期刊文献+

基于NetBIOS名字服务获取MAC地址的原理及实现 被引量:4

Principle and implementation of obtaining MAC based on NetBIOS name service
下载PDF
导出
摘要 为了在大型计算机实验室管理过程中快速获取远程计算机的MAC地址,基于对NetBIOS名字服务基本原理的研究,分析了相关的NODE STATUS REQUEST和NODE STATUS RESPONSE两个数据结构.在Windows环境下,使用套接字技术实现了快速获取远程主机MAC地址的服务程序.给出了NODE STATUS REQUEST和NODE STATUS RESPONSE两个数据包结构的C语言定义及获取MAC地址之程序的基本流程,并在Windows平台上用Visual C++2010实现了该获取信息的程序.结果表明:本获取MAC地址的方法简单快捷,可批量获取MAC地址,为位于局域网内计算机的自动化管理及基于MAC地址的应用等工作奠定基础. To rapidly obtain MAC address of remote host in the management of large computer lab, the two data structures of NODE STATUS REQUEST and NODE STATUS RESPONSE were analyzed based on the fundamental principle of NetBIOS name service. Under Windows condition, the computer service program was used to quickly achieve MAC address of remote host by socket technology. The definitions of C structures of NODE STATUS REQUEST and NODE STATUS RESPONSE were provided with the basic procedure of obtaining MAC address. The obtaining information program was implemented based on Visual C + +2010 on Windows. The results show that the proposed method is simple to obtain MAC address in batch, and can provide a base of the computer automated management in LAN and the application based on MAC address.
出处 《江苏大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第3期306-311,共6页 Journal of Jiangsu University:Natural Science Edition
基金 高等学校博士学科点专项科研基金资助项目(20124105110004)
关键词 MAC地址 NetBIOS名字服务 nbtstat 远程主机 套接字 MAC NetBIOS name service nbtstat remote host socket
  • 相关文献

参考文献11

  • 1Zhu Jing, Roy Sumit. A 802. 11 Based slotted dual-channel reservation MAC protocol for in-building muhi- hop networks [ J ]. Mobib, Networks and Applications, 2005, 10 (5) :593 - 606.
  • 2刘波,齐德昱,段丽艳,张艳青.基于IP广播的计算机远程唤醒机制及其实现[J].计算机应用研究,2004,21(7):237-238. 被引量:8
  • 3Jimeno M, Christensen K, Nordman B. A network con- nection proxy to enable hosts to sleep and save energy [ C ] //Proceedings of 2008 IEEE International Perfor- mance, Computing, and Communications Conference. Piscataway : IEEE ,2008 : 101 - 110.
  • 4沈泓,范亚芹.企业局域网机密信息传输系统设计[J].吉林大学学报(信息科学版),2009,27(3):324-328. 被引量:5
  • 5伍红兵.如何获取网卡的MAC地址[J].计算机应用,2001,21(9):99-100. 被引量:3
  • 6Seet P K, Lee B S, Gay R K L. NETBIOS implementa- tion and performance study of different network operating systems[J]. Computer Communications, 1991, 14(1): 5 -14.
  • 7Chutatape O. Performance evaluation and application of IPX network protocol in flexible manufacturing system [C] //Proceedings of 1996 IEEE Conference on Emer- ging Technologies and Factory Automation. Piscataway: IEEE, 1996 : 602 - 608.
  • 8Network Working Group. Protocol standard for a Net- BIOS service on a TCP/UDP transport: detailed specifi- cations[R]. RFC 1002,1987. URL: https://tools. ietf. org/rfc/rfcl002, txt.
  • 9Zurutuza U, Uribeetxeberria R, Zamboni D. A data mining approach for analysis of worm activity through au- tomatic signature generation [ C ] //Proceedings of the ACM Conference on Computer and Communications Secu- rity. New York : ACM, 2008:61 - 70.
  • 10Alonso A, Porras S, Garitano I, et al. On the visualiza- tion of honeypot data through projection techniques [C]//Proceedings of the 10th International Conference on Computational and Mathematical Methods in Science and Engineering. Almeria, Spain: CMMSE, 2010: 1038 - 1049.

二级参考文献16

  • 1WILLIAM STALLINGS.密码编码学与网络安全:原理与实践[M].第2版.杨明,胥光辉,齐望东,等译.北京:电子工业出版社,2004.
  • 2LIU Yu-cheng, GLENN A GIBSON. Microcomputer Systems; the 8086/8088 Family Architucture Programming and Design [M].[S. l]: Prentice Hall, 1998: 199-209.
  • 3ZADEH L A. Fuzzy Logic, Neural Network and Soft Computing [J]. Communications of the ACM, 1994, 37 (3) : 77- 84.
  • 4LUCC, TSENG S Y. Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter [ C] ,//Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors. [ S. l. ] : IEEE, 2002 : 277-285.
  • 5ANDREWNASH,WILLIAM DUANE,CELELIA JOSEPH,et al.公钥基础设施(PKI):实现和管理电子安全[M].北京:清华大学出版社,2004.
  • 6LIAN Feng-li, MOYNEJ J R, TILBURY D M. Performance Evaluation of Control Networks : Ethernet, Control Net and Device Net [J]. IEEE Control Systems Magazine, 2001, 21 (1) : 61-83.
  • 7林永,张乐强.Visual Basic 6.0用户编程手册[M].北京:人民邮电出版社,2006.
  • 8TIIOMIJSSIJ J P. A Review of Field Buses [J]. Annual Reviews in Control, 1998, 22 (3) : 35-45.
  • 9李毅.私钥与公钥使用安全.软件学报,2005,14(3):26-29.
  • 10[3]Christian Huitema.因特网路由技术[M].北京:清华大学出版社,1998.

共引文献13

同被引文献23

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部