通信工程英语专业论文

合集下载

通信工程专业英语论文设计

通信工程专业英语论文设计

The General Situation of AT89C51The AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash Programmable and Erasable Read Only Memory (PEROM) and 128 bytes RAM. The device is manufactured using Atmel’s high density nonvolatile memory technology and is compatible with the industry standard MCS-51™ instruction set and pin out. The chip combines a versatile 8-bit CPU with Flash on a monolithic chip; the Atmel AT89C51 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications.Features:• Compatible with MCS-51™ Products• 4K Bytes of In-System Reprogrammable Flash Memory• Endurance: 1,000 Write/Erase Cycles• Fully Static Operation: 0 Hz to 24 MHz• Three-Level Program Memory Lock• 128 x 8-Bit Internal RAM• 32 Programmable I/O Lines• Two 16-Bit Timer/Counters• Six Interrupt Sources• Programmable Serial Channel• Low Power Idle and Power Down ModesThe AT89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator and clock circuitry. In addition, the AT89C51 isdesigned with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power Down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset.Block DiagramPin Description:VCC Supply voltage.GND Ground.Port 0:Port 0 is an 8-bit open drain bidirectional I/O port. As an output port each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs.(Sink/flow)Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has internal pull-ups.Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification.Port 1:Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2:Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). In this application it uses strong internal pull-ups when emitting 1s. During accesses to external data memories that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-order address bits and some control signals during Flash programming and verification.Port 3:Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups.Port 3 also serves the functions of various special features of the AT89C51 as listed below:Port 3also receivessome controlsignals forFlashprogramming and verification.RST:Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device.ALE/PROG:Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation ALE is emitted at a constant rate of 1/6 theoscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSEN:Program Store Enable is the read strobe to external program memory.When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPP:External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1(LB1) is programmed, EA will be internally latched (fasten with a latch) on reset.EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage(VPP) during Flash programming, for parts that require 12-volt VPP.XTAL1:Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2:Output from the inverting oscillator amplifier.Oscillator Characteristics:XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low times specifications must be observed.Idle Mode:In idle mode, the CPU puts itself to sleep while all the on chip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset.It should be noted that when idle is terminated by a hard ware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory.Power Down ModeIn the power down mode the oscillator is stopped, and the instruction that invokes power down is the last instruction executed. The on-chip RAM and Special Function Registers retain their valuesuntil the power down mode is terminated. The only exit from power down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize.Program Memory Lock BitsOn the chip are three lock bits which can be left unprogrammed (U) or can be programmed (P) to obtain the additional features listed in the table below:Lock Bit Protection ModesWhen lock bit 1 is programmed, the logic level at the EA pin is sampled and latched during reset. If the device is powered up without a reset, the latch initializes to a random value, and holds that value until reset is activated. It is necessary that the latched value of EA be in agreement with the current logic level at that pin in order for the device to function properly.Programming the Flash:The AT89C51 is normally shipped with the on-chip Flash memory array in the erased state (that is, contents = FFH) and ready to be programmed.The programming interface accepts either a high-voltage (12-volt) or a low-voltage (VCC) program enable signal.The low voltage programming mode provides a convenient way toprogram the AT89C51 inside the user’s system, while the high-voltage programming mode is compatible with conventional third party Flash or EPROM programmers.The AT89C51 is shipped with either the high-voltage or low-voltage programming mode enabled. The respective top-side marking and device signature codes are listed in the following table.The AT89C51 code memory array is programmed byte-bybyte in either programming mode. To program any nonblank byte in the on-chip Flash Programmable and Erasable Read Only Memory, the entire memory must be erased using the Chip Erase Mode.Programming Algorithm: Before programming the AT89C51, the address, data and control signals should be set up according to the Flash programming mode table and Figures 3 and 4. To program the AT89C51, take the following steps.1. Input the desired memory location on the address lines.2. Input the appropriate data byte on the data lines.3. Activate the correct combination of control signals.4. Raise EA/VPP to 12V for the high-voltage programming mode.5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte-write cycle is self-timed and typically takes no more than 1.5 ms. Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached.Data Polling: The AT89C51 features Data Polling to indicate the end of a write cycle. During a write cycle, an attempted read of thelast byte written will result in the complement of the written datum on PO.7. Once the write cycle has been completed, true data are valid on all outputs, and the next cycle may begin. Data Polling may begin any time after a write cycle has been initiated.Ready/Busy:The progress of byte programming can also be monitored by the RDY/BSY output signal. P3.4 is pulled low after ALE goes high during programming to indicate BUSY. P3.4 is pulled high again when programming is done to indicate READY.Program Verify: If lock bits LB1 and LB2 have not been programmed, the programmed code data can be read back via the address and data lines for verification. The lock bits cannot be verified directly. Verification of the lock bits is achieved by observing that their features are enabled.Chip Erase: The entire Flash Programmable and Erasable Read Only Memory array is erased electrically by using the proper combination of control signals and by holding ALE/PROG low for 10 ms. The code array is written with all “1”s. The chip erase operation must be executed before the code memory can be re-programmed.Reading the Signature Bytes: The signature bytes are read by the same procedure as a normal verification of locations 030H, 031H, and 032H, except that P3.6 and P3.7 must be pulled to a logic low. The values returned are as follows.(030H) = 1EH indicates manufactured by Atmel(031H) = 51H indicates 89C51(032H) = FFH indicates 12V programming(032H) = 05H indicates 5V programmingProgramming InterfaceEvery code byte in the Flash array can be written and the entire array can be erased by using the appropriate combination of controlsignals. The write operation cycle is selftimed and once initiated, will automatically time itself to completion.AT89C51的概况AT89C51是美国ATMEL公司生产的低电压,高性能CMOS8位单片机,片内含4Kbytes的快速可擦写的只读程序存储器(PEROM)和128 bytes 的随机存取数据存储器(RAM),器件采用ATMEL公司的高密度、非易失性存储技术生产,兼容标准MCS-51产品指令系统,片内置通用8位中央处理器(CPU)和flish存储单元,功能强大AT89C51单片机可为您提供许多高性价比的应用场合,可灵活应用于各种控制领域。

通信工程英文论文

通信工程英文论文

英文原文RESEARCH OF CELLULAR WIRELESSCOMMUNATION SYSTEMAbstractCellular communication systems allow a large number of mobile users to seamlessly and simultaneously communicate to wireless modems at fixed base stations using a limited amount of radio frequency (RF) spectrum. The RF transmissions received at the base stations from each mobile are translated to baseband,or to a wideband microwave link,and relayed to mobile switching centers (MSC), which connect the mobile transmissions with the Public Switched Telephone Network (PSTN). Similarly,communications from the PSTN are sent to the base station, where they are transmitted to the mobile。

Cellular systems employ either frequency division multiple access (FDMA),time division multiple access (TDMA), code division multiple access (CDMA), or spatial division multiple access (SDMA)。

介绍通信工程专业英语作文

介绍通信工程专业英语作文

Introduction to Communication EngineeringCommunication Engineering is a vibrant and rapidly evolving field that deals with the transmission of information across various mediums, from wired connections to wireless networks. It encompasses a wide range of technologies and systems, including telephones, radios, televisions, satellites, and the internet, all essential components of modern society.The core of communication engineering lies in understanding the principles of signal processing and information theory. This involves the study of analog and digital signals, modulation techniques, coding and decoding methods, and the design of efficient communication systems. Additionally, communication engineers must stay abreast of emerging technologies such as 5G, the Internet of Things (IoT), and satellite communications, which are revolutionizing the way we connect and interact.A degree in communication engineering opens up a plethora of career opportunities. Graduates can find employment in telecommunications companies, network infrastructure providers, broadcasting organizations, or even in research and development roles within the industry. Moreover, with the increasing demand for high-speed and reliable communication systems, the job prospects in this field are expected to grow significantly in the coming years.In conclusion, Communication Engineering is a fascinating and challenging field that plays a pivotal role in connecting people and driving technological advancements. It requires a blend of theoretical knowledge, practical skills, and a keen interest in staying updated with the latest trends and developments.通信工程专业介绍通信工程专业是一个充满活力和快速发展的领域,涉及信息在各种媒介中的传输,从有线连接到无线网络。

