英文文献科技类原文及翻译1

英文文献科技类原文及翻译1

On the deployment of V oIP in Ethernet networks:

methodology and case study

Abstract

Deploying IP telephony or voice over IP (V oIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step methodology on how V oIP can be deployed successfully. The methodology can be used to assess the support and readiness of an existing network. Prior to the purchase and deployment of V oIP equipment, the methodology predicts the number of V oIP calls that can be sustained by an existing network while satisfying QoS requirements of all network services and leaving adequate capacity for future growth. As a case study, we apply the methodology steps on a typical network of a small enterprise. We utilize both analysis and simulation to investigate throughput and delay bounds. Our analysis is based on queuing theory, and OPNET is used for simulation. Results obtained from analysis and simulation are in line and give a close match. In addition, the paper discusses many design and engineering issues. These issues include characteristics of V oIP traffic and QoS requirements, V oIP flow and call distribution, defining future growth capacity, and measurement and impact of background traffic. Keywords: Network Design,Network Management,V oIP,Performance Evaluation,

Analysis,Simulation,OPNET

1 Introduction

These days a massive deployment of V oIP is taking place over data networks. Most of these networks are Ethernet based and running IP protocol. Many network managers are finding it very attractive and cost effective to merge and unify voice and data networks into one. It is easier to run, manage, and maintain. However, one has to keep in mind that IP networks are best-effort networks that were designed for non-real time applications. On the other hand, V oIP requires timely packet delivery with low latency, jitter, packet loss, and

sufficient bandwidth. To achieve this goal, an efficient deployment of V oIP must ensure these real-time traffic requirements can be guaranteed over new or existing IP networks. When deploying a new network service such as V oIP over existing network, many network architects, managers, planners, designers, and engineers are faced with common strategic, and sometimes challenging, questions. What are the QoS requirements for V oIP? How will the new V oIP load impact the QoS for currently running network services and applications? Will my existing network support V oIP and satisfy the standardized QoS requirements? If so, how many V oIP calls can the network support before upgrading prematurely any part of the existing network hardware? These challenging questions have led to the development of some commercial tools for testing the performance of multimedia applications in data networks. A list of the available commercial tools that support V oIP is listed in [1,2]. For the most part, these tools use two common approaches in assessing the deployment of V oIP into the existing network. One approach is based on first performing network measurements and then predicting the network readiness for supporting V oIP. The prediction of the network readiness is based on assessing the health of network elements. The second approach is based on injecting real V oIP traffic into existing network and measuring the resulting delay, jitter, and loss. Other than the cost associated with the commercial tools, none of the commercial tools offer a comprehensive approach for successful V oIP deployment. I n particular, none gives any prediction for the total number of calls that can be supported by the network taking into account important design and engineering factors. These factors include V oIP flow and call distribution, future growth capacity, performance thresholds, impact of V oIP on existing network services and applications, and impact background traffic on V oIP. This paper attempts to address those important factors and layout a comprehensive methodology for a successful deployment of any multimedia application such as V oIP and video conferencing. However, the paper focuses on V oIP as the new service of interest to be deployed. The paper also contains many useful engineering and design guidelines, and discusses many practical issues pertaining to the deployment of V oIP. These issues include characteristics of V oIP traffic and QoS requirements, V oIP flow and call distribution, defining future growth capacity, and measurement and impact of background traffic. As a case study, we illustrate how our

approach and guidelines can be applied to a typical network of a small enterprise. The rest of the paper is organized as follows. Section 2 presents a typical network topology of a small enterprise to be used as a case study for deploying V oIP. Section 3 outlines practical eight-step methodology to deploy successfully V oIP in data networks. Each step is described in considerable detail. Section 4 describes important design and engineering decisions to be made based on the analytic and simulation studies. Section 5 concludes the study and identifies future work.

2 Existing network

3 Step-by-step methodology

Fig. 2 shows a flowchart of a methodology of eight steps for a successful V oIP deployment. The first four steps are independent and can be performed in parallel. Before embarking on the analysis and simulation study, in Steps 6 and 7, Step 5 must be carried out which requires any early and necessary redimensioning or modifications to the existing network. As shown, both Steps 6 and 7 can be done in parallel. The final step is pilot deployment.

3.1. VoIP traffic characteristics, requirements, and assumptions

For introducing a new network service such as V oIP, one has to characterize first the nature of its traffic, QoS requirements, and any additional components or devices. For simplicity, we assume a point-to-point conversation for all V oIP calls with no call conferencing. For deploying V oIP, a gatekeeper or Call Manager node has to be added to the network [3,4,5]. The gatekeeper node handles signaling for establishing, terminating, and authorizing connections of all V oIP calls. Also a V oIP gateway is required to handle external calls. A V oIP gateway is responsible for converting V oIP calls to/from the Public Switched Telephone Network (PSTN). As an engineering and design issue, the placement of these nodes in the network becomes crucial. We will tackle this issue in design step 5. Other

hardware requirements include a V oIP client terminal, which can be a separate V oIP device, i.e. IP phones, or a typical PC or workstation that is V oIP-enabled. A V oIP-enabled workstation runs V oIP software such as IP Soft Phones .

Fig. 3 identifies the end-to-end V oIP components from sender to receiver [9]. The first component is the encoder which periodically samples the original voice signal and assigns a fixed number of bits to each sample, creating a constant bit rate stream. The traditional sample-based encoder G.711 uses Pulse Code Modulation (PCM) to generate 8-bit samples every 0.125 ms, leading to a data rate of 64 kbps . The packetizer follows the encoder and encapsulates a certain number of speech samples into packets and adds the RTP, UDP, IP, and Ethernet headers. The voice packets travel through the data network. An important component at the receiving end, is the playback buffer whose purpose is to absorb variations or jitter in delay and provide a smooth playout. Then packets are delivered to the depacketizer and eventually to the decoder which reconstructs the original voice signal. We will follow the widely adopted recommendations of H.323, G.711, and G.714 standards for V oIP QoS requirements.

Table 1 compares some commonly used ITU-T standard codecs and the amount of

one-way delay that they impose. To account for upper limits and to meet desirable quality requirement according to ITU recommendation P.800, we will adopt G.711u codec standards for the required delay and bandwidth. G.711u yields around 4.4 MOS rating. MOS, Mean Opinion Score, is a commonly used V oIP performance metric given in a scale of 1–5, with 5 is the best. However, with little compromise to quality, it is possible to implement different ITU-T codecs that yield much less required bandwidth per call and relatively a bit higher, but acceptable, end-to-end delay. This can be accomplished by applying compression, silence suppression, packet loss concealment, queue management techniques, and encapsulating more than one voice packet into a single Ethernet frame.

3.1.1. End-to-end delay for a single voice packet

Fig. 3 illustrates the sources of delay for a typical voice packet. The end-to-end delay is sometimes referred to by M2E or Mouth-to-Ear delay. G.714 imposes a maximum total one-way packet delay of 150 ms end-to-end for V oIP applications . In [22], a delay of up to 200 ms was considered to be acceptable. We can break this delay down into at least three different contributing components, which are as follows (i) encoding, compression, and packetization delay at the sender (ii) propagation, transmission and queuing delay in the network and (iii) buffering, decompression, depacketization, decoding, and playback delay at the receiver.

3.1.2. Bandwidth for a single call

The required bandwidth for a single call, one direction, is 64 kbps. G.711 codec samples 20 ms of voice per packet. Therefore, 50 such packets need to be transmitted per second. Each packet contains 160 voice samples in order to give 8000 samples per second. Each packet is sent in one Ethernet frame. With every packet of size 160 bytes, headers of additional protocol layers are added. These headers include RTP+UDP+IP+Ethernet with preamble of sizes 12+8+20+26, respectively. Therefore, a total of 226 bytes, or 1808 bits, needs to be transmitted 50 times per second, or 90.4 kbps, in one direction. For both directions, the required bandwidth for a single call is 100 pps or 180.8 kbps assuming a symmetric flow.

3.1.3. Other assumptions

Throughout our analysis and work, we assume voice calls are symmetric and no voice conferencing is implemented. We also ignore the signaling traffic generated by the gatekeeper. We base our analysis and design on the worst-case scenario for V oIP call traffic. The signaling traffic involving the gatekeeper is mostly generated prior to the establishment of the voice call and when the call is finished. This traffic is relatively small compared to the actual voice call traffic. In general, the gatekeeper generates no or very limited signaling traffic throughout the duration of the V oIP call for an already established on-going call. In this paper, we will implement no QoS mechanisms that can enhance the quality of packet delivery in IP networks.

A myriad of QoS standards are available and can be enabled for network elements. QoS standards may i nclude IEEE 802.1p/Q, the IETF’s RSVP, and DiffServ.Analysis of implementation cost, complexity, management, and benefit must be weighed carefully before adopting such QoS standards. These standards can be recommended when the cost for upgrading some network elements is high and the network resources are scarce and heavily loaded.

3.2. VoIP traffic flow and call distribution

Knowing the current telephone call usage or volume of the enterprise is an important step for a successful V oIP deployment. Before embarking on further analysis or planning phases for a V oIP deployment, collecting statistics about of the present call volume and profiles is essential. Sources of such information are organization’s PBX, telephone records and bills. Key characteristics of existing calls can include the number of calls, number of concurrent calls, time, duration, etc. It is important to determine the locations of the call endpoints, i.e. the sources and destinations, as well as their corresponding path or flow. This will aid in identifying the call distribution and the calls made internally or externally. Call distribution must include percentage of calls within and outside of a floor, building, department, or organization. As a good capacity planning measure, it is recommended to base the V oIP call distribution on the busy hour traffic of phone calls for the busiest day of a week or a month. This will ensure support of the calls at all times with high QoS for all V oIP calls.

When such current statistics are combined with the projected extra calls, we can predict the worst-case V oIP traffic load to be introduced to the existing network.

Fig. 4 describes the call distribution for the enterprise under study based on the worst busy hour and the projected future growth of V oIP calls. In the figure, the call distribution is described as a probability tree. It is also possible to describe it as a probability matrix. Some important observations can be made about the voice traffic flow for inter-floor and external calls. For all these type of calls, the voice traffic has to be always routed through the router. This is so because Switchs 1 and 2 are layer 2 switches with VLANs configuration. One can observe that the traffic flow for inter-floor calls between Floors 1 and 2 imposes twice the load on Switch 1, as the traffic has to pass through the switch to the router and back to the switch again. Similarly, Switch 2 experiences twice the load for external calls from/to Floor 3.

3.3. Define performance thresholds and growth capacity

In this step, we define the network performance thresholds or operational points for a number of important key network elements. These thresholds are to be considered when deploying the new service. The benefit is twofold. First, the requirements of the new service to be deployed are satisfied. Second, adding the new service leaves the network healthy and susceptible to future growth. Two important performance criteria are to be taken into account.

First is the maximum tolerable end-to-end delay; and second is the utilization bounds or thresholds of network resources. The maximum tolerable end-to-end delay is determined by the most sensitive application to run on the network. In our case, it is 150 ms end-to-end for V oIP. It is imperative to note that if the network has certain delay sensitive applications, the delay for these applications should be monitored, when introducing V oIP traffic, such that they do not exceed their required maximum values. As for the utilization bounds for network resources, such bounds or thresholds are determined by factors such as current utilization, future plans, and foreseen growth of the network. Proper resource and capacity planning is crucial. Savvy network engineers must deploy new services with scalability in mind, and ascertain that the network will yield acceptable performance under heavy and peak loads, with no packet loss. V oIP requires almost no packet loss. In literature, 0.1–5% packet loss was generally asserted. However, in [24] the required V oIP packet loss was conservatively suggested to be less than 105 . A more practical packet loss, based on experimentation, of below 1% was required in [22]. Hence, it is extremely important not to utilize fully the network resources. As rule-of-thumb guideline for switched fast full-duplex Ethernet, the average utilization limit of links should be 190%, and for switched shared fast Ethernet, the average limit of links should be 85% [25]. The projected growth in users, network services, business, etc. must be all taken into consideration to extrapolate the required growth capacity or the future growth factor. In our study, we will ascertain that 25% of the available network capacity is reserved for future growth and expansion. For simplicity, we will apply this evenly to all network resources of the router, switches, and switched-Ethernet links. However, keep in mind this percentage in practice can be variable for each network resource and may depend on the current utilization and the required growth capacity. In our methodology, the reservation of this utilization of network resources is done upfront, before deploying the new service, and only the left-over capacity is used for investigating the network support of the new service to be deployed.

3.4. Perform network measurements

In order to characterize the existing network traffic load, utilization, and flow, network

measurements have to be performed. This is a crucial step as it can potentially affect results to be used in analytical study and simulation. There are a number of tools available commercially and noncommercially to perform network measurements. Popular open-source measurement tools include MRTG, STG, SNMPUtil, and GetIF [26]. A few examples of popular commercially measurement tools include HP OpenView, Cisco Netflow, Lucent VitalSuite, Patrol DashBoard, Omegon NetAlly, Avaya ExamiNet, NetIQ Vivinet Assessor, etc. Network measurements must be performed for network elements such as routers, switches, and links. Numerous types of measurements and statistics can be obtained using measurement tools. As a minimum, traffic rates in bits per second (bps) and packets per second (pps) must be measured for links directly connected to routers and switches. To get adequate assessment, network measurements have to be taken over a long period of time, at least 24-h period. Sometimes it is desirable to take measurements over several days or a week. One has to consider the worst-case scenario for network load or utilization in order to ensure good QoS at all times including peak hours. The peak hour is different from one network to another and it depends totally on the nature of business and the services provided by the network.

Table 2 shows a summary of peak-hour utilization for traffic of links in both directions connected to the router and the two switches of the network topology of Fig. 1. These measured results will be used in our analysis and simulation study.

外文文献译文

以太网网络电话传送调度:方法论与案例分析

摘要

对网络数据研究者与设计师来说,IP电话或者语音IP电话调度是一项重大而艰巨的任务。本文概述的准则与循序渐进的方法,解释了如何在IP上成功调度传送语音。该方法可用于评估的支持,并准备用在现有的网络。此前购买并部署的网络电话设备,这种方法预算出了在保证现有网络服务质量要求与日后足够扩充能力基础上的网络电话调用次数。作为一个研究的课题,我们把这种方法在一个典型的小型企业网上得到逐步应用。我们运用分析与模拟吞吐量与延迟区域。我们的分析基于排队理论,同时OPNET 用于模拟。理论分析与模拟结构比较一致。此外,本文谈论了许多设计与工程问题。这些问题包含网络电话通信的特征与服务质量要求,网络电话流程与呼叫分配,定义未来增长容量,测定后台通信的影响。

关键词:网络设计,网络管理,V oIP,性能评估,分析,模拟,OPNET

绪论

最近大量的网络电话调度在数据网中占有相当的比例。其中大部分基于以太网与运行IP协议。很多网络管理员发现把语音与数据网合二为一非常有吸引力与具成本效应。这将更易于运行、管理与保护。然而,人们应该认识到IP网络目的是为了非实时应用服务;另一方面,网络电话要求带有低延迟、低抖动、低丢包率与充足的带宽。为了达到这一目标,务必保证在现有或者新的IP网络中完成实时通信要求的高效网络电话调度。当在现有的网络部署譬如VoIP这样的新网络服务,许多网络架构师、经理、计划师、设计师与工程师面临着共同的目标与挑战。什么是网络电话的服务质量要求?新的网络电话负荷如何冲击了当今运行中的网络服务与应用的质量?我们现有的网络将支持网络电话与将满足标准的服务质量要求吗?假如那样,在过早升级任何现有的网络硬件的零件前,能支持多少个的VoIP电话网络?这些富挑战性的问题导致了用于测试网络多媒体数据应用性能的商业工具的进展。支持网络电话的商用工具名单如表[1,2]。很大程度上,这些工具使用两种共同的方法把VoIP 部署入现有的网络。一种方法根据第一次执行的网络测量与然后预测支持VoIP的网络应该就绪情况。预测的网络情况是根据网络要素来估计的。第二种是根据加入到现有网络中VoIP的实时通信信息,然后测出延时时间、时基误差与丢包率。除有关的商业工具费用外,没有其它工具能够提供全面兼容的成功网络电话调度方法。特别是,无任何一个预测能给出网络能够支持的呼叫次数已提到设计与工程的议事日程上来。这些因素包含网络电话流程与呼叫分配、今后增长容量、性能极限、VoIP对现有网络服务与应用与后台通信能力的冲击。本文尝试研究这些重要因素,规划出一个支持像网络电话与视频会议系统的全面可行方法。

不管如何,本文集中论述了网络电话服务调度新方法。文章同样包含了许多工程与设计指南,同时也讨论了许多与网络电话有关的实际问题。这些问题包含网络电话的通信与服务质量要求,网络电话数据流向与呼叫分配,定义今后的增长容量与我们的方法与纲领如何应用在像小型的企业网这样的典型网络中。其余部分作如下安排:第二部分论述了小型企业网的典型网络拓扑如何在网络电话中实现调度。第三部分大致描述了网络电话数据网调度有用的八个步骤。每一步骤都有全面的说明。第四部分介绍了基于分析与仿真研究得出的重要设计结论与工程结论。第五部分谈到了今后研究还需做的具体工作。

2 现有的网络

图1 一个小型企业网的逻辑图

图1是在大厦中一个的小型企业网的典型网络拓扑图。图中所示真实网络情况仅用于研究目的;然而,我们文中提出的原理、框架与概念等工作成果将会更容易被大型网络采纳。这些网络都是通过一个路由连接的两个第二层以太网交换机。路由是卡西欧2621,交换机是3Com Superstack 3300。交换机1连接第一、二层与两个服务器;交换机2连接第三层与四个服务器。每一层的本地局域网就是一个连接有个人电脑的工作组与打印机服务器的共享以太网。网络利用虚拟局域网来隔离广播与组播拥塞。总计有五个局域网存在。所有虚拟局域网基于端口划分。交换机一配置三个虚拟局域网。虚拟局域网一包含数据库与文件服务器。虚拟局域网二包含层一。虚拟局域网三包含层二。另一方面,交换机二配置为含有两个虚拟局域网。虚拟局域网四包含邮件服务器、超文本协议、网页与缓存代理与防火墙。虚拟局域网五包含层三。除了层1-3是100Mbps 的半双工以太网其余链接都是100Mbps 速率全双工的以太网。

3 步进的方法论

路由器

文件服

务器

数据库 层2

一个小型企业网的逻辑图

交换机1 交换机2

打印机服务器

工作组服务器 互联网

前面网络评估与更换

分析模拟

前端调度

说明方法步骤的流程图

图1说明方法步骤的流程图

图2表示了一个成功的网络电话调度八步骤流程图。前面四步是独立的,能够并行运行。在封装分析与模拟研究前,作为前面网络评估与更换的第5步务必先执行。如图,步骤6与7能够并行执行。最后一步是前端调度。

3.1 网络电话通信特征、要求与假想

要介绍像网络电话这样的服务,首先要概括出它通信的本质、服务质量要求与其它原因或者设备问题。出于简单考虑,我们假定在一个没有呼叫协商的点对点对话网络电话呼叫。对网络电话调度来说,网络节点或者呼叫管理器节点务必添加到网络[3,4,5]。网络节点处理用于建立、终止与受权所有网络电话呼叫的连接,同时也要处理外部的呼叫。网络电话负责转换网络电话呼叫到公共交换电话网(或者反向)。作为一个工程与设计课题,如何放置这些网络中的节点变得至关紧要。在步骤5中我们会谈到如何处理这个问题。其它硬件要求包含网络电话客户终端(比如网络电话机或者典型的个人电脑又或者是含有激活网络电话的工作站)能够是独立的设备。激活网络电话的工作站运行着像IP 电话这样的软件。

图 2 网络电话端到端器件

图3表示了一个端对端网络电话的发送与接收器件。第一个器件是编码器,它用于周期性采集原始声音信号与分配固定的比特位给每一个样本,产生一个常速率的比特流。传统的样本采集编码器G.711利用脉冲编码调制来产生每0.125 ms 的8位比特的样本,从而产生64 kbps 的数据速率。压缩包随着编码器压入一定数量的语音标本到信息包,然后加入实时位置、用户数据报、网际协议与以太网报头等信息。语音信号包随之流向数据网络。在接收端有一个重要的元件,它是为了汲取变调的声音与抖动失确实录音回放缓冲器,同时也是为了提供平滑过度的释放。然后数据包被传送至解压器,最终还原成原始声音信号。我们会使用大量被推荐网络电话的H.323、 G.711、与G.714服务质量保证标准。

表 1标准ITU-T 编码器与其默认值

表1对使用国际电信联盟标准的多媒体数字信号编解码器与大量强制要求的单声道的延迟标准作了一个比较。为了达到上层限制要求与满足国际电信联盟推荐的质量要求标准P.800,我们使用G.711u 编解码器标准来满足延时与带宽要求。G.711u 产生4.4等级MOS 。MOS ,意思为一种经常用在网络电话性能指标中的评价标准,有1-5个等级,第封装 解包 编码 解码

标准ITU-T 编码器与其默认值

A/D 转换延迟

5级为最好。然而,为了折衷小小的质量问题,最有可能执行每次呼叫需求带宽更少、有关程度稍高、更能同意的端到端的延迟时间的ITU-T编解码器的不一致标准。这将通过用密集的、静默压缩的、隐蔽的小包丢失数、队列管理技术与把超过一个声音信号包封装在单个以太网帧中。

3.1.1 单声道的端到端延迟

图3阐述了典型语音包延迟的缘由。这端到端的延迟有的时候归结于M2E或者口到耳的延迟。G.714提出了单声道最大总数不超过150ms的网络电话端到端应用。在[22]提到不超过200ms的延迟是能够同意的。我们能够通过下列最少三种起作用的元件降低延迟:(i)发送端的编码、压缩与解压延迟;(ii)传播、运输与网络中的排队延迟;(iii)接收端的缓冲、解压、解码、录音重放延迟。

3.1.2 单个呼叫的带宽

单个呼叫的带宽要求,一个参数就是64 kbps。G.711多媒体编解码器每个语音包20ms的采样。因此,每秒必需有50个这样的数据包。每个包中包含160语音样本目的是为了达到8000每秒的采样率。每个包通过单个以太网帧传送。每个包有160字节大小,再加上协议各层的报头信息。这些报头包含12+8+20+26对应大小的RTP+UDP+IP+Ethernet信息。因此,总共有226字节(或者1808位)的信息需要每秒传送50次,或者一次传送90.4 kbps。关于每个参数来说,一次呼叫需求的带宽是100 脉冲/秒或者均衡的180.8 kbps数据流。

3.1.3 其余假设

纵览我们的分析与研究工作,能够假设语音呼叫次数是均衡的而且语音协商被得到有效执行。我们也忽视了网关的信号拥塞。基于对网络电话呼叫拥塞最坏情况的分析与研究,网关最有可能在建立呼叫与拆除呼叫时产生发送拥塞。比起实际语音呼叫拥塞来说这还是相对较小的。总体上,在一个已经建立好同时在运行的网络电话呼叫持续时间内,网关中产生非常少或者没有信号拥塞。本文我们将使用非服务质量 (能增强在IP 网络层传输包的质量的一种服务) 的设备。许多的服务质量标准能够被网络设备运用。服务质量标准包含IEEE 802.1p/Q、the IETF’s RSVP、与DiffServ。分析运行开支、复杂性、管理与利益务必在使用服务质量标准前好好衡量一下。当网络资源稀少且负荷严重需升级一些花费较贵的网络设备时就应该推荐这种标准。

3.2 网络电话信息流与呼叫分布情况

要明白现在的电话呼叫方法与企业的容量需求是成功的网络电话调度的重要步骤。在着手分析更深层意义的网络电话调度计划阶段,收集静止的现有呼叫量与网络电话的整体框架情况是很有必要的。像这样的信息是组织机构的专用分组交换机、电话清单。现有呼叫的关键问题包含呼叫次数、并发呼叫的次数、时间、持续时间等等。测定呼叫终端的位置显得很重要,比如源与目的地、传输路径与流向。这将有助于辨别呼叫分布情况与内外部的呼叫。呼叫分布情况务必包含在楼层里面与外面的呼叫百分比、建筑物、部门与组织机构。作为一个良好容量测量,建议基于一个星期或者一个月中的最繁忙时期网络电话呼叫分布情况。这将能保证任何时期都有高服务质量的网络电话呼叫支持。当现今的数据表计划外的呼叫结合起来的时候,我们能够推测现有网络中最糟糕的网络电话负载。

网络电话呼叫分配概率树型图

图3网络电话呼叫分配概率树型图

图4描述了基于最繁忙时段的企业呼叫分布情况。在图中,呼叫分布情况被描述成概率树形式。这也能够说成是概率矩阵。一些重要资料能够通过内外部的语音信息流得出。对所有类型的呼叫来说,语音信息流都要通过路由器进行路由选择。这是由于交换机1与2是第2层虚拟以太网设备。能够通过交换机1的层1与层2之间两次负载看出拥塞流向,由于信息包要通过交换机到达路由再返回到交换机。类似,交换机2从(到)第3层经历了两次外部呼叫的负载。

3.3 定义性能极限与增长容量

在这一步,我们对许多重要的网络关键设备进行了性能极限或者操作点的定义。当调度新的服务时这些极限值得考虑。好处是双重的。首先是新服务调度要求令人满意;其次,增加新的设备使网络更健康良性进展。这两个性能标准正被提到议事日程上来。第一是端到端延迟的最大容忍极限;第二是网络资源的极限限制。端到端延迟的最大极限由运行在网络中的灵敏应用服务决定。在我们的案例中,对网络电话来说端到端的延迟是150ms。假如网络的灵敏应用有一定的延迟,当研究网络电话拥塞时对这些应用的延迟监控显得很有必要,这样他们就不可能超过最大极限了。对网络资源的应用范围来说,这样的范围与极限由当前应用与将来的计划与可预见的网络增长决定。恰当的资源与容量计划是至关紧要的。聪明的网络工程师务必把新服务调度的可量测性放在脑中,保证网络在重载与轻载的时候都会产生满意的性能与没有包的丢失。网络电话要求几乎没有包的丢失。在文献中,0.1~5%丢失包是经常的事。然而在文章[24]中网络电话丢失包被建议为减少至低于105 。文章[22]提到了基于实验得出的一个更实际的包丢失数是低于1%。因此,不要全部使用网络资源显得非常重要。由于单凭经验得出对快速交换全双工以太网的方法,平均使用限制在85%以内。用户计划的增长数、网络服务、繁忙程度都务必纳入考虑范围之内以此推断增长容量要求与未来增长因素。在我们的研究中,我们假设有25%的网络空闲容量能够用做将来增长之用。同样的,我们甚至把这种应用到像路由、交换机与交换以太网链接这些网络设备中。尽管如此,在实际中,应该留有对每个网络资源的这种比例与对当前应用与将来增长容量会变化的办法。在我们的拓扑图中,这种网络资源在新服务调度之前最先被保留利用,只有剩余容量被用来研究新服务调度的网络支持。

3.4 网络性能度量

为了说明现有网络通信负载、利用情况与流向,网络度量务必执行。这是一个关键性的步骤由于它能够潜在地影响分析研究与仿真结果。有很多商业或者非商业工具能够用来进行网络度量。流行的开放资源度量工具有MRTG、STG、SNMPUtil与GetIF。一些流行的商业度量工具有HP OpenView, Cisco Netflow, Lucent VitalSuite, Patrol DashBoard, Omegon NetAlly, Avaya ExamiNet, NetIQ Vivinet Assessor等等。网络度量务必在诸如路由、交换机与链接的网络设备中运行。许多类型的度量数据与统计表能够通过度量工具获得。像一个最小的以比特每秒与包每秒的传输速度可通过直接链接到的路由器与交换机测量得出。为了得到恰当的估计,网络度量务必有一段时间,至少是24小时的周期。有的时候甚至需要测量几天或者一个星期。为了保证有好的服务质

量,我们务必考虑到网络负载的最坏使用情况,包含在最高峰时期。最高峰时期的网络各不相同,它由网络提供的服务的事务的性质决定。

表2最糟网络评估表

表2显示了图1中双向链接的路由与两个交换机的网络拓扑图的最高峰拥塞情况。这些测量结果将会用于分析与仿真研究中。

摘自:《Int J Adv 》 ,2005年创刊,第25期,Manuf Technol 出版社出版,DOI 收录期刊。 From: Int J Adv .Manuf Technol (2005) 25: 723–729 DOI 10.1007/s00170-003-1914-5

From: Khaled Salah, Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, 1 July 2005.

摘自:Khaled Salah , 《信息与计算机科学》, Fahd University 皇家石油矿物大学2005 年7月1 日。 最糟网络评估表

利用率

包速率 比特率

外文文献翻译译稿和原文

外文文献翻译译稿1 卡尔曼滤波的一个典型实例是从一组有限的,包含噪声的,通过对物体位置的观察序列(可能有偏差)预测出物体的位置的坐标及速度。在很多工程应用(如雷达、计算机视觉)中都可以找到它的身影。同时,卡尔曼滤波也是控制理论以及控制系统工程中的一个重要课题。 例如,对于雷达来说,人们感兴趣的是其能够跟踪目标。但目标的位置、速度、加速度的测量值往往在任何时候都有噪声。卡尔曼滤波利用目标的动态信息,设法去掉噪声的影响,得到一个关于目标位置的好的估计。这个估计可以是对当前目标位置的估计(滤波),也可以是对于将来位置的估计(预测),也可以是对过去位置的估计(插值或平滑)。 命名[编辑] 这种滤波方法以它的发明者鲁道夫.E.卡尔曼(Rudolph E. Kalman)命名,但是根据文献可知实际上Peter Swerling在更早之前就提出了一种类似的算法。 斯坦利。施密特(Stanley Schmidt)首次实现了卡尔曼滤波器。卡尔曼在NASA埃姆斯研究中心访问时,发现他的方法对于解决阿波罗计划的轨道预测很有用,后来阿波罗飞船的导航电脑便使用了这种滤波器。关于这种滤波器的论文由Swerling(1958)、Kalman (1960)与Kalman and Bucy(1961)发表。 目前,卡尔曼滤波已经有很多不同的实现。卡尔曼最初提出的形式现在一般称为简单卡尔曼滤波器。除此以外,还有施密特扩展滤波器、信息滤波器以及很多Bierman, Thornton开发的平方根滤波器的变种。也许最常见的卡尔曼滤波器是锁相环,它在收音机、计算机和几乎任何视频或通讯设备中广泛存在。 以下的讨论需要线性代数以及概率论的一般知识。 卡尔曼滤波建立在线性代数和隐马尔可夫模型(hidden Markov model)上。其基本动态系统可以用一个马尔可夫链表示,该马尔可夫链建立在一个被高斯噪声(即正态分布的噪声)干扰的线性算子上的。系统的状态可以用一个元素为实数的向量表示。随着离散时间的每一个增加,这个线性算子就会作用在当前状态上,产生一个新的状态,并也会带入一些噪声,同时系统的一些已知的控制器的控制信息也会被加入。同时,另一个受噪声干扰的线性算子产生出这些隐含状态的可见输出。

科技文献中英文对照翻译

Sensing Human Activity:GPS Tracking 感应人类活动:GPS跟踪 Stefan van der Spek1,*,Jeroen van Schaick1,Peter de Bois1,2and Remco de Haan1 Abstract:The enhancement of GPS technology enables the use of GPS devices not only as navigation and orientation tools,but also as instruments used to capture travelled routes:as sensors that measure activity on a city scale or the regional scale.TU Delft developed a process and database architecture for collecting data on pedestrian movement in three European city centres,Norwich,Rouen and Koblenz,and in another experiment for collecting activity data of13families in Almere(The Netherlands)for one week.The question posed in this paper is:what is the value of GPS as‘sensor technology’measuring activities of people?The conclusion is that GPS offers a widely useable instrument to collect invaluable spatial-temporal data on different scales and in different settings adding new layers of knowledge to urban studies,but the use of GPS-technology and deployment of GPS-devices still offers significant challenges for future research. 摘要:增强GPS技术支持使用GPS设备不仅作为导航和定位工具,但也为仪器用来捕捉旅行路线:作为传感器,测量活动在一个城市或区域范围内规模。代尔夫特开发过程和涂数据库架构对行人运动收集数据在三个欧洲城市中心、诺维奇、鲁昂、科布伦茨,和在另一个实验中收集活动数据的13个家庭在Almere(荷兰)一个星期。本文提出的问题是:什么是GPS的价值是“传感器技术的测量活动的人吗?结论是,GPS提供了一个广泛的可用的工具来收集宝贵的时空数据在不同尺度和不同的设置添加新层的知识城市研究,但使用GPS技术和部署的GPS设备仍为未来的研究提供了重要的挑战。 Keywords:GPS;Tracking;People;Behaviour;Mapping;Movement. 关键字:GPS;跟踪;人群:行为;制图;运动

计算机科学与技术 外文翻译 英文文献 中英对照

附件1:外文资料翻译译文 大容量存储器 由于计算机主存储器的易失性和容量的限制, 大多数的计算机都有附加的称为大容量存储系统的存储设备, 包括有磁盘、CD 和磁带。相对于主存储器,大的容量储存系统的优点是易失性小,容量大,低成本, 并且在许多情况下, 为了归档的需要可以把储存介质从计算机上移开。 术语联机和脱机通常分别用于描述连接于和没有连接于计算机的设备。联机意味着,设备或信息已经与计算机连接,计算机不需要人的干预,脱机意味着设备或信息与机器相连前需要人的干预,或许需要将这个设备接通电源,或许包含有该信息的介质需要插到某机械装置里。 大量储存器系统的主要缺点是他们典型地需要机械的运动因此需要较多的时间,因为主存储器的所有工作都由电子器件实现。 1. 磁盘 今天,我们使用得最多的一种大量存储器是磁盘,在那里有薄的可以旋转的盘片,盘片上有磁介质以储存数据。盘片的上面和(或)下面安装有读/写磁头,当盘片旋转时,每个磁头都遍历一圈,它被叫作磁道,围绕着磁盘的上下两个表面。通过重新定位的读/写磁头,不同的同心圆磁道可以被访问。通常,一个磁盘存储系统由若干个安装在同一根轴上的盘片组成,盘片之间有足够的距离,使得磁头可以在盘片之间滑动。在一个磁盘中,所有的磁头是一起移动的。因此,当磁头移动到新的位置时,新的一组磁道可以存取了。每一组磁道称为一个柱面。 因为一个磁道能包含的信息可能比我们一次操作所需要得多,所以每个磁道划分成若干个弧区,称为扇区,记录在每个扇区上的信息是连续的二进制位串。传统的磁盘上每个磁道分为同样数目的扇区,而每个扇区也包含同样数目的二进制位。(所以,盘片中心的储存的二进制位的密度要比靠近盘片边缘的大)。 因此,一个磁盘存储器系统有许多个别的磁区, 每个扇区都可以作为独立的二进制位串存取,盘片表面上的磁道数目和每个磁道上的扇区数目对于不同的磁盘系统可能都不相同。磁区大小一般是不超过几个KB; 512 个字节或1024 个字节。

(完整版)数字信号处理英文文献及翻译

数字信号处理 一、导论 数字信号处理(DSP)是由一系列的数字或符号来表示这些信号的处理的过程的。数字信号处理与模拟信号处理属于信号处理领域。DSP包括子域的音频和语音信号处理,雷达和声纳信号处理,传感器阵列处理,谱估计,统计信号处理,数字图像处理,通信信号处理,生物医学信号处理,地震数据处理等。 由于DSP的目标通常是对连续的真实世界的模拟信号进行测量或滤波,第一步通常是通过使用一个模拟到数字的转换器将信号从模拟信号转化到数字信号。通常,所需的输出信号却是一个模拟输出信号,因此这就需要一个数字到模拟的转换器。即使这个过程比模拟处理更复杂的和而且具有离散值,由于数字信号处理的错误检测和校正不易受噪声影响,它的稳定性使得它优于许多模拟信号处理的应用(虽然不是全部)。 DSP算法一直是运行在标准的计算机,被称为数字信号处理器(DSP)的专用处理器或在专用硬件如特殊应用集成电路(ASIC)。目前有用于数字信号处理的附加技术包括更强大的通用微处理器,现场可编程门阵列(FPGA),数字信号控制器(大多为工业应用,如电机控制)和流处理器和其他相关技术。 在数字信号处理过程中,工程师通常研究数字信号的以下领域:时间域(一维信号),空间域(多维信号),频率域,域和小波域的自相关。他们选择在哪个领域过程中的一个信号,做一个明智的猜测(或通过尝试不同的可能性)作为该域的最佳代表的信号的本质特征。从测量装置对样品序列产生一个时间或空间域表示,而离散傅立叶变换产生的频谱的频率域信息。自相关的定义是互相关的信号本身在不同时间间隔的时间或空间的相关情况。 二、信号采样 随着计算机的应用越来越多地使用,数字信号处理的需要也增加了。为了在计算机上使用一个模拟信号的计算机,它上面必须使用模拟到数字的转换器(ADC)使其数字化。采样通常分两阶段进行,离散化和量化。在离散化阶段,信号的空间被划分成等价类和量化是通过一组有限的具有代表性的信号值来代替信号近似值。 奈奎斯特-香农采样定理指出,如果样本的取样频率大于两倍的信号的最高频率,一个信号可以准确地重建它的样本。在实践中,采样频率往往大大超过所需的带宽的两倍。 数字模拟转换器(DAC)用于将数字信号转化到模拟信号。数字计算机的使用是数字控制系统中的一个关键因素。 三、时间域和空间域 在时间或空间域中最常见的处理方法是对输入信号进行一种称为滤波的操作。滤波通常包括对一些周边样本的输入或输出信号电流采样进行一些改造。现在有各种不同的方法来表征的滤波器,例如: 一个线性滤波器的输入样本的线性变换;其他的过滤器都是“非线性”。线性滤波器满足叠加条件,即如果一个输入不同的信号的加权线性组合,输出的是一个同样加权线性组合所对应的输出信号。

英文文献 科技类 原文及翻译 (电子 电气 自动化 通信…)74

英文文献科技类原文及翻译(电子电气自动化通 信…)74 Article Creating a Debugging and Profiling Agent with JVMTI Articles Index The Java Virtual Machine Tool Interface (JVMTI) provides a programming interface that allows you, the software developer, to create software agents that can monitor and control your Java programming language applications. JVMTI is new in the Java 2 Software Development Kit (SDK), Standard Edition, version 1.5.0. It replaces the Java Virtual Machine Profiling Interface (JVMPI), which had been included as an experimental feature of the Java 2 SDK since version 1.1. JVMTI is described in JSR-163. This article illustrates how to use JVMTI to create a debugging and profiling tool for Java applications. Such a tool, also called an agent, uses the functionality exposed by the interface to register for notification of events as they occur in the application, and to query and control

计算机英文文献加翻译

Management Information System Overview Management Information System is that we often say that the MIS, is a human, computers and other information can be composed of the collection, transmission, storage, maintenance and use of the system, emphasizing the management, stressed that the modern information society In the increasingly popular. MIS is a new subject, it across a number of areas, such as scientific management and system science, operations research, statistics and computer science. In these subjects on the basis of formation of information-gathering and processing methods, thereby forming a vertical and horizontal weaving, and systems. The 20th century, along with the vigorous development of the global economy, many economists have proposed a new management theory. In the 1950s, Simon made dependent on information management and decision-making ideas. Wiener published the same period of the control theory, that he is a management control process. 1958, Gail wrote: "The management will lower the cost of timely and accurate information to better control." During this period, accounting for the beginning of the computer, data processing in the term. 1970, Walter T. Kenova just to the management information system under a definition of the term: "verbal or written form, at the right time to managers, staff and outside staff for the past, present, the projection of future Enterprise and its environment-related information 原文请找腾讯3249114六,维^论~文.网https://www.360docs.net/doc/3819242230.html, no application model, no mention of computer applications. 1985, management information systems, the founder of the University of Minnesota professor of management at the Gordon B. Davis to a management information system a more complete definition of "management information system is a computer hardware and software resources, manual operations, analysis, planning , Control and decision-making model and the database - System. It provides information to support enterprises or organizations of the operation, management and decision-making function. "Comprehensive definition of this Explained that the goal of management information system, functions and composition, but also reflects the management information system at the time of level. With the continuous improvement of science and technology, computer science increasingly mature, the computer has to be our study and work on the run along. Today, computers are already very low price, performance, but great progress, and it was used in many areas, the computer was so popular mainly because of the following aspects: First, the computer can substitute for many of the complex Labor. Second, the computer can greatly enhance people's work efficiency. Third, the computer can save a lot of resources. Fourth, the computer can make sensitive documents more secure. Computer application and popularization of economic and social life in various fields. So that the original old management methods are not suited now more and social development. Many people still remain in the previous manual. This greatly hindered the economic development of mankind. In recent years, with the University of sponsoring scale is growing, the number of students in the school also have increased, resulting in educational administration is the growing complexity of the heavy work, to spend a lot of manpower, material resources, and the existing management of student achievement levels are not high, People have been usin g the traditional method of document management student achievement, the management there are many shortcomings, such as: low efficiency, confidentiality of the poor, and Shijianyichang, will have a large number of documents and data, which is useful for finding, updating and

外文文献及翻译

外文文献 (一)原文 DUAL FULL BRIDGE PROTECTED MOTOR DRIVER(A3976)The A3976 is designed to drive both windings of a bipolar stepper motor or bidirectionally control two DC Motors. Both H-Bridges are capable of continuous output currents of up to +/- 500 mA and operating voltages to 30V. Free wheeling, substrate isolated diodes are included for output transient suppression when switching motors or other inductive loads. For each bridge the PHASE input controls load current polarity by selecting the appropriate source and sink driver pair. The ENABLE input, when held high, enables the respective output H-bridge. When both ENABLE pins are held low the device will enter SLEEP mode and consume less than 100mA. The 3976 is protected to ensure safe operation in harsh operating environments and was designed specifically for automotive applications. Protection circuitry will check for open or shorted load, motor lead short to ground or supply, VBB overvoltage, VCC undervoltage, and thermal shutdown. If any of these conditions are detected the outputs will be disabled and fault information will be output to diagnostic pins FAULT1 and FAULT2. The 3976 is supplied in a choice of two power packages, a 16-lead plastic DIP with a copper batwing tab (suffix ‘B’), and a 24-lead plastic SOIC with a copper batwing tab (suffix ‘LB’). In both cases, the power tab is at ground potential and needs no electrical isolation. FEATURES (1)30 V , ±500 mA Continuous Output Rating (2)35V Load Dump Survival (3)Output Short Circuit Protection (4)Coded Fault Diagnostic Outputs (5)Low Current Standby Mode (6)Open Load Monitor (7)Low Current Standby Mode (8)VBB Over Voltage Shutdown (9)Internal Thermal Shutdown Circuitry (10)Internal Low Parasitic Free Wheeling Diodes (11)Crossover Current Protection

科技英语阅读原文及翻译(李健版,单元1-7)

Unit 1 Environment Earth’s Health in Sharp Decline, Massive Study Finds 大规模研究发现:地球的“健康”每况愈下 The report card has arrived from the largest ever scientific Earth analysis, and many of the planet’s ecosystems are simply not making the grade. 有史以来对地球进行的最大规模的科学分析结果表明,地球上的许多生态系统都达不到标准。 The UN-backed Millennium Ecosystem Assessment Synthesis Report found that nearly two-thirds of Earth’s life-supporting ecosystems, including clean water, pure air, and stable climate, are being degraded by unsustainable use. 由联合国主持的《千年生态系统评估综合报告》指出,由于不可持续的使用,地球上将近三分之二的用来维持生命的生态系统(包括干净的水源、纯净的空气以及稳定的气候)正遭受破坏。 Human has caused much of this damage during the past half century. Soaring demand for food, fresh water, timber, fiber and fuel have led to dramatic environmental changes, from deforestation to chemical pollution, the report says. The already grim situation may worsen dramatically during the first half of the 21st century, the report’s authors warn. 以上大部分的破坏都是人类在过去的半个世纪里造成的。据报告分析,随着人类对食物、淡水、木材、纤维以及燃料等资源的需求日趋激增,环境发生了极大的变化,引发了诸如滥伐森林、化学污染等问题。因此,该报告的作者警告说,照此下去,本已岌岌可危的生态环境将会在21世纪的上半叶进一步恶化。 Over 1,300 governmental and private-sector contributors from 95 countries collaborated to create the landmark study. For four years they examined the plant’s many habitats and species and the systems that bind them together. The United Nations Environment

科技英语原文及简单翻译

科技英语原文及简单翻译 How ASIMO Works Introduction to How ASIMO Works Want a robot to cook your dinner, do your homework, clean your house, or get your groceries? Robots already do a lot of the jobs that we humans don't want to do, can't do, or simply can't do as well as our robotic counterparts. Honda engineers have been busy creating the ASIMO robot for more than 20 years. In this article, we'll find out what makes ASIMO the most advanced humanoid robot to date. The Honda Motor Company developed ASIMO, which stands for Advanced Step in Innovative Mobility, and is the most advanced humanoid robot in the world. According to the ASIMO Web site, ASIMO is the first humanoid robot in the world that can walk independently and climb stairs. Rather than building a robot that would be another toy, Honda wanted to create a robot that would be a helper for people -- a robot to help around the house, help the elderly, or help someone confined to a wheelchair or bed. ASIMO is 4 feet 3 inches (1.3 meters) high, This allows ASIMO to do the jobs it was created to do without being too big and menacing. ASIMO's Motion: Walk Like a Human Honda researchers began by studying the legs of insects, mammals, and the motion of a mountain climber with prosthetic legs to better understand the physiology and all of the things that take place when we walk -- particularly in the joints. For example, the fact that we shift our weight using our bodies and especially our arms in

(完整word版)英文文献及翻译:计算机程序

姓名:刘峻霖班级:通信143班学号:2014101108 Computer Language and Programming I. Introduction Programming languages, in computer science, are the artificial languages used to write a sequence of instructions (a computer program) that can be run by a computer. Simi lar to natural languages, such as English, programming languages have a vocabulary, grammar, and syntax. However, natural languages are not suited for programming computers because they are ambiguous, meaning that their vocabulary and grammatical structure may be interpreted in multiple ways. The languages used to program computers must have simple logical structures, and the rules for their grammar, spelling, and punctuation must be precise. Programming languages vary greatly in their sophistication and in their degree of versatility. Some programming languages are written to address a particular kind of computing problem or for use on a particular model of computer system. For instance, programming languages such as FORTRAN and COBOL were written to solve certain general types of programming problems—FORTRAN for scientific applications, and COBOL for business applications. Although these languages were designed to address specific categories of computer problems, they are highly portable, meaning that the y may be used to program many types of computers. Other languages, such as machine languages, are designed to be used by one specific model of computer system, or even by one specific computer in certain research applications. The most commonly used progra mming languages are highly portable and can be used to effectively solve diverse types of computing problems. Languages like C, PASCAL and BASIC fall into this category. II. Language Types Programming languages can be classified as either low-level languages or high-level languages. Low-level programming languages, or machine languages, are the most basic type of programming languages and can be understood directly by a computer. Machine languages differ depending on the manufacturer and model of computer. High-level languages are programming languages that must first be translated into a machine language before they can be understood and processed by a computer. Examples of high-level

英文文献及翻译(计算机专业)

英文文献及翻译(计算机专业) The increasing complexity of design resources in a net-based collaborative XXX common systems。design resources can be organized in n with design activities。A task is formed by a set of activities and resources linked by logical ns。XXX management of all design resources and activities via a Task Management System (TMS)。which is designed to break down tasks and assign resources to task nodes。This XXX。 2 Task Management System (TMS) TMS is a system designed to manage the tasks and resources involved in a design project。It poses tasks into smaller subtasks。XXX management of all design resources and activities。TMS assigns resources to task nodes。XXX。 3 Collaborative Design

Collaborative design is a process that XXX a common goal。In a net-based collaborative design environment。n XXX n for all design resources and activities。 4 Task n XXX is the process of XXX for better management of resources and activities。as well as more XXX of the task as a whole。TMS XXX for effective management of all design resources and activities。 5 n Management System An n management system is a system that manages the storage and retrieval of n。In a net-based collaborative design environment。an n management system is essential for managing the diverse and complex design resources。TMS serves as an n management system by XXX。

英文科技文献及翻译

外文翻译 DC GENENRATORS 1. INTRODUCTION For all practical purposes, the direct-current generator is only used for special applications and local dc power generation. This limitation is due to the commutator required to rectify the internal generated ac voltage, thereby making largescale dc power generators not feasible. Consequently, all electrical energy produced commercially is generated and distributed in the form of three-phase ac power. The use of solid state converters nowadays makes conversion to dc economical. However, the operating characteristics of dc generators are still important, because most concepts can be applied to all other machines. 2. FIELD WINDING CONNECTIONS The general arrangement of brushes and field winding for a four-pole machine is as shown in Fig.1. The four brushes ride on the commutator. The positive brusher are connected to terminal A1 while the negative brushes are connected to terminal A2 of the machine. As indicated in the sketch, the brushes are positioned approximately midway under the poles. They make contact with coils that have little or no EMF induced in them, since their sides are situated between poles. Figure 1 Sketch of four-pole dc matchine The four excitation or field poles are usually joined in series and their ends brought out to terminals marked F1 and F2. They are connected such that they produce north and south poles alternately. The type of dc generator is characterized by the manner in which the field

相关文档
最新文档