首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 421 毫秒
1.
基于宽带网的雷达信号远程传输技术研究   总被引:1,自引:1,他引:0  
以高性能警戒/引导雷达为模型,研究了适合雷达信号宽带远程传输的协议体系,重点对应用层协议进行了设计,并用Visual C 开发实现了专用通信软件,基于专门构建的宽带网络平台对软件进行了测试仿真,结果表明其传输性能良好,满足雷达信号宽带远程传输的要求。  相似文献   

2.
以高性能警戒-引导雷达为模型,研究了适合雷达信号宽带远程传输的协议体系,重点对应用层协议进行了设计,并用Visual C++开发实现了专用通信软件。而后基于专门构建的宽带网络平台对软件进行了测试仿真。仿真结果表明其传输性能良好,可满足雷达信号宽带远程传输的要求。  相似文献   

3.
0612355 基于宽带网的雷达信号远程传输[刊,中]/谢跃权//雷达科学与技术.-2005,3(6).-336-341(D) 以高性能警戒-引导雷达为模型,研究了适合雷达信号宽带远程传输的协议体系,重点对应用层协议进行了设计,并用Visual C++开发实现了专用通信软  相似文献   

4.
基于CAN总线技术的专用PLC之间的通信   总被引:2,自引:0,他引:2  
介绍了CAN总线及基于CAN总线技术的应用层协议CANopen协议的技术特点,并通过一个应用系统,说明了其在专用PLC之间通信的实现。  相似文献   

5.
根据供水自动化监控系统的应用需求,构建了一种有效的监控系统网络的模型,系统采用Modbus协议进行远程数据传输,监控应用层与现场层能实时的进行数据交换,进而实时在线的监控自动供水系统。通过对该网络模型的构建,说明了整个系统的构成,监控软件的相关设计和开发,以及Modbus协议的实现。实践证明,本方案是一种有益的尝试,得到了良好的应用。  相似文献   

6.
多媒体可视图文系统   总被引:1,自引:0,他引:1  
本文介绍了一种新一代的多媒体远程信息检索系统,介绍了它的网络结构、用户接入方式、人机接口、表示层句法及应用层协议等。最后还介绍了它的应用。  相似文献   

7.
文章描述了一个基于IP网络的远程多媒体实时教学系统中的通信协议模型CIP(Class Initation Protocol),该协议通过借鉴H.323与SIP协议,并结合实际教学的特点,满足远程多媒体实时教学的需求,在简单介绍了系统的总体设计框架后,给出了系统通信报文格式及协议模型,最后,描述了系统如何使用该协议进行通信。  相似文献   

8.
基于嵌入式系统的汽车防盗及呼救系统的研究   总被引:1,自引:0,他引:1  
提出了汽车防盗及呼救系统的解决方案.通过采用嵌入式技术开发,实现了将华邦ARM7微处理器、嵌入式操作系统uc/os,GPS/GSM模块完美集成.系统使用GPS技术定位汽车的位置信息,通过GSM网络远距离传输汽车位置和防盗信息,实现了远程呼救、自动防盗、交互控制的功能.着重强调了系统的应用层软件体系与防盗和呼救功能设计,短信私有协议的定义.经实践测试系统性能指标达到了预期的设计要求.  相似文献   

9.
许海婴 《电视技术》2023,(4):157-160
以中波发射台远程监控方案为重点,介绍IPSec协议,阐述基于IPSec协议的中波发射台远程监控方案,从系统架构、访问验证、入侵监测等方面,全面探讨方案细节,以期实现对发射台发射机的远程监控和远程开、关机。  相似文献   

10.
基于远程诊断和状态监测的设备管理系统研究   总被引:1,自引:0,他引:1  
王双利  王太勇 《信息技术》2003,27(6):47-48,51
提出了基于远程诊断和状态监测(RDCM)的设备综合管理信息系统(PIMS)的总体方案和体系结构,建立了系统的功能模型和信息模型,讨论了系统的一些关键技术,并给出了系统的具体配置。  相似文献   

