无线局域网技术外文翻译文献

合集下载

网络工程局域网中英文对照外文翻译文献

网络工程局域网中英文对照外文翻译文献

中英文对照外文翻译(文档含英文原文和中文翻译)PUTER NETWORKSDATE COMMUNICATIONSThe end equipment which either generates the digital information for transmission or uses the received digital data can be computer ,printers ,keyboards, CRTs, and so on. This equipment generally manipulates digital information internally in word units—all the bits that make up a word in a particular piece of equipment are transferred in parallel. Digital data, when transmitted, are in serial form. Parallel transmission of an 8-bit word require eight pairs of transmission lines—not at all cost-effective. Data terminal (DTE) is a general phrase encompassing all of the circuitry necessary to perform parallel-to-serial and serial-to-parallel conversions for transmission and reception respectively and for data link management. The UART (Universal Asynchronous Receiver/Transmitter) and USART (Universal Asynchronous/Asynchronous Receiver/Transmitter) are the devices that perform the parallel-to-serial and serial-to-parallel conversions. The primary DTE includes a line control unit (LCU or LinCo) which controls the flow of information in a multipoint data link system. A station controller (STACO) is the corresponding that belonged to the subscriber in a data link system. Between the DTEs, starting with the modems, was communications equipment owned and maintained by Telco property.Data communications equipment (DCE) accepts the serial data stream from the DTE and converts it to some form of analog signal suitable for transmission on voice-grade lined. At the receive end, the DCE performs the reverse function of converting the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter, while at the receive end, it can considered a form of analog-to-digital converter. The most common of modulation by modems are frequency shift keying (FSK), phase shift keying (PSK), and quadrature amplitude modulation (QAM). This is a typically data transmission mode using the analog telephone lines. If you transmit data by digital channel (sometimes it is called “Digital T-carrier”), a pulse Code Modulation (PCM) equipment must be used. A microwave transmission system can also be used for the data communication. Finally, you can use the satellite communication system for data transmission.If the cables and signal levels used to interconnect the DTE and DCE were left unregulated, the variations generated would probably be proportional to the number of manufacturers. Electronics industries Association (EIA),an organization of manufactures with establishing the DTE and modem. This is a 25-pincable whose pins have designated functions and specified signal levels. The RS-232C is anticipated to be replaced by an update standard.2.ARCHITECTURE OF COMPUTER NETWORKSComputer network is a complex consisting of two or more conned computing units, it is used for the purpose of data communication and resource resource sharing. Design of a network and its logical structure should comply with a set of design principles, including the organization of functions and the description of data formats and procedure. This is the network architecture and so called as a set of layers and protocols, because the architecture is a layer-based.In the next two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model.1.The OSI Reference ModelThe OSI model is shown in Fig.14-2(minus the physical medium). This model is based on a proposal developed by the International Standards Organizations (OSI) as the first step toward international standardization of the protocols used in the various layers. The model is called the ISO OSI (Open System Interconnection) Reference Model because it deals with connecting open systems--that is, systems that are open for communication with other systems, We will usually just call it the OSI model for short.The OSI model has seven has seven layers. Note that the OSI model itself is not a network architecture because it does not specify the exact services and protocols to be used in each layer. It just tells what each layer should do. However , However, ISO has also produced standards for all the layers, although these are not part of the reference model itself. Each one has been published as a separate international standard.2.The TCP/IP Reference ModelThe TCP/IP reference model is an early transport protocol which was designed by the US Department of Defence (DOD) around in 1978. It is often claimed that it gave rise the OSI “connectionless”mode of operation. TCP/IP is still usedextensively and is called as a industrial standard of internet work in fact, TCP/IP has two parts: TCP and IP. TCP means it is on the transport layer and IP means it is on the network layer separately.1.There are two end-to-end protocols in the transport layer, one of which is TCP (Transmission Control Protocol) , another is UDP (User Datagram Protocol). TCP is a connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet. UDP is an unreliable, connectionless protocol for application that do not want TCP’s sequencing of flows control flow control and wish to provide their own.2.The network layer defines an official packet format and protocol called IP (Internet protocol). The job of the network layer is to deliver IP packets where they are supposed to go.The TCP/IP Reference Model is shown in Fig.14.3. On top of the transport layer is the application layer, It contains all the higher-level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP), electronic mail (SMTP) and domain name service(DNS).3.WIDE AREA NETWORKA wide area network, or WAN, spans a large geographical area, often a country or continent . It contains a collection of machines intended for running user (i. e. , application) programs. We will follow traditional usage and call these machines hosts. By a communication subnet, or just subnet for short. The job of the subnet is to carry messages from host to host, just as the telephone system carries words from speaker to listener. By separating the pure communication aspects of the network (the subnet) from the application aspects (the hosts), the complete network design is greatly simplified. Relation between hosts and the subnet is shown in Fig.14-4.One of many methods that can be used to categorize wide area networks is with respect to the flow of information on a transmission facility. If we use this method to categorize wide area networks, we can group them into three basic types: circuit switched, leased line and packet switched.1.CIRCUIT SWITCHED NETWORKSThe most popular type of network and the one almost all readers use on a daily basis is a circuit switched network. The public switched telephone network, however,is not limited to the telephone company, By purchasing appropriate switching equipment, any organization can construct their own internal circuit switched network and, if desired, provide one or more interfaces to the public switched network to allow voice and data transmission to flow between the public network and their private internal network2.LEASED LINE NETWORKSThis is a dedicated network connected by leased lines. Leased line is a communications line reserved for the exclusive use of a leasing customer without inter-exchange switching arrangements. Leased or private lines are dedicated to the user. This advantage is that the terminal or computer is a always physically connected to the line. Very short response times are met with service.3.PACKET SWITCHING NETWORKSA packet network is constructed through the use of equipment that assembles and disassembles packets, equipment that routes packet, and transmission facilities used to route packets from the originator to the destination device. Some types of data terminal equipment (DTE) can create their own packets, while other types of DTE require the conversion of their protocol into packets through the use of a packet assembler / disassemble (PAD). Packets are routed through the network by packet switches. Packet switches examine the destination of packets as they flow through the network and transfer the packets onto trunks interconnecting switches based upon the packet destination destination and network activity.Many older pubic networks follow a standard called X.25. It was developed during 1970s by CCITT to provide an interface between public packet-switched network and their customers.CCITT Recommendation X.25 controls the access from a packet mode DTE, such as a terminal device or computer system capable of forming packets, to the DCE at a packet mode. CCITT Recommendation X.28 controls the interface between non-packet mode devices that cannot interface between the PAD and the host computer. CCITT Recommendation X.3 specifies the parameter settings on the PAD and X.75 specifies the interface between packet network.4.LOCAL AREA NETWORKLocal area data network , normally referred to simply as local area network or LANs, are used to interconnect distributed communities of computer-based DTEs located within a building or localized group of building. For example, a LAN may be used to interconnect workstations distributed around offices within a single building or a group of buildings such as a university campus. Alternatively, it may be complex. Since all the equipment is located within a single establishment, however, LANs are normally installed and maintained by the organization. Hence they are also referred to as private data networks.The main difference between a communication path established using a LAN and a connection made through a public data network is that a LAN normally offers much higher date transmission rates because of the relatively short physical separations involved. In the context of the ISO Reference Model for OSI, however, this difference manifests itself only at the lower network dependent layers. In many instances the higher protocol layers in the reference model are the same for both types of network.Before describing the structure and operation of the different types of LAN, it is perhaps helpful to first identify some of the selection issues that must be considered. It should be stressed that this is only a summary; there are also many possible links between the tips of the branches associated with the figure.1.TopologyMost wide area networks, such as the PSTN, use a mesh (sometimes referred to as a network) topology. With LANs, however, the limited physical separation of the subscriber DTEs allows simpler topologies to be used. The four topologies in common use are star, bus ,ring and hub.The most widespread topology for LANs designed to function as data communication subnetworks for the interconnection of local computer-based equipment is the hub topology, which is a variation a variation of the bus and ring. Sometimes it is called hub/tree topology.2.Transmission mediaTwisted pair, coaxial cable and optical fiber are the three main type of transmission medium used for LANs.3. Medium access control methodsTwo techniques have been adopted for use of the medium access control in the LANs. They are carrier-sense-multiple-access with collision detection (CSMA/CD), for bus network topologies, and control token, for use with either bus or ring networks.CSMA/CD is used to control multiple-access networks. Each on the network “listens” before attempting to send a message, waiting for the “traffic” to clear. If two stations try to sent their messages at exactly the same time, a “collision” is detected, and both stations are required to “step back” and try later.Control token is another way of controlling access to a shared transmission medium that is by the use of a control (permission) token. This token is passed form one DTE to another according to a defined set of rules understood and adhered to by all DTEs connected to the medium. ADTE may only transmit a frame when it is in possession of the token and, after it has transmitted the frame, it passed the token on to allow another DTE to access the transmission medium.1.计算机网络数据通信端设备可以是计算机、打印机、键盘、CRT等,它们可以产生要发送的数字信息,也可使用所接收的数字数据。

Cooperative Diversity in Wireless Networks 文献翻译

Cooperative Diversity in Wireless Networks 文献翻译

Cooperative Diversity in Wireless Networks 文献翻译————————————————————————————————作者:————————————————————————————————日期:23 无线网络的协作分集:高效协议和中断行为 摘要:我们研究和分析了低复杂度的协作分集协议用以抵抗无线网络中多径传播引起的衰落,其底层技术是利用协作终端为其他终端转发信号而获得空间分集。

我们略述几种协同通信策略,包括固定中继方法如放大-转发,译码-转发,基于协同终端间的信道估计的选择中继方式,基于目标终端的有限反馈的增量中继方式。

我们在高SNR 条件下以中断事件、相关中断概率指标讨论了其性能特征,以估计协议对传输衰落的鲁棒性。

除固定的解码—转发协议外,所有的协同分集协议就所达到的全分集(也就是在两个终端下的二阶分集)来说是高效的,而且在某些状态下更加接近于最优(小于1。

5dB )。

因此,当用分布式天线时,我们可以不用物理阵列而提供很好的空间分集效应,但因为采用半双工工作方式要牺牲频谱效率,也可能要增加额外接收硬件的开销。

协作分集对任何无线方式都适用,包括因空间限制而不能使用物理阵列的蜂窝移动通信和无线ad hoc 网络,这些性能分析显示使用这些协议可减少能耗.索引语——分集技术,衰落信道,中断概率,中继信道,用户协同,无线网络Ⅰ 介绍在无线网络中,多径传播引起的信号衰落是一个特别严重的信道损害问题,可以利用分集技术来减小。

II 系统模型在图1中的无线信道模型中,窄带传输会产生频率非选择性衰落和附加噪声。

我们在第四部分重点分析慢衰落,在时延限制相当于信道相干时间里,用中断概率来评价,与空间分集的优势区分.虽然我们的协同协议能自然的扩展到宽频带和高移动情况,其中面临各自的频域和时域的选择性衰落,当系统采用另一种形式的分集时对我们协议的潜在影响将相对减小。

4A 媒体接入当前的无线网络中,例如蜂窝式和无线局域网,我们将有用的带宽分成正交信道,并且分配这些信道终端,使我们的协议适用于现存的网络.这种选择产生的意外效果是,我们能够同时在I —A 处理多径(单个接收)和干扰(多个接收),相当于在信号接收机传输信号的一对中继信号.对于我们所有的协同协议,传输中的必须同时处理他们接收到的信号;但是,网络实现使终端不能实现全双工,也就是,传输和接收同时在相同的频带中实现。

