information technology-security techniques-Code of practice for information security management

二级参考文献64

  • 1林闯,李雅娟,刘雪宁.非马尔可夫随机Petri网的分析方法及应用[J].系统仿真学报,2003,15(z1):71-75. 被引量:3
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3Chuang Lin,Proceedings of the 6th International Conference on Computer Communications and N,1997年,538页
  • 4林闯,软件学报,1995年,6卷,增刊,59页
  • 5Bo Li,ACM J Wireless Networks,1988年,4卷,4期,279页
  • 6林闯.随机Petri网的分解和压缩技术[J].软件学报,1997,8(7):541-548. 被引量:17
  • 7Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 8Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 9Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245
  • 10Mahimkar A.,Shmatikov V.Game-based analysis of Denial-of-service prevention protocols.In:Proceedings of the IEEE Computer Security Foundations Workshop(CSFW05),Aix-en-Provence,France,2005,287~301

共引文献143

同被引文献308

引证文献36

二级引证文献122

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部