This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The...This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)展开更多
This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then ...This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model.展开更多
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l...This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.展开更多
A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Wi...A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.展开更多
As a promising solution to efficiently achieving fiber to the home (FTTH), Ethernet passive optical network (EPON) is currently improved to provide intercommunication among customers, together with normal traffic ...As a promising solution to efficiently achieving fiber to the home (FTTH), Ethernet passive optical network (EPON) is currently improved to provide intercommunication among customers, together with normal traffic delivery, via optical local area network emulation. It is a new research direction and expected to enhance the normal EPON performances. The purpose of this article is to review the state-of -the-art solutions to emulating optical local area networks (OLANs) over EPON. We discuss the major problems involved, e.g., network architecture, control mechanisms, and other potential enhancements. We also outline areas for future researches.展开更多
The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.
HUSTRING, a local area network named after the Harbin University of Science and Technology, uses a combination of token-passing approach and register insertion technology as its medium access control mechanism. The re...HUSTRING, a local area network named after the Harbin University of Science and Technology, uses a combination of token-passing approach and register insertion technology as its medium access control mechanism. The results of theoretical analysis and computer simulation indicate that the real-time performance of the HUSTRING is much better than that of the well-known token-ring local area network.The network topology of the HUSTRING, the architecture of its physical layer, medium access layer and logic link layer and the configuration of its ring interface are describedand its performance is compared with the token ring local area network.展开更多
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ...IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.展开更多
针对现有的双局域网(LAN)太赫兹无线局域网(Dual-LAN THz WLAN)相关介质访问控制(MAC)协议中存在的某些节点会在多个超帧内重复发送相同的信道时隙请求帧以申请时隙资源以及网络运行的一些时段存在空闲时隙等问题,提出一种基于自发数据...针对现有的双局域网(LAN)太赫兹无线局域网(Dual-LAN THz WLAN)相关介质访问控制(MAC)协议中存在的某些节点会在多个超帧内重复发送相同的信道时隙请求帧以申请时隙资源以及网络运行的一些时段存在空闲时隙等问题,提出一种基于自发数据传输的高效MAC协议——SDTE-MAC(high-Efficiency MAC protocol based on Spontaneous Data Transmission)。SDTE-MAC通过让各节点都维护一张或多张时间单元链表,使各节点与其余节点在网络运行时间上达到同步,从而获悉各节点应该在信道空闲时隙的什么位置开始发送数据帧,优化了传统的信道时隙分配和信道剩余时隙再分配的流程,提高了网络吞吐量和信道时隙利用率,降低了数据时延,能够进一步提升双LAN太赫兹无线局域网的性能。仿真结果表明,网络饱和时,相较于AHT-MAC(Adaptive High Throughout multi-pan MAC protocol)中的N-CTAP(Normal Channel Time Allocation Period)时段时隙资源分配新机制以及自适应缩短超帧时段机制,SDTE-MAC的MAC层吞吐量提升了9.2%,信道时隙利用率提升了10.9%,数据时延降低了22.2%。展开更多
随着卫星通信技术的日益发展,系统内部多信道并存的现象越来越普遍,信道间传输的业务容易引起相互干扰,单纯运用传统路由器很难完成系统中不同信道间的业务完整隔离;同时,多信道卫星通信系统网络拓扑结构复杂,易引起控制混乱等问题。针...随着卫星通信技术的日益发展,系统内部多信道并存的现象越来越普遍,信道间传输的业务容易引起相互干扰,单纯运用传统路由器很难完成系统中不同信道间的业务完整隔离;同时,多信道卫星通信系统网络拓扑结构复杂,易引起控制混乱等问题。针对这些问题,提出一种基于虚拟局域网(Virtual Local Area Network,VLAN)的多信道卫星通信地面系统的设计方法。该方法充分利用网络划分VLAN技术的隔离性和安全性特征,结合多信道通信技术使用多个信道同时传输业务的特征,提升特征维度,实现高效、可靠的多信道卫星通信,具有易于硬件实现的特点,提高网络通信的吞吐量。展开更多
With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to o...With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort.展开更多
文摘This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)
文摘This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model.
