Abstract The Ubiquitous Communications project aims at
蓝牙室内定位服务的营销指南说明书

The Marketer’s Guide to Bluetooth® LE Indoor Location ServicesCREATING AMAZING ONSITE MOBILE EXPERIENCES WITH VIRTUAL BEACONSThe Marketer’s Guide to Bluetooth® LEIndoor Location ServicesCREATING AMAZING ONSITE MOBILE EXPERIENCES WITH VIRTUAL BEACONSLocation-based mobile marketing is a boon to every marketer tasked with delivering the right message to the right person at the right time. After all, there’s no better time to reach prospective customers than when they are nearby. And there’s no better way to provide personalized, targeted information than by combining what you already know about them with their current location inside your establishment.Most people are aware of the Global Positioning System (GPS), which is the defacto standard for location-based interaction when outdoors. It uses geofencing technology to trigger activities, such as push notifications, when a mobile device enters or leaves a virtual geographic boundary. However, GPS does not work when it comes to indoor location services. That is why a new technology, Bluetooth® Low Energy (BLE), has emerged to identify and engage with mobile employees, customers, and guests inside hotels, stores, convention centers, hospitals, and other establishments.If you’re reading this guide, chances are you’ve heard about Bluetooth® LE. Perhaps you’ve experimented with battery-powered BLE beacons, but struggled with the complexity of creating a complete solution from the disparate parts of different vendors. Maybe you ran a successful pilot, but when it came time to scale, your IT department said it would be too complicated and costly to manage.If so, you’re not alone. While indoor location using Bluetooth® LE has been around since Apple’s introduction of the iBeacon protocol in 2013, challenges with scalability, interoperability, and manageability have hampered large-scale adoption of this technology to date. Fortunately, this is all changing.New advancements in the wireless infrastructure, such as virtual beacons enabled by machine learning, have made Bluetooth®LE easy to deploy and operate at scale. In addition, the convergence of Wi-Fi and BLE has removed the need for an overlay network, making it more cost effective than ever to roll out indoor location services.We are in a new era of enterprise-grade, personalized, indoor-location services using BLE. Are you ready to take advantage of it? This paper will show you how.What you’ll learn:• Bluetooth® LE basics and common beaconing standards• T op use cases for BLE (e.g. analytics, wayfinding, proximity messaging and more)• Overcoming BLE deployment and management challenges• The Mist solution for BLE engagement• Getting startedTHE ABCS OF BLUETOOTH® LEBluetooth® is the ubiquitous communications technology we all use to connect our wireless headsets, keyboards, and hands-free systems to our smart phones and computers. Operating in the 2.4GHz band (the same as Wi-Fi), Bluetooth was designed for continuous streaming of voice and data over short distances, and comes standard in all modern mobile devices.Bluetooth® Low Energy (BLE) is a subset of the Bluetooth protocol introduced in 2011. Unlike classic Bluetooth’s continuous streaming, BLE was designed for transmitting short bursts of data. Because it stays in sleep mode until a connection is initiated, BLE consumes far less energy thanclassic Bluetooth. This energy efficiency is driving a new class of wireless devices and applications, from smart home sensors and wearables like Fitbits, to indoor-location beacons and proximity marketing.Beacons are devices that use Bluetooth ® LE to transmit short packetsthat are used for providing location-based information, such as proximitynotifications, location, and nearby items of interest. They can be usedfor anything from analyzing customer traffic patterns to providing turn-by-turn directions and delivering offers or other contextual informationbased on physical location. You can even turn your mobile phone into aBLE beacon for use cases such as letting the server in a restaurant knowyou would like another drink. There are two main protocols used for Bluetooth ® LE beaconing: iBeacon, introduced by Apple in 2013, and Eddystone, Google’s cross platform beaconing protocol that was launched in 2015. Both protocols work in a similar fashion by broadcasting a unique identifier that is picked up by a compatible app or operating system on the phone or other mobile devices, to determine its relative position at your location. (A third protocol, Altbeacon, was announced in July 2014 as an open source beacon protocol. It overcomes vendor tie-in, but lacks the widespread adoption of iBeacon and Eddystone.)It is worth pointing out that Bluetooth ® LE beacons are an opt-in solution. Mobile consumers grant permission to use their location information in exchange for content or services they consider valuable. Mobile devices must have Bluetooth ® and location services on, and either a mobile app configured for BLE, or Google Chrome installed (if you’re beacon is configured with Eddystone-URL). BLUETOOTH ®LE BEACON USE CASES ARE LIMITED ONLY BY YOUR IMAGINATION The more you integrate a mobile user’ location data with everything else you know about the user, the more personalized, valuable, and amazing the experience. With Bluetooth ® LE (BLE) now standard in all modern mobile devices (and expected to be in 90% of all devices by 2018), and more people enabling Bluetooth (required to pick up beacon signals) to communicate with their wireless peripherals, BLE beaconing is quickly moving from a nice-to-have to a must-have marketing technology in 2017.-- Boston Retail Partners surveyCompanies of all sizes are using BLE technology to gain tremendous insight into employee, customer, and guest behavior, and to offer helpful, convenient, and incredibly personalized new services. Here are just some of the use cases that are enabled with BLE indoor location services:Analytics – Gather zone-based user analytics, such as the average number of people in your establishment, the number of passersby, or the length of time each person spends at a particular display, area or department. Look at traffic patterns by time of day, day of week, or by season. Integrate with other data such as weather feeds and customer relationship management (CRM) to gain even greater insights.Wayfinding (Indoor Navigation) – A GPS-like navigation experience for indoor environments. Wayfinding typically offers turn-by-turn directions and a map showing the user moving toward his or her destination. Ideal for airports, hotels, casinos, tradeshows, events, malls, or any other large venue.Mobile DeviceBLE Tag Access PointPush Promotions – Consumers receive personalized notifications or offerson their smartphone, based on their proximity to a specific object—a storein a mall, or an aisle, product or brand once inside. Integrate with othercustomer data to deliver ever more personalized and relevant messages:Direct customers to a product they recently researched online, or promotea concert at a baseball game to a fan that follows the band.Proximity Messaging – Not all messages need be promotional. Providinghelpful information or additional content helps increase brand loyalty.Greet customers by name as they walk through the door. Provide specialoffers to premium guests. Offer customized information to museumpatrons or trade show guests as they approach a specific display or booth.Notify shoppers when their in-store purchases are ready for pickup.Personalized Experiences – Beacons coupled with other technology,such as RFID tags and digital signage, take personalization from theuser’s phone to the surrounding physical environment. Customers canbe greeted by name when they reach a specific display. Screens coulddisplay specific products of interest based on past purchases or even bythe products currently in their shopping carts. Even prices on digital tagscould change based on that customer’s loyalty points or stored coupons.Hyperlocal Check-in – Unlike Facebook or Foursquare, highly targeted check-ins enable consumers to tell you exactly where they are in your facility. This feature could be used in conjunction with specific location-based promotions or reward-based games, like a scavenger hunt.Employee Assistance – Find the closest sales associate for product inquiries or rapid checkout. Or enable your customers to direct an employee straight to them with the tap of a finger.Retargeting Ads – T argeting people who visit your website with ads on Facebook, Twitter and other sites that use retargeting is a powerfully cost-effective way to reserve your ad spend on people who have already indicated an interest in your business. Now imagine being able to do the same for people who walk into your store or other physical place of business.Virtual Concierges – Guests in a restaurant, mall, fitness club or other establishment can use their phones to order food and other services, which can be delivered right to their exact location.Asset Tracking – Is another popular use case for Bluetooth® LE beacons. Instead of broadcasting its ID to mobile devices, the beacon “listens” for the unique IDs of BLE tags attached to objects. Because these tags can be equipped with sensors—for things such as light, sound, movement and temperature—the applications are many, from tracking of wheelchairs and infusion pumps in a hospital, to monitoring the movement, speed and vibration of an airport baggage conveyor.Creative marketers in every industry are already dreaming up ways to leverage asset tracking to generate more revenue streams and increase productivity.BLE Engagement WayfindingProximity Messaging Real-time Location AnalyticsTRADITIONAL BLUETOOTH® LE DEPLOYMENT AND MANAGEMENT CHALLENGESWhile the use cases for Bluetooth® LE are compelling, historically it has been a challenge to deploy and operate large BLE networks in a cost-effective way. That is because the beaconing technology to date has required battery powered devices (i.e. transmitters), which create the following challenges:•Comprehensive site surveys are required to arrange and calibrate beacons for optimum performance and accuracy in a given environment.Want to move or add more beacons? Another site survey and recalibration is required. Because RF signals can be impacted by physical changes in the environment—such as new product displays, moved furniture, or even large influxes of people—the system will be plagued by poor performance until the beacons can be recalibrated. What retail store or event venue doesn’t change on a regular basis? Who has an IT staff capable of dealing with dynamic daily changes, like large groups of people, on demand?•High deployment costs. Many of the use cases above require alocation system with granular micro-location to deliver one to threemeter accuracy. This would requires thousands of beacons in a singlelocation, which creates substantial cost barriers.•Battery maintenance is problematic- While battery life has improved, alarge enterprise may deploy tens of thousands of beacons, distributedacross the globe. Locating and replacing dead batteries can be aweekly occurrence. The more you beacon to get accurate and timelylocation information, the faster you’ll be replacing batteries.I’m a battery-powered Beacon •Lack of enterprise-grade management means costly truck rollsand time-consuming manual processes. Physical beacons lack IPaddresses. As such, they can’t be identified by the network and bemanaged remotely by IT.•Aesthetics. Battery powered beacons are glued to the wall, often 25 feet apart. This can adversely impact the appearance of a location, which is often a nonstarter in hotels, museums, and other locations where aesthetics is important.•Risk of theft. Battery powered beacons can be stolen or knocked off the wall, creating additional management headaches.All told, a large enterprise can expect to pay approximately $300 per beacon in maintenance costs. Even if your use cases warranted the high cost, there is still the issue of inconsistent user experiences to consider. Differences in mobile device types (chipsets, OS, antenna, etc.), and dynamic changes to the RF environment—like that large influx of people-- can dramatically affect accuracy and user experience. Manual site surveys and RF calibrations simply cannot keep up.MIST VIRTUALIZES INDOOR LOCATIONFor indoor location services to truly take off, companies require BLE deployments that integrate with their existing networks, scale to handle millions of mobile devices, and automatically recalibrate for different device types and dynamic changes to the environment in real time.Fortunately, new solutions like the Mist Learning WLAN integrate BLE with Wi-Fi in a single A.I.-driven platform that is operated via the cloud.Unlike other WLANs that just integrate a single BLE beacon in anAccess Point and/or make it possible to monitor battery beacons viaa centralized management tool, Mist completely virtualizes the indoorlocation experience for maximum scale, performance, ease of use,and cost effectiveness. Here are the unique components of the Mistsolution:Access Points with directional BLE antenna array. The first step in a Bluetooth ® LE location service is to blanket the room with BLE signals. Rather than use physical beacons, Mist achieves this with a patented 16 element directional antenna array in Mist Access Points, which sends unique RF energy in multiple different directions. With BLE signals emanating from the AP, Mist eliminates the need for battery powered BLE beacons and lets mobile devices interact with an entire room instead of a single transmitter.Machine learning in the cloud. An iPhone 6s operate s very differentlythan an iPhone 5s or Samsung Galaxy on a wireless network. But knowingthat doesn’t make it any easier to recalibrate for every situation. T oaddress this, the Mist platform uses artificial intelligence to account fordifferences in devices, as well as constant changes to the RF environment—such as moving a chair, or adding a partition. It continuously takeslocation estimates from every-day use, examines them, detects the RFcharacteristics based on the actual input, and adapts the location formulato maximize accuracy.Machine learning operates across different end user device types,constructing specifically tailored path loss formulas. This is naturallynecessary as different devices have different RF characteristics. Bycontinuously and automatically adapting to different devices and changingRF environments, new Mist WLAN systems obviate the need for manualcalibration in BLE environments.Virtual Beacons. As mentioned above, Mist eliminates the need forbattery powered beacons by moving the Bluetooth ® LE beaconingfunctionality into the AP and using machine learning in the cloud. T oenable location-specific messages, Mist patented a new concept knownas virtual beacons. Virtual beacons use geofencing technology to allowspecific messages to be displayed anywhere on a floor plan (like GPS usesoutdoors). The message, range and location is completely configurableusing software – i.e. the Mist UI or APIs. With Mist, an unlimited numberof virtual beacons can be deployed in any physical environment, providingunsurpassed scalability and ease of use.The above technologies enable Mist to deliver 1-3m location accuracy with sub-second latency, making it ideal for all the use cases mentioned above. By integrating this functionality into an enterprise-grade WLAN platform, you save time and money on deployment and operations while ensuring maximum scalability and reliability.Machine Learning in the Cloud Patented Virtual BeaconsHOW TO START YOUR OWN INDOOR LOCATION JOURNEYNow that you understand the basics of Bluetooth ® LE and how to deploy a scalable solution, here is what you need to get started with indoor location services:A Bluetooth ® LE-enabled mobile appA mobile app with a compelling user experience is essential for a successful proof of concept. Y ou can start with a simple navigation or wayfinding app, or any number of readily available third-party apps designed specifically for your industry. If you have your own branded app, your beacon platform provider can supply your developers with the software developerkit (SDK) they’ll need to BLE-enable your app. You can also find expertBLE app development partners to help you customize your app or build one from the ground up.Indoor MapA digital map of your facility or campus is required for navigation andproximity marketing. Your POC use case will help you determine howextensive your initial indoor map needs to be. But you should alsoconsider what will be required and who will maintain your maps longterm. Indoor mapping and navigation vendors catering to a variety ofindustries can be found in the Mist BLE Alliance.Bluetooth ® LE beacon infrastructure and analyticsBeacons and accompanying software services are required for blue dotlocation and analytics. A few battery beacons are all you need to testpilot your application. However, we recommend you engage early withyour IT department, and an enterprise-grade BLE/Wi-Fi provider toensure your solution can scale.Management platformMost battery beacons are managed with a mobile app. When moving from POC to full-scale deployment, you may want to consider an enterprise-grade management system with machine learning and virtual beacon capabilities to avoid expensive overlay network management and unsatisfactory user experiences.YOUR CEO WILL THANK YOUThe wireless world is at a tipping point where every smartphone, tablet and laptop has BLE, making these devices ready for new indoor location-based services.Thanks to new modern wireless platforms with enterprise-grade BLE access points, machine learning in the cloud, and virtual beacon technology, the infrastructure is now ready to support the demand.The use cases for BLE are endless. Are you ready to take advantage of the enormous opportunity? Mist can help you with all the elements needed to deliver a great BLE user experience. Email *************and we will get you started.Mist Case Study。
