共查询到20条相似文献,搜索用时 0 毫秒
1.
Shankar A.U. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1991,79(12):1687-1707
A method for specifying services, specifying protocols, and constructing protocol specifications by stepwise refinement of service specifications is presented. The method is based on assertional reasoning and a refinement relation between state transition systems. The method is demonstrated on the transport layer, which is used by application protocols such as electronic mail, file transfer, remote login, etc. A succession of specifications is constructed, starting from a very abstract transport service and culminating in specific transport protocols comparable to TCP and ISO TP4. Each specification offers both connection management and connection-specific data transfer. It is shown how any connection-independent data transfer protocol can be transformed to offer connection-specific data transfer service 相似文献
2.
介绍了联机计费采集的提出背景,FTAM协议作为交换机联机计费数据采集协议的实现过程,重点阐述了EWSD交换机FTAM联机采集连接方式、OSI协议栈的功能和计费策略,并提出了EWSD联机采集实施中应注意的问题。 相似文献
3.
4.
A fuzzy knowledge construction method is proposed for application to human-machine interfaces. This paper considers a human movement estimation system to be one of the interfaces. This estimation system transforms human physical movements into qualitative linguistic labels. For example, the degrees of magnitude and speed of the physical movement are represented by qualitative words. It is difficult to construct the transformation knowledge because the relation between the movements and the labels is fuzzy. This paper proposes a method of constructing the knowledge. This proposed method uses a fuzzy associative memory organizing units system and is applied to estimating human sports movements. Experimental results show that the proposed method is suitable for application to human-machine interfaces 相似文献
5.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1983,71(12):1372-1377
Among the more important new works on the Physical Layer are perhaps the CCITT Draft Recommendation X.211, Physical Layer Service Definition, and the emerging Physical Layer protocols of the ISDN's (Integrated Services Digital Networks). Discussed along with these new developments, which came in time after the definition of the OSI model, are some of the widely used classic older standards and specifications, such as X.21, V.24, and V.54, which do not always fit nicely within the model layers but which deal substantively with the Physical Layer. This paper starts with an overview of Physical Layer documents, continues with-a detailed discussion of architectural service specifications, and concludes with a discussion of related standards. 相似文献
6.
Protocols are large and complex software systems. Complete conformance testing of an implementation against its standard may not be feasible in terms of the resources available. This paper discusses a new approach, the P-method, to the testing of meaningful subsets of communication protocols for an asynchronous model of communication. The approach is based on the probabilistic verification of protocols, which is carried out on the more probable part of the protocol first. The technique can be used for generating probabilistic test sequences for the conformance testing of communication protocols to standards. The proposed method yields meaningful protocol test sequences which test the most probable behaviors of a protocol when the testing of the complete protocol is not feasible. Probabilistic test sequences can be categorized into different classes. The higher the class a probabilistic test sequence is in, the larger the extent of the protocol it covers, and the better is the fault coverage. If the class of a test sequence is high enough, its fault coverage is comparable to the fault coverage of test sequences generated by other methods. Results from a study of the P-method, using alternating bit protocol (ABP) and a subset of NBS TP4 as examples, support the claims above. It can also be shown that if errors are introduced only to the more probable part of the protocol, the fault coverage of P-method is also comparable to other methods 相似文献
7.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1983,71(12):1397-1400
This paper describes the principles of the Session Layer of Open Systems Interconnection and the current standardization status. The Session Layer provides the means necessary for cooperating Presentation-entities to organize and synchronize their dialogue, and to manage their data exchange. To do this, the Session Layer provides services to establish a session connection between two Presentation-entities, and to support orderly data exchange interactions. 相似文献
8.
A technique for designing new symmetric biorthogonal wavelets from a given symmetric regular filter is presented. The main idea is to find a symmetric complementary filter of a given regular filter such that it has the least mean square (LMS) amplitude deviation from the ideal halfband lowpass filter. New biorthogonal wavelet filter pairs can be obtained via factoring the product of the complementary polynomial and the given binomial. By applying these new symmetric biorthogonal wavelet filters to the compression of some complicated images an improved result in reducing artefacts may be achieved 相似文献
9.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1983,71(12):1378-1383
Data Link control protocols are among the oldest recognized communication protocols. The protocol provides a well-defined set of rules which govern the interchange of supervisory information and user data over the interconnecting communication link. Such rules are essential to successful and efficient operation. Data Link protocols have evolved continuously from the early free-wheeling protocols, through the widely implemented character-oriented protocols, to the increasingly popular bit-oriented protocols. Data Link protocols play a vital role in the drive toward Open Systems Interconnection (OSI). Constituting Layer 2 of the International Standards Organization (ISO) Reference Model, these procedure and the services that they offer, are directed at assuring successful and reliable transfer of information over point-to-point or multipoint data links. This paper reviews the role of link protocols in the open systems environment. It discusses the objectives and functions of these protocols and delineates the services provided to the higher layers. A review, with examples, of the protocols suitable for use within the framework of OSI is included. The paper concludes with a look at some of the current Data Link issues. 相似文献
10.
Providing support for TCP with good quality link connection is a key issue for future wireless networks in which Internet access is going to be one of the most important data services. A number of schemes have been proposed in literature to improve the TCP performance over wireless links. In this paper, we study the performance of a particular combination of link layer protocol (e.g., radio link protocol or RLP) and MAC retransmissions to support the TCP connections over third generation (3G) wireless CDMA networks. We specifically investigate two metrics - the packet error rate and the delay provided by RLP and MAC retransmissions - both of which are important for TCP performance. For independent and identically distributed (i.i.d) error channels, we propose an analytical model for RLP performance with MAC retransmission. The segmentation of TCP/IP packets into smaller RLP frames, as well as the RLP buffering process, is modeled using a Markov chain. For correlated fading channels, we introduce an analytical metric called RLP retransmission efficiency. We show that: 1) the RLP frame size has significant impact on the overall 3G system performance, 2) MAC layer retransmissions significantly improve the TCP performance, and 3) the RLP retransmission scheme performs better in highly correlated channels, while other scheme performs better in low correlated channels. Simulation results also confirm these conclusions. 相似文献
11.
