首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
徐立锋  芦东昕  缪敬 《计算机工程》2003,29(22):64-65,180
命令行接口是高端数据产品,如路由器中一个十分重要的功能模块,通过它,后台可发送命令来对前台的资源进行查询、设置其工作模式、进行系统控制等。文章描述了命令行接口的工作原理、总体设计、关键模块的流程图及重要数据结构,并介绍了命令行接口设计中一些关键算法的实现。  相似文献   

2.
无线网络的逐渐普及,为消费者提供了更方便、更自由的网络应用解决方案。目前主流厂商都开始推出带有USB接口的无线路由器产品,带有USB接口的无线路由器为无线网络应用带来更多好用实用新功能,成为近期无线网络产品的热点。随着市场上此类产品的逐渐增多,功能各异的无线路由器将带给消费者更多新的选择。  相似文献   

3.
5G数据网络设备是现代通信的基础设施,其安全可靠性直接影响整个网络的安全可靠程度。命令行接口作为网络设备的基本操作接口,研究其存在的漏洞对提升整个网络安全具有至关重要的意义。基于模糊测试提出一种命令行接口漏洞挖掘方法,并对注入点分析及界定、模糊测试漏洞挖掘数据模型处理、模糊测试算法优化及模糊测试漏洞挖掘流程等关键技术及过程进行深入研究。研究成果直接运用到命令行接口模糊测试漏洞挖掘系统中,实现包含网络设备信息收集、模糊测试漏洞挖掘数据建模、网络设备响应信息分析、模糊测试漏洞挖掘执行、漏洞挖掘后分析及生成漏洞报告等关键功能。最后对未来提升命令行接口模糊测试漏洞挖掘系统的效率和有效性进行了讨论和展望。  相似文献   

4.
赵辉  张志刚 《网络与信息》2008,22(11):25-27
命令行接口是高端网络设备中一个十分重要的功能模块,通过它,后台可发送命令来对前台的资源进行查询、配置其工作模式、进行系统控制等.本文旨在提供一种设计高效、稳定的命令行系统的方法,描述了命令行接口的工作原理、总体设计、关键模块的流程图及重要数据结构,并介绍了命令行的语法设计、解析原理并配有实例说明.  相似文献   

5.
11月30日获悉:上海博达公司的天网BDCOM3000S安全(加密)路由器一次性通过公安部计算机信息系统安全产品质量监督检验中心的安全功能检测。这款路由器是集常规路由器和加密卡于一体的网络安全产品,它提供了一个10MEthernet接口和3个广域网接口,并具有防火墙和  相似文献   

6.
崔滔  陈自力 《计算机应用》2002,22(10):82-84
基于网络设备中命令行接口(CLI)管理系统的组成和操作流程,介绍了命令树在CLI中的工作机制,提出了用动态命令树生成策略构造命令集,并定义了用来生成命令树的语法规则,从而缩短了CLI的开发时间,并提高了代码的可重用性,最后,结合现有路由器中CLI的特性,对该管理系统的性能优势作了深入分析。  相似文献   

7.
Linux卓越的网络系统功能和微内核设计使它在嵌入式系统的开发中也有非凡的表现,目前很多网络设备都是基于Linux内核的。文章主要讲述在X86硬件平台下,结合linuxkernel2.4系统环境开发RIP路由器的基本原理及实现的三个主要环节——嵌入式linux的构建,命令行接口(CLI)实现,RIP路由协议实现,同时也给出了一些针对RIP路由协议的优化方法。  相似文献   

8.
IronPort C60作为企业级信息网关产品,拥有双处理器、四块热插拔的SCSI硬盘、硬件RAID控制器、双路热插拔电源,以及风扇和双网卡接口等。C60同时支持多用户登录,具有强大的日志和报表功能和XML编程接口,并能够通过SSH/Telnet方式提供命令行界面。C60信息网关安装在防火墙和群件  相似文献   

9.
《电脑迷》2011,(14):37-37
华硕WL-330N3G无线路由器是专为外出办公需求较多的商务人士设计的一款产品。体积小巧,尺寸迷你,比普通名片还要小巧,是一款名副其实的口袋路由器。华硕WL-330N3G无线路由器在机身侧面设置了RJ45网线接口、电源接  相似文献   

