首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Current network management needs an end‐to‐end overview of various flows rather than the information that is purely local to the individual devices. The typical manager‐centric polling approach, however, is not suitable to understand network‐wide behavior of a large‐scale Internet. In this paper, we propose a new management information base (MIB) approach called Service Monitoring MIB (SM MIB). The MIB provides a network manager with dynamic end‐to‐end management information by utilizing special packets. The special packet is an Internet control message protocol (ICMP) application that is sent to a remote network element to monitor Internet services. The SM MIB makes an end‐to‐end management feasible while it reduces management‐related traffic and manager‐to‐manager interactions. Real examples show that the proposed SM MIB is useful for end‐to‐end QoS monitoring. We discuss the accuracy of the obtained data as well as the monitoring overhead. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

2.
该文针对工业控制系统安全,提出面向数控系统(NCS)网络安全保护技术框架,选用国产密码系列算法中的SM2, SM3, SM4算法,设计并建立了数控网络(CNC)认证与验证模型(AUTH-VRF),分内外两层为数控网络提供安全防护。外层为数控网络设备间通信与传输进行安全认证实现网段隔离,内层验证通信协议完整性以确保现场设备接收运行程序的正确性与有效性;通过基于SM2, SM3, SM4算法设计和部署的外层防护装置,为分布式数控(DNC)设备与数控系统之间的通信提供身份认证与文件加密传输;同时针对工业控制网络的S7Comm工业通信协议数据,通过SM3算法验证专有工业协议数据完整性。通过网络攻击实验证明,AUTH-VRF模型可以为数控网络中工业生产数据提供有效的安全认证和资源完整性保护,为满足我国关键基础设施“国内、国外工业控制系统产品共同安全可控”和“安全技术深入工业控制系统各个层级”的需求提供了实际可行的技术参考方案。  相似文献   

3.
In this paper we propose a novel spectrum sharing protocol for overlay cognitive radio networks using non-orthogonal multiple access (NOMA), spatial modulation (SM) and antenna selection (AS). The proposed protocol allows a secondary transmitter (ST) to transmit simultaneously to both a primary receiver (PR) and a secondary receiver (SR) using SM. The usage of NOMA and SM will increase the spectral efficiency for both PR and SR with reduced detection complexity than the case without NOMA in which the detectors are required to jointly detect both SM symbols at each receiver. The application of AS at ST with regards to PR provides higher quality transmission for PR without affecting the performance of SR. The performance of the proposed protocol is investigated by derivations of upper bounds on the average symbol error probabilities at PR and SR and by Monte Carlo simulations. Analytical and simulation results show that the proposed protocol offers efficient spectrum utilization over spectrum sharing protocols proposed recently that uses SM – to convey the primary data to PR through the amplitude phase modulation technique and the secondary data to SR through the index of the active antenna.  相似文献   

4.
General packet radio service (GPRS) provides efficient access to the integrated services Internet from wireless networks. When the GPRS‐attached mobile station attempts to send or receive data, a packet data protocol (PDP) context shall be established. The GPRS session management (SM) supports the PDP context handling, which consists of PDP context activation, deactivation, and modification procedures. In this paper, we propose an SM software architecture for the serving GPRS support node. Our design goals are to achieve compatibility, modularity, and flexibility. More importantly, our approach can accommodate the design of the SM software architecture for third‐generation wireless networks. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

5.
提出了一种新型的适合于大规模应用层多播的模型VRBH(Virtual Ring-Based Hierarchy),它以环作为拓扑结构,同时引入了分层和虚拟环的概念。采用了基于优先级的动态规划方法使得该环状拓扑结构随时间的变化逐渐趋于合理,并且采取一定的措施使得当出现数据传输错误时可以进行快速的恢复。由仿真试验结果得知该模型具有较低的控制开销,较高的带宽利用率和较高的数据传输率,应用该多播模型可以较好地提高多播的性能。  相似文献   

6.
提出了基于进化规划的安全协议生成方法,并用BAN逻辑来描述和验证协议,为进一步提高协议生成效率,降低协议消息的冗余度,加入了协议优化模块.该方法具有较高的扩展性,对于不同的需求,可以生成不同的安全协议.实验表明,本文方法能够成功、高效地生成安全协议,保证所生成协议的安全性.  相似文献   

