期刊文献+
共找到1,275篇文章
< 1 2 64 >
每页显示 20 50 100
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
1
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching internet protocol Security Virtual Private network Video Conferencing Voice over internet protocol JITTER End to End Delay
下载PDF
Principles of Network Security Protocols Based on Dynamic Address Space Randomization 被引量:1
2
作者 Vladimir Krylov Kirill Kravtsov 《通讯和计算机(中英文版)》 2016年第2期77-89,共13页
关键词 网络安全协议 地址空间 随机化 网络安全解决方案 原理 软件解决方案 网络节点 网络地址
下载PDF
LOA-RPL:Novel Energy-Efficient Routing Protocol for the Internet of Things Using Lion Optimization Algorithm to Maximize Network Lifetime
3
作者 Sankar Sennan Somula Ramasubbareddy +2 位作者 Anand Nayyar Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2021年第10期351-371,共21页
Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a c... Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a clustering protocol,the selection of a cluster head(CH)plays a key role in prolonging the lifetime of a network.However,most cluster-based protocols,including routing protocols for low-power and lossy networks(RPLs),have used fuzzy logic and probabilistic approaches to select the CH node.Consequently,early battery depletion is produced near the sink.To overcome this issue,a lion optimization algorithm(LOA)for selecting CH in RPL is proposed in this study.LOA-RPL comprises three processes:cluster formation,CH selection,and route establishment.A cluster is formed using the Euclidean distance.CH selection is performed using LOA.Route establishment is implemented using residual energy information.An extensive simulation is conducted in the network simulator ns-3 on various parameters,such as network lifetime,power consumption,packet delivery ratio(PDR),and throughput.The performance of LOA-RPL is also compared with those of RPL,fuzzy rule-based energyefficient clustering and immune-inspired routing(FEEC-IIR),and the routing scheme for IoT that uses shuffled frog-leaping optimization algorithm(RISARPL).The performance evaluation metrics used in this study are network lifetime,power consumption,PDR,and throughput.The proposed LOARPL increases network lifetime by 20%and PDR by 5%–10%compared with RPL,FEEC-IIR,and RISA-RPL.LOA-RPL is also highly energy-efficient compared with other similar routing protocols. 展开更多
关键词 internet of things cluster head clustering protocol optimization algorithm lion optimization algorithm network lifetime routing protocol wireless sensor networks energy consumption low-power and lossy networks
下载PDF
Embedded Internet环境下TCP/IP协议簇的约简 被引量:6
4
作者 韩光洁 赵海 +2 位作者 王金东 林涛 王济勇 《小型微型计算机系统》 CSCD 北大核心 2004年第9期1602-1606,共5页
基于 Em bedded Internet技术下 ,为了实现非 Internet设备信息的共享和访问 ,作者对 TCP/ IP协议簇进行系统的研究 ,提出在设备中嵌入 thin TCP/ IP协议栈并使其能够实现与网络的透明互联 .对 TCP/ IP协议簇进行尽最大可能的约简而不... 基于 Em bedded Internet技术下 ,为了实现非 Internet设备信息的共享和访问 ,作者对 TCP/ IP协议簇进行系统的研究 ,提出在设备中嵌入 thin TCP/ IP协议栈并使其能够实现与网络的透明互联 .对 TCP/ IP协议簇进行尽最大可能的约简而不使其失去标准和相应的机制 ,从而可以利用 TCP/ IP协议在设备与 Internet之间建立通讯联系 ,真正把设备纳入到网络的管理范围 ,实现设备的网络化和智能化管理 .设备中嵌入 TCP/ 展开更多
