数据通信 毕业论文外文文献英文翻译
数字通信英文作文

数字通信英文作文英文:As a communication AI, I have a lot to say aboutdigital communication. Digital communication refers to the use of electronic devices and technology to transmit information and messages. It has become an integral part of our daily lives, from sending emails to texting friends and family. There are two main types of digital communication: synchronous and asynchronous.Synchronous communication refers to communication that happens in real-time, such as video conferencing or instant messaging. Asynchronous communication, on the other hand, refers to communication that occurs over a period of time, such as email or social media messaging.One of the benefits of digital communication is its convenience. It allows us to communicate with people from all over the world, anytime and anywhere. It has also madecommunication faster and more efficient, as we can send messages instantly and receive responses quickly.However, digital communication also has its downsides. It can be impersonal and lack the emotional connection that face-to-face communication provides. It can also lead to miscommunication, as tone and context can be misinterpreted in written messages.Overall, digital communication has revolutionized the way we communicate and has made our lives easier in many ways. However, it's important to remember the importance of face-to-face communication and to use digital communication responsibly.中文:作为一名交流型AI,我对数字通信有很多看法。
通信外文翻译外文文献英文文献及译文

通信外文翻译外文文献英文文献及译文通信外文翻译外文文献英文文献及译文Communication SystemA generalized communication system has the following components:(a) Information Source. This produces a message which may be written or spoken words, or some form of data.(b) Transmitter. The transmitter converts the message into a signal, the form of which is suitable for transmission over the communication channel.(c) Communication Channel. The communication channel is the medium used transmit the signal, from the transmitter to the receiver. The channel may be a radio link or a direct wire connection.(d) Receiver. The receiver can be thought of as the inverse of the transmitter. Itchanges the received signal back into a message and passes the message on to its destination which may be a loudspeaker,teleprinter or computer data bank.An unfortunate characteristic of all communication channels is that noise is added to the signal. This unwanted noise may cause distorionsof sound in a telephone, or errors in a telegraph message or data.Frequency Diversion MultiplexingFrequency Diversion Multiplexing(FDM) is a one of analog technologies. A speech signal is 0~3 kHz, single sideband amplitude (SSB) modulation can be used to transfer speech signal to new frequency bands,four similar signals, for example, moved by SSB modulationto share the band from 5 to 20 kHz. The gaps between channels are known as guard spaces and these allow for errors in frequency, inadequate filtering, etc in the engineered system.Once this new baseband signal, a "group" of 4 chEmnels, has been foimed it ismoved around the Lrunk network as a single unit. A hierarchy can be set up withseveral channels fonning a "group". several groups a "supergroup" and several"supergraup" eicher a "nmsrergroup" or "hypergroup".Groups or supergroups are moved around as single units by the communicationsequipment and it is not necessary for the radios to know how many channels are involved. A radio can handle a supergroup provided sufficient bandwidth is available. The size of the groups is a compromise as treating each channel individually involves far more equipment because separate filters, modulators and oscillators are required for every channel rather than for each group. However the failure of one module will lose all of the channels associated with a group.Time Diversion MultiplexingIt is possible, with pulse modulation systems, to use the between samples to transmit signals from other circuits. The technique is knownas time diversion multiplexing (TDM). To do this, it is necessary to employ synchronized switches at eachend of the communication links to enable samples to be transmittedin turn, from each of several circuits. Thus several subscribers appear to use the link simultaneously. Although each user onlyhas periodic short time slots, the original analog signals between samples can be reconstituted at the receiver.Pulse Code ModulationIn analog modulation, the signal was used to modulate the amplitude or frequency of a carrier, directly. However, in digital modulation a stream of pulse, representing the original,is created. This stream is then used to modulate a carrier or alternatively is transmitted directly over a cable. Pulse Code Modulation (PCM) is one of the two techniques commonly used.All pulse systems depend on the analog waveform being sampled at regular intervals. The signal created by sampling our analog speech input is known as pulse amplitude modulation. It is not very useful in practice but is used as an intermediate stage towards forming a PCM signal. It will be seen later that most of the advantages of digital modulation come from the transmitted pulses having two levels only, this being known as a binary system. In PCM the height of each sample is converted into a binary number. There are three step in the process of PCM: sampling, quantizing and coding.Optical Fiber CommunicationsCommunication may be broadly defined as the transfer of information from one point to another. When the information is to be conveyed over any distance acommunication system is usually required. Within a communication system the information transfer is frequently achieved by superimposing or modulating the information on to an electromagnetic wave which acts as a carrier for the informationsignal. This modulated carrier is then transmitted to the required destination where it is received and the originalinformation signal is obtained by demodulation. Sophisticated techniques have been developed for this process by using electromagnetic carrier wavesoperating at radio frequencies as well as microwave and millimeter wave frequencies. However,拻 communication?may also be achieved by using an electromagneticcarrier which is selected from the optical range of frequencies.In this case the information source provides an electrical signal to a transmitter comprising an electrical stage which drives an optical source to give modulation of the light-wave carrier. The optical source which provides the electrical-optical conversion may be either a semiconductor laser or light emitting diode (LED). The transmission medium consists of an optical fiber cable and the receiver consists of an optical detector which drives a further electrical stage and hence provides demodulation optical carrier. Photodiodes (P-N, P-I-N or avalanche) and , in some instances,phototransistor and photoconductors are utilized for the detection of the optical signal and the electrical-optical conversion. Thus there is a requirement for electrical interfacing at either end of the optical link and at present the signal processing is usually performed electrically.The optical carrier may be modulated by using either an analog or digital information signal. Analog modulation involves the variation of the light emitted from the optical source in a continuous manner. With digital modulation, however, discrete changes in the light intensity are obtained (i.e. on-off pulses). Although often simpler to implement, analog modulation with an optical fiber communication system is lessefficient, requiring a far higher signal to noise ratio at the receiver than digital modulation. Also, the linearity needed for analog modulation is not always provided by semiconductor optical source, especially at high modulation frequencies. For thesereasons,analog optical fiber communications link are generally limited to shorter distances and lower bandwidths than digital links.Initially, the input digital signal from the information source is suitably encoded for optical transmission. The laser drive circuit directly modulates the intensity of the semiconductor laser with the encoded digital signal. Hence a digital optical signal is launched into the optical fiber cable. The avalanche photodiode detector (APD) is followed by a fronted-end amplifier and equalizer orfilter to provide gain as well as linear signal processing and noise bandwidth reduction. Finally, the signal obtained is decoded to give the original digital information.Mobile CommunicationCordless Telephone SystemsCordless telephone system are full duplex communication systems that use radio to connect a portable handset to a dedicated base station,which is then connected to a dedicated telephone line with a specific telephone number on the public switched telephone network (PSTN) .In first generation cordless telephone systems5(manufactured in the 1980s), the portable unit communications only to the dedicatedbase unit and only over distances of a few tens of meters.Early cordless telephones operate solely as extensiontelephones to a transceiver connected to a subscriber line on the PSTN and are primarily for in-home use.Second generation cordless telephones have recently been introduced which allowsubscribers to use their handsets at many outdoor locations within urban centers such as London or Hong Kong. Modern cordless telephones are sometimes combined with paging receivers so that a subscriber may first be paged and then respond to the pageusing the cordless telephone. Cordless telephone systems provide the user with limited range and mobility, as it is usually not possible to maintain a call if the user travels outside the range of the base station. Typical second generation base stations provide coverage ranges up to a few hundred meters.Cellular Telephone SystemA cellular telephone system provides a wireless connection to the PSTN for any user location within the radio range of the system.Cellular systems accommodate alarge number of users over a large geographic area, within a limited frequency spectrum. Cellular radio systems provide high quality service that is often comparable to that of the landline telephone systems. High capacity is achieved by limiting the coverage of each base station transmitter to a small geographic area called a cell so that the same radio channels may be reused by another base station located some distance away. A sophisticated switching technique called a handoff enables a call to proceeduninterrupted when the user moves from one cell to another.A basic cellular system consists of mobile station, basestations and a mobile switching center (MSC). The Mobile Switching Center is sometimes called a mobiletelephone switching office (MTSO), since it is responsible for connecting all mobiles to the PSTN in a cellular system. Each mobilecommunicates via radio with one of the base stations and may be handed-off to any number of base stations throughout the duration of a call. The mobile station contains a transceiver, an antenna, and control circuitry,and may be mounted in a vehicle or used as a portable hand-held unit. Thebase stations consists of several transmitters and receivers which simultaneously handlefull duplex communications and generally have towers which support several transmitting and receiving antennas. The base station serves as a bridge between