期刊文献+
共找到134篇文章
< 1 2 7 >
每页显示 20 50 100
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
1
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
2
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Neural-Network-Based Control for Discrete-Time Nonlinear Systems with Input Saturation Under Stochastic Communication Protocol 被引量:10
3
作者 Xueli Wang Derui Ding +1 位作者 Hongli Dong Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期766-778,共13页
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between th... In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive dynamic programming(ADP) constrained inputs neural network(NN) stochastic communication protocols(SCPs) suboptimal control
下载PDF
Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems 被引量:4
4
作者 Ming Wan Jiangyuan Yao +1 位作者 Yuan Jing Xi Jin 《Computers, Materials & Continua》 SCIE EI 2018年第6期447-463,共17页
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri... As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency. 展开更多
关键词 Event sequence anomaly detection non-public industrial communication protocols SDN
下载PDF
Variance-Constrained Filtering Fusion for Nonlinear Cyber-Physical Systems With the Denial-of-Service Attacks and Stochastic Communication Protocol 被引量:4
5
作者 Hang Geng Zidong Wang +2 位作者 Yun Chen Xiaojian Yi Yuhua Cheng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期978-989,共12页
In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the st... In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the stochastic communication protocol is adopted in the sensor-to-filter channels to regulate the transmission order of sensors.Each sensor is allowed to enter the network according to the transmission priority decided by a set of independent and identicallydistributed random variables.From the defenders’view,the occurrence of the denial-of-service attack is governed by the randomly Bernoulli-distributed sequence.At the local filtering stage,a set of variance-constrained local filters are designed where the upper bounds(on the filtering error covariances)are first acquired and later minimized by appropriately designing filter parameters.At the fusion stage,all local estimates and error covariances are combined to develop a variance-constrained fusion estimator under the federated fusion rule.Furthermore,the performance of the fusion estimator is examined by studying the boundedness of the fused error covariance.A simulation example is finally presented to demonstrate the effectiveness of the proposed fusion estimator. 展开更多
关键词 Cyber-physical system(CPS) denial-of-service attack stochastic communication protocol(SCP) variance-constrained filtering fusion
下载PDF
A Computing Resource Adjustment Mechanism for Communication Protocol Processing in Centralized Radio Access Networks 被引量:3
6
作者 Guowei Zhai Lin Tian +2 位作者 Yiqing Zhou Qian Sun Jinglin Shi 《China Communications》 SCIE CSCD 2016年第12期79-89,共11页
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n... The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly. 展开更多
关键词 computing resource adjustment communication protocol processing cloud RAN super BS processing resource outage probability optimized connected graph
下载PDF
A Recovery Algorithm for Self-Stabilizing Communication Protocols 被引量:1
7
作者 Li Layuan & Li Chunlin (Department of Computer Science & Technology, Wuhan nansportation University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期38-46,共9页
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro... This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes. 展开更多
关键词 Computer networks communication protocols Recovery algorithm SELF-STABILIZATION Multimedia communication networks.
下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
8
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The Security Analysis of Two-Step Quantum Direct communication protocol in Collective-Rotation Noise Channel EPR
下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
9
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 communication protocol Hybrid Encryption Security Protection
下载PDF
The Algorithms for Achieving Global States and Self-Stabilization for Communication Protocols
10
作者 Li Layuan & Li Chunlin(Department of Computer Science & Engineering. Wuhan Transportation University,430063,P . R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第4期34-41,共8页
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita... This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol. 展开更多
关键词 communication protocols Algorithm for achieving global states Self-stabilization Computer networks Multimedia communication networks.
