期刊文献+
共找到642篇文章
< 1 2 33 >
每页显示 20 50 100
Improving Throughput of Transmission Control Protocol Using Cross LayerApproach
1
作者 Jansi Rani Sella Veluswami 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1231-1239,共9页
Most of the internet users connect through wireless networks. Majorpart of internet traffic is carried by Transmission Control Protocol (TCP). It hassome design constraints while operated across wireless networks. TCP... Most of the internet users connect through wireless networks. Majorpart of internet traffic is carried by Transmission Control Protocol (TCP). It hassome design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestionin the network, TCP used acknowledgment to delivery of packets by the end host.In wired network, packet loss signals congestion in the network. But rather inwireless networks, loss is mainly because of the wireless characteristics such asfading, signal strength etc. When a packet travels across wired and wireless networks, TCP congestion control theory faces problem during handshake betweenthem. This paper focuses on finding this misinterpretation of the losses using crosslayer approach. This paper focuses on increasing bandwidth usage by improvingTCP throughput in wireless environments using cross layer approach and hencenamed the proposed system as CRLTCP. TCP misinterprets wireless loss as congestion loss and unnecessarily reduces congestion window size. Using the signalstrength and frame error rate, the type of loss is identified and accordingly theresponse of TCP is modified. The results show that there is a significant improvement in the throughput of proposed TCP upon which bandwidth usage isincreased. 展开更多
关键词 BANDWIDTH wireless networks transmission control protocol THROUGHPUT
在线阅读 下载PDF
A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network
2
作者 郭强 朱杰 张海滨 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期245-249,共5页
OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Trans... OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Transmission Prot ocol) based OAM, i.e., SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its tran sport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experim ental results prove the proposed SOAM system achieves better performance on sign aling transmission compared with conventional TCP based OAM system. 展开更多
关键词 stream control transmission protocol (SCTP) operations administration and maintenance (OAM) signaling transmission 3G cellular network
在线阅读 下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
3
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
在线阅读 下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
4
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
在线阅读 下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
5
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 internet control message protocol support vector machine covert tunnel network analysis
在线阅读 下载PDF
Observer-based quantised control of networked systems with round-robin protocol and transmission delay
6
作者 Ge Guo Xuefei Yan Jian Kang 《Journal of Control and Decision》 2025年第1期24-33,共10页
