期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
ACARS报文通信服务器的设计与实现 被引量:3
1
作者 钟青 张其善 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2001年第5期511-513,共3页
着重介绍ACARS(飞机通信寻址与报告系统 )报文通信服务器的软件设计方案及实现方法 .ACARS报文通信服务器通信模式采用了客户 /服务器(Client/Server)模式 .为了提高系统的实时性和响应速度 ,ACARS报文通信服务器设计成多线程并发服务器... 着重介绍ACARS(飞机通信寻址与报告系统 )报文通信服务器的软件设计方案及实现方法 .ACARS报文通信服务器通信模式采用了客户 /服务器(Client/Server)模式 .为了提高系统的实时性和响应速度 ,ACARS报文通信服务器设计成多线程并发服务器 .ACARS报文通信服务器实现了实时接收、发送和分发ACARS报文 .该系统已经成功地应用于中国民航VHF(甚高频 )数据通信网网络监控中心 . 展开更多
关键词 通信软件 信息交换 协议(通信) 飞机通信寻址报告系统 报文通信服务器 ACARS 软件设计 数据通信 民航
在线阅读 下载PDF
高速公路收费系统通信服务器的设计与实现 被引量:2
2
作者 付孟若 吴今培 张其善 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2003年第7期624-626,共3页
高速公路收费系统通信服务器是高速公路收费系统数据传输的枢纽 .重点介绍了高速公路收费系统通信服务器软件的设计、实现方法和特点 .通信服务器使用按优先级分发报文的通信协议 ,支持多用户的并发通信 .为了实现数据共享的集中控制 ,... 高速公路收费系统通信服务器是高速公路收费系统数据传输的枢纽 .重点介绍了高速公路收费系统通信服务器软件的设计、实现方法和特点 .通信服务器使用按优先级分发报文的通信协议 ,支持多用户的并发通信 .为了实现数据共享的集中控制 ,通信服务器采用客户 服务器的模式 .使用多线程的编程技术 ,满足了对通信服务器实时性的要求 .目前 ,该软件已通过了验收 。 展开更多
关键词 通信软件 协议(通信) 网络软件 并发通信
在线阅读 下载PDF
多协议多用户GPS/GSM监控系统网关的设计与实现 被引量:3
3
作者 陶海亮 张其善 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2002年第3期272-275,共4页
在多协议、多用户GPS(GlobalPositionSystem) GSM(GlobalSystemforMobilecommunications)监控系统中 ,网关的设计对系统的性能、可用性和可扩展性有重要作用 .讨论了在网关设计中需要注意的几个关键问题 :通过分析不同短消息服务器的... 在多协议、多用户GPS(GlobalPositionSystem) GSM(GlobalSystemforMobilecommunications)监控系统中 ,网关的设计对系统的性能、可用性和可扩展性有重要作用 .讨论了在网关设计中需要注意的几个关键问题 :通过分析不同短消息服务器的接口协议 ,提出使用协议管理器实现多协议接入 ;给出了与用户系统的通信指令格式 ,并分析了地址的转换流程 .最后剖析了用多线程方式和消息驱动实现这种系统的优点 ,并给出了一个具体实现的消息循环流程 .实践证明这种设计是可靠高效的 . 展开更多
关键词 监视系统 通信软件 协议(通信) 全球移动通信系统 网关 短消息服务
在线阅读 下载PDF
Design and Research of Information Processing System Based on Mix Platform
4
作者 董宁 徐立新 +1 位作者 何超 张宇河 《Journal of Beijing Institute of Technology》 EI CAS 1999年第3期294-299,共6页
Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifun... Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface. 展开更多
关键词 information processing real time data collection communicating protocols
在线阅读 下载PDF
A New Rational Secret Sharing Scheme 被引量:4
5
作者 ZHANG En CAI Yongquan 《China Communications》 SCIE CSCD 2010年第4期18-22,共5页
In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round... In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players. 展开更多
关键词 Secret Sharing Game Theory Verifiable Secret Sharing Resilient Equilibrium
在线阅读 下载PDF
Principles and Defense Strategies of DNS Cache Poisoning 被引量:3
6
作者 Jin Chong Hao Zhiyu Wu Zhigang 《China Communications》 SCIE CSCD 2009年第4期75-81,共7页
DNS is one of the most important basic infrastructures of the Internet, attacks on which will prevent the Internet from working properly. Therefore, its security is receiving great concern. This paper analyzes the pri... DNS is one of the most important basic infrastructures of the Internet, attacks on which will prevent the Internet from working properly. Therefore, its security is receiving great concern. This paper analyzes the principles of both traditional and novel (Kaminsky) DNS cache poisoning, presents attack samples and describes the whole attack process in detail. After verifying the potential harm of DNS cache poisoning, the paper gives out several defense strategies. 展开更多
关键词 DNS cache poisoning Kaminsky attack
在线阅读 下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
7
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
在线阅读 下载PDF
A Feedback Scheme for Fountain Codes Based Transport Protocol in Space Communications 被引量:1
8
作者 XING Yanling GE Ning 《China Communications》 SCIE CSCD 2015年第8期62-72,共11页
This paper proposed a practical- feedback scheme for fountain codes based transportprotocol in space communications. In the proposed scheme, the sender is signaled by two types of acknowledgment (ACK) packets.Before... This paper proposed a practical- feedback scheme for fountain codes based transportprotocol in space communications. In the proposed scheme, the sender is signaled by two types of acknowledgment (ACK) packets.Before decoding, packet loss probability isestimated on the receiver side and encapsulated intoa soft ACKand sent to the sender.After decoding,decoding results are encapsulated into hard ACKsandsent to the sender. There are two contributionsin the proposed scheme: 1. Empl layer calculation instead layer statistics to estimate oying physical of application the packet loss probability of space channel, which can improvethe accuracy and practicality. 2. A cascade overhead-failure probability relationship between the sender and the receiver has been analyzed to help determine the exact numberof packetsneeded byfountain decoding.Simulations show that for space communications,compared with the existing space transport protocols, fountain codes based transport protoeolwith the proposed schemecan not only ensure transmission reliability, but also greatly improvelink utilization. 展开更多
关键词 fountain code FEEDBACK spacecommunication packet loss probabilityestimation transport protocol
在线阅读 下载PDF
Dynamic Polarization-Basis Compensation for Free-Space Quantum Communications 被引量:3
9
作者 张光宇 杨哲 +2 位作者 张成龙 朱智涵 王振华 《China Communications》 SCIE CSCD 2013年第2期27-32,共6页
In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every pola... In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every polariza-tion quantum bit required for a quantum com-munication protocol. In order to complete the protocol, the ground-based receiver needs to track and compensate for the polarization zero direction of the satellite-based transmitter. Ex- pressions satisfied by amplitudes of the s-polarization component and the p-polarization component are derived based on a two-mirror model, and a condition satisfied by the reflec- tion coefficients of the two mirrors is given. A polarization tracking principle is analyzed for satellite-to-ground quanaun communications, and quantum key encoding and decoding prin- ciples based on polarization tracking are given. A half-wave-plate-based dynamic polariza- tion-basis compensation scheme is proposed in this paper, and this scheme is proved to be suitable for satellite-to-ground and intersatellite quantum communications. 展开更多
关键词 dynamic polarization-basis com-pensation half-wave plate two-mirror model free-space quantum communications
在线阅读 下载PDF
New Optimal Power Allocation for Bidirectional Communications in Cognitive Relay Network Using Analog Network Coding 被引量:2
10
作者 LU Luxi JIANG Wei XIANG Haige LUO Wu 《China Communications》 SCIE CSCD 2010年第4期144-148,共5页
Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information w... Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol. 展开更多
关键词 Cognitive Radio Cooperative Communication Analog Network Coding Bidirectional Communications Interference power constraint
在线阅读 下载PDF
Exploring Application Layer Protocol Relationships in SoftSwitch
11
作者 Zhu Xiaomin Liao Jianxin +1 位作者 Chen Junliang Li Tonghong 《China Communications》 SCIE CSCD 2009年第4期155-167,共13页
Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid mu... Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead. 展开更多
关键词 protocol relationship protocol grouping SOFTSWITCH information flow trail
在线阅读 下载PDF
From the Far Side of the Moon: Delay/DisruptionTolerant Networking Communications via Lunar Satellites 被引量:2
12
作者 Pietrofrancesco Apollonio Carlo Caini Vincenzo Fiore 《China Communications》 SCIE CSCD 2013年第10期12-25,共14页
Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates ... Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates DTN communications between the Earth and the far side of the Moon, by means of a lunar orbiter acting as relay. After an introductory part, the paper presents a comprehensive analysis of the DTN performance that can be achieved on the identified communication scenario. The focus is on the evaluation of the stateof-the-art ability of Interplanetary Overlay Network(ION), the NASA DTN implementation of Bundle Protocol(BP) and Contact Graph Routing(CGR), to meet the many challenges of the space communication scenario investigated(and more generally of a future interplaynetary Internet): intermittent links, network partitioning, scarce bandwidth, long delays, dynamic routing, handling of high priority and emergency traffic, interoperability issues. A study of security threats and Bundle Security Protocol(BSP) countermeasures complete the work.The many results provided, confirm the essential role of DTN in future space communications. 展开更多