无线局域网毕业论文中英文对照资料外文翻译文献

无线局域网毕业论文中英文对照资料外文翻译文献

无线局域网毕业论文中英文对照资料外文翻译文献中英文对照资料外文翻译文献WLANWhy use WLANFor one of the main local area network management, for the laying of cables, or check the cable is disconnected this time-consuming work, it is easy to upset, not easy to break in a short time to find out where. Furthermore, for the business and application environment constantly updating and development of enterprise network must be matched with the original re-layout, need to re-install the network lines, although the cable itself is not expensive, but requested the technical staff to the high cost of wiring, especially the old building, wiring project costs even higher. Therefore, the construction of wireless local area network has become the best solution.What conditions need to use WLANWLAN is not limited to alternative local area network, but to make up for lack of wired local area networks, in order to achieve the purpose of extending the network, the following circumstances may have wireless local area network.●no fixed workplace users●wired local area network set up by the environmental constraints●As a wired local area network backup systemWLAN access technologyCurrently manufacturers in the design of wireless local area network products, there are quite a variety of access design methods can be divided into three categories: narrowband microwave, spread spectrum (Spread Spectrum) technology, andinfrared have their advantages and disadvantages, limitations, and more, followed by detailed discussion of these techniques. (Infrared) technology, each technique has their advantages and disadvantages, limitations, and more, followed by detailed discussion of these techniques.Technical requirementsAs wireless local area network needs to support high-speed, burst data services, need to be addressed in the indoor use of multipath fading, as well as issues such as crosstalk subnets. Specifically, wireless local area network must achieve the following technical requirements:1)Reliability: Wireless LAN system packet loss rate should be lower than 10-5,the error rate should be lower than 10-8.2)Compatibility: For indoor use of wireless local area network, so as far aspossible with the existing wired LAN network operating system and networksoftware compatible.3)Data rate: In order to meet the needs of local area network traffic, wirelessLAN data transfer rate should be more than 1Mbps.4)The confidentiality of communications: As the data transmitted in the air viawireless media, wireless local area networks at different levels must takeeffective measures to improve communication security and data security.5)Mobility: support for all mobile networks or semi-mobile network.6)Energy Management: When receiving or sending data to the site when themachine is in sleep mode, when activated again when the data transceiver toachieve the savings in power consumption.7)small size and low price: This is the key to the popularity of wireless local areanetwork can be.8)Electromagnetic environment: wireless LAN should consider thehumanbodyand the surrounding electromagnetic environment effects.AndroidGoogle Android is a Linux-based platform for developing open-source phone operating system (registered trademark in China called "Achi;). It includes operating systems, user interface and applications - mobile phone work required by the software, but there is no past, the exclusive right to impede innovation and barriers to mobile industry, called mobile terminal is the first to create a truly open and complete mobile software. Google and Open Handset Alliance to develop the Android, the alliance by including China Mobile, Motorola, Qualcomm and T-Mobile, including more than 30 technology and the composition of a leader in wireless applications. Google with operators, equipment manufacturers, developers and other interested parties to form deep-level partnerships, hoping to establish a standardized, open software platform for mobile phones in the mobile industry to form an open ecosystem .It uses software stack layers (software stack, also known as the software stack) architecture, is divided into three parts: thecore of the underlying Linux-based language developed by the c, only basic functions. Middle layer consists of library. Library and Virtual Machine Virtual Machine, developed by the C +. At the top are a variety of applications, including the call procedures, SMS procedures, application software is developed by the companies themselves to write java.To promote this technology, Google, and dozens of other phone company has established the Open Handset Alliance (Open Handset Alliance).Characteristic●application framework to support component reuse and replacement●Dalvik virtual machine specifically for mobile devices i s optimized●Internal integrated browser, the browser-based open-source WebKit engine●optimization of 2D and 3D graphics library includes graphics library, 3Dgraphics library based on OpenGL ES 1.0 (hardware-accelerated optional)●# SQLite for structured data storage●Multimedia support includes the common audio, video and static image fileformats (such as MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF)●GSM phone (depending on hardware)●Bluetooth Bluetooth, EDGE, 3G, and WiFi (hardware dependent)●Camera, GPS, compass, and accelerometer (hardware dependent)●Rich development environment including a device emulator, debugger,memory and performance analysis charts, and the Eclipse integrateddevelopment environment plug-insApplicationsA core Android application package together with the release of the application package, including email client, SMS short messaging program, calendar, maps, browser, contact management procedures. A ll applications are written using JA V A.Android Application Framework Developers have full access to core applications used by the API framework. The application framework designed to simplify the reuse of software components; any application can publish its functional blocks and any other applications can use the function block its release (but must follow the framework of security restrictions). Reuse mechanism allows the application form can be user replaced.All of the following applications by the composition of a range of services and systems, including:●an expanded view (V iews) can be used to build applications, including a list of(lists), grid (grids), text boxes (text boxes), buttons (buttons), and even an embeddable web browser.●Content Manager (Content Providers) allows applications to access data fromanother application program (such as the contact database), or to share their own data.● A resource manager (Resource Manager) to provide access to non-coderesources, such as local strings, graphics, and hierarchical file (layout files).● A notification manager (Notif ication Manager) allows applications to customersin the status bar display notification information.●An activity class Manager (Activity Manager) to manage the application lifecycle and provides common navigation rollback feature.Ordering the systemOrdering the system information using automated software tools to achieve la carte, side dishes, stir fry vegetables to the transfer of all management processes; completion point, the computer management menu, point the menu and the kitchen, front-end checkout synchronization print; achieved without the menu paper-based operation; backstage manager of inquiry; warehouse inventory management and so on.In addition, ordering the system can also effectively manage customer data, archiving and future reference, put an end to the restaurant "leakage List", "run list" phenomenon; help restaurants using computer data processing capability and powerful ability to process optimization to achieve automated management, streamline workflow restaurant, reduce waste and man-made phenomenon of management oversight, re-optimal allocation of corporate resources, the operating costs to a minimum.Powerful addition to ordering the system to support the general application of stand-alone and LAN in addition to support head office / branch of multi-level framework used for remote network using the POS system to achieve front store sales cashier, sales of small-ticket instantly print sales day-end, reporting sales data and receive information of new featuresdishes.There are three currently ordering the system to achieve mode:First, the touch screen a la carte model: It uses the currently most popular touch-computer ordering process to achieve that members can to order the software screen prompts, simply click on the screen with your fingers can complete the entire ordering process and convenient This model applies to the practice of rich dishes and large restaurants, restaurants, and restaurant, etc..Second,the wireless PDA ordering mode: it uses a wireless WiFi technology, a la carte interface by PDA display, use touch pen to complete the ordering process, virtuallyanywhere, anytime to order real-time response, this model is more suitable for dishes and practices simple restaurant, features a restaurant and special mood of senior restaurants.Third, the wireless ordering Po mode: it uses the ISM band, can be a floor or other obstruction in the case of seamless coverage up to 10 meters away, while the signal remained stable, which is the ratio of the wireless PDA ordering model's greatest strength, this model applies to simple dishes and practices and other requirements with fewer fast food restaurants, pot shops.。

英文文献科技类原文及翻译1

英文文献科技类原文及翻译1

英文文献科技类原文及翻译1On the deployment of V oIP in Ethernet networks:methodology and case studyAbstractDeploying IP telephony or voice over IP (V oIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step methodology on how V oIP can be deployed successfully. The methodology can be used to assess the support and readiness of an existing network. Prior to the purchase and deployment of V oIP equipment, the methodology predicts the number of V oIP calls that can be sustained by an existing network while satisfying QoS requirements of all network services and leaving adequate capacity for future growth. As a case study, we apply the methodology steps on a typical network of a small enterprise. We utilize both analysis and simulation to investigate throughput and delay bounds. Our analysis is based on queuing theory, and OPNET is used for simulation. Results obtained from analysis and simulation are in line and give a close match. In addition, the paper discusses many design and engineering issues. These issues include characteristics of V oIP traffic and QoS requirements, V oIP flow and call distribution, defining future growth capacity, and measurement and impact of background traffic. Keywords: Network Design,Network Management,V oIP,Performance Evaluation,Analysis,Simulation,OPNET1 IntroductionThese days a massive deployment of V oIP is taking place over data networks. Most of these networks are Ethernet based and running IP protocol. Many network managers are finding it very attractive and cost effective to merge and unify voice and data networks into one. It is easier to run, manage, and maintain. However, one has to keep in mind that IP networks are best-effort networks that were designed for non-real time applications. On the other hand, V oIP requires timely packet delivery with low latency, jitter, packet loss, andsufficient bandwidth. To achieve this goal, an efficient deployment of V oIP must ensure these real-time traffic requirements can be guaranteed over new or existing IP networks. When deploying a new network service such as V oIP over existing network, many network architects, managers, planners, designers, and engineers are faced with common strategic, and sometimes challenging, questions. What are the QoS requirements for V oIP? How will the new V oIP load impact the QoS for currently running network services and applications? Will my existing network support V oIP and satisfy the standardized QoS requirements? If so, how many V oIP calls can the network support before upgrading prematurely any part of the existing network hardware? These challenging questions have led to the development of some commercial tools for testing the performance of multimedia applications in data networks. A list of the available commercial tools that support V oIP is listed in [1,2]. For the most part, these tools use two common approaches in assessing the deployment of V oIP into the existing network. One approach is based on first performing network measurements and then predicting the network readiness for supporting V oIP. The prediction of the network readiness is based on assessing the health of network elements. The second approach is based on injecting real V oIP traffic into existing network and measuring the resulting delay, jitter, and loss. Other than the cost associated with the commercial tools, none of the commercial tools offer a comprehensive approach for successful V oIP deployment. I n particular, none gives any prediction for the total number of calls that can be supported by the network taking into account important design and engineering factors. These factors include V oIP flow and call distribution, future growth capacity, performance thresholds, impact of V oIP on existing network services and applications, and impact background traffic on V oIP. This paper attempts to address those important factors and layout a comprehensive methodology for a successful deployment of any multimedia application such as V oIP and video conferencing. However, the paper focuses on V oIP as the new service of interest to be deployed. The paper also contains many useful engineering and design guidelines, and discusses many practical issues pertaining to the deployment of V oIP. These issues include characteristics of V oIP traffic and QoS requirements, V oIP flow and call distribution, defining future growth capacity, and measurement and impact of background traffic. As a case study, we illustrate how ourapproach and guidelines can be applied to a typical network of a small enterprise. The rest of the paper is organized as follows. Section 2 presents a typical network topology of a small enterprise to be used as a case study for deploying V oIP. Section 3 outlines practical eight-step methodology to deploy successfully V oIP in data networks. Each step is described in considerable detail. Section 4 describes important design and engineering decisions to be made based on the analytic and simulation studies. Section 5 concludes the study and identifies future work.2 Existing network3 Step-by-step methodologyFig. 2 shows a flowchart of a methodology of eight steps for a successful V oIP deployment. The first four steps are independent and can be performed in parallel. Before embarking on the analysis and simulation study, in Steps 6 and 7, Step 5 must be carried out which requires any early and necessary redimensioning or modifications to the existing network. As shown, both Steps 6 and 7 can be done in parallel. The final step is pilot deployment.3.1. VoIP traffic characteristics, requirements, and assumptionsFor introducing a new network service such as V oIP, one has to characterize first the nature of its traffic, QoS requirements, and any additional components or devices. For simplicity, we assume a point-to-point conversation for all V oIP calls with no call conferencing. For deploying V oIP, a gatekeeper or Call Manager node has to be added to the network [3,4,5]. The gatekeeper node handles signaling for establishing, terminating, and authorizing connections of all V oIP calls. Also a V oIP gateway is required to handle external calls. A V oIP gateway is responsible for converting V oIP calls to/from the Public Switched Telephone Network (PSTN). As an engineering and design issue, the placement of these nodes in the network becomes crucial. We will tackle this issue in design step 5. Otherhardware requirements include a V oIP client terminal, which can be a separate V oIP device, i.e. IP phones, or a typical PC or workstation that is V oIP-enabled. A V oIP-enabled workstation runs V oIP software such as IP Soft Phones .Fig. 3 identifies the end-to-end V oIP components from sender to receiver [9]. The first component is the encoder which periodically samples the original voice signal and assigns a fixed number of bits to each sample, creating a constant bit rate stream. The traditional sample-based encoder G.711 uses Pulse Code Modulation (PCM) to generate 8-bit samples every 0.125 ms, leading to a data rate of 64 kbps . The packetizer follows the encoder and encapsulates a certain number of speech samples into packets and adds the RTP, UDP, IP, and Ethernet headers. The voice packets travel through the data network. An important component at the receiving end, is the playback buffer whose purpose is to absorb variations or jitter in delay and provide a smooth playout. Then packets are delivered to the depacketizer and eventually to the decoder which reconstructs the original voice signal. We will follow the widely adopted recommendations of H.323, G.711, and G.714 standards for V oIP QoS requirements.Table 1 compares some commonly used ITU-T standard codecs and the amount ofone-way delay that they impose. To account for upper limits and to meet desirable quality requirement according to ITU recommendation P.800, we will adopt G.711u codec standards for the required delay and bandwidth. G.711u yields around 4.4 MOS rating. MOS, Mean Opinion Score, is a commonly used V oIP performance metric given in a scale of 1–5, with 5 is the best. However, with little compromise to quality, it is possible to implement different ITU-T codecs that yield much less required bandwidth per call and relatively a bit higher, but acceptable, end-to-end delay. This can be accomplished by applying compression, silence suppression, packet loss concealment, queue management techniques, and encapsulating more than one voice packet into a single Ethernet frame.3.1.1. End-to-end delay for a single voice packetFig. 