首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 161 毫秒
1.
Fiber-wireless (FiWi) access networks, which are a combination of fiber networks and wireless networks, have the advantages of both networks, such as high bandwidth, high security, low cost, and flexible access. However, with the increasing need for bandwidth and types of service from users~ FiWi networks are still relatively incapable and ossified. To alleviate bandwidth tension and facilitate new service deployment, we attempt to apply network virtualization in FiWi networks, in which the network's control plane and data plane are separated from each other. Based on a previously proposed hierarchical model and service model for FiWi network virtualization, the process of service implementation is described. The performances of the FiWi access networks applying network virtualization are analyzed in detail, including bandwidth for links, throughput for nodes, and multipath flow transmission. Simulation results show that the FiWi network with virtualization is superior to that without.  相似文献   

2.
Internet is best effort network, on the whole, it doesn't provide any quality of service assurance for services. Especially,all kinds of stream media need more network performance and quality of service. Currently, because of existing many heterogeneous networks, such as telecommunication network, IP data network , mobile network and so on ,in order to break off this heterogeneous network isolated complexion ,research and developmentnext generation network must be carried out,only by this way,can these isolated heterogeneous network be merged into an all IP network. This network will provide enormous services for service users,how to manage these services effectively is a topic proposed by next generation internet. [1] gave research status for service management and advance,this paper researches service management requirement for next generation Internet and workflow etc,and based on these technique,a service management architecture model is proposed. It consists of service access layer, service deployment layer, service providing layer, service mapping layer, policy control layer and network element managing layer. These layers coordinate to implement service management.  相似文献   

3.
The basic mobile IP protocol is difficult to implement on the traditional IP network and not flexible and efficient under certain conditions.For example,firewalls or boundary routers may drop packets sent by mobile nodes for security reasons.Traditional networking devices such as routers cannot dynamically load and unload extended services to achieve different qualities of services.In this paper,a new scheme of using the active network to support the mobile IP is presented.The Softnet,a prototype of active networks based on mobile agents,is introduced.The active network is characterized by the programmability of its intermediate nodes and therefore presents dynaic and flexible behaviors.Special services can be dynamically deployed onto the active nodes in the Softnet.This property is definitely required in implementing the mobile IP protocols.The SOftnet.This property is definitely required in implementing the mobile IP protocols.The Softnet.This property is definitely required in implementing the mobile IP protocols.The Softnet supports not only the basic mobile IP protocol but also other extended mobile IP protocols.Virtual networks for mobile IP services are dynamically formed by mobile agents in the Softnet to provide different qualities of services.  相似文献   

4.
5.
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Compared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.  相似文献   

6.
Access control policy in wireless networks has a significant impact on QoS satisfaction and resource utilization efficiency. The design of access control policy in heterogeneous wireless networks (HWNs) becomes more challenging especially for the heterogeneous multiple access protocols of each radio network. In this paper, a Markov model is proposed to analyze the performance of three access control policies for HWNs. The first policy is the optimal radio access technology (O-RAT) selection, where the incoming traffic always tries to access one network with the maximum service rate before admission. The second policy intends to allocate the same data to all networks. And the traffic will leave the system if it is accomplished first by one of these networks, which is formulated as the aggregated multi-radio access (A-MRA) technology. The third policy is named the parallel multi-radio access (P-MRA) transmission, in which the incoming traffic is split into different networks. The traffic is served with the sum of the service rates provided by overall networks. Numerical and simulate results show the effectiveness of our analytical framework and the performance gain of the three access control policies. As illustrated with some representative results, the P-MRA policy shows superior performance gain to the other two policies independent on the specific parameters of the different multiple access protocols due to the multiplexing gain.  相似文献   

