Font Size: a A A

Reseach And Application Of The Network Performance And Data Security In The Mobile Learning

Posted on:2013-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:J LuoFull Text:PDF
GTID:2248330371493151Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
In recent years as the popularity of portable digital equipment, people’s study also more dash forward show "anytime, anywhere", the new study way--mobile learning was born. Mobile learning is a new study way with "Anyone, Anytime, Anywhere, Anystyle" characteristics and the great emphasis on the people in the study of personal autonomy. Because mobile learning itself is the combined product of mobile communication technology and learning theory, natural communication network and the safety of the data is the focus of mobile learning technology application.According to the campus environment, this paper explains the feasibility of mobile ad hoc network for mobile learning, analyses the characteristics of campus network environment which may have. And then compares the classic mobile ad hoc network routing protocol AODV and DSR, and simulates the two routing protocols on the campus network environment in the OPNET simulation. The simulation analysis AODV protocol in the campus environment with more users and the study resources which have more content will get a better network performance, and DSR is good for the campus environment in which whole network flow limited or mobile device itself limited flow, learning resources content is less small scattered, and to the network delay the demand is not very high.In data security, this paper analyzes that when the code information is the key the symmetric key encryption system is still safety, and then puts forward a symmetric key encryption scheme with coding redundancy. The whole scheme will use the plaintext position and block information as a key, in the encryption process the plaintext will be arranged, and added to the redundancy false information content, then encoded; the decryption process is decoding the ciphertext, and then according to the key content to extract the correct plaintext contents to complete the whole ciphertext decryption. This paper analyzes that when the key do not know by the eavesdropper, the number of possibility which ciphertext-only attacks will gain is a exponential function, under the condition that the price of decipher is higher than information value itself, the scheme is a feasible. Then the paper also plans for the simple realization, the whole scheme is not complex, with the good function of the random condition the scheme can achieve a dense security requirements.
Keywords/Search Tags:mobile learning, mobile ad hoc network, routing protocol, symmetrickey encryption system, redundancy false information, encode
PDF Full Text Request
Related items