期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
三种基于环分解的网状网保护结构比较
1
作者 王建明 常世强 《光通信技术》 CSCD 北大核心 2004年第8期41-42,共2页
在电信传输网中,环网的优良生存特性为人们所熟知。同时,网状网在生存性方面也很有优势。为此,人们开发了几种网状网的生存方案,其中有现在的研究热点--智能化的动态保护,另一种即是网状网的环分解。本文就针对环分解方案,分析对比它的... 在电信传输网中,环网的优良生存特性为人们所熟知。同时,网状网在生存性方面也很有优势。为此,人们开发了几种网状网的生存方案,其中有现在的研究热点--智能化的动态保护,另一种即是网状网的环分解。本文就针对环分解方案,分析对比它的几种保护机制。 展开更多
关键词 环分解 网状网保护
下载PDF
全光传送网的生存性技术
2
作者 林新棋 吴大鹏 《现代电子技术》 2007年第19期49-51,54,共4页
互联网和其他通信网络的爆发性成长,导致对更大带宽、更高生存性业务的需求急剧增长。在网络故障的情况下,为了使光通路的数据丢失最小化,我们可以使用不同的保护和恢复方案。好的保护方案可以使网络业务更快地从故障中恢复过来,满足光... 互联网和其他通信网络的爆发性成长,导致对更大带宽、更高生存性业务的需求急剧增长。在网络故障的情况下,为了使光通路的数据丢失最小化,我们可以使用不同的保护和恢复方案。好的保护方案可以使网络业务更快地从故障中恢复过来,满足光网络对故障恢复时间的苛刻要求(毫秒级)。本文主要讨论光通路的保护方案。 展开更多
关键词 点到点保护 环形保护 网状网保护
下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
3
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
下载PDF
The Study on Wireless Mesh Networks Security based on Improved Coding Scheme
4
《International English Education Research》 2014年第1期10-12,共3页
In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect from multiple failures in w... In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect from multiple failures in wireless mesh networks to achieve high throughput where the redundancy is considered for the average number of failures. Our coding scheme is designed to protect from the average number of failures to increase the network throughput. When the number of failures is more than the average case, the destination will have to wait for more coded packets in the following time slots. 展开更多
关键词 Network Security link failure survivability.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部