期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
ASON:自动交换光网络
1
作者 刘涛 《通信世界》 2002年第13期37-37,共1页
关键词 ASON 自动交换光网络 传输网结构 网络体系 数据网元 光层网元
下载PDF
A Router Based Packet Filtering Scheme for Defending Against DoS Attacks 被引量:1
2
作者 LU Ning SU Sen +1 位作者 JING Maohua HAN Jian 《China Communications》 SCIE CSCD 2014年第10期136-146,共11页
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ... The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage. 展开更多
关键词 Internet security DoS attacks filter-based reactive packet filtering
下载PDF
SAFE:a Scalable Filter-Based Packet Filtering Scheme 被引量:1
3
作者 LU Ning HU Wenhao 《China Communications》 SCIE CSCD 2016年第2期163-177,共15页
Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the ... Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the filtering location, the proposed schemes can be grouped into Victim-end Filtering and Source-end Filtering. The first scheme uses a single filtering router to block the attack flows near the victim, but does not take the factor that the filters are scarce resource into account, which causes the huge loss of legitimate flows; considering each router could contribute a few filters, the other extreme scheme pushes the filtering location back into each attack source so as to obtain ample filters, but this may incur the severe network transmission delay due to the abused filtering routers. Therefore, in this paper, we propose a scalable filter-based packet filtering scheme to balance the number of filtering routers and the available filters. Through emulating DoS scenarios based on the synthetic and real-world Intemet topologies and further implementing the various filter-based packet filtering schemes on them, the results show that our scheme just uses fewer filtering routers to cut off all attack flows while minimizing the loss of legitimate flows. 展开更多
关键词 internet security DoS attacks filtering scheme
下载PDF
Considerations on Transport Networks Technologies Evolution
4
作者 张海懿 赵文玉 吴冰冰 《China Communications》 SCIE CSCD 2013年第4期7-18,共12页
Driven by an ever-increasing num- ber of new services and applications, transport networks have been undergoing significant changes. In this paper, we describe several ex- citing technology directions associated with ... Driven by an ever-increasing num- ber of new services and applications, transport networks have been undergoing significant changes. In this paper, we describe several ex- citing technology directions associated with future optical transport networks. We review the status of 100G, which is now commercially available and entering volume deployments, and its applications in China. Beyond 100G is considered as the primary technology for the expansion of both channel and fiber capacity in tile near term, and several enabling techniques are introduced. Then, key technologies, prod- ucts, and future evolutionary options of Optical Transport Networks (OTNs) are extensively discussed. Compared to fixed bandwidth and coarse granularity of current WDM network, a flexible grid architecture is a desirable evolu- tion trend, and key technologies and challenges are described. Finally, we illustrate the multi-dimension convergences in terms of IP and optical, Packet OTN (P-OTN), as well as Electronic Integrated Circuits (EICs) and Photonic Integrated Cimuits (PICs). Transport networks are therefore in the process of be- coming more broadband, robust, flexible, cost-effective and lower-power-consumptive. 展开更多
关键词 beyond I OOG OTN flexible grid multi-dimension convergence
下载PDF
Reducing energy consumption optimization selection of path transmission routing algorithm in opportunistic networks 被引量:2
5
作者 吴嘉 Yi Xi Chen Zhigang 《High Technology Letters》 EI CAS 2015年第3期321-327,共7页
Opportunistic networks are random networks and do not communicate with each other among respective communication areas.This situation leads to great difficulty in message transfer.This paper proposes a reducing energy... Opportunistic networks are random networks and do not communicate with each other among respective communication areas.This situation leads to great difficulty in message transfer.This paper proposes a reducing energy consumption optimal selection of path transmission(OSPT) routing algorithm in opportunistic networks.This algorithm designs a dynamic random network topology,creates a dynamic link,and realizes an optimized selected path.This algorithm solves a problem that nodes are unable to deliver messages for a long time in opportunistic networks.According to the simulation experiment,OSPT improves deliver ratio,and reduces energy consumption,cache time and transmission delay compared with the Epidemic Algorithm and Spray and Wait Algorithm in opportunistic networks. 展开更多
