首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu IPv4和IPv6在Windows Vista和Linux Ubuntu上的性能评估
S. Narayan, Peng Shang, Na Fan
A small network of computing devices that started as ARPANET project in early 1980s is now a worldwide network of devices for billions of users. This global network, the Internet, has become an integral part of worldwide economy and life of individuals. Internet Protocol (IP) v4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. In this paper, two operating systems namely, Windows Vista and Linux Ubuntu are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, jitter and CPU usage are empirically measured on a test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the operating system.
一个小型的计算设备网络,始于20世纪80年代初的阿帕网项目,现在是一个拥有数十亿用户的全球设备网络。这个全球性的网络,因特网,已经成为世界经济和个人生活的一个组成部分。Internet Protocol (IP) v4是Internet的基本构建块,并且服务良好,但是它有一些限制,阻碍了它的发展。解决方案是IPv6,它解决了早期版本的固有问题。然而,由于IPv6的开销增加以及它与承载该通信协议的操作系统的交互,可能会出现网络性能问题。本文以Windows Vista和Linux Ubuntu两种操作系统配置两个版本的IP,并对性能差异进行实证评估。与性能相关的指标,如吞吐量、延迟、抖动和CPU使用率,都是在测试平台上进行经验测量的。结果表明,网络性能不仅与IP版本和流量类型有关,还与操作系统的选择有关。
{"title":"Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu","authors":"S. Narayan, Peng Shang, Na Fan","doi":"10.1109/NSWCTC.2009.368","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.368","url":null,"abstract":"A small network of computing devices that started as ARPANET project in early 1980s is now a worldwide network of devices for billions of users. This global network, the Internet, has become an integral part of worldwide economy and life of individuals. Internet Protocol (IP) v4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. In this paper, two operating systems namely, Windows Vista and Linux Ubuntu are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, jitter and CPU usage are empirically measured on a test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the operating system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Initialization Method of Gene Library Based on Teiresias Algorithm 基于Teiresias算法的基因库初始化方法
D. You-xiang, Huang Min, Xu Jiuyun
this paper analyses the problems and disadvantages of generating detectors in the current intrusion detection system so as to propose a method that can be applied into Teiresias algorithm to initialize gene library, relating with the ways of generating detectors by using the gene library based on the artificial immune theory. By using Teiresias algorithm to preprocess the non-self data, we can get a more effective variable-length sequence pattern that can reflect the non-self characteristics. Using this pattern, which is relatively independent, complete and meaningful, to initialize the gene library can make the gene library more optimized, and this will greatly improve the efficiency and accuracy of intrusion detection system.
本文分析了当前入侵检测系统中生成检测器存在的问题和不足,提出了一种可应用于Teiresias算法初始化基因库的方法,以及基于人工免疫理论的利用基因库生成检测器的方法。利用Teiresias算法对非自数据进行预处理,可以得到更有效地反映非自特征的变长序列模式。利用这种相对独立、完整、有意义的模式对基因文库进行初始化,可以使基因文库更加优化,从而大大提高入侵检测系统的效率和准确性。
{"title":"Initialization Method of Gene Library Based on Teiresias Algorithm","authors":"D. You-xiang, Huang Min, Xu Jiuyun","doi":"10.1109/NSWCTC.2009.119","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.119","url":null,"abstract":"this paper analyses the problems and disadvantages of generating detectors in the current intrusion detection system so as to propose a method that can be applied into Teiresias algorithm to initialize gene library, relating with the ways of generating detectors by using the gene library based on the artificial immune theory. By using Teiresias algorithm to preprocess the non-self data, we can get a more effective variable-length sequence pattern that can reflect the non-self characteristics. Using this pattern, which is relatively independent, complete and meaningful, to initialize the gene library can make the gene library more optimized, and this will greatly improve the efficiency and accuracy of intrusion detection system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks 基于信誉的集群自组网信任管理策略
Li Xu, Yihui Zhang
To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member. Then we propose the method of combining trust ratings and modified Bayesian in the information exchange and reputation judgment. The network is not susceptible to damage from selfish or malicious nodes easily and efficiently. Finally, Analysis of the strategy and performance simulation is also presented.
为了克服不熟悉节点信息有限的问题,减少集群自组织网络所需的内存空间,提出了一种基于信誉的集群自组织网络信任管理策略。基本上,我们的解决方案首先将邻近节点聚集为一个集群,并选择一个节点作为集群头,负责向每个集群成员颁发信任证书。在此基础上,提出了信息交换与信誉判断中信任评级与修正贝叶斯相结合的方法。网络不容易受到自私或恶意节点的破坏。最后,对策略进行了分析,并进行了性能仿真。
{"title":"A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks","authors":"Li Xu, Yihui Zhang","doi":"10.1109/NSWCTC.2009.265","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.265","url":null,"abstract":"To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member. Then we propose the method of combining trust ratings and modified Bayesian in the information exchange and reputation judgment. The network is not susceptible to damage from selfish or malicious nodes easily and efficiently. Finally, Analysis of the strategy and performance simulation is also presented.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134156264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Time-decay Based P2P Trust Model 基于时间衰减的P2P信任模型
Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang
This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is more approached fact value and it can resist vicious association attraction, dynamic strategy attraction, and it has a favorable performance.
提出了一种基于时间衰减的点对点网络信任模型。该模型通过对交易时间进行衰减,使信任值随时间衰减而动态变化,达到交易越接近越可靠的目的。最后给出了实验方案和仿真。实验结果表明,该模型更接近事实值,能够抵抗恶性关联吸引、动态策略吸引,具有良好的性能。
{"title":"A Time-decay Based P2P Trust Model","authors":"Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang","doi":"10.1109/NSWCTC.2009.98","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.98","url":null,"abstract":"This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is more approached fact value and it can resist vicious association attraction, dynamic strategy attraction, and it has a favorable performance.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Range Query Model Based on DHT in P2P System P2P系统中基于DHT的范围查询模型
Wang Dan, Li Maozeng
A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.
P2P (Peer-to-Peer)系统已成为分布式环境中最成功的资源共享方式之一,而DHT(distributed Hash Table)是在P2P系统中定位共享资源的一种有效方法。本文将DHT与B+树相结合,提出了一种扩展的DHT模型。共享资源由其属性表示。每个查询请求都与一个或多个属性中的范围相关联,并且引入B+树来组织每个属性的值。为了实现和验证我们的模型,选择Chord作为底层DHT系统。除了相等查询之外,该模型还可以在DHT上执行范围查询。介绍了从B+树到Chord系统映射的相关技术。给出了节点的添加和退出过程和范围查询过程。
{"title":"A Range Query Model Based on DHT in P2P System","authors":"Wang Dan, Li Maozeng","doi":"10.1109/NSWCTC.2009.55","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.55","url":null,"abstract":"A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"35 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114024287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SPTM: A Security Protocol for Protecting the P2P Trust Information Management 一种保护P2P信任信息管理的安全协议
Jianli Hu, Quanyuan Wu, Bin Zhou
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peers’ behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.
P2P网络的开放性、共享性和匿名性为分布式计算技术的发展提供了机遇和威胁。建立基于信誉的信任管理系统(TMS)是降低威胁的可行途径之一。以往的研究大多集中在如何利用信任机制对对等体的行为进行评价以及如何建立基于声誉的信任管理机制上,而没有考虑信任信息管理中的安全问题。针对这一问题,本文提出了一种保护P2P信任信息管理(SPTM)的安全协议。理论分析和仿真实验表明,SPTM在传输过程中可以有效抑制符号攻击者和信任信息篡改对等体,且时间开销很小。此外,它可以很容易地集成到各种基于声誉的tms中。
{"title":"SPTM: A Security Protocol for Protecting the P2P Trust Information Management","authors":"Jianli Hu, Quanyuan Wu, Bin Zhou","doi":"10.1109/NSWCTC.2009.156","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.156","url":null,"abstract":"The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peers’ behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology Optimization for Target Localization in Wireless Sensor Networks 无线传感器网络中目标定位的拓扑优化
Chao Yang, Lijun Chen, Daoxu Chen, Li Xie
Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.
目标定位是无线传感器网络中的一个重要应用。然而,由于单个节点的能力和环境噪声的限制,单个传感器往往无法准确定位目标,需要将多个传感器的观测结果结合起来以提高定位精度。本文采用一种广泛应用的节点定位算法——质心法进行目标定位。我们首先确定了影响质心法精度的两个因素:节点密度和均匀性。在此基础上,提出了一种基于聚类的网络分类方法。在这种基于集群的网络中,只有一部分传感器处于活动状态,通过调整节点密度和均匀度来提高定位精度。实验结果表明,采用该分类方法可以在减少活动节点的情况下提高定位结果的准确性。
{"title":"Topology Optimization for Target Localization in Wireless Sensor Networks","authors":"Chao Yang, Lijun Chen, Daoxu Chen, Li Xie","doi":"10.1109/NSWCTC.2009.28","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.28","url":null,"abstract":"Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology 基于无线传感器网络技术的石油钻井监测系统的研究与开发
Qinghua Xu, Jinyu Jiang, Xianbiao Wang
Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.
介绍了石油钻井现场无线传感器网络的建设。基于Zigbee技术,搭建了系统框架,进行了软硬件配置,并对系统流程进行了分析。实现了TinyOS操作系统在CC2430平台上的移植,无线传感器网络的数据采集、程序调试和性能测试。监测系统采集的数据与实际情况吻合。因此,该监控系统可用于石油钻井过程的监控。
{"title":"Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology","authors":"Qinghua Xu, Jinyu Jiang, Xianbiao Wang","doi":"10.1109/NSWCTC.2009.270","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.270","url":null,"abstract":"Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Research of Hybrid Network Communication System in NC System 数控系统中混合网络通信系统的研究
Kun-qi Wang, Pengju Wang, Ya-nan Wang
Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.
将有线通信网络与无线通信相结合,提出了一种应用于数控系统的混合网络通信系统。数控系统采用上位机与下位机相结合的操作方式,形成有线通信网络。上位机实现了CAD、CAM、图形自动编程、刀具位置计算、NC代码生成等功能。下位机仅作为运动控制系统。数控机床的一些故障信号由下位机传输到上位机。下位机与上位机通过基于TCP / IP协议的网线和以太网交换机连接。采用工业以太网作为平台。另外,通过虚拟串口技术将数控系统与PDA连接,形成微型网络,对虚拟蓝牙技术的无报警故障进行诊断。用NT端口软件直接访问PC机中的虚拟串口。在c++ Builder6中,通过带定时器的蓝牙无线通信模块从顶层应用程序中定期访问数控机床的信息,包括数控代码、刀具位置数据等。通过ActiveSync软件将数控机床信息以Access文件的形式保存在PDA数据库中。在c++ Builder6中采用虚拟Winsock技术设计了上位机通信程序和下位机通信程序。采用evb3.0编写PDA接收数据模块程序。在基于上述方法的实验中,在下位机正常运行的情况下,上位机实现了CAD、CAM、图形自动编程、刀具位置计算、NC代码生成等功能,增加了数控系统的功能。当下位机与PDA连接时,可以成功地将过程信息传递到PDA,提高数控系统运行时的维护效率。将混合网络通信系统应用于数控系统中,提高了系统的功能和维护效率。
{"title":"The Research of Hybrid Network Communication System in NC System","authors":"Kun-qi Wang, Pengju Wang, Ya-nan Wang","doi":"10.1109/NSWCTC.2009.345","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.345","url":null,"abstract":"Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic Access Control for Web Services Web服务的语义访问控制
Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang
The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.
本文设计了WSACPL策略本体来表达web服务的访问控制策略。本体还包括解决WSACPL策略之间冲突的机制。最后,给出了WACS的实现方案。WACS将WSACPL策略本体与领域本体和服务本体相结合,实现对web服务的语义访问控制。
{"title":"Semantic Access Control for Web Services","authors":"Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang","doi":"10.1109/NSWCTC.2009.389","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.389","url":null,"abstract":"The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"652 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1