Future internet The Internet of Things

Future Internet: The Internet of ThingsLu Tan Computer Science and Technology DepartmentEast China Normal UniversityShanghai, ChinaEmail: jackytan217@ Abstract. Nowadays, the main communication form on theInternet is human-human. But it is foreseeable that in a nearsoon that any object will have a unique way of identificationand can be addressed so that every object can be connected.The Internet will become to the Internet of Things. Thecommunicate forms will expand from human-human tohuman-human, human-thing and thing-thing (also calledM2M).This will bring a new ubiquitous computing andcommunication era and change people's life extremely. RadioFrequency Identification techniques (RFID) and relatedidentification technologies will be the cornerstones of theupcoming Internet of Things (IOT).This paper aims to show askeleton of the Internet of Things and we try to address someessential issues of the Internet of Things like its architectureand the interoperability, etc. At the beginning we describe anoverview of the Internet of Things. Then we give ourarchitecture design proposal of the Internet of Things and thenwe design a specific the Internet of Things application modelwhich can apply to automatic facilities management in thesmart campus. At last, we discuss some open questions aboutthe Internet of Things.Keywords-Internet 0/ Things; M2M; RFID; ubiqutiouscomputing; smart campus; automatic/acilities management. I. INTRODUCTIONTo date, the vast majority of Internet connectionsworldwide are devices used directly by humans, such ascomputers and mobile handsets. The main communicationform is human-human. In a not distant future, every objectcan be connected. Things can exchange information bythemselves and the number of "things" connected to theinternet will be much larger than the number of "people" andhumans may become the minority of generators andreceivers of traffic [I). We mix the physical world andinformation world together. The future is not going to bepeople talking to people; it's not going to be peopleaccessing information. It's going to be about using machinesto talk to other machines on behalf of people. We areentering a new era of ubiquity, we are entering the Internet ofThings era in which new forms of communication betweenhuman and things, and between things themselves will berealized. A new dimension has been added to the world ofinformation and communication technologies: from anytime,any place connectivity for anyone, we will have connectivityfor anything [2]. Fig.l shows this new dimension. Neng WangComputer Science and Technology Department East China Normal University Shanghai, China Email: nwang@• O n the roo v e • O utdoo r s a i n door s • Nghl • O n t he roo v e 'Dayt i me • O utdoo r s • I n do o r s f r om the PC) • AI the PC Figure 1. A new dimensionThere is no standard identification of "Internet of Things". Considering the functionality and identity as central it is reasonable to define the loT as "Things have identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environment, and user contexts". A different definition that puts the focus on the seamless integration could be formulated as "Interconnected objects having an active role in what might be called Future Internet" [3). A. Main Technologiesfor the Internet of Things The Internet of Things is a technological revolution that represents the future of computing and communications, and its development needs the support from some innovational technologies. Radio frequency identification (RFID) is seen as one of the pivotal enablers of the Internet of Things. Objects should be indentified so that they could be connected. RFID, which use radio waves to identifY items, can provide this function [4]. Sometimes RFID has been labeled as a replacement of bar code, but RFIO system can do much more than that. In addition to identifY items it also can track items in real-time to get important information about their location and status. RFID has already had some valuable applications in retail,health-care, facilities management [5], etc. A mature RFIDtechnology provides a strong support for the Internet of Things.One of the biggest breakthroughs of the Internet of Things is making the physical world and information world together. Sensors play a very important role to bridge the gap between the physical world and information world. Sensors collect data from their environment, generating information raising awareness about context. So the change � of t �eir environment can be monitored and the correspondIng thIngs can make some responses if needed [6].Nanotechnology and miniaturization can make embedded intelligence in things themselves which called smart dev .i �es. They can process information, self-configure, make . deCls �on independently, just until then there will be a real thIng-thIng communication.B. Trends From a long perspective, the development trend of the Internet of Things includes three steps: embedded intelligence, connectivity, interaction.Firstly, we have embedded intelligences which can do actions automatically. There already have been many applications, for example: the RFID tag embedded in food can record the information about the food and we can get the information by using a RFID reader; the washing machine controller can make washing machine complete its work automatically; engine controllers and antilock b �ake controllers for automobiles; inertial guidance system, flIght control hardware/software and other integrated systems in aircraft and missiles; artificial arms with semi-functional hands, etc[7]. Though all of those devices are intelligent, we can see that they only work alone and locally, there's nothing to do with "network".So the next step is making every smart device can be connected. From the smart connected devices viewpoint, smart devices are not smart because they are just endowed with agent capabilities and all the actions are pre-designed by human, they are smart because they are connected. Things can be connected wired or wirelessly. In the Internet of Things wireless connection will to be the main way. Base on the existed infrastructure, there are many ways to connect a thing: RFID, ZigBee, WPAN, WSN, DSL, UMTS, GPRS, WiFi, WiMax, LAN, WAN, 3G, etc. Connect smart things makes interaction possible.Even though we can connect anything does not mean things can communicate by themselves. So new smart things should be created which can process information, selfconfigure, self-maintain, self-repair, make independent decision, eventually even play an active role in their own disposal. Things can interact, they exchange information by themselves. So the form of communication will change from human-human to human-thing to thing-thing. As the Internet of Things is application driven, new business applications should be created which can improve the innovation and development of the Internet of Things [8].Fig.2 shows a rough development trend of the Internet of Things [9]. TecIvloiogy Reach TECHNOLOGY ROADMAP THE INTERNET O F THINGS Miniilturiz::rti o o, power. effie ent electronics: ar.d Soti'.�71rA a!JAA l i; ::In!1 advar.:ed sensor fu s o n av a i 'a bIB speClrum r.eoper,tio, and t.,pr�"nC8: Abii� ro manitor and control ds�nl obI<ds .Ab�jlyof P hys ic a l-Wor l d inDoors to recerJe Webgeoloc3tioosi�nals L"",lillY �eupk 'lid Cost reduct olllcLldinaa Ubiquitous Positionin g to diffusion nto 200 Wi1ve of applicatil)'rS Surveilance, security, h l!"l!lK:;m!.II;Ul s l lI l�, 1oocJ,,1.'y, """m enl Ocrn3l"<l'orcxpc<li:ed t.Qistics V8rtica ..:\4ark91 Applicafions RFIDIag.,or IJCiilatingrouting, invcnl OfYing , and loss p'evenloo SJpply.Choin Hdpcrs21100 2010 Figure 2. Trend of the Internet of Things II. ARCHITECTURE 2020 TilJlH Current Internet has a five-layered architecture, running with TCP/IP protocols, which has worked well for a long time. However, in the Internet of Things billions of objects are connected which will create much larger traffic and need much more data storages. In addition to these, there still have some other challenges like security, governance, etc. But today's Internet was designed in the 1970s for purposes that bear little resemblance to today's usage scenarios and related traffic patterns. Mismatches between original design and current utilization are now beginning to hamper the Internet's potential. In the BLED Declaration [10] and other supporting statements, they all point out this point. So it is reasonable and essential to design a new architecture for the Internet of Things. . Redesign a new architecture is a very complex proJect, which needs consider many factors like reliability, scalability, modularity, interoperability, interface, QoS, etc. About the architecture design of the Internet of Things, service-oriented architecture (SOA), exploiting integration with Internet and interfacing with wide ranging edge technologies and associated networks is a key objective. For this objective, we should consider embracing a fully inclusive range of "edge" technologies, including RFIO for interfacing with the physical world; exploiting evolving object-connected data capture technologies and networking capabilities-sensory, location local communication and security; integration with the evo l ving Internet and some other technique issues. In addition to these, we should also view the needs for governance, QoS, security, privacy and other socioeconomic issues. Anthony Furness gives us a proposal about the .Internet of Things' architecture [11]. Fig.3, FigA are from thIS proposaland they show us the Internet of Things with different level of edge technologies.Pass i ve RFID datacarr i ers and UIDPhysicalin t erface zone I nterroga t or IGatewaydevice I nterroga t or IGatewaydevice A pp li cation commandsand r es pon s es Wider area communicationsand NetworksFigure 3. Internet of Things-at its most basic leveldata Sensory dataPhysicalinterface zoneFurther l aye r s of Data Capture TechnologyIHost Gate wayInformation Wide r area dev i ce communicationsand Networks Figure 4. Internet of Things-including RFID and other edgetechnologiesThen he gives the architecture of the Internet of Things he has designed. Fig.5Networksupported servicesEdge ·techno l ogy data capture and NetworksF i xed and mobile commun i c a t i on protocols Applications layer Middleware Access Gateway layerFigure 5. Architecture of the Internet of ThingsThis is a good proposal which has given us a rough solution of the Internet of Things' architecture. But there still are some further important issues we should think about carefully. The first is if every object is connected and things can exchange information by themselves, then the traffic and storages in the network will increase very rapidly with an exponential way. Does today's Internet really can bear this? Do we need a new backbone? Connecting every object andmake them can communicate independently is a very attractive vision, and yes we can imagine many cases in future that a thing needs to "talk" to another thing, but is it real necessary that an object "talks" to all the other objects? Why a toothbrush needs to "talk" to a fridge? In fact, the main connections of an object are with those objects which are in the same the Internet of Things application system as it. And it is could be seen that the Internet of Things is made up of many the Internet of Things application systems. From this point of view, we can have a new seeing of the Internet of Things. Fi .6 shows us this new view oint. Figure 6. Internet of ThingsThe Backbone Network may be today's Internet, may be not or may be its expansion.Now the Internet of Things' application situation is there already have been many applications like EPC Global, sma;t hospital and so on which seem work well. But the problem IS these application systems work alone, a�d even thou�h I mentioned before that today an object maInly commUnIcate with another object who is in the same application system, but there's no doubt that the technical future is connecting every application system and with the gro.wth of the I�te';1et of Things the communication between dIfferent apphcatlO� systems will become more and more frequently for theIr collaboration. But as the lack of global standards, they may have used different standards and technologies, so the interoperability is a problem. Only if we can solve the interoperability problem we can have a re�1 the Intern.et of Things. The authors come up with a solutIon that addIng a Coordination Layer into the Internet of Things' architecture design. The coordination layer responses to process the structure of packages from different application systems and reassemble them to an unified structure which can be identified and processed by every application system. Of course if the standards of the Internet of Things are completed then the systems which based on the standa!ds will have no problem in interoperability, this problem eXIsts between the existed application systems and the new deployed systems, and between the existed ap�lication systems themselves. Based on all above, we . gIve .our architecture design proposal of the Internet of ThIngs.Flg.7 shows our design.Application LayerMiddleware LayerCoordination LayerBackbone Network LayerExisted aloneAccess LayerApplicationSystemEdge TechnologyLayerFigure 7. The Internet of Things' ArchitectureIII. A THE INTERNET OF THINGS APPLICATION INCOLLEGEThe Internet of Things is not a theory, it's an application technology which our life can benefit fro�. I� fact, in a I�ngterm the value of the internet of things eXIsts In some speCIfic application. Specific application solutions will be one of themost important engines of the innovation and development of the Internet of Things. it's application driven. Currently, there already have some successful appli�ations in different fields like retail, food, logistics, transportatIOn, etc.So far we have mentioned so many stuffs about the Internet of Th i ngs, but what a real the Inte�et of Thin?s �pplication system like? Here the authors desIgn an apphcatIo� modelfor the college campus facilities management USIng the Internet of Things technology and take it as an example toshow what a real the Internet of Things like and how it can benefit our life.In the college campus, there are many buildings, e.g. teaching buildings, office buildings, library; dinnin� h�lIs, etc. Almost every building has its own heatIng, ventIlatIng, air condition systems (HV A C) and elevator system, those devices should be managed and maintained but it's not easy to make this job well done. Now we can use the Inte';1et �f Things technology in campus facilities manage�ent. Flg.S �s the architecture of this pilot project we have desIgned for thiS kind of facilities management.InformationWorldSolid lines --Data FlowDashed lines --Control FlowBuilding Facilities Control SystemCommunication ManagerWi-FiCommunication ManagerFigure 8. Architecture for Facilities Management We deploy enough number of RFID tags in the building which can monitor the HVAC and elevators' behavior, collect information, sense the change of their environment。
the internet of things

自1997年起,国际电联发起了名为“对网络的挑战”互联网系列报告,本次报告《国际电信联盟ITU互联网报告2005:物联网》是该系列之七。
本报告由国际电联的战略和政策团队所写,报告所关注的是下一步通信中的新技术,如无限射频识别(RFID)和互连的网络设备的智能计算。
从轮胎到牙刷,各类物体在不久的将来会实现相互通信,这预示着一个新时代的黎明,也许就是今天的互联网让位于明天的互联网该报告共六章,具体内容如下:第一章,介绍物联网及其关键技术,如无处不在的网络,下一代网络,无处不在的计算。
第二章,应用技术,研究了将驱动物联网未来的技术,包括无线互联网,射频识别(RFID),传感器技术,智能物体,纳米技术和小型化;第三章,塑造市场,探讨了这些市场的技术潜力,以及抑制市场增长的因素,着眼于说明在特定的行业中物联网将改变传统的商业模式;第四章,新挑战,思索着障碍走向标准化和事物互联网的更广泛影响的社会,例如增加对隐私权的关注;第五章,世界发展中的机遇,提出了这些技术可能给发展中国家带来的好处,本身也成为导致用户和市场的驱动因素;第六章,用大框图将所有因素联系在一起,并得出未来10年我们的生活方式将发生怎样的改变。
About the Report (1)1 What is the Internet of Things? (2)2 Technologies for the Internet of Things (3)3 Market Opportunities (6)4 Challenges and Concerns (8)5 Implications for the Developing World (10)6 2020: A Day in the Life (12)7 A New Ecosystem (13)Table of Contents (16)About the Report“The Internet of Things” is the seventh in the series of ITU Internet Reports originally launched in 1997 under the title “Challenges to the Network”. This edition has been specially prepared for the second phase of the World Summit on the Information Society (WSIS), to be held in Tunis, 16-18 November 2005.Written by a team of analysts from the Strategy and Policy Unit (SPU) of ITU, the report takes a look at the next step in “always on” communications, in which new technologies like radio-frequency identification (RFID) and smart computing promise a world of networked and interconnected devices. Everything from tyres to toothbrushes might soon be in communications range, heralding the dawn of a new era; one in which today’s Internet (of data and people) gives way to tomorrow’s Internet of Things.The report consists of six chapters as follows:Chapter one,Introducing the Internet of Things, explores the key technical visions underlying the Internet of Things, such as ubiquitous networks, next-generation networks and ubiquitous computing;Chapter two, Enabling Technologies, examines the technologies that will drive the future Internet of Things, including radio-frequency identification (RFID), sensor technologies, smartthings, nanotechnology and miniaturization;Chapter three, Shaping the Market, explores the market potential of these technologies, as well as factors inhibiting market growth. It looks at new business models in selected industries to illustrate how the Internet of Things is changing the way firms do business;Chapter four, Emerging Challenges, contemplates the hurdles towards standardization and the wider implications of the Internet of Things for society, such as growing concerns over privacy;Chapter five, Opportunities for the Developing World, sets out some of the benefits these technologies offer to developing countries that may themselves become lead users and drivers of the market;Chapter six, The Big Picture, draws these threads together and concludes on how our lifestyles may be transformed over the next decade. The Statistical annex presents the latest data and charts for more than 200 economies worldwide in their use of ICTs.This Executive Summary, published separately, provides a synopsis of the full report, which is available for purchase (at the catalogue price of CHF 100) on the ITU website at www.itu.int/publications under General Secretariat.1 What is the Internet of Things?Over a decade ago, the late Mark Weiser developed a seminal vision of future technological ubiquity one in which the increasing “availability of processing power would be accompani ed by its decreasing visibilityWe are standing on the brink of a new ubiquitous computing and communication era, one that will radically transform our corporate, community, and personal spheres. Over a decade ago, the late Mark Weiser developed a seminal vision of future technological ubiquity – one in which the increasing “availability” of processing power would be accompanied by its decreasing “visibility”. As he observed, “the most profound technologies are those that disappear…they weave themselves in to the fabric of everyday life until they are indistinguishable from it”. Early forms of ubiquitous information and communication networks are evident in the widespread use of mobile phones: the number of mobile phones worldwide surpassed 2 billion in mid-2005. These little gadgets have become an integral and intimate part of everyday life for many millions of people, even more so than the internet.Today, developments are rapidly under way to take this phenomenon an important step further, by embedding short-range mobile transceivers into a wide array of additional gadgets and everyday items, enabling new forms of communication between people and things, and between things themselves. A new dimension has been added to the world of information and communication technologies (ICTs): from anytime, any place connectivity for anyone, we willnow have connectivity for anything (Figure 1).Connections will multiply andcreate an entirely new dynamic networkof networks – an Internet of Things. TheInternet of Things is neither sciencefiction nor industry hype, but is basedon solid technological advances andvisions of network ubiquity that arezealously being realized.2 Technologies for the Internet of ThingsThe Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to nanotechnology.First, in order to connecteveryday objects and devices tolarge databases and networks – andindeed to the network of networks(the internet) – a simple,unobtrusive and cost-effectivesystem of item identification iscrucial. Only then can data aboutthings be collected and processed.Radio-frequency identification(RFID) offers this functionality.Second, data collection will benefitfrom the ability to detect changes inthe physical status of things, using sensor technologies. Embedded intelligence in the things themselves can further enhance the power of the network by devolving information processing capabilities to the edges of the network. Finally, advances in miniaturization and nanotechnology mean that smaller and smaller things will have the ability to interact and connect (Figure 2). A combination of all of these developments will create an Internet of Things that connects the world’s objects in both a sensory and an intelligent manner.Indeed, with the benefit of integrated information processing, industrial products and everyday objects will take on smart characteristics and capabilities. They may also take on electronic identities that can be queried remotely, or be equipped with sensors for detecting physical changes around them. Eventually, even particles as small as dust might be tagged andnetworked. Such developments will turn the merely static objects of today into newly dynamic things, embedding intelligence in our environment, and stimulating the creation of innovative products and entirely new services.RFID technology, which uses radio waves to identify items, is seen as one of the pivotal enablers of the Internet of Things. Although it has sometimes been labelled as the next-generation of bar codes, RFID systems offer much more in that they can track items in real-time to yield important information about their location and status. Early applications of RFID include automatic highway toll collection, supply-chain management (for large retailers), pharmaceuticals (for the prevention of counterfeiting) and e-health (for patient monitoring). More recent applications range from sports and leisure (ski passes) to personal security (tagging children at schools). RFID tags are even being implanted under human skin for medical purposes, but also for VIP access to bars like the Baja Beach Club in Barcelona. E-government applications such as RFID in drivers’ licences, passports or cash are under consideration. RFID readers are now being embedded in mobile phones. Nokia, for instance, released its RFID-enabled phones for businesses with workforces in the field in mid-2004 and plans to launch consumer handsets by 2006.The Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to nanotechnology.In addition to RFID, the ability todetect changes in the physical status ofthings is also essential for recordingchanges in the environment. In this regard,sensors play a pivotal role in bridging thegap between the physical and virtualworlds, and enabling things to respond tochanges in their physical environment.Sensors collect data from theirenvironment, generating information andraising awareness about context. Forexample, sensors in an electronic jacketcan collect information about changes in external temperature and the parameters of the jacket can be adjusted accordingly.Embedded intelligence in things themselves will further enhance the power of the network.Embedded intelligence in things themselves will distribute processing power to the edges of the network, offering greater possibilities for data processing and increasing the resilience of the network.This will also empower things and devices at the edges of the network to take independent decisions. “Smart things” are difficult to define, but imply a certain processing power and reaction to external stimuli. Advances in smart homes, smart vehicles and personal robotics are some of the leading areas. Research on wearable computing (including wearable mobilityvehicles) is swiftly progressing. Scientists are using their imagination to develop new devices and appliances, such as intelligent ovens that can be controlled through phones or the internet, online refrigerators and networked blinds (Figure 3).The Internet of Things will draw on the functionality offered by all of these technologies to realize the vision of a fully interactive and responsive network environment.3 Market OpportunitiesThe technologies of the Internet of Things offer immense potential to consumers, manufacturers and firms. However, for these ground-breaking innovations to grow from idea to specific product or application for the mass market, a difficult process of commercialization is required, involving a wide array of players including standard development organizations, national research centres, service providers, network operators, and lead users (Figure 4).From their original inception and throughout the R&D phase, new ideas and technologies must find champions to take them to the production phase. The time to market, too, requires key “lead users” that can push the innovation forward. To date, the technologies driving the Internet of Things are notable for the strong involvement of the private sector, e.g. through industry fora and consortia. Yet public sector involvement is growing, through national strategies for technical development (e.g. nanotechnology) and in sector-specific investments in healthcare, defence or education.RFID is the most mature of the enabling technologies with established standardization protocols and commercial applications reaching the wider market. The global market for RFIDproducts and services is growing fast, with sizeable revenues of between USD 1.5-1.8 billion by 2004. However, this is dwarfed by the total revenues expected over the medium- to long-term, with the spread of smart cards and RFID in all kinds of consumer products, including mobile phones.Changing business strategies is the name of the game…Wireless sensor networks are widely used in industries such as automotive, homeland security, medical, aerospace, home automation, remote monitoring, structural and environmental monitoring. Estimates of their market potential vary (partly due to different definitions), but analysts forecast that as their unit price falls, the number of units deployed will grow significantly. Meanwhile, robotics is expanding into new markets. At present, the market share of industrial robotics is larger than that of personal and service robotics, but this is set to change, as the personal robotics segment is expected to lead future market growth.Changing business strategies is the name of the game, in particular in the retail, automotive and telecommunication industries. Firms are embracing the underlying technologies of the Internet of Things to optimize their internal processes, expand their traditional markets and diversify into new businesses.4 Challenges and ConcernsBuilding on the potential benefits offered by the Internet of Things poses a number of challenges, not only due to the nature of the enabling technologies but also to the sheer scale of their deployment. Technological standardization in most areas is still in its infancy, or remains fragmented. Not surprisingly, managing and fostering rapid innovation is a challenge for governments and industry alike. Standardization is essential for the mass deployment and diffusion of any technology. Nearly all commercially successful technologies have undergone some pro cess of standardization to achieve mass market penetration. Today’s internet and mobile phones would not have thrived without standards such as TCP/IP and IMT-2000.Successful standardization in RFID was initially achieved through the Auto-ID Center and now by EPC Global. However, efforts are under way in different forums (ETSI, ISO, etc...) and there have been calls for the increased involvement of ITU in the harmonization of RFID protocols. Wireless sensor networks have received a boost through the work of the ZigBee Alliance, among others. By contrast, standards in nanotechnology and robotics are far more fragmented, with a lack of common definitions and a wide variety of regulating bodies.One of the most important challenges in convincing users to adopt emerging technologies is the protection of data and privacy. Concerns over privacy and data protection are widespread, particularly as sensors and smart tags can track users’ movements, habits and ongoing preferences. When everyday items come equipped with some or all of the five senses (such as sight and smell) combined with computing and communication capabilities, concepts of data request and data consent risk becoming outdated. Invisible and constant data exchange between things and people, and between things and other things, will occur unknown to the owners and originators of such data. The sheer scale and capacity of the new technologies will magnify this problem. Who will ultimately control the data collected by all the eyes and ears embedded in the environment surrounding us?Public concerns and active campaigns by consumers have already hampered commercial trials of RFID by two well-known retailers. To promote a more widespread adoption of the technologies underlying the Internet of Things, principles of informed consent, data confidentiality and security must be safeguarded. Moreover, protecting privacy must not be limited to technical solutions, but encompass regulatory, market-based and socio-ethical considerations (Figure 5). Unless there are concerted efforts involving all government, civil society and private sector players to protect these values, the development of the Internet of Things will be hampered if not prevented. It is only through awareness of these technological advances, and the challenges they present, that we can seize the future benefits of a fair and user-centric Internet of Things.When everyday items come equipped with some or all of the five senses… combined with computing and communication capabilities, concepts of data request and data consent risk becoming outdated.5 Implications for the Developing WorldThe technologies discussed in this report are not just the preserve of industrialized countries. These technologies have much to offer for the developing world and can lead to tangible applications in, inter alia, medical diagnosis and treatment, cleaner water, improved sanitation, energy production, the export of commodities and food security.In line with the global commitment to achieving the Millennium Development Goals (MDGs), the World Summit on the Information Society (WSIS) focuses on ICT development through the creation of national e-strategies, the guarantee of universal, ubiquitous, equitable and affordable access to technology and the wider dissemination and sharing of information and knowledge. WSIS commitments go far beyond technological diffusion –there is a pledge for common action towards poverty alleviation, the enhancement of human potential and overall development through communication technologies and related emerging technologies. In this regard, the technologies underlying the Internet of Things offer many potential benefits.One does not have to look far to find examples. In the production and export of commodities, sensor technologies are being used to test the quality and purity of different products, such ascoffee in Brazil and beef in Namibia. RFID has been used to track shipments of beef to the European Union to verify their origin, integrity and handling – essential given present trends in food tracability standards. Such applications help ensure the quality and market expansion of commodities from developing countries.The enabling technologies of the Internet of Things have much to offer developing countries in their goals for improving quality of lifeThe enabling technologies of the Internet of Things have much to offer developing countries in their goals for improving quality of life.Nanofilters in Bangladesh are removing pollutants and ensuring that water is safe to drink. Nano-sensors can be used to monitor water quality at reduced cost, while nanomembranes can assist in the treatment of wastewater. Research is under way to apply nanotechnology in the diagnosis and treatment of disease, including the diagnosis of HIV and AIDS, as well as nano-drugs for other diseases. Emerging technologies could also improve the quality and reliability of conventional