期刊文献+
共找到1,190篇文章
< 1 2 60 >
每页显示 20 50 100
The intelligent leap of wireless short-range connection
1
作者 Wan Lei 《China Standardization》 2026年第1期47-47,共1页
Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSL... Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSLA has established a technical standards system for wireless short-range communication covering full-stack standards such as the end-to-end protocol system. 展开更多
关键词 wireless short range communication end end protocol system technical standards system full stack standards international sparklink alliance isla now wireless short range connection standards system ISLA
原文传递
Implementation of Embedded Ethernet Based on Hardware Protocol Stack in Substation Automation System 被引量:1
2
作者 马强 赵建国 刘炳旭 《Transactions of Tianjin University》 EI CAS 2008年第2期153-156,共4页
Embedded Ethernet technology has been utilized increasingly widely as the communication mode in the substation automation system(SAS).This paper introduces the current applying situation about embedded Ethernet in SAS... Embedded Ethernet technology has been utilized increasingly widely as the communication mode in the substation automation system(SAS).This paper introduces the current applying situation about embedded Ethernet in SAS First.After analyzing the protocol levels used in SAS based on embedded Ethernet and the differences between the TCP and UDP,UDP/IP is selected as the communication protocol between the station-level and bay-level devices for its real-time characteristic.Then a new kind of implementation of the embedded Ethernet is presented based on hardware protocol stack.The designed scheme can be implemented easily,reduce cost significantly and shorten developing cycle. 展开更多
关键词 embedded Ethernet substation automation system hardware protocol stack UDP W3100A
在线阅读 下载PDF
Self-organization of Reconfigurable Protocol Stack for Networked Control Systems 被引量:1
3
作者 Chun-Jie Zhou Hui Chen +2 位作者 Yuan-Qing Qin Yu-Feng Shi Guang-Can Yu 《International Journal of Automation and computing》 EI 2011年第2期221-235,共15页
In networked control systems(NCS),the control performance depends on not only the control algorithm but also the communication protocol stack.The performance degradation introduced by the heterogeneous and dynamic com... In networked control systems(NCS),the control performance depends on not only the control algorithm but also the communication protocol stack.The performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol stack.In this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication standards.Within the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol stack.Especially,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling table.Finally,the study on the protocol of dynamic address management is conducted for the system of controller area network(CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack. 展开更多
关键词 Networked control system(NCS) communication network SELF-ORGANIZATION protocol stack RECONFIGURATION
在线阅读 下载PDF
Improvement of User's Accuracy Through Classification of Principal Component Images and Stacked Temporal Images 被引量:1
4
作者 Nilanchal Patel Brijesh Kumar Kaushal 《Geo-Spatial Information Science》 2010年第4期243-248,共6页
