检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张引发[1] 王鲸鱼[1] 邓宏钟[2] 廖晓闽[1]
机构地区:[1]西安通信学院,陕西西安710106 [2]国防科技大学信息系统与管理学院,湖南长沙410073
出 处:《空军工程大学学报(自然科学版)》2013年第3期63-67,共5页Journal of Air Force Engineering University(Natural Science Edition)
基 金:国家自然科学基金资助项目(61179002;61072125);陕西省自然科学基金资助项目(2011JM8030)
摘 要:针对地理分布光网络的脆弱性,给出了构建地理灾难模型与光网络脆弱性研究的方法;提出了一种地理灾难相关故障模型仿真现实的灾难情况和相关链路故障的情况,并分析了灾难之间的相关性。围绕地理灾难相关故障和相关链路故障,通过选择高斯函数的方差、交互参数c和半径R聚类分析了2种类型(抑制型和群集型)4种灾难场景;通过计算4种灾难场景的可靠性,得出网络最有效攻击范围为200km和攻击类型为群集性灾难;采用最有效的灾难对实际的网络拓扑进行仿真,仿真结果表明采用本方案能够获得光网络脆弱区域,且降低了算法时间的复杂度。According to the vulnerability of the optical network from the Geography Distribution, this paper gives a method of constructing the model of geographical disaster and researching the vulnerability of opti-cal network. The paper also proposes a spatial probabilistic model to simulate the disaster of real-world scenarios and correlated link failures and simultaneously analyzes the correlation among the disasters. Ac-cording to correlated link failures of geographical disaster, the four scenarios of disaster of the two classes those are of inhibition and clustering are analyzed by choosing the variance, radial and probability density. By computing the reliability of the four scenarios of disaster, the conclusion is obtained that the most effec-tive range is 200 km and the type of the attack is of clustering disaster. Then the most effective attack is a- dopted to simulate in the actual network topology, the result shows that the use of this scheme can capture the vulnerable region and reduce the time complexity of algorithm.
分 类 号:TN929.1[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.191.5.237