3 illustrates the sources of delay for a typical voice packet. The end-to-end delay is sometimes referred to by M2E or Mouth-to-Ear delay. G.714 imposes a maximum total one-way packet delay of 150 ms end-to-end for V oIP applications . In [22], a delay of up to 200 ms was considered to be acceptable. We can break this delay down into at least three different contributing components, which are as follows (i) encoding, compression, and packetization delay at the sender (ii) propagation, transmission and queuing delay in the network and (iii) buffering, decompression, depacketization, decoding, and playback delay at the receiver.3.1.2. Bandwidth for a single callThe required bandwidth for a single call, one direction, is 64 kbps. G.711 codec samples 20 ms of voice per packet. Therefore, 50 such packets need to be transmitted per second. Each packet contains 160 voice samples in order to give 8000 samples per second. Each packet is sent in one Ethernet frame. With every packet of size 160 bytes, headers of additional protocol layers are added. These headers include RTP+UDP+IP+Ethernet with preamble of sizes 12+8+20+26, respectively. Therefore, a total of 226 bytes, or 1808 bits, needs to be transmitted 50 times per second, or 90.4 kbps, in one direction. For both directions, the required bandwidth for a single call is 100 pps or 180.8 kbps assuming a symmetric flow.3.1.3. Other assumptionsThroughout our analysis and work, we assume voice calls are symmetric and no voice conferencing is implemented. We also ignore the signaling traffic generated by the gatekeeper. We base our analysis and design on the worst-case scenario for V oIP call traffic. The signaling traffic involving the gatekeeper is mostly generated prior to the establishment of the voice call and when the call is finished. This traffic is relatively small compared to the actual voice call traffic. In general, the gatekeeper generates no or very limited signaling traffic throughout the duration of the V oIP call for an already established on-going call. In this paper, we will implement no QoS mechanisms that can enhance the quality of packet delivery in IP networks.A myriad of QoS standards are available and can be enabled for network elements. QoS standards may i nclude IEEE 802.1p/Q, the IETF’s RSVP, and DiffServ.Analysis of implementation cost, complexity, management, and benefit must be weighed carefully before adopting such QoS standards. These standards can be recommended when the cost for upgrading some network elements is high and the network resources are scarce and heavily loaded.3.2. VoIP traffic flow and call distributionKnowing the current telephone call usage or volume of the enterprise is an important step for a successful V oIP deployment. Before embarking on further analysis or planning phases for a V oIP deployment, collecting statistics about of the present call volume and profiles is essential. Sources of such information are organization’s PBX, telephone records and bills. Key characteristics of existing calls can include the number of calls, number of concurrent calls, time, duration, etc. It is important to determine the locations of the call endpoints, i.e. the sources and destinations, as well as their corresponding path or flow. This will aid in identifying the call distribution and the calls made internally or externally. Call distribution must include percentage of calls within and outside of a floor, building, department, or organization. As a good capacity planning measure, it is recommended to base the V oIP call distribution on the busy hour traffic of phone calls for the busiest day of a week or a month. This will ensure support of the calls at all times with high QoS for all V oIP calls.When such current statistics are combined with the projected extra calls, we can predict the worst-case V oIP traffic load to be introduced to the existing network.Fig. 4 describes the call distribution for the enterprise under study based on the worst busy hour and the projected future growth of V oIP calls. In the figure, the call distribution is described as a probability tree. It is also possible to describe it as a probability matrix. Some important observations can be made about the voice traffic flow for inter-floor and external calls. For all these type of calls, the voice traffic has to be always routed through the router. This is so because Switchs 1 and 2 are layer 2 switches with VLANs configuration. One can observe that the traffic flow for inter-floor calls between Floors 1 and 2 imposes twice the load on Switch 1, as the traffic has to pass through the switch to the router and back to the switch again. Similarly, Switch 2 experiences twice the load for external calls from/to Floor 3.3.3. Define performance thresholds and growth capacityIn this step, we define the network performance thresholds or operational points for a number of important key network elements. These thresholds are to be considered when deploying the new service. The benefit is twofold. First, the requirements of the new service to be deployed are satisfied. Second, adding the new service leaves the network healthy and susceptible to future growth. Two important performance criteria are to be taken into account.First is the maximum tolerable end-to-end delay; and second is the utilization bounds or thresholds of network resources. The maximum tolerable end-to-end delay is determined by the most sensitive application to run on the network. In our case, it is 150 ms end-to-end for V oIP. It is imperative to note that if the network has certain delay sensitive applications, the delay for these applications should be monitored, when introducing V oIP traffic, such that they do not exceed their required maximum values. As for the utilization bounds for network resources, such bounds or thresholds are determined by factors such as current utilization, future plans, and foreseen growth of the network. Proper resource and capacity planning is crucial. Savvy network engineers must deploy new services with scalability in mind, and ascertain that the network will yield acceptable performance under heavy and peak loads, with no packet loss. V oIP requires almost no packet loss. In literature, 0.1–5% packet loss was generally asserted. However, in [24] the required V oIP packet loss was conservatively suggested to be less than 105 . A more practical packet loss, based on experimentation, of below 1% was required in [22]. Hence, it is extremely important not to utilize fully the network resources. As rule-of-thumb guideline for switched fast full-duplex Ethernet, the average utilization limit of links should be 190%, and for switched shared fast Ethernet, the average limit of links should be 85% [25]. The projected growth in users, network services, business, etc. must be all taken into consideration to extrapolate the required growth capacity or the future growth factor. In our study, we will ascertain that 25% of the available network capacity is reserved for future growth and expansion. For simplicity, we will apply this evenly to all network resources of the router, switches, and switched-Ethernet links. However, keep in mind this percentage in practice can be variable for each network resource and may depend on the current utilization and the required growth capacity. In our methodology, the reservation of this utilization of network resources is done upfront, before deploying the new service, and only the left-over capacity is used for investigating the network support of the new service to be deployed.3.4. Perform network measurementsIn order to characterize the existing network traffic load, utilization, and flow, networkmeasurements have to be performed. This is a crucial step as it can potentially affect results to be used in analytical study and simulation. There are a number of tools available commercially and noncommercially to perform network measurements. Popular open-source measurement tools include MRTG, STG, SNMPUtil, and GetIF [26]. A few examples of popular commercially measurement tools include HP OpenView, Cisco Netflow, Lucent VitalSuite, Patrol DashBoard, Omegon NetAlly, Avaya ExamiNet, NetIQ Vivinet Assessor, etc. Network measurements must be performed for network elements such as routers, switches, and links. Numerous types of measurements and statistics can be obtained using measurement tools. As a minimum, traffic rates in bits per second (bps) and packets per second (pps) must be measured for links directly connected to routers and switches. To get adequate assessment, network measurements have to be taken over a long period of time, at least 24-h period. Sometimes it is desirable to take measurements over several days or a week. One has to consider the worst-case scenario for network load or utilization in order to ensure good QoS at all times including peak hours. The peak hour is different from one network to another and it depends totally on the nature of business and the services provided by the network.Table 2 shows a summary of peak-hour utilization for traffic of links in both directions connected to the router and the two switches of the network topology of Fig. 1. These measured results will be used in our analysis and simulation study.外文文献译文以太网网络电话传送调度:方法论与案例分析摘要对网络数据研究者与设计师来说,IP电话或者语音IP电话调度是一项重大而艰巨的任务。

