期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
安全通信协议模型EABRA的设计
1
作者 夏阳 陆余良 蒋凡 《计算机工程》 CAS CSCD 北大核心 2003年第6期131-133,共3页
提出了一种安全的通信协议模型EABRA,通过该模型可以简单有效地实现网络安全通信。首先对EABRA协议系统、体系结构以及状态转换进行了细致的阐述,然后用ESTELLE语言对协议模型的实现过程进行了具体的描述,最后对EABRA协议模型进行了... 提出了一种安全的通信协议模型EABRA,通过该模型可以简单有效地实现网络安全通信。首先对EABRA协议系统、体系结构以及状态转换进行了细致的阐述,然后用ESTELLE语言对协议模型的实现过程进行了具体的描述,最后对EABRA协议模型进行了正确性验证。 展开更多
关键词 通信协议模型 EABRA协议 计算机网络 设计 网络安全
下载PDF
分布式系统同步通信协议模型的比较研究 被引量:2
2
作者 包达尔罕 《内蒙古民族大学学报(自然科学版)》 2015年第2期108-109,共2页
通信是分布式系统最基本的特征,其目的是支持位于不同地理位置、通过网络连接的软件应用之间的互操作.分布式系统的同步通信模式是阻塞式的,发送者要等待接收者应答之后才能继续处理自己的事务,用阻塞来表示等待响应.同步通信模型一般有... 通信是分布式系统最基本的特征,其目的是支持位于不同地理位置、通过网络连接的软件应用之间的互操作.分布式系统的同步通信模式是阻塞式的,发送者要等待接收者应答之后才能继续处理自己的事务,用阻塞来表示等待响应.同步通信模型一般有RPC、ORPC、CORBA和DCOM等.文章阐述了这几种模型的通信原理,并对它们应用机制作了对比研究. 展开更多
关键词 分布式系统 通信协议模型 同步 通信原理
下载PDF
自控网络综合分析与研究 被引量:6
3
作者 董春桥 张亚男 桑杭武 《电气自动化》 北大核心 2007年第4期3-5,10,共4页
自控网络是现代自动化系统的核心和基础,面对众多不同体系结构的自控网络,综合分析和研究自控网络的本质特征是非常重要的。通过对自控网络通信协议、信息模型、互操作模式和系统集成方式的抽象分析和研究,揭示了自控网络的本质特征和... 自控网络是现代自动化系统的核心和基础,面对众多不同体系结构的自控网络,综合分析和研究自控网络的本质特征是非常重要的。通过对自控网络通信协议、信息模型、互操作模式和系统集成方式的抽象分析和研究,揭示了自控网络的本质特征和基本框架,为开发和应用不同体系结构自控网络提供了一般性的分析和研究方法,同时也分析和研究了现代 IT 技术在自控网络中的应用方式和相关技术,并说明了自控网络的发展趋势。 展开更多
关键词 自控网络通信协议信息模型互操作 系统集成XML/Web SERVICES
下载PDF
建设统一高效的HFC网管平台
4
作者 宗瑞朝 《广播电视信息》 2008年第11期67-69,共3页
本文从HFC网管平台的作用入手,介绍其通信协议模型和如何建设统一高效的HFC网管平台,结合重庆网管平台建设案例,说明了统一平台带来的高效管理。
关键词 网管平台 HFC 通信协议模型 平台建设 高效管理
下载PDF
Analysis on the Security Enhancement Model of Communication System based on Chaotic Encryption and Analytic Hierarchy Process
5
作者 Qianfei Huang 《International Journal of Technology Management》 2016年第10期28-30,共3页
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by... In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result. 展开更多
关键词 Security Enhancement Communication System Chaotic Encryption Analytic Hierarchy Process
下载PDF
Channel Transmission Behavioral Modeling Dedicated to WSNs
6
作者 Nasreddine Nadim Boizard Jean Louis Christophe Escriba Fourniols Jean Yves 《Journal of Energy and Power Engineering》 2012年第7期1042-1049,共8页
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. G... The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena. 展开更多
关键词 WSN VHDL-AMS BER PER.
下载PDF
Covert voice over internet protocol communications based on spatial model 被引量:3
7
作者 HUANG YongFeng TANG ShanYu 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第1期117-127,共11页
This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without c... This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications. 展开更多
关键词 covert communication multimedia networking Vo IP data security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部