首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
一个基于信任的嵌入式Internet协同工作模型   总被引:4,自引:1,他引:3  
提出了一种基于社会信任关系的协同工作网络模型,并将其应用在嵌入式Internet系统中,在嵌入式Internet系统中,每一个嵌入设备都是整个嵌入式分布网络中的一个端点,端点之间可以协作完成某一复杂功能,如分布式计算,普适计算等。在协作过程中,端点之间逐步形成了一种相互信任的关系,这种关系以信任表的形式存在本地端点中,并通过不断的自学习来修改信任表。本文给出了信任模型的建立过程以及信任参数的更新和传递算法,最后在文中还给出了一个使用此模型的实例。  相似文献   

2.
介绍了嵌入式Internet的发展目的、发展现状和技术模型,以及当前所用实现Internet的嵌入式TCP/IP协议栈,重点介绍了1wIP协议栈,最后阐述了嵌入式Internet的发展前景.  相似文献   

3.
基于SSL协议的嵌入式WEB系统安全性研究与实现   总被引:4,自引:0,他引:4  
Internet上最流行的安全协议SSL与访问控制机制配合使用,可以为嵌入式WEB系统提供一个完善安全的解决方案。本文将介绍在嵌入式WEB服务器中实现SSL协议的两种开放套件包所用典型技术、策略和方法.以及一些访问控制机制。并指出了今后的研究工作。  相似文献   

4.
本文运用嵌入式Internet技术,设计了一个基于TCP/IP协议的嵌入式网络打印服务器,提出了本系统中TCP/IP协议的剪裁方案,分析了系统软硬件的设计思路,最后通过测试程序验证了其可行性.  相似文献   

5.
嵌入式技术和Internet技术的发展,使得嵌入式设备也能够接入Internet网。为此,文中介绍了嵌入式Internet技术的基本原理和实现方案,讨论了MCU应用系统接入Internet网的通信协议。针对嵌入式Internet技术将在实际应用中的技术难点,提出了一种嵌入式网关的设计方案,利用该方案可嵌入式系统通过以太网接入Internet网络中。  相似文献   

6.
区分服务模型是一种在固定Internet中提供服务质量保证的服务模型,但是它并不是为移动环境设计的,特别是当采用移动IP作为移动管理协议时,区分服务模型会引起一系列问题。本文讨论和分析了移动环境下区分服务模型存在的问题,并且提出了一些解决方案。  相似文献   

7.
传统的Internet应用以PC为中心,未来的Internet应用将转向以嵌入式设备为中心。据预测,将来在Internet上传输的信息中将有70%的信息来自于小型嵌入式系统。提出了由单片机 操作系统 嵌入式TCP/IP协议栈 测控对象来实现嵌入式网络测控系统接口的一种实现方法。并给出了嵌入式TCP/IP协议栈在单片机上的实现方法、讨论了通用网关接口(CGI)实现的作用以及测控系统的主要作用的基本原理。  相似文献   

8.
在电信网IP化的趋势下,越来越多的IP网络设备在电信网中得到应用。在分析TMN与SNMP的框架、协议和管理信息模型的基础上。提出了基于TMN的电信网IP网络设备管理方案,并给出了相应的系统结构与软件结构。为电信网络中IP网络设备的管理提供了一种可行的方案。  相似文献   

9.
嵌入式系统的技术和发展(下)   总被引:1,自引:0,他引:1  
4.嵌入式系统和Internet的连接嵌入式系统接入Internet和微型计算机系统接入Internet一样,需要通过相应的通信协议。因此,嵌入式系统必须要通过TCP/IP协议接入Internet。在目前,一般采用两种不同的方法实现这一目标。第一种方法是由嵌入式系统对信息进行TCP/IP协议处理,使得信息变为可在Internet上传送的IP数据包,从而实现嵌入式系统接入Internet。第二种方法是通过网关进行TCP/IP协议处理,嵌入式系统在非TCP/IP协议的异构网中工作,由网关或路由器把信息变换成IP包再送入Internet中传送。在目前,嵌入式系统和Internet连接有多…  相似文献   

