Data transmission method and data transmission device

A data transmission method and data frame technology, which are applied in the network field, can solve the problems of unfavorable construction of a super-strong military communication network, military communication network can not take into account confidential communication and network self-healing ability, etc.

Active Publication Date: 2016-03-30
ZHANGJIAGANG INST OF IND TECH SOOCHOW UNIV +1
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the existing research on secure communication and network self-healing, the two are often separated and studied independently, resulting in military communication n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and data transmission device
  • Data transmission method and data transmission device
  • Data transmission method and data transmission device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] See figure 1 , which shows a flow chart of the data transmission method provided by this application, which may include the following steps:

[0047] Step S11: The transmitting end establishes N different first paths between the transmitting end and the receiving end in the preset network.

[0048] Wherein, the N is an integer greater than 1.

[0049] Step S12: The sender splits the fixed-length data frame into N first fragments, each of the first fragments corresponds to one of the first paths, and the first paths corresponding to the first fragments are different from each other.

[0050] In this embodiment, the length of the i-th first fragment is The L is the length of the data frame, the P(i) is a random number generated by a preset key according to a preset algorithm, the P(i) is greater than 0 and less than 1, the

[0051] In this embodiment, the preset key and preset algorithm are not limited, as long as application layer encryption is applicable.

[0052...

Embodiment 2

[0073] In this embodiment, in figure 1 On the basis of the data transmission method shown, another data transmission method is extended, please refer to figure 2 , which can include the following steps:

[0074] Step S21: The transmitting end establishes N different first paths between the transmitting end and the receiving end of the preset network.

[0075] Wherein, the N is an integer greater than 1.

[0076] Step S22: The transmitting end splits the fixed-length data frame into N first fragments, each of the first fragments corresponds to one of the first paths, and the first paths corresponding to the first fragments are different from each other.

[0077] In this embodiment, the length of the i-th first fragment is The L is the length of the data frame, the P(i) is a random number generated by a preset key according to a preset algorithm, the P(i) is greater than 0 and less than 1, the

[0078] Step S23: The transmitting end sends the corresponding first fragment...

Embodiment 4

[0107] and figure 1 Corresponding to the data transmission method shown, this embodiment provides a schematic diagram of a logical structure of a data transmission device. Please refer to Figure 4 , the data transmission apparatus includes: a first establishing unit 41 , a first splitting unit 42 , a first sending unit 43 , a second splitting unit 44 , a second establishing unit 45 and a second sending unit 46 .

[0108] The first establishing unit 41 is configured to establish N different first paths between the sending end and the receiving end of the preset network.

[0109] The N is an integer greater than 1.

[0110] The first splitting unit 42 is configured to split the fixed-length data frame into N first fragments, each of which corresponds to one of the first paths, and the first paths corresponding to each of the first fragments are different from each other. , the length of the i-th first fragment is The L is the length of the data frame, the P(i) is a random n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data transmission method and a data transmission device. The data transmission method comprises the following steps: a sender establishes N different first paths between the sender and a receiver of a default network; the sender splits a data frame of fixed length into N first fragments; the sender sends the corresponding first fragments to the receiver through the first paths; if M first paths fail in the transmission process of the data frame, the sender splits the data frame into (N-M) second fragments; the sender establishes (N-M) different second paths between the sender and the receiver; and the sender sends the corresponding second fragments to the receiver through the second paths. According to the invention, both secure communication capacity and the self-healing capacity of a military communication network are taken into consideration, and a super-strong military communication network can be constructed.

Description

technical field [0001] The present application relates to the field of networks, and in particular, to a data transmission method and device. Background technique [0002] With the rapid arrival of the information age, military communication networks have gradually become an indispensable part of military activities. Among them, secure communication and network self-healing capabilities are the two major elements for building a super-strong military communication network. [0003] At present, the secure communication method used in military communication networks is the application layer secure communication technology, because the application layer secure communication technology is relatively mature, and it is difficult to crack without mastering the encryption, decryption keys and algorithms. [0004] On the other hand, the network self-healing capability means that in the event of a network failure or attack that causes one or more network links to break at the same time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L12/24
CPCH04L9/0869H04L41/0654H04L9/0827H04L9/14H04L2001/0096H04L9/08H04B1/0483
Inventor 沈纲祥李龙飞江昊岷
Owner ZHANGJIAGANG INST OF IND TECH SOOCHOW UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products