期刊文献+

G.hn技术在同轴接入网中的应用 被引量:1

Application of G.hn Technology in Coaxial Access Network
下载PDF
导出
摘要 目前广电网络双向改造模式是EPON+Eo C,其中Eo C产品大部分使用的标准是Home Plug AV,符合该标准的Eo C产品整个系统吞吐量在300 Mbps左右、时延在20~30 ms之间,在广电网络双改的初期能够满足网络建设和用户宽带的需求,但随着"宽带中国"战略的发布以及广电自身业务的发展,原来使用的Home Plug AV技术组网方式显现出一些局限性。G.hn技术可以解决目前同轴接入网中面临的问题,它是多种媒体介质的统一解决方案,具备高抗干扰性、高带宽、低时延等特点,在广电网络应用场景下,可替代现有的Eo C接入网系统,为终端用户提供千兆接入,同时也是OTT的同轴线缆承载解决方案。 The use of radio and television network bidirectional transformation tech is based on EPON +EoC, which most of EoC products using standard is HomePlugAV,conforms to the standard of the EoC products throughout the system throughput in 300 mbps around,the latency between the 20~30ms,in radio and televi-sion networks to modify the initial period to meet the needs of network construction and broadband users,but with the broadband China strategy of publishing and broadcasting their own business development,the original use HomePlugAV technology network show out some of the limitations of G.hn technology can solve the prob-lems currently facing the coax access network,it is a lot of media of the unified solutions,with high anti-in-terference,high bandwidth,low latency,in radio and television network scenarios,replace the existing EoC access network system and user terminal to provide Gigabit access,but also the coaxial cable OTT bearing so-lution.
出处 《中国有线电视》 2016年第4期487-491,共5页 China Digital Cable TV
关键词 G.hn 高带宽高抗干扰 LDPC G.hn high bandwidth high anti-interference LDPC
  • 相关文献

参考文献1

二级参考文献11

  • 1[1]Wu T, Malkin M, Boneh D. Building intrusion tolerant applications.Proceedings of the USENIX Security Symposium, 1999:79-91
  • 2[2]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM,1978;21(2):120-126
  • 3[5]Shamir A. How to share a secret. Communications of the ACM,1979; 22(11):612-613
  • 4[6]Chor B, GoldWasser S, Micali S, Awerbuch B. Verifiable secret sharing and achieving simultaneity in the presence of faults.Proceedings of 26th IEEE Symposium on Foundations of Computer Science. 1985:251-260
  • 5[7]Pedersen T. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptology-Crypto' 91. 1991:129-140
  • 6[8]Gennaro R. Theory and practice of verifiable secret sharing. USA:Massachusetts Institute of Technology(MIT), 1996
  • 7[9]Feldman P. A practical scheme for non-interactive verifiable secret sharing. Proceedings of 28th IEEE Symposium on Foundations of Computer Science. 1987:427-437
  • 8[10]Gennaro R, Rabin M, Babin T. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. Proceedings of 1998 ACM Symposium on Principles of Distributed Computing. Mexico: Puerto Vallarta, 1998:101-111
  • 9[11]Frankel. Y, Gemmell P, MacKenzie. P D, et al. Optimal-resilience proactive public-key cryptosystems. IEEE Symposium on Foundations of Computer Science, 1997: 384-393
  • 10荆继武,冯登国.一种入侵容忍的CA方案[J].软件学报,2002,13(8):1417-1422. 被引量:65

共引文献6

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部