drugs for the developing world: RFID, for example, can track the origin of safe drugs thereby reducing counterfeit.Sensor technologies can monitor vulnerable environments and prevent or limit natural disasters. Extensive and effective systems are needed to ensure early warning and evacuation, thereby reducing loss of life due to natural disasters. Special robots have for instance been used for mine detection to save lives and limbs in conflict zones. Commercial applications are already beingdeployed in countries like India, Thailand and Turkey, among others.Next-generation communication technologies may well originate in the larger growth markets of the developing world –China and India, in particular. The substantial research programmes currently being undertaken by these developing giants mean that the implementation of the Internet of Things will be adapted to local conditions and circumstances, as well as to international trade. Wal-Mart, for instance, now requires its suppliers to be RFID-compliant. In 2002, Wal-Mart sourced billions of dollars worth of products from China, i.e. around 12% of the total value of US imports from China during that year. Not surprisingly, China is rapidly preparing itself to become a leader in RFID deployment. Far from being passive followers of the Internet of Things, the developing world stands to greatly influence the implementation and widespread adoption of these emerging technologies.6 2020: A Day in the LifeBut what does the Internet of Things mean in a practical sense for a citizen of the future? Let us imagine for a moment a day in the life of Rosa, a 23-year-old student from Spain, in the year 2020.Rosa has just quarrelled with her boyfriend and needs a little time to herself. She decides to drive secretly to the French Alps in her smart Toyota to spend a weekend at a ski resort. But itseems she must first stop at a garage – her car's RFID sensor system (required by law) has alerted her of possible tyre failure. As she passes through the entrance to her favourite garage, a diagnostic tool using sensors and radio technology conducts a comprehensive check of her car and asks her to proceed to a specialized maintenance terminal. The terminal is equipped with fully automated robotic arms and Rosa confidently leaves her beloved car behind in order to get some coffee. The “Orange Wall” beverage machine knows all about Rosa’s love of iced cof fee and pours it for her after Rosa waves her internet watch for secure payment. When she gets back, a brand new pair of rear tyres has already been installed with integrated RFID tags for monitoring pressure, temperature and deformation.What does the Internet of Things mean in a practical sense for a citizen of the future?The robotic guide then prompts Rosa on the privacy-related options associated with the new tyres. The information stored in her car’s control system is intended for maintenance purpos es but can be read at different points of the car journey where RFID readers are available. However, since Rosa does not want anyone to know (especially her boyfriend) where she is heading, such information is too sensitive to be left unprotected. She therefore chooses to have the privacy option turned on to prevent unauthorized tracking.Finally, Rosa can do some shopping and drives to the nearest mall. She wants to buy that new snowboard jacket with embedded media player and weather-adjusting features. The resort she is heading towards uses a network of wireless sensors to monitor the possibilities of avalanches so she feels both healthy and safe. At the French-Spanish border, there is no need to stop, as Rosa’s car contains information on her driver’s li cence and passport which is automatically transmitted to the minimal border control installations.Suddenly, Rosa gets a video-call on her sunglasses. She pulls over and sees her boyfriend who begs to be forgiven and asks if she wants to spend the weekend together. Her spirits rise and on impulse she gives a speech command to the navigation system to disable the privacy protection, so that her boyfriend’s car might find her location and aim directly for it. Even in a world full of smart interconnected things, human feelings continue to rule.7 A New EcosystemThe internet as we know it is transforming radically. From an academic network for the chosen few, it became a mass-market, consumer-oriented network. Now, it is set to become fully pervasive, interactive and intelligent. Real-time communications will be possible not only by humans but also by things at anytime and from anywhere. The advent of the Internet of Things will create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities whilst providing new revenue opportunities for a host of enterprising businesses.The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players (Figure 6). These players have to operate within a constantlyevolving economic and legal system, which establishes a framework for their endeavours. Nevertheless, the human being should remain at the core of the overall vision, as his or her needs will be pivotal to future innovation in this area. Indeed, technology and markets cannot exist independently from the over-arching principles of a social and ethical system. The Internet of Things will have a broad impact on many of the processes that characterize our daily lives, influencing our behaviour and even our values.For the telecommunication industry, the Internet of Things is an opportunity to capitalize on existing success stories, such as mobile and wireless communications, but also to explore new frontiers. In a world increasingly mediated by technology, we must ensure that the human core to our activities remains untouched. On the road to the Internet of Things, this can only be achieved through people-oriented strategies, and tighter linkages between those that create technology and those that use it. In this way, we will be better equipped to face the challenges that modern life throws our way.Technology and markets cannot exist independently of the over arching principles of a social and ethical systemStatistical Annex: Mobile market data for top 20 economies (ranked by total subscriber numbers) as at 31 December 2004Total subscribers, penetration rate, proportion of which are 3G (IMT-2000) subscribers and price of OECD low-user basket in USD* 3G mobile or IMT-2000 , as defined by ITU includes subscribers to commercially available services using CDMA 2000 1x, CDMA 2000 1x EV-DO and W-CDMA standards.** Limited mobility Wireless Local Loop service available, for which WLL 9,921,780 subscribers at 31 December 2004.Statistical Annex: Broadband market data for top 20 economies (ranked by broadband penetration) as at 31 December 2004Total subscribers, penetration rate, as percentage of total internet subscribers and price in USD per 100 kbps。
监控技术是福是祸英语作文

监控技术是福是祸英语作文Surveillance Technology: A Double-Edged SwordThe rapid advancement of technology has brought about a myriad of changes in our daily lives, and one of the most significant developments has been the proliferation of surveillance technology. From security cameras in public spaces to the ubiquitous presence of smartphones and the internet, our every move is being monitored and recorded. This has led to a heated debate over the merits and drawbacks of this technology, with proponents arguing that it enhances safety and security, while critics contend that it infringes on personal privacy and civil liberties.On the positive side, surveillance technology has undoubtedly played a crucial role in maintaining public order and preventing crime. Security cameras installed in high-risk areas have proven to be effective deterrents, as potential criminals are aware that their actions are being monitored and can be easily identified. This has led to a decrease in the incidence of vandalism, theft, and other forms of criminal activity in these areas. Moreover, the footage captured by these cameras has often been instrumental in solving crimes, providing law enforcement with vital evidence that can lead to theapprehension and conviction of offenders.In the wake of terrorist attacks and other acts of violence, the importance of surveillance technology has become even more pronounced. Governments and law enforcement agencies have increasingly relied on advanced surveillance systems, such as facial recognition software and data mining techniques, to identify and track potential threats. This has enabled them to thwart numerous plots and prevent countless lives from being lost. The ability to monitor the movements and communications of suspected individuals has been a valuable tool in the fight against terrorism and other forms of organized crime.Furthermore, surveillance technology has also been beneficial in the realm of public health and safety. During the COVID-19 pandemic, for instance, contact tracing apps and thermal imaging cameras have been used to identify and isolate infected individuals, helping to slow the spread of the virus and protect vulnerable populations. Similarly, in the event of natural disasters or other emergencies, surveillance systems can be utilized to monitor the situation, coordinate rescue efforts, and ensure the well-being of affected communities.However, the widespread use of surveillance technology has also raised significant concerns about privacy and civil liberties. Many individuals feel that their right to privacy is being compromised, astheir every action and interaction is being recorded and potentially accessed by authorities or private entities. This has led to a growing sense of unease and a fear of being constantly under scrutiny, which can have a detrimental impact on personal freedom and the overall quality of life.Moreover, there are valid concerns about the potential for abuse and misuse of surveillance data. Authoritarian regimes and oppressive governments have been known to use surveillance technology to monitor and suppress dissent, target minority groups, and maintain a stranglehold on power. Even in democratic societies, there have been instances where surveillance data has been used for nefarious purposes, such as political espionage, discrimination, and the infringement of individual rights.Another issue that has come to the forefront is the lack of transparency and accountability surrounding the use of surveillance technology. In many cases, the public is unaware of the extent and nature of the surveillance measures being implemented, and there is a lack of clear guidelines and oversight mechanisms to ensure that these technologies are being used responsibly and ethically. This has led to a growing demand for greater transparency and the establishment of robust regulatory frameworks to protect the rights of citizens.Furthermore, the increasing reliance on artificial intelligence and algorithmic decision-making in surveillance systems has raised concerns about bias, accuracy, and the potential for discrimination. Algorithms can perpetuate and amplify existing societal biases, leading to disproportionate targeting and monitoring of certain groups, such as racial minorities and marginalized communities. This can further exacerbate existing inequalities and undermine the principles of fairness and equal treatment under the law.In conclusion, the debate over the role of surveillance technology in our society is a complex and multifaceted one. While it has undoubtedly provided valuable benefits in terms of public safety, security, and emergency response, the potential for abuse and the infringement of civil liberties cannot be ignored. As we continue to navigate this rapidly evolving technological landscape, it is crucial that we strike a delicate balance between the need for security and the preservation of individual privacy and freedom. This will require a collaborative effort between policymakers, technology experts, civil society organizations, and the general public to develop robust ethical frameworks and regulatory mechanisms that ensure the responsible and accountable use of surveillance technology. Only then can we fully harness the potential of this technology while safeguarding the fundamental rights and liberties that are the cornerstone of a free and democratic society.。
科技英语中英文对照翻译

mobile and cellular radio移动和细胞广播in comparison to the relative stability and modest technical developments which are occurring in long haul wideband microwave communication systems there is rapid development and expanding deployment of new mobile personal communication system. These rang from wide coverage area pagers,for simple data message transmission,which employ common standards and hence achieve contiguous coverage over large geographical areas,such as all the major urban centres and transport routes in Europe,Asia or the continental USA.This chapter discusses the special channel characteristics of mobile systems and examines the typical cellular clusters adopted to achieve continuous communication with the mobile user.It then highlights the important properties of current,and emerging,TDMA and code division multiple access(CDMA), mobile digital cellular communication systems.Private mobile radioTerrestrial mobile radio works best at around 250 MHz as lower frequencies than this suffer from noise and interference while higher frequencies experience multipath propagation from buildings,etc,section 15.2.In practice modest frequency bands are allocated between 60MHz and 2GHz. Private mobile radio(PMR) is the system which is used by taxi companies,county councils,health authorities,ambulance services,fire services,the utility industries,etc,for mobile communications.PMR has three spectral at VHF,one just below the 88 to 108 MHz FM broadcast band and one just above this band with another allocation at approximately 170MHz.There are also two allocations at UHF around 450MHz. all these spectral allocations provide a total of just over 1000 radio channels with the channels placed at 12KHz channel spacings or centre frequency offsets. Within the 12khz wide channal the analogue modulation in PMR typically allows 7khz of bandwidth for the signal transmission.when further allowance is made for the frequency drift in the oscillators of these systems a peak deviation of only 2 to 3 khz is available for the speech traffic. Traffic is normally impressed on these systems by amplitude modulation or frequency modulation and again the receiver is of the ubiquitous superheterodyne design,Figure 1.4. A double conversion receiver with two separate local oscillator stages is usually required to achieve the required gain and rejection of adjacent channel signals.One of the problems with PMR receiver is that they are requiredto detect very small signals,typically—120dBm at the antenna output,corresponding to 0.2 uV,and,after demodulating this signal,produce ann output with perhaps 1W of audio equipment, the first IF is normally at10.7MHz and the second IF is very orten at 455KHz . unfortunately,with just over 1000 available channels for the whole of the UK and between 20000and30000issued licences for these systems,it is inevitable that the average busuness user will have to share the allocated channel with other companies in their same geographical area.There are various modes of operation for mobile radio communications networks, the simplest of which is singal frequency simplex. In simplex communication, traffic is broadcast, or one way. PMR uses half duplex(see later Table 15.3) where, at the end of each transmission period, there is a handover of the single channel to the user previously receiving, in order to permit them to reply over the same channel. This is efficient in that it requires only one frequency allocation for the communication link but it has the disadvantage that all units canhear all transmissions provided they are within rage of the mobile and frequencies are allocated for the transmissions. One frequency is used for the forward or downlink, namely base-to-mobile communications. This permits simultaneous two-way communication and greatly reduces the level of interference, but it halves other’s transmissions, which can lead to contention with two mobiles attempting to initiate a call, at the same time, on the uplink in a busy syetem.Although PMR employs relatively simple techniques with analogue speech transmission there have been many enhancements to these systems over the years . Data transmission is now in widespread use in PMR systems using FSK modulation. Data transmission also allows the possibility of hard copy graphics output and it gives direct access to computer services such as databases, etc. Data prembles can also be used, in a selective calling mode, when initiating a transmission to address a special receiver and thus obtain more privacy within the system.15.4.5 Trunked radio for paramilitary use集群无线电的军事使用Another related TDMA mobile radio standard is the European trunked radio(TETRA)network which has been developed as