期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
计算机网络数据通信交换关键技术研究 被引量:2
1
作者 张云飞 《中国新通信》 2018年第22期28-28,共1页
随着我国科学技术的发展,计算机网络通信的相关技术水平也有了显著的提升。本文分析了计算机网络的概念和数据通信交换技术的原理,并具体探讨了其中的几大关键技术,希望能够为相关的工作提供借鉴和参考。
关键词 计算机 网络数据通信交换 电路光 分组
下载PDF
基于通信网络交换的分布式风电光伏智能运维系统设计
2
作者 顾伟博 《电子技术(上海)》 2024年第9期304-305,共2页
阐述分布式风电光伏智能运维系统的设计方案。分析通信网络交换技术在智能运维系统中的应用,探讨实时通信、数据同步、系统扩展性、安全性、可靠性等关键技术的实现和挑战。
关键词 智能运维系统 通信网络交换 实时通信 分布式风光发电
原文传递
光交换技术及其应用 被引量:1
3
作者 张相国 李飞 刘佳辉 《电子技术与软件工程》 2017年第14期37-37,共1页
随着时代的发展与科技的进步,通信传输网络中交换技术的发展也十分迅速,尤其是光交换技术,展现出了巨大的发展前景。可以说,光交换技术代表了光通信领域最先进、最新型的交换技术。本文主要对空分光交换、时分光交换、波分光交换以及混... 随着时代的发展与科技的进步,通信传输网络中交换技术的发展也十分迅速,尤其是光交换技术,展现出了巨大的发展前景。可以说,光交换技术代表了光通信领域最先进、最新型的交换技术。本文主要对空分光交换、时分光交换、波分光交换以及混合型光交换这几种光交换方式进行了介绍,并详细介绍了光交换技术的应用与市场前景。 展开更多
关键词 交换通信网络 全光网络
下载PDF
下一代网络监控系统模型的研究与实现 被引量:1
4
作者 熊俊勇 《计算机与数字工程》 2009年第4期88-90,181,共4页
目前下一代网络在国内得到快速发展,以软交换为核心的网络结构改变了通信网络,对下一代网络的网络质量监控和对现有的问题进行诊断成为下一代网络发展过程中新的要求。结合国内电信网络环境,以软交换为核心,对现行下一代网络环境进行监... 目前下一代网络在国内得到快速发展,以软交换为核心的网络结构改变了通信网络,对下一代网络的网络质量监控和对现有的问题进行诊断成为下一代网络发展过程中新的要求。结合国内电信网络环境,以软交换为核心,对现行下一代网络环境进行监控;在研究与实现过程中,采用时间同步和内存数据库数据处理技术解决了信令在网内的一致性问题和对海量数据处理速度,保证了系统的可行性和正确性,最后通过真实环境部署,实现了对其网络中的信令的有效监控与问题诊断。 展开更多
关键词 下一代网络 交换通信网络监控 信令 时间同步 内存数据库
下载PDF
银行信用卡使用环境和服务体系应加改进 被引量:1
5
作者 李鲁建 王玉萍 盛婕 《山东金融》 1996年第10期56-56,共1页
银行信用卡使用环境和服务体系应加改进李鲁建王玉萍盛婕我国自1988年发行第一张银行信用卡以来,信用卡的发行使用量已超过500万张,信用卡授权特约使用网点也以每年上万的速度发展,电子货币流量日益增大,第三产业部门使用信... 银行信用卡使用环境和服务体系应加改进李鲁建王玉萍盛婕我国自1988年发行第一张银行信用卡以来,信用卡的发行使用量已超过500万张,信用卡授权特约使用网点也以每年上万的速度发展,电子货币流量日益增大,第三产业部门使用信用卡结算的势头看好。商店POS机... 展开更多
关键词 信用卡结算 银行信用卡 使用环境 服务体系 商业银行 人民银行 管理机制 交换通信网络 商业网点 金卡工程
下载PDF
Achieve Personalized Anonymity Through Query Blocks Exchanging 被引量:13
6
作者 Chunguang Ma Lei Zhang +2 位作者 Songtao Yang Xiaodong Zheng Pinhui Ke 《China Communications》 SCIE CSCD 2016年第11期106-118,共13页
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency. 展开更多
关键词 cyberspace security location-based services collaborative users personalized anonymity query and location privacy
下载PDF
A STUDY ON PROBE-BASED MULTICAST ADMISSION CONTROL AND ENHANCEMENT
7
作者 Le Chunhui He Jianhua Yang Zongkai Liu Wei 《Journal of Electronics(China)》 2006年第1期69-75,共7页
To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequ... To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequent request problem is found in PBMAC, which degrades system performance significantly when the network traffic is heavily loaded. Based on the analysis on subsequent request problem, an Enhance PBMAC (EPBMAC) scheme is proposed, in which complementary probing is devised to solve the problem. Using a new metric of normalized requested equivalent link capacity, the pertbrmance of PBMAC and EPBMAC is analyzed and evaluated. Two implementations are proposed for incremental dcployment. The paper finally introduces evaluation with packet-based simulations. Both analytical and simulation results show the significant improvement in performance. 展开更多