关键词 DTN Earth to Moon communications interplanetary Interact satellite communications space communications
在线阅读 下载PDF
A Kind of Multi-party Non-repudiation Protocol with Consistent Evidence
13
作者 Liu Dongmei Qing Sihan 《China Communications》 SCIE CSCD 2009年第4期88-96,共9页
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio... With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack. 展开更多
关键词 multi-party fair non-repudiation protocol consistent evidence collusion attack freehess FAIRNESS
在线阅读 下载PDF
Seamless Handover for IMS over Mobile-IPv6 Using Context Transfer
14
作者 Reza Farahbakhsh Naser Movahhedinia 《China Communications》 SCIE CSCD 2009年第3期122-133,共12页
Mobility support for the next generation IPv6 networks has been one of the recent research issues due to the growing demand for wireless services over internet.In the other hand,3GPP has introduced IP Multimedia Subsy... Mobility support for the next generation IPv6 networks has been one of the recent research issues due to the growing demand for wireless services over internet.In the other hand,3GPP has introduced IP Multimedia Subsystem as the next generation IP based infrastructure for wireless and wired multimedia services.In this paper we present two context transfer mechanisms based on predictive and reactive schemes,to support seamless handover in IMS over Mobile IPv6.Those schemes reduce handover latency by transferring appropriate session information between the old and the new access networks.Moreover,we present two methods for QoS parameters negotiations to preserve service quality along the mobile user movement path.The performances of the proposed mechanisms are evaluated by simulations. 展开更多
关键词 context transfer seamless handover IP Multimedia Subsystem (IMS) mobile IPv6 Quality of Service (QoS)
在线阅读 下载PDF
Multicast Routing in Satellite Network
15
作者 郭惠玲 宋姝 +2 位作者 李磊 刘志涛 郭鹏程 《Journal of China University of Mining and Technology》 2004年第1期61-63,共3页
There are some problems in the dual-layer satellite MPLs metworks to be composed of LEO and MEO. In order to solve the problems, this paper presents a plan by means of unicast LSP to implement multicast in the dual-la... There are some problems in the dual-layer satellite MPLs metworks to be composed of LEO and MEO. In order to solve the problems, this paper presents a plan by means of unicast LSP to implement multicast in the dual-layer satellite MPLs networks. It has advantages of saving space and reducing extra charge. 展开更多
关键词 satellite network low earch orbit(LEO)/medium earth orbit(MEO) multicast routing MPLS
在线阅读 下载PDF
Authenticated Key Agreement Protocol
16
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
在线阅读 下载PDF
Efficient Mechanisms to Improve TCP Performance over OBS Networks
17
作者 Hong Xiaobin, Zhou Jun, Wu Jian, Guo Hongxiang, Zuo Yong, Xu Kun, Lin Jintong Key Laboratory of Information Photonics and Optical Communications, Ministry of Education Institute of Optical Communications and Optoelectronics, Beijing University of Posts and Telecommunications, Beijing 100876, China 《China Communications》 SCIE CSCD 2010年第2期87-91,共5页
Transmission Control Protocol (TCP) performance over Optical Burst Switching (OBS) is experimentally investigated on an OBS network testbed, concluding that burst losses will lead to a significant drop in the availabl... Transmission Control Protocol (TCP) performance over Optical Burst Switching (OBS) is experimentally investigated on an OBS network testbed, concluding that burst losses will lead to a significant drop in the available TCP bandwidth. Two mechanisms are introduced to improve TCP performance. One is concerning the burst assembly optimization and another is based on the novel assembly and scheduling mechanism to reduce the burst losses. 展开更多
关键词 OBS ACK TCP burst loss probability scheduling algorithm
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部