7.
Pavlov  G. Liotta  A. Abbi  P. Ceri  S. 《IEEE network》1998,12(5):10-20
CMIS/P is the OSI systems management service and protocol used as the base technology for the telecommunications management network. It is a generic object oriented protocol that provides multiple object access capabilities to managed object clusters administered by agent applications. Its navigation and object selection capabilities rely on traversing containment relationships. This is restrictive because information models for emerging broadband technologies (SDH/SONET, ATM) exhibit various other relationships. We present extensions to the CMIS service that provide a richer access language and show how these extensions can be supported by corresponding extensions to the CMIP protocol. These extensions allow traversal of any object relationship and filtering out objects at any stage of the selection process. CMIS++ provides much greater expressive power than CMIS, while CMIP++ supports the remote evaluation of the corresponding expressions, minimizing the management traffic required for complex management information retrieval. These extensions follow an incremental approach, starting from a version compatible with the current standard and gradually adding sophisticated features. The applicability and importance of the proposed concepts is demonstrated through an example from SDH management, while we also discuss implementation considerations  相似文献   

8.
XML technologies provide proven benefits for the configuration management of complex heterogeneous multi‐vendor networks. These benefits have been recently manifested in numerous research, industrial and standardization efforts, including the XMLNET architecture. In this paper we present UbiXML, a system for programmable management of ubiquitous computing resources. UbiXML extends the benefits of XML technologies in the broader class of ubiquitous computing environments, which are inherently complex distributed heterogeneous and multi‐vendor. In UbiXML management applications are structured as XML documents that incorporate programming constructs. Thus, UbiXML allows administrators to build sophisticated management applications with little or no programming effort. While UbiXML builds on several XMLNET concepts, it significantly augments XMLNET to handle management of sensors, perceptual components and actuating devices. Moreover, UbiXML is extensible towards additional ubiquitous computing elements. UbiXML has been exploited in implementing realistic management applications for a smart space. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

9.
Programming language concepts have inspired some networking design decisions. For example, concepts such as object encapsulation and interface invocation have been borrowed, at the time of their adoption, from an already well established object oriented programming paradigm. The authors suggest in this paper that it may be time again to revisit emerging software engineering programming paradigms to learn from them. More specifically, this paper discusses the practical tangling problem, embedded in conventional layer‐coupling (linking) network software design and highlighted by recent research proposals for cross layer design. The adopted solution is based on the aspect‐oriented programming paradigm. We show its programming efficiency, limitations and role in the seamless enforcement of multiple policy scenarios while emphasizing little design changes. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

10.
The NetScript active network system   总被引:2,自引:0,他引:2  
NetScript is a language system for dynamically programming and deploying protocol software in an active network. NetScript programs are packet flow processors composed out of dataflow components. They can be dynamically dispatched to remote nodes, composed with installed software, and executed to enhance node functions. NetScript has proven useful for implementing a variety of practical network systems including Internet protocol (IP) routers, firewalls, protocol analyzers, traffic shapers, load balancers, various queuing disciplines, intrusion detection systems, Web transport protocols, and IP telephony systems. The paper illustrates the principal concepts of NetScript with an example application, an active IP router that is dynamically extended to provide firewall protection  相似文献   

11.
In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key‐share, and key control.  相似文献   

12.
The 4G or Beyond 3G wireless networks is consist of IP-based heterogeneous access networks from 3G cellular, WiFi, WiMAX to other emerging access technologies such as mesh networks. The key objective of designing the next generation wireless networks is to support of mobile subscribers. To support the mobile host in the hybrid wireless access technologies, many solutions based on network protocol stack have been proposed in the literature. In this article, after review of mobility concepts, a special attention is given to some of the mobility management methods as well as handover techniques across various wireless access networks. We have also compared the major mobility protocols in each layer for their features. Finally, some of the open issues that needed to be addressed in mobility management protocol in the next generation wireless networks are outlined.  相似文献   

