基于文件交换的点对点有序可靠通信链路设计方法

展开
  • 1.上海明华电力科技有限公司, 上海 200090
    2.淮沪电力有限公司田集第二发电厂,安徽 淮南 232098
    3.上海云欣电子信息技术有限公司, 上海 200233
邱寅祺(1989-),男,上海市人,高级工程师,从事电力系统自动化研究.

收稿日期: 2021-09-24

  网络出版日期: 2022-01-24

A Design Method of File Exchange-Based Point-to-Point Ordered Reliable Data Link Service

Expand
  • 1. Shanghai Minghua Electric Power Science and Technology Co., Ltd., Shanghai 200090, China
    2. Huaihu Electric Power Co., Ltd., Tianji Second Power Plant, Huainan 232098, Anhui, China
    3. Shanghai Yunxin Electronic Information Technology Co., Ltd., Shanghai 200233, China

Received date: 2021-09-24

  Online published: 2022-01-24

摘要

针对仅具有文件交换且没有其他信息交换手段的通信双方,提出了点对点有序可靠的数据链路层设计方法.通过对交换的文件附加控制信息,实现链路基本控制;结合使用滑动窗口和超时重发,解决链路可能存在的失序与丢失问题;对交换的文件附加MD5等校验码,结合使用数据校验技术,可及时发现可能的毁损,保证交换文件的完整一致性.实际应用表明,即使通信双方仅具有文件交换手段,只要能找到合适的滑动窗口参数,可以实现有序可靠的通信链路服务.

本文引用格式

邱寅祺, 付文龙, 潘聪, 卢宏林, 归一数 . 基于文件交换的点对点有序可靠通信链路设计方法[J]. 上海交通大学学报, 2021 , 55(S2) : 82 -85 . DOI: 10.16183/j.cnki.jsjtu.2021.S2.013

Abstract

For the communication parties which only have file exchange and no other means of information exchange, this paper proposes a design method of a point-to-point ordered reliable data link layer. Control information is appended to the exchanged files to realize the basic link control function. Mechanisms of sliding window and timeout retransmission are also introduced to address the problem of disorder and even loss. Furthermore, MD5 or some other check codes are also appended to the exchanged files to achieve an efficient verification of possible damage, guaranteeing the integrity and consistency of the exchanged files. The practical application shows that ordered reliable communication link service can be realized as long as all appropriate sliding window parameters could be found, even though the communication parties only have the means of file exchanges.

参考文献

[1] 夏素霞, 袁宗福, 李芳, 等. 计算机网络技术与应用[M]. 北京: 人民邮电出版社, 2010.
[1] XIA Suxia, YUAN Zongfu, LI Fang, et al. Computer networks: Technology and application[M]. Beijing: Posts & Telecom Press, 2010.
[2] 谢希仁. 计算机网络[M].5版. 北京: 电子工业出版社, 2008.
[2] XIE Xiren. Computer networks[M]. 5th ed. Beijing: Publishing House of Electronics Industry, 2008.
[3] 蔡京玫, 宋文官. 计算机网络基础实验[M]. 北京: 中国铁道出版社, 2008.
[3] CAI Jingmei, SONG Wenguan. Basic experiment of computer network[M]. Beijing: China Railway Publishing House, 2008.
[4] 编委会. 网络通信技术分册[M]//通信工程新技术实用手册. 北京: 北京邮电大学出版社, 2002.
[4] Editorial Committee. Volume of network communication technology[M]//Practical manual of new technology in communication engineering. Beijing: Beijing University of Posts and Telecommunications Press, 2002.
[5] 吴爱清, 潘成超, 刘江明, 等. MD5加密机制在跨平台文件传输系统中的应用[J]. 中国管理信息化, 2018, 21(3): 164-166.
[5] WU Aiqing, PAN Chengchao, LIU Jiangming, et al. MD5 application of encryption mechanism in cross platform file transmission system[J]. China Management Informationization, 2018, 21(3): 164-166.
文章导航

/