The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is necessary to monitor and control remotely the devices in scattered unattended machine rooms. The remote monitoring and controlling system are designed based on SNMP and TCP/IP, which uses mainly existing intranet. Following the introductions of SNMP and TCP/IP, overview design and software design of the system are presented. The system may achieve the management of unattended machine rooms and...
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP) is the main problem in this paper. Anomaly detection...
Ubiquitous patient care monitoring system can be defined as the combination of communication technology and body sensor nodes. Ubiquitous patient care monitoring is the part of telemedicine monitoring, an application communication protocol which is HTTP (Hypertext Transfer protocol), used to access information from handheld devices such as PCs, PDA (personal digital assistant) etc. which have the...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable with spoofed Internet Protocol (IP) address. The main problem in this paper is how to detect TCP...
Mobile video service is emerging as an attractive service, on basis of the successful IPTV commercialization and recent incredible smart-phone penetration to the mobile market. However, the lack of QoE/QoS monitoring mechanism will be a major obstacle for wider acceptance. In this paper, we present a QoE/QoS monitoring scheme, extending OMA-DM protocol and streaming QoE parameters. The design and...
This paper explores the use of TCP fingerprints for identifying and blocking spammers. Evidence has shown that some bots use custom protocol stacks for tasks such as sending spam. If a receiver could effectively identify the bot TCP fingerprint, connection requests from spam bots could be dropped immediately, thus reducing the amount of spam received and processed by a mail server. Starting from a...
In the design of mobile phone monitoring system, the balance of real-time video playback fluency and clarity is the key of the design work. For this problem, the designer can use image data compression international standard, such as MPEG standards, and real-time transport protocol RTP to reallize real-time video data transmission on GPRS, but the final result is extremely poor. On the basis of introducing...
The rapid development of network technology in particular the widely use of the internet based on TCP/IP protocol, affects the way people work, learn and live greatly. Network's business value and importance increases as people get more dependent on network. Every walk of life's development and various activities of the word are inseparable from the Internet. However, as the telecommunication operation...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable. The main problem in this paper is how to detect TCP SYN flood through network. This paper used anomaly...
To meet the requirements of some intelligent vehicle monitoring system, the software integrates Global Position System (GPS), Geographic Information System (GIS) and Global System for Mobile communications (GSM) in the whole. The structure, network topology, functions, main technical features and their implementation principles of the system are introduced. Then hardware design of the vehicle terminal...
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server...
In order to transmit the coal mine multi-service in the unified platform, the status and development of the coal mine multi-service system for monitoring are researched. According to the different service requirements in coal mine, the model of the coal mine multi-service based on soft-switch is proposed; the Architecture of the coal mine multi-service based on soft-switch is designed. In the platform,...
About ten years ago the trend of development of Ethernet-based field buses began. Now a (large) number of them are standardized within IEC 61158, a variety of products and a variety of installed systems do exist. Beside the usage of Ethernet as a fast physical layer it also brought the entire TCP/UDP/IP or Internet protocol suite down to the shop floor, establishing the general opportunity to provide...
Development of network monitoring tools for realtime rich-media (RTRM) applications remains a challenge for both academic and industrial researchers as the complexity of the computational processing varies dynamically. We propose a novel, flexible and cost effective technique which can be implemented in ordinary network environment to monitor QoS parameters such as packet-delay, packet-loss, packet...
A new methodology of mobile police spatial information service grid model is studied based on spatial grid computing environment. Key technologies are presented in the model, including spatial grid computing, mobile agent (MA) distributed computing, mobile geographic information system (GIS), global positioning system (GPS), video monitoring, transfer control protocol/internet protocol (TCP/IP), and...
A water quality monitoring system using automatic control and network techniques has been built. Hardware and software configuration for the system: measure meters, sensors, client/server configurations, Ethernet networks running TCP/IP, wireless network, PC-based operator terminals, terminal server's relational database and application software. The telemetry network improves the monitoring system's...
In the traditional structure of B/S, the date interaction between the client and the server is Request-Response mechanism based on the HTTP model Protocol so that the operating efficiency and real-time of B/S monitoring system limited greatly which are basic requirements of modern industrial production and control system. On this issue, a new B/S model industrial control system based on Ajax technology...
Both power and performance are important issues in today's datacenters. It is hard to achieve optimization in both aspects on shared infrastructures due to system dynamics. Previous work mostly emphasized on either aspect or relied on models that were trained off-line for specific workload. In this paper, we present vPnP, a feedback control-based coordination system that provides guarantees on a service...
This article discusses the development of monitoring system about the security situation in coal production and coal mining. In order to solve the problem of coal mine monitoring systems and self-management of coal enterprises, Adopt the Socket communication mechanism based on TCP protocol, design the Real-time monitoring and development of a WEB-based remote coal mine gas monitoring system. The test...
With the development of e-commerce, SSL protocol is more and more widely applied to various network services. For the defect of SSL authentication, this paper analyses two kinds of drawbacks in SSL handshake, and respectively conducts fake certificate and conversion from HTTPS to HTTP data to attack. Both of them are dangerous to HTTPS communication. For that reason, we have proposed three different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.