首页 | 本学科首页   官方微博 | 高级检索  
     

计算机网络安全性分析建模研究
引用本文:邓侗. 计算机网络安全性分析建模研究[J]. 计算机与网络, 2014, 0(14): 52-54
作者姓名:邓侗
作者单位:湖南九嶷职业技术学院,湖南永州425000
摘    要:计算机与互联网的结合,通过遵循共通的TCP/IP通信协议实现了全世界互联。针对脉冲编码调制技术中传输数据信息的抽样、量化和编码,抽取的模拟信号完成幅值跳变,使Q个变化的电平之间完成转换模式,最终在终端设备上对数据信息解码以及解调,恢复原始信号,保证了传输数据信息的有效性,使传输的数据信息无失真的传送至终端设备,这种技术模式将会使计算机网络安全更加严谨。

关 键 词:网络安全  建模分析  通信协议  脉冲编码

Research on Computer Network Security Analysis Modeling
DENG Tong. Research on Computer Network Security Analysis Modeling[J]. China Computer & Network, 2014, 0(14): 52-54
Authors:DENG Tong
Affiliation:DENG Tong (Hunan Jiuyi Vocational and Technical College, Yongzhou Hunan 425000, China)
Abstract:The combination of computer and lntemet follows the common TCP/IP conmmnication protocol to inlplement the worldwide interconnection. Aiming at the sampling, quantization and coding of data information transmission in pulse coding modulation technology, the sampled analog signal completes the amplitude jump, so that the transfonnation between Q changed levels is implemented. Finally, the data information is decoded and demodulated on the terminal equipment, the original signal is recovered, the effectiveness of data information transmission is ensured, and the mmsmitted data information is transferred to the terminal equipment without distortion. This technical mode will make the computer network be more secure.
Keywords:network security  modeling analysis  communication protocol  pulse coding
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号