all mobile users in the cell and connects the simultaneous mobile calls via telephone lines or microwave links to the MSC. The MSC coordinates the activities of all the base stations and connects the entire cellular system to the PSTN. A typical MSC handles 100000 cellular subscribers and 5000 simultaneous conversations at a time, and accommodates all billing and system maintenance functions, as well. In large cities, several MSCs are used by a single carrier.Broadband CommunicationAs can be inferred from the examples of video phone and HDTV, the evolution offuture communications will be via broadband communication centered around video signals. The associated services make up a diverse set of high-speed and broadband services ranging from video services such as video phone,video conferencing,videosurveillance, cable television (CATV) distribution, and HDTV distribution to the high-speed data services such as high-resolution image transmission, high-speed datatransmission, and color facsimile. The means of standardizing these various broadbandcommunication services so that they can be provided in an integrated manner is no other than the broadband integrated services digital network (B-ISDN). Simple put, therefore, the future communications network can be said to be a broadband telecommunicationsystem based on the B-ISDN.For realization of the B-ISDN, the role of several broadband communicationtechnologies is crucial. Fortunately, the remarkable advances in the field of electronics and fiber optics have led to the maturation of broadband communication technologies.As the B-ISDN becomes possible on the optical communication foundation, the relevant manufacturing technologies for light-source and passive devices and for optical fiberhave advanced to considerable levels. Advances in high-speed device and integratedcircuit technologies for broadband signal processing are also worthy of close attention. There has also been notable progress in software, signal processing, and video equipment technologies. Hence, from the technological standpoint, the B-ISDN hasfinally reached a realizable state.On the other, standardization activities associated with broadband communication have been progressing. TheSynchronous Optical Network (SONET) standardization centered around the T1 committee eventually bore fmit in the form of the Synchronous Digital Hierarchy (SDH) standards of the International Consultative Committee in Telegraphy and Telephony (CCITT), paving the way for synchronous digital transmission based on optical communication. The standardization activities of the 5integrated services digital network (ISDN), which commenced in early 1980s with the objective of integrating narrowband services, expanded in scope with the inclusion of broadband services, leading to the standardization of the B-ISDN in late1980抯and establishing the concept of asynchronous transfer mode (ATM)communication in process. In addition, standardization of various video signals is becoming finalized through the cooperation among such organizations as CCITT, the International Radio-communications Consultative Committee (CCIR), and theInternational Standards Organization (ISO), and reference protocols for high-speedpacket communication are being standardized through ISO, CCITT, and the Institute of Electrical and Electronics Engineer (IEEE).Various factors such as these have made broadband communication realizable.5Therefore, the 1990s is the decade in which matured broadband communicationtechnologies will be used in conjunction with broadband standards to realize broadband communication networks. In the broadband communication network, the fiber opticnetwork will represent the physical medium for implementing broadband communication, while synchronous transmission will make possible the transmission of broadband service signals over the optical medium. Also, the B-ISDN will be essentialas the broadband telecommunication network established on the basis of optical medium and synchronous transmission and ATM is the communication means that enables the realization of the B-ISDN. The most important of the broadband services to be providedthrough the B-ISDN are high-speed data communication services and videocommunication services.Image AcquisitionA TV camera is usually used to take instantaneous images and transform them into electrical signals, which will be further translated into binary numbers for the computer to handle. The TV camera scans oneline at a time. Each line is further divided into hundreds of pixels. The whole frame is divided into hundreds (for example, 625) of lines.The brightness of a pixel can be represented by a binary number with certain bits, for example, 8 bits. The value of the binary number varies from 0 to 255, a range great enough to accommodate all possible contrast levels of images taken from real scene.These binary numbers are sorted in an RAM (it must have a great capacity) ready for processing by the computer.Image ProcessingImage processing is for improving the quality of the imagesobtained. First, it is necessary to improve the signal-to-noise ratio. Here noise refers to any interference flaw or aberation that obscure the objects on the image. Second, it is possible to improve contrast, enhance sharpness of edges between images through various computational means.Image AnalysisIt is for outlining all possible objects that are included in the scene. A computer program checks through the binary visual informationin store for it and identifies specific feature and characteristics of those objects. Edges or boundaries are identifiablebecause of the different brightness levels on either side of them. Usingcertain algorithms, the computer program can outline all possible boundaries of the objects in the scene. Image analysis also looks for textures and shadings between lines.Image ComprehensionImage Comprehension means understanding what is in a scene. Matching the prestored binary visual information with certain templates which represent specific objects in a binary form is technique borrowed from artificial intelligence, commonly referred to as "templeite matching"emplate matching? One by one,the templates are checked against the binary information representing the scene. Once a match occurs, an object is identified. The template matching process continues until all possible objects in the scene have been identified, otherwise it fails.通信系统一般的通信系统由下列部分组成:信源。
通信工程专业英语文献翻译

Multi-Code TDMA (MC-TDMA) for Multimedia Satellite Communications用于多媒体卫星通信的MC--TDMA(多码时分多址复用)R. Di Girolamo and T. Le-NgocDepartment ofa Electricl and Computer Engineering - Concordia University1455 de Maisonneuve Blvd. West, Montreal, Quebec, Canada, H3G 1M8 ABSTRACT摘要In this paper, we propose a multiple access scheme basedon a hybrid combination of TDMA and CDMA,在这篇文章中,我们提出一种基于把时分多址复用和码分多址复用集合的多址接入方案。
referred toas multi-code TDMA (MC-TDMA). 称作多码—时分多址复用The underlying TDMAframe structure allows for the transmission of variable bitrate (VBR) information,以TDMA技术为基础的帧结构允许传输可变比特率的信息while the CDMA provides inherentstatistical multiplexing.和CDMA提供固有的统计特性多路复用技术The system is studied for a multimediasatellite environment with long-range dependentdata traffic,and VBR real-time voice and video traffic研究这个系统是为了在远程环境下依赖数据传输和可变比特率的语音和视频传输的多媒体卫星通信系统 . Simulationresults show that with MC-TDMA, the data packetdelay and the probability of real-time packet loss can bemaintained low. 仿真结果表明:采用MC-TDMA的多媒体卫星通信,数据包延时和实时数据丢失的可能性可以保持很低。
通信类 英文原文及译文

ABSTRACTIn this paper, we present a system using an Android smartphone that collects, displays sensor data on the screen and streams to the central server simultaneously. Bluetooth and wireless Internet connections are used for data transmissions among the devices. Also, using Near Field Communication (NFC) technology, we have constructed a more efficient and convenient mechanism to achieve an automatic Bluetooth connection and application execution. This system is beneficial on body sensor networks (BSN) developed for medical healthcare applications. For demonstration purposes, an accelerometer, a temperature sensor and electrocardiography (ECG) signal data are used to perform the experiments. Raw sensor data are interpreted to either graphical or text notations to be presented on the smartphone and the central server. Furthermore, a Java-based central server application is used to demonstrate communication with the Android system for data storage and analysis.1INTRODUCTIONMobile communication devices are designed to achieve multiple purposes but mostly are focused on voice and short messaging services. Wireless technology has the benefit of improving data mobility, using different protocols such as Wi- Fi and Bluetooth. In the medical field, many studies introduced body sensor networks (BSN) for healthcare applications. BSN improves the patient’s monitoring system with the help of the modern technology. This can be done by various wearable sensors equipped with wireless capabilities, In addition, as seen in various researches, it is desirable to develop a low power system. Different types of sensors can be used for monitoring movements, temperature changes, heart-beat, blood pressure and more to establish a patient monitoring system. Bluetooth is one of the widely available options for managing wireless networks to simultaneously connect up to 7 ancillary devices.In this paper, we introduce a microcontroller system that communicates via Bluetooth with the smartphone for data collections, and streams data simultaneously to the central server for data storage and analysis via the Internet. This system provides a solution for mobile patients by forming a wireless BSN in Bluetooth and Wi-Fi/cellular Internet connections with a common Android smartphone which can monitor the patient status via wireless data transmission.2SYSTEM DESIGNFigure 1 represents the Mobile Sensor Data Collector that involves Bluetooth, Near Field Communication (NFC) and wireless Internet connections for collecting, streaming, storing and analyzing sensor data in real-time. Three different sensors transfer sampled data to the MSP430BT5190 which communicate with the CC2560 Bluetooth transmitter via UART and sends data to a smartphone using the Android and Bluetooth system. On the phone, it displays received data on the screen and streams to the server for storage and data analysis. The term “real-time” in this paper is used to express that data transfers are achieved without perceivable delays among the devices. Also, since the Android system is capable of running application software in the background mode, the application used in this paper has the ability to transfer data during a phone call.Figure 1Overall Design of Mobile Sensor Data CollectorA Java-based UDP server application is used to collect data sent from the smartphone via the Internet. When receiving data from the smartphone, the server application displays and saves all received data to a text file for later analysis. For experimental purposes, this server was implemented with an ordinary desktop to demonstrate our fundamental idea. Also, UDP protocol was chosen over TCP because UDP usually achieves faster transmission than the TCP protocol by not waiting for an acknowledgment signal back to the origin.3EXPERIMENT RESULTSAs shown in Figure 