期刊文献+

适合异构通信网络的信息传输服务 被引量:5

Information Transmission Service Adapted to Heterogeneous Communication Network
下载PDF
导出
摘要 提出一个在应用层解决应急指挥系统中异构通信网络互联问题的传输服务模型,给出模型的主要传输服务功能,对通信节点标识、转发表生成与维护以及扩充性等关键技术进行探讨。该模型结合异构通信网络的特点及发展趋势,将IP网络作为系统通信的主要方式,将其他通信方式作为实现特定通信能力的辅助手段。应用结果证明,该模型可以提升应急指挥能力,减小异构网络互通的复杂性。 This paper proposes a new model of information transmission service adapted to heterogeneous communication network of emergency command system. The main functions of the model and some key technologies such as node labeling, routing table generating & r.aintaining and so on. This model takes into account the characteristics of heterogeneous communication networks and the development trend, uses IP network as the system's main communication means, and uses other communication means to meet the special communication needs. Application proves that the model improve the capacity of emergency command system, and reduces the complexity of heterogeneous communication .
出处 《计算机工程》 CAS CSCD 北大核心 2009年第8期152-154,共3页 Computer Engineering
基金 中国电子科技集团第二十八研究所C4ISR国防重点实验室基金资助项目
关键词 传输服务 异构通信网络 路径选择 用户数据报协议 transmission service heterogeneous communication network path choosing User Datagram Protocol(UDP)
  • 相关文献

参考文献3

二级参考文献7

  • 1[1]Stalling, William.SNMP, SNMPv2,and CMIP: The Practical Guide to Network Management Standards. San Francisco:Addison Wesley, 1993
  • 2[2]Comer D E,Stevens D L.Intemetworking with TCP/IP. San Francisco:Printice Hall,Inc., 1996
  • 3[3]Tanenbaum A S.Computer Networks. San Francisco:Prentice Hall,Inc.,1996
  • 4[4]芩贤道.网络管理协议及应用开发.北京:清华大学出版社,1998
  • 5王铁(译),基于 TCP/IP的 PC联网技术,1997年
  • 6汤毅坚,计算机实用网络编程,1995年
  • 7周明天,TCP/IP网络原理与技术,1993年

共引文献4

同被引文献19

  • 1田杨,王宏,陈晓梅.采用Netflow数据的典型异常流量检测方法[J].电子科技大学学报,2009,38(S1):57-60. 被引量:5
  • 2张渊,夏清国.基于Rete算法的JAVA规则引擎[J].科学技术与工程,2006,6(11):1548-1550. 被引量:36
  • 3张文星,纪有奎.人工智能语言Prolog专家系统原理与设计[M].武汉: 武汉测绘科技大学出版社,1998.
  • 4Gabriel C. DoCoMo DEMANDS Google' s Help with Signaling Storm [Z ]. 2012.
  • 5Qian Feng, Wang Zhaoguang, Gao Yudong, et al. Periodic Transfers in Mobile Applications:Network-wide Origin, Impact, and Optimization [ C ]//Proceedings of International Conference on World Wide Web. New York, USA : ACM Press, 2012 : 51-60.
  • 6Li Qian,Chan E W W, Lee P C, et al. Characterization of 3G Control-plane Signaling Overhead from a Data- plane Perspective[C]//Proceedings of ACM Inter- national Conference on Modeling. New York, USA: ACM Press ,2012:325-332.
  • 7Parimala M,Lopez D, Senthilkumar N C. A Survey on Density Based Clustering Algorithms for Mining LargeSpatial Databases [J].International Journal of Advanced Science and Technology,2011,31 (1) :59-66.
  • 8Erman J, Gerber A, Hajiaghayi M T, et al. Network- aware Forward Caching [ C ]//Proceedings of Inter- national Conference on World Wide Web. New York, USA : ACM Press, 2009 : 291-300.
  • 9Racic R, Ma D, Chert Hao. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone' s Battery [ C ]//Proceedings of Securecomm & Workshops. Washington D. C. ,USA :IEEE Press ,2006 : 1-10.
  • 10Qian Feng, Wang Zhaoguang, Gerber A, et al. TOP : Tail Optimization Protocol for Cellular Radio Resource Alloca- tion [ C ]//Proceedings of ICNP' 10. Washington D. C. , USA: IEEE Press ,2010:285-294.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部