Error: Client network socket disconnected before secure TLS connection was established
View in Console
Learn more about troubleshooting API requests
取消勾选即可
Client network socket disconnected before secure TLS connection was establishedView in Conso
Error: Client network socket disconnected before secure TLS connection was establishedView in ConsoleLearn more about troubleshooting API requests取消勾选即可
标题:
Client
network
socket
dis
connect
ed
before
secu
re
TLS
connection
was
es
tabl
ished
我在使用 SAP Spartacus 连接 Commerce Cloud 后台 OCC API 时,遇到如下错误消息:
Error:
Client
network
socket
dis
connect
ed
before
secu
re
TLS
connection
was
es
tabl
ished
at connR
es
etException (in
当你使用API时出现下面错误时,请检查你的Http请求头
Error: write EPROTO 600118488:error:100000f7:SSL routin
es
:OPENSSL_internal:WRONG_VERSION_NUMBER:../../third_party/boringssl/src/ssl/
tls
_record.cc:242:
View
in
Console
Learn more about troubl
es
hooting API requ
es
ts
了解有...
npm WARN registry Unexpect
ed
warning for https://registry.npmjs.org/: Miscellaneous Warning ECONNR
ES
VMware® vSAN™
Network
D
es
ign 11.1.vCenter Recovery Example with Unicast vSAN 11.2.vSAN Node preparation 11.3.vCenter Preparation 11.4.Adding vSAN nod
es
to vCenter 12. Appendix F 12.1.Boot Strapping a vSAN 6.6 unicast cluster 13. Switch and NIC Performance 13.1.NIC performance considerations 13.2.NIC Featur
es
and Performance
----------------------------------------------------------------------
Remote Administrator 2.2 for Win9X/ME/NT4.0/2000/XP
All rights r
es
erv
ed
.
All rights r
es
erv
ed
.
Date: June 15th, 2004
----------------------------------------------------------------------
You can find complete help in 'help.hlp' file
----------------------------------------------------------------------
Radmin
----------------------------------------------------------------------
Contents:
* What is Radmin?
- What mak
es
it different from other systems?
- Featur
es
* System requirements
* Installation
* Radmin
Secu
rity
* How to contact us
----------------------------------------------------------------------
What is Radmin?
----------------------------------------------------------------------
Radmin is a remote control program that lets you work on another
computer remotely through your own. You see the remote computer's
screen in a r
es
izable window on your own monitor or as the full
screen. Your mouse and keyboard control the remote computer so you
can work on the remote computer just as if you were sitting right at
The remote computer can be anywhere on the Internet or in your local
network
. You don't ne
ed
a fast
network
connection
. Even with a MODEM
the screen update spe
ed
is an accep
tabl
e 5-10 screen updat
es
per
second. If the remote computer is on your LOCAL
NETWORK
the typical
spe
ed
is from 100 to 500 screen updat
es
per second.
Often while working in Radmin's full-screen mode, you forget that you
are working on a REMOTE computer!
Radmin consists of two parts:
* The server on the remote computer that sends the remote
computer's screen
dis
play.
* The
client
- also call
ed
the
view
er - that shows the remote screen
dis
play on your own monitor.
To get start
ed
you ne
ed
to run Radmin server on the remote computer.
Then run Radmin
client
on your own computer. The current version of
Radmin requir
es
a TCP/IP
connection
between both computers, so you'll
ne
ed
to set this up if they are not already
connect
ed
.
----------------------------------------------------------------------
What mak
es
it different from other systems?
----------------------------------------------------------------------
Radmin outperforms all other remote control software in spe
ed
,
secu
rity and usability.
Spe
ed
: Radmin is the fast
es
t remote control software available.
It is optimiz
ed
for low-bandwidth
connection
s such as
modems.
Connect
ing via modem, screen refr
es
hment rate
reach
es
5-10 updat
es
per second. If
connect
ed
to a LAN you
can work on remote computer with real-time spe
ed
, reaching
over 100 screen updat
es
per second.
Secu
rity is a critical consideration when implementing the remote
control software. To maintain the
secu
rity of data and
corporate
network
r
es
ourc
es
, Radmin supports the existing
level of environment
secu
rity and provide its own level
as well. Radmin offers the high
es
t levels of encryption
available in its category.
Usability: Radmin simple interface is devoid of usel
es
s
'value add
ed
featur
es
' that bloat software and make it
hard to work with. Radmin is extremely easy to learn
and use.
