This paper discusses traffic engineering with multi protocol label switching (MPLS) in a backbone of Internet data center (IDC) network. The traditional SPF routing limitations are analyzed and the traffic engineerin...This paper discusses traffic engineering with multi protocol label switching (MPLS) in a backbone of Internet data center (IDC) network. The traditional SPF routing limitations are analyzed and the traffic engineering concept is given. MPLS, resource reservation protocol (RSVP) and enhanced link status Protocols intermediate system to intermediate system (IS IS) are reviewed to provide a background for traffic engineering, the general issues of designing an MPLS system of IDC network for traffic engineering are then discussed. Finally a practical example with MPLS traffic engineering is shown.展开更多
Wireless sensor nodes have the advantage of being low-cost,easily deployed and of good mobility.If deployed in an underground mine with existing underground transmission systems a wireless sensor network can improve t...Wireless sensor nodes have the advantage of being low-cost,easily deployed and of good mobility.If deployed in an underground mine with existing underground transmission systems a wireless sensor network can improve the collection of information.To get good transmission performance for 2.4 GHz wireless sensor nodes at the working face we calculated the reflection properties of electromagnetic waves from a flat metal plate.Using the cascade impedance method(CIM),we studied transmission attenuation and compared the results to actual tests.The results show that the effective transmission distance of 2.4 GHz wireless sensor nodes meets the stipulations of the ZigBee protocol.展开更多
Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the ...Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool.展开更多
文摘This paper discusses traffic engineering with multi protocol label switching (MPLS) in a backbone of Internet data center (IDC) network. The traditional SPF routing limitations are analyzed and the traffic engineering concept is given. MPLS, resource reservation protocol (RSVP) and enhanced link status Protocols intermediate system to intermediate system (IS IS) are reviewed to provide a background for traffic engineering, the general issues of designing an MPLS system of IDC network for traffic engineering are then discussed. Finally a practical example with MPLS traffic engineering is shown.
基金Project 60774090 supported by the National Natural Science Foundation of China
文摘Wireless sensor nodes have the advantage of being low-cost,easily deployed and of good mobility.If deployed in an underground mine with existing underground transmission systems a wireless sensor network can improve the collection of information.To get good transmission performance for 2.4 GHz wireless sensor nodes at the working face we calculated the reflection properties of electromagnetic waves from a flat metal plate.Using the cascade impedance method(CIM),we studied transmission attenuation and compared the results to actual tests.The results show that the effective transmission distance of 2.4 GHz wireless sensor nodes meets the stipulations of the ZigBee protocol.
基金supported by the National Key Research and Development Program of China (No. 2017YFC0820603)
文摘Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool.