期刊文献+
共找到635篇文章
< 1 2 32 >
每页显示 20 50 100
A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network
1
作者 郭强 朱杰 张海滨 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期245-249,共5页
OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Trans... OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Transmission Prot ocol) based OAM, i.e., SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its tran sport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experim ental results prove the proposed SOAM system achieves better performance on sign aling transmission compared with conventional TCP based OAM system. 展开更多
关键词 stream control transmission protocol (SCTP) operations administration and maintenance (OAM) signaling transmission 3G cellular network
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
2
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
3
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
4
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 internet control message protocol support vector machine covert tunnel network analysis
下载PDF
Improving Throughput of Transmission Control Protocol Using Cross LayerApproach
5
作者 Jansi Rani Sella Veluswami 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1231-1239,共9页
Most of the internet users connect through wireless networks. Majorpart of internet traffic is carried by Transmission Control Protocol (TCP). It hassome design constraints while operated across wireless networks. TCP... Most of the internet users connect through wireless networks. Majorpart of internet traffic is carried by Transmission Control Protocol (TCP). It hassome design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestionin the network, TCP used acknowledgment to delivery of packets by the end host.In wired network, packet loss signals congestion in the network. But rather inwireless networks, loss is mainly because of the wireless characteristics such asfading, signal strength etc. When a packet travels across wired and wireless networks, TCP congestion control theory faces problem during handshake betweenthem. This paper focuses on finding this misinterpretation of the losses using crosslayer approach. This paper focuses on increasing bandwidth usage by improvingTCP throughput in wireless environments using cross layer approach and hencenamed the proposed system as CRLTCP. TCP misinterprets wireless loss as congestion loss and unnecessarily reduces congestion window size. Using the signalstrength and frame error rate, the type of loss is identified and accordingly theresponse of TCP is modified. The results show that there is a significant improvement in the throughput of proposed TCP upon which bandwidth usage isincreased. 展开更多
关键词 Bandwidth wireless networks transmission control protocol throughput
下载PDF
Multi-Stage Image Compression-Decompression System Using PCA/IPCA to Enhance Wireless Transmission Security
6
作者 Ali A. Ibrahim Thura Ali Khalaf Bashar Mudhafar Ahmed 《Journal of Computer and Communications》 2022年第4期87-96,共10页
The goal of this paper is to propose a fast and secure multi-stage image compression-decompression system by using a wireless network between two Personal Computers (PCs). In this paper, the Principal Component Analys... The goal of this paper is to propose a fast and secure multi-stage image compression-decompression system by using a wireless network between two Personal Computers (PCs). In this paper, the Principal Component Analysis (PCA) technique is used for multi-stage image compression and Inverse Principal Component Analysis (IPCA) for multi-stage image decompression. The first step of the proposed system is to select the input image, the second step is to perform PCA up to 9 times on the input image, this compression, and after multi-stage compression process then the third step begins by transforming across wireless Ad hoc Network (WANET) to the second computing device, forth step start with multi-stage decompression process up 9 times. The proposed system for different images is transferred over the wireless network using Transmission Control Protocol/Internet Protocol (TCP/IP), which is programmed using the network role property of the MATLAB program. The proposed system implements 25 different images correctly (100%). The main contribution of this paper is that we are dealing with the black image at the end of the compressed process ad start with a black image at the start of the decompressed process of this proposed system. In this work, the compressed and uncompressed images are compared with each other in their size and transmission time. This system can be very useful in networks because they provide a high level of protection to the transmitted data from hackers because they cannot guess how much the image has been compressed or what kind of information the image represents. 展开更多
关键词 Principle Component Analysis Inverse Principle Component Analysis Wireless Ad Hoc Network transmission control protocol/internet protocol
下载PDF
AN ENHANCEMENT SCHEME OF TCP PROTOCOL IN MOBILE AD HOC NETWORKS:MME-TCP
7
作者 Kai Caihong Yu Nenghai Chen Yuzhong 《Journal of Electronics(China)》 2007年第1期1-9,共9页
Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple m... Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple metrics measurement is proposed to improve TCP performance in MANETs. Multi-metric Measurement based Enhancement of TCP (MME-TCP) designs the metrics and the identification algorithm according to the characteristics of MANETs and the experiment results. Furthermore,these metrics are measured at the sender node to reduce the overhead of control information over networks. Simulation results show that MME-TCP mechanism achieves a significant performance improvement over standard TCP in MANETs. 展开更多
关键词 Ad hoc networks transmission control protocol (TCP) Network states End-to-end metrics Identification algorithms
下载PDF
Cloud control for IIoT in a cloud-edge environment
8
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
下载PDF
基于嵌入式Internet的工业控制 被引量:45
9
作者 陶波 丁汉 熊有伦 《测控技术》 CSCD 2001年第8期5-9,共5页
嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本... 嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本文综述了现场总线控制网络、以太网和现场总线混合控制网络 ,提出了基于嵌入式Internet的控制网络模型 ,并从开放性、互连性、分散性的角度探讨了控制网络与Internet集成的发展趋势 。 展开更多
关键词 工业控制 嵌入式internet 远程监控 现场总线 传感器
下载PDF
Internet端到端拥塞控制研究综述 被引量:8
10
作者 刘拥民 蒋新华 +1 位作者 年晓红 鲁五一 《计算机科学》 CSCD 北大核心 2008年第2期6-12,共7页
本文描述了Internet中端对端拥塞控制技术的内容和特点,分析了标准化拥塞控制算法所涉及的技术难点及不足,概括了拥塞控制算法的发展历程,并根据目前最新的研究情况,提出把控制与优化理论引入网络拥塞控制的思路,最后总结出进一步的研... 本文描述了Internet中端对端拥塞控制技术的内容和特点,分析了标准化拥塞控制算法所涉及的技术难点及不足,概括了拥塞控制算法的发展历程,并根据目前最新的研究情况,提出把控制与优化理论引入网络拥塞控制的思路,最后总结出进一步的研究趋势和方向。 展开更多
关键词 internet 拥塞控制 TCP协议 控制理论 端对端
下载PDF
基于Internet的远程测控技术 被引量:39
11
作者 曹军义 刘曙光 《国外电子测量技术》 2001年第6期17-21,共5页
本文从工业控制技术发展出发,结合 Internet技术给出了基于 Internet远程控制系统的组成,详细分析了远程测控技术的现状,最后介绍了基于Internet远程测控系统的应用和前景。
关键词 internet 远程测控技术 现场总线 TCP/IP 交换式以太网 故障诊断 互操作
下载PDF
基于Internet的实时控制系统的传输协议 被引量:2
12
作者 黄杰 吴平东 +2 位作者 修震 马树元 陈之龙 《计算机工程》 EI CAS CSCD 北大核心 2005年第2期110-111,共2页