10.
BDCOM3000系列多协议路由器是国内第一家通过邮电部检测并取得入网证的国产品牌路由器,它的推出一举打破了路由器由国外产品垄断的局面。该设备支持中、英文语界面,更符合中国人的特点。此外,为博达产品配套的生产厂家均持有 ISO 9002质量体系认证。BDCOM3000路由器具有3个同步口,可满足多级备份。配有 RJ45接口,直接与集线器相连。BDCOM-3000系列路由器完全按照有关的国际标准及规范进行设计和开发,支持多  相似文献   

11.
多点组播的可靠扩展控制机制研究   总被引:1,自引:0,他引:1  
针对多点组播(multicast)控制机制中可靠性(reliability)与可扩展性(scalability)间存在的问题,将扩展性方案中超立方体(hypercube)拓扑思想与可靠性方案中反馈重发局部化(localization)思想用于控制机制,提出一种基于超立方体拓扑的可靠扩展控制机制:将组播节点控制拓扑从1维树型拓扑映射为n维超立方体拓扑,运用超立方体拓扑的几何特性将基于包丢失的局部反馈重发可靠性有效融于节点扩展性中,实现组播的有效可靠扩展。理论分析与实际测试表明:控制机制有着良好的扩展性和可靠性,可满足不同网络条件下的多点组播的可靠性扩展。  相似文献   

12.
Linux下高性能网络I/O解决方案分析   总被引:1,自引:0,他引:1  
Linux下网络I/O的高性能,主要指当Socket文件描述符上有大量事件发生时,系统可以快速响应,且其处理能力具有可扩展性.以往,人们都是使用select()或poll()来实现,但实践表明,随着文件描述符的增多,这两个系统调用的性能会显著下降.本文将讨论一种实现机制更高效、扩展性更好的解决方案:使用epoll(),并通过实验证明其高效性.  相似文献   

13.
Fountain codes were introduced as an efficient and universal forward error correction (FEC) solution for data multicast over lossy packet networks. They have recently been proposed for large scale multimedia content delivery in practical multimedia distribution systems. However, standard fountain codes, such as LT or Raptor codes, are not designed to meet unequal error protection (UEP) requirements typical in real-time scalable video multicast applications. In this paper, we propose recently introduced UEP expanding window fountain (EWF) codes as a flexible and efficient solution for real-time scalable video multicast. We demonstrate that the design flexibility and UEP performance make EWF codes ideally suited for this scenario, i.e., EWF codes offer a number of design parameters to be ldquotunedrdquo at the server side to meet the different reception criteria of heterogeneous receivers. The performance analysis using both analytical results and simulation experiments of H.264 scalable video coding (SVC) multicast to heterogeneous receiver classes confirms the flexibility and efficiency of the proposed EWF-based FEC solution.  相似文献   

14.
《Computer Networks》2002,38(2):181-206
The original design of the Internet and its underlying protocols did not anticipate users to be mobile. With the growing interest in supporting mobile users and mobile computing, a great deal of work is taking place to solve this problem. For a solution to be practical, it has to integrate easily with existing Internet infrastructure and protocols, and offer an adequate migration path toward what might represent the ultimate solution. In that respect, the solution has to be incrementally scalable to handle a large number of mobile users and wide geographical scopes, and well performing so as to support all application requirements including voice and video communications and a wide range of mobility speeds. In this paper, we present a survey of the state-of-the-art and propose a scalable infrastructure to support mobility in Internet protocol networks. In that respect, we exploit local area network (LAN) technologies to create the network infrastructure necessary to offer connectivity to mobile users across any geographical area (building, campus and metropolis). The intrinsic properties of LAN technologies and their underlying protocols, namely flat address space, transparent learning and low complexity renders this solution particularly cost effective for supporting user mobility. In particular, we propose a network topology and a set of protocols that render the infrastructure scalable to a large geographical area and many users.  相似文献   