无线路由器中英文外文翻译文献

无线路由器中英文外文翻译文献

无线路由器中英文外文翻译文献本文介绍了一些关于无线路由器的中英文外文翻译文献,并对其进行简要介绍。

- Author: John Smith- Author: Jane Johnson- Published in: Journal of Wireless Networking3. Title: "Securing Wireless Routers: Best Practices and Vulnerabilities"- Author: David Lee- Published in: Journal of Internet Security4. Title: "Wireless Router Placement for Optimal Coverage: A Case Study"- Author: Sarah Chen- Summary: This case study investigates the optimal placement of wireless routers to achieve maximum coverage. It explores factors thataffect signal strength and coverage, such as obstacles and interference, and proposes strategies for router placement to improve network performance and expand coverage in different environments.以上是一些关于无线路由器的中英文外文翻译文献的简要介绍。

这些文献涵盖了无线路由器的技术、性能评估、安全性和优化方面的研究,有助于了解无线路由器的相关知识和应用。

计算机网络中英文对照外文翻译文献

计算机网络中英文对照外文翻译文献

中英文资料外文翻译计算机网络计算机网络,通常简单的被称作是一种网络,是一家集电脑和设备为一体的沟通渠道,便于用户之间的沟通交流和资源共享。

网络可以根据其多种特点来分类。

计算机网络允许资源和信息在互联设备中共享。

一.历史早期的计算机网络通信始于20世纪50年代末,包括军事雷达系统、半自动地面防空系统及其相关的商业航空订票系统、半自动商业研究环境。

1957年俄罗斯向太空发射人造卫星。

十八个月后,美国开始设立高级研究计划局(ARPA)并第一次发射人造卫星。

然后用阿帕网上的另外一台计算机分享了这个信息。

这一切的负责者是美国博士莱德里尔克。

阿帕网于来于自印度,1969年印度将其名字改为因特网。

上世纪60年代,高级研究计划局(ARPA)开始为美国国防部资助并设计高级研究计划局网(阿帕网)。

因特网的发展始于1969年,20世纪60年代起开始在此基础上设计开发,由此,阿帕网演变成现代互联网。

二.目的计算机网络可以被用于各种用途:为通信提供便利:使用网络,人们很容易通过电子邮件、即时信息、聊天室、电话、视频电话和视频会议来进行沟通和交流。

共享硬件:在网络环境下,每台计算机可以获取和使用网络硬件资源,例如打印一份文件可以通过网络打印机。

共享文件:数据和信息: 在网络环境中,授权用户可以访问存储在其他计算机上的网络数据和信息。

提供进入数据和信息共享存储设备的能力是许多网络的一个重要特征。

共享软件:用户可以连接到远程计算机的网络应用程序。

信息保存。

安全保证。

三.网络分类下面的列表显示用于网络分类:3.1连接方式计算机网络可以据硬件和软件技术分为用来连接个人设备的网络,如:光纤、局域网、无线局域网、家用网络设备、电缆通讯和G.hn(有线家庭网络标准)等等。

以太网的定义,它是由IEEE 802标准,并利用各种媒介,使设备之间进行通信的网络。

经常部署的设备包括网络集线器、交换机、网桥、路由器。

无线局域网技术是使用无线设备进行连接的。

计算机科学与技术专业无线局域网毕业论文外文文献翻译及原文

计算机科学与技术专业无线局域网毕业论文外文文献翻译及原文

毕业设计(论文)外文文献翻译文献、资料中文题目:无线局域网文献、资料英文题目:文献、资料来源:文献、资料发表(出版)日期:院(部):专业:计算机科学与技术专业班级:姓名:学号:指导教师:翻译日期: 2017.02.14毕业设计(论文)外文资料翻译外文出处:Chris Haseman. Android-essential(用外文写)s[M].London:Spring--Verlag,2008.8-13.附件: 1.外文资料翻译译文;2.外文原文。

指导教师评语:签名:年月日注:请将该封面与附件装订成册。

附件1:外文资料翻译译文无线局域网一、为何使用无线局域网络对于局域网络管理主要工作之一,对于铺设电缆或是检查电缆是否断线这种耗时的工作,很容易令人烦躁,也不容易在短时间内找出断线所在。

再者,由于配合企业及应用环境不断的更新与发展,原有的企业网络必须配合重新布局,需要重新安装网络线路,虽然电缆本身并不贵,可是请技术人员来配线的成本很高,尤其是老旧的大楼,配线工程费用就更高了。

因此,架设无线局域网络就成为最佳解决方案。

二、什么情形需要无线局域网络无线局域网络绝不是用来替代有限局域网络,而是用来弥补有线局域网络之不足,以达到网络延伸之目的,下列情形可能须要无线局域网络。

●无固定工作场所的使用者●有线局域网络架设受环境限制●作为有线局域网络的备用系统三、无线局域网络存取技术目前厂商在设计无线局域网络产品时,有相当多种存取设计方式,大致可分为三大类:窄频微波技术、展频(Spread Spectrum)技术、及红外线(Infrared)技术,每种技术皆有其优缺点、限制及比较,接下来是这些技术方法的详细探讨。

1.技术要求由于无线局域网需要支持高速、突发的数据业务,在室内使用还需要解决多径衰落以及各子网间串扰等问题。

具体来说,无线局域网必须实现以下技术要求:1)可靠性:无线局域网的系统分组丢失率应该低于10-5,误码率应该低于10-8。

无线局域网外文翻译

无线局域网外文翻译

AbstractThis paper focuses on the development of an energy efficent street lighting remote management system making use of low-rate wireless personal area networks and the Digital Addressable Lighting Interface (DALI) protocol to get a duplex communication, necessary for checking lamp parameters like lamp status, current level ,etc.Because of the fact that two thirds of the installed street lighting systems use old and inefficient technologies there exists a huge potential to renew the street lighting and save in the energy consumption. The proposed system uses DALI protocol in street lighting increasing the maximum number of slave devices (ballasts) that can be controlled with DALI-originally it can only have 64 ballasts. Some aspects regarding the lighting control protocol and the communication system are discussed, presenting experimental results obtained from several tests.IntroductionTwo thirds of the current installed street lighting systems still use very old and inefficient technologies, that is , there exists a huge potential to renew the existing street lighting and save in the energy consumption[1]. It is estimated that nearly the 5% of the energy used in lighting applications is consumed by the street lighting, being the most important energy regarding the energy usage in a city . New industrial approaches have been develop recently in order to achieve an efficient lighting, which can be summarized in improvements in lamps' technology and electronic ballasts, soft start systems, noiseless performance and lighting automatisms.Saving energy in street lighting can be achieved with two methods,by controlling the light duration or by dimming. There also exist remote management systems that allow the user to keep an individual remote control and monitorization of every single lamp. By making use of these systems the operator can monitor the main parameters of any light point from a central or mobile unit. The obtained data are ready for processing, allowing the reckoning of statistical consumption, lamp status, voltages, anomalies,ect,decreasing the mean time to repair. Another interesting parameter could be the arc voltage level, which can mean the change of a corrective or preventive maintenance to a predictive one, saving money in the maintenance cost.In order to have an optimum control, the remote management system should allow a duplex or half/duplex communication between the user and the ballast; otherwise we could not know the lighting status. The management system is implemented using a communication system and a lighting control protocol. The communication system can be wired,such as Ethernet, optical fiber and Power Line Carrier(PLC) or wireless. Among the last group we have GSM/GPRS, RF,WiFi,WiMAX,IEEE802.15.4 and ZigBee have brought about the boom of wireless sensor networks(WSNs).A comprehensive study of the state of the art of WSNs and both standards can be found in [2] and [3].A WSN consists of tiny sensor nodes, sink nodes, an information transport network and personal computers. Usually, WSN architecture consists of three layers, the physical layer, the MAC layer and the application layer. The IEEE802.15.4 standard deals with Low-Rate Wireless Personal Area Networks(LR-WPAN); its aim is to standardize the two lower layers of OSI protocol stack, i.e.physical layer and medium access control layer. It only considers star and peer-to-peer network topologies. On the other hand , ZigBee defines the upper layers, network and application layers, its main contribution is to provide the ability of forming cluster,tree and meshnetwork topologies to IEEE802.15.4 applicationsAs regards the lighting control protocol, it can be chosen between an open protocol,like TCP/IP , BACNet, DMX512,LONWorks,X-10, 0-10 V or DALI, or proprietary.DALI stands for Digital Addressable Lighting Interface, it was defined by annex E.4 of IEC 60929 as a digital signal controller for tubular fluorescent lamp ballasts' control interface and modified by IEC 62386, which also integrates other application of DALI apart from lighting and extends the kind of lamp to high intensity discharge (HID), halogens, incandescent, LEDs,etc.This paper focuses on developing a street lighting management system by making use of wireless sensor networks and DALI ballasts, materials used in the system are described and results about tests and measurements are presented.BackgroundSeveral scientific researches have been carried out in order to take the WSN advantages to the street lighting systems. For example, reference[4] explains the development of a wireless control system based on ZigBee. Their system allows the user to control and monitor the state of the lighting , but they do not focus on the energy efficienty, just the maintenance and the removal of wires in public areas for the people safety. Reference[5] gives a more complex exemple of WSN applied to street lighting, they develop a system that consists of sensor nodes placed in streetlight poles, a sink node in transformer station which controls every sensor node placed in a pole that belongs to that transformer station. The information of any sink node is sent to the control center via GPRS. The system also has individual or bank dimming up to 60% in order to save the energy consumption. Reference[6] states the main features of a WSN to be used as a street lighting control system, they use 6LoWPAN instead of ZigBee due to ZigBee routing protocols drawbacks and the ease of adapting 6LoWPAN, which does not define routing protocols, to any specific system文摘这一张主要是关注基于无线节能局域网和DALI协议的节能型路灯的远程控制系统之间的连接,用于检查单个路灯,比如路灯的位置、路灯的电流等。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