关键词 EMBEDDED internet TCP/ip协议栈 嵌入式 约简
下载PDF
Mobile Ad Hoc Network与Internet互联的技术研究 被引量:3
5
作者 胡中功 邹莉 沈斌 《武汉科技学院学报》 2005年第6期65-69,共5页
分析了移动IP和AODV协议的工作机理,对MANET与Internet互联的关键技术,包括协议转换、地址分配、网关发现、路由发现与数据传输等问题进行了详细的讨论,并对今后的研究工作进行了展望。
关键词 Mobile AD HOC network internet 移动ip AODV路由协议
下载PDF
嵌入式Internet系统中TCP/IP协议的实现 被引量:8
6
作者 钟建国 《陕西师范大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第4期16-19,共4页
分析了由8位和16位MCU组成的嵌入式系统的特点,研究了嵌入式系统中TCP/IP协议栈的体系结构,提出了嵌入式系统中TCP/IP协议选择的方法和功能裁剪的策略,阐述了嵌入式系统实现TCP/IP协议过程中需要解决的关键问题,给出了协议处理的总流程... 分析了由8位和16位MCU组成的嵌入式系统的特点,研究了嵌入式系统中TCP/IP协议栈的体系结构,提出了嵌入式系统中TCP/IP协议选择的方法和功能裁剪的策略,阐述了嵌入式系统实现TCP/IP协议过程中需要解决的关键问题,给出了协议处理的总流程.在对各协议控制字段进行深入分析的基础上,从编程和应用的角度给出了具体的解决方案和实现方法.实验表明,方案和方法对嵌入式Internet系统设计具有一定的参考价值. 展开更多
关键词 嵌入式系统 因特网 TCP/ip协议
下载PDF
基于IPSec的Internet密钥交换安全性分析 被引量:3
7
作者 罗仕漳 张颖江 《计算机与现代化》 2003年第1期36-48,54,共14页
介绍了一组IKE协议,分析了IKE协议中的安全特性,也分析了它们是如何抵制某些攻击的。
关键词 internet 密钥交换 安全性分析 ipSEC协议 安全联盟 虚拟专用网 混合型协议 通信协议
下载PDF
IP/DWDM光Internet中的一种公平智能QoS组播路由机制
8
作者 王兴伟 刘聪 +1 位作者 崔建业 黄敏 《计算机科学》 CSCD 北大核心 2005年第10期31-33,共3页
QoS(QualityofService)与组播是IP/DWDM光Internet中应该具备的基本能力。本文研究了IP/DWDM光Internet中的公平智能QoS组播路由机制。在所提出的机制中,QoS需求的区间表示形式体现了对柔性与异构QoS的支持;根据微观经济学理论,建立基于... QoS(QualityofService)与组播是IP/DWDM光Internet中应该具备的基本能力。本文研究了IP/DWDM光Internet中的公平智能QoS组播路由机制。在所提出的机制中,QoS需求的区间表示形式体现了对柔性与异构QoS的支持;根据微观经济学理论,建立基于Kelly/PSP模型的定价策略,体现组间公平性;使用下游链路均分方法在组成员之间分摊费用,体现组内公平性;基于点火耦合神经网络,建立智能QoS组播路由算法。以上各方面有机结合,构成IP/DWDM光Internet中的公平智能QoS组播路由机制。仿真结果表明,该机制是可行和有效的。 展开更多
关键词 ip/DWDM光internet QOS组播 路由 公平性 神经网络 微观经济学 internet QOS组播 路由机制 智能 耦合神经网络 组播路由算法 微观经济学 基本能力 表示形式
下载PDF
基于高速路由器的私有IP地址与Internet互联技术
9
作者 杨洪勇 孔祥新 宗广灯 《计算机工程》 CAS CSCD 北大核心 2003年第17期138-139,共2页
基于高速路由器设计技术,针对使用私有IP地址连入Internet所面临的安全性和可靠性问题,介绍了一种网络地址转换的路由技术,把内部私有IP 地址映射到外部地址。
关键词 私有ip地址 internet 网络地址转换 路由器
下载PDF
低冗余主动测量IP级Internet拓扑的一种数据修正方法
10
作者 张昕 赵海 李晓光 《计算机学报》 EI CSCD 北大核心 2012年第8期1700-1711,共12页
Internet拓扑的研究对于网络的应用与发展具有重要意义.由于交叉路由的存在,目前主动测量Internet拓扑大多采用多源点高冗余探测的方法,以发现单探测点情况下相对隐藏的链路.为降低探测难度与代价,避免由架设多探测点所带来的高度复杂... Internet拓扑的研究对于网络的应用与发展具有重要意义.由于交叉路由的存在,目前主动测量Internet拓扑大多采用多源点高冗余探测的方法,以发现单探测点情况下相对隐藏的链路.为降低探测难度与代价,避免由架设多探测点所带来的高度复杂性及重复性,给出一种针对单点测量数据的修正方法.基于授权的海量实测数据,提取隐藏链路的多核连接特征,使产生的测量结果更完整.实验表明,该方法可以大幅提高单点测量Internet拓扑的精确性,从而增强低冗余测量数据的可用性. 展开更多
关键词 ipinternet拓扑 单点测量 交叉路由 网络核数
下载PDF
基于Internet2的城域宽带IP网建设构想
11
作者 杨志新 李建国 旷晖 《计算机工程与科学》 CSCD 1999年第6期26-29,共4页
本文介绍了宽带IP网的最新发展动态, 分析了湖南省城域网络建设的现状,
关键词 城域网 宽带ip internet2 internet
下载PDF
基于IP的Internet记帐系统研究
12
作者 李卫 郑卫斌 张德运 《微机发展》 1998年第3期23-26,共4页
本文描述了在中国教育和科研计算机网(CERNET)的基础上实现的一种基于IP流量的网络记帐方法。它利用SNMP协议,收集网络流量并按一定的策略进行统计,为网络管理者提供收费依据。
关键词 internet 网络记帐系统 ip地址 网络协议
下载PDF
IPsec的Internet密钥交换
13
作者 袁剑 刘刚 王文海 《西安文理学院学报(自然科学版)》 2006年第4期52-56,共5页
介绍了IPsec的基本组成和一组IKE协议.分析了IKE协议的安全特性,以及IKE的协商过程.其中包括:在主模式中建立ISAKMP SA的过程和在快速模式中利用已建立好的ISAKMP SA完成IPsec SA的协商.通过详细分析主模式中用于完成SA要交换的六个消... 介绍了IPsec的基本组成和一组IKE协议.分析了IKE协议的安全特性,以及IKE的协商过程.其中包括:在主模式中建立ISAKMP SA的过程和在快速模式中利用已建立好的ISAKMP SA完成IPsec SA的协商.通过详细分析主模式中用于完成SA要交换的六个消息的发送步骤、属性、结构来说明安全性的实现. 展开更多