1, all experiments are initiated using an NFC tagging process to start the Android application and initiate the Bluetooth connection automatically. In this particular smartphone, the NFC tag reader is located on the backside. The user needs to tap on the NFC tag as shown in Figure 2 to run the program. The NFC tag containing theBluetooth MAC address of the CC2560 Bluetooth device is attached to demonstrate where the tag should be located.Figure 2Initiating connection processUp to 7 ancillary sensor nodes can be simultaneously connected to the Android system. However, a single sensor Bluetooth connection was employed for testing purposes.3.1Accelerometer Data CollectionIn this paper, the Android 2.3.3 and 4.0.3 operating systems are tested using Google Nexus S to display collected data and stream data to the server. The design of the new system is achieved first by collecting sensor data from the MSP430BT5190, transferred via the CC2560 Bluetooth transmitter. Then, the Bluetooth transmitter sends data to the smartphone, which displays the collected data in real-time. As an example, Figure 3(a) shows the accelerometer data collected and displayed on the smartphone in text and Figure 3(b) shows the data in the graphical notation.Figure 3Received real-time acceleration data display(a) text notation;(b) graphical notationThese data are being sent to the central server either via Wi-Fi or cellular networks for storage and analysis at the same time. Figure 4 shows the received data from the smartphone displayed on the server. The server also saves data to a text file in the designated directory for data analysis.Figure 4Received real-time acceleration data on server An axis value representation depends on the raw sensor data and this raw data could differ from the sensors. There are 3 axes provided from the sensor and each set of data needs to be interpreted. For this particular device used in this paper, x- axis data between -60 and -50 represents LEFT, between +50 and +60 represents RIGHT. This rule applies similarly to the other two axes. This differs from other sensors where the data output of acceleration is normally represented in terms of m/s2. However, a translation algorithm shares the same idea. Figure 5 is the result of translating the accelerometer data based on accelerometer movements.Figure5Accelerometer data translationThis type of the accelerometer translation was extended to the Snake Game sample provided by Android Developers [9]. The original game uses touch screen inputs to control the snake. The touch screen inputs were replaced by accelerometer movements to provide data in LEFT, RIGHT, UP and DOWN. The data analysis was done on the phone itself for test purposes. Figure 6 shows the movement of the snake on the phone that is controlled by accelerometer data from the MSP430 eZ430-RF2560.Figure 6Remote controlling Snake GameThis example emphasizes that accelerometer data can be adapted for the patientmovement detection system. Multiple accelerometers could be implemented to produce more advanced movement analysis.3.2Temperature Sensor Data CollectionA temperature sensor monitoring the real-time room temperature is used to perform the experiment. The procedure of the experiment resembles the previous section but with the different data interpretation. In this particular experiment, a heat gun was used to heat up or cool down the sensor for testing purposes as shown in Figure 7. Similar to the previous accelerometer application, Figure 8(a) shows the text notation of the received data in real-time and Figure 8(b) shows the graphical notation of the received data in real-time. Particularly in the graphical notation output, we provide a warning message if the temperature exceeds more than 35 degrees Celsius. Also, the graphical notation has a range of between 0 degrees Celsius to 50 degrees Celsius for this demonstration.Figure 9 shows the server displaying the received data from the smartphone. It delivers similar outputs compared to the accelerometer demonstration and also saves it to a text file.Figure 7Testing temperature sensor data transmissionFigure 8Received real-time temperature data display(a) text notation;(b) graphical notationFigure 9Received real-time temperature data on server3.3Electrocardiography (ECG) Data CollectionThe ECG signal is an important part of a patient monitoring system. Currently, ECG machines are dependent on wired connections which limit their data mobility. Our system using the Bluetooth protocol for ECG signal collections greatly enhances the mobility. This ECG signal is also sent simultaneously to the server via a wireless Internet connection through the smartphone in real-time. Figure 10 shows the display of received ECG signal on the smartphone and Figure 11 shows the same result transmitted to the server in the text format.Figure 10Received real-time ECG data in graphical notationFigure 11Received real-time ECG data on serverHeart-beat rate (BPM) can be determined after analysis of the data either on the smartphone or the server. In this particular example, it represents a patient’s stablecondition with a normal heart-beat rate at approximately 72 BPM. This type of data can be diagnostically valuable and easily transmitted for consultations with distant experts.3.4Overall Data Transmission Rate (DTR)The Data Transmission Rate (DTR) is another important part of the system considering the data size. In our system, DTR depends on the microcontroller, the Bluetooth transmitter and the wireless Internet connection speed. An UART connection between the sensor and microcontroller is established at the baud rate of 115200 bps which achieves a communication bandwidth up to 15KB/s. This emphasizes that our system is capable of the data transmission by integrating multiple types of sensors for a body sensor network system that can be important for patient monitoring, real-time data analysis and diagnosis.4CONCLUSIONSIn this paper, we introduced a system using the smartphone for collecting real-time sensor data and simultaneously streaming the data to the server using Bluetooth and Internet connections. This design is the advancement over ordinary wired sensor networks which are restricted to a fixed monitoring location. In the proposed system, an accelerometer, a temperature sensor and ECG signals have been selected for data transmission using Bluetooth and wireless Internet connections. Having the Bluetooth transmitter on the smartphone, the Android system receives and displays the data on the screen in the graphical or text format and streams the collected data to the central server for data analysis, diagnosis and archiving. Taking advantage of the Android system, NFC technology was used to reduce the unnecessary Bluetooth connection process. This system is highly scalable to include more sensors to produce an upgraded patient monitoring system that is both more accurate and responsive. Furthermore, storing history of collected sensor data in the central server is extremely critical for reliable patient diagnosis.摘要在本文中,我们提出了一个使用Android智能手机,收集传感器数据显示在屏幕上并同步到中央服务器的数据流同步系统。
数字通信或面对面通信英语作文

数字通信或面对面通信英语作文Digital Communication vs. Face-to-Face Communication.Communication is the lifeblood of any society, and it has evolved significantly over the years. From the ancient times of oral traditions and smoke signals to the modern era of digital communication, people have found innovative ways to convey messages and share ideas. In this essay, we will delve into the comparison between digital communication and face-to-face communication, discussing their respective advantages, disadvantages, and the impact they have on our lives.Digital Communication.Digital communication, primarily through the internet and various digital devices, has revolutionized the way we interact with each other. It has removed geographical barriers, allowing people from different parts of the world to connect instantly. Emails, social media, messaging apps,and video conferencing tools have made it possible for businesses to operate globally and for families to stay connected despite being far apart.Advantages of Digital Communication.1. Convenience: Digital communication offers unprecedented convenience. You can send messages, make calls, or video chat from anywhere, anytime, as long as you have an internet connection.2. Cost-Effectiveness: Compared to traditional communication methods, digital communication is often more cost-effective. It eliminates the need for physical infrastructure like phone lines or postal services.3. Versatility: Digital communication tools are incredibly versatile, allowing users to share not just text but also images, videos, audio files, and more.4. Accessibility: People with disabilities or special needs can benefit significantly from digital communicationtools that offer features like text-to-speech conversion, captioning, and zoom capabilities.Disadvantages of Digital Communication.1. Lack of Nonverbal Communication: Face-to-face communication involves a range of nonverbal cues likefacial expressions, body language, and tone of voice. Digital communication often fails to capture these important elements, leading to misunderstandings and misinterpretations.2. Digital Divide: Not everyone has access to digital communication tools, creating a digital divide between those who are connected and those who are not.3. Privacy Concerns: With the widespread use of digital communication, there are increasing concerns about privacy and data security.Face-to-Face Communication.Face-to-face communication, on the other hand, is the oldest and perhaps the most natural form of communication. It involves direct interaction between people, where they can see, hear, and respond to each other's cues.Advantages of Face-to-Face Communication.1. Richer Communication: Face-to-face communication allows for a richer exchange of ideas and emotions. It incorporates both verbal and nonverbal cues, leading to a deeper understanding and connection between people.2. Immediate Feedback: When communicating face-to-face, you can immediately see and respond to the reactions of the other person. This feedback loop is crucial for effective communication.3. Building Relationships: Face-to-face communicationis essential for building and maintaining relationships. It fosters trust and understanding, leading to stronger social bonds.Disadvantages of Face-to-Face Communication.1. Limited Reach: Face-to-face communication is limited by physical proximity. It can be challenging to connect with people who are far away.2. Time Constraints: Face-to-face meetings often require scheduling and can be time-consuming, especially when multiple parties are involved.3. Cost: Face-to-face communication can be more costly, especially when it involves travel and accommodation expenses.Conclusion.Digital communication and face-to-face communication each have their unique strengths and weaknesses. The choice between them depends on the context, purpose, and the people involved. In the modern world, where technology is constantly evolving, it is essential to appreciate both forms of communication and use them appropriately toachieve the desired outcomes.Digital communication is invaluable for its convenience, cost-effectiveness, and versatility. It has transformed the way we work, learn, and socialize, making the world more connected and accessible. However, we should also recognize its limitations, particularly in terms of lacking nonverbal cues and potential privacy concerns.Face-to-face communication, on the other hand, is irreplaceable for its ability to convey emotions, build trust, and foster deeper relationships. It remains crucialin settings where a richer, more personal exchange is desired or needed, such as in negotiations, therapy sessions, or simply catching up with friends.Ultimately, the key is to understand the strengths and weaknesses of both communication modes and use them complementarily to achieve the best possible outcomes in different scenarios. By doing so, we can harness the powerof technology while maintaining the humanity and warmth of face-to-face interactions.。
