期刊文献+

单向信道的信息可靠传输机制研究 被引量:2

Research on mechanism of reliable information transmission over unidirectional channel
下载PDF
导出
摘要 提出了两级FEC的机制来解决单向信道的信息可靠传输的问题。数据包级FEC(第一级)通过添加冗余数据包来恢复传输过程中数据包的丢失。比特级FEC(第二级)通过添加冗余比特来纠正数据在传输过程中比特差错。鉴于包头信息是数据包级FEC的关键,提出数据包包头FEC机制来尽量保证包头信息的正确。提出的方案能很好地恢复丢失的数据包,特别是连续数据包的丢失,能很好地纠正比特差错。 This paper proposes a two stage Forward Error Correction(FEC) to solve the problem of reliable information transmission over undirectional channel.Packet-level FEC(stage one) is added across packets to correct packet losses due to congestion and route disruption.Bit-Level FEC(stage two) is then added to both application packets and stage-one FEC pack-ets to recover bits errors from the link layer.Because the packet header information is very important to packet-level FEC,packet header FEC is presented to guarantee the correctness of packet header information.The results show the present scheme can effectively recover the lost packets,especially the continuous lost packets,and significantly reduce the bit errors.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第24期88-92,共5页 Computer Engineering and Applications
基金 国家"十一五"科技支撑计划重大项目资助(No.2008BAH33B02)~~
关键词 单向信道 数据包级前向纠错 比特级前向纠错 unidirectional channel packet-level Forward Error Correction(FEC) bit-level Forward Error Correction(FEC)
  • 相关文献

参考文献13

  • 1Huang C W,Somsak S.An embedded packet train and adaptive FEC scheme for VolP over wired/wireless IP networks[C]//ICASSP 2006 Processings,Washington,2006:429-432.
  • 2Moreira J C, Farrell P G.Essentials of error-control coding[M]. Chichester: John Wiley and Sons,2006.
  • 3Ishibashi K, Ochiai H, Kohno R.Embedded forward error con- trol technique(EFECT) for low-rate but low latency eommuni- cation[J].IEEE Transactions on Wireless Communication, 2008,7 (5).
  • 4Al-Shaikhi A A, Ilow J.Vandermonde matrix packet-level FEC for joint recovery from errors and packet loss P1MRC[C]// IEEE Personal,Indoor and Mobile Radio Communieations(PIMRC 2008) ,Cannes,2008.
  • 5AI-Shaikhi A, How J.Packet oriented error correcting codes using Vandermonde matrices and shitt operators[C]//IEEE Wire- less Communications and Networking Conference(WCNC'08), Las Vegas,Nevada,2008.
  • 6姚文顶,李晖,陈立甲,许洪光.深空通信中喷泉码技术研究[J].系统工程与电子技术,2009,31(1):40-44. 被引量:10
  • 7谈云钢.基于单向卫星网络的丢包模型及UDP数据抗干扰编码研究[J].微型电脑应用,2009,25(2):4-7. 被引量:1
  • 8路利宁,余玉材,刘纯青.一种单向卫星网络中冗余递增的数据分发机制[J].科学技术与工程,2010,10(19):4668-4673. 被引量:3
  • 9Shan Yufeng.Adaptive two-stage FEC scheme for scalable video transmission over wireless networks[J].Signal Processing:Im- age Communication, 2009,24: 718-729.
  • 10Combinational methods for improvement of packet-loss recovery in distributed speech recognition[C]//ISCCSP 2008, St Ju- lians, 2008 : 825-830.

二级参考文献32

共引文献21

同被引文献16

  • 1Bell D E, LaPadula L J. Secure computer systems: Mathematical foundations[R]. MITRE CORP BEDFORD MA, 1973.
  • 2Ogurtsov N, O'Malley S, Spatscheck O, et al. Experimental results of covert channel limitation in one-way communication systems[C]// Network and Distributed System Security, Symposium on. IEEE Computer Society, 1997: 2-2.
  • 3Moskowitz I S, Miller A R. Simple tinting channels[C]//Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on. IEEE, 1994: 56-64.
  • 4Moskowitz I S, Kang M H. Covert channels-here to stay?[C]// Computer Assurance, 1994. COMPASS'94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security. Proceedings of the Ninth Annual Conference on. IEEE, 1994: 235-243.
  • 5Millen J K. Finite-State Noiseless Covert Channels[C]//CSFW. 1989, 89: 81-86,.
  • 6WrayJ C. An analysis of covert timing channels[J]. Journal of Computer Security, 1992, 1(3): 219-232.
  • 7Goldschlag D M. Several secure store and forward devices[C]// Proceedings of the 3rd ACIVi Conference on Computer and Communications Security. ACM, 1996: 129-137.
  • 8Kang M H, Moskowitz I S, Chincheck S. The pump: A decade of covert fun[C]//Computer Security Applications Conference, 21st Annual. IEEE, 2005:7 DD.-360.
  • 9基于安全隔离的不同信任域网络数据库交换[D].上海:上海交通大学,2004.
  • 10李小庆,赵晓东,曾庆凯.基于硬件虚拟化的单向隔离执行模型[J].JoumalofSoftware,2012,23(8),1.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部