共查询到20条相似文献,搜索用时 140 毫秒
1.
主要介绍Intel PXA255平台网络设备驱动的软硬件设计和实现方案,分析了嵌入式Linux下网络设备驱动的一般特性与编程要点,阐述了网络设备驱动如何处理数据的发送、接收、超时等相应事件,并简要介绍了网卡驱动与上层协议之间的交互。分别利用系统测试和应用测试验证该设计方案,结果表明网卡驱动能够很好地实现网络包数据的传输,达到较快的速度和较高的稳定性。 相似文献
2.
3.
接入点AP(Access Point)是构建无线局域网的重要组成部分,无线网络用户节点通过AP接入到有线网络中。但是AP的价格相对无线网卡来讲要昂贵得多,而且一些AP的替代方案比较复杂,对用户的操作水平要求较高。因此,为了节省成本,更好地利用现有的设备,扩展无线网卡的功用,章提出并实现了一个简单快速的无线AP在PC上的实现技术方案。该方案使用一块普通的有线网卡和一块无线网卡,利用Linux(或其他遵守GPL源码公开的操作系统)机器,安装一个简单的软件驱动模块,实现无线节点与有线网络的连接。实验证明,这种解决方案不仅可以实现AP的功能,同时还具有取材和安装简单(一条指令),实现快速的优点。 相似文献
4.
接入点AP(Access Point)是构建无线局域网的重要组成部分,无线网络用户节点通过AP接入到有线网络中。但是AP的价格相对无线网卡来讲要昂贵得多,而且一些AP的替代方案比较复杂,对用户的操作水平要求较高。因此,为了节省成本,更好地利用现有的设备,扩展无线网卡的功用,文章提出并实现了一个简单快速的无线AP在PC上的实现技术方案。该方案使用一块普通的有线网卡和一块无线网卡,利用Linux(或其他遵守GPL源码公开的操作系统)机器,安装一个简单的软件驱动模块,实现无线节点与有线网络的连接。实验证明,这种解决方案不仅可以实现AP的功能,同时还具有取材和安装简单(一条指令),实现快速的优点。 相似文献
5.
针对当前流媒体传输存在的由于高并发访问带来的网络带宽不足而造成的网络拥塞等问题,提出了RTP负载格式优化策略和RTP打包以后数据独特的分发襄略,并在此基础上设计了多网卡绑定的视频传输系统。通过实验证明,在并发访问大的情况下,该系统提高了服务器的抗并发访问能力,有效控制了视频传输的丢包率,保证了服务器访问的稳定和畅快。 相似文献
6.
7.
针对当前流媒体传输存在的由于高并发访问带来的网络带宽不足而造成的网络拥塞等问题,提出了RTP负载格式优化策略和RTP打包以后数据独特的分发策略,并在此基础上设计了多网卡绑定的视频传输系统。通过实验证明,在并发访问大的情况下,该系统提高了服务器的抗并发访问能力,有效控制了视频传输的丢包率,保证了服务器访问的稳定和畅快。 相似文献
8.
9.
10.
11.
文章介绍了Linux下设备驱动程序的基本框架,讨论了基于Linux的光纤通道网卡驱动程序的设计和开发,并针对开发中的具体问题给出了解决方法,以及调试技巧。 相似文献
12.
为了促进高速光纤通道网卡在Windows下的应用,介结了先锋光纤通道网卡的特点,分析了Windows 2000设备驱动程序的原理,开发了Windows下高速网卡的驱动程序.程序内采用软件内数据零拷贝技术,针对先锋网卡特点优化数据收发路径,实现了数据的高速传输.经过试用,表明该方法是可行的. 相似文献
13.
14.
Design of Secure Distributed Intrusion Detection Systems 总被引:1,自引:0,他引:1
1 IntroductionWiththedevelopmentofInternet,variousnet workincidentshavedonegreatharmtonetworkin formationsystemsandusers.Manysecurityprod ucts[1 ] alsoappearsuchasfirewall,VirtualPrivateNetwork (VPN)andIntrusionDetectionSystems(IDS) .Intrusiondetectionsystems… 相似文献
15.
MA Zhaofeng 《电子学报:英文版》2017,26(4)
Data leakage prevention (DLP) is very im-portant for sensitive or unauthorized data protection, how-ever, most current DLP technologies are based on con-tent monitor, detection and filtering, which can be easily bypassed or cheated. We propose a thorough and high-level Content protection secure scheme of DLP (CPSec DLP) based on kernel-level mandatory encryption, in which we proposed mutual authentication and key agree-ment method between client and server, and we adopted SM2 algorithm for session key management; and we pro-pose kernel-level mandatory secure middleware for un-structured data protection, in which the secure middleware works in File system driver (FSD) layer supporting for"write-encryption, open-decryption" operation, once the data is written to storage space either in hard-disk or USB disk the data is mandatorily encrypted, while when the data is open the mandatory secure middleware decrypts the data to plain in system memory. Moreover we propose data share and delivery among domain internal users and external customers. In the CPSec DLP scheme, the encryp-tion algorithms, security policy and rules can be dynami-cally parameterized when necessary, while in the lifecycle the data management can only be used according to its usage control rules, such as read-only, write, save, print, export, backup rights. Upon the proposed CPSec DLP, we implemented the CPSec DLP system in kernel-level driver layer based on FSD, which supports parameterized process and document format for unstructured data leakage pro-tection. Large amount of experiments manifest the pro-posed scheme is secure, reliable, extendible and efficient for kinds of format unstructured data leakage protection. 相似文献
16.
文中针对NoC体系结构,提出了两种数据压缩技术,被称为高速缓存压缩和网络接口控制(NIC)内的压缩.性能实测结果指示压缩能够使NoC设计在较低的网络延迟、较低的功耗和改进应用性能等方面获得优势. 相似文献
17.
Advances in quantum computers pose potential threats to the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate against attackers equipped with quantum computational power, Multivariate Public Key Cryptosystems (MPKCs) has attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as multivariate signature schemes, and the way to construct an efficient MPKC enabling secure encryption remains unknown. By employing the basic MQ trapdoors, this paper proposes a novel multivariate encryption scheme by combining MPKCs and code based public key encryption schemes. Our new construction gives a positive response to the challenges in multivariate public key cryptography. Thorough analysis shows that our scheme is secure and efficient, and its private key size is about 10 times smaller than that of McEliece type cryptosystems. 相似文献
18.
对防火墙技术中使用的传输层驱动程序接口(TDI)过滤技术进行了分析,阐述了程序设计中的关键技术。给出了在TDI设计中应用程序的上网通告,内存的分配和释放在Windows下的实现流程及源代码。在对传输层驱动接口程序的性能分析的基础上,提出了改进驱动性能的优化方案,并对驱动开发过程的错误处理等技术在进行了说明。 相似文献
19.
20.
In this paper, we show how to use the dual techniques in the subgroups to give a secure identitybased broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security (adaptive security) under three static (i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security. 相似文献