搜档网
当前位置:搜档网 › 计算机专业外文翻译-----无线局域网技术

计算机专业外文翻译-----无线局域网技术

计算机专业外文翻译-----无线局域网技术
计算机专业外文翻译-----无线局域网技术

WIRELESS LAN

In just the past few years, wireless LANs have come to occupy a significant niche in the local area network market. Increasingly, organizations are finding that wireless LANs are an indispensable adjunct to traditional wired LANs, as they satisfy requirements for mobility, relocation, ad hoc networking, and coverage of locationsdifficult to wire. As the name suggests, a wireless LAN is one that makes use of a wireless transmission medium. Until relatively recently, wireless LANs were little used; the reasons for this included high prices, low data rates, occupational safety concerns, and licensing requirements. As these problems have been addressed, the popularity of wireless LANs has grown rapidly.

In this section, we first look at the requirements for and advantages of wireless LANs, and then preview the key approaches to wireless LAN implementation.

Wireless LANs Applications

There are four application areas for wireless LANs: LAN extension, crossbuilding interconnect, nomadic access, and ad hoc networks. Let us consider each of these in turn.

LAN Extension

Early wireless LAN products, introduced in the late 1980s, were marketed as substitutes for traditional wired LANs. A wireless LAN saves the cost of the installation of LAN cabling and eases the task of relocation and other modifications to network structure. However, this motivation for wireless LANs was overtaken by events. First, as awareness of the need for LAN became greater, architects designed new buildings to include extensive prewiring for data applications. Second, with advances in data transmission technology, there has been an increasing reliance on twisted pair cabling for LANs and, in particular, Category 3 unshielded twisted pair. Most older building are already wired with an abundance of Category 3 cable. Thus, the use of a wireless LAN to replace wired LANs has not happened to any great extent.

However, in a number of environments, there is a role for the wireless LAN as an alternative to a wired LAN. Examples include buildings with large open areas, such as manufacturing plants, stock exchange trading floors, and warehouses; historical buildings with insufficient twisted pair and in which drilling holes for new wiring is prohibited; and small offices where installation and maintenance of wired LANs is not economical. In all of these cases, a wireless LAN provides an effective and more attractive alternative. In most of these cases, an organization will also have a wired LAN to support servers and some stationary workstations. For example, a manufacturing facility typically has an office area that is separate from the factory floor but which must be linked to it for networking purposes. Therefore, typically, a wireless LAN will be linked into a wired LAN on the same premises. Thus, this application area is referred to as LAN extension.

Cross-Building Interconnect

Another use of wireless LAN technology is to connect LANs in nearby buildings, be they wired or wireless LANs. In this case, a point-to-point wireless link is used between two buildings. The devices so connected are typically bridges or routers. This single point-to-point link is not a LAN per se, but it is usual to include this application under the heading of wireless LAN.

Nomadic Access

Nomadic access provides a wireless link between a LAN hub and a mobile data terminal equipped with an antenna, such as a laptop computer or notepad computer. One example of the utility of such a connection is to enable an employee returning from a trip to transfer data from a personal

portable computer to a server in the office. Nomadic access is also useful in an extended environment such as a campus or a business operating out of a cluster of buildings. In both of these cases, users may move around with their portable computers and may wish access to the servers on a wired LAN from various locations.

Ad Hoc Networking

An ad hoc network is a peer-to-peer network (no centralized server) set up temporarily to meet some immediate need. For example, a group of employees, each with a laptop or palmtop computer, may convene in a conference room for a business or classroom meeting. The employees link their computers in a temporary network just for the duration of the meeting.

Wireless LAN Requirements

A wireless LAN must meet the same sort of requirements typical of any LAN, including high capacity, ability to cover short distances, full connectivity among attached stations, and broadcast capability. In addition, there are a number of requirements specific to the wireless LAN environment. The following are among the most important requirements for wireless LANs: Throughput. The medium access control protocol should make as efficient use as possible of the wireless medium to maximize capacity.

Number of nodes. Wireless LANs may need to support hundreds of nodes across multiple cells. Connection to backbone LAN. In most cases, interconnection with stations on a wired backbone LAN is required. For infrastructure wireless LANs, this is easily accomplished through the use of control modules that connect to both types of LANs. There may also need to be accommodation for mobile users and ad hoc wireless networks.

Service area. A typical coverage area for a wireless LAN may be up to a 300 to 1000 foot diameter.

Battery power consumption. Mobile workers use battery-powered workstations that need to have a long battery life when used with wireless adapters. This suggests that a MAC protocol that requires mobile nodes to constantlymonitor access points or to engage in frequent handshakes with a base stationis inappropriate.

Transmission robustness and security. Unless properly designed, a wireless LAN may be interference-prone and easily eavesdropped upon. The design of a wireless LAN must permit reliable transmission even in a noisy environment and should provide some level of security from eavesdropping.

Collocated network operation. As wireless LANs become more popular, it is quite likely for two of them to operate in the same area or in some area where interference between the LANs is possible. Such interference may thwart the normal operation of a MAC algorithm and may allow unauthorized access to a particular LAN.

License-free operation. Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band used by the LAN.

HandoWroaming. The MAC protocol used in the wireless LAN should enable mobile stations to move from one cell to another.

Dynamic configuration. The MAC addressing and network management aspects of the LAN should permit dynamic and automated addition, deletion, and relocation of end systems without disruption to other users.

Physical Medium Specification

Three physical media are defined in the current 802.11 standard:

Infrared at 1 Mbps and 2 Mbps operating at a wavelength between 850 and 950 nm.

Direct-sequence spread spectrum operating in the 2.4-GHz ISM band. Up to 7 channels, each with a data rate of 1 Mbps or 2 Mbps, can be used.

Frequency-hopping spread spectrum operating in the 2.4-GHz ISM band. The details of this option are for further study.

Wireless LAN Technology

Wireless LANs are generally categorized according to the transmission techniquethat is used. All current wireless LAN products fall into one of the following categories:

Infrared (IR) LANs. An individual cell of an IR LAN is limited to a single room, as infrared light does not penetrate opaque walls.

Spread Spectrum LANs. This type of LAN makes use of spread spectrum transmission technology. In most cases, these LANs operate in the ISM (Industrial, Scientific, and Medical) bands, so that no FCC licensing is required for their use in the U.S.

Narrowband Microwave. These LANs operate at microwave frequencies but do not use spread spectrum. Some of these products operate at frequencies that require FCC licensing, while others use one of the unlicensed ISM bands.

