期刊文献+

二进制数据流通用翻译框架及实现 被引量:1

General framework and its implementation for translating binary data flow
下载PDF
导出
摘要 为了辅助xDSL Modem开发人员做好固件程序的测试工作,提出了一个通用的二进制数据流翻译方案。它能够根据某个协议标准将Modem产生的二进制数据流转换成人们容易理解的形式,从而帮助开发人员快速判定Modem中的固件程序是否符合那个协议标准。同时,为了保证翻译程序不受协议版本变动的影响,将协议标准的内容以协议规则的形式存于外部文件。不同于现有的描述方式,提出了一个灵活且完备的协议规则描述方式,指出了协议规则应具备的10个属性。最后,实现了一个原型系统,并以国际通信联盟标准事业部的G.994.1协议标准为例验证了该翻译方案的有效性。 To facilitate testing of firmware of xDSL Modem for developers, a generalized translation approach of binary data flow is proposed. This approach can translate binary data flow generated by Modem into easy understanding format according to some protocol standard, so that the developers can quickly determine whether or not that firmware complies with these standards. Meanwhile, for assuring that translation program is not influenced by the version changes of proto-col standard, the content of protocol standard is stored at an external file in protocol rule format. Distinguishing with the existing method, a flexible and completed description method of protocol rules is designed. Finally, a prototype is imple-mented and G.994.1 protocol standard is used as an example to validate the effectiveness of the approach.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第20期5-10,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.61300095) 广东省自然科学基金(No.S2012040011123) 广东省教育厅高校优秀青年创新人才培育项目(No.2012LYM_0065)
关键词 翻译算法 数据翻译 协议规则 协议解析 translation algorithm data translation protocol rule protocol analysis
  • 相关文献

参考文献17

  • 1刘超,林基明.多用户VDSL2系统远端串扰抵消算法[J].计算机工程与科学,2014,36(4):627-633. 被引量:1
  • 2周洁,王勇,陶晓玲,郭航舵.G.inp在ADSL2和VDSL2上的应用研究[J].计算机工程与设计,2013,34(11):3811-3814. 被引量:1
  • 3高瑶,李有明,洪顺利,金明.用户下线时抑制串音的自更新算法[J].电子学报,2012,40(7):1368-1371. 被引量:2
  • 4R&D and Lab VDSL2 protocol analyzer[EB/OL].[2015-03-10].http://tracespan.com/wp-content/uploads/2015/03/VDSL_Xpert_Brochure.pdf.
  • 5朱利,常飞,何金星,米玥,田元强.实时异构集成数据自适应模板解析算法[J].计算机工程与应用,2012,48(19):243-248. 被引量:1
  • 6Li Hai,Yu Yueyue,Liu Chang,et al.A protocol analysis platform based on open source software[C]//2012 2nd International Conference on Instrumentation,Measurement,Computer,Communication and Control,2012:846-849.
  • 7Jiang X T,He J B.A multi-standard-supporting and general communication protocol parsing system design[C]//2011 IEEE International Conference on Information and Automation,Shenzhen,China,2011:716-719.
  • 8潘璠,洪征,周振吉,吴礼发.语义层次的协议格式提取方法[J].通信学报,2013,34(10):162-173. 被引量:10
  • 9ITU-T/SG15.Recommendation ITU-T G.994.1 Handshake procedures for Digital Subscriber Line(DSL)transceivers[EB/OL].(2012-06-12).http://www.itu.int/-rec/T-RECG.994.1-201206-I.
  • 10Krajsa O,Silhavy P,Sysel P.Filterbank modulation techniques and its utilization in ADSL systems[C]//34th International Conference on Telecommunications and Signal Processing,2011:514-517.

二级参考文献52

  • 1汪坤.VDSL2串音消除的关键技术[J].现代电信科技,2007(3):52-58. 被引量:3
  • 2Issam Wahibi, Meryem Ouzzif, Jerome Le Masson, Samir Saoudi. Crosstalk cancellation in upstream coordinated DSL using an iterative MMSE receive [ A ]. IEEE International Conference on Communications [C]. Dresden, 2009.1 - 5.
  • 3Amir Leshem,Li Youming.A low complexity linear precoding technique for multichannel VDSL [J].IEEE Transactions on Signal Processing, 2007,55 (11) : 5527 - 5534.
  • 4S M Zafaruddin, Piyush Agrawal. Krylov algorithms for FEXT cancellation in upstream MIMO VDSL [ A ]. National Conference on Communications [C]. Chennai,2010.1 - 5.
  • 5John Homer, Mandar Gujrathi, Raphael Cendrillon, I Vaughan L Clarkson, Marc Moonen. Adaptive NLMS partial crosstalk cancellation in digital subscriber lines [ A]. Fortieth Asilomar Conference on Signal, System and Computers [ C ]. Pacific Grove, CA,2006. 1385 - 1389.
  • 6William W Hager. Updating the inverse of a matrix [J]. SIAM Review, 1989,31(02) :221 - 239.
  • 7CUI W, KANNAN J, WANG H. Discoverer: automatic protocol re- verse engineering from network traces[A]. The 16th USENIX Security Symposium[C]. Boston, Sheraton, USA, 2007. 199-212.
  • 8CABALLERO J, YIN H, LIANG Z, et al. Polyglot: automatic extrac- tion of protocol format using dynamic binary analysis[A]. ACM CCS[C]. Alexandria, VA, USA, 2007.317-329.
  • 9CUI W, PEINADO M, CHEN K, et al. Tupni: automatic reverse engi- neering of input formats[A]. ACM CCS[C]. Alexandria, VA, USA, 2008. 391-402.
  • 10CABALLERO J, POOSANKAM P, KREIBICH C, et al. Dispatcher: enabling active botnet infiltration using automatic protocol Re- verse-engineering[A]. ACM CCS[C]. Chicago, IL, USA, 2009. 621-634.

共引文献10

同被引文献19

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部