期刊文献+

基于非交叉路径的加权网络可靠性模型

Weighted Network Reliability Model Based on Disjoint Path
下载PDF
导出
摘要 针对交叉路径和非交叉路径的数目不能准确反映网络系统可靠性,在节点失效的条件下,建立基于非交叉路径的加权网络端到端可靠性评估模型,并提出一种数值求解算法。算例分析结果表明,该模型可以精确计算出网络端到端可靠性的界,并能分析网络部件故障率连续变化和以网络部件负载率为权值情况下的网络可靠性。 Aiming at the number of joint paths and disjoint path can not accurately reflect network system reliability,in the condition of node failure,this paper builds weighted network end-to-end reliability model based on disjoint path,and presents a numerical solving algorithm.Example analysis result shows that this model can exactly compute the lower bound and the upper bound of two-terminal reliability,and provide the quantitative analysis of network reliability in the condition of network components failure rate of continuous change and network components load rate of weight.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第5期33-34,37,共3页 Computer Engineering
基金 国家自然科学基金资助项目(70771111 60904065)
关键词 非交叉路径 Menger数 加权网络可靠性模型 disjoint path Menger number weighted network reliability model
  • 相关文献

参考文献7

二级参考文献61

  • 1许兆高,李秉智.移动Ad hoc网络路由协议的研究[J].微计算机信息,2008,24(6):144-145. 被引量:8
  • 2汪秉宏,周涛,何大韧.统计物理与复杂系统研究最近发展趋势分析[J].中国基础科学,2005,7(3):37-43. 被引量:32
  • 3Cohen R, Erez K, Ben-Avraham D, et al. Resilience of the Internet to random breakdowns[J]. Phys. Rev. Lett. , 2000, 85 (21): 4626-4628.
  • 4Newman M E J, Strogatz S H, Watts D J. Random graphs with arbitrary degree distributions and their applications[J]. Phys. Rev. E, 2001, 64 (2): 26118.
  • 5Broadbent S R, Hammersley J M. Percolation processes: Ⅰ. Crystals and mazes[J]. Proc. Cambridge Philos Soc. , 1957, 53: 629-641.
  • 6Hammersley J M. Percolation processes: Ⅱ. The connective constant[J]. Proc. Cambridge Philos. Soc., 1957, 53: 642 - 645.
  • 7Phillips C, Swiler L. A Graph-based System for Network Vulnerability Analysis[C]//Proceedings of the New Security Paradigms Workshop. Charlottesville, VA, USA: [s. n.], 1998.
  • 8Swiler L, Phillips C, Ellis D, et al. Computer-attack Graph Generation Tool[C]//Proc. of DISCEX'01. Anaheim, CA, USA: [s. n.], 2001.
  • 9Sheyner O, Haines J, Jha S. Automated Generation and Analysis of Attack Graphs[C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 2002.
  • 10ISO/IEC 13335-5-2001 Information Technology Guidelines for the Management of IT Security-Part5: Management Guidance on Network Security[S]. 2001.

共引文献131

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部