蓝牙技术外文翻译文献

合集下载

蓝牙翻译英文

蓝牙翻译英文

蓝牙翻译英文Bluetooth TranslationBluetooth is a wireless technology that enables the transfer of data and information between devices over short distances. It has become increasingly popular in recent years and is now found in a wide range of devices, including mobile phones, computers, and even cars.There are several benefits to using Bluetooth technology for translation purposes. Firstly, it eliminates the need for physical cables or cords, making it much more convenient and user-friendly. Users can simply connect their devices via Bluetooth and start translating without any hassle.Another advantage of Bluetooth translation is its compatibilitywith multiple devices. Bluetooth-enabled devices can communicate with each other, regardless of their brand or operating system. This means that a translation device with Bluetooth capabilities can be used with a variety of smartphones or tablets, making it accessible to a wider range of users.Bluetooth translation also offers a level of privacy and security. Unlike other wireless technologies, Bluetooth connections are typically more secure and less prone to hacking or eavesdropping. This is especially important when dealing with sensitive or personal information during translation.In addition to its ease of use and security features, Bluetooth translation devices also offer high-quality translation services.They are equipped with advanced language processing algorithms and artificial intelligence technologies, allowing for accurate and reliable translations. Some devices even offer real-time translation, where spoken words are instantly translated into the desired language, making it ideal for conversations or business meetings.Bluetooth translation devices are also designed with portability in mind. They are usually compact and lightweight, making them easy to carry around. This means that users can bring them on their travels or use them in various settings, such as in classrooms, offices, or public spaces.Despite its many advantages, Bluetooth translation does have some limitations. One major limitation is the limited range of Bluetooth connections, typically up to 100 meters. This means that devices must be within close proximity to establish a connection. However, this is usually not an issue for most translation purposes, as users can simply bring their devices closer to each other.Another limitation is the dependency on battery power. Bluetooth devices require power to function, so users need to ensure that their devices are adequately charged before using them for translation. However, with advancements in technology, Bluetooth devices now come with longer battery life, allowing for extended use.In conclusion, Bluetooth translation offers numerous benefits for users in need of translation services. Its convenience, compatibility, security, and high-quality translations make it a desirable choicefor many. With the continuous advancements in Bluetoothtechnology, we can expect even more innovative and efficient translation devices in the future.。

中英文文献翻译—蓝牙设备怎样工作

中英文文献翻译—蓝牙设备怎样工作

How Bluetooth WorksChatschik BisdikianThere are lots of different ways that electronic devices can connect to one another. For example:Many desktop computer systems have a CPU unit connected to a mouse, a keyboard, a printer and so on.. A personal digital assistant (PDA) will normally connect to the computer with a cable and a docking cradle. A TV will normally connect to a VCR and a cable box, with a remote control for all there components. A cordless phone connects to its base unit radio waves and it may have a headset that connects to the phone with a wire. In a stereo system, a CD player and other audio devices connect to the receiver, which connects to the speakers. When you use computers, entertainment systems or telephones, the various pieces and parts of the systems make up a community of electronic devices. These devices communicate with each other using a variety of wires, cables, radio signals and infrared light beams, and an even greater variety of connectors, plugs and protocols.The art of connecting things is becoming more and more complex every day. We sometimes feel as if we need a Ph.D. in electrical engineering just to set up the electronics in our homes! In this article, we will look at a completely different way to form the connections, called Bluetooth. Bluetooth is wireless and automatic, and has a number of interesting features that can simplify our daily lives.The ProblemsWhen any two devices need to talk to each other, they have to agree on a number of points before the conversation can begin. The first point of agreement is physical: Will they talk over wires, or through some form of wireless signals? If they use wires, how many are required – one, two, eight, 25? Once the physical attributes are decided, several more questions arise:Information can be sent 1 bit at a time in a scheme called parallel communications, or in groups of bits (usually 8 or 16 at a time) in a scheme called parallel communications. . A desktop computer uses both serial and parallel communications to talk to different devices: Modems, mice and keyboards tend to talk through serial links, while printers tend to use parallel links.All of the parties in an electronic discussion need to know what the bits mean and whether the message they receive is the same message that was sent. In most cases, this means developing a language of commands and responses know as a protocol. Some types of products have a standard protocol used by virtually all companies so that the commands for one product will tend to have the same effect on another. Modems fall into this category. Other product types each speak their own language, which means that commands intended for one specific product will seem gibberish if received by another. Printers are like this, with multiple standards like PCL and PostScript.Companies that manufacture computers, entertainment systems and other electronic devices have realized that the incredible array of cables and connectors involved in their products makes it difficult for even expert technicians to correctly set up a complete system on the first try. Setting up computer and home entertainmentsystem becomes terrifically complicated when the person buying the equipment has to learn and remember all the details to connect all the parts. In order to make home electronic more user friendly, we need a better way for all the electronic part of our modern life to talk to each other. That’s where Bluetooth comes in.Bluetooth BasicsBluetooth is a standard developed by a group of electronics manufacturers that allows any sort of electronic equipment –from computer and cell phones to keyboards and headphones –to make its own connections, without wires, cables or any direct action from a user. Bluetooth is intended to be a standard that works at two levels: It provides agreement at the physical level –Bluetooth is a radio-frequency standard . It also provides agreement at the next level up , where products have to agree on when bits are sent, how many will be sent at a time and how the parties in conversation can be sure that the message received is same as the message sent.The companies belonging to the Bluetooth Special Interest Group, and there are more than 1,000 of them, want to let Bluetooth’s radio communications take the place of wires for connecting peripherals, telephones and computers.Other Wireless ConnectionsThere are already a couple of ways to get around using wires. One is to carry information between computers via beams of light in the infrared spectrum. Infrared refers to light waves of a lower frequency than human eyes can receive and interpret.. Infrared is used in most television remote control systems, and with a standard called IrDA (Infrared Data Association) it`s used to connect some computers with peripheral devices. For most of these computer and entertainment purposes, infrared is used in a digital mode – the signal is pulsed on and off very quickly to send data from one point to another.Infrared communications are fairly reliable and don`t cost very much to build into a device, but there are a couple of drawbacks. First, infrared is a ―line of sight‖technology. For example, you have to point the remote control at the television or DVD player to make things happen. The second drawback is that infrared is almost always a ―one to one‖ technology. You can send data between your desktop computer and your laptop computer, but not your laptop computer and your PDA at the time.These two qualities of infrared are actually advantageous in some regards. Because infrared transmitters and receivers have to be lined up with each other, interference between devices is uncommon. The one-to-one nature of infrared communications is useful in that you can make sure a message goes only to the intended recipient, even in a room full infrared receivers.The Bluetooth SolutionBluetooth is intended to get around the problems that come with both infrared and cable synchronizing systems. The hardware vendors, which include Siemens, Intel, Toshiba, Motorola and Ericsson, have developed a specification for a very small radio module to be built into computer, telephone and entertainment equipment. From the user`s point of view, there are three important features to Bluetooth: It`s wireless. When you travel, you don`t have to worry about keeping track of a briefcase full of cables to attach all of your components, and you can design youroffice without wondering where all the wires will go.It`s inexpensive.You don`t have to think about it. Bluetooth doesm`t require you to do anything special to make it work. The devices find one another and strike up a conversation without any user input at all.Bluetooth FrequencyBluetooth communicates on a frequency of 2.45 gigahertz, which has been set aside by international agreement for the use of industrial, scientific and medical devices (ISM).A number of devices that you may already use take advantage of this same radio-frequency band. Baby monitors, garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. Making sure that Bluetooth and these other devices don`t interfere with one another has been a crucial part of the design process.Avoiding Interference: Low PowerOne of the ways Bluetooth devices avoid interfering with other system is by sending out very weak signals of 1 milliwatt. By computer, the most powerful cell phones can transmit a signal of 3 watts. The low power limits the range of a Bluetooth device to about 10 meters, cutting the chances of interference between your computer system and your portable telephone or television. Even with the low power, the walls in your house won`t stop a Bluetooth signal, making the standard useful for controlling several devices in different rooms.With many different Bluetooth devices in a room, you might think they`d interfere with one another, but it`s unlikely. On the next page, we`ll see why.Avoiding Interference: HoppingIt is unlikely that several devices will be on the same frequency at the same time, because Bluetooth uses a technique called spread-spectrum frequency hopping. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the casa of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second.When Bluetooth-capable devices come within range of one another, an electronic conversation takes place to determine whether they have data to share or whether one needs to control the other. The user doesn`t have to press a button or give a command –the electronic conversation happens automatically. Once the conversation has occurred, the devices – whether they`re part of a computer system or a stereo – form a network. Bluetooth systems create a personal-area network (PAN), or piconet, that may fill a room or may encompass no more distance than that between the cell phone on a belt-clip and the headset on your head. Once a piconet isestablished, the members randomly hop frequencies in unison so they stay in touch with one another and avoid other piconets that mat be operating in the same room. Example: NetworksLet`s take a look at how the Bluetooth frequency hopping and personal-area network keep system from becoming confused. Let`s say you`re got a typical modern living room with the typical modern stuff inside. There`s an entertainment system with a stereo, a DVD player, a satellite TV receiver and a television; there`s cordless telephone and a personal computer. Each of these systems uses Bluetooth, and each forms its own piconet to talk between main unit and peripheral.The cordless telephone has one Bluetooth transmitter in the base and another in the handset. The manufacturer has programmed each unit with an address that falls into a range of addresses it has established for a particular type of device. When the base is first turned on, it sends radio signals asking for a response from any units with an address in a particular range. Since the handset has an address in the range, it responds, and a tiny network is formed. Now, even if one of these devices should receive a signal from another system, it will ignore it since it`s not from within the network. The computer and entertainment system go through similar routines, establishing networks among address in ranges established by manufacturers. Once the networks are established, the systems begin talking among themselves. Each piconet hops randomly through the available frequencies, so all of the piconets are completely separated from one another.Now the living room has three separate network established , each one made up of devices that know the address of transmitters it should listen to and the address of receivers it should talk to.Since each network is changing the frequency of its operation thousand of times a second, it’s unlikely that any two network will be on the same frequency at the same time. If it turns out that they are, then the resulting confusion will only cover a tiny fraction of a second, and software designed to correct for such errors weeds out the confusing information and gets on with network’s businessExample:Half/Full DuplexMost of the time,a network or communications method either works in one direction at a time, called half-duplex communication, or in both direction simultaneously, called full-duplex communication. A speakerphone that lets you either listen or talk, but not both ,is an example of half-duplex communication, while a regular telephone handset is a full-duplex device.Beacause Bluetooth is designed to work in a number of different circumstances, it can be either half-duplex or full-duplex.The cordless telephone is an example of a use that will call for a full-duplex (two-way) link, and Buletooth can send data at more than 64,000 bits per second in a full-duplex link—a rate high enough to support several human voice conversation. If a particular use calls for a half-duplex link—connecting to a computer printer, for example—Bluetooth can transmit up to 721 kilobits per second(Kbps) in one direction,with 57.6 Kps in the other. If the use calls for the same speed in both directions, a link with 432.6-Kbps capacity in each direction can be made.Bluetooth SpaceHere are some specification details from the Bluetooth Web siteThe devices in a piconet share a common communication data channel. The channel has a total capacity of 1 megabit per second (Mbps). Headers and handshaking information consume about 20 percent of this capacity.In the United States and Europe, the frequency range is 2,400 to 2,483.5 MHz, with 79 1-MHz radio frequency (RF) channels. In practice, the range is 2,402 MHz to 2,480 MHz. In Japan, the frequency range is 2,497 MHz with 23 1-MHz rf channels.A data channel hops randomly 1,600 times per second between the 79 (or 23) RF channels.Each channel is divided into time slots 625 microseconds long.A piconet has a master and up to seven slzves.Packets can be up to five time slots wide.Data in a packet can be up to 2,745 bits in length.There are currently two types of data transfer between devices: SCO ( synchronous connection oriented) and ACL (asynchronous connectionless).In a piconet, there can be up to three SCO links of 64,000 bits per second each. To avoid timing and collision problems, the SCO links use reserved slots set up by the master.Masters can support up to three SCO links with one, two or three slaves.One master and slave can have a single ACL link.ACL is either point-to-point (master to one slave) or broadcast to all the slaves.ACL slaves can only transmit when requested by the master.The heart of the Bluetooth specification is the Bluetooth protocol stack. By providing well-defined layers of functionality, the Bluetooth specification ensures interoperability of Bluetooth devices and encourages adoption of Bluetooth technology.As you can see in figure 1-1, these layers range from the low-level radio link to the profiles.Figure 1-1:The Bluetooth protocol stackLower LayersAt the base of the Bluetooth protocol stack is the radio layer. The radio module in a Bluetooth device is responsible for the modulation and demodulation of data into RF signals for transmission in the air. The radio layer describes the physical characteristics a Bluetooth device`s receiver-transmitter component must have. These include modulation characteristics, radio frequency tolerance, and sensitivity level. Above the radio layer is the baseband and link controller layer. The Bluetooth specification doesn`t establish a clear distinction between the responsibilities of the baseband and those of the link controller. The best way to think about it is that the baseband portion of the layer is responsible for properly formatting data for transmission to and from the radio layer. In addition, it handles the synchronization of links. The link controller portion of this layer is responsible for carrying out the link manager`s commands and establishing and maintaining the link stipulated by link manager.The link manager itself translates the host controller interface (HCI) commands it receives into baseband-level operations. It is responsible for establishing and configuring links and managing power-change requests, among other tasks.You`ve noticed links mentioned numerous time in the preceding paragraphs. The Bluetooth specification defines two types of links between Bluetooth devices: Synchronous, Connection-Oriented (SCO), for isochronous and voice communication using, for example, headsetsAsynchronous, Connectionless (ACL), for data communication, such as the exchange of vCards.Each link type is associated with a specific packet. A SCO link provides reserved channel bandwidth for communication between a master and a slave, and supports regular, periodic exchange of data with no retransmission of SCO packets.An ACL link exists between a master and a slave the moment a connection is established. The data packets Bluetooth uses for ACL links all have 142 bits of encoding information in addition to a payload that can be as large as 2712 bits. The extra amount of data encoding heightens transmission security. It also helps to maintain a robust communication link in an environment fill with other devices and common noise.The HCI (host controller interface) layer acts as a boundary between the lower layers of the Bluetooth protocol stack and upper layers The Bluetooth specification defines a standard HCI to support Bluetooth systems that are implemented across two separate processors, For example, a Bluetooth system on computer might use a Bluetooth module`s processor to implement the lower layers of the stack (radio, baseband, link controller, and link manager). It might then use its own processor to implement the upper layers (L2CAP, RFCOMM, OBEX, and selected profiles). In this scheme, the lower portion is known as the Bluetooth module and the upper portion as the Bluetooth host.Of course, it`s not required to partition the Bluetooth stack in this way. Bluetooth headsets, for example, combine the module and the host portions of stack on one processor because they need to be small and self-contained. In such devices, the HCI may not be implemented at all unless at all unless device testing is required.Because the Bluetooth HCI is well defined, you can write drivers that handle different Bluetooth modules from different manufacturers. Apple provides an HCI controller object that supports a USB implementation of the HCI layer. .ReferencesBN. Sklavos et al., "Random Number Generator Architecture and VLSI Implementation,"Proc. IEEE Int'1 Symp. Circuits &Systems (ISCAS 02), IEEE Circuits and Systems So Bluetooth security white paper;Bluetooth SIG security expert group.c. Press, Piscataway, N.J., 2002, pp.854-857.M. Abramovici, M.A. Breuer, and A.D. Friedman, Digital Systems Testing and Testable Design, IEEE Press, Piscataway, N.J., 1990.P. Chandrakasan, S. Sheng, and R. W.Brodersen, "Low Power CMOS Digital Design," IEEE J. Solid-State Circuits, vo1.27, no. 4, Apr. 1992, pp. 473-X84.J.L. Massey, G.H. Khachatrian, and M.K.Kuregian, "Nomination of SAFER+ as Candidate Algorithm for the Advance Encryption Standard," Proc. 1 st AdvancedEncryption Standard Candidate Conf., 1998;/}rblee/safer+.Bluetooth SIG, Specification of the Bluetooth system, Core, Part B;'Baseband specification'; Version 1 .1, 22 February 2001, at血S.Sengodan,T.Luo,R.Bansal,H.Herlin; "End-to-end Security Issues Wireless-IP Networks,‖IASTED Applied Informatics,Austria,February in 15-17,2000M.Bellare,R.Canetti,H.Krawczykz, "Keying Hash Functions for Message Authentication,"Advances in Crypto 96 Proceedings ,Lecture Notes in Computer Sciences V o1.1109,N.Koblitz ed.,Springer-Verlag,1996蓝牙设备怎样工作在电气设备中存在很多种连接方式。

外文文献翻译蓝牙技术中英文

外文文献翻译蓝牙技术中英文

蓝牙技术外文文献翻译(含:英文原文及中文译文)文献出处:K Nieberl. Telemedicine ECG-telemetry with Bluetooth technology[J] Computers in Cardiology IEEE, 2016,5(3):58-69.英文原文Bluetooth TechnologyKarl NieberlIntroductionBluetooth is a forever, limited radio connect that resides on a microchip. It was originally expanded through Swedish mobile phone creator Ericsson in 1994 as a method to let laptop computers make calls above a mobile phone. As then, numerous organizations have signed on to create Bluetooth the low-power thoughtless wireless average for a broad variety of devices (LeVitus, 216-220). Industry spectators anticipate Bluetooth to be fitted in billions of devices through 2005.DiscussionDeveloped by engineers at Ericsson in the late 1990s, Bluetooth is more and more special technology that facilitates thoughtless wireless communication among a diversity of electronic devices. Its mainly important aspect is that it permits devices to “talk” (relocate and orchestrate data) wirelessly with each other, terminating the requirement for the outwardly continuous tangle of cables, cords, and adaptersimportant for numerous today’s expertise.The Bluetooth Special Interest Group (SIG) was formed in 1998 to manage the expansion and prologue of Bluetooth knowledge (LeVitus, 216-220). IBM, Intel, Toshiba and Nokia connected with Ericsson as the beginning associates of the SIG, and in excess of 8,000 organizations have contracted since. So as to trade products with the Bluetooth requirement and logo, manufacturers should be associates of the SIG and the devices should meet well-outlined credentials. These procedures make sure that Bluetooth wireless devices international may converse with each other, apart from company or nation of derivation.Speed and RangeRange is application specific and although a minimum range is mandated by the Core Specification, there is not a limit and manufacturers can tune their implementation to support the use case they are enabling.Range may vary depending on class of radio used in an implementation:∙Class 3 radios – have a range of up to 1 meter or 3 feet∙Class 2 radios – most commonly found in mobile devices , have a range of 10 meters or 33 feet∙Class 1 radios – used primarily in industrial use cases , have a range of 100 meters or 300 feetThat creates Bluetooth technology appropriate for transporting lesser files for example cell phone contracts and text documents, also as lower-quality pictures and audio (Kumkum, 160-162). At these relocate speeds; Bluetooth may not actually deal streaming video or high-quality pictures and audio at this end, except this possibly will alter in the future when fresh Bluetooth standards are initiated.Simple and Competent to UtilizeCreating and configuring Bluetooth allowed devices is moderately uncomplicated, with little extra commotion than acquire the two devices close to one another and twist them on. There is no requirement to mount drivers or further software to complex an ad-hoc, personal wireless network (Kumkum, 160-162). It has a uniform organization, meaning that some two wireless products attributing Bluetooth technology, despite of product or nation of origin, have the ability to converse faultlessly with each other.Common ApplicationsOne of the mainly ordinary applications of Bluetooth is hands-free cell phone procedure. About each cell phone fashioned in our day has constructed Bluetooth (Meier, 15-20). Only pair phone with a Bluetooth headset, and he may talk whereas his phone is in his purse or pocket. Several of today’s car stereos as w ell have fitted Bluetooth for hands-free calling in his vehicle. And if his vehicle has a plant stereo or grown-upaftermarket one that he merely doesn’t wish to restore, he may yet like hands-free identifying with a Bluetooth car kit.BluetoothBluetooth is the fresh Bluetooth wireless typical adopted through the Bluetooth SIG on April 21, 2020. The fresh standard supports elevated data remove speeds and constructs ahead the preceding standards (Meier, 15-20). With its superior speed, the technology has the probable to transfigure the consumer electronics industry.PROTOCOLThe Bluetooth technology standard is set to make different applications can “communicate” with each other. Remote devices in communication use the same protocol stacks, while different applications need different protocol stacks. But, every application needs the data link layer and physical layer of the Bluetooth technology. The whole Bluetooth protocol stacks is shown as blow. Not any application should use all of the protocols, but one or some lists of these. The chart below shows the relationship between protocols, but the relationship may change in some applications.The completely protocol stacks include Bluetooth special protocols (like LMP and L2CAP) and not special ones (such as OBEX and UDP). The basic principle for designing protocol and protocol stacks is that use existing high level protocol as possible, ensure the combination ofprotocols and Bluetooth technology, and take the best advantage of the software and hardware which adapt to the Bluetooth technology standards. The open Bluetooth technology makes device manufacturers can choose protocols freely as they like or used to.The protocols in Bluetooth protocol systemThere are four layers in Bluetooth protocol system according to the SIG∙Core protocols∙Cable replacement protocols∙Telephony control protocols∙Adopted protocolsExcept the protocol layers above, the standard also defines Host/Controller Interface (HCI),which provides command interface for baseband controller, connection manager, hardware state and control register.Bluetooth core protocols consist of the special protocols made by SIG. Most Bluetooth devices need core protocols, while other protocols are used depend on needs of the application. After all, cable replacement protocols, technology control protocols and adopted protocols based on the core protocols constitute the object-oriented protocols.∙Core protocols∙LMP (Link Management Protocol)Used for control of the radio link between two devices. Implemented on the controllers. It identifies and encrypts through launching, exchanging and checking the connection, and decides the size of baseband data packets through conference. It also controls the power mode and work cycle of wireless equipment, and connection status of unit equipment in piconet.∙L2CAP (Logical Link Control & Adaptation Protocol)This protocol is used to multiplex multiple logical connections between two devices using different higher level protocols, and provides segmentation and reassembly of on-air packets.In Basic mode, L2CAP provides packets with a payload configurable up to 64kB, supported MTU.In Retransmission & Flow Control modes, L2CAP can be configured for reliable or isochronous data per channel by performing retransmissions and CRC checks. Bluetooth Core Specification Addendum 1 adds two additional L2CAP modes to the core specification. These modes effectively deprecate original Retransmission and Flow Control modes:∙Enhanced Retransmission Mode (ERTM): This mode is an improved version of the original retransmission mode. This mode provides a reliable L2CAP channel.∙Streaming Mode (SM): This is a very simple mode, with noretransmission or flow control. This mode provides an unreliable L2CAP channel.Reliability in any of these modes is optionally and/or additionally guaranteed by the lower layer Bluetooth BDR/EDR air interface by configuring the number of retransmissions and flush timeout (time after which the radio will flush packets). In-order sequencing is guaranteed by the lower layer.Only L2CAP channels configured in ERTM or SM may be operated over AMP logical links.∙SDP (Service Discovery Protocol)Service Discovery Protocol (SDP) allows a device to discover services supported by other devices, and their associated parameters. For example, when connecting a mobile phone to a Bluetooth headset, SDP will be used for determining which multiplexer settings needed to connect to each of them. Each service is identified profiles) assigned a short form UUID (16 bits rather than the full 128)/vichitra∙Cable replacement protocols(RFCOMM)Radio frequency communications (RFCOMM) is a cable replacement protocol used to create a virtual serial data stream. RFCOMM provides for binary data transport and layer.RFCOMM provides a simple reliable data stream to the user, similar to TCP. It is used directly by many telephony related profiles as a carrierfor AT commands, as well as being a transport layer for OBEX over Bluetooth.∙Telephony control protocols (TCP).Telephony control protocol-binary (TCS BIN) is the bit-oriented protocol that defines the call control signaling for the establishment of voice and data calls between Bluetooth devices. Additionally, "TCS BIN defines mobility management procedures for handling groups of Bluetooth TCS devices."TCS-BIN is only used by the cordless telephony profile, which failed to attract implementers. As such it is only of historical interest.∙Adopted protocolsAdopted protocols are defined by other standards-making organizations and incorporated into Bluetooth’s protocol stack, allowing Bluetooth to create protocols only when necessary. The adopted protocols include:∙Point-to-Point Protocol (PPP): Internet standard protocol for transporting IP datagrams over a point-to-point link.∙TCP/IP/UDP: For communicating with the device connected to Internet. ∙Object Exchange Protocol (OBEX): Session-layer protocol for the exchange of objects, providing a model for object and operation representation. It uses the client-server mode.∙Wireless Application Environment/Wireless Application Protocol(W AE/W AP):W AE specifies an application framework for wireless devices and W AP is an open standard to provide mobile users access to telephony and information services.SPECTRUM AND INTERFERENCEBluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at to GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The GHz ISM band is available and unlicensed in most countries.SIM frequency band is open to all radio system, So the use of a certain frequency band will meet unpredictable interference sources. Therefore, Bluetooth designs special fast acknowledge and frequency hopping technique to ensure the stability of link. Frequency hopping technique to divide the band into many frequency hopping channels, in a connection, radio transceiver “jump” from a channel to another constantly according to certain code sequence. Only sender and receiver communicate according to this law, and the rest of interference may not press the same rule. The instantaneous bandwidth of Frequency hopping is very narrow, but through the spread spectrum technology it can make the narrow bandwidth one hundred times expanded into wideband, making the influence of interference may become very small. Comparing to other systems that work in the same frequency band, frequency hopping of Bluetooth works faster, data packet of Bluetooth is shorter,which make it more stable than the other.ERROR CORRECTIONBluetooth supports circuit switching and packet switching two techniques, and defines two types of link connection, namely connection-oriented synchronous link (SCO) and connectionless-oriented asynchronous link (ACL)Bluetooth use three error correction models: 1/3 Forward Error Correction (FEC), 2/3forward Forward Error Correction and Automatic Repeat Request (ARQ). Purpose to the error correction is to reduce the possibility of retransmission, while at the same time increase the extra expenses, but in a reasonable errorless environment, redundant bids will reduce output. So the packet definition itself also keeps flexible ways. Hence the software can be defined whether to adopt FEC. In general, when the channel noise is large, Bluetooth system will uses FEC, in order to ensure the quality of communication: as to SCO link, 1/3 FEC is used; 2/3 FEC is used in ACL link. In unnumbered ARQ, the data send in a time slot must receive a confirmation of receipt in the next time slot. Only when the data is checked to be without mistake after header error detection and CRC at receiver will the confirmation sent to sender, or an error message will be sent back.RANGERange is application specific and although a minimum range ismandated by the Core Specification, there is not a limit and manufacturers can tune their implementation to support the use case they are enabling.Range may vary depending on class of radio used in an implementation:∙Class 3 radios – have a range of up to 1 meter or 3 feet∙Class 2 radios – most commonly found in mobile devices , have a range of 10 meters or 33 feet∙Class 1 radios – used primarily in industrial use cases , have a range of 100 meters or 300 feetPOWERIn order to make a Bluetooth equipment can also be in connection even in a very low power state, Bluetooth stipulates three energy saving state: Park state, Hold state and Sniff state. The energy saving efficiency of these states declines one by one.The most commonly used radio is Class 2 and users of power. Bluetooth technology is designed to have very low power consumption. This is reinforced in the specification by allowing radios to be powered down when inactive.The Generic Alternate MAC/PHY in Version HS enables the discovery of remote AMPs for high speed devices and tums on the radio only when needed for data transfer giving a power optimization benefit aswell as aiding in the security of the radios.Bluetooth low energy technology, optimized for devices requiring maximum battery life instead of a high data transfer rate, consumers between 1/2 and 1/100 the power of classic Bluetooth technology.SECURITYMobility and open of Bluetooth system makes safety problems extremely important. Although the frequency modulation technique used by Bluetooth system has already provided a certain security, but Bluetooth system still need safety management to link layer and application layer. In link layer, Bluetooth system provides authentication, encryption and key management, and other functions. Each user has a Personal Identification Number (PIN), which will be translated into 128 bit link key for one-way or both-way certification. Once the authentication finished, link will use encryphon key to encrypt. The link layer security mechanism provides a great deal of certification schemes and a flexible encryption scheme (means allow the consultation of the length of password). This mechanism is very important when the equipments in communication are from different countries, because some countries will specify maximum password length. Bluetooth system will select the smallest maximum allowable password length of all equipments in the piconet.Bluetooth system also supports the high level of protocol stack indifferent applications of special security mechanisms. Bluetooth security mechanism builds trust relationship between devices relying on pins. Once this relationship established, these pins can be stored in the equipment, in order to connection more quickly the next time.中文译文蓝牙技术卡尔·尼伯尔引言蓝牙是永久性的,有限的无线电连接,驻留在微芯片上。

科技英语翻译蓝牙bluetooth

科技英语翻译蓝牙bluetooth

BluetoothHello everyone, Our new product is the Bluetooth earphone. What is the Bluetooth? It is very important. Okay, now I want to introduce the Bluetooth technology first.Cables have become a headache in many offices and homes. Bluetooth is wireless a cable-replacement technology based on short-range radio used to connect digital device.A Bluetooth chip is designed to replace cables by taking the information normally carried by the cable, and transmitting it to a receiver Bluetooth chip, which then gives the information received to the computer, phone, or other device.To establish a connection, two Bluetooth-equipped devices must be within a 10 meter range. Because Bluetooth utilizes a radio-based link, line-of-sight connection is not required.Interference from other signals is avoided by hopping to a new frequency after transmitting or receiving a packet.1. Your laptop could send information to a printer in the next room.2. You could use your mobile phone to control your home alarm system.3. Your mobile phone headset could communicate with a mobile phone in your pocket, or even in another room.4. You can surf the Web or write emails on your laptop while your mobile phone is in your bag and no wires in between.电缆已经让很多家庭和公司都感到头疼。

本科毕业设计--基于蓝牙技术智能灯光控制设计外文翻译

本科毕业设计--基于蓝牙技术智能灯光控制设计外文翻译

杭州电子科技大学信息工程学院毕业设计(论文)外文文献翻译毕业设计(论文)题目基于蓝牙技术智能灯光控制设计安卓软件设计翻译题目蓝牙技术系通信工程专业通信工程姓名班级学号指导教师International Journal of Computer Tools & Manufacture 45 (2005) 115–124The origin and development of BluetoothC.K. Au*School of Mechanical and Production Engineering, Nanyang Technological University, 50 Nanyang Ave, 639798SingaporeReceived 15 March 2004; received in revised form 7 June 2004; accepted 15 June 2004国际期刊计算机与制造45 (2005) 115-124蓝牙的起源与发展C.K. Au南洋理工大学机械生产工程学院,新加坡南阳路50号,639798标准版本2004年3月15;修订版本2004年6月7;正常版本2004年6月15号摘要本文论述蓝牙技术的起源与发展。

重点介绍蓝牙技术的基本原理以及蓝牙技术在当今时间的作用。

论述了蓝牙技术的优点与缺陷以及未来的发展趋势关键字:协议、技术、应用、发展介绍蓝牙是一个永远的,有限的无线电连接驻留在一个芯片。

它最初是在1994年扩大,作为一种方法,让笔记本电脑作出上述呼吁手机通过瑞典手机爱立信的创造者。

然后,许多组织已经签署了创建蓝牙低功耗平均各种各样的设备(LeVitus,216-220)的无线轻率。

业内观众预期蓝牙在安装设备的十亿美元,到2005年。

讨论蓝牙是由爱立信工程师在20世纪90年代末开发,越来越多的特殊的技术,有利于无线通信电子设备的多样性之间的轻率。

蓝牙技术的英文介绍

蓝牙技术的英文介绍

Origin
Bluetooth is the founder of Sweden's Ericsson, Ericsson has been R & D in 1994. In 1997, Ericsson and other equipment, contact the manufacturer and to stimulate their interest in this technology.ln February 1998, five multinational companies, including Ericsson, Nokia, IBM, Toshiba and Intel formed a special interest group (SIG), their common goal is to establish a global short-range wireless communications technology, which is now Bluetooth.
Whafs the presently newest technical standard for shortrange radio?
@ Bluetooth
Bluetooth devices communicate without wires, using built-in radio transceivers that operate on a globally available radio frequency to ensure worldwide compatibility.
Entertainment
Bluetooth wireless technology is the only truly wireless entertainment technology.

Bluetooth(专业英语论文)

Bluetooth(专业英语论文)

BluetoothAbstract:Bluetooth has been the most advanced technology in our world. But not all of us know what exactly Bluetooth is, how dose Bluetooth work and what advantage Bluetooth has? Today or in the future, Bluetooth will bring us a great many riches, so all of us should know something about Bluetooth now. In my academic discourse, you will know more about Bluetooth: why we need Bluetooth? How dose Bluetooth come out? How dose Bluetooth work? In what aspect can Bluetooth be used? How will Bluetooth develop? With all of these questions, let us read this discourse and go into the Bluetooth World.Keyword:Bluetooth 蓝牙cable 电缆, 海底电报, 缆,索frequency 频率, 周率, 发生次数mobile phones 可移动电话,手机microchip 微芯片synchronous 同步的,同时的IEEE 电气和电子工程师协会Broadband 宽带Wireless 无线的SNAP Smart Network Access Points(智能网络接入点)Polyphony Server 复音服务器Constellation Partners 星级伙伴Virtual Private Networks 虚拟专用网Ethernet 以太网Look around you at the moment, you have your keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What joins all of these together? Of course, they are connected by cables. Cables have become the bane of many offices, homes etc. Most of us have experienced the 'joys' of trying to figure out what cable goes where, and getting tangled up in the details. Today, you will not be worried about this, Bluetooth essentially aims to fix this,it is a cable-replacement technology .But what exactly is Bluetooth? Well it isn't some strange form of tooth decay as you might initially imagine. Bluetooth is the name of a new technology, set to commercially come out in bulk around 2002. It promises to change significantly the way we use machines.Bluetooth Technology, which was conceived initially by Ericsson, has gained the support of Nokia, IBM, Toshiba, Intel and many other manufacturers today. Before being adopted by these companies, Bluetooth is a standard for a small, cheap radio chip to be plugged into computers, printers, mobile phones, etc. A Bluetooth chip is designed to replace cables by taking the information normally carried by the cable, and transmitting it at a special frequency to a receiver Bluetooth chip, which will then give the information received to the computer, phonewhatever. That was the original idea, but the originators of the original idea soon realized that a lot more was possible. They thought, if you can transmit information between a computer and a printer, why not transmit data from a mobile phone to a printer, or even a printer to a printer? The projected low cost of a Bluetooth chip, and its low power consumption, means you could literally place one anywhere.How does Bluetooth works? Bluetooth uses a short-range radio link built into a 9 mm x 9 mm microchip. The protocol enables the exchange of information between many devices, including mobile telephones, PDAs, notebook PCs, handheld PCs, associated peripherals, and home hubs, which may include Home RF. The radio will operate on the globally available 2.45 GHz ISM "free band," meaning there will be no hindrance for international travelers using Bluetooth-enabled equipment. Bluetooth does not require line of sight for connection, provided they are within operational range of other Bluetooth-enabled devices. The Bluetooth base band protocol is a combination of circuit- and packet-switching, making it suitable for both voice and data. Each voice channel supports a 64 Kbit/s synchronous link, and the asynchronous channel can support an asymmetric link of up to 721 Kbit/s in either direction, while permitting 57.6 Kbit/s in the return direction. All in all, this is fast enough to cope with the vast majority of proposed data rates over cellular systems. The nominal link range is 10 cm to 10 m, but links can be extended to morethan 100 m by increasing the transmit power. The software framework in the proposed specification would require Bluetooth-compliant devices to support a basic level of interoperability. The level of compliance will vary depending on the device application.Now we can say that Bluetooth has a lot of advantage.1>Fast frequency hopping avoids interference.2>Adaptive output power minimizes interference.3>Short data packets maximize capacity during interference.4>Fast acknowledge allows low coding overhead for links.5>CVSD(Continuous Variable Slope Delta Modulation) voice coding enables operation at high bit-error rates.6>Flexible packet types supports wide application range.7>Air interface tailored to minimize current consumption. Basic Technical Information-Based upon a small, high performance integrated radio transceiver, each of which is allocated a unique 48-bit address derived form the IEEE 802.standard. 8>Operate in the unrestricted 2.45GHz ISM free band, Which is available globally although slight variation of location and width of band apply.9>Range set at 10m to optimize for target market of mobile and businessuser.10>Gross data rate 1Mbit/s with second generation plans to increase to 1Mbit/s.11>One-to-one connections allow maximum data transfer rate of 721kbit/s (3 voice channels). 12>Uses packet switching protocol based on frequency hop scheme with 1600hops/s enable high performance in noisy radio environments. The entire available frequencyspectrum id used with 79 hops of 1Mhz bandwidth, analogous to the IEEE 802.11 standard.13>Low power consumption longevity for battery powered devices. During data transfer the maximum current drain is30mA.However during pauses or at lower data rates will be lover.Because of all the things we have inferred above, a lot of people become interested in Bluetooth. With this viewpoint interest in Bluetooth is soaring, lots of ideas are constantly emerging, some practical and feasible e.g.: Bluetooth chips in freight containers to identify cargo when a lorry drives into a storage depot, or a headset that communicates with a mobile phone in your pocket, or even in the other room, other ideas not so feasible: Refrigerator communicating with your Bluetooth-enabled computer, informing it that food supply is low, and to inform the retailer over the internet. If we want to know more about Bluetooth, we should know some new Bluetooth Products. There are some new Bluetooth Products here, we can see the big advantage it has.1. The Racewood Technology Co., Ltd. Bluetooth headset RBTHS001. It can be used with any application requesting personal audio through a lightweight, easy- to-use and easy-to-wear device, offering enhanced mobility through the use of true wireless technology. The RBTHS001 allows for the host headset to be worn and used freely up to a distance of10 meters from the connecting device. The headset can be operated and linked to the audio gateway at most 3 seconds after being turned on.2. The Racewood Technology Co., Ltd. Universal Class 1 and Class 2 Bluetooth™ USB Dongle RBTPU001. It is compact and qualified module that provide a complete 2.4GHz Bluetooth™ system for wireless data and voice communications. The RBTPU001 includes an integrated antenna and a USB connector interface, offering a simple Bluetooth solution for electronic devices with a USB interface.3. The Racewood Technology Co, Ltd Universal Class 2 BluetoothCompact Flash card RBTCF001. It is Bluetooth v1.1 compliant that will be used with Personal Digital Assistant products to allow you to wirelessly connect with other Bluetooth-enabled devices. The Bluetooth Compact Flash card can plug into PDA, handheld PC through a Type 1 Compact Card slot, features a class 2 radio, an integral antenna and operation range of 10m.The Bluetooth Compact Flash card can be plug_and_play under Windows CE and Pocket PC 2000/2002 operating systems.Use Bluetooth Compact Flash card in your PDA, pocket or handheld PC to wirelessly synchronize data with your Bluetooth PC or other Bluetooth device. Also, this single wireless product can be used for many purposes,whether connecting to the Internet via an access point or sending files to others.Now let us talk about the hotel and Bluetooth. The rapid adoption of Bluetooth technology by the hotel industry would appear to provide early evidence of its potential. However, there are many questions as to the real viability of wireless systems in this business environment. The hotel industry is not one that you would normally associate with leading edge, high technology. However, in this age of the international business park, the demands of the business travelers are changing the face of hotel services. Hotels catering for business travelers have flourished and to keep its increasingly essential business clientele, the hotel industry is embracing new technologies to help deliver increased services to guests. The idea is a relatively simple one. There is a sort of service war going on and some hotels, particularly the larger chains, have grown hungry for new technologies. This hunger is manifesting itself in the take-up of wireless technologies and in particular, Bluetooth.The main reasoning behind this is to offer guests services such as email, internet access, greater in-hotel control of facilities, and access to local attraction information, remote checking in or out, use of hotel printing facilities and so on. While anyone can see that additional services in hotels could be extremely beneficial to the business travelersin particular, given that Bluetooth is still a new technology there remains an air of uncertainty around the validity of such services. And one question that is always thrown about when a new technology comes along is whether or not it is technology for technology's sake. There are enough worthy applications around to suggest this is not the case, although this is still something to be wary of. It is important to decipher whether hotels are embarking on a technology game or if there is something of real value to hotel guests here.One company that is about to embark on a trial of a Bluetooth-based hotel network is Bluetooth software developer, Classwave Wireless. The trial, to take place in June this year, follows a partnership deal with the Starwood Hotel chain. The potential of the application is full of optimism. We could say that "working with a partner like Classwave will enable Starwood to deliver a new level of information and service to its guests and employees." Classwave CEO, Tom Sweeney, claimed that its Polyphony Server "will enable Starwood to easily create new revenue streams and business models by delivering mobile personal networks for the dynamic delivery of content within their properties worldwide." Starwood, which boasts 725 properties in 80 countries including the Sheraton, St Regis and Westin brands, will install Classwave's Polyphony server in one of its New York hotels. This, it claims, will offer guests access to the internet and email, mobile registration and personalizedinformation via mobile devices, electronic concierge and in-hotelm-commerce. Classwave, a specialist in what it terms Bluetooth Network Infrastructure solutions, will initially set up a system that will deal with guest reservation and registration information. Business travelers will be able to check-in and check-out where they want and when they want, according to the company.But it doesn't stop there. According to Classwave, there are greater benefits in terms of both functionality and cost. As well as offering guests wireless services, the system will enable a number of other functions for the hotel back office including mobile management systems, employee service logistics, employee chat services, instant messaging and access to corporate data.The hotel could also have its own mobile portal extending localized content to guests, voice services and access to Starwood's 'Constellation Partners' for m-commerce and convention services. "The wireless server platform enables companies like Starwood to easily create new revenue streams and business models by delivering mobile portals for the dynamic delivery of content," says a Classwave spokeswoman. "We are finding three primary reasons for deploying Polyphony Server in hotels: to generate revenue; reduce registration staff; and reduce call centre staff." The revenue generation comes from an increase in fee-based services such as high-speed internet usage, email and fax, while the reduction in traditional staff isundoubtedly a long-term cost saver. A reduction in registration staff by providing automated check-in and a reduction in call centre staff through extension of website reservation system to wireless devices will be attractive propositions to the budget sensitive hotelier. It will also have the added benefit of reducing waiting times for check-in and reservation changes.The system works by deploying a number of SNAPs around the hotels to allow for transfer of information from kiosks to customer mobile devices. It is controlled by Classwave's Polyphony Server, which provides the backbone 'intelligence' for the Bluetooth network by managing the devices media format and content delivery through the SNAPs and other wireless channels including cellular networks. While the network is based on the Bluetooth standard, Classwave's application itself is not dependent on Bluetooth. Classwave also supports 802.11 but claims, "due to the form factor of PDAs and phones expected to embrace Bluetooth, we are using it in the hotel trials," adds the spokeswoman. The main reasoning given is the "lower power usage", "reasonable speed" and "the support for both data and voice".Let us have a look at the Five-star treatment. The Holiday Inn Wall Street is another hotel striving to offer its clientele leading edge technology services. It has teamed up with Registry Magic to deliver what it claims is "the world's first full service Bluetooth-enabled hotel," a statement that may raise a few eyebrows at Starwood. Registry Magic'sinvolvement with The Holiday Inn is to initially provide itsBluetooth-based Consumer Payment Network and Bluetooth cell phones and mobile devices to enable guests to access a host of wireless services. These services include check-in and check-out, making payments atin-house restaurants, secure access to rooms, internet access and picking up phone messages.Like Classwave and Starwood, Registry Magic and The Holiday Inn are quick to dismiss any suggestion of gimmick. John Falcone, Registry Magic's senior vice president of technology and business development believes that the hotel application is one of the "true commercial Bluetooth applications" and therefore a valid investment for the hotel industry.Of course, if you don't spend your time frequenting hotels then this application is highly unlikely to impact your everyday life, but we kind of see the point. For so long Bluetooth has just been a technology with visions attached to it and now here is an application with a willing commercial audience in the hotel trade.In fact, for the past 18 months, hotel chains have been, or are now starting to install technology as a means to offer greater services to guests in what is fast becoming a services war in the industry. Hyatt Hotels and Resorts last yearteamed-up with I-Quest to install a broadband plug_and_play internet connection in its rooms using Worldroom Connect's Virtual Private Networks (VPNs). Although the system is based on a standard Ethernetcable network, it demonstrates that the demand for internet access in hotel rooms is sufficient enough to warrant the investment from the hotel groups.While it could be argued that guests only really work and want to access the internet in their rooms, it may be because that is the only option that is open to them. The trouble here is that we are dabbling in a yet-to-be-proven use of mobile devices where words such as 'potential' and 'if' are regularly applied. So could this drive towards wireless infrastructures be misplaced? The answer is not. A Bluetooth-based network service should just provide guests with greater flexibility. If they want to use their mobile devices and notebook PCs in their rooms they can still use the system but it just provides greater flexibility of movement. If a guest wants to peruse the web while sitting in the bar sipping his favourite cocktails, why shouldn't he?Of greater concern are the still inherent problems encountered with Bluetooth. Interoperability is still causing some problems especially as the technology and subsequent Bluetooth-enabled devices are still in their infancy. Could Classwave risk interoperability problems in the trials? It seems not, as the company admits it is sourcing devices from a single vendor in an attempt to mitigate the risks.For Bluetooth to also take-off in the hotel trade it will have to be very reliable. It is one thing saying that a Bluetooth application will reduce check-in times and ease the registration process but it is another thing to actually deliver it, especially at the cost of front desk staff. It is almost possible to imagine the scene where the system breaks down and the hotel lobby is full of suited guests queuing to speak to one or two receptionists while staring blankly into their Bluetooth devices.The optimism in the hotel industry is indicative of the hype that has surrounded Bluetooth since its inception. A fundamentally excellent invention, simple idea but complicated execution has meant that it was always going to struggle to meet early expectation. The hotel applications provide the technology with an intriguing test bed that will pit a number of Bluetooth features and devices together in one potentially busy environment.The remaining question for hoteliers is an emotional one. Hotels traditionally cater for a wide variety of people and not all business travelers may demand wireless services. Standardizing certain hotel functions through technology may be dangerous. Not everyone, even business travelers, like too much technology and gadgetry. Getting the mix of traditional and technology-based services right will be down to the skill of the hoteliers themselves. When that mix is decided upon, Bluetooth will no doubt play its part. Although still in its honeymoon period, Bluetooth appears to have found a home in hotels.I think now you have known Bluetooth comprehensively. By the way if, you're wondering where the Bluetooth name originally came from, it's named after a Danish Viking and King, Harald Bl?tand (Bluetooth in English), who lived in the latter part of the 10th century. Harald Bl?tand united and controlled Denmark and Norway (hence the inspiration on the name : uniting devices through Bluetooth). Old Harald had an inclination towards eating Blueberries, so much so his teeth became stained with the colour, leaving Harald with a rather unique set of molars.In my opinion, nothing can be more important than advanced technology in our new life. It is to say Bluetooth has its own station in our world. In the nearly future, there are no cable around us, everything will become easy.Reference:///yunfu/mobile_tech/bluetooth.htm。

蓝牙技术的英文介绍

蓝牙技术的英文介绍

The Bluetooth logo design of this: it's name from Harald Bluetooth "H" and "B" two Letters, with the Runic alphabet to represent, these two together, it became a Bluetooth logo.
Origin
Bluetooth is the founder of Sweden's Ericsson, Ericsson has been R & D in 1994. In 1997, Ericsson and other equipment, contact the manufacturer and to stimulate their interest in this technology.In February 1998, five multinational companies, including Ericsson, Nokia, IBM, Toshiba and Intel formed a special interest group (SIG), their common goal is to establish a global short-range wireless communications technology, which is now Bluetooth.
kitchen
Work
Through Bluetooth wireless technology , the office no longer see the clutter of wires , the whole office is like a machine , like an orderly and efficient operation.

什么是“蓝牙”技术?WhatisBluetooth?

什么是“蓝牙”技术?WhatisBluetooth?

