首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
This paper discusses problems of muhicasting and its application. Two ways are proposed to overcome theproblems of muhicasting according to the architectures of current networks and the functional requirements of asurveillance System. One is that Winsock API is directly used to implement muhicasting on a network supporting multicasting. The other adopts the technology of proxy server and tunneling on a network not supporting multicast-ing. In addition,this paper discusses some techniques of muhicasting,such as sending,resending,auto-adjusting with the change of the transmission aualitv of networks .and the management of multicast group and multicast addresses.  相似文献   

2.
基于蓝牙的无线校园网接入模式研究   总被引:3,自引:0,他引:3  
Bluetooth technique is a kind of close-distance wireless communication standard which has low wastage Using bluetooth technique in campus network can form bluetooth wireless campus network.This paper analyzes topologic structure of bluetooth technique and introduces the concept of bluetooth wireless campus network ,at last the application manners of bluetooth technique in campus network are studied in detail.  相似文献   

3.
In mobile network, quality of service (Qos) is difficultly guaranteed for the particularity of mobile network. If the system knows, prior to the mobile subscriber movement, the exact trajectory it will follow, the Qos can be guaranteed. Thus, location prediction is the key issue to provide quality of service to mobile subscriber. In the present paper, RBF Network of Neural Network techniques were used to predict the mobile user's next location based on his current location as well as time. The software Matlab 6.5 was used to confirm the parameters of RBF network, and to same training data, makes the detailed contrast with resilient propagation BP and BP in learning time and steps of learning. Experiment results show that predicted locations with RBF are more effective and accurate than resilient BP.  相似文献   

4.
On environment-driven software model for Internetware   总被引:8,自引:0,他引:8  
Internetware is envisioned as a general software paradigm for the application style of resources integration and sharing in the open, dynamic and uncertain platforms such as the Internet. Continuing the agent-based Internetware model presented in a previous paper, in this paper, after an analysis of the behavioral patterns and the technical challenges of environment-driven applications, a software-structuring model is proposed for environment-driven Internetware applications. A series of explorations on the enabling techniques for the model, especially the modeling, management and utilization of context information are presented. Several proto-typical systems have also been built to prove the concepts and evaluate the techniques. These research efforts make a further step toward the Internetware paradigm by providing an initial framework for the construction of context-aware and self-adaptive software application systems in the open network environment.  相似文献   

5.
To meet the future internet traffic challenges, enhancement of hardware architectures related to network security has vital role where software security algorithms are incompatible with high speed in terms of Giga bits per second (Gbps). In this paper, we discuss signature detection technique (SDT) used in network intrusion detection system (NIDS). Design of most commonly used hardware based techniques for signature detection such as finite automata, discrete comparators, Knuth-Morris-Pratt (KMP) algorithm, content addressable memory (CAM) and Bloom filter are discussed. Two novel architectures, XOR based pre computation CAM (XPCAM) and multi stage look up technique (MSLT) Bloom filter architectures are proposed and implemented in third party field programmable gate array (FPGA), and area and power consumptions are compared. 10 Gbps network traffic generator (TNTG) is used to test the functionality and ensure the reliability of the proposed architectures. Our approach involves a unique combination of algorithmic and architectural techniques that outperform some of the current techniques in terms of performance, speed and power-efficiency.  相似文献   

6.
Each lnternet communication leaves trails that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source, destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency[~l, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, the author investigate the following technical question: What implementation techniques can be configured to truly reduce anonymity leaks using deployable systems and exploiting the popular Tor security strategies.  相似文献   

7.
This paper first establishes a neural network model for logic circuits from the truth tableby using linear equations theory,presents a kind of ATPG neural network model,and investigates energy local minima for the network.And then,it proposes the corresponding techniques to reduce the number of energy local minima as well as some approaches to escaping from local minimum of energy.Finally,two simulation systems,the binary ATPG neural network and the continuous ATPG neural network,are implemented on SUN 3/260 workstation in C language.The experimental results and their analysis and discussion are given.The preliminary experimental results show that this method is feasible and promising.  相似文献   

8.
In the mobile ad hoc networks, due to the multi-hop of the data, the limited bandwidth and the dynamic changes of the network topology, the network performance is hindered. This paper proposes a Load-based Queue Scheduling algorithm (LBQS) for MANET. Nodes thoroughly consider their own load states when forwarding packets. The priorities of packets are assigned according to the current node's load level. When nodes are leisure, they should help other nodes to construct route first. In order to avoid network transmission delay increasing and packets losing, nodes should delay or forbid the construction of new route passing through them when their load level is high. The simulation results show that LBQS algorithm can effectively decrease the network transmission delay and promote the network throughput to a certain extent.  相似文献   

