The Design of Data-Link Equipment Redundant Strategy

  • Li Qian-Mu
  • Xu Man-Wu
  • Zhang Hong
  • Liu Feng-Yu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4234)

Abstract

A framework model proposed in this paper is a data-link Equipment Redundant Strategy based on reliability theory. The strategy combined with the normal maintenance could greatly improve the performance of the network system. The static-checking and policy of authentication mechanism ensure the running network without any error. The redundant equipments are independent but are capable of communication with each other when they work their actions. The model is independent of specific application environment, thus providing a general-purpose framework for fault diagnosis. An example is given to express the calculating method.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Othmar, K.: Network Troubleshooting. Agilrnt Technologies, Berlin (2002)Google Scholar
  2. 2.
    Jun, Z., Hong, L., et al.: A New Analysis Method on the Hidden Terminals in Self—Organized TDMA VHF Datalink. Electric Journal 12(29), 128–132 (2001)CrossRefGoogle Scholar
  3. 3.
    Qian, F., Jia, Y., Huang, Y., et al.: A Dynamic And Fault-Tolerable Algorithm on Redundant Service Performance Improvement. Journal of Software 12(6), 523–528 (2001)Google Scholar
  4. 4.
    Jacobson, V.: Congestion Avoidance and Control. IEEE/ACM Transaction Networking 6(3), 314–329 (2000)Google Scholar
  5. 5.
    Caserri, C., Meo, M.: A new approach to model the stationary behavior of TCP connections. In: Proc IEEE INFOCOM 2000, Tel Aviv, Israel, IEEE Computer Society, CA (2000)Google Scholar
  6. 6.
    Veres, A., Boda, M.: The chaotic nature of TCP congestion control. In: Proc INFOCOM 2000, Tel Aviv, Israel, IEEE Computer Society, CA (2000)Google Scholar
  7. 7.
    Floyd, S., Fall, K.: Promoting the use of End-to-End congestion control in the Internet. IEEE/ACM Transaction Networking 7(4), 458–472 (2002)CrossRefGoogle Scholar
  8. 8.
    Harris, B., Hunt, R.: TCP/IP security threats and attack methods. Computer Communications 22(10), 885–897 (2004)CrossRefGoogle Scholar
  9. 9.
    Schuba, C.L., Krsul, I.V.: Analysis of denial of service attack on TCP. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (2000)Google Scholar
  10. 10.
    Hamann, T., Walrand, J.: A new fair window algorithm for ECN capable TCP(New-ECN). In: Proc IEEE INFOCOM 2000, Tel Aviv, Israel, IEEE Computer Society, CA (2000)Google Scholar
  11. 11.
    Dan, C., Hua-Can, H., Hui, W.: A new t-norm and its application in fuzzy control. In: Proc WCICIA 2000, Hefei, China, pp. 1284–1289 (2000)Google Scholar
  12. 12.
    Yager, R.: OWA neurons: A new class of fuzzy neurons. In: Proc IEEE-FUZZ, pp. 2316–2340 (1992)Google Scholar
  13. 13.
    Pierre-Yves, G.: Neuro-fuzzy logic. In: Proc. IEEE-FUZZ, pp. 512–518 (2003)Google Scholar
  14. 14.
    Pedrycz, W.: Fuzzy neural networks and neuro computations. Fuzzy Sets and Systems 56(1), 1–28 (1992)CrossRefGoogle Scholar
  15. 15.
    Pedrycz, W.: Logic-based neurons: Extensions, uncertainty representation and development of fuzzy controllers. Fuzzy Sets and Systems 66(1), 251–266 (2004)Google Scholar
  16. 16.
    Bailey, S.A., Ye-Hwa, C.: A two layerd network using the OR/AND neuron. In: Proc. IEEE-FUZZ, pp. 1566–1571 (1999)Google Scholar
  17. 17.
    Averkin, A.N.: Decision making based on multivalued logic and fuzzy logic, architectures for semiotic modeling and situation analysis in large complex systems. In: Proc. ISIC Workshop, Monterey, pp. 871–875 (2001)Google Scholar
  18. 18.
    Hua-Can, H., et al.: Generalized logic in experience thinking. Science in China(E) 39(3), 225–234 (1996)Google Scholar
  19. 19.
    Buckley, J.J., Siler, W.: A new t-norm. Fuzzy Sets and Systems 16(1), 283–290 (2004)MathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Li Qian-Mu
    • 1
    • 2
  • Xu Man-Wu
    • 1
  • Zhang Hong
    • 2
  • Liu Feng-Yu
    • 2
  1. 1.State Key Laboratory for Novel Software TechnologyNanjing UniversityNanjingChina
  2. 2.Computer Science DepartmentNanjing University of Science and TechnologyNanjingChina

Personalised recommendations