期刊文献+
共找到599篇文章
< 1 2 30 >
每页显示 20 50 100
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
1
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:3
2
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet protocol Security virtual Private Network Video Conferencing Voice over Internet protocol JITTER End to End Delay
在线阅读 下载PDF
The Network Architecture and Protocols for Distributed Virtual Environment
3
作者 杨永高 潘启敬 《Journal of Modern Transportation》 1998年第2期9-22,共14页
In this paper, the properties of distributed virtual environment (DVE) and the requirements on computer networks is briefly reviewed. A multicast protocol, called sender initiated grouping multicast protocol for DVE... In this paper, the properties of distributed virtual environment (DVE) and the requirements on computer networks is briefly reviewed. A multicast protocol, called sender initiated grouping multicast protocol for DVE (SIGMP), is proposed. This new multicast protocol is based on a novel concept, multicast group (MG), which divides all participants in a DVE system into groups, among which there is a multicast group trustee (MGT) node to manage the group. The protocol provides unreliable/reliable, totally ordered and multiple to multiple multicast transmission service for DVE systems without sacrificing the communication efficiency heavily. At the same time, reliable unicast and one to multiple multicast transmission services are also supported. The performance analysis of the new protocols is also presented. Based on SIGMP, a simple demonstration of DVE system is designed and implemented. This demo system is running on several SGI workstations connected by a FDDI and Ethernet network. 展开更多
关键词 distributed virtual environments computer networks protocols MULTICAST
在线阅读 下载PDF
基于叶脊网络架构构建大型校园网应用研究
4
作者 王亮 高晓佳 王婷 《通信电源技术》 2026年第2期185-187,共3页
为解决传统3层架构在大型校园网中存在的东西向流量瓶颈与扩展性不足问题,探索叶脊(Spine-Leaf)网络架构应用。该架构采用扁平化拓扑,以Spine层为高速转发核心、Leaf层为接入汇聚节点,结合边界网关协议(Border Gateway Protocol,BGP)构... 为解决传统3层架构在大型校园网中存在的东西向流量瓶颈与扩展性不足问题,探索叶脊(Spine-Leaf)网络架构应用。该架构采用扁平化拓扑,以Spine层为高速转发核心、Leaf层为接入汇聚节点,结合边界网关协议(Border Gateway Protocol,BGP)构建路由自动收敛机制,通过等价多路径路由(Equal-Cost Multi-Path Routing,ECMP)实现负载均衡,依托虚拟扩展局域网(Virtual Extensible Local Area Network,VXLAN)突破大二层边界。测试结果表明,其吞吐量和时延均优于传统架构,适配高性能计算、在线教学场景,可为大型校园网建设提供可行技术路径。 展开更多
关键词 叶脊网络架构 边界网关协议(BGP)动态路由 虚拟扩展局域网(VXLAN)封装
在线阅读 下载PDF
Visualization of Large Amount of Spectra in Virtual Observatory Environment
5
作者 Petr aloun David Andrei +1 位作者 Petr koda Ivan Zelinka 《International Journal of Automation and computing》 EI CSCD 2014年第6期613-620,共8页