13.
14.
随着网络故障的日益复杂,将自我管理与网络故障管理结合起来就显得非常有必要。文中提出一种面向对象、组件的技术和基于Policy的应用去构造网络故障管理模型的解决方案,将系统业务逻辑分离成Policy,对应相应的组件.实现了管理任务的动态配置,提高了网络管理的灵活性和易管理性。  相似文献   

15.
The FlexRay communication protocol is expected to be the de facto standard for high-speed, in-vehicle communication. In this paper, we formally investigate the scheduling problem for the dynamic segment (DS) of FlexRay. We take the bounds on the generation times and the timing requirements of the signals into consideration to propose a reservation-based scheduling approach that preserves the flexible medium access of the DS. To obtain efficient schedules, we formulate a nonlinear integer programming problem (NIP) that minimizes the required duration of the DS. This NIP is then decomposed into two linear binary integer programming problems to facilitate the computation of feasible message schedules. An experimental study illustrates our message scheduling approach for the DS of FlexRay.   相似文献   

16.
物联网技术与应用研究   总被引:10,自引:1,他引:10       下载免费PDF全文
钱志鸿  王义君 《电子学报》2012,40(5):1023-1029
 在解析物联网两层基本涵义的基础上,提出了包括底层网络分布、汇聚网关接入、互联网络融合、终端用户应用四部分的物联网系统架构;设计了由网络通信协议、网络控制平台、应用终端平台组成的面向物联网的网络协议体系,并从硬件和软件两个层面讨论了实现物联网的关键技术;在分析当前物联网标准、技术、安全以及应用方面存在问题的基础上提出了未来物联网发展的六个重要理念.  相似文献   

17.
核心网中的光分组交换   总被引:1,自引:0,他引:1  
光分组交换(OPS)是光交换技术的长远发展目标,其研究工作在上世纪90年代取得了很大进步。本文主要介绍OPS的一些基本概念和相关使能技术的进展情况,最后对OPS的前景做一些分析。  相似文献   

18.
MPI系统中共享内存通信技术研究   总被引:1,自引:0,他引:1  
MPI是消息传递并行程序设计接口,目前已经成为主流的并行编程模式。多核处理系统的出现,使得高性能计算更加关注节点内的进程通信性能。介绍多种节点内通信协议,以及两种MPI实现(OpenMPI和MPICH2)的结构,并对其中基于共享内存的消息传递功能采用的通信协议进行了研究,最后对两者的点点通信性能测试结果进行了比较和分析同时提出了优化策略。  相似文献   

19.
This paper describes a new paradigm to realize network virtualization and defines two novel concepts, network planes and parallel Internets, to achieve service differentiation. These concepts are packaged in a technology-agnostic and a multi-dimensional approach for the delivery of Internet protocol (IP) service differentiation, both intra- and inter-domain. The definition of the aforementioned concepts covers several dimensions, mainly routing, forwarding, and traffic management ones. Unlike some radical “Post IP” proposals, this paper advocates an evolutionary approach for enhancing the level of experienced connectivity services (including quality of service and robustness) and therefore to enhance the Internet of the future. Both the rationale and the merits of our approach are explained. In addition, this paper focuses on the critical problem of determining the network planes and parallel Internets to be engineered by a given IP network provider to meet the service connectivity requirements of external service providers. Finally, in order to assess the validity of the proposed approach, a network plane Emulation Platform is described.  相似文献   

20.
With the rapid development of the genomic sequencing technology, the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced. The analysis and utilization of genomic data gradually entered the public view, and the leakage of genomic data privacy has attracted the attention of researchers. The security of genomic data is not only related to the protection of personal privacy, but also related to the biological information security of the country. However, there is still no effective genomic data privacy protection scheme using Shangyong Mima(SM) algorithms. In this paper, we analyze the widely used genomic data file formats and design a large genomic data files encryption scheme based on the SM algorithms. Firstly, we design a key agreement protocol based on the SM2 asymmetric cryptography and use the SM3 hash function to guarantee the correctness of the key. Secondly, we used the SM4 symmetric cryptography to encrypt the genomic data by optimizing the packet processing of files, and improve the usability by assisting the computing platform with key management. Software implementation demonstrates that the scheme can be applied to securely transmit the genomic data in the network environment and provide an encryption method based on SM algorithms for protecting the privacy of genomic data.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号