7.
An asynchronous message invocation mechanism of distributed object middleware in the business heterogeneous and integrated platform is studied in this paper. On the basis of the analysis of currently existing distributed object middleware supporting callback and poller, an asynchronous messaging model with time independent invocation is proposed to deal with the problem of time independent asynchronous invocation that neither of the two above-mentioned mechanisms supports. In this model, message picking-up, packing and transforming arc implemented by Message Conversion Layer (MCL), and a Software Route Agent (SPA) is designed to store and transmit message. The model can support message invocation asynchronously and time independent invocation effectively. At the same time, it also can support message service quality control. Finally the algorithm and implementation of software route agent are given.  相似文献   

8.
Active network is a new framework where network nodes not only forward packets, but also perform customized computation on the packet flowing through them. It provides a programmable interface to the user where users dynamically inject services into the intermediate nodes. This paper brings forwards a structure of active router based on IP network, analyses the extended definition field of IP datagram and the format of the active IP datagram, researches the module structure, the logic flow chart and the arithmetic of active router, thereby realizes the active networks technology in IP network and extends the service in existence network.  相似文献   

9.
iSCSI is a newly emerging protocol with the goal of implementing the storage area network (SAN) technology over TCP/IP, which brings economy and convenience whereas it also raises performance and reliability issues. This paper presents a implementation of iSCSI-based disk array system, and then analyzed the reliability of this system by combination of fuzzy logic and Markov modeling. This reliability method is a technique for analyzing fault tolerant designs under considerable uncertainty, such as is seen in compilations of component failure rates, the presented model provides the estimation of the lower and upper boundary of iSCSI-based disk array system with a single run of the model.  相似文献   

10.
Aiming at building up more powerful, open-standard-based and generic infras-tructures for application integration, service grids address the challenges in large-scale coordinated sharing and on-demand composition of network-based application services. The related endeavors have opened up new ways of application development, deployment and integration. In connection with the new level of scale, openness and dynamism brought forward by service grids, adaptive service configuration is of essential importance to applications. This paper proposes an approach called CAFISE, which tries to better facilitate on-demand configuration and dynamic reconfigura-tion of service grid applications. In CAFISE, a business design and its supporting software system are considered in a coherent way, and a convergent relation, which helps to map business-level configurations to software-level configurations, is highlighted. The paper is particularly devoted to presenting and discussing the principles, reference model, modeling language and supporting application framework of CAFISE. Since practical usefulness is highly valued in the development of CAFISE, the application of the approach to a real-world scenario is also presented in the paper.  相似文献   

11.
Due to the rapid development of the Internet technology such as 5G/6G and artificial intelligence, more and more new network applications appear. Customers using these applications may have different individual demands and such a trend causes great challenges to the traditional integrated service and routing model. In order to satisfy the individual demands of customers, the service customization should be considered, during which the cost of Internet Service Provider (ISP) naturally increases. Hence, how to reach a balance between the customer satisfaction and the ISP profit becomes vitally important. Targeting at addressing this critical problem, this work proposes a service customization oriented reliable routing mechanism, which includes two modules, that is, the service customization module and the routing module. In particular, the former (i.e., the service customization module) is responsible for classifying services by analyzing and processing the customer’s demands. After that, the IPv6 protocol is used to implement the service customization, since it naturally supports differentiated services via the extended header fields. The latter is responsible for transforming the customized services into specific routing policies. Specifically, the Nash equilibrium based economic model is firstly introduced to make a perfect balance between the user satisfaction and the ISP profits, which could finally produce a win-win solution. After that, based on the customized service policies, an optimized grey wolf algorithm is designed to establish the routing path, during which the routing reliability is formulated and calculated. Finally, the experiments are carried out and the proposed mechanism is evaluated. The results indicate that the proposed service customization and routing mechanism improves the routing reliability, user satisfaction and ISP satisfaction by about 8.42%, 15.5% and 17.75% respectively compared with the classical open shortest path first algorithm and the function learning based algorithm.  相似文献   

12.
给出了DiffServ网络的一种设计与实现,提出了一种有效的资源管理模型。在该模型中,存在一个带宽代理(Bandwidth Broker)同步多个边界节点的接纳控制,负责区分服务网络之间的SLA(Server Level Agreement)协商,进行路由器配置;边界节点使用RSVP协议为集聚流预留资源;RSVP使用预计算QoS路由寻找路径。整个模型不仅综合了已有资源管理方案的优点,而且保持了区分服务网络的可扩展性。  相似文献   

13.
该文介绍了一种Web服务按需定制的新模式--主动服务。在主动服务模型下,现有Web服务描述语言标准WSDL[7]所提供的信息明显不足。针对这个问题,文章提出了支持主动服务的服务描述模型ASDM,并给出了具体应用实例。  相似文献   

14.
15.
This article proposes a distributed admission control (AC) model based on on-line monitoring to manage the quality of Internet services and Service Level Specifications (SLSs) in class-based networks. The AC strategy covers intra- and interdomain operation, without adding significant complexity to the network control plane and involving only edge nodes. While ingress nodes perform implicit or explicit AC resorting to service-oriented rules for SLS and QoS parameters control, egress nodes collect service metrics providing them as inputs for AC. The end-to-end operation is viewed as a cumulative and repetitive process of AC and available service computation. We discuss crucial key points of the model implementation and evaluate its two main components: the monitoring process and the AC criteria. The results show that, using proper AC rules and safety margins, service commitments can be efficiently satisfied, and the simplicity and flexibility of the model can be explored to manage successfully QoS requirements of multiple Internet services.  相似文献   

16.
袁满  罗军  胡建平  阚志刚  马健 《计算机工程》2003,29(14):22-23,29
服务定位协议(SLP)是IETF提出的基于IP网络的服务定位标准。而这一标准并没有考虑对QoS的支持。未来的互联网络是一个具有QoS保证的网络。服务发现仅仅是Internet服务管理中的一个方面,发现服务不是最终目的,最终目的是为了使用这一服务。在对SLP体系结构、下一代互联网QoS服务管理及相关技术充分研究的基础上,提出了一种新奇的基于QoS的Internet服务管理体系结构模型。为使在服务表示与发现层支持QoS,对SLP定位协议进行了一些扩充。对服务定位协议扩充后,当用户代理在向服务代理发布请求时,可以在请求消息中绑定QoS对象参数,一旦服务代理接收到这一消息,就可以利用这些QoS参数与域管理器进行协商,协商结果可通过服务代理反馈给用户代理。这样不仅减小了网络开销,而且降低了传统的用户代理与域管理器协商的次数,在服务发现的同时用户代理还可以直接获得该服务的QoS信息。  相似文献   

17.
Internet服务管理技术综述   总被引:2,自引:1,他引:2  
1 服务与服务的分类经常提到服务这个概念,那么到底什么是服务呢?文[1]对服务进行了定义:服务就是服务提供方向一个或多个所服务的用户提供的一组实际能力。为研究之便,我们将服务分成两类:一类是传输服务,另一类是应用服务。这两种服务并不完全独立,它们是相互依存的,其中传输服务是应用服务的基础与保证,而应用服务是对传输服务的一种增值与体现。应用  相似文献   

18.
Rafael  Bonifacio  Nicolas  Julian 《Neurocomputing》2009,72(16-18):3631
In this paper we explore the interest of computational intelligence tools in the management of heterogeneous communication networks, specifically to predict congestion, failures and other anomalies in the network that may eventually lead to degradation of the quality of offered services. We show two different applications based on neural and neuro-fuzzy systems for quality of service (QoS) management in next generation networks for voice and video service over heterogeneous Internet protocol (V2oIP) services. The two examples explained in this paper attempt to predict the communication network resources for new incoming calls, and visualizing the QoS of a communication network by means of self-organizing maps.  相似文献   

19.
针对用户对远程数据存储与异地数据备份的需求增加,提出一种基于IPv6协议的Internet存储服务模型。设计应用层的Internet存储访问协议,结合IPv6协议的安全性特点设计安全存储模型,为下一代互联网提供一种标准、安全的远程存储服务。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号