The classification accuracy of the various categories on the classified remotely sensed images are usually evaluated by two different measures of accuracy, namely, producer's accuracy (PA) and user's accuracy (UA... The classification accuracy of the various categories on the classified remotely sensed images are usually evaluated by two different measures of accuracy, namely, producer's accuracy (PA) and user's accuracy (UA). The PA of a category indicates to what extent the reference pixels of the category are correctly classified, whereas the UA of a category represents to what extent the other categories are less misclassified into the category in question. Therefore, the UA of the various categories determines the reliability of their interpretation on the classified image and is more important to the analyst than the PA. The present investigation has been performed in order to determine if there occurs improvement in the UA of the various categories on the classified image of the principal components of the original bands and on the classified image of the stacked image of two different years. We performed the analyses using the IRS LISS Ⅲ images of two different years, i.e., 1996 and 2009, that represent the different magnitude of urbanization and the stacked image of these two years pertaining to Ranchi area, Jharkhand, India, with a view to assessing the impacts of urbanization on the UA of the different categories. The results of the investigation demonstrated that there occurs significant improvement in the UA of the impervious categories in the classified image of the stacked image, which is attributable to the aggregation of the spectral information from twice the number of bands from two different years. On the other hand, the classified image of the principal components did not show any improvement in the UA as compared to the original images. 展开更多
关键词 producer's accuracy user's accuracy principal components CLASSIFICATION stacked image
原文传递
基于Ethernet的嵌入式测控系统的设计
5
作者 桑静 任靖福 王宜怀 《计算机与数字工程》 2012年第7期131-133,136,共4页
在分析工业控制网络发展趋势、嵌入式以太网接入Internet网络数据传输需要的协议的基础上,针对现场总线通信方式的不足,设计了一个基于Ethernet的嵌入式测控系统。文章阐述了系统的设计方案,在硬件电路设计上,重点介绍了测控系统数据采... 在分析工业控制网络发展趋势、嵌入式以太网接入Internet网络数据传输需要的协议的基础上,针对现场总线通信方式的不足,设计了一个基于Ethernet的嵌入式测控系统。文章阐述了系统的设计方案,在硬件电路设计上,重点介绍了测控系统数据采集节点设计和以太网通信接口电路的设计;在软件系统设计上,提出测控终端软件设计方案,并实现了基于TCP/IP协议栈的网络通信设计。实际使用表明,该系统运行灵活、可靠、稳定,可直接使用企业内部的Intranet信息网,也可直接接入现行的公共Internet网络。 展开更多
关键词 嵌入式测控 以太网 MCF52233 TCP/IP协议栈 数据采集
在线阅读 下载PDF
CAN总线与Ethernet互联网关的设计
6
作者 黄小波 张钢 《自动化技术与应用》 2010年第8期77-81,共5页
在对CAN协议及TCP/IP协议栈进行深入研究的基础上,设计了以太网与CAN总线互联网关,该设计可以实现基于TCP/IP协议的计算机网络设备与基于CAN总线协议的底层现场网络互联。通过Visual C++6.0编写了网关上的程序使用了MSComm和WinSock控... 在对CAN协议及TCP/IP协议栈进行深入研究的基础上,设计了以太网与CAN总线互联网关,该设计可以实现基于TCP/IP协议的计算机网络设备与基于CAN总线协议的底层现场网络互联。通过Visual C++6.0编写了网关上的程序使用了MSComm和WinSock控件提供串口通信和TCP/IP通信功能,通过数据包发送和接收实验表明Can-Ethernet网关设计的有效性。 展开更多
关键词 以太网 CAN总线 TCP/IP协议栈 RTL8019AS
在线阅读 下载PDF
A Dynamic Protocol Stack Structure for Diversified QoS Requirements in Ad Hoc Network 被引量:3
7
作者 DONG Fang Li Ou +1 位作者 RAN Xiaomin JIN Feicai 《China Communications》 SCIE CSCD 2016年第S1期43-53,共11页
A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol sta... A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol stack, DPS operates in a dynamic and adaptive manner and is scalable to network condition changes. In addition, a protocol construction algorithm is proposed to dynamically construct of the protocol stack each network node. Simulation results show that, the processing and forwarding performance of our scheme is close to 1 Gb/s, and the performance of our algorithm is close to that of the classical algorithms with much lower complexity. 展开更多
