Abstract The Ubiquitous Communications project aims at
蓝牙室内定位服务的营销指南说明书
The Marketer’s Guide to Bluetooth® LE Indoor Location ServicesCREATING AMAZING ONSITE MOBILE EXPERIENCES WITH VIRTUAL BEACONSThe Marketer’s Guide to Bluetooth® LEIndoor Location ServicesCREATING AMAZING ONSITE MOBILE EXPERIENCES WITH VIRTUAL BEACONSLocation-based mobile marketing is a boon to every marketer tasked with delivering the right message to the right person at the right time. After all, there’s no better time to reach prospective customers than when they are nearby. And there’s no better way to provide personalized, targeted information than by combining what you already know about them with their current location inside your establishment.Most people are aware of the Global Positioning System (GPS), which is the defacto standard for location-based interaction when outdoors. It uses geofencing technology to trigger activities, such as push notifications, when a mobile device enters or leaves a virtual geographic boundary. However, GPS does not work when it comes to indoor location services. That is why a new technology, Bluetooth® Low Energy (BLE), has emerged to identify and engage with mobile employees, customers, and guests inside hotels, stores, convention centers, hospitals, and other establishments.If you’re reading this guide, chances are you’ve heard about Bluetooth® LE. Perhaps you’ve experimented with battery-powered BLE beacons, but struggled with the complexity of creating a complete solution from the disparate parts of different vendors. Maybe you ran a successful pilot, but when it came time to scale, your IT department said it would be too complicated and costly to manage.If so, you’re not alone. While indoor location using Bluetooth® LE has been around since Apple’s introduction of the iBeacon protocol in 2013, challenges with scalability, interoperability, and manageability have hampered large-scale adoption of this technology to date. Fortunately, this is all changing.New advancements in the wireless infrastructure, such as virtual beacons enabled by machine learning, have made Bluetooth®LE easy to deploy and operate at scale. In addition, the convergence of Wi-Fi and BLE has removed the need for an overlay network, making it more cost effective than ever to roll out indoor location services.We are in a new era of enterprise-grade, personalized, indoor-location services using BLE. Are you ready to take advantage of it? This paper will show you how.What you’ll learn:• Bluetooth® LE basics and common beaconing standards• T op use cases for BLE (e.g. analytics, wayfinding, proximity messaging and more)• Overcoming BLE deployment and management challenges• The Mist solution for BLE engagement• Getting startedTHE ABCS OF BLUETOOTH® LEBluetooth® is the ubiquitous communications technology we all use to connect our wireless headsets, keyboards, and hands-free systems to our smart phones and computers. Operating in the 2.4GHz band (the same as Wi-Fi), Bluetooth was designed for continuous streaming of voice and data over short distances, and comes standard in all modern mobile devices.Bluetooth® Low Energy (BLE) is a subset of the Bluetooth protocol introduced in 2011. Unlike classic Bluetooth’s continuous streaming, BLE was designed for transmitting short bursts of data. Because it stays in sleep mode until a connection is initiated, BLE consumes far less energy thanclassic Bluetooth. This energy efficiency is driving a new class of wireless devices and applications, from smart home sensors and wearables like Fitbits, to indoor-location beacons and proximity marketing.Beacons are devices that use Bluetooth ® LE to transmit short packetsthat are used for providing location-based information, such as proximitynotifications, location, and nearby items of interest. They can be usedfor anything from analyzing customer traffic patterns to providing turn-by-turn directions and delivering offers or other contextual informationbased on physical location. You can even turn your mobile phone into aBLE beacon for use cases such as letting the server in a restaurant knowyou would like another drink. There are two main protocols used for Bluetooth ® LE beaconing: iBeacon, introduced by Apple in 2013, and Eddystone, Google’s cross platform beaconing protocol that was launched in 2015. Both protocols work in a similar fashion by broadcasting a unique identifier that is picked up by a compatible app or operating system on the phone or other mobile devices, to determine its relative position at your location. (A third protocol, Altbeacon, was announced in July 2014 as an open source beacon protocol. It overcomes vendor tie-in, but lacks the widespread adoption of iBeacon and Eddystone.)It is worth pointing out that Bluetooth ® LE beacons are an opt-in solution. Mobile consumers grant permission to use their location information in exchange for content or services they consider valuable. Mobile devices must have Bluetooth ® and location services on, and either a mobile app configured for BLE, or Google Chrome installed (if you’re beacon is configured with Eddystone-URL). BLUETOOTH ®LE BEACON USE CASES ARE LIMITED ONLY BY YOUR IMAGINATION The more you integrate a mobile user’ location data with everything else you know about the user, the more personalized, valuable, and amazing the experience. With Bluetooth ® LE (BLE) now standard in all modern mobile devices (and expected to be in 90% of all devices by 2018), and more people enabling Bluetooth (required to pick up beacon signals) to communicate with their wireless peripherals, BLE beaconing is quickly moving from a nice-to-have to a must-have marketing technology in 2017.-- Boston Retail Partners surveyCompanies of all sizes are using BLE technology to gain tremendous insight into employee, customer, and guest behavior, and to offer helpful, convenient, and incredibly personalized new services. Here are just some of the use cases that are enabled with BLE indoor location services:Analytics – Gather zone-based user analytics, such as the average number of people in your establishment, the number of passersby, or the length of time each person spends at a particular display, area or department. Look at traffic patterns by time of day, day of week, or by season. Integrate with other data such as weather feeds and customer relationship management (CRM) to gain even greater insights.Wayfinding (Indoor Navigation) – A GPS-like navigation experience for indoor environments. Wayfinding typically offers turn-by-turn directions and a map showing the user moving toward his or her destination. Ideal for airports, hotels, casinos, tradeshows, events, malls, or any other large venue.Mobile DeviceBLE Tag Access PointPush Promotions – Consumers receive personalized notifications or offerson their smartphone, based on their proximity to a specific object—a storein a mall, or an aisle, product or brand once inside. Integrate with othercustomer data to deliver ever more personalized and relevant messages:Direct customers to a product they recently researched online, or promotea concert at a baseball game to a fan that follows the band.Proximity Messaging – Not all messages need be promotional. Providinghelpful information or additional content helps increase brand loyalty.Greet customers by name as they walk through the door. Provide specialoffers to premium guests. Offer customized information to museumpatrons or trade show guests as they approach a specific display or booth.Notify shoppers when their in-store purchases are ready for pickup.Personalized Experiences – Beacons coupled with other technology,such as RFID tags and digital signage, take personalization from theuser’s phone to the surrounding physical environment. Customers canbe greeted by name when they reach a specific display. Screens coulddisplay specific products of interest based on past purchases or even bythe products currently in their shopping carts. Even prices on digital tagscould change based on that customer’s loyalty points or stored coupons.Hyperlocal Check-in – Unlike Facebook or Foursquare, highly targeted check-ins enable consumers to tell you exactly where they are in your facility. This feature could be used in conjunction with specific location-based promotions or reward-based games, like a scavenger hunt.Employee Assistance – Find the closest sales associate for product inquiries or rapid checkout. Or enable your customers to direct an employee straight to them with the tap of a finger.Retargeting Ads – T argeting people who visit your website with ads on Facebook, Twitter and other sites that use retargeting is a powerfully cost-effective way to reserve your ad spend on people who have already indicated an interest in your business. Now imagine being able to do the same for people who walk into your store or other physical place of business.Virtual Concierges – Guests in a restaurant, mall, fitness club or other establishment can use their phones to order food and other services, which can be delivered right to their exact location.Asset Tracking – Is another popular use case for Bluetooth® LE beacons. Instead of broadcasting its ID to mobile devices, the beacon “listens” for the unique IDs of BLE tags attached to objects. Because these tags can be equipped with sensors—for things such as light, sound, movement and temperature—the applications are many, from tracking of wheelchairs and infusion pumps in a hospital, to monitoring the movement, speed and vibration of an airport baggage conveyor.Creative marketers in every industry are already dreaming up ways to leverage asset tracking to generate more revenue streams and increase productivity.BLE Engagement WayfindingProximity Messaging Real-time Location AnalyticsTRADITIONAL BLUETOOTH® LE DEPLOYMENT AND MANAGEMENT CHALLENGESWhile the use cases for Bluetooth® LE are compelling, historically it has been a challenge to deploy and operate large BLE networks in a cost-effective way. That is because the beaconing technology to date has required battery powered devices (i.e. transmitters), which create the following challenges:•Comprehensive site surveys are required to arrange and calibrate beacons for optimum performance and accuracy in a given environment.Want to move or add more beacons? Another site survey and recalibration is required. Because RF signals can be impacted by physical changes in the environment—such as new product displays, moved furniture, or even large influxes of people—the system will be plagued by poor performance until the beacons can be recalibrated. What retail store or event venue doesn’t change on a regular basis? Who has an IT staff capable of dealing with dynamic daily changes, like large groups of people, on demand?•High deployment costs. Many of the use cases above require alocation system with granular micro-location to deliver one to threemeter accuracy. This would requires thousands of beacons in a singlelocation, which creates substantial cost barriers.•Battery maintenance is problematic- While battery life has improved, alarge enterprise may deploy tens of thousands of beacons, distributedacross the globe. Locating and replacing dead batteries can be aweekly occurrence. The more you beacon to get accurate and timelylocation information, the faster you’ll be replacing batteries.I’m a battery-powered Beacon •Lack of enterprise-grade management means costly truck rollsand time-consuming manual processes. Physical beacons lack IPaddresses. As such, they can’t be identified by the network and bemanaged remotely by IT.•Aesthetics. Battery powered beacons are glued to the wall, often 25 feet apart. This can adversely impact the appearance of a location, which is often a nonstarter in hotels, museums, and other locations where aesthetics is important.•Risk of theft. Battery powered beacons can be stolen or knocked off the wall, creating additional management headaches.All told, a large enterprise can expect to pay approximately $300 per beacon in maintenance costs. Even if your use cases warranted the high cost, there is still the issue of inconsistent user experiences to consider. Differences in mobile device types (chipsets, OS, antenna, etc.), and dynamic changes to the RF environment—like that large influx of people-- can dramatically affect accuracy and user experience. Manual site surveys and RF calibrations simply cannot keep up.MIST VIRTUALIZES INDOOR LOCATIONFor indoor location services to truly take off, companies require BLE deployments that integrate with their existing networks, scale to handle millions of mobile devices, and automatically recalibrate for different device types and dynamic changes to the environment in real time.Fortunately, new solutions like the Mist Learning WLAN integrate BLE with Wi-Fi in a single A.I.-driven platform that is operated via the cloud.Unlike other WLANs that just integrate a single BLE beacon in anAccess Point and/or make it possible to monitor battery beacons viaa centralized management tool, Mist completely virtualizes the indoorlocation experience for maximum scale, performance, ease of use,and cost effectiveness. Here are the unique components of the Mistsolution:Access Points with directional BLE antenna array. The first step in a Bluetooth ® LE location service is to blanket the room with BLE signals. Rather than use physical beacons, Mist achieves this with a patented 16 element directional antenna array in Mist Access Points, which sends unique RF energy in multiple different directions. With BLE signals emanating from the AP, Mist eliminates the need for battery powered BLE beacons and lets mobile devices interact with an entire room instead of a single transmitter.Machine learning in the cloud. An iPhone 6s operate s very differentlythan an iPhone 5s or Samsung Galaxy on a wireless network. But knowingthat doesn’t make it any easier to recalibrate for every situation. T oaddress this, the Mist platform uses artificial intelligence to account fordifferences in devices, as well as constant changes to the RF environment—such as moving a chair, or adding a partition. It continuously takeslocation estimates from every-day use, examines them, detects the RFcharacteristics based on the actual input, and adapts the location formulato maximize accuracy.Machine learning operates across different end user device types,constructing specifically tailored path loss formulas. This is naturallynecessary as different devices have different RF characteristics. Bycontinuously and automatically adapting to different devices and changingRF environments, new Mist WLAN systems obviate the need for manualcalibration in BLE environments.Virtual Beacons. As mentioned above, Mist eliminates the need forbattery powered beacons by moving the Bluetooth ® LE beaconingfunctionality into the AP and using machine learning in the cloud. T oenable location-specific messages, Mist patented a new concept knownas virtual beacons. Virtual beacons use geofencing technology to allowspecific messages to be displayed anywhere on a floor plan (like GPS usesoutdoors). The message, range and location is completely configurableusing software – i.e. the Mist UI or APIs. With Mist, an unlimited numberof virtual beacons can be deployed in any physical environment, providingunsurpassed scalability and ease of use.The above technologies enable Mist to deliver 1-3m location accuracy with sub-second latency, making it ideal for all the use cases mentioned above. By integrating this functionality into an enterprise-grade WLAN platform, you save time and money on deployment and operations while ensuring maximum scalability and reliability.Machine Learning in the Cloud Patented Virtual BeaconsHOW TO START YOUR OWN INDOOR LOCATION JOURNEYNow that you understand the basics of Bluetooth ® LE and how to deploy a scalable solution, here is what you need to get started with indoor location services:A Bluetooth ® LE-enabled mobile appA mobile app with a compelling user experience is essential for a successful proof of concept. Y ou can start with a simple navigation or wayfinding app, or any number of readily available third-party apps designed specifically for your industry. If you have your own branded app, your beacon platform provider can supply your developers with the software developerkit (SDK) they’ll need to BLE-enable your app. You can also find expertBLE app development partners to help you customize your app or build one from the ground up.Indoor MapA digital map of your facility or campus is required for navigation andproximity marketing. Your POC use case will help you determine howextensive your initial indoor map needs to be. But you should alsoconsider what will be required and who will maintain your maps longterm. Indoor mapping and navigation vendors catering to a variety ofindustries can be found in the Mist BLE Alliance.Bluetooth ® LE beacon infrastructure and analyticsBeacons and accompanying software services are required for blue dotlocation and analytics. A few battery beacons are all you need to testpilot your application. However, we recommend you engage early withyour IT department, and an enterprise-grade BLE/Wi-Fi provider toensure your solution can scale.Management platformMost battery beacons are managed with a mobile app. When moving from POC to full-scale deployment, you may want to consider an enterprise-grade management system with machine learning and virtual beacon capabilities to avoid expensive overlay network management and unsatisfactory user experiences.YOUR CEO WILL THANK YOUThe wireless world is at a tipping point where every smartphone, tablet and laptop has BLE, making these devices ready for new indoor location-based services.Thanks to new modern wireless platforms with enterprise-grade BLE access points, machine learning in the cloud, and virtual beacon technology, the infrastructure is now ready to support the demand.The use cases for BLE are endless. Are you ready to take advantage of the enormous opportunity? Mist can help you with all the elements needed to deliver a great BLE user experience. Email *************and we will get you started.Mist Case Study。
Future internet The Internet of Things
Future Internet: The Internet of ThingsLu Tan Computer Science and Technology DepartmentEast China Normal UniversityShanghai, ChinaEmail: jackytan217@ Abstract. Nowadays, the main communication form on theInternet is human-human. But it is foreseeable that in a nearsoon that any object will have a unique way of identificationand can be addressed so that every object can be connected.The Internet will become to the Internet of Things. Thecommunicate forms will expand from human-human tohuman-human, human-thing and thing-thing (also calledM2M).This will bring a new ubiquitous computing andcommunication era and change people's life extremely. RadioFrequency Identification techniques (RFID) and relatedidentification technologies will be the cornerstones of theupcoming Internet of Things (IOT).This paper aims to show askeleton of the Internet of Things and we try to address someessential issues of the Internet of Things like its architectureand the interoperability, etc. At the beginning we describe anoverview of the Internet of Things. Then we give ourarchitecture design proposal of the Internet of Things and thenwe design a specific the Internet of Things application modelwhich can apply to automatic facilities management in thesmart campus. At last, we discuss some open questions aboutthe Internet of Things.Keywords-Internet 0/ Things; M2M; RFID; ubiqutiouscomputing; smart campus; automatic/acilities management. I. INTRODUCTIONTo date, the vast majority of Internet connectionsworldwide are devices used directly by humans, such ascomputers and mobile handsets. The main communicationform is human-human. In a not distant future, every objectcan be connected. Things can exchange information bythemselves and the number of "things" connected to theinternet will be much larger than the number of "people" andhumans may become the minority of generators andreceivers of traffic [I). We mix the physical world andinformation world together. The future is not going to bepeople talking to people; it's not going to be peopleaccessing information. It's going to be about using machinesto talk to other machines on behalf of people. We areentering a new era of ubiquity, we are entering the Internet ofThings era in which new forms of communication betweenhuman and things, and between things themselves will berealized. A new dimension has been added to the world ofinformation and communication technologies: from anytime,any place connectivity for anyone, we will have connectivityfor anything [2]. Fig.l shows this new dimension. Neng WangComputer Science and Technology Department East China Normal University Shanghai, China Email: nwang@• O n the roo v e • O utdoo r s a i n door s • Nghl • O n t he roo v e 'Dayt i me • O utdoo r s • I n do o r s f r om the PC) • AI the PC Figure 1. A new dimensionThere is no standard identification of "Internet of Things". Considering the functionality and identity as central it is reasonable to define the loT as "Things have identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environment, and user contexts". A different definition that puts the focus on the seamless integration could be formulated as "Interconnected objects having an active role in what might be called Future Internet" [3). A. Main Technologiesfor the Internet of Things The Internet of Things is a technological revolution that represents the future of computing and communications, and its development needs the support from some innovational technologies. Radio frequency identification (RFID) is seen as one of the pivotal enablers of the Internet of Things. Objects should be indentified so that they could be connected. RFID, which use radio waves to identifY items, can provide this function [4]. Sometimes RFID has been labeled as a replacement of bar code, but RFIO system can do much more than that. In addition to identifY items it also can track items in real-time to get important information about their location and status. RFID has already had some valuable applications in retail,health-care, facilities management [5], etc. A mature RFIDtechnology provides a strong support for the Internet of Things.One of the biggest breakthroughs of the Internet of Things is making the physical world and information world together. Sensors play a very important role to bridge the gap between the physical world and information world. Sensors collect data from their environment, generating information raising awareness about context. So the change � of t �eir environment can be monitored and the correspondIng thIngs can make some responses if needed [6].Nanotechnology and miniaturization can make embedded intelligence in things themselves which called smart dev .i �es. They can process information, self-configure, make . deCls �on independently, just until then there will be a real thIng-thIng communication.B. Trends From a long perspective, the development trend of the Internet of Things includes three steps: embedded intelligence, connectivity, interaction.Firstly, we have embedded intelligences which can do actions automatically. There already have been many applications, for example: the RFID tag embedded in food can record the information about the food and we can get the information by using a RFID reader; the washing machine controller can make washing machine complete its work automatically; engine controllers and antilock b �ake controllers for automobiles; inertial guidance system, flIght control hardware/software and other integrated systems in aircraft and missiles; artificial arms with semi-functional hands, etc[7]. Though all of those devices are intelligent, we can see that they only work alone and locally, there's nothing to do with "network".So the next step is making every smart device can be connected. From the smart connected devices viewpoint, smart devices are not smart because they are just endowed with agent capabilities and all the actions are pre-designed by human, they are smart because they are connected. Things can be connected wired or wirelessly. In the Internet of Things wireless connection will to be the main way. Base on the existed infrastructure, there are many ways to connect a thing: RFID, ZigBee, WPAN, WSN, DSL, UMTS, GPRS, WiFi, WiMax, LAN, WAN, 3G, etc. Connect smart things makes interaction possible.Even though we can connect anything does not mean things can communicate by themselves. So new smart things should be created which can process information, selfconfigure, self-maintain, self-repair, make independent decision, eventually even play an active role in their own disposal. Things can interact, they exchange information by themselves. So the form of communication will change from human-human to human-thing to thing-thing. As the Internet of Things is application driven, new business applications should be created which can improve the innovation and development of the Internet of Things [8].Fig.2 shows a rough development trend of the Internet of Things [9]. TecIvloiogy Reach TECHNOLOGY ROADMAP THE INTERNET O F THINGS Miniilturiz::rti o o, power. effie ent electronics: ar.d Soti'.�71rA a!JAA l i; ::In!1 advar.:ed sensor fu s o n av a i 'a bIB speClrum r.eoper,tio, and t.,pr�"nC8: Abii� ro manitor and control ds�nl obI<ds .Ab�jlyof P hys ic a l-Wor l d inDoors to recerJe Webgeoloc3tioosi�nals L"",lillY �eupk 'lid Cost reduct olllcLldinaa Ubiquitous Positionin g to diffusion nto 200 Wi1ve of applicatil)'rS Surveilance, security, h l!"l!lK:;m!.II;Ul s l lI l�, 1oocJ,,1.'y, """m enl Ocrn3l"<l'orcxpc<li:ed t.Qistics V8rtica ..:\4ark91 Applicafions RFIDIag.,or IJCiilatingrouting, invcnl OfYing , and loss p'evenloo SJpply.Choin Hdpcrs21100 2010 Figure 2. Trend of the Internet of Things II. ARCHITECTURE 2020 TilJlH Current Internet has a five-layered architecture, running with TCP/IP protocols, which has worked well for a long time. However, in the Internet of Things billions of objects are connected which will create much larger traffic and need much more data storages. In addition to these, there still have some other challenges like security, governance, etc. But today's Internet was designed in the 1970s for purposes that bear little resemblance to today's usage scenarios and related traffic patterns. Mismatches between original design and current utilization are now beginning to hamper the Internet's potential. In the BLED Declaration [10] and other supporting statements, they all point out this point. So it is reasonable and essential to design a new architecture for the Internet of Things. . Redesign a new architecture is a very complex proJect, which needs consider many factors like reliability, scalability, modularity, interoperability, interface, QoS, etc. About the architecture design of the Internet of Things, service-oriented architecture (SOA), exploiting integration with Internet and interfacing with wide ranging edge technologies and associated networks is a key objective. For this objective, we should consider embracing a fully inclusive range of "edge" technologies, including RFIO for interfacing with the physical world; exploiting evolving object-connected data capture technologies and networking capabilities-sensory, location local communication and security; integration with the evo l ving Internet and some other technique issues. In addition to these, we should also view the needs for governance, QoS, security, privacy and other socioeconomic issues. Anthony Furness gives us a proposal about the .Internet of Things' architecture [11]. Fig.3, FigA are from thIS proposaland they show us the Internet of Things with different level of edge technologies.Pass i ve RFID datacarr i ers and UIDPhysicalin t erface zone I nterroga t or IGatewaydevice I nterroga t or IGatewaydevice A pp li cation commandsand r es pon s es Wider area communicationsand NetworksFigure 3. Internet of Things-at its most basic leveldata Sensory dataPhysicalinterface zoneFurther l aye r s of Data Capture TechnologyIHost Gate wayInformation Wide r area dev i ce communicationsand Networks Figure 4. Internet of Things-including RFID and other edgetechnologiesThen he gives the architecture of the Internet of Things he has designed. Fig.5Networksupported servicesEdge ·techno l ogy data capture and NetworksF i xed and mobile commun i c a t i on protocols Applications layer Middleware Access Gateway layerFigure 5. Architecture of the Internet of ThingsThis is a good proposal which has given us a rough solution of the Internet of Things' architecture. But there still are some further important issues we should think about carefully. The first is if every object is connected and things can exchange information by themselves, then the traffic and storages in the network will increase very rapidly with an exponential way. Does today's Internet really can bear this? Do we need a new backbone? Connecting every object andmake them can communicate independently is a very attractive vision, and yes we can imagine many cases in future that a thing needs to "talk" to another thing, but is it real necessary that an object "talks" to all the other objects? Why a toothbrush needs to "talk" to a fridge? In fact, the main connections of an object are with those objects which are in the same the Internet of Things application system as it. And it is could be seen that the Internet of Things is made up of many the Internet of Things application systems. From this point of view, we can have a new seeing of the Internet of Things. Fi .6 shows us this new view oint. Figure 6. Internet of ThingsThe Backbone Network may be today's Internet, may be not or may be its expansion.Now the Internet of Things' application situation is there already have been many applications like EPC Global, sma;t hospital and so on which seem work well. But the problem IS these application systems work alone, a�d even thou�h I mentioned before that today an object maInly commUnIcate with another object who is in the same application system, but there's no doubt that the technical future is connecting every application system and with the gro.wth of the I�te';1et of Things the communication between dIfferent apphcatlO� systems will become more and more frequently for theIr collaboration. But as the lack of global standards, they may have used different standards and technologies, so the interoperability is a problem. Only if we can solve the interoperability problem we can have a re�1 the Intern.et of Things. The authors come up with a solutIon that addIng a Coordination Layer into the Internet of Things' architecture design. The coordination layer responses to process the structure of packages from different application systems and reassemble them to an unified structure which can be identified and processed by every application system. Of course if the standards of the Internet of Things are completed then the systems which based on the standa!ds will have no problem in interoperability, this problem eXIsts between the existed application systems and the new deployed systems, and between the existed ap�lication systems themselves. Based on all above, we . gIve .our architecture design proposal of the Internet of ThIngs.Flg.7 shows our design.Application LayerMiddleware LayerCoordination LayerBackbone Network LayerExisted aloneAccess LayerApplicationSystemEdge TechnologyLayerFigure 7. The Internet of Things' ArchitectureIII. A THE INTERNET OF THINGS APPLICATION INCOLLEGEThe Internet of Things is not a theory, it's an application technology which our life can benefit fro�. I� fact, in a I�ngterm the value of the internet of things eXIsts In some speCIfic application. Specific application solutions will be one of themost important engines of the innovation and development of the Internet of Things. it's application driven. Currently, there already have some successful appli�ations in different fields like retail, food, logistics, transportatIOn, etc.So far we have mentioned so many stuffs about the Internet of Th i ngs, but what a real the Inte�et of Thin?s �pplication system like? Here the authors desIgn an apphcatIo� modelfor the college campus facilities management USIng the Internet of Things technology and take it as an example toshow what a real the Internet of Things like and how it can benefit our life.In the college campus, there are many buildings, e.g. teaching buildings, office buildings, library; dinnin� h�lIs, etc. Almost every building has its own heatIng, ventIlatIng, air condition systems (HV A C) and elevator system, those devices should be managed and maintained but it's not easy to make this job well done. Now we can use the Inte';1et �f Things technology in campus facilities manage�ent. Flg.S �s the architecture of this pilot project we have desIgned for thiS kind of facilities management.InformationWorldSolid lines --Data FlowDashed lines --Control FlowBuilding Facilities Control SystemCommunication ManagerWi-FiCommunication ManagerFigure 8. Architecture for Facilities Management We deploy enough number of RFID tags in the building which can monitor the HVAC and elevators' behavior, collect information, sense the change of their environment。
the internet of things
自1997年起,国际电联发起了名为“对网络的挑战”互联网系列报告,本次报告《国际电信联盟ITU互联网报告2005:物联网》是该系列之七。
本报告由国际电联的战略和政策团队所写,报告所关注的是下一步通信中的新技术,如无限射频识别(RFID)和互连的网络设备的智能计算。
从轮胎到牙刷,各类物体在不久的将来会实现相互通信,这预示着一个新时代的黎明,也许就是今天的互联网让位于明天的互联网该报告共六章,具体内容如下:第一章,介绍物联网及其关键技术,如无处不在的网络,下一代网络,无处不在的计算。
第二章,应用技术,研究了将驱动物联网未来的技术,包括无线互联网,射频识别(RFID),传感器技术,智能物体,纳米技术和小型化;第三章,塑造市场,探讨了这些市场的技术潜力,以及抑制市场增长的因素,着眼于说明在特定的行业中物联网将改变传统的商业模式;第四章,新挑战,思索着障碍走向标准化和事物互联网的更广泛影响的社会,例如增加对隐私权的关注;第五章,世界发展中的机遇,提出了这些技术可能给发展中国家带来的好处,本身也成为导致用户和市场的驱动因素;第六章,用大框图将所有因素联系在一起,并得出未来10年我们的生活方式将发生怎样的改变。
About the Report (1)1 What is the Internet of Things? (2)2 Technologies for the Internet of Things (3)3 Market Opportunities (6)4 Challenges and Concerns (8)5 Implications for the Developing World (10)6 2020: A Day in the Life (12)7 A New Ecosystem (13)Table of Contents (16)About the Report“The Internet of Things” is the seventh in the series of ITU Internet Reports originally launched in 1997 under the title “Challenges to the Network”. This edition has been specially prepared for the second phase of the World Summit on the Information Society (WSIS), to be held in Tunis, 16-18 November 2005.Written by a team of analysts from the Strategy and Policy Unit (SPU) of ITU, the report takes a look at the next step in “always on” communications, in which new technologies like radio-frequency identification (RFID) and smart computing promise a world of networked and interconnected devices. Everything from tyres to toothbrushes might soon be in communications range, heralding the dawn of a new era; one in which today’s Internet (of data and people) gives way to tomorrow’s Internet of Things.The report consists of six chapters as follows:Chapter one,Introducing the Internet of Things, explores the key technical visions underlying the Internet of Things, such as ubiquitous networks, next-generation networks and ubiquitous computing;Chapter two, Enabling Technologies, examines the technologies that will drive the future Internet of Things, including radio-frequency identification (RFID), sensor technologies, smartthings, nanotechnology and miniaturization;Chapter three, Shaping the Market, explores the market potential of these technologies, as well as factors inhibiting market growth. It looks at new business models in selected industries to illustrate how the Internet of Things is changing the way firms do business;Chapter four, Emerging Challenges, contemplates the hurdles towards standardization and the wider implications of the Internet of Things for society, such as growing concerns over privacy;Chapter five, Opportunities for the Developing World, sets out some of the benefits these technologies offer to developing countries that may themselves become lead users and drivers of the market;Chapter six, The Big Picture, draws these threads together and concludes on how our lifestyles may be transformed over the next decade. The Statistical annex presents the latest data and charts for more than 200 economies worldwide in their use of ICTs.This Executive Summary, published separately, provides a synopsis of the full report, which is available for purchase (at the catalogue price of CHF 100) on the ITU website at www.itu.int/publications under General Secretariat.1 What is the Internet of Things?Over a decade ago, the late Mark Weiser developed a seminal vision of future technological ubiquity one in which the increasing “availability of processing power would be accompani ed by its decreasing visibilityWe are standing on the brink of a new ubiquitous computing and communication era, one that will radically transform our corporate, community, and personal spheres. Over a decade ago, the late Mark Weiser developed a seminal vision of future technological ubiquity – one in which the increasing “availability” of processing power would be accompanied by its decreasing “visibility”. As he observed, “the most profound technologies are those that disappear…they weave themselves in to the fabric of everyday life until they are indistinguishable from it”. Early forms of ubiquitous information and communication networks are evident in the widespread use of mobile phones: the number of mobile phones worldwide surpassed 2 billion in mid-2005. These little gadgets have become an integral and intimate part of everyday life for many millions of people, even more so than the internet.Today, developments are rapidly under way to take this phenomenon an important step further, by embedding short-range mobile transceivers into a wide array of additional gadgets and everyday items, enabling new forms of communication between people and things, and between things themselves. A new dimension has been added to the world of information and communication technologies (ICTs): from anytime, any place connectivity for anyone, we willnow have connectivity for anything (Figure 1).Connections will multiply andcreate an entirely new dynamic networkof networks – an Internet of Things. TheInternet of Things is neither sciencefiction nor industry hype, but is basedon solid technological advances andvisions of network ubiquity that arezealously being realized.2 Technologies for the Internet of ThingsThe Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to nanotechnology.First, in order to connecteveryday objects and devices tolarge databases and networks – andindeed to the network of networks(the internet) – a simple,unobtrusive and cost-effectivesystem of item identification iscrucial. Only then can data aboutthings be collected and processed.Radio-frequency identification(RFID) offers this functionality.Second, data collection will benefitfrom the ability to detect changes inthe physical status of things, using sensor technologies. Embedded intelligence in the things themselves can further enhance the power of the network by devolving information processing capabilities to the edges of the network. Finally, advances in miniaturization and nanotechnology mean that smaller and smaller things will have the ability to interact and connect (Figure 2). A combination of all of these developments will create an Internet of Things that connects the world’s objects in both a sensory and an intelligent manner.Indeed, with the benefit of integrated information processing, industrial products and everyday objects will take on smart characteristics and capabilities. They may also take on electronic identities that can be queried remotely, or be equipped with sensors for detecting physical changes around them. Eventually, even particles as small as dust might be tagged andnetworked. Such developments will turn the merely static objects of today into newly dynamic things, embedding intelligence in our environment, and stimulating the creation of innovative products and entirely new services.RFID technology, which uses radio waves to identify items, is seen as one of the pivotal enablers of the Internet of Things. Although it has sometimes been labelled as the next-generation of bar codes, RFID systems offer much more in that they can track items in real-time to yield important information about their location and status. Early applications of RFID include automatic highway toll collection, supply-chain management (for large retailers), pharmaceuticals (for the prevention of counterfeiting) and e-health (for patient monitoring). More recent applications range from sports and leisure (ski passes) to personal security (tagging children at schools). RFID tags are even being implanted under human skin for medical purposes, but also for VIP access to bars like the Baja Beach Club in Barcelona. E-government applications such as RFID in drivers’ licences, passports or cash are under consideration. RFID readers are now being embedded in mobile phones. Nokia, for instance, released its RFID-enabled phones for businesses with workforces in the field in mid-2004 and plans to launch consumer handsets by 2006.The Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to nanotechnology.In addition to RFID, the ability todetect changes in the physical status ofthings is also essential for recordingchanges in the environment. In this regard,sensors play a pivotal role in bridging thegap between the physical and virtualworlds, and enabling things to respond tochanges in their physical environment.Sensors collect data from theirenvironment, generating information andraising awareness about context. Forexample, sensors in an electronic jacketcan collect information about changes in external temperature and the parameters of the jacket can be adjusted accordingly.Embedded intelligence in things themselves will further enhance the power of the network.Embedded intelligence in things themselves will distribute processing power to the edges of the network, offering greater possibilities for data processing and increasing the resilience of the network.This will also empower things and devices at the edges of the network to take independent decisions. “Smart things” are difficult to define, but imply a certain processing power and reaction to external stimuli. Advances in smart homes, smart vehicles and personal robotics are some of the leading areas. Research on wearable computing (including wearable mobilityvehicles) is swiftly progressing. Scientists are using their imagination to develop new devices and appliances, such as intelligent ovens that can be controlled through phones or the internet, online refrigerators and networked blinds (Figure 3).The Internet of Things will draw on the functionality offered by all of these technologies to realize the vision of a fully interactive and responsive network environment.3 Market OpportunitiesThe technologies of the Internet of Things offer immense potential to consumers, manufacturers and firms. However, for these ground-breaking innovations to grow from idea to specific product or application for the mass market, a difficult process of commercialization is required, involving a wide array of players including standard development organizations, national research centres, service providers, network operators, and lead users (Figure 4).From their original inception and throughout the R&D phase, new ideas and technologies must find champions to take them to the production phase. The time to market, too, requires key “lead users” that can push the innovation forward. To date, the technologies driving the Internet of Things are notable for the strong involvement of the private sector, e.g. through industry fora and consortia. Yet public sector involvement is growing, through national strategies for technical development (e.g. nanotechnology) and in sector-specific investments in healthcare, defence or education.RFID is the most mature of the enabling technologies with established standardization protocols and commercial applications reaching the wider market. The global market for RFIDproducts and services is growing fast, with sizeable revenues of between USD 1.5-1.8 billion by 2004. However, this is dwarfed by the total revenues expected over the medium- to long-term, with the spread of smart cards and RFID in all kinds of consumer products, including mobile phones.Changing business strategies is the name of the game…Wireless sensor networks are widely used in industries such as automotive, homeland security, medical, aerospace, home automation, remote monitoring, structural and environmental monitoring. Estimates of their market potential vary (partly due to different definitions), but analysts forecast that as their unit price falls, the number of units deployed will grow significantly. Meanwhile, robotics is expanding into new markets. At present, the market share of industrial robotics is larger than that of personal and service robotics, but this is set to change, as the personal robotics segment is expected to lead future market growth.Changing business strategies is the name of the game, in particular in the retail, automotive and telecommunication industries. Firms are embracing the underlying technologies of the Internet of Things to optimize their internal processes, expand their traditional markets and diversify into new businesses.4 Challenges and ConcernsBuilding on the potential benefits offered by the Internet of Things poses a number of challenges, not only due to the nature of the enabling technologies but also to the sheer scale of their deployment. Technological standardization in most areas is still in its infancy, or remains fragmented. Not surprisingly, managing and fostering rapid innovation is a challenge for governments and industry alike. Standardization is essential for the mass deployment and diffusion of any technology. Nearly all commercially successful technologies have undergone some pro cess of standardization to achieve mass market penetration. Today’s internet and mobile phones would not have thrived without standards such as TCP/IP and IMT-2000.Successful standardization in RFID was initially achieved through the Auto-ID Center and now by EPC Global. However, efforts are under way in different forums (ETSI, ISO, etc...) and there have been calls for the increased involvement of ITU in the harmonization of RFID protocols. Wireless sensor networks have received a boost through the work of the ZigBee Alliance, among others. By contrast, standards in nanotechnology and robotics are far more fragmented, with a lack of common definitions and a wide variety of regulating bodies.One of the most important challenges in convincing users to adopt emerging technologies is the protection of data and privacy. Concerns over privacy and data protection are widespread, particularly as sensors and smart tags can track users’ movements, habits and ongoing preferences. When everyday items come equipped with some or all of the five senses (such as sight and smell) combined with computing and communication capabilities, concepts of data request and data consent risk becoming outdated. Invisible and constant data exchange between things and people, and between things and other things, will occur unknown to the owners and originators of such data. The sheer scale and capacity of the new technologies will magnify this problem. Who will ultimately control the data collected by all the eyes and ears embedded in the environment surrounding us?Public concerns and active campaigns by consumers have already hampered commercial trials of RFID by two well-known retailers. To promote a more widespread adoption of the technologies underlying the Internet of Things, principles of informed consent, data confidentiality and security must be safeguarded. Moreover, protecting privacy must not be limited to technical solutions, but encompass regulatory, market-based and socio-ethical considerations (Figure 5). Unless there are concerted efforts involving all government, civil society and private sector players to protect these values, the development of the Internet of Things will be hampered if not prevented. It is only through awareness of these technological advances, and the challenges they present, that we can seize the future benefits of a fair and user-centric Internet of Things.When everyday items come equipped with some or all of the five senses… combined with computing and communication capabilities, concepts of data request and data consent risk becoming outdated.5 Implications for the Developing WorldThe technologies discussed in this report are not just the preserve of industrialized countries. These technologies have much to offer for the developing world and can lead to tangible applications in, inter alia, medical diagnosis and treatment, cleaner water, improved sanitation, energy production, the export of commodities and food security.In line with the global commitment to achieving the Millennium Development Goals (MDGs), the World Summit on the Information Society (WSIS) focuses on ICT development through the creation of national e-strategies, the guarantee of universal, ubiquitous, equitable and affordable access to technology and the wider dissemination and sharing of information and knowledge. WSIS commitments go far beyond technological diffusion –there is a pledge for common action towards poverty alleviation, the enhancement of human potential and overall development through communication technologies and related emerging technologies. In this regard, the technologies underlying the Internet of Things offer many potential benefits.One does not have to look far to find examples. In the production and export of commodities, sensor technologies are being used to test the quality and purity of different products, such ascoffee in Brazil and beef in Namibia. RFID has been used to track shipments of beef to the European Union to verify their origin, integrity and handling – essential given present trends in food tracability standards. Such applications help ensure the quality and market expansion of commodities from developing countries.The enabling technologies of the Internet of Things have much to offer developing countries in their goals for improving quality of lifeThe enabling technologies of the Internet of Things have much to offer developing countries in their goals for improving quality of life.Nanofilters in Bangladesh are removing pollutants and ensuring that water is safe to drink. Nano-sensors can be used to monitor water quality at reduced cost, while nanomembranes can assist in the treatment of wastewater. Research is under way to apply nanotechnology in the diagnosis and treatment of disease, including the diagnosis of HIV and AIDS, as well as nano-drugs for other diseases. Emerging technologies could also improve the quality and reliability of conventional drugs for the developing world: RFID, for example, can track the origin of safe drugs thereby reducing counterfeit.Sensor technologies can monitor vulnerable environments and prevent or limit natural disasters. Extensive and effective systems are needed to ensure early warning and evacuation, thereby reducing loss of life due to natural disasters. Special robots have for instance been used for mine detection to save lives and limbs in conflict zones. Commercial applications are already beingdeployed in countries like India, Thailand and Turkey, among others.Next-generation communication technologies may well originate in the larger growth markets of the developing world –China and India, in particular. The substantial research programmes currently being undertaken by these developing giants mean that the implementation of the Internet of Things will be adapted to local conditions and circumstances, as well as to international trade. Wal-Mart, for instance, now requires its suppliers to be RFID-compliant. In 2002, Wal-Mart sourced billions of dollars worth of products from China, i.e. around 12% of the total value of US imports from China during that year. Not surprisingly, China is rapidly preparing itself to become a leader in RFID deployment. Far from being passive followers of the Internet of Things, the developing world stands to greatly influence the implementation and widespread adoption of these emerging technologies.6 2020: A Day in the LifeBut what does the Internet of Things mean in a practical sense for a citizen of the future? Let us imagine for a moment a day in the life of Rosa, a 23-year-old student from Spain, in the year 2020.Rosa has just quarrelled with her boyfriend and needs a little time to herself. She decides to drive secretly to the French Alps in her smart Toyota to spend a weekend at a ski resort. But itseems she must first stop at a garage – her car's RFID sensor system (required by law) has alerted her of possible tyre failure. As she passes through the entrance to her favourite garage, a diagnostic tool using sensors and radio technology conducts a comprehensive check of her car and asks her to proceed to a specialized maintenance terminal. The terminal is equipped with fully automated robotic arms and Rosa confidently leaves her beloved car behind in order to get some coffee. The “Orange Wall” beverage machine knows all about Rosa’s love of iced cof fee and pours it for her after Rosa waves her internet watch for secure payment. When she gets back, a brand new pair of rear tyres has already been installed with integrated RFID tags for monitoring pressure, temperature and deformation.What does the Internet of Things mean in a practical sense for a citizen of the future?The robotic guide then prompts Rosa on the privacy-related options associated with the new tyres. The information stored in her car’s control system is intended for maintenance purpos es but can be read at different points of the car journey where RFID readers are available. However, since Rosa does not want anyone to know (especially her boyfriend) where she is heading, such information is too sensitive to be left unprotected. She therefore chooses to have the privacy option turned on to prevent unauthorized tracking.Finally, Rosa can do some shopping and drives to the nearest mall. She wants to buy that new snowboard jacket with embedded media player and weather-adjusting features. The resort she is heading towards uses a network of wireless sensors to monitor the possibilities of avalanches so she feels both healthy and safe. At the French-Spanish border, there is no need to stop, as Rosa’s car contains information on her driver’s li cence and passport which is automatically transmitted to the minimal border control installations.Suddenly, Rosa gets a video-call on her sunglasses. She pulls over and sees her boyfriend who begs to be forgiven and asks if she wants to spend the weekend together. Her spirits rise and on impulse she gives a speech command to the navigation system to disable the privacy protection, so that her boyfriend’s car might find her location and aim directly for it. Even in a world full of smart interconnected things, human feelings continue to rule.7 A New EcosystemThe internet as we know it is transforming radically. From an academic network for the chosen few, it became a mass-market, consumer-oriented network. Now, it is set to become fully pervasive, interactive and intelligent. Real-time communications will be possible not only by humans but also by things at anytime and from anywhere. The advent of the Internet of Things will create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities whilst providing new revenue opportunities for a host of enterprising businesses.The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players (Figure 6). These players have to operate within a constantlyevolving economic and legal system, which establishes a framework for their endeavours. Nevertheless, the human being should remain at the core of the overall vision, as his or her needs will be pivotal to future innovation in this area. Indeed, technology and markets cannot exist independently from the over-arching principles of a social and ethical system. The Internet of Things will have a broad impact on many of the processes that characterize our daily lives, influencing our behaviour and even our values.For the telecommunication industry, the Internet of Things is an opportunity to capitalize on existing success stories, such as mobile and wireless communications, but also to explore new frontiers. In a world increasingly mediated by technology, we must ensure that the human core to our activities remains untouched. On the road to the Internet of Things, this can only be achieved through people-oriented strategies, and tighter linkages between those that create technology and those that use it. In this way, we will be better equipped to face the challenges that modern life throws our way.Technology and markets cannot exist independently of the over arching principles of a social and ethical systemStatistical Annex: Mobile market data for top 20 economies (ranked by total subscriber numbers) as at 31 December 2004Total subscribers, penetration rate, proportion of which are 3G (IMT-2000) subscribers and price of OECD low-user basket in USD* 3G mobile or IMT-2000 , as defined by ITU includes subscribers to commercially available services using CDMA 2000 1x, CDMA 2000 1x EV-DO and W-CDMA standards.** Limited mobility Wireless Local Loop service available, for which WLL 9,921,780 subscribers at 31 December 2004.Statistical Annex: Broadband market data for top 20 economies (ranked by broadband penetration) as at 31 December 2004Total subscribers, penetration rate, as percentage of total internet subscribers and price in USD per 100 kbps。
监控技术是福是祸英语作文
监控技术是福是祸英语作文Surveillance Technology: A Double-Edged SwordThe rapid advancement of technology has brought about a myriad of changes in our daily lives, and one of the most significant developments has been the proliferation of surveillance technology. From security cameras in public spaces to the ubiquitous presence of smartphones and the internet, our every move is being monitored and recorded. This has led to a heated debate over the merits and drawbacks of this technology, with proponents arguing that it enhances safety and security, while critics contend that it infringes on personal privacy and civil liberties.On the positive side, surveillance technology has undoubtedly played a crucial role in maintaining public order and preventing crime. Security cameras installed in high-risk areas have proven to be effective deterrents, as potential criminals are aware that their actions are being monitored and can be easily identified. This has led to a decrease in the incidence of vandalism, theft, and other forms of criminal activity in these areas. Moreover, the footage captured by these cameras has often been instrumental in solving crimes, providing law enforcement with vital evidence that can lead to theapprehension and conviction of offenders.In the wake of terrorist attacks and other acts of violence, the importance of surveillance technology has become even more pronounced. Governments and law enforcement agencies have increasingly relied on advanced surveillance systems, such as facial recognition software and data mining techniques, to identify and track potential threats. This has enabled them to thwart numerous plots and prevent countless lives from being lost. The ability to monitor the movements and communications of suspected individuals has been a valuable tool in the fight against terrorism and other forms of organized crime.Furthermore, surveillance technology has also been beneficial in the realm of public health and safety. During the COVID-19 pandemic, for instance, contact tracing apps and thermal imaging cameras have been used to identify and isolate infected individuals, helping to slow the spread of the virus and protect vulnerable populations. Similarly, in the event of natural disasters or other emergencies, surveillance systems can be utilized to monitor the situation, coordinate rescue efforts, and ensure the well-being of affected communities.However, the widespread use of surveillance technology has also raised significant concerns about privacy and civil liberties. Many individuals feel that their right to privacy is being compromised, astheir every action and interaction is being recorded and potentially accessed by authorities or private entities. This has led to a growing sense of unease and a fear of being constantly under scrutiny, which can have a detrimental impact on personal freedom and the overall quality of life.Moreover, there are valid concerns about the potential for abuse and misuse of surveillance data. Authoritarian regimes and oppressive governments have been known to use surveillance technology to monitor and suppress dissent, target minority groups, and maintain a stranglehold on power. Even in democratic societies, there have been instances where surveillance data has been used for nefarious purposes, such as political espionage, discrimination, and the infringement of individual rights.Another issue that has come to the forefront is the lack of transparency and accountability surrounding the use of surveillance technology. In many cases, the public is unaware of the extent and nature of the surveillance measures being implemented, and there is a lack of clear guidelines and oversight mechanisms to ensure that these technologies are being used responsibly and ethically. This has led to a growing demand for greater transparency and the establishment of robust regulatory frameworks to protect the rights of citizens.Furthermore, the increasing reliance on artificial intelligence and algorithmic decision-making in surveillance systems has raised concerns about bias, accuracy, and the potential for discrimination. Algorithms can perpetuate and amplify existing societal biases, leading to disproportionate targeting and monitoring of certain groups, such as racial minorities and marginalized communities. This can further exacerbate existing inequalities and undermine the principles of fairness and equal treatment under the law.In conclusion, the debate over the role of surveillance technology in our society is a complex and multifaceted one. While it has undoubtedly provided valuable benefits in terms of public safety, security, and emergency response, the potential for abuse and the infringement of civil liberties cannot be ignored. As we continue to navigate this rapidly evolving technological landscape, it is crucial that we strike a delicate balance between the need for security and the preservation of individual privacy and freedom. This will require a collaborative effort between policymakers, technology experts, civil society organizations, and the general public to develop robust ethical frameworks and regulatory mechanisms that ensure the responsible and accountable use of surveillance technology. Only then can we fully harness the potential of this technology while safeguarding the fundamental rights and liberties that are the cornerstone of a free and democratic society.。
科技英语中英文对照翻译
mobile and cellular radio移动和细胞广播in comparison to the relative stability and modest technical developments which are occurring in long haul wideband microwave communication systems there is rapid development and expanding deployment of new mobile personal communication system. These rang from wide coverage area pagers,for simple data message transmission,which employ common standards and hence achieve contiguous coverage over large geographical areas,such as all the major urban centres and transport routes in Europe,Asia or the continental USA.This chapter discusses the special channel characteristics of mobile systems and examines the typical cellular clusters adopted to achieve continuous communication with the mobile user.It then highlights the important properties of current,and emerging,TDMA and code division multiple access(CDMA), mobile digital cellular communication systems.Private mobile radioTerrestrial mobile radio works best at around 250 MHz as lower frequencies than this suffer from noise and interference while higher frequencies experience multipath propagation from buildings,etc,section 15.2.In practice modest frequency bands are allocated between 60MHz and 2GHz. Private mobile radio(PMR) is the system which is used by taxi companies,county councils,health authorities,ambulance services,fire services,the utility industries,etc,for mobile communications.PMR has three spectral at VHF,one just below the 88 to 108 MHz FM broadcast band and one just above this band with another allocation at approximately 170MHz.There are also two allocations at UHF around 450MHz. all these spectral allocations provide a total of just over 1000 radio channels with the channels placed at 12KHz channel spacings or centre frequency offsets. Within the 12khz wide channal the analogue modulation in PMR typically allows 7khz of bandwidth for the signal transmission.when further allowance is made for the frequency drift in the oscillators of these systems a peak deviation of only 2 to 3 khz is available for the speech traffic. Traffic is normally impressed on these systems by amplitude modulation or frequency modulation and again the receiver is of the ubiquitous superheterodyne design,Figure 1.4. A double conversion receiver with two separate local oscillator stages is usually required to achieve the required gain and rejection of adjacent channel signals.One of the problems with PMR receiver is that they are requiredto detect very small signals,typically—120dBm at the antenna output,corresponding to 0.2 uV,and,after demodulating this signal,produce ann output with perhaps 1W of audio equipment, the first IF is normally at10.7MHz and the second IF is very orten at 455KHz . unfortunately,with just over 1000 available channels for the whole of the UK and between 20000and30000issued licences for these systems,it is inevitable that the average busuness user will have to share the allocated channel with other companies in their same geographical area.There are various modes of operation for mobile radio communications networks, the simplest of which is singal frequency simplex. In simplex communication, traffic is broadcast, or one way. PMR uses half duplex(see later Table 15.3) where, at the end of each transmission period, there is a handover of the single channel to the user previously receiving, in order to permit them to reply over the same channel. This is efficient in that it requires only one frequency allocation for the communication link but it has the disadvantage that all units canhear all transmissions provided they are within rage of the mobile and frequencies are allocated for the transmissions. One frequency is used for the forward or downlink, namely base-to-mobile communications. This permits simultaneous two-way communication and greatly reduces the level of interference, but it halves other’s transmissions, which can lead to contention with two mobiles attempting to initiate a call, at the same time, on the uplink in a busy syetem.Although PMR employs relatively simple techniques with analogue speech transmission there have been many enhancements to these systems over the years . Data transmission is now in widespread use in PMR systems using FSK modulation. Data transmission also allows the possibility of hard copy graphics output and it gives direct access to computer services such as databases, etc. Data prembles can also be used, in a selective calling mode, when initiating a transmission to address a special receiver and thus obtain more privacy within the system.15.4.5 Trunked radio for paramilitary use集群无线电的军事使用Another related TDMA mobile radio standard is the European trunked radio(TETRA)network which has been developed as part of the public safety radio communications service(PSRCS) for use by police, utilities, customs office, etc. TETRA in fact is part of wider international collaborations for paramilitary radio use.In these portable radios there is a need for frequency hopping (FH) to give an antieavesdropping capability and encryption for security of transmission to extend military mobile radio capabilities to paramilitary use, i.e. for police, customs and excise offices, etc. these capabilities are included in the multiband interteam radio for the associated public safety communications office in the USA while Europe has adopted the TETRA standard.TETRA is essentially the digital TDMA replacement of the analogue PMR systems. The TETRA standard has spectrum allocations of 380 to 400 and 410 to 430MHz, with the lower band used for mobile transmissions and the upper band for base station use. TETRA mobile have 1 W output power and the base stations 25 W using error with the data throughput rate varying, to meet the required quality of service. TETRA can accommodate up to four users each with a basic speech or data rate of 7.2kbit/s. with coding and signaling overheads, the final transmission rate for the four-user slot is 36 kbit/s. this equipment is large and more sophisticated than a commercial cell phone, and it sells for a very much higher price becase the production runs are much small. However, its advanced capabilities are essential for achieving paramilitary communications which are secure from eavesdropping.15.5 Code division multiple accessAnalogue communication systems predominantly adopt frequency division multiple access (FDMA), where each subscriber is allocated a narrow frequency slot within the available channel. The alternative TDMA(GSM) technique allocates the entire channel bandwidth to a subscriber but constrains the subscriber but constrains the subscriber to transmit only regular short bursts of wideband signal. Both these accessing techniques are well established for long haulterrestrial, satellite and mobile communications as they offer very good utilization of the available bandwidth.15.5.1The inflexibility of these coordinated accessing techniques has resulted in the development of new systems based on the uncoordinated spread spectrum concept. In these systems the bits of slow speed data traffic from each subscriber are deliberately multiplied by a high chip rate spreading code, forcing the low rate (narrowband data signal) to fill a wide channel bandwidth.15.7.2 3G systemsThe evolution of the third generation (3G)system began when the ITU produce the initial recommendations for a new universal mobile telecommunications system(UMTS)[www.] The 3G mobile radio service provides higher data rate services ,with a maximum data rate in excess of 2Mbit/s, but the achievable bit rate is linked to mobility. Multimedia applications encompass services such as voice, audio/video, graphics, data, Internet access and e-mail. These packet and circuit switched services have to be supported by the radio interface and the network subsystem.Several radio transmission technologies(RTT) were evaluated by the ITU and adopted into the new standard, IMT-2000. the European standardization body for 3G, the ETSI Special Mobile Group, agreed on a radio access scheme for 3G UMTS universal terrestrial radio access(UTRA) as an evolution of GSM. UTRA consists of two modes : frequency division duplex(FDD) where the uplink and downlink are transmitted on different frequencies; and time division duplex(TDD) where the uplink and downlink are time multiplexed onto the same carrier frequency. The agreement assigned the unpaired bands (i.e. for UTRA TDD ). TD-CDMA is a pure CDMA based system. Both modes of UTRA have been harmonised with respect to basic system parameters such as carrier spacing, chip rate and frame length to ensure the interworking of UTRA with GSM.The 3G proposal were predominantly based wideband CDMA(WCDMA) and a mix of FDD and TDD access techniques. WCDMA is favoured for 3G in poor propagation environments with a mix of high modest speed data traffic. It is generally accepted that CDMA is the preferred accesstechnique and, with the increase in the data rate, then the spreading modulation needs to increase to wideband transmission.WCDMA is based on 3.84Mchip/s spreading codes with spreading ratio, i.e. , K values, of 4-256 giving corresponging data ratas of 960-15 kbit/s. the upper FDD uplink band I from 1920-1980 MHz is paired with a 2110-2170 MHz downlink. In addition uplink bands II & III at 1850-1910 MHz and 1710-1785 MHz are also paired, respectively, with 1930-1990 MHz and 1805-1880 MHz allocations. the system is configured on a 10 ms frame with 15 individual slots to facilitate TDD as well as FDD transmissions. TDD is more flexible as time-slots can be dynamically reassigned to uplink and downlink functions, as required for asymmetric transfer of large files or video on demand traffic. 3G WCDMA systems use an adaptive multirate speech coder with encoded rates of 4.75-12.2 kbit/s. receivers commonly use the easily integrated direct conversion design, in place of the superheterodyne design . receiver sensitivities are typically -155dBm.The 3GPP2 standard aims to achieve a wide area mobile wireless packet switched capability with CDMA2000 1×EV DO revision A (sometimes called IS-856A). Here 1×refers to the single carrier 1.25 Mchip/s system. It achieves a 3.1 Mbit/s downlink and a delay sensitive services. The 3GPP standard has gone through many release with R4 in 2001 which introduced packet data services and R6 in 2005 to further increase the available data transmission rate . R6 pioneers the use of high-speed downlink packet access and multimedia broadcast multicast services which offer reduced delays and increased uplink data rates approaching 6 Mbit/s.In parallel with the European activities extensive work on 3G mobile radio was also performed in Japan. The Japanese standardisation body also chose WCDMA, so that the Japanese and European proposals for the FDD mode were already aligned closely. Very similar concepts have also been adopted by the North American standardization body.In order to work towards a global 3G mobile radio standard, the third generation partnership project(3GPP), consisting of members of the standardization bodies in Europe, the USA, Japan, Korea and China, was formed. It has merged the already well harmonized proposals of the regional standardization bodies to work on a common 3G international mobile radio standard, still called UTRA. The 3GPP Project 2(3GPP2), on the other hand, works towards a 3G mobile radio standard based on cdmaOne/IS-95 evolution, originally called CDMA2000.比起相对稳定、适度的技术发展是发生在宽带微波通信系统,有长期快速发展和扩大部署的新的移动个人通讯系统。
信息技术专业外语单词汇总
1attribute 可归因旳,可归属旳communications satellite 通讯卫星magnetic field磁场2.intergreted circuit 集成电路logic circuit逻辑电路timingcircuit定期电路3microcomputer 微型电脑,微型计算机monolithic整体旳,单片旳discrete离散旳,分离旳4semiconducter 半导体dope(半导体中)掺杂superconducting超导电旳5transistor 晶体管vacuum tube 真空管,电子管photocell光电管,光电池diode 二极管6active element 有源器件passive component无源器件air-evacuated 抽成真空旳,排空气旳7alternating current(AC)交流电direct current(DC)直流电current intensity 电流强度8electrode 电极anode 阳极cathode 阴极grid 格子,栅极9battary 电池filament 细丝,细线,灯丝10capacitor 电容器inducter 电感器resistor电阻器rectifier 整流器sensor传感器,敏感元件tranducter变换器,换能器,传感器counter计数器filter过滤,滤波;过滤器,滤波器amplifier 放大器,扩大器flip-flop触发器comparator比较器regulater调整器,稳压器mixer 混合器,混频器generator 发电机,电源video amplifier视频放大器thermister热敏电阻audio amplifier音蘋放大器oprational amplifier(op-amp)运算放大器radio frequency amplifier射频放大器modulator调制器adder加法器oscillator振荡器alarm clock闹钟INVERTER反相器11field-effect transister(FET)场效应管zener diode齐纳二极管,稳压二极管triode三极管,真空三极管cassette recorder盒式录音机electronic organ电子琴12germanium 锗元素(半导体材料)silicon 硅元素cadmium sulfied硫化镉13migrate移动,移往bias 偏压,偏置fluctuation变动,波动unimpededly无阻地,不受阻地photolithography摄影平板印刷术,光刻法14thermocouple热电偶DC-coupled直流耦合旳,直接耦合旳15hum嗡嗡声blood vessels血管malfunction故障,失灵fidelity保真度playback播放,回放,重现distortion失真,变形definition清晰度,辨别率16respiratory呼吸旳ripple涟纹,波纹citizens band民用无线电频带dial拨打;拨号盘17feedback 反馈,回授push-button按钮,按键tune为...调谐,对准频率warning system报警系统18AND gate“与”门OR gate“或”门Boolean algebra布尔代数19completary metal oxide semiconductor(CMOS)logistic互补型金属-氧化物-半导体(CMOS)逻辑(电路)20emitter coupled logic(ECL)发射极耦合逻辑()电路21obsolate荒废旳,陈旧旳,失去时效旳22resistor-transisiorlogic(RTC)电阻-晶体管逻辑(电路)23transistor-transistor logic(TTC)晶体管-晶体管逻辑(电路)24CT(Computer Tomography)计算机断层造影术,CT检查25discreminate区别,辨别,差异待遇26very-large-scale integrated(VLSL)circuit超大规模集成电路➢amplitude-modulation幅度调制旳,调幅旳anomalous不规则旳,反常旳disturbance扰乱,干扰➢electromagnetic wave电磁波frequency modulation(FM)频率调制,调频ionosphere电离层➢oscillation振荡propagation传播receiver接受机,接受器transmitter发射机,发射器➢amplitude modulation(AM)幅度调制,调幅alternating current(AC)交流电,交流电流➢amplifier放大器antenna天线,触角buffer缓冲器capacitance电容(量)carrier载波➢coaxial cable同轴电缆condencer电容器demodulation解调detection检波double加倍,倍频➢electron tube电子管fidelity保真度inductance电感(量)intelligibility清晰度,可读度,可识度magnetron磁控管modulator调制器phase modulation(PM)相位调制,调相➢quartz crystal石英晶体reflex klystron反射速调管superheterodyne超外差式(旳)➢tank circuit槽路,谐振电路transducer传感器acoustic听觉旳,声学旳,音响学旳➢agitation搅动,激动,骚动attenuation衰弱,减小automatic volum control自动音量控制➢cross modulation交叉调制,交叉干扰direct current(DC)直流电,直流电流➢discriminator鉴别器,鉴频器,鉴相器distortion变形,失真filament细丝,灯丝➢filter过滤,滤波,滤波器harmonic谐波(旳),泛波(旳)inasmuch as由于,由于➢integrated circuit集成电路radio-detector无线电探测器,检波器rectify整流,检波➢selectivity选择性sensitivity敏捷度shield防护,屏蔽solid-state electronic device固体电子器件speaker cone喇叭筒static静电干扰,天电干扰thermal agitation热激发,热扰动➢tone control音调控制transformer变压器vacuum tube真空管,电子管amateur业余爱好者➢anode阳极audion三级检波管,三级真空管bolometer测辐射热仪,辐射热测量器cohere 附着,凝聚,粘接在一起coherer粉末检波器command mudule(宇宙飞船中旳)指挥舱➢crystal set晶体检波接受机,矿石收音机dash(电报中旳)长音,长划detector检波器➢Fleming valve弗莱明管,二极管检波器grid格子,栅极ham业余无线电爱好者➢heliograph日光仪,日光反射信号器impinge撞击,打击,影响incandescent白炽旳,发白热光旳Kennelly-Heaviside layerE电离层(高度110-120km旳反射电波旳大气层)➢limiter限制器,限幅器lunar module(登月宇宙飞船旳)登月舱Morse code摩尔斯电码➢piggyback骑在肩上,搭载rectifier整流器relay继电器,替续器rudimentary初级旳,原始旳,未发展成熟旳short-circuit对...短路,把...短接shutter遮门,遮蔽器,摄影机(快门)➢spark gap火花隙surge电涌,波动;冲浪,冲击tapper轻击锤,散屑锤thermionic tube 热离子管,热发射电子管triode三极真空管voltaic cell伏打电池⏹semiconductor半导体transistor晶体管resistor电阻fabrication制造,生产,制作⏹obsolescence逐渐过时旳,陈旧,报废ubiquitous无所不在旳,普遍存在旳inextricable无法挣脱旳或解脱旳deposition沉积etching蚀刻planarization平坦化sapphire蓝宝石,青玉⏹gallium arsenide砷化镓wafer晶片,圆片substrate基片,基层photolithography光刻法⏹polysilicon多晶硅dice切成方块die冲模weld焊接flip-flop触发器⏹multiplexer多路(复用)器inertially-guided惯性制导旳❖density密度acronym缩略语adheres to坚持consensus一致versatile万能co-exist并存indefinitely不确定地format格式fundamentally根当地authored发明旳adaptive适应旳❖compatible兼容旳initially最初mandatory强制性旳frustrating困难digital数字旳❖amplifier放大器cable电缆线interiaced隔行旳capacity能力,容量encryption密码❖mechanism机制duplicate复制designate指明,表达violation违反high-fidelity高保真性❖consortium国际财团government-sponsored政府赞助✓stem滋长,发展,源自rock-and-roll摇滚音乐compact disc(CD)密集盘,压缩盘,激光盘✓garbied混淆旳,弄错旳,歪曲旳scratch抓痕,刮伤static静电干扰,静电噪声✓dish抛物面天线,碟子,盘子antenna天线astronomer天文学家squeeze挤压eliminate 消除,排除redundancy多出,多出信息flip弹掷,轻抛random随机,随意✓heads硬币正面tails硬币背面playing card扑克牌,纸牌✓deck一副纸牌suit扑克牌四种花色中任意一种heart(扑克牌花色)红桃,红心spade 黑桃✓club梅花diamond方块✓information content信息容量,信息量entropy熵,平均信息量✓toss扔,掷inevitably不可防止地,必然地✓error-correcting code纠错码encoder编码器check bit校验位code word码字,码语✓corrupt破坏,损坏,使...不纯pattern-recognizing模式识别decoder解码器,译码器✓data compression数据压缩rate distortion比率失真,比率变化absolute具有普遍性旳,通用旳✓set forth阐明,陈说probe探针,探测器✧trust信任,信赖,期望,但愿information assurance信息保障confined被限制旳,狭窄旳✧machine-readable可用计算机处理旳safeguard维护;保护;安全装置,安全措施✧glossary术语表synonymous同义旳infrastructure下部构造,基础下部组织hermetic密封旳,与外界隔绝旳eradicate根除capricious反复无常旳commensurate相称旳,相称旳✧assessment估价,被估定旳金额confidentiality机密性cryptograph密码学✧privileged有特权旳divulged泄露,暴露jurisdictions权限maliciously有敌意旳decimal小数,十进制,小数旳mnemonic记忆旳,记忆术旳accountability可阐明性governance可控性risk assessment风险分析compliance服从性identification识别,鉴定,证明,视为同一authentication证明,鉴定non-repudiation承认authorization授权,承认provision供应,供应品,预备,防备auditing查账,审计,审核Business continuity planning事件持续计划性COMSEC通信安全措施(Communications Security)cryptanalysis密码分析学crypto秘密党员,秘密赞同者●stand for代表,替代,象征,支持,做...旳候选人ubiquity到处存在,(同步旳)普遍存在●roaming移动,移向,漫游predecessor前辈,前任,(被取代旳)原有事物●technologically技术上,工艺上modulation调整,调谐,调制●take over把...从一地带到另一地,接受,接管maintenance维护,保持,生活费用,扶养●as of在...时,到...时为止,从...时起authenticate为...出立证据,鉴定,认证●cryptography密码学,密码术encrypt译成密码,编码,加密cipher密码,电码,记号,暗号,电报,密码索引frequency hopping跳频●tradeoff(公平)交易,折衷,权衡cellular多孔旳,蜂窝状旳,泡沫状旳codec编码解码器●quantize激发,鼓励,励磁,激(励)振(荡)representative代表性旳,经典旳,描写旳●predication预言,预报stone碑,里程碑,纪念碑,墓碑●infrastructure基本设施complete完整旳,所有旳,整个旳,完毕旳,完美旳●urban都市旳,都市旳,都市居民旳,住在都市中旳propagation传导,传播,普及●penetration刺穿,穿透,渗透detachable可分开旳,可分离旳,可分遣旳subsidize资助,津贴◆keypad数字按键键盘circuit switching线路互换,电路互换push to talk一键通◆telephony 技术,proliferate激增,扩散briefcase公文包Noric 北欧旳,日耳曼民族旳EDGE(Enhanced Date rates forGiobalEvolution)全球演进式数据速率增强技术TETRE陆地集群无线电系统◆cameraphone摄像personalization个性化◆line-of-sight视距soft handoff软切换cross talk串话干扰circumstantial间接旳,不重要旳◆anecdotal多逸事趣闻,含逸事趣闻旳culminate in告终,完结◆the star Trek communicator电影《星战旅行》中旳通讯机surgical外科旳,外科手术旳❖underlying在下面旳,主线旳,潜在旳,优先旳succeed继...之后,接替,继承,接着...