无线局域网技术外文翻译文献(文档含中英文对照即英文原文和中文翻译)翻译:无线局域网技术最近几年,无线局域网开始在市场中独霸一方。

越来越多的机构发现无线局域网是传统有线局域网不可缺少的好帮手,它可以满足人们对移动、布局变动和自组网络的需求,并能覆盖难以铺设有线网络的地域。

无线局域网是利用无线传输媒体的局域网。

就在前几年,人们还很少使用无线局域网。

原因包括成本高、数据率低、职业安全方面的顾虑以及需要许可证。

随着这些问题的逐步解决,无线局域网很快就开始流行起来了。

无线局域网的应用局域网的扩展在20世纪80年代后期出现的无线局域网早期产品都是作为传统有线局域网替代品而问世的。

无线局域网可以节省局域网缆线的安装费用,简化重新布局和其他对网络结构改动的任务。

但是,无线局域网的这个动机被以下一系列的事件打消。

首先,随着人们越来越清楚地认识到局域网的重要性,建筑师在设计新建筑时就包括了大量用于数据应用的预先埋设好的线路。

其次,随着数据传输技术的发展,人们越来越依赖于双绞线连接的局域网。

特别是3类和5类非屏蔽双绞线。

大多数老建筑中已经铺设了足够的3类电缆,而许多新建筑里则预埋了5类电缆。

因此,用无线局域网取代有线局域网的事情从来没有发生过。

但是,在有些环境中无线局域网确实起着有线局域网替代品的作用。

例如,象生产车间、股票交易所的交易大厅以及仓库这样有大型开阔场地的建筑;没有足够双绞线对,但又禁止打洞铺设新线路的有历史价值的建筑;从经济角度考虑,安装和维护有线局域网划不来的小型办公室。

在以上这些情况下,无线局域网向人们提供了一个有效且更具吸引力的选择。

其中大多数情况下,拥有无线局域网的机构同时也拥有支持服务器和某些固定工作站的有线局域网。

因此,无线局域网通常会链接到同样建筑群内的有线局域网上。

所以我们将此类应用领域成为局域网的扩展。

建筑物的互连无线局域网技术的另一种用途是邻楼局域网之间的连接,这些局域网可以是无线的也可以是有线的。

在这种情况下,两个楼之间采用点对点的无线链接。

被链接的设备通常是网桥或路由器。

这种点对点的单链路从本质上看不是局域网,但通常我们也把这种应用算作无线局域网。

漫游接入漫游接入提供局域网和带有天线的移动数据终端之间的无线链接,如膝上型电脑和笔记本电脑。

这种应用的一个例子是从外地出差回来的职员将数据从个人移动电脑传送到办公室的服务器上。

漫游接入在某种延伸的环境下也是十分有用的,如在建筑群之外操作的一台电脑或一次商务行为。

在以上两种情况下,用户会带着自己的电脑随意走动,并希望可以从不同的位置访问有线局域网上的服务器。

自组网络自组网络(ad hoc network)是为了满足某些即时需求而临时而建立的一种对等网络(没有中央服务器)例如,有一群职员,每人带着一台膝上电脑或掌上电脑,会聚在商务会议室或课堂上。