下载PDF
Study of Communication Protocol and Link Establishing Mode of Mine Managing Mobile Communication System of Minute Areas
11
作者 杨维 孙继平 苏又平 《International Journal of Mining Science and Technology》 2000年第2期79-82,共4页
This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and d... This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and designed. 展开更多
关键词 MINE mobile communication communication protocol LAYER LINK
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
12
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
下载PDF
A Secure Communication Protocol for Unmanned Aerial Vehicles 被引量:3
13
作者 Navid Ali Khan N.Z.Jhanjhi +2 位作者 Sarfraz Nawaz Brohi Abdulwahab Ali Almazroi Abdulaleem Ali Almazroi 《Computers, Materials & Continua》 SCIE EI 2022年第1期601-618,共18页
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between th... Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Ground Control Station.The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS.In order to increase the transfer speed and efficiency,the Mavlink does not encrypt the messages.As a result,the protocol is vulnerable to various security attacks such as Eavesdropping,GPS Spoofing,and DDoS.In this study,we tackle the problem and secure the Mavlink communication protocol.By leveraging the Mavlink packet’s vulnerabilities,this research work introduces an experiment in which,first,the Mavlink packets are compromised in terms of security requirements based on our threat model.The results show that the protocol is insecure and the attacks carried out are successful.To overcomeMavlink security,an additional security layer is added to encrypt and secure the protocol.An encryption technique is proposed that makes the communication between the UAV and GCS secure.The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency.The results are validated in terms of transfer speed,performance,and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol.Our achieved results have significant improvement over the literature and Mavlink in terms of security. 展开更多
关键词 Unmanned aerial vehicles mavlink protocol drones security UAVs communication
下载PDF
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker 被引量:1
14
作者 Prabhu Kaliappan Hartmut Koenig 《Journal of Software Engineering and Applications》 2008年第1期13-19,共7页
The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which of... The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which often leads to rapid, premature developments. Many protocols have not scaled to satisfy important properties like deadlock and livelock freedom, since MDA focuses on the rapid development rather than on the quality of the developed models. In order to fix the above, we introduce a 2-Phase strategy based on the UML state machine and sequence diagram. The state machine is converted into PROMELA code as a protocol model and its properties are derived from the sequence diagram as Linear Temporal Logic (LTL) through automation. The PROMELA code is interpreted through the SPIN model checker, which helps to simulate the behavior of protocol. Later the automated LTL properties are supplemented to the SPIN for the verification of protocol properties. The results are compared with the developed UML model and SPIN simulated model. Our test results impress the designer to verify the expected results with the system design and to identify the errors which are unnoticed during the design phase. 展开更多
关键词 UML Modeling communication protocols protocol Verification SPIN Tool
下载PDF
CCPA: Component-based communication protocol architecture for embedded systems
15
作者 戴鸿君 陈天洲 陈纯 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第B08期79-86,共8页
For increased and various communication requirements of modem applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mod... For increased and various communication requirements of modem applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mode. We present the Component-Based Communication Protocol Architecture (CCPA) to make communication dynamic and configurable. It can develop, test and store the customized components for flexible reuse. The protocols are implemented by component assembly and support by configurable environments. This leads to smaller memory, more flexibility, more reconfiguration ability, better concurrency, and multiple data channel support. 展开更多
关键词 Component-Based protocol Component-Based protocol Architecture (CCPA) Dynamic configuration Embedded communication system
下载PDF
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks:Design and analysis
16
作者 Sheng Hao Huyin Zhang +2 位作者 Fei Yang Chenghao Li Jing Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第2期481-497,共17页
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har... Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results. 展开更多
关键词 Hybrid power-line/Visible light communication (HPVC)networks MAC protocol CSMA/CA IEEE 802.15.7 IEEE 1901 Performance analysis
下载PDF
ICPFuzzer:proprietary communication protocol fuzzing by using machine learning and feedback strategies 被引量:2
17
作者 Pei-Yi Lin Chia-Wei Tien +1 位作者 Ting-Chun Huang Chin-Wei Tien 《Cybersecurity》 EI CSCD 2021年第1期427-441,共15页
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards... The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety. 展开更多
关键词 Industrial communication protocol Network protocol fuzzing Long short-term memory(LSTM) Industrial control system(ICS)
原文传递
Studies on Algorithms for Self-StabilizingCommunication Protocols
18
作者 李腊元 李春林 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第6期606-613,共8页
in this paper the algorithms for self-stabilizing communication protocols are studied. First some concepts and a formal method for describing theproposed algorithms are described, then an improved algorithm for achiev... in this paper the algorithms for self-stabilizing communication protocols are studied. First some concepts and a formal method for describing theproposed algorithms are described, then an improved algorithm for achieving globalstates is presented. The study shows that the improved algorithm can be appliedto obtain the global states in the case of a loss of cooperation of the different processes in the protocol, which can be used as a recovery point that will be used bythe following recovery procedure. Thus, the improved algorithm can be used toself-stabilize a communication protocol. Meanwhile, a recovery algorithm for selfstabilizing communication protocols is presented. After a failure is detected, allProcesses can eventually know the error. The recovery algorithm uses the contextualinformation exchanged during the progress of the protocol and recorded on the stablememory. The proof of correctness and analysis of complexity for these algorithmshave been made. The availability and efficiency of the algorithms have been verifiedby illustrating the example protocols. Finally, some conclusions and remarks aregiven. 展开更多
关键词 communication protocol SELF-STABILIZATION global state recoveryalgorithm multimedia communication
原文传递
A Hybrid Formal Description Method Based on FSM,CSP and ADT for Communication Protocol
19
作者 Li Layman(Wuhan Transportation Universityl 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期29-38,共10页
Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description met... Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach. 展开更多
关键词 communication protocol Formal description techniques protocol engineering Hybrid formal method
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
20
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部