期刊文献+
共找到627篇文章
< 1 2 32 >
每页显示 20 50 100
Improving Throughput of Transmission Control Protocol Using Cross LayerApproach
1
作者 Jansi Rani Sella Veluswami 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1231-1239,共9页
Most of the internet users connect through wireless networks. Majorpart of internet traffic is carried by Transmission Control Protocol (TCP). It hassome design constraints while operated across wireless networks. TCP... Most of the internet users connect through wireless networks. Majorpart of internet traffic is carried by Transmission Control Protocol (TCP). It hassome design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestionin the network, TCP used acknowledgment to delivery of packets by the end host.In wired network, packet loss signals congestion in the network. But rather inwireless networks, loss is mainly because of the wireless characteristics such asfading, signal strength etc. When a packet travels across wired and wireless networks, TCP congestion control theory faces problem during handshake betweenthem. This paper focuses on finding this misinterpretation of the losses using crosslayer approach. This paper focuses on increasing bandwidth usage by improvingTCP throughput in wireless environments using cross layer approach and hencenamed the proposed system as CRLTCP. TCP misinterprets wireless loss as congestion loss and unnecessarily reduces congestion window size. Using the signalstrength and frame error rate, the type of loss is identified and accordingly theresponse of TCP is modified. The results show that there is a significant improvement in the throughput of proposed TCP upon which bandwidth usage isincreased. 展开更多
关键词 BANDWIDTH wireless networks transmission control protocol THROUGHPUT
下载PDF
A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network
2
作者 郭强 朱杰 张海滨 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期245-249,共5页
OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Trans... OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Transmission Prot ocol) based OAM, i.e., SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its tran sport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experim ental results prove the proposed SOAM system achieves better performance on sign aling transmission compared with conventional TCP based OAM system. 展开更多
关键词 stream control transmission protocol (SCTP) operations administration and maintenance (OAM) signaling transmission 3G cellular network
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
3
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
4
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
5
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 internet control message protocol support vector machine covert tunnel network analysis
