首页 > 最新文献

DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.最新文献

英文 中文
Partial disjoint path for multi-layer protection in GMPLS networks GMPLS网络中多层保护的部分不相交路径
A. Urra, E. Calle, J. Marzo
In this paper, different recovery methods applied at different network layers and time scales are used in order to enhance the network reliability. Each layer deploys its own fault management methods. However, current recovery methods are applied to only a specific layer. New protection schemes, based on the proposed partial disjoint path algorithm, are defined in order to avoid protection duplications in a multi-layer scenario. The new protection schemes also encompass shared segment backup computation and shared risk link group identification. A complete set of experiments proves the efficiency of the proposed methods in relation with previous ones, in terms of resources used to protect the network, the failure recovery time and the request rejection ratio.
为了提高网络的可靠性,本文在不同的网络层和时间尺度上采用了不同的恢复方法。每一层都部署了自己的故障管理方法。然而,目前的恢复方法只适用于特定的层。在提出的部分不相交路径算法的基础上,定义了新的保护方案,以避免多层场景下的重复保护。新的保护方案还包括共享段备份计算和共享风险链路组识别。一组完整的实验证明了所提方法在保护网络的资源、故障恢复时间和请求拒绝率等方面的有效性。
{"title":"Partial disjoint path for multi-layer protection in GMPLS networks","authors":"A. Urra, E. Calle, J. Marzo","doi":"10.1109/DRCN.2005.1563861","DOIUrl":"https://doi.org/10.1109/DRCN.2005.1563861","url":null,"abstract":"In this paper, different recovery methods applied at different network layers and time scales are used in order to enhance the network reliability. Each layer deploys its own fault management methods. However, current recovery methods are applied to only a specific layer. New protection schemes, based on the proposed partial disjoint path algorithm, are defined in order to avoid protection duplications in a multi-layer scenario. The new protection schemes also encompass shared segment backup computation and shared risk link group identification. A complete set of experiments proves the efficiency of the proposed methods in relation with previous ones, in terms of resources used to protect the network, the failure recovery time and the request rejection ratio.","PeriodicalId":415896,"journal":{"name":"DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A computational study for demand-wise shared protection 基于需求的共享保护的计算研究
C. Gruber, A. Koster, S. Orlowski, R. Wessäly, A. Zymolka
In this paper, we compare the new resilience mechanism demand-wise shared protection (DSP) with dedicated and shared path protection. The computational study on five realistic network planning scenarios reveals that that the best solutions for DSP are on average 15% percent better than the corresponding 1+1 dedicated path protection solutions, and only 15% percent worse than shared path protection.
在本文中,我们比较了新的弹性机制需求智能共享保护(DSP)与专用和共享路径保护。对五种现实网络规划场景的计算研究表明,DSP的最佳方案比相应的1+1专用路径保护方案平均好15%,比共享路径保护方案平均差15%。
{"title":"A computational study for demand-wise shared protection","authors":"C. Gruber, A. Koster, S. Orlowski, R. Wessäly, A. Zymolka","doi":"10.1109/DRCN.2005.1563902","DOIUrl":"https://doi.org/10.1109/DRCN.2005.1563902","url":null,"abstract":"In this paper, we compare the new resilience mechanism demand-wise shared protection (DSP) with dedicated and shared path protection. The computational study on five realistic network planning scenarios reveals that that the best solutions for DSP are on average 15% percent better than the corresponding 1+1 dedicated path protection solutions, and only 15% percent worse than shared path protection.","PeriodicalId":415896,"journal":{"name":"DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Scaling protection to the needs of metro optical networking 扩展保护,满足城域光网络的需求
H. Hinderthür, L. Friedrich