This paper addresses the ultimate boundedness control problem for a class of networked nonlinear systems with the round-robin(RR)protocol and uniform quantisation.The communication between sensor nodes and the control... This paper addresses the ultimate boundedness control problem for a class of networked nonlinear systems with the round-robin(RR)protocol and uniform quantisation.The communication between sensor nodes and the controller is implemented via a constrained communication channel.The quantised output of the system is transmitted to the remote controller through a communication channel subject to a transmission delay.For the purpose of alleviating possible data collision,the well-known RR communication protocol is deployed to schedule the data transmissions.On the other hand,the uniform quantisation effects of the network are characterised by a round function(i.e.the nearest integer function).The purpose of the addressed problem is to design an observer-based controller for the networked nonlinear systems such that,in the presence of RR protocol and uniform quantisation effects,the closed-loop system is ultimately bounded.The controller is designed based on mean square stability analysis and Lyapunov-like method.A set of sufficient conditions for the ultimate boundedness of the closed-loop system are established and,on the basis of which,the desired controller gains are obtained by solving a set of linear matrix inequalities.The effectiveness of the proposed method is verified by numerical examples. 展开更多
关键词 Networked control systems(NCSs) round-robin(RR)protocol transmission delay uniform quantisation ultimate boundedness control
原文传递
Multi-Stage Image Compression-Decompression System Using PCA/IPCA to Enhance Wireless Transmission Security
7
作者 Ali A. Ibrahim Thura Ali Khalaf Bashar Mudhafar Ahmed 《Journal of Computer and Communications》 2022年第4期87-96,共10页
The goal of this paper is to propose a fast and secure multi-stage image compression-decompression system by using a wireless network between two Personal Computers (PCs). In this paper, the Principal Component Analys... The goal of this paper is to propose a fast and secure multi-stage image compression-decompression system by using a wireless network between two Personal Computers (PCs). In this paper, the Principal Component Analysis (PCA) technique is used for multi-stage image compression and Inverse Principal Component Analysis (IPCA) for multi-stage image decompression. The first step of the proposed system is to select the input image, the second step is to perform PCA up to 9 times on the input image, this compression, and after multi-stage compression process then the third step begins by transforming across wireless Ad hoc Network (WANET) to the second computing device, forth step start with multi-stage decompression process up 9 times. The proposed system for different images is transferred over the wireless network using Transmission Control Protocol/Internet Protocol (TCP/IP), which is programmed using the network role property of the MATLAB program. The proposed system implements 25 different images correctly (100%). The main contribution of this paper is that we are