关键词 ad HOC network QoS GUARANTEE DYNAMIC protocol stack protocol construction algorithm
在线阅读 下载PDF
Development and Verification of Simulation Model Based on Real MANET Experiments for Transport Layer Protocols (UDP and TCP) 被引量:2
8
作者 Joarder Mohammad Mustafa Kamal Mohammad Shahidul Hasan +1 位作者 Alison L. Griffiths Hongnian Yu 《International Journal of Automation and computing》 EI CSCD 2013年第1期53-63,共11页
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper... There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established. 展开更多
关键词 Mobile ad-hoc networks (MANET) real-life experiment Internet control message protocol (ICMP) user datagram protocol (UDP) transmission control protocol (TCP) optimised link state routing (OLSR) NS-2
原文传递
Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
9
作者 谢琪 刘文浩 +3 位作者 王圣宝 胡斌 董娜 于秀源 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期418-424,共7页
User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are... User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are two key problems for designing smart cart and password based user authentication scheme. In 2011, Li and Lee proposed a new smart cart and password based user authentication scheme with smart card revocation, and claimed that their scheme could be immunity to these attacks. In this paper, we show that Li and Lee's scheme is vulnerable to off-line password guessing attack once the information stored in smart card is extracted, and it does not provide perfect forward secrecy. A robust user authentication scheme with smart card revocation is then proposed. We use a most popular and widely used formal verification tool ProVerif, which is based on applied pi calculus, to prove that the proposed scheme achieves security and authentication. 展开更多
关键词 user authentication smart card PASSWORD protocol SECURITY
原文传递
A NOVEL MARKOV ANALYTICAL MODEL FOR THE TCP/AQM SYSTEMS
10
作者 Cao Zhenzhen Xiao Yang Chi Caixia 《Journal of Electronics(China)》 2010年第1期15-23,共9页
A novel closed-loop feedback TCP/AQM(Transfer Control Protocol/Active Queue Management) model is proposed in this paper using a discrete-time Markov chain,and a way to calculate the equilibrium distribution of this mo... A novel closed-loop feedback TCP/AQM(Transfer Control Protocol/Active Queue Management) model is proposed in this paper using a discrete-time Markov chain,and a way to calculate the equilibrium distribution of this model is given.In the model,system time is divided into time slots,the bottleneck router queue model and TCP window size model in each slot are analyzed.Finally,by combining adjacent slots,an integrated TCP/AQM analytical model is developed.By this model,the average values of packets dropping ratio and queue length in the router and TCP sending rate can be estimated,hence,this model could be a useful tool for the analysis of AQMs and support the development of new AQM schemes theoretically.The proposed TCP/AQM model is extended to a TCP-UDP(Control User Datagram Protocol)/AQM model,to analyze the TCP/AQM system performance when UDP flows exist.By implementing this model on Matlab,we compare its solutions to NS2 simulated solutions,then the validity of the model to analyze the closed-loop feedback TCP/RED(Random Early Detection) system is verified. 展开更多
