scholarly journals Application of Information Transmission Protocol in Communication Transmission Network System

2021 ◽  
Vol 1856 (1) ◽  
pp. 012044
Author(s):  
Dan Wei ◽  
Yang Guo ◽  
Jiawei Luo
2014 ◽  
Vol 608-609 ◽  
pp. 435-439
Author(s):  
Xiao Lei Wu

Combined with the transmission characteristics of multi node under master-slave mode, the paper design a high speed parallel transmission network based on RS485 bus, realize sampling nodes on the bus communication data packet detection using the ring buffer technique, and use the hardware timer and system parameters in the controller, combine with a custom packet to complete point to point protocol design of broadcast communication, in order to realize the free cutting of the whole system and reliable control and stable data transmission and node. The actual field test that communication rate has no error and error operation under the condition of the cable length of 2 Mbps and 100 m.


Author(s):  
Jingxiang Zhong

In order to improve the secure transmission capability of wireless transmission network communication data, a network communication data encryption design is required. An encryption and secure transmission method of wireless transmission network communication data based on wireless channel feature detection is proposed. The ECC (Elliptic Curves Cryptography) algorithm analyzes by monitoring single-channel and multi-channel samples separately. The ciphertext protocol for data secure transmission is constructed, the Hash dynamic transmission protocol is used for data access control, the data dynamic symmetric key, the key construction and arithmetic coding design are constructed. Combined with the ellipse linear mapping method, the data is encrypted safely. According to the intensity of the wireless channel feature distribution, the scrambling degree is rearranged for the random scrambling and encryption of the data, and the random linear coding method is used to realize the random scrambling and encryption of the data, so as to realize the secure transmission of network communication data and the secure storage of information. The simulation test results show that using this method to encrypt and transmit wireless transmission network communication data has better security and stronger anti-attack ability, thereby improving the secure transmission performance of network communication data.


Author(s):  
Aleksejs Jurenoks ◽  
Leonids Novickis

<p class="R-AbstractKeywords"><span lang="EN-US">In the recent years low power computing systems have gained popularity.  Networks, which use low power computer systems and transmitted data by using wireless connection are called wireless sensor networks, which  main task is to get the information from sensors and transmission network. Nowadays, the most topical researches pertaining to wireless sensor networks are grounded on the  new optimization of structure of network transmission protocol, the routing optimization in transmission network, optimization of network structure, as a result of which the life circle of wireless network sensors is possible to increase. In the present article the methodology for determining the life circle of network is discussed. The approaches in detection of life circle pertaining to the important network nodes are described.</span></p>


Sign in / Sign up

Export Citation Format

Share Document