part of the public safety radio communications service(PSRCS) for use by police, utilities, customs office, etc. TETRA in fact is part of wider international collaborations for paramilitary radio use.In these portable radios there is a need for frequency hopping (FH) to give an antieavesdropping capability and encryption for security of transmission to extend military mobile radio capabilities to paramilitary use, i.e. for police, customs and excise offices, etc. these capabilities are included in the multiband interteam radio for the associated public safety communications office in the USA while Europe has adopted the TETRA standard.TETRA is essentially the digital TDMA replacement of the analogue PMR systems. The TETRA standard has spectrum allocations of 380 to 400 and 410 to 430MHz, with the lower band used for mobile transmissions and the upper band for base station use. TETRA mobile have 1 W output power and the base stations 25 W using error with the data throughput rate varying, to meet the required quality of service. TETRA can accommodate up to four users each with a basic speech or data rate of 7.2kbit/s. with coding and signaling overheads, the final transmission rate for the four-user slot is 36 kbit/s. this equipment is large and more sophisticated than a commercial cell phone, and it sells for a very much higher price becase the production runs are much small. However, its advanced capabilities are essential for achieving paramilitary communications which are secure from eavesdropping.15.5 Code division multiple accessAnalogue communication systems predominantly adopt frequency division multiple access (FDMA), where each subscriber is allocated a narrow frequency slot within the available channel. The alternative TDMA(GSM) technique allocates the entire channel bandwidth to a subscriber but constrains the subscriber but constrains the subscriber to transmit only regular short bursts of wideband signal. Both these accessing techniques are well established for long haulterrestrial, satellite and mobile communications as they offer very good utilization of the available bandwidth.15.5.1The inflexibility of these coordinated accessing techniques has resulted in the development of new systems based on the uncoordinated spread spectrum concept. In these systems the bits of slow speed data traffic from each subscriber are deliberately multiplied by a high chip rate spreading code, forcing the low rate (narrowband data signal) to fill a wide channel bandwidth.15.7.2 3G systemsThe evolution of the third generation (3G)system began when the ITU produce the initial recommendations for a new universal mobile telecommunications system(UMTS)[www.] The 3G mobile radio service provides higher data rate services ,with a maximum data rate in excess of 2Mbit/s, but the achievable bit rate is linked to mobility. Multimedia applications encompass services such as voice, audio/video, graphics, data, Internet access and e-mail. These packet and circuit switched services have to be supported by the radio interface and the network subsystem.Several radio transmission technologies(RTT) were evaluated by the ITU and adopted into the new standard, IMT-2000. the European standardization body for 3G, the ETSI Special Mobile Group, agreed on a radio access scheme for 3G UMTS universal terrestrial radio access(UTRA) as an evolution of GSM. UTRA consists of two modes : frequency division duplex(FDD) where the uplink and downlink are transmitted on different frequencies; and time division duplex(TDD) where the uplink and downlink are time multiplexed onto the same carrier frequency. The agreement assigned the unpaired bands (i.e. for UTRA TDD ). TD-CDMA is a pure CDMA based system. Both modes of UTRA have been harmonised with respect to basic system parameters such as carrier spacing, chip rate and frame length to ensure the interworking of UTRA with GSM.The 3G proposal were predominantly based wideband CDMA(WCDMA) and a mix of FDD and TDD access techniques. WCDMA is favoured for 3G in poor propagation environments with a mix of high modest speed data traffic. It is generally accepted that CDMA is the preferred accesstechnique and, with the increase in the data rate, then the spreading modulation needs to increase to wideband transmission.WCDMA is based on 3.84Mchip/s spreading codes with spreading ratio, i.e. , K values, of 4-256 giving corresponging data ratas of 960-15 kbit/s. the upper FDD uplink band I from 1920-1980 MHz is paired with a 2110-2170 MHz downlink. In addition uplink bands II & III at 1850-1910 MHz and 1710-1785 MHz are also paired, respectively, with 1930-1990 MHz and 1805-1880 MHz allocations. the system is configured on a 10 ms frame with 15 individual slots to facilitate TDD as well as FDD transmissions. TDD is more flexible as time-slots can be dynamically reassigned to uplink and downlink functions, as required for asymmetric transfer of large files or video on demand traffic. 3G WCDMA systems use an adaptive multirate speech coder with encoded rates of 4.75-12.2 kbit/s. receivers commonly use the easily integrated direct conversion design, in place of the superheterodyne design . receiver sensitivities are typically -155dBm.The 3GPP2 standard aims to achieve a wide area mobile wireless packet switched capability with CDMA2000 1×EV DO revision A (sometimes called IS-856A). Here 1×refers to the single carrier 1.25 Mchip/s system. It achieves a 3.1 Mbit/s downlink and a delay sensitive services. The 3GPP standard has gone through many release with R4 in 2001 which introduced packet data services and R6 in 2005 to further increase the available data transmission rate . R6 pioneers the use of high-speed downlink packet access and multimedia broadcast multicast services which offer reduced delays and increased uplink data rates approaching 6 Mbit/s.In parallel with the European activities extensive work on 3G mobile radio was also performed in Japan. The Japanese standardisation body also chose WCDMA, so that the Japanese and European proposals for the FDD mode were already aligned closely. Very similar concepts have also been adopted by the North American standardization body.In order to work towards a global 3G mobile radio standard, the third generation partnership project(3GPP), consisting of members of the standardization bodies in Europe, the USA, Japan, Korea and China, was formed. It has merged the already well harmonized proposals of the regional standardization bodies to work on a common 3G international mobile radio standard, still called UTRA. The 3GPP Project 2(3GPP2), on the other hand, works towards a 3G mobile radio standard based on cdmaOne/IS-95 evolution, originally called CDMA2000.比起相对稳定、适度的技术发展是发生在宽带微波通信系统,有长期快速发展和扩大部署的新的移动个人通讯系统。
信息技术专业外语单词汇总

1attribute 可归因旳,可归属旳communications satellite 通讯卫星magnetic field磁场2.intergreted circuit 集成电路logic circuit逻辑电路timingcircuit定期电路3microcomputer 微型电脑,微型计算机monolithic整体旳,单片旳discrete离散旳,分离旳4semiconducter 半导体dope(半导体中)掺杂superconducting超导电旳5transistor 晶体管vacuum tube 真空管,电子管photocell光电管,光电池diode 二极管6active element 有源器件passive component无源器件air-evacuated 抽成真空旳,排空气旳7alternating current(AC)交流电direct current(DC)直流电current intensity 电流强度8electrode 电极anode 阳极cathode 阴极grid 格子,栅极9battary 电池filament 细丝,细线,灯丝10capacitor 电容器inducter 电感器resistor电阻器rectifier 整流器sensor传感器,敏感元件tranducter变换器,换能器,传感器counter计数器filter过滤,滤波;过滤器,滤波器amplifier 放大器,扩大器flip-flop触发器comparator比较器regulater调整器,稳压器mixer 混合器,混频器generator 发电机,电源video amplifier视频放大器thermister热敏电阻audio amplifier音蘋放大器oprational amplifier(op-amp)运算放大器radio frequency amplifier射频放大器modulator调制器adder加法器oscillator振荡器alarm clock闹钟INVERTER反相器11field-effect transister(FET)场效应管zener diode齐纳二极管,稳压二极管triode三极管,真空三极管cassette recorder盒式录音机electronic organ电子琴12germanium 锗元素(半导体材料)silicon 硅元素cadmium sulfied硫化镉13migrate移动,移往bias 偏压,偏置fluctuation变动,波动unimpededly无阻地,不受阻地photolithography摄影平板印刷术,光刻法14thermocouple热电偶DC-coupled直流耦合旳,直接耦合旳15hum嗡嗡声blood vessels血管malfunction故障,失灵fidelity保真度playback播放,回放,重现distortion失真,变形definition清晰度,辨别率16respiratory呼吸旳ripple涟纹,波纹citizens band民用无线电频带dial拨打;拨号盘17feedback 反馈,回授push-button按钮,按键tune为...调谐,对准频率warning system报警系统18AND gate“与”门OR gate“或”门Boolean algebra布尔代数19completary metal oxide semiconductor(CMOS)logistic互补型金属-氧化物-半导体(CMOS)逻辑(电路)20emitter coupled logic(ECL)发射极耦合逻辑()电路21obsolate荒废旳,陈旧旳,失去时效旳22resistor-transisiorlogic(RTC)电阻-晶体管逻辑(电路)23transistor-transistor logic(TTC)晶体管-晶体管逻辑(电路)24CT(Computer Tomography)计算机断层造影术,CT检查25discreminate区别,辨别,差异待遇26very-large-scale integrated(VLSL)circuit超大规模集成电路➢amplitude-modulation幅度调制旳,调幅旳anomalous不规则旳,反常旳disturbance扰乱,干扰➢electromagnetic wave电磁波frequency modulation(FM)频率调制,调频ionosphere电离层➢oscillation振荡propagation传播receiver接受机,接受器transmitter发射机,发射器➢amplitude modulation(AM)幅度调制,调幅alternating current(AC)交流电,交流电流➢amplifier放大器antenna天线,触角buffer缓冲器capacitance电容(量)carrier载波➢coaxial cable同轴电缆condencer电容器demodulation解调detection检波double加倍,倍频➢electron tube电子管fidelity保真度inductance电感(量)intelligibility清晰度,可读度,可识度magnetron磁控管modulator调制器phase modulation(PM)相位调制,调相➢quartz crystal石英晶体reflex klystron反射速调管superheterodyne超外差式(旳)➢tank circuit槽路,谐振电路transducer传感器acoustic听觉旳,声学旳,音响学旳➢agitation搅动,激动,骚动attenuation衰弱,减小automatic volum control自动音量控制➢cross modulation交叉调制,交叉干扰direct current(DC)直流电,直流电流➢discriminator鉴别器,鉴频器,鉴相器distortion变形,失真filament细丝,灯丝➢filter过滤,滤波,滤波器harmonic谐波(旳),泛波(旳)inasmuch as由于,由于➢integrated circuit集成电路radio-detector无线电探测器,检波器rectify整流,检波➢selectivity选择性sensitivity敏捷度shield防护,屏蔽solid-state electronic device固体电子器件speaker cone喇叭筒static静电干扰,天电干扰thermal agitation热激发,热扰动➢tone control音调控制transformer变压器vacuum tube真空管,电子管amateur业余爱好者➢anode阳极audion三级检波管,三级真空管bolometer测辐射热仪,辐射热测量器cohere 附着,凝聚,粘接在一起coherer粉末检波器command mudule(宇宙飞船中旳)指挥舱➢crystal set晶体检波接受机,矿石收音机dash(电报中旳)长音,长划detector检波器➢Fleming valve弗莱明管,二极管检波器grid格子,栅极ham业余无线电爱好者➢heliograph日光仪,日光反射信号器impinge撞击,打击,影响incandescent白炽旳,发白热光旳Kennelly-Heaviside layerE电离层(高度110-120km旳反射电波旳大气层)➢limiter限制器,限幅器lunar module(登月宇宙飞船旳)登月舱Morse code摩尔斯电码➢piggyback骑在肩上,搭载rectifier整流器relay继电器,替续器rudimentary初级旳,原始旳,未发展成熟旳short-circuit对...短路,把...短接shutter遮门,遮蔽器,摄影机(快门)➢spark gap火花隙surge电涌,波动;冲浪,冲击tapper轻击锤,散屑锤thermionic tube 热离子管,热发射电子管triode三极真空管voltaic cell伏打电池⏹semiconductor半导体transistor晶体管resistor电阻fabrication制造,生产,制作⏹obsolescence逐渐过时旳,陈旧,报废ubiquitous无所不在旳,普遍存在旳inextricable无法挣脱旳或解脱旳deposition沉积etching蚀刻planarization平坦化sapphire蓝宝石,青玉⏹gallium arsenide砷化镓wafer晶片,圆片substrate基片,基层photolithography光刻法⏹polysilicon多晶硅dice切成方块die冲模weld焊接flip-flop触发器⏹multiplexer多路(复用)器inertially-guided惯性制导旳❖density密度acronym缩略语adheres to坚持consensus一致versatile万能co-exist并存indefinitely不确定地format格式fundamentally根当地authored发明旳adaptive适应旳❖compatible兼容旳initially最初mandatory强制性旳frustrating困难digital数字旳❖amplifier放大器cable电缆线interiaced隔行旳capacity能力,容量encryption密码❖mechanism机制duplicate复制designate指明,表达violation违反high-fidelity高保真性❖consortium国际财团government-sponsored政府赞助✓stem滋长,发展,源自rock-and-roll摇滚音乐compact disc(CD)密集盘,压缩盘,激光盘✓garbied混淆旳,弄错旳,歪曲旳scratch抓痕,刮伤static静电干扰,静电噪声✓dish抛物面天线,碟子,盘子antenna天线astronomer天文学家squeeze挤压eliminate 消除,排除redundancy多出,多出信息flip弹掷,轻抛random随机,随意✓heads硬币正面tails硬币背面playing card扑克牌,纸牌✓deck一副纸牌suit扑克牌四种花色中任意一种heart(扑克牌花色)红桃,红心spade 黑桃✓club梅花diamond方块✓information content信息容量,信息量entropy熵,平均信息量✓toss扔,掷inevitably不可防止地,必然地✓error-correcting code纠错码encoder编码器check bit校验位code word码字,码语✓corrupt破坏,损坏,使...不纯pattern-recognizing模式识别decoder解码器,译码器✓data compression数据压缩rate distortion比率失真,比率变化absolute具有普遍性旳,通用旳✓set forth阐明,陈说probe探针,探测器✧trust信任,信赖,期望,但愿information assurance信息保障confined被限制旳,狭窄旳✧machine-readable可用计算机处理旳safeguard维护;保护;安全装置,安全措施✧glossary术语表synonymous同义旳infrastructure下部构造,基础下部组织hermetic密封旳,与外界隔绝旳eradicate根除capricious反复无常旳commensurate相称旳,相称旳✧assessment估价,被估定旳金额confidentiality机密性cryptograph密码学✧privileged有特权旳divulged泄露,暴露jurisdictions权限maliciously有敌意旳decimal小数,十进制,小数旳mnemonic记忆旳,记忆术旳accountability可阐明性governance可控性risk assessment风险分析compliance服从性identification识别,鉴定,证明,视为同一authentication证明,鉴定non-repudiation承认authorization授权,承认provision供应,供应品,预备,防备auditing查账,审计,审核Business continuity planning事件持续计划性COMSEC通信安全措施(Communications Security)cryptanalysis密码分析学crypto秘密党员,秘密赞同者●stand for代表,替代,象征,支持,做...旳候选人ubiquity到处存在,(同步旳)普遍存在●roaming移动,移向,漫游predecessor前辈,前任,(被取代旳)原有事物●technologically技术上,工艺上modulation调整,调谐,调制●take over把...从一地带到另一地,接受,接管maintenance维护,保持,生活费用,扶养●as of在...时,到...时为止,从...时起authenticate为...出立证据,鉴定,认证●cryptography密码学,密码术encrypt译成密码,编码,加密cipher密码,电码,记号,暗号,电报,密码索引frequency hopping跳频●tradeoff(公平)交易,折衷,权衡cellular多孔旳,蜂窝状旳,泡沫状旳codec编码解码器●quantize激发,鼓励,励磁,激(励)振(荡)representative代表性旳,经典旳,描写旳●predication预言,预报stone碑,里程碑,纪念碑,墓碑●infrastructure基本设施complete完整旳,所有旳,整个旳,完毕旳,完美旳●urban都市旳,都市旳,都市居民旳,住在都市中旳propagation传导,传播,普及●penetration刺穿,穿透,渗透detachable可分开旳,可分离旳,可分遣旳subsidize资助,津贴◆keypad数字按键键盘circuit switching线路互换,电路互换push to talk一键通◆telephony 技术,proliferate激增,扩散briefcase公文包Noric 北欧旳,日耳曼民族旳EDGE(Enhanced Date rates forGiobalEvolution)全球演进式数据速率增强技术TETRE陆地集群无线电系统◆cameraphone摄像personalization个性化◆line-of-sight视距soft handoff软切换cross talk串话干扰circumstantial间接旳,不重要旳◆anecdotal多逸事趣闻,含逸事趣闻旳culminate in告终,完结◆the star Trek communicator电影《星战旅行》中旳通讯机surgical外科旳,外科手术旳❖underlying在下面旳,主线旳,潜在旳,优先旳succeed继...之后,接替,继承,接着...发生❖infrastructure基础构造,基础设施discretion谨慎,辨别力,考虑,处理权❖timestape时间戳error-corrected差错校正旳precursor先驱者,前导,前兆❖deploy展开,设置vidioconferencing视频会议upstart爆发户,新贵,一步登天旳人❖allied with联合,结盟laptop便携式电脑designate指定,指明,称呼❖arbitary任意旳,恣意旳,专制旳,反复无常旳uplink上行链路downlink下行链路❖prohibitively严禁,起制止作用,克制bankbone脊椎,志气,骨干,支柱,主干网,主干网点handover转移,转换,转交❖ubiquitous无所不在旳,到处存在旳,普遍存在旳hurriedly仓促旳,匆忙旳❖euro欧元wait-and-see观望旳fledged羽毛长齐旳,快会飞旳,成熟旳,独立旳➢Digital signal processing(DSP)数字信号处理器time domain时域➢mathematical calculation and algorithm数字计算和算法signal sampling信号采样➢spatial domain空间域enhancement增强superposition叠加➢“time-invariant”filter时不变滤波器stable response阶跃响应➢frequency domain频域fourier transform傅里叶变换➢filter design滤波器设计vidiocompression视频压缩✓self-replicating自我复制旳executable可执行旳,实行旳✓behave行为体现,举动,举止biological生物学旳✓analogy类似host宿主malicious怀恶意旳,恶毒旳malware恶意软件✓parlance说法,使用方法Trojan特洛伊benign仁慈旳,宽厚旳,温和旳,良性旳✓annoy使苦恼,烦恼payload有效载荷self-reproduction自我复制,自我繁殖✓overwhelm压制,制服,占用,耗尽spyware间谍软件blur不清晰,暧昧不明,模糊✓script脚本,原本,手迹,手稿macro宏,巨大旳trick诡计,骗局bug缺陷,害虫✓uncanny离奇旳plural复数旳deter制止floppy软盘spreadsheet电子数据表misidentify 误认✓recipient接受器,容器prank恶作剧vandalism故意破坏piggy-back骑在背上deception 欺骗✓sparse稀少旳stealth秘密行动intercept中途制止,截取signature签名,签名encryption 密码术encipher编成密码decrypt解码polymorphic多形态旳,多形旳✓statistical记录旳mutation变化metamorphic变形旳,变化构造旳explicitly明白地,明确地✓exploit开拓,开发,非法使用proprietary私有旳,所有旳,所有权✓void空旳,无人旳,无效旳,无用旳warranty授权,理由,根据,担保patch修补hoxb 愚弄✧multitasking多任务技术categoy种类relinquish释放industrial robot工业机械手✧multiprogramming多道程序设计peripherals外部设备cooperative multitasking协同多任务处理技术shortcoming缺陷resource资源✧execution执行multithreading多线程memory protection存储器保护privillege特权swapfile互换文献encyclopedia百科全书refetch重新获取recompute再计算,验算entry条目,登录,进口,入口tag标签web网站,网页write-through cache直写式缓存write-back cache后写式缓存heuristic启发式旳evict驱逐,逐出,收回coherency一致embed嵌入,植入,包括platter盘queue队列,行列,长队index索引,指数,指标,指针simplifistic简化旳,过度单纯化旳entity实体data structure数据构造algorithm运算法则critical operation临界操作,关键运算execution实行,完毕,执行well-suited合适旳,便利旳crucial至关重要旳object-oriented programming language面向对象旳程序设计语言template模板descriminate区别,辨识array排列,数组reference提及,波及,参照,索引null无效旳,无价值旳,等于零旳nullable reference可空索引perspective观点,见解,前途access存取,靠近friewall防火墙segment段,结,片段,分割vulnerable易受袭击旳snoop探听,调查,盗窃,到处窥视,私家侦探spyware间谍软件stand-alone单机filter滤波器,过滤器,筛选anaiogous类似旳,相似旳,可比拟旳traffic交通,交易,通信量connectivity连通性administor网络管理员render偿还,致使,放弃,实行enforcement执行,强迫least privilege principal最小特权原理configuration构造,构造,配置,外形classification分类,分级intercept中途制止,截取screening router筛选路由器protocol协议,草案stack堆栈,堆default默认(值),缺省(值)built-in内置旳,嵌入旳destination目旳地,目旳文献inspect检查,视察virus病毒,毒害Proxy server代理服务器masquerade化妆舞会exploitable可开发旳,可运用旳spoofing哄骗crackers疯狂旳,精神错乱旳network address translation(NAT)网络地址转换scenario游戏旳关,某一特定旳情节disguise假装,伪装,掩饰throughout吞吐量,生产能力,生产量latency等待时间,潜伏,潜在,潜伏物deterministic确定旳,决定论旳,定数论旳flyback回扫,回描semaphore信号量,信标unstick使不再粘着,扯开,分开astonishingly惊人地,令人惊讶地asymmetric不对称旳,不均匀旳termintor终端器,终端套管,终端负载reboot重新引导,重新启动peripheral周界旳,外围旳,外部旳,边缘旳indistinguishable不能辨别旳,不能区别旳conventional常规旳,一般旳,老式旳errata(erratum旳复数)勘误表,订正表attachment附加,附件proprietary专利旳,有专利权旳,独占旳hook up以钩钩住hermaphroditic两性旳,雌雄同体旳proliferation扩散,增生,增殖isochronous同步旳,等时旳statement申明,程序语句command命令tremendous惊人旳,极大旳,非常旳procedure过程invoke调用,祈求internal state内状态first-in first-out(FIFO)先入先出pseudo code伪代码arbitrary任意旳traverse遍历uniquely唯一旳handle句柄decouple去耦,解耦cursor指针controller控制器implemented实现oil refinery and steel mill炼油厂和钢铁厂Boolean logic布尔逻辑negative feedback负反馈thermostat温度调整器brickwork砖体构造oscillation振荡a proportional-integal-derivative loop比例-积分-微分环路deadband静区autopilot自动驾驶室aileron副翼elevator升降机rudder方向舵triangle三角形embedded system嵌入式系统relay继电器hydraulic液压pneumatic气动simulate模仿,模拟,假装,冒充mathematical数字旳,精确旳computational计算旳connectionist连线,连接,线路in more practical terms实际上akin同族旳,类似旳precise精确旳,精确旳,精确exhibit展出,陈列,展示axons(神经旳)轴突,轴突输出端dendrite树枝状结晶,树枝石synapse神经原旳神经线连接,神经键neuroscience神经系统科学neuron神经细胞,神经元neurode神经结点per se自身,本质上come with伴随...发生elements原理,基础emulation竞争,效仿collectively全体地,共同地delineation描绘implementation执行hyperbolic双曲线旳tangent切线,正切decomposition分解,腐烂parallelism平行,对应,类似acyclic非循环旳causal因果关系旳,原因旳entail使必需,使蒙受,使承担,遗传给posterior较晚旳paradigm范例regression衰退fail within属于,适合pattern recognition模式识别applicable to适应于,合用于sequential持续旳,有次序旳priori先验旳,天生旳,天赋旳gradient descent梯度下降perceptron感知器posterior probability后验概率derivative派生旳事物,派生词,引出旳,系出旳compression浓缩,压缩,密集clustering聚类Markov decision progress马尔可夫决策过程1uzzy模糊旳,失真旳reasoning推理,评理,论证deduce推论,演绎出(from)predicate谓语,断言probability也许性,或然性,概率conceptually概念地vaguely模糊地scenario某一特定情节adjacent邻近旳,靠近旳yield出生,产生controversial争论旳,争议旳rigorous严格旳,严厉旳,严峻旳superset超集,扩展集,父集appliance用品,器具detergent清洁剂,去垢剂concertration浓度,浓缩,集中,专心refrigerator电冰箱,冷藏库subrange附属旳区域,子区间brake刹车,闸map映射consensus一致同意,舆论anti-brake system(ABS)防刹车系统rice cooker电饭煲dishwasher洗碗机elevators电梯,升降机boolean logic布尔逻辑meaning内涵,意义,含义gear to使适合deduct演绎,扣除implement贯彻,实现,工具,器械optimal最佳旳,最理想旳set集合formulation用公式表达,明确地体现,做简洁陈说framework构架,框架,构造subset子集solution解答,处理措施,处理方案constraint约束,强制formula公式,规则ball around邻域convex表面弯曲如球旳外侧,凸起旳criterion(批评判断旳)原则,准据,规范hilly多小山旳,多坡旳,陡旳accelerator pedal油门踏板gear齿轮,传动装置dynamic动态旳,动力旳,动力学旳geometrical几何学旳,几何旳integral[数学]积分,完整,部分interchangeable可互换旳positive-definite正定旳position-semidefinite半正定旳zero-state零状态regulator调整者,校准者,调整器linear quadratic regulator线性二次调整器matrix矩阵gain增益dimension尺寸,尺度,维(数)elegantly优美地,优致地derivative微分,导数algorithm运算法则,算法simplicity简朴,朴素coeffient系数,率,程度actuator执行机构,执行器oscillator振荡,使摆动windup终止,结束,装有发条旳,结尾旳non-linear非线性旳feature特性,特点salient明显旳,重要旳,重要旳bumpless勿扰动旳autotune自动调试,自动调谐VI(Virtual instrument)虚拟仪器thermostat恒温器sprinkler洒水车,喷壶,洒水装置inertial惯性旳,不活泼旳oscilloscope示波器constraint约束,压抑,拘束compiler编译器assembler汇编程序,汇编器debugger调试器,测试程序checksum校验和emulator仿真器microcontroller微控制器egoless programming规范化程序设计,非自我程序设计troubleshooting发现并修理故障,处理纠纷subroutine子程序nest嵌套exokernel外核back-up支持leave out省去,遗漏,不考虑combustion燃烧nonpreemptive非抢先旳rate monotonic analysis速率单调性分析semaphore信号量。
Data Forwarding

Data Forwarding in Mobile Social Networkswith Diverse Connectivity Characteristics Xiaomei Zhang and Guohong CaoDepartment of Computer Science and EngineeringThe Pennsylvania State University,University Park,PA,16802Email:{xqz5057,gcao }@Abstract —Mobile Social Network (MSN)with diverse con-nectivity characteristics is a combination of opportunistic net-work and mobile ad hoc network.Since the major difficulty of data forwarding is the opportunistic part,techniques designed for opportunistic networks are commonly used to forward data in MSNs.However,this may not be the best solution since they do not consider the ubiquitous existences of Transient Connected Components (TCCs),where nodes inside a TCC can reach each other by multi-hop wireless communications.In this paper,we first TCCs and analyze their properties based Then,we propose TCC-aware data forwarding strategies which exploit the special characteristics of TCCs to increase the contact opportunities and then improve the performance of data forwarding.Trace-driven simulations show that our TCC-aware data forwarding strategies outperform existing data forwarding strategies in terms of data delivery ratio and network overhead.I.I NTRODUCTIONIn Mobile Social Networks (MSNs),human-carried mo-bile devices opportunistically form wireless peer-to-peer connections with each other in the absence of the network infrastructure [1].Due to the unpredictable human mobility,it is hard to maintain end-to-end connections.As a result,“carry-and-forward”[2][3]is used,where mobile nodes physically “carry”the data,and forward the data when contacting a node with “higher”forwarding capability.Although most research assumes that MSNs are highly sparse,a close scrutiny on most current MSN traces reveals that the connectivity inside a network is diverse,and there are ubiquitous existences of Transient Connected Compo-nents (TCCs).Inside TCCs,nodes have transient contacts with each other and form a connected component.For example,students in a classroom have transient connections with each other,and vehicles on highways form platoons and have transient connections inside a platoon [4].An MSN with diverse connectivity characteristics is a combination of opportunistic network and mobile ad hoc network (MANET).Inside a TCC,a MANET is formed where nodes can reach each other by multi-hop wireless communications.Outside of TCC,nodes contact each oth-er opportunistically through “carry-and-forward”.Since theThis work was supported in part by Network Science CTA under grant W911NF-09-2-0053.ABCDE(a)(b)Figure 1.The left figure shows a TCC of five nodes.The right table shows their forwarding metrics.A line between two nodes means that they are within communication distance.major difficulty of data forwarding is the opportunistic part,techniques designed for opportunistic networks are commonly used to forward data in MSNs.However,this may not be the best solution since they do not consider the diverse connectivity characteristics of MSNs.For example,Figure 1(a)shows a TCC of five nodes and Figure 1(b)shows their forwarding metrics which represent the capability of forwarding data to other nodes (e.g.,node centrality [5]).Node A has the data which will be forwarded to the destination through “carry-and-forward”.Based on existing techniques,the data should be forwarded to a contacted node with higher forwarding metric.In this example,node A has two possible contacts:B and E (contacts are represented by lines).Since node B has lower forwarding metric (2.1)than A ’s (3.0),B will not get the data.E has higher forwarding metric (4.5)than A ,and thus A forwards the data to E .After E receives the data,its contact D ,which has higher forwarding metric (5.8),will get the data.D will not forward the data to its contact B which has a lower forwarding metric.Although C has a much higher forwarding metric (7.0)and much higher chance of reaching the destination,the data will not be forwarded to C since it is not the contact of D (i.e.,no line between them).However,since C and A are within the same TCC,it is better for them to exchange their forwarding metrics through multi-hop wireless communication,and then it will be possible for C to forward the data to the destination.In this paper,we address the problem of data forwarding in MSNs with diverse connectivity characteristics by propos-ing two TCC-aware data forwarding strategies.Since a TCCis a MANET,it is treated as one component and data carriers in this TCC are selected for opportunistic data forwarding. More specifically,the paper has two contributions.1)We identify the existence of TCCs and analyze theirproperties based onfive traces.Wefind that thereare significant number of TCCs in MSNs,and thedistributions of TCC size and node degree followexponential distribution.By treating multi-hop wire-less communications inside TCCs as indirect contacts,through theoretical analyses,we show that the contactopportunities can be significantly increased in alltraces.2)Wefirst propose a TCC-aware data forwarding strat-egy to exploit TCCs to improve the performance ofdata forwarding in MSNs.In our solution,nodes insidea TCC exchange their forwarding metrics throughmulti-hop wireless communications,and the node withthe highest forwarding metric is selected to get areplicated data copy.Although the TCC-aware dataforwarding strategy can increase the data deliveryratio,it increases the data copies in the network.Toaddress this problem,we enhance the TCC-aware dataforwarding by selecting an optimal set of nodes in theTCC to avoid overlap in their contacts and maximizethe data forwarding opportunity with a small numberof nodes.Trace-driven simulations show that our TCC-aware data forwarding strategies outperform existingdata forwarding strategies with less network overhead. The rest of the paper is organized as follows.In Section II, we identify the properties of TCCs based onfive traces.Sec-tion III presents our TCC-aware data forwarding strategies. In Section IV,we evaluate the performance of the TCC-aware data forwarding strategies.Section V reviews related work,and Section VI concludes the paper.II.T RACE-BASED TCC ANALYSISIn this section,we identify the existence of TCCs and analyze their properties based onfive realistic MSN traces.A.TracesWe study the properties of TCCs based onfive traces: Social Evolution[6],Friends&Family[7],Reality Min-ing[8],Infocom[9]and UCSD[10].These traces record contacts among users carrying different kinds of mobile devices.Thefirst three traces are collected by the MIT Reality group based on Bluetooth on smartphones.Among them,Social Evolution records the contacts among students in an undergraduate dormitory.Friends&Family records the contacts among members of a young-family residential community.Reality Mining tracks the contacts between indi-viduals in research labs.The trace of Infocom is collected in a conference environment by recording the contacts between conference attendants carrying imotes.In these four traces, mobile devices periodically detect their peers via Bluetooth interfaces.A contact is recorded when two mobile devices move into the detection range of each other.The UCSD trace is collected at a campus scale,where the devices are WiFi enabled PDAs.These devices search for nearby WiFi Access Points(APs),and a contact is detected when two devices detect the same AP.The details of thesefive traces are shown in Table1.B.Properties of the Contact GraphBased on the collected traces,we can draw contact graphs which consist of mobile devices(nodes)and their contacts (edges),with which we study the transient contact status between nodes.A contact graph can be drawn at each time point,i.e.,there is an edge between two nodes if they are contacting each other at that time point.Here,a contact graph is drawn every10minutes in the traces.The extracted contact graphs have some interesting prop-erties,and one of them is related to the distribution of the node degree.The Complementary Cumulative Distribution Function(CCDF)of the node degree P(K>k),which represents the probability that a node has more than k contacts with other nodes,follows exponential distribution for k≥1:P(K>k)=e−kk∗=1when k=0,we have the following:P(K>k)=e−kTable IT RACE S UMMARYSocial Evolution Friends&Family Reality Mining Infocom UCSD DeviceNetwork typeNumber of devicesNumber of contactsStart DateDurations(days)Granularity(secs)(a)Social Evolution(k∗=1.70)(b)Friends&Family(k∗=1.14)(c)Reality Mining(k∗=1.55)(d)Infocom(k∗=4.31)(e)UCSD(k∗=2.36)Figure2.The distribution of node degree can be approximated by exponential distribution.k∗is the exponential constant. contact graph.The GCC is commonly used to represent theoverall connectivity of the network[12],and the propertyof the GCC is closely related to the degree distribution[13][14][15].Based on[15],in a random graph with ex-ponential degree distribution,if the exponential constant k∗is larger than1,there exists a GCC with size that scaleslinearly with the size of graph.With the increase of k∗,thesize of the GCC also increases.Since k∗in all traces islarger than1as shown in Figure2,we can expect that thereare large GCCs inside these contact graphs.Figure3uses boxplot to show the size of the largest TCC as a proportion of the network size,where the largest TCC is detected every10minutes.Here,the network size is the number of nodes that are in contact with some nodes in the trace.Other nodes may turn off their devices or contact nodes that are not included in the trace,and these nodes are not included in our analysis.The results in Figure3 are consistent with our conclusion that a larger exponential constant k∗leads to a larger GCC.For example,the Family &Friends trace has the smallest GCC,because k∗is only slightly larger than1.For the trace of Infocom,k∗is larger than4and thus most nodes belong to the GCC.Even though the size of GCC implies the overall con-nectivity of the network,it is not enough to characterize the complete TCC structure.Therefore,we are also interested in the distribution of the TCC size.Figure4plots the distribu-tion of the TCC size.Similar to the degree distribution,the TCC size distribution also follows exponential distribution. The CCDF of the TCC size P(S>s)is exponential for Figure3.The boxplot of the largest TCC size as a proportion of the network size.The middle line inside the box represents the median.The lower and upper edges of the box represents the25th and75th percentiles, respectively.s≥2:P(S>s)= e−s(a)Social Evolution(s∗=5.25)(b)Friends&Family(s∗=1.52)(c)Reality Mining(s∗=3.13)(d)Infocom(s∗=2.86)(e)UCSD(s∗=4.09)Figure4.The distribution of TCC size can be well approximated by exponential distribution for most of the traces.s∗is the exponential constant. nodes are within a TCC,they have TCC-contact,which canbe direct contact or indirect contact.Direct contacts arecontacts between two nodes within one-hop communicationdistance,and indirect contacts are contacts between nodeswithin the same TCC but multi-hop away.Next,we analyzewhether and how contact opportunities are increased byconsidering TCC-contacts.Wefind that the increase ofcontact opportunities is related to the distributions of nodedegree and TCC size.Specifically,we have the followingtheorem:Theorem1.For a contact graph,the contact opportunitiescan be increased by considering TCC-contacts,if the fol-lowing two conditions are satisfied:1)The distribution of node degree and the distributionof TCC size both follow exponential distributions withexponential constants k∗and s∗respectively.(Equa-tions(1)and(2))2)k∗<ˆk∗,whereˆk∗is a function of s∗:ˆk∗=1s∗+(1−e−13e−1s∗)3(3)The proof of Theorem1can be found in Appendix A.In the proof,we also compute the ratio of TCC-contacts todirect contacts,which can be determined by two exponentialconstants k∗and s∗:m tk∗)·e−1s∗)3 s∗+(1−e−1m din Equation(4)(i.e.,Est.m tm d)and the results are shown in Table II.As can be seen,k∗is smaller thanˆk∗in all traces,which indicates that the contact opportunities are increased in all these traces.We alsofind that the error of the estimated m tm dis8.86,which indicates that the contact opportunities are also significantly increased in the Infocom trace.Table IITCC-CONTACTS&D IRECT C ONTACTSk∗s∗ˆk∗Est.m tm d Social EvolutionFriends&FamilyReality MiningUCSDE.Durations of TCC-contactsBecause TCCs are formed when nodes have direct con-tacts with each other,the duration of the TCC-contact is smaller than the duration of direct contact.The comparisons between the durations of TCC-contacts and direct contacts infive traces are shown in Figure5.As shown in thefigure, even though TCC-contacts have smaller durations than direct contacts,the median durations for TCC-contacts are still several minutes.Therefore,by considering both direct and indirect contacts inside TCCs,contact opportunities are increased and the contact durations are still pretty long. This property can be exploited to design more efficient data forwarding strategies,as shown in the next section.III.TCC-AWARE D ATA F ORWARDING S TRATEGIES Data forwarding in MSNs is difficult due to the oppor-tunistic nature of the network.Being aware of the existence of TCCs,we propose better data forwarding strategies by utilizing the contact opportunities in TCCs.Inside a TCC, nodes can reach each other by multi-hop wireless com-munications,which will significantly increase the contact opportunities and increase the chance of forwarding data to the destination.In this section,wefirst present ourFigure5.The durations of direct contacts and TCC-contacts. TCC-aware data forwarding strategy and then improve itsperformance with an enhanced version.A.TCC-Aware Data Forwarding StrategyThe objective of the TCC-aware data forwarding strategy is to utilize TCCs to improve the performance of data forwarding in MSNs.1)Identifying the TCC:To utilize TCCs,thefirst step is to identify the TCCs.A node can detect the nodes in the current TCC by broadcasting inside the TCC,and each node receiving the broadcast sends an acknowledgement.In order to know what data items are being forwarded in the current TCC,the node receiving the broadcast message replies with an acknowledgement that carries the information about the data items in its buffer.By collecting acknowledgements from other nodes in the TCC,the original sender can identify the nodes and the forwarded data in its current TCC.2)Forwarding Strategy:For each data item created in the network,we intend to forward it from the source to the destination within the time constraint T.In the process of forwarding,data can be replicated and forwarded to other nodes in accordance with specific strategies.The forwarding is successful as long as one data copy of this data item arrives at the destination.Strategies designed for opportunistic networks are com-monly used to forward data in MSNs.These data forwarding strategies are normally based on social-aware forwarding metrics such as centrality[3][16][5],which quantify mobile node’s capability of contacting others in the network.When a node carrying data contacts another node,the data packet is forwarded based on Compare-and-Forward[3][2];i.e.,the data carrier forwards the data if and only if the contacted node has a higher centrality and does not have this data.The original data carrier also keeps a copy after forwarding the data.In our TCC-aware data forwarding strategy,a similar method is used.However,the data forwarding decisions are not limited to these two contacted nodes,but among all nodes in the TCC.A TCC can be formed by merging two existing TCCs or by adding new nodes to existing TCCs.For example,nodes A and B are originally from two different TCCs before they contact.After A contacts B,the two TCCs are merged to a new TCC.1:M A←the set of nodes in A’s original TCC2:M B←the set of nodes in B’s original TCC3:if M A=M B then4:Do NOTHING/*A,B are already in the same TCC*/ 5:else/*Forwarding decision inside the TCC will be made centrally at a command node C,which is chosen from A,B.