关键词 Transfer Control protocol(TCP) Active Queue Management(AQM) Markov chain Congestion control user Datagram protocol(UDP)
在线阅读 下载PDF
An efficient cross-layer buffer management optimization scheme for 5G protocol stack
11
作者 YANG Xining ZHOU Yiqing CHEN Yang 《High Technology Letters》 EI CAS 2022年第4期384-391,共8页
It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the domin... It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load. 展开更多
关键词 cross-layer optimization 5G protocol stack evaluation framework OpenAirInterface(OAI)
在线阅读 下载PDF
基于Windows套接字的Ethercat主站协议栈设计与实现 被引量:1
12
作者 柳青 《机电产品开发与创新》 2021年第5期14-15,18,共3页
针对Ethercat主站需要专用硬件或者特殊网卡驱动的问题,提出了一种在windows平台上利用套接字实现Ethercat主站的方法。首先对协议栈进行模块化设计;然后分析了Ethercat协议在UDP/IP协议上的报文规范,并实现了主站对从站的读写;在此基... 针对Ethercat主站需要专用硬件或者特殊网卡驱动的问题,提出了一种在windows平台上利用套接字实现Ethercat主站的方法。首先对协议栈进行模块化设计;然后分析了Ethercat协议在UDP/IP协议上的报文规范,并实现了主站对从站的读写;在此基础上设计了协议栈自动配置从站的方法;最后采用wireshark软件抓取通信数据包,实验结果表明:设计的协议栈能够实现对从站的配置及数据交换,验证了协议栈的正确性。 展开更多
关键词 EtheRCAT 套接字 协议栈
在线阅读 下载PDF
A new protocol for concurrently allocating licensed spectrum to underlay cognitive users
13
作者 Sabyasachi Chatterjee Prabir Banerjee Mita Nasipuri 《Digital Communications and Networks》 SCIE 2018年第3期200-208,共9页
Cognitive radio technology makes efficient use of the valuable radio frequency spectrum in a non-interfering manner to solve the problem of spectrum scarcity. This paper aims to design a scheme for the concurrent use ... Cognitive radio technology makes efficient use of the valuable radio frequency spectrum in a non-interfering manner to solve the problem of spectrum scarcity. This paper aims to design a scheme for the concurrent use of licensed frequencies by Underlay Cognitive Users (UCUs). We develop a new receiver-initiated Medium Access Control (MAC) protocol to facilitate the selections of alternative reliable carrier frequencies. A circuit is designed to establish reliable carrier selections based on the Received Signal Strength Indicator (RSSI) at the receiving end. Based on both packet-level simulations and various performance parameters, a comparison is carried out among conventional techniques, including the Multiple Access with Collision Avoidance (MACA) and MACA by invitation(MACA-BI) techniques, and our scheme. The simulated results demonstrate that when conventional techniques are used, the system overhead time increases from 0.5 s on the first attempt to 16.5 s on the sixth attempt. In the proposed scheme under the same failure condition, overhead time varies from 0.5 s to 2 s. This improvement is due to the complete elimination of the exponential waiting time that occurs during failed transmissions. An average efficiency of 60% is achieved with our scheme while only 43% and 34% average efficiencies are achieved with the MACA and MACA-BI techniques, respectively. The throughput performance of our scheme on the fourth attempt is 7 Mbps, whereas for the MACA and MACA-BI protocols, it is 1.9 Mbps and 2.2 Mbps respectively. 展开更多
关键词 Exponential back-off time Interference temperature limit Medium-access control protocol Received signal strength indicator Underlay cognitive user
在线阅读 下载PDF
基于Z-Stack协议栈的WSN能量管理策略 被引量:14
14
作者 李军 黄岚 王忠义 《计算机工程》 CAS CSCD 北大核心 2011年第7期121-124,共4页
在分析基于ZigBee协议的Z-Stack1.4.3协议栈基础上,实现无线传感器网络(WSN)数据的自动周期获取,通过设置协议栈中休眠条件,不仅能最大限度地降低功耗,而且可以保证网络的同步性。构建一个簇树结构的低功耗ZigBee网络,设计具有网络数据... 在分析基于ZigBee协议的Z-Stack1.4.3协议栈基础上,实现无线传感器网络(WSN)数据的自动周期获取,通过设置协议栈中休眠条件,不仅能最大限度地降低功耗,而且可以保证网络的同步性。构建一个簇树结构的低功耗ZigBee网络,设计具有网络数据、拓扑显示等功能的监控管理系统。应用结果表明,该系统能在低功耗下稳定地工作,完成环境数据监测。 展开更多
关键词 无线传感器网络 Z-stack协议栈 协议栈机制 低功耗
在线阅读 下载PDF
基于Z-Stack协议栈的无线温湿度采集系统 被引量:10
15
作者 朱苗苗 牛国锋 程宏斌 《计算机系统应用》 2016年第10期258-262,共5页
基于Z-Stack协议栈,以CC2530射频收发芯片和DHT22数字温湿度传感器为核心,采用Zig Bee无线通信技术设计实现了无线温湿度采集监测系统,并在IAR环境下采用上位机软件以GUI的方式在终端直观地显示温湿度变化情况.主要阐述了系统结构设计... 基于Z-Stack协议栈,以CC2530射频收发芯片和DHT22数字温湿度传感器为核心,采用Zig Bee无线通信技术设计实现了无线温湿度采集监测系统,并在IAR环境下采用上位机软件以GUI的方式在终端直观地显示温湿度变化情况.主要阐述了系统结构设计、温湿度数据采集流程和图形化界面监测实现.实验表明,该系统实现温湿度数据的采集不但实时有效、可扩展性良好,而且具有极高的可靠性和卓越的稳定性. 展开更多
关键词 Z-stack协议栈 CC2530 ZIGBEE 协调器 DHT22
在线阅读 下载PDF
基于Z-Stack协议栈的船舶机舱环境监测系统设计 被引量:6
16
作者 何琪 杨培青 徐鹏 《船舶工程》 CSCD 北大核心 2021年第3期100-104,共5页
为提高船舶机舱的安全性,针对传统有线监测方式存在布线困难、成本高和扩展性差的缺点,设计了一套基于Z-Stack协议栈的监测系统。该系统综合了Zigbee无线网络自行愈合、组网灵活和超低功耗的优点,以CC2530射频模块为基础组成网络节点,... 为提高船舶机舱的安全性,针对传统有线监测方式存在布线困难、成本高和扩展性差的缺点,设计了一套基于Z-Stack协议栈的监测系统。该系统综合了Zigbee无线网络自行愈合、组网灵活和超低功耗的优点,以CC2530射频模块为基础组成网络节点,由传感器节点把测得的温湿度值、CO_(2)浓度和空气流速等参数经路由器或直接传递到协调器,最终传至上位机监控界面来实时显示、记录数值。试验结果表明,该系统具有功耗低、稳定性高、可开发性强等特点,满足机舱里监测实时性和数据精度的要求,同时对提高船舶自动化水平具有一定的参考和借鉴意义。 展开更多
关键词 船舶机舱 无线传感网络 Z-stack协议栈 CC2530
原文传递
基于Stacking模型融合的专变用户电费回收风险识别方法 被引量:10
17
作者 潘国兵 龚明波 +4 位作者 贺民 邬程欢 唐小淇 杨吕 欧阳静 《电力自动化设备》 EI CSCD 北大核心 2021年第1期152-158,共7页
针对当前电力公司面临的专变用户电费回收风险,提出一种基于Stacking模型融合的专变用户电费回收风险识别方法。对专变用户数据进行特征处理、特征构造与特征筛选,从样本分布和特征属性上优化模型的泛化性能;利用Stacking模型融合多个... 针对当前电力公司面临的专变用户电费回收风险,提出一种基于Stacking模型融合的专变用户电费回收风险识别方法。对专变用户数据进行特征处理、特征构造与特征筛选,从样本分布和特征属性上优化模型的泛化性能;利用Stacking模型融合多个基学习器,构建专变用户电费回收风险识别模型。实验结果表明,相较于其他常用的分类算法,所提方法具有更优的精确率、召回率、P-R调和均值、AUC值以及模型泛化性能,对专变风险用户的识别率也更高。 展开更多
关键词 专变用户 电费回收 风险识别 stacking模型融合 LGBM
在线阅读 下载PDF
基于Z-Stack的ZigBee协议栈组网过程研究 被引量:11
18
作者 何智勇 徐丽萍 《南京工业职业技术学院学报》 2018年第1期1-3,共3页
在ZigBee协议栈Z-Stack基础上,重点分析了Z-Stack协议栈的结构和组网类型,通过详细研究TI公司的Z-Stack协议栈核心的实现过程,从代码级别对ZigBee协议栈组网过程进行剖析和节点组网过程中的重要函数调用进行详细分析,对实际工程项目开... 在ZigBee协议栈Z-Stack基础上,重点分析了Z-Stack协议栈的结构和组网类型,通过详细研究TI公司的Z-Stack协议栈核心的实现过程,从代码级别对ZigBee协议栈组网过程进行剖析和节点组网过程中的重要函数调用进行详细分析,对实际工程项目开发有一定的指导作用。 展开更多
关键词 ZIGBEE协议栈 Z-stack 组网过程
在线阅读 下载PDF
基于Stacking与多特征融合的加密恶意流量检测 被引量:13
19
作者 霍跃华 赵法起 《计算机工程》 CAS CSCD 北大核心 2023年第5期165-172,180,共9页
加密技术保护网络通信安全的同时,大量恶意软件也采用加密协议来隐藏其恶意行为。在现有基于机器学习的TLS加密恶意流量检测模型中,存在单模型检测算法对多粒度特征适用性差和混合流量检测误报率高的问题。提出基于Stacking策略和多特... 加密技术保护网络通信安全的同时,大量恶意软件也采用加密协议来隐藏其恶意行为。在现有基于机器学习的TLS加密恶意流量检测模型中,存在单模型检测算法对多粒度特征适用性差和混合流量检测误报率高的问题。提出基于Stacking策略和多特征融合的非解密TLS加密恶意流量检测方法。分析加密恶意流量特征多粒度的特点,提取流量的流特征、连接特征和TLS握手特征。对所提取的特征通过特征工程进行规约处理,从而减少计算开销。对规约处理后的3类特征分别建立随机森林、XGBoost和高斯朴素贝叶斯分类器模型学习隐藏在流量内部的规律。在此基础上,使用流指纹融合处理后的多维特征,利用Stacking策略组合3个分类器,构成DMMFC检测模型来识别网络中的TLS加密恶意流量。基于CTU-13公开数据集对构建的模型进行性能评估,实验结果表明,该方法在二分类实验上识别召回率高达99.93%,恶意流量检测的误报率低于0.10%,能够有效检测非解密的TLS加密恶意流量。 展开更多
关键词 加密恶意流量 TLS协议 stacking策略 特征降维 多特征融合
在线阅读 下载PDF
TCP Offload系统的设计与实现 被引量:1
20
作者 孙小涓 杨卫兵 +1 位作者 周新亮 陈明宇 《计算机工程》 CAS CSCD 北大核心 2007年第24期99-101,共3页
网络带宽的迅速发展使主机协议处理开销成为系统整体性能的瓶颈。为了提高网络应用的性能、降低主机系统的资源占用,该文采用网卡子系统分担主机的网络包收发和TCP协议处理,设计实现了一个TCP offload系统,分析了一般TCP offload系统在... 网络带宽的迅速发展使主机协议处理开销成为系统整体性能的瓶颈。为了提高网络应用的性能、降低主机系统的资源占用,该文采用网卡子系统分担主机的网络包收发和TCP协议处理,设计实现了一个TCP offload系统,分析了一般TCP offload系统在性能和实施的困难,给出系统设计的基本原则,介绍了系统在通信接口、资源管理、事件管理和用户接口等方面的实现。系统测试结果表明,网卡能处理高速的网络应用,在一些情况下甚至达到线速。 展开更多
关键词 TCP下移 高速网络处理 协议栈
在线阅读 下载PDF
上一页 1 2 60 下一页 到第
使用帮助 返回顶部