下载PDF
Cloud control for IIoT in a cloud-edge environment
6
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
下载PDF
Multi-Stage Image Compression-Decompression System Using PCA/IPCA to Enhance Wireless Transmission Security
7
作者 Ali A. Ibrahim Thura Ali Khalaf Bashar Mudhafar Ahmed 《Journal of Computer and Communications》 2022年第4期87-96,共10页
The goal of this paper is to propose a fast and secure multi-stage image compression-decompression system by using a wireless network between two Personal Computers (PCs). In this paper, the Principal Component Analys... The goal of this paper is to propose a fast and secure multi-stage image compression-decompression system by using a wireless network between two Personal Computers (PCs). In this paper, the Principal Component Analysis (PCA) technique is used for multi-stage image compression and Inverse Principal Component Analysis (IPCA) for multi-stage image decompression. The first step of the proposed system is to select the input image, the second step is to perform PCA up to 9 times on the input image, this compression, and after multi-stage compression process then the third step begins by transforming across wireless Ad hoc Network (WANET) to the second computing device, forth step start with multi-stage decompression process up 9 times. The proposed system for different images is transferred over the wireless network using Transmission Control Protocol/Internet Protocol (TCP/IP), which is programmed using the network role property of the MATLAB program. The proposed system implements 25 different images correctly (100%). The main contribution of this paper is that we are dealing with the black image at the end of the compressed process ad start with a black image at the start of the decompressed process of this proposed system. In this work, the compressed and uncompressed images are compared with each other in their size and transmission time. This system can be very useful in networks because they provide a high level of protection to the transmitted data from hackers because they cannot guess how much the image has been compressed or what kind of information the image represents. 展开更多
关键词 Principle Component Analysis Inverse Principle Component Analysis Wireless Ad Hoc Network transmission control protocol/internet protocol
下载PDF
AN ENHANCEMENT SCHEME OF TCP PROTOCOL IN MOBILE AD HOC NETWORKS:MME-TCP
8
作者 Kai Caihong Yu Nenghai Chen Yuzhong 《Journal of Electronics(China)》 2007年第1期1-9,共9页
Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple m... Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple metrics measurement is proposed to improve TCP performance in MANETs. Multi-metric Measurement based Enhancement of TCP (MME-TCP) designs the metrics and the identification algorithm according to the characteristics of MANETs and the experiment results. Furthermore,these metrics are measured at the sender node to reduce the overhead of control information over networks. Simulation results show that MME-TCP mechanism achieves a significant performance improvement over standard TCP in MANETs. 展开更多
关键词 Ad hoc networks transmission control protocol (TCP) Network states End-to-end metrics Identification algorithms
下载PDF
网络多媒体传输协议在物联网音频监控系统中的应用
9
作者 游才文 《电声技术》 2024年第9期139-141,共3页
介绍网络多媒体传输协议的基本原理,探讨其在音频监控中的应用,包括音频数据捕获、编码、传输、接收及解码等环节。基于此,设计一个基于网络多媒体传输协议的物联网音频监控系统架构,并对其功能进行设计。最后进行系统运行测试,验证该... 介绍网络多媒体传输协议的基本原理,探讨其在音频监控中的应用,包括音频数据捕获、编码、传输、接收及解码等环节。基于此,设计一个基于网络多媒体传输协议的物联网音频监控系统架构,并对其功能进行设计。最后进行系统运行测试,验证该架构的可行性和有效性。 展开更多
关键词 网络多媒体传输协议 物联网 音频监控 系统架构
下载PDF
基于光纤传输的高速数据传输控制技术研究
10
作者 蒋云鹏 《电气传动自动化》 2024年第4期48-51,共4页
随着互联网的快速发展,数据传输速度的要求也在不断提高。因此,研究高速数据传输技术具有重要意义。首先,对光纤传输技术进行了深入探讨,分析了光纤传输的原理和特点。其次,针对高速数据传输,提出了一种基于CSMA/CA协议与退避算法的高... 随着互联网的快速发展,数据传输速度的要求也在不断提高。因此,研究高速数据传输技术具有重要意义。首先,对光纤传输技术进行了深入探讨,分析了光纤传输的原理和特点。其次,针对高速数据传输,提出了一种基于CSMA/CA协议与退避算法的高速数据传输控制技术。最后,本文对高速数据传输控制技术进行了实验验证。实验结果表明,基于光纤传输的高速数据传输控制技术可以显著提高数据传输速度。同时,该技术还具有较好的实用性和稳定性。 展开更多
关键词 光纤传输 高速数据传输 控制技术 CSMA/CA协议
下载PDF
传输控制中的确认机制研究 被引量:1
11
作者 李彤 郑凯 徐恪 《软件学报》 EI CSCD 北大核心 2024年第4期1993-2021,共29页
Internet传输层协议需要依赖于确认(ACK)机制提供的反馈信息,实现拥塞控制和可靠传输等功能.以Internet传输协议演化的历史为线索,回顾传输控制领域中的确认机制,并讨论现有确认机制中需要解决的问题;基于“类型-触发条件-信息”三要素... Internet传输层协议需要依赖于确认(ACK)机制提供的反馈信息,实现拥塞控制和可靠传输等功能.以Internet传输协议演化的历史为线索,回顾传输控制领域中的确认机制,并讨论现有确认机制中需要解决的问题;基于“类型-触发条件-信息”三要素,提出按需确认机制及其设计原则,重点分析确认机制和拥塞控制、丢包恢复等传输协议子模块之间的耦合关系;结合设计原则,详细阐述一种可行的按需确认机制实现——TACK机制,并对相关概念进行系统的、深入的分析和澄清.最后结合按需确认机制面临的挑战,给出几个有意义的研究方向. 展开更多
关键词 传输协议 确认机制 拥塞控制 丢包恢复 按需确认
下载PDF
一种基于区块链的MQTT协议优化算法 被引量:1
12
作者 高焜 刘泽辉 +3 位作者 高伟 张雨柔 赵勇彪 琚贇 《电力信息与通信技术》 2024年第5期10-16,共7页
通信协议的设计已然成为实现设备与互联网通信的重要支撑,其覆盖了整个物联网系统的各个环节。针对传统物联网协议中关键数据被伪造或篡改的安全问题,文章设计了一种在数据传输过程中使用区块链技术来保证传输数据安全的改进消息队列遥... 通信协议的设计已然成为实现设备与互联网通信的重要支撑,其覆盖了整个物联网系统的各个环节。针对传统物联网协议中关键数据被伪造或篡改的安全问题,文章设计了一种在数据传输过程中使用区块链技术来保证传输数据安全的改进消息队列遥测传输(message queue telemetry transmission,MQTT)协议,进而保证了存储在broker的数据不被恶意篡改。通过仿真实验证明,该方法具有高效、轻量以及易实现等多方面的特点,在保护物联网的数据安全方面效果十分显著。 展开更多
关键词 MQTT协议 区块链 消息代理服务器 物联网 安全
下载PDF
基于嵌入式Internet的工业控制 被引量:45
13
作者 陶波 丁汉 熊有伦 《测控技术》 CSCD 2001年第8期5-9,共5页
嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本... 嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本文综述了现场总线控制网络、以太网和现场总线混合控制网络 ,提出了基于嵌入式Internet的控制网络模型 ,并从开放性、互连性、分散性的角度探讨了控制网络与Internet集成的发展趋势 。 展开更多
关键词 工业控制 嵌入式internet 远程监控 现场总线 传感器
下载PDF
Internet端到端拥塞控制研究综述 被引量:8
14
作者 刘拥民 蒋新华 +1 位作者 年晓红 鲁五一 《计算机科学》 CSCD 北大核心 2008年第2期6-12,共7页