----------------------------------------------------------------------
Featur
es
----------------------------------------------------------------------
Run as a Service
Radmin server can work as a SERVICE under Win9x, ME, NT4.0, Win2000
and Winsows XP. This lets you log a user on or off remotely.
NOTE: If Radmin server is start
ed
on Windows XP, the "Switch User"
feature cannot be us
ed
.
Multiple
Connection
s Support
Radmin server supports simultaneous multiple
connection
s to the same
remote screen.
Full-Screen, Scal
ed
and Window
ed
View
Mod
es
Full-screen mode shows the remote screen full-size on your own monitor
Scal
ed
mode lets you see the remote screen in a window on your monitor
scal
ed
to the remote screen's defin
ed
size.
Video Hook Driver Technology is Us
ed
Radmin us
es
video hook kernel mode drivers under Windows NT to capture
screen chang
es
. This boosts the spe
ed
to hundr
ed
s of screen updat
es
per second.
File Transfer
Current version lets you transfer fil
es
(l
es
s than 2Gb) between
computers with Windows Explorer like interface.
Remote Shutdown
Now you don't have to
connect
in the Full Control mode.
Telnet Server
Radmin server provid
es
Telnet acc
es
s to remote computers (except on
Win9x).
Windows NT
Secu
rity Support
You can allow remote control, remote
view
, telnet and file transfer
acc
es
s to specific users or user groups from an NT domain. If a user
logg
ed
into a WinNT domain
connect
s to Radmin server, the user's
current username/password are employ
ed
by Radmin
view
er to authorize
a
connection
to the Radmin server.
Password Protection
If Windows NT
secu
rity support is switch
ed
off, acc
es
s to a remote
computer is controll
ed
by a password. Radmin us
es
a challenge-r
es
ponse
password authentication method bas
ed
on 128 bit strong encryption.
128 Bit Strong Encryption of All Data Streams.
In the version 2.2 encryption is always enabl
ed
, it caus
es
just 5%
performance loss.
IP Filter
Allows an acc
es
s to the Radmin server only from specifi
ed
IP addr
es
s
es
and subnets.
Radmin Supports High-R
es
olution Mod
es
Dis
play r
es
olutions up to 2048 X 2048 X 32 bit color are support
ed
by
Radmin.
----------------------------------------------------------------------
System requirements.
----------------------------------------------------------------------
No special requirements for hardware.
Requir
ed
software is Windows 95/ME/NT4.0/2000/XP with TCP/IP
protocol install
ed
.
NOTE: If Radmin server is start
ed
on Windows XP, the "Switch User"
feature cannot be us
ed
.
NOTE: Radmin still operat
es
succ
es
sfully when the
dis
play, mouse and
keyboard are
dis
connect
ed
from the remote computer, however some
computers do not boot succ
es
sfully without a keyboard
plugg
ed
in.
For All Operating Systems (Win9x/ME/NT/2000/XP):
The computer must have TCP/IP install
ed
, the most-us
ed
protocol for
network
ing computers.
Windows NT 4.0:
Service pack 4 or higher is requir
ed
.
----------------------------------------------------------------------
Installation.
----------------------------------------------------------------------
Two computers ne
ed
to be
connect
ed
by TPC/IP, either on a local
network
or the Internet.
Radmin must be install
ed
on each computer.
Before Installation For All Users:
Uninstall any earlier version of Radmin, before installing a newer
version.
Before Installation For All Users:
* Uninstall any earlier version of Radmin, before installing a newer
version.
For Windows 2000/XP Users:
* You ne
ed
administrator rights to install Radmin Server as a service.
For Windows NT 4.0 Users:
* You ne
ed
administrator rights to install Radmin Server as a service
and install the driver.
* Before installing Radmin's video hook driver be sure that any other
Remote Control software that us
es
video hook driver technology has
been remov
ed
. Running more than one video hook driver can lead to a
system crash while booting. Sample applications that use a video
hook driver: NetMeeting 3.0+, SMS, Timbuktu. If a problem occurs
while booting with the Radmin driver, you can pr
es
s the
'1' (number one) key repeat
ed
ly during booting and the Radmin
driver will not load.
----------------------------------------------------------------------
Limitations
----------------------------------------------------------------------
Radmin file transfer feature supports fil
es
up to 2Gb and folders
with up to 20,000 fil
es
.
Radmin may fail to operate correctly together with some applications
causing high CPU usage, also with some specific antiviral software and
firewalls. The product may be not compatible with some particular
models of hardware, such as routers.