15.
DeBenedictis  E.P. Johnson  S.C. 《Computer》1993,26(11):43-53
Because it retrieves all instructions and data from a single memory, the von Neumann computer architecture has a fundamental speed limit. The scalable multicomputer architecture, which uses many microprocessors together to solve a single problem and can run at teraflop speeds, may be a solution. While teraflop processor technology is known, the scalable operating and I/O system technology necessary for those speeds are not known. The authors describe how Unix can be extended to scalable computing, permitting teraflop speeds and offering parallel computing to users unfamiliar with parallel programming. They designed this technology into the system software of the Ncube-2, the predecessor to Ncube's announced teraflop parallel computer. The authors describe the system in detail and provide some performance results  相似文献   

16.
基于Hash链的可扩展RFID验证协议   总被引:1,自引:0,他引:1       下载免费PDF全文
射频识别(RFID)的广泛应用带来了用户隐私和安全问题。基于Hash的RFID验证协议是受到广泛关注的解决方案,但其中的一些协议随着标签数量的增加,数据库计算量快速上升,不具扩展性。另外一些协议具有可扩展性但容易被跟踪。该文采用Hash链预计算的方法解决两者的矛盾,并且协议具有前向安全、抗碰撞、防失同步攻击等安全特性,实验结果验证了其可扩展性。  相似文献   

17.

芯粒集成逐渐成为不同场景下敏捷定制深度学习芯片的高可扩展性的解决方案,芯片设计者可以通过集成设计、验证完成的第三方芯粒来降低芯片开发周期和成本,提高芯片设计的灵活性和芯片良率. 在传统的芯片设计和商业模式中,编译器等专用软件工具链是芯片解决方案的组成部分,并在芯片性能和开发中发挥重要作用. 然而,当使用第三方芯粒进行芯片敏捷定制时,第三方芯粒所提供的专用工具链无法预知整个芯片的资源,因此无法解决敏捷定制的深度学习芯片的任务部署问题,而为敏捷定制的芯片设计全新的工具链需要大量的时间成本,失去了芯片敏捷定制的优势. 因此,提出一种面向深度学习集成芯片的可扩展框架(scalable framework for integrated deep learning chips)——Puzzle,它包含从处理任务输入到运行时管理芯片资源的完整流程,并自适应地生成高效的任务调度和资源分配方案,降低冗余访存和芯粒间通信开销. 实验结果表明,该可扩展框架为深度学习集成芯片生成的任务部署方案可自适应于不同的工作负载和硬件资源配置,与现有方法相比平均降低27.5%的工作负载运行延迟.

  相似文献   

18.
Many of today’s virtual environment applications, such as massively multiplayer online games, involve a large and rapidly changing set of users. The server-based architecture of these applications makes its hard for them to support the dynamic user base and provide a scalable solution. Badumna, a scalable network engine for large-scale virtual environments, was developed to address these issues. The approach is based on a decentralised architecture using a structured peer-to-peer network. In order to ensure a highly scalable and efficient design, Badumna uses techniques that include neighbour introductions and the formation of dynamic bounded regions to reduce the load on the peer-to-peer network. The performance of Badumna is evaluated using extensive simulations. Results indicate that Badumna is able to scale to a large number of users without placing any additional overheads on the network that degrade performance.  相似文献   

19.
This paper presents a scalable delivery solution for commercial near on-demand video streaming systems with an associated pricing model. The proposed delivery solution combines the benefits of periodic broadcasting and stream merging, thereby enabling scalable video delivery. Video advertisements are delivered to the clients prior to viewing the requested videos. The revenues generated from the ads are used to subsidize the price of the requested videos. The pricing is determined based on the total ad viewing time. The proposed solution includes an efficient ad allocation scheme and a new constraint-based scheduling approach. In addition, the paper investigates how targeted advertisements can be efficiently supported. Furthermore, we investigate the effectiveness of the overall solutions and analyze and compare the effectiveness of various scheduling policies and ad allocation alternatives in terms of several metrics, including client defection probability, average number of viewed ads per client, price, channel utilization, revenue, and profit.  相似文献   

20.
The Journal of Supercomputing - Cloud computing maps tasks to resources in a scalable fashion. The scheduling is an NP-hard problem; thus, the scheduler chooses one solution from among many. This...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号