通信类英文文献及翻译

附录一、英文原文:Detecting Anomaly Traffic using Flow Data in the realVoIP networkI. INTRODUCTIONRecently, many SIP[3]/RTP[4]-based VoIP applications and services have appeared and their penetration ratio is gradually increasing due to the free or cheap call charge and the easy subscription method. Thus, some of the subscribers to the PSTN service tend to change their home telephone services to VoIP products. For example, companies in Korea such as LG Dacom, Samsung Net- works, and KT have begun to deploy SIP/RTP-based VoIP services. It is reported that more than five million users have subscribed the commercial VoIP services and 50% of all the users are joined in 2009 in Korea [1]. According to IDC, it is expected that the number of VoIP users in US will increase to 27 millions in 2009 [2]. Hence, as the VoIP service becomes popular, it is not surprising that a lot of VoIP anomaly traffic has been already known [5]. So, Most commercial service such as VoIP services should provide essential security functions regarding privacy, authentication, integrity and non-repudiation for preventing malicious traffic. Particu- larly, most of current SIP/RTP-based VoIP services supply the minimal security function related with authentication. Though secure transport-layer protocols such as Transport Layer Security (TLS) [6] or Secure RTP (SRTP) [7] have been standardized, they have not been fully implemented anddeployed in current VoIP applications because of the overheads of implementation and performance. Thus, un-encrypted VoIP packets could be easily sniffed and forged, especially in wireless LANs. In spite of authentication,the authentication keys such as MD5 in the SIP header could be maliciously exploited, because SIP is a text-based protocol and unencrypted SIP packets are easily decoded. Therefore, VoIP services are very vulnerable to attacks exploiting SIP and RTP. We aim at proposing a VoIP anomaly traffic detection method using the flow-based traffic measurement archi-tecture. We consider three representative VoIP anomalies called CANCEL, BYE Denial of Service (DoS) and RTP flooding attacks in this paper, because we found that malicious users in wireless LAN could easily perform these attacks in the real VoIP network. For monitoring VoIP packets, we employ the IETF IP Flow Information eXport (IPFIX) [9] standard that is based on NetFlow v9. This traffic measurement method provides a flexible and extensible template structure for various protocols, which is useful for observing SIP/RTP flows [10]. In order to capture and export VoIP packets into IPFIX flows, we define two additional IPFIX templates for SIP and RTP flows. Furthermore, we add four IPFIX fields to observe packets which are necessary to detect VoIP source spoofing attacks in WLANs.II. RELATED WORK[8] proposed a flooding detection method by the Hellinger Distance (HD) concept. In [8], they have pre- sented INVITE, SYN and RTP flooding detection meth-ods. The HD is the difference value between a training data set and a testing data set. The training data set collected traffic over n sampling period of duration Δ testing data set collected traffic next the training data set in the same period. If the HD is close to ‘1’, this testing data set is regarded as anomaly traffic. For using this method, they assumed that initial training data set didnot have any anomaly traffic. Since this method was based on packet counts, it might not easily extended to detect other anomaly traffic except flooding. On the other hand, [11] has proposed a VoIP anomaly traffic detection method using Extended Finite State Machine (EFSM). [11] has suggested INVITE flooding, BYE DoS anomaly traffic and media spamming detection methods. However, the state machine required more memory because it had to maintain each flow. [13] has presented NetFlow-based VoIP anomaly detection methods for INVITE, REGIS-TER, RTP flooding, and REGISTER/INVITE scan. How-ever, the VoIP DoS attacks considered in this paper were not considered. In [14], an IDS approach to detect SIP anomalies was developed, but only simulation results are presented. For monitoring VoIP traffic, SIPFIX [10] has been proposed as an IPFIX extension. The key ideas of the SIPFIX are application-layer inspection and SDP analysis for carrying media session information. Yet, this paper presents only the possibility of applying SIPFIX to DoS anomaly traffic detection and prevention. We described the preliminary idea of detecting VoIP anomaly traffic in [15]. This paper elaborates BYE DoS anomaly traffic and RTP flooding anomaly traffic detec-tion method based on IPFIX. Based on [15], we have considered SIP and RTP anomaly traffic generated in wireless LAN. In this case, it is possible to generate the similiar anomaly traffic with normal VoIP traffic, because attackers can easily extract normal user information from unencrypted VoIP packets. In this paper, we have extended the idea with additional SIP detection methods using information of wireless LAN packets. Furthermore, we have shown the real experiment results at the commercial VoIP network.III. THE VOIP ANOMALY TRAFFIC DETECTION METHOD A. CANCEL DoS Anomaly Traffic DetectionAs the SIP INVITE message is not usually encrypted, attackers could extract fields necessary to reproduce the forged SIP CANCEL message by sniffing SIP INVITE packets, especially in wireless LANs. Thus, we cannot tell the difference between the normal SIP CANCEL message and the replicated one, because the faked CANCEL packet includes the normal fields inferred from the SIP INVITE message. The attacker will perform the SIP CANCEL DoS attack at the same wireless LAN, because the purpose of the SIP CANCEL attack is to prevent the normal call estab-lishment when a victim is waiting for calls. Therefore, as soon as the attacker catches a call invitation message for a victim, it will send a SIP CANCEL message, which makes the call establishment failed. We have generated faked SIP CANCEL message using sniffed a SIP INVITE in SIP header of this CANCEL message is the same as normal SIP CANCEL message, because the attacker can obtain the SIP header field from unencrypted normal SIP message in wireless LAN environment. Therefore it is impossible to detect the CANCEL DoS anomaly traffic using SIP headers, we use the different values of the wireless LAN frame. That is, the sequence number in the frame will tell the difference between a victim host and an attacker. We look into source MAC address and sequence number in the MAC frame including a SIP CANCEL message as shown in Algorithm 1. We compare the source MAC address of SIP CANCEL packets with that of the previously saved SIP INVITE flow. If the source MAC address of a SIP CANCEL flow is changed, it will be highly probable that the CANCEL packet is generated by a unknown user. However, the source MAC address could be spoofed. Regarding source spoofing detection, we employ the method in [12] that uses sequence numbers of frames. We calculate the gap between n-th and (n-1)-th frames. As the sequence number field in a MAC header uses 12 bits, it varies from 0 to 4095. When we find that the sequence number gap between a single SIP flow is greater than the threshold value of N that willbe set from the experiments, we determine that the SIP host address as been spoofed for the anomaly traffic.B. BYE DoS Anomaly Traffic DetectionIn commercial VoIP applications, SIP BYE messages use the same authentication field is included in the SIP IN-VITE message for security and accounting purposes. How-ever, attackers can reproduce BYE DoS packets through sniffing normal SIP INVITE packets in wireless faked SIP BYE message is same with the normal SIP BYE. Therefore, it is difficult to detect the BYE DoS anomaly traffic using only SIP header sniffing SIP INVITE message, the attacker at the same or different subnets could terminate the normal in- progress call, because it could succeed in generating a BYE message to the SIP proxy server. In the SIP BYE attack, it is difficult to distinguish from the normal call termination procedure. That is, we apply the timestamp of RTP traffic for detecting the SIP BYE attack. Generally, after normal call termination, the bi-directional RTP flow is terminated in a bref space of time. However, if the call termination procedure is anomaly, we can observe that a directional RTP media flow is still ongoing, whereas an attacked directional RTP flow is broken. Therefore, in order to detect the SIP BYE attack, we decide that we watch a directional RTP flow for a long time threshold of N sec after SIP BYE message. The threshold of N is also set from the 2 explains the procedure to detect BYE DoS anomal traffic using captured timestamp of the RTP packet. We maintain SIP session information between clients with INVITE and OK messages including the same Call-ID and 4-tuple (source/destination IP Address and port number) of the BYE packet. We set a time threshold value by adding Nsec to the timestamp value of the BYE message. The reason why we use the captured timestamp is that a few RTP packets are observed under second. If RTP traffic is observed after the time threshold, this willbe considered as a BYE DoS attack, because the VoIP session will be terminated with normal BYE messages. C. RTP Anomaly Traffic Detection Algorithm 3 describes an RTP flooding detection method that uses SSRC and sequence numbers of the RTP header. During a single RTP session, typically, the same SSRC value is maintained. If SSRC is changed, it is highly probable that anomaly has occurred. In addition, if there is a big sequence number gap between RTP packets, we determine that anomaly RTP traffic has happened. As inspecting every sequence number for a packet is difficult, we calculate the sequence number gap using the first, last, maximum and minimum sequence numbers. In the RTP header, the sequence number field uses 16 bits from 0 to 65535. When we observe a wide sequence number gap in our algorithm, we consider it as an RTP flooding attack.IV. PERFORMANCE EVALUATIONA. Experiment EnvironmentIn order to detect VoIP anomaly traffic, we established an experimental environment as figure 1. In this envi-ronment, we employed two VoIP phones with wireless LANs, one attacker, a wireless access router and an IPFIX flow collector. For the realistic performance evaluation, we directly used one of the working VoIP networks deployed in Korea where an 11-digit telephone number (070-XXXX-XXXX) has been assigned to a SIP wireless SIP phones