关键词 MULTICAST Quality of Service (QoS) Admission control Traffic probing
下载PDF
THE NOVEL COMMUNICATION ALGORITHM AND THE THROUGHPUT ANALYSIS FOR WIRELESS SENSOR NETWORKS
8
作者 Yu Genjian Zheng Baoyu Xu Li 《Journal of Electronics(China)》 2007年第4期550-556,共7页
Aiming at the significance of the energy controls of wireless sensor networks, an economical energy consumption algorithm for wireless communicating in Wireless Sensor Networks (WSN) is presented. Based on the algorit... Aiming at the significance of the energy controls of wireless sensor networks, an economical energy consumption algorithm for wireless communicating in Wireless Sensor Networks (WSN) is presented. Based on the algorithm, the maximal system throughput of WSN is analyzed, and the upper bound of throughput of WSN is proposed and proved. Some numerical simulations are conducted and analyzed. The conclusions include that the transmitting radius of sensor node and the parameters of the energy cost function have significant influence upon the throughput, but the monitoring region radius has little influence. For the same transmitting distance, the more the hopping of information trans- mitting, the better the throughput of WSN. On the other hand, for the energy optimization of the whole WSN, the trade-off problem between the throughput capacity and the relay nodes is proposed, and the specific expression of relay hops that minimized the energy consumptions and the maximal throughput of WSN under the specific situation is derived. 展开更多
关键词 Wireless Sensor Networks (WSN) Communication algorithm THROUGHPUT Energy cost function Trade-off
下载PDF
Novel self-similar traffic shaping mechanism in transport networks
9
作者 BO Ming-xia LI Pei-yuan PAN Xiao-fei GU Wan-yi 《Optoelectronics Letters》 EI 2005年第2期134-137,共4页
In this paper,we present a new self-similar traffic shaping mechanism and investigate its effect on the output traffic characteristics and network performance under self-similar traffic.Simulation results show that ou... In this paper,we present a new self-similar traffic shaping mechanism and investigate its effect on the output traffic characteristics and network performance under self-similar traffic.Simulation results show that our proposed mechanism can not only effectively reduce the burstiness of input traffic,but also perform better than the non-traffic shaping scheme in the terms of packet-loss rate and blocking probability. 展开更多
关键词 自相似交换 传输网络 通信网络 WDM MARKOV模型
下载PDF
华为新闻
10
作者 孙润平 《世界电信》 2004年第12期57-57,共1页
为CTBC商用新一代移动通信网络提供全套解决方案,联通MSTP选型 华为保持领军地位,NE80E核心路由器助力中国电信CN2骨干网络建设,承建荷兰全国WCDMA网络。
关键词 华为公司 交换移动通信网络 CTBC 联通MSTP选型 NE80E核心路由器 中国电信 CN2骨干网络建设
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部