The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direc...The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,展开更多
This project was designated as Meritorious of Mathematical Contest inModeling (MCM'94). We have been required tu solve a problem of findins thebest schedule of a file transfer network in order to niake the niaktis...This project was designated as Meritorious of Mathematical Contest inModeling (MCM'94). We have been required tu solve a problem of findins thebest schedule of a file transfer network in order to niake the niaktispan the smallestone. Three situations with展开更多
This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtu...This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.展开更多
A file transfer algorithm based on ADP (autonomous decentrafized protocol) was proposed to solve the problem that the ADS (autonomous decentralized system) middleware (NeXUS/Drink) lacks of file transfer functio...A file transfer algorithm based on ADP (autonomous decentrafized protocol) was proposed to solve the problem that the ADS (autonomous decentralized system) middleware (NeXUS/Drink) lacks of file transfer functions for Windows. The algorithm realizes the peer-to-peer file transfer, one-to-N inquiry/multi-response file transfer and one-to-N file distribution in the same data field based on communication patterns provided by the ADP. The peer-to-peer file transfer is implemented through a peer-to-peer communication path, one-to-N inquiry/multi-response file transfer and one-to-N file distribution are implemented through multicast communication. In this algorithm, a file to be transferred is named with a GUID (global unique identification), every data packet is marked with a sequence number, and file-receiving in parallel is implemented by caching DPOs(data processing objects) and multi-thread technologies. The algorithm is applied in a simulation system of the decentralized control platform, and the test results and long time stable tanning prove the feasibility of the algorithm.展开更多
When examining the file transfer performance in a peer-to-peer file sharing system, a fundamental problem is how to describe the service rate for a file transfer. In this paper, the problem is examined by analyzing th...When examining the file transfer performance in a peer-to-peer file sharing system, a fundamental problem is how to describe the service rate for a file transfer. In this paper, the problem is examined by analyzing the distribution of server-like nodes' upstream-bandwidth among their concurrent transfers. A sufficient condition for the service rate, what a receiver obtains for downloading a file, to asymptotically be uniform is presented. On the aggregate service rate for transferring a file in a system, a sufficient condition for it to asymptotically follow a Zipf distribution is presented. These asymptotic equalities are both in the mean square sense. These analyses and the sufficient conditions provide a mathematic base for modeling file transfer processes in peer-to-peer file sharing systems.展开更多
With the rapid development of Internet technology and the rapid increase of multimedia information, people put forward higher requirements for the security, reliability, stability and efficiency of multimedia file tra...With the rapid development of Internet technology and the rapid increase of multimedia information, people put forward higher requirements for the security, reliability, stability and efficiency of multimedia file transmission. As far as the current network situation is concerned, there are various problems in network security, so how to ensure the safe transmission of files is a very important research topic. In order to improve the security effect of database information, we should also do a good job of classification and archiving storage. Multimedia files must be heavily compressed so that they can be efficiently transmitted over traditional data communication networks. The rapid development of computer networks has made people's lives more and more convenient. In the process of using computer networks, it is necessary to actively strengthen the security control of file transmission on computer networks. Take appropriate measures to avoid network file transmission security risks.展开更多
With the rapid development of Internet technology and the rapid increase of multimedia information, people put forward higher requirements for the security, reliability, stability and efficiency of multimedia file tra...With the rapid development of Internet technology and the rapid increase of multimedia information, people put forward higher requirements for the security, reliability, stability and efficiency of multimedia file transmission. As far as the current network situation is concerned, there are various problems in network security, so how to ensure the safe transmission of files is a very important research topic. In order to improve the security effect of database information, we should also do a good job of classification and archiving storage. Multimedia files must be heavily compressed so that they can be efficiently transmitted over traditional data communication networks. The rapid development of computer networks has made people's lives more and more convenient. In the process of using computer networks, it is necessary to actively strengthen the security control of file transmission on computer networks. Take appropriate measures to avoid network file transmission security risks.展开更多
白盒模型下密码分析者被授权可以完全访问加密软件实现的中间过程.为了解决现有白盒密码通信中密钥生成方式固定、安全性不足的问题,构造了动态白盒库,设计了改进的SM4动态白盒密码算法WBDL(white-box SM4 algorithm based on dynamic w...白盒模型下密码分析者被授权可以完全访问加密软件实现的中间过程.为了解决现有白盒密码通信中密钥生成方式固定、安全性不足的问题,构造了动态白盒库,设计了改进的SM4动态白盒密码算法WBDL(white-box SM4 algorithm based on dynamic white-box library).算法设计中应用新的查找表理论,构造了非固定的动态白盒库,把SM4算法的轮函数分割成三个阶段,再进行置乱编码,然后将密钥信息隐藏在第二阶段的查找表中以保护密钥.以设计的WBDL算法为基础构造了白盒加密通信软件系统,能够完成即时通讯、文件加解密、定期更换加密密钥等功能,可以在数据安全传输过程中实现对文件及密钥的有效保护.测试结果表明算法平均加密速率为0.273×10^(−3) Gbps,平均解密速率为0.234×10^(−3) Gbps,占用空间仅为尚-白盒算法的3%,但运算效率却更高;所设计的白盒加密通信软件对文件进行加解密的速度相近,平均值约为0.26 Mbps;文件加密传输速度均值为0.95 Mbps;软件系统的平均响应时间为425 ms.展开更多
文摘The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,
文摘This project was designated as Meritorious of Mathematical Contest inModeling (MCM'94). We have been required tu solve a problem of findins thebest schedule of a file transfer network in order to niake the niaktispan the smallestone. Three situations with
文摘This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.