This paper presents overview of new features so far prepared for new version of spectral analysis tool SPLAT-VO that allows to retrieve a large amount of spectra(and other data) based on its characteristics by detaile... This paper presents overview of new features so far prepared for new version of spectral analysis tool SPLAT-VO that allows to retrieve a large amount of spectra(and other data) based on its characteristics by detailed querying a virtual observatory s resources. The overview is focused on enhancements of user experience, work with simple application messaging protocol(SAMP) and other interoperability that improves work with global list of spectra, plot window and analysis menu. 展开更多
关键词 SPLAT-VO virtual observatory SPECTRA simple application message protocol (SAMP) flexible image transport system (FITS)
原文传递
Determining Requirements for an Optimal Ad-Hoc Multicast Protocol in Mobile Health Care Training Systems
6
作者 Anis Zarrad Ahmed Redha Mahlous 《Communications and Network》 2015年第2期81-88,共8页
Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all ... Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all of the healthcare disciplines, however research in this field is still in its early stage. Increasingly, decision makers and developers look forward to offer more sophisticated, much larger, and more complex HCTS to serve the desired outcome and improve the quality and safety of patient care. Due to the rapidly increasing usage of personal mobile devices and the need of executing HCTS applications in environments that have no previous network infrastructure available, Mobile Health Care Training-based System (MHCTS) is an expected future trend. In such systems, medical staff will share and collaborate in a 3D virtual environment through their mobile devices in an ad-hoc network (MANET) in order to accomplish specific missions’ typically surgical emergency room. Users are organized into various groups (Radiologists, Maternity departments, and General surgery etc...), and need to be managed by a multicast scheme to save network bandwidth and offer immersive sense. MHCTS is sensitive to networking issues, since interactive 3D graphics requires additional load due to the use of mobile devices. Therefore, we need to emphasize on the importance and the improvement of multicast techniques for the effectiveness of MHCTS and the management of collaborative group interaction. Research so far has devoted little attention to the network communication protocols design of such systems which is crucial to preserve the sense of immersion for participating users. In this paper, we investigate the effect of multicast routing protocol in advancing the field of Health care Training-based System to the benefit of patient’s safety, and health care professional. Also, we address the issue of selecting a multicast