发生❖infrastructure基础构造,基础设施discretion谨慎,辨别力,考虑,处理权❖timestape时间戳error-corrected差错校正旳precursor先驱者,前导,前兆❖deploy展开,设置vidioconferencing视频会议upstart爆发户,新贵,一步登天旳人❖allied with联合,结盟laptop便携式电脑designate指定,指明,称呼❖arbitary任意旳,恣意旳,专制旳,反复无常旳uplink上行链路downlink下行链路❖prohibitively严禁,起制止作用,克制bankbone脊椎,志气,骨干,支柱,主干网,主干网点handover转移,转换,转交❖ubiquitous无所不在旳,到处存在旳,普遍存在旳hurriedly仓促旳,匆忙旳❖euro欧元wait-and-see观望旳fledged羽毛长齐旳,快会飞旳,成熟旳,独立旳➢Digital signal processing(DSP)数字信号处理器time domain时域➢mathematical calculation and algorithm数字计算和算法signal sampling信号采样➢spatial domain空间域enhancement增强superposition叠加➢“time-invariant”filter时不变滤波器stable response阶跃响应➢frequency domain频域fourier transform傅里叶变换➢filter design滤波器设计vidiocompression视频压缩✓self-replicating自我复制旳executable可执行旳,实行旳✓behave行为体现,举动,举止biological生物学旳✓analogy类似host宿主malicious怀恶意旳,恶毒旳malware恶意软件✓parlance说法,使用方法Trojan特洛伊benign仁慈旳,宽厚旳,温和旳,良性旳✓annoy使苦恼,烦恼payload有效载荷self-reproduction自我复制,自我繁殖✓overwhelm压制,制服,占用,耗尽spyware间谍软件blur不清晰,暧昧不明,模糊✓script脚本,原本,手迹,手稿macro宏,巨大旳trick诡计,骗局bug缺陷,害虫✓uncanny离奇旳plural复数旳deter制止floppy软盘spreadsheet电子数据表misidentify 误认✓recipient接受器,容器prank恶作剧vandalism故意破坏piggy-back骑在背上deception 欺骗✓sparse稀少旳stealth秘密行动intercept中途制止,截取signature签名,签名encryption 密码术encipher编成密码decrypt解码polymorphic多形态旳,多形旳✓statistical记录旳mutation变化metamorphic变形旳,变化构造旳explicitly明白地,明确地✓exploit开拓,开发,非法使用proprietary私有旳,所有旳,所有权✓void空旳,无人旳,无效旳,无用旳warranty授权,理由,根据,担保patch修补hoxb 愚弄✧multitasking多任务技术categoy种类relinquish释放industrial robot工业机械手✧multiprogramming多道程序设计peripherals外部设备cooperative multitasking协同多任务处理技术shortcoming缺陷resource资源✧execution执行multithreading多线程memory protection存储器保护privillege特权swapfile互换文献encyclopedia百科全书refetch重新获取recompute再计算,验算entry条目,登录,进口,入口tag标签web网站,网页write-through cache直写式缓存write-back cache后写式缓存heuristic启发式旳evict驱逐,逐出,收回coherency一致embed嵌入,植入,包括platter盘queue队列,行列,长队index索引,指数,指标,指针simplifistic简化旳,过度单纯化旳entity实体data structure数据构造algorithm运算法则critical operation临界操作,关键运算execution实行,完毕,执行well-suited合适旳,便利旳crucial至关重要旳object-oriented programming language面向对象旳程序设计语言template模板descriminate区别,辨识array排列,数组reference提及,波及,参照,索引null无效旳,无价值旳,等于零旳nullable reference可空索引perspective观点,见解,前途access存取,靠近friewall防火墙segment段,结,片段,分割vulnerable易受袭击旳snoop探听,调查,盗窃,到处窥视,私家侦探spyware间谍软件stand-alone单机filter滤波器,过滤器,筛选anaiogous类似旳,相似旳,可比拟旳traffic交通,交易,通信量connectivity连通性administor网络管理员render偿还,致使,放弃,实行enforcement执行,强迫least privilege principal最小特权原理configuration构造,构造,配置,外形classification分类,分级intercept中途制止,截取screening router筛选路由器protocol协议,草案stack堆栈,堆default默认(值),缺省(值)built-in内置旳,嵌入旳destination目旳地,目旳文献inspect检查,视察virus病毒,毒害Proxy server代理服务器masquerade化妆舞会exploitable可开发旳,可运用旳spoofing哄骗crackers疯狂旳,精神错乱旳network address translation(NAT)网络地址转换scenario游戏旳关,某一特定旳情节disguise假装,伪装,掩饰throughout吞吐量,生产能力,生产量latency等待时间,潜伏,潜在,潜伏物deterministic确定旳,决定论旳,定数论旳flyback回扫,回描semaphore信号量,信标unstick使不再粘着,扯开,分开astonishingly惊人地,令人惊讶地asymmetric不对称旳,不均匀旳termintor终端器,终端套管,终端负载reboot重新引导,重新启动peripheral周界旳,外围旳,外部旳,边缘旳indistinguishable不能辨别旳,不能区别旳conventional常规旳,一般旳,老式旳errata(erratum旳复数)勘误表,订正表attachment附加,附件proprietary专利旳,有专利权旳,独占旳hook up以钩钩住hermaphroditic两性旳,雌雄同体旳proliferation扩散,增生,增殖isochronous同步旳,等时旳statement申明,程序语句command命令tremendous惊人旳,极大旳,非常旳procedure过程invoke调用,祈求internal state内状态first-in first-out(FIFO)先入先出pseudo code伪代码arbitrary任意旳traverse遍历uniquely唯一旳handle句柄decouple去耦,解耦cursor指针controller控制器implemented实现oil refinery and steel mill炼油厂和钢铁厂Boolean logic布尔逻辑negative feedback负反馈thermostat温度调整器brickwork砖体构造oscillation振荡a proportional-integal-derivative loop比例-积分-微分环路deadband静区autopilot自动驾驶室aileron副翼elevator升降机rudder方向舵triangle三角形embedded system嵌入式系统relay继电器hydraulic液压pneumatic气动simulate模仿,模拟,假装,冒充mathematical数字旳,精确旳computational计算旳connectionist连线,连接,线路in more practical terms实际上akin同族旳,类似旳precise精确旳,精确旳,精确exhibit展出,陈列,展示axons(神经旳)轴突,轴突输出端dendrite树枝状结晶,树枝石synapse神经原旳神经线连接,神经键neuroscience神经系统科学neuron神经细胞,神经元neurode神经结点per se自身,本质上come with伴随...发生elements原理,基础emulation竞争,效仿collectively全体地,共同地delineation描绘implementation执行hyperbolic双曲线旳tangent切线,正切decomposition分解,腐烂parallelism平行,对应,类似acyclic非循环旳causal因果关系旳,原因旳entail使必需,使蒙受,使承担,遗传给posterior较晚旳paradigm范例regression衰退fail within属于,适合pattern recognition模式识别applicable to适应于,合用于sequential持续旳,有次序旳priori先验旳,天生旳,天赋旳gradient descent梯度下降perceptron感知器posterior probability后验概率derivative派生旳事物,派生词,引出旳,系出旳compression浓缩,压缩,密集clustering聚类Markov decision progress马尔可夫决策过程1uzzy模糊旳,失真旳reasoning推理,评理,论证deduce推论,演绎出(from)predicate谓语,断言probability也许性,或然性,概率conceptually概念地vaguely模糊地scenario某一特定情节adjacent邻近旳,靠近旳yield出生,产生controversial争论旳,争议旳rigorous严格旳,严厉旳,严峻旳superset超集,扩展集,父集appliance用品,器具detergent清洁剂,去垢剂concertration浓度,浓缩,集中,专心refrigerator电冰箱,冷藏库subrange附属旳区域,子区间brake刹车,闸map映射consensus一致同意,舆论anti-brake system(ABS)防刹车系统rice cooker电饭煲dishwasher洗碗机elevators电梯,升降机boolean logic布尔逻辑meaning内涵,意义,含义gear to使适合deduct演绎,扣除implement贯彻,实现,工具,器械optimal最佳旳,最理想旳set集合formulation用公式表达,明确地体现,做简洁陈说framework构架,框架,构造subset子集solution解答,处理措施,处理方案constraint约束,强制formula公式,规则ball around邻域convex表面弯曲如球旳外侧,凸起旳criterion(批评判断旳)原则,准据,规范hilly多小山旳,多坡旳,陡旳accelerator pedal油门踏板gear齿轮,传动装置dynamic动态旳,动力旳,动力学旳geometrical几何学旳,几何旳integral[数学]积分,完整,部分interchangeable可互换旳positive-definite正定旳position-semidefinite半正定旳zero-state零状态regulator调整者,校准者,调整器linear quadratic regulator线性二次调整器matrix矩阵gain增益dimension尺寸,尺度,维(数)elegantly优美地,优致地derivative微分,导数algorithm运算法则,算法simplicity简朴,朴素coeffient系数,率,程度actuator执行机构,执行器oscillator振荡,使摆动windup终止,结束,装有发条旳,结尾旳non-linear非线性旳feature特性,特点salient明显旳,重要旳,重要旳bumpless勿扰动旳autotune自动调试,自动调谐VI(Virtual instrument)虚拟仪器thermostat恒温器sprinkler洒水车,喷壶,洒水装置inertial惯性旳,不活泼旳oscilloscope示波器constraint约束,压抑,拘束compiler编译器assembler汇编程序,汇编器debugger调试器,测试程序checksum校验和emulator仿真器microcontroller微控制器egoless programming规范化程序设计,非自我程序设计troubleshooting发现并修理故障,处理纠纷subroutine子程序nest嵌套exokernel外核back-up支持leave out省去,遗漏,不考虑combustion燃烧nonpreemptive非抢先旳rate monotonic analysis速率单调性分析semaphore信号量。
Data Forwarding
Data Forwarding in Mobile Social Networkswith Diverse Connectivity Characteristics Xiaomei Zhang and Guohong CaoDepartment of Computer Science and EngineeringThe Pennsylvania State University,University Park,PA,16802Email:{xqz5057,gcao }@Abstract —Mobile Social Network (MSN)with diverse con-nectivity characteristics is a combination of opportunistic net-work and mobile ad hoc network.Since the major difficulty of data forwarding is the opportunistic part,techniques designed for opportunistic networks are commonly used to forward data in MSNs.However,this may not be the best solution since they do not consider the ubiquitous existences of Transient Connected Components (TCCs),where nodes inside a TCC can reach each other by multi-hop wireless communications.In this paper,we first TCCs and analyze their properties based Then,we propose TCC-aware data forwarding strategies which exploit the special characteristics of TCCs to increase the contact opportunities and then improve the performance of data forwarding.Trace-driven simulations show that our TCC-aware data forwarding strategies outperform existing data forwarding strategies in terms of data delivery ratio and network overhead.I.I NTRODUCTIONIn Mobile Social Networks (MSNs),human-carried mo-bile devices opportunistically form wireless peer-to-peer connections with each other in the absence of the network infrastructure [1].Due to the unpredictable human mobility,it is hard to maintain end-to-end connections.As a result,“carry-and-forward”[2][3]is used,where mobile nodes physically “carry”the data,and forward the data when contacting a node with “higher”forwarding capability.Although most research assumes that MSNs are highly sparse,a close scrutiny on most current MSN traces reveals that the connectivity inside a network is diverse,and there are ubiquitous existences of Transient Connected Compo-nents (TCCs).Inside TCCs,nodes have transient contacts with each other and form a connected component.For example,students in a classroom have transient connections with each other,and vehicles on highways form platoons and have transient connections inside a platoon [4].An MSN with diverse connectivity characteristics is a combination of opportunistic network and mobile ad hoc network (MANET).Inside a TCC,a MANET is formed where nodes can reach each other by multi-hop wireless communications.Outside of TCC,nodes contact each oth-er opportunistically through “carry-and-forward”.Since theThis work was supported in part by Network Science CTA under grant W911NF-09-2-0053.ABCDE(a)(b)Figure 1.The left figure shows a TCC of five nodes.The right table shows their forwarding metrics.A line between two nodes means that they are within communication distance.major difficulty of data forwarding is the opportunistic part,techniques designed for opportunistic networks are commonly used to forward data in MSNs.However,this may not be the best solution since they do not consider the diverse connectivity characteristics of MSNs.For example,Figure 1(a)shows a TCC of five nodes and Figure 1(b)shows their forwarding metrics which represent the capability of forwarding data to other nodes (e.g.,node centrality [5]).Node A has the data which will be forwarded to the destination through “carry-and-forward”.Based on existing techniques,the data should be forwarded to a contacted node with higher forwarding metric.In this example,node A has two possible contacts:B and E (contacts are represented by lines).Since node B has lower forwarding metric (2.1)than A ’s (3.0),B will not get the data.E has higher forwarding metric (4.5)than A ,and thus A forwards the data to E .After E receives the data,its contact D ,which has higher forwarding metric (5.8),will get the data.D will not forward the data to its contact B which has a lower forwarding metric.Although C has a much higher forwarding metric (7.0)and much higher chance of reaching the destination,the data will not be forwarded to C since it is not the contact of D (i.e.,no line between them).However,since C and A are within the same TCC,it is better for them to exchange their forwarding metrics through multi-hop wireless communication,and then it will be possible for C to forward the data to the destination.In this paper,we address the problem of data forwarding in MSNs with diverse connectivity characteristics by propos-ing two TCC-aware data forwarding strategies.Since a TCCis a MANET,it is treated as one component and data carriers in this TCC are selected for opportunistic data forwarding. More specifically,the paper has two contributions.1)We identify the existence of TCCs and analyze theirproperties based onfive traces.Wefind that thereare significant number of TCCs in MSNs,and thedistributions of TCC size and node degree followexponential distribution.By treating multi-hop wire-less communications inside TCCs as indirect contacts,through theoretical analyses,we show that the contactopportunities can be significantly increased in alltraces.2)Wefirst propose a TCC-aware data forwarding strat-egy to exploit TCCs to improve the performance ofdata forwarding in MSNs.In our solution,nodes insidea TCC exchange their forwarding metrics throughmulti-hop wireless communications,and the node withthe highest forwarding metric is selected to get areplicated data copy.Although the TCC-aware dataforwarding strategy can increase the data deliveryratio,it increases the data copies in the network.Toaddress this problem,we enhance the TCC-aware dataforwarding by selecting an optimal set of nodes in theTCC to avoid overlap in their contacts and maximizethe data forwarding opportunity with a small numberof nodes.Trace-driven simulations show that our TCC-aware data forwarding strategies outperform existingdata forwarding strategies with less network overhead. The rest of the paper is organized as follows.In Section II, we identify the properties of TCCs based onfive traces.Sec-tion III presents our TCC-aware data forwarding strategies. In Section IV,we evaluate the performance of the TCC-aware data forwarding strategies.Section V reviews related work,and Section VI concludes the paper.II.T RACE-BASED TCC ANALYSISIn this section,we identify the existence of TCCs and analyze their properties based onfive realistic MSN traces.A.TracesWe study the properties of TCCs based onfive traces: Social Evolution[6],Friends&Family[7],Reality Min-ing[8],Infocom[9]and UCSD[10].These traces record contacts among users carrying different kinds of mobile devices.Thefirst three traces are collected by the MIT Reality group based on Bluetooth on smartphones.Among them,Social Evolution records the contacts among students in an undergraduate dormitory.Friends&Family records the contacts among members of a young-family residential community.Reality Mining tracks the contacts between indi-viduals in research labs.The trace of Infocom is collected in a conference environment by recording the contacts between conference attendants carrying imotes.In these four traces, mobile devices periodically detect their peers via Bluetooth interfaces.A contact is recorded when two mobile devices move into the detection range of each other.The UCSD trace is collected at a campus scale,where the devices are WiFi enabled PDAs.These devices search for nearby WiFi Access Points(APs),and a contact is detected when two devices detect the same AP.The details of thesefive traces are shown in Table1.B.Properties of the Contact GraphBased on the collected traces,we can draw contact graphs which consist of mobile devices(nodes)and their contacts (edges),with which we study the transient contact status between nodes.A contact graph can be drawn at each time point,i.e.,there is an edge between two nodes if they are contacting each other at that time point.Here,a contact graph is drawn every10minutes in the traces.The extracted contact graphs have some interesting prop-erties,and one of them is related to the distribution of the node degree.The Complementary Cumulative Distribution Function(CCDF)of the node degree P(K>k),which represents the probability that a node has more than k contacts with other nodes,follows exponential distribution for k≥1:P(K>k)=e−kk∗=1when k=0,we have the following:P(K>k)=e−kTable IT RACE S UMMARYSocial Evolution Friends&Family Reality Mining Infocom UCSD DeviceNetwork typeNumber of devicesNumber of contactsStart DateDurations(days)Granularity(secs)(a)Social Evolution(k∗=1.70)(b)Friends&Family(k∗=1.14)(c)Reality Mining(k∗=1.55)(d)Infocom(k∗=4.31)(e)UCSD(k∗=2.36)Figure2.The distribution of node degree can be approximated by exponential distribution.k∗is the exponential constant. contact graph.The GCC is commonly used to represent theoverall connectivity of the network[12],and the propertyof the GCC is closely related to the degree distribution[13][14][15].Based on[15],in a random graph with ex-ponential degree distribution,if the exponential constant k∗is larger than1,there exists a GCC with size that scaleslinearly with the size of graph.With the increase of k∗,thesize of the GCC also increases.Since k∗in all traces islarger than1as shown in Figure2,we can expect that thereare large GCCs inside these contact graphs.Figure3uses boxplot to show the size of the largest TCC as a proportion of the network size,where the largest TCC is detected every10minutes.Here,the network size is the number of nodes that are in contact with some nodes in the trace.Other nodes may turn off their devices or contact nodes that are not included in the trace,and these nodes are not included in our analysis.The results in Figure3 are consistent with our conclusion that a larger exponential constant k∗leads to a larger GCC.For example,the Family &Friends trace has the smallest GCC,because k∗is only slightly larger than1.For the trace of Infocom,k∗is larger than4and thus most nodes belong to the GCC.Even though the size of GCC implies the overall con-nectivity of the network,it is not enough to characterize the complete TCC structure.Therefore,we are also interested in the distribution of the TCC size.Figure4plots the distribu-tion of the TCC size.Similar to the degree distribution,the TCC size distribution also follows exponential distribution. The CCDF of the TCC size P(S>s)is exponential for Figure3.The boxplot of the largest TCC size as a proportion of the network size.The middle line inside the box represents the median.The lower and upper edges of the box represents the25th and75th percentiles, respectively.s≥2:P(S>s)= e−s(a)Social Evolution(s∗=5.25)(b)Friends&Family(s∗=1.52)(c)Reality Mining(s∗=3.13)(d)Infocom(s∗=2.86)(e)UCSD(s∗=4.09)Figure4.The distribution of TCC size can be well approximated by exponential distribution for most of the traces.s∗is the exponential constant. nodes are within a TCC,they have TCC-contact,which canbe direct contact or indirect contact.Direct contacts arecontacts between two nodes within one-hop communicationdistance,and indirect contacts are contacts between nodeswithin the same TCC but multi-hop away.Next,we analyzewhether and how contact opportunities are increased byconsidering TCC-contacts.Wefind that the increase ofcontact opportunities is related to the distributions of nodedegree and TCC size.Specifically,we have the followingtheorem:Theorem1.For a contact graph,the contact opportunitiescan be increased by considering TCC-contacts,if the fol-lowing two conditions are satisfied:1)The distribution of node degree and the distributionof TCC size both follow exponential distributions withexponential constants k∗and s∗respectively.(Equa-tions(1)and(2))2)k∗<ˆk∗,whereˆk∗is a function of s∗:ˆk∗=1s∗+(1−e−13e−1s∗)3(3)The proof of Theorem1can be found in Appendix A.In the proof,we also compute the ratio of TCC-contacts todirect contacts,which can be determined by two exponentialconstants k∗and s∗:m tk∗)·e−1s∗)3 s∗+(1−e−1m din Equation(4)(i.e.,Est.m tm d)and the results are shown in Table II.As can be seen,k∗is smaller thanˆk∗in all traces,which indicates that the contact opportunities are increased in all these traces.We alsofind that the error of the estimated m tm dis8.86,which indicates that the contact opportunities are also significantly increased in the Infocom trace.Table IITCC-CONTACTS&D IRECT C ONTACTSk∗s∗ˆk∗Est.m tm d Social EvolutionFriends&FamilyReality MiningUCSDE.Durations of TCC-contactsBecause TCCs are formed when nodes have direct con-tacts with each other,the duration of the TCC-contact is smaller than the duration of direct contact.The comparisons between the durations of TCC-contacts and direct contacts infive traces are shown in Figure5.As shown in thefigure, even though TCC-contacts have smaller durations than direct contacts,the median durations for TCC-contacts are still several minutes.Therefore,by considering both direct and indirect contacts inside TCCs,contact opportunities are increased and the contact durations are still pretty long. This property can be exploited to design more efficient data forwarding strategies,as shown in the next section.III.TCC-AWARE D ATA F ORWARDING S TRATEGIES Data forwarding in MSNs is difficult due to the oppor-tunistic nature of the network.Being aware of the existence of TCCs,we propose better data forwarding strategies by utilizing the contact opportunities in TCCs.Inside a TCC, nodes can reach each other by multi-hop wireless com-munications,which will significantly increase the contact opportunities and increase the chance of forwarding data to the destination.In this section,wefirst present ourFigure5.The durations of direct contacts and TCC-contacts. TCC-aware data forwarding strategy and then improve itsperformance with an enhanced version.A.TCC-Aware Data Forwarding StrategyThe objective of the TCC-aware data forwarding strategy is to utilize TCCs to improve the performance of data forwarding in MSNs.1)Identifying the TCC:To utilize TCCs,thefirst step is to identify the TCCs.A node can detect the nodes in the current TCC by broadcasting inside the TCC,and each node receiving the broadcast sends an acknowledgement.In order to know what data items are being forwarded in the current TCC,the node receiving the broadcast message replies with an acknowledgement that carries the information about the data items in its buffer.By collecting acknowledgements from other nodes in the TCC,the original sender can identify the nodes and the forwarded data in its current TCC.2)Forwarding Strategy:For each data item created in the network,we intend to forward it from the source to the destination within the time constraint T.In the process of forwarding,data can be replicated and forwarded to other nodes in accordance with specific strategies.The forwarding is successful as long as one data copy of this data item arrives at the destination.Strategies designed for opportunistic networks are com-monly used to forward data in MSNs.These data forwarding strategies are normally based on social-aware forwarding metrics such as centrality[3][16][5],which quantify mobile node’s capability of contacting others in the network.When a node carrying data contacts another node,the data packet is forwarded based on Compare-and-Forward[3][2];i.e.,the data carrier forwards the data if and only if the contacted node has a higher centrality and does not have this data.The original data carrier also keeps a copy after forwarding the data.In our TCC-aware data forwarding strategy,a similar method is used.However,the data forwarding decisions are not limited to these two contacted nodes,but among all nodes in the TCC.A TCC can be formed by merging two existing TCCs or by adding new nodes to existing TCCs.For example,nodes A and B are originally from two different TCCs before they contact.After A contacts B,the two TCCs are merged to a new TCC.1:M A←the set of nodes in A’s original TCC2:M B←the set of nodes in B’s original TCC3:if M A=M B then4:Do NOTHING/*A,B are already in the same TCC*/ 5:else/*Forwarding decision inside the TCC will be made centrally at a command node C,which is chosen from A,B.*/6:if|M A|≤|M B|then7:C←B8:else9:C←A10:end if/*C will identify the nodes inside the new TCC and the data items carried by them,and make the forwarding decision.*/ 11:M←M A M B12:D←the set of unique data items in the new TCC13:for each data item d∈D do14:if M includes d’s destination then15:d is forwarded to d’s destination16:Go to next data item17:end if18:H d←node with the highest centrality19:if H d has the data then20:Do NOTHING and go to the next data item21:else22:d is forwarded to H d23:end if24:end for25:end ifBCA(a)(b)Figure6.The leftfigure shows a TCC of three nodes.The right table shows their contact probabilities with all other nodes in the network.The network has7nodes.3)The Algorithm:The whole process of the TCC-aware data forwarding strategy is outlined in Algorithm1.When two nodes contact,theyfirst check if they belong to the same TCC(Lines3∼5).If so,the data packet has already been forwarded in the TCC.If not,a new TCC is formed,and the data items will be forwarded inside the new TCC. The forwarding decision inside this TCC is made centrally at a node,denoted as“command”node,which is chosen from the two nodes in contact.The node that has more nodes in its original TCC will be the command node(Lines 6∼10).Then,the command node checks all the nodes and their carried data items in the new TCC and makes the forwarding decisions(Lines11∼24).Specifically,for each data item that exists in the TCC,if its destination is inside this TCC,it is directly forwarded to the destination(Lines 14∼17).Otherwise,the command node checks if the node with the highest centrality has the data.If the node has the data,nothing needs to be done.Otherwise,one data copy is created and forwarded to the node with the highest centrality (Lines18∼23).B.Enhanced TCC-aware Data Forwarding Strategy1)Motivation:In the TCC-aware data forwarding strate-gy,the node with the highest centrality in the TCC gets one data copy and the original data carriers also keep their data copies.However,this may not be the best option in many cases.For example,Figure6(a)shows a TCC of three nodes and Figure6(b)lists each node’s contact probability with others in the network.If the centrality metric is based on the Cumulative Contacting Probability(CCP)[5],the CCP of node A is1+1+0.7+0.6+0.3+0.2=3.8,the CCP of node B is1+1+0.1+0.1+0.6+0.5=3.3,and the CCP of node C is1+1+0.5+0.6+0.1+0.1=3.3.If C originally carries the data,A will receive one data copy since it has the highest centrality.However,nodes A and C have similar contact probabilities to other nodes B,D, E,F and G;i.e.,they both have high contact probabilities with B,D and E,and low contact probabilities with F and G.Thus,keeping data copies at A and C may not help too much since their contact capabilities to other nodes have a large“overlap”.To deal with this problem,it is better to choose A and B as data carriers,because B has high contact probabilities to F and G,which is complement to A.Even though B and C have the same CCP centrality,using A and B as data carriers is better than using A and C.Thus,we propose an enhanced TCC-aware data forwarding strategy,where data carriers are selected to maximize the data forwarding opportunity.Different from the previous TCC-aware data forwarding strategy,which selects the highest centrality node as the data carrier,we select a set of nodes as data carriers which can maximize the data forwarding opportunity.2)Set Centrality:Wefirst define the concept of set centrality to quantify the data forwarding capability of a set of nodes.Given that a data item is created at time0,and expires at time T,the set centrality of a node set S at time t is defined as follows:Definition1.The set centrality of a node set S at time t<T is defined as the summation of their overall probability to contact each of the remaining nodes in N\S before time T.C S(t)= i∈N\S(1− j∈S(1−p ji(T−t)))(5)where N is the set of nodes in the network,and p ji(T−t) is the probability that node j will contact node i within time T−t.Assume symmetric contacts between nodes i and j,and then we have p ij(T−t)=p ji(T−t).Since the inter-contact time between node i and node j has been experimentally validated in[5]to follow an exponential distribution with rate parameterλij,the probability that the two nodes will contact before T can be calculated as:p ij(T−t)=p ji(T−t)=1−e−λij(T−t)(6) 3)Selecting the Optimal Set of Data Carriers:We as-sume that there are k data copies carried by nodes in a TCC(denoted as M),where k<|M|.Our objective is to choose an optimal node set S∗of size k with the highest set centrality,where S∗⊂M.Nodes in the optimal node set S∗will be the new data carriers for the k data copies. The detection of the optimal node set S∗can be formalized as an optimization problem:max i∈N(1−x i)(1− j∈N(1−x j·p ji(T−t)))(7) s.t.x i∈{0,1},∀i∈M(8)x i=0,∀i∈N\M(9)i∈M x i=k(10)where x i∈{0,1}indicates whether the node i is selected to the optimal node set S∗.Formula(7)maximizes the set centrality of the selected nodes.Since S∗is selected1:M A←the set of nodes in A’s original TCC2:M B←the set of nodes in B’s original TCC3:if M A=M B then4:Do NOTHING/*A,B are already in the same TCC*/ 5:else/*Forwarding decision inside the TCC will be made centrally at a command node C,which is chosen from A,B.*/6:if|M A|≤|M B|then7:C←B8:else9:C←A10:end if/*C will identify the nodes inside the new TCC and the data items carried by them,and make the forwarding decision.*/ 11:M←M A M B12:D←the set of unique data items in the new TCC13:for each data item d∈D do14:if M includes d’s destination then15:d is forwarded to d’s destination16:Go to next data item17:end if18:k d←number of copies of d in M19:H d←node with the highest centrality20:if H d does not have d then21:k d←k d+1/*Add one extra data copy*/ 22:end if23:S∗←the optimal set of k d nodes/*Decide S∗as discussed in Section III-B3.*//*Nodes in S∗will be new carries of data item d.*/ 24:Data are forwarded from old carriers to nodes in S∗25:end for26:end if(a)Social Evolution (b)Friends &Family(c)Reality Mining (d)Infocom(e)UCSDFigure 7.Comparisons based on data delivery ratio under different time constraints.