这些职员会将他们的电脑链接起来,形成一个临时性的、仅仅在会议期间存在的网络。

无线局域网的要求无线局域网必须满足所有局域网的典型要求,包括大容量、近距离的覆盖能力、相连站点间的完全连接性以及广播能力。

另外,无线局域网环境还有一些特殊的要求。

以下是一些无线局域网最终要的要求:吞吐量:媒体接入控制协议应当尽可能地有效利用无线媒体以达到最大的容量。

节点数量:无线局域网可能需要支持分布在多个蜂窝中的上百个节点。

连接到主干局域网:在大多数情况下,要求能够与主干有线局域网的站点相互连接。

对于有基础设施的无线局域网,很容易通过利用控制模块完成这个任务,控制模块本身就连接着这两种类型的局域网。

对于移动用户和自组无线网络来说,可能需要满足这个要求。

电池能量消耗:移动工作人员用的是由电池供电的工作站,它需要在使用无线适配器的情况下,电池供电时间足够长。

这就是说,要求移动节点不停地监视接入点或者经常要与基站握手的MAC协议是不适用的。

通常,无线局域网的实现都具有在不使用网络时减少能量消耗的特殊性能,如睡眠模式。

传输健壮性和安全性:除非涉及合理,无线局域网很容易受到干扰并且容易被窃听。

无线局域网的设计必须做到即使在噪音较大的环境中也能可靠传输,并且为应用提供某种程度的安全性,以防窃听。

并列的网络操作:随着无线局域网变得越来越流行,很可能有两个或者更多无线局域网同时存在于一个区域内,或在局域网之间可能存在干扰的某些区域内运行。

这种干扰可能会阻碍MAC算法的正常运行,还可能造成对特定局域网的非法接入。

不需要许可证的操作:用户希望购买和运行的是这样的无线局域网产品,它们不需要专门为局域网所使用的频带而申请许可证。

切换和漫游:无线局域网中使用的MAC协议应当让移动站点能够从一个蜂窝移动到另一个蜂窝。

动态配置:局域网在MAC地址机制和网络管理方面应当允许端系统能够动态且自动地增加、删除和移动位置,并且不打扰到其他用户。

无线局域网技术无线局域网通常根据它所采用的传输技术进行分类。

目前所有无线局域网产品都可归为以下三个大类之一:红外线(IR)局域网:红外线局域网的一个蜂窝只能限制在一个房间里,因为红外线无法穿过不透明的墙。

扩频局域网:这种类型的局域网利用了扩频传输技术。

在大多数情况下,这些局域网运行在ISM(个人、科学和医学)波段内,因此,在美国使用这些局域网不需要联邦通信委员会(FCC)发放的许可证。

窄带微波:这些局域网运行在微波频率是,但没有使用扩频技术。

其中有些产品运行的频率需要FCC的许可证,而其他一些产品则使用了不需要许可的波段。

无线局域网有一个特性是人们乐意接受的,虽然不是必要的,那就是不需要通过麻烦的授权过程就能使用。

每个国家的许可证发放制度都不一样,这就使事情变得更加复杂。

在美国,FCC在ISM波段内特许了两个不需要许可证的应用:最大功率为1瓦的扩频系统合最大运行功率为0.5瓦的低功率系统。

自从FCC开放了这个波段以来,在扩频无线局域网中的应用就越来越普遍。

1990年IEEE802.11工作组成立,它的宪章就是要为无线局域网开发MAC协议以及物理媒体规约。

无线局域网中最小的模块是基本服务集(Basic Service Set, BSS),它由一些执行相同MAC协议并争用同一共享媒体完成接入的站点组成。

基本服务集可以是孤立的,也可以通过接入点(Access Point, AP)连到主干分发系统(Distribution System, DS)上。

接入点的功能相当于网桥。

MAC协议可以是完全分布式的,也可以由位于接入点的中央协调功能控制。

BBS通常与文献中的蜂窝相对应,而DS则有可能是交换机或有线网络,也可以是无线网络。

MAC层的主要任务是在MAC实体之间传送MSDU,这个任务是由分发服务实现的。

分发服务的正常运行需要该ESS内所有站点的信息,而这个信息是由与关联(association)相关的服务提供的。

在分发服务向站点交付数据或者接收来自站点的数据之前,该站点必须要建立关联。

标准基于移动性定义了三种转移类型:无转移:这种类型的站点或者是固定的,或者只在一个BSS的直接通信范围内移动。

BSS转移:这种类型的站点移动是在同一ESS内从一个BSS移动到另一个BSS。

在这种情况下,该站点的数据交付需要寻址功能,能识别出该站点的新位置。

ESS转移:它的定义是指站点从一个ESS的BSS到另一个ESS的BSS移动。

只有从某种意义上看该站点是能够移动的,才能支持这种类型的转移。

802.11工作组考虑了两类MAC算法建议:分布式接入协议和集中式接入协议。

分布式接入协议类似于以太网,采用载波监听机制把传输的决定权分布到所有节点。

集中式接入协议由一个集中的决策模块来控制发送。

分布式接入协议对于对等工作站形式的自组网络是有意义的,同时也可能对主要是突发性通信量的其他一些无线局域网颇具吸引力。

如果一个局域网的配置是由许多互连的无线站点和以某种形式连接到主干有线局域网的基站组成,则采用集中式接入控制是自然而然的事情。

当某些数据是时间敏感的或者是高优先级的时,这种方法特别有用。

IEEE802.11的最终结果是一个称为分布式基础无线MAC(Distributed Foundation Wireless MAC,DFWMAC)的算法,它提供了一个分布式接入控制机制,并在顶端具有可选的集中式控制。

MAC层的低端子层是分布式协调功能(Distributed Coordination Function , DCF).DCF采用争用算法向所有通信量提供接入。

正常的异步通信量直接使用DCF。

点协调功能(Point Coordination Function, PCF)是一个集中式MAC算法,用于提供无争用服务。

分布式协调功能DCF子层使用一种简单的CSMA(载波监听多点接入)算法。

如果站点有一个MAC 帧要发送,则先监听媒体。

如果媒体空闲,站点可以发送。

否则,该站点必须等待直到当前的发送结束。

DCF不包括冲突检测功能(CSMA/CD),因为在无线网络中进行冲突检测是不实际的。

媒体上信号变动范围很大,所以如果正在传输的站点接收到微弱信号,它无法区分这是噪声还是因为自己的传输而带来的影响。

为了保证算法的平稳和公平运行,DCF包含了一组等价于优先级策略的时延。

我们首先考虑一个称为帧间间隔(InterFrame Space,IFS)时延。

采用IFS后CSMA 的接入规则如下:1。

有帧要传输的站点先监听媒体。

如果媒体是空闲的,等待IFS长的一段时间,再看媒体是否空闲,如果是空闲,立即发送。

2。

如果媒体是忙的(或是一开始就发现忙,或是在IFS空闲时间内发现媒体忙),则推迟传输,并继续监听媒体直到当前的传输结束。

3。

一旦当前的传输结束,站点再延迟IFS一段时间。

如果媒体在这段时间内都是空闲的,则站点采用二进制指数退避策略等待一段时间后再监听媒体,如果媒体依然是空闲的,则可以传输。

在退避期间,如果媒体又变忙了,退避定时器暂停,并在媒体变空闲后恢复计时。

点协调功能PCF是在DCF之上实现的另一种接入方式。

其操作由中央轮询主控器(点协调器)的轮询构成。

点协调在发布轮询时采用PIFS。

因为PIFS比DIFS小,所以点协调器在发布轮询和接收响应时能获取媒体并封锁所有的异步通信量。

点协调器不断地发布轮询,并永远封锁所有异步通信量。

为了避免这种情况,定义了一个称为超帧(superframe)的时间间隔。

在超帧时间的开始部分,点协调器以循环方式向所有配置成轮询的站点发布轮询。

然后,在余下的超帧时间里,点协调器空闲,允许异步通信量有一段争用接入的时间。

在超帧开始时,点协调器可以在给定时间内获得控制权和发布轮询,这由选项决定。

由于响应站点发出的帧的长度是变化的,所以这个时间间隔也是变化的。

超帧剩余的时间用于基于争用的接入。

在超帧末尾,点协调器泳PIFS时间争用媒体接入权。

相关文档
最新文档