----------------------------------------------------------------------
Radmin
Secu
rity
----------------------------------------------------------------------
A lot of attention was paid to
secu
rity issu
es
in the Radmin d
es
ign
from the outset. Here are some reasons that Radmin's operations are
completely
secu
re:
* Radmin 2.2 supports Windows NT/2000/XP user level
secu
rity. You can
allow remote control to specific users or user groups.
* If Windows NT
secu
rity support is switch
ed
off, acc
es
s to a remote
computer is r
es
trict
ed
by password. Remote Administrator us
es
a
challenge-r
es
ponse password authentication method (MD5 and Twofish
crypto algorithms are us
ed
). This method is similar to the
authentication method us
ed
in Windows NT, but us
es
more powerful
secu
rity keys.
* Radmin works in encrypt
ed
mode, where all data, including screen
imag
es
, mouse movements and keypr
es
s
es
are encrypt
ed
. 128 bit
Twofish encryption is us
ed
. Twofish crypto is
dis
tingu
ished
for its
combination of spe
ed
, flexibility and conservative d
es
ign.
* Radmin server has a logging feature. All actions are written to
the log file. Event Log support is also includ
ed
.
* Radmin server has an IP filter
tabl
e that r
es
tricts remote acc
es
s
to IP addr
es
s
es
and
network
s you specify.
* Radmin has a self t
es
ting code defence that protects the code from
being alter
ed
.
----------------------------------------------------------------------
How to contact us
----------------------------------------------------------------------
Feel free to contact us. All register
ed
users of Radmin can get full
technical support. You can also clear up any qu
es
tions about Radmin
purchasing or offer sugg
es
tions. If you have something of inter
es
t
about how you use Radmin, we'd be very happy to hear from you.
If you simply want to expr
es
s an opinion about our site, this is how
to contact us.
General - radmin@radmin.com
Purchasing qu
es
tions - sal
es
@radmin.com
Technical support - support@radmin.com
Visit our site for the lat
es
t news, versions and updat
es
www.radmin.com
You can find complete help in 'help.hlp' file
----------------------------------------------------------------------
All rights r
es
erv
ed
.
All rights r
es
erv
ed
.
Wirel
es
s sensor
network
s (WSNs) have attract
ed
a wide range of
dis
ciplin
es
where close interactions
with the physical world are
es
sential. The
dis
tribut
ed
sensing capabiliti
es
and the ease of deployment
provid
ed
by a wirel
es
s communication paradigm make WSNs an important component of our daily
liv
es
. By providing
dis
tribut
ed
, real-time information from the physical world, WSNs extend the reach
of current cyber infrastructur
es
to the physical world.
WSNs consist of tiny sensor nod
es
, which act as both data generators and
network
relays. Each
node consists of sensor(s), a microproc
es
sor, and a transceiver. Through the wide range of sensors
available for tight integration, capturing data from a physical phenomenon becom
es
standard. Through
on-board microproc
es
sors, sensor nod
es
can be programm
ed
to accomplish complex tasks rather than
transmit only what they observe. The transceiver provid
es
wirel
es
s
connect
ivity to communicate the
observ
ed
phenomena of inter
es
t. Sensor nod
es
are generally stationary and are power
ed
by limit
ed
capacity batteri
es
. Therefore, although the locations of the nod
es
do not change, the
network
topology
dynamically chang
es
due to the power management activiti
es
of the sensor nod
es
. To save energy, nod
es
aggr
es
sively switch their transceivers off and
es
sentially become
dis
connect
ed
from the
network
. In this
dynamic environment, it is a major challenge to provide
connect
ivity of the
network
while minimizing
the energy consumption. The energy-efficient operation of WSNs, however, provid
es
significantly long
lifetim
es
that surpass any system that reli
es
on batteri
es
.
In March 2002, our survey paper “Wirel
es
s sensor
network
s: A survey” appear
ed
in the Elsevier jour-
nal Computer
Network
s, with a much shorter and concise version appearing in IEEE Communications
Magazine in August 2002. Over the years, both of th
es
e papers were among the top 10 download
ed
papers from Elsevier and IEEE Communication Society (ComSoc) journals with over 8000 citations in
total.