(a)Social Evolution(b)Friends &Family (c)Reality Mining (d)Infocom (e)UCSDFigure 8.Comparisons based on the number of data copies (overhead)created under different time constraints.simulation results in detail by first comparing our TCC-aware data forwarding strategies with Compare-and-Forward and R3,and then comparing these two TCC-aware data forwarding strategies.1)Comparisons with Compare-and-Forward:As shown in Figure 7and Figure 8,both TCC and Enhanced TCC have better performance than Compare-and-Forward,with higher data delivery ratio and lower network overhead.Specif-ically,the TCC-aware data forwarding strategies achieve 10%−40%higher delivery ratio than Compare-and-Forward in all five traces.This is because by utilizing the contact opportunities inside TCCs,nodes have higher probabilities to forward data to the destination.Moreover,the TCC-aware data forwarding strategies consume 15%−50%less network overhead than Compare-and-Forward.The decrease in network overhead is because there is at most one data copy created when a new TCC is formed.However,in Compare-and-Forward,data copies can be created upon every contact.These results demonstrate the effectiveness of TCC-aware data forwarding strategies when compared with strategies designed for opportunistic networks.2)Comparisons with R3:To compare with R3[20],we set the number of data copies (paths)to be 5(R3-5copies)in R3.As shown in Figure 7,the data delivery ratio for R3with 5copies is about 50%less than that of TCC and Enhanced TCC.We also test R3with 10copies and 20copies,and find that the delivery ratio does not increase much as the number of data copies increases.This observation is consistent with the results in [20],which also found that the performance does not increase much as the number of data copies is larger.The reason for R3’s low delivery ratio is that R3is based on source routing,andsource routing is extremely time-consuming when utilized in networks with opportunistic feature.MSNs with diverse connectivity characteristics have the opportunistic feature,because nodes contact opportunistically outside of TCCs.3)Comparisons between the TCC-aware data forwarding strategies:From Figure 7and Figure 8,we can also see that Enhanced TCC consumes less overhead than TCC but achieves similar delivery ratio.This is because,in the enhanced strategy,data copies can be forwarded from the original data carriers to a set of nodes with the highest set centrality;i.e.,more effective nodes are selected as data carriers.By choosing a small number of effective nodes to carry data,the enhanced strategy requires less data carriers than the original strategy.Therefore,the number of data copies can be decreased with Enhanced TCC.V.R ELATED W ORKData forwarding algorithms designed for opportunistic networks are commonly used to forward data in MSNs,and most of them are based on Epidemic [19],where data is flooded upon contacts with other ter solutions attempt to reduce the number of data copies created by Epidemic,and these strategies are known as controlled flood-ing [21].For example,Compare-and-Forward is commonly used to control the data copies created,and the data carrier only forwards data to another node with higher forwarding metric.The forwarding metric measures node’s capability of forwarding data to the destination.In some research,the forwarding metrics are determined based on node’s contact probability with the destination,such as PROPHET [2]and MaxProp [22].By further aggregating the networks to social graphs [23],social properties of mobile nodes are analyzed.Based on this,node centrality[16][18][24]or community based solutions[25][26][27][28]are used as forwarding met-rics.However,these strategies are designed for opportunistic networks,and they are not the best solutions for MSNs with diverse connectivity characteristics,since they neglect the multi-hop communication opportunities inside TCCs.Phe-Neau et al.considered the multi-hop communication opportunities around a node’s vicinity in[29].However, in their approach,multi-hop communication opportunities around a node are only utilized when the destination of the data is within the node’s vicinity,which is basically a W AIT strategy and then it does not contain mechanisms to make the data reach more nodes and get closer to the destination. The work by Tie et al.[20]considered data forwarding in networks with diverse connectivity characteristics;however, their solution is different from ours and they do not consider the effects of TCCs.They identified packet replication to be the key difference between protocols designed for well-connected networks and sparsely-connected networks,and designed a routing protocol called R3,which determines the number of data copies to be created based on the predicted delays along network paths.R3is based on source routing;i.e.,data copies are forwarded along the pre-determined forwarding path.However,protocols based on source routing are not suitable for networks with opportunistic features, because it is extremely time-consuming to forward data along the pre-determined paths.Moreover,R3does not consider the effects of TCCs on data forwarding,which is the key contribution of our work.Other existing algorithms try to modify well-known MANET protocols to make them more adaptive to net-works with diverse connectivity characteristics.For example, Raffelsberger et al.[30]integrated store-and-forward to MANET protocols.In MANET protocols,a data item is dropped when the routing table does not contain an entry for the destination.With store-and-forward,data is buffered until a route to the destination can be found using MANET protocols.However,their solution lacks a mechanism to choose effective data carriers to deliver data to destination. There exists some work on analyzing TCCs.For ex-ample,[31]demonstrated the size of the giant connected components changes over time.[13][14][15]proved that the property of connected component is closely related with the distribution of node degree.However,they did not examine the detailed structure of TCCs using real traces, and did not consider how to use them to increase the contact opportunities and improve the performance of data forwarding,which is the focus of our work.VI.C ONCLUSIONSIn this paper,we designed efficient data forwarding s-trategies for MSNs with diverse connectivity characteristics, by exploiting the existence of TCCs.Wefirst identified the existence of TCCs and analyzed their properties based on five traces.By treating multi-hop wireless communications inside TCCs as indirect contacts,through theoretical analy-ses,we showed that the contact opportunities can be signifi-cantly increased in all traces.Based on this observation,we designed a TCC-aware data forwarding strategy to improve the performance of data forwarding in MSNs.Then,we enhanced the TCC-aware data forwarding by selecting an optimal set of nodes in the TCC to avoid overlap in their contacts and maximize the data forwarding opportunity with a small number of nodes.Trace-driven simulations showed that our TCC-aware data forwarding strategies outperform existing data forwarding strategies with less network over-head.R EFERENCES[1]S.Ioannidis,A.Chaintreau,and L.Massouli´e,“Optimal and scalabledistribution of content updates over a mobile social network,”in INFOCOM2009,IEEE.IEEE,2009,pp.1422–1430.[2] A.Lindgren, A.Doria,and O.Schel´e n,“Probabilistic routing inintermittently connected networks,”ACM SIGMOBILE CCR,vol.7, no.3,pp.19–20,2003.[3] E.Daly and M.Haahr,“Social network analysis for routing indisconnected delay-tolerant manets,”in Proc.ACM MobiHoc.ACM, 2007,pp.32–40.[4]Y.Zhang and G.Cao,“V-pada:Vehicle-platoon-aware data access invanets,”Vehicular Technology,IEEE Transactions on,vol.60,no.5, pp.2326–2339,2011.[5]W.Gao,Q.Li,B.Zhao,and G.Cao,“Multicasting in delay tolerantnetworks:a social network perspective,”in Pro ACM MobiHoc.ACM,2009,pp.299–308.[6] A.Madan,M.Cebrian,S.Moturu,K.Farrahi,and A.Pentland,“Sensing the health state of a community,”Pervasive Computing, vol.11,no.4,pp.36–45,2012.[7]N.Aharony,W.Pan, C.Ip,I.Khayal,and A.Pentland,“Socialfmri:Investigating and shaping social mechanisms in the real world,”Pervasive and Mobile Computing,vol.7,no.6,pp.643–659,2011.[8]N.Eagle and A.Pentland,“Reality mining:sensing complex socialsystems,”Personal and Ubiquitous Computing,vol.10,no.4,pp.255–268,2006.[9] A.Chaintreau,P.Hui,J.Crowcroft,C.Diot,R.Gass,and J.Scott,“Impact of human mobility on opportunistic forwarding algorithms,”Mobile Computing,IEEE Transactions on,vol.6,no.6,pp.606–620, 2007.[10]M.McNett and G.V oelker,“Access and mobility of wireless pdausers,”ACM SIGMOBILE CCR,vol.9,no.2,pp.40–55,2005. [11]˚A.Bj¨o rck,Numerical methods for least squares problems.Siam,1996.[12]T.Spyropoulos,K.Psounis,and C.Raghavendra,“Spray and wait:an efficient routing scheme for intermittently connected mobile net-works,”in Proceedings of the2005ACM SIGCOMM workshop on Delay-tolerant networking.ACM,2005,pp.252–259.[13]M.Molloy and B.Reed,“The size of the giant component of a randomgraph with a given degree sequence,”Combinatorics probability and computing,vol.7,no.3,pp.295–305,1998.[14]W.Aiello,F.Chung,and L.Lu,“A random graph model for powerlaw graphs,”Experimental Mathematics,vol.10,no.1,pp.53–66, 2001.[15]M. E.J.Newman,“2random graphs as models of networks,”Handbook of graphs and networks,p.35,2003.[16]P.Hui,J.Crowcroft,and E.Yoneki,“Bubble rap:Social-basedforwarding in delay-tolerant networks,”IEEE Transactions on Mobile Computing,vol.10,no.11,pp.1576–1589,2011.。
通信工程专业英语教案
Ancient systems and optical telegraphy
Early telecommunications included smoke signals and drums. Talking drums1 were used by natives in Africa, New Guinea and South America, and smoke signals in North America and China. Contrary to what one might think, these systems were often used to do more than merely announce the presence of a military camp.
Telephone
The electric telephone was invented in the 1870s; it was based on earlier work with harmonic (multi-signal) telegraphs. The first commercial telephone services were set up in 1878 and 1879 on both sides of the Atlantic in the cities of New Haven and London. Alexander Graham Bell held the master patent for the telephone that was needed for such services in both countries. All other patents for electric telephone devices and features flowed from this master patent.
三级英语关于电子邮件的作文
三级英语关于电子邮件的作文Here is an English essay on the topic of electronic mail, with over 1,000 words in the body of the text. The title is not included in the word count.Electronic Mail: The Ubiquitous Communication Tool of the Modern AgeIn the rapidly evolving digital landscape of the 21st century electronic mail or email has firmly established itself as the preeminent mode of communication in both our personal and professional lives Electronic mail has become so ingrained in our daily routines that it is difficult to imagine a world without this ubiquitous communication tool Email has revolutionized the way we share information exchange ideas and conduct business across the globe Its convenience efficiency and versatility have made email an indispensable part of modern lifeThe origins of email can be traced back to the 1960s when the first electronic messaging systems were developed for mainframe computers However it was not until the 1990s that email truly gained widespread adoption with the rise of personal computers and theinternet As the internet became more accessible to the general public email emerged as the primary means of digital communication enabling people to send and receive messages instantly across vast distances This rapid proliferation of email was further accelerated by the increasing accessibility of mobile devices such as smartphones and tablets which allowed users to stay connected and responsive to their inboxes at all timesOne of the primary advantages of email is its unparalleled convenience Email allows users to communicate efficiently and effectively without the need for synchronous interaction as is the case with telephone calls or face-to-face meetings Users can compose messages at their own pace and send them to recipients who can then access and respond to them at their convenience This asynchronous nature of email communication is particularly beneficial in situations where immediate responses are not required or where participants are located in different time zones or have conflicting schedules Furthermore email provides a written record of all communications which can be easily stored referenced and retrieved as needed This documentation aspect of email is invaluable in professional settings where accountability and traceability are crucialIn addition to its convenience email also offers a high degree of flexibility and versatility Email can be used to transmit a wide rangeof content including text documents spreadsheets images audio and video files enabling seamless collaboration and information sharing across various mediums Furthermore email can be integrated with a variety of other digital tools and platforms such as calendars task managers and cloud storage services further enhancing its utility and functionality This flexibility and integration with other technologies have made email an indispensable tool for both personal and professional communicationAnother significant advantage of email is its cost-effectiveness Compared to traditional forms of communication such as postal mail or long-distance telephone calls email is significantly more affordable and accessible to users around the world This cost-effectiveness has been a major driver of email's widespread adoption particularly in developing regions where access to other communication technologies may be limited Email has democratized communication by providing a low-cost alternative that is available to individuals and organizations regardless of their geographical location or financial resourcesDespite its many advantages email is not without its drawbacks One of the primary issues with email is the potential for information overload As users receive an ever-increasing number of messages on a daily basis it can become challenging to keep up with the volume and prioritize the most important communications This informationoverload can lead to decreased productivity and increased stress as users struggle to manage their inboxes Additionally email can be vulnerable to security breaches and cyber attacks such as phishing scams and malware distribution which can compromise the confidentiality and integrity of sensitive informationAnother concern with email is the potential for miscommunication or misunderstandings due to the lack of nonverbal cues and tone of voice that are present in face-to-face interactions Email messages can be interpreted differently by recipients leading to confusion misunderstandings and even conflicts Furthermore the asynchronous nature of email can sometimes result in delayed responses or a lack of immediate feedback which can hinder effective communication and decision-makingDespite these challenges email remains an indispensable tool for communication in the modern age As technology continues to evolve it is likely that email will continue to play a central role in our personal and professional lives However as we become increasingly reliant on email it is important to develop strategies and best practices to mitigate its drawbacks and ensure that it is used effectively and responsiblyIn conclusion email has revolutionized the way we communicate in the digital age Its convenience efficiency and versatility have made itan indispensable tool for individuals and organizations around the world While email is not without its challenges such as information overload and potential security risks its advantages have firmly established it as the ubiquitous communication tool of the modern age As we navigate the ever-changing landscape of digital communication it is essential that we continue to leverage the power of email while also being mindful of its limitations and potential pitfalls。
电子邮件与传统信件英语作文
电子邮件与传统信件英语作文Electronic Mail vs. Traditional MailIn the modern era, electronic communication has become ubiquitous, revolutionizing the way we exchange information and stay connected. One of the most prevalent forms of digital communication is electronic mail, commonly known as email. Compared to the traditional postal mail system, email offers a multitude of advantages that have transformed the way we communicate in both personal and professional settings.One of the primary benefits of email is its speed and efficiency. With the click of a button, messages can be delivered instantaneously, regardless of the geographic distance between the sender and the recipient. This rapid transmission allows for real-time communication and the ability to respond to inquiries or share information quickly.In contrast, traditional mail can take days or even weeks to reach its destination, making it a much slower method of communication.Moreover, email provides a more convenient and accessible meansof communication. Users can compose, send, and receive messages from virtually anywhere, as long as they have access to a computeror a mobile device with an internet connection. This flexibility allows individuals to stay connected and productive even when they are on the go or working remotely. Traditional mail, on the other hand, requires the physical presence of the sender and the recipient, as well as the availability of postal services, which can be limited in certain areas or during specific times of the year.Another significant advantage of email is its cost-effectiveness. Sending an email is generally free or incurs minimal costs, making it a more affordable option compared to the expenses associated with traditional mail, such as postage, envelopes, and the transportation of physical letters. This cost-saving aspect is particularly beneficial for individuals or organizations with limited budgets or those who need to communicate frequently.Furthermore, email provides a more environmentally friendly alternative to traditional mail. The digital nature of email eliminates the need for paper, reducing the environmental impact associated with the production, transportation, and disposal of physical letters. This aligns with the growing global emphasis on sustainability and the reduction of waste.In addition to these practical benefits, email also offers enhanced organizational and record-keeping capabilities. Emails can be easily stored, searched, and retrieved, allowing users to maintain acomprehensive digital archive of their communications. This can be particularly useful for professional purposes, such as tracking project discussions, documenting important decisions, or referencing past interactions. In contrast, physical letters can be more challenging to organize and retrieve, especially when dealing with large volumes of correspondence.However, it is important to acknowledge that traditional mail still has its own unique advantages. For instance, the tangible nature of physical letters can convey a sense of personal connection and thoughtfulness that may be lacking in electronic communication. The act of handwriting a letter and physically mailing it can be seen as a more meaningful gesture, particularly in certain cultural contexts or for special occasions.Moreover, traditional mail can be more secure in certain situations, as it is less susceptible to digital security breaches or cyber threats, such as hacking or phishing attempts. This can be particularly relevant for sensitive or confidential information that requires a higher level of privacy and protection.In conclusion, while electronic mail has undoubtedly transformed the way we communicate, both email and traditional mail have their own distinct advantages and disadvantages. The choice between the two often depends on the specific needs, preferences, and circumstancesof the individual or organization. As technology continues to evolve, it is likely that the interplay between these two modes of communication will continue to evolve, with both coexisting and complementing each other in the years to come.。
IEEE Communications Letters据搞重投回复信
Dear Dr. Zhou and reviewers, Thank you for your time and effort put in reviewing our manuscript. We also thank you for your detailed remarks that helped us to improve the quality of this paper. In the following, we address your concerns in the order that they are mentioned. Best Wishes, Authors
Replies to additional comments from the Editor: Comment: All reviewers have shown concerns on the key assumptions used in the network model. Specifically, the so-called "separation architecture" seems to be a questionable model and it has not been properly explained. The user association model is unclear. This leads to questions on the method used for computing the rate performance. The defined metric, ASR, should be approached from the viewpoint of the network instead of a single cell. Therefore, the correct way of computing ASR may give different results compared with the ones obtained in the current paper. Given these major issues, I am unable to recommend its publication in IEEE Communications Letters. Answer: Thank you very much for your comment. The separation architecture proposed by some researchers decouples the connections of control plane and data plane of users. Compared with the conventional architecture, there are two main differences: 1) The control information and data transmission no longer need to be provided by the same BSs. Firstly, to guarantee the ubiquitous coverage in control plane, the crucial control information of all users are transmitted by the macro BSs (MBSs), which have higher transmit power and larger coverage areas. Secondly, for high-rate data transmission in data plane, the low-mobility users’ data transmission are provided by the small cell BSs (SBSs), which are deployed densely to boost the localized capacity. However, for the high-mobility users, in order to reduce the overhead and delay potentially caused by frequent handover among SBSs, the high-mobility users’ data transmission are still provided by the MBSs. 2) The users association is decoupled in control plane and data plane. Due to the separation of the control plane and data plane, the user association scheme is different from the conventional architecture. For the low-mobility users, the user association in control plane and data plane are different. In control plane, each low-mobility user is associated with the nearest MBS. In data plane, each low-mobility user is associated with the nearest SBSs. However, for the high-mobility user, the user association in control plane and data plane are the same, i.e., each high-mobility user is associated with the nearest MBSs. The above two differences make the analysis and optimization different from the conventional twotier network:
远程教育学期末复习知识点整理
远程教育学期末复习知识点整理P321远程教育学是教育学的一门相对独立地的新兴分支学科,是研究远程教育这一新兴教育形态的现象、规律和本质,探讨作为方式或方法的远程教育在人类教育和培训体系中的地位、作用、原理、方法和特点的学问。
远程教育学的研究对象是远程教育,即将远程教育这一社会历史现象的各个方面作为研究客体,探讨这类新型教育形态的发生和发展的内在规律及其丰富的表现形式。
模块1 远程教育的发展与展望(1.1,9.4,9.5)1.远程教育起源于函授教育 (Correspondence Education)函授教育:利用印刷教材和通信指导的方式进行教学。
函授教育发源于19C中叶的英国。
函授教育的始祖:英.伊萨克·皮特曼(Isaac Pitman)2.划分远程教育发展阶段的主要依据:媒体(媒体的变化).国际上关于DE发展阶段的两个主要流派:三代信息技术和三代远程教育分期表(丁兴富);五代信息技术和五代远程教育(泰勒)3.三代信息技术与三代远程教育:第一代信息技术以印刷技术(Print Technology)和邮件通信(Post Communications)为主,对应第一代函授(Conrrespondence)教育第二代信息技术以大众媒介(Mass Media)和视听技术(Audio-Visual Technology)为主,对应第二代多媒体教学(Multi-Media)的开放远程教育(Open and Distance Education)第三代信息技术以电子信息通信技术(EICTs: Electronic Information Communication Technologies )为主,以计算机多媒体(Multimedia)和互联网(Internet)为主要代表,对应大三代网络远程教育(NetworkedTele-education),或直接成为电子/网络教育E-education)、电子/网络学习E-learning)、网络/在线学习(Online Learning) 4.现代信息技术是远程教育发展的物质技术基础,远程教育则是实现终身教育和终身学习理想的实现途径。
通信网基本概念与主体结构(第二版)答案Ch2
Solutions to Chapter 2 (Note: solution to Problem 62 to be added)1. Explain how the notion of layering and internetworking make the rapid growth of applications such as the World Wide Web possible.Solution:Internetworking allows many component networks each with different underlying technology and operation to work together and form one large network. As new network technologies are introduced they can be readily incorporated into the Internet. This provides the ubiquitous connectivity for applications like WWW.The layering concept hides the specific underlying network technology from the upper layers and provides a common networking platform. Using the communication service provided by the layers below, new applications can be introduced independently and at a rapid rate.2. (a) What universal set of communication services is provided by TCP/IP?Solution:The TCP/IP protocol stack provides two basic types of communications services through its two transport layer protocols: TCP provides reliable connection-oriented transfer of a byte stream; UDP provides for best-effort connectionless transfer of individual messages. TCP/IP provides withglobally unique logical addressing that enables machines connected to the Internet to access these two services. The IP addressing scheme is very scalable because of its hierarchical structure.2. (b)How is independence from underlying network technologies achieved?Solution:The two basic communications services provided by TCP and UDP are built on the connectionless packet transfer service provided by the Internet Protocol (IP). Many network interfaces are defined tosupport IP. The salient part of the above figure is that all of the higher layer protocols access the network interfaces through IP. This is what provides the ability to operate over multiple networks.2. (c) What economies of scale result from (a) and (b)?Solution:Once a network interface for IP is defined for a given network technology, then hosts connected using the given network technology can connect to the Internet. This allows the reach of the Internet to grow rapidly, leveraging multiple coexisting networks technologies. Thus investment in new network technologies extends the reach of the Internet.3. What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service?Solution:If the data link layer provides a connection-oriented service to the network layer, then the network layer must precede all transfer of information with a connection setup procedure. If the connection-oriented service includes assurances that frames of information are transferred correctly and insequence by the data link layer, the network layer can then assume that the packets it sends to its neighbor traverse an error-free pipe.On the other hand, if the data link layer is connectionless, then each frame is sent independently through the data link, probably in unconfirmed manner (without acknowledgments orretransmissions). In this case the network layer cannot make assumptions about the sequencing or correctness of the packets it exchanges with its neighbors.The Ethernet local area network provides an example of connectionless transfer of data link frames.The transfer of frames using "Type 2" service in Logical Link Control (discussed in Chapter 6)provides a connection-oriented data link control example.4. Suppose transmission channels become virtually error-free. Is the data link layer still needed?Solution:The data link layer is still needed for framing the data and for flow control over the transmissionchannel. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users.5. Why is the transport layer not present inside the network?Solution:Some of the functions provided by the transport layer can be provided inside the networks, but other functions cannot. For example, the transport layer provides functions at the end-system tocompensate for the limitations and impairments of the network layer, in order to meet requirements(e.g. QoS) of the upper layer. For example in TCP/IP, IP provides only best effort service. To providethe reliable service required by some applications - that is, to compensate for the shortcomings of best effort service - TCP establishes connections and implements error control on an end-to-end basis. One can imagine that a service provider could incorporate this error control function at the edge of its network. On the other hand, one of the main purposes of the transport layer is to allow multiple processes in the end systems to share a network service. This cannot be achieved inside the network.6. Which OSI layer is responsible for the following?