首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 15 毫秒
1.
Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing.From our work develogpin a scalable distributed network cache.we have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks(WAN).In this paper,we discuss several hardware and software dsign techniques,and then describe their application to an implementation of an enhanced FTP protocol called GridFTP,We describe results from the Supercomputing 2000 conference.  相似文献   

2.
The interactions among proteins, DNA and RNA in an organism form elaborate cell-cycle networks which govern cell growth and proliferation. Understanding the common structure of cell-cycle networks will be of great benefit to science research. Here, inspired by the importance of the cell-cycle regulatory network of yeast which has been studied intensively, we focus on small networks with 11 nodes, equivalent to that of the cell-cycle regulatory network used by Li et al. [Proc. Natl. Acad. Sci. USA 101(2004)4781] Using a Boolean model, we study the correlation between structure and function, and a possible common structure. It is found that cascade-like networks with a great number of interactions between nodes are stable. Based on these findings, we are able to construct synthetic networks that have the same functions as the cell-cycle regulatory network.  相似文献   

3.
In this paper,we study the scaling for the mean first-passage time(MFPT) of the random walks on a generalized Koch network with a trap.Through the network construction,where the initial state is transformed from a triangle to a polygon,we obtain the exact scaling for the MFPT.We show that the MFPT grows linearly with the number of nodes and the dimensions of the polygon in the large limit of the network order.In addition,we determine the exponents of scaling efficiency characterizing the random walks.Our results are the generalizations of those derived for the Koch network,which shed light on the analysis of random walks over various fractal networks.  相似文献   

4.
Transport networks, such as railway networks and airport networks, are a kind of random network with complex topology. Recently, more and more scholars paid attention to various kinds of transport networks and try to explore their inherent characteristics. Here we study the exponential properties of a recently introduced Bus Transport Networks (BTNs) evolution model with random overlapping clique structure, which gives a possible explanation for the observed exponential distribution of the connectivities of some BTNs of three major cities in China. Applying mean-field theory, we analyze the BTNs model and prove that this model has the character of exponential distribution of the connectivities, and develop a method to predict the growth dynamics of the individual vertices, and use this to calculate analytically the connectivity distribution and the exponents. By comparing mean-field based theoretic results with the statistical data of real BTNs, we observe that, as a whole, both of their data show similar character of exponential distribution of the connectivities, and their exponents have same order of magnitude, which show the availability of the analytical result of this paper.  相似文献   

5.
Recently the troubles related to the network security have often occurred attacks.It consists of two fundamental thinge;the monitoring and the access control.To monitor the network,we have installed the intrusion detectioin system and have managed it since 1998,For the second thing,we arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level.To realize these three categories,we filter the incoming packet from outside KEK whether it has a SYN flag or not.The network monitoring and the access control produced good effects in keeping our security level high.Since 2000 we have started the transiton of LAN from shared-media network to switched network.Now almost part of LAN was re-configured and in this new LAN 10Mbps/100Mbps/1Gbps Ethernet are supported.Currently we are planning further speedup(10Gbps)and redundancy of network.Not only LAN but also WAN,network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government,In this very high speed network,our current strategy will be affected and again the network security becomes a big issue,This paper describes our experiences in practice of the current strategy and management know-how together with the discussion on the new strategy.  相似文献   

6.
Fixed-point attractors with global stability manifest themselves in a number of gene regulatory networks. This property indicates the stability of regulatory networks against small state perturbations and is closely related to other complex dynamics. In this paper, we aim to reveal the core modules in regulatory networks that determine their global attractors and the relationship between these core modules and other motifs. This work has been done via three steps. Firstly, inspired by the signal transmission in the regulation process, we extract the model of chain-like network from regulation networks. We propose a module of “ideal transmission chain(ITC)”, which is proved sufficient and necessary(under certain condition) to form a global fixed-point in the context of chain-like network. Secondly, by examining two well-studied regulatory networks(i.e., the cell-cycle regulatory networks of Budding yeast and Fission yeast), we identify the ideal modules in true regulation networks and demonstrate that the modules have a superior contribution to network stability(quantified by the relative size of the biggest attraction basin). Thirdly, in these two regulation networks, we find that the double negative feedback loops, which are the key motifs of forming bistability in regulation, are connected to these core modules with high network stability. These results have shed new light on the connection between the topological feature and the dynamic property of regulatory networks.  相似文献   

7.
Assortative/disassortative mixing is an important topological property of a network. A network is called assortative mixing if the nodes in the network tend to connect to their connectivity peers, or disassortative mixing if nodes with low degrees are more likely to connect with high-degree nodes. We have known that biological networks such as protein-protein interaction networks (PPI), gene regulatory networks, and metabolic networks tend to be disassortative. On the other hand, in biological evolution, duplication and divergence are two fundamental processes. In order to make the relationship between the property of disassortative mixing and the two basic biological principles clear and to study the cause of the disassortative mixing property in biological networks, we present a random duplication model and an anti-preference duplication model. Our results show that disassortative mixing networks can be obtained by both kinds of models from uncorrelated initial networks. Moreover, with the growth of the network size, the disassortative mixing property becomes more obvious.  相似文献   

8.
In complex networks, network modules play a center role, which carry out a key function. In this paper, we introduce the spatial correIation function to describe the relationships among the network modules. Our focus is to investigate how the network modules evolve, and what the evolution properties of the modules are. In order to test the proposed method, as the examples, we use our method to analyze and discuss the ER random network and scale-free network. Rigorous analysis of the existing data shows that the introduced correlation function is suitable for describing the evolution properties of network modules. Remarkably, the numerical simulations indicate that the ER random network and scale-free network have different evolution properties.  相似文献   

9.
Despite the large size of most communication and transportation systems,there are short paths between nodes in these networks which guarantee the efficient information,data and passenger delivery;furthermore these networks have a surprising tolerance under random errors thanks to their inherent scale-free topology.However,their scale-free topology also makes them fragile under intentional attacks,leaving us a challenge on how to improve the network robustness against intentional attacks without losing their strong tolerance under random errors and high message and passenger delivering capacity.Here we propose two methods (SL method and SH method) to enhance scale-free network’s tolerance under attack in different conditions.  相似文献   

10.
张盛  王剑  唐朝京  张权 《中国物理 B》2011,20(8):80306-080306
As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号