基金the National Science Council (No. NSC-99-2219-E-033-001)the Foundation of the Chung Yuan Christian University (1004) (No. CYCU-EECS.9801)
文摘This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.
基金the National Natural Science Foundation of China (No.61165008)the Natural Science Foundation of Jiangxi Province (No.20114BAB206004)the Project of Jiangxi Provincial Education Department(No.GJJ12038)
文摘A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.
基金the National Science Fund for Distinguished Young Scholars(Grant No.60725104)the National Basic Research Program of China(Grant No.2007CB310706)+2 种基金the National High Technology Research and Development Program of China(Grant Nos.2007AA01Z246 and 2007AA01Z227)the National Natural Science Foundation of China(Grant No.60672045)the Research Fund for the Doctoral Program of Higher Education(Grant No.20060614018)
文摘As a promising solution to efficiently achieving fiber to the home (FTTH), Ethernet passive optical network (EPON) is currently improved to provide intercommunication among customers, together with normal traffic delivery, via optical local area network emulation. It is a new research direction and expected to enhance the normal EPON performances. The purpose of this article is to review the state-of -the-art solutions to emulating optical local area networks (OLANs) over EPON. We discuss the major problems involved, e.g., network architecture, control mechanisms, and other potential enhancements. We also outline areas for future researches.
文摘The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.
文摘HUSTRING, a local area network named after the Harbin University of Science and Technology, uses a combination of token-passing approach and register insertion technology as its medium access control mechanism. The results of theoretical analysis and computer simulation indicate that the real-time performance of the HUSTRING is much better than that of the well-known token-ring local area network.The network topology of the HUSTRING, the architecture of its physical layer, medium access layer and logic link layer and the configuration of its ring interface are describedand its performance is compared with the token ring local area network.
基金The manuscript APC is supported by the grant name(UMS No.DFK2005)“Smart Vertical farming Technology for Temperate vegetable cultivation in Sabah:practising smart automation system using IR and AI technology in agriculture 4.0”.
文摘IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.
文摘针对现有的双局域网(LAN)太赫兹无线局域网(Dual-LAN THz WLAN)相关介质访问控制(MAC)协议中存在的某些节点会在多个超帧内重复发送相同的信道时隙请求帧以申请时隙资源以及网络运行的一些时段存在空闲时隙等问题,提出一种基于自发数据传输的高效MAC协议——SDTE-MAC(high-Efficiency MAC protocol based on Spontaneous Data Transmission)。SDTE-MAC通过让各节点都维护一张或多张时间单元链表,使各节点与其余节点在网络运行时间上达到同步,从而获悉各节点应该在信道空闲时隙的什么位置开始发送数据帧,优化了传统的信道时隙分配和信道剩余时隙再分配的流程,提高了网络吞吐量和信道时隙利用率,降低了数据时延,能够进一步提升双LAN太赫兹无线局域网的性能。仿真结果表明,网络饱和时,相较于AHT-MAC(Adaptive High Throughout multi-pan MAC protocol)中的N-CTAP(Normal Channel Time Allocation Period)时段时隙资源分配新机制以及自适应缩短超帧时段机制,SDTE-MAC的MAC层吞吐量提升了9.2%,信道时隙利用率提升了10.9%,数据时延降低了22.2%。
文摘随着卫星通信技术的日益发展,系统内部多信道并存的现象越来越普遍,信道间传输的业务容易引起相互干扰,单纯运用传统路由器很难完成系统中不同信道间的业务完整隔离;同时,多信道卫星通信系统网络拓扑结构复杂,易引起控制混乱等问题。针对这些问题,提出一种基于虚拟局域网(Virtual Local Area Network,VLAN)的多信道卫星通信地面系统的设计方法。该方法充分利用网络划分VLAN技术的隔离性和安全性特征,结合多信道通信技术使用多个信道同时传输业务的特征,提升特征维度,实现高效、可靠的多信道卫星通信,具有易于硬件实现的特点,提高网络通信的吞吐量。
基金supported by the National Natural Science Foundation of China(61571162)the Major National Science and Technology Project(2014ZX03004003-005)
文摘With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort.