期刊文献+
共找到636篇文章
< 1 2 32 >
每页显示 20 50 100
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
1
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Partitioned k-Exclusion Real-Time Locking Protocol Motivated by Multicore Multi-GPU Systems
2
作者 Mao-Lin Yang Hang Lei +1 位作者 Yong Liao Ze-Wei Chen 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第3期193-198,共6页
Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due ... Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due to the lack in framework for real-time analysis. In order to guarantee real-time requirements while maintaining system utilization ~in modern heterogeneous systems, such as multicore multi-GPU systems, a novel suspension-based k-exclusion real-time locking protocol and the associated suspension-aware schedulability analysis are proposed. The proposed protocol provides a synchronization framework that enables multiple GPUs to be efficiently integrated in multicore real-time systems. Comparative evaluations show that the proposed methods improve upon the existing work in terms of schedulability. 展开更多
关键词 Embedded systems graphic processing units(GPUs) heterogeneous systems locking protocols MULTICORE real-time systems
下载PDF
Real-Time Communication Method for mHealth Base on Extended XMPP Protocol
3
作者 Chenjie Shi Yu Fang 《Communications and Network》 2013年第3期590-595,共6页
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ... Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework. 展开更多
关键词 MHEALTH XMPP protocol real-time Communication
下载PDF
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
4
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor Network real-time Routing protocol Contention-Based Scheme Beaconless
下载PDF
Improvement Design for Distributed Real-Time Stream Processing Systems 被引量:4
5
作者 Wei Jiang Liu-Gen Xu +1 位作者 Hai-Bo Hu Yue Ma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第1期3-12,共10页
In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of ... In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of horizontal scalability and high throughput, which is manly deployed in many areas in order to address the problem of speed mismatch between message producers and consumers. When using Kafka, we need to quickly receive data sent by producers. In addition, we need to send data to consumers quickly. Therefore, the performance of Kafka is of critical importance to the performance of the whole stream processing system. In this paper, we propose the improved design of real-time stream processing systems, and focus on improving the Kafka's data loading process.We use Kafka cat to transfer data from the source to Kafka topic directly, which can reduce the network transmission. We also utilize the memory file system to accelerate the process of data loading, which can address the bottleneck and performance problems caused by disk I/O. Extensive experiments are conducted to evaluate the performance, which show the superiority of our improved design. 展开更多
关键词 Kafka Kafka CAT memory FILE SYSTEM messagE QUEUE real-time STREAM processing SYSTEM
下载PDF
Integration of naval distributed tactical training simulation system based on advanced message queuing protocol 被引量:2
