期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
通信网络基础设施综合评价指标
1
作者 周又眉 李宁 +1 位作者 李志超 滕达 《邮电设计技术》 2019年第1期11-14,共4页
通信网络基础设施既包括前期的网络建设,也包括后期的运行维护。二者相辅相成,缺一不可。而且前期建设的质量会直接影响后期的运行效果,尤其是PUE值。因此仅用PUE评价通信网络基础设施,是有一定局限性的。研究了一种通信网络基础设施综... 通信网络基础设施既包括前期的网络建设,也包括后期的运行维护。二者相辅相成,缺一不可。而且前期建设的质量会直接影响后期的运行效果,尤其是PUE值。因此仅用PUE评价通信网络基础设施,是有一定局限性的。研究了一种通信网络基础设施综合评价指标。既突破了用PUE对通信网络基础设施评价的局限性,又彻底解决了对通信网络基础设施无法进行经济评价的难题。 展开更多
关键词 通信网络基础设施 综合评价指标 基础设施虚拟销售综合单价 电源使用效率
下载PDF
通信网络基础设施的维护与管理——以北京首都国际机场T3航站楼为例 被引量:3
2
作者 张炜夏 《智能建筑》 2010年第6期55-58,共4页
随着通信网络技术在航空领域的不断扩充应用,建筑物智能化水平的不断提高,通信网络技术已经渗透到航空运行与经营的各个领域。本文以北京首都国际机场T3航站楼为例,重点介绍了通信网络基础设施维护与管理的经验。
关键词 通信网络基础设施 T3航站楼 网络设备 巡检 维护与管理
原文传递
国外ICT业务运营对国内电信业的启示 被引量:1
3
作者 张文建 章建聪 《电信技术》 2008年第4期19-22,共4页
ICT服务的范围大致可分为三个层次,一是面向网络基础通信设施(包括网络规划、网络系统集成等)的服务,二是面向IT应用系统(包括ERP、SCM等)的服务,三是面向流程整合(包括系统咨询、业务流程外包等)的服务。第一种服务的层次最低,... ICT服务的范围大致可分为三个层次,一是面向网络基础通信设施(包括网络规划、网络系统集成等)的服务,二是面向IT应用系统(包括ERP、SCM等)的服务,三是面向流程整合(包括系统咨询、业务流程外包等)的服务。第一种服务的层次最低,第三种服务的层次最高,电信运营商提供的ICT服务层次越高,则表明其在该领域拓展的范围越广。 展开更多
关键词 ICT 业务运营 电信业 网络基础通信设施 网络系统集成 国内 国外 服务层
下载PDF
三网合一 高速连接各分局 思科技术为公安信息化建设添砖加瓦——云南省公安厅率先采用IP技术构建全省综合系统
4
《信息网络安全》 2003年第2期36-36,共1页
“金盾工程”是公安系统根据自身发展需求制定的切实的网络建设工程,该工程包括公安通信网络与计算机信息系统建设。按照规划,我国公安系统将分别建成全国范围内的综合业务通信网、违法犯罪信息中心CCIC、全国指挥调度系统、全国公共网... “金盾工程”是公安系统根据自身发展需求制定的切实的网络建设工程,该工程包括公安通信网络与计算机信息系统建设。按照规划,我国公安系统将分别建成全国范围内的综合业务通信网、违法犯罪信息中心CCIC、全国指挥调度系统、全国公共网络安全监控中心等。 云南省公安厅为贯彻实施“金盾工程”建立了覆盖全省范围的公安网络系统。建成后的网络将是一个高宽带、高性能、综合多种业务的数据通信网,应该为确保公安工作的运行,提供高质量的语音、视频和数据服务,同时承载多种网络应用,完善内部网络建设,实现日常办公自动化。 展开更多
关键词 公安信息化建设 云南省公安厅 IP技术 云南省综合系统 计算机网络 网络基础通信设施 网络平台 “金盾工程”
下载PDF
The Innovation and Development of Internet of Vehicles 被引量:9
5
作者 Weiwei Zhang Xiaoqiang Xi 《China Communications》 SCIE CSCD 2016年第5期122-127,共6页
With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and inf... With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and infrastructures, thus, the development of IOV will greatly improve vehicles safety, promote green information consumption and have a profound impact on many industries. The purpose of this paper is to promote the innovation and development of IOV. Firstly, this paper presents general requirements of IOV such as guidelines, basic principles, and the goal of development. Secondly, we analyze critical applications, crucial support, and business model to promote the industrial development of IOV. Finally, this paper proposes some safeguard measures to further promote the development of IOV. 展开更多
关键词 internet of vehicles wireless communication vehicle platform
下载PDF
Smart Meter Deployment Threat and Vulnerability Analysis and Response
6
作者 Steven Dougherty Takaki Saitoh 《Journal of Energy and Power Engineering》 2015年第2期199-213,共15页
Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabiliti... Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabilities and re-evaluate traditional approaches to cyber security. Protection against emerging cyber-security threats targeting smart meter infrastructures will increase risk to both the utility and customer if not addressed within initial rollouts. This paper will discuss the issues in SMI (smart meter infrastructures) deployments that pertain to cyber security. It will cover topics such as the threats to operations, infrastructure, network and people and organization and their associated risks. SMI deployments include not only the smart meter, but also the interfaces for home energy management systems as well as communication interfaces back to the utility. Utilities must recognize and anticipate the new threat landscape that can attack and compromise the meter and the associated field network collectors. They must also include threats to the WAN (wide-area-network) backhaul networks, smart meter headends, MDMS (meter data management systems) and their interfaces to CIS (customer information systems) and billing and OMS (outage management systems). Lessons learned from SMI implementations from North America, Europe and recently, Japan, will be discussed. How white-box and black-box testing techniques are applied to determine the threat impact to the SMI. Finally, organizational change risk will be discussed and how utilities have responded to re-organizing and developing a security governance structure for the SMI and other smart grid applications. 展开更多
关键词 Smart meter infrastructure cyber security risk assessment threat analysis meter vulnerability security operation center privacy.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部