protocol to provide the best performance for a particular e-health system at any time. Previous work has demonstrated that multicast operates at least as efficiently as traditional MAODV. A comprehensive analysis about various ad-hoc multicast routing protocols is proposed. The selection key factors for the right protocol for MHCTS applications were safety and robustness. To the best of our knowledge, this work will be the first initiative involving systematic literature reviews to identify a research gate for the use of multicast protocol in health care simulation learning community. 展开更多
关键词 AD-HOC MULTICAST protocol HEALTH CARE Training System 3D virtual Environment E-HEALTH
暂未订购
Human-Centric Composite-Quality Modeling and Assessment for Virtual Desktop Clouds
7
作者 Yingxiao Xu Prasad Calyam +3 位作者 David Welling Saravanan Mohan Alex Berryman Rajiv Ramnath 《ZTE Communications》 2013年第1期27-36,共10页
There are several motivations, such as mobility, cost, and secu- rity, that are behind the trend of traditional desktop users transi- tioning to thin-client-based virtual desktop clouds (VDCs). Such a trend has led ... There are several motivations, such as mobility, cost, and secu- rity, that are behind the trend of traditional desktop users transi- tioning to thin-client-based virtual desktop clouds (VDCs). Such a trend has led to the rising importance of human-centric performance modeling and assessment within user communities that are increasingly making use of desktop virtualization. In this paper, we present a novel reference architecture and its eas- ily deployable implementation for modeling and assessing objec- tive user quality of experience (QoE) in VDCs. This architec- ture eliminates the need for expensive, time-consuming subjec- tive testing and incorporates finite-state machine representa- tions for user workload generation. It also incorporates slow-mo- tion benchmarking with deep-packet inspection of application task performance affected by QoS variations. In this way, a "composite-quality" metric model of user QoE can be derived. We show how this metric can be customized to a particular user group profile with different application sets and can be used to a) identify dominant performance indicators and troubleshoot bottlenecks and b) obtain both absolute and relative objective user QoE measurements needed for pertinent selection of thin-client encoding configurations in VDCs. We validate our composite-quality modeling and assessment methodology by us- ing subjective and objective user QoE measurements in a re- al-world VDC called VDPilot, which uses RDP and PCoIP thin-client protocols. In our case study, actual users are pres- ent in virtual classrooms within a regional federated university system. 展开更多