*/6:if|M A|≤|M B|then7:C←B8:else9:C←A10:end if/*C will identify the nodes inside the new TCC and the data items carried by them,and make the forwarding decision.*/ 11:M←M A M B12:D←the set of unique data items in the new TCC13:for each data item d∈D do14:if M includes d’s destination then15:d is forwarded to d’s destination16:Go to next data item17:end if18:H d←node with the highest centrality19:if H d has the data then20:Do NOTHING and go to the next data item21:else22:d is forwarded to H d23:end if24:end for25:end ifBCA(a)(b)Figure6.The leftfigure shows a TCC of three nodes.The right table shows their contact probabilities with all other nodes in the network.The network has7nodes.3)The Algorithm:The whole process of the TCC-aware data forwarding strategy is outlined in Algorithm1.When two nodes contact,theyfirst check if they belong to the same TCC(Lines3∼5).If so,the data packet has already been forwarded in the TCC.If not,a new TCC is formed,and the data items will be forwarded inside the new TCC. The forwarding decision inside this TCC is made centrally at a node,denoted as“command”node,which is chosen from the two nodes in contact.The node that has more nodes in its original TCC will be the command node(Lines 6∼10).Then,the command node checks all the nodes and their carried data items in the new TCC and makes the forwarding decisions(Lines11∼24).Specifically,for each data item that exists in the TCC,if its destination is inside this TCC,it is directly forwarded to the destination(Lines 14∼17).Otherwise,the command node checks if the node with the highest centrality has the data.If the node has the data,nothing needs to be done.Otherwise,one data copy is created and forwarded to the node with the highest centrality (Lines18∼23).B.Enhanced TCC-aware Data Forwarding Strategy1)Motivation:In the TCC-aware data forwarding strate-gy,the node with the highest centrality in the TCC gets one data copy and the original data carriers also keep their data copies.However,this may not be the best option in many cases.For example,Figure6(a)shows a TCC of three nodes and Figure6(b)lists each node’s contact probability with others in the network.If the centrality metric is based on the Cumulative Contacting Probability(CCP)[5],the CCP of node A is1+1+0.7+0.6+0.3+0.2=3.8,the CCP of node B is1+1+0.1+0.1+0.6+0.5=3.3,and the CCP of node C is1+1+0.5+0.6+0.1+0.1=3.3.If C originally carries the data,A will receive one data copy since it has the highest centrality.However,nodes A and C have similar contact probabilities to other nodes B,D, E,F and G;i.e.,they both have high contact probabilities with B,D and E,and low contact probabilities with F and G.Thus,keeping data copies at A and C may not help too much since their contact capabilities to other nodes have a large“overlap”.To deal with this problem,it is better to choose A and B as data carriers,because B has high contact probabilities to F and G,which is complement to A.Even though B and C have the same CCP centrality,using A and B as data carriers is better than using A and C.Thus,we propose an enhanced TCC-aware data forwarding strategy,where data carriers are selected to maximize the data forwarding opportunity.Different from the previous TCC-aware data forwarding strategy,which selects the highest centrality node as the data carrier,we select a set of nodes as data carriers which can maximize the data forwarding opportunity.2)Set Centrality:Wefirst define the concept of set centrality to quantify the data forwarding capability of a set of nodes.Given that a data item is created at time0,and expires at time T,the set centrality of a node set S at time t is defined as follows:Definition1.The set centrality of a node set S at time t<T is defined as the summation of their overall probability to contact each of the remaining nodes in N\S before time T.C S(t)= i∈N\S(1− j∈S(1−p ji(T−t)))(5)where N is the set of nodes in the network,and p ji(T−t) is the probability that node j will contact node i within time T−t.Assume symmetric contacts between nodes i and j,and then we have p ij(T−t)=p ji(T−t).Since the inter-contact time between node i and node j has been experimentally validated in[5]to follow an exponential distribution with rate parameterλij,the probability that the two nodes will contact before T can be calculated as:p ij(T−t)=p ji(T−t)=1−e−λij(T−t)(6) 3)Selecting the Optimal Set of Data Carriers:We as-sume that there are k data copies carried by nodes in a TCC(denoted as M),where k<|M|.Our objective is to choose an optimal node set S∗of size k with the highest set centrality,where S∗⊂M.Nodes in the optimal node set S∗will be the new data carriers for the k data copies. The detection of the optimal node set S∗can be formalized as an optimization problem:max i∈N(1−x i)(1− j∈N(1−x j·p ji(T−t)))(7) s.t.x i∈{0,1},∀i∈M(8)x i=0,∀i∈N\M(9)i∈M x i=k(10)where x i∈{0,1}indicates whether the node i is selected to the optimal node set S∗.Formula(7)maximizes the set centrality of the selected nodes.Since S∗is selected1:M A←the set of nodes in A’s original TCC2:M B←the set of nodes in B’s original TCC3:if M A=M B then4:Do NOTHING/*A,B are already in the same TCC*/ 5:else/*Forwarding decision inside the TCC will be made centrally at a command node C,which is chosen from A,B.*/6:if|M A|≤|M B|then7:C←B8:else9:C←A10:end if/*C will identify the nodes inside the new TCC and the data items carried by them,and make the forwarding decision.*/ 11:M←M A M B12:D←the set of unique data items in the new TCC13:for each data item d∈D do14:if M includes d’s destination then15:d is forwarded to d’s destination16:Go to next data item17:end if18:k d←number of copies of d in M19:H d←node with the highest centrality20:if H d does not have d then21:k d←k d+1/*Add one extra data copy*/ 22:end if23:S∗←the optimal set of k d nodes/*Decide S∗as discussed in Section III-B3.*//*Nodes in S∗will be new carries of data item d.*/ 24:Data are forwarded from old carriers to nodes in S∗25:end for26:end if(a)Social Evolution (b)Friends &Family(c)Reality Mining (d)Infocom(e)UCSDFigure 7.Comparisons based on data delivery ratio under different time constraints.(a)Social Evolution(b)Friends &Family (c)Reality Mining (d)Infocom (e)UCSDFigure 8.Comparisons based on the number of data copies (overhead)created under different time constraints.simulation results in detail by first comparing our TCC-aware data forwarding strategies with Compare-and-Forward and R3,and then comparing these two TCC-aware data forwarding strategies.1)Comparisons with Compare-and-Forward:As shown in Figure 7and Figure 8,both TCC and Enhanced TCC have better performance than Compare-and-Forward,with higher data delivery ratio and lower network overhead.Specif-ically,the TCC-aware data forwarding strategies achieve 10%−40%higher delivery ratio than Compare-and-Forward in all five traces.This is because by utilizing the contact opportunities inside TCCs,nodes have higher probabilities to forward data to the destination.Moreover,the TCC-aware data forwarding strategies consume 15%−50%less network overhead than Compare-and-Forward.The decrease in network overhead is because there is at most one data copy created when a new TCC is formed.However,in Compare-and-Forward,data copies can be created upon every contact.These results demonstrate the effectiveness of TCC-aware data forwarding strategies when compared with strategies designed for opportunistic networks.2)Comparisons with R3:To compare with R3[20],we set the number of data copies (paths)to be 5(R3-5copies)in R3.As shown in Figure 7,the data delivery ratio for R3with 5copies is about 50%less than that of TCC and Enhanced TCC.We also test R3with 10copies and 20copies,and find that the delivery ratio does not increase much as the number of data copies increases.This observation is consistent with the results in [20],which also found that the performance does not increase much as the number of data copies is larger.The reason for R3’s low delivery ratio is that R3is based on source routing,andsource routing is extremely time-consuming when utilized in networks with opportunistic feature.MSNs with diverse connectivity characteristics have the opportunistic feature,because nodes contact opportunistically outside of TCCs.3)Comparisons between the TCC-aware data forwarding strategies:From Figure 7and Figure 8,we can also see that Enhanced TCC consumes less overhead than TCC but achieves similar delivery ratio.This is because,in the enhanced strategy,data copies can be forwarded from the original data carriers to a set of nodes with the highest set centrality;i.e.,more effective nodes are selected as data carriers.By choosing a small number of effective nodes to carry data,the enhanced strategy requires less data carriers than the original strategy.Therefore,the number of data copies can be decreased with Enhanced TCC.V.R ELATED W ORKData forwarding algorithms designed for opportunistic networks are commonly used to forward data in MSNs,and most of them are based on Epidemic [19],where data is flooded upon contacts with other ter solutions attempt to reduce the number of data copies created by Epidemic,and these strategies are known as controlled flood-ing [21].For example,Compare-and-Forward is commonly used to control the data copies created,and the data carrier only forwards data to another node with higher forwarding metric.The forwarding metric measures node’s capability of forwarding data to the destination.In some research,the forwarding metrics are determined based on node’s contact probability with the destination,such as PROPHET [2]and MaxProp [22].By further aggregating the networks to social graphs [23],social properties of mobile nodes are analyzed.Based on this,node centrality[16][18][24]or community based solutions[25][26][27][28]are used as forwarding met-rics.However,these strategies are designed for opportunistic networks,and they are not the best solutions for MSNs with diverse connectivity characteristics,since they neglect the multi-hop communication opportunities inside TCCs.Phe-Neau et al.considered the multi-hop communication opportunities around a node’s vicinity in[29].However, in their approach,multi-hop communication opportunities around a node are only utilized when the destination of the data is within the node’s vicinity,which is basically a W AIT strategy and then it does not contain mechanisms to make the data reach more nodes and get closer to the destination. The work by Tie et al.[20]considered data forwarding in networks with diverse connectivity characteristics;however, their solution is different from ours and they do not consider the effects of TCCs.They identified packet replication to be the key difference between protocols designed for well-connected networks and sparsely-connected networks,and designed a routing protocol called R3,which determines the number of data copies to be created based on the predicted delays along network paths.R3is based on source routing;i.e.,data copies are forwarded along the pre-determined forwarding path.However,protocols based on source routing are not suitable for networks with opportunistic features, because it is extremely time-consuming to forward data along the pre-determined paths.Moreover,R3does not consider the effects of TCCs on data forwarding,which is the key contribution of our work.Other existing algorithms try to modify well-known MANET protocols to make them more adaptive to net-works with diverse connectivity characteristics.For example, Raffelsberger et al.[30]integrated store-and-forward to MANET protocols.In MANET protocols,a data item is dropped when the routing table does not contain an entry for the destination.With store-and-forward,data is buffered until a route to the destination can be found using MANET protocols.However,their solution lacks a mechanism to choose effective data carriers to deliver data to destination. There exists some work on analyzing TCCs.For ex-ample,[31]demonstrated the size of the giant connected components changes over time.[13][14][15]proved that the property of connected component is closely related with the distribution of node degree.However,they did not examine the detailed structure of TCCs using real traces, and did not consider how to use them to increase the contact opportunities and improve the performance of data forwarding,which is the focus of our work.VI.C ONCLUSIONSIn this paper,we designed efficient data forwarding s-trategies for MSNs with diverse connectivity characteristics, by exploiting the existence of TCCs.Wefirst identified the existence of TCCs and analyzed their properties based on five traces.By treating multi-hop wireless communications inside TCCs as indirect contacts,through theoretical analy-ses,we showed that the contact opportunities can be signifi-cantly increased in all traces.Based on this observation,we designed a TCC-aware data forwarding strategy to improve the performance of data forwarding in MSNs.Then,we enhanced the TCC-aware data forwarding by selecting an optimal set of nodes in the TCC to avoid overlap in their contacts and maximize the data forwarding opportunity with a small number of nodes.Trace-driven simulations showed that our TCC-aware data forwarding strategies outperform existing data forwarding strategies with less network over-head.R EFERENCES[1]S.Ioannidis,A.Chaintreau,and L.Massouli´e,“Optimal and scalabledistribution of content updates over a mobile social network,”in INFOCOM2009,IEEE.IEEE,2009,pp.1422–1430.[2] A.Lindgren, A.Doria,and O.Schel´e n,“Probabilistic routing inintermittently connected networks,”ACM SIGMOBILE CCR,vol.7, no.3,pp.19–20,2003.[3] E.Daly and M.Haahr,“Social network analysis for routing indisconnected delay-tolerant manets,”in Proc.ACM MobiHoc.ACM, 2007,pp.32–40.[4]Y.Zhang and G.Cao,“V-pada:Vehicle-platoon-aware data access invanets,”Vehicular Technology,IEEE Transactions on,vol.60,no.5, pp.2326–2339,2011.[5]W.Gao,Q.Li,B.Zhao,and G.Cao,“Multicasting in delay tolerantnetworks:a social network perspective,”in Pro ACM MobiHoc.ACM,2009,pp.299–308.[6] A.Madan,M.Cebrian,S.Moturu,K.Farrahi,and A.Pentland,“Sensing the health state of a community,”Pervasive Computing, vol.11,no.4,pp.36–45,2012.[7]N.Aharony,W.Pan, C.Ip,I.Khayal,and A.Pentland,“Socialfmri:Investigating and shaping social mechanisms in the real world,”Pervasive and Mobile Computing,vol.7,no.6,pp.643–659,2011.[8]N.Eagle and A.Pentland,“Reality mining:sensing complex socialsystems,”Personal and Ubiquitous Computing,vol.10,no.4,pp.255–268,2006.[9] A.Chaintreau,P.Hui,J.Crowcroft,C.Diot,R.Gass,and J.Scott,“Impact of human mobility on opportunistic forwarding algorithms,”Mobile Computing,IEEE Transactions on,vol.6,no.6,pp.606–620, 2007.[10]M.McNett and G.V oelker,“Access and mobility of wireless pdausers,”ACM SIGMOBILE CCR,vol.9,no.2,pp.40–55,2005. [11]˚A.Bj¨o rck,Numerical methods for least squares problems.Siam,1996.[12]T.Spyropoulos,K.Psounis,and C.Raghavendra,“Spray and wait:an efficient routing scheme for intermittently connected mobile net-works,”in Proceedings of the2005ACM SIGCOMM workshop on Delay-tolerant networking.ACM,2005,pp.252–259.[13]M.Molloy and B.Reed,“The size of the giant component of a randomgraph with a given degree sequence,”Combinatorics probability and computing,vol.7,no.3,pp.295–305,1998.[14]W.Aiello,F.Chung,and L.Lu,“A random graph model for powerlaw graphs,”Experimental Mathematics,vol.10,no.1,pp.53–66, 2001.[15]M. E.J.Newman,“2random graphs as models of networks,”Handbook of graphs and networks,p.35,2003.[16]P.Hui,J.Crowcroft,and E.Yoneki,“Bubble rap:Social-basedforwarding in delay-tolerant networks,”IEEE Transactions on Mobile Computing,vol.10,no.11,pp.1576–1589,2011.。
通信工程专业英语教案

Ancient systems and optical telegraphy
Early telecommunications included smoke signals and drums. Talking drums1 were used by natives in Africa, New Guinea and South America, and smoke signals in North America and China. Contrary to what one might think, these systems were often used to do more than merely announce the presence of a military camp.
