期刊文献+
共找到1,589篇文章
< 1 2 80 >
每页显示 20 50 100
STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL 被引量:2
1
作者 逯昭义 齐藤忠夫 《Science China Mathematics》 SCIE 1990年第9期1123-1131,共9页
The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.
关键词 local area network access control star-type LAN access control.
原文传递
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
2
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
原文传递
Fault Tolerant Control for Networked Control Systems with Access Constraints 被引量:4
3
作者 ZHAO Ming-Yue LIU He-Ping +2 位作者 LI Zhi-Jun SUN De-Hui LIU Ke-Ping 《自动化学报》 EI CSCD 北大核心 2012年第7期1119-1126,共8页
关键词 网络控制系统 容错控制器 访问限制 Lyapunov函数法 执行器故障 采样时间 设计方法 调度方法
在线阅读 下载PDF
Towards Effective Integrated Access Control Lists in Internet Networks
4
作者 Kamal A. Ahmat Ammar Elnour 《通讯和计算机(中英文版)》 2013年第10期1284-1291,共8页
关键词 访问控制列表 INTERNET网络 有效集成 启发式算法 企业网络 安全漏洞 网络性能 ACL
在线阅读 下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
5
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access control Wireless Sensor networks GAUSS MARKOV MOBILITY Model
在线阅读 下载PDF
Performance Analysis of WLAN Medium Access Control Protocols in Simulcast Radio-Over-Fiber-Based Distributed Antenna Systems 被引量:5
6
作者 LI Jianqiang FAN Yuting CHEN Hao LU Xun XU Kun 《China Communications》 SCIE CSCD 2014年第5期37-48,共12页
The performance of three wireless local-area network(WLAN) media access control(MAC) protocols is investigated and compared in the context of simulcast radioover-fiber-based distributed antenna systems(RoF-DASs) where... The performance of three wireless local-area network(WLAN) media access control(MAC) protocols is investigated and compared in the context of simulcast radioover-fiber-based distributed antenna systems(RoF-DASs) where multiple remote antenna units(RAUs) are connected to one access point(AP) with different-length fiber links.The three WLAN MAC protocols under investigation are distributed coordination function(DCF) in basic access mode,DCF in request/clear to send(RTS/CTS) exchange mode,and point coordination function(PCF).In the analysis,the inter-RAU hidden nodes problems and fiber-length difference effect are both taken into account.Results show that adaptive PCF mechanism has better throughput performances than the other two DCF modes,especially when the inserted fiber length is short. 展开更多
关键词 radio-over-fiber wireless localarea network distributed antenna systems medium access control simulcast
在线阅读 下载PDF
Architectural Approaches to Network and Service Access Authentication
7
作者 Marcin Dabrowski Piotr Pacyna 《China Communications》 SCIE CSCD 2007年第3期4-16,共13页
Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wir... Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wireless world.However,the differences in the operational environment between the fixed and the wireless world,heterogeneity of the radio communications systems,new trends in service provisioning, emerging business models and performance requirements raise the need to revisit the original requirements for authentication systems and to come up with schemes that better suit current needs.In this review paper we discuss authentication in singlehop radio access networks by characterizing the current as well as the emerging authentication schemes. 展开更多
关键词 AUTHENTICATION access control wireless networks next-generation Internet
在线阅读 下载PDF
AN ADAPTIVE OPPORTUNISTIC RETRANSMISSION CONTROL SCHEME ENVIRONMENT-AWARE-BASED FOR WIRELESS MULTIMEDIA MESH NETWORKS
