This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro...This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes.展开更多
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita...This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol.展开更多
A flexible and extendible control mechanism for invoking services is required for taking full advantage of the potential B--ISDN services. In this paper, a flexible specification of signaling protocol based on an obje...A flexible and extendible control mechanism for invoking services is required for taking full advantage of the potential B--ISDN services. In this paper, a flexible specification of signaling protocol based on an object-oriented call mode is proposed. The article’focuses on the protocol’s message syntax, message flow model, and applicability for defining multimedia and multiparty services.’展开更多
This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without c...This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications.展开更多
随着网络技术的发展,网络技术逐渐渗透到各个行业领域,很多领域顺应时代发展进行多样化的变革。其中,实际生产和工作中使用多媒体技术支持系统可以共享网络资源,提高资源的利用率和工作效率。文章介绍了传输控制协议/网际协议(Transmiss...随着网络技术的发展,网络技术逐渐渗透到各个行业领域,很多领域顺应时代发展进行多样化的变革。其中,实际生产和工作中使用多媒体技术支持系统可以共享网络资源,提高资源的利用率和工作效率。文章介绍了传输控制协议/网际协议(Transmission Control Protocol/Internet Protocol,TCP/IP),并对基于TCP/IP的多媒体技术支持系统进行了设计和实现。展开更多
The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fau...The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault-tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.展开更多
基金National Natural Science Foundation of China and NSF of Hubei Province.
文摘This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes.
文摘This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol.
文摘A flexible and extendible control mechanism for invoking services is required for taking full advantage of the potential B--ISDN services. In this paper, a flexible specification of signaling protocol based on an object-oriented call mode is proposed. The article’focuses on the protocol’s message syntax, message flow model, and applicability for defining multimedia and multiparty services.’
基金supported by the National Natural Science Foundation of China(Grant Nos.61271392U1405254&61272469)the British Government(Grant No.ktp008263)
文摘This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications.
文摘随着网络技术的发展,网络技术逐渐渗透到各个行业领域,很多领域顺应时代发展进行多样化的变革。其中,实际生产和工作中使用多媒体技术支持系统可以共享网络资源,提高资源的利用率和工作效率。文章介绍了传输控制协议/网际协议(Transmission Control Protocol/Internet Protocol,TCP/IP),并对基于TCP/IP的多媒体技术支持系统进行了设计和实现。
基金This project was supported by the National Natural Science Foundation of China and the Natural Science Foundation of Hubei Prov
文摘The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault-tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.