什么是“蓝牙”技术?WhatisBluetooth?什么是“蓝牙”技术? What is Bluetooth?什么是“蓝牙”技术? What is Bluetooth?Bluetooth is a universal radio interface in the 2.45GHz frequency band that enables portable electronic devices to connect and communicate wirelessly via short-range, ad hoc networks. Each unit can simultaneously communicate with up to sever other units per piconet. Moreover, each unit can simultaneously belong to several piconets.What is Bluetooth Technology?Bluetooth technology which apart from Ericsson, has gained the support of Nokia, IBM, Toshiba, Intel and many other manufacturerseliminates the need for wires, cables and connectors for and between cordless or mobile phones, modems, headsets,PDAs, Computers, printers, projectors, local area networks, and so on, and paves the way for new and completely different devices and applications.Technology Characteristics1Ms/s symbol rate exploits maximum available channel bandwidthFast frequency hopping avoids interferenceAdaptive output power minimizes interferenceShort data packets maximize capacity during interferenceFast acknowledge allows low coding overhead for linksCVSD (Continuous Variable Slope Delta Modulation) voice coding enablesoperation at high bit- error ratesFlexible packet types supports wide application rangeAir interface tailored to minimize current consumptionBasic Technical Information—Based upon a small , high performance integrated radio transceiver ,each of which is allocated a unique 48-bit address derived from the IEEE 802·standard .Operate in the unrestricted 2.45GHz ISM free band, Which is available globally although slight variation of location and width of band applyRange set at 10m to optimize for target market of mobile and business userGross data rate 1Mbit/s with second generation plans to increase to 1Mbit/s。

蓝牙技术及其应用

蓝牙技术及其应用

蓝⽛技术及其应⽤蓝⽛技术及应⽤Bluetooth Technology and Its Application摘要蓝⽛技术是指⼀种低成本、⾼可靠性的短距离通⽤⽆线通信接⼝技术及其配套软件的公开标准。

它将通信和计算机技术进⼀步整合在有限范围内使不同⼚家⽣产的各种信息设备通过⽆线接⼝实现信息共享和互操作。

蓝⽛技术有着⼴阔的发展和应⽤前景。

本⽂简要介绍了蓝⽛技术及应⽤。

关键词: 蓝⽛技术应⽤发展AbstractThe bluetooth technology refers to a low cost, high reliability of wireless communication interface technology of short general public standards and software. It will further integrate communication and computer technology in a limited range of different manufacturers to all kinds of information through wireless device interface implementation of information sharing and interoperability. Bluetooth technology has wide development and application prospect. This paper briefly introduces the bluetooth technology and application.Keywords :Bluetooth technology , application , development现代⽣活中,每个⼈的信息设备都越来越多,为了提⾼⼯作效率及设备资源的充分利⽤,周围的连线不可避免地逐渐增多,蓝⽛技术的设计初衷是利⽤短程⽆线电链路取代专⽤电缆 ,将移动电话和便携式计算机、台式计算机、个⼈数字助理 (PDA)、传真机、打印机、摄像机、数字照相机以及和微波炉、电冰箱、洗⾐机等家⽤电器连接起来 ,不但可以免去相互之间电缆连接的⿇烦 ,⽽且便于⼈们在室内或室外流动时遥控操作。

蓝牙技术概述

蓝牙技术概述

蓝牙技术概述【摘要】介绍了蓝牙的起源和SIG组织的发展现状,分析了蓝牙技术的协议标准,并讨论了蓝牙技术的特点,对蓝牙技术在生活中的应用做了探讨。

关键词蓝牙技术;短距离无线通信;协议堆栈Bluetooth technology overviewAbstract This article describes the origin of the Bluetooth and the development of the organization of the SIG, analysis the standard agreement of the Bluetooth technology and discusses the characteristics of Bluetooth.Key words Bluetooth technology;short-range wireless communications;protocol stack信息时代最大的特点便是更加方便快速的信息传播,而数字化设备的有线连接给人们随时随地与信息网络连接和通信带来了很多不便,正是基于这一点技术人员也在努力开发更加出色的信息数据传输方式。

蓝牙,对于手机乃至整个IT业而言已经不仅仅是一项简单蓝牙适配器图片的技术,而是一种概念。

当蓝牙联盟信誓旦旦地对未来前景作着美好的憧憬时,整个业界都为之震动。

抛开传统连线的束缚,彻底地享受无拘无束的乐趣,蓝牙给予我们的承诺足以让人精神振奋。

所谓蓝牙(Bluetooth)技术,实际上是一种短距离无线电技术,利用"蓝牙"技术,能够有效地简化掌上电脑、笔记本电脑和移动电话手机等移动通信终端设备之间的通信,也能够成功地简化以上这些设备与因特网之间的通信,从而使这些现代通信设备与因特网之间的数据传输变得更加迅速高效,为无线通信拓宽道路。

一、蓝牙技术的发展1、蓝牙的起源蓝牙的创始人是瑞典爱立信公司,爱立信早在1994年就已进行研发。

英文文献翻译(关于zigbee)

英文文献翻译(关于zigbee)

英文文献翻译1.1 StandarsWireless sensor standards have been developed with the key design requirement for low power consumption. The standard defines the functions and protocols necessary for sensor nodes to interface with a variety of networks.Someof these standardincludeIEEE802.15.4,ZigBee,WirelessHART,ISA100.11,IETF6LoW-PAN,IE EE802.15.3,Wibree.The follow-ing paragraphs describes these standards in more detail.IEEE802.15.4:IEEE802.15.4[37] is the proposed stan-dard for low rate wireless personal area networks (LR-WPAN's).IEEE802.15.4 focuses on low cost of deployment,low complexity, and low power consumption.IEEE802.15.4 is designed for wireless sensor applications that require short range communication to maximize battery life. The standard allows the formation of the star and peer-to-peer topology for communication between net-work devices.Devices in the star topology communicate with a central controller while in the peer-to-peer topol-ogy ad hoc and self-configuring networks can be formed.IEEE802.15.4devices are designed to support the physical and data-link layer protocols.The physical layer supports 868/915 MHz low bands and 2.4 GHz high bands. The MAC layer controls access to the radio channel using the CSMA-CA mechanism.The MAC layer is also responsible for validating frames, frame delivery, network interface, network synchronization, device association, and secure services.Wireless sensor applications using IEEE802.15.4 include residential, industrial, and environment monitor-ing, control and automation.ZigBee [38,39] defines the higher layer communication protocols built on the IEEE 802.15.4 standards for LR-PANs. ZigBee is a simple, low cost, and low power wireless com- munication technology used in embedded applications.ZigBee devices can form mesh networks connecting hun- dreds to thousands of devices together. ZigBee devices use very little power and can operate on a cell battery for many years. There are three types of ZigBee devices:Zig-Bee coordinator,ZigBee router, and ZigBee end device.Zig-Bee coordinator initiates network formation,stores information, and can bridge networks together. ZigBee routers link groups of devices together andprovide mul-ti-hop communication across devices. ZigBee end devic consists of the sensors, actuators, and controllers that col-lects data and communicates only with the router or the coordinator. The ZigBee standard was publicly available as of June 2005.WirelessHART:The WirelessHART[40,41] standard pro-vides a wireless network communication protocol for pro-cess measurement and control applications.The standard is based on IEEE802.15.4 for low power 2.4 GHz operation. WirelessHART is compatible with all existing devices, tools, and systems. WirelessHART is reliable, secure, and energy efficient. It supports mesh networking,channel hopping, and time-synchronized work com-munication is secure with encryption,verification,authen-tication,and key management.Power management options enable the wireless devices to be more energy effi-cient.WirelessHART is designed to support mesh, star, and combined network topologies. A WirelessHART network consists of wireless field devices,gateways, process auto- mation controller, host applications,and network man-ager.Wireless field devices are connected to process or plant equipment.Gateways enable the communication be-tween the wireless field devices and the host applications.The process automation controller serves as a single con-troller for continuous process.The network manager con-figures the network and schedule communication between devices. It also manages the routing and network traffic. The network manager can be integrated into the gateway, host application, or process automation control-ler. WirelessHART standards were released to the industry in September 2007 and will soon be available in commer- cial products.ISA100.11a: ISA100.11a [42] standard is designed for low data rate wireless monitoring and process automation applications. It defines the specifications for the OSI layer, security, and system management.The standard focuses on low energy consumption,scalability, infrastructure,robustness, and interoperability with other wireless de-vices. ISA100.11a networks use only 2.4 GHz radio and channel hopping to increase reliability and minimize inter-ference.It offers both meshing and star network topolo-gies. ISA100.11a also provides simple, flexible, and scaleable security functionality. 6LoWPAN: IPv6-based Low power Wireless Personal Area Networks [43-45] enables IPv6 packets communica-tion over an IEEE802.15.4 based network.Low power device can communicate directly with IP devices using IP-based protocols. Using 6LoWPAN,low power devices have all the benefits of IPcommunication and management.6LoWPAN standard provides an adaptation layer, new packet format, and address management. Because IPv6 packet sizes are much larger than the frame size of IEEE 802.15.4, an adaptation layer is used. The adaptation layer carries out the functionality for header compression. With header compression, smaller packets are created to fit into an IEEE 802.15.4 frame size. Address management mecha- nism handles the forming of device addresses for commu-nication. 6LoWPAN is designed for applications with low data rate devices that requires Internet communication.IEEE802.15.3:IEEE802.15.3[46] is a physical and MAC layer standard for high data rateWPAN. It is designed to support real-time multi-media streaming of video and mu-sic.IEEE802.15.3 operates on a 2.4 GHz radio and has data rates starting from 11 Mbps to 55 Mbps.The standard uses time division multiple access (TDMA) to ensure quality of service. It supports both synchronous and asynchronous data transfer and addresses power consumption, data rate scalability, and frequency performance. The standard is used in devices such as wireless speakers, portable video electronics, and wireless connectivity for gaming, cordless phones, printers, and televisions.Wibree: Wibree [47] is a wireless communication tech-nology designed for low power consumption, short-range communication, and low cost devices. Wibree allows the communication between small battery-powered devices and Bluetooth devices.Small battery powered devices in-clude watches, wireless keyboard, and sports sensors which connect to host devices such as personal computer or cellular phones. Wibree operates on 2.4 GHz and has a data rate of 1 Mbps. The linking distance between the de-vices is 5-10 m.Wibree is designed to work with Blue-tooth. Bluetooth with Wibree makes the devices smaller and more energy-efficient. Bluetooth-Wibree utilizes the existing Bluetooth RF and enables ultra-low power con-sumption. Wibree was released publicly in October 2006.1.2 IntroductionWireless sensor networks (WSNs) have gained world-wide attention in recent years,particularly with the prolif-eration in Micro-Electro-Mechanical Systems (MEMStechnology which has facilitated the development of smart sensors.These sensors are small, with limited processing and computing resources, and they areinexpensive com-pared to traditional sensors. These sensor nodes can sense, measure, and gather information from the environment and, based on some local decision process, they can trans-mit the sensed data to the user.Smart sensor nodes are low power devices equipped with one or more sensors, a processor, memory, a power supply, a radio, and an actuator. 1 A variety of mechanical, thermal, biological, chemical, optical, and magnetic sensors may be attached to the sensor node to measure properties of he environment. Since the sensor nodes have limited memory and are typically deployed in difficult-to-access locations, a radio is implemented for wireless communica- tion to transfer the data to a base station (e.g., a laptop, a personal handheld device, or an access point to a fixed infra-structure). Battery is the main power source in a sensor node. Secondary power supply that harvests power from the environment such as solar panels may be added to the node depending on the appropriateness of the environment where the sensor will be deployed. Depending on the appli- cation and the type of sensors used, actuators may be incor- porated in the sensors.A WSN typically has ittle or no infrastructure. It con-sists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data about the environment. There are two types of WSNs: structured and unstructured. An unstructured WSN is one that con-tains a dense collection of sensor nodes. Sensor nodes 2 may be deployed in an ad hoc manner into the field. Once 2 In ad hoc deployment, sensor nodes may be randomly placed into the deployed, the network is left unattended to perform moni-toring and reporting functions. In an unstructured WSN, net-work maintenance such as managing connectivity and detecting failures is difficult since there are so many nodes. In a structured WSN, all or some of the sensor nodes are de-ployed in a pre-planned manner.3The advantage of a struc-tured network is that fewer nodes can be deployed with lower network maintenance and management cost.Fewer nodes can be deployed now since nodes are placed at spe-cific locations to provide coverage while ad hoc deployment can have uncovered regions.WSNs have great potential for many applications in sce-narios such as military target tracking and surveillance [2,3], natural disaster relief [4], biomedical health monitor- ing [5,6], and hazardous environment exploration and seis-mic sensing [7].Inmilitary target tracking and surveillance, a WSN can assist in intrusion detection and identification. Specific examples include spatially-corre-lated and coordinated troop and tank movements. With natural disasters, sensor nodes can sense and detect the environment to forecast disasters before they occur. In bio-medical applications, surgical implants of sensors can help monitor a patient's health.For seismic sensing, ad hoc deployment of sensors along the volcanic area can detect the development of earthquakes and eruptions.Unlike traditional networks,a WSN has its own design resource constraints.Resource constraints include a limited amount of energy,short communication range, low bandwidth, and limited processing and storage in each node. Design constraints are application dependent and are based on the monitored environment. The environment plays a key role in determining the size of the network, the deployment scheme, and the network topology. The size of the network varies with the monitored environ-ment. For indoor environments, fewer nodes are required to form a network in a limited space whereas outdoor envi-ronments may require more nodes to cover a larger area. An ad hoc deployment is preferred over pre-planned deployment when the environment is inaccessible by hu-mans or when he network is composed of hundreds to thousands of nodes. Obstructions in the environment can also limit communication between nodes, which in turn af-fects the network connectivity (or topology).Research in WSNs aims to meet the above constraints by introducing new design concepts,creating or improving existing protocols, building new applications, and develop-ingnewalgorithms.Inthisstudy,wepresentatop-downap-proach to survey different protocols and algorithms proposed in recent years. Our work differs from other sur-veys as follows:•While our survey is similar to [1], our focus has been to survey the more recent literature.•We address the issues in a WSN both at the individual sensor node level as well as a group level.•We survey the current provisioning, management and control issues in WSNs.These include issues such as localization, coverage, synchronization, network secu-rity, and data aggregation and compression.•We compare and contrast the various types of wireless sensor networks.•Finally, we provide a summary of the current sensor technologies.The remainder of this paper is organized as follows: Section 2 gives an overview of the key issues in a WSN. Section 3 compares the different types of sensor networks. Section 4 discusses several applications of WSNs.Section 5 presents issues in operating system support, supporting standards, storage, and physical testbed. Section 6 summa-rizes the control and management issues. Section 7 classi-fies and compares the proposed physical layer,data-link layer, network layer, and transport layer protocols. Section 8 concludes this paper. Appendix A compares the existing types of WSNs. Appendix B summarizes the sensor tech-nologies. Appendix C compares sensor applications with the protocol stack.1.3 Overview of key issuesCurrent state-of-the-art sensor technology provides a solution to design and develop many types of wireless sen-sor applications. A summary of existing sensor technolo-gies is provided in Appendix A. Available sensors in the market include generic (multi-purpose) nodes and gate- way (bridge) nodes. A generic (multi-purpose) sensor node's task is to take measurements from the monitored environment. It may be equipped with a variety of devices which can measure various physical attributes such as light, temperature, humidity, barometric pressure, veloc-ity, acceleration, acoustics, magnetic field, etc.Gateway (bridge) nodes gather data from generic sensors and relay them to the base station. Gateway nodes have higher pro-cessing capability,battery power, and transmission (radio) range. A combination of generic and gateway nodes is typ-ically deployed to form a WSN.To enable wireless sensor applications using sensor tech-nologies, the range of tasks can be broadly classified into three groups as shown in Fig. 1. The first group is the system. Eachsensor nodeis an individual system.In order to support different application software on a sensor system, develop-ment of new platforms, operating systems, and storage schemes are needed. The second group is communication protocols, which enable communication between the appli-cation and sensors. They also enable communication be-tween the sensor nodes. The last group is services which are developed to enhance the application and to improve system performance and network efficiency.From application requirements and network manage-ment perspectives, it isimportant th asensor nodes are capable of self-organizing themselves. That is, the sensor nodes can organize themselves into a network and subse-quently are able to control and manage themselves effi-ciently. As sensor nodes are limited in power, processing capacity, and storage, new communication protocols and management requirements.The communication protocol consists of five standard protocol layers for packet switching:application layer,transport layer, network layer, data-link layer, and physical layer. In this survey, we study how protocols at different layers address network dynamics and energy efficiency.Functions such as localization, coverage, storage, synchro- nization, security, and data aggregation and compression are explored as sensor network services.Implementation of protocols at different layers in the protocol stack can significantly affect energy consumption, end-to-end delay, and system efficiency. It is important to optimize communication and minimize energy usage. Tra-ditional networking protocols do not work well in a WSN since they are not designed to meet these requirements.Hence, new energy-efficient protocols have been proposed for all layers of the protocol stack. These protocols employ cross-layer optimization by supporting interactions across the protocol layers.Specifically, protocol state information at a particular layer is shared across all the layers to meet the specific requirements of the WSN.As sensor nodes operate on limited battery power, en-ergy usage is a very important concern in a WSN; and there has been significant research focus that revolves around harvesting and minimizing energy. When a sensor node is depleted of energy, it will die and disconnect from the network which can significantly impact the performance of the application. Sensor network lifetime depends on the number of active nodes and connectivity of the net- work, so energy must be used efficiently in order to maxi- mize the network lifetime.Energy harvesting involves nodes replenishing its en-ergy from an energy source. Potential energy sources in- clude solar cells [8,9], vibration [10], fuel cells, acoustic noise, and a mobile supplier [11]. In terms of harvesting energy from the environment [12], solar cell is the current mature technique that harvest energy from light. There is also work in using a mobile energy supplier such as a robot to replenish energy. The robots would be responsible in charging themselves with energy and then deliveringen- ergy to the nodes.Energy conservation in a WSN maximizes network life-time and is addressed through efficient reliable wireless communication, intelligent sensor placement to achieve adequate coverage, security and efficient storage manage-ment, and through data aggregation and data compression. The above approaches aim to satisfy both the energy con-straint and provide quality of service (QoS) 4 for the applica- tion. For reliable communication, services such as congestion control, active buffer monitoring, acknowledge-ments, and packet-loss recovery are necessary to guarantee reliable packet delivery. Communication strength is depen-dent on the placement of sensor nodes. Sparse sensor place-ment may result in long-range transmission and higher energy usage while dense sensor placement may result in short-range transmission and less energy consumption. Cov-erage is interrelated to sensor placement. The total number of sensors in the network and their placement determine the degree of network coverage. Depending on the application, a higher degree of coverage may be required to increase the accuracy of the sensed data. In this survey, we review new protocols and algorithms developed in these areas.1.1 标准协议:无线传感器标准已经发展出关键的设计要求低功率消耗。

中英文文献翻译—无线安全

中英文文献翻译—无线安全

英文原文Wireless SecurityRichard BarberRichard Barber, group technical advisor of Articon-Integralis looks, at the evolution of tele- anddata-communications systems and assesses the potential advantages for mobile security offered by technologies like BluetoothSecurityToday's wireless world means that data is being sent, among us, invisibly from device to device, country to country, person to person. This data, in the form of e-mails, photos, contacts and addresses are precious and private to each of us. This private information, no longer making its way along wires in plain sight, needs to be sent securely to its intended recipient without interception. Wireless standards the world over are evolving and have various formats for dealing with the security issues of its users. Bluetooth wireless technology is no exception.Bluetooth wireless technology has, from its inception, put great emphasis on wireless security so that users of this global standard can feel secure while making their connections. The Bluetooth Special Interest Group (SIG), made up of over 4000 member manufacturers, has a Bluetooth security experts group made up of engineers from its member companies who provide critical security information and feedback that is taken into account as the Bluetooth wireless specification evolves.Product developers that use Bluetooth wireless technology in their products have several options for implementing security. There are three modes of security for Bluetooth access between two devices.Security Mode 1: non-secureSecurity Mode 2: service level enforced securitySecurity Mode 3: link level enforced securityThe manufacturer of each product determines these security modes. Devices and services also have different security levels. For devices, there are two levels: "trusted device" and "untrusted device." A trusted device, having been paired with one's other device, has unrestricted access to all services. With regard to services, three security levels are defined: services that require authorization and authentication, services that require authentication only and services that are open to all devices.Lately, confusion and misinformation surrounding security and Bluetooth wireless technology has increased. The current security issues typically involve mobile phones. How these issues apply to other classes of devices is important and is often not addressed. The encryption algorithm in the Bluetooth specifications is secure. This includes devices such as mice and keyboards connecting to a PC, a mobile phone synchronizing with a PC, and a PDA using a mobile phone as a modem to name just a few of the many use cases.Cases where data has been compromised on mobile phones are the result of implementation issues on that platform. The Bluetooth SIG diligently works with our members to investigate any issues that are reported to understand the root cause of the issue. If it is a specification issue, we work with the membership to get patches out and ensure future devices don't suffer from the same vulnerability. This is an on-going process. The recently reported issues of advanced "hackers" gaining access to information stored on select mobile phones using Bluetooth functionality are due to incorrect implementation. The names bluesnarfing and bluebugging have been given to these methods of illegal and improper access to information. The questions and answers below provide users with more information about these current issues and will address their concerns for dealing with these security risks. What is bluejacking?Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does NOT involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping orthe user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.What is bluebugging?Bluebugging allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone’s user. This vulnerability allows the hacker to initiate phone calls, send and receive text messages, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. As with all the attacks, without specialized equipment, the hacker must be within a 10 meter range of the phone. This is a separate vulnerability from bluesnarfing and does not affect all of the same phones as bluesnarfing.What is bluesnarfing?Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone’s user of the connection made to the device. The information that can be accessed in this manner includes the phonebook and associated images, calendar, and IMEI (international mobile equipment identity). By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. Without specialized equipment the hacker must be within a 10 meter range of the device while running a device with specialized software. Only specific older Bluetooth enabled phones are susceptible to bluesnarfing.What are phone manufacturers doing to address the situation?Both Nokia and Sony Ericsson have developed software upgrades for phones vulnerable to bluesnarfing and bluebugging. Both companies have also worked hard to make sure new phones coming to market will not be susceptible to these attacks. For more information on how users can obtain applicable software upgrades for their phones, visit the websites of Sony Ericsson and Nokia.What is Car Whisperer?The car whisperer is a software tool developed by security researchers to connect to and send or receive audio to and from Bluetooth car-kits with a specific implementation. An individual using the tool could potentially remotely connect to and communicate with a car from an unauthorized remote device, sending audio to the speakers and receiving audio from the microphone in the remote device. Without specialized equipment, someone using the tool must be within a 10 meter range of the targeted car while running a laptop with the car whisperer tool. The security researchers’ goal was to highlight an implementation weakness in a select number of Bluetooth enabled car-kits and pressure manufacturers to better secure Bluetooth enabled devices.How can I tell if my car kit or car is vulnerable to the car whisperer?To be accessed by the car whisperer tool, the car-kit needs to be continuously in pairing mode, have a standard fixed four digit PIN code and not be connected to a phone. If a user consistently has a phone paired with the car kit, an unauthorized device cannot connect to the car kit. Concerned individuals, whose car kits are continuously in pairing mode and have a standard fixed four digit PIN code (i.e. 0000 or 1234), should contact the manufacturer directly for more information on the vulnerability of their devices and to obtain applicable software upgrades for their car-kits.Is Bluetooth wireless technology susceptible to hackers in other ways?Currently, the attacks listed on this page are the only known possibilities for hacking into a limited amount of products on the market, if appropriate measures are taken such as having security turned on and using reasonably long PIN codes or pairing devices in private. The Bluetooth SIG continues to study security risks associated with the technology and determine their viability as the technology spreads and develops.What can consumers do to protect their data?Consumers can do a number of things to protect their data. If users have a phone that is vulnerable to bluesnarfing or bluebugging, they should contact the phone's manufacturer or take the phone to a manufacturer authorized service point. The manufacturers of the vulnerable devices have developed software patches to fix the vulnerability. In addition, if users are still concerned about a device being targeted, they can turn the device tonon-discoverable mode when not using Bluetooth wireless technology and in unknown areas. Users can also ensure their data is secure by not "pairing" with unknown devices. If a user were to receive an invitation to pair with another device, and asked to put in a PIN code, but was unsure of what device was inviting to pair, the user should not pair. Only pair with known devices.What is the cabir worm? Which devices does the cabir worm affect?The cabir worm is malicious software, also known as malware. When installed on a phone, it uses Bluetooth technology to send itself to other similarly vulnerable devices. Due to this self-replicating behavior, it is classified as a worm. The cabir worm currently only affects mobile phones that use the Symbian series 60 user interface platform and feature Bluetooth wireless technology. Furthermore, the user has to manually accept the worm and install the malware in order to infect the phone. More information on the cabir worm is available from the software licensing company Symbian and on the websites of F-Secure, McAfee and Symantec.How does a PIN affect security?The personal identification number (PIN) is a four or more digit alphanumeric code that is temporarily associated with one's products for the purposes of a one time secure pairing. It is recommended that users employ at minimum an eight character or more alphanumeric PIN when possible. Product owners must share that PIN number only with trusted individuals and trusted products for pairing. Without this PIN number, pairing cannot occur. It is always advisable to pair products in areas with relative privacy. Avoid pairing your Bluetooth enabled devices in public. If, for some reason, your devices become unpaired, wait until you are in a secure, private location before repairing your devices.Do I need to remember my PIN?No. It is not necessary to remember your PIN except in the seldom situation when the PIN is a fixed PIN - in which case simply retaining the user manual, with given PIN, for future reference is advisable.Why does pairing in a public location potentially introduce a security risk?Theoretically a hacker can monitor and record activities in the frequency spectrum and then use a computer to regenerate the PIN codes being exchanged. This requires specially built hardware and thorough knowledge of Bluetooth systems. By using a PIN code with eight or more alphanumeric characters it would take the hacker years to discover the PIN. By using a four digit numeric PIN code, the hacker could discover the PIN in a matter of a few hours. Still advanced software is required.Is this a real risk to Bluetooth enabled devices?Bluetooth devices generate a secure connection by means of the initial pairing process. During this process one or both devices need a PIN code to be entered, which is used by internal algorithms to generate a secure key, which is then used to authenticate the devices whenever they connect in the future.A new academic paper puts forward a theoretical process that could potentially "guess" the security settings on a pair of Bluetooth devices. To do this the attacking device would need to listen in to the initial one-time pairing process. From this point it can use an algorithm to guess the security key and masquerade as the other Bluetooth device. What is new in this paper is an approach that forces a new pairing sequence to be conducted between the two devices and an improved method of performing the guessing process, which brings the time down significantly from previous attacks.To perform this hack, it is necessary for the attacker to overhear the initial pairing process, which normally only happens once in a private environment and takes a fraction of a second. The authors have put forward some possible methods to try and force a deletion of the security key in one of the two Bluetooth devices, and hence initiate a new pairing process, which they could then listen in to. To do this, they need to masquerade as the second device during a connection. The equipment needed for this process is very expensive and usually used by developers only. If this process succeeds the user will see a message on their device that asks them to re-enter a PIN code. If they do this while the attacker is present, and the PIN code they enter is sufficiently short, then the attack could theoretically succeed.If the PIN key that has been used consists of only four numeric characters, a fast PC can calculate the security key in less than one tenth of a second. As the PIN key gets longer, thetime to crack the security code gets longer and longer. At eight alphanumeric characters it could take over one hundred years to calculate the PIN making this crack nearly impossible.This is an academic analysis of Bluetooth security. What this analysis outlines is possible, but it is highly unlikely for a normal user to ever encounter such an attack. The attack also relies on a degree of user gullibility, so understanding the Bluetooth pairing process is an important defense.Can the SIG guarantee me that all of my future Bluetooth products will be secure?Absolute security can never be totally guaranteed - in technology or otherwise. Security is an ongoing and important effort for any technology. The Bluetooth SIG has made security a high priority from day one with security algorithms that to date have proven adequate. In the roadmap for the advancement of Bluetooth wireless technology, the Bluetooth SIG published security and privacy enhancements. These enhancements to the specification further strengthen the pairing process and ensure privacy after a connection is established. We are continuing with our work in this area, trying to always stay a step ahead of people trying to hack into devices.What is denial of service (DoS)?The well known denial of service (DoS) attack, which has been most popular for attacking internet web sites and networks, is now an option for hackers of Bluetooth wireless technology enabled devices. This nuisance is neither original nor ingenious and is, very simply, a constant request for response from a hacker’s Bluetooth enabled computer (with specific software) to another Bluetooth enabled device such that it causes some temporary battery degradation in the receiving device. While occupying the Bluetooth link with invalid communication requests, the hacker can temporarily disable the product’s Bluetooth services. Can a hacker get access to my devices data or content with DoS?The DoS attack only offers the hacker the satisfaction of temporary annoyance, but does not allow for access to the device’s data or services – no information residing on the receiving device can be used or stolen by the attacker.What devices are vulnerable to attacks, and what is the Bluetooth SIG doing about it?DoS attacks can be performed on any discoverable Bluetooth enabled device but in some cases, advanced hackers can determine the address of a non-discoverable Bluetooth device. The Bluetooth SIG takes all security issues seriously, and we constantly work to make the specification more secure. Therefore, future Bluetooth core specifications are planned to include features that will make it impossible to penetrate non-discoverable devices. There are also ways for manufacturers to reduce the risk of DoS attacks at the implementation level of Bluetooth wireless technology.What is the risk of being on the receiving end of a DoS attack?To date, DoS attacks on Bluetooth devices have only been conducted in laboratory tests. The risk of an attempted DoS attack should be considered minimal given the requirements and the normally short range of Bluetooth wireless technology.中文译文无线安全作者:理查Articon-Integralis的技术顾问理查,在一个关于通信系统安全性的会议中,提出的蓝牙安全性的文章。

feature_bluetooth

feature_bluetooth

feature_bluetoothBluetooth is a wireless technology used to transmit data and connect devices over short distances. It can be used to connect various devices such as mobile phones, headphones, keyboards, mice, printers, etc. Bluetooth technology transmits data wirelessly, making it easy for devices to communicate and share information. This technology is widely used in many fields, such as consumer electronics, automotive technology, medical equipment, etc. Bluetooth is also constantly evolving, with new Bluetooth versions being released all the time, offering faster data transfer speeds, lower power consumption, and more reliable connections.蓝牙是一种无线技术,用于在短距离内传输数据和连接设备。

它可以用于连接手机、耳机、键盘、鼠标、打印机等各种设备。

蓝牙技术通过无线方式传输数据,使设备之间可以方便地进行通信和共享信息。

这项技术在许多领域都得到了广泛应用,例如消费电子、汽车科技、医疗设备等。

蓝牙还不断发展,新的蓝牙版本不断推出,提供更快的数据传输速度、更低的功耗以及更可靠的连接。

蓝牙语音传输外文翻译

蓝牙语音传输外文翻译

石家庄经济学院本科生毕业设计(论文)外文翻译题目蓝牙语音信号传输系统设计与仿真实现姓名郭小林学号407109060213学院信息工程学院专业通信工程指导教师边群玲BluetoothHuman is entering the digital network information age, a great number of digital communication and data transfer is achieved through the cable. These cables connected to these connectors in shape, size and pin number of photogenic match through a variety of connectors and a variety of devices. Wired connection of digital equipment bring a lot of inconvenience for people to connect to networks anytime and anywhere. The development of wireless communication link technology, liberating people from the shackles of a wired connection, has become a trend. The greatest feature of the Information Age is more convenient and rapid information dissemination, based on this point, technical staff is also working to develop more excellent information and data transmission. Bluetooth technology (Bluetooth) is a short-range wireless communication open technology which launched in 1998 by Ericsson (Ericsson), Nokia (NOKIA), Toshiba (TOSHIBA), International Business Machines (IBM) and Intel (INTEL) and other companies jointly. It Intends for portable or fixed electronic devices replace the use of cables or connections such as cable connections. Its main feature is a powerful, low power consumption, transmission reliability, versatility, low cost, and easy to use. We can use in the office, home, travel and in the laboratory, without any electronic devices in the special cable and connector layout. Bluetooth devices can form through a "micro-network", net of any Bluetooth transceiver can communicate with the device signal, and this connection does not require complex software support. Cast aside the shackles of the traditional connection, completely carefree days of fun, Bluetooth promises to give us enough to make spirits. Bluetooth, for the entire IT industry, has more than just a simple technology that has become a concept.Bluetooth technology is the founder of Sweden's Ericsson, already as early as 1994 its research and development. February 1998, Ericsson, Nokia, IBM, Toshiba and Intel formed a five multinational special interest group (SIG, Special Interest Group), aims to create a global common standard short-range wireless communication technology, now Bluetooth technology. Bluetooth name from the 10th century Danish King Harald Blatand-translated as Harold Bluetooth (because he was very fond of eating blueberries, so every day with a blue tooth), he had a unified Europe over Norway, Sweden and Denmark. The high will be named after him, is to express a unified industry standard Bluetooth technology to make coordination between different industrial areas, good communication with each other to meaning. Bluetooth applications for work permits without the 2.4GHz ISM band, based on time division multiplexing and frequency hopping principle, the combination of circuit switching and packet switching is suitable for voice transmission and data transmission. Currently, Bluetooth products have been widely used in mobile communications, computer and peripheral equipment, automotive, industrial controls, appliances, office applications, e-commerce, medical fitness and other fields.Bluetooth technology enables a variety of mobile devices, computer peripherals and other low-cost digital wireless connection between devices made possible not only to replace the cable connection between these devices, but also makes the function of many digital devices has been expanded so that the original Independent of the digital devices can be networked with other devices to exchange information. Since Bluetooth small size, low power consumption, can be integrated into almost any digital device, especially those less demanding on the data transmission rate of mobile devices and portable devices. Ideas have been proposed for many applications, some already have products available. From a market perspective, the Bluetooth technology to create point to point connections, multipoint connections, and personal area network applications and other network products.More and more people consider their own devices to add wireless connectivity, people have gradually realized that the Bluetooth technology, low power consumption and low cost solution is ideal. Bluetooth SIG to promote the use of the Bluetooth technical standards will be open all over the world within the scope of any unit or individual can be the development of Bluetooth products, as long as the final product by the Bluetooth SIG compliance testing to connect to the market. Many manufacturers have manufactured have Bluetooth products, the future of Bluetooth technology will be more mature and function will be more powerful.Bluetooth is an open, short distance wireless communication technology standard that can be used in a smaller range of a wireless connection means to achieve the fixed equipment, and interconnection between mobile devices, can be flexible between various digital devices , Safety, low cost, small power consumption of audio and data communication. Because Bluetooth technology can be easily embedded into a single chip, so it is especially suitable for small mobile communication devices.Bluetooth carrier frequency used globally 2. 4GHz ISM industrial, scientific, medical) band, the 2. 4GHz ISM band is open to all radio frequency systems, the use of any one frequency band are likely to encounter unpredictable Sources of interference. Using frequency hopping spread spectrum technology is an effective measure to avoid interference. Band frequency hopping is to be divided into a number of frequency hopping channels in a connection, the radio transceiver according to a certain code sequence and continuously from one channel to another channel, the two sides is the only transceiver to communicate according to the law, while others Sources of interference can not be carried out by the same laws of interference. Instantaneous bandwidth of frequency hopping is very narrow, but through spread spectrum technology to make this into a narrow bandwidth to expand into broadband times, so that the impact of interference may become very small. Bluetooth uses frequency hopping spread spectrum technology is one of the key. Corresponds to the single-slot packet, the Bluetooth frequency hopping rate of 1600 hop / sec; corresponding slot bag, hopping rate is reduced; in 3200 to establish the link to raise the jump / sec. Such a high rate of use of frequency hopping, Bluetooth system has a sufficiently high anti-interference ability. It uses the butterfly as the core of multi-level mapping program, compared with other programs, with a hardware deviceis simple, superior performance, ease of 79/23 band compatible with the two systems and a variety of state hopping sequence using the same circuit to realize.The human voice is the most basic and direct exchange of information. Since the phone has been invented, voice communication has always been to continue the development of fast rate from the previously adopted a comprehensive approach to digital simulation methods. Digital voice signal transmission and storage reliability, interference immunity, security and price and so on are much better than analog voice signal. Voice to digital format are often stored and transmitted, the data can be transmitted through voice devices. Some wireless communication technology is designed to transmit voice, while others are designed for use with data services. The Bluetooth technology supports both voice and data transmission, can support voice or data devices to communicate with each other. Contribute to the development of the system's wireless voice message listener. More spiritual system works if either the wireless remote control PC, and upload the voice data collected microcontroller can also choose to operate the system locally. The two control not only independent of each other, can be used alone, but also cross-use with each other to meet the practical requirements of different jobs. As the system uses Bluetooth wireless communication, the transmission speed, high reliability, not only to ensure that the voice listener, but also to make itself has some anti-detectable. In addition, the MCU side joined the U disk function of large-capacity data storage can be necessary in the circumstances to save the information locally and temporarily sent outside until the right time to further transmission. This undoubtedly increased the hidden nature of the whole system to make it closer to the practicability.蓝牙人类正步入数字化网络信息时代,目前很多数字通信和数据传输都是通过缆线连接来实现的。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

