期刊文献+

面向认知网络的用户QoS动态自配置方法 被引量:10

Dynamic self-configuration of user QoS oriented to cognitive network
下载PDF
导出
摘要 为解决网络阻塞状态下用户QoS迅速降低的问题,提高网络系统对用户QoS的准确判定能力和动态调整能力,提出了一种保障用户QoS水平的动态自配置方法;采用效用函数对用户QoS优先级初始化表示,利用认知网络的主动特性和中断管理机制,通过认知节点对用户QoS优先级进行判定和动态修正。仿真实验和分析表明了所提出的方法优于传统的DiffServ,能够有效保障网络阻塞状态下用户的QoS水平。 To solve the rapid drop of user QoS under network congestion, improve the accuracy of user QoS and advance the ability of dynamic adjustment, a dynamic self-configuration method for user QoS protection was proposed. Utility function was introduced to initialize the priorities of user QoS, and then the active features of cognitive network and the interruption management were utilized to determine the priorities and also correct them dynamically by cognitive nodes. Simulation results show that the proposed method is better than traditional DiffServ, and able to guarantee user QoS effectively in case of network congestion.
出处 《通信学报》 EI CSCD 北大核心 2010年第3期133-140,共8页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2007AA01Z401) 国家自然科学基金重大计划资助项目(90718003) 国家自然科学基金资助项目(60973027 60873036)~~
关键词 认知网络 用户QoS 中断 自配置 cognitive network user QoS interruption self-configuration
  • 相关文献

参考文献15

  • 1AWAD C, SANS B, GIRARD A. DiffServ for differentiated reliability in meshed IP/WDM networks[J]. Computer Networks, 2008, 52(10) 1988-2012.
  • 2MAMMERI Z. Framework for parameter mapping to provide end-to-end QoS guarantees in IntServ/DiffServ architectures[J] Computer Communications, 2005, 28(9): 1074-1092.
  • 3SAFAK M. Towards cognitive telecommunication networks[A]. Pro ceedings of the IEEE 15th Conference on Signal Processing and Communications Applications[C]. Eskisehir, Turkey, 2007. 1-4.
  • 4CLARKE R. P2P's significance for ebusiness: towards a research agenda[J]. Journal of Theoretical and Applied Electronic Commerce Research, 2006, 1(3):42-57.
  • 5SCHMID S, SIFALAKIS M, HUTCHISON D. Towards autonomic networks[A]. Proceedings of the Third Annual Conference on Autonomic Networking, Autonomic Communication Workshop (IFIP AN/WAC), Volume 4195 of Lecture Notes in Computer Science(LNCS)[C]. Paris, France, 2006. 1-11.
  • 6KATSUNO Y, AIHARA T, RES I. Autonomic network configuration for networkable digital appliances[J]. IEEE Transactions on Consumer Electronics, 2005, 51(2):494-500.
  • 7TANSUPASIRI T, KANCHANASUT K, BARAKA C. Using active networks technology for dynamic QoS[J]. Computer Networks, 2006,50(11):1692-1709.
  • 8MAHMOUD Q. Cognitive Networks: Towards Self-aware Networks [M]. New York: Wiley Interscience, 2007.11 - 18.
  • 9THOMAS R, FRIEND D, DASILVA L. Cognitive networks: adaptation and learning to achieve end-to-end performance objectives[J] IEEE Communications Magazine, 2006, 44(12): 51-57.
  • 10MICHAEL R, DAVID S. Computers and Intractability: a Guide to the Theory of NP-completeness[M]. New York: W H Freeman & Co Ltd, 1979.35-43, 52.

二级参考文献21

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 3Braden R, Clark D, Shenker S. Integrated services in the Internet architecture: An overview. RFC1633, June 1994
  • 4Blake S, Black D, Carlson M, Davies E, Wang Z,Weiss W. An architecture for differentiated services. RFC2475, December 1998
  • 5Rosen E, Viswanathan A, Callon R. Multiprotocol label switching architecture. RFC 3031, January 2001
  • 6Bell. Failure to thrive: QoS and the culture of operational networking//Proceedings of the ACM SIGCOMM Workshop on Revisiting IP QoS (RIPQoS'03). New York, NY, USA, 2003:115-120
  • 7Crowcroft et al. QoS's downfall; At the bottom or not at all//Proeeedings of the ACM SIGCOMM. Germany, 2003: 109-114
  • 8Srivastava V. Cross-layer design: A survey and the road ahead. IEEE Communications Magazine, 2005, 43(12): 112-119
  • 9Ong C S, Nahrstedt K, Yuan W. Quality of protection for mobile multimedia applieations//Proeeedings of the International Conference on Multimedia and Expo(ICME'03). Baltimore, Maryland, 2003, 2:137-140
  • 10ISO/IEC 17799:2005 Information technology-security techniques-Code of practice for information security management

共引文献35

同被引文献123

引证文献10

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部