作文范文之通信专业英语作文

作文范文之通信专业英语作文

通信专业英语作文【篇一:通信工程专业外语介绍二极管作文】? 1、there are two types of standard transistors,npn and pnp,with different circuit symbols. the letters refer to the layers of semiconductor material used to make the transistor.2、the leads are labelled base(b),collector(c)and emitter(e).these terms refer to the internal operation of a transistor.3、transistors amplify currents,for example they can be used to amplify the small output current from a logic chip so that it can operate a lamp,relay or other high current device.in many circuits a resistor is used to convert the changing current to a changing voltage,so the transistor is being used to amplify voltage.4、a transistor may be used as a switch (either fully on with maximum current,or fully off with no current)and as an amplifier(always partly on).【篇二:通信工程-专业英语论文】《专业英语》课程论文论文题目:wireless sensor network node 学院(系):信息工程学院专业:电子科学与技术班级:学生姓名:胡剑学号:1049721303194 教师:徐文君2014年 5月 16 日wireless sensor network node positioningalgorithmhu jianschool of information engineering,wuhan university of technology, wuhan, chinaabstract- wireless sensor networks as a new type of data node localization algorithm to complete. targeting the acquisition technology, combined with microelectronics, location of the network nodes is known as the reference wireless communications and wireless networks, such as node, the destination node determines that the event or multi-discipline, have broad application prospects in the field of the location in the network.industrialcontrol,military,medicalassistance,andenvironmental monitoring. in most applications, the physical location of the guide to the sensor node is a basic requirement, however, due to the large number of sensor nodes, randomly distributed, and the software and hardware resources are limited, so study effective positioning algorithm to determine the location of each node has an important theoretical significance and practical value.access to large amounts of literature on the basis of the lessons do an overview of the wireless sensor network-based positioning technology, wireless sensor networks, highlights several typical distributed positioning algorithm principle and characteristics, including amorphous , apit, centroid, dv-hop, rssi, etc., its matlab simulation environment simulation analysis, and compare the positioning accuracy of the various algorithms and error.keywords: wireless sensor algorithm, matlab, simulation analysisnetworks, localizationii. system designtin sensor networks, most existing node localizationalgorithms, reference anchor nodes are positioned to take advantage of the way place. a large number of sensor nodes in the target area in the layout: a portion called the particular node, also called anchor node (beacon), which themselves can be obtained by carrying the exact location of the gps positioning apparatus or artificial means, and have more than node powerful capabilities, but such a small proportion of nodes; node other unknown locations themselves, through their neighbor nodes to communicate to get information of each anchor nodes, these nodes using the locationinformation as a reference, and use some calculations to get their position known to the unknown is called a node (node)in wireless sensor networks usually used only two-dimensional coordinate system of .so long as we know from the unknown node with three anchor nodescan calculate the position of the unknown node.i. introductionpositioning of wireless sensor networks is the wireless, self-organizing network to provide location information of nodes in the network in some way, self-organizing network localization process can be divided into self-positioning and targeting node node positioning itself to determine the coordinates of the information network node . the targeting information is needed to determine the coordinates of a target within the network coverage or an event. node itself is the process of determining the positioning properties of the network itself, or you can use the manual calibration of variousfigure 1. schematic trilateral positioningassuming three anchor node coordinates are (x1,y1), (x2, y2), (x3, y3), the coordinates of the unknown node (xu, yu), unknown node distances from three anchor nodes are r1, r2 , r3, shown in figure 3-2, the distance formula based on a two-dimensional coordinate system of equations can be obtained asfollows:(1)the above equations are usually solved using the maximum likelihood method estimates the unknown node coordinate multilateral used (xu, yu):(2)in summary, it may obtain a plurality of unknown nodes as long as the anchor node that the unknown distance from the node to the anchor node 3 may be positioned on the practical application of the unknown node, this calculation can be different for each selected three points, and finally the results were averaged for several times and thus improve the positioning accuracy.iii. specific positioning algorithma. apit algorithmapit algorithm theoretical basis is the best point inside the triangle test method pit. pit test principle is that if there is a direction unknown nodes simultaneously moving along this direction away from or close to three beacon nodes, then the unknown nodes located in three beacon nodes outside the triangle; otherwise unknown nodes located within the triangle. point test using the network in a relatively high density ofnodes to simulate the mobile nodes using wireless signal propagation characteristics to determine whether far or near beacon nodes within the approximate triangle, usually in a given direction, a node from another node the farther the received signal strength is weaker. neighbor nodes exchange their received signal strength determination of a distance of beacon nodes, the nodes to move mimic pit. b.centroid positioning algorithmcentroid algorithm, the beacon node to a neighboringnode periodically broadcasts a beacon packet, a beacon packet contains the identification number and the location information of beacon nodes. when the node receives the unknown number of different beacon beacon packet from a node or reception exceeds a certain threshold time, the position of which determines its beacon nodes consisting of the centroid of the polygon.centroid algorithm based solely on network connectivity, and therefore relatively easy to implement. however, this method is affected by the density of the beacon nodes. centroid algorithm for improved algorithm, density adaptive heap algorithm, by increasing the beacon beacon nodes nodes in a low density area in order to improve the positioning accuracy.c. dv-hop positioning algorithman advantage of the proposed method of ideological distance vector routing and gps positioning. consists of three phases: first, all nodes in the network to obtain the number of hops from a beacon node; secondly, when obtaining the position and the other beacon nodes hop distance apart, the beacon nodes calculate the average hop distance of the network, giving their survival period, then the survival of the school with a positive value in the webcast. unknown node receives only record the first correction, and forwarded to the neighbors.this strategy ensures that the vast majority of node receives an average hop distance from the nearest beacon node. according unknown node hops records to calculate distance to jump beacon nodes.... d. rssi algorithmrssi measurement model and the theoretical model of general experience using the signal propagation. for empirical model before the actual positioning, first select a number of test points, records the received signal strength at these points ofthe base stations, to establish the relationship between position and signal strength line database (x, y, ss1, ss2 respective points, ss3 ). in the actual positioning, based on the measured signal strength (ss1 , ss2, ss3 ) and the signal strength recorded in the database by comparing the variance of the coordinates of the minimum signal strength that are used as the coordinates of the node point.iv. the simulation resultsa.apit algorithmfigure 4. figure positioning error(red * indicates anchor nodes, blue o represents an estimate offigure 2. node distribution(300 nodes, including 60 anchor nodes, red * indicates