The predominant transmission technology today is still SONET/SDH. Most of the service level agreements service providers have with their customers are based on the characteristics of SONET/SDH protection mechanisms. Therefore significant effort has been spent to transfer the principles of SONET/SDH protection and self healing rings to WDM technology. Mandatory functionality of the protection scheme is protection switching within 50 ms switch-over time, and a permanent monitoring capability for both paths in order to manage switching after path restoration. This leads to DWDM protection schemes like O-UPSR or O-BLSR which are WDM equivalents to the well known UPSR and BLSR schemes from the SONET/SDH world. One major characteristic of those schemes is the protection of the entire end to end path per individual channel. End to end protection in a WDM network means full redundancy in all network sections, i.e. redundant fibre traces and line equipment, redundant filter stages and redundant active WDM channel cards. The switching mechanism takes place either on the application layer or on the tributary side of the channel cards: if the working path fails the protection channel card tributary interface goes active. This means protection is done on the single wavelength level. Looking at service level agreements among numerous service providers it is learned that typical contractually guaranteed availabilities in the metro arena range from 98.000% to 99.990%. O-UPSR or O-BLSR typically outperforms this benchmark at the cost of extremely high capital expenditure (CAPEX). Alternative protection schemes that are characterized by a lower level of redundancy inside the WDM terminals could cut down CAPEX by up to 50%. The logical consequence when reducing the redundancy in a network is an increase of the possible network downtime. Whereas in a path protected WDM terminal channel cards, channel filters and band filter stages are redundant, those alternative protection schemes introduce some sort of path switch in any stage of a WDM terminal such as line, wavelength band, single wavelength or even between line and tributary side of a WDM channel card. Due to this introduction of a single point of failure the probability for service interruption in such an alternatively protected network necessarily increases in some way. But service providers do not leave their network downtime to chance. They are used to plan and design networks according to well defined network availability numbers. The network availability is mainly based on three parameters: Mean time between failure (MTBF) value of transmission equipment, mean time to repair (MTTR) value of transmission equipment, and downtime of fibre per year and kilometer. Based on assumptions that are specific for metro networks the paper gives an overview over different protection schemes for WDM systems. Each protection scheme is explained and characterized by typical configuration, level of redundancy, level of netw
目前主要的传输技术仍然是SONET/SDH。服务提供商与其客户签订的大多数服务水平协议都是基于SONET/SDH保护机制的特征。因此,将SONET/SDH保护和自愈环的原理转移到WDM技术上已经花费了大量的努力。保护方案的强制功能是在50毫秒的切换时间内进行保护切换,以及对两条路径的永久监控能力,以便在路径恢复后管理切换。这导致了像O-UPSR或O-BLSR这样的DWDM保护方案,它们相当于SONET/SDH世界中众所周知的UPSR和BLSR方案。这些方案的一个主要特点是保护每个单独信道的整个端到端路径。WDM网络中的端到端保护意味着所有网络部分的完全冗余,即冗余的光纤走线和线路设备、冗余的滤波器级和冗余的有源WDM信道卡。交换机制发生在应用层或通道卡的支路侧:如果工作路径失败,保护通道卡支路接口激活。这意味着保护是在单波长水平上完成的。查看众多服务提供商之间的服务水平协议,可以了解到城域领域中典型的合同保证可用性范围从98.000%到99.990%。O-UPSR或O-BLSR通常以极高的资本支出(CAPEX)为代价优于该基准。另一种保护方案的特点是WDM终端内部的冗余程度较低,可以减少高达50%的资本支出。减少网络冗余的逻辑结果是增加可能的网络停机时间。然而在路径保护的WDM终端信道卡中,信道滤波器和频带滤波器级是冗余的,这些可选的保护方案在WDM终端的任何一级引入某种路径开关,例如线路、波长带、单波长,甚至在WDM信道卡的线路和支路侧之间。由于引入了单点故障,在这种可选保护的网络中,服务中断的概率必然以某种方式增加。但服务提供商不会让他们的网络宕机纯属偶然。它们用于根据定义良好的网络可用性数字来规划和设计网络。网络的可用性主要基于三个参数:传输设备的平均故障间隔时间(MTBF)值、传输设备的平均修复时间(MTTR)值、光纤的年、公里停机时间。基于城域网络的特定假设,本文概述了WDM系统的不同保护方案。每个保护方案都通过典型配置、冗余级别、实现的网络可用性级别和使用的保护触发机制来解释和描述。城域WDM系统能够反映网络保护中的这种可变性,服务提供商将能够根据他们必须提供的服务水平协议(SLA)精确地扩展他们的基础设施冗余级别。