关键词 ipscc IKE 密钥交换
下载PDF
嵌入式Internet中TCP/IP协议栈的研究与设计 被引量:4
14
作者 黄文力 马礼 王玉超 《电脑开发与应用》 2008年第1期46-47,50,共3页
目前大多数嵌入式设备是8位或16位的MCU,要将Internet与嵌入式设备进行结合,其主要困难在于,相对于8/16位低速处理器本身资源的限制,Internet的TCP/IP协议簇过于复杂,因此不可能实现完整的TCP/IP协议栈,必须根据实际需求进行精简。针对... 目前大多数嵌入式设备是8位或16位的MCU,要将Internet与嵌入式设备进行结合,其主要困难在于,相对于8/16位低速处理器本身资源的限制,Internet的TCP/IP协议簇过于复杂,因此不可能实现完整的TCP/IP协议栈,必须根据实际需求进行精简。针对8位或16位的低档MCU接入Internet,采用MCU+软件嵌入TCP/IP协议的方法加以实现。对嵌入式Internet中TCP/IP协议栈的实现进行了研究与分析,针对每一层的具体协议,提出了设计方法和精简方案。由于嵌入式设备自身资源的限制,使得在嵌入式Internet中TCP/IP协议栈的实现存在功能简单、安全性不高等问题。但是随着嵌入式硬件设备和Internet技术的不断发展,嵌入式TCP/IP协议栈的实现也将会越来越完善。 展开更多
关键词 8/16bMCU 嵌入式internet 嵌入式TCP/ip协议栈
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:2
15
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 internet of things Wireless sensor network Secure routing protocol Trust management
下载PDF
Software Defined Networking Based On-Demand Routing Protocol in Vehicle Ad-Hoc Networks 被引量:1
16
作者 DONG Baihong WU Weigang +1 位作者 YANG Zhiwei LI Junjie 《ZTE Communications》 2017年第2期11-18,共8页
This paper comes up with a SDN Based Vehicle Ad-Hoc On-Demand Routing Protocol(SVAO),which separates the data forwarding layer and network control layer,as in software defined networking(SDN),to enhance data transmiss... This paper comes up with a SDN Based Vehicle Ad-Hoc On-Demand Routing Protocol(SVAO),which separates the data forwarding layer and network control layer,as in software defined networking(SDN),to enhance data transmission efficiency within vehicle ad-hoc networks(VANETs).The roadside service unit plays the role of local controller and is in charge of selecting vehicles to forward packets within a road segment.All the vehicles state in the road.Correspondingly,a two-level design is used.The global level is distributed and adopts a ranked query scheme to collect vehicle information and determine the road segments along which a message should be forwarded.On the other hand,the local level is in charge of selecting forwarding vehicles in each road segment determined by the global level.We implement two routing algorithms of SVAO,and compare their performance in our simulation.We compare SVAO with popular ad-hoc network routing protocols,including Optimized Link State Routing(OLSR),Dynamic Source Routing(DSR),Destination Sequence Distance Vector(DSDV),and distance-based routing protocol(DB)via simulations.We consider the impact of vehicle density,speed on data transmission rate and average packet delay.The simulation results show that SVAO performs better than the others in large-scale networks or with high vehicle speeds. 展开更多
关键词 VANETS SDN ROUTING protocol ad.hoc network internet of Vehicle
下载PDF
Adaptability Analysis of IP Routing Protocol in Broadband LEO Constellation Systems 被引量:3
17
作者 SUN Chenhua YIN Bo +2 位作者 LI Xudong TIAN Xing PANG Ce 《ZTE Communications》 2020年第4期34-44,共11页
