搜档网
当前位置:搜档网 › 计算机网络外文文献外文翻译英文文献新技术的计算机网络

计算机网络外文文献外文翻译英文文献新技术的计算机网络

计算机网络外文文献外文翻译英文文献新技术的计算机网络
计算机网络外文文献外文翻译英文文献新技术的计算机网络

New technique of the computer network

Abstract

The 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the people's work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.

keywords

Internet Network System Digital Certificates Grid Storage

1. Foreword

Internet turns 36, still a work in progress

Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress.

University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce Spam (junk mail) and security troubles.

All the while threats loom: Critics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.

Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Klein rock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.

Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the second most popular application behind e-mail - in 1990. The Internet expanded beyond its initial military and educational domain into businesses and homes around the world.

Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internet's key oversight body, he is trying to defend the core addressing system from outside threats.

He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only "best efforts" at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and stutters now common with video.

Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp.Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated - a way to cut down on junk messages sent using spoofed addresses.

Many features being developed today wouldn't have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.

2.Digital Certificates

Digital certificates are data files used to establish the identity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions.

Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificate to a ttest that it hasn’t been forged or altered in any way.

New Uses For Digital Certificates

Digital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups to use them. Not long ago, Version Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning.

Using Version software, hardware makers can generate cryptographic keys and corresponding digital certificates those manufacturers or cable service providers can use to automatically identify individual modems.

This ‘ast-mile’authentication not only protects the value of existing content and services but also positions cable system operators to bring a broad new range of content, applications and value-added services to market.

When a CA digitally signs a certificate, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access.

Identifying information embedded in the certificate includes the holder’ s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When the CA verifies a user’s identity, the certificate uses the holder’s public encryption key to protect this data.

Certificates that a Web server uses to confirm the authenticity of a Web site for a user’s browser also employ public keys. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transaction, the browser will access the public key in the server’s digital certificate to verify its identity.

Role of Public-Key Cryptography

The public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates.

Public-key cryptography uses matched public and private keys for encryption and decrypt ion. These keys have a numerical value that’s used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key.

Others to encrypt information meant only for that person use a person’s public key. When he receives the information, he uses his corresponding private key, which is kept secret, to decrypt the data. A person's public key can be distributed without damaging the private key. A Web server using a digital certificate can use its private key to make sure that only it can decrypt confidential information sent to it over the Internet.

The Web server’s certificate is validated by a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape Navigator.

The CA certificate tells users whether they can trust the Web server certificate when it’s presented to the browser. If the validity of the Web server certificate is affirmed, the certificate’s public key is used to secure information for the server using Secure Sockets Layer (SSL) technology.

Digital certificates are used by the SSL security protocol to create a secure “pipe” between two parties that seek confidential communication. SSL is used in most major Web browsers and commercial Web servers.

3. Digital Wallets

----A digital wallet is software that enables users to pay for goods on the Web .It holds credit-card numbers and other personal information such as a shipping address .Once entered,the data automatically populates order fields at merchant sites .

----When using a digital wallet,consumers don’t need to fill out order forms on each site when they purchase an item because the information has already been stored and is automatically updated and entered into the order fields across merchant sites .Consumers also benefit when using digital wallets because their information is encrypted or protected by a private software code .And merchants benefit by receiving protection against fraud .

----Digital wallets are available to consumers free of charge,and they’re fairly easy to obtain .For example,when a consumer makes a purchase at a merchant site that’s set up to handle server-side digital wallets,he types his name and payment and shipping information into the merchant’s own form .At the end of the purchase,one consumer is asked to sign up for a wallet of his choice by entering a user name and password for future purchases .Users can also acquire wallets at a wallet vendor’s site .

----Although a wallet is free for consumers,vendors charge merchants for wallets .

----Digital wallets come in two main types: client-side and server- side .Within those divisions are wallets that work only on specific merchant sites and those that are merchant agnostic .

----Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to download and install software .A user downloads the wallet application and inputs payment and mailing

information .At that point,the information is secured and encrypted on the user’s hard drive .The user retains control of his credit card and personal information locally .

----With a server-based wallet,a user fills out his personal information,and a cookie is automatically downloaded .(A cookie is a text contains information about the user .)In this scenario,the consumer information resides on the server of a financial institution or a digital wallet vendor rather than on the user’s PC .

----Server-side wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties .When a party makes a transaction,it presents its certificate to the other parties involved .A certificate is an attachment to an electronic message used to verify the identity of the party and to provide the receiver with the means to encode a reply .

----Furthermore,the cardholder’s sensitive data is typically housed at a financial institution,so there’s an extra sense of security because financial environments generally provide the highest degree of security .

----But even though wallets provide easy shopping online,adoption hasn’t been widespread .

----Standards are pivotal to the success of digital wallets .

----Last month,major vendors,including Microsoft Corp .,Sun Microsystems Inc .and America Online Inc .announced their endorsement of a new standard called EMCL,or E-Commerce Modeling Language,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment .

4. Grid Storage

Definition: Grid storage, analogous to grid computing, is a new model for deploying and managing storage distributed across multiple systems and networks, making efficient use of available storage capacity without requiring a large, centralized switching system.

A grid is, in fact, a meshed network in which no single centralized switch or hub controls routing. Grids offer almost unlimited scalability in size and performance because they aren’t constrained by the need for ev er-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure.

Applying the grid concept to a computer network lets us harness available but unused resources by dynamically allocating and deal locating capacity, bandwidth and processing among numerous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power, collaboration and information access to connected users. Universities and research facilities are using grids to build what amounts to supercomputer capability from PCs, Macintoshes and Linux boxes.

After grid computing came into being, it was only a matter of time before a similar model would emerge for making use of distributed data storage. Most storage networks are built in star configurations, where all servers and storage devices are connected to a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth increases and continue to deliver improved reliability and higher performance and connectivity.

Based on current and proposed products, it appears that a grid storage system should include the following:

Modular storage arrays: These systems are connected across a storage network using serial ATA disks. The systems can be block-oriented storage arrays or network-attached storage gateways and servers.

Common virtualization layer: Storage must be organized as a single logical pool of resources available to users.

Data redundancy and availability: Multiple copies of data should exist across nodes in the grid, creating redundant data access and availability in case of a component failure.

Common management: A single level of management across all nodes should cover the areas of data security, mobility and migration, capacity on demand, and provisioning.

Simplified platform/management architecture: Because common management is so important, the tasks involved in administration should be organized in modular fashion, allowing the auto discovery of new nodes in the grid and automating volume and .

Three Basic Benefits

Applying grid topology to a storage network provides several benefits, including the following:

Reliability. A well-designed grid network is extremely resilient. Rather than providing just two paths between any two nodes, the grid offers multiple paths between each storage node. This makes it easy to service and replace components in case of failure, with minimal impact on system availability or downtime.

Performance. The same factors that lead to reliability also can improve performance. Not requiring a centralized switch with many ports eliminates a potential performance bottleneck, and applying load-balancing techniques to the multiple paths available offers consistent performance for the entire network.

Scalability. It’s easy to expand a grid network using inexpensive switches with low port counts to accommodate additional servers for increased performance, bandwidth and capacity. In essence, grid storage is a way to scale out rather than up, using relatively inexpensive storage building blocks.

计算机网络

摘要:

21世纪是信息经济的时代,作为这个时代的代表技术,计算机网络技术

将在非常快的速度发展很快,不断创造性地将进入人们的工作,学习和生活中深。

因此,控制这种技术,然后似乎更提供的重视。现在,我主要介绍一些在现实的网络新技术现场应用。

关键字:

网络系统互联网数字证书网格存储

1.前言:

互联网变成36,仍然在进行中的工作

36年后在加州大学洛杉矶分校的计算机科学家相连两台笨重的计算机用一条15英尺长的灰色电缆,测试在网络上交换数据的新方法,最终产生了互联网仍然是一个正在进行的工作。

大学的研究人员正在试验方法,以增加其容量和速度。编程人员正在设法注入更多的智能网页。和工作正在进行重新设计网络以减少垃圾邮件(垃圾邮件)和安全麻烦。

所有的威胁一直是存在:批评人士警告说,商业,法律和政治压力可能会阻碍创新的类型,使互联网是今天。

Stephen Crocker和Vinton Cerf同谁的研究生参加了对1969年9月2日工程实验室,加州大学洛杉矶分校教授Len克莱瑞克作为数据传输试验,静静地流过两台计算机之间。到1月,其他三个“节点”加入这个网络。

接着出现了电子邮件,几年后,一个核心通信协议,TCP / IP协议在70年代末,80年代中的域名系统和万维网-现在第二个最受欢迎的背后电子邮件在1990年-应用。在Interbetween两台计算机。到1月,其他三个“节点”加入这个网络。净扩大,超出了最初的军事和教育纳入企业和世界各地的家庭域。

现在,Crocker还在从事互联网的工作,为网络协作设计更好的工具。作为互联网安全的关键监督机构的主席,他是为了捍卫核心处理来自外部的威胁系统。

他承认,他帮助建立互联网还远远没有完成,在商店的变化,以满足多媒体日益增长的需求。网络供应商现在只是“最大努力”在提供数据包,克罗克说,需要更好的保障,以防止和结结巴巴跳过现在视频常见。

瑟夫,现在在MCI公司说,他希望他可以设计出具有内置安全性的互联网英寸微软,雅虎和美国在线等,目前正在努力改造的网络,电子邮件发送者可以验证-一种方法减少了发送垃圾邮件使用伪造的地址。

许多目前正在开发的功能在出生就没有可能发生,由于计算机速度很慢窄互联网管道,或带宽,瑟夫说。

2.Digital证书

数字证书是数据文件,用于建立人民和因特网上的电子资产的身份。他们允许安全,加密的网络通信和经常被用来保护网上交易。

数字证书颁发由信任的第三方作为认证机构(CA)已知的缔约国。CA的验证证书持有人的“标志”证书的身份证明,它没有被伪造或以任何方式改变。

使用新数字证书

数字证书是目前用来提供安全和无线连接验证,和硬件制造商最新的群体之一来使用它们。不久前,VeriSign公司宣布Cable Modem的认证服务,它允许嵌入数字证书到电缆调制解调器硬件制造商,以帮助防止通过设备克隆盗版的宽带服务。

使用VeriSign的软件,硬件制造商可以生成密钥和相应的数字证书,制造商或有线电视服务提供商可以使用自动识别个人调制解调器。

这'同工酶mile'authentication不仅保护了现有的内容和服务,而且位置有线电视系统业者的价值带来广泛的内容,应用和价值的各种增值服务推向市场。

当数字证书是由CA签署的,其所有者可以使用电子护照,以证明他的身份。它可以提交给网站,网络或个人,需要安全的访问。

识别信息嵌入在证书中包括持有人'姓名和电子邮件地址,CA的,序列号和激活或到期的任何名称的凭证资料。当用户的身份是由CA验证,使用证书持有人的公开加密密钥,以保护这些数据。

公共密钥还聘请证书,Web服务器用来确认了用户的浏览器网站的真实性。当用户想发送,如信用卡号码机密信息的Web服务器,网上交易,浏览器将访问服务器的数字证书的公钥来验证其身份。

角色的公钥加密

公共密钥是一个公共钥匙加密,它提供了基础,采用数字证书密钥对的一半。

公开密钥加密使用匹配的加密和解密公钥和私钥。这些键有一个数字值的使用对加密信息的算法,使其只对用户可读与相应的解密密钥。

一个人的公共密钥用于加密他人的信息只能用于人的意思。当他收到的信息,他还是用相应的私钥,这是保密的,对数据进行解密。一个人的公钥可以分布不损坏私钥。Web服务器使用数字证书可以使用它的私钥,以确保只有它才能解密的机密资料通过互联网传送给它。

Web服务器的证书验证了自签名的CA证书,标识颁发CA。CA证书是预装在大多数主要的Web浏览器,包括Microsoft Internet Explorer和Netscape Navigator。

CA证书告诉用户他们是否可以信任的Web服务器证书时,它在浏览器里。如果Web服务器证书是肯定的有效性,该证书的公钥是用来确保为使用安全套接字层(SSL)技术的服务器信息。

使用数字证书的SSL安全协议,以创造一个安全的“,双方之间的管道”,寻求保密通信。使用SSL在大多数主要的Web浏览器和商业Web服务器。

3。数字钱包

----一个数字钱包软件,使用户支付的货物在网络上。它拥有如送货地址,信用卡号码和其他个人资料。一旦输入后,数据自动填充在商业网站秩序领域。

----在使用电子钱包,消费者并不需要填写在每个网站上订购表格,当他们购买,因为这些信息已经存储的项目,并自动更新,并成为全国的商业网站字段中输入的顺序。消费者也有利于使用,因为他们的信息被加密或由私人软件代码保护的数字钱包。和商人的利益,接受保护,防止欺诈。

----数码钱包,可向消费者免费的,而且他们很容易获得。例如,当消费者在作出购买的商业网站的建立,处理服务器端,他种的数字化钱包名称和付款和

红外数据通信技术外文翻译文献

红外数据通信技术外文翻译文献(文档含中英文对照即英文原文和中文翻译) Infrared Remote Control System Abstract Red outside data correspondence the technique be currently within the scope of world drive extensive usage of a kind of wireless conjunction technique, drive numerous hardware and software platform support. Red outside the transceiver product have cost low, small scaled turn, the baud rate be quick, point to point SSL, be free from electromagnetism thousand Raos

etc. characteristics, can realization information at dissimilarity of the product fast, convenience, safely exchange and transmission, at short distance wireless deliver aspect to own very obvious of advantage. Along with red outside the data deliver a technique more and more mature, the cost descend, red outside the transceiver necessarily will get at the short distance communication realm more extensive of application. The purpose that design this system is transmit customer’s operation information with infrared rays for transmit media, then demodulate original signal with receive circuit. It use coding chip to modulate signal and use decoding chip to demodulate signal. The coding chip is PT2262 and decoding chip is PT2272. Both chips are made in Taiwan. Main work principle is that we provide to input the information for the PT2262 with coding keyboard. The input information was coded by PT2262 and loading to high frequent load wave whose frequent is 38 kHz, then modulate infrared transmit dioxide and radiate space outside when it attian enough power. The receive circuit receive the signal and demodulate original information. The original signal was decoded by PT2272, so as to drive some circuit to accomplish customer’s operation demand. Keywords: Infrared dray;Code;Decoding;LM386;Red outside transceiver 1 Introduction 1.1 research the background and significance Infrared Data Communication Technology is the world wide use of a wireless connection technology, by the many hardware and software platforms supported. Is a data through electrical pulses and infrared optical pulse switch between the wireless data transceiver technology.

计算机网络专业词汇中英对照

《计算机网络》中英文对照 Chapter 1 End system P28 端系统 Modem P29 调制解调器(俗称:猫) Base station P29 基站 Communication link P30 通信链路 Physical media P30 物理介质 Coaxial cable P30 同轴电缆 Fiber optics P30 光纤 Radio spectrum P30 射频频谱 Transmission rate P30 传输速率 Packets P30 (数据)包,或分组 Routers P30 路由器 Link-layer switches P30 链路层交换机 Path P30 路径 ISP (Internet Service Provider) P30 网络服务提供商 TCP (Transmission Control Protocol) P31 传输控制协议 IP ( Internet Protocol) P31 网际协议 Intranets P31 内网 API (Application Programming Interface) P32 应用程序编程接口Network edge P35 网络边缘 Access Networks P38 接入网 Ethernet P42 以太网 Network core P48 网络核心 Circuit Switching P50 电路转换 Packet Switching 分组交换 FDM (frequency-division multiplexing) P50 频分多路复用 TDM (time-division multiplexing) P50 时分多路复用 Statistical Multiplexing 统计复用 Store-and-forward 存储转发 Queuing delays P53 排队延迟 Transmission delay P60 传输延迟,或发送延迟 Propagation delay P60 传播延迟 Throughput P59 吞吐量 Internet backbone P57 骨干网 Delay P59 延迟,或时延 Loss P59 丢包 Packet-Switched Network P59 分组交换网络 Nodal processing delay P60 节点处理延迟 End-to-end delay P66 端到端延迟 Instantaneous throughput P68 瞬时吞吐量

英文文献翻译

中等分辨率制备分离的 快速色谱技术 W. Clark Still,* Michael K a h n , and Abhijit Mitra Departm(7nt o/ Chemistry, Columbia Uniuersity,1Veu York, Neu; York 10027 ReceiLied January 26, 1978 我们希望找到一种简单的吸附色谱技术用于有机化合物的常规净化。这种技术是适于传统的有机物大规模制备分离,该技术需使用长柱色谱法。尽管这种技术得到的效果非常好,但是其需要消耗大量的时间,并且由于频带拖尾经常出现低复原率。当分离的样本剂量大于1或者2g时,这些问题显得更加突出。近年来,几种制备系统已经进行了改进,能将分离时间减少到1-3h,并允许各成分的分辨率ΔR f≥(使用薄层色谱分析进行分析)。在这些方法中,在我们的实验室中,媒介压力色谱法1和短柱色谱法2是最成功的。最近,我们发现一种可以将分离速度大幅度提升的技术,可用于反应产物的常规提纯,我们将这种技术称为急骤色谱法。虽然这种技术的分辨率只是中等(ΔR f≥),而且构建这个系统花费非常低,并且能在10-15min内分离重量在的样本。4 急骤色谱法是以空气压力驱动的混合介质压力以及短柱色谱法为基础,专门针对快速分离,介质压力以及短柱色谱已经进行了优化。优化实验是在一组标准条件5下进行的,优化实验使用苯甲醇作为样本,放在一个20mm*5in.的硅胶柱60内,使用Tracor 970紫外检测器监测圆柱的输出。分辨率通过持续时间(r)和峰宽(w,w/2)的比率进行测定的(Figure 1),结果如图2-4所示,图2-4分别放映分辨率随着硅胶颗粒大小、洗脱液流速和样本大小的变化。

通信工程项目毕业材料外文翻译

用于多跳认知无线电网络的分布式网络编码控制信道 Alfred Asterjadhi等著 1 前言 大多数电磁频谱由政府机构长期指定给公司或机构专门用于区域或国家地区。由于这种资源的静态分配,许可频谱的许多部分在许多时间和/或位置未使用或未被充分利用。另一方面,几种最近的无线技术在诸如IEEE802.11,蓝牙,Zigbee之类的非许可频段中运行,并且在一定程度上对WiMAX进行操作;这些技术已经看到这样的成功和扩散,他们正在访问的频谱- 主要是2.4 GHz ISM频段- 已经过度拥挤。为了为这些现有技术提供更多的频谱资源,并且允许替代和创新技术的潜在开发,最近已经提出允许被许可的设备(称为次要用户)访问那些许可的频谱资源,主要用户未被使用或零星地使用。这种方法通常被称为动态频谱接入(DSA),无线电设备发现和机会性利用未使用或未充分利用的频谱带的能力通常称为认知无线电(CR)技术。 DSA和CR最近都引起了无线通信和网络界的极大关注。通常设想两种主要应用。第一个是认知无线接入(CW A),根据该认知接入点,认知接入点负责识别未使用的许可频谱,并使用它来提供对次用户的接入。第二个应用是我们在这个技术中研究的应用,它是认知自组织网络(CAN),也就是使用 用于二级用户本身之间通信的无许可频谱,用于诸如点对点内容分发,环境监控,安全性等目的,灾难恢复情景通信,军事通信等等。 设计CAN系统比CW A有更多困难,主要有两个原因。第一是识别未使用的频谱。在CW A中,接入点的作用是连接到互联网,因此可以使用简单的策略来推断频谱可用性,例如查询频谱调节器在其地理位置的频谱可用性或直接与主用户协商频谱可用性或一些中间频谱经纪人另一方面,在CAN中,与频谱调节器或主要用户的缺乏直接通信需要二级用户能够使用检测技术自己识别未使用的频谱。第二个困难是辅助用户协调媒体访问目的。在CW A中存在接入点和通常所有二级用户直接与之通信(即,网络是单跳)的事实使得直接使用集中式媒体接入控制(MAC)解决方案,如时分多址(TDMA)或正交频分多址(OFDMA)。相反,预计CAN将跨越多跳,缺少集中控制器;而对于传统的单通道多跳自组织网络而言,这个问题的几个解决方案是已知的,因为假设我们处理允许设备访问的具有成

计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络

New technique of the computer network Abstract The 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the people's work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application. keywords Internet Network System Digital Certificates Grid Storage 1. Foreword Internet turns 36, still a work in progress Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress. University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce Spam (junk mail) and security troubles. All the while threats loom: Critics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today. Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Klein rock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.

5G无线通信网络中英文对照外文翻译文献

5G无线通信网络中英文对照外文翻译文献(文档含英文原文和中文翻译)

翻译: 5G无线通信网络的蜂窝结构和关键技术 摘要 第四代无线通信系统已经或者即将在许多国家部署。然而,随着无线移动设备和服务的激增,仍然有一些挑战尤其是4G所不能容纳的,例如像频谱危机和高能量消耗。无线系统设计师们面临着满足新型无线应用对高数据速率和机动性要求的持续性增长的需求,因此他们已经开始研究被期望于2020年后就能部署的第五代无线系统。在这篇文章里面,我们提出一个有内门和外门情景之分的潜在的蜂窝结构,并且讨论了多种可行性关于5G无线通信系统的技术,比如大量的MIMO技术,节能通信,认知的广播网络和可见光通信。面临潜在技术的未知挑战也被讨论了。 介绍 信息通信技术(ICT)创新合理的使用对世界经济的提高变得越来越重要。无线通信网络在全球ICT战略中也许是最挑剔的元素,并且支撑着很多其他的行业,它是世界上成长最快最有活力的行业之一。欧洲移动天文台(EMO)报道2010年移动通信业总计税收1740亿欧元,从而超过了航空航天业和制药业。无线技术的发展大大提高了人们在商业运作和社交功能方面通信和生活的能力无线移动通信的显著成就表现在技术创新的快速步伐。从1991年二代移动通信系统(2G)的初次登场到2001年三代系统(3G)的首次起飞,无线移动网络已经实现了从一个纯粹的技术系统到一个能承载大量多媒体内容网络的转变。4G无线系统被设计出来用来满足IMT-A技术使用IP面向所有服务的需求。在4G系统中,先进的无线接口被用于正交频分复用技术(OFDM),多输入多输出系统(MIMO)和链路自适应技术。4G无线网络可支持数据速率可达1Gb/s的低流度,比如流动局域无线访问,还有速率高达100M/s的高流速,例如像移动访问。LTE系统和它的延伸系统LTE-A,作为实用的4G系统已经在全球于最近期或不久的将来部署。 然而,每年仍然有戏剧性增长数量的用户支持移动宽频带系统。越来越多的

变电站_外文翻译_外文文献_英文文献_变电站的综合概述

英文翻译 A comprehensive overview of substations Along with the economic development and the modern industry developments of quick rising, the design of the power supply system become more and more completely and system. Because the quickly increase electricity of factories, it also increases seriously to the dependable index of the economic condition, power supply in quantity. Therefore they need the higher and more perfect request to the power supply. Whether Design reasonable, not only affect directly the base investment and circulate the expenses with have the metal depletion in colour metal, but also will reflect the dependable in power supply and the safe in many facts. In a word, it is close with the economic performance and the safety of the people. The substation is an importance part of the electric power system, it is consisted of the electric appliances equipments and the Transmission and the Distribution. It obtains the electric power from the electric power system, through its function of transformation and assign, transport and safety. Then transport the power to every place with safe, dependable, and economical. As an important part of power’s transport and control, the transformer substation must change the mode of the traditional design and control, then can adapt to the modern electric power system, the development of modern industry and the of trend of the society life. Electric power industry is one of the foundations of national industry and national economic development to industry, it is a coal, oil, natural gas, hydropower, nuclear power, wind power and other energy conversion into electrical energy of the secondary energy industry, it for the other departments of the national economy fast and stable development of the provision of adequate power, and its level of development is a reflection of the country's economic development an important indicator of the level. As the power in the industry and the importance of the national economy, electricity transmission and distribution of electric energy used in these areas is an indispensable component.。Therefore, power transmission and distribution is critical. Substation is to enable superior power plant power plants or power after adjustments to the lower load of books is an important part of power transmission. Operation of its functions, the capacity of a direct impact on the size of the lower load power, thereby affecting the industrial production and power consumption.Substation system if a link failure, the system will protect the part of action. May result in power outages and so on, to the production and living a great disadvantage. Therefore, the substation in the electric power system for the protection of electricity reliability,

通信工程移动通信中英文对照外文翻译文献

中英文翻译 附件1:外文资料翻译译文 通用移动通信系统的回顾 1.1 UMTS网络架构 欧洲/日本的3G标准,被称为UMTS。 UMTS是一个在IMT-2000保护伞下的ITU-T 批准的许多标准之一。随着美国的CDMA2000标准的发展,它是目前占主导地位的标准,特别是运营商将cdmaOne部署为他们的2G技术。在写这本书时,日本是在3G 网络部署方面最先进的。三名现任运营商已经实施了三个不同的技术:J - PHONE 使用UMTS,KDDI拥有CDMA2000网络,最大的运营商NTT DoCoMo正在使用品牌的FOMA(自由多媒体接入)系统。 FOMA是基于原来的UMTS协议,而且更加的协调和标准化。 UMTS标准被定义为一个通过通用分组无线系统(GPRS)和全球演进的增强数据

技术(EDGE)从第二代GSM标准到UNTS的迁移,如图。这是一个广泛应用的基本原理,因为自2003年4月起,全球有超过847万GSM用户,占全球的移动用户数字的68%。重点是在保持尽可能多的GSM网络与新系统的操作。 我们现在在第三代(3G)的发展道路上,其中网络将支持所有类型的流量:语音,视频和数据,我们应该看到一个最终的爆炸在移动设备上的可用服务。此驱动技术是IP协议。现在,许多移动运营商在简称为2.5G的位置,伴随GPRS的部署,即将IP骨干网引入到移动核心网。在下图中,图2显示了一个在GPRS网络中的关键部件的概述,以及它是如何适应现有的GSM基础设施。 SGSN和GGSN之间的接口被称为Gn接口和使用GPRS隧道协议(GTP的,稍后讨论)。引进这种基础设施的首要原因是提供连接到外部分组网络如,Internet或企业Intranet。这使IP协议作为SGSN和GGSN之间的运输工具应用到网络。这使得数据服务,如移动设备上的电子邮件或浏览网页,用户被起诉基于数据流量,而不是时间连接基础上的数据量。3G网络和服务交付的主要标准是通用移动通信系统,或UMTS。首次部署的UMTS是发行'99架构,在下面的图3所示。 在这个网络中,主要的变化是在无线接入网络(RAN的)CDMA空中接口技术的引进,和在传输部分异步传输模式作为一种传输方式。这些变化已经引入,主要是为了支持在同一网络上的语音,视频和数据服务的运输。核心网络保持相对不变,主要是软件升级。然而,随着目前无线网络控制器使用IP与3G的GPRS业务支持节点进行通信,IP协议进一步应用到网络。 未来的进化步骤是第4版架构,如图4。在这里,GSM的核心被以语音IP技术为基础的IP网络基础设施取代。 海安的发展分为两个独立部分:媒体网关(MGW)和MSC服务器(MSS)的。这基本上是打破外连接的作用和连接控制。一个MSS可以处理多个MGW,使网络更具有扩展性。 因为现在有一些在3G网络的IP云,合并这些到一个IP或IP/ ATM骨干网是很有意义的(它很可能会提供两种选择运营商)。这使IP权利拓展到整个网络,一直到BTS(基站收发信台)。这被称为全IP网络,或推出五架构,如图五所示。在HLR/ VLR/VLR/EIR被推广和称为HLR的子系统(HSS)。 现在传统的电信交换的最后残余被删除,留下完全基于IP协议的网络运营,并

计算机网络英文试题

Computer Network Test Paper 1.Who invented IP and some related Internet protocols? B a)Vinton Cerf and Bob Metcalfe b)Vinton Cerf and Robert Kahn c)Bob Metcalfe and Ivan Sutherland d)Bob Metcalfe and David Clark 2.In the OSI reference model, 3.The upper layers of the OSI model are, in correct order B a)Session, application, presentation b)Session, presentation, application c)Session, application, presentation, physical d)Application, presentation, session 4.The lower layers of the OSI model are, in correct order D a)physical, system, network, logical b)physical, logical, network, system c)physical, transport, network, data link d)physical, data link, network, transport 5.The Internet Protocol (IP) generally corresponds to which OSI layer? A a)Network (layer three) b)Transport (layer four) c)Data link (layer two) d)Session (layer five) 6.MTU stands for C a)Minimum Transfer Unit b)Minimum Transmission Unit c)Maximum Transmission Unit d)Maximum Transfer Unit 7.What layer of the OSI model is designed to perform error detection functions? B a)Physical b)Data link c)Network d)transport 8.Which of these network devices primarily functions at the OSI Network layer (layer 3)? C

博物馆 外文翻译 外文文献 英文文献

第一篇: 航空博物馆与航空展示公园 巴特罗米耶杰·基谢列夫斯基 飞翔的概念、场所的精神、老机场的建筑---克拉科夫新航空博物馆理性地吸取了这些元素,并将它们整合到一座建筑当中。Rakowice-Czyzyny机场之前的旧飞机修理库为新建筑的平面和高度设定了模数比例。在此基本形态上进一步发展,如同裁切和折叠一架纸飞机,生成了一座巨大的建筑。其三角形机翼是由混凝土制成,却如同风动螺旋桨一样轻盈。这个机翼宽大通透,向各个方向开敞。它们的形态与组织都是依据内部功能来设计的。机翼部分为3个不平衡的平面,使内外景观在不断变化中形成空间的延续性,并且联系了建筑内的视觉焦点和室外的展览区。 新航空展示公园的设计连接了博物馆的8栋建筑和户外展览区,并与历史体验建立联系。从前的视觉轴线与通道得到尊重,旧的道路得到了完善,朝向飞机场和跑道的空间被限定出来。每栋建筑展示了一个主题或是一段飞行史。建筑周围伸展出巨大的平台,为特殊主题的室外展览提供了空间。博物馆容纳了超过150架飞机、引擎、飞行复制品、成套的技术档案和历史图片。这里的特色收藏是飞机起源开始的各种飞行器,如Jatho1903、Grade1909、莱特兄弟1909年的飞机模型和1911年的鸽式单翼机。 The first passage: Museum for aviation and aviation exhibition park Bartiomiej Kislelewski The idea of flying, the spirit of place, the structure of the historic airfield – the new Museum of Aviation in Krakow takes up these references intellectually and synthesizes them into a building. The old hangars of the former airport Rakowice Czyzyny set the modular scale for the footprint and the height of the new building. Developed from this basic shape, as if cut out and folded like a paper airplane, a large structure has been generated, with triangular wings made of concrete and yet as light as a wind-vane propeller. The wings are generously glazed and open in all directions. Their form and arrangement depend on the interior uses. In the floor plans of the wings, the three offset

通信工程专业Code-division-multiple-access码分多址大学毕业论文外文文献翻译及原文

毕业设计(论文)外文文献翻译 文献、资料中文题目:码分多址 文献、资料英文题目:Code division multiple access 文献、资料来源: 文献、资料发表(出版)日期: 院(部): 专业: 班级: 姓名: 学号: 指导教师: 翻译日期:2017.02.14

外文原文 Code division multiple access Code division multiple access (CDMA) is a channel access method used by various radio communication technologies. It should not be confused with the mobile phone standards called cdmaOne, CDMA2000 (the 3G evolution of cdmaOne) and WCDMA (the 3G standard used by GSM carriers), which are often referred to as simply CDMA, and use CDMA as an underlying channel access method. One of the concepts in data communication is the idea of allowing several transmitters to send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). This concept is called multiple access. CDMA employs spread-spectrum technology and a special coding scheme (where each transmitter is assigned a code) to allow multiple users to be multiplexed over the same physical channel. By contrast, time division multiple access (TDMA) divides access by time, while frequency-division multiple access (FDMA) divides it by frequency. CDMA is a form of spread-spectrum signalling, since the modulated coded signal has a much higher data bandwidth than the data being communicated. Steps in CDMA Modulation Each user in a CDMA system uses a different code to modulate their signal. Choosing the codes used to modulate the signal is very important in the performance of CDMA systems. The best performance will occur when there is good separation between the signal of a desired user and the signals of other users. The separation of the signals is made by correlating the received signal with the locally generated code of the desired user. If the signal matches the desired user's code then the correlation function will be high and the system can extract that signal. If the desired user's code has nothing in common with the signal the correlation should be as close to zero as

机器人外文翻译(文献翻译-中英文翻译)

外文翻译 外文资料: Robots First, I explain the background robots, robot technology development. It should be said it is a common scientific and technological development of a comprehensive results, for the socio-economic development of a significant impact on a science and technology. It attributed the development of all countries in the Second World War to strengthen the economic input on strengthening the country's economic development. But they also demand the development of the productive forces the inevitable result of human development itself is the inevitable result then with the development of humanity, people constantly discuss the natural process, in understanding and reconstructing the natural process, people need to be able to liberate a slave. So this is the slave people to be able to replace the complex and engaged in heavy manual labor, People do not realize right up to the world's understanding and transformation of this technology as well as people in the development process of an objective need. Robots are three stages of development, in other words, we are accustomed to regarding robots are divided into three categories. is a first-generation robots, also known as teach-type robot, it is through a computer, to control over one of a mechanical degrees of freedom Through teaching and information stored procedures, working hours to read out information, and then issued a directive so the robot can repeat according to the people at that time said the results show this kind of movement again, For example, the car spot welding robots, only to put this spot welding process, after teaching, and it is always a repeat of a work It has the external environment is no perception that the force manipulation of the size of the work piece there does not exist, welding 0S It does not know, then this fact from the first generation robot, it will exist this shortcoming, it in the 20th century, the late 1970s, people started to study the second-generation robot, called Robot with the feeling that This feeling with the robot is similar in function of a certain feeling, for

期末考试复习计算机网络英文版

. .word 资料. .. 第一章 计算机网络概述 第二章 数据和信号

第三章传输介质 第四章 . .word资料. ..

. .word 资料. .. ● What is Encoding? Why must encoding be used for data transmission? (1)【什么是编码?】Convert internal data of a sender into line signals suitable for transmission is called encoding . (2)【数据发送时为什么要编码?】 1) Electromagnetic signals in information process devices are not allowed transmitting directly over communication lines. 2) The signal type of a device differs from the signal type of a communication line. 3) The parameter requirements of device signals differs from the one of line signals. 4) Specific requirements in synchronization, efficiency , error control, etc.. ★ Because electromagnetic signals in information process devices are not allowed transmitting directly over communication lines, so encoding must be used for data transmission to converts internal data of a sender into line signals suitable for transmission. 2.3.4.机信号与线路类型不一样;机信号参数与线路传输的要求不一样;同步、效率、纠错等方面的特殊要求 ● Which two techniques are used when analog data transmitted by digital signals? Which of them is the most important? Why? 用数字信号传输模拟数据常用技术有哪两种?最常用的是?为什么? (1) Pulse Code Modulation(PCM) and Delta Modulation(DM). (2) Pulse Code Modulation(PCM) is the most important. (3) The principal advantage of DM over PCM is the simplicity of its implementation. In general, PCM exhibits better SNR characteristics at the same data rate. ● What processes will be involved when analog data are digitized by PCM technique? 用PCM 技术将模拟数据数字化时,要经过哪些处理步骤? Sampling (PAM)---->quantization---->binary encoding ---->digital to digital coding ● Q4-1 List three techniques of digital-to-digital conversion. ● Q4-4 Define baseline wandering and its effect on digital transmission. (1)In decoding a digital signal, the receiver calculates a running average of the received signal power. This average is called the baseline.(2)The incoming signal power is evaluated against this baseline to determine the value of the data element. (3)A long string of 0s or 1s can cause a drift in the baseline (baseline wandering) and make it difficult for the receiver to decode correctly. ● Q4-5 Define a DC component and its effect on digital transmission. (Define) When the voltage level in a digital signal is constant for a while, the specturm creates very low frequencies(results of Fourier analysis). These frequences around zero,called DC(derect-current) components , that present problems for a system that can not pass low frequencies or a system that uses electrical coupling. (Effect) DC component means 0/1 parity that can cause base-line wondering. 直流分量的影响不仅仅是基线偏移,还有更重要的原因。看看教材和课件,或看看原书作业答案。 ● Q4-9 Define scrambling and give its purpose. (Define) Scrambling is a way to avoid a long sequence of 0s in the original stream,Scrambling is a technique that does not increase the number of bits and does

相关主题