Since then, the r
es
earch on the unique challeng
es
of WSNs has accelerat
ed
significantly. In the
last decade, promising r
es
ults have been obtain
ed
through th
es
e r
es
earch activiti
es
, which have enabl
ed
the development and manufacture of sophisticat
ed
products. This, as a r
es
ult, eventually creat
ed
a brand-
new market power
ed
by the WSN phenomenon. Throughout th
es
e years, the deployment of WSNs has
become a reality. Consequently, the r
es
earch community has gain
ed
significant experience through th
es
e
deployments. Furthermore, many r
es
earchers are currently engag
ed
in developing solutions that addr
es
s
the unique challeng
es
of the pr
es
ent WSNs and envision new WSNs such as wirel
es
s underwater and
underground sensor
network
s. We have contribut
ed
to this r
es
earch over the years through numerous
articl
es
and four additional survey/roadmap papers on wirel
es
s sensor actor
network
s, underwater
acoustic
network
s, wirel
es
s underground sensor
network
s, and wirel
es
s multim
ed
ia sensor
network
s
which were publ
ished
in different years within the last decade.
In summer 2003, we start
ed
to work on our second survey paper on WSNs to revisit the state-of-the-
art solutions since the dawn of this phenomenon. The large volume of work and the inter
es
t in both
academia and industry have motivat
ed
us to significantly enhance this survey to create this book, which
is target
ed
at teaching graduate students, stimulating them for new r
es
earch ideas, as well as providing
academic and industry prof
es
sionals with a thorough over
view
and in-depth understanding of the state-
of-the-art in wirel
es
s sensor
network
ing and how they can develop new ideas to advance this technology
as well as support emerging applications and servic
es
. The book provid
es
a comprehensive coverage of
According to Google Scholar as of October 2009.xx Preface
the pr
es
ent r
es
earch on WSNs as well as their applications and their improvements in numerous fields.
This book covers several major r
es
earch r
es
ults including the authors’ own contributions as well as all
standardization committee decisions in a coh
es
ive and unifi
ed
form. Due to the sheer amount of work
that has been publ
ished
over the last decade, obviously it is not possible to cover every single solution
and any lack thereof is unintentional.
The contents of the book mainly follow the TCP/IP stack starting from the physical layer and covering
each protocol layer in detail. Moreover, cross-layer solutions as well as servic
es
such as synchronization,
localization, and topology control are
dis
cuss
ed
in detail. Special cas
es
of WSNs are also introduc
ed
.
Functionaliti
es
and existing protocols and algorithms are cover
ed
in depth. The aim is to teach the readers
what already exists and how th
es
e
network
s can further be improv
ed
and advanc
ed
by pointing out grand
r
es
earch challeng
es
in the final chapter of the book.
Chapter 1 is a comprehensive introduction to WSNs, including sensor platforms and
network
architectur
es
. Chapter 2 summariz
es
the existing applications of WSNs ranging from military solutions
to home applications. Chapter 3 provid
es
a comprehensive coverage of the characteristics, critical d
es
ign
factors, and constraints of WSNs. Chapter 4 studi
es
the physical layer of WSNs, including physical
layer technologi
es
, wirel
es
s communication characteristics, and existing standards at the WSN physical
layer. Chapter 5 pr
es
ents various m
ed
ium acc
es
s control (MAC) protocols for WSNs, with a special
focus on the basic carrier sense multiple acc
es
s with collision avoidance (CSMA/CA) techniqu
es
us
ed
extensively at this layer, as well as
dis
tinct solutions ranging from CSMA/CA variants, time
division multiple acc
es
s (TDMA)-bas
ed
MAC, and their hybrid counterparts. Chapter 6 focus
es
on
error control techniqu
es
in WSNs as well as their impact on energy-efficient communication. Along
with Chapter 5, th
es
e two chapters provide a comprehensive evaluation of the link layer in WSNs.
