期刊文献+

工业无线网络性能测试方法研究和实现 被引量:4

Research and Implementation of the Performance Testing Method for Industrial Wireless Network
下载PDF
导出
摘要 为了研究基于IEEE 802.15.4a的工业无线网络的实时通信性能,给出了基于该标准下的无线网络的实时性测试方法。设计了该方法的测试装置,实现了对该无线网络的实时性能指标的测试。测试结果表明,该测试方法可靠、稳定,能够有效地获取该无线控制网络的实时性能指标,为优化和改善工业无线网络通信提供了依据。 In order to research the real-time communication performance of the industrial wireless network based on CSS physical layer specifications of IEEE 802.15.4a standard,the test method for the real time performance of such network is given,and the test device based on this method has been designed for implementing the test of the performance index.The result of the test indicates that this method is reliable,stable and is able to effectively obtain the real-time performance indexes of this wireless control network;thus it provides basis for optimizing and improving communication performance of industrial wireless network.
出处 《自动化仪表》 CAS 北大核心 2011年第8期74-77,共4页 Process Automation Instrumentation
基金 国家科技部基金资助项目(编号:2009GJC00013) 上海市科委重点科研基金资助项目(编号:08160512100) 上海市科委国际合作基金资助项目(编号:08160705900) 上海市教委"机械电子工程"创新团队项目(编号:08160705900)
关键词 实时性能测试 无线网络 数据通信 操作系统 嵌入式 Real-time performance test Wireless network Data communication Operating system Embedded
  • 相关文献

参考文献4

二级参考文献109

  • 1李旻松,刘东远.无线工业控制的网络结构及协议研究[J].微计算机信息,2008(9):104-106. 被引量:2
  • 2顾瑞红,张宏科.基于ZigBee的无线网络技术及其应用[J].电子技术应用,2005,31(6):1-3. 被引量:148
  • 3苏理云,庞武.超宽带无线技术——短距离无线通信的前沿技术[J].技术与市场,2005,12(05A):35-35. 被引量:7
  • 4彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 5Simon D, Aboba B, and Hurst R. The EAP-TLS authentication protocol. RFC 5216, IETF, 2008.
  • 6Manulis M, Leroy D, and Koeune F. Authenticated wireless roaming via tunnels: making mobile guests feel at home. http://eprint.iacr.org/2008/382. pdf, 2008.
  • 7Vivek K and Vivek S A. Elliptic curve cryptography[C]. www.acm.org/ubiquity/volume_ 9/pf/v9i20_singh.pdf. ACM Ubiquity, 2008.
  • 8Canetti R and Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels (Full Version), http://eprint.iacr.org. 2001.
  • 9Bellare M, Canetti R, and Krawczyk H. A modular approach to the design and analysis of authentication and key exchange protocols[C]. Proceedings of the 30th ACM Symposium on Theory of Computing, Dallas, 1998: 419-428.
  • 10Tin Y S T, Vasanta H, Boyd C, and Nieto J M G. Protocols with security proofs for mobile applications[C]. Proceedings of the ACISP 2004, Sydney, July. 13-15, 2004: 358-369.

共引文献745

同被引文献13

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部