首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
多播安全体系结构的研究与实现   总被引:5,自引:0,他引:5  
IP多播安全是一些重要多播应用得以推广的基础。该文描述了一个多播安全体系结构及其策略框架、实现模型和分层协议组。在该文研究的基础上,为一类重要应用实现了安全基础结构。  相似文献   

2.
交互式IP多播技术及其在多点视频会议中的应用研究   总被引:4,自引:0,他引:4  
文章介绍了ITU的H.323多点视频会议标准、IETF的多媒体会议标准、IP多播技术以及RTP/RTCP协议,综合两种视频会议标准的特点提出了交互式IP多播技术,给单向的IP多播增加交互功能,使用简单的方法实现多点视频会议,而不需要昂贵的MCU支持;文章给出了该技术在多点视频会议系统中应用的详细说明和简单的应用实现,使基于IP多播的多点视频会议可以利用RTCP控制包和TCP服务端口有效地解决会议主动成员的可管理性,同时保留了IETF多媒体会议的可扩展性。  相似文献   

3.
由于IP多播难以在因特网环境中配置,应用层多播作为IP多播的一种替代方案得到越来越多的研究。从网络设计的角度来看,应用层多播在网络代价模型及路由策略方面与传统的IP多播有很大区别。本文研究了带度约束的最小直径应用层网络多播路由问题,提出了解决该问题的启发式遗传算法。通过大量仿真实验,我们对比分析了两种贪婪算法法和遗传算法的性能。实验显示,启发式遗传算法具有较好的性能。  相似文献   

4.
随着互联网的发展,多播技术被越来越多地应用在一些主流的服务中。例如,视频会议、IP电视、远程教育等。IP多播的安全性问题限制了其广泛使用,为了保护通信的机密性,在多播组中仅仅给予合格的组成员相应的密钥用于通信。密钥管理是IP多播的一个基本问题,密钥管理的目的是为了组成员在一个多播期间形成、更新、传输密钥,以及在传输过程中提供密钥的保密性。回顾了几种经典的密钥管理方法,并提出了一种基于LKH的分层式密钥更新的优化方案,最后与其他方法进行了比较。  相似文献   

5.
蒋玉玲 《微处理机》2003,(2):25-27,30
在介绍IP多播技术基本原理的基础之上,重点阐述了在Linux环境下如何利用多播技术实现数据的广播和监听,并简要地描述了IP多播技术的应用情况。  相似文献   

6.
以移动IP作为网络层路由支持向移动主机提供多播技术是一个巨大的挑战.本文研究在目前的移动IP方案中如何有效提供多播技术的支持,分析了在现有的IP网络中集成多播和移动性几种可能的机制以及出现的问题,并比较了各自的优缺点.最后提出了一种改进的基于移动IP的移动主机多播技术支持方案,并与其他方案做了比较.  相似文献   

7.
IP多播组密钥管理方案分类体系研究   总被引:10,自引:1,他引:10       下载免费PDF全文
IP多播组密钥管理问题是IP多播安全的核心问题。本文通过对现有组密钥管理方案和密钥管理本身规律的研究,给出了组密钥管理方案的详细分类,该分类对分析和改进已有方案、设计新的方案具有重要的指导意义。  相似文献   

8.
应用层语义可靠的自适应多播   总被引:3,自引:0,他引:3  
Internet上的可靠多播具有很大的应用前景,但是同时也面临着挑战,主要是因为Internet的异构性以及IP Multicast仍不能广域内得以实现.提出了一种应用层语义可靠的自适应多播体系结构(application semantics reliable multicast,简称ASRM).ASRM不以IP Multicast为基础,而是采用一种混合IP单播和多播的方法来实现多点数据通信.ASRM采用一种简单、自然,且具有更好的伸缩性的方法来命名多播会话,并可以在转发过程中,根据变换模型、变换规则和  相似文献   

9.
IP多播技术浅析及实现   总被引:2,自引:1,他引:2  
在计算机通信领域,IP多播日益重要。本文简要分析了IP多播的特点,介绍了IP多播地址、TTL、多播返还及IGMP技术。在此基础上,建立了一个实现IP多播基本过程的MFC类。程序在实际的开发系统中得到了较好的应用。  相似文献   

10.
分析了移动IP和多播实现的原理,在此基础上,讨论了使移动IP支持多播的方案,包括多播组管理和报文路由的实现并对它们进行了分析比较。  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号