10.
基于以太网的嵌入式Web服务器的设计与实现   总被引:5,自引:1,他引:4  
文章设计并实现一种可以将基于TCP/IP协议的计算机网络设备,与基于CAN总线协议的底层现场网络连通的嵌入式Web服务器。用户可以使用PC机通过Internet进行远程访问和控制WEB服务器,从而能够将工业现场测控层得到的数据方便快捷地送到异地的管理监控层。  相似文献   

11.
With the advent of the Internet of Things (IoT), more and more devices can establish a connection with local area networks and use routing protocols to forward all information to the sink. But these devices may not have enough resources to execute a complex routing protocol or to memorize all information about the network. With proactive routing protocols, each node calculates the best path, and it needs enough resources to memorize the network topology. With reactive routing protocols, each node has to broadcast the message to learn the right path that the packets must follow. In all cases, in large networks such as IoT, this is not an appropriate mechanism. This paper presents a new software‐defined network (SDN)–based network architecture to optimize the resource consumption of each IoT object while securing the exchange of messages between the embedded devices. In this architecture, the controller is in charge of all decisions, and objects only exchange messages and forward packets among themselves. In the case of large networks, the network is organized into clusters. Our proposed network architectures are tested with 1000 things grouped in five clusters and managed by one SDN controller. The tests using OpenDayLight and IoT embedded applications have been implemented on several scenarios providing the ability and the scalability from dynamic reorganization of the end‐devices. This approach explores the network performance issues using a virtualized SDN‐clustered environment which contributes to a new model for future network architectures.  相似文献   

12.
Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devices in a self-organized manner. A consequence of this principle is that end-user devices must also perform routing functions. However, end-user devices can easily be compromised, and they may not follow the routing protocol faithfully. Such compromised and misbehaving nodes can disrupt routing, and hence, disable the operation of the network. In order to cope with this problem, several secured routing protocols have been proposed for ad-hoc networks. However, many of them have design flaws that still make them vulnerable to attacks mounted by compromised nodes. In this paper, we propose a fully automatic verification method for secure ad-hoc network routing protocols that helps increasing the confidence in a protocol by providing an analysis framework that is more systematic, and hence, less error-prone than the informal analysis. Our method is based on a deductive proof technique and a backward reachability approach. The main novelty of this approach compared to the prior works is that beside providing expressive semantics and syntax for modelling and specifying secure routing protocols, it assumes an arbitrary topology, and a strong attacker model.  相似文献   

13.
基于OSGI的智能家庭系统的设计与实现   总被引:1,自引:0,他引:1  
张波  董康 《电子设计工程》2011,19(7):118-121
为了解决普适环境下智能家庭各类设备组网困难的问题,本系统采用OSGi(Open Service Gateway Initiative)服务框架和LonWorks现场总线技术,利用低压电力线载波手段来设计和实现智能家庭系统.利用上述方法可以极大地实现不同标准设备的组网,并且可以实现对智能家庭设备管理的灵活性和便捷性.  相似文献   

14.
This paper proposes iMobile, a proxy‐based platform for developing mobile services for various mobile devices and wireless access technologies. iMobile acts as a message gateway that allows mobile devices to relay messages to each other through various protocols on different access networks. It allows mobile devices to access internet services, corporate databases and to control various network devices. iMobile implements three key abstractions: dev‐let, info‐let and app‐let. An info‐let provides abstract view of information space. An app‐let implements service or application logic by processing information from various info‐lets. A dev‐let receives and sends messages through any particular protocols for mobile devices. The let engine supports user and device profiles for personalization and transcoding, and invokes proper app‐lets and info‐lets to answer requests from a dev‐let. The iMobile modular architecture allows developers to write device drivers, information access methods and application logic independently from each other. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