{"title":"Scaling protection to the needs of metro optical networking","authors":"H. Hinderthür, L. Friedrich","doi":"10.1109/DRCN.2005.1563856","DOIUrl":"https://doi.org/10.1109/DRCN.2005.1563856","url":null,"abstract":"The predominant transmission technology today is still SONET/SDH. Most of the service level agreements service providers have with their customers are based on the characteristics of SONET/SDH protection mechanisms. Therefore significant effort has been spent to transfer the principles of SONET/SDH protection and self healing rings to WDM technology. Mandatory functionality of the protection scheme is protection switching within 50 ms switch-over time, and a permanent monitoring capability for both paths in order to manage switching after path restoration. This leads to DWDM protection schemes like O-UPSR or O-BLSR which are WDM equivalents to the well known UPSR and BLSR schemes from the SONET/SDH world. One major characteristic of those schemes is the protection of the entire end to end path per individual channel. End to end protection in a WDM network means full redundancy in all network sections, i.e. redundant fibre traces and line equipment, redundant filter stages and redundant active WDM channel cards. The switching mechanism takes place either on the application layer or on the tributary side of the channel cards: if the working path fails the protection channel card tributary interface goes active. This means protection is done on the single wavelength level. Looking at service level agreements among numerous service providers it is learned that typical contractually guaranteed availabilities in the metro arena range from 98.000% to 99.990%. O-UPSR or O-BLSR typically outperforms this benchmark at the cost of extremely high capital expenditure (CAPEX). Alternative protection schemes that are characterized by a lower level of redundancy inside the WDM terminals could cut down CAPEX by up to 50%. The logical consequence when reducing the redundancy in a network is an increase of the possible network downtime. Whereas in a path protected WDM terminal channel cards, channel filters and band filter stages are redundant, those alternative protection schemes introduce some sort of path switch in any stage of a WDM terminal such as line, wavelength band, single wavelength or even between line and tributary side of a WDM channel card. Due to this introduction of a single point of failure the probability for service interruption in such an alternatively protected network necessarily increases in some way. But service providers do not leave their network downtime to chance. They are used to plan and design networks according to well defined network availability numbers. The network availability is mainly based on three parameters: Mean time between failure (MTBF) value of transmission equipment, mean time to repair (MTTR) value of transmission equipment, and downtime of fibre per year and kilometer. Based on assumptions that are specific for metro networks the paper gives an overview over different protection schemes for WDM systems. Each protection scheme is explained and characterized by typical configuration, level of redundancy, level of netw","PeriodicalId":415896,"journal":{"name":"DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A theory for setting the "safety margin" on availability guarantees in an SLA 在SLA中设置可用性保证的“安全边际”的理论
Ling Zhou, W. Grover
A Service Level Agreement (SLA) is a contract between provider and customer that stipulates certain Quality of Service guarantees. One parameter of an SLA can be the maximum downtime guaranteed over the contract time. If the actual outage exceeds the guarantee, the customer is unhappy and the operator may bear financial penalties. It is important therefore that a network operator not only have some way to estimate or calculate the theoretical long-term availability of the services offered, but some basis for also determining a safety factor on the total outage time promised to a customer on any finite-term contract. As the period gets shorter, either nothing will go wrong and the effective availability will be perfect or if a single outage occurs, the unavailability may seem very bad. More generally, the question is how a network operator can build in theoretically justified safety factors on the availability a customer may experience over a finite-term contract. We are told that most service providers give availability guarantees based empirically on experience and historical statistics. A simple theory is thus proposed to help refine these methods for SLA policy setting. A simulation study is implemented to verify the theory within the axioms it assumes to be true.