本文描述了Internet中端对端拥塞控制技术的内容和特点,分析了标准化拥塞控制算法所涉及的技术难点及不足,概括了拥塞控制算法的发展历程,并根据目前最新的研究情况,提出把控制与优化理论引入网络拥塞控制的思路,最后总结出进一步的研... 本文描述了Internet中端对端拥塞控制技术的内容和特点,分析了标准化拥塞控制算法所涉及的技术难点及不足,概括了拥塞控制算法的发展历程,并根据目前最新的研究情况,提出把控制与优化理论引入网络拥塞控制的思路,最后总结出进一步的研究趋势和方向。 展开更多
关键词 internet 拥塞控制 TCP协议 控制理论 端对端
下载PDF
基于Internet的远程测控技术 被引量:39
15
作者 曹军义 刘曙光 《国外电子测量技术》 2001年第6期17-21,共5页
本文从工业控制技术发展出发,结合 Internet技术给出了基于 Internet远程控制系统的组成,详细分析了远程测控技术的现状,最后介绍了基于Internet远程测控系统的应用和前景。
关键词 internet 远程测控技术 现场总线 TCP/IP 交换式以太网 故障诊断 互操作
下载PDF
Modbus TCP协议安全风险分析及对策研究
16
作者 马如坡 王群 +1 位作者 尹强 高谷刚 《信息网络安全》 CSCD 北大核心 2024年第11期1710-1720,共11页
工业互联网作为新一代信息技术与工业系统深度融合的产物,正推动着工业生产方式的变革。然而,工控网络协议在设计之初因注重效率提升和功能实现忽视了一些安全性问题,加之应用中的安全漏洞和异常行为,导致其存在严峻的安全隐患。文章介... 工业互联网作为新一代信息技术与工业系统深度融合的产物,正推动着工业生产方式的变革。然而,工控网络协议在设计之初因注重效率提升和功能实现忽视了一些安全性问题,加之应用中的安全漏洞和异常行为,导致其存在严峻的安全隐患。文章介绍了工业互联网的发展背景、趋势和工控网络协议特点,分析了当前应用最广泛的典型工控网络协议Modbus TCP的安全风险,研究了数据加密、数据完整性检测、身份认证及异常入侵检测等安全对策,提出一套Modbus TCP协议安全方案。该方案包含采用AES算法和RSA算法的数据加密和解密模块、采用SM3算法的数据完整性检测模块、采用动态口令认证技术的身份认证模块和基于数据特征的异常入侵检测系统,同时引入PKI进一步加强工控系统的安全性,为其他工控网络协议的安全防范提供借鉴和参考。 展开更多
关键词 工业互联网 工控网络协议 MODBUS TCP 安全风险分析
下载PDF
基于Internet的实时控制系统的传输协议 被引量:2
17
作者 黄杰 吴平东 +2 位作者 修震 马树元 陈之龙 《计算机工程》 EI CAS CSCD 北大核心 2005年第2期110-111,共2页
为了在Inertnet内实现实时控制,需要开发基于Internet的实时控制系统的传输协议。提出了该协议的设计方案,完全符合TCP/IP协议标准,并且在运输层同时支持TCP协议和UDP协议。以该协议为基础,开发了基于Internet的实时控制系统实验平台,... 为了在Inertnet内实现实时控制,需要开发基于Internet的实时控制系统的传输协议。提出了该协议的设计方案,完全符合TCP/IP协议标准,并且在运输层同时支持TCP协议和UDP协议。以该协议为基础,开发了基于Internet的实时控制系统实验平台,实验表明该协议能在Internet上进行远程控制。 展开更多
关键词 实时控制系统 传输协议 TCP/IP协议 TCP协议 远程控制 实验平台 UDP协议
下载PDF
基于Internet的工业机器人的远程控制 被引量:6
18
作者 汤双清 付建科 +1 位作者 施仲光 廖道训 《计算机应用研究》 CSCD 北大核心 2002年第6期151-153,共3页
随着国际互联网的高速发展 ,制造行业的生产和组织管理发生了根本的变化。尤其进入 2 0世纪 90年代后期 ,敏捷制造、全球化制造、动态企业联盟和虚拟企业相继诞生了 ,这标志着制造理念已经完全进入一个更高、更新的层面。为了适应这种... 随着国际互联网的高速发展 ,制造行业的生产和组织管理发生了根本的变化。尤其进入 2 0世纪 90年代后期 ,敏捷制造、全球化制造、动态企业联盟和虚拟企业相继诞生了 ,这标志着制造理念已经完全进入一个更高、更新的层面。为了适应这种新形势 ,这就要求能对制造系统中的机器人实施远程控制。将从现代制造系统中工业机器人的控制着手 ,讨论机器人远程控制策略及其实现途径 ,以及远程可视化实现方法。 展开更多
关键词 现代制造系统 通信协议 internet 工业机器人 远程控制
下载PDF
基于Internet的机器人实时双向遥操作 被引量:3
19
作者 孙立宁 谢小辉 +1 位作者 杜志江 富立新 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期146-150,164,共6页
基于服务质量的时延、时延振荡、带宽需求和丢包率,认为传输控制协议是一个安全的协议,而UDP(用户数据包协议)是一个相对实时的协议.因此在实际情况中,可针对不同的数据类型选择相应的协议.使用UDP协议控制数据时有包丢失问题,可采取冗... 基于服务质量的时延、时延振荡、带宽需求和丢包率,认为传输控制协议是一个安全的协议,而UDP(用户数据包协议)是一个相对实时的协议.因此在实际情况中,可针对不同的数据类型选择相应的协议.使用UDP协议控制数据时有包丢失问题,可采取冗余发射的方式加以克服.在基于Internet的机器人遥操作系统中有网络时延问题,影响整个系统的稳定性、透明性和实时性.使用UDP协议使系统具有了实时性的同时,不影响系统的稳定、透明和同步.使用力、图像、声音、温度等多模态反馈能够提高系统性能和安全性,但各个模态之间存在同步问题,用事件驱动的方法可解决此问题. 展开更多
关键词 遥操作 用户数据包协议 事件驱动方法
下载PDF
Internet中分组丢弃缓存管理技术的研究 被引量:3
20
作者 温蜀山 李乐民 孙海荣 《通信学报》 EI CSCD 北大核心 2002年第7期98-106,共9页
Internet中,基于分组丢弃的缓存管理技术是分组转发设备的重要功能模块,其算法对网络性能会产生重大影响。本文对现有主要的分组丢弃技术及其派生算法作了总结,并就存在的问题和不足提出了研究建议。
关键词 internet 分组丢弃 缓存管理 传输控制协议 随机早期检测 最长队列丢弃
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部