为了在Inertnet内实现实时控制,需要开发基于Internet的实时控制系统的传输协议。提出了该协议的设计方案,完全符合TCP/IP协议标准,并且在运输层同时支持TCP协议和UDP协议。以该协议为基础,开发了基于Internet的实时控制系统实验平台,... 为了在Inertnet内实现实时控制,需要开发基于Internet的实时控制系统的传输协议。提出了该协议的设计方案,完全符合TCP/IP协议标准,并且在运输层同时支持TCP协议和UDP协议。以该协议为基础,开发了基于Internet的实时控制系统实验平台,实验表明该协议能在Internet上进行远程控制。 展开更多
关键词 实时控制系统 传输协议 TCP/IP协议 TCP协议 远程控制 实验平台 UDP协议
下载PDF
基于Internet的工业机器人的远程控制 被引量:6
13
作者 汤双清 付建科 +1 位作者 施仲光 廖道训 《计算机应用研究》 CSCD 北大核心 2002年第6期151-153,共3页
随着国际互联网的高速发展 ,制造行业的生产和组织管理发生了根本的变化。尤其进入 2 0世纪 90年代后期 ,敏捷制造、全球化制造、动态企业联盟和虚拟企业相继诞生了 ,这标志着制造理念已经完全进入一个更高、更新的层面。为了适应这种... 随着国际互联网的高速发展 ,制造行业的生产和组织管理发生了根本的变化。尤其进入 2 0世纪 90年代后期 ,敏捷制造、全球化制造、动态企业联盟和虚拟企业相继诞生了 ,这标志着制造理念已经完全进入一个更高、更新的层面。为了适应这种新形势 ,这就要求能对制造系统中的机器人实施远程控制。将从现代制造系统中工业机器人的控制着手 ,讨论机器人远程控制策略及其实现途径 ,以及远程可视化实现方法。 展开更多
关键词 现代制造系统 通信协议 internet 工业机器人 远程控制
下载PDF
基于Internet的机器人实时双向遥操作 被引量:3
14
作者 孙立宁 谢小辉 +1 位作者 杜志江 富立新 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期146-150,164,共6页
基于服务质量的时延、时延振荡、带宽需求和丢包率,认为传输控制协议是一个安全的协议,而UDP(用户数据包协议)是一个相对实时的协议.因此在实际情况中,可针对不同的数据类型选择相应的协议.使用UDP协议控制数据时有包丢失问题,可采取冗... 基于服务质量的时延、时延振荡、带宽需求和丢包率,认为传输控制协议是一个安全的协议,而UDP(用户数据包协议)是一个相对实时的协议.因此在实际情况中,可针对不同的数据类型选择相应的协议.使用UDP协议控制数据时有包丢失问题,可采取冗余发射的方式加以克服.在基于Internet的机器人遥操作系统中有网络时延问题,影响整个系统的稳定性、透明性和实时性.使用UDP协议使系统具有了实时性的同时,不影响系统的稳定、透明和同步.使用力、图像、声音、温度等多模态反馈能够提高系统性能和安全性,但各个模态之间存在同步问题,用事件驱动的方法可解决此问题. 展开更多
关键词 遥操作 用户数据包协议 事件驱动方法
下载PDF
Internet中分组丢弃缓存管理技术的研究 被引量:3
15
作者 温蜀山 李乐民 孙海荣 《通信学报》 EI CSCD 北大核心 2002年第7期98-106,共9页
Internet中,基于分组丢弃的缓存管理技术是分组转发设备的重要功能模块,其算法对网络性能会产生重大影响。本文对现有主要的分组丢弃技术及其派生算法作了总结,并就存在的问题和不足提出了研究建议。
关键词 internet 分组丢弃 缓存管理 传输控制协议 随机早期检测 最长队列丢弃
下载PDF
嵌入式Internet中TCP协议的设计与实现 被引量:13
16
作者 李金梁 景博 《微计算机信息》 北大核心 2005年第06Z期40-41,138,共3页
介绍了嵌入式Internet技术的概念和研究现状,以网络传感器为应用背景,对TCP/IP协议栈中的主要协议TCP进行了机制裁减和编程实现。该研究对于Internet技术能否在8位单片机上实现和应用有着重要而现实的意义。
关键词 嵌入式internet 传输控制协议TCP
下载PDF
Internet协议簇在楼宇自控中的应用 被引量:1
17
作者 王瑞华 王普 尹金玉 《北京工业大学学报》 CAS CSCD 北大核心 2004年第1期13-17,共5页
针对目前在楼宇自控中最流行的开放协议BACnet和LonWorks的弊端,探讨了Internet协议簇的发展以及在楼宇自控行业中的应用.针对HTTP协议只解决了一半互操作的问题,提出了用XML协议实现真正完全的基于组件的互操作.用XML语言编写了配置控... 针对目前在楼宇自控中最流行的开放协议BACnet和LonWorks的弊端,探讨了Internet协议簇的发展以及在楼宇自控行业中的应用.针对HTTP协议只解决了一半互操作的问题,提出了用XML协议实现真正完全的基于组件的互操作.用XML语言编写了配置控制器的文档实例,证明了它的可行性. 展开更多
关键词 楼宇自控 BACNET LONWORKS internet协议簇 XML
下载PDF
城市交通监控中的一种基于Internet的传输控制协议 被引量:1
18
作者 张伟 谭国真 丁男 《计算机工程与科学》 CSCD 北大核心 2010年第11期25-28,共4页
本文基于城市交通物联网及远程控制的发展趋势,提出一个设备无关的、可靠的、面向连接的传输控制协议,使各种交通设备的传输数据和控制命令能够以统一的数据格式进行表示和传输,并通过Internet来进行远程感知和控制。设计了设备和服务... 本文基于城市交通物联网及远程控制的发展趋势,提出一个设备无关的、可靠的、面向连接的传输控制协议,使各种交通设备的传输数据和控制命令能够以统一的数据格式进行表示和传输,并通过Internet来进行远程感知和控制。设计了设备和服务器间交互报文的数据格式,结合通信协议的原子性、次序性、实时性和容错性,实现了连接建立、数据传输、状态维护、丢包检测和重传机制、拥塞控制等关键技术。通过仿真和实验分析了可行性及传输性能。 展开更多
关键词 传输协议 交通监督 城市交通感知 远程控制
下载PDF
用Winsock在Internet上实现计算机远程控制 被引量:2
19
作者 李大伟 李大志 董立岩 《气象水文海洋仪器》 2010年第3期38-42,45,共6页
简要介绍了TCP/IP(Transmission Control Protocol/Internet Protocol)通讯协议、Windows Sockets(Winsock)和VisualC#6.0编程环境,阐述了利用Winsock和VisualC#6.0在Internet上实现计算机远程控制的原理和方法。计算机远程控制包括两... 简要介绍了TCP/IP(Transmission Control Protocol/Internet Protocol)通讯协议、Windows Sockets(Winsock)和VisualC#6.0编程环境,阐述了利用Winsock和VisualC#6.0在Internet上实现计算机远程控制的原理和方法。计算机远程控制包括两个部分:通讯部分和命令处理部分。通讯部分主要是通过调用Winsock中的函数来实现服务器端和客户端的连接与数据通讯。命令处理部分在VisualC6.0环境下编程实现,进行相应的命令处理。为了保证数据传输的正确性、顺序性和不重复,采用了面向连接的协议TCP,提供无边界的字节流的传输。计算机远程控制可以实现上传文件、下载文件、在服务器端执行文件、删除文件、搜索文件、注销当前用户、重新启动远程计算机、关闭远程计算机、键盘和鼠标的加锁与解锁、查看远程计算机的屏幕、进程管理、列出远程计算机的系统信息等功能。实践证明,这种方法是灵活有效而且可行的。 展开更多
关键词 WINSOCK internet API 协议 数据通讯 计算机远程控制 套接字
下载PDF
Internet综合业务模型和资源预留协议RSVP 被引量:1
20
作者 王茜 吴靖 +1 位作者 程时端 马健 《北京电信科技》 1999年第3期1-4,共4页
简要介绍了 Internet 综合业务模型的基本组成和实现机制, 并对 Internet 综合业务模型中提出的资源预留协议 R S V P 进行了简要说明和分析。
关键词 internet 综合业务 资源预留协议 RSVP
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部