SLA (Service Level Agreement)是服务提供商和客户之间的合同,规定了一定的服务质量保证。SLA的一个参数可以是合同时间内保证的最大停机时间。如果实际停机超过保证时间,客户会不满意,运营商可能会承担经济处罚。因此,重要的是,网络运营商不仅要有一些方法来估计或计算所提供服务的理论长期可用性,而且要有一些基础来确定在任何有限期限合同中承诺给客户的总停机时间的安全系数。随着周期越来越短,要么什么都不会出错,有效可用性将是完美的,要么如果发生一次中断,不可用性可能看起来非常糟糕。更一般地说,问题是网络运营商如何在客户在有限期限合同中可能体验到的可用性中建立理论上合理的安全因素。我们被告知,大多数服务提供商根据经验和历史统计数据提供可用性保证。因此,提出了一个简单的理论来帮助改进这些SLA策略设置方法。通过仿真研究验证了该理论在其假设为真的公理范围内的正确性。
{"title":"A theory for setting the \"safety margin\" on availability guarantees in an SLA","authors":"Ling Zhou, W. Grover","doi":"10.1109/DRCN.2005.1563899","DOIUrl":"https://doi.org/10.1109/DRCN.2005.1563899","url":null,"abstract":"A Service Level Agreement (SLA) is a contract between provider and customer that stipulates certain Quality of Service guarantees. One parameter of an SLA can be the maximum downtime guaranteed over the contract time. If the actual outage exceeds the guarantee, the customer is unhappy and the operator may bear financial penalties. It is important therefore that a network operator not only have some way to estimate or calculate the theoretical long-term availability of the services offered, but some basis for also determining a safety factor on the total outage time promised to a customer on any finite-term contract. As the period gets shorter, either nothing will go wrong and the effective availability will be perfect or if a single outage occurs, the unavailability may seem very bad. More generally, the question is how a network operator can build in theoretically justified safety factors on the availability a customer may experience over a finite-term contract. We are told that most service providers give availability guarantees based empirically on experience and historical statistics. A simple theory is thus proposed to help refine these methods for SLA policy setting. A simulation study is implemented to verify the theory within the axioms it assumes to be true.","PeriodicalId":415896,"journal":{"name":"DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Network reliability under mixed IP and optical protection 混合IP和光保护下的网络可靠性
Christian Awad, B. Sansò, A. Girard
In this article, we extend previous work showing that DiffServ can provide some QoS guarantees to both realtime and non real-time traffic in the event of the failure of an optical component. Even though DiffServ cannot totally replace optical protection in a network, it might be able to do so to some degree. In this paper, we study a 4-node linear topology which can be protected by DiffServ, DiffProtect or even a combination of both (MixProtect). We evaluate the performance of all protection combinations which enables us to study the extent to which we could replace optical protection by DiffServ in a particular network. Results have shown that replacing optical protection by DiffServ cannot be done randomly, the number and positions of DiffServ protected links versus DiffProtect's must be carefully chosen in order to guarantee maximum performance to all traffic types.