基金The National Innovation Fund(No.00C262251211336)the Project of State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University(No.SKL2007K001)
文摘A file transfer algorithm based on ADP (autonomous decentrafized protocol) was proposed to solve the problem that the ADS (autonomous decentralized system) middleware (NeXUS/Drink) lacks of file transfer functions for Windows. The algorithm realizes the peer-to-peer file transfer, one-to-N inquiry/multi-response file transfer and one-to-N file distribution in the same data field based on communication patterns provided by the ADP. The peer-to-peer file transfer is implemented through a peer-to-peer communication path, one-to-N inquiry/multi-response file transfer and one-to-N file distribution are implemented through multicast communication. In this algorithm, a file to be transferred is named with a GUID (global unique identification), every data packet is marked with a sequence number, and file-receiving in parallel is implemented by caching DPOs(data processing objects) and multi-thread technologies. The algorithm is applied in a simulation system of the decentralized control platform, and the test results and long time stable tanning prove the feasibility of the algorithm.
基金National High Technology Research and Development Program of China (No.2007AA01Z457)Shanghai Science and Technology Development Fundation,China(No.07QA14033)
文摘When examining the file transfer performance in a peer-to-peer file sharing system, a fundamental problem is how to describe the service rate for a file transfer. In this paper, the problem is examined by analyzing the distribution of server-like nodes' upstream-bandwidth among their concurrent transfers. A sufficient condition for the service rate, what a receiver obtains for downloading a file, to asymptotically be uniform is presented. On the aggregate service rate for transferring a file in a system, a sufficient condition for it to asymptotically follow a Zipf distribution is presented. These asymptotic equalities are both in the mean square sense. These analyses and the sufficient conditions provide a mathematic base for modeling file transfer processes in peer-to-peer file sharing systems.
文摘With the rapid development of Internet technology and the rapid increase of multimedia information, people put forward higher requirements for the security, reliability, stability and efficiency of multimedia file transmission. As far as the current network situation is concerned, there are various problems in network security, so how to ensure the safe transmission of files is a very important research topic. In order to improve the security effect of database information, we should also do a good job of classification and archiving storage. Multimedia files must be heavily compressed so that they can be efficiently transmitted over traditional data communication networks. The rapid development of computer networks has made people's lives more and more convenient. In the process of using computer networks, it is necessary to actively strengthen the security control of file transmission on computer networks. Take appropriate measures to avoid network file transmission security risks.
文摘With the rapid development of Internet technology and the rapid increase of multimedia information, people put forward higher requirements for the security, reliability, stability and efficiency of multimedia file transmission. As far as the current network situation is concerned, there are various problems in network security, so how to ensure the safe transmission of files is a very important research topic. In order to improve the security effect of database information, we should also do a good job of classification and archiving storage. Multimedia files must be heavily compressed so that they can be efficiently transmitted over traditional data communication networks. The rapid development of computer networks has made people's lives more and more convenient. In the process of using computer networks, it is necessary to actively strengthen the security control of file transmission on computer networks. Take appropriate measures to avoid network file transmission security risks.