anchornodes, blue o represents the unknown node)the position of the unknown node, black o that they can not be positioned unknown nodes, blue - shows the positioning error of unknown nodes (nodes connected to an unknown location and estimate the true position), a total of 300 node: 60 anchor nodes, 240 unknown nodes, 0 unknown nodes can not be located, the positioning error of 0.29857)v. conclusionsfive algorithms are square_random selected node distribution, gps errors are 30m, communication radius comm-r are 200 unified communication model for the same communication model regular model folder, a list of error will be calculated by the five algorithms,as shown in figure 5:figure 3. neighbor relationship diagram(300 nodes, including 60 anchor nodes, red * indicates anchornodes, red o indicates unknown node communication radius: 200m, anchor node communication radius:200m, communication model: regular model, the average connectivity of the network is: 31.1133, the average number of neighbor nodes of the network anchor is: 6.18)figure 5. positioning deviationseen from the table, the maximum error and the centroid apit algorithm followed dv-hop algorithm then amorphous algorithm is the smallest error rssi algorithm.references[1] ou dexiang, wang zhizhong. “the design for intelligent node o f dcs based can bus”. electronic computer design world, vol 19,2002.[2] sun huixian, zhang yuhua, luo feilu. “data collection system for power monitor based on usb and can bus”. proceedings of the csu–epsa, vol 21, pp: 99-103, 2009.[3] zhang zhen-wei, huang shi-hong, “the design of vibration signal acquisition system,” turbine technology, 49 (3), pp.187-188, march 2007.[4] xu huazhong, “feng bo. design of usb module based on pdiusbd12.”.journal of wuhan university oftechnology(informationmanagement engineering), vol 02, 2008.[5] li jinbo. “design and realization of usb2.0 interface in equipment condition monitoring instrument”. process automation instrumentation. vol 29, pp: 14-17, 2008.【篇三:通信英语专业论文】the development trend of modernmobile communicationabstractrecalling the development history of the mobile communication,development of mobile communications has gone through several stages of development.the first generation of mobile communication technology mainly refers analog cellular mobile communication ,technical characteristics of a cellular network architecture to overcome the large district system capacity is low, the problem of limited range of activities.the second generation mobile communications is a cellular digital mobile communication, the cellular system can be provided with digital transmission and various advantages of integrated services.the third generation mobile communications also known as modern mobile communications.it is in addition to the main features of a second-generation mobile communication systems have various advantages and overcome its shortcomings, but also able to provide broadband multimedia services, can providehigh-quality video broadband multimedia integrated services, and to achieve global roaming.third generation technology is not too successful today,but it has great prospects for development.so lets talk about development trend of modern mobile communication.in the information technology support, market competition and demand together, the development of mobile communication technology is leaps and bounds, showing the following major trends:network traffic data, packet; broadband network technologies; intelligent network technology; higher frequency bands; more effective use of frequencies; various networks to converge. understand and master these trends on mobile operators and equipment manufacturers have important practical significance.work traffic data, packetmobile wireless data communications are considered the main direction of development. in recent years there are mainly two kinds of mobile data communications, one is circuit-switched mobile data services, the other is packet-switched mobile data industry.wireless data services is the main driving force of the users application , and other areas of communication, wireless data services one of the most important driving force from the internet.quest for voice communication anytime, anywhere mobile communications success so early. mobile communications business value and user market has been proved that the global mobile market with extraordinary pace. the next phase of the evolution of mobile communications is to provide mobile multimedia wireless data transfer and even individuals, this progress has already begun, andwill be an important future growth. personal mobile multimedia will provide people based on location can not imagine, perfect service and wireless personal information will people work and all aspects of life impact.2.broadband network technologiesin the history of the telecommunications industry, mobile communications technology and the market may be the fastest growing areas. business, technology and market interaction among a relationship, along with the user data and multimedia services demand increases, the data network service, packetdevelopment of broadband mobile networks will inevitably move toward.the third-generation mobile systems, namely imt-2000, is a true broadband multimedia system that can provide high-quality broadband integrated services and achieve seamless global coverage. after 2000, the narrow-band mobile phone business needs will remain large, but with the internet and other high-speed data communications and multimedia communications demand-driven, integrated broadband multimedia services will gradually increase, and the construction of the future information superhighway seamless coverage in terms of , broadband mobile communications as a whole, a subset of the mobile market share will become increasingly important.3.intelligent network technologygrowing demand for mobile communications and new technologies in mobile communication widely used, prompting the mobile network has been developing rapidly. mobile network consists simply transfer and exchange of information, and gradually to store and process information, the development of intelligent, mobile intelligent network as a result.along with the mobile network evolution to third generation systems, intelligent networks are constantly improved. intelligent network and its intelligence services constitute the basic conditions for future personal communications.4.higher frequency bandsfrom the first generation analog mobile phone, to the second generation of digital mobile networks, to the future of the third generation mobile communication systems, networks using wireless spectrum from low to high to follow a trend. born in 1981, the first international roaming nmt analog systems use frequency band 450mhz, 1986 年 nmt changes to the 900mhz band. chinas current band analog tacs system is used for 900 mhz. in the second generation networks, gsm systems use frequency band is started 900mhz, is-95 cdma system is800mhz. in order to from the fundamentally improve the gsm system the capacity of the,1997 appeared in 1800mhz system, gsm 900/1800 dual-band network rapid popularization. 2002 will be put into commercialthird generation systems imt-2000 is positioned in the 2ghz band.5.more effective use of frequenciesradio frequency is a valuable resource. with the rapid development of mobile communications, spectrum resources are limited and the dramatic increase in mobile subscribers increasingly acute contradictions, a frequency of severe shortage phenomenon. frequency congestion problem solving way is to use various frequency effective use of technology and development of new bands.as the future mainstream of the third generation mobile communication systems wireless access technology wcdma (wideband code division multiple access) to more efficient use of radio frequencies. it uses hierarchical cell structure, adaptive antenna array and coherent demodulation (bidirectional) technology, a substantial increase in network capacity available that can better meet the requirements of the development of future mobile communication.6.various networks to convergetechnological developments, changes in market demand, market competition and market control policies will relax computer。

介绍通信工程专业英语作文

介绍通信工程专业英语作文

介绍通信工程专业英语作文English:Communication engineering is a specialized field that involves the study and application of various communication technologies and systems. Students in this major learn about wireless and wired communication principles, network architectures, telecommunications systems, signal processing, information theory, and digital communication techniques. They also gain practical experience in designing and implementing communication networks, analyzing data transmission, and troubleshooting communication issues. Communication engineering professionals play a crucial role in developing and maintaining communication infrastructures that enable seamless connectivity and information exchange in today's digital world. This major equips students with the necessary knowledge and skills to work in a variety of industries, including telecommunications, internet service providers, broadcasting, and information technology companies.Translated content:通信工程是一个专门领域,涉及各种通信技术和系统的研究和应用。

通信专业的英文作文

通信专业的英文作文

通信专业的英文作文I chose to study communication because I've always been fascinated by how people connect with each other. From verbal communication to nonverbal cues, there's so much to learn about how we interact and share information.One of the things that drew me to this field is the ever-evolving nature of communication technology. From the invention of the telephone to the rise of social media,it's incredible to see how these advancements have changed the way we communicate.In my studies, I've learned about the power of storytelling and how it can be used to convey messages and evoke emotions. Whether it's through advertising, public speaking, or film, storytelling is a powerful tool that can bring people together and inspire action.Another aspect of communication that I find fascinating is the role of culture in shaping how we communicate.Different cultures have their own unique communication styles and norms, and understanding these differences is crucial for effective cross-cultural communication.I'm also interested in the impact of communication on relationships, both personal and professional. Effective communication is essential for building trust, resolving conflicts, and fostering collaboration, and I'm eager to explore how communication strategies can be used to strengthen relationships.Overall, the study of communication is a rich and diverse field that offers endless opportunities for learning and growth. I'm excited to continue exploring the many facets of communication and applying my knowledge to make a positive impact in the world.。

对通信工程的理解英语作文

对通信工程的理解英语作文

对通信工程的理解英语作文Communication engineering is a discipline that deals with the design, development, and implementation of communication systems. It involves the use of various technologies, such as radio, television, telephony, and computer networks, to transmit information from one place to another. In this essay, I will discuss my understanding of communication engineering and its importance in today's world.Firstly, communication engineering plays a crucial role in modern society. It enables people to communicate with each other, regardless of their location. This is particularly important in today's globalized world, where people need to communicate with others from different countries and cultures. Communication engineering has made it possible to connect people from all over the world, making it easier for them to share ideas, exchange information, and collaborate on projects.Secondly, communication engineering has revolutionized the way we live and work. It has made it possible for us to access information and communicate with others in real-time. This has led to the development of many new technologiesand applications, such as social media, online shopping,and teleconferencing. These technologies have transformedthe way we interact with each other, making our lives more convenient and efficient.Thirdly, communication engineering has opened up many new opportunities for businesses and organizations. It has made it possible for them to reach out to customers and clients in new and innovative ways. For example, companies can use social media to promote their products and services, or they can use teleconferencing to hold meetings with clients from different parts of the world. This has helped businesses to expand their reach and grow their customer base.Finally, communication engineering plays a vital rolein the development of new technologies. It provides the foundation for many new technologies, such as artificialintelligence, the internet of things, and 5G networks. These technologies have the potential to transform our lives in ways we cannot even imagine, and communication engineering is at the forefront of their development.In conclusion, communication engineering is a vital discipline that plays a crucial role in modern society. It enables us to connect with each other, access information, and collaborate on projects. It has revolutionized the way we live and work, opened up new opportunities for businesses, and paved the way for the development of new technologies. As technology continues to evolve, communication engineering will remain a critical component of our lives.。

介绍通信工程专业英语作文

介绍通信工程专业英语作文

介绍通信工程专业英语作文英文回答:Telecommunications engineering is a branch ofelectrical engineering that deals with the transmission of information over long distances. It involves the design, construction, and maintenance of communication systems,such as telephone networks, data networks, and satellite communication systems.Telecommunications engineers are responsible for ensuring that communication systems are reliable, efficient, and secure. They must have a strong understanding of the principles of communication theory, as well as the latest technologies used in the field.Telecommunications engineering is a rapidly evolving field, with new technologies being developed all the time. As a result, telecommunications engineers must beconstantly learning and adapting to new technologies.Telecommunications engineering is a challenging and rewarding field. It offers the opportunity to work on cutting-edge technologies and to make a real difference in the world.中文回答:电信工程是电气工程的一个分支,它涉及远距离的信息传输。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

On the deployment of VoIP in Ethernet networks:methodology and case studyKhaled Salah, Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, P.O. Box 5066, Dhahran 31261, Saudi Arabia Received 25 May 2004; revised 3 June 2005; accepted 3 June 2005. Available online 1 July 2005.AbstractDeploying IP telephony or voice over IP (V oIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step methodology on how V oIP can be deployed successfully. The methodology can be used to assess the support and readiness of an existing network. Prior to the purchase and deployment of V oIP equipment, the methodology predicts the number of V oIP calls that can be sustained by an existing network while satisfying QoS requirements of all network services and leaving adequate capacity for future growth. As a case study, we apply the methodology steps on a typical network of a small enterprise. We utilize both analysis and simulation to investigate throughput and delay bounds. Our analysis is based on queuing theory, and OPNET is used for simulation. Results obtained from analysis and simulation are in line and give a close match. In addition, the paper discusses many design and engineering issues. These issues include characteristics of V oIP traffic and QoS requirements, V oIP flow and call distribution, defining future growth capacity, and measurement and impact of background traffic.Keywords: Network Design,Network Management,V oIP,Performance Evaluation,Analysis,Simulation,OPNET1 IntroductionThese days a massive deployment of V oIP is taking place over data networks. Most of these networks are Ethernet based and running IP protocol. Many network managers are finding it very attractive and cost effective to merge and unify voice and data networks into one. It is easier to run, manage, and maintain. However, one has to keep in mind that IP networks are best-effort networks that were designed for non-real time applications. On the other hand, V oIP requires timely packet delivery with low latency, jitter, packet loss, and sufficient bandwidth. To achieve this goal, an efficient deployment of V oIP must ensure these real-time traffic requirements can be guaranteed over new or existing IP networks. When deploying a new network service such as V oIP over existing network, many network architects, managers, planners, designers, and engineers are faced with common strategic, and sometimes challenging, questions. What are the QoS requirements for V oIP? How will the new V oIP load impact the QoS for currently running network services and applications? Will my existing network support V oIP and satisfy the standardized QoS requirements? If so, how many V oIP calls can the network support before upgrading prematurely any part of the existing network hardware? These challenging questions have led to the development of some commercial tools for testing the performance of multimedia applications in data networks. A list of the available commercial tools that support V oIP is listed in [1,2]. For the most part, these tools use two common approaches in assessing the deployment of V oIP into the existing network. One approach is based on first performing network measurements and then predicting the network readiness for supporting V oIP. The prediction of the network readiness is based on assessing the health of network elements. The second approach is based on injecting real V oIP traffic into existing network and measuring the resulting delay, jitter, and loss. Other than the cost associated with the commercial tools, none of the commercial tools offer a comprehensive approach for successful V oIP deployment. I n particular, none gives any prediction for the total number of calls that can be supported by the network taking into account important design and engineering factors. These factors include V oIP flow and call distribution, future growth capacity, performance thresholds, impact of V oIP on existing network services and applications, and impact backgroundtraffic on V oIP. This paper attempts to address those important factors and layout a comprehensive methodology for a successful deployment of any multimedia application such as V oIP and video conferencing. However, the paper focuses on V oIP as the new service of interest to be deployed. The paper also contains many useful engineering and design guidelines, and discusses many practical issues pertaining to the deployment of V oIP. These issues include characteristics of V oIP traffic and QoS requirements, V oIP flow and call distribution, defining future growth capacity, and measurement and impact of background traffic. As a case study, we illustrate how our approach and guidelines can be applied to a typical network of a small enterprise. The rest of the paper is organized as follows. Section 2 presents a typical network topology of a small enterprise to be used as a case study for deploying V oIP. Section 3 outlines practical eight-step methodology to deploy successfully V oIP in data networks. Each step is described in considerable detail. Section 4 describes important design and engineering decisions to be made based on the analytic and simulation studies. Section 5 concludes the study and identifies future work.2 Existing networkFig. 1 illustrates a typical network topology for a small enterprise residing in ahigh-rise building. The network shown is realistic and used as a case study only; however, our work presented in this paper can be adopted easily for larger and general networks by following the same principles, guidelines, and concepts laid out in this paper. The network is Ethernet-based and has two Layer-2 Ethernet switches connected by a router. The router is Cisco 2621, and the switches are 3Com Superstack 3300. Switch 1 connects Floors 1 and 2 and two servers; while Switch 2 connects Floor 3 and four servers. Each floor LAN is basically a shared Ethernet connecting employee PCs with workgroup and printer servers. The network makes use of VLANs in order to isolate broadcast and multicast traffic. A total of five LANs exist. All VLANs are port based. Switch 1 is configured such that it has three VLANs. VLAN1 includes the database and file servers. VLAN2 includes Floor 1. VLAN3 includes Floor2. On the other hand, Switch 2 is configured to have two VLANs. VLAN4 includes the servers for E-mail, HTTP, Web and cache proxy, and firewall. VLAN5 includes Floor 3. All the links are switched Ethernet 100 Mbps full duplex except for the links for Floors 1–3 which are shared Ethernet 100 Mbps half duplex.3 Step-by-step methodologyFig. 2 shows a flowchart of a methodology of eight steps for a successful V oIP deployment. The first four steps are independent and can be performed in parallel. Before embarking on the analysis and simulation study, in Steps 6 and 7, Step 5 must be carried out which requires any early and necessary redimensioning or modifications to the existing network. As shown, both Steps 6 and 7 can be done in parallel. The final step is pilot deployment.3.1. VoIP traffic characteristics, requirements, and assumptionsFor introducing a new network service such as V oIP, one has to characterize first the nature of its traffic, QoS requirements, and any additional components or devices. For simplicity, we assume a point-to-point conversation for all V oIP calls with no call conferencing. For deploying V oIP, a gatekeeper or Call Manager node has to be added to the network [3,4,5]. The gatekeeper node handles signaling for establishing, terminating, and authorizing connections of all V oIP calls. Also a V oIP gateway is required to handle external calls. A V oIP gateway is responsible for converting V oIP calls to/from the Public Switched Telephone Network (PSTN). As an engineering and design issue, the placement of these nodes in the network becomes crucial. We will tackle this issue in design step 5. Other hardware requirements include a V oIP client terminal, which can be a separate V oIP device, i.e. IP phones, or a typical PC or workstation that is V oIP-enabled. A V oIP-enabled workstation runs V oIP software such as IP Soft Phones .Fig. 3 identifies the end-to-end V oIP components from sender to receiver [9]. The first component is the encoder which periodically samples the original voice signal and assigns a fixed number of bits to each sample, creating a constant bit rate stream. The traditional sample-based encoder G.711 uses Pulse Code Modulation(PCM) to generate 8-bit samples every 0.125 ms, leading to a data rate of 64 kbps . The packetizer follows the encoder and encapsulates a certain number of speech samples into packets and adds the RTP, UDP, IP, and Ethernet headers. The voice packets travel through the data network. An important component at the receiving end, is the playback buffer whose purpose is to absorb variations or jitter in delay and provide a smooth playout. Then packets are delivered to the depacketizer and eventually to the decoder which reconstructs the original voice signal. We will follow the widely adopted recommendations of H.323, G.711, and G.714 standards for V oIP QoS requirements.Table 1 compares some commonly used ITU-T standard codecs and the amount of one-way delay that they impose. To account for upper limits and to meet desirable quality requirement according to ITU recommendation P.800, we will adopt G.711u codec standards for the required delay and bandwidth. G.711u yields around 4.4 MOS rating. MOS, Mean Opinion Score, is a commonly used V oIP performance metric given in a scale of 1–5, with 5 is the best. However, with little compromise to quality, it is possible to implement different ITU-T codecs that yield much less required bandwidth per call and relatively a bit higher, but acceptable, end-to-end delay. This can be accomplished by applying compression, silence suppression, packet loss concealment, queue management techniques, and encapsulating more than one voice packet into a single Ethernet frame.3.1.1. End-to-end delay for a single voice packetFig. 3 illustrates the sources of delay for a typical voice packet. The end-to-end delay is sometimes referred to by M2E or Mouth-to-Ear delay. G.714 imposes a maximum total one-way packet delay of 150 ms end-to-end for V oIP applications . In [22], a delay of up to 200 ms was considered to be acceptable. We can break this delay down into at least three different contributing components, which are as follows (i) encoding, compression, and packetization delay at the sender (ii) propagation, transmission and queuing delay in the network and (iii) buffering, decompression, depacketization, decoding, and playback delay at the receiver.3.1.2. Bandwidth for a single callThe required bandwidth for a single call, one direction, is 64 kbps. G.711 codec samples 20 ms of voice per packet. Therefore, 50 such packets need to be transmitted per second. Each packet contains 160 voice samples in order to give 8000 samples per second. Each packet is sent in one Ethernet frame. With every packet of size 160 bytes, headers of additional protocol layers are added. These headers include RTP+UDP+IP+Ethernet with preamble of sizes 12+8+20+26, respectively. Therefore, a total of 226 bytes, or 1808 bits, needs to be transmitted 50 times per second, or 90.4 kbps, in one direction. For both directions, the required bandwidth for a single call is 100 pps or 180.8 kbps assuming a symmetric flow.3.1.3. Other assumptionsThroughout our analysis and work, we assume voice calls are symmetric and no voice conferencing is implemented. We also ignore the signaling traffic generated by the gatekeeper. We base our analysis and design on the worst-case scenario for V oIP call traffic. The signaling traffic involving the gatekeeper is mostly generated prior to the establishment of the voice call and when the call is finished. This traffic is relatively small compared to the actual voice call traffic. In general, the gatekeeper generates no or very limited signaling traffic throughout the duration of the V oIP call for an already established on-going call. In this paper, we will implement no QoS mechanisms that can enhance the quality of packet delivery in IP networks. A myriadof QoS standards are available and can be enabled for network elements. QoS standards may include IEEE 802.1p/Q, the IETF’s RSVP, and DiffServ. Analysis of implementation cost, complexity, management, and benefit must be weighed carefully before adopting such QoS standards. These standards can be recommended when the cost for upgrading some network elements is high and the network resources are scarce and heavily loaded.3.2. VoIP traffic flow and call distributionKnowing the current telephone call usage or volume of the enterprise is an important step for a successful V oIP deployment. Before embarking on further analysis or planning phases for a V oIP deployment, collecting