在本文中,我们扩展了以前的工作,表明在光学组件发生故障的情况下,DiffServ可以为实时和非实时流量提供一些QoS保证。尽管DiffServ不能完全取代网络中的光保护,但它可能在某种程度上做到这一点。在本文中,我们研究了一个可以由DiffServ、DiffProtect甚至两者的组合(MixProtect)来保护的4节点线性拓扑。我们评估了所有保护组合的性能,这使我们能够研究在特定网络中用DiffServ取代光保护的程度。结果表明,用DiffServ代替光保护不能随机完成,必须仔细选择DiffServ保护链路与DiffProtect保护链路的数量和位置,以保证所有流量类型的最大性能。
{"title":"Network reliability under mixed IP and optical protection","authors":"Christian Awad, B. Sansò, A. Girard","doi":"10.1109/DRCN.2005.1563864","DOIUrl":"https://doi.org/10.1109/DRCN.2005.1563864","url":null,"abstract":"In this article, we extend previous work showing that DiffServ can provide some QoS guarantees to both realtime and non real-time traffic in the event of the failure of an optical component. Even though DiffServ cannot totally replace optical protection in a network, it might be able to do so to some degree. In this paper, we study a 4-node linear topology which can be protected by DiffServ, DiffProtect or even a combination of both (MixProtect). We evaluate the performance of all protection combinations which enables us to study the extent to which we could replace optical protection by DiffServ in a particular network. Results have shown that replacing optical protection by DiffServ cannot be done randomly, the number and positions of DiffServ protected links versus DiffProtect's must be carefully chosen in order to guarantee maximum performance to all traffic types.","PeriodicalId":415896,"journal":{"name":"DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125575010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enabling flexible working using hybrid IP VPNs 使用混合IP vpn实现灵活的工作
T. Hubbard
The premise of this paper is based on the simple marketing concept that work should be an activity not a location, it is something people do and not somewhere they go. This simple marketing concept has been enabled by the availability of new technology, new applications, and new services from an array of vendors and service providers. These technologies, applications, and services include: secure connectivity using SSL, IPSec, and MPLS based IP VPNs; high speed broadband access using Wi-Fi, xDSL, and UMTS; applications including telephony, video, email, and Internet services can run on laptops, personal data assistants (PDAs), and smartphones; the separation of network and service following the introduction of telephony and video call servers; and devices can be secured and protected using personal firewalls, intrusion detection, anti virus, and bio-metric access. By bringing together all this technology as a service offering, enterprises are able to securely extend their corporate IT infrastructures and applications to locations, remote workers, and home workers irrespective of where they happen to be. This paper looked at how these technologies can be brought together to make work an activity not a location.
本文的前提是基于简单的营销概念,即工作应该是一种活动,而不是一个地点,它是人们做的事情,而不是他们去的地方。这个简单的营销概念是由来自一系列供应商和服务提供商的新技术、新应用程序和新服务的可用性实现的。这些技术、应用和服务包括:使用SSL、IPSec和基于MPLS的IP vpn的安全连接;使用Wi-Fi、xDSL和UMTS的高速宽带接入;包括电话、视频、电子邮件和互联网服务在内的应用程序可以在笔记本电脑、个人数据助理(pda)和智能手机上运行;随着电话和视频呼叫服务器的引入,网络和业务分离;设备可以使用个人防火墙、入侵检测、反病毒和生物识别访问来保护和保护。通过将所有这些技术作为服务产品组合在一起,企业能够安全地将其企业IT基础设施和应用程序扩展到位置、远程工作人员和家庭工作人员,而不管他们身在何处。本文研究了如何将这些技术结合起来,使工作成为一种活动,而不是一个地点。
{"title":"Enabling flexible working using hybrid IP VPNs","authors":"T. Hubbard","doi":"10.1109/NETWKS.2004.240682","DOIUrl":"https://doi.org/10.1109/NETWKS.2004.240682","url":null,"abstract":"The premise of this paper is based on the simple marketing concept that work should be an activity not a location, it is something people do and not somewhere they go. This simple marketing concept has been enabled by the availability of new technology, new applications, and new services from an array of vendors and service providers. These technologies, applications, and services include: secure connectivity using SSL, IPSec, and MPLS based IP VPNs; high speed broadband access using Wi-Fi, xDSL, and UMTS; applications including telephony, video, email, and Internet services can run on laptops, personal data assistants (PDAs), and smartphones; the separation of network and service following the introduction of telephony and video call servers; and devices can be secured and protected using personal firewalls, intrusion detection, anti virus, and bio-metric access. By bringing together all this technology as a service offering, enterprises are able to securely extend their corporate IT infrastructures and applications to locations, remote workers, and home workers irrespective of where they happen to be. This paper looked at how these technologies can be brought together to make work an activity not a location.","PeriodicalId":415896,"journal":{"name":"DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.","volume":"38 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1