15.
在数字家庭网络中,UPnP与IGRS都能实现不同设备间无缝联接,但这两种协议存在差异,无法互联互通。针对该问题,从寻址、发现、描述、控制、事件几个方面着手,找出两个协议间的联系和区别,然后提出了一种新的方法:基于UPnP与IGRS互操作双协议框架。围绕该框架,详细描述了转换桥、虚设备管理以及UPnP/IGRS设备管理三个模块的实现过程。将基于双协议框架开发的程序运行在PC上,使其与IGRS设备和UPnP设备交互。通过实验结果发现,PC能够发现这两种设备,而且这两种设备间也能够互相发现,共享资源。提出的基于UPnP与IGRS互操作双协议框架能够有效实现这两种协议间的互操作。  相似文献   

16.
Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.  相似文献   

17.
Kagal  Lalana  Korolev  Vladimir  Avancha  Sasikanth  Joshi  Anupam  Finin  Tim  Yesha  Yelena 《Wireless Networks》2002,8(6):619-635
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become computationally enabled. Micro/nano sensors will be widely embedded in most engineered artifacts, from the clothes we wear to the roads we drive on. All of these devices will be (wirelessly) networked using Bluetooth, IEEE 802.15 or IEEE 802.11 for short range connectivity creating pervasive environments. In this age where a large number of wirelessly networked appliances and devices are becoming commonplace, there is a necessity for providing a standard interface to them that is easily accessible by any user. This paper outlines the design of Centaurus, an infrastructure for presenting services to heterogeneous mobile clients in a physical space via some short range wireless links. The infrastructure is communication medium independent; we have implemented the system over Bluetooth, CDPD and Infrared, three well-known wireless technologies. All the components in our model use a language based on Extensible Markup Language (XML) for communication, giving the system a uniform and easily adaptable interface. Centaurus defines a uniform infrastructure for heterogeneous services, both hardware and software, to be made available to diverse mobile users within a confined space.  相似文献   

18.
Static spectrum allocation prohibits radio devices from using spectral bands designated for others. As a result, some bands are under-utilized while other bands are over-populated with radio devices. To remedy this problem, the concept of spectrum agility has been considered so as to enable devices to opportunistically utilize others' spectral bands. In order to help realize this concept, we establish an analytical model to derive performance metrics, including spectrum utilization and spectrum-access blocking time in spectral-agile communication systems. We then propose three basic building blocks for spectral-agile systems, namely spectrum opportunity discovery, spectrum opportunity management, and spectrum usage coordination, and develop protocols for each blocks. These protocols are integrated with the IEEE 802.11 protocol, and simulated using ns-2 to evaluate the protocol overhead. The simulation results show that our proposed protocols can improve the throughput of an IEEE 802.11 wireless LAN by 90% for the simulated scenarios, and the improvements matched well our analytical model. These results demonstrate the great potential of using spectrum agility for improving spectral utilization in an efficient, distributed, and autonomous manner  相似文献   

19.
为改变运维部门的传统运维模式,建立新的自动化运维模式,本文提出一种云计算时代的DevOps自动化运维平台。该平台不仅能满足目前企业对云计算数据中心各类设备的日常运维管理要求,具备良好的扩展性,而且能够为纳管设备的整个管理生命周期提供一系列自动化管理手段,涵盖了其规划、设计、实施和运维等各个阶段,有效缩短上线周期、提高运维效率、有效支撑业务、保障系统合规、有效管理风险。  相似文献   

20.
戴丽  袁琴  朱顶贵  王增香  赵俊 《电子器件》2021,44(1):192-196
满足移动医疗设备的区域性定位、运行轨迹跟踪及现场可视化管理需求,实现重点区域的越界和入侵告警管理.基于CSS技术和边缘计算技术,设计医疗设备定位管理系统,定义系统层次功能,优化定位滤波算法,构建实验测试系统并完成系统性能测试.经过Kalman滤波后,系统定位精度可提高到1 m左右,传输速率为1 Mbit/s信号.在1μ...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号