期刊文献+
共找到88篇文章
< 1 2 5 >
每页显示 20 50 100
Application and Prospects of SDN Technology in Modern Network Management
1
作者 Aoyu Li Yingjie Yang 《Journal of Electronic Research and Application》 2025年第5期7-11,共5页
With the rapid development of information technology,the scale of the network is expanding,and the complexity is increasing day by day.The traditional network management is facing great challenges.The emergence of sof... With the rapid development of information technology,the scale of the network is expanding,and the complexity is increasing day by day.The traditional network management is facing great challenges.The emergence of software-defined network(SDN)technology has brought revolutionary changes to modern network management.This paper aims to discuss the application and prospects of SDN technology in modern network management.Firstly,the basic principle and architecture of SDN are introduced,including the separation of control plane and data plane,centralized control and open programmable interface.Then,it analyzes the advantages of SDN technology in network management,such as simplifying network configuration,improving network flexibility,optimizing network resource utilization,and realizing fast fault recovery.The application examples of SDN in data center networks and WAN optimization management are analyzed.This paper also discusses the development status and trend of SDN in enterprise networks,including the integration of technologies such as cloud computing,big data,and artificial intelligence,the construction of an intelligent and automated network management platform,the improvement of network management efficiency and quality,and the openness and interoperability of network equipment.Finally,the advantages and challenges of SDN technology are summarized,and its future development direction is provided. 展开更多
关键词 Software-defined network network management Data centers Wide area network Cloud computing
在线阅读 下载PDF
Real-Time 7-Core SDM Transmission System Using Commercial 400 Gbit/s OTN Transceivers and Network Management System
2
作者 CUI Jian GU Ninglun +2 位作者 CHANG Cheng SHI Hu YAN Baoluo 《ZTE Communications》 2025年第3期81-88,共8页
Space-division multiplexing(SDM)utilizing uncoupled multi-core fibers(MCF)is considered a promising candidate for nextgeneration high-speed optical transmission systems due to its huge capacity and low inter-core cros... Space-division multiplexing(SDM)utilizing uncoupled multi-core fibers(MCF)is considered a promising candidate for nextgeneration high-speed optical transmission systems due to its huge capacity and low inter-core crosstalk.In this paper,we demonstrate a realtime high-speed SDM transmission system over a field-deployed 7-core MCF cable using commercial 400 Gbit/s backbone optical transport network(OTN)transceivers and a network management system.The transceivers employ a high noise-tolerant quadrature phase shift keying(QPSK)modulation format with a 130 Gbaud rate,enabled by optoelectronic multi-chip module(OE-MCM)packaging.The network management system can effectively manage and monitor the performance of the 7-core SDM OTN system and promptly report failure events through alarms.Our field trial demonstrates the compatibility of uncoupled MCF with high-speed OTN transmission equipment and network management systems,supporting its future deployment in next-generation high-speed terrestrial cable transmission networks. 展开更多
关键词 multi-core fiber real-time transmission optical transport network field trial network management system
在线阅读 下载PDF
Study on the Impact of Network Information Management on the Compliance of Maintenance Hemodialysis Patients
3
作者 Chunyan Liu Xuebao Liu 《Journal of Clinical and Nursing Research》 2025年第9期137-143,共7页
This study focuses on the management of maintenance hemodialysis(MHD)patients,with a specific emphasis on the practical application effect of the network information management model including its impact on patients’... This study focuses on the management of maintenance hemodialysis(MHD)patients,with a specific emphasis on the practical application effect of the network information management model including its impact on patients’compliance.A network information management model for MHD patients was constructed around three management schemes:“software reminders+follow-up guidance”,“dietary records+self-management reminders”,and“dialysis plan+precise weight management”.These schemes were respectively used to optimize anemia management,control the risk of hyperphosphatemia,and improve toxin clearance efficiency.A controlled experiment was conducted,with an experimental group and a control group set up for comparative practice.The results showed that the network information management model can effectively improve patients’anemia,help alleviate mineral metabolism disorders and the accumulation of small-molecule toxins,and exert a positive impact on patients’treatment compliance. 展开更多
关键词 network information management Maintenance hemodialysis PATIENTS COMPLIANCE IMPACT
暂未订购
Exploring the Nuclear Power DCS Network Security Management Method and Its Application
4
作者 Yu Chen Yongjie Fu Yajie Wen 《Journal of Electronic Research and Application》 2025年第3期97-103,共7页
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c... Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future. 展开更多
关键词 network security DCS Nuclear power plant network security management
在线阅读 下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques 被引量:2
5
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
在线阅读 下载PDF
NetST:Network Encrypted Traffic Classification Based on Swin Transformer
6
作者 Jianwei Zhang Hongying Zhao +2 位作者 Yuan Feng Zengyu Cai Liang Zhu 《Computers, Materials & Continua》 2025年第9期5279-5298,共20页
Network traffic classification is a crucial research area aimed at improving quality of service,simplifying network management,and enhancing network security.To address the growing complexity of cryptography,researche... Network traffic classification is a crucial research area aimed at improving quality of service,simplifying network management,and enhancing network security.To address the growing complexity of cryptography,researchers have proposed various machine learning and deep learning approaches to tackle this challenge.However,existing mainstream methods face several general issues.On one hand,the widely used Transformer architecture exhibits high computational complexity,which negatively impacts its efficiency.On the other hand,traditional methods are often unreliable in traffic representation,frequently losing important byte information while retaining unnecessary biases.To address these problems,this paper introduces the Swin Transformer architecture into the domain of network traffic classification and proposes the NetST(Network Swin Transformer)model.This model improves the Swin Transformer to better accommodate the characteristics of network traffic,effectively addressing efficiency issues.Furthermore,this paper presents a traffic representation scheme designed to extract meaningful information from large volumes of traffic while minimizing bias.We integrate four datasets relevant to network traffic classification for our experiments,and the results demonstrate that NetST achieves a high accuracy rate while maintaining low memory usage. 展开更多