关键词 virtual desktops quality modeling and assessment performancebenchmarking thin-client protocol adaptation objective QoEmetrics
在线阅读 下载PDF
基于隐蔽通信视角的网际协议分析虚拟仿真实验教学的创新实践 被引量:1
8
作者 卢璥 王晋隆 +1 位作者 全韩彧 田晖 《实验室研究与探索》 北大核心 2025年第6期99-104,124,共7页
为培养学生网络安全综合能力,从隐蔽通信视角切入,融合现代教学理念及虚拟仿真技术,开发了网际协议分析虚拟仿真实验教学课程。课程设计遵循科学性、创新性、系统性和可行性原则,构建基础、进阶、创新三层内容框架。在教学实践中,采用... 为培养学生网络安全综合能力,从隐蔽通信视角切入,融合现代教学理念及虚拟仿真技术,开发了网际协议分析虚拟仿真实验教学课程。课程设计遵循科学性、创新性、系统性和可行性原则,构建基础、进阶、创新三层内容框架。在教学实践中,采用情境代入、任务驱动、前沿综合与自主学习等多元方法,深化学生对网际协议和隐蔽通信分析的理解,促进学生自主探究与创新实践,强化网络安全意识和综合素养,为计算机网络与安全领域课程教学改革提供有效路径与实践参考。 展开更多
关键词 虚拟仿真 教学方法 教学评估 隐蔽通信 网际协议
在线阅读 下载PDF
Integration of Manufacturing Services into Virtual Environments over the Internet
9
作者 Huiping Shang Zhengxu Zhao 《International Journal of Automation and computing》 EI 2004年第1期89-106,共18页
Virtual reality (VR) is a rapidly developing technology that has a wide spectrum of industrial and commercial applications. Networked (distributed or shared) virtual environments (VE) are of growing interest to modern... Virtual reality (VR) is a rapidly developing technology that has a wide spectrum of industrial and commercial applications. Networked (distributed or shared) virtual environments (VE) are of growing interest to modern manufacturing industry; a dominating use of networked virtual manufacturing environments (VMEs) is on-line visualisation and collaborative control of 3D information. This has to be supported by real-time data transfer. To meet a broad range of common requirements for Internet-based VE communications, particularly for virtual manufacturing and collaborative design and control, this paper presents a networked virtual environment system that is designed to support networked virtual design and manufacturing. The system is implemented with manufacturing message specification (MMS) standards so as to integrate a range of manufacturing services into networked VEs over the Internet. 展开更多
关键词 Distributed virtual environment networked virtual environment shared virtual environment virtual reality (VR) virtual environment (VE) virtual manufacturing virtual manufacturing device (VMD) manufacturing message specification (MMS) communication protocol
在线阅读 下载PDF
基于跨域MPLS的虚拟私有网络优化研究
10
作者 钟兴宇 韩梅 孙昊 《天津理工大学学报》 2025年第2期113-119,共7页
现有3种基于多协议标签交换(multi-protocol label switching,MPLS)的跨域虚拟私有网络(virtual private network,VPN)方案都存在着设备负载过重、可扩展性不强,以及维护成本较高等问题。为此,提出了基于负载分担的跨域VPN优化方案,优... 现有3种基于多协议标签交换(multi-protocol label switching,MPLS)的跨域虚拟私有网络(virtual private network,VPN)方案都存在着设备负载过重、可扩展性不强,以及维护成本较高等问题。为此,提出了基于负载分担的跨域VPN优化方案,优化了网络拓扑结构,设计了输入路由重分发算法(input route redistribution algorithm,IRRA)、输出标签交换算法(output label switching algorithm,OLSA)和路由标记检测算法(route target detecting algorithm,RTDA)。仿真结果表明,优化方案在减轻边界设备性能负载方面效果显著。当需要跨域的VPN实例达到300时,边缘设备的资源利用率较现有跨域方案分别降低了29%,53%,4%;服务商边缘路由器(provider edge router,PE)设备不断增加时,路由连接数较现有跨域方案显著减少,降低网络维护成本,增强网络可扩展性,是实现跨域VPN优化的有效方案。 展开更多
