期刊文献+

基于随机Petri网的GSM-R越区切换成功率的形式化分析 被引量:1

Formal Analysis of GSM-R Handover Success Rate Based on the Stochastic Petri Net
下载PDF
导出
摘要 首先建立了基于随机Petri网的GSM-R越区切换模型,在模型中综合考虑了信道故障、信道占用和越区切换参数配置不合理等影响越区切换成功率的因素。其次,说明了随机Petri网与马尔可夫链的关系,以及使用马尔可夫链分析"GSM-R越区切换的随机Petri网模型"的方法。最后,利用SPNP工具分析了影响GSM-R越区切换成功率的因素,发现GSM-R小区预留信道越多,越区切换成功率越高;列车运行速度越高,越区切换成功率越低;在一定范围内,列车追踪间隔越大,越区切换成功率就越高。 Firstly, GSM-R handover model is established based on the Stochastic Petri Net (SPN). The factors which affect the handover success rate are considered in the model, such as channel fault, channel occupancy and unreasonable handover parameters. Secondly, this paper illustrates the relationship between the Stochastic Petri Net and Markov Chain (MC), discussing the method of Markov Chain in analyzing the GSM-R handover model. Finally, the factors which affect the GSM-R handover success rate are analyzed with the SPNP tool. The result shows that the more GSM-R cell reserved channels are, the higher the handover success rate is. The result also shows that the higher the train speed is, the lower the handover success rate is. Within a certain range, the greater the train track interval is, the higher the handover success rate is.
出处 《华东交通大学学报》 2012年第4期73-80,共8页 Journal of East China Jiaotong University
基金 科学技术部国家科技支撑计划项目(2009BAG12A08)
关键词 随机PETRI网 CTCS GSM-R 越区切换 马尔可夫链 Stochastic Petri Net Chinese Train Control System GSM-R handover Markov Chain
  • 相关文献

参考文献9

二级参考文献51

  • 1丁建文,崔永利,钟章队.GSM-R数字移动通信系统中数据时延的研究[J].中国铁路,2004(8):23-26. 被引量:3
  • 2廖洁君,陈燕.城市物流中多目标配送模型[J].大连海事大学学报,2004,30(4):82-85. 被引量:7
  • 3石先明.对我国客运专线列车追踪间隔时分的研究[J].中国铁路,2005(5):32-35. 被引量:22
  • 4胡松筠,陈燕,李晔,王惠.基于随机时间Petri网的第三方物流业务流程建模与分析[J].大连海事大学学报,2005,31(4):53-55. 被引量:9
  • 5傅小华,郭宋平.基于随机Petri网的FMS建模及其性能分析[J].武汉理工大学学报(信息与管理工程版),2007,29(4):81-83. 被引量:5
  • 6Lee H C J, Thing V L L. Port Hopping for Resilient Networks[C]. IEEE: Proe. 60th Vehicular Technology Conference, Sept 26--29, 2004. Los Angeles, USA. Washington.. IEEE CS Press, 2004.. 3 291--3 295.
  • 7Atighetehi M, Pal P, Webber F, et al. Adaptive use of network-centric mechanisms in cyber-dcfense[C]. IEEE: Proc. 6th Int'l Syrup Object-Oriented Real-Time Distributed Computing, May 14--16, 2003, Hakodate, Japan. Washington: IEEE CS Press, 2003: 183--192.
  • 8Sifalakis M, Schmid S, Hutchison D. Network address hopping: a mechanism to enhance data protection for packet communications[C]. IEEE International Conference on Communications, May 16-- 20, 2005, Seoul, Korea. Washington: IEEE CS Press, 2005:1 518--1 523.
  • 9Bedishiy G, Herzberg A, Keidar L. Keeping denial-of-service attagkers in the dark[C]. EATCS: 19th International Symposium on Distributed Computing, Sept 26-- 29, 2005.. Cracow Poland. Berlin: Springer-Verlag, 2005, LNCS 3 724.. 18--31.
  • 10Shi LY, Jia C F, Lu S W, et al. Port and address hopping for active eyber-defense[C]. IEEE.. Pacific Asia Workshop on Intelligence and Security informatics, Apr 11-- 12, 2007, Chengdu China. Berlin : Springer-Veriag, 2007 : LHCS 4 430: 295--300.

共引文献52

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部