关键词 opportunistic networks routing algorithm deliver ratio energy consumption transmission delay cache time
下载PDF
Estimation of Data Transfer Routes Fractal Dimension in Large Scale Networks
6
作者 Yuriy Danik Yuriy Kulakov +1 位作者 Vladimir Vorotnikov Igor Gumenyuk 《Journal of Mathematics and System Science》 2016年第1期38-45,共8页
The article is devoted to the evaluation of fractal properties of routing data in computer large scale networks. Implemented the study of percolation network topological structures of large dimension and made their tr... The article is devoted to the evaluation of fractal properties of routing data in computer large scale networks. Implemented the study of percolation network topological structures of large dimension and made their transformation into fractal macrostructure. An example of calculating the fractal dimension of the data path for the boundary of the phase transition between the states of network connectivity. The dependence of the fractal dimension of the percolation cluster on the size of the square δ-cover and conductivity value network of large dimension. It is shown that for the value of the fractal dimension of the route dc ≈ 1.5, network has a stable dynamics of development and size of clusters are optimized with respect to the current load on the network. 展开更多
关键词 large scale network percolation cluster fractal dimension ROUTING
下载PDF
Analysis and Design of Open Remote Monitor and Control System Based on Virtual Reality
7
作者 Xiang Chen Huihuang Pi Linlin Zhou 《International Journal of Technology Management》 2013年第3期53-55,共3页
Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor ... Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor system was realized. Meanwhile, give possible solutions of the real-time data transmission and the stability of the system. 展开更多
关键词 WEB Virtual reality Remote monitor VRML JavaJRMI
下载PDF
Power Transfer of PV Inverter from DC to AC Voltage Source
8
作者 A. de A. Lorencato A.S. Martins G. Bonan G.C. Flores 《Journal of Energy and Power Engineering》 2010年第4期45-53,共9页
This paper presents a simple approach of a topology already known in the literature, applied in active power transfer from direct current source to any alternating current voltage source, whether the utility power or ... This paper presents a simple approach of a topology already known in the literature, applied in active power transfer from direct current source to any alternating current voltage source, whether the utility power or a voltage inverter that is forming an isolated AC grid. The photovoltaic inverter works as current controlled voltage source inverter that provides a sinusoidal current to the AC grid. The inverter is insulated from the grid by a transformer. The system is discussed and modeled. Simulation results of this application are presented and experimental results validate this topology. 展开更多
关键词 Renewable energy distributed generation current control grid connection voltage source inverter
下载PDF
Chaos synchronization with dual-channel time-delayed couplings 被引量:4
9
作者 FAN HuaWei WANG YaFeng +1 位作者 CHEN MengJiao WANG XinGang 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第3期428-435,共8页
While the significance of oscillator dynamics and coupling structure to synchronization behaviors has been well addressed in the literature, little attention has been paid to the possible influence of coupling functio... While the significance of oscillator dynamics and coupling structure to synchronization behaviors has been well addressed in the literature, little attention has been paid to the possible influence of coupling functions. In the present paper, adopting the scheme of dual-channel time-delayed couplings, we investigate how the synchronization behaviors of networked chaotic oscillators are influenced by parameters in the coupling functions. It is found that, with the introduction of the second coupling channel, the synchronization region, as calculated according to the method of master stability function(MSF), can be largely modified. In particular, by a slight change of the time delay, it is found that the synchronization region can be significantly adjusted, or even switched from non-existing to existing. We demonstrate this interesting phenomenon for both situations of processing and propagation induced time delays, as well as for different coupling functions. Our studies shed new light on the mechanism of chaos synchronization, and may potentially be used for the control of complex network dynamics. 展开更多
关键词 chaos synchronization dual-channel coupling time delay master stability function
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部