11.
MAC protocols for wireless sensor networks: a survey   总被引:25,自引:0,他引:25  
Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, low sensing ranges result in dense networks and thus it becomes necessary to achieve an efficient medium-access protocol subject to power constraints. Various medium-access control (MAC) protocols with different objectives have been proposed for wireless sensor networks. In this article, we first outline the sensor network properties that are crucial for the design of MAC layer protocols. Then, we describe several MAC protocols proposed for sensor networks, emphasizing their strengths and weaknesses. Finally, we point out open research issues with regard to MAC layer design.  相似文献   

12.
Abstract Syntax Notation One (ASN.1) is a language for describing structured information. It is generally used in the specification of communications protocols. To date, it has primarily been used in the specification of OSI application layer protocols and protocols which use basic encoding rules (BER) and its derivatives as encoding schemes. While it is difficult to understand why ASN.1 has not received more widespread use for protocol specification, one possible explanation is its perceived reliance on BER and its derivatives as encoding schemes. This work attempts to address this misconception by providing mappings for ASN.1 constructs directly onto encoding schemes other than BER. By harnessing the techniques described, ASN.1 can be used to describe new and existing protocols regardless of their encoding scheme. The effectiveness of our techniques is demonstrated using a protocol analyzer (sometimes called a packet analyzer). Protocol analyzers decode and display protocol data units (PDUs). A major limitation of many protocol analyzers is their inability to dynamically incorporate new and proprietary PDUs. A “proof of concept” for the solutions suggested in this paper is provided via a protocol analyzer capable of processing protocols directly from an ASN.1 specification  相似文献   

13.
A study of Internet instant messaging and chat protocols   总被引:1,自引:0,他引:1  
Instant messaging (IM) and network chat communication have seen an enormous rise in popularity over the last several years. However, since many of these systems are proprietary, little has been described about the network technology behind them. This analysis helps bridge this gap by providing an overview of the available features, functions, system architectures, and protocol specifications of the three most popular network IM protocols: AOL Instant Messenger, Yahoo! Messenger, and Microsoft Messenger. We describe common features across these systems and highlight distinctions between them. Where possible, we discuss the advantages and disadvantages of different technical approaches used in these systems to support different features and functions. We also briefly discuss ongoing efforts to standardize IM and chat-based protocols in IETF and other standards bodies.  相似文献   

14.
The problem of secure information transmission over networks in distributed systems is considered. It is shown that protective measures that are used in such systems only on the network layer are insufficient. Analysis of the data packets transmitted between the system components has shown that, in the systems with high requirements for information security, the application-level security protocols should be used. It is shown that the maximum independence of security protocols from the remaining data-transmission protocols should be provided.  相似文献   

15.
Telehealth is the use of electronic information and communication technology to deliver health and medical information and services over large and small distances. Broadband wireless services available today, along with more powerful and convenient handheld devices, will enable a transformational change in health management and healthcare with the introduction of real-time monitoring and timely responses to a wide array of patient needs. Further, a network of low-cost sensors and wireless systems help in creating constantly vigilant and pervasive monitoring capability at home and at work. This paper addresses recent efforts in this growing field, including standards, system architectures, propagation models, and lower layer protocols for body area networks. The paper also suggests the use of cooperative transmission-based strategies for such wireless topologies.  相似文献   

16.
The Internet of Things (IoT) has been growing over the past few years due to its flexibility and ease of use in real-time applications. The IoT's foremost task is ensuring that there is proper communication among different types of applications and devices, and that the application layer protocols fulfill this necessity. However, as the number of applications grows, it is necessary to modify or enhance the application layer protocols according to specific IoT applications, allowing specific issues to be addressed, such as dynamic adaption to network conditions and interoperability. Recently, several IoT application layer protocols have been enhanced and modified according to application requirements. However, no existing survey articles focus on these protocols. In this article, we survey traditional and recent advances in IoT application layer protocols, as well as relevant real-time applications and their adapted application layer protocols for improving performance. As changing the nature of protocols for each application is unrealistic, machine learning offers means of making protocols intelligent and is able to adapt dynamically. In this context, we focus on providing open challenges to drive IoT application layer protocols in such a direction.  相似文献   

17.
Mobility support in wireless Internet   总被引:7,自引:0,他引:7  
The tremendous advancement and popularity of wireless access technologies necessitates the convergence of multimedia (audio, video, and text) services on a unified global (seamless) network infrastructure. Circuit-switched proprietary telecommunication networks are evolving toward more cost-effective and uniform packet-switched networks such as those based on IP. However, one of the key challenges for the deployment of such wireless Internet infrastructure is to efficiently manage user mobility. To provide seamless services to mobile users, several protocols have been proposed over the years targeting different layers in the network protocol stack. In this article we present a cross-layer perspective on the mobility protocols by identifying the key features of their design principles and performance issues. An analysis of the signaling overhead and handoff delay for some representative protocols in each layer is also presented. Our conclusion is that although the application layer protocol is worse than the protocols operating in the lower layers, in terms of handoff delay and signaling overhead, it is better suited as a potential mobility solution for the next-generation heterogeneous networks, if we consider such factors as protocol stack modification, infrastructure change, and inherent operational complexity.  相似文献   

18.

Crowdsourcing-based road pavement monitoring is a new computing paradigm, where some drivers detect road surface information and publish it to the data center, while other drivers download it for use. However, current road pavement monitoring schemes lack an incentive mechanism, which discourages drivers from publishing road surface information. More importantly, current security protocols for crowdsourcing-based systems are built on real identities of drivers, resulting in the user privacy problem. At the same time, current security protocols for crowdsourcing-based systems use time-consuming bilinear map for designing cryptographic algorithms, resulting in the efficiency problem. To solve the above problems, we present a secure incentive mechanism for road pavement monitoring systems called SIM-RPM. Different from protocols of this field, SIM-RPM is built on pseudonyms, which can provide user privacy protection for drivers. Moreover, by designing an access control protocol, SIM-RPM enables drivers to sell road surface information, which encourages drivers to attend the road pavement monitoring system. Finally, to reduce the time cost, we introduce the Bloom filter technique to SIM-RPM, and design novel light-weight cryptographic algorithms. By doing so, SIM-RPM provides a secure and efficient incentive mechanism for crowdsourcing-based road pavement monitoring systems. Experimential results show SIM-RPM is feasible for real world applications.

  相似文献   

19.
The restructuring of the electric power grid has created new control and monitoring requirements for which classical technologies may be inadequate. The most obvious way of building such systems, using TCP connections to link monitoring systems with data sources, gives poor scalability and exhibits instability precisely when information is most urgently required. Astrolabe, Bimodal Multicast, and Gravitational Gossip, technologies of our own design, seek to overcome these problems using what are called "epidemic" communication protocols. This paper evaluates a hypothetical power monitoring scenario involving the New York State grid, and concludes that the technology is well matched to the need.  相似文献   

20.
The application of wireless sensor networks (WSNs) technology in monitoring systems is demanding more efficient services to fulfill the requirements of the monitoring task. For this purpose, the simultaneous presence of features such as different communication mediums (air and water) used by nodes and various sizes of data generated by heterogeneous nodes are the key obstacles to build a communication protocol, which can ensure the reliable data delivery. This work terms such WSNs as mixed wireless sensor networks (MWSNs) which contains the aforementioned features. In this paper, we introduce a new cross‐layer protocol for mixed wireless sensor network (XMSN) which can adapt these features. The proposed cross layer protocol XMSN for such mixed environment is implemented and analyzed extensively in Castalia simulator. The performance of XMSN is compared with composition of well‐known protocols, namely, CTP plus BoX‐MAC‐2. The result shows that XMSN has better efficiency in terms of end‐to‐end delay, energy consumption, and goodput than that of CTP plus BoX‐MAC‐2 protocol.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号