supporting , we could make calls to/from the PSTN or cellular phones. In the wireless access router, we used two wireless LAN cards- one is to support the AP service, and the other is to monitor packets. Moreover, in order to observe VoIP packets in the wireless access router, we modified nProbe [16], that is an open IPFIX flow generator, to create and export IPFIX flows related with SIP, RTP, and information. As the IPFIX collector, we have modified libipfix so that it could provide the IPFIX flow decoding function for SIP, RTP, and templates. We used MySQL for the flow DB.B. Experimental ResultsIn order to evaluate our proposed algorithms, we gen-erated 1,946 VoIP calls with two commercial SIP phones and a VoIP anomaly traffic generator. Table I showsour experimental results with precision, recall, and F-score that is the harmonic mean of precision and recall. In CANCEL DoS anomaly traffic detection, our algorithm represented a few false negative cases, which was related with the gap threshold of the sequence number in MAC header. The average of the F-score value for detecting the SIP CANCEL anomaly is %.For BYE anomaly tests, we generated 755 BYE mes-sages including 118 BYE DoS anomalies in the exper-iment. The proposed BYE DoS anomaly traffic detec-tion algorithm found 112 anomalies with the F-score of %. If an RTP flow is terminated before the threshold, we regard the anomaly flow as a normal one. In this algorithm, we extract RTP session information from INVITE and OK or session description messages using the same Call-ID of BYE message. It is possible not to capture those packet, resulting in a few false-negative cases. The RTP flooding anomaly traffic detection experiment for 810 RTP sessions resulted in the F score of 98%.The reason of false-positive cases was related with the sequence number in RTP header. If the sequence number of anomaly traffic is overlapped with the range of the normal traffic, our algorithm will consider it as normal traffic.V. CONCLUSIONSWe have proposed a flow-based anomaly traffic detec-tion method against SIP and RTP-based anomaly traffic in this paper. We presented VoIP anomaly traffic detection methods with flow data on the wireless access router. We used the IETF IPFIX standard to monitor SIP/RTP flows passing through wireless access routers, because its template architecture is easily extensible to several protocols. For this purpose, we defined two new IPFIX templates for SIP and RTP traffic and four new IPFIX fields for traffic. Using these IPFIX flow templates,we proposed CANCEL/BYE DoS and RTP flooding traffic detection algorithms. From experimental results on the working VoIP network in Korea, we showed that our method is able to detect three representative VoIP attacks on SIP phones. In CANCEL/BYE DoS anomaly trafficdetection method, we employed threshold values about time and sequence number gap for classfication of normal and abnormal VoIP packets. This paper has not been mentioned the test result about suitable threshold values. For the future work, we will show the experimental result about evaluation of the threshold values for our detection method.二、英文翻译:交通流数据检测异常在真实的世界中使用的VoIP网络一 .介绍最近,许多SIP[3],[4]基于服务器的VoIP应用和服务出现了,并逐渐增加他们的穿透比及由于自由和廉价的通话费且极易订阅的方法。
通信工程外文文献

外文资料和中文翻译外文资料:Review of UMTS1.1 UMTS Network ArchitectureThe European/Japanese 3G standard is referred to as UMTS. UMTS is one of a number of standards ratified by the ITU-T under the umbrella of IMT-2000. It is currently the dominant standard, with the US CDMA2000 standard gaining ground, particularly with operators that have deployed cdmaOne as their 2G technology. At time of writing,Japan is the most advanced in terms of 3G network deployment. The three incumbent operators there have implemented three different technologies: J-Phone is using UMTS,KDDI has a CDMA2000 network, and the largest operator NTT DoCoMo is using a system branded as FOMA (Freedom of Multimedia Access). FOMA is based on the original UMTS proposal, prior to its harmonization and standardization.The UMTS standard is specified as a migration from the second generation GSM standard to UMTS via the General Packet Radio System (GPRS) and Enhanced Data for Global Evolution (EDGE), as shown in Figure. This is a sound rationale since as of April 2003, there were over 847 Million GSM subscribers worldwide1, accounting for68% of the global cellular subscriber figures. The emphasis is on keeping as much ofthe GSM network as possible to operate with the new system.We are now well on the road towards Third Generation (3G), where the network will support all traffic types: voice, video and data, and we should see an eventual explosion in the services available on the mobile device. The driving technology for this is the IP protocol. Many cellular operators are now at a position referred to as 2.5G, with the deployment of GPRS, which introduces an IP backbone into the mobile core network.The diagram below, Figure 2, shows an overview of the key components in a GPRS network, and how it fits into the existing GSM infrastructure.The interface between the SGSN and GGSN is known as the Gn interface and uses the GPRS tunneling protocol (GTP, discussed later). The primary reason for the introduction of this infrastructure is to offer connections to external packet networks, such as the Internet or a corporate Intranet.This brings the IP protocol into the network as a transport between the SGSN and GGSN. This allows data services such as email or web browsing on the mobile device,with users being charged based on volume of data rather than time connected.The dominant standard for delivery of 3G networks and services is the Universal Mobile Telecommunications System, or UMTS. The first deployment of UMTS is the Release ’99 architecture, shown below in Figure 3.In this network, the major change is in the radio access network (RAN) with the introduction of CDMA technology for the air interface, and ATM as a transport in the transmission part. These changes have been introduced principally to support the transport of voice, video and data services on the same network. The core network remains relatively unchanged, with primarily software upgrades. However, the IP protocol pushes further into the network with the RNC now communicating with the 3G SGSN using IP.The next evolution step is the Release 4 architecture, Figure 4. Here, the GSM core is replaced with an IP network infrastructure based around Voice over IP technology.The MSC evolves into two separate components: a Media Gateway (MGW) and an MSC Server (MSS). This essentially breaks apart the roles of connection and connection control. An MSS can handle multiple MGWs, making the network more scaleable.Since there are now a number of IP clouds in the 3G network, it makes sense to merge these together into one IP or IP/ATM backbone (it is likely both options will be available to operators.) This extends IP right across the whole network, all the way to the BTS.This is referred to as the All-IP network, or the Release 5 architecture, as shown in Figure 5. The HLR/VLR/EIR are generalised and referred to as the HLR Subsystem(HSS).Now the last remnants of traditional telecommunications switching are removed, leaving a network operating completely on the IP protocol, and generalised for the transport of many service types. Real-time services are supported through the introduction of a new network domain, the IP Multimedia Subsystem (IMS).Currently the 3GPP are working on Release 6, which purports to cover all aspects not addressed in frozen releases. Some call UMTS Release 6 4G and it includes such issues as interworking of hot spot radio access technologies such as wireless LAN.1.2 UMTS FDD and TDDLike any CDMA system, UMTS needs a wide frequency band in which to operate to effectively spread signals. The defining characteristic of the system is the chip rate, where a chip is the width of one symbol of the CDMA code. UMTS uses a chip rate of 3.84Mchips/s and this converts to a required spectrum carrier of 5MHz wide. Since this is wider than the 1.25MHz needed for the existing cdmaOne system, the UMTS air interface is termed ‘wideband’ CDMA.There are actually two radio technologies under the UMTS umbrella: UMTS FDD and TDD. FDD stands for Frequency Division Duplex, and like GSM, separates traffic in the uplink and downlink by placing them at different frequency channels. Therefore an operator must have a pair of frequencies allocated to allow them to run a network, hence the term ‘paired spectrum’. TDD or Time Division Duplex requires only one frequency channel, and uplink and downlink traffic are separated by sending them at different times. The ITU-T spectrum usage, as shown in Figure 6, for FDD is 1920- 980MHz for uplink traffic, and 2110-2170MHz for downlink. The minimum allocation an operator needs is two paired 5MHz channels, one for uplink and one for downlink, at a separation of 190MHz. However, to provide comprehensive coverage and services, it is recommended that an operator be given three channels. Considering the spectrum allocation, there are 12 paired channels available, and many countries have now completed the licencing process for this spectrum, allocating between two and four channels per licence. This has tended to work out a costly process for operators, since the regulatory authorities in some countries, notably in Europe, have auctioned these licences to the highest bidder. This has resulted in spectrum fees as high as tens of billions of dollars in some countries.The Time Division Duplex (TDD) system, which needs only one 5MHz band in which to operate, often referred to as unpaired spectrum. The differences between UMTS FDD and TDD are only evident at the lower layers, particularly on the radio interface. At higher layers, the bulk of the operation of the two systems is the same. As the name suggests, the TDD system separates uplink and downlink traffic by placing them in different time slots. As will be seen later, UMTS uses a 10ms frame structure which is divided into 15 equal timeslots. TDD can allocate these to be either uplink or downlink,with one or more breakpoints between the two in a frame defined. In this way, it is well suited to packet traffic, since this allows great flexibility in dynamically dimensioning for asymmetry in traffic flow.The TDD system should not really be considered as an independent network, but rather as a supplementfor an FDD system to provide hotspot coverage at higher data rates. It is rather unsuitable for large scale deployment due to interference between sites, since a BTS may be trying to detect a weak signal from a UE, which is blocked out by a relatively strong signal at the same frequency from a nearby BTS. TDD is ideal for indoor coverage over small areas.Since FDD is the main access technology being developed currently, the explanations presented here will focus purely on this system.1.3 UMTS Bearer ModelThe procedures of a mobile device connecting to a UMTS network can be split into two areas: the access stratum (AS) and the non-access stratum (NAS). The access stratum involves all the layers and subsystems that offer general services to the non-access stratum. In UMTS, the access stratum consists of all of the elements in the radio access network, including the underlying ATM transport network, and the various mechanisms such as those to provide reliable information exchange. All of the non-access stratum functions are those between the mobile device and the core network, for example, mobility management. Figure 7 shows the architecture model. The AS interacts with the NAS through the use of service access points (SAPs).UMTS radio access network (UTRAN) provides this separation of NAS and AS functions, and allows for AS functions to be fully controlled and implemented within the UTRAN. The two major UTRAN interfaces are the Uu, which is the interface between the mobile device, or User Equipment (UE) and the UTRAN, and the Iu, which is the interface between the UTRAN and the core network. Both of these interfaces can be divided into control and user planes each with appropriate protocol functions.A Bearer Service is a link between two points, which is defined by a certain set of characteristics. In the case of UMTS, the bearer service is delivered using radio access bearers.A Radio access bearer (RAB) is defined as the service that the access stratum (i.e.UTRAN) provides to the non-access stratum for transfer of user data between the User Equipment and Core Network. A RAB can consist of a number of subflows, which are data streams to the core network within the RAB that have different QoS characteristics,such as different reliabilities. A common example of this is different classes of bits with different bit error rates can be realised as different RAB subflows. RAB subflows are established and released at the time the RAB is established and released, and are delivered together over the same transport bearer.A Radio Link is defined as a logical association between a single User Equipment (UE) and a single UTRAN access point, such as an RNC. It is physically comprised of one or more radio bearers and should not be confused with radio access bearer.Looking within the UTRAN, the general architecture model is as shown in Figure 8 below. Now shown are the Node B or Base Station (BTS) and Radio Network Controller (RNC) components, and their respective internal interfaces. The UTRAN is subdivided into blocks referred to as Radio Network Subsystems (RNS), where each RNS consists of one controlling RNC (CRNC) and all the BTSs under its control. Unique to UMTS is the interface between RNSs, the Iur interface, which plays a key role in handover procedures. The interface between the BTS and RNC is the Iub interface.All the ‘I’ interfaces: Iu, Iur and Iub, currently3 use ATM as a transport layer. In the context of ATM, the BTS is seen as a host accessing an ATM network, within which the RNC is an ATM switch. Therefore, the Iub is a UNI interface, whereas the Iu and Iur interfaces are considered to be NNI, as illustrated in Figure 9.This distinction is because the BTS to RNC link is a point-to-point connection in that a BTS or RNC will only communicate with the RNC or BTS directly connected to it, and will not require communication beyond that element to another network element.For each user connection to the core network, there is only one RNC, which maintains the link between the UE and core network domain, as highlighted in Figure 10. This RNC is referred to as the serving RNC or SRNC. That SRNC plus the BTSs under its control is then referred to as the SRNS. This is a logical definition with reference to that UE only. In an RNS, the RNC that controls a BTS is known as the controlling RNC or CRNC. This is with reference to the BTS, cells under its control and all the common and shared channels within.As the UE moves, it may perform a soft or hard handover to another cell. In the case of a soft handover, the SRNC will activate the new connection to the new BTS. Should the new BTS be under the control of another RNC, the SRNC will also alert this new RNC to activate a connection along the Iur interface. The UE now has two links, one directly to the SRNC, and the second, through the new RNC along the Iur interface. In this case, this new RNC is logically referred to as a drift RNC or DRNC, see Figure 10. It is not involved in any processing of the call and merely relays it to the SRNC for connection to the core. In summary, SRNC and DRNC are usually associated with the UE and the CRNC is associated with the BTS. Since these are logical functions it is normal practice that a single RNC is capable of dealing with all these functions.A situation may arise where a UE is connected to a BTS for which the SRNC is not the CRNC for that BTS. In that situation, the network may invoke the Serving RNC Relocation procedure to move the core network connection. This process is described inSection 3.中文翻译:通用移动通信系统的回顾1.1 UMTS网络架构欧洲/日本的3G标准,被称为UMTS。
红外数据通信技术外文翻译文献

红外数据通信技术外文翻译文献(文档含中英文对照即英文原文和中文翻译)Infrared Remote Control SystemAbstractRed outside data correspondence the technique be currently within the scope of world drive extensive usage of a kind of wireless conjunction technique, drive numerous hardware and software platform support. Red outside the transceiver product have cost low, small scaled turn, the baud rate be quick, point to point SSL, be free from electromagnetism thousand Raosetc. characteristics, can realization information at dissimilarity of the product fast, convenience, safely exchange and transmission, at short distance wireless deliver aspect to own very obvious of advantage. Along with red outside the data deliver a technique more and more mature, the cost descend, red outside the transceiver necessarily will get at the short distance communication realm more extensive of application.The purpose that design this system is transmit customer’s operation information with infrared rays for transmit media, then demodulate original signal with receive circuit. It use coding chip to modulate signal and use decoding chip to demodulate signal. The coding chip is PT2262 and decoding chip is PT2272. Both chips are made in Taiwan. Main work principle is that we provide to input the information for the PT2262 with coding keyboard. The input information was coded by PT2262 and loading to high frequent load wave whose frequent is 38 kHz, then modulate infrared transmit dioxide and radiate space outside when it attian enough power. The receive circuit receive the signal and demodulate original information. The original signal was decoded by PT2272, so as to drive some circuit to accomplish customer’s operation demand.Keywords: Infrared dray;Code;Decoding;LM386;Red outside transceiver1 Introduction1.1 research the background and significanceInfrared Data Communication Technology is the world wide use of a wireless connection technology, by the many hardware and software platforms supported. Is a data through electrical pulses and infrared optical pulse switch between the wireless data transceiver technology.Infrared transceiver products with low cost, small, fast transmission rate, the point-to-point transmission security, not subject to electromagnetic interference and other characteristics that can be achieved between the different products, rapid, convenient and safe exchange and transmission, In short distance wireless transmission have a very distinct advantage.Infrared transceiver products in the portable product of a great role. At present, the world's 150 million piece of equipment used infrared technology in electronic products and industrial equipment. medical equipment and other fields widely used. For example, 95% of the notebook computers on the installation of infrared transceiver interface the majority of the cell phone is also the allocation of infrared transceiver interface. With the exchange of quantitative data, infrared data communications will enable cell phone data transmission more convenient. With infrared data transmission technology matures, perfect, low costs, Infrared Transceiver in short distance communications will be more widely applied.This chapter first describes the infrared transceiver IC design issues to the background and significance. then briefed the infrared data communications technology features and applications, and infrared transceiver product characteristics, domestic and international situation and development trend of the last under infrared remote transceiver system in practical application to establish a task of design orientation.1.2 Infrared Remote Control Transceiver SystemInfrared remote control system is divided into single-channel and multi-channel remote control. Only a command signal transmission channel, called single-channel remote control system; with more than two instructions signal transmission channel known as a multi-channel remote control system. Relatively simple single-channel remote control, in general, only a launcher directive Key receivers and only one circuit implementation. While in thereceiving circuit to add more stable memory circuits that can be activated commands to launch a number of key, so that the receiver circuit multi stable memory circuit repeatedly to change the state, to realize many of the functional control, But such a state of change is the order. If we are to achieve an arbitrary control, resort to the use of multi-channel remote control system. Multi-channel remote control can be realized by the object of arbitrary multi-function remote control. As for the choice of several routes and what control methods, according to the actual situation (such as object, operational requirements and cost accounting, etc.) to decide. General infrared remote transceiver system by infrared remote control transmitter signal coding, infrared remote control signal receivers and decoders (or decoder chip MCU) and the external circuit consisting of three parts. Signal transmitter remote control code used to generate pulses of infrared emission-driven output infrared remote control signal, receiver completion of the remote control signal amplification and detection, plastic and demodulation encoding pulse. Infrared remote control coded pulse is going to obtain a continuous serial binary code, and for most of the infrared transceiver system, This serial code as micro-controller of the remote control input signals from the internal CPU completion of the remote control instruction decoder, on the other infrared remote control transceivers, the designers of electronic products, The internal micro-controller of the remote control decoder directive is not accessible. Therefore, people are using infrared encoder / decoder chip and microcontroller developed various generic infrared remote transceiver system, In various equipment infrared signals between the transceiver.Remote transceiver system generally transmitters and receivers is composed of two parts. Launchers from the general direction keys, coded instructions circuit modulation circuit, driving circuit, firing circuit of several parts. When pressed a key, the directive coding circuit, in the correspondinginstructions encoded signal, the encoder signal to the carrier modulation, Driven by the power amplifier circuit after circuit fired from the field after firing instructions coded modulation signals. General receiver by the receiving circuit, the amplifier circuit, demodulation circuits, instruction decoder circuit, driving circuit, circuit implementation of several parts. Receiving Circuit will launch vehicles have been coded modulation signal receiving instructions from, and to enlarge evacuation demodulation circuit. Demodulation circuit will have the coding modulation signal demodulation, namely, reduction of signal coding. The instruction decoder to the encoder signal decoding, Driven by the final circuit to drive the implementation of various instructions circuit to control the operation.1.3 infrared remote control transceiver product profiles 1.3.1 infrared remote control transceiver product structure and typeCurrently infrared transceiver in accordance with the mode of transmission rate and can be divided into four categories : Serial mode, the highest rate of 115.2 Kbps; medium-speed model : the highest rate of 0.567 Mbps and 1.152Mbps; High-speed mode : The maximum rate of 16 Mbps.Also according to the size chip power consumption can be divided into low-power consumption and standard two categories, low-power type normally used 3 V power supply, transmission distance closer to about 0 - 30cm, which is commonly used standard 5V power supply, transmission distance away at least 1m above.1.3.2 infrared remote control transmitters of the status quo at home and abroadInfrared communication technology in the development stage and there are several infrared communication standards, between different standards for infrared equipment can not infrared communication. To have all the infraredequipment to interoperability in 1993 by more than 20 large manufacturers initiated the establishment of an Infrared Data Association (IRDA) unified the infrared communication standards , which is currently widely used in infrared data communication protocols and standards, also known as the IRDA standard.Since 1993 IRDA since the establishment of the Infrared Data Association members have developed to more than 150. IRDA standards of the industry has been widely recognized and supported. Has been developed with the infrared communications equipment have been as many as 100 species. IR module, installed capacity has reached 150 million sets. Although there is also a short distance wireless Bluetooth technology, But in infrared communication technology low cost and broad compatibility advantages, Infrared data communication in the future will still be a very long time inherent short-range wireless data communications fields play an important role.1.3.3 Infrared Transceiver product development trendIn various infrared transceiver products, although the transmission rate, transmission distance and other characteristics, But infrared transceiver products has been towards improving the transmission rate, increase the transmission distance and lower power consumption, expanding launch reception angle of development. In particular, as the technology development and maturity, the means of transmission is moving in the direction of point-to-multipoint. Therefore infrared remote control transceiver products have broader prospects for development.2 Infrared communication of knowledge2.1 infrared ray foundation knowledge2.1.1 infrared outlinedInfrared is actually a kind of electromagnetic wave. From the analysis of various natural component of the electromagnetic wave reflected spectrum is :-ray, x-ray, ultraviolet, visible, infrared, microwave and radio wave. From the viewpoint of form, and they did not seem to, but if the wavelength in descending order, and we will find him all the only visible light spectrum of the entire 0.38 μm - 0.76μm so long little area, and adjacent to the visible light and infrared (including the far infrared, mid-infrared and near infrared foreign) accounts for the spectrum of 0.76 μm - 1000μm of a major. Which micron wavelength range also includes UV, visible, near infrared, mid-infrared and far-infrared, microwave.From the above analysis shows that infrared is a very rich spectrum resources, it currently has in production, life, military, medical, and other aspects have been widely used, such as infrared heating, medical infrared, infrared communication, infrared camera, infrared remote control, and so on. Infrared remote control is the many applications of infrared part of the current household appliances widely used in TV remote control, VCR remote control, VCD remote control, high-fidelity audio remote control, are used infra-red remote control, It allows the control of these appliances have become very easy.2.1.2 infrared propertiesInfrared lies between visible light and microwave a wave, it is with certain clinical characteristics of the wave. In the near-infrared, visible light and its adjacent, it is visible in certain characteristics, such as straight-line transmission, reflection, refraction, scattering, diffraction, can be certainobjects and can be absorbed through the lens of their focusing. In the far-infrared region, owing to its neighboring microwave, it has some characteristics of microwave, If a strong penetrating power and can run through some opaque substances. Since in any object, natural profession, regardless of whether its own luminescence (referring to visible light), as long as the temperature is above absolute zero (-273 °C), moment will be kept around to infrared radiation. Only higher temperature of objects strong infrared radiation, low-temperature objects infrared radiation weaker. Therefore infrared feature is the greatest common in nature, it is called thermal radiation called thermal radiation. Infrared cameras, infrared night market pyroelectric infrared detectors and some other missiles aiming at is the use of this characteristic of infrared work.Infrared and visible light compared to another characteristic of a variety of colors. As the longest wavelength of visible light is a wavelength of the shortest times (780 nm-380 nm), So is called an octave. And infrared wavelength is the longest shortest wavelength of a times, and the longest wavelength infrared is the shortest wavelength of 10 times, that is, 10 octave. Therefore, if visible light can be expressed as seven colors, infrared may performance 70 colors, showing the rich colors. Infrared smoke through the good performance, which is also one of its features.Because not visible to the infrared, it has little effect on the environment. By the wave infrared rays than the long wavelength radio waves, infrared remote control will not affect the nearby radio equipment. Another wavelength of less t han 1.5μm near infrared light, transparent atmosphere in the visible light transmission characteristics much better than, because it close to the visible edge of the red light, linear transmission, reflection, refraction and absorption material and the physical characteristics very similar to visible light. Therefore, it can be used with similar visible focusing lens and other opticaldevices. Because infrared remote control is not as remote as the radio through the barrier to control the object's ability to control, so in the design of household appliances infra-red remote control, wireless remote control as unnecessary, each set (transmitters and receivers) have different frequency or remote coding (Otherwise, wall will control or interference with neighbors household appliances), all similar products in the infrared remote control, The same can control the frequency or coding, and no remote control signal "drop." This universal infrared remote control provides a great convenience. Infrared to visible light, is very subtle and confidentiality, therefore, the security, Alert and other security devices have been widely used. Infrared remote control is simple in structure and easy, low-cost, anti-interference capability, high reliability are a number of advantages, is a close-up remote control, especially in indoor remote control optimized manner.2.1.3 infrared diode characteristicsInfrared is not visible, people here are not aware of. Electronic technology is used infrared light emitting diode (also known as the IR emission diode) to generate infrared. Infrared remote control transceiver is using near-infrared transmission control instructions 0.76μm wavelength of ~ 1. 5μm. Near-infrared remote control as a light source, because there infrared light emitting diodes and infrared receiving device (photo diode. Transistor and PV) and the luminescence peak wavelength of light by the general 0.8μm ~ 0. 94μm. in the near-infrared band, both of the spectrum is the coincidence to a good match, access to higher transmission efficiency and higher reliability. Commonly used infrared diode, and its shape is similar LED light emitting diodes, Its basic circuit shown in figure 2 -2. The triode plans for the switch, when the base added a driving signal, Transistor saturated conduction infrared LED D is also Wizard Link, issued infrared (near infrared about 0.93 μm). D.The pressure drop of about 1.4 V and the current general for 10-20mA. To adapt to the working voltage of the D loop resistance often as a series of infrared diode current limit resistance.When the circuit diagram of the infrared emission control corresponding to the controlled device, the control of the distance and D is proportional to the transmitting power. In order to increase the distance of infrared control, infrared diode D should work on the pulse state that work is the lifeblood of current. Because pulse light (optical modulation) the effective transmission distance and pulse is proportional to the peak current, only maximize peak current Ip, will increase the infrared distance. Ip increase is a way to reduce the pulse duty cycle, that is compressed pulse width τ some TV infrared remote control, its infrared luminescence of the pulse duty cycle of about 1/4-1/3; Some electrical products infrared remote control, its duty cycle of 1 / 10. Decreasing pulse duty cycle also enable low-power infrared LED distance of the greatly increased. Common infrared light emitting diodes, power is divided into small power (1 mW - 10mW). Chinese power (20mW - 50mW) and power (50mW - 100mW more) three categories. Use different power infrared LED, the allocation should be driven by the corresponding power control. Figure 2 -2 by the reflected infrared light-emitting diodes to make produce optical modulation, Drivers only need to add the control of a certain frequency pulse voltage.Infrared transmitter and receiver in the way the two kinds of straight, and the second is reflective. Luminescence pointed straight pipe and tube receiver placed in a relatively controlled and fired on the two ends, a certain distance away from the middle; Reflective means luminescent tube and pipe parallel with the receiving peacetime, without always receiving tube light, luminescence only in possession of the infrared light reflected fromencountered, the receiving tube received from the reflected infrared before work.2.2 infrared communication basic tenets2.2.1 infrared communication PrincipleCommunication is the use of infrared wavelength of 900 nm-infrared waves from 1000 to serve as an information carrier, through infrared technology between the two close communication and confidentiality of information transmitted. Infrared communication system structure include : part launcher, channel, the receiver part.Launcher source letter issued after the binary signal from the high-frequency modulated infrared LED sent, receiving device regard the reception of high-frequency signals from the infrared receiver tube after receiving further demodulation photoelectric conversion of the original information of a mass communication lose way. Afterwards the former Information received after receiving part of the drive circuit connected to the expected completion of the various functions. To which the modulation coding style pulse width modulation (by changing the pulse width modulated signal PWM) and pulse modulation time (through change the pulse train interval time between the modulation signal PPM) two.2.2.2 infrared communication system elements(1) Launches : Currently there is a infrared wireless digital communications system sources of information including voice, data, images. Its methods of work for the launch of the receiver can be divided into different layout LOS way (Light-of-Sight , intracardiac way), diffuse (diffuse) mode. LOS way directional, it has good channel characteristics such advantages, but the existence of a "shadow" effect. difficult to achieve roaming function. Roaming means the main features of non-directional, and easy to implementroaming function, but its channel quality is better sometimes LOS way. Transmission of signals required for a few of (the sampling was quantified), the general need for baseband modulation, transmission, modulation, sometimes signal source coding, the above-driven signals from photoelectric converter complete optical signal transmission. Infrared wireless digital communications system and its scope of work-for-fired power distribution, the quality of the communication. While using various methods to improve optical transmitter power, the other using spatial diversity, holographic films and so on so diffuse light for the launch of space optical power evenly distributed.(2) Channel : infrared wireless digital communication channel refers to the transmitters and receivers in the space between. Due to natural light and artificial light sources such as light signals in the context of intervention, and the source - Electrical Equipment, The optical noise and disturbances, infrared wireless digital communications in some occasions, poor quality, At this point needed to channel coding. Infrared wireless communication system, the optical signal reflection, light scattering and background noise and interference effects, Infrared wireless digital channel presence multi-path interference and noise, This is to improve the quality and access for high-speed applications should be addressed. Infrared wireless digital communication channel often used by the major optical components, optical filter, condenser, their role is : plastic, filter, depending on the field transformation, the band division, the lens can be used as launch-ray focusing, the use of optical filters filter out stray light, the use of optical lenses to expand the field of view receiver, able to make use of optical components for the link frequency division multiplexing, etc.. Infrared wireless communication channel optical noise : the natural noise (sunlight) and anthropogenic interference (fluorescent lighting). can be modulated by the transmission technology such as filters and adding to be addressed.(3) receivers : Channel optical signal from the optical receiver partially photoelectric conversion, In order to remove noise and intersymbol interference and other functions. Infrared wireless digital communications system receiver include optical receiver parts and follow-up sampling, filtering, judgment, quantity, balanced and decoding part. Infrared wireless optical receiver often used amplifier, and called for large-bandwidth, high gain, low noise and low noise, frequency response and channel impulse response matched. To be suppressed by low-frequency noise and human disturbance needs a band-pass filter. To obtain large optical receiver scope and instantaneous field of view, often using spherical optical lens.2.2.3 infrared communications featureWireless communications are a lot of ways, some using infrared communication with the following characteristics :• The high frequency, wave length, and fired the energy concentrated space propagation attenuation coefficient can ensure the effective signal transmission;• infrared is the invisible light, strong confidentiality and use it as an information carrier. device when there is no visual pollution, it does no harm to the human body;• dissemination without limitation, and there is no question of frequency interference with radio-wave pattern, not on the spectrum resources to the relevant authorities for the application and registration, easy to implement;• has a good point, when the transmission equipment and infrared receiver ports line up straight, deviation of not more than about 15 degrees when infrared devices running the best effect;• through infrared or not bypassed and objects, data transmission, optical path can not be blocked;• currently produce and receive infrared signals in the technology is relatively mature, components small size, low cost production of simple, easy to produce and modulation advantages.2.3 infrared communication code based on the knowledgeUsually, infrared remote control transmitters will signal (pulse binary code) modulation at 38 KHz carrier, After buffer amplified sent to the infrared light-emitting diodes, infrared signals into firing away. Pulse binary code in a variety of formats. One of the most commonly used code is PWM (pulse width modulation code) and the PPM code (Pulse Code Modulation). The former said in a pulse width, pulse indicated 0. The latter pulse width, but the width of code-not the same, the codes represent a bit - and the digits represent narrow 0.Remote coding pulse signal (PPM code as an example) are usually guided by the code, the system code, the anti-code system, a feature code, functional anti-code signal components. Guide the code name for the initial code, by the width of 9 ms and the margin width of 4.5 ms to the low-level components (different remote control systems in the low-level high width of a certain distinction), remote coding used to mark the beginning of pulsed signals. System identification code is also called code, which used to indicate the type of remote control system, in order to distinguish other remote-control system, prevent the remote control system malfunction. Functional code is also called scripts, which represents the corresponding control functions, Receiver of the micro-controller functions under the numerical code to complete the various functions operating. Anti-code system and function codes are anti-system code and the functional code against code Anti-code can be joined to the receiver synchronization transmission process leads to errors. In order to improve performance and reduce interference power consumption, The remote control will be coded pulse frequency of 38 KHz (for the cycle of 26.3 ms) of the carrier signal pulse reshuffle system (PAM), and then sentto the buffer amplified infrared LED, the remote control signal transmitter away.Address code and data codes are composed of different pulse width expressed that the two narrow pulse "0"; 2 pulse width "1"; a narrow pulse width and pulse expressed an "F" is the code addresses "vacant."Is the first part of a group a group of code, each code synchronization between separated. The plan is to enlarge the second half of a group code : a code from 12 AD (the address code plus data code For example, eight address code plus four data code), each with two AD-Pulse's : Pulse said the two "0"; 2 pulse width "1"; a narrow pulse width and pulse expressed an "F" is the code addresses "vacant."Realize fired at each fired at least four groups code, PT2272 only twice in a row to detect the same address code plus data code data will be the code "1" is driven The data should be output to drive margin and VT terminal for synchronous serial.红外遥控系统摘要目前红外数据通信技术是在世界范围内被广泛应用的一种无线连接技术,它也可以被许多软硬件平台所支持。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
郑州轻工业学院本科毕业设计(论文)——英文翻译题目差错控制编码解决加性噪声的仿真学生姓名专业班级通信工程05-2 学号 12院(系)计算机与通信工程学院指导教师完成时间 2009年4月26日英文原文:Data communicationsGildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerlandfgildas.avoine, philippe.oechsling@ep.chAbstractData communications are communications and computer technology resulting from the combination of a new means of communication. To transfer information between the two places must have transmission channel, according to the different transmission media, there is wired data communications and wireless data communications division. But they are through the transmission channel data link terminals and computers, different locations of implementation of the data terminal software and hardware and the sharing of information resources.1 The development of data communicationsThe first phase: the main language, through the human, horsepower, war and other means of transmission of original information.Phase II: Letter Post. (An increase means the dissemination of information)The third stage: printing. (Expand the scope of information dissemination)Phase IV: telegraph, telephone, radio. (Electric to enter the time)Fifth stage: the information age, with the exception of language information, there are data, images, text and so on.1.1 The history of modern data communicationsCommunication as a Telecommunications are from the 19th century, the beginning Year 30. Faraday discovered electromagnetic induction in 1831. Morse invented telegraph in 1837. Maxwell's electromagnetic theory in 1833. Bell invented the telephone in 1876. Marconi invented radio in 1895. Telecom has opened up in the new era. Tube invented in 1906 in order to simulate the development of communications.Sampling theorem of Nyquist criteria In 1928. Shannong theorem in 1948. The invention of the 20th century, thesemiconductor 50, thereby the development of digital communications. During the 20th century, the invention of integrated circuits 60. Made during the 20th century, 40 the concept of geostationary satellites, but can not be achieved. During the 20th century, space technology 50. Implementation in 1963 first synchronized satellite communications. The invention of the 20th century, 60 laser, intended to be used for communications, was not successful. 70 The invention of the 20th century, optical fiber, optical fiber communications can be developed.1.2 Key figuresBell (1847-1922), English, job in London in 1868. In 1871 to work in Boston. In 1873, he was appointed professor at Boston University. In 1875, invented many Telegram Rd. In 1876, invented the telephone. Lot of patents have been life. Yes, a deaf wife.Marconi (1874-1937), Italian people, in 1894, the pilot at his father's estate. 1896, to London. In 1897, the company set up the radio reported. In 1899, the first time the British and French wireless communications. 1916, implementation of short-wave radio communications. 1929, set up a global wireless communications network. Kim won the Nobel Prize. Took part in the Fascist Party.1.3 Classification of Communication SystemsAccording to type of information: Telephone communication system, Cable television system ,Data communication systems.Modulation by sub: Baseband transmission,Modulation transfer.Characteristics of transmission signals in accordance with sub: Analog Communication System ,Digital communication system.Transmission means of communication system