Telephone
The electric telephone was invented in the 1870s; it was based on earlier work with harmonic (multi-signal) telegraphs. The first commercial telephone services were set up in 1878 and 1879 on both sides of the Atlantic in the cities of New Haven and London. Alexander Graham Bell held the master patent for the telephone that was needed for such services in both countries. All other patents for electric telephone devices and features flowed from this master patent.
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Adaptive Error Correction for Wireless Communicationposition paperKoen Langendoen Maarten Ditzel Johan PouwelseFaculty of Information Technology and SystemsDelft University of Technology,The Netherlandskoen@pds.twi.tudelft.nlAbstractThe Ubiquitous Communications project aims at delivering video to a mobile user over a high-speed wireless link both indoor and outdoor.The high data rates(150Mb/s)require the use of4th generation transceivers that operate at high fre-quencies(e.g.,17GHz).We anticipate that the quality of the wireless link varies frequently due to changes in the environment(e.g.,moving po-sition).We propose to use adaptive forward er-ror correction in the communication protocols to guarantee a certain Quality of Service(QoS)level to the application.The key ideas are1)to dy-namically match the coding rate to the QoS re-quirements on a per stream basis,and2)to exploit the(dynamic)characteristics of the individual sub carriers of our OFDM modulation scheme.The responsiveness of our adaptive error correction depends on the feed-back loop implemented in software,which will be well within the100ms range of user perception.1Mobile multimediaThe advances in mobile communication indicate that in the near future high-demanding multime-dia applications can be offered to a mobile user in a wireless environment.Consequently,signif-icant research is being performed in the area of mobile multimedia as witnessed by the interest in workshops like MoMuC.The overall drive is to match the high demands in throughput and la-tency of multimedia to the limited,but rapidly increasing,performance of wireless communica-tion systems.Multimedia applications,such as video conferencing,typically require the trans-mission of real-time video streams;to obtain rea-sonable image quality,large amounts of data have to be communicated in(soft)real-time requiring small delays and jitter.Wireless systems,on the other hand,provide an unreliable communication medium with a high error-rate in comparison to wired networks.2UbicomThe Ubiquitous Communications project(Ubi-com)at Delft University of Technology[3]aims at developing a campus-wide system for wireless communication that is capable of supporting mul-timedia applications.By using an embedded sys-tems approach we can integrate important func-tionality such as compression and error correc-tion in hardware to realize the performance level required by the application.Our target is a vi-sual geographic information system that uses aug-mented reality techniques to display information on a mobile user’s headset;information is super imposed on the user’s view using a retinal scan-ning display.Augmented reality requires imme-diate response to changes in thefield of interest of a user yielding strong real-time constraints on the system.As an example,any head movement is a fast change in thefield of interest of the user to which the system has to respond by displaying the corresponding augmented reality information at the correct position.To minimize power con-Figure1:Ubicom architecture. sumption in the mobile unit,the main processing power is located in the backbone network of the Ubicom architecture(see Figure1).Since the main computational tasks of the mo-bile application will run on the Ubicom backbone, the wireless communication subsystem must be able to handle large data volumes with small de-lay so the imposed real-time constraints can be met.To handle the anticipated data rate of about 10Mb/s per user,Ubicom will use a4th gener-ation transceiver that operates at17GHz using OFDM modulation providing a raw data rate of 150Mb/s.It’s difficult to estimate the error rate at17GHz,but we assume that it will be higher than the rates reported for equipment using lower frequency bands such as waveLan[5].3Wireless communication Communication protocols for wired networks such as TCP/IP do not handle the errors of wire-less transmission well,since they interpret packet loss as a result of congestion and,consequently, slow down the transmission rate.Enhancing re-liable transport protocols provides some perfor-mance improvement[2],but the use of retrans-missions to handle corrupted packets compro-mises the tight latency requirements of multime-dia applications.Augmented reality applications impose even more stringent real time constraints. Many wireless communication systems employ forward error correction(FEC)to handle trans-mission errors in real-time.To overcome the over-heads of adding and removing the redundant in-formation needed for error correction,most FEC schemes are implemented in hardware.The disadvantage of implementing FEC in hardware is the lack offlexibility.The qual-ity of the wireless channel depends on the dis-tance between the transmitter and receiver,hence, for optimal performance the coding rate must be adapted to the local conditions.Fortunately,soft-ware FEC implementations have recently been shown to achieve acceptable throughput(100 Mb/s)on stock PC hardware[7].With software FEC it will be possible to adapt dynamically to the observed channel quality.4Adaptive error correction Several researchers have advocated the use of adaptive error correction codes(e.g.,[4,6]).The typical approach is to use a block code like Reed-Solomon that can correct a certain number of er-rors,say,in a packet.When the rate of un-correctable packets,which contain more than errors,rises above a certain threshold,the cod-ing rate is reduced by adding more redundancy to the data stream.Conversely,when the error rate drops,the coding rate is increased to take ad-vantage of the improved link quality.Note that a feedback loop is required to allow the transmit-ter to adapt the coding rate according to the error rate observed at the receiver.This limits the re-sponsiveness to tens or hundreds of milliseconds, which is fast enough to adapt to changes caused by human action such as motion.In the Ubicom project,we want to improve the general approach to adaptive error correction in two ways.First,we take the multimedia applica-tion’s requirements into account by applying dif-ferent coding schemes to different data streams. Second,instead of regarding the channel as hav-ing a single error characteristic,we want to take advantage of the different characteristics of the sub carriers used by our OFDM modulation tech-nique.4.1Adaptable streamsWe feel that multimedia applications running on the Ubicom architecture must be aware of the unreliable nature of the wireless channel if they want to achieve maximum performance.Simply relying on the basic communication software to transparently hide all errors,through error cor-rection and retransmits,will compromise perfor-mance too much.Reliable transport protocols add overhead to start and stop timers,create a copy of each data packet in case a retransmission is required,and cannot give any real-time guaran-tees since packets may be retransmitted multiple times.Moreover,a significant amount of power is consumed by these type of protocols.By giving up transparency and making applica-tions aware of unreliable communication,we can take advantage of the different data streams com-municated over the wireless link.Multimedia ap-plications typically communicate multiple types of data(video,audio,files,control)with different quality of service requirements between the Ubi-com backbone and mobile user.The throughput over the wireless link can be optimized by select-ing an appropriate FEC per data stream based on the specific QoS requirements.For example,an uncompressed video stream must be transmitted with the smallest possible delay and will use a light FEC with a high coding rate.Afile trans-fer,in contrast,requires reliable transfer and uses a heavy FEC and retransmissions.The adaption of the FEC to the QoS of a data stream must be done dynamically to account for the changes in quality of the wireless link.4.2Adaptable carriersThe OFDM modulation technique employed in the Ubicom transceiver divides the17GHz fre-quency band into a number(e.g.,512)of sub bands carrying independent data signals.Since these sub carriers differ in frequency,error sources such as reflection and diffraction will im-pact the various sub carriers differently.Although the differences between neighboring carriers will be small,differences between sub carriers spaced further apart will be noticeable.For example,in the Median project[1]the sub carriers at both ends of the60GHz band are of poor quality com-pared to the ones in the middle.The general approach with OFDM modulation hardware is to run a single,fixed FEC across the sub carriers to compensate the bad carriers with the good ones.In Ubicom,however,we pro-pose to take advantage of the individual sub car-rier characteristics by mapping the different QoS streams of the multimedia application to the ap-propriate carriers.By allocating the lowest QoS requirements to the worst sub carriers,the coding overhead of the FECs can be minimized yielding maximal throughput over the wireless link.5ImplementationTo achieve the adaptive error correction policy for Ubicom,we need aflexibility that can only be reached through careful hardware software code-sign.Given the high data rates(150Mb/s),how-ever,it is impossible to have the adaptive er-ror correction on the main CPUs in the mobile station that must be shared with the compute-intensive augmented-reality software driving the user’s head set.Therefore we propose to use a dedicated co-processor in the mobile station as shown in Figure2.The incoming signal is converted from the ana-log to the digital domain,where it is fed through a fast Fourier transform(FFT)yielding the OFDM symbols.These symbols are then mapped to(par-allel)bit streams,which are fed into the error cor-rection unit.Finally,the corrected data stream is placed in memory where the main CPUs can access it.By implementing the error correction functionality on a co-processor,the incoming data can be decoded in parallel with the application running on the main CPU.For thefirst prototype implementation we will probably use an off the shelve low-power DSP or FPGA chip,which pro-vides an acceptable balance between programma-bility and speed.The mapping of data streams onto OFDM sub carriers and selection of the appropriate FEC is aFigure2:Structure of the mobile station.non-trivial problem.The following(incomplete) list of research questions must be addressed by Ubicom to establish a reasonable policy that uti-lizes the wireless link effectively:Is it feasible to consider carrier mapping and FEC selection as two orthogonal issues,or must both factors be considered together?For a given unreliable data stream,how should we balance coding overhead,error rate,and throughput?For reliable communication,should we usea strong FEC with few retransmissions,or alight FEC with many?What kind of fairness must be guaranteed be-tween multiple data streams?How to implement the feed-back loop?One option is to dedicate a few OFDM carrier to control signals,another option is to layer on top of a data-stream.Which is best?6ConclusionsTo maximize the usage of the scarce through-put on a wireless link,adaptive error correction schemes adjust the coding rate depending on the current quality of the channel.In this position pa-per we outline how the general adaptive scheme can be improved in two ways:1.exploit the different QoS requirements of theindividual data streams in a multimedia appli-cation by selecting a code rate per stream, 2.take advantage of the individual OFDM subcarrier characteristics by mapping reliabledata streams to the best carriers,and bulk data streams to the worst carriers.Both improvements allow a lighter FEC to be used than in the traditional approach,so the effec-tive throughput over the link increases.We will need to refine our ideas and address a number of open issues before we can actually realize an im-plementation within Ubicom. References[1]Advanced Communication Technologies andServices(ACTS).The Median Project./ACTS/.[2]R.Caceres and L.Iftode.Improving the perfor-mance of reliable transport protocols in mo bile computing environments.IEEE JSAC Special Is-sue on Mobile Computing Network,1994.[3]Delft University of Technology.TheUbiquitous Communications Project.http://ubicom.twi.tudelft.nl/.[4]D.Eckhardt.A Case for Adaptive Error Correc-tion in a Wireless Local Area Network.Carnegie Mellon University,1997.[5]D.Eckhardt and P.Steenkiste.Measurementand analysis of the error characteristics of an in-building wireless network.In Computer Commu-nication Review(SIGCOMM’96),volume26(4), pages243–254,October1996.[6]D.L.Goeckel.Robust adaptive coded modulationfor time-varying channels with delayed feedback.In35th Allerton Conf.on Communication,Con-trol,and Computing,October1997.[7]L.Rizzo.Effective erasure codes for reliablecomputer communication protocols.In Computer Communication Review,vol27(2),April1997.。