期刊文献+

AdHoe网络管理系统可靠性评估 被引量:1

Reliability Evaluation on Ad Hoc Networks Management System
下载PDF
导出
摘要 针对AdHoc网络管理系统,提出了一种可靠性评估算法,首先确定AdHoc网管系统可靠性三要素,然后利用最小定点割集确定AdHoc网络中的重要区域,同时根据生成树算法确定各个网管子系统的权重系数,分析AdHoc网络管理系统特点确定失效判据,依据失效判据进行可靠性建模,选择合适的可靠性模型,从而可以计算出AdHoc网络管理系统的可靠度。最后通过实例说明某AdHoc网络管理系统的可靠性评估。 An algorithm of reliability evaluation is brought forward fo Ad Hoe Networks management system. Firstly three key factors of Ad Hoc network management system reliability is defined. Then important area is determined by minimum vertex cut set. The weight coefficient of each subnet management system is drawn by Spanning Tree Protocol. Disabled criterion is defined by analyzing the characteristic of Ad Hoc Networks management system. Reliability model is built according to disabled criterion and is selected. The reliability of Ad Hoe Networks management system is computed. Lastly the reliability evaluation on Ad Hoc Networks management system is illustrated by examples.
出处 《无线电通信技术》 2012年第2期20-23,共4页 Radio Communications Technology
关键词 可靠性评估 失效判据 生成树算法 权重系数 reliability evaluation disabled criterion spanning tree potocol weight coefficient
  • 相关文献

参考文献6

  • 1DERERMAYER B L. A New Appearl of Network Reliability[J].IEEE Trans omRel,1990,(02):343-345.
  • 2DOWNS T,SCOTT A. Evaluating the Performance Id Software Reliability Models[J].IEEE Transactions on Reliability,1992,(04):12-16.
  • 3文长康.浅谈软件可靠性的评估技术[J]通信技术,2004(01):65-69.
  • 4张继旭;王琪.软件可靠性的模块分析方法[J]战术导弹技术,2001(05):100-104.
  • 5曾旷怡,杨家海.一种基于策略的网络管理系统研究与实现[J].小型微型计算机系统,2007,28(2):218-223. 被引量:11
  • 6ZAHEDI F,ASHRAFI N. Software Reliability Allocation Based on Structure Utility,Price and Cost[J].IEEE Transactions on Software Engineering,1991,(04):345-356.doi:10.1109/32.90434.

二级参考文献9

  • 1Westerinen A,et al.Terminology for policy based management[S].IETF RFC 3198,2001.
  • 2Moffett J,Sloman M.Policy hierarchies for distributed systems management[J].IEEE Journal on Selected Areas in Communications,December 1993,11(9):1404-1414.
  • 3Damianou C N.A policy framework for management of distributed systems[D].Engineering of the University of London,February 2002.
  • 4Stallings W.Cryptography and network security principles and practice (3rd Edition)[M].USA:Prentice Hall,2002.
  • 5Ravi S Sandhu,Edward J Coyne,Hal,et al.Role-based access control model[J].IEEE Computer,Feb.1996,29(2):38-47.
  • 6Colton A.Cisco IOS for IP routing[M].Rocket Science Press,Inc,Printed in Canada,2003,ISBN:0-9722862-0-9.
  • 7Lupu E.A role-based framework for distributed network management[D].Imperial College London UK,1998.
  • 8Lupu E,Sloman M.Conflicts in policy based distributed systems management[J].IEEE Transactions on Software Engineering,1999,25(6):852-869.
  • 9Verma D.Simplifying network administration using policy based management[J].IEEE Network,2002,16(2):20-26.

共引文献10

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部