For network fault recovery mechanisms can have a significant impact on network performance reconfigurable actual situation theoretically analyze the running reconfigurable networks
a reconfigurable network availability model is proposed. In this model
quantitative description of the node service capabilities and network services capabilities
based on reconfigurable network by introducing state transition theory
finite-state Markov chain theoretical analysis. To verify the validity of the availability of the model by simulation
simulation results show that the theoretical model calculations and simulation results fit better
can be used to describe the specific performance reconfigurable networks available.
CHENG D N , WANG B Q , WANG B J , et al . Preliminary study on the connotation of flexibility in dynamically reconfigurable networks [J ] . Journal on Communications , 2012 , 8 ( 33 ): 214 - 222 .
LAN J L , XING C Q , HU Y X , et al . Reconfiguration technology and future network architecture [J ] . Telecommunications Science , 2013 , 29 ( 8 ): 16 - 23 .
LAN J L , CHENG D N , HU Y X . Research on reconfigurable information communication basal network architecture [J ] . Journal on Communications , 2014 , 35 ( 1 ): 128 - 139 .
QI N , WANG B Q , GUO J . Research on construction methods of logical carrying network [J ] . Chinese Journal of Computers , 2010 , 33 ( 9 ): 1533 - 1540 .
WANG Z M , et al . Research on reconfigurable service carrying network resilient construction algorithms [J ] . Journal of Electronics & In-formation Technology , 2012 , 34 ( 2 ): 54 - 56 .
LIN C , WANG Y , LIN Q L . Stochastic modeling and evaluation for network security [J ] . Chinese Journal of Computers , 2005 , 28 ( 12 ): 1944 - 1956 .
NICOL D M , SANDERS W H , TRIVEDI K S . Model-based evaluation: From dependability to security [J ] . IEEE Transactions on Dependability and Security , 2004 , 1 ( 1 ): 48 - 65 .
WANG J , WANG H Q , ZHAO G S . Index system of quantitative evaluation for information systems survivability [J ] . Computer Engineering , 2009 , 35 ( 3 ): 54 - 56 .
CHEN X Z , ZHENG Q H , et al . Quantitative hierarchical threat evaluation model for network security [J ] . Jorunal of Software , 2006 , 17 ( 4 ): 885 - 897 .
JIANG W , FANG B X , et al . Evaluating network security and optimal active defense based on attack2defense game model [J ] . Chinese Journal of Computers , 2009 , 32 ( 4 ): 817 - 827 .
MCDERMOTT J . Attack-potential-based survivability modeling for high-consequence systems [A ] . Proceedings of the 3rd IEEE Interna-tional Workshop on Information Assurance(IWIA'05) [C ] . Callege Park, Maryland, USA , 2005 . 119 - 130 .
FENG P H , LIAN Y F . A vulnerability model of distributed systems based on reliability theory [J ] . Journal of Software , 2006 , 17 ( 7 ): 1633 - 1640 .
GOSEVA. P K , WANG F , WANG R . Characterizing intrusion tolerant systems using a state transition model [A ] . Proceedings of DARPA DISCEX II Conference [C ] . 2001 . 211 - 221 .