通信类英文文献及翻译.doc
外文参考文献翻译-中文
外⽂参考⽂献翻译-中⽂基于4G LTE技术的⾼速铁路移动通信系统KS Solanki教授,Kratika ChouhanUjjain⼯程学院,印度Madhya Pradesh的Ujjain摘要:随着时间发展,⾼速铁路(HSR)要求可靠的,安全的列车运⾏和乘客通信。
为了实现这个⽬标,HSR的系统需要更⾼的带宽和更短的响应时间,⽽且HSR的旧技术需要进⾏发展,开发新技术,改进现有的架构和控制成本。
为了满⾜这⼀要求,HSR采⽤了GSM的演进GSM-R技术,但它并不能满⾜客户的需求。
因此采⽤了新技术LTE-R,它提供了更⾼的带宽,并且在⾼速下提供了更⾼的客户满意度。
本⽂介绍了LTE-R,给出GSM-R与LTE-R之间的⽐较结果,并描述了在⾼速下哪种铁路移动通信系统更好。
关键词:⾼速铁路,LTE,GSM,通信和信令系统⼀介绍⾼速铁路需要提⾼对移动通信系统的要求。
随着这种改进,其⽹络架构和硬件设备必须适应⾼达500公⾥/⼩时的列车速度。
HSR还需要快速切换功能。
因此,为了解决这些问题,HSR 需要⼀种名为LTE-R的新技术,基于LTE-R的HSR提供⾼数据传输速率,更⾼带宽和低延迟。
LTE-R能够处理⽇益增长的业务量,确保乘客安全并提供实时多媒体信息。
随着列车速度的不断提⾼,可靠的宽带通信系统对于⾼铁移动通信⾄关重要。
HSR的应⽤服务质量(QOS)测量,包括如数据速率,误码率(BER)和传输延迟。
为了实现HSR的运营需求,需要⼀个能够与 LTE保持⼀致的能⼒的新系统,提供新的业务,但仍能够与GSM-R长时间共存。
HSR系统选择合适的⽆线通信系统时,需要考虑性能,服务,属性,频段和⼯业⽀持等问题。
4G LTE系统与第三代(3G)系统相⽐,它具有简单的扁平架构,⾼数据速率和低延迟。
在LTE的性能和成熟度⽔平上,LTE- railway(LTE-R)将可能成为下⼀代HSR通信系统。
⼆ LTE-R系统描述考虑LTE-R的频率和频谱使⽤,对为⾼速铁路(HSR)通信提供更⾼效的数据传输⾮常重要。
通信类中英文翻译、外文文献翻译
美国科罗拉多州大学关于在噪声环境下对大量连续语音识别系统的改进---------噪声环境下说话声音的识别工作简介在本文中,我们报道美国科罗拉多州大学关于噪声环境下海军研究语音词汇系统方面的最新改进成果。
特别地,我们介绍在有限语音数据的前提下,为了了解不确定观察者和变化的环境的任务(或调查方法),我们必须在提高听觉和语言模式方面努力下工夫。
在大量连续词汇语音识别系统中,我们将展开MAPLR自适应方法研究。
它包括单个或多重最大可能线形回归。
当前噪声环境下语音识别系统使用了大量声音词汇识别的声音识别引擎。
这种引擎在美国科罗拉多州大学目前得到了飞速的发展,本系统在噪声环境下说话声音系统(SPINE-2)评价数据中单词错识率表现为30.5%,比起2001年的SPINE-2来,在相关词汇错识率减少16%。
1.介绍为获得噪声环境下的有活力的连续声音系统的声音,我们试图在艺术的领域做出计算和提出改善,这个工作有几方面的难点:依赖训练的有限数据工作;在训练和测试中各种各样的军事噪声存在;在每次识别适用性阶段中,不可想象的听觉溪流和有限数量的声音。
在2000年11月的SPIN-1和2001年11月SPIN-2中,海军研究词汇通过DARPT在工作上给了很大的帮助。
在2001年参加评估的种类有:SPIIBM,华盛顿大学,美国科罗拉多州大学,AT&T,奥瑞哥研究所,和梅隆卡内基大学。
它们中的许多先前已经报道了SPINE-1和SPLNE-2工作的结果。
在这方面的工作中不乏表现最好的系统.我们在特性和主模式中使用了自适应系统,同时也使用了被用于训练各种参数类型的多重声音平行理论(例如MFCC、PCP等)。
其中每种识别系统的输出通常通过一个假定的熔合的方法来结合。
这种方法能提供一个单独的结果,这个结果的错误率将比任何一个单独的识别系统的结果要低。
美国科罗拉多州大学参加了SPIN-2和SPIN-1的两次评估工作。
我们2001年11月的SPIN-2是美国科罗拉多州大学识别系统基础上第一次被命名为SONIC(大量连续语音识别系统)的。
(完整word版)英文文献及翻译:计算机程序
姓名:刘峻霖班级:通信143班学号:2014101108Computer Language and ProgrammingI. IntroductionProgramming languages, in computer science, are the artificial languages used to write a sequence of instructions (a computer program) that can be run by a computer. Simi lar to natural languages, such as English, programming languages have a vocabulary, grammar, and syntax. However, natural languages are not suited for programming computers because they are ambiguous, meaning that their vocabulary and grammatical structure may be interpreted in multiple ways. The languages used to program computers must have simple logical structures, and the rules for their grammar, spelling, and punctuation must be precise.Programming languages vary greatly in their sophistication and in their degree of versatility. Some programming languages are written to address a particular kind of computing problem or for use on a particular model of computer system. For instance, programming languages such as FORTRAN and COBOL were written to solve certain general types of programming problems—FORTRAN for scientific applications, and COBOL for business applications. Although these languages were designed to address specific categories of computer problems, they are highly portable, meaning that the y may be used to program many types of computers. Other languages, such as machine languages, are designed to be used by one specific model of computer system, or even by one specific computer in certain research applications. The most commonly used progra mming languages are highly portable and can be used to effectively solve diverse types of computing problems. Languages like C, PASCAL and BASIC fall into this category.II. Language TypesProgramming languages can be classified as either low-level languages or high-level languages. Low-level programming languages, or machine languages, are the most basic type of programming languages and can be understood directly by a computer. Machine languages differ depending on the manufacturer and model of computer. High-level languages are programming languages that must first be translated into a machine language before they can be understood and processed by a computer. Examples of high-levellanguages are C, C++, PASCAL, and FORTRAN. Assembly languages are intermediate languages that are very close to machine languages and do not have the level of linguistic sophistication exhibited by other high-level languages, but must still be translated into machine language.1. Machine LanguagesIn machine languages, instructions are written as sequences of 1s and 0s, called bits, that a computer can understand directly. An instruction in machine language generally tells the computer four things: (1) where to find one or two numbers or simple pieces of data in the main computer memory (Random Access Memory, or RAM), (2) a simple operation to perform, such as adding the two numbers together, (3) where in the main memory to put the result of this simple operation, and (4) where to find the next instruction to perform. While all executable programs are eventually read by the computer in machine language, they are not all programmed in machine language. It is extremely difficult to program directly in machine language because the instructions are sequences of 1s and 0s. A typical instruction in a machine language might read 10010 1100 1011 and mean add the contents of storage register A to the contents of storage register B.2. High-Level LanguagesHigh-level languages are relatively sophisticated sets of statements utilizing word s and syntax from human language. They are more similar to normal human languages than assembly or machine languages and are therefore easier to use for writing complicated programs. These programming languages allow larger and more complicated programs to be developed faster. However, high-level languages must be translated into machine language by another program called a compiler before a computer can understand them. For this reason, programs written in a high-level language may take longer to execute and use up more memory than programs written in an assembly language.3. Assembly LanguagesComputer programmers use assembly languages to make machine-language programs easier to write. In an assembly language, each statement corresponds roughly to one machine language instruction. An assembly language statement is composed with the aid of easy to remember commands. The command to add the contents of the storage register A to the contents of storage register B might be written ADD B, A in a typical assembl ylanguage statement. Assembly languages share certain features with machine languages. For instance, it is possible to manipulate specific bits in both assembly and machine languages. Programmers use assemblylanguages when it is important to minimize the time it takes to run a program, because the translation from assembly language to machine language is relatively simple. Assembly languages are also used when some part of the computer has to be controlled directly, such as individual dots on a monitor or the flow of individual characters to a printer.III. Classification of High-Level LanguagesHigh-level languages are commonly classified as procedure-oriented, functional, object-oriented, or logic languages. The most common high-level languages today are procedure-oriented languages. In these languages, one or more related blocks of statements that perform some complete function are grouped together into a program module, or procedure, and given a name such as “procedure A.” If the same sequence of oper ations is needed elsewhere in the program, a simple statement can be used to refer back to the procedure. In essence, a procedure is just amini- program. A large program can be constructed by grouping together procedures that perform different tasks. Procedural languages allow programs to be shorter and easier for the computer to read, but they require the programmer to design each procedure to be general enough to be usedin different situations. Functional languages treat procedures like mathematical functions and allow them to be processed like any other data in a program. This allows a much higher and more rigorous level of program construction. Functional languages also allow variables—symbols for data that can be specified and changed by the user as the program is running—to be given values only once. This simplifies programming by reducing the need to be concerned with the exact order of statement execution, since a variable does not have to be redeclared , or restated, each time it is used in a program statement. Many of the ideas from functional languages have become key parts of many modern procedural languages. Object-oriented languages are outgrowths of functional languages. In object-oriented languages, the code used to write the program and the data processed by the program are grouped together into units called objects. Objects are further grouped into classes, which define the attributes objects must have. A simpleexample of a class is the class Book. Objects within this class might be No vel and Short Story. Objects also have certain functions associated with them, called methods. The computer accesses an object through the use of one of the object’s methods. The method performs some action to the data in the object and returns this value to the computer. Classes of objects can also be further grouped into hierarchies, in which objects of one class can inherit methods from another class. The structure provided in object-oriented languages makes them very useful for complicated programming tasks. Logic languages use logic as their mathematical base. A logic program consists of sets of facts and if-then rules, which specify how one set of facts may be deduced from others, for example: If the statement X is true, then the statement Y is false. In the execution of such a program, an input statement can be logically deduced from other statements in the program. Many artificial intelligence programs are written in such languages.IV. Language Structure and ComponentsProgramming languages use specific types of statements, or instructions, to provide functional structure to the program. A statement in a program is a basic sentence that expresses a simple idea—its purpose is to give the computer a basic instruction. Statements define the types of data allowed, how data are to be manipulated, and the ways that procedures and functions work. Programmers use statements to manipulate common components of programming languages, such as variables and macros (mini-programs within a program). Statements known as data declarations give names and properties to elements of a program called variables. Variables can be assigned different values within the program. The properties variables can have are called types, and they include such things as what possible values might be saved in the variables, how much numerical accuracy is to be used in the values, and how one variable may represent a collection of simpler values in an organized fashion, such as a table or array. In many programming languages, a key data type is a pointer. Variables that are pointers do not themselves have values; instead, they have information that the computer can use to locate some other variable—that is, they point to another variable. An expression is a piece of a statement that describe s a series of computations to be performed on some of the program’s variables, such as X+Y/Z, in which the variables are X, Y, and Z and the computations are addition and division. An assignment statement assigns a variable a value derived fromsome expression, while conditional statements specify expressions to be tested and then used to select which other statements should be executed next.Procedure and function statements define certain blocks of code as procedures or functions that can then be returned to later in the program. These statements also define the kinds of variables and parameters the programmer can choose and the type of value that the code will return when an expression accesses the procedure or function. Many programming languages also permit mini translation programs called macros. Macros translate segments of code that have been written in a language structure defined by the programmer into statements that the programming language understands.V. HistoryProgramming languages date back almost to the invention of the digital computer in the 1940s. The first assembly languages emerged in the late 1950s with the introduction of commercial computers. The first procedural languages were developed in the late 1950s to early 1960s: FORTRAN, created by John Backus, and then COBOL, created by Grace Hopper The first functional language was LISP, written by John McCarthy4 in the late 1950s. Although heavily updated, all three languages are still widely used today. In the late 1960s, the first object-oriented languages, such as SIMULA, emerged. Logic languages became well known in the mid 1970swith the introduction of PROLOG6, a language used to program artificial intelligence software. During the 1970s, procedural languages continued to develop with ALGOL, BASIC, PASCAL, C, and A d a SMALLTALK was a highly influential object-oriented language that led to the merging ofobject- oriented and procedural languages in C++ and more recently in JAVA10. Although pure logic languages have declined in popularity, variations have become vitally important in the form of relational languages for modern databases, such as SQL.计算机程序一、引言计算机程序是指导计算机执行某个功能或功能组合的一套指令。
本科毕业论文中英文翻译--Wireless-Communications无线通信【范本模板】
Wireless Communications*byJoshua S。
Gans,Stephen P。
King and Julian Wright1. IntroductionIn 1895, Guglielmo Marconi opened the way for modern wireless communications by transmitting the three—dot Morse code for the letter ‘S’ over a distance of th ree kilometers using electromagnetic waves。
From this beginning,wireless communications has developed into a key element of modern society. From satellite transmission, radio and television broadcasting to the now ubiquitous mobile telephone,wireless communications has revolutionized the way societies function.This chapter surveys the economics literature on wireless communications。
Wireless communications and the economic goods and services that utilise it have some special characteristics that have motivated specialised studies。
First, wireless communications relies on a scarce resource –namely,radio spectrum –the property rights for which were traditionally vested with the state. In order to foster the development of wireless communications (including telephony and broadcasting)those assets were privatised。
光纤通信系统Optical_Fiber_Communications_英文资料及中文翻译
光纤通信系统Optical Fiber Communications英文资料及中文翻译Communication may be broadly defined as the transfer of information from one point to another .When the information is to be conveyed over any distance a communication system is usually required .Within a communication system the information transfer is frequently achieved by superimposing or modulating the information on to an electromagnetic wave which acts as a carrier for the information signal .This modulated carrier is then transmitted to the required destination where it is received and the original information signal is obtained by demodulation .Sophisticated techniques have been developed for this process by using electromagnetic carrier waves operating at radio requites as well as microwave and millimeter wave frequencies.The carrier maybe modulated by using either optical an analog digital information signal.. Analog modulation involves the variation of the light emitted from the optical source in a continuous manner. With digital modulation, however, discrete changes in the length intensity are obtained (i.e. on-off pulses). Although often simpler to implement, analog modulation with an optical fiber communication system is less efficient, requiring a far higher signal to noise ratio at the receiver than digital modulation. Also, the linearity needed for analog modulation is mot always provided by semiconductor optical source, especially at high modulation frequencies .For these reasons ,analog optical fiber communications link are generally limited to shorter distances and lower bandwidths than digital links .Initially, the input digital signal from the information source is suitably encoded for optical transmission .The laser drive circuit directly modulates the intensity of the semiconductor last with the encoded digital signal. Hence a digital optical signal is launched into the optical fiber cable .The avalanche photodiode detector (APD) is followed by a front-end amplifier and equalizer or filter to provide gain as well as linear signal processing and noise bandwidth reduction. Finally ,the signal obtained isdecoded to give the original digital information .Generating a Serial SignalAlthough a parallel input-output scheme can provide fast data transfer and is simple in operation, it has the disadvantage of requiring a large number of interconnections. As an example typical 8 bit parallel data port uses 8 data lines, plus one or two handshake lines and one or more ground return lines. It is fairly common practice to provide a separate ground return line for each signal line, so an 8 bit port could typically use a 20 core interconnection cable. Whilst such a multi way cable is quite acceptable for short distance links, up to perhaps a few meters, it becomes too expensive for long distance links where, in addition to the cost of the multiword cable, separate driver and receiver circuits may be required on each of the 10 signal lines. Where part of the link is to be made via a radio link, perhaps through a space satellite, separate radio frequency channels would be required for each data bit and this becomes unacceptable.An alternative to the parallel transfer of data is a serial in which the states of the individual data bits are transmitted in sequence over a single wire link. Each bit is allocated a fixed time slot. At the receiving end the individual bit states are detected and stored in separate flip-flop stages, so that the data may be reassembled to produce a parallel data word. The advantage of this serial method of transmission is that it requires only one signal wire and a ground return, irrespective of the number of bits in the data word being transmitted. The main disadvantage is that the rate at which data can be transferred is reduced in comparison with a parallel data transfer, since the bits are dealt with in sequence and the larger the number of bits in the word, the slower the maximum transfer speed becomes. For most applications however, a serial data stream can provide a perfectly adequate data transfer rate . This type of communication system is well suited for radio or telephone line links, since only one communication channel is required to carry the data.We have seen that in the CPU system data is normally transferred in parallel across the main data bus, so if the input -output data is to be in serial form, then a parallel to serial data conversion process is required between the CPU data bus andthe external I/O line. The conversion from parallel data to the serial form could be achieved by simply using a multiplexed switch, which selects each data bit in turn and connects it to the output line for a fixed time period. A more practical technique makes use of a shift register to convert the parallel data into serial form.A shift register consists of a series of D type flip-flops connected in a chain, with the Q output of one flip-flop driving the D input of the next in the chain. All of the flip-flops ate clocked simultaneously by a common clock pulse, when the clock pulse occurs the data stored in each flip-flop is transferred to the next flip-flop to the right in the chain. Thus for each clock pulse the data word is effectively stepped along the shift register by one stage, At the end of the chain the state of the output flip-flop will sequence through the states of the data bits originally stored in the register. The result is a serial stream of data pulses from the end of the shift register.In a typical parallel to serial conversion arrangement the flip-flops making up the shift register have their D input switchable. Initially the D inputs are set up in a way so that data can be transferred in parallel from the CPU data bus into the register stages. Once the data word has been loaded into the register the D inputs are switched so that the flip-flops from a shift register .Now for each successive clock pulse the data pattern is shifted through the register and comes out in serial form at the right hand end of the register.At the receiving end the serial data will usually have to be converted back into the parallel form before it can be used. The serial to parallel conversion process can also be achieved by using a shift register .In this case the serial signal is applied to the D input of the stage at the left hand end of the register. As each serial bit is clocked into the register the data word again moves step by step to the right, and after the last bit has been shifted in the complete data word will be assembled within the register .At this point the parallel data may be retrieved by simply reading out the data from individual register stages in parallel It is important that the number of stages in the shift register should match the number of bits in the data word, if the data is to be properly converted into parallel form.To achieve proper operation of the receiving end of a serial data link, it isimportant that the clock pulse is applied to the receive shift register at a time when the data level on the serial line is stable. It is possible to have the clock generated at either end of the link, but a convenient scheme is to generate the clock signal at the transmitting end (parallel-serial conversion )as the master timing signal. To allow for settling time and delays along the line, the active edge of the clock pulse at the receive end is delayed relative to that which operates the transmit register. If the clock is a square wave the simples approach might be to arrange that the transmit register operates on the rising edge of the clock wave, and the receive register on the falling edge, so that the receiver operates half a clock period behind the transmitter .If both registers operate on arising edge, the clock signal from the transmitter could be inverted before being used to drive the receive shifty register.For an 8 bit system a sequence of 8 clock pulses would be needed to send the serial data word .At the receiving end the clock pulses could be counted and when the eighth pulse is reached it might be assumed that the data in the receive register is correctly positioned, and may be read out as parallel data word .One problem here is that, if for some reason the receive register missed a clock pulse ,its data pattern would get out of step with the transmitted data and errors would result. To overcome this problem a further signal is required which defines the time at which the received word is correctly positioned in the receive shift register and ready for parallel transfer from the register .One possibility is to add a further signal wire along which a pulse is sent when the last data bit is being transmitted, so that the receiver knows when the data word is correctly set up in its shift register. Another scheme might be to send clock pulses only when data bits are being sent and to leave a timing gap between the groups of bits for successive data words. The lack of the clock signal could then be detected and used to reset the bit counter, so that it always starts at zero at the beginning of each new data word.Serial and Parallel Data lion is processed. Serial indicates that the information is handled sequentially, similar to a group of soldiers marching in single file. In parallel transmission the info The terms serial and parallel are often used in descriptions of data transmission techniques. Both refer to the method by which information isdivided in to characters, words, or blocks which are transmitted simultaneously. This could be compared to a platoon of soldiers marching in ranks.The output of a common type of business machine is on eight—level punched paper tape, or eight bits of data at a time on eight separate outputs. Each parallel set of eight bits comprises a character, and the output is referred to as parallel by bit, serial by character. The choice of cither serial or parallel data transmission speed requirements.Business machines with parallel outputs, how—ever, can use either parallel outputs, how—ever, can use either direct parallel data trans—mission or serial transmission, with the addition of a parallel—to—serial converter at the interface point of the business machine and the serial data transmitter. Similarly, another converter at the receiving terminal must change the serial data back to the parallel format.Both serial and parallel data transmission systems have inherent advantages which are some—what different. Parallel transmission requires that parts of the available bandwidth be used as guard bands for separating each of the parallel channels, whereas serial transmission systems can use the entire linear portion of the available band to transmit data, On the other hand, parallel systems are convenient to use because many business machines have parallel inputs and outputs. Though a serial data set has the added converters for parallel interface, the parallel transmitter re—quires several oscillators and filters to generate the frequencies for multiplexing each of the side—by—side channels and, hence, is more susceptible to frequency error.StandardsBecause of the wide variety of data communications and computer equipment available, industrial standards have been established to provide operating compatibility. These standards have evolved as a result of the coordination between manufacturers of communication equipment and the manufacturers of data processing equipment. Of course, it is to a manufacturer’s advantage to provide equipment that isuniversally acceptable. It is also certainly apparent that without standardization intersystem compatibility would be al—most impossible.Organizations currently involved in uniting the data communications and computer fields are the CCITT, Electronic Industries Association (EIA), American Standards Association (ASA), and IEEE.A generally accepted standard issued by the EIA, RS—232—B, defines the characteristics of binary data signals, and provides a standard inter—face for control signals between data processing terminal equipment and data communications equipment. As more and more data communications systems are developed, and additional ways are found to use them, the importance ways are found to use them, the importance of standards will become even more significant.Of the most important considerations in transmitting data over communication systems is accuracy. Data signals consist of a train of pulses arranged in some sort of code. In a typical binary system, for example, digits 1 and 0 are represented by two different pulse amplitudes. If the amplitude of a pulse changes beyond certain limits during transmission, the detector at the receiving end may produce the wrong digit, thus causing an error.It is very difficult in most transmission systems to completely avoid. This is especially true when transmission system designed for speech signals. Many of the inherent electrical characteristics of telephone circuits have an adverse effect on digital signals.Making the circuits unsatisfactory for data transmission—especially treated before they can be used to handle data at speeds above 2000 bits per second.V oice channels on the switched (dial—up) telephone network exhibit certain characteristics which tend to distort typical data signal waveforms. Since there is random selection of a particular route for the data signal with each dialed connection, transmission parameters will generally change, sometimes upsetting the effect of built—in compensationNetworks. In addition, the switched network cannot be used of for large multipleaddress data systems using time sharing. Because of these considerations, specially treated voice bandwidth circuits are made available for data use. The characteristics and costs of these point—to—point private lines are published in document called tariffs, which are merely regulatory agreements reached by the FCC, state public utilities commissions, and operating telephone companies regarding charges for particular types of telephone circuits. The main advantage of private or dedicated facilities is that transmission characteristics are fixed and remain so for all data communications operations.Correlative TechniqueCorrelative data transmission techniques, particularly the Duobinary principle, have aroused considerable interest because of the method of converting a binary signal into three equidistant levels. This correlative scheme is accomplished in such a manner that the predetermined level depends on past signal history, forming the signal so that it never goes from one level extreme to another in one bit interval.The most significant property of the Duobinary process is that it affords a two—to—one bandwidth compression relative to binary signaling, or equivalently twice the speed capability in bits per second for a fixed bandwidth. The same speed capability for a multilevel code would normally require four levels, each of which would represent two binary digits.The FutureIt is universally recognized that communication is essential at every level of organization. The United States Government utilizes vast communications network for voice as well as data transmission. Likewise, business need communications to carry on their daily operations.The communications industry has been hard at work to develop systems that will transmit data economically and reliably over both private—line and dial up telephone circuits. The most ardent trend in data transmission today is toward higher speeds over voice—grade telephone channels. New transmission and equalization techniques now being investigated will soon permit transmitting digital data over telephone channels at speeds of 4800 bits per second or higher.To summarize: The major demand placed on telecommunications systems is for more information-carrying capacity because the volume of information produced increases rapidly. In addition, we have to use digital technology for the high reliability and high quality it provides in the signal transmission. However, this technology carries a price: the need for higher information-carrying capacity.The Need for Fiber-Optic Communications Systems The major characteristic of a telecommunications system is unquestionably its information-carrying capacity, but there are many other important characteristics. For instance, for a bank network, security is probably more important than capacity. For a brokerage house, speed of transmission is the most crucial feature of a network. In general, though, capacity is priority one for most system users. And there’s the rub. We cannot increase link capacity as much as we would like. The major limit is shown by the Shannon-Hartley theorem,Where C is the information-carrying capacity(bits/sec), BW is the link bandwidth (Hz=cycles/sec), and SNR is the signal-to-noise power ratio.Formula 1.1 reveals a limit to capacity C; thus, it is often referred to as the “ Shannon limit.” The formula, which comes from information theory, is true regardless of specific technology. It was first promulgated in 1948 by Claude Shannon, a scientist who worked at Bell Laboratories. R. V. L. Hartley, who also worked at Bell Laboratories, published a fundamental paper 20 years earlier, a paper that laid important groundwork in information theory, which is why his name is associated with Shannon’s formula.The Shannon-Hartley theorem states that information-carrying capacity is proportional to channel bandwidth, the range of frequencies within which the signals can be transmitted without substantial attenuation.What limits channel bandwidth? The frequency of the signal carrier. The higher the carrier’s frequency, the greater the channel bandwidth and the higher the information-carrying capacity of the system. The rule of thumb for estimating possible order of values is this: Bandwidth is approximately 10 percent of the carrier-signal frequency. Hence, if a microwave channel uses a 10-GHz carrier signal.Then its bandwidth is about 100 MHz.A copper wire can carry a signal up to 1 MHz over a short distance. A coaxial cable can propagate a signal up to 100 MHz. Radio frequencies are in the range of 500 KHz to 100 MHz. Microwaves, including satellite channels, operate up to 100 GHz. Fiber-optic communications systems use light as the signal carrier; light frequency is between 100 and 1000 THz; therefore, one can expect much more capacity from optical systems. Using the rule of thumb mentioned above, we can estimate the bandwidth of a single fiber-optic communication link as 50 THz.To illustrate this point, consider these transmission media in terms of their capacity to carry, simultaneously, a specific number of one-way voice channels. Keep in mind that the following precise value. A single coaxial cable can carry up to 13,000 channels, a microwave terrestrial link up to 20,000 channels, and a satellite link up to 100,000 channels. However, one fiber-optic communications link, such as the transatlantic cable TAT-13, can carry 300,000 two-way voice channels simultaneously. That’s impressive and explains why fiber-optic communications systems form the backbone of modern telecommunications and will most certainly shape its future.To summarize: The information-carrying capacity of a telecommunications system is proportional to its bandwidth, which in turn is proportional to the frequency of the carrier. Fiber-optic communications systems use light-a carrier with the highest frequency among all the practical signals. This is why fiber-optic communications systems have the highest information-carrying capacity and this is what makes these systems the linchpin of modern telecommunications.To put into perspective just how important a role fiber-optic communications will be playing in information delivery in the years ahead, consider the following statement from a leading telecommunications provider: “ The explosive growth of Internet traffic, deregulation and the increasing demand of users are putting pressure on our customers to increase the capacity of their network. Only optical networks can deliver the required capacity, and bandwidth-on-demand is now synonymous with wavelength-on-demand.” Th is statement is true not only for a specific telecommunications company. With a word change here and there perhaps, but withthe same exact meaning, you will find telecommunications companies throughout the world voicing the same refrain.A modern fiber-optic communications system consists of many components whose functions and technological implementations vary. This is overall topic of this book. In this section we introduce the main idea underlying a fiber-optic communications system.Basic Block DiagramA fiber-optic communications system is a particular type of telecommunications system. The features of a fiber-optic communications system can be seen in Figure 1.4, which displays its basic block diagram.Information to be conveyed enters an electronic transmitter, where it is prepared for transmission very much in the conventional manner-that is, it is converted into electrical form, modulated, and multiplexed. The signal then moves to the optical transmitter, where it is converted into optical detector converts the light back into an electrical signal, which is processed by the electronic receiver to extract the information and present it in a usable form (audio, video, or data output).Let’s take a simple example that involves Figures 1.1, 1.3, and 1.4 Suppose we need to transmit a voice signal. The acoustic signal (the information) is converted into electrical form by a microphone and the analog signal is converted into binary formby the PCM circuitry. This electrical digital signal modulates a light source and the latter transmits the signal as a series of light pulses over optical fiber. If we were able to look into an optical fiber, we would see light vary between off and on in accordance with the binary number to be transmitted. The optical detector converts the optical signal it receives into a set of electrical pulses that are processed by an electronic receiver. Finally, a speaker converts the analog electrical signal into acoustic waves and we can hear sound-delivered information.Figure 1.4 shows that this telecommunications system includes electronic components and optical devices. The electronic components deal with information in its original and electrical forms. The optical devices prepare and transmit the light signal. The optical devices constitute a fiber-optic communications system.TransmitterThe heart of the transmitter is a light source. The major function of a light source is to convert an information signal from its electrical form into light. Today’sfiber-optic communications systems use, as a light source, either light-emitting diodes (LEDs) or laser diodes (LDs). Both are miniature semiconductor devices that effectively convert electrical signals are usually fabricated in one integrated package. In Figure 1.4, this package is denoted as an optical transmitter. Figure 1.5 displays the physical make-up of an LED, an LD, and integrated packages.Optical fiberThe transmission medium in fiber-optic communications systems is an optical fiber. The optical fiber is the transparent flexible filament that guides light from a transmitter to a receiver. An optical information signal entered at the transmitter end of a fiber-optic communications system is delivered to the receiver end by the optical fiber. So, as with any communication link, the optical fiber provides the connection between a transmitter and a receiver and, very much the way copper wire and coaxial cable conduct an electrical signal, optical fiber “ conducts” light.The optical fiber is generally made from a type of glass called silica or, less commonly nowadays, from plastic. It is about a human hair in thickness. To protect very fragile optical fiber from hostile environments and mechanical damage, it is usually enclosed in a specific structure. Bare optical fiber, shielded by its protective coating, is encapsulated use in a host of applications, many of which will be covered in subsequent chaptersReceiver The key component of an optical receiver is its photodetector. The major function of a photodetector is to convert an optical information signal back into an electrical signal (photocurrent). The photodetector in today's fiver-optic communications systems is a semiconductor photodiode (PD). This miniature device is usually fabricated together with its electrical circyitry to form an integrated package that provides power-supply connections and signal amplification. Such an integrated package is shown in Figure 1.4 as an optical receiver. Figure 1.7 shows samples of a photodiode and an integrated package.The basic diagram shown in Figure 1.4 gives us the first idea of what a fiber-optic communications system is and how it works. All the components of this point-to-point system are discussed in detail in this book. Particular attention is given to the study of networks based on fiber-optic communications systems.The role of Fiber-Optic Communications Technology has not only already changed the landscape of telecommunications but it is still doing so and at a mind-boggling pace. In fact, because of the telecommunications industry's insatiable appetite for capacity, in recent years the bandwidth of commercial systems has increased more than a hundredfold. The potential information-carrying capacity of a single fiber-optic channel is estimated at 50 terabits a second (Tbit/s) but, from apractical standpoint, commercial links have transmitted far fewer than 100 Gbps, an astoundingamount of data in itself that cannot be achieved with any other transmission medium. Researchers and engineers are working feverishly to develop new techniques that approach the potential capacity limit.Two recent major technological advances--wavelength-division multiplexing (WDM) anderbium-doped optical-fiber amplifiers (EDFA)--have boosted the capacity of existing system sand have brought about dramatic improvements in the capacity of systems now in development. In fact,' WDM is fast becoming the technology of choice in achieving smooth, manageable capacity expansion.The point to bear in mind is this: Telecommunications is growing at a furious pace, and fiber-optic communications is one of its most dynamically moving sectors. While this book refleets the current situation in fiber-optic communications technology, to keep yourself updated, you have to follow the latest news in this field by reading the industry's trade journals, attending technical conferences and expositions, and finding the time to evaluate the reams of literature that cross your desk every day from companies in the field.光纤通信系统一般的通信系统由下列部分组成:(1) 信息源。
水生通讯与网络的研究进展英语原版及翻译
Recent Advances in Underwater Acoustic Communications & Networking水声通信与网络研究进展Abstract– The past three decades have seen a growing interest in underwater acousticcommunications. Continued research over the years has resulted in improved performance androbustness as compared to the initial communication systems. Research has expanded frompoint-to-point communications to include underwater networks as well. A series of review papers provide an excellent history of the development of the field until the end of the last decade. In this paper, we aim to provide an overview of the key developments, both theoretical and applied, in the field in thepast two decades. We also hope to provide an insight into some of the open problems and challenges facingresearchers in this field in the near future.抽象过去三十年来,在水声通信的兴趣与日俱增。
5G无线通信网络中英文对照外文翻译文献
5G无线通信网络中英文对照外文翻译文献(文档含英文原文和中文翻译)翻译:5G无线通信网络的蜂窝结构和关键技术摘要第四代无线通信系统已经或者即将在许多国家部署。
然而,随着无线移动设备和服务的激增,仍然有一些挑战尤其是4G所不能容纳的,例如像频谱危机和高能量消耗。
无线系统设计师们面临着满足新型无线应用对高数据速率和机动性要求的持续性增长的需求,因此他们已经开始研究被期望于2020年后就能部署的第五代无线系统。
在这篇文章里面,我们提出一个有内门和外门情景之分的潜在的蜂窝结构,并且讨论了多种可行性关于5G无线通信系统的技术,比如大量的MIMO技术,节能通信,认知的广播网络和可见光通信。
面临潜在技术的未知挑战也被讨论了。
介绍信息通信技术(ICT)创新合理的使用对世界经济的提高变得越来越重要。
无线通信网络在全球ICT战略中也许是最挑剔的元素,并且支撑着很多其他的行业,它是世界上成长最快最有活力的行业之一。
欧洲移动天文台(EMO)报道2010年移动通信业总计税收1740亿欧元,从而超过了航空航天业和制药业。
无线技术的发展大大提高了人们在商业运作和社交功能方面通信和生活的能力无线移动通信的显著成就表现在技术创新的快速步伐。
从1991年二代移动通信系统(2G)的初次登场到2001年三代系统(3G)的首次起飞,无线移动网络已经实现了从一个纯粹的技术系统到一个能承载大量多媒体内容网络的转变。
4G无线系统被设计出来用来满足IMT-A技术使用IP面向所有服务的需求。
在4G系统中,先进的无线接口被用于正交频分复用技术(OFDM),多输入多输出系统(MIMO)和链路自适应技术。
4G无线网络可支持数据速率可达1Gb/s的低流度,比如流动局域无线访问,还有速率高达100M/s的高流速,例如像移动访问。
LTE系统和它的延伸系统LTE-A,作为实用的4G系统已经在全球于最近期或不久的将来部署。
然而,每年仍然有戏剧性增长数量的用户支持移动宽频带系统。
通信类英文文献及翻译
姓名:峻霖班级:通信143班学号:2014101108附录一、英文原文:Detecting Anomaly Traffic using Flow Data in thereal VoIP networkI. INTRODUCTIONRecently, many SIP[3]/RTP[4]-based VoIP applications and services have appeared and their penetration ratio is gradually increasing due to the free or cheap call charge and the easy subscription method. Thus, some of the subscribers to the PSTN service tend to change their home telephone services to VoIP products. For example, companies in Korea such as LG Dacom, Samsung Net- works, and KT have begun to deploy SIP/RTP-based VoIP services. It is reported that more than five million users have subscribed the commercial VoIP services and 50% of all the users are joined in 2009 in Korea [1]. According to IDC, it is expected that the number of VoIP users in US will increase to 27 millions in 2009 [2]. Hence, as the VoIP service becomes popular, it is not surprising that a lot of VoIP anomaly traffic has been already known [5]. So, Most commercial service such as VoIP services should provide essential security functions regarding privacy, authentication, integrity andnon-repudiation for preventing malicious traffic. Particu- larly, most of current SIP/RTP-based VoIP services supply the minimal security function related with authentication. Though secure transport-layer protocols such as Transport Layer Security (TLS) [6] or Secure RTP (SRTP) [7] have been standardized, they have not been fully implemented and deployed in current VoIP applications because of the overheads of implementation and performance. Thus, un-encrypted VoIP packets could be easily sniffed and forged, especially in wireless LANs. In spite of authentication,the authentication keys such as MD5 in the SIP header could be maliciously exploited, because SIP is a text-based protocol and unencrypted SIP packets are easily decoded. Therefore, VoIP services are very vulnerable to attacks exploiting SIP and RTP. We aim at proposing a VoIP anomaly traffic detection method using the flow-based traffic measurement archi-tecture. We consider three representative VoIP anomalies called CANCEL, BYE Denial of Service (DoS) and RTP flooding attacks in this paper, because we found that malicious users in wireless LAN could easily perform these attacks in the real VoIP network. For monitoring VoIP packets, we employ the IETF IP Flow Information eXport (IPFIX) [9] standard that is based on NetFlow v9. This traffic measurement method provides a flexible and extensible template structure for various protocols, which is useful for observing SIP/RTP flows [10]. In order to capture and export VoIP packets into IPFIX flows, we define two additional IPFIX templates for SIP and RTP flows. Furthermore, weadd four IPFIX fields to observe 802.11 packets which are necessary to detect VoIP source spoofing attacks in WLANs.II. RELATED WORK[8] proposed a flooding detection method by the Hellinger Distance (HD) concept. In [8], they have pre- sented INVITE, SYN and RTP flooding detection meth-ods. The HD is the difference value between a training data set and a testing data set. The training data set collected traffic over n sampling period of duration Δ t.The testing data set collected traffic next the training data set in the same period. If the HD is close to ‘1’, this testing data set is regarded as anomaly traffic. For using this method, they assumed that initial training data set did not have any anomaly traffic. Since this method was based on packet counts, it might not easily extended to detect other anomaly traffic except flooding. On the other hand, [11] has proposed a VoIP anomaly traffic detection method using Extended Finite State Machine (EFSM). [11] has suggested INVITE flooding, BYE DoS anomaly traffic and media spamming detection methods. However, the state machine required more memory because it had to maintain each flow. [13] has presented NetFlow-based VoIP anomaly detection methods for INVITE, REGIS-TER, RTP flooding, and REGISTER/INVITE scan. How-ever, the VoIP DoS attacks considered in this paper were not considered. In [14], an IDS approach to detect SIP anomalies was developed, but only simulation results are presented. For monitoring VoIP traffic, SIPFIX [10] has been proposed as an IPFIX extension. The key ideas of the SIPFIX are application-layer inspection andSDP analysis for carrying media session information. Yet, this paper presents only the possibility of applying SIPFIX to DoS anomaly traffic detection and prevention. We described the preliminary idea of detecting VoIP anomaly traffic in [15]. This paper elaborates BYE DoS anomaly traffic and RTP flooding anomaly traffic detec-tion method based on IPFIX. Based on [15], we have considered SIP and RTP anomaly traffic generated in wireless LAN. In this case, it is possible to generate the similiar anomaly traffic with normal VoIP traffic, because attackers can easily extract normal user information from unencrypted VoIP packets. In this paper, we have extended the idea with additional SIP detection methods using information of wireless LAN packets. Furthermore, we have shown the real experiment results at the commercial VoIP network.III. THE VOIP ANOMALY TRAFFIC DETECTION METHODA. CANCEL DoS Anomaly Traffic DetectionAs the SIP INVITE message is not usually encrypted, attackers could extract fields necessary to reproduce the forged SIP CANCEL message by sniffing SIP INVITE packets, especially in wireless LANs. Thus, we cannot tell the difference between the normal SIP CANCEL message and the replicated one, because the faked CANCEL packet includes the normal fields inferred from the SIP INVITE message. The attacker will perform the SIP CANCEL DoS attack at the same wireless LAN, because the purpose of the SIP CANCEL attack is to prevent the normal call estab-lishment when a victim is waiting for calls. Therefore, as soonas the attacker catches a call invitation message for a victim, it will send a SIP CANCEL message, which makes the call establishment failed. We have generated faked SIP CANCEL message using sniffed a SIP INVITE message.Fields in SIP header of this CANCEL message is the same as normal SIP CANCEL message, because the attacker can obtain the SIP header field from unencrypted normal SIP message in wireless LAN environment. Therefore it is impossible to detect the CANCEL DoS anomaly traffic using SIP headers, we use the different values of the wireless LAN frame. That is, the sequence number in the 802.11 frame will tell the difference between a victim host and an attacker. We look into source MAC address and sequence number in the 802.11 MAC frame including a SIP CANCEL message as shown in Algorithm 1. We compare the source MAC address of SIP CANCEL packets with that of the previously saved SIP INVITE flow. If the source MAC address of a SIP CANCEL flow is changed, it will be highly probable that the CANCEL packet is generated by a unknown user. However, the source MAC address could be spoofed. Regarding 802.11 source spoofing detection, we employ the method in [12] that uses sequence numbers of 802.11 frames. We calculate the gap between n-th and (n-1)-th 802.11 frames. As the sequence number field in a 802.11 MAC header uses 12 bits, it varies from 0 to 4095. When we find that the sequence number gap between a single SIP flow is greater than the threshold value of N that will be set from the experiments, we determine that the SIP host address as been spoofed for the anomaly traffic.B. BYE DoS Anomaly Traffic DetectionIn commercial VoIP applications, SIP BYE messages use the same authentication field is included in the SIP IN-VITE message for security and accounting purposes. How-ever, attackers can reproduce BYE DoS packets through sniffing normal SIP INVITE packets in wireless LANs.The faked SIP BYE message is same with the normal SIP BYE. Therefore, it is difficult to detect the BYE DoS anomaly traffic using only SIP header information.After sniffing SIP INVITE message, the attacker at the same or different subnets could terminate the normal in- progress call, because it could succeed in generating a BYE message to the SIP proxy server. In the SIP BYE attack, it is difficult to distinguish from the normal call termination procedure. That is, we apply the timestamp of RTP traffic for detecting the SIP BYE attack. Generally, after normal call termination, the bi-directional RTP flow is terminated in a bref space of time. However, if the call termination procedure is anomaly, we can observe that a directional RTP media flow is still ongoing, whereas an attacked directional RTP flow is broken. Therefore, in order to detect the SIP BYE attack, we decide that we watch a directional RTP flow for a long time threshold of N sec after SIP BYE message. The threshold of N is also set from the experiments.Algorithm 2 explains the procedure to detect BYE DoS anomal traffic using captured timestamp of the RTP packet. We maintain SIP session information between clients with INVITE and OK messages including the same Call-ID and 4-tuple (source/destination IP Address and port number) of the BYEpacket. We set a time threshold value by adding Nsec to the timestamp value of the BYE message. The reason why we use the captured timestamp is that a few RTP packets are observed under 0.5 second. If RTP traffic is observed after the time threshold, this will be considered as a BYE DoS attack, because the VoIP session will be terminated with normal BYE messages. C. RTP Anomaly Traffic Detection Algorithm 3 describes an RTP flooding detection method that uses SSRC and sequence numbers of the RTP header. During a single RTP session, typically, the same SSRC value is maintained. If SSRC is changed, it is highly probable that anomaly has occurred. In addition, if there is a big sequence number gap between RTP packets, we determine that anomaly RTP traffic has happened. As inspecting every sequence number for a packet is difficult, we calculate the sequence number gap using the first, last, maximum and minimum sequence numbers. In the RTP header, the sequence number field uses 16 bits from 0 to 65535. When we observe a wide sequence number gap in our algorithm, we consider it as an RTP flooding attack.IV. PERFORMANCE EVALUATIONA. Experiment EnvironmentIn order to detect VoIP anomaly traffic, we established an experimental environment as figure 1. In this envi-ronment, we employed two VoIP phones with wireless LANs, one attacker, a wireless access router and an IPFIX flow collector. For the realistic performance evaluation, we directly used one of the working VoIP networks deployed in Korea where an 11-digit telephone number (070-XXXX-XXXX) has been assigned to a SIP phone.With wireless SIP phones supporting 802.11, we could make calls to/from the PSTN or cellular phones. In the wireless access router, we used two wireless LAN cards- one is to support the AP service, and the other is to monitor 802.11 packets. Moreover, in order to observe VoIP packets in the wireless access router, we modified nProbe [16], that is an open IPFIX flow generator, to create and export IPFIX flows related with SIP, RTP, and 802.11 information. As the IPFIX collector, we have modified libipfix so that it could provide the IPFIX flow decoding function for SIP, RTP, and 802.11 templates. We used MySQL for the flow DB.B. Experimental ResultsIn order to evaluate our proposed algorithms, we gen-erated 1,946 VoIP calls with two commercial SIP phones and a VoIP anomaly traffic generator. Table I shows our experimental results with precision, recall, and F-score that is the harmonic mean of precision and recall. In CANCEL DoS anomaly traffic detection, our algorithm represented a few false negative cases, which was related with the gap threshold of the sequence number in 802.11 MAC header. The average of the F-score value for detecting the SIP CANCEL anomaly is 97.69%.For BYE anomaly tests, we generated 755 BYE mes-sages including 118 BYE DoS anomalies in the exper-iment. The proposed BYE DoS anomaly traffic detec-tion algorithm found 112 anomalies with the F-score of 96.13%. If an RTP flow is terminated before the threshold, we regard the anomaly flow as a normal one. In this algorithm, we extract RTP session information from INVITE and OK or session description messages using the same Call-ID of BYE message. It is possible not to capture those packet, resulting in a few false-negative cases. The RTP flooding anomaly traffic detection experiment for 810 RTP sessions resulted in the F score of 98%.The reason of false-positive cases was related with the sequence number in RTP header. If the sequence number of anomaly traffic is overlapped with the range of the normal traffic, our algorithm will consider it as normal traffic.V. CONCLUSIONSWe have proposed a flow-based anomaly traffic detec-tion method against SIP and RTP-based anomaly traffic in this paper. We presented VoIP anomaly traffic detection methods with flow data on the wireless access router. We used the IETF IPFIX standard to monitor SIP/RTP flows passing through wireless access routers, because its template architecture is easily extensible to several protocols. For this purpose, we defined two new IPFIX templates for SIP and RTP traffic and four new IPFIX fields for 802.11 traffic. Using these IPFIX flow templates,we proposed CANCEL/BYE DoS and RTP flooding traffic detection algorithms. From experimental results on the working VoIP network in Korea, we showed that our method is able to detect three representative VoIP attacks on SIP phones. In CANCEL/BYE DoS anomaly trafficdetection method, we employed threshold values about time and sequence number gap for classfication of normal and abnormal VoIP packets. This paper has not been mentioned the test result about suitable threshold values. For the future work, we will show the experimental result about evaluation of the threshold values for our detection method.二、英文翻译:交通流数据检测异常在真实的世界中使用的VoIP网络一 .介绍最近,多SIP[3],[4]基于服务器的VoIP应用和服务出现了,并逐渐增加他们的穿透比及由于自由和廉价的通话费且极易订阅的法。
通信类外文文献翻译
使用LabVIEW中的TCP/IP和UDP协议前言互联网络协议(IP),用户数据报协议(UDP)和传输控制协议(TCP)是网络通信的基本的工具。
TCP与IP的名称来自于一组最著名的因特网协议中的两个--传输控制协议和互联网络协议。
你能使用TCP/IP来进行单一网络或者互连网络间的通信。
单独的网络会被大的地理距离分隔。
TCP/IP把数据从一个子网网络或者因特网连接的计算机发送到另一个上。
因为TCP/IP 在大多数计算机上是可用的,它能在多样化的系统中间传送信息。
LabVIEW和TCP/IP你能在所有平台上的LabVIEW中使用TCP/IP。
LabVIEW包含了TCP和UDP程序还有能让你建立客户端或者服务器程序的功能。
IPIP执行低层次的计算机间的数据传送。
在组成部分里的IP数据包称为数据报。
一个数据报包含表明来源和目的地地址的数据和报头字。
IP为通过网络或者因特网把数据发送到指定的目的地的数据报确定正确的路径。
IP协议并不能保证发送。
事实上,如果数据报在传输中被复制,IP可能多次传送一个单独的数据报。
所以,程序很少用IP而是用TCP或者UDP代替。
UDPUDP在计算机进程中提供简单而低层次的通信。
进程通过把数据报发送到一个目的地计算机或者端口进行通信。
一个端口是你发送数据的位置。
IP处理计算机对计算机的发送。
在数据报到达目的地计算机后,UDP把数据报移动到其目的端口。
如果目的端口不是开放的,UDP 将删除数据报。
UDP将发生IP的同样的发送问题。
应用程序的UDP的可靠性不强。
例如,一项应用程序能经常把大量信息的数据传送到目的地而丢失少量的数据是肯定的。
在LabVIEW中使用UDP协议因为UDP不是一个TCP似的一个以连接为基础的协议,在你发送或者收到数据之前,你不需要和目的地建立一种连接。
相反,当你每发送一个数据报时,由你指定数据目的地。
操作系统不会报告传输差错使用UDP打开功能在一个端口上打开一个UDP插口。
Internet中英文资料对照外文翻译文献综述
中英文资料对照外文翻译文献综述Internet的历史起源——ARPAnetInternet是被美国政府作为一项工程进行开发的。
这项工程的目的,是为了建立远距离之间点与点的通信,以便处理国家军事范围内的紧急事件,例如核战争。
这项工程被命名为ARPAnet,它就是Internet的前身。
建立此工程的主要应用对象就是军事通讯,那些负责ARPAnet的工程师们当时也没有想到它将成为“Internet”。
根据定义,一个“Internet”应该由四或者更多的计算机连接起来的网络。
ARPAnet是通过一种叫TCP/IP的协议实现连网工作的。
此协议最基础的工作原理是:如果信息在网络中的一条路径发送失败,那么它将找到其他路径进行发送,就好象建立一种语言以便一台计算机与其他计算机“交谈”一样,但不注意它是PC,或是Macintosh。
到了20世纪80年代,ARPAnet已经开始变成目前更为有名的Internet了,它拥有200台在线主机。
国防部很满意ARPAnets的成果,于是决定全力将它培养为能够联系很多军事主机,资源共享的服务网络。
到了1984年,它就已经超过1000台主机在线了。
在1986年ARPAnet关闭了,但仅仅是建立它的机构关闭了,而网络继续存在与超过1000台的主机之间。
由于使用NSF连接失败,ARPAnet才被关闭。
NSF是将5个国家范围内的超级计算机连入ARPAnet。
随着NSF的建立,新的高速的传输介质被成功的使用,在1988年,用户能通过56k的电话线上网。
在那个时候有28,174台主机连入Internet。
到了1989年有80,000台主机连入Internet。
到1989年末,就有290,000台主机连入了。
另外还有其他网络被建立,并支持用户以惊人的数量接入。
于1992年正式建立。
现状——Internet如今,Internet已经成为人类历史上最先进技术的一种。
每个人都想“上网”去体验一下Internet中的信息财富。
通信专业外文翻译
通信工程专业毕业设计外文资料翻译第1 页正交频分复用技术简介可以减少子信道之间的相互干扰。
每个利用在容易受外界干扰或者抵抗外界干扰能力较差的传输介质中。
目前正交频分复用技称的数字用户环路、欧洲电信标准协会的数字音频广播、数字视频广播、高清晰度电视、无线局域网等。
40纪60年代就已经有人提出了使用平行数据传输和频分复用的概念。
70正交的子载波以及从子载波中恢复原信号的问题。
这就解决了多载波传输系统发送和传送的难题。
应用快速傅里叶变换和快速傅里叶逆变换更是使多载波传输系统的复杂度大大降低。
从此正交频分复用技术开始走向实用。
但是应用正交频分复用系统仍然需要大机振荡器的稳定性以及射频功率放大器的线性要求等因素也是正交频分复用技术实现的制约条件。
因此正交频分复用技术迟迟没有得到迅速发展。
80进入901999程师协会通过了一个的无线局域网标准IEEE802.lla54Mbps25Mbps的无线A TM接口和10Mbps能满足室内、室外的各种应用场合。
欧洲电信组织的宽带射频接入网的局域网标准通信工程专业毕业设计外文资料翻译第 2 页HiperiLAN2也把正交频分复用定为它的物理层标准调制技术。
正交频分复用有许多关键技术。
12息也必须不断的传送。
二是既有较低的复杂度又有良好的导频跟踪能力的信道估计器的计器的性能与导频信息的传输方式有关。
3码和交织是通常采用的方道特性信息已经被正交频分复用这种调制方式本身所利用了。
但是正交频分复用系统的4N个正交子载波信号的叠N值功率是平均功率的N分复用系统的性能大大下降甚至直接影响实际应用。
为了解决这一问于信号畸变技术、信号扰码技术和基于信号空间扩展等降低正交频分复用系统峰均功率比的方法。
11000个通信工程专业毕业设计外文资料翻译第3 页了这种特殊的信号穿透能力使得正交频分复用技术深受欧洲通信营运商以及手机生产商的喜爱和欢迎。
(2) 正交频分复用技术能够持续不断地监控传输介质上通信特性的突然变化。
通信工程光纤滤波器中英文对照外文翻译文献
中英文翻译(文档含英文原文和中文翻译)译文一:基于一个高双折射光纤双Sagnac环的可调谐多波长光纤激光器1.引言工作在波长1550nm附近的多波长光纤激光器已经吸引了许多人的兴趣,它可以应用于密集波分复用(DWDM)系统,精细光谱学,光纤传感和微波(RF)光电[1-4]等领域。
多波长光纤激光器可以通过布拉格光纤光栅阵列[5],锁模技术[6-7],光学参量振荡器[8],四波混频效应[9],受激布里渊散射效应实现[10-12]。
掺铒光纤(EDF)环形激光器可以提供大输出功率,高斜度效率和大可调谐波长范围。
例如,作为一种可调谐EDF激光器,带有单个高双折射光纤Sagnac 环的多波长光纤激光器已经提出[13-15]。
输出波长可以通过调整偏振控制器(PC)进行调谐,波长间隔可以通过改变保偏光纤(PMF)的长度进行调谐。
然而,对于单个Sagnac环光纤激光器来说,波长间隔和线宽都不能独立调谐[16]。
密集波分复用(DWDM)系统要求激光波长调谐更灵活,否则会限制这些激光器的应用。
一个双Sagnac环的多波长光纤激光器能提供更好的可调谐性和可控性。
采用这种结构,可以实现保持线宽不变的波长间隔可调谐,以及保持波长间隔不变的线宽调谐。
本文提出和证明了一种双Sagnac环可调谐多波长掺铒光纤环形激光器。
多波长选择由两个Sagnac 环实现,而每个环由一个3dB 耦合器,一个PC ,和一段高双折射PMF 组成。
本文模拟分析了单个和两个Sagnac 环的梳状滤波器的特征。
实验中,得到输出激光的半峰全宽(FWHM )是0.0187nm ,边模抑制比(SMSR )是50dB 。
通过调整两个PC 可以实现多波长激光器输出的大范围调谐。
与单环结构相比,改变PMF 长度可以独立调谐波长间隔和激光线宽。
本文中提出的双Sagnac 环光纤激光器是先前单Sagnac 环多段PMF 多波长光纤激光器工作的延伸,其在DWDM 系统,传感和仪表测试中具有潜在应用。
光纤通信简介翻译级英文原文
�处好列下有输传的号信电用使�言而用应信通的宽带低对相和离距短于对 。反相好正线输传的号信电输传和这�扰干的讯串生产会不也行并纤光条数使即时 输传离距长在是点优个一另的纤光�缆光成换求要被都缆电多很。力能息信带携的高较 有身本且输传行并率功�扰干号信他其和流电的上地有没它�耗损的小常非有纤光是点 优的要主最。离距输传的长较有以可缆电于对相者或度宽带频的高较有求要常通纤光择 选统系为 �衡权行进题问点几就要需输传行进缆铜用利是还输传纤光用利是择选在
页 2 第
�译翻献文�文论业毕院学技科河黄
较比的统系信通统传与、五 。器继中了代取的量大器大放光中备 设的新在。之发激光激长波短以再��muibre�铒如素元族土稀杂掺内纤光段一在过通 是它。号信电为号信光换转要需不号信光大放接直它�器大放光用是法方换变种一
。高常非也本成的器继中些这�器继中 个一要需就里公 02 隔每时同�术技用复分波的代一新于用适不�杂复为较构架统系的样这而然�器 继中个一下往传号信光的强较成换变再后大放号信电回转号信光将先器继中种这。题问些这了决
erew smetsys citpo-rebif dna ,gnimusnoc-emit dna tluciffid ylevi taler saw sei tic nihtiw reppoc gni tsixe revo segatnavda egral sah rebif lacitpo ,ecnerefretni dna noitaunetta rewol h cum enohpelet timsnart ot seinapmoc snoitacinummocelet ynam yb desu si rebif lacitpO ot euD .slangis n oisivelet elbac dna ,noitacinummoc tenretnI tnempoleved erutcurtsarfni ,revewoH .snoi tacilppa dnamed-hgih dna ecnatsid-gnol ni eriw
英文文献翻译
英文文献翻译文献一:改进的多分层空时分组码接收器算法摘要:在多层次空时分组码的接收端,本文提出了一种采用基于QR分解的新的接收结构,并将它和接收端采用基于MMSE干扰抑制的方法的性能做了对比。
这两种算法基于软统计判决来消除来自其它子层数据流的干扰,同时减少误差传播。
最后将这两种算法的性能和采用排序QR方法进行比较,讨论复杂性、速率和分集之间的折中。
1.前言:文献[1]提出了在发射端使用多天线系统可以产生容量增益,然而,由于在发射端和接收端没有对数据流进行联合编码和解码,这种系统不能达到满分集优势。
这种次优系统性能主要在中到高信噪比中,由于在解码的第一层有最低的分集排序,导致在接收端发生估值错误[2]。
这些误差传播基于连续干扰抵消属性同时对下层造成干扰。
使用多用户检测(MUD)[3],Tarokh[4]提出了一种分组干扰方法,这种方法要求计算零空间矩阵。
相似的,在文献[5],使用一种正交矩阵来消除除了预想求的码元外的其它干扰。
然而[5]要求在发射端进行理想的功率分配增加了计算的复杂性。
次优接收检测算法如[6]中提到的垂直分层空时码的迫零(ZF)算法和[7]中提到的基于连续干扰抵消的最小均方误差(MMSE)算法。
ZF-VBLAST迫使噪声在接收端乘以带有信道转置矩阵的接收信号。
然而,它的性能仍然比[8]中使用的QR 分解方法好很多。
MMSE-VBLAST算法在复杂性和性能方面提供了一种很好的均横。
以上所知的几种算法的误传(EP)性能在多用户检测-连续干扰抵消中都得到了实现。
文献[10]中我们提出了一种新的结合空时分组码和垂直分层空时码的算法,称为分层空时分组码,它显示了通过在解码第一层使用空时分组码可以减小EP的作用。
为了匹配Genie-BLAST[11]提供假设无EP的性能,提出了一种编码准则.本文将[10]中的MMSE 算法和低计算度的QR 分解干扰抑制算法进行了比较。
最后将sorted QR 分解方法和以上集中方法进行了比较,结果显示:[10]中的MMSE 检测算法能提供最好的复杂性、速率和分集之间的折中。
通信工程中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译)外文:Structure and function of the MCS-51 series Structure and function of the MCS-51 series one-chip computer MCS-51 is a name of a piece of one-chip computer series which Intel Company produces.This company introduced 8 top-grade one-chip computers of MCS-51 series in 1980 after introducing 8 one-chip computers of MCS-48 series in 1976.It belong to a lot of kinds this line of one-chip computer the chips have ,such as 8051, 8031,8751,80C51 BH, 80C31BH,etc., their basic composition, basic performance and instruction system are all the same.8051 daily representatives- 51 serial one-chip computer .An one-chip computer system is made up of several following parts:(1) One microprocessor of 8 (CPU).(2) At slice data memory RAM (128B/256B),it used to depositing not can reading /data that write, such as result not middle of operation,final result and data wanted to show, etc.(3)Procedure memory ROM/EPROM(4KB/8KB ), is used to preserve the procedure , some initial data and form in slice.But does not take ROM/EPROM within some one-chip computers, such as 8031 ,8032, 80C ,etc..(4)Four 8 run side by side I/O interface P0 four P3, each mouth canuse as introduction , may use as exporting too.(5)Two timer / counter, each timer /counter may set up and count in the way, used to count to the external incident, can setup into a timing way too, and can according to count or result of timing realize theontrol of the computer.(6)Five cut off cutting off the control system of thesource .(7)One all duplex serial I/O mouth of UART (universal asynchronous receiver/transmitter(UART)), is it realize one-chip computer or one-chip computer and serial communication of computer to use for.(8) Stretch oscillator and clock produce circuit, quartz crystal finely tune electric capacity need outer.Allow oscillation frequency as 12 now at most. Every the above-mentioned part was joined through the inside data bus .Among them, CPU is a core of the one-chip computer, it is the control of the computer and command centre, made up of such parts as arithmetic unit and controller,etc.. The arithmetic unit can carry on 8 persons of arithmetic operation and unit ALUof logic operation while including one, the 1 storing device temporarily of 8, storingdevice 2 temporarily, 8's accumulation device ACC, register B and procedure stateregister PSW, etc. Person who accumulate ACC count by 2 input ends entered ofchecking etc. temporarily as one operation often, come from person who store 1 operation is it is it make operation to go on to count temporarily , operation result and loop back ACC with another one. In addition, ACC is often regarded as the transferstation of data transmission on 8051 inside .The same as general microprocessor, it is the busiest register. Help remembering that agreeing with A expresses in the order.The controller includes the procedure counter ,the order is deposited, the order decipher, the oscillator and timing circuit, etc. The procedure counter is made up of counter of 8 for two, amounts to 16. It is a byte address counter of the procedure in fact, the content is the next IA that will carried out in PC. The content which changes it can change the direction that the procedure carries out .Shake the circuit in 8051 one-chip computers, only need outer quartz crystal and frequency to finely tune the electric capacity, its frequency range is its 12MHZ of 1.2MHZ. This pulse signal, as 8051 basic beats of working, namely the minimum unit of time. 8051 is the same as other computers, the work in harmony under the control of the basic beat, just like an orchestra according to the beat play that is commanded. There are ROM (procedure memory , can only read ) and RAM in 8051 slices (data memory, can is it can write ) two to read, they have each independent memory address space, dispose way to be the same with general memory of computer. Procedure 8051 memory and 8751 slice procedure memory capacity 4KB, address begin from 0000H, used for preserving the procedure and form constant. Data 8051- 8751 8031 of memory data memory 128B, address false 00FH, use for middle result to deposit operation, the data are stored temporarily and the data are buffered etc.. InRAM of this 128B, there is unit of 32 bytes that can be appointed as the job register, this and general microprocessor is different, 8051 slice RAM and job register rank one formation the same to arrange the location. It is not very the same that the memory of MCS-51 series one-chip computer and general computer disposes the way in addition. General computer for first address space, ROM and RAM can arrange in different space within the range of this address at will, namely the addresses of ROM and RAM, with distributing different address space in a formation. While visiting the memory, corresponding and only an address Memory unit, can ROM, it can be RAM too, and by visiting the order similarly. This kind of memory structure is called the structure of Princeton. 8051 memories are divided into procedure memory space and data memory space on the physics structure, there are four memory spaces in all: The procedure stores in one and data memory space outside data memory and one in procedure memory space and one outside one, the structure forms of this kind of procedure device and data memory separated form data memory, called Harvard structure. But use the angle from users, 8051 memory address space is divided into three kinds: (1) In the slice, arrange blocks of FFFFH , 0000H of location , in unison outside the slice (use 16 addresses). (2) The data memory address space outside one of 64KB, the address is arranged from 0000H 64KB FFFFH (with 16 addresses) too to the location. (3) Data memory address space of 256B (use 8 addresses). Three above-mentioned memory space addresses overlap, for distinguishing and designing the order symbol of different data transmission in the instruction system of 8051: CPU visit slice, ROM order spend MOVC, visit block RAM order uses MOVXoutside the slice, RAM order uses MOV to visit in slice. 8051 one-chip computer have four 8 walk abreast I/O port, call P0, P1, P2 and P3. Each port is 8 accurate two-way mouths, accounts for 32 pins altogether. Every one I/O line can be used as introduction and exported independently. Each port includes a latch (namely special function register), one exports the driver and a introduction buffer. Make data can latch when outputting, data can buffer when making introduction, but four function of pass way these self-same. Expand among the system of memory outside having slice, four port these may serve as accurate two-way mouth of I/O in common use. Expand among the system of memory outside having slice, P2 mouth see high 8 address off; P0 mouth is a two-way bus, send the introduction of 8 low addresses and data / export in timesharing The circuit of 8051 one-chip computers and four I/O ports is very ingenious in design. Familiar with I/O port logical circuit, not only help to use ports correctly and rationally, and will inspire to designing the peripheral logical circuit of one-chip computer to some extent. Load ability and interface of port have certain requirement, because output grade, P0 of mouth and P1 end output, P3 of mouth gradedifferent at structure, so, the load ability and interface of its door demand to have nothing in common with each other. P0 mouth is different from other mouths, its output grade draws the resistance supreme. When using it as the mouth in common use to use, output grade is it leak circuit to turn on, is it is it urge NMOS draw the resistance on taking to be outer with it while inputting to go out to fail. When being used as introduction, should write "1" to a latch first. Every one with P0 mouth candrive 8 Model LS TTL load to export. P1 mouth is an accurate two-way mouth too, used as I/O in common use. Different from P0 mouth output of circuit its, draw load resistance link with power on inside have. In fact, the resistance is that two effects are in charge of FET and together :One FET is in charge of load, its resistance is regular. Another one can is it lead to work with close at two state, make its President resistance value change approximate 0 or group value heavy two situation very. When it is 0 that the resistance is approximate , can draw the pin to the high level fast/view/9ca78b07caaedd3383c4d383.html?from=search 4/6 When resistance value is very large, P1 mouth, in order to hinder the introduction state high. Output as P1 mouth high electricity at ordinary times, can is it draw electric current load to offer outwards, draw the resistance on needn't answer and then.Here when the port is used as introduction, must write into 1 to the corresponding latch first too, make FET end. The structure of P2 some mouth is similar to P0 mouth, there are MUX switches. Is it similar to mouth partly to urge, but mouth large a conversion controls some than P1. P3 mouth one multi-functional port, mouth getting many than P1 it have "and " 3 door and 4 buffer". Two part these, make her besides accurate two-way function with P1 mouth just, can also use the second function of every pin, "and " door 3 function one switch in fact, it determines to be to output data of latch to output second signal of function. Act as W =At 1 o'clock, output Q end signal; Act as Q =At 1 o'clock, can output W line signal . At the time of programming, it is that the first function is still the second function but needn't have software that setup P3 mouth in advance . It hardware not inside is the automatic to have two function outputted when CPU carries on SFR and seeks the location (the location or the byte) to visit to P3 mouth /at not lasting lining, there are inside hardware latch Qs =1.The operation principle of P3 mouth is similar to P1 mouth.Output grade, P3 of mouth , P1 of P1 , connect with inside have load resistanceof drawing , every one of they can drive 4 Model LS TTL load to output. As while inputting the mouth, any TTL or NMOS circuit can drive P1 of 8051 one-chip computers as P3 mouth in a normal way . Because draw resistance on output grade of them have, can open a way collector too or drain-source resistance is it urge to open a way, do not need to have the resistance of drawing outer . Mouths are all accurate two-way mouths too. When the conduct is input, must write the corresponding port latch with 1 first. As to 80C51 one-chip computer, port can only offer milliampere of output electric currents, is it output mouth go when urging one ordinary basing of transistor to regard as, should contact a resistance among the port and transistor base, in order to the electricity while restraining the high level from exporting P1~P3 Being restored to the throne is the operation of initializing of an one-chip computer. Its main function is to turn PC into 0000H initially, make the one-chip computer begin to hold the conduct procedure from unit 0000H. Except that the ones that enter the system are initialized normally ,as because procedure operate it make mistakes or operate there aren't mistake, in order to extricate oneself from a predicament , need to be pressed and restored to the throne the key restarting too. It is an input end which is restored to the throne the signal in 8051 China RST pin. Restore to the throne signal high leveleffective , should sustain 24 shake cycle (namely 2 machine cycles ) the above its effective times. If 6 of frequency of utilization brilliant to shake, restore to the throne signal duration should exceed 4 delicate to finish restoring to the throne and operating.Produce the logic picture of circuit which is restored to the throne the signal。
英文文献翻译(1)
英文文献翻译二〇一四年月日科技文章摘译Preventing electricity-stolen smart metersWith the development, it has been increasingly used in smart instrumentation equipment, so that the instrument performance have been greatly improved. This article describes the preventing electricity-stolen smart meters is to the ATMEL AT89C51 microcontroller as the core of the design, it achieves 32 power measurement and touring shows, and other functions, but also preventing electricity-stolen, anti-submarine-moving, high-precision, long-life And low power consumption and other characteristics of the new residential areas and is the preferred meter in the urban network reform.Hardware design(l) Signal acquisition and conversion of the electric circuit is more complicated measures, the traditional way is to sample the respective current, voltage, the AID conversion after their multiplication. This approach is not only to analog circuit design of high demand, the software programming requirements are also high, but it is difficult to achieve multiple users on the measure. Therefore, we choose BL0932B as a signal acquisition and conversion circuit core, it is an electronic power meter ASIC. BL0932B design based on the signal acquisition and conversion external circuit board with simple, high precision and stability, and other characteristics, especially for single-phase two-line power users of energy metering.BLO932B within the buffer amplifier, analog multiplier, VIF converters, counting circuit and drive circuit, can accurately measure positive and negative direction of the two active power and computing power in the same direction. The output in two ways: rapid pulse output and slow output for the former computer data processing, the latter used to drive pulse motor work.As the signal acquisition and conversion circuit board as well as the high-voltage 220 v, there Baidoa v order of magnitude of the small-signal, which requires the printed circuit board design and production process to be very scientific and rational. In addition, in order to protect the motherboard, BL0932B rapid pulse of the photoelectric sent to isolation after the SCM.(2) MCU control circuitSCM control circuit, including analog switch arrays, display and keypad circuit, datastorage, serial communications interface and watchdog circuit.l) analog switch array Preventing electricity-stolen smart meters are centralized meter, the MCU to the multi-pulse signals in real-time detection, therefore, it uses an Analog Switches CD405I of four eight-select and a 3 to 8 decoder 74 LS138 common Composed of analog switch arrays,ang it achieve a 32-way pulse of the cycle of detection.2) And show circuit as a key focus on smart meters, need to show the contents of many. Main form of households, electricity, the status of various instructions and error information. To this end, we designed the LED display, from 10 strings and static converters 74 LSl64 drive so you can at least take up the MCU resources. In addition, the signal input terminal also designed the 25 LED indicator, to display the 25 electricity capacity.The meters are "checking" and "cleared" two function keys are directly linked to the P3 in 89 C51 on the mouth. Through a combination of the two keys, can easily achieve the MCU cleared meter, single households cleared, online check, such as locking and unlocking operation.3) Data storage because of the configuration of the table need to record a large number of important data, in order to ensure data security, we designed the two data memory: parallel data memory and serial data memory. Parallel data memory by 6264, it has SK bytes of storage space, to fully meet the requirements of the table. In order to prevent power-down when the data loss, to the 6264 allocation of the 3.6 v backup battery. Backup battery switch and the 6264 election signals the film, by special worship P MAx691 provide monitoring chip. Serial data memory by 24 LC65, it also has a SK bytes of storage space, and through IZC bus connected with the MCU. Although there is no IZC 89C51 microcontroller bus interface, but through software programming, P1 I can simulate the two lines of its timing, completion of the 24 LC65 read and write operations. 24LC65 is a serial EZPROM, without battery backup, data can be safely stored in 200 years.4) Serial communication interface 89 C51 has a full-duplex serial interface, used in this meter for meter reading and communication interface. In order to achieve far more concentrated form clusters copied, in the serial interface on the basis of plus RS485 driver chips 75 LBC184. This can be through various meter RS485 bus and data acquisition system for communication links, and concentrate meter reading, remote meter reading.4) watchdog circuit watchdog circuit used for monitoring chip mix P MAX691, it has a power-on reset, brownout detection, backup battery switch and watchdog timer input output, and other functions. To determine whether the cumulative electricity. This part of the programming is mainly used in order to achieve the operation, with fewer bytes RAMoccupation, the code simple and fast, and other advantages.(3) Data validation and multi-site storage of data directly related to electricity users and property management departments of vital interests, is the most important data, we must ensure that its security is absolutely right and, therefore, in the real data storage, all of the electricity Check to ensure the accuracy of the data. Data in 6264 and 2465 have been taken in the multi-site storage, backup each other to ensure that data foolproof. Practice has proved that these measures, the data will no longer be an error or lost, the effect is very obvious.(4) of electricity and stepping roving show that the normal operation procedure, the pulse measurement, shows that various tour operators, and its power, when the last one shows that the electricity consumption, to calculate the unit's total electricity consumption and display, and then To start from scratch cycle show. In order to facilitate the spot meter reading, specially designed step show: that is, each press a button detection, household electricity consumption, and also shows the integral part.防偷电智能电表随发展,它已被越来越多地用于仪器仪表中构成智能仪器,从而使仪器仪表的性能得到极大改善。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
附录一、英文原文:Detecting Anomaly Traf?c using Flow Data in the realVoIP networkI. INTRODUCTIONRecently, many SIP[3]/RTP[4]-based VoIP applications and services haveappeared and their penetration ratio is gradually increasing due to the freeor cheap call charge and the easy subscription method. Thus, some of the subscribers to the PSTN service tend to change their home telephone servicesto VoIP products. For example, companies in Korea such as LGDacom, SamsungNet- works, and KT have begun to deploy SIP/RTP-based VoIP services. It is reportedthat more than ?ve million users have subscribed the commercial VoIP servicesand 50% of all the users are joined in 2009 in Korea [1]. According to IDC, itis expected that the number of VoIP users in US will increase to 27 millionsin 2009 [2]. Hence, as the VoIP service becomes popular, it is not surprisingthat a lot of VoIP anomaly traf ?c has been already known [5]. So, Most commercial service such as VoIP services should provide essential security functions regarding privacy, authentication, integrity and non-repudiation for preventing malicious traf ?c. Particu- larly, most of current SIP/RTP-based VoIP servicessupply the minimal security function related with authentication. Though secure transport-layer protocols such as Transport Layer Security (TLS) [6] or Secure RTP(SRTP) [7] have been standardized, they have not been fully implemented anddeployed in current VoIP applications because of the overheads of implementation and performance. Thus, un-encrypted VoIP packets could be easily sniffed andforged, especially in wireless LANs. In spite of authentication,the authentication keys such as MD5in the SIP header could be maliciously exploited, because SIP is a text-based protocol and unencrypted SIP packets are easilydecoded. Therefore, VoIP services are very vulnerable to attacks exploiting SIP and RTP. We aim at proposing a VoIP anomaly traf ?c detection method using the?ow-based traf ?c measurement archi-tecture. We consider three representativeVoIP anomalies called CANCEL,BYEDenial of Service (DoS) and RTP?ooding attacks in this paper, because we found that malicious users in wireless LANcould easily perform these attacks in the real VoIP network. For monitoring VoIP packets,we employ the IETF IP Flow Information eXport (IPFIX) [9] standard that is based on NetFlow v9. This traf ?c measurement method provides a ?exible and extensible template structure for various protocols, which is useful for observing SIP/RTP ?ows [10]. In order to capture and export VoIP packets into IPFIX ?ows, we de?ne two additional IPFIX templates for SIP and RTP ?ows. Furthermore, we add four IPFIX ?elds to observe packets which are necessary to detect VoIP source spoo?ng attacks in WLANs.II. RELATED WORK[8] proposed a ?ooding detection method by the Hellinger Distance (HD) concept. In [8], they have pre- sented INVITE, SYN and RTP?ooding detection meth-ods.The HD is the difference value between a training data set and a testing dataset. The training data set collected traf?c over n sampling period of duration testing data set collected traf?c next the training data set in the sameperiod. If the HD is close to ‘1’, this testing data set is regarded as anomaly traf ?c. For using this method, they assumed that initial training data set didnot have any anomaly traf ?c. Since this method was based on packet counts, itmight not easily extended to detect other anomaly traf ?c except ?ooding. On the other hand, [11] has proposed a VoIP anomaly traf ?c detection method using Extended Finite State Machine (EFSM). [11] has suggested INVITE ?ooding, BYEDoS anomaly traf ?c and media spamming detection methods. However, the statemachine required more memory because it had to maintain each ?ow. [13] has presented NetFlow-based VoIP anomaly detection methods for INVITE, REGIS-TER,RTP?ooding, and REGISTER/INVITEscan. How-ever, the VoIP DoSattacks consideredin this paper were not considered. In [14], an IDS approach to detect SIPanomalies was developed, but only simulation results are presented. For monitoring VoIP traf ?c, SIPFIX [10] has been proposed as an IPFIX extension.The key ideas of the SIPFIX are application-layer inspection and SDP analysisfor carrying media session information. Yet, this paper presents only the possibility of applying SIPFIX to DoS anomaly traf ?c detection and prevention. Wedescribed the preliminary idea of detecting VoIP anomaly traf ?c in [15]. This paper elaborates BYEDoSanomaly traf ?c and RTP?ooding anomaly traf ?c detec-tion method based on IPFIX. Based on [15], we have considered SIP and RTP anomalytraf ?c generated in wireless LAN. In this case, it is possible to generate thesimiliar anomaly traf ?c with normal VoIP traf ?c, because attackers can easilyextract normal user information from unencrypted VoIP packets. In this paper,we have extended the idea with additional SIP detection methods using informationof wireless LAN packets. Furthermore, we have shown the real experiment resultsat the commercial VoIP network.III. THE VOIP ANOMALY TRAFFIC DETECTION METHOD A. CANCEL DoS Anomaly Traf ?c DetectionAs the SIP INVITE message is not usually encrypted, attackers could extract ?elds necessary to reproduce the forged SIP CANCELmessage by snif ?ng SIP INVITE packets, especially in wireless LANs. Thus, wecannot tell the difference between the normal SIP CANCEL message and the replicated one, because the faked CANCEL packet includes the normal ?elds inferred from the SIP INVITE message. Theattacker will perform the SIP CANCELDoS attack at the samewireless LAN, because the purpose of the SIP CANCELattack is to prevent the normal call estab-lishment when a victim is waiting for calls. Therefore, as soon as the attacker catchesa call invitation message for a victim, it will send a SIP CANCELmessage, which makes the call establishment failed. Wehave generated faked SIP CANCELmessage using sniffed a SIP INVITE in SIP header of this CANCEL message is the sameas normal SIP CANCEL message, because the attacker can obtain the SIP header?eld from unencrypted normal SIP message in wireless LANenvironment. Therefore it is impossible to detect the CANCEL DoS anomaly traf ?c using SIP headers, we use the different values of the wireless LANframe. That is, the sequence number in the frame will tell the difference between a victim host and an attacker.Welook into source MACaddress and sequence number in the MAC frame including a SIP CANCEL messageas shown in Algorithm 1. We compare the source MAC address of SIP CANCEL packets with that of the previously saved SIP INVITE ?ow. If the source MAC address of a SIP CANCEL ?ow is changed, it will be highly probablethat the CANCEL packet is generated by a unknown user. However, the source MAC address could be spoofed. Regarding source spoo ?ng detection, we employ the method in [12] that uses sequence numbers of frames. We calculate the gapbetween n-th and (n-1)-th frames. As the sequence number ?eld in a MAC header uses 12 bits, it varies from 0 to 4095. When we ?nd that the sequence number gap between a single SIP ?ow is greater than the threshold value of N that willbe set from the experiments, we determine that the SIP host address as beenspoofed for the anomaly traf ?c.B. BYE DoS Anomaly Traf ?c DetectionIn commercial VoIP applications, SIP BYE messages use the same authentication ?eld is included in the SIP IN-VITE message for security andaccounting purposes. How-ever, attackers can reproduce BYEDoS packets through snif ?ng normal SIP INVITE packets in wireless faked SIP BYE message is samewith the normal SIP BYE. Therefore, it is dif ?cult to detect the BYEDoS anomaly traf ?c using only SIP header snif ?ng SIP INVITE message, the attacker at the same or different subnets could terminate the normal in- progress call, because it could succeed in generating a BYE message to the SIP proxy server. In theSIP BYE attack, it is dif ?cult to distinguish from the normal call termination procedure. That is, we apply the timestamp of RTP traf ?c for detecting the SIP BYE attack. Generally, after normal call termination, the bi-directional RTP?ow is terminated in a bref space of time. However, if the call terminationprocedure is anomaly, we can observe that a directional RTP media ?ow is still ongoing, whereas an attacked directional RTP?ow is broken. Therefore, in order to detect the SIP BYE attack, we decide that we watch a directional RTP ?ow for a long time threshold of N sec after SIP BYEmessage. The threshold of N is also set from the 2 explains the procedure to detect BYE DoS anomal traf ?c using captured timestamp of the RTPpacket. Wemaintain SIP session information between clients with INVITE and OK messages including the same Call-ID and 4-tuple(source/destination IP Address and port number) of the BYEpacket. Weset a time threshold value by adding Nsec to the timestamp value of the BYE message. Thereason why we use the captured timestamp is that a few RTP packets are observed under second. If RTP traf ?c is observed after the time threshold, this willbe considered as a BYE DoS attack, because the VoIP session will be terminatedwith normal BYEmessages. C. RTPAnomaly Traf ?c Detection Algorithm 3 describes an RTP ?ooding detection method that uses SSRC and sequence numbers of the RTP header. During a single RTPsession, typically, the sameSSRCvalue is maintained. If SSRCis changed, it is highly probable that anomaly has occurred. In addition,if there is a big sequence number gap between RTP packets, we determine thatanomaly RTPtraf ?c has happened. As inspecting every sequence number for a packet is dif ?cult, we calculate the sequence number gap using the ?rst, last, maximum and minimum sequence numbers. In the RTP header, the sequence number ?eld uses 16 bits from 0 to 65535. When we observe a wide sequence number gap in our algorithm, we consider it as an RTP ?ooding attack.IV. PERFORMANCE EVALUATIONA. Experiment EnvironmentIn order to detect VoIP anomaly traf ?c, we established an experimental environment as ?gure 1. In this envi-ronment, we employed two VoIP phones with wireless LANs, one attacker, a wireless access router and an IPFIX ?ow collector.For the realistic performance evaluation, we directly used one of the workingVoIP networks deployed in Korea where an 11-digit telephone number (070-XXXX-XXXX) has been assigned to a SIP wireless SIP phones supporting ,we could make calls to/from the PSTNor cellular phones. In the wireless access router, we used two wireless LAN cards- one is to support the AP service, andthe other is to monitor packets. Moreover, in order to observe VoIP packetsin the wireless access router, we modi ?ed nProbe [16], that is an open IPFIX?ow generator, to create and export IPFIX ?ows related with SIP, RTP, and information. As the IPFIX collector, we have modi ?ed libip ?x so that it could provide the IPFIX ?ow decoding function for SIP, RTP, and templates. We used MySQL for the ?ow DB.B. Experimental ResultsIn order to evaluate our proposed algorithms, we gen-erated 1,946 VoIP callswith two commercial SIP phones and a VoIP anomaly traf ?c generator. Table I showsour experimental results with precision, recall, and F-score that is the harmonic mean of precision and recall. In CANCEL DoS anomaly traf ?c detection, our algorithm represented a few false negative cases, which was related with thegap threshold of the sequence number in MAC header. The average of the F-score value for detecting the SIP CANCEL anomaly is %.For BYE anomaly tests, wegenerated 755 BYEmes-sages including 118 BYEDoSanomalies in the exper-iment. The proposed BYE DoS anomaly traf ?c detec-tion algorithm found 112 anomalieswith the F-score of %. If an RTP?ow is terminated before the threshold, we regard the anomaly ?ow as a normal one. In this algorithm, we extract RTP sessioninformation from INVITE and OK or session description messages using the sameCall-ID of BYE message. It is possible not to capture those packet, resultingin a few false-negative cases. The RTP ?ooding anomaly traf ?c detection experiment for 810 RTP sessions resulted in the F score of 98%.The reason offalse-positive cases was related with the sequence number in RTP header. If the sequence number of anomaly traf ?c is overlapped with the range of the normaltraf ?c, our algorithm will consider it as normal traf ?c.V. CONCLUSIONSWe have proposed a ?ow-based anomaly traf ?c detec-tion method against SIP and RTP-based anomaly traf ?c in this paper. We presented VoIP anomaly traf ?c detection methods with ?ow data on the wireless access router. Weused the IETF IPFIX standard to monitor SIP/RTP ?ows passing through wireless access routers, because its template architecture is easily extensible to several protocols.For this purpose, we de ?ned two new IPFIX templates for SIP and RTP traf ?c and four new IPFIX ?elds for traf ?c. Using these IPFIX ?ow templates,we proposed CANCEL/BYE DoS and RTP?ooding traf ?c detection algorithms. From experimental results on the working VoIP network in Korea, we showed that our method is able to detect three representative VoIP attacks on SIP phones. In CANCEL/BYE DoS anomaly traf ?cdetection method, we employed threshold values about time and sequence numbergap for class ?cation of normal and abnormal VoIP packets. This paper has notbeen mentioned the test result about suitable threshold values. For the futurework, we will show the experimental result about evaluation of thethreshold values for our detection method.二、英文翻译:交通流数据检测异常在真实的世界中使用的VoIP 网络一.介绍最近 , 许多 SIP[3],[4]基于服务器的VoIP应用和服务出现了,并逐渐增加他们的穿透比及由于自由和廉价的通话费且极易订阅的方法。