The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ...The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel.展开更多
Network Time Protocol(NTP)是用来使计算机及网络设备时间同步化的一种协议,其目的是为各种网络设备提供高精准度的时间校正。伴随着高校网络设备数量爆炸式增长,我们所依赖的文件服务器、邮件服务器、互联网网关等诸多网络设备之间都...Network Time Protocol(NTP)是用来使计算机及网络设备时间同步化的一种协议,其目的是为各种网络设备提供高精准度的时间校正。伴随着高校网络设备数量爆炸式增长,我们所依赖的文件服务器、邮件服务器、互联网网关等诸多网络设备之间都需要一个精准的时钟作为信息共享的基础,因为数据共享、设备日志和网络安全是互联网上最常用也是最易遭受攻击的信息。为确保网络设备安全,网络工程师需要精准的时间确保这些应用及其它关键网络应用的安全。本文基于NTP协议网络应用时间戳同步机制的研究,可有效应用于高校网络中,使所有网络设备的时间戳具有高度统一性。所以在互联网中设计专门的时间服务器为需要精准时间的网络设备同步成为当今日益复杂网络应用环境的现实需求。展开更多
为了保证航天系统内时间的准确性和一致性,设计一种基于网络时间协议(network time protoco,NTP)的航天测控网络对时系统。针对各系统设备对时间的精确性和可靠性要求,在分析NTP基本原理和工作模式的基础上,建立了航天测控网络上的NTP...为了保证航天系统内时间的准确性和一致性,设计一种基于网络时间协议(network time protoco,NTP)的航天测控网络对时系统。针对各系统设备对时间的精确性和可靠性要求,在分析NTP基本原理和工作模式的基础上,建立了航天测控网络上的NTP对时系统架构,根据具体应用编程实现了NTP网络对时系统,并对该系统是否满足航天测控网络对时间精度的要求进行验证。实践结果证明:该系统能把全网中的用户设备时间偏差精度控制在1 ms以内,实现高精度的对时。展开更多
为解决四自由度(4 degree-of-freedom,4-DOF)无人水面船在动态不确定性和外部扰动下的路径跟踪问题,提出一种基于有限时间积分视线(finite-time integral line-of-sight,FT-ILOS)制导的自适应神经网络路径跟踪控制方法。在视线(line-of-...为解决四自由度(4 degree-of-freedom,4-DOF)无人水面船在动态不确定性和外部扰动下的路径跟踪问题,提出一种基于有限时间积分视线(finite-time integral line-of-sight,FT-ILOS)制导的自适应神经网络路径跟踪控制方法。在视线(line-of-sight,LOS)制导框架下,利用有限时间理论,引入积分机制和新的制导机制,实现船舶位置跟踪误差的有限时间收敛,且避免制导积分项引起的饱和风险。基于反步控制法设计框架,结合FT-ILOS制导方法,利用自适应神经网络逼近复合扰动项,利用虚拟参数学习技术解决“维数灾难”问题,同时利用动态面控制技术降低计算复杂度。为减少执行器响应频率和磨损,在控制律与执行器之间建立周期事件触发协议。通过李雅普诺夫稳定性分析证明闭环控制系统中所有信号均有界,通过MATLAB仿真对比实验验证所提控制方法的有效性和鲁棒性。展开更多
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to...Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.展开更多
基金TheNationalNaturalScienceFoundationofChina (No .6 9984 0 0 3)
文摘The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel.
基金supported in part by the school scientific research project of Beijing University of Civil Engineering and Architecture,(101203308)
文摘Network Time Protocol(NTP)是用来使计算机及网络设备时间同步化的一种协议,其目的是为各种网络设备提供高精准度的时间校正。伴随着高校网络设备数量爆炸式增长,我们所依赖的文件服务器、邮件服务器、互联网网关等诸多网络设备之间都需要一个精准的时钟作为信息共享的基础,因为数据共享、设备日志和网络安全是互联网上最常用也是最易遭受攻击的信息。为确保网络设备安全,网络工程师需要精准的时间确保这些应用及其它关键网络应用的安全。本文基于NTP协议网络应用时间戳同步机制的研究,可有效应用于高校网络中,使所有网络设备的时间戳具有高度统一性。所以在互联网中设计专门的时间服务器为需要精准时间的网络设备同步成为当今日益复杂网络应用环境的现实需求。
文摘为了保证航天系统内时间的准确性和一致性,设计一种基于网络时间协议(network time protoco,NTP)的航天测控网络对时系统。针对各系统设备对时间的精确性和可靠性要求,在分析NTP基本原理和工作模式的基础上,建立了航天测控网络上的NTP对时系统架构,根据具体应用编程实现了NTP网络对时系统,并对该系统是否满足航天测控网络对时间精度的要求进行验证。实践结果证明:该系统能把全网中的用户设备时间偏差精度控制在1 ms以内,实现高精度的对时。
文摘为解决四自由度(4 degree-of-freedom,4-DOF)无人水面船在动态不确定性和外部扰动下的路径跟踪问题,提出一种基于有限时间积分视线(finite-time integral line-of-sight,FT-ILOS)制导的自适应神经网络路径跟踪控制方法。在视线(line-of-sight,LOS)制导框架下,利用有限时间理论,引入积分机制和新的制导机制,实现船舶位置跟踪误差的有限时间收敛,且避免制导积分项引起的饱和风险。基于反步控制法设计框架,结合FT-ILOS制导方法,利用自适应神经网络逼近复合扰动项,利用虚拟参数学习技术解决“维数灾难”问题,同时利用动态面控制技术降低计算复杂度。为减少执行器响应频率和磨损,在控制律与执行器之间建立周期事件触发协议。通过李雅普诺夫稳定性分析证明闭环控制系统中所有信号均有界,通过MATLAB仿真对比实验验证所提控制方法的有效性和鲁棒性。
基金the National High Technology Development "863" Program of China (2006AA01Z436, 2007AA01Z452)the National Natural Science Foundation of China(60702042).
文摘Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.