关键词 Traffic classification encrypted network traffic Swin Transformer network management deep learning
在线阅读 下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
7
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
在线阅读 下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
8
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
在线阅读 下载PDF
Research and Implementation of Network Intelligent Management Based on CSCW
9
作者 沈俊 罗军舟 顾冠群 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期44-48,共5页
This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supp... This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supported cooperative work (CSCW) and combining new technologies such as WWW, Java. AGIMA transfers from information distribution centered mode in traditional network management to computing distribution centered mode, providing intelligence capacity for network management by a whole intelligent agent group. The implementation of AGIMA takes much consideration of openess, scalability, proactive adaptability and friendliness of human computer interface. Authors present properties of intelligent agent in details, and conclude that network intelligence should be cooperation between human and computer. 展开更多
关键词 network management artificial intelligence CSCW WWW multi agent system
在线阅读 下载PDF
Implementation of SNMP and AgentX in SDH Management Network
10
作者 Jinn Huang, Minghai Sun, Yichao Wang Dept. of Electronic Engineering, Tsinghua Univ. Rm. 302, Bldg. 37, Tsinghua Univ. Beijing, P.R.China 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期719-720,共2页
This article describes an implementation of management of SDH network based on SNMP systematic structure, featuring its simplicity and low resource consumption together with the flexible extensibility by the applicati... This article describes an implementation of management of SDH network based on SNMP systematic structure, featuring its simplicity and low resource consumption together with the flexible extensibility by the application of AgentX. 展开更多
关键词 SDH SNMP Implementation of SNMP and AgentX in SDH management network of in
原文传递
Understanding Interoperability in Collaborative Network Management: the Case of Metro High School
11
作者 Aleksey Kolpakov Robert Agranoff Michael McGuire 《Journal of Health Science》 2016年第6期318-332,共15页
The-increasing importance of interoperability (IOp)--reciprocal communication and accommodation among government organizations and NGOs to develop interactive policy and programming--has become an integral part of n... The-increasing importance of interoperability (IOp)--reciprocal communication and accommodation among government organizations and NGOs to develop interactive policy and programming--has become an integral part of networked organizations, now utilized beyond IOps's emergency management origins in public administration. Using a mixed methods approach, this paper empirically examines IOp in a networked STEM (science, technology, engineering and mathematics) secondary school that includes 16 school districts and their public agency and NGO partners, particularly in its planning and operational phases. It also identifies the growing use of lOp in a number of non-emergency management settings and raises the prospects for utilizing this type of interorganizational management in the public arena. 展开更多
关键词 Interopembility COLLABORATION public management networks.
在线阅读 下载PDF
Cognitive Network Management in Internet of Things 被引量:5
12
作者 覃毅芳 沈强 +4 位作者 林涛 赵志军 唐晖 慈松 冯志勇 《China Communications》 SCIE CSCD 2011年第1期1-7,共7页
The wide variety of smart embedded computing devices and their increasing number of applications in our daily life have created new op- portunities to acquire knowledge from the physical world anytime and anywhere, wh... The wide variety of smart embedded computing devices and their increasing number of applications in our daily life have created new op- portunities to acquire knowledge from the physical world anytime and anywhere, which is envisioned as the"Internet of Things" (IoT). Since a huge number of heterogeneous resources are brought in- to IoT, one of the main challenges is how to effi- ciently manage the increasing complexity of IoT in a scalable, flexNle, and autonomic way. Further- more, the emerging IoT applications will require collaborations among loosely coupled devices, which may reside in various locations of the Inter- net. In this paper, we propose a new IoT network management architecture based on cognitive net- work management technology and Service-Orien- ted Architecture to provide effective and efficient network management of loT. 展开更多
关键词 cognitive network management Serv- ice-Oriented Architecture (SOA) Internet of Things policy-based network management
在线阅读 下载PDF
Light-Weight Simple Network Management Protocol in Wireless Sensor Networks 被引量:2
13
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
在线阅读 下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
14
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed Web network management CORBA JAVA
在线阅读 下载PDF
Network Management of Food Additives Quality Analysis and Inspection 被引量:3
15
作者 Hairui Zhang Guofu Zhang Li Zhang 《Journal of Chemistry and Chemical Engineering》 2015年第7期468-471,共4页
In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management ap... In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management applications are developed using the development technology of Visual Basic language and computer system operating environment, to achieve a network management software for users on food additives of quality analytical testing. The software sets up an information sharing network platform for enterprise and quality management departments, which is a major innovation in the food additive quality analysis on test management methods and tools. 展开更多
关键词 Food additives quality analysis Visual Basic language network management software development.
