首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 113 毫秒
1.
介绍分析了几种典型的IP多播路由协议,如距离向量多播路由协议、协议独立多播、多播开放最短路径优先和基于核心树的多播等,并对这几种IP多播路由协议进行了分析对比。  相似文献   

2.
计算机网络协议测试及其发展   总被引:4,自引:0,他引:4  
毕军  史美林 《电信科学》1996,12(7):51-54
协议测试已经成为计算机网络和分布系统协议中最的领域之一。近年来,协议一致性测试技术得到了很好的发展和完善,与此同时,互操作测试和性能测试逐渐成为新的研究热点。本文在分析协议一致性测试的基础上,对协议测试的发展进行讨论。  相似文献   

3.
无线AdHOC网络的应用越来越广泛。由于在移动环境中节点韵频繁移动.使得现有网络的路由协议不能满足用户的需求,为此.有许多的研究机构开始关注无线路由协议及算法,提出了多个无线AdHOC路由解决方案。本文介绍和分析了当前AdHOC网络中的主要路由协议算法,使用网络仿真软件NS2评价AdHoc路由协议中的DSR.AODV,DSDV协议.编写了用于仿真实现的脚本程序,并对仿真结果进行比较和性能评价。本文的仿真是在5个和30个无线节点的网络拓扑结构中进行.对整个传输过程产生的仿真Trace文档处理、分析.得到DSR.AODV,DSDV路由协议的性能比较.由此得出不同协议的适用范围和协议特性。  相似文献   

4.
高速计算机网络协议的关键技术   总被引:1,自引:1,他引:0  
本文探讨了提高计算机网络协议处理性能,使其适应高速计算机网络环境的三种途径:协议体系结构的革新,轻型协议的研制和高速协议的硬件实现。  相似文献   

5.
薛小平 《数字通信》1998,25(4):14-16
计算机网络的传输带宽在急剧增长,而在计算机网络中协议的处理能力和速度并没有传输增长速度相同,因而,协议处理将会成为未来高速计算机网络的一个瓶戏。主要描述了高性能的传输协议HPOS,提出了采用并行协议处理的方法处理协议,给出了支持高速处理协议的计算机结构及其处理过程。  相似文献   

6.
本文研究了Needham-Schroeder共享密钥协议。指出了该协议存在的缺陷和漏洞,并给出了一种攻击该协议方法。虽然Needham和Schroeder对原始的协议进行了修改,但修改后的协议仍然存在缺陷。还有其他一些学者也对该协议进行了修改,但是仍然不令人满意。针对原始协议存在的缺陷和漏洞,我们进行了相应的修改,并用BAN逻辑来分析了修改后的协议。说明修改后的协议能够达到协议的目标。  相似文献   

7.
安全协议SSL与SET的分析与比较   总被引:5,自引:1,他引:4  
安全协议是目前电子支付技术安全问题中的热点,安全套接层(SSL)和安全电子交易(SET)是电子商务中支持支付系统的关键技术。本文分析了这两种协议的原理,并对两者的特点进行了对比,最后对安全协议在我国的发展趋势做出了预测。  相似文献   

8.
Ad hoc网络技术讲座第2讲 Ad hoc网络中的路由选择问题   总被引:1,自引:0,他引:1  
本文介绍了Ad hoc网络中路由选择问题的特点,并从路由的驱动机制方面介绍了主动式路由协议和按需式路由协议,从网络的拓扑结构方面介绍了平面式路由协议和分簇式路由协议,最后给出了这几类路由协议的性能比较。  相似文献   

9.
浅析JFK协议     
IPSec协议中的IKE(Internet密钥交换协议)实现了在不可信网络通道上的密钥交换的安全机制。尽管IKE已成为IPSec协议的一部分,它仍然有一些缺陷和不足,文章简单分析了传统IKE协议的缺陷,IFK密钥交换协议(包括IFKi协议、IFKr协议和内核安全),及其对传统IKE协议的改进。  相似文献   

10.
分析了几种典型的IP多播路由协议,如DVMRP、PIM、MOSPF和CBF等,并对这几种IP多播路由协议进行了分析对比。  相似文献   

11.
区间关系保密计算若干问题研究   总被引:1,自引:0,他引:1       下载免费PDF全文
安全多方计算是密码学界的一个重要研究方向,本文主要研究区间的安全计算问题.首先应用Paillier加密方案设计"点与区间"以及"区间与区间"关系两方保密计算基础协议,协议的特点是判定结果以密文形式输出.将其推广为有理区间关系判定协议时,相比已有协议,本文协议更为安全与高效.在此基础上,进一步研究多维度的"点与区间"以及"区间与区间"关系阈值判定这一类新问题.由于基础协议的输出结果为密文,故以此为基础所设计的多维度问题协议更加安全.最后,应用模拟范例方法严格证明了协议的安全性,并对协议进行了效率分析及模拟实验,理论分析及实验结果都说明本文协议是高效的.  相似文献   