dealing with the black image at the end of the compressed process ad start with a black image at the start of the decompressed process of this proposed system. In this work, the compressed and uncompressed images are compared with each other in their size and transmission time. This system can be very useful in networks because they provide a high level of protection to the transmitted data from hackers because they cannot guess how much the image has been compressed or what kind of information the image represents. 展开更多
关键词 Principle Component Analysis Inverse Principle Component Analysis Wireless Ad Hoc Network transmission control protocol/internet protocol
在线阅读 下载PDF
Cloud control for IIoT in a cloud-edge environment 被引量:1
8
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
在线阅读 下载PDF
AN ENHANCEMENT SCHEME OF TCP PROTOCOL IN MOBILE AD HOC NETWORKS:MME-TCP
9
作者 Kai Caihong Yu Nenghai Chen Yuzhong 《Journal of Electronics(China)》 2007年第1期1-9,共9页
Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple m... Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple metrics measurement is proposed to improve TCP performance in MANETs. Multi-metric Measurement based Enhancement of TCP (MME-TCP) designs the metrics and the identification algorithm according to the characteristics of MANETs and the experiment results. Furthermore,these metrics are measured at the sender node to reduce the overhead of control information over networks. Simulation results show that MME-TCP mechanism achieves a significant performance improvement over standard TCP in MANETs. 展开更多
关键词 Ad hoc networks transmission control protocol (TCP) Network states End-to-end metrics Identification algorithms
在线阅读 下载PDF
石油行业图像数据高效安全传输方法
10
作者 汤明 邹露 +3 位作者 何世明 谢玉森 周越淼 陈春钱 《深圳大学学报(理工版)》 北大核心 2025年第2期172-182,I0004-I0006,共14页
为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理... 为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理想解排序(technique for order preference by similarity to an ideal solution,TOPSIS)法对分解后的奇异值进行优选,在确保数据真实性的前提下用少量奇异值表征原始图像,进行图像压缩,降低数据大小,提高传输效率;提出多通道猫脸分割加密方法,分别对每个颜色通道的图像进行随机分割、随机加密和随机排序,解决了传统猫脸加密算法颜色通道线性相关度高,整体置乱度低的问题.结果表明:改进奇异值压缩技术在保证图像清晰的情况下仅利用15%的奇异值数据完成对图像的压缩,最大图像压缩比可达4.43,平均压缩后所占用的存储空间仅为原空间的26.29%,数据传输控制协议通信平均传输效率提高86.39%.在加密图像达到0相关的前提下,多通道猫脸分割加密算法加密图像在像素点处三通道颜色值完全不同,新方法颜色通道相关系数分别为0.20、0.22和0.25,对比传统猫脸加密方法,分别降低0.78、0.75和0.71.新方法加密效果好、难破解,可为石油行业数字化转型提供理论和技术支撑. 展开更多
关键词 石油天然气工业 图像数据 改进奇异值压缩 猫脸变换 熵权TOPSIS法 传输控制协议 数据安全
在线阅读 下载PDF
基于量子密钥分发技术的物联网信息端到端加密传输算法
11
作者 张继飞 张春红 林超 《黑龙江工程学院学报》 2025年第1期22-28,共7页
根据量子不可克隆定理,未经授权的第三方无法复制或准确测量正在传输的量子态,因为任何测量操作都会不可避免地改变量子态,从而被合法的通信双方检测到。因此,提出一种基于量子密钥分发技术的物联网信息端到端加密传输算法。利用量子密... 根据量子不可克隆定理,未经授权的第三方无法复制或准确测量正在传输的量子态,因为任何测量操作都会不可避免地改变量子态,从而被合法的通信双方检测到。因此,提出一种基于量子密钥分发技术的物联网信息端到端加密传输算法。利用量子密钥分发技术生成安全初始密钥,并通过量子密码传输协议进行密钥分发,量子密码传输协议通过单向量子信息通道和双向公共信息通道,确保用户与传感节点间信息加密传输。在握手过程中,完成用户与传感节点的双向认证,建立安全连接,进行数据加密与完整性封装,实现端到端加密传输。实验结果显示,该算法在物联网端到端数据传输的完整性与安全性方面表现出色,且在传输延时控制方面具有显著优势。 展开更多
关键词 量子密钥分发技术 物联网信息 端到端 加密传输 量子密码传输协议 安全认证
在线阅读 下载PDF
基于嵌入式Internet的工业控制 被引量:45
12
作者 陶波 丁汉 熊有伦 《测控技术》 CSCD 2001年第8期5-9,共5页
嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本... 嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本文综述了现场总线控制网络、以太网和现场总线混合控制网络 ,提出了基于嵌入式Internet的控制网络模型 ,并从开放性、互连性、分散性的角度探讨了控制网络与Internet集成的发展趋势 。 展开更多
关键词 工业控制 嵌入式internet 远程监控 现场总线 传感器
在线阅读 下载PDF
Internet端到端拥塞控制研究综述 被引量:8
13
作者 刘拥民 蒋新华 +1 位作者 年晓红 鲁五一 《计算机科学》 CSCD 北大核心 2008年第2期6-12,共7页
本文描述了Internet中端对端拥塞控制技术的内容和特点,分析了标准化拥塞控制算法所涉及的技术难点及不足,概括了拥塞控制算法的发展历程,并根据目前最新的研究情况,提出把控制与优化理论引入网络拥塞控制的思路,最后总结出进一步的研... 本文描述了Internet中端对端拥塞控制技术的内容和特点,分析了标准化拥塞控制算法所涉及的技术难点及不足,概括了拥塞控制算法的发展历程,并根据目前最新的研究情况,提出把控制与优化理论引入网络拥塞控制的思路,最后总结出进一步的研究趋势和方向。 展开更多
关键词 internet 拥塞控制 TCP协议 控制理论 端对端
在线阅读 下载PDF
基于Internet的远程测控技术 被引量:39
14
作者 曹军义 刘曙光 《国外电子测量技术》 2001年第6期17-21,共5页
本文从工业控制技术发展出发,结合 Internet技术给出了基于 Internet远程控制系统的组成,详细分析了远程测控技术的现状,最后介绍了基于Internet远程测控系统的应用和前景。
关键词 internet 远程测控技术 现场总线 TCP/IP 交换式以太网 故障诊断 互操作
在线阅读 下载PDF
基于Internet的实时控制系统的传输协议 被引量:2
15
作者 黄杰 吴平东 +2 位作者 修震 马树元 陈之龙 《计算机工程》 EI CAS CSCD 北大核心 2005年第2期110-111,共2页
为了在Inertnet内实现实时控制,需要开发基于Internet的实时控制系统的传输协议。提出了该协议的设计方案,完全符合TCP/IP协议标准,并且在运输层同时支持TCP协议和UDP协议。以该协议为基础,开发了基于Internet的实时控制系统实验平台,... 为了在Inertnet内实现实时控制,需要开发基于Internet的实时控制系统的传输协议。提出了该协议的设计方案,完全符合TCP/IP协议标准,并且在运输层同时支持TCP协议和UDP协议。以该协议为基础,开发了基于Internet的实时控制系统实验平台,实验表明该协议能在Internet上进行远程控制。 展开更多
关键词 实时控制系统 传输协议 TCP/IP协议 TCP协议 远程控制 实验平台 UDP协议
在线阅读 下载PDF
基于Internet的工业机器人的远程控制 被引量:6
16
作者 汤双清 付建科 +1 位作者 施仲光 廖道训 《计算机应用研究》 CSCD 北大核心 2002年第6期151-153,共3页
随着国际互联网的高速发展 ,制造行业的生产和组织管理发生了根本的变化。尤其进入 2 0世纪 90年代后期 ,敏捷制造、全球化制造、动态企业联盟和虚拟企业相继诞生了 ,这标志着制造理念已经完全进入一个更高、更新的层面。为了适应这种... 随着国际互联网的高速发展 ,制造行业的生产和组织管理发生了根本的变化。尤其进入 2 0世纪 90年代后期 ,敏捷制造、全球化制造、动态企业联盟和虚拟企业相继诞生了 ,这标志着制造理念已经完全进入一个更高、更新的层面。为了适应这种新形势 ,这就要求能对制造系统中的机器人实施远程控制。将从现代制造系统中工业机器人的控制着手 ,讨论机器人远程控制策略及其实现途径 ,以及远程可视化实现方法。 展开更多
关键词 现代制造系统 通信协议 internet 工业机器人 远程控制
在线阅读 下载PDF
基于Internet的机器人实时双向遥操作 被引量:3
17
作者 孙立宁 谢小辉 +1 位作者 杜志江 富立新 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期146-150,164,共6页
基于服务质量的时延、时延振荡、带宽需求和丢包率,认为传输控制协议是一个安全的协议,而UDP(用户数据包协议)是一个相对实时的协议.因此在实际情况中,可针对不同的数据类型选择相应的协议.使用UDP协议控制数据时有包丢失问题,可采取冗... 基于服务质量的时延、时延振荡、带宽需求和丢包率,认为传输控制协议是一个安全的协议,而UDP(用户数据包协议)是一个相对实时的协议.因此在实际情况中,可针对不同的数据类型选择相应的协议.使用UDP协议控制数据时有包丢失问题,可采取冗余发射的方式加以克服.在基于Internet的机器人遥操作系统中有网络时延问题,影响整个系统的稳定性、透明性和实时性.使用UDP协议使系统具有了实时性的同时,不影响系统的稳定、透明和同步.使用力、图像、声音、温度等多模态反馈能够提高系统性能和安全性,但各个模态之间存在同步问题,用事件驱动的方法可解决此问题. 展开更多
关键词 遥操作 用户数据包协议 事件驱动方法
在线阅读 下载PDF
Internet中分组丢弃缓存管理技术的研究 被引量:3
18
作者 温蜀山 李乐民 孙海荣 《通信学报》 EI CSCD 北大核心 2002年第7期98-106,共9页
Internet中,基于分组丢弃的缓存管理技术是分组转发设备的重要功能模块,其算法对网络性能会产生重大影响。本文对现有主要的分组丢弃技术及其派生算法作了总结,并就存在的问题和不足提出了研究建议。
关键词 internet 分组丢弃 缓存管理 传输控制协议 随机早期检测 最长队列丢弃
在线阅读 下载PDF
嵌入式Internet中TCP协议的设计与实现 被引量:13
19
作者 李金梁 景博 《微计算机信息》 北大核心 2005年第06Z期40-41,138,共3页
介绍了嵌入式Internet技术的概念和研究现状,以网络传感器为应用背景,对TCP/IP协议栈中的主要协议TCP进行了机制裁减和编程实现。该研究对于Internet技术能否在8位单片机上实现和应用有着重要而现实的意义。
关键词 嵌入式internet 传输控制协议TCP
在线阅读 下载PDF
Internet协议簇在楼宇自控中的应用 被引量:1
20
作者 王瑞华 王普 尹金玉 《北京工业大学学报》 CAS CSCD 北大核心 2004年第1期13-17,共5页
针对目前在楼宇自控中最流行的开放协议BACnet和LonWorks的弊端,探讨了Internet协议簇的发展以及在楼宇自控行业中的应用.针对HTTP协议只解决了一半互操作的问题,提出了用XML协议实现真正完全的基于组件的互操作.用XML语言编写了配置控... 针对目前在楼宇自控中最流行的开放协议BACnet和LonWorks的弊端,探讨了Internet协议簇的发展以及在楼宇自控行业中的应用.针对HTTP协议只解决了一半互操作的问题,提出了用XML协议实现真正完全的基于组件的互操作.用XML语言编写了配置控制器的文档实例,证明了它的可行性. 展开更多
关键词 楼宇自控 BACNET LONWORKS internet协议簇 XML
在线阅读 下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部