(a)Determining the best path to route packets.The network layer is concerned with the selection of paths across the network.(b)Providing end-to-end communications with reliable service.The transport layer is concerned with providing reliable service on an end-to-end basis across the network.(c)Providing node-to-node communications with reliable service.The data link layer provides for the reliable transfer of information between adjacent nodes in anetwork.7. Should connection establishment be a confirmed service or an unconfirmed service? What about data transfer in a connection-oriented service? Connection release?Solution:In general, the establishment of a connection needs to be confirmed before information transfer can commence across a connection. Therefore connection establishment should be a confirmed service.A connection-oriented service is usually reliable so confirmation of data delivery is not necessary. Incertain situations, however, it is possible that the transfer across a connection is not reliable; in this case confirmation of correct data transfer may be required.In general it is desirable that the release of a connection be confirmed by the parties involved. We will see in Chapter 8, section 5, that sometimes it is not easy to confirm that a connection has beenclosed. Consequently, many protocols attempt to confirm the closing of a connection several times, and then give up and simply stop transmitting.8. Does it make sense for a network to provide a confirmed, connectionless packet transfer service?Solution:Yes. Connectionless packet transfer is often unreliable, that is, packets may be lost or discarded inside a network. Certain applications, for example, signaling in connection setup, requireconfirmation to acknowledge the receipt of packets.9. Explain how the notion of multiplexing can be applied at the data link, network, and transport layers. Draw afigure that shows the flow of PDUs in each multiplexing scheme.Solution:Transport Layer: Multiple application layers processes can share the service provided by UDP.When a UDP PDU arrives from the network layer, the destination port number in the PDU is used to deliver the SDU to the appropriate application layer process. Multiple application layer processes also share the service provided by TCP. In this case, when a TCP segment arrives, the TCPconnection ID, consisting of (source port #, source IP address, destination port #, destination IP address), is used to determine which application process to deliver the SDU to.Network Layer: The packet transfer service provided by IP can be used by all transport layersoperating in a machine. Each transfer layer passes SDUs to the IP layer which prepares IP packets with appropriate source and destination IP addresses for transfer across the Internet. Upon receiving an IP packet, a machine examines the protocol type field to determine which transport layer service to deliver the SDU to. We can also view all transport layer PDUs as sharing the IP packet transfer service between a source machine and a destination machine.Data Link Layer: Network layer packets from different protocols (IP, IPX, Appletalk, etc) can share a data link (such as PPP or Ethernet). We can also view packet flows that traverse a data linkbetween two routers as sharing the link.10. Give two features that the data link layer and transport layer have in common. Give two features in which they differ. Hint: Compare what can go wrong to the PDUs that are handled by these layers.Solution:Features they have in common:•Both layers can provide recovery from transmission errors.•Both layers can provide flow control.•Both layers can support multiplexing.Features in which they differ:•The transport layer is end to end and involves the interaction of peer processes across the network. The data link layer involves the interaction of peer-to-peer processes that areconnected directly. In general, the time that elapses in traversing a data link is much smaller than the time traversing a network, where packets can become trapped in temporary routing loops.Consequently, transport layer protocols must be able to deal with out-of-sequence PDUs and amuch larger backlog of PDUs than data link layers.•The data link layer is concerned with framing and the transport layer is not.•The data link layer may be concerned with medium access control, the transport layer does not have this concern.11(a). Can a connection-oriented, reliable message transfer service be provided across a connectionless packet network? Explain.Solution:Yes. To provide a connection-oriented service, the transport layer can establish a logical connection across the connectionless packet network by setting up state information (for example, packetsequence number) at the end systems. During the connection setup, the message is broken into separate packets, and each packet is assigned a sequence number.Using the sequence numbers, the end-system transport-layer entities can acknowledge received packets, determine and retransmit lost packets, delete duplicate packets, and rearrange out-of-order packets. The original message is reassembled as packets arrive at the receiving end.For example, TCP provides a connection-oriented reliable transfer service over IP, a connectionless packet transfer service.11b. Can a connectionless datagram transfer service be provided across a connection-oriented network?Solution:Yes. The connectionless datagram transfer service can be implemented by simply setting up aconnection across the network each time a datagram needs to be transferred. Alternatively, all nodes can have permanent connections to a “connectionless server” that has the function of relayingdatagrams in connectionless fashion.12. An internet path between two hosts involves a hop across network A, a packet-switching network, to a router and then another hop across packet-switching network B. Suppose that packet switching network A carries the packet between the first host and the router over a two-hop path involving one intermediate packet switch. Suppose also that the second network is an Ethernet LAN. Sketch the sequence of IP and non-IP packets and frames that are generated as an IP packet goes from host 1 to host 2.Solution:The IP layer in Host 1 generates an IP packet addressed to the destination host on the destination network and sends it to the router. The network interface in the host encapsulates the IP packet into the packet PDU used by network A. This packet is encapsulated in a frame that traverses data link 1 to the packet switch. The packet is recovered and then forwarded inside a frame along data link 2.The data link at the router recovers the Network A packet, and the IP network interface at the router recovers the IP packet and determines that the next hop is on Network B. The router encapsulates the IP packet into an Ethernet frame, puts the host 2 Ethernet physical address in the frame and sends it to the LAN. The Ethernet card on the host captures the frame and extracts the IP packet and passes it to the host.13. Does Ethernet provide connection-oriented or connectionless service?Solution:Ethernet provides connectionless transfer service of information frames.14. Ethernet is a LAN so it is placed in the data link layer of the OSI reference model.(a)How is the transfer of frames in Ethernet similar to the transfer of frames across a wire? How is itdifferent?The transfer of frames in Ethernet occurs directly over a transmission medium and in this sense is similar to direct transmission over a wire. The sequence of frames into Ethernet arrive in thesame order they are transmitted. However multiple stations can transmit in Ethernet which differs from direct transmission over a wire.(b)How is the transfer of frames in Ethernet similar to the transfer of frames in a packet-switching network?How is it different?Ethernet supports the transfer of frames among multiple end systems and in this sense is similar to a packet switching network. Ethernet does not involve routing which is a feature of packetswitching. Ethernet depends on broadcasting and/or bridging which differs from packet networks.15. Suppose that a group of workstations is connected to an Ethernet LAN. If the workstations communicate only with each other, does it make sense to use IP in the workstations? Should the workstations run TCP directly over Ethernet? How is addressing handled?Solution:Ethernet supports the exchange of frames between stations and can support the direct exchange of information. Using Ethernet without IP would result in an inflexible and difficult to managesystem. Ethernet addresses are fixed and tables need to be changed whenever a machine ismoved, while IP addresses are logical and can be changed whenever a machine is moved. ATCP connection uses the IP addresses in its connection ID so Ethernet addresses could not beused.16. Suppose two Ethernet LANs are interconnected by a box that operates as follows. The box has a table that tells it the physical addresses of the machines in each LAN. The box listens to frame transmissions on each LAN. If a frame is destined to a station at the other LAN, the box retransmits the frame onto the other LAN, otherwise the box does nothing.Solutions follow questions:a.Is the resulting network still a LAN? Does it belong in the data link layer or the network layer?The resulting network is a local area network that has been extended. The extended LAN transfers frames, and so it still belongs in the data link layer.b.Can the approach be extended to connect more than two LANs? If so, what problems arise as the number ofLANs becomes large?Yes, more than two LANs can be connected using the above approach to form an extended LAN. As the number of LANs becomes large, the number of physical addresses stored in the bridge grows and becomes unmanageable. Each time a machine is added the addresses in all the boxes need to be updated. Serious problems arise if boxes are connected so that loops can occur.17. Suppose all laptops in a large city are to communicate using radio transmissions from a high antenna tower. Is the data link layer or network layer more appropriate for this situation?Solution:The data link layer is concerned with the transfer of frames of information across a single hop. The network layer involves the transfer of information across a network using multiple hops per path in general. The connection from a radio antenna to the laptops is direct, and thus a data link layerprotocol is more suitable for this situation.Now suppose the city is covered by a large number of small antennas covering smaller areas. Which layer is more appropriate?A number of areas each covered by small antennas can be interconnected using the "bridging"approach of problem 16, which remains in the data link layer. However, the network layer may be more appropriate because it provides for the transfer of data in the form of packets across thecommunication network. A key aspect of this transfer is the routing of the packets from the source machine to the destination machine, typically traversing a number of transmission link and network nodes where routing is carried out.18. Suppose that a host is connected to a connection-oriented packet-switching network and that it transmits a packet to a server along a path that traverses two packet switches. Suppose that each hop in the path involves a point-to-point link, that is, a wire. Show the sequence of network layer and data link layer PDUs that are generated as the packet travels from the host to the server.Solution:Assume that a network connection has already been set up between the host machine and thenetwork machine. When the host generates an IP packet for transfer to the server, the IP packet will be transferred using the network connection as follows.•The IP packet is encapsulated into a network packet that has a connection ID in its header.The packet may then be encapsulated into a frame that traverses data link 1 and arrives atswitch 1.•The network packet is recovered from the data link 1 frame. The connection ID in the packet is used to determine the outgoing port from switch 1. The connection ID may need to bemapped into a corresponding connection ID over data link 2. The packet is encapsulated intoa frame that traverses data link 2.•The network packet is recovered from the data link 2 frame. The connection ID in the packet determines the outgoing port from switch 1 and the next connection ID. The packet isencapsulated into a frame that traverses data link 3.•The network packet is recovered from the data link 3 frame. The connection ID in the arriving packet indicates that this is the destination node. The IP packet is recovered.The connection-oriented network in this example could correspond to ATM or to frame relay.19. Suppose an application layer entity wants to send an L-byte message to its peer process, using an existing TCP connection. The TCP segment consists of the message plus 20 bytes of header. The segment is encapsulated into an IP packet that has an additional 20 bytes of header. The IP packet in turn goes inside an Ethernet frame that has 18 bytes of header and trailer. What percentage of the transmitted bits in the physical layer correspond to message information, if L = 100 bytes, 500 bytes, 1000 bytes?Solution:TCP/IP over Ethernet allows data frames with a payload size up to 1460 bytes. Therefore, L = 100, 500 and 1000 bytes are within this limit.The message overhead includes:•TCP: 20 bytes of header•IP: 20 bytes of header•Ethernet: total 18 bytes of header and trailer.ThereforeL = 100 bytes, 100/158 = 63% efficiency.L = 500 bytes, 500/558 = 90% efficiency.L = 1000 bytes, 1000/1058 = 95% efficiency.20. Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the amount of overhead incurred from segmenting the file into packet-sized units.Solution:1500 - 20 -20 = 1460 bytes1.5 Mbyte / 1460 byte = 1027.4, therefore 1028 blocks are needed to transfer the file.Overhead = ((1028 x 1500 - 1.5M)/1.5M) x 100 = 2.8%21. Suppose a TCP entity receives a digital voice stream from the application layer. The voice stream arrives at a rate of 8000 bytes/second. Suppose that TCP arranges bytes into block sizes that result in a total TCP and IP header overhead of 50 percent. How much delay is incurred by the first byte in each block?Solution:Assume the stream is segmented as shown below, where the white cells represent data and the shaded cells represent the TCP header overhead.Therefore, block size = 80 bytes and the payload size = 40 bytes.Assume zero processing delay due to data arrangement and segmenting.The delay incurred by the first byte of each block = 40/8000 = 0.5 ms.22. How does the network layer in a connection-oriented packet-switching network differ from the network layer ina connectionless packet-switching network?Solution:The network layer in connection-oriented networks maintains state information about everyconnection. It can allocate resources at the switches through admission control. The network layer in connectionless networks has no knowledge of "connections", and instead deals independently with each packet.The network layer in connection-oriented networks performs routing on a per connection basis. Each packet is routed based on a connection identifier of some sort and packets of the same connection have the same identifier value. In a connectionless network, routing is performed on per packet basis;each packet is routed independently based on information carried in the packet header, for example, the destination address.In connection-oriented networks, the network layer forwarding table is set up by a signaling procedure during the connection establishment. In connectionless networks, the routers may execute adistributed algorithm to share network state information and dynamically calculate the routing table continuously.In case of failure, the connection must be re-established in connection-oriented networks, whereas in connectionless networks, the packets are re-routed. The network layer in connectionless networks is more robust against failures.Summary of differences:Connection-oriented Connectionless Maintain state information about every connection No knowledge of the "connection"Allocate resources to connections at switches No resource allocationAdmission control No admission controlPer connection routing Per packet routingRoute packet based on identifier Route packet based on destination address.Forwarding table specifies the output port and outgoing identifier value as function of the incoming identifier value Routing table specifies the output port depending on the destination addressForwarding table set up by signaling during connection establishment.Router executes distributed algorithm to share network state information and dynamically calculate the routing tableConnection must be re-established in cases of failure Packets are rerouted around failures, robust against failures23. Identify session layer and presentation layer functions in the HTTP protocol.Solution:Presentation layer functions:The request message and the response message headers include information about the content type of the documents (e.g. text/html, image/gif).Session layer functions:The HTTP protocol defines the client/server interaction in three steps:1. Client sends the request for a file2. Server replies with the file or error message if file is not found.3. Server closes the TCP connection after some timeout period.24. Suppose we need a communication service to transmit real-time voice over the Internet. What features of TCP and what features of UDP are appropriate?Solution:TCP is desirable in that it provides a connection for the transfer of a stream of information, which characterizes a digital voice stream. However, to provide reliable service TCP uses acknowledgments and retransmissions that result in packet delay and jitter that can not be tolerated by real-time traffic.UDP provides connectionless service and delivers packets quickly. In case of packet loss, UDP does not provide retransmission, but some degree of packet loss can be tolerated by voice.25. Consider the end-to-end IP packet transfer examples in Figure 2.15. Sketch the sequences of IP packets and Ethernet and PPP frames that are generated by the three examples of packet transfers: from the workstation to the server; from the server to the PC, and from the PC to the server. Include all relevant header information in the sketch.Solution:Workstation to Server:IP packet headerEthernet FrameThe Ethernet frame is broadcast over the LAN. The server's NIC card recognizes that the frame is intended for its host, so it captures the frame and examines it. It finds that the protocol type is set to IP, so it passes the IP datagram up to the IP entity.Server to PC:IP packet headerEthernet FrameThe Ethernet frame is broadcast over the LAN. The router examines frame and passes IPdatagram to its IP entity which discover that the IP datagram is not for itself, but is to be routed on. The routing tables at the router show that the machine with address (2,2) is connecteddirectly on the other side of the point-to-point link. The router encapsulates the IP datagram in a PPP frame.IP packet headerPPP FrameThe PPP receiver at the PC receives the frame, checks the protocol type field and passes the IP datagram to its IP entity.PC to Server:The PC IP entity generates the IP packet shown below. The PPP transmitter at the PC encapsulates the IP packet into a PPP frame sends it to the point-to-point link. There's no need for a physical address specificationIP datagramIP packet headerPPP FrameThe router examines the PPP frame and passes the IP datagram to its IP entity which discoversthat the IP datagram is not for itself, but is to be routed on. The routing table at the router showsthat the machine with address (1,1) is connected in the other side of the Ethernet network. Therouter then encapsulates the IP datagram into an Ethernet frame that is broadcast in the LAN.The server's NIC card recognizes that the frame is intended for its host, so it captures the frameand examines it. It finds that the protocol type is set to IP, so it passes the IP datagram up to the IP entity.26. Suppose a user has two browser applications active at the same time, and suppose that the two applications are accessing the same server to retrieve HTTP documents at the same time. How does the server tell the difference between the two applications?Solution:A client application generates an ephemeral port number for every TCP connection it sets up. AnHTTP request connection is uniquely specified by the five parameters: (TCP, client IP address,ephemeral port #, server IP address, 80). The two applications in the above situations will havedifferent ephemeral port #s and will thus be distinguishable to the server.27. Consider the operation of non-persistent HTTP and persistent HTTP.(a)In non-persistent HTTP (version 1.0): Each client-server interaction involves setting up a TCP connection,carrying out the HTTP exchange, and closing the TCP connection. Let T be the time that elapses fromwhen a packet is sent from client to server to when the response is received. Find the rate at which HTTPexchanges can be made using non-persistent HTTP.(b)In persistent HTTP (version 1.1) the TCP connection is kept alive. Find the rate at which HTTP exchangescan be made if the client cannot send an additional request until it receives a response for each request.(c)Repeat part (b) if the client is allowed to pipeline requests, that is, it does not have to wait for a responsebefore sending a new request.Solution:(a) Each HTTP exchange involves: 1. a three-way handshake to set up the TCP connection; 2. anHTTP request-response interaction; and 3. a TCP close. The client can send its request after the first two handshakes in part 1 (which takes up T seconds). The request and response then take an additional T second. A new request can be initiated with an associated new TCP connection even while the previous TCP connection is being closes. Thus a maximum of one HTTP exchange per 2T seconds is possible.(b) Since each exchange is completed in T seconds, after the connection is setup, the exchange rateis 1/T.(c) The rate depends on how long it takes to send a request and how late it takes to compose aresponse. Considering the maximum of these to be t seconds, exchange rate can be up to 1/t.28. What is the difference between a physical address, a network address, and a domain name?Solution:The physical address is the unique hardware address that identifies an interface of a machine on a physical network such as a LAN. Physical addresses are used in the data link layer.A network address is a machine's logical address on a network. The network address is used in thenetwork layer. The network address used on the Internet is the IP address.Domain names are used as an aid to identify hosts and networks in the Internet, since names are easier to remember than numbers. The DNS system is used to translate between domain names and IP addresses. The domain name for the network address 128.100.132.30 is .29. Explain how a DNS query proceeds if the local name server does not have the IP address for a given host when the following approaches are used. Assume an example where four machines are involved in ultimately resolving a given query.(a)When a machine B cannot resolve an address in response to a query from A, machine B sends the query toanother machine in the chain. When B receives the response, it forwards the result to B.(b)When a machine B cannot resolve an address in response to a query from A, machine B sends a DNS replyto A with the IP address of the next machine in the chain, and machine A contacts that machine.Solution:(a) Host A sends a query to a name server B. B cannot resolve an address, therefore sends the queryto C. C cannot resolve an address either, and send the query to D. Similarly, D cannot resolve an address and sends the query to E, where finally an address is resolved and returned to D. D replies the address to C, C replies it to B, and finally B passes it to the host. In this scenario each server should remember the state of the query and its source.(b) Host A sends a query to name server B. B cannot resolve an address, replies to A with the IPaddress of C. Host A send a query to C this time. C cannot resolve an address, and replies to A with the IP address of D. A sends a query to D. D cannot resolve an address, and replies with the IP address of E. A sends a query to E, E finally resolves an address and returns it to A. In this scenario。
普适计算
普适计算目录提出核心思想特点发展预计研究力量提出核心思想特点发展预计研究力量展开普适计算又称普存计算、普及计算(英文中叫做pervasive computing 或者Ubiquitous computing)这一概念强调和环境融为一体的计算,而计算机本身则从人们的视线里消失。
在普适计算的模式下,人们能够在任何时间、任何地点、以任何方式进行信息的获取与处理。
编辑本段提出普适计算最早起源于1988年Xerox PARC 实验室的一系列研究计划。
在该计划中美国施乐(Xerox)公司PARC研究中心的Mark Weiser首先提出了普适计算的概念。
1991年Mark Weiser在《Scientific American》上发表文章“The Computer for the 21st Century” ,正式提出了普适计算(ubiquitous computing)。
Mark Weiser指出:普适计算“The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.”1999年,IBM也提出普适计算(IBM称之为pervasive computing)的概念,即为无所不在的,随时随地可以进行计算的一种方式。
跟Weiser一样,IBM也特别强调计算资源普存于环境当中,人们可以随时随地获得需要的信息和服务。
1999年欧洲研究团体ISTAG提出了环境智能(Ambient Intelligence)的概念。
其实这是个跟普适计算类似的概念,只不过在美国等通常叫普适计算,而欧洲的有些组织团体则叫环境智能。
二者提法不同,但是含义相同,实验方向也是一致的。
编辑本段核心思想科学家表示,普适计算的核心思想是小型、便宜、网络化的处理设备广泛分布在日常生活的各个场所,计算设备将不只依赖命令行、图形界面进行人机交互,而更依赖“自然”的交互方式,计算设备的尺寸将缩小到毫米甚至纳米级。
219332012_共振隧穿二极管THz_辐射源研究进展
第 21 卷 第 5 期2023 年 5 月Vol.21,No.5May,2023太赫兹科学与电子信息学报Journal of Terahertz Science and Electronic Information Technology共振隧穿二极管THz辐射源研究进展彭雨欣,孟雄,孟得运(江苏大学物理与电子工程学院,江苏镇江212000)摘要:太赫兹技术被称为“改变未来世界十大技术之一”,对基础科学研究、国民经济发展和国防建设具有重要意义,尤其在未来6G通信方面举足轻重。
太赫兹波源是整个太赫兹技术研究的基础,也是太赫兹应用系统的核心部件。
近年来,共振隧穿二极管(RTD)型太赫兹波源因体积小,质量轻,易于集成,室温工作,功耗低等特点受到广泛关注,为太赫兹波推广应用开辟了新的途径。
通过文献分析,本文从器件材料技术、主要工艺及器件性能等方面对InP基与GaN基RTD太赫兹振荡器的发展进行评述,并探讨了InP基与GaN基RTD太赫兹振荡器件的研究方向。
关键词:共振隧穿二级管;太赫兹波源;磷化铟;氮化镓中图分类号:TN15 文献标志码:A doi:10.11805/TKYDA2022120Research progress of Resonant Tunneling Diode THz radiation sourcePENG Yuxin,MENG Xiong,MENG Deyun(School of Physics and Electronic Engineering,Jiangsu University,Zhenjiang Jiangsu 212000,China) AbstractAbstract::Terahertz technology is known as “one of the top ten technologies to change the future world”, which is of great significance to basic scientific research, national economic development andnational defense construction, especially in the future 6G communication. Terahertz source is essentialto terahertz technology research and the core component of terahertz application system. In recent years,Resonant Tunneling Diode(RTD) terahertz source has attracted extensive attention because of its smallvolume, light weight, easy integration, room temperature operation and low power consumption, whichopens up a new way for the popularization and application of terahertz. Through literature analysis, thispaper reviews the development of RTD terahertz oscillators based on InP and GaN from the aspects ofdevice material technology, main processes and device properties. At present, how to prepare high-performance, mature and stable InP and GaN based RTD terahertz oscillators has always been a researchdirection.KeywordsKeywords::Resonant Tunneling Diode;terahertz source;indium phosphide;gallium nitride 太赫兹(THz)波是指频率在0.3~30 THz(波长为1 mm~10 μm)范围内的电磁波,具有高透射性、宽频性、相干性、低能量性、瞬态性和稳定性等特点和优势,在军事、天文、通信、计算机、生物医学、安检成像等领域发挥巨大作用。