The authors propose a method for incorporating engineering information about failure mechanisms into a statistical lifetime model. The central idea is that wear, stress, and strain are more directly related to failure than is component age. With an application to tribology, they use the method to derive a lifetime model which explicitly uses information about wear. The model is contrasted with the more common technique of fitting the parameters of a statistical distribution. A primary benefit of an engineering-based model is its interpretability for connecting lifetime data for similar components used under differing operating conditions, such as during accelerated lifetime testing 相似文献
12.
A two-dimensional (2-D) multiple invariance technique for computing signal subspaces for uniform rectangular arrays (URAs) of size M×N sensors is introduced. The method is based on a multiple maximum overlap configuration of the sensors in the array with m×n subarrays of (M-m+1)×(N-n+1) sensors each. We exploit the fact that the stacked subspace of the subarray sensor output signals admits a two-level equirotational stack parametrization. We introduce a TLS-type algorithm for estimating the parameters of this equirotational stack subspace model. Based on this method of equirotational stack subspace fitting, the overall array signal subspace can be estimated with a much higher accuracy than with conventional unstructured SVD and TLS techniques. Detailed experiments validate the theoretical results. We propose a variant of 2-D ESPRIT based on equirotational stack subspace fitting. This 2-D equirotational stack ESPRIT (2-D ES-ESPRIT) algorithm clearly outperforms conventional unstructured variants of 2-D ESPRIT. A detailed comparison with 2-D unitary ESPRIT is presented 相似文献
13.
移动协议网络层切换时延分析 总被引:1,自引:1,他引:1
对移动协议网络层切换时延进行了研究。提出合适的网络模型,从理论上分析了各移动协议的路径更新时间,并采用数值仿真的方法对采用微观移动协议和只使用移动IP协议以及采用不同的微观移动协议的情形进行了比较。研究结果表明路径更新时间与所采用的移动协议的路径更新方法相关;采用微观移动协议时的路径更新时间远小于只使用移动IP协议时的情形;在所有的微观移动协议中,MIP-RR协议中使用的路径更新方法性能最佳。 相似文献
14.
A. V. Novoselov V. E. Antsiperov S. A. Nikitov 《Journal of Communications Technology and Electronics》2007,52(10):1133-1136
The problem of secure information transmission over networks in distributed systems is considered. It is shown that protective measures that are used in such systems only on the network layer are insufficient. Analysis of the data packets transmitted between the system components has shown that, in the systems with high requirements for information security, the application-level security protocols should be used. It is shown that the maximum independence of security protocols from the remaining data-transmission protocols should be provided. 相似文献
15.
16.
作为OSGi框架中最上面的一层,服务层带来了更多的动态性,并且使用了大众基本了解过的面向服务编程模型,其好处是显而易见的。文中讲解了什么是服务层和服务层对于OSGi框架的意义,此外,还将提出什么时候应该使用服务,什么时候不应该使用。最后将会是OSGi服务层的一些基础,包括如何定义、注册和发现服务。 相似文献
17.
Chitre D.M. Lee H.-M. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1990,78(7):1289-1294
The International Standards Organization's (ISO's) seven-layer reference model for computer communication protocols is discussed. The layering arises out of the stratification of functions across the layers. The various protocol functions performed at each higher layer are examined in detail, identifying the appropriate procedures that affect the efficient operation of these protocols over satellite links for different ranges of transmission speeds and bit error rates. Appropriate modifications are presented for removing the possible degradation and improving the performance. Specifically, changes are discussed in Transport Protocol Class 4 (ISO 8073), Session Protocol (ISO 8327), and the File Transfer Access, and Management (FTAM) Protocol (ISO 8571) 相似文献
18.
19.
Wireless Networks - Wide-spread use of low power lossy networks (LLNs) in internet of things (IoT) raises numerous challenges to video transmission over those networks. Deployment of proper... 相似文献
20.
In the application of real-time identification methods for diagnosis or adaptive control of biomedical systems, there is often known model information that is ignored. Constraints on the allowable values of parameters, which may be based on physical considerations, are often neglected because the information does "fit" easily into commonly used parameter-identification algorithms. In this paper a method of incorporating constraints on model parameters is developed. This method is applicable to most recursive parameter-identification algorithms. It enforces linear equality constraints on identified parameters. The use of this method for the real-time identification of autoregressive moving-average-type time series models, subject to parameter constraints, is described in detail. These constraints may be time varying. At each time step, the parameter estimate obtained by a recursive least squares estimator is orthogonally projected onto the constraint surface. This simple idea, when appropriately executed, enhances the output prediction accuracy of estimated parameters. Using constraint information in this way is important when we do not wish to destroy a "natural" parameterization of the model (by an initial projection to incorporate equality constraints), or when we cannot use a single initial model simplification (because the constraints are time varying or involve inputs and outputs). Because it improves output prediction at future times, this method is advantageous for use in predictive adaptive controllers. The use of this algorithm is demonstrated in the identification of electrically stimulated quadriceps muscles in paraplegic human subjects, using percutaneous intramuscular electrodes. The nonlinear steady-state force versus pulsewidth recruitment characteristic of the electrode-muscle system is identified simultaneously with the input-output muscle response dynamics, using a Hammerstein-type model. Knowledge of the recruitment curve's shape is translated into constraints on the identified parameters. This information improves the experimental predictive quality of the identified model. 相似文献