8
作者 Zhao Haitao Dong Yuning +1 位作者 Zhang Hui Li Yang 《Journal of Electronics(China)》 2010年第6期756-764,共9页
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env... In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput. 展开更多
关键词 Wireless Mesh networks (WMNs) Media access control (MAC) Retransmission control Environment-aware
在线阅读 下载PDF
The Novel MAC Protocol for Mixed-media PON Access Networks
9
作者 HO Jih-Hsin 《通讯和计算机(中英文版)》 2010年第6期71-75,共5页
关键词 MAC协议 PON 网络媒体 接入 混合 无源光网络 介质访问控制 网络带宽
在线阅读 下载PDF
VDL模式2系统媒介访问控制协议建模
10
作者 刘海涛 董沁卓 戴永璋 《中国民航大学学报》 2026年第1期80-85,共6页
甚高频数据链(VDL,VHF data link)模式2系统是民用航空空中交通管理(ATM,air traffic management)系统的重要基础设施。未来ATM系统将采用基于四维航迹的空域运行(TBO,trajectory-based operations)模式,该模式对VDL模式2系统提出了更... 甚高频数据链(VDL,VHF data link)模式2系统是民用航空空中交通管理(ATM,air traffic management)系统的重要基础设施。未来ATM系统将采用基于四维航迹的空域运行(TBO,trajectory-based operations)模式,该模式对VDL模式2系统提出了更高的要求。为提升VDL模式2系统的性能,本文基于优化网络工程工具(OPNET,optimized network engineering tools)构建了其媒介访问控制协议的仿真模型,该协议采用p-坚持载波侦听多路访问(p-CSMA,p-persistent carrier sense multiple access)机制。通过仿真实验,系统分析了坚持参数p对系统吞吐量、传输时延和丢帧率的影响规律。研究表明:坚持参数p对上述3项性能指标具有显著影响,且三者之间存在明显的权衡关系;通过合理选取p值,可在实现较高吞吐量的同时,保持较低的传输时延和丢帧率,从而满足TBO运行对通信可靠性与实时性的要求。 展开更多
关键词 航空数据链 VDL模式2系统 媒介访问控制 优化网络工程工具(OPNET)建模
在线阅读 下载PDF
基于发送速率梯度的数据中心网络拥塞控制
11
作者 江艺 吴向军 张经纬 《计算机工程与科学》 北大核心 2026年第2期209-215,共7页
针对现有RoCE网络协议带宽利用率不足、收敛速度较慢和多流共享链路公平性不足等问题,在HPCC协议基础上,改进并提出了一种基于发送速率梯度的动态速率自适应增量算法DRAI。首先,交换机在数据包中添加包含链路容量及最大并发流数目等字段... 针对现有RoCE网络协议带宽利用率不足、收敛速度较慢和多流共享链路公平性不足等问题,在HPCC协议基础上,改进并提出了一种基于发送速率梯度的动态速率自适应增量算法DRAI。首先,交换机在数据包中添加包含链路容量及最大并发流数目等字段的INT信息;其次,接收端返回携带相同INT信息的ACK包;最后,发送端由INT信息计算得到拥塞点的速率梯度,并以此为信号实现动态的加性递增因子,采取MIMD调速策略控制发送速率。实验结果表明,与HPCC协议相比,所提出的拥塞控制算法收敛速度更快,多流共享链路公平性更佳;在短流FCT与HPCC协议基本持平的同时,能够在高负载场景降低长流的99分位FCT。 展开更多
关键词 数据中心网络 远程直接内存访问 拥塞控制 带内网络遥测 RoCE网络协议
在线阅读 下载PDF
基于零信任架构的网络安全防御系统的设计与实现
12
作者 杜奕霖 罗海涛 +2 位作者 黄炜 王伟奇 黄华豪 《移动信息》 2026年第2期82-84,共3页
随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零... 随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零信任架构的网络安全防御系统。在系统实现部分,引入基于动态信任评分模型、策略自适应调整模型以及风险—收益优化模型,使系统能够在复杂网络环境下实现“持续验证—动态调节—平衡取舍”的完整防御逻辑。最后,以某高校校园网为案例进行了测试。结果表明,该系统在降低入侵风险,提升访问安全性方面具有良好效果,为高校及其他组织的网络安全建设提供了参考。 展开更多
关键词 零信任架构 网络安全 身份认证 访问控制 高校网络
在线阅读 下载PDF
人工智能安全访问控制系统设计
13
作者 雷蕾 《计算机应用文摘》 2026年第2期107-109,共3页
针对内网安全面临的威胁,文章设计了一种基于人工智能的安全访问控制系统。首先,从架构层面分析该系统结构,涵盖网络层、接口层与系统层;硬件部分由数据处理设备、主服务器集群、入侵检测防御设备及网络设备组成,协同实现对威胁行为的... 针对内网安全面临的威胁,文章设计了一种基于人工智能的安全访问控制系统。首先,从架构层面分析该系统结构,涵盖网络层、接口层与系统层;硬件部分由数据处理设备、主服务器集群、入侵检测防御设备及网络设备组成,协同实现对威胁行为的实时监测与防护。软件方面,系统采用基于模糊聚类的人工智能克隆算法,以有效检测访问控制系统中的异常行为与潜在风险;通过客户端模块响应用户数据请求,并集成授权区块链技术实现安全日志存储,增强访问过程的可靠性与可追溯性。测试结果表明,该系统在实际运行中具有较高的安全性,可有效提升访问控制环节的防护能力。 展开更多
关键词 局域网 人工智能 安全访问 控制系统
在线阅读 下载PDF
变电站综合自动化系统通信安全防护技术研究
14
作者 张琦玮 闫绍华 谷芊锐 《通信电源技术》 2026年第1期174-176,共3页
变电站综合自动化系统由过程层、间隔层及站控层组成,负责采样、控制及调度通信。分析通信安全威胁场景与风险,研究面向通用对象的变电站事件(Generic Object Oriented Substation Event,GOOSE)、采样值(Sampled Value,SV)及IEC104在实... 变电站综合自动化系统由过程层、间隔层及站控层组成,负责采样、控制及调度通信。分析通信安全威胁场景与风险,研究面向通用对象的变电站事件(Generic Object Oriented Substation Event,GOOSE)、采样值(Sampled Value,SV)及IEC104在实时场景下的伪报文、重放及时序扰动风险,构建网络分区与访问控制、协议与身份安全加固、入侵检测与审计联动的防护体系,形成白名单、报文完整性校验、链路加密及深度包检测异常识别的协同机制,旨在支撑实时控制链稳定运行并实现工程级安全落地。 展开更多
关键词 变电站综合自动化 通信安全防护 网络隔离与访问控制
在线阅读 下载PDF
随机多址协议下的鲁棒模型预测控制策略
15
作者 黄朕荣 董钰莹 高晨曦 《华侨大学学报(自然科学版)》 2026年第1期119-126,共8页
为在通信资源受限的网络化控制系统中实现对多胞不确定对象的控制,提出一种考虑随机多址协议(RMP)的鲁棒模型预测控制(RMPC)策略。首先,构建一类受通信约束与参数不确定性的闭环系统模型;其次,利用参数依赖Lyapunov函数与线性矩阵不等式... 为在通信资源受限的网络化控制系统中实现对多胞不确定对象的控制,提出一种考虑随机多址协议(RMP)的鲁棒模型预测控制(RMPC)策略。首先,构建一类受通信约束与参数不确定性的闭环系统模型;其次,利用参数依赖Lyapunov函数与线性矩阵不等式,将RMPC优化问题转化为可在线求解的凸优化问题,进而推导保证闭环系统均方稳定的充分条件;最后,对所提策略进行仿真算例验证。结果表明:经过100次独立实验验证,所提策略在随机网络环境下仍能有效保证闭环系统的均方稳定性。 展开更多