6
作者 柳玉 Wen Jiayan Ji Daqin 《High Technology Letters》 EI CAS 2016年第4期385-394,共10页
Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protoc... Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange. 展开更多
关键词 tactical simulation message middleware advanced message queuing protocol(AMQP) software architecture distributed interactive simulation
下载PDF
A Secure Short Message Communication Protocol 被引量:1
7
作者 Chao-Wen Chang Heng Pan Hong-Yong Jia 《International Journal of Automation and computing》 EI 2008年第2期202-207,共6页
According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the stan... According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application. 展开更多
关键词 Short messaging service security protocol subscriber identity module (SIM) tool kit (STK) AUTHENTICATION mobile
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
8
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded Internet terminal (EIT) algorithm information security
下载PDF
IPC Mechanisms in Satellite Real-Time Microkernel Operating System
9
作者 刘晓冬 李莲治 +1 位作者 郭福顺 朱力群 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1998年第4期72-75,共4页
One of the most important features of modem minor satellites is to realize autonomous moving. The perfomance of the satellite autonomous computer operating system acting as the control center is of utrnost importance.... One of the most important features of modem minor satellites is to realize autonomous moving. The perfomance of the satellite autonomous computer operating system acting as the control center is of utrnost importance. The recent trend in operating system development is adopting microkernel architecture that holds such advantages as microminiaturization, modularity, portability and extendibility. IPC is the key of microkernel design. Message-based IPC mechanism is generally used in existing microkernel Operating system. It is of consistency, safety and reliability.However, it can not provide efficient support for real-time applications in satellite systems and it only applies to loose coupling multi-processor architecture. In this paper, an improvement solution for existing message-based IPC is proposed at first to obtain real-time performance. Then a new IPC mechanism is designed. It particulary applies to shared memory tight coupling multi-processor architecture. 展开更多
关键词 SATELLITE MICROKERNEL real-time IPC MECHANISM messagE
下载PDF
Transmission Considerations with QoS Support to Deliver Real-Time Distributed Speech Recognition Applications
10
作者 Zhu Xiao-gang Zhu Hong-wen Rong Meng-tian 《Wuhan University Journal of Natural Sciences》 EI CAS 2002年第1期65-70,共6页
Distributed speech recognition (DSR) applications have certain QoS (Quality of service) requirements in terms of latency, packet loss rate, etc. To deliver quality guaranteed DSR application over wirelined or wireless... Distributed speech recognition (DSR) applications have certain QoS (Quality of service) requirements in terms of latency, packet loss rate, etc. To deliver quality guaranteed DSR application over wirelined or wireless links, some QoS mechanisms should be provided. We put forward a RTP/RSVP transmission scheme with DSR-specific payload and QoS parameters by modifying the present WAP protocol stack. The simulation result shows that this scheme will provide adequate network bandwidth to keep the real-time transport of DSR data over either wirelined or wireless channels. 展开更多