关键词 边界网关协议 多协议标签交换 虚拟私有网络 跨域
在线阅读 下载PDF
基于网络流量探测的加密矿池特征识别方法
11
作者 史博轩 毛洪亮 林绅文 《计算机应用研究》 北大核心 2025年第11期3251-3256,共6页
针对目前国内隐匿型挖矿活动以加密流量为主,无法直接从报文流量解析发现加密矿池相关特征等问题,提出了一种基于网络流量探测的加密矿池或代理节点发现及其关键特征解析分析方法。通过模拟加密矿工实际的挖矿流量,将特定的多种流量注... 针对目前国内隐匿型挖矿活动以加密流量为主,无法直接从报文流量解析发现加密矿池相关特征等问题,提出了一种基于网络流量探测的加密矿池或代理节点发现及其关键特征解析分析方法。通过模拟加密矿工实际的挖矿流量,将特定的多种流量注入至加密矿池或代理节点中,通过融合网络安全监测、区块链数据分析等多种技术手段,对基于主流矿池协议的加密矿池或代理节点快速发现。建立针对加密矿池的币种特征识别模型以及加密矿池所属特征识别,准确地提取分析加密矿池的画像特征,包括矿池的证书、币种、名称、钱包地址等特征信息,同时结合上述方法发现的加密矿池信息,利用基于时间序列的IQR算法识别已知对端为加密矿池中的实际挖矿流量。实验结果表明,该技术能够有效识别不同矿池协议以及对应画像特征。针对加密矿池的币种特征识别,其识别准确率均超过97%,同时能够较为准确地识别已知对端为加密矿池节点的挖矿流量,为实际网络监控中区分挖矿流量提供了一种高效的技术手段。 展开更多
关键词 区块链 虚拟货币 加密流量 主动探测 矿池协议
在线阅读 下载PDF
基于HOPE技术的MPLS VPN网络架构优化研究
12
作者 钟兴宇 韩梅 孙昊 《天津理工大学学报》 2025年第3期72-79,共8页
传统基于多协议标签交换的虚拟私有网络(multi-protocol label switching virtual private network,MPLS VPN)架构存在组网扁平化的问题,与企业层级化网络模型的设计思想相冲突。通过分析上述问题产生的根源,提出了基于分层服务商边缘... 传统基于多协议标签交换的虚拟私有网络(multi-protocol label switching virtual private network,MPLS VPN)架构存在组网扁平化的问题,与企业层级化网络模型的设计思想相冲突。通过分析上述问题产生的根源,提出了基于分层服务商边缘路由器(provider edge router,PE)技术的MPLS VPN网络优化方案,即将PE设备根据网络的分层结构划分为多个层级,由上层PE(superstratum PE,SPE)和下层PE(underlayer PE,UPE)共同完成原有PE的功能,并建立多目标模型对传统最短路径优先算法进行优化。仿真结果表明,该方案使得传统MPLS VPN网络架构与企业层级化网络模型相吻合,增强了MPLS VPN网络可扩展性。与传统方案相比,接入层PE设备资源利用率降低了11.8%、VPN延迟降低了77%、文件传输(file transfer protocol,FTP)业务响应时间降低了55%,为企业VPN的建设提供了合理有效的优化方案。 展开更多
关键词 多协议标签交换 虚拟私有网络 分层服务商边缘路由器 网络仿真
在线阅读 下载PDF
面向臂型摄影机器人的摄影机FREE-D协议数据转换设备研发
13
作者 贺京杰 管若辰 柯毅 《现代电影技术》 2025年第10期36-42,共7页
虚拟摄制可实现摄影机视角中,真实演员表演与LED屏幕中显示虚拟场景的协同运动。虚实协同要求虚拟环境中的摄影机必须与真实摄影机具有相同的位姿和镜头参数。目前获取真实摄影机位姿的主流技术为光学追踪法。光学追踪摄像头与摄影机固... 虚拟摄制可实现摄影机视角中,真实演员表演与LED屏幕中显示虚拟场景的协同运动。虚实协同要求虚拟环境中的摄影机必须与真实摄影机具有相同的位姿和镜头参数。目前获取真实摄影机位姿的主流技术为光学追踪法。光学追踪摄像头与摄影机固定连接,通过分析视野光学追踪摄像头中光学标记点状态,计算摄影机位姿。光学标记点散布在影棚棚顶或地面,但该方法价格高,光学标记点占用拍摄空间,且与照明系统产生物理或光学干涉。本文提出的FREE-D协议数据转换设备可直接从机械臂中采集末端摄影机位姿,同时通过机械齿轮采集镜头参数,并在Genlock同步时钟触发时,将摄影机最新的位姿和镜头参数发送给虚实合成服务器。通过设备实际部署和使用,证明本系统成本低,安装使用简单,不占用拍摄时物理和光学空间,可追踪摄影机任意运动。 展开更多
关键词 虚拟摄制 摄影机器人 FREE-D协议转换 机械臂 嵌入式系统
在线阅读 下载PDF
虚拟现实技术在计算机通信中的应用研究
14
作者 汤宁 《智能城市应用》 2025年第7期51-53,共3页
计算机通信在人们的日常生活、工作以及学习等方面所发挥的作用日益凸显,各个领域针对通信方面的要求变得更为严格且呈现出多元化的特点。伴随我国虚拟现实等前沿技术发展速度不断加快,在计算机通信领域,对于与这些新兴技术展开深度融... 计算机通信在人们的日常生活、工作以及学习等方面所发挥的作用日益凸显,各个领域针对通信方面的要求变得更为严格且呈现出多元化的特点。伴随我国虚拟现实等前沿技术发展速度不断加快,在计算机通信领域,对于与这些新兴技术展开深度融合这件事愈发予以重视,正在积极拓宽其应用场景的涵盖范围,同时深入挖掘技术整合方面的潜力,把虚拟现实技术恰当地融入到计算机通信体系当中,达成二者的优势互补状态,这已然成为了当下跨学科研究最为关键的核心攻关所在。 展开更多
关键词 虚拟现实 计算机通信 人机交互 通信协议
在线阅读 下载PDF
基于整车虚拟道路行驶试验的车辆零部件疲劳分析 被引量:13
15
作者 孙宏祝 陈循 +1 位作者 梁科山 丛楠 《国防科技大学学报》 EI CAS CSCD 北大核心 2007年第4期121-125,共5页