Chapter 7 is d
ed
icat
ed
to routing protocols for WSNs. The extensive number of solutions at this layer
are studi
ed
in four main class
es
: data-centric, hierarchical, geographical, and quality of service (QoS)-
bas
ed
routing protocols. Chapter 8 firstly introduc
es
the challeng
es
of transport layer solutions and
then d
es
crib
es
the protocols. Chapter 9 introduc
es
the cross-layer interactions between each layer and
their impacts on communication performance. Moreover, cross-layer communication approach
es
are
explain
ed
in detail. Chapter 10
dis
cuss
es
time synchronization challeng
es
and several approach
es
that
have been d
es
ign
ed
to addr
es
s th
es
e challeng
es
. Chapter 11 pr
es
ents the challeng
es
for localization
and studi
es
them in three class
es
: ranging techniqu
es
, range-bas
ed
localization protocols, and range-
free localization protocols. Chapter 12 is organiz
ed
to capture the topology management solutions in
WSNs. More specifically, deployment, power control, activity, sch
ed
uling, and clustering solutions are
explain
ed
. Chapter 13 introduc
es
the concept of wirel
es
s sensor–actor
network
s (WSANs) and their
characteristics. In particular, the coordination issu
es
between sensors and actors as well as between
different actors are highlight
ed
along with sui
tabl
e solutions. Moreover, the communication issu
es
in
WSANs are
dis
cuss
ed
. Chapter 14 pr
es
ents wirel
es
s multim
ed
ia sensor
network
s (WMSNs) along with
their challeng
es
and various architectur
es
. In addition, the existing multim
ed
ia sensor
network
platforms
are introduc
ed
, and the protocols are d
es
crib
ed
in the various layers following the general structure
of the book. Chapter 15 is d
ed
icat
ed
to underwater wirel
es
s sensor
network
s (UWSNs) with a major
focus on the impacts of the underwater environment. The basics of underwater acoustic propagation are
studi
ed
and the corr
es
ponding solutions at each layer of the protocol stack are summariz
ed
. Chapter 16
introduc
es
wirel
es
s underground sensor
network
s (WUSNs) and various applications for th
es
e
network
s.
In particular, WUSNs in soil and WUSNs in min
es
and tunnels are d
es
crib
ed
. The channel properti
es
in both th
es
e cas
es
are studi
ed
. Furthermore, the existing challeng
es
in the communication layers are
d
es
crib
ed
. Finally, Chapter 17
dis
cuss
es
the grand challeng
es
that still exist for the proliferation of
WSNs.
It is a major task and challenge to produce a textbook. Although usually the authors carry the major
burden, there are several other key people involv
ed
in publishing the book. Our foremost thanks go
to Birgit Gruber from John Wiley & Sons who initiat
ed
the entire idea of producing this book. Tiina
Ruonamaa, Sarah Tilley, and Anna Smart at John Wiley & Sons have been incr
ed
ibly helpful, persistent,Preface xxi
and patient. Their assistance, ideas, d
ed
ication, and support for the creation of this book will always be
greatly appreciat
ed
. We also thank several individuals who indirectly or directly contribut
ed
to our book.
In particular, our sincere thanks go to Özgur B. Akan, Tommaso Melodia, Dario Pompili, Weilian Su,
Eylem Ekici, Cagri Gungor, Kaushik R. Chowdhury, Xin Dong, and Agnelo R. Silva for their help.
I (MCV) would like to specifically thank the numerous prof
es
sors who have inspir
ed
me throughout
my
ed
ucation in both Bilkent University, Ankara, Turkey and Georgia Institute of Technology, Atlanta,
GA. I would like to thank my colleagu
es
and friends at the University of Nebraska–Lincoln and
the Department of Computer Science and Engineering for the environment they creat
ed
during the
development of this book. I am
es
pecially thankful to my PhD advisor, Prof
es
sor Ian F. Akyildiz,
who introduc
ed
me to the challeng
es
of WSNs. I wholeheart
ed
ly thank him for his strong guidance,
friendship, and trust during my PhD as well as my career thereafter. I would also like to expr
es
s my
deep appreciation to my wife, Demet, for her love, exceptional support, constructive critiqu
es
, and her
sacrific
es
that made the creation of this book possible. I am thankful to my mom, Ayla, for the love,
support, and encouragement that only a mother can provide. Finally, this book is d
ed
icat
ed
to the loving
memory of my dad, Mehmet Vuran (or Hem&c
ed
il;serim as we us
ed
to call each other). He was the great
es
t
driving force for the realization of this book as well as many other accomplishments in my life.
I (IFA) would like to specifically thank my wife and children for their support throughout all th
es
e
years. Without their continuous love, understanding, and tolerance, none of th
es
e could have been
achiev
ed
. Also my past and pr
es
ent PhD students, who became part of my family over the last 25
years, d
es
erve the high
es
t and sincer
es
t thanks for being in my life and letting me enjoy the r
es
earch
to the full
es
t with them. The feeling of seeing how they develop
ed
in their careers over the years is
ind
es
cribable and one of the b
es
t satisfactions in my life. Their r
es
earch r
es
ults contribut
ed
a great deal
to the contents of this book as well.
Ian F. Akyildiz and Mehmet Can Vuran
pm ERR! code ECONNR
ES
ET
pm ERR! errno ECONNR
ES
ET
pm ERR!
network
requ
es
t to https://registry.npmjs.org/-/npm/v1/
secu
rity/audits
ail
ed
, reason...