关键词 鲁棒预测控制 随机多址协议 网络化控制系统 均方稳定性
在线阅读 下载PDF
面向算力网络的端网协同RDMA拥塞控制
16
作者 刘亚萍 严定宇 +3 位作者 方滨兴 许名广 张硕 杨智凯 《通信学报》 北大核心 2026年第2期109-124,共16页
为解决远程直接内存访问(RDMA)技术跨域互联场景下的长控制回路及混合流量拥塞问题,提出了一种面向算力网络的拥塞控制方法WRCC。采用基于输入速率的公平速率计算策略,由交换机精确计算拥塞队列的端口公平速率。结合近源交换机双控制回... 为解决远程直接内存访问(RDMA)技术跨域互联场景下的长控制回路及混合流量拥塞问题,提出了一种面向算力网络的拥塞控制方法WRCC。采用基于输入速率的公平速率计算策略,由交换机精确计算拥塞队列的端口公平速率。结合近源交换机双控制回路与带内网络遥测技术,实现端网协同的速率控制,快速响应拥塞。仿真实验表明,与现有商用方法相比,WRCC能将平均流完成时间降低8%~47%,还能将尾流完成时间降低10%~70%。原型系统测试表明,与英伟达CX7相比,WRCC将短距离场景下尾时延降低7%~49%。在640 km长距离场景下,WRCC将平均时延降低2%~7%,尾时延降低45%~49%,平均吞吐量提升26%~90%。 展开更多
关键词 拥塞控制 远程直接内存访问 算力网络 端网协同
在线阅读 下载PDF
A new multi-channel MAC protocol based on CDMA for ad hoc networks 被引量:1
17
作者 贾旻 陈惠民 袁玉华 《Journal of Shanghai University(English Edition)》 CAS 2007年第2期174-177,共4页
This paper proposes a novel multichannel medium access control (MAC) protocol based on CDMA that improves network performance and reduces collision probability in wireless ad hoc networks. In the scheme, the code ch... This paper proposes a novel multichannel medium access control (MAC) protocol based on CDMA that improves network performance and reduces collision probability in wireless ad hoc networks. In the scheme, the code channel is divided into common channel, broadcast channel and several data channels. Simulation results show that the proposed protocol can achieve significantly better performance than the IEEE 802.11 standard. 展开更多
关键词 ad hoc networks medium access control (MAC) protocol MULTICHANNEL CDMA
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
18
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
19
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication access control In-network data sharing Information-centric network
在线阅读 下载PDF
A Survey on Underwater Acoustic Sensor Networks: Perspectives on Protocol Design for Signaling, MAC and Routing 被引量:5
20
作者 Mohammad Sharif-Yazd Mohammad Reza Khosravi Mohammad Kazem Moghimi 《Journal of Computer and Communications》 2017年第5期12-23,共12页
Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underw... Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underwater sensor networks are different from other sensor networks due to the acoustic channel used in their physical layer, thus we should discuss about the specific features of these underwater networks such as acoustic channel modeling and protocol design for different layers of open system interconnection (OSI) model. Each node of these networks as a sensor needs to exchange data with other nodes;however, complexity of the acoustic channel makes some challenges in practice, especially when we are designing the network protocols. Therefore based on the mentioned cases, we are going to review general issues of the design of an UASN in this paper. In this regard, we firstly describe the network architecture for a typical 3D UASN, then we review the characteristics of the acoustic channel and the corresponding challenges of it and finally, we discuss about the different layers e.g. MAC protocols, routing protocols, and signal processing for the application layer of UASNs. 展开更多
关键词 ACOUSTIC Communications UNDERWATER ACOUSTIC Sensor networks (UASNs) UNDERWATER Medium access control (Underwater MAC) UNDERWATER ROUTING Distributed Signal Processing
在线阅读 下载PDF
上一页 1 2 80 下一页 到第
使用帮助 返回顶部