The Methodology of Determination of SDH-Network Structural Reliability. Mathematical and Imitating Models
In this paper a general overview of network protection and reserving has been made and the presentation of imitating model is given.
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 584 |
---|---|
container_issue | |
container_start_page | 582 |
container_title | |
container_volume | |
creator | Klymash, M. Pavlyuk, R. |
description | In this paper a general overview of network protection and reserving has been made and the presentation of imitating model is given. |
doi_str_mv | 10.1109/TCSET.2006.4404641 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4404641</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4404641</ieee_id><sourcerecordid>4404641</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-8da6e530871a149039340e34ecb725ecd96091c379e8ecefadd3b85821fac3183</originalsourceid><addsrcrecordid>eNotkM9KAzEYxAMiKLUvoJe8wK5fNv-P0lYttAp27yVNvm2juxvZTZG-vRV7GmZ-zByGkHsGJWNgH-vZZlGXFYAqhQChBLsiU6uNVUpKLkFXN2Q6jp8AwKzSQupbEusD0jXmQwqpTfsTTQ2dY8ahi73LMfV_wWb-Wrxh_knDF93k4ejzcXAt_cA2ul1sYz6VdO3yAbtzxZ-J6wNddjGfbb-n6xSwHe_IdePaEacXnZD6eVHPXovV-8ty9rQqooVcmOAUSg5GM8eEBW65AOQC_U5XEn2wCizzXFs06LFxIfCdkaZijfOcGT4hD_-zERG330Ps3HDaXv7gv2jQV3o</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>The Methodology of Determination of SDH-Network Structural Reliability. Mathematical and Imitating Models</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Klymash, M. ; Pavlyuk, R.</creator><creatorcontrib>Klymash, M. ; Pavlyuk, R.</creatorcontrib><description>In this paper a general overview of network protection and reserving has been made and the presentation of imitating model is given.</description><identifier>ISBN: 9789665535072</identifier><identifier>ISBN: 9665535072</identifier><identifier>DOI: 10.1109/TCSET.2006.4404641</identifier><language>eng</language><publisher>IEEE</publisher><subject>Availability ; Computer bugs ; Earthquakes ; Humans ; Mathematical model ; Network protection and reserving ; Peer to peer computing ; protection imitating model ; Protection switching ; SDH Network ; Switches ; Synchronous digital hierarchy ; Telecommunication traffic</subject><ispartof>2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science, 2006, p.582-584</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4404641$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4404641$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Klymash, M.</creatorcontrib><creatorcontrib>Pavlyuk, R.</creatorcontrib><title>The Methodology of Determination of SDH-Network Structural Reliability. Mathematical and Imitating Models</title><title>2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science</title><addtitle>TCSET</addtitle><description>In this paper a general overview of network protection and reserving has been made and the presentation of imitating model is given.</description><subject>Availability</subject><subject>Computer bugs</subject><subject>Earthquakes</subject><subject>Humans</subject><subject>Mathematical model</subject><subject>Network protection and reserving</subject><subject>Peer to peer computing</subject><subject>protection imitating model</subject><subject>Protection switching</subject><subject>SDH Network</subject><subject>Switches</subject><subject>Synchronous digital hierarchy</subject><subject>Telecommunication traffic</subject><isbn>9789665535072</isbn><isbn>9665535072</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkM9KAzEYxAMiKLUvoJe8wK5fNv-P0lYttAp27yVNvm2juxvZTZG-vRV7GmZ-zByGkHsGJWNgH-vZZlGXFYAqhQChBLsiU6uNVUpKLkFXN2Q6jp8AwKzSQupbEusD0jXmQwqpTfsTTQ2dY8ahi73LMfV_wWb-Wrxh_knDF93k4ejzcXAt_cA2ul1sYz6VdO3yAbtzxZ-J6wNddjGfbb-n6xSwHe_IdePaEacXnZD6eVHPXovV-8ty9rQqooVcmOAUSg5GM8eEBW65AOQC_U5XEn2wCizzXFs06LFxIfCdkaZijfOcGT4hD_-zERG330Ps3HDaXv7gv2jQV3o</recordid><startdate>200602</startdate><enddate>200602</enddate><creator>Klymash, M.</creator><creator>Pavlyuk, R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200602</creationdate><title>The Methodology of Determination of SDH-Network Structural Reliability. Mathematical and Imitating Models</title><author>Klymash, M. ; Pavlyuk, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-8da6e530871a149039340e34ecb725ecd96091c379e8ecefadd3b85821fac3183</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Availability</topic><topic>Computer bugs</topic><topic>Earthquakes</topic><topic>Humans</topic><topic>Mathematical model</topic><topic>Network protection and reserving</topic><topic>Peer to peer computing</topic><topic>protection imitating model</topic><topic>Protection switching</topic><topic>SDH Network</topic><topic>Switches</topic><topic>Synchronous digital hierarchy</topic><topic>Telecommunication traffic</topic><toplevel>online_resources</toplevel><creatorcontrib>Klymash, M.</creatorcontrib><creatorcontrib>Pavlyuk, R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Klymash, M.</au><au>Pavlyuk, R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>The Methodology of Determination of SDH-Network Structural Reliability. Mathematical and Imitating Models</atitle><btitle>2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science</btitle><stitle>TCSET</stitle><date>2006-02</date><risdate>2006</risdate><spage>582</spage><epage>584</epage><pages>582-584</pages><isbn>9789665535072</isbn><isbn>9665535072</isbn><abstract>In this paper a general overview of network protection and reserving has been made and the presentation of imitating model is given.</abstract><pub>IEEE</pub><doi>10.1109/TCSET.2006.4404641</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9789665535072 |
ispartof | 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science, 2006, p.582-584 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4404641 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Availability Computer bugs Earthquakes Humans Mathematical model Network protection and reserving Peer to peer computing protection imitating model Protection switching SDH Network Switches Synchronous digital hierarchy Telecommunication traffic |
title | The Methodology of Determination of SDH-Network Structural Reliability. Mathematical and Imitating Models |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T06%3A47%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=The%20Methodology%20of%20Determination%20of%20SDH-Network%20Structural%20Reliability.%20Mathematical%20and%20Imitating%20Models&rft.btitle=2006%20International%20Conference%20-%20Modern%20Problems%20of%20Radio%20Engineering,%20Telecommunications,%20and%20Computer%20Science&rft.au=Klymash,%20M.&rft.date=2006-02&rft.spage=582&rft.epage=584&rft.pages=582-584&rft.isbn=9789665535072&rft.isbn_list=9665535072&rft_id=info:doi/10.1109/TCSET.2006.4404641&rft_dat=%3Cieee_6IE%3E4404641%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4404641&rfr_iscdi=true |