A set of wireless LAN standards has been developed by the IEEE 802.11 committee. The terminology and some of the specific features of 802.11 are unique to this standard and are not reflected in all commercial products. However, it is useful to be familiar with the standard as its features are representative of required wireless LAN capabilities.

The smallest building block of a wireless LAN is a basic service set (BSS), which consists of some number of stations executing the same MAC protocol and competing for access to the same shared medium. A basic service set may be isolated, or it may connect to a backbone distribution system through an access point. The access point functions as a bridge. The MAC protocol may be fully distributed or controlled by a central coordination function housed in the access point. The basic service set generally corresponds to what is referred to as a cell in the literature. An extended service set (ESS) consists of two or more basic service sets interconnected by a distribution system. Typically, the distribution system is a wired backbone LAN. The extended service set appears as a single logical LAN to the logical link control (LLC) level. The standard defines three types of stations, based on mobility:

No-transition. A station of this type is either stationary or moves only within the direct communication range of the communicating stations of a single BSS.

BSS-transition. This is defined as a station movement from one BSS to another BSS within the same ESS. In this case, delivery of data to the station requires that the addressing capability be able to recognize the new location of the station.

ESS-transition. This is defined as a station movement from a BSS in one ESS to a BSS within another ESS. This case is supported only in the sense that the station can move. Maintenance of upper-layer connections supported by 802.11 cannot be guaranteed. In fact, disruption of service is likely to occur. details of this option are for further study.

The 802.11 working group considered two types of proposals for a MAC algorithm: distributed-access protocols which, like CSMAICD, distributed the decision to transmit over all the nodes using a carrier-sense mechanism; and centralized access protocols, which involve regulation of transmission by a centralized decision maker. A distributed access protocol makes sense of an ad hoc network of peer workstations and may also be attractive in other wireless LAN

configurations that consist primarily of bursty traffic. A centralized access protocol is natural for configurations in which a number of wireless stations are interconnected with each other and with some sort of base station that attaches to a backbone wired LAN; it is especially useful if some of the data is time-sensitive or high priority.

The end result of the 802.11 is a MAC algorithm called DFWMAC (distributed foundation wireless MAC) that provides a distributed access-control mechanism with an optional centralized control built on top of that. Figure 13.20 illustrates the architecture. The lower sublayer of the MAC layer is the distributed coordination function (DCF). DCF uses a contention algorithm to provide access to all traffic. Ordinary asynchronous traffic directly uses DCF. The point coordination function (PCF) is a centralized MAC algorithm used to provide contention-free service. PCF is built on top of DCF and exploits features of DCF to assure access for its users. Let us consider these two sublayers in turn.

Distributed Coordination Function

The DCF sublayer makes use of a simple CSMA algorithm. If a station has a MAC frame to transmit, it listens to the medium. If the medium is idle, the station may transmit; otherwise, the station must wait until the current transmission is complete before transmitting. The DCF does not include a collision-detection function (i.e., CSMAICD) because collision detection is not practical on a wireless network. The dynamic range of the signals on the medium is very large, so that a transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission. To ensure the smooth and fair functioning of this algorithm, DCF includes a set of delays that amounts to a priority scheme. Let us start by considering a single delay known as an interframe space (IFS). In fact, there are three different IFS values, but the algorithm is best explained by initially ignoring this detail. Using an IFS, the rules for CSMA access are as follows:

I. A station with a frame to transmit senses the medium. If the medium is idle, the station waits to see if the medium remains idle for a time equal to IFS, and, if this is so, the station may immediately transmit.

2. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.

3. Once the current transmission is over, the station delays another IFS. If the medium remains idle for this period, then the station backs off using a binary exponential backoff scheme and again senses the medium. If the medium is still idle, the station may transmit.

Point Coordination Function

PCF is an alternative access method implemented on top of the DCF. The operation consists of polling with the centralized polling master (point coordinator). The point coordinator makes use of PIFS when issuing polls. Because PIFS is smaller than DIFS, the point coordinator can seize the medium and lock out all asynchronous traffic while it issues polls and receives responses.

As an extreme, consider the following possible scenario. A wireless network is configured so that a number of stations with time-sensitive traffic are controlled by the point coordinator while remaining traffic, using CSMA, contends for access.

The point coordinator could issue polls in a round-robin fashion to all stations configured for polling. When a poll is issued, the polled station may respond using SIFS. If the point coordinator receives a response, it issues another poll using PIFS. If no response is received during the

expected turnaround time, the coordinator issues a poll. If the discipline of the preceding paragraph were implemented, the point coordinator would lock out all asynchronous traffic by repeatedly issuing polls. To prevent this situation, an interval known as the superframe is defined. During the first part of this interval, the point coordinator issues polls in a round-robin fashion to all stations configured for polling. The point coordinator then idles for the remainder of the superframe, allowing a contention period for asynchronous access.

At the beginning of a superframe, the point coordinator may optionally seize control and issue polls fora give period of time. This interval varies because of the variable frame size issued by responding stations. The remainder of the superframe is available for contention-based access. At the end of the superframe interval, the point coordinator contends for access to the medium using PIFS. If the medium is idle, the point coordinator gains immediate access, and a full superframe period follows. However, the medium may be busy at the end of a superframe. In this case, the point coordinator must wait until the medium is idle to gain access; this results in a foreshortened superframe period for the next cycle.

无线局域网技术

最近几年,无线局域网开始在市场中独霸一方。越来越多的机构发现无线局域网是传统有线局域网不可缺少的好帮手,它可以满足人们对移动、布局变动和自组网络的需求,并能覆盖难以铺设有线网络的地域。无线局域网是利用无线传输媒体的局域网。就在前几年,人们还很少使用无线局域网。原因包括成本高、数据率低、职业安全方面的顾虑以及需要许可证。随着这些问题的逐步解决,无线局域网很快就开始流行起来了。

无线局域网的应用

局域网的扩展

在20世纪80年代后期出现的无线局域网早期产品都是作为传统有线局域网替代品而问世的。无线局域网可以节省局域网缆线的安装费用,简化重新布局和其他对网络结构改动的任务。但是,无线局域网的这个动机被以下一系列的事件打消。首先,随着人们越来越清楚地认识到局域网的重要性,建筑师在设计新建筑时就包括了大量用于数据应用的预先埋设好的线路。其次,随着数据传输技术的发展,人们越来越依赖于双绞线连接的局域网。特别是3类和5类非屏蔽双绞线。大多数老建筑中已经铺设了足够的3类电缆,而许多新建筑里则预埋了5类电缆。因此,用无线局域网取代有线局域网的事情从来没有发生过。

但是,在有些环境中无线局域网确实起着有线局域网替代品的作用。例如,象生产车间、股票交易所的交易大厅以及仓库这样有大型开阔场地的建筑;没有足够双绞线对,但又禁止打洞铺设新线路的有历史价值的建筑;从经济角度考虑,安装和维护有线局域网划不来的小型办公室。在以上这些情况下,无线局域网向人们提供了一个有效且更具吸引力的选择。其中大多数情况下,拥有无线局域网的机构同时也拥有支持服务器和某些固定工作站的有线局域网。因此,无线局域网通常会链接到同样建筑群内的有线局域网上。所以我们将此类应用领域成为局域网的扩展。

建筑物的互连

无线局域网技术的另一种用途是邻楼局域网之间的连接,这些局域网可以是无线的也可以是有线的。在这种情况下,两个楼之间采用点对点的无线链接。被链接的设备通常是网桥或路由器。这种点对点的单链路从本质上看不是局域网,但通常我们也把这种应用算作无线局域网。

漫游接入

漫游接入提供局域网和带有天线的移动数据终端之间的无线链接,如膝上型电脑和笔记本电脑。这种应用的一个例子是从外地出差回来的职员将数据从个人移动电脑传送到办公室的服务器上。漫游接入在某种延伸的环境下也是十分有用的,如在建筑群之外操作的一台电脑或一次商务行为。在以上两种情况下,用户会带着自己的电脑随意走动,并希望可以从不同的位置访问有线局域网上的服务器。

自组网络

自组网络(ad hoc network)是为了满足某些即时需求而临时而建立的一种对等网络(没有中央服务器)例如,有一群职员,每人带着一台膝上电脑或掌上电脑,会聚在商务会议室或课堂上。这些职员会将他们的电脑链接起来,形成一个临时性的、仅仅在会议期间存在的网络。

无线局域网的要求

无线局域网必须满足所有局域网的典型要求,包括大容量、近距离的覆盖能力、相连站点间

的完全连接性以及广播能力。另外,无线局域网环境还有一些特殊的要求。以下是一些无线局域网最终要的要求:

吞吐量:媒体接入控制协议应当尽可能地有效利用无线媒体以达到最大的容量。

节点数量:无线局域网可能需要支持分布在多个蜂窝中的上百个节点。

连接到主干局域网:在大多数情况下,要求能够与主干有线局域网的站点相互连接。对于有基础设施的无线局域网,很容易通过利用控制模块完成这个任务,控制模块本身就连接着这两种类型的局域网。对于移动用户和自组无线网络来说,可能需要满足这个要求。

电池能量消耗:移动工作人员用的是由电池供电的工作站,它需要在使用无线适配器的情况下,电池供电时间足够长。这就是说,要求移动节点不停地监视接入点或者经常要与基站握手的MAC协议是不适用的。通常,无线局域网的实现都具有在不使用网络时减少能量消耗的特殊性能,如睡眠模式。

传输健壮性和安全性:除非涉及合理,无线局域网很容易受到干扰并且容易被窃听。无线局域网的设计必须做到即使在噪音较大的环境中也能可靠传输,并且为应用提供某种程度的安全性,以防窃听。

并列的网络操作:随着无线局域网变得越来越流行,很可能有两个或者更多无线局域网同时存在于一个区域内,或在局域网之间可能存在干扰的某些区域内运行。这种干扰可能会阻碍MAC算法的正常运行,还可能造成对特定局域网的非法接入。

不需要许可证的操作:用户希望购买和运行的是这样的无线局域网产品,它们不需要专门为局域网所使用的频带而申请许可证。

切换和漫游:无线局域网中使用的MAC协议应当让移动站点能够从一个蜂窝移动到另一个蜂窝。

动态配置:局域网在MAC地址机制和网络管理方面应当允许端系统能够动态且自动地增加、删除和移动位置,并且不打扰到其他用户。

无线局域网技术

无线局域网通常根据它所采用的传输技术进行分类。目前所有无线局域网产品都可归为以下三个大类之一:

红外线(IR)局域网:红外线局域网的一个蜂窝只能限制在一个房间里,因为红外线无法穿过不透明的墙。

扩频局域网:这种类型的局域网利用了扩频传输技术。在大多数情况下,这些局域网运行在ISM(个人、科学和医学)波段内,因此,在美国使用这些局域网不需要联邦通信委员会(FCC)发放的许可证。

窄带微波:这些局域网运行在微波频率是,但没有使用扩频技术。其中有些产品运行的频率需要FCC的许可证,而其他一些产品则使用了不需要许可的波段。

无线局域网有一个特性是人们乐意接受的,虽然不是必要的,那就是不需要通过麻烦的授权过程就能使用。每个国家的许可证发放制度都不一样,这就使事情变得更加复杂。在美国,FCC在ISM波段内特许了两个不需要许可证的应用:最大功率为1瓦的扩频系统合最大运行功率为0.5瓦的低功率系统。自从FCC开放了这个波段以来,在扩频无线局域网中的应用就越来越普遍。

1990年IEEE802.11工作组成立,它的宪章就是要为无线局域网开发MAC协议以及物理媒体规约。

无线局域网中最小的模块是基本服务集(Basic Service Set, BSS),它由一些执行相同MAC 协议并争用同一共享媒体完成接入的站点组成。基本服务集可以是孤立的,也可以通过接入

点(Access Point, AP)连到主干分发系统(Distribution System, DS)上。接入点的功能相当于网桥。MAC协议可以是完全分布式的,也可以由位于接入点的中央协调功能控制。BBS 通常与文献中的蜂窝相对应,而DS则有可能是交换机或有线网络,也可以是无线网络。MAC层的主要任务是在MAC实体之间传送MSDU,这个任务是由分发服务实现的。分发服务的正常运行需要该ESS内所有站点的信息,而这个信息是由与关联(association)相关的服务提供的。在分发服务向站点交付数据或者接收来自站点的数据之前,该站点必须要建立关联。标准基于移动性定义了三种转移类型:

无转移:这种类型的站点或者是固定的,或者只在一个BSS的直接通信范围内移动。

BSS转移:这种类型的站点移动是在同一ESS内从一个BSS移动到另一个BSS。在这种情况下,该站点的数据交付需要寻址功能,能识别出该站点的新位置。

ESS转移:它的定义是指站点从一个ESS的BSS到另一个ESS的BSS移动。只有从某种意义上看该站点是能够移动的,才能支持这种类型的转移。

802.11工作组考虑了两类MAC算法建议:分布式接入协议和集中式接入协议。分布式接入协议类似于以太网,采用载波监听机制把传输的决定权分布到所有节点。集中式接入协议由一个集中的决策模块来控制发送。分布式接入协议对于对等工作站形式的自组网络是有意义的,同时也可能对主要是突发性通信量的其他一些无线局域网颇具吸引力。如果一个局域网的配置是由许多互连的无线站点和以某种形式连接到主干有线局域网的基站组成,则采用集中式接入控制是自然而然的事情。当某些数据是时间敏感的或者是高优先级的时,这种方法特别有用。

IEEE802.11的最终结果是一个称为分布式基础无线MAC(Distributed Foundation Wireless MAC,DFWMAC)的算法,它提供了一个分布式接入控制机制,并在顶端具有可选的集中式控制。MAC层的低端子层是分布式协调功能(Distributed Coordination Function , DCF).DCF 采用争用算法向所有通信量提供接入。正常的异步通信量直接使用DCF。点协调功能(Point Coordination Function, PCF)是一个集中式MAC算法,用于提供无争用服务。

分布式协调功能

DCF子层使用一种简单的CSMA(载波监听多点接入)算法。如果站点有一个MAC帧要发送,则先监听媒体。如果媒体空闲,站点可以发送。否则,该站点必须等待直到当前的发送结束。DCF不包括冲突检测功能(CSMA/CD),因为在无线网络中进行冲突检测是不实际的。媒体上信号变动范围很大,所以如果正在传输的站点接收到微弱信号,它无法区分这是噪声还是因为自己的传输而带来的影响。

为了保证算法的平稳和公平运行,DCF包含了一组等价于优先级策略的时延。我们首先考虑一个称为帧间间隔(InterFrameSpace,IFS)时延。采用IFS后CSMA的接入规则如下:1。有帧要传输的站点先监听媒体。如果媒体是空闲的,等待IFS长的一段时间,再看媒体是否空闲,如果是空闲,立即发送。

2。如果媒体是忙的(或是一开始就发现忙,或是在IFS空闲时间内发现媒体忙),则推迟传输,并继续监听媒体直到当前的传输结束。

3。一旦当前的传输结束,站点再延迟IFS一段时间。如果媒体在这段时间内都是空闲的,则站点采用二进制指数退避策略等待一段时间后再监听媒体,如果媒体依然是空闲的,则可以传输。在退避期间,如果媒体又变忙了,退避定时器暂停,并在媒体变空闲后恢复计时。点协调功能

PCF是在DCF之上实现的另一种接入方式。其操作由中央轮询主控器(点协调器)的轮询构成。点协调在发布轮询时采用PIFS。因为PIFS比DIFS小,所以点协调器在发布轮询和接收响应时能获取媒体并封锁所有的异步通信量。

点协调器不断地发布轮询,并永远封锁所有异步通信量。为了避免这种情况,定义了一个称

为超帧(superframe)的时间间隔。在超帧时间的开始部分,点协调器以循环方式向所有配置成轮询的站点发布轮询。然后,在余下的超帧时间里,点协调器空闲,允许异步通信量有一段争用接入的时间。

在超帧开始时,点协调器可以在给定时间内获得控制权和发布轮询,这由选项决定。由于响应站点发出的帧的长度是变化的,所以这个时间间隔也是变化的。超帧剩余的时间用于基于争用的接入。在超帧末尾,点协调器泳PIFS时间争用媒体接入权。如果媒体是空闲的,点协调器可以立刻接入,然后又是一个全超帧期。不过,媒体在超帧末尾有可能是忙的。在这种情况下,点协调器必须等待直到媒体空闲并获得接入。其结果是下一个循环中相应缩短的超帧期。

PLC控制下的电梯系统外文文献翻译、中英文翻译、外文翻译

PLC控制下的电梯系统 由继电器组成的顺序控制系统是最早的一种实现电梯控制的方法。但是,进入九十年代,随着科学技术的发展和计算机技术的广泛应用,人们对电梯的安全性、可靠性的要求越来越高,继电器控制的弱点就越来越明显。 电梯继电器控制系统故障率高,大大降低了电梯的可靠性和安全性,经常造成停梯,给乘用人员带来不便和惊忧。且电梯一旦发生冲顶或蹲底,不但会造成电梯机械部件损坏,还可能出现人身事故。 可编程序控制器(PLC)最早是根据顺序逻辑控制的需要而发展起来的,是专门为工业环境应用而设计的数字运算操作的电子装置。鉴于其种种优点,目前,电梯的继电器控制方式己逐渐被PLC控制所代替。同时,由于电机交流变频调速技术的发展,电梯的拖动方式己由原来直流调速逐渐过渡到了交流变频调速。因此,PLC控制技术加变频调速技术己成为现代电梯行业的一个热点。 1. PLC控制电梯的优点 (1)在电梯控制中采用了PLC,用软件实现对电梯运行的自动控制,可靠性大大提高。 (2)去掉了选层器及大部分继电器,控制系统结构简单,外部线路简化。 (3)PLC可实现各种复杂的控制系统,方便地增加或改变控制功能。 (4) PLC可进行故障自动检测与报警显示,提高运行安全性,并便于检修。 (5)用于群控调配和管理,并提高电梯运行效率。 (6)更改控制方案时不需改动硬件接线。 2.电梯变频调速控制的特点 随着电力电子技术、微电子技术和计算机控制技术的飞速发展,交流变频调速技术的发展也十分迅速。电动机交流变频调速技术是当今节电、改善工艺流程以提高产品质量和改善环境、推动技术进步的一种主要手段。变频调速以其优异的调速性能和起制动平稳性能、高效率、高功率因数和节电效果,广泛的适用范围及其它许多优点而被国内外公认为最有发展前途的调速方式 交流变频调速电梯的特点 ⑴能源消耗低 ⑵电路负载低,所需紧急供电装置小 在加速阶段,所需起动电流小于2.5倍的额定电流。且起动电流峰值时间短。由于起动电流大幅度减小,故功耗和供电缆线直径可减小很多。所需的紧急供电

毕设外文资料翻译.

理工学院 毕业设计外文资料翻译 专业:计算机科学与技术 姓名:马艳丽 学号: 12L0752218 外文出处:The Design and Implementation of 3D Electronic Map of Campus Based on WEBGIS 附件: 1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文 基于WebGIS的校园三维电子地图的设计与实现 一.导言 如今,数字化和信息化是当今时代的主题。随着信息革命和计算机科学的发展,计算机技术已经渗透到科学的各个领域,并引起了许多革命性的变化,在这些科目,古代制图学也不例外。随着技术和文化的不断进步,地图变化的形式和内容也随之更新。在计算机图形学中,地理信息系统(GIS)不断应用到Web,制作和演示的传统方式经历了巨大的变化,由于先进的信息技术的发展,地图的应用已经大大延长。在这些情况下,绘图将面临广阔的发展前景。电子地图是随之应运而生的产品之一。随着计算机技术,计算机图形学理论,遥感技术,航空摄影测量技术和其他相关技术的飞速发展。用户需要的三维可视化,动态的交互性和展示自己的各种地理相关的数据处理和分析,如此多的关注应支付的研究三维地图。东北石油大学及其周边地区的基础上本文设计并建立三维电子地图。 二.系统设计 基于WebGIS的校园三维电子地图系统的具有普通地图的一般特性。通过按键盘上的箭头键(上,下,左,右),可以使地图向相应的方向移动。通过拖动鼠标,可以查看感兴趣的任何一个地方。使用鼠标滚轮,可以控制地图的大小,根据用户的需求来查看不同缩放级别的地图。在地图的左下角会显示当前鼠标的坐标。在一个div层,我们描绘了一个新建筑物的热点,这层可以根据不同的地图图层的显示,它也可以自动调整。通过点击热点,它可以显示热点的具体信息。也可以输入到查询的信息,根据自己的需要,并得到一些相关的信息。此外,通过点击鼠标,人们可以选择检查的三维地图和卫星地图。 主要功能包括: ?用户信息管理:检查用户名和密码,根据权限设置级别的认证,允许不同权限的用户通过互联网登录系统。 ?位置信息查询:系统可以为用户提供模糊查询和快速定位。

电子信息工程专业课程翻译中英文对照表

电子信息工程专业课程名称中英文翻译对照 (2009级培养计划)

实践环节翻译

高等数学Advanced Mathematics 大学物理College Physics 线性代数Linear Algebra 复变函数与积分变换Functions of Complex Variable and Integral Transforms 概率论与随机过程Probability and Random Process 物理实验Experiments of College Physics 数理方程Equations of Mathematical Physics 电子信息工程概论Introduction to Electronic and Information Engineering 计算机应用基础Fundamentals of Computer Application 电路原理Principles of Circuit 模拟电子技术基础Fundamentals of Analog Electronics 数字电子技术基础Fundamentals of Digital Electronics C语言程序设计The C Programming Language 信息论基础Fundamentals of Information Theory 信号与线性系统Signals and Linear Systems 微机原理与接口技术Microcomputer Principles and Interface Technology 马克思主义基本原理Fundamentals of Marxism 毛泽东思想、邓小平理论 和“三个代表”重要思想 概论 Thoughts of Mao and Deng 中国近现代史纲要Modern Chinese History 思想道德修养与法律基 础 Moral Education & Law Basis 形势与政策Situation and Policy 英语College English 体育Physical Education 当代世界经济与政治Modern Global Economy and Politics 卫生健康教育Health Education 心理健康知识讲座Psychological Health Knowledge Lecture 公共艺术课程Public Arts 文献检索Literature Retrieval 军事理论Military Theory 普通话语音常识及训练Mandarin Knowledge and Training 大学生职业生涯策划 (就业指导) Career Planning (Guidance of Employment ) 专题学术讲座Optional Course Lecture 科技文献写作Sci-tech Document Writing 高频电子线路High-Frequency Electronic Circuits 通信原理Communications Theory 数字信号处理Digital Signal Processing 计算机网络Computer Networks 电磁场与微波技术Electromagnetic Field and Microwave

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholes Richard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem. Different perspective of security loo phole s In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: ● Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. ● specialized software loophole. If Oracle loopholes, Apach e,

计算机网络安全文献综述

计算机网络安全综述学生姓名:李嘉伟 学号:11209080279 院系:信息工程学院指导教师姓名:夏峰二零一三年十月

[摘要] 随着计算机网络技术的快速发展,网络安全日益成为人们关注的焦点。本文分析了影响网络安全的主要因素及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出了针对性的建议。 [关键词] 计算机网络;安全;管理;技术;加密;防火墙 一.引言 计算机网络是一个开放和自由的空间,但公开化的网络平台为非法入侵者提供了可乘之机,黑客和反黑客、破坏和反破坏的斗争愈演愈烈,不仅影响了网络稳定运行和用户的正常使用,造成重大经济损失,而且还可能威胁到国家安全。如何更有效地保护重要的信息数据、提高计算机网络的安全性已经成为影响一个国家的政治、经济、军事和人民生活的重大关键问题。本文通过深入分析网络安全面临的挑战及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出针对性建议。

二.正文 1.影响网络安全的主要因素[1] 计算机网络安全是指“为数据处理系统建立和采取的技术和管理的安全保护,保护计算机硬件、软件数据不因偶然和恶意的原因而遭到破坏、更改和泄漏”。计算机网络所面临的威胁是多方面的,既包括对网络中信息的威胁,也包括对网络中设备的威胁,但归结起来,主要有三点:一是人为的无意失误。如操作员安全配置不当造成系统存在安全漏洞,用户安全意识不强,口令选择不慎,将自己的帐号随意转借他人或与别人共享等都会给网络安全带来威胁。二是人为的恶意攻击。这也是目前计算机网络所面临的最大威胁,比如敌手的攻击和计算机犯罪都属于这种情况,此类攻击又可以分为两种:一种是主动攻击,它以各种方式有选择地破坏信息的有效性和完整性;另一类是被动攻击,它是在不影响网络正常工作的情况下,进行截获、窃取、破译以获得重要机密信息。这两种攻击均可对计算机网络造成极大的危害,并导致机密数据的泄漏。三是网络软件的漏洞和“后门”。任何一款软件都或多或少存在漏洞,这些缺陷和漏洞恰恰就是黑客进行攻击的首选目标。绝大部分网络入侵事件都是因为安全措施不完善,没有及时补上系统漏洞造成的。此外,软件公司的编程人员为便于维护而设置的软件“后门”也是不容忽视的巨大威胁,一旦“后门”洞开,别人就能随意进入系统,后果不堪设想。

