首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
网络通信是通过因特网进行数据交换的过程。伴随着因特网技术的不断发展,网络通信技术已应用于各个行业的远程控制以及各种即时通信中。设计了一个基于VC^++6.0的网络通信系统,采用UDP协议,利用VC^++6.0内置的Socket实现了网络的即时通信;并实现了基于FTP协议的文件传输。系统操作直观,可靠性高,文件传送过程中几乎不会发生数据的丢失,具有广泛的实际应用价值。  相似文献   

2.
闫妍  王澄非 《现代电子技术》2007,30(20):108-110
单纯用TCP或UDP实现局域网通信存在很多不足,为了建立高效、稳定、可靠的通信。并以多媒体教学系统的软件开发为例,在Delphi平台上,运用Indy9.0组件,将UDP和TCP结合起来,实现了局域网中C/S模式的通信。首先简述TCP,UDP协议的特点,对网络中三种基本的数据传输模式进行了比较,然后介绍Indy技术,最后写出实现这种方式的关键步骤和程序。  相似文献   

3.
TCP and UDP are considered the most popular and well known transport layer protocols to facilitate the end to end communication between two nodes in the network. TCP is used as the transport layer protocol in packet delivery and error sensitive applications, where packet loss cannot be compromised. However, low-rate TCP targeted Denial of Service (DoS) attacks exploit the retransmission timeout and congestion control features of TCP protocol. These low-rate TCP targeted Denial of Service (DoS) attacks are also called JellyFish (JF) attacks. These attacks perform the malicious activities either by delaying, or periodically dropping or mis-ordering the data packets on the route from source to destination node in the network, and cause severe degradation in end-to-end throughput in the network. JellyFish attack is further classified as JF-Delay Variance Attack, JF-Periodic Drop Attack and JF-Reorder Attack based on the type of the malicious activities being performed. JellyFish attack conforms to all existing routing and packet forwarding protocol specifications, and therefore it becomes very difficult to detect its presence in the network. In this paper, a Friendship Based JellyFish Attack Detection Algorithm (FJADA) is presented for Mobile Ad Hoc Networks, where the basic concept of friendship mechanism is added to the existing Direct Trust-based Detection (DTD) algorithm to save the valuable resources of a node in monitoring the activities of its one hop neighbours, through promiscuous mode. FJADA also minimizes the possibility of overestimating the malicious behaviour of innocent nodes due to radio transmission errors, network congestion or packet collisions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed detection algorithm.  相似文献   

4.
基于端信息自适应跳变的主动网络防御模型   总被引:1,自引:0,他引:1  
端信息跳变是目前主动网络防御领域的研究热点之一。该文构建了固定策略下的定时隙端信息跳变模型,分析了固定跳变周期引起的防御收益下降和跳变边界数据包丢失造成的服务损失问题。提出了基于非广延熵和Sibson熵融合的实时网络异常度量算法,在此基础上设计了端信息跳变周期和跳变空间自调整策略,构建了主动网络防御模型,提高了防御收益。给出了基于网络时延预测的跳变周期拉伸策略,保证了跳变边界的服务质量。理论分析与仿真实验结果表明了所提模型在网络防御中的有效性和良好的服务性。  相似文献   

5.
Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.  相似文献   

6.
随着计算机技术,网络技术,通信技术的迅速发展,越来越多的网络信息走入了大众的生活,对网络信息的传输设计和实现技术要求也越来越高。论文研究基于VC的UDP网络编程的设计与实现,并采用异步传输技术实现了一个简单的UDP Server。  相似文献   

7.
IP多播是一类重要的基于IP的应用,支持很多业务。无线接入系统使用灵活,作为IP网络的最后一跳,对组网寻址、服务质量构成影响;鉴于无线接入系统存在带宽有限、传输质量逊于有线方式等不足,所以在寻址方面通过合理的无线链路多播机制与IP多播寻址进行映射,在传输质量方面,通过对有线分组进行分片、ARQ、流控等机制,弥补UDP协议无流控、无确认等缺陷,以期提高服务质量。  相似文献   

8.
内生安全网络架构   总被引:7,自引:6,他引:1       下载免费PDF全文
IP 网络通过连接全球大量的网络设备给人类带来了便利,但网络面临持续性的安全和隐私问题令人担忧。由于网络缺乏内生安全的设计,IP地址伪造、隐私泄露、中间人攻击、分布式拒绝服务(DDoS)攻击等顽固安全问题难以根治,传统的补丁式解决方案补不胜补。在研究IP网络面临的各类安全威胁及相关安全技术的基础上,剖析了IP网络固有的安全缺陷,提出了具有内生安全特性的网络架构,包括具有内生安全的隐私ID/Loc、安全验证和审计协议、跨域联合防御机制等,能够为端到端通信保驾护航。  相似文献   

9.
蓝牙通信技术因建立灵活、成本低、功耗低的特点而得到广泛应用。在介绍蓝牙跳频通信技术原理基础上,建立蓝牙跳频通信系统结构组成框图。应用Simulink对系统进行仿真,解释各模块的作用,列出具体的模块参数设置和参数设置的依据。仿真分析结果表明,蓝牙跳频通信系统的抗干扰性能受信道信噪比影响,因采用分组传输的方式,连续相位调制方式及跳频技术,蓝牙跳频系统具有较强的抗干扰能力。  相似文献   

10.
Beam-hopping technology provides a basis for flexible allocation and efficient utilization of satellite resources,and it is considered as a key technology of the new generation of high-throughput satellite.With the goal of service-driven,efficient utilization of resources and on-demand coverage of hot spots area,from the aspects of system architecture,communication system,working mechanism,resource allocation method and beam-hopping pattern design,user access strategy,air interface protocol design and system workflow,a top-down feasibility and technical foundation was provided for the design of a new generation of high-throughput satellite communication system based on beam hopping.Finally,it meet the requirements of flexible and mobile information service for the space-earth integration network,as well as the demand of the space-based backbone network with high reliability and large capacity transmission.  相似文献   

11.
基于端信息跳变的主动网络防护研究   总被引:4,自引:0,他引:4  
从军事跳频通信中得到启发,提出端信息跳变的概念,即通过伪随机改变端到端的数据传输中通信端口、地址、时隙、加密算法甚至协议等端信息,破坏敌方攻击干扰,实现主动网络防护.建立了端信息跳变主动防护模型,采用移动代理技术实现了端信息跳变原型系统,解决了同步、数据切换等关键问题,理论分析并实验验证了模型系统的抗拒绝服务和截获攻击特性,证明了端信息跳变策略对于主动网络防护的可行性与有效性.  相似文献   

12.
孔明  艾树峰  杜辉 《电讯技术》2005,45(5):167-171
本文研究基于TCP/IP协议栈的嵌入式系统在网络智能设备中的测控应用设计。以Rabbit2000网络微处理器和Dynam ic C软件开发环境为例,阐述构建嵌入式W ebServer的具体技术及相关的实现方案;详细介绍了实现TCP、UDP报文进行网络通信、串行口数据通信和对网络智能设备的测控技术等,并给出系统硬件原理框图和有关软件实现的程序代码及流程图。  相似文献   

13.
为解决NoC和PC机之间通信速率低的问题,本文为NoC设计一个千兆级的网络通信资源节点,该资源节点主要包括UDP数据组包、UDP数据解包、三速以太网控制器和资源网络接口等模块。以典型的2D Mesh结构NoC系统作为测试对象,实验结果表明,本文设计的资源节点能够实现最高1.02Gbps、平均995.4Mbps的数据传输速率,在基于NoC的高速数据传输领域具有一定的实用价值。  相似文献   

14.
利用深度学习解决无线通信识别问题的研究越来越多。为了建立安全可靠的深度神经网络模型,有必要研究其对抗攻击技术。在介绍对抗样本概念和攻击算法的基础上,提出了无线通信智能识别神经网络的对抗攻击模型;对近年来无线通信中智能识别神经网络的对抗攻击方法进行了对比分析,给出了当前对抗攻击方法的局限性和后续研究重点;最后展望了未来的研究方向。  相似文献   

15.
为提高UDP网络通信的可靠性,设计了一个基于STM32F429和W5500的嵌入式双网冗余UDP通信模块,硬件上设计了相互热备份双网冗余电路,软件上采用了时间片轮询方法,通过读取W5500状态数据发现网络故障,并设计了快速可靠的切换策略,实现了两路网络的切换,切换时间小于10ms,该设备在实际应用过程中,工作稳定可靠。  相似文献   

16.
差分跳频通信中的关键技术分析   总被引:1,自引:0,他引:1  
介绍了近年来扩频通信的一种全新通信体制——差分跳频通信的原理,阐述了其与普通跳频通信的区别,重点分析了差分跳频通信所需解决的两个关键技术:G函数设计和接收信号检测技术。最后指出了差分跳频通信的应用前景和发展方向。  相似文献   

17.
张成文  孙鹏飞  谭学治   《电子器件》2005,28(2):446-449
为了使不同地域相互独立的集群系统互通,应用TCP/LP网络技术,PCM交换技术,设计了基于宽带传输网络的集中控制方式的联网中心。应用此联网中心通过级联的方式实现集群系统的多级联网,使联网系统内用户能够自动漫游、跨系统单呼、组呼。同时设计了基于UDP协议的不同厂家集群系统接入的网关接口。  相似文献   

18.
差分跳频(DFH)是一种新的短波跳频技术,它主要归结为一种G函数算法,这种G函数集跳频图案、信息调制与解调于一体。它的通信机理与常规跳频完全不同,较好的解决了数据速率和跟踪、干扰等问题,代表了当前短波通信的一个重要发展方向。鉴于此,在研究G函数算法原理的基础之上,重点对短波差分跳频信号的发生器进行基于FPGA的整体优化设计,并在软件和硬件环境下进行仿真与实现,从而指导工程实践。  相似文献   

19.
借鉴3G中WCDMA标准的AMR语音编码算法,结合多线程和循环缓冲区队列的方法,并采用UDP协议,给出了一个语音实时传输系统的实现方案。该方案具有较好的语音通信质量和自适应性。  相似文献   

20.
Network address hopping (NAH) proposed a mechanism to enhance data protection in communications across untrusted networks. It spread the data stream of a communication session across multiple channels, which tried to obstruct information interception in the first place by obscuring the fact that communication takes place between certain end-points. However, the time-stamped packets between two peers would provide a hint for correlating the intercepted packets in case the encryption of the counter got compromised. Furthermore, due to synchronization, the Internet Protocol version 6 (IPv6) addresses pair of the channel ends would appear and disappear strictly, which would perform time-relevance character. A Network-based hopping communication mechanism (NetHop) is proposed in this paper. The address hopping function is deployed on the network side instead of endpoint, which can support secure hopping communication function for universal endpoints without any restriction of Operating System or hardware. By using IPv6 to IPv6 network address translation (NAT), NetHop fully exploits the superiority of IPv6 huge address space. The hopping addresses are generated by hash function and the hopping addresses pair can be chosen randomly. Consequently, NetHop performs better on randomness and concealment than channel-rule NAH.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号