针对现有车辆零部件精确疲劳分析依赖成本高昂的实车试验的问题,提出了一种利用整车虚拟样机仿真分析零部件疲劳寿命的方法。该方法通过在ADAMS/CAR中用整车虚拟样机在虚拟道路模型上进行行驶试验,利用多体系统动力学基于模态坐标的求... 针对现有车辆零部件精确疲劳分析依赖成本高昂的实车试验的问题,提出了一种利用整车虚拟样机仿真分析零部件疲劳寿命的方法。该方法通过在ADAMS/CAR中用整车虚拟样机在虚拟道路模型上进行行驶试验,利用多体系统动力学基于模态坐标的求解特点,使用模态应力恢复技术准确还原出了用于零部件疲劳寿命分析的载荷历程。将该方法应用于某车辆双横臂前悬中的下控制臂,在较短的时间内获得了该零件的预测疲劳寿命、寿命安全系数及危险部位等信息。应用结果表明,该方法可作为汽车设计过程与测试过程中的有效试验手段。 展开更多
关键词 汽车零件 虚拟道路 模态应力恢复 疲劳寿命 虚拟样机
在线阅读 下载PDF
用于虚拟样机系统可信度评估的多属性决策网方法 被引量:4
16
作者 方可 马萍 杨明 《计算机集成制造系统》 EI CSCD 北大核心 2012年第5期1054-1060,共7页
为解决虚拟样机系统的可信度评估问题,提出一种多属性决策网方法。论述了网络的数学定义、算法和图示方法,推导了网络的评估优先级和评估值计算式,阐述了将虚拟样机系统可信度评估问题映射为多属性决策网的过程。通过一个虚拟样机系统... 为解决虚拟样机系统的可信度评估问题,提出一种多属性决策网方法。论述了网络的数学定义、算法和图示方法,推导了网络的评估优先级和评估值计算式,阐述了将虚拟样机系统可信度评估问题映射为多属性决策网的过程。通过一个虚拟样机系统可信度评估实例,验证了应用多属性决策网可以实现更准确的虚拟样机系统可信度评估。 展开更多
关键词 虚拟样机 可信度评估 多属性决策网 评估优先级
在线阅读 下载PDF
智能变电站远程虚拟终端访问系统设计与实现 被引量:8
17
作者 李澄 陆玉军 +1 位作者 王宁 葛永高 《电测与仪表》 北大核心 2016年第13期123-128,共6页
针对智能变电站运维仍采用传统就地检修方式的现状及存在的问题,在结合电力通讯网络和站内设备的技术特点的基础上,文章介绍了一种智能变电站远程访问系统设计方案。系统通过变电站端代理服务器和主站端浏览服务器,为主站端用户构建变... 针对智能变电站运维仍采用传统就地检修方式的现状及存在的问题,在结合电力通讯网络和站内设备的技术特点的基础上,文章介绍了一种智能变电站远程访问系统设计方案。系统通过变电站端代理服务器和主站端浏览服务器,为主站端用户构建变电站虚拟终端,并采用通讯协议代理、双链路通讯控制、数据加密等技术,实现了对智能变电站内设备在主站端的安全远程访问。该方案提供了智能变电站远程运维手段,对于提高运维效率,降低运维成本,具有一定的参考价值。 展开更多
关键词 智能变电站 远程访问 虚拟终端 协议代理 双链路通信控制 数据加密
在线阅读 下载PDF
InfiniBand交换机制的研究 被引量:4
18
作者 董小社 贾志国 赵青苹 《微电子学与计算机》 CSCD 北大核心 2004年第2期81-85,共5页
随着计算能力向数据中心的集中,消除数据通信性能瓶颈和改进系统管理变得比以往更加重要,I/O子系统是造成这类问题的关键。InfiniBand是被认为可以消除当前I/O架构性能瓶颈的一种新的I/O技术,这种基于交换式的I/O新技术的核心就是交换... 随着计算能力向数据中心的集中,消除数据通信性能瓶颈和改进系统管理变得比以往更加重要,I/O子系统是造成这类问题的关键。InfiniBand是被认为可以消除当前I/O架构性能瓶颈的一种新的I/O技术,这种基于交换式的I/O新技术的核心就是交换机。文章介绍了InfiniBand技术,着重分析了InfiniBand交换机的功能,最后给出了交换机的架构模块设计方案并对交换机的性能进行了分析与比较。 展开更多
关键词 网络互连 网络服务器 INFINIBAND 交换机制 计算机网络
在线阅读 下载PDF
MPLS VPN关键技术研究 被引量:28
19
作者 陈雪非 黄河 李蓬 《计算机工程与设计》 CSCD 北大核心 2007年第13期3138-3140,3150,共4页
利用多协议标记交换(multi-protocol label switch,MPLS)骨干网络实施虚拟专用网是一种具有巨大技术优势的新型VPN(virtual private network)技术。目前,MPLS VPN技术本身还具有一定局限性。如多自治系统VPN中实施服务质量和网络管理的... 利用多协议标记交换(multi-protocol label switch,MPLS)骨干网络实施虚拟专用网是一种具有巨大技术优势的新型VPN(virtual private network)技术。目前,MPLS VPN技术本身还具有一定局限性。如多自治系统VPN中实施服务质量和网络管理的复杂性,以及缺乏内在安全机制等。阐述了MPLS VPN的关键技术,分析了多自治系统MPLS VPN的实现方式及其服务质量问题,提出了增强MPLS VPN安全性的方法。 展开更多
关键词 多协议标记交换 虚拟专用网 边界网关协议 流量工程 网络安全
在线阅读 下载PDF
两种动态路由协议分析及其实验设计与仿真 被引量:17
20
作者 付承彪 田安红 《实验技术与管理》 CAS 北大核心 2016年第7期140-144,共5页
分别阐述了RIP和OSPF两种动态路由协议的工作原理和报文格式,并利用模拟软件设计了两种动态路由协议实验方案,即RIP动态路由实验和OSPF动态路由实验。分析了路由器和PC机的端口IP配置,以及RIP和OSPF路由协议配置命令。实验结果表明,所... 分别阐述了RIP和OSPF两种动态路由协议的工作原理和报文格式,并利用模拟软件设计了两种动态路由协议实验方案,即RIP动态路由实验和OSPF动态路由实验。分析了路由器和PC机的端口IP配置,以及RIP和OSPF路由协议配置命令。实验结果表明,所组建的RIP动态路由实验和OSPF动态路由实验方案可行,这种实验教学方式加深了学生对于动态路由协议的理解。 展开更多
关键词 动态路由协议 虚拟仿真 RIP OSPF
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部