关键词 distributed speech recognition quality of service real-time transmission protocol resource reservation protocol wireless application protocol
下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
11
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 Internet control message protocol support vector machine covert tunnel network analysis
下载PDF
An On-Line Scheduler over Hard Real-Time Communication System
12
作者 CHEN Hui XIONG Guangze(School of Computer Science and Engineering,UESTC Chengdu 610054 China) 《Journal of Electronic Science and Technology of China》 2003年第1期47-53,共7页
By thorough research on the prominent periodic and aperiodic scheduling algorithms,anon-line hard real-time scheduler is presented,which is applicable to the scheduling of packets over a link.This scheduler,based on b... By thorough research on the prominent periodic and aperiodic scheduling algorithms,anon-line hard real-time scheduler is presented,which is applicable to the scheduling of packets over a link.This scheduler,based on both Rate Monotonic,pinwheel scheduling algorithm Sr and Polling Serverscheduling algorithms,can rapidly judge the schedulability and then automatically generate a bus tablefor the scheduling algorithm to schedule the packets as the periodic packets.The implementation of thescheduler is simple and easy to use,and it is effective for the utilization of bus link.The orderly executionof the bus table can not only guarantee the performance of the hard real time but also avoid the blockageand interruption of the message transmission.So the scheduler perfectly meets the demand of hard real-time communication system on the field bus domain. 展开更多
关键词 hard real-time communication advanced real-time communication scheduler(ARTCS) on-line scheduler bus scheduling table messagE
下载PDF
基于MQTT协议的轻量化文本信息分发技术研究
13
作者 熊风光 陈霖 +3 位作者 韩慧妍 张元 庞敏 焦世超 《计算机技术与发展》 2024年第2期90-97,共8页
随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题... 随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题。针对文本信息在卫星通信网络下的分发过程存在效率低下、可靠性不高的问题,设计一种基于MQTT(Message Queuing Telemetry Transport)协议的轻量化文本信息分发技术。该技术使用MQTT协议作为消息传输协议,在文本信息分发前对MQTT协议进行主题设计、发布订阅机制设计、设备连接设计以及设备心跳设计,确保设备之间的连通性;在文本信息的分发过程中,设计数据校验加密算法、文本信息轻量化处理方法和离线消息存储机制,保证文本信息分发的安全性、可靠性。实验结果表明:相较于传统的基于JSON数据的文本信息分发技术,该技术在提高文本信息分发效率的同时,可确保信息分发的安全性、完整性和稳定性。 展开更多
关键词 MQTT协议 轻量化 文本信息分发 数据加密 离线消息存储
下载PDF
一种基于区块链的MQTT协议优化算法
14
作者 高焜 刘泽辉 +3 位作者 高伟 张雨柔 赵勇彪 琚贇 《电力信息与通信技术》 2024年第5期10-16,共7页
通信协议的设计已然成为实现设备与互联网通信的重要支撑,其覆盖了整个物联网系统的各个环节。针对传统物联网协议中关键数据被伪造或篡改的安全问题,文章设计了一种在数据传输过程中使用区块链技术来保证传输数据安全的改进消息队列遥... 通信协议的设计已然成为实现设备与互联网通信的重要支撑,其覆盖了整个物联网系统的各个环节。针对传统物联网协议中关键数据被伪造或篡改的安全问题,文章设计了一种在数据传输过程中使用区块链技术来保证传输数据安全的改进消息队列遥测传输(message queue telemetry transmission,MQTT)协议,进而保证了存储在broker的数据不被恶意篡改。通过仿真实验证明,该方法具有高效、轻量以及易实现等多方面的特点,在保护物联网的数据安全方面效果十分显著。 展开更多
关键词 MQTT协议 区块链 消息代理服务器 物联网 安全
下载PDF
语音实验室端到端即时通信认证协议设计
15
作者 何锴 《现代电子技术》 北大核心 2024年第11期18-21,共4页