With the inclusion of satellite Internet as the information infrastructure in China's "new infrastructure" category,relevant domestic industries and scientific research institutes have successively carri... With the inclusion of satellite Internet as the information infrastructure in China's "new infrastructure" category,relevant domestic industries and scientific research institutes have successively carried out the design of broadband low earth orbit(LEO) constellation systems and key technical research.As the core technology for the satellite-to-ground network communications of a broadband LEO constellation system,routing technology is extremely important for the efficient and reliable transmission of various service data.Focusing on the two important broadband LEO constellation systems in China,in-depth analysis and simulation of the high dynamics of the satellite-to-ground satellites are conducted in this paper to obtain more accurate network topology changes and characteristics;then the adaptability of the ground standard IP routing protocol to the broadband LEO constellation system is analyzed,and an LEO constellation simulation scenario is built with the Opnet software.The simulation results of the convergence performance of the standard IP routing protocol are produced.The results show that the IP protocol does not perform well for LEO satellite constellation networks.Based on the studies,some solutions are proposed to take full advantages of the characteristics of LEO satellite systems.These can also provide a reference for the choice of intersatellite routing architecture and protocol technology for broadband LEO constellation in the future development. 展开更多
关键词 satellite internet ip routing protocol high dynamic networking
下载PDF
Internet安全技术——IPSec 被引量:1
18
作者 桂玲 《铁道通信信号》 2000年第6期26-28,共3页
论述了当前 Internet本身存在的安全问题和当今应用的安全技术 ,详细介绍了 IETF的最新安全技术标准
关键词 internet 安全问题 ip安全技术 ipSEC协议
下载PDF
IP ADDRESS AUTOCONFIGURATION FOR WIRELESS AD HOC NETWORKS
19
作者 Amjad M.T.Said(阿姆贾德) 《Journal of Shanghai Jiaotong university(Science)》 EI 2002年第2期231-237,共7页
A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay i... A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay in obtaining an IP address, and fully utilizes the available addresses space of an ad hoc network, and independent of the existing routing protocol, and less prone to security threats. Moreover, a new Join/Leave mechanism was proposed as an enhancement to the new IP address autoconfiguration algorithm, to support the overall operation of the existing routing protocol of wireless ad hoc networks. 展开更多
关键词 wireless ad HOC networks ip ADDRESS allocation ip ADDRESS AUTOCONFIGURATION routing protocols DUPLICATE ADDRESS detection (DAD)
下载PDF
嵌入式Internet的TCP/IP协议子集选用探讨
20
作者 张永生 雷必成 《台州学院学报》 2005年第3期41-43,共3页
通过对TCP/IP协议的分析,并结合嵌入式系统的特点,提出一种在实现嵌入式Internet时如何选择TCP/IP协议子集的思路,并根据这一思路挑选出一套精简的TCP/IP协议栈以供参考。
关键词 网络 嵌入式系统 嵌入式internet技术 TCP/ip协议
下载PDF
上一页 1 2 64 下一页 到第
使用帮助 返回顶部