statistics about of the present call volume and profiles is essential. Sources of such information are organization’s PBX, telephone records and bills. Key characteristics of existing calls can include the number of calls, number of concurrent calls, time, duration, etc. It is important to determine the locations of the call endpoints, i.e. the sources and destinations, as well as their corresponding path or flow. This will aid in identifying the call distribution and the calls made internally or externally. Call distribution must include percentage of calls within and outside of a floor, building, department, or organization. As a good capacity planning measure, it is recommended to base the V oIP call distribution on the busy hour traffic of phone calls for the busiest day of a week or a month. This will ensure support of the calls at all times with high QoS for all V oIP calls. When such current statistics are combined with the projected extra calls, we can predict the worst-case V oIP traffic load to be introduced to the existing network.Fig. 4 describes the call distribution for the enterprise under study based on the worst busy hour and the projected future growth of V oIP calls. In the figure, the call distribution is described as a probability tree. It is also possible to describe it as a probability matrix. Some important observations can be made about the voice traffic flow for inter-floor and external calls. For all these type of calls, the voice traffic has to be always routed through the router. This is so because Switchs 1 and 2 are layer 2 switches with VLANs configuration. One can observe that the traffic flow for inter-floor calls between Floors 1 and 2 imposes twice the load on Switch 1, as the traffic has to pass through the switch to the router and back to the switch again. Similarly, Switch 2 experiences twice the load for external calls from/to Floor 3.3.3. Define performance thresholds and growth capacityIn this step, we define the network performance thresholds or operational points for a number of important key network elements. These thresholds are to be considered when deploying the new service. The benefit is twofold. First, the requirements of the new service to be deployed are satisfied. Second, adding the new service leaves the network healthy and susceptible to future growth. Two important performance criteria are to be taken into account. First is the maximum tolerable end-to-end delay; and second is the utilization bounds or thresholds of networkresources. The maximum tolerable end-to-end delay is determined by the most sensitive application to run on the network. In our case, it is 150 ms end-to-end for V oIP. It is imperative to note that if the network has certain delay sensitive applications, the delay for these applications should be monitored, when introducing V oIP traffic, such that they do not exceed their required maximum values. As for the utilization bounds for network resources, such bounds or thresholds are determined by factors such as current utilization, future plans, and foreseen growth of the network. Proper resource and capacity planning is crucial. Savvy network engineers must deploy new services with scalability in mind, and ascertain that the network will yield acceptable performance under heavy and peak loads, with no packet loss. V oIP requires almost no packet loss. In literature, 0.1–5% packet loss was generally asserted. However, in [24] the required V oIP packet loss was conservatively suggested 5to be less than 10. A more practical packet loss, based on experimentation, of below 1% was required in [22]. Hence, it is extremely important not to utilize fully the network resources. As rule-of-thumb guideline for switched fast full-duplex Ethernet, the average utilization limit of links should be 190%, and for switched shared fast Ethernet, the average limit of links should be 85% [25]. The projected growth in users, network services, business, etc. must be all taken into consideration to extrapolate the required growth capacity or the future growth factor. In our study, we will ascertain that 25% of the available network capacity is reserved for future growth and expansion. For simplicity, we will apply this evenly to all network resources of the router, switches, and switched-Ethernet links. However, keep in mind this percentage in practice can be variable for each network resource and may depend on the current utilization and the required growth capacity. In our methodology, the reservation of this utilization of network resources is done upfront, before deploying the new service, and only the left-over capacity is used for investigating the network support of the new service to be deployed.3.4. Perform network measurementsIn order to characterize the existing network traffic load, utilization, and flow,network measurements have to be performed. This is a crucial step as it can potentially affect results to be used in analytical study and simulation. There are a number of tools available commercially and noncommercially to perform network measurements. Popular open-source measurement tools include MRTG, STG, SNMPUtil, and GetIF [26]. A few examples of popular commercially measurement tools include HP OpenView, Cisco Netflow, Lucent VitalSuite, Patrol DashBoard, Omegon NetAlly, Avaya ExamiNet, NetIQ Vivinet Assessor, etc. Network measurements must be performed for network elements such as routers, switches, and links. Numerous types of measurements and statistics can be obtained using measurement tools. As a minimum, traffic rates in bits per second (bps) and packets per second (pps) must be measured for links directly connected to routers and switches. To get adequate assessment, network measurements have to be taken over a long period of time, at least 24-h period. Sometimes it is desirable to take measurements over several days or a week. One has to consider the worst-case scenario for network load or utilization in order to ensure good QoS at all times including peak hours. The peak hour is different from one network to another and it depends totally on the nature of business and the services provided by the network.Table 2 shows a summary of peak-hour utilization for traffic of links in both directions connected to the router and the two switches of the network topology of Fig.1. These measured results will be used in our analysis and simulation study.。

相关文档
最新文档