为保证语音实验室端到端即时通信安全,确保语音内容不被窃听和篡改,提出一种基于混合加解密的语音实验室端到端即时通信认证协议的设计方法。利用RSA方法加解密发送方传输的即时通信会话密钥,通过3DES方法将发送方发送的明文语音信息进... 为保证语音实验室端到端即时通信安全,确保语音内容不被窃听和篡改,提出一种基于混合加解密的语音实验室端到端即时通信认证协议的设计方法。利用RSA方法加解密发送方传输的即时通信会话密钥,通过3DES方法将发送方发送的明文语音信息进行加解密。在加解密过程中,加密信息打包为加密包后发送至信息接收方,信息接收方获取加密包后,使用RSA方法、3DES方法进行有效的密钥解密认证、明文语音消息解密,获取语音实验室端到端的明文语音信息。实验结果显示,此协议使用下,语音实验室端到端即时通信的认证加速比提升,且仅在密钥输入内容准确的情况下,信息接收方才可得到准确的明文语音消息内容,且不存在内容失真问题。 展开更多
关键词 语音实验室 端到端 即时通信 认证协议 RSA算法 3DES方法 密钥加解密 明文加解密
下载PDF
基于改进K-means的AODV路由协议
16
作者 陈成鹏 查文文 +3 位作者 潘伟豪 汤先美 辜丽川 许正荣 《合肥学院学报(综合版)》 2024年第2期83-90,共8页
AODV路由协议是无线自组织网络中的经典协议,被广泛应用于各种通讯场景中。传统的AODV路由协议在路由发现阶段使用广播方法转发RREQ(路由请求分组),容易造成广播风暴从而影响网络性能。针对该问题,研究提出了基于改进K-means的AODV路由... AODV路由协议是无线自组织网络中的经典协议,被广泛应用于各种通讯场景中。传统的AODV路由协议在路由发现阶段使用广播方法转发RREQ(路由请求分组),容易造成广播风暴从而影响网络性能。针对该问题,研究提出了基于改进K-means的AODV路由协议,使用节点间距离、传输错误数和路由拥塞度作为路由度量,利用密集度参数改进初始聚类中心的选择,设计AODV-K路由协议选择最佳转发节点以减少不必要的路由请求分组转发,提高了路由请求分组的转发效率并减少了路由拥塞。运用NS-3对协议进行仿真,仿真结果表明所提出的改进路由协议,在高网络负载和网络密度下,对比原AODV路由协议,在平均端到端延迟方面分别降低了26.1%和25.6%。当节点数在30、40、50时,在分组投递率方面平均提升13.7%,当每秒发送分组数据包数大于30时,分组投递率平均提高了11.3%。 展开更多
关键词 无线自组织网络 AODV路由协议 路由度量 K-MEANS聚类 消息转发机制
下载PDF
基于Ether CAT协议的伺服性能分析工具设计及应用
17
作者 谢希杨 李翔龙 侯欢 《自动化应用》 2024年第6期164-168,共5页
随着工业控制领域对于实时性和精确性要求的不断提高,EtherCAT总线技术在伺服控制系统中得到广泛应用,而伺服系统的性能对于实现精准的运动控制具有重要意义。因此,提出了一种基于EtherCAT报文数据的伺服性能分析方法。首先,利用Wiresh... 随着工业控制领域对于实时性和精确性要求的不断提高,EtherCAT总线技术在伺服控制系统中得到广泛应用,而伺服系统的性能对于实现精准的运动控制具有重要意义。因此,提出了一种基于EtherCAT报文数据的伺服性能分析方法。首先,利用Wireshark网络封包软件截取EtherCAT通信数据,并导出为pcapng文件格式,然后,根据EtherCAT协议的报文规范,采用VC++对其进行解析,以获得过程数据对象,最后,利用这些数据对象分析伺服系统的定位误差、位置跟踪误差、位置稳定时间和定位时间。EtherCAT报文解析工具的设计为伺服性能分析提供了一种新的思路和工具支持。 展开更多
关键词 EtherCAT协议 伺服系统 伺服性能 报文分析
下载PDF
基于区块链的征信系统消息转移协议
18
作者 陈丽燕 《计算机应用与软件》 北大核心 2024年第2期8-13,79,共7页
目前征信个人隐私保护系统中的消息转移只实现了单向信任转移,对申请方的责任未做确认,因此,无法建立消息转移双方的双向信任关系,无法实现公正性;此外,消息转移过程也存在安全隐患。提出一个基于区块链的征信系统消息转移协议,该协议... 目前征信个人隐私保护系统中的消息转移只实现了单向信任转移,对申请方的责任未做确认,因此,无法建立消息转移双方的双向信任关系,无法实现公正性;此外,消息转移过程也存在安全隐患。提出一个基于区块链的征信系统消息转移协议,该协议要求消息转移的双方需要完成顺序的签署确认,借助于区块链的共识机制和附加协议、加密算法等技术保障消息安全转移,具有公正性、隐私性。此外,还提供了消息的追加、更新和删除等功能。最后,分析了本协议的公正性、隐私性和不可抵赖性。 展开更多
关键词 区块链 智能合约 征信信息 隐私保护 消息转移协议
下载PDF
基于WebSocket协议的消息安全推送系统设计与实现
19
作者 徐智勇 戴祖旭 《武汉工程大学学报》 CAS 2024年第3期310-316,共7页
为节约应用系统的带宽资源,提高客户端接收消息的可靠性和安全性,设计了一个独立的消息安全推送系统,提供开放的接口供应用系统调用。客户端向应用系统请求有时延风险的业务时,首先触发与推送系统的WebSocket连接,获取客户标识和密钥,... 为节约应用系统的带宽资源,提高客户端接收消息的可靠性和安全性,设计了一个独立的消息安全推送系统,提供开放的接口供应用系统调用。客户端向应用系统请求有时延风险的业务时,首先触发与推送系统的WebSocket连接,获取客户标识和密钥,然后携带标识再次与应用系统发起HTTP连接办理业务。在耗时业务处理过程中,客户端无需与应用系统保持长连接。应用系统完成业务后,将响应消息连同客户标识通过HTTP连接转发给推送系统缓存。推送系统将多位客户的响应消息打包加密成一条密文推送到客户端,客户端解密得到请求的业务结果。推送系统基于Golang语言和MySQL数据库实现,对外提供符合表述性状态转移(REST)架构的通用接口。功能测试结果表明,客户端能准确接收来自推送系统的消息,实现了预期功能。 展开更多
关键词 消息推送 机密性 时延 WebSocket协议
下载PDF
电文通信中间件在中南股份特棒PCS的研究和应用
20
作者 吴衍聪 冯立冬 陈宇曦 《南方金属》 CAS 2024年第4期37-39,54,共4页
阐述基于TCP/IP Socket的电文通信中间件在中南股份特棒过程控制系统(PCS)的应用。电文通信中间件采用TCP/IP协议,静态套接字(Socket)同步通信机制,通过创建Socket、绑定、监听、接受信息和关闭套接字实现与MES系统、PLC系统间的数据交... 阐述基于TCP/IP Socket的电文通信中间件在中南股份特棒过程控制系统(PCS)的应用。电文通信中间件采用TCP/IP协议,静态套接字(Socket)同步通信机制,通过创建Socket、绑定、监听、接受信息和关闭套接字实现与MES系统、PLC系统间的数据交互,并对通信电文数据校验,数据清洗、数据转换、数据存储。从电文定义、数据格式、通信过程等介绍电文的通信规约,在遵循通信规约的前提下,可在不同的操作系统、不同编程语言开发的应用程序间进行电文通信,提供了简单易用、高效可靠的分布应用开发和通信平台,可快速高效开发稳定可靠的分布式应用。 展开更多
关键词 电文 套接字 协议 通信
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部