Abstract
A framework model proposed in this paper is a data-link Equipment Redundant Strategy based on reliability theory. The strategy combined with the normal maintenance could greatly improve the performance of the network system. The static-checking and policy of authentication mechanism ensure the running network without any error. The redundant equipments are independent but are capable of communication with each other when they work their actions. The model is independent of specific application environment, thus providing a general-purpose framework for fault diagnosis. An example is given to express the calculating method.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Othmar, K.: Network Troubleshooting. Agilrnt Technologies, Berlin (2002)
Jun, Z., Hong, L., et al.: A New Analysis Method on the Hidden Terminals in Self—Organized TDMA VHF Datalink. Electric Journal 12(29), 128–132 (2001)
Qian, F., Jia, Y., Huang, Y., et al.: A Dynamic And Fault-Tolerable Algorithm on Redundant Service Performance Improvement. Journal of Software 12(6), 523–528 (2001)
Jacobson, V.: Congestion Avoidance and Control. IEEE/ACM Transaction Networking 6(3), 314–329 (2000)
Caserri, C., Meo, M.: A new approach to model the stationary behavior of TCP connections. In: Proc IEEE INFOCOM 2000, Tel Aviv, Israel, IEEE Computer Society, CA (2000)
Veres, A., Boda, M.: The chaotic nature of TCP congestion control. In: Proc INFOCOM 2000, Tel Aviv, Israel, IEEE Computer Society, CA (2000)
Floyd, S., Fall, K.: Promoting the use of End-to-End congestion control in the Internet. IEEE/ACM Transaction Networking 7(4), 458–472 (2002)
Harris, B., Hunt, R.: TCP/IP security threats and attack methods. Computer Communications 22(10), 885–897 (2004)
Schuba, C.L., Krsul, I.V.: Analysis of denial of service attack on TCP. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (2000)
Hamann, T., Walrand, J.: A new fair window algorithm for ECN capable TCP(New-ECN). In: Proc IEEE INFOCOM 2000, Tel Aviv, Israel, IEEE Computer Society, CA (2000)
Dan, C., Hua-Can, H., Hui, W.: A new t-norm and its application in fuzzy control. In: Proc WCICIA 2000, Hefei, China, pp. 1284–1289 (2000)
Yager, R.: OWA neurons: A new class of fuzzy neurons. In: Proc IEEE-FUZZ, pp. 2316–2340 (1992)
Pierre-Yves, G.: Neuro-fuzzy logic. In: Proc. IEEE-FUZZ, pp. 512–518 (2003)
Pedrycz, W.: Fuzzy neural networks and neuro computations. Fuzzy Sets and Systems 56(1), 1–28 (1992)
Pedrycz, W.: Logic-based neurons: Extensions, uncertainty representation and development of fuzzy controllers. Fuzzy Sets and Systems 66(1), 251–266 (2004)
Bailey, S.A., Ye-Hwa, C.: A two layerd network using the OR/AND neuron. In: Proc. IEEE-FUZZ, pp. 1566–1571 (1999)
Averkin, A.N.: Decision making based on multivalued logic and fuzzy logic, architectures for semiotic modeling and situation analysis in large complex systems. In: Proc. ISIC Workshop, Monterey, pp. 871–875 (2001)
Hua-Can, H., et al.: Generalized logic in experience thinking. Science in China(E) 39(3), 225–234 (1996)
Buckley, J.J., Siler, W.: A new t-norm. Fuzzy Sets and Systems 16(1), 283–290 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qian-Mu, L., Man-Wu, X., Hong, Z., Feng-Yu, L. (2006). The Design of Data-Link Equipment Redundant Strategy. In: King, I., Wang, J., Chan, LW., Wang, D. (eds) Neural Information Processing. ICONIP 2006. Lecture Notes in Computer Science, vol 4234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893295_60
Download citation
DOI: https://doi.org/10.1007/11893295_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46484-6
Online ISBN: 978-3-540-46485-3
eBook Packages: Computer ScienceComputer Science (R0)