12.
Data Link control protocols are among the oldest recognized communication protocols. The protocol provides a well-defined set of rules which govern the interchange of supervisory information and user data over the interconnecting communication link. Such rules are essential to successful and efficient operation. Data Link protocols have evolved continuously from the early free-wheeling protocols, through the widely implemented character-oriented protocols, to the increasingly popular bit-oriented protocols. Data Link protocols play a vital role in the drive toward Open Systems Interconnection (OSI). Constituting Layer 2 of the International Standards Organization (ISO) Reference Model, these procedure and the services that they offer, are directed at assuring successful and reliable transfer of information over point-to-point or multipoint data links. This paper reviews the role of link protocols in the open systems environment. It discusses the objectives and functions of these protocols and delineates the services provided to the higher layers. A review, with examples, of the protocols suitable for use within the framework of OSI is included. The paper concludes with a look at some of the current Data Link issues.  相似文献   

13.
14.

Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.

  相似文献   

15.
Cooperative hybrid‐automatic repeat request (HARQ) protocols, which can exploit the spatial and temporal diversities, have been widely studied. The efficiency of cooperative HARQ protocols is higher than that of cooperative protocols because retransmissions are only performed when necessary. We classify cooperative HARQ protocols as three decode‐and‐forward‐based HARQ (DF‐HARQ) protocols and two amplified‐and‐forward‐based HARQ (AF‐HARQ) protocols. To compare these protocols and obtain the optimum parameters, two unified frameworks are developed for protocol analysis. Using the frameworks, we can evaluate and compare the maximum throughput and outage probabilities according to the SNR, the relay location, and the delay constraint. From the analysis we can see that the maximum achievable throughput of the DF‐HARQ protocols can be much greater than that of the AF‐HARQ protocols due to the incremental redundancy transmission at the relay.  相似文献   

16.
无线传感器网络MAC协议研究   总被引:1,自引:0,他引:1  
本文首先从应用需求和业务特性两方面分析了无线传感器网络MAC协议设计面临的挑战.然后,结合现有典型协议,对无线传感器网络MAC协议的研究现状和趋势、节能策略及协议其他特点进行了分析与总结.最后,探讨了无线传感器网络MAC协议的待研究问题.  相似文献   

17.
Medium access control protocols are at the core of all forms of electronic communications systems. MAC protocols are designed to coordinate the transmission of packets, retransmission of damaged packets, and resolution of collisions among stations during a contention period. MAC protocols are foundations in low-level network architecture and play a significant role in the performance of higher-level protocols such as multiservices and multimedia application protocols. In this article five classes of MAC protocols are investigated with respect to their applications in satellite communications. These classes include fixed assignments, demand assignment, random access, hybrid random access and reservation, and adaptive protocols. Among several QoS objectives described in high-speed networking and the limitations inherent in satellite communications systems, in this article a set of important performance criteria are identified and used to evaluate different MAC protocols for satellite communications. The performance criteria include high channel throughput, low transmission delay, channel stability, protocol scalability, channel reconfigurability, broadband applicability, and low complexity of the control algorithm. For this, a simulation study is performed among selected MAC protocols from different classes, and their performances have been evaluated for NASA's Mars Regional Network  相似文献   

18.
19.
Most existing designs for two-way cryptographic authentication protocols suffer from one or more limitations. Among other things, they require synchronization of local clocks, they are subject to export restrictions because of the way they use cryptographic functions, and they are not amenable to use in lower layers of network protocols because of the size and complexity of messages they use. Designing suitable cryptographic protocols that cater to large and dynamic network communities but do not suffer from these problems presents substantial problems. It is shown how a few simple protocols, including one proposed by ISO, can easily be broken, and properties that authentication protocols should exhibit are derived. A methodology for systematically building and testing the security of a family of cryptographic two-way authentication protocols that are as simple as possible yet resistant to a wide class of attacks, efficient, easy to implement and use, and amenable to many different networking environments is described. Examples of protocols of that family that presents various advantages in specific distributed system scenarios are discussed  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号