The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Railway signaling communication is a kind of safety-related processing and the information has to be delivered safely. RSSP-1 Railway Signal Safety Protocol is a safety communication protocol which aims at protecting the message transmission between railway signaling safety-related equipment in closed transmission systems. CPN is suitable for the verification of the correctness and safety characteristics...
Along with the progress of the demonstration centre of construction projects, using the application in place of funds to purchase a lot of network equipment, in order to solve the network equipment unified management and maintenance problem, an method of network VTP domain for computer experimental teaching demonstration center is presented. First, the VTP concept, function and characteristics are...
In recent years, with the developments of wireless sensor networks technology, how to prolong the lifetime of WSN and reduce energy consumption by the sensor nodes becomes a hot topic. This article analyzes the mechanism of clustering in LEACH protocol and presents improved approaches based on energy of sensor node and the distance between the node and the base satation, then compares their performances...
The E-business under the pattern of cloud computing has much of advantages and prominent features, which will be confronted with a variety of issues about security just like the current E-business. This article introduces the conception and trait about the E-business under the pattern of cloud computing in brief and puts forward the security threats from the perversion of data security, the criterion...
Data consistency consists of strong consistency and weak consistency. Strong consistency ensures that the data replicas keep consistent at any time, but it limits system availability, weak consistency ensures the data replicas keep consistent at last that greatly increases system availability, but it can not keep concurrent modification timely. Replication is the key technology of massive data consistency...
Nowadays, communication technology is increasingly used in Chinese Train Control System. And the Railway Signal Safety Communication protocol is the upper layer protocol that ensures safety transmission of safety related information in a non-trusted channel. The characteristics and behavior pattern of the protocol are closely related to the safety of the whole railway signal system. This paper simulates...
As the protocol conformance testing has become a common phase during the development process, the TD_LTE wireless terminal tester must be designed in accordance with the protocol specifications. For this purpose, special programming languages, such as TTCN-3, as well as tools are available. This paper builds the corresponding test system based on the standard testing notation TTCN-3, and elaborates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.