Optical Communications
Optical CommunicationsOptical communications, also known as optical networking, is a technology that uses light to transmit information. It has revolutionized the way we communicate and has become an essential part of our daily lives. From the internet totelephone networks, optical communications play a crucial role in connectingpeople and enabling global communication. In this response, we will explore the various perspectives on optical communications, including its benefits, challenges, and future prospects. One perspective on optical communications is its immense capacity for data transmission. Unlike traditional copper-based communication systems, optical fibers can carry a significantly higher amount of data overlonger distances. This high capacity is due to the use of light, which has a much higher frequency and bandwidth compared to electrical signals. As a result,optical communications can support the ever-increasing demand for data-intensive applications such as video streaming, cloud computing, and virtual reality. Another perspective on optical communications is its reliability and security. Optical fibers are immune to electromagnetic interference, which is a major advantage over copper wires. This makes optical communications more reliable, asit reduces the chances of signal degradation or loss. Additionally, the use oflight for transmission makes it more secure, as it is difficult to tap into the signal without physically accessing the fiber. This makes optical communicationsan attractive choice for applications that require high levels of security, suchas military communications and financial transactions. However, optical communications also face several challenges. One of the main challenges is thecost of deployment and maintenance. Optical fiber infrastructure requires significant investment, both in terms of laying the fibers and maintaining them. This cost can be a barrier, especially in developing countries or rural areas where the infrastructure is not well-developed. Additionally, the delicate nature of optical fibers makes them susceptible to damage, requiring regular maintenance and repairs. Another challenge is the limited reach of optical communications. While optical fibers can transmit data over long distances, they still require repeaters or amplifiers at regular intervals to boost the signal. This limits the reach of optical communications, especially in remote areas where theinfrastructure is sparse. Overcoming this challenge requires the development of advanced technologies, such as all-optical amplifiers and repeaters, to extend the reach of optical communications. Looking towards the future, there are several exciting prospects for optical communications. One of them is the development of faster and more efficient technologies. Researchers are constantly working on improving the data transmission rates of optical fibers, pushing the limits of what is possible. This will enable even higher data speeds and support emerging technologies such as 5G networks and the Internet of Things. Another prospect is the integration of optical communications into everyday devices. Currently,optical communications are mainly used in long-distance communication networks. However, there is a growing interest in bringing optical communications to consumer devices such as smartphones and laptops. This would enable faster and more reliable internet connections for individuals, enhancing their overall communication experience. In conclusion, optical communications have revolutionized the way we communicate and connect with each other. Its high capacity, reliability, and security make it an essential technology for the modern world. However, challenges such as cost and limited reach need to be addressed to ensure widespread adoption. With ongoing research and development, optical communications hold great promise for the future, enabling faster and moreefficient communication technologies.。
论文范文:电脑打印机驱动程序自动安装系统的开发设计
论文范文:电脑打印机驱动程序自动安装系统的开发设计1绪论课题研究背景打印机作为一种重要的输出设备,在办公自动化系统中是不可缺少的一部分,当人们来到一个陌生的环境,需要打印操作时,往往因为找不到打印机或对打印机提供的服务不了解而导致工作延误,有时又因为找到打印机却无法安装驱动或是无法正确安装驱动而导致不能进行打印操作,这对于经常出差在外的人来说是十分不方便的。
因此,针对如何查找打印机和快捷方便安装打印机驱动这一明显问题,利用普适计算的思想,来构建一个满足普适计算关键特性的普适打印机系统是十分必要的。
1991年,美国XeroxPAPC 实验室的MarkWeise首次提出了普适计算(PervasiveComputing或UbiquitousComputing)这一超越桌面计算的全新计算模式[‘]。
普适计算模式下,信息空间与物理空间将融合为一体。
一方面,信息空间中的对象与物理空间中的物体建立相互的对应,使这个物体成为访问信息空间中服务的直接入口。
另一方面,物理空间和信息空间之间无需人的干预与交互,即其中任一个空间状态的改变可以引起另一个空间的状态的相应改变。
要实现这样的对应变化,就必须使普适设备能够动态的感知上下文环境的变化,并根据相应的决策策略,采取相应的动作,来适应环境的变化。
普适计算具有两个关键特性:一是随时随地访问信息的能力;二是不可见性,通过在物理环境中提供多个传感器、嵌入式设备、移动设备和其他任何有计算能力的设备,从而在用户不察觉的情况下进行了计算、通讯、并提供各种服务,最大限度的减少用户的介入[2]a 打印机的普适化是现在亚待解决的问题,而且也是打印机发展的关键问题。
当人们使用打印机时,能够不必为寻找打印机和安装打印机驱动而烦恼,因此,本文主要针对于打印机的自动发现和驱动的自动安装问题进行了讨论,并提出了一种解决方法。
1.2相关研究及现状从最初的串口打印机、并口打印机到现今的USB打印机、网络打印机,打印机的接口类型作为打印机发展的一个重要指标也在不停的发展着。
智能家居 外文翻译 外文文献 英文文献
Increasing an individual’s quality of life via their intelligent home The hypothesis of this project is: can an individual’s quality of life be increased by integrating “intelligent technology” into their home environment. This hypothesis is very broad, and hence the researchers will investigate it with regard to various, potentially over-lapping, sub-sections of the population. In particular, the project will focus on sub-sections with health-care needs, because it is believed that these sub-sections will receive the greatest benefit from this enhanced approach to housing. Two research questions flow from this hypothesis: what are the health-care issues that could be improved via “intelligent housing”, and what are the technological issues needing to be sol ved to allow “intelligent housing” to be constructed? While a small number of initiatives exist, outside Canada, which claim to investigate this area, none has the global vision of this area. Work tends to be in small areas with only a limited idea of how the individual pieces contribute towards a greater goal. This project has a very strong sense of what it is trying to attempt, and believes that without this global direction the other initiatives will fail to address the large important issues described within various parts of this proposal, and that with the correct global direction the sum of the parts will produce much greater rewards than the individual components. This new field has many parallels with the field of business process engineering, where many products fail due to only considering a sub-set of the issues, typically the technology subset. Successful projects and implementations only started flow when people started to realize that a holistic approach was essential. This holistic requirement also applies to the field of “smart housing”; if we genuinely want it to have benefit to the community rather than just technological interest. Having said this, much of the work outlined below is extremely important and contains a great deal of novelty within their individual topics.Health-Care and Supportive housing:To date, there has been little coordinated research on how “smart house” technologies can assist frail seniors in remaining at home, and/or reduce the costs experienced by their informal caregivers. Thus, the purpose of the proposed research is to determine the usefulness of a variety of residential technologies in helping seniors maintain their independence and in helping caregivers sustain their caringactivities.The overall design of the research is to focus on two groups of seniors. The first is seniors who are being discharged from an acute care setting with the potential for reduced ability to remain independent. An example is seniors who have had hip replacement surgery. This group may benefit from technologies that would help them become adapted to their reduced mobility. The second is seniors who have a chronic health problem such as dementia and who are receiving assistance from an informal caregiver living at a distance. Informal caregivers living at a distance from the cared-for senior are at high risk of caregiver burnout. Monitoring the cared-for senior for health and safety is one of the important tasks done by such caregivers. Devices such as floor sensors (to determine whether the senior has fallen) and access controls to ensure safety from intruders or to indicate elopement by a senior with dementia could reduce caregiver time spent commuting to monitor the senior.For both samples, trials would consist of extended periods of residence within the ‘smart house’. Samples of seniors being discharged from acute care would be recruited from acute care hospitals. Samples of seniors being cared for by informal caregivers at a distance could be recruited through dementia diagnosis clinics or through request from caregivers for respite.Limited amounts of clinical and health service research has been conducted upon seniors (with complex health problems) in controlled environments such as that represented by the “smart house”. For exa mple, it is known that night vision of the aged is poor but there is very little information regarding the optimum level of lighting after wakening or for night activities. Falling is a major issue for older persons; and it results in injuries, disabilities and additional health care costs. For those with dementing illnesses, safety is the key issue during performance of the activities of daily living (ADL). It is vital for us to be able to monitor where patients would fall during ADL. Patients and caregivers activities would be monitored and data will be collected in the following conditions.Projects would concentrate on sub-populations, with a view to collecting scientific data about their conditions and the impact of technology upon their life styles. For example:Persons with stable chronic disability following a stroke and their caregivers: to research optimum models, types and location of various sensors for such patients (these patients may have neglect, hemiplegia, aphasia and judgment problems); to research pattern of movements during the ambulation, use of wheel chairs or canes on various type of floor material; to research caregivers support through e-health technology; to monitor frequencies and location of the falls; to evaluate the value of smart appliances for stroke patients and caregivers; to evaluate information and communication technology set up for Tele-homecare; to evaluate technology interface for Tele-homecare staff and clients; to evaluate the most effective way of lighting the various part of the house; to modify or develop new technology to enhance comfort and convenience of stroke patients and caregivers; to evaluate the value of surveillance systems in assisting caregivers.Persons with Alzheimer’s disease and their caregivers: to evaluate the effect of smart house (unfamiliar environment) on their ability to conduct self-care with and without prompting; to evaluate their ability to use unfamiliar equipment in the smart house; to evaluate and monitor persons with Alzheimer’s diseas e movement pattern; to evaluate and monitor falls or wandering; to evaluate the type and model of sensors to monitor patients; to evaluate the effect of wall color for patients and care givers; to evaluate the value of proper lighting.Technology - Ubiquitous Computing:The ubiquitous computing infrastructure is viewed as the backbone of the “intelligence” within the house. In common with all ubiquitous computing systems, the primary components with this system will be: the array of sensors, the communication infrastructure and the software control (based upon software agents) infrastructure. Again, it is considered essential that this topic is investigated holistically.Sensor design: The focus of research here will be development of (micro)-sensors and sensor arrays using smart materials, e.g. piezoelectric materials, magneto strictive materials and shape memory alloys (SMAs). In particular, SMAs are a class of smart materials that are attractive candidates for sensing and actuating applications primarily because of their extraordinarily high work output/volume ratiocompared to other smart materials. SMAs undergo a solid-solid phase transformation when subjected to an appropriate regime of mechanical and thermal load, resulting in a macroscopic change in dimensions and shape; this change is recoverable by reversing the thermo mechanical loading and is known as a one-way shape memory effect. Due to this material feature, SMAs can be used as both a sensor and an actuator.A very recent development is an effort to incorporate SMAs in micro-electromechanical systems (MEMS) so that these materials can be used as integral parts of micro-sensors and actuators.MEMS are an area of activity where some of the technology is mature enough for possible commercial applications to emerge. Some examples are micro-chemical analyzers, humidity and pressure sensors, MEMS for flow control, synthetic jet actuators and optical MEMS (for the next generation internet). Incorporating SMAs in MEMS is a relatively new effort in the research community; to the best of our knowledge, only one group (Prof. Greg Carman, Mechanical Engineering, University of California, Los Angeles) has successfully demonstrated the dynamic properties of SMA-based MEMS. Here, the focus will be to harness the sensing and actuation capabilities of smart materials to design and fabricate useful and economically viable micro-sensors and actuators.Communications: Construction and use of an “intelligent house” offers extensive opportunities to analyze and verify the operation of wireless and wired home-based communication services. While some of these are already widely explored, many of the issues have received little or no attention. It is proposed to investigate the following issues:Measurement of channel statistics in a residential environment: knowledge of the indoor wireless channel statistics is critical for enabling the design of efficient transmitters and receivers, as well as determining appropriate levels of signal power, data transfer rates, modulation techniques, and error control codes for the wireless links. Interference, channel distortion, and spectral limitations that arises as a result of equipment for the disabled (wheelchairs, IV stands, monitoring equipment, etc.) is of particular interest.Design, analysis, and verification of enhanced antennas for indoor wirelesscommunications. Indoor wireless communications present the need for compact and rugged antennas. New antenna designs, optimized for desired data rates, frequency of operation, and spatial requirements, could be considered.Verification and analysis of operation of indoor wireless networks: wireless networking standards for home automation have recently been commercialized. Integration of one or more of these systems into the smart house would provide the opportunity to verify the operation of these systems, examine their limitations, and determine whether the standards are over-designed to meet typical requirements.Determination of effective communications wiring plans for “smart homes.”: there exist performance/cost tradeoffs regarding wired and wireless infrastructure. Measurement and analysis of various wireless network configurations will allow for determination of appropriate network designs.Consideration of coordinating indoor communication systems with larger-scale communication systems: indoor wireless networks are local to the vicinity of the residence. There exist broader-scale networks, such as the cellular telephone network, fixed wireless networks, and satellite-based communication networks. The viability and usefulness of compatibility between these services for the purposes of health-care monitoring, the tracking of dementia patients, etc needs to be considered.Software Agents and their Engineering: An embedded-agent can be considered the equivalent of supplying a friendly expert with a product. Embedded-agents for Intelligent Buildings pose a number of challenges both at the level of the design methodology as well as the resulting detailed implementation. Projects in this area will include:Architectures for large-scale agent systems for human inhabited environment: successful deployment of agent technology in residential/extended care environments requires the design of new architectures for these systems. A suitable architecture should be simple and flexible to provide efficient agent operation in real time. At the same time, it should be hierarchical and rigid to allow enforcement of rules and restrictions ensuring safety of the inhabitants of the building system. These contradictory requirements have to be resolved by designing a new architecture that will be shared by all agents in the system.Robust Decision and Control Structures for Learning Agents: to achieve life-long learning abilities, the agents need to be equipped with powerful mechanisms for learning and adaptation. Isolated use of some traditional learning systems is not possible due to high-expected lifespan of these agents. We intend to develop hybrid learning systems combining several learning and representation techniques in an emergent fashion. Such systems will apply different approaches based on their own maturity and on the amount of change necessary to adapt to a new situation or learn new behaviors. To cope with high levels of non-determinism (from such sources as interaction with unpredictable human users), robust behaviors will be designed and implemented capable of dealing with different types of uncertainty (e.g. probabilistic and fuzzy uncertainty) using advanced techniques for sensory and data fusion, and inference mechanisms based on techniques of computational intelligence.Automatic modeling of real-world objects, including individual householders: The problems here are: “the locating and extracting” of information essential for representation of personality and habits of an individual; development of systems that “follow and adopt to” individual’s mood and behavior. The solutions, based on data mining and evolutionary techniques, will utilize: (1) clustering methods, classification tress and association discovery techniques for the classification and partition of important relationships among different attributes for various features belonging to an individual, this is an essential element in finding behavioral patterns of an individual; and (2) neuro-fuzzy and rule-based systems with learning and adaptation capabilities used to develop models of an individual’s characteristics, this is essential for estimation and prediction of potential activities and forward planning.Investigation of framework characteristics for ubiquitous computing: Consider distributed and internet-based systems, which perhaps have the most in common with ubiquitous computing, here again, the largest impact is not from specific software engineering processe s, but is from available software frameworks or ‘toolkits’, which allow the rapid construction and deployment of many of the systems in these areas. Hence, it is proposed that the construction of the ubiquitous computing infrastructure for the “smart house” should also be utilized as a software engineering study. Researchers would start by visiting the few genuine ubiquitous computing systems inexistence today, to try to build up an initial picture of the functionality of the framework. (This approach has obviously parallels with the approach of Gamma, Helm, Johnson and Vlissides deployed for their groundbreaking work on “design patterns”. Unfortunately, in comparison to their work, the sample size here will be extremely small, and hence, additional work will be required to produce reliable answers.) This initial framework will subsequently be used as the basis of the smart house’s software system. Undoubtedly, this initial framework will substantially evolve during the construction of the system, as the requirements of ubiquitous computing environment unfold. It is believed that such close involvement in the construction of a system is a necessary component in producing a truly useful and reliable artifact. By the end of the construction phase, it is expected to produce a stable framework, which can demonstrate that a large number of essential characteristics (or patterns) have been found for ubiquitous computing.Validation and Verification (V&V) issues for ubiquitous computing: it is hoped that the house will provide a test-bed for investigating validation and verification (V&V) issues for ubiquitous computing. The house will be used as an assessment vehicle to determine which, if any, V&V techniques, tools or approaches are useful within this environment. Further, it is planned to make this trial facility available to researchers worldwide to increase the use of this vehicle. In the long-term, it is expected that the facilities offered by this infrastructure will evolve into an internationally recognized “benchmarking” site for V&V activities in ubiquitous computing.Other technological areas:The project also plans to investigate a number of additional areas, such as lighting systems, security systems, heating, ventilation and air conditioning, etc. For example, with regard to energy efficiency, the project currently anticipates undertaking two studies:The Determination of the effectiveness of insulating shutters: Exterior insulating shutters over time are not effective because of sealing problems. Interior shutters are superior and could be used to help reduce heat losses. However, their movement and positioning needs appropriate control to prevent window breakage due to thermalshock. The initiation of an opening or closing cycle would be based on measured exterior light levels; current internal heating levels; current and expected use of the house by the current inhabitants, etc.A comparison of energy generation alternatives: The energy use patterns can easily be monitored by instrumenting each appliance. Natural gas and electricity are natural choices for the main energy supply. The conversion of the chemical energy in the fuel to heat space and warm water can be done by conventional means or by use of a total energy system such as a V olvo Penta system. With this system, the fuel is used to power a small internal combustion engine, which in turn drives a generator for electrical energy production. Waste heat from the coolant and the exhaust are used to heat water for domestic use and space heating. Excess electricity is fed back into the power grid or stored in batteries. At a future date, it is planned to substitute a fuel cell for the total energy system allowing for a direct comparison of the performance of two advanced systems.Intelligent architecture: user interface design to elicit knowledge modelsMuch of the difficulty in architectural design is in integrating and making explicit the knowledge of the many converging disciplines (engineering, sociology, ergonomic sand psychology, to name a few), the building requirements from many view points, and to model the complex system interactions. The many roles of the architect simply compound this. This paper describes a system currently under development—a 3Ddesign medium and intelligent analysis tool, to help elicit and make explicit these requirements. The building model is used to encapsulate information throughout the building lifecycle, from inception and master planning to construction and ‘lived-in’ use. From the tight relationship between m aterial behaviour of the model, function analysis and visual feedback, the aim is to help in the resolution of functional needs, so that the building meets not only the aims of the architect, but the needs of the inhabitants, users and environment.The Problem of Designing the Built Environment:It is often said that architecture is the mother of the arts since it embodies all the techniques of painting: line, colour, texture and tone, as well as those of sculpture: shape, volume, light and shadow, and the changing relative position of the viewer, andadds to these the way that people inhabit and move through its space to produce—at its best—a spectacle reminiscent of choreography or theatre. As with all the arts, architecture is subject to personal critical taste and yet architecture is also a public art, in that people are constrained to use it. In this it goes beyond the other arts and is called on to function, to modify the climate, provide shelter, and to subdivide and structure space into a pattern that somehow fits the needs of social groups or organizations and cultures. Whilst architecture may be commissioned in part as a cultural or aesthetic expression, it is almost always required to fulfill a comprehensive programme of social and environmental needs.This requirement to function gives rise to three related problems that characterize the design and use of the built environment. The first depends on the difference between explicit knowledge—that of which we are at least conscious and may even have a scientific or principled understanding—and implicit knowledge, which, like knowing your mother tongue, can be applied without thinking. The functional programmes buildings are required to fulfill are largely social, and are based on implicit rather than explicit bodies of knowledge. The knowledge we exploit when we use the built environment is almost entirely applied unconsciously. We don’t have to think about buildings or cities to use them; in fact, when we become aware of it the built environment is often held to have failed. Think of the need for yellow lines to help people find their way around the Barbican complex in the City of London, or the calls from tenants to ‘string up the architects’ when housing estates turn out to be social disasters.The second is a problem of complexity. The problem is that buildings need to function in so many different ways. They are spatial and social, they function in terms of thermal environment, light and acoustics, they use energy and affect people’s health, they need to be constructed and are made of physical components that can degrade and need to be maintained. On top of all this they have an aesthetic and cultural role, as well as being financial investments and playing an important role in the economy. Almost all of these factors are interactive—decisions taken for structural reasons have impacts on environment or cost—but are often relatively independent in terms of the domains ofknowledge that need to be applied. This gives rise to a complex design problem in which everything knocks on to everything else, and in which no single person has a grasp of all the domains of knowledge required for its resolution. Even when the knowledge that needs to be applied is relatively explicit—as for instance in structural calculations, or thoseconcerning thermal performance—the complex interactive nature of buildings creates a situation in which it is only through a team approach that design can be carried out, with all that this entails for problems of information transfer and breakdowns in understanding.The third is the problem of ‘briefing’. It is a characteristic of building projects that buildings tend not to be something that people buy ‘off-the-shelf’. Often the functional programme is not even explicit at the