伺服电机外文文献翻译

伺服电机 1. 伺服电机的定义 伺服电动机又称执行电动机,在自动控制系统中,用作执行元件,把所收到的电信号转换成电动机轴上的角位移或角速度输出。分为直流和交流伺服电动机两大类,其主要特点是,当信号电压为零时无自转现象,转速随着转矩的增加而匀速下降。伺服电机在伺服系统中控制机械元件运转的发动机. 是一种补助马达间接变速装置。伺服电机可使控制速度, 位置精度非常准确。将电压信号转化为转矩和转速以驱动控制对象。转子转速受输入信号控制,并能快速反应,在自动控制系统中作执行元件,且具有机电时间常数小、线性度高、始动电压低等特点。 2. 伺服电机工作原理 1.伺服主要靠脉冲来定位,基本上可以这样理解,伺服电机接收到1 个脉冲,就会旋转1 个脉冲对应的角度,从而实现位移,因为,伺服电机本身具备发出脉冲的功能,所以伺服电机每旋转一个角度,都会发出对应数量的脉冲,这样,和伺服电机接受的脉冲形成了呼应,或者叫闭环,如此一来,系统就会知道发了多少脉冲给伺服电机,同时又收了多少脉冲回来,这样,就能够很精确的控制电机的转动,从而实现精确的定位,可以达到0.001mm有刷电机成本低,结构简单,启动转矩大,调速范围宽,控制容易,需要维护,但维护方便(换碳刷),产生电磁干扰,对环境有要求。无刷电机体积小,重量轻,出力大,响应快,速度高,惯量小,转动平滑,力矩稳定。控制复杂,容易实现智能化,其电子换相方式灵活,可以方波换相或正弦波换相。电机免维护,效率很高,运行温度低,电磁辐射很小,长寿命,可用于各种环境。 2. 交流伺服电机也是无刷电机,分为同步和异步电机,目前运动控制中一般都用同步电机,它的功率范围大,可以做到很大的功率。大惯量,最高转动速度低,且随着功率增大而快速降低。因而适合做低速平稳运行的应用。 3. 永磁交流伺服电动机简介 20 世纪80 年代以来,随着集成电路、电力电子技术和交流可变速驱动技术的发展,永磁交流伺服驱动技术有了突出的发展,各国著名电气厂商相继推出各自的交流伺服电动机和伺服驱动器系列产品并不断完善和更新。交流伺服系统已成为当代高性能伺服系统的主要发展方向,使原来的直流伺服面临被淘汰的危机。90 年代以后,世界各国已经商品化了的交流伺服系统是采用全数字控制的正弦

电子信息工程外文翻译外文文献英文文献微处理器

外文资料 所译外文资料: 1. 作者G..Bouwhuis, J.Braat, A.Huijser 2. 书名:Principles of Optical Disk Systems 3. 出版时间:1991年9月 4. 所译章节:Session 2/Chapter9, Session 2/Chapter 11 原文: Microprocessor One of the key inventions in the history of electronics, and in fact one of the most important inventions ever period, was the transistor. As time progressed after the inven ti on of LSI in tegrated circuits, the tech no logy improved and chips became smaller, faster and cheaper. The functions performed by a processor were impleme nted using several differe nt logic chips. In tel was the first compa ny to in corporate all of these logic comp onents into a si ngle chip, this was the first microprocessor. A microprocessor is a complete computati on engine that is fabricated on a sin gle chip. A microprocessor executes a collecti on of machi ne in struct ions that tell the processor what to do. Based on the in struct ions, a microprocessor does three basic things: https://www.sodocs.net/doc/b911677529.html,ing the ALU (Arithmetic/Logic Unit), a microprocessor can perform mathematical operatio ns like additi on, subtract ion, multiplicatio n and divisi on; 2.A microprocessor can move data from one memory location to another; 3.A microprocessor can make decisi ons and jump to a new set of in struct ions based on those decisi ons. There may be very sophisticated things that a microprocessor does, but those are its three basic activities. Microprocessor has an address bus that sends an address to memory, a data bus that can send data to memory or receive data from memory, an RD(read) and WR(write) line that lets a clock pulse sequenee the processor and a reset li ne that resets the program coun ter to zero(or whatever) and restarts executi on. And let ' s assume that both the address and data buses are 8 bits wide here. Here are the comp onents of this simple microprocessor: 1. Registers A, B and C are simply latches made out of flip-flops. 2. The address latch is just like registers A, B and C. 3. The program coun ter is a latch with the extra ability to in creme nt by 1 whe n told to do so, and also to reset to zero whe n told to do so. 4. The ALU could be as simple as an 8-bit adder, or it might be able to add, subtract, multiply and divide 8- bit values. Let ' s assume the latter here. 5. The test register is a special latch that can hold values from comparisons performed in the ALU. An ALU can normally compare two numbers send determine if they are equal, if one is greater

计算机专业外文文献翻译6

外文文献翻译(译成中文2000字左右): As research laboratories become more automated,new problems are arising for laboratory managers.Rarely does a laboratory purchase all of its automation from a single equipment vendor. As a result,managers are forced to spend money training their users on numerous different software packages while purchasing support contracts for each. This suggests a problem of scalability. In the ideal world,managers could use the same software package to control systems of any size; from single instruments such as pipettors or readers to large robotic systems with up to hundreds of instruments. If such a software package existed, managers would only have to train users on one platform and would be able to source software support from a single vendor. If automation software is written to be scalable, it must also be flexible. Having a platform that can control systems of any size is far less valuable if the end user cannot control every device type they need to use. Similarly, if the software cannot connect to the customer’s Laboratory Information Management System (LIMS) database,it is of limited usefulness. The ideal automation software platform must therefore have an open architecture to provide such connectivity. Two strong reasons to automate a laboratory are increased throughput and improved robustness. It does not make sense to purchase high-speed automation if the controlling software does not maximize throughput of the system. The ideal automation software, therefore, would make use of redundant devices in the system to increase throughput. For example, let us assume that a plate-reading step is the slowest task in a given method. It would make that if the system operator connected another identical reader into the system, the controller software should be able to use both readers, cutting the total throughput time of the reading step in half. While resource pooling provides a clear throughput advantage, it can also be used to make the system more robust. For example, if one of the two readers were to experience some sort of error, the controlling software should be smart enough to route all samples to the working reader without taking the entire system offline. Now that one embodiment of an ideal automation control platform has been described let us see how the use of C++ helps achieving this ideal possible. DISCUSSION C++: An Object-Oriented Language Developed in 1983 by BjarneStroustrup of Bell Labs,C++ helped propel the concept of object-oriented programming into the mainstream.The term ‘‘object-oriented programming language’’ is a familiar phrase that has been in use for decades. But what does it mean? And why is it relevant for automation software? Essentially, a language that is object-oriented provides three important programming mechanisms:

双闭环直流调速系统外文翻译

对直流电机的速度闭环控制系统的设计 钟国梁 机械与汽车工程学院华南理工大学 中国,广州510640 电子邮件:zhgl2chl@https://www.sodocs.net/doc/b911677529.html, 机械与汽车工程学院 华南理工大学 中国,广州510640 江梁中 电子邮件:jianglzh88@https://www.sodocs.net/doc/b911677529.html, 该研究是由广州市科技攻关项目赞助(No.2004A10403006)。(赞助信息) 摘要 本文介绍了直流电机的速度控制原理,阐述了速度控制PIC16F877单片机作为主控元件,利用捕捉模块的特点,比较模块和在PIC16F877单片机模数转换模块将触发电路,并给出了程序流程图。系统具有许多优点,包括简单的结构,与主电路同步,稳定的移相和足够的移相范围,10000步控制的角度,对电动机的无级平滑控制,陡脉冲前沿,足够的振幅值,设定脉冲宽度,良好的稳定性和抗干扰性,并且成本低廉,这速度控制具有很好的实用价值,系统可以容易地实现。 关键词:单片机,直流电机的速度控制,控制电路,PI控制算法

1.简介 电力电子技术的迅速发展使直流电机的转速控制逐步从模拟转向数字,目前,广泛采用晶闸管直流调速传动系统设备(如可控硅晶闸管,SCR )在电力拖动控制系统对电机供电已经取代了笨重的F-D 发电机电动机系统,尤其是单片机技术的应用使速度控制直流电机技术进入一个新阶段。在直流调速系统中,有许多各种各样的控制电路。单片机具有高性能,体积小,速度快,优点很多,价格便宜和可靠的稳定性,广泛的应用和强劲的流通,它可以提高控制能力和履行的要求实时控制(快速反应)。控制电路采用模拟或数字电路可以实现单片机。在本文中,我们将介绍一种基于单片机PIC16F877单片机的直流电机速度控制系统的分类。 2.直流电机的调速原理 在图1中,电枢电压a U ,电枢电流a I ,电枢回路总电阻a R ,电机 常数a C 和励磁磁通Φ,根据KVL 方程,电机的转速为 Φ-= a a a a C R I U n a pN C 60= a a a a U R I U ≈- )1(63.0)(84.0)1()1()()1()(10--+-=--+-=k e k e k T k e a k e a k T k T d d d d i l T T Tf Kp a T T Kp a +==+ =10)1(

毕业设计外文翻译

毕业设计(论文) 外文翻译 题目西安市水源工程中的 水电站设计 专业水利水电工程 班级 学生 指导教师 2016年

研究钢弧形闸门的动态稳定性 牛志国 河海大学水利水电工程学院,中国南京,邮编210098 nzg_197901@https://www.sodocs.net/doc/b911677529.html,,niuzhiguo@https://www.sodocs.net/doc/b911677529.html, 李同春 河海大学水利水电工程学院,中国南京,邮编210098 ltchhu@https://www.sodocs.net/doc/b911677529.html, 摘要 由于钢弧形闸门的结构特征和弹力,调查对参数共振的弧形闸门的臂一直是研究领域的热点话题弧形弧形闸门的动力稳定性。在这个论文中,简化空间框架作为分析模型,根据弹性体薄壁结构的扰动方程和梁单元模型和薄壁结构的梁单元模型,动态不稳定区域的弧形闸门可以通过有限元的方法,应用有限元的方法计算动态不稳定性的主要区域的弧形弧形闸门工作。此外,结合物理和数值模型,对识别新方法的参数共振钢弧形闸门提出了调查,本文不仅是重要的改进弧形闸门的参数振动的计算方法,但也为进一步研究弧形弧形闸门结构的动态稳定性打下了坚实的基础。 简介 低举升力,没有门槽,好流型,和操作方便等优点,使钢弧形闸门已经广泛应用于水工建筑物。弧形闸门的结构特点是液压完全作用于弧形闸门,通过门叶和主大梁,所以弧形闸门臂是主要的组件确保弧形闸门安全操作。如果周期性轴向载荷作用于手臂,手臂的不稳定是在一定条件下可能发生。调查指出:在弧形闸门的20次事故中,除了极特殊的破坏情况下,弧形闸门的破坏的原因是弧形闸门臂的不稳定;此外,明显的动态作用下发生破坏。例如:张山闸,位于中国的江苏省,包括36个弧形闸门。当一个弧形闸门打开放水时,门被破坏了,而其他弧形闸门则关闭,受到静态静水压力仍然是一样的,很明显,一个动态的加载是造成的弧形闸门破坏一个主要因素。因此弧形闸门臂的动态不稳定是造成弧形闸门(特别是低水头的弧形闸门)破坏的主要原是毫无疑问。

计算机专业外文翻译

专业外文翻译 题目JSP Technology Conspectus and Specialties 系(院)计算机系 专业计算机科学与技术 班级 学生姓名 学号 指导教师 职称讲师 二〇一三年五月十六日

JSP Technology Conspectus and Specialties The JSP (Java Server Pages) technology is used by the Sun micro-system issued by the company to develop dynamic Web application technology. With its easy, cross-platform, in many dynamic Web application programming languages, in a short span of a few years, has formed a complete set of standards, and widely used in electronic commerce, etc. In China, the JSP now also got more extensive attention; get a good development, more and more dynamic website to JSP technology. The related technologies of JSP are briefly introduced. The JSP a simple technology can quickly and with the method of generating Web pages. Use the JSP technology Web page can be easily display dynamic content. The JSP technology are designed to make the construction based on Web applications easier and efficient, and these applications and various Web server, application server, the browser and development tools work together. The JSP technology isn't the only dynamic web technology, also not the first one, in the JSP technology existed before the emergence of several excellent dynamic web technologies, such as CGI, ASP, etc. With the introduction of these technologies under dynamic web technology, the development and the JSP. Technical JSP the development background and development history In web brief history, from a world wide web that most of the network information static on stock transactions evolution to acquisition of an operation and infrastructure. In a variety of applications, may be used for based on Web client, look no restrictions. Based on the browser client applications than traditional based on client/server applications has several advantages. These benefits include almost no limit client access and extremely simplified application deployment and management (to update an application, management personnel only need to change the program on a server, not thousands of installation in client applications). So, the software industry is rapidly to build on the client browser multilayer application. The rapid growth of exquisite based Web application requirements development of

电力电子技术的发展及应用

均是精品,欢迎下载学习!!! 电力电子技术的发展及应用 朱磊1侯振义1张开2 (空军工程大学电讯工程学院陕西西安710077) (南京理工大学动力工程学院江苏南京210000) 摘要:本文通过介绍电力电子技术的发展及应用,阐述了电力电子技术在国民经济中的重要作用,结合国家政策,描绘出我国电力电子行业的大好前景。 关键词:电力电子技术功率器件逆变能源 电力电子技术,又称功率电子技术。它主要研究各种电力电子器件,以及这些电力电子器件所构成的各种各样高效地完成对电能的变换和控制的电路或装置。它既是电子学在强电(高电压、大电流)或电工领域的一个分支,又是电工学在弱电(低电压、大电流)或电子领域的一个分支,总之是强弱电相结合的新学科。 1 电力电子技术的发展 电力电子技术的发展与功率器件的发展密切相关,1948年普通晶体管的发明引起了电子工业革命,1957年第一只晶闸管的问世,为电力电子技术的诞生奠定了基础。 1.1 电力电子技术的晶闸管时代 由于大功率硅整流器能够高效率的把工频交流电转变为直流电,因此在60年代和70年代,大功率硅整流管和晶闸管的开发与应用得到大发展,这一时期称之为电力电子技术的晶闸管时代。 1.2 电力电子技术的逆变时代 20世纪70年代,随着自关断器件的出现,电力电子技术进入了逆变时代。七十年代出现了世界范围的能源危机,交流电机变频调速因节能效果显著而迅速发展。在70年代到80年代,随着变频调速装置的普及,大功率逆变用的晶闸管、巨型功率晶体管(GTR)和门极可关断晶闸管(GT0)成为当时电力电子器件的主角。这时的电力电子技术已经能够实现整流和逆变,但工作频率较低,仅局限在中低频范围内。 1.3现代电力电子时代 80年代末期和90年代初期发展起来的以功率MOSFET和IGBT为代表的集高频、高压和大电流于一身的功率半导体复合器件,使以低频技术处理问题为主的传统电力电子学,向以高频技术处理问题为主的现代电力电子学转变创造了条件,表明传统电力电子技术已经进入现代电力电子时代。 这一时期,各种新型器件应用大规模集成电路技术,向复合化、模块化的方向发展,使得器件及结构紧凑、体积缩小,并且能够综合了不同器件的优点。在性能上,器件的容量不断增大,工作频率不断提高,目前,市场化的碳化硅器件达(3500V\1200A),智能功率模块达到(1200V\800A),在斩波器的PWM开关频率可达1MHz。 这一时期,各种新的控制方法得到了广泛应用,特别是现代电力电子技术越来越多地运用了人工智能技术。在所有人工智能学科中,神经网络将对电力电子学产生的影响最大,利用混合人工智能技术(神经一模糊,神经一遗传,神经一模糊一遗传,模糊一遗传)开发强大的智能控制以及估计方法,单个神经模糊专用集成芯片能承担无传感器矢量控制,且具有在线故障诊断和容错控制能力。基于人工智能的模糊控制在参数变化和负载转矩扰动的非线性反馈系统中可能可以提供最好的鲁棒性,在故障监测和故障耐力控制中将会起到越来越重要的作用。 2电力电子的技术应用 随着科技的不断发展和人们要求的不断提高,电力电子技术的应用越来越广泛。当今世界先进工业国家正处于由“工业经济”模式向“信息经济”模式转变的时期。电力电子技术作为信息产业与传统产业之间的桥梁,是在非常广泛的领域内改造传统产业、支持高新技术发展的基础。因此,电力电子技术将在国民经济中扮演着越来越重要的角色。

毕设外文文献翻译

xxxxxxxxx 毕业设计(论文)外文文献翻译 (本科学生用) 题目:Poduct Line Engineering: The State of the Practice 生产线工程:实践的形态 学生姓名:学号: 学部(系): 专业年级: 指导教师:职称或学位: 2011年3月10日

外文文献翻译(译成中文1000字左右): 【主要阅读文献不少于5篇,译文后附注文献信息,包括:作者、书名(或论文题目)、出版社(或刊物名称)、出版时间(或刊号)、页码。提供所译外文资料附件(印刷类含封面、封底、目录、翻译部分的复印件等,网站类的请附网址及原文】 Requirements engineering practices A precise requirements engineering process— a main driver for successful software development —is even more important for product line engineering. Usually, the product line’s scope addresses various domains simultaneously. This makes requirements engineering more complex. Furthermore, SPL development involves more tasks than single-product development. Many product line requirements are complex, interlinked, and divided into common and product-specific requirements. So, several requirements engineering practices are important specifically in SPL development: ? Domain identification and modeling, as well as commonalities and variations across product instances Separate specification and verification for platform and product requirements ? Management of integrating future requirements into the platform and products ? Identification, modeling, and management of requirement dependencies The first two practices are specific to SPL engineering. The latter two are common to software development but have much higher importance for SPLs. Issues with performing these additional activities can severely affect the product line’s long-term success. During the investigation, we found that most organizations today apply organizational and procedural measures to master these challenges. The applicability of more formal requirements engineering techniques and tools appeared rather limited, partly because such techniques are not yet designed to cope with product line evelopment’s inherent complexities. The investigation determined that the following three SPL requirements engineering practices were most important to SPL success. Domain analysis and domain description. Before starting SPL development, organizations should perform a thorough domain analysis. A well-understood domain is a prerequisite for defining a suitable scope for the product line. It’s the foundation for efficiently identifying and distinguishing platform and product requirements. Among the five participants in our investigation, three explicitly modeled the product line requirements. The others used experienced architects and domain experts to develop the SPL core assets without extensive requirements elicitation. Two organizations from the first group established a continuous requirements management that maintained links between product line and product instance requirements. The three other organizations managed their core assets’ evolution using change management procedures and versioning concepts. Their business did not force them to maintain more detailed links between the requirements on core assets and product instances. The impact of architectural decisions on requirements negotiations. A stable but flexible architecture is important for SPL development. However, focusing SPL evolution too much on architectural issues will lead to shallow or even incorrect specifications. It can cause core assets to ignore important SPL requirements so that the core assets lose relevance for SPL development. Organizations can avoid this problem by establishing clear responsibilities for requirements management in addition to architectural roles. The work group participants reported that a suitable organizational tool for balancing requirements and architecture is roundtable meetings in which requirements engineers,

相关主题