期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
SDH传输网仿真应用研究及发展 被引量:9
1
作者 马增耀 马力 贺亚美 《中国新技术新产品》 2011年第16期24-25,共2页
近年来,SDH传输网技术是发展极为迅速的通信网传输技术,也是目前我国较为成熟的传输技术之一。但由于受到各种条件的制约,传输网是一个包含设备厂家众多、设备类型多样的复杂网络,文章阐述了基于一种SDH传输网的概述;在此基础上提出了SD... 近年来,SDH传输网技术是发展极为迅速的通信网传输技术,也是目前我国较为成熟的传输技术之一。但由于受到各种条件的制约,传输网是一个包含设备厂家众多、设备类型多样的复杂网络,文章阐述了基于一种SDH传输网的概述;在此基础上提出了SDH传输网的仿真平台的应用及它的发展趋势。 展开更多
关键词 SDH技术 传输网仿真 应用研究 发展趋势
下载PDF
A Router Based Packet Filtering Scheme for Defending Against DoS Attacks 被引量:1
2
作者 LU Ning SU Sen +1 位作者 JING Maohua HAN Jian 《China Communications》 SCIE CSCD 2014年第10期136-146,共11页
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ... The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage. 展开更多
关键词 Internet security DoS attacks filter-based reactive packet filtering
下载PDF
Channel Transmission Behavioral Modeling Dedicated to WSNs
3
作者 Nasreddine Nadim Boizard Jean Louis Christophe Escriba Fourniols Jean Yves 《Journal of Energy and Power Engineering》 2012年第7期1042-1049,共8页
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. G... The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena. 展开更多
关键词 WSN VHDL-AMS BER PER.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部