蓝牙技术外文翻译文献(文档含中英文对照即英文原文和中文翻译)蓝牙的起源与发展摘要本文论述蓝牙技术的起源与发展。

重点介绍蓝牙技术的基本原理以及蓝牙技术在当今时间的作用。

论述了蓝牙技术的优点与缺陷以及未来的发展趋势关键字:协议、技术、应用、发展介绍蓝牙是一个永远的,有限的无线电连接驻留在一个芯片。

它最初是在1994年扩大,作为一种方法,让笔记本电脑作出上述呼吁手机通过瑞典手机爱立信的创造者。

然后,许多组织已经签署了创建蓝牙低功耗平均各种各样的设备(LeVitus,216-220)的无线轻率。

业内观众预期蓝牙在安装设备的十亿美元,到2005年。

讨论蓝牙是由爱立信工程师在20世纪90年代末开发,越来越多的特殊的技术,有利于无线通信电子设备的多样性之间的轻率。

其主要的一个重要方面是,它允许设备“对话”(搬迁和协调数据)无线对方,终止向外不断纠结,电线,电缆和适配器许多今天的专长重要的要求。

蓝牙特别兴趣小组(SIG)成立于1998年,管理蓝牙知识的扩展和序幕(LeVitus,216-220)。

IBM,英特尔,东芝,诺基亚与爱立信的SIG开始联营,超过8000组织承包以来。

因此,贸易与蓝牙的要求和标志的产品,制造商应该是联营公司的SIG和设备应符合轮廓的凭据。

这些程序确保蓝牙无线设备的国际可与对方交谈,除了派生公司或国家。

速度和范围范围是特定应用和核心规范的规定,虽然最小的范围内是不是有限制,制造商可以调整其实施,以支持使用的情况下,他们正在使。

范围可能有所不同取决于在执行用无线电类:3级收音机 - 有一个范围可达1米或3英尺2类无线电 - 移动设备中最常用的发现,有一个10米或33英尺的范围1类无线电 - 主要用于工业用途的案件中,有一个100米或300英尺的范围创建适合运送较小的文件,例如手机合同和文本文件的蓝牙技术,也为低质量的图像和音频(Kumkum,160-162)。

在这些搬迁速度;蓝牙可能无法实际处理视频流或高品质的图片和音频,为此,除这可能会在未来改变时,新鲜的蓝牙标准发起。

利用简单和主管创建和配置蓝牙允许的设备是适度的简单,一点额外的骚动,比获得两个彼此接近的设备和扭曲他们。

有没有要求安装驱动程序或其他软件复杂的特设,个人无线网络(Kumkum,160-162)。

它有一个统一的组织,这意味着有两个无线归因于蓝牙技术的产品,尽管产品或民族的起源,有能力完美地与对方交谈。

常见的应用蓝牙技术主要是普通的应用之一是免提手机程序。

关于在我们的日常生活中塑造每个手机已建成蓝牙迈尔(15-20)。

只对蓝牙耳机的手机,他可以谈,而他的手机是在他的钱包或口袋。

今天的汽车音响以及几个有装在他的汽车免提通话的蓝牙。

如果他的车辆有一个厂的立体声或成年的售后,他只是不希望恢复的话,他可能还喜欢免提蓝牙汽车套件的识别。

蓝牙3.0蓝牙3.0是典型的通过蓝牙SIG于2009年4月21日,通过新鲜的蓝牙无线。

新鲜的标准支持提升数据删除速度和结构,前面的标准迈尔(15-20)。

凭借其出众的速度,有可能transfigure消费电子行业的技术。

技术协议蓝牙技术标准的设置,使不同的应用程序可以相互“沟通”。

在远程通信设备使用相同的协议栈,而不同的应用需要不同的协议栈。

但是,每一个应用程序需要的数据链路层和物理层的蓝牙技术。

整个蓝牙协议栈所示的打击。

任何应用程序不应该使用的所有协议,但其中一个或一些名单。

下面的图表显示了协议之间的关系,但在某些应用中的关系可能会改变。

完全的协议栈包括蓝牙特殊协议(LMP和L2CAP),而不是特殊的(如OBEX和UDP)。

设计协议和协议栈的基本原则是,尽可能利用现有的高层协议,确保协议和蓝牙技术相结合,采取适应的蓝牙技术标准的软件和硬件的最佳优势。

开放的蓝牙技术,使得设备制造商可以自由选择的协议,因为他们喜欢或使用。

蓝牙协议体系中的协议据SIG的有4层蓝牙协议体系核心协议电缆替代协议电话控制协议通过协议除上述协议层,该标准还定义了主机/控制器接口(HCI),它提供基带控制器,连接管理器,硬件状态和控制寄存器的命令接口。

蓝牙核心协议包括由SIG提出的特殊协议。

大多数蓝牙设备需要核心协议,而其他协议取决于应用的需要。

毕竟,电缆替代协议,技术控制协议,通过协议和基于核心协议,构成了面向对象的协议。

核心协议LMP(链路管理协议)用于两个设备之间的无线链路控制。

控制器上实现。

通过开展交流和检查连接的识别和加密,并决定基带数据包通过会议的规模。

它还控制无线设备的电源模式和工作周期,并在微微网单元设备的连接状态。

的L2CAP(逻辑链路控制与适配协议)该协议用于复用多个逻辑连接两个使用不同的高层协议的设备之间,提供分割和重组的空气包。

L2CAP的基本模式,提供与有效载荷配置多达64KB的数据包,为672个字节的默认MTU,48个字节的最低强制性支持的MTU。

L2CAP的转播及流量控制模式,可以被配置为每个通道的可靠或同步数据进行转播和CRC检查。

蓝牙核心规范附录1增加了两个额外的L2CAP模式的核心规范。

这些模式有效地贬低原重发和流量控制模式:增强重传模式(ERTM)的:这种模式是一种原始的转播模式的改进版本。

这种模式提供了可靠的L2CAP信道。

流模式(SM):这是一个非常简单的模式,没有转播或流量控制。

这种模式提供了一个可靠的L2CAP信道。

在这些模式中的任何可靠性,选择性和/或另外下层BDR的/ EDR的蓝牙空气通过配置重传和的冲洗超时(时间之后,无线电将刷新包)接口保证。

保证下层顺序排序。

ERTM或SM只有配置的L2CAP通道可运行超过AMP的逻辑联系。

SDP(服务发现协议)服务发现协议(SDP)允许设备发现其他设备,其相关参数的支持服务。

例如,当手机连接到蓝牙耳机,社民党将用于确定哪些支持蓝牙配置文件耳机(耳机模式,免提配置文件,高级音频分配模式(A2DP)等)和协议复用器设置需要连接到他们每个人。

每个服务标识通用唯一标识符(UUID)分配一个短形式的UUID(16位),而不是完整的128 / vichitra官方服务(蓝牙模式),电缆替代协议(RFCOMM协议)无线电频率通信(RFCOMM协议)是一种电缆替代协议,用于创建一个虚拟的串行数据流。

RFCOMM协议提供二进制数据传输和模拟的EIA-232(RS-232)在蓝牙基带层的控制信号。

RFCOMM协议提供给用户一个简单可靠的数据流,类似于TCP。

它被用于许多与电话相关的配置文件直接作为AT 命令的载体,以及通过蓝牙OBEX传输层。

电话控制协议(TCP)。

电话控制协议二进制(塔塔咨询服务公司的BIN)是面向比特的协议,它定义了呼叫控制蓝牙设备之间的语音和数据呼叫建立信令。

此外,“塔塔咨询服务公司的BIN定义用于处理蓝牙TCS的设备组的流动性管理程序。

”TCS - BIN仅用于无绳电话的个人资料,未能吸引实施者。

因此,它是历史的兴趣。

通过协议通过协议定义其他组织的标准制定,并纳入蓝牙协议栈,允许蓝牙协议只在必要时。

所采用的协议包括:点的点对点协议(PPP):互联网点至点链接的IP数据报传输的标准协议。

的TCP / IP / UDP的连接到互联网的设备进行通信。

对象交换协议(OBEX):会话层协议的交换对象,提供了一个模型对象和操作表示。

它采用客户 - 服务器模式。

无线应用环境/无线应用协议(WAE / WAP):WAE指定用于无线设备和WAP是一个开放的标准,向移动用户提供电话和信息服务的访问的应用程序框架。

技术谱和干扰经营无牌工业,科学和医疗(ISM)在2.4到2.485 GHz的带蓝牙技术,使用扩频,跳频,名义利率在1600跳/秒的全双工信号。

2.4 GHz ISM频段在大多数国家和无牌。

SIM频段是开放给所有的无线电系统,所以一定频段的使用将满足不可预测的干扰源。

因此,蓝牙设计特殊的快速确认和跳频技术,以确保链路稳定。

跳频技术分为许多频率波段跳频信道,在一个连接,无线电收发器“跳”到另一个从一个通道按一定的码序列不断。

只有发送方和接收沟通,依照本法和其他干扰可能无法按相同的规则。

的频率跳频的瞬时带宽是很窄,但通过扩频技术,它可以使狭窄的带宽扩展到宽带的一百倍,使干扰的影响可能会变得非常小。

工作在同一频段的其他系统相比,蓝牙跳频频率运作更快,蓝牙技术的数据包是短,这使得它比其他稳定纠错蓝牙支持电路交换和分组交换两种技术,并定义了两种类型的链路连接,即面向连接的同步链路(SCO)和面向无连接的异步链路(ACL)蓝牙使用误差修正模型:1/3前向错误校正(FEC),2/3forward前向纠错和自动重复请求(ARQ)。

纠错的目的是减少重发的可能性,而在同一时间增加额外的费用,但在合理无误环境,多余的投标会减少输出。

因此,包定义本身也保持灵活的方式。

因此,该软件可以定义是否采用FEC。

在一般情况下,信道噪声较大时,蓝牙系统将采用前向纠错,以确保通信质量:SCO链路,使用1/3 FEC是2/3 FEC是使用ACL链路。

在一间没有门牌的ARQ,在一个时隙发送数据,必须在接下来的时段确认收到的收据。

只有当数据检查没有错误后,头错误检测和接收端的CRC将确认发送给发件人,或错误消息将被送回。

范围范围是特定应用和核心规范的规定,虽然最小的范围内是不是有限制,制造商可以调整其实施,以支持使用的情况下,他们正在使。

范围可能有所不同取决于在执行用无线电类:3级收音机 - 有一个范围可达1米或3英尺2类无线电 - 移动设备中最常用的发现,有一个10米或33英尺的范围1类无线电 - 主要用于工业用途的案件中,有一个100米或300英尺的范围电力为了使蓝牙设备也可以连接,即使是在一个非常低的功率状态,蓝牙规定了三种节能状态:国家公园,保持状态和,嗅嗅状态。

这些国家的节能效率下降一个接一个。

电台最常用的是2级和用户的功率2.5MW。

蓝牙技术设计,具有非常低的功耗。

这是加强规范,让收音机断电时无效。

通用替代的MAC / PHY 3.0版HS能够发现远程省级高速只有当提供电源优化效益的数据传输以及协助无线电安全需要的无线电设备和吃药。

蓝牙低功耗技术,为需要最长的电池寿命,而不是一个很高的数据传输速率,消费者的经典蓝牙技术的力量之间的1/2和1/100的设备进行了优化。

保密性蓝牙系统的流动性和开放,使安全问题非常重要。

虽然蓝牙系统所使用的频率调制技术已经提供了一定的保障,但是蓝牙系统仍然需要链路层和应用层安全管理。

在链路层中,蓝牙系统提供认证,加密和密钥管理,和其他功能。

每个用户都有一个个人识别号码(PIN)为单向或双向认证,这将翻译成128位的链路密钥。

一旦认证完毕,链路将使用encryphon的密钥来加密。

链路层安全机制提供了大量的认证方案和一个灵活的加密方案(指允许密码长度的咨询)。

相关文档
最新文档