outset. One might characterise the process that actually takes place by saying that the design and the brief ‘co-evolve’. As a project moves from inception to full sp ecification both the requirements and the design become more and more concrete through an iterative process in which design of the physical form and the requirements that it is expected to fulfill both develop at once. Feasible designs are evaluated according to what they provide, and designers try to develop a design that matches the client’s requirements. Eventually, it is to be hoped, the two meet with the textual description of what is required and the physical description of the building that will provide it more or less tying together as the brief becomes a part of the contractual documentation that theclient signs up to.These three problems compound themselves in a number of ways. Since many of the core objectives of a client organization rest on implicit knowledge—the need for a building to foster communication and innovation amongst its workers for instance—it is all too easy for them to be lost to sight against the more explicitly stated requirements such as those concerned with cost, environmental performance or statutory regulations. The result is that some of the more important aspects of the functional programme can lose out to less important but better understood issues. This can be compounded by the approach that designers take in order to control themcomplexity of projects. All too often the temptation is to wait until the general layout of a building is ‘fixed’ before calling in the domain experts. The result is that functional design has to resort to retrofitting to resolve problems caused by the strategic plan.The Intelligent Architecture project is investigating the use of a single unified digital model of the building to help resolve these problems by bringing greater intelligence to bear at the earliest ‘form generating’ phase of the design process when the client’s requirements are still being specified and when both physical design and client expectations are most easily modified. The aim is to help narrow the gap between what clients hope to obtain and what they eventually receive from a building project.The strategy is simple. By capturing representations of the building as a physical and spatial system, and using these to bring domain knowledge to bear on a design at its earliest stages, it is hoped that some of the main conflicts that lead to sub- optimal designs can be avoided. By linking between textual schedules of requirements and the physical/spatial model it is intended to ease the reconciliation of the brief and the design, and help the two to co-evolve. By making available some of the latest ‘intelligent’ techniques for modelling spatial systems in the built environment, it is hoped to help put more of the implicit knowledge on an equal footing with explicit knowledge, and by using graphical feedback about functional outcomes where explicit knowledge exists, to bring these within the realm of intuitive application by designers.The Workbench:In order to do this, Intelligent Architecture has developed Pangea. Pangea has been designed as a general-purpose environment for intelligent 3D modelling—it does not pre-suppose a particular way of working, a particular design solution, or even a particular application domain. Several features make this possible.Worlds can be constructed from 3D and 2D primitives (including blocks, spheres, irregular prisms and deformable surfaces), which can represent real-world physical objects, or encapsulate some kind of abstract behaviour. The 3D editor provides a direct and simple interface for manipulating objects—to position, reshape, rotate andrework. All objects, both physical and abstract, have an internal state (defined by attributes), and behaviour, rules and constraints (in terms of a high-level-language ‘script’). Attributes can be added dynamically, making it possible for objects to change in nature, in response to new knowledge about them, or to a changing environment. Scripts are triggered by events, so that objects can respond and interact, as in the built environment, molecular systems, or fabric falling into folds on an irregular surface.Dynamic linking allows Pangea’s functionality to be extended to include standard ‘off-the-peg’ software tools —spreadsheets, statistical analysis applications, graphing packages and domain-specific analysis software, such as finite element analysis for air- flow modelling. The ‘intelligent toolkit’ includes neural networks [Koho89] [Wass89], genetic algorithms [Gold89] [Holl75] and other stochastic search techniques [KiDe95], together with a rule- based and fuzzy logic system [Zade84]. The intelligent tools are objects, just like the normal 3D primitives: they have 3D presence and can interact with other 3D objects. A natural consequence of this design is easy ‘hybridisability’ of techniques, widely considered as vital to the success of intelligent techniques in solving realistically complex problems [GoKh95]. This infrastructure of primitive forms, intelligent techniques and high-level language makes it possible to build applications to deal with a broad range of problems, from the generation of architectural form, spatial optimisation, object recognition and clustering, and inducing rules and patterns from raw data.Embedding Intelligence:Many consider that there is an inevitable trade-off between computers as a pure design medium, and computers with intelligence, ‘as a thinking machine’ [Rich94]. We propose here that it is possible to provide both these types of support, and allow the user to choose how best to use each, or not, according to the situation.It is essential that the creative role of the architect is preserved as he or she uses the work bench, that the architect as artist may draw manipulate the world as seen through the workbench as freely as they would when using a sheet of paper. Much of。
美国国家自然科学基金
2021年12月英语六级阅读真题及答案 第3套 仔细阅读2篇_1
2021年12月英语六级阅读真题及答案第3套仔细阅读2篇Passage OneQuestions 46 to 50 are based on the following passage.Dr. Donald Sadoway at MIT started his own battery company with the hope of changing the world's energy future. It's a dramatic endorsement for a technology most people think about only when their smartphone goes dark. But Sadoway isn't alone in trumpeting energy storage as a missing link to a cleaner, more efficient, and more equitable energy future.Scientists and engineers have long believed in the promise of batteries to change the world. Advanced batteries are moving out of specialized markets and creeping into the mainstream, signaling a tipping point for forward-looking technologies such as electric cars and rooftop solar propels.The ubiquitous (无所不在的) battery has already come a long way, of course. For better or worse, batteries make possible our mobile-first lifestyles, our screen culture, our increasingly globalized world. Still, as impressive as all this is, it may be trivial compared with what comes next. Havingalready enabled a communications revolution, the battery is now poised to transform just about everything else.The wireless age is expanding to include not just our phones, tablets, and laptops, but also our cars, homes, and even whole communities. In emerging economies, rural communities are bypassing the wires and wooden poles that spread power. Instead, some in Africa and Asia are seeing their first lightbulbs illuminated by the power of sunlight stored in batteries.Today, energy storage is a $33 billion global industry that generates nearly 100 gigawatt-hours of electricity per year. By the end of the decade, it's expected to be worth over $50 billion and generate 160 gigawatt-hours, enough to attract the attention of major companies that might not otherwise be interested in a decidedly pedestrian technology. Even utility companies, which have long Viewed batteries and alternative forms of energy as a threat, are learning to embrace the technologies as enabling rather than disrupting.Today's battery breakthroughs come as the. world looks to expand modern energy access to the billion or so people without it, while also cutting back on fuels that warm the planet. Those simultaneous challenges appear less overwhelming with increasingly better answers to a centuries-old question: howto make power portable.To be sure, the battery still has a long way to go before the nightly recharge completely replaces the weekly trip to the gas station. A battery-powered world comes with its own risks, too. What happens to the centralized electric grid, which took decades and billions of dollars to build, as more and more people become "prosumers," who produce and consume their own energy onsite?No one knows which--if any--battery technology will ultimately dominate, but one thing remains clear. The future of energy is in how we store it.46. What does Dr. Sadoway think of energy storage?A. It involves the application of sophisticated technology.B. It is the direction energy development should follow.C. It will prove to be a profitable business.D. It is a technology benefiting everyone.47. What is most likely to happen when advanced batteries become widely used?A. Mobile-first lifestyles will become popular.B. The globalization process will be accelerated.C. Communications will take more diverse forms.D. The world will undergo revolutionary changes.48. In some rural communities of emerging economies, people have begun to _____.A. find digital devices simply indispensableB. communicate primarily by mobile phoneC. light their homes with stored solar energyD. distribute power with wires and wooden poles49. Utility companies have begun to realize that battery technologies _____.A. benefit their businessB. transmit power fasterC. promote innovationD. encourage competition50. What does the author imply about the centralized electric grid?A. It might become a thing of the past.B. It might turn out to be a "prosumer".C. It will be easier to operate and maintain.D. It will have to be completely transformed.Passage TwoQuestions 51 to 55 are based on the following passage.More than 100 years ago, American sociologist W. E. B. Du Bois was concerned that race was being used as a biologicalexplanation for what he understood to be social and cultural differences between different populations of people. He spoke out against the idea of "white" and "black" as distinct groups, claiming that these distinctions ignored the scope of human diversity.Science would favor Du Bois. Today, the mainstream belief among scientists is that race is a social construct without biological meaning. In an article published in the journal Science, four scholars say racial categories need to be phased out."Essentially, I could not agree more with the authors," said Svante Pääbo, a biologist and director of the Max Planck Institute for Evolutionary Anthropology in Germany. In one example that demonstrated genetic differences were not fixed along racial lines, the full genomes (基因组) of James Watson and Craig Venter, two famous American scientists of European ancestry, were compared to that of a Korean scientist, Seong-Jin Kim. It turned out that Watson and Venter shared fewer variations in their genetic sequences than they each shared with Kim.Michael Yudell, a professor of public health at Drexel University in Philadelphia, said that modem genetics researchis operating in a paradox: on the one hand, race is understood to be a useful tool to illuminate human genetic diversity, but on the other hand, race is also understood to be a poorly defined marker of that diversity.Assumptions about genetic differences between people of different races could be particularly dangerous in a medical setting. "If you make clinical predictions based on somebody's race, you're going to be wrong a good chunk of the time," Yudell told Live Science. In the paper, he and his colleagues used the example of cystic fibrosis, which is underdiagnosed in people of African ancestry because it is thought of as a "white" disease.So what other variables could be used if the racial concept is thrown out? Yudell said scientists need to get more specific with their language, perhaps using terms like "ancestry" or "population" that might more precisely reflect the relationship between humans and their genes, on both the individual and population level. The researchers also acknowledged that there are a few areas where race as a construct might still be useful in scientific research: as a political and social, but not biological, variable."While we argue phasing out racial terminology (术语) inthe biological sciences, we also acknowledge that using race as a political or social category to study racism, although filled with lots of challenges, remains necessary given our need to understand how structural inequities and discrimination produce health disparities (差异) between groups." Yudell said.51. Du Bois was opposed to the use of race as _____.A. a basis for explaining human genetic diversityB. an aid to understanding different populationsC. an explanation for social and cultural differencesD. a term to describe individual human characteristics52. The study by Svante Pääbo served as an example to show _____.A. modern genetics research is likely to fuel racial conflictsB. race is a poorly defined marker of human genetic diversityC. race as a biological term can explain human genetic diversityD. genetics research should consider social and cultural variables53. The example of the disease cystic fibrosisunderdiagnosed in people of African ancestry demonstrates that _____.A. it is absolutely necessary to put race aside in making diagnosisB. it is important to include social variables in genetics researchC. racial categories for genetic diversity could lead to wrong clinical predictionsD. discrimination against black people may cause negligence in clinical treatment54. What is Yudell's suggestion to scientists?A. They be more precise with the language they use.B. They refrain from using politically sensitive terms.C. They throw out irrelevant concepts in their research.D. They examine all possible variables in their research.55. What can be inferred from Yudell's remark in the last paragraph?A. Clinging to racism prolongs inequity and discrimination.B. Physiological disparities are quite striking among races.C. Doing away with racial discrimination is challenging.D. Racial terms are still useful in certain fields of study.Passage one46.B47.D48.C49.A50.APassage two51.A52.B53.C54.A55.D。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Adaptive Error Correction for Wireless Communicationposition paperKoen Langendoen Maarten Ditzel Johan PouwelseFaculty of Information Technology and SystemsDelft University of Technology,The Netherlandskoen@pds.twi.tudelft.nlAbstractThe Ubiquitous Communications project aims at delivering video to a mobile user over a high-speed wireless link both indoor and outdoor.The high data rates(150Mb/s)require the use of4th generation transceivers that operate at high fre-quencies(e.g.,17GHz).We anticipate that the quality of the wireless link varies frequently due to changes in the environment(e.g.,moving po-sition).We propose to use adaptive forward er-ror correction in the communication protocols to guarantee a certain Quality of Service(QoS)level to the application.The key ideas are1)to dy-namically match the coding rate to the QoS re-quirements on a per stream basis,and2)to exploit the(dynamic)characteristics of the individual sub carriers of our OFDM modulation scheme.The responsiveness of our adaptive error correction depends on the feed-back loop implemented in software,which will be well within the100ms range of user perception.1Mobile multimediaThe advances in mobile communication indicate that in the near future high-demanding multime-dia applications can be offered to a mobile user in a wireless environment.Consequently,signif-icant research is being performed in the area of mobile multimedia as witnessed by the interest in workshops like MoMuC.The overall drive is to match the high demands in throughput and la-tency of multimedia to the limited,but rapidly increasing,performance of wireless communica-tion systems.Multimedia applications,such as video conferencing,typically require the trans-mission of real-time video streams;to obtain rea-sonable image quality,large amounts of data have to be communicated in(soft)real-time requiring small delays and jitter.Wireless systems,on the other hand,provide an unreliable communication medium with a high error-rate in comparison to wired networks.2UbicomThe Ubiquitous Communications project(Ubi-com)at Delft University of Technology[3]aims at developing a campus-wide system for wireless communication that is capable of supporting mul-timedia applications.By using an embedded sys-tems approach we can integrate important func-tionality such as compression and error correc-tion in hardware to realize the performance level required by the application.Our target is a vi-sual geographic information system that uses aug-mented reality techniques to display information on a mobile user’s headset;information is super imposed on the user’s view using a retinal scan-ning display.Augmented reality requires imme-diate response to changes in thefield of interest of a user yielding strong real-time constraints on the system.As an example,any head movement is a fast change in thefield of interest of the user to which the system has to respond by displaying the corresponding augmented reality information at the correct position.To minimize power con-Figure1:Ubicom architecture. sumption in the mobile unit,the main processing power is located in the backbone network of the Ubicom architecture(see Figure1).Since the main computational tasks of the mo-bile application will run on the Ubicom backbone, the wireless communication subsystem must be able to handle large data volumes with small de-lay so the imposed real-time constraints can be met.To handle the anticipated data rate of about 10Mb/s per user,Ubicom will use a4th gener-ation transceiver that operates at17GHz using OFDM modulation providing a raw data rate of 150Mb/s.It’s difficult to estimate the error rate at17GHz,but we assume that it will be higher than the rates reported for equipment using lower frequency bands such as waveLan[5].3Wireless communication Communication protocols for wired networks such as TCP/IP do not handle the errors of wire-less transmission well,since they interpret packet loss as a result of congestion and,consequently, slow down the transmission rate.Enhancing re-liable transport protocols provides some perfor-mance improvement[2],but the use of retrans-missions to handle corrupted packets compro-mises the tight latency requirements of multime-dia applications.Augmented reality applications impose even more stringent real time constraints. Many wireless communication systems employ forward error correction(FEC)to handle trans-mission errors in real-time.To overcome the over-heads of adding and removing the redundant in-formation needed for error correction,most FEC schemes are implemented in hardware.The disadvantage of implementing FEC in hardware is the lack offlexibility.The qual-ity of the wireless channel depends on the dis-tance between the transmitter and receiver,hence, for optimal performance the coding rate must be adapted to the local conditions.Fortunately,soft-ware FEC implementations have recently been shown to achieve acceptable throughput(100 Mb/s)on stock PC hardware[7].With software FEC it will be possible to adapt dynamically to the observed channel quality.4Adaptive error correction Several researchers have advocated the use of adaptive error correction codes(e.g.,[4,6]).The typical approach is to use a block code like Reed-Solomon that can correct a certain number of er-rors,say,in a packet.When the rate of un-correctable packets,which contain more than errors,rises above a certain threshold,the cod-ing rate is reduced by adding more redundancy to the data stream.Conversely,when the error rate drops,the coding rate is increased to take ad-vantage of the improved link quality.Note that a feedback loop is required to allow the transmit-ter to adapt the coding rate according to the error rate observed at the receiver.This limits the re-sponsiveness to tens or hundreds of milliseconds, which is fast enough to adapt to changes caused by human action such as motion.In the Ubicom project,we want to improve the general approach to adaptive error correction in two ways.First,we take the multimedia applica-tion’s requirements into account by applying dif-ferent coding schemes to different data streams. Second,instead of regarding the channel as hav-ing a single error characteristic,we want to take advantage of the different characteristics of the sub carriers used by our OFDM modulation tech-nique.4.1Adaptable streamsWe feel that multimedia applications running on the Ubicom architecture must be aware of the unreliable nature of the wireless channel if they want to achieve maximum performance.Simply relying on the basic communication software to transparently hide all errors,through error cor-rection and retransmits,will compromise perfor-mance too much.Reliable transport protocols add overhead to start and stop timers,create a copy of each data packet in case a retransmission is required,and cannot give any real-time guaran-tees since packets may be retransmitted multiple times.Moreover,a significant amount of power is consumed by these type of protocols.By giving up transparency and making applica-tions aware of unreliable communication,we can take advantage of the different data streams com-municated over the wireless link.Multimedia ap-plications typically communicate multiple types of data(video,audio,files,control)with different quality of service requirements between the Ubi-com backbone and mobile user.The throughput over the wireless link can be optimized by select-ing an appropriate FEC per data stream based on the specific QoS requirements.For example,an uncompressed video stream must be transmitted with the smallest possible delay and will use a light FEC with a high coding rate.Afile trans-fer,in contrast,requires reliable transfer and uses a heavy FEC and retransmissions.The adaption of the FEC to the QoS of a data stream must be done dynamically to account for the changes in quality of the wireless link.4.2Adaptable carriersThe OFDM modulation technique employed in the Ubicom transceiver divides the17GHz fre-quency band into a number(e.g.,512)of sub bands carrying independent data signals.Since these sub carriers differ in frequency,error sources such as reflection and diffraction will im-pact the various sub carriers differently.Although the differences between neighboring carriers will be small,differences between sub carriers spaced further apart will be noticeable.For example,in the Median project[1]the sub carriers at both ends of the60GHz band are of poor quality com-pared to the ones in the middle.The general approach with OFDM modulation hardware is to run a single,fixed FEC across the sub carriers to compensate the bad carriers with the good ones.In Ubicom,however,we pro-pose to take advantage of the individual sub car-rier characteristics by mapping the different QoS streams of the multimedia application to the ap-propriate carriers.By allocating the lowest QoS requirements to the worst sub carriers,the coding overhead of the FECs can be minimized yielding maximal throughput over the wireless link.5ImplementationTo achieve the adaptive error correction policy for Ubicom,we need aflexibility that can only be reached through careful hardware software code-sign.Given the high data rates(150Mb/s),how-ever,it is impossible to have the adaptive er-ror correction on the main CPUs in the mobile station that must be shared with the compute-intensive augmented-reality software driving the user’s head set.Therefore we propose to use a dedicated co-processor in the mobile station as shown in Figure2.The incoming signal is converted from the ana-log to the digital domain,where it is fed through a fast Fourier transform(FFT)yielding the OFDM symbols.These symbols are then mapped to(par-allel)bit streams,which are fed into the error cor-rection unit.Finally,the corrected data stream is placed in memory where the main CPUs can access it.By implementing the error correction functionality on a co-processor,the incoming data can be decoded in parallel with the application running on the main CPU.For thefirst prototype implementation we will probably use an off the shelve low-power DSP or FPGA chip,which pro-vides an acceptable balance between programma-bility and speed.The mapping of data streams onto OFDM sub carriers and selection of the appropriate FEC is aFigure2:Structure of the mobile station.non-trivial problem.The following(incomplete) list of research questions must be addressed by Ubicom to establish a reasonable policy that uti-lizes the wireless link effectively:Is it feasible to consider carrier mapping and FEC selection as two orthogonal issues,or must both factors be considered together?For a given unreliable data stream,how should we balance coding overhead,error rate,and throughput?For reliable communication,should we usea strong FEC with few retransmissions,or alight FEC with many?What kind of fairness must be guaranteed be-tween multiple data streams?How to implement the feed-back loop?One option is to dedicate a few OFDM carrier to control signals,another option is to layer on top of a data-stream.Which is best?6ConclusionsTo maximize the usage of the scarce through-put on a wireless link,adaptive error correction schemes adjust the coding rate depending on the current quality of the channel.In this position pa-per we outline how the general adaptive scheme can be improved in two ways:1.exploit the different QoS requirements of theindividual data streams in a multimedia appli-cation by selecting a code rate per stream, 2.take advantage of the individual OFDM subcarrier characteristics by mapping reliabledata streams to the best carriers,and bulk data streams to the worst carriers.Both improvements allow a lighter FEC to be used than in the traditional approach,so the effec-tive throughput over the link increases.We will need to refine our ideas and address a number of open issues before we can actually realize an im-plementation within Ubicom. References[1]Advanced Communication Technologies andServices(ACTS).The Median Project./ACTS/.[2]R.Caceres and L.Iftode.Improving the perfor-mance of reliable transport protocols in mo bile computing environments.IEEE JSAC Special Is-sue on Mobile Computing Network,1994.[3]Delft University of Technology.TheUbiquitous Communications Project.http://ubicom.twi.tudelft.nl/.[4]D.Eckhardt.A Case for Adaptive Error Correc-tion in a Wireless Local Area Network.Carnegie Mellon University,1997.[5]D.Eckhardt and P.Steenkiste.Measurementand analysis of the error characteristics of an in-building wireless network.In Computer Commu-nication Review(SIGCOMM’96),volume26(4), pages243–254,October1996.[6]D.L.Goeckel.Robust adaptive coded modulationfor time-varying channels with delayed feedback.In35th Allerton Conf.on Communication,Con-trol,and Computing,October1997.[7]L.Rizzo.Effective erasure codes for reliablecomputer communication protocols.In Computer Communication Review,vol27(2),April1997.。