在线阅读 下载PDF
A Survey on Event Mining for ICT Network Infrastructure Management 被引量:1
16
作者 LIU Zheng LI Tao WANG Junchang 《ZTE Communications》 2016年第2期47-55,共9页
1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred milli... 1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred million [2]. The fast growth ol the lnternet pusnes me rapid development of information technology (IT) and communication technology (CT). Many traditional IT service and CT equipment providers are facing the fusion of IT and CT in the age of digital transformation, and heading toward ICT enterprises. Large global ICT enterprises, such as Apple, Google, Microsoft, Amazon, Verizon, and AT&T, have been contributing to the performance improvement of IT service and CT equipment. 展开更多
关键词 event mining failure prediction log analysis network infrastructure management root cause analysis
在线阅读 下载PDF
Home Network and Digital Rights Management Technology 被引量:2
17
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home network and Digital Rights management Technology ZTE ISDB ATSC
在线阅读 下载PDF
Machine learning-based zero-touch network and service management:a survey 被引量:2
18
作者 Jorge Gallego-Madrid Ramon Sanchez-Iborra +1 位作者 Pedro M.Ruiz Antonio F.Skarmeta 《Digital Communications and Networks》 SCIE CSCD 2022年第2期105-123,共19页
The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosio... The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosion along the end-to-end network chain has increased the complexity in the coordinated orchestration of different segments composing the whole infrastructure.The Zero-touch Network and Service Management(ZSM)concept has recently emerged to automatically orchestrate and manage network resources while assuring the Quality of Experience(QoE)demanded by users.Machine Learning(ML)is one of the key enabling technologies that many ZSM frameworks are adopting to bring intelligent decision making to the network management system.This paper presents a comprehensive survey of the state-of-the-art application of ML-based techniques to improve ZSM performance.To this end,the main related standardization activities and the aligned international projects and research efforts are deeply examined.From this dissection,the skyrocketing growth of the ZSM paradigm can be observed.Concretely,different standardization bodies have already designed reference architectures to set the foundations of novel automatic network management functions and resource orchestration.Aligned with these advances,diverse ML techniques are being currently exploited to build further ZSM developments in different aspects,including multi-tenancy management,traffic monitoring,and architecture coordination,among others.However,different challenges,such as the complexity,scalability,and security of ML mechanisms,are also identified,and future research guidelines are provided to accomplish a firm development of the ZSM ecosystem. 展开更多
关键词 Zero-touch network and service management(ZSM) Next generation networks(NGN) Artificial intelligence(AI) Machine learning(ML)
在线阅读 下载PDF
A Vehicle Routing Problem Based on Intelligent Batteries Transfer Management for the EV Network 被引量:2
19
作者 XIA Yamei CHENG Bo 《China Communications》 SCIE CSCD 2014年第5期160-169,共10页
Batteries transfer management is one important aspect in electric vehicle(EV)network's intelligent operation management system.Batteries transfer is a special and much more complex VRP(Vehicle Routing Problem) whi... Batteries transfer management is one important aspect in electric vehicle(EV)network's intelligent operation management system.Batteries transfer is a special and much more complex VRP(Vehicle Routing Problem) which takes the multiple constraints such as dynamic multi-depots,time windows,simultaneous pickups and deliveries,distance minimization,etc.into account.We call it VRPEVB(VRP with EV Batteries).This paper,based on the intelligent management model of EV's battery power,puts forward a battery transfer algorithm for the EV network which considers the traffic congestion that changes dynamically and uses improved Ant Colony Optimization.By setting a reasonable tabv range,special update rules of the pheromone and path list memory functions,the algorithm can have a better convergence,and its feasibility is proved by the experiment in an EV's demonstration operation system. 展开更多
关键词 VRP battery power management ant colony algorithm electric vehicle network
在线阅读 下载PDF
Several Key Issues in Networking Management of Analytic Instruments 被引量:3
20
作者 LIU Jie 《International Journal of Plant Engineering and Management》 2008年第2期89-95,共7页
To improve the application of networking to analytic instruments, a kind of networking method based on conversion module between serial port RS-232 and protocol TCP/IP of MOXA Company is studied and compared with trad... To improve the application of networking to analytic instruments, a kind of networking method based on conversion module between serial port RS-232 and protocol TCP/IP of MOXA Company is studied and compared with traditional methods. Several characteristic classifications of equipment are summarized, and the methods of relevant data treatment are introduced. The key technical issues and successful cases are also presented which provides the networking of equipment in laboratories with a flexible and highly efficient solution. 展开更多
关键词 analytic instrument networking management TCP/IP RS-232
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部