9.
In the ages of current network technology, as a new technology, the emergence of mobile agent shows us a wider and wider application prospect in the fields of network technology, such as Network Management,Intelligence Information Retrieval and Electronic Commence and so on. The security is the essence of mobile agent technology. In this paper we analyze the security issues and survey some representative approaches to solve the problem in mobile agent systems. We focus on the issues about the agent's security and propose a master-slave designpattern based security model for mobile agent called SMAP(Secure Mobile Agent Platform). In the end we give anapplication example to show how to use these.  相似文献   

10.
CMOS Design of Ternary Arithmetic Devices   总被引:3,自引:0,他引:3       下载免费PDF全文
This paper presents CMOS circuit designs of a ternary adder and a ternary multiplier,formulated using transmission function theory.Binary carry signals appearing in these designs allow conventional look-ahead carry techniques to be used.compared with previous similar designs,the circuits proposed in this paper have advantages such as low dissipation,low output impedance,and simplicity of construction.  相似文献   

11.
近些年来,Web Service技术逐渐在校园网资源中得到了一定应用,这主要是由于目前各个学校校园网络资源已经极为丰富,但是由于没有进行很好的分配,使得校园网络资源在实行共享方面面临着较大的困难,不利于校园网络资源共享平台的建立。文章通过对校园网络资源在使用的过程中存在的问题进行了分析,提出了一种基于Web Service技术的校园资源共享平台的建立,而且对Web Service技术的相关方面进行了阐述,为有效地构建一个基于Web Service技术的校园资源共享平台提供依据,从而更好地促进校园资源的实现共享。  相似文献   

12.
资源建设已经成为当前数字化校园完善的重要内容,通过网络技术能够有效地实现资源共享,进而提升校园的共组效率。重点分析了当前实现校园网资源共享的几种策略,目的为当前校园网的信息资源共享的建设提供一些可以参考的技术。  相似文献   

13.
近些年来,网络技术的不断发展为现代校园网络的建设提供了更为坚实的技术支撑,因此,校园网络的建设也随之受到了越来越多的重视。校园网络的建设与完善是当前高校管理活动中一项重要的内容,从分析校园网络的需求出发,对于校园网络的规划与设计的相关问题进行简单的阐述,为校园网的建设工作提供更多可行性建议。  相似文献   

14.
安全、稳定和高速传输已经成为衡量园区网建设成功与否的重要标准,结合园区网的现状,通过配置PVLAN(PrivateVLAN)交换机,展现PVLAN在园区网中的特性和QOS(QualityofService)优势,为园区网的长期建设提供有力的技术支持。  相似文献   

15.
随着时代的发展,信息技术在我们的生活中作用越来越明显。在高校的校园建设中,校园网建设也成为了一 个重要的组成部分。本文主要介绍了新型大学校园网络建设的作用,并进一步分析了当下大学校园网络建设的问题,最后阐 述了关于新型大学校园网络建设的思考与建议。  相似文献   

16.
校园网是学校教学和科研以及管理活动重要的信息平台,校园网在高校建设和发展中的作用越来越大。从实用角度出发,根据目前高校校园网的运行实际,对校园网的设计、建设和管理进行探讨。  相似文献   

17.
本文主要讨论了针对校园网建设过程以及后期的使用和维护过程中,现代网络安全技术的应用.文章开头主要对校园网络做了简要介绍,并就当前环境下校园网建设过程中所面临的各种威胁做了深入地分析与研究.其次重点介绍了校园网络安全问题的一些具体表现形式.并就防火墙杀和毒软件的应用以及提高广大教师学生的网络安全防护意识两方面对网络安全技术在校园网建设中的应用进行了系统研究与讨论.文章最后在总结全文的基础上对未来校园网络的建设做了展望.  相似文献   

18.
校园网络只有抓好安全建设,才能确保网络安全。首先校园网络管理员要把握校园网络安全建设中容易出现的问题,通过防火墙采用数据处理系统技术进行管理安全保护。另外,要定期对校园网络进行病毒检测,并采用信息加密技术等方式确保校园网络的安全,同时职业技术学院校园网络安全建设,要加强安全责任和组织管理,并提升校园网络安全管理者的业务素质。  相似文献   

19.
随着计算机网络技术的发展,现代教育逐渐实现了信息化、网络化的转变,校园网建设已成为各级学校的重点建设项目,校园网安全维护已成为学校日常管理的重要内容之一。文章主要分析了高职院校的校园网建设与安全维护,以期为高职院校的相关工作提供引导。  相似文献   

20.
浅谈校园网安全问题及解决办法   总被引:2,自引:0,他引:2  
校园网络作为信息化建设的主要载体,校园网络安全已经成为当前各高校网络建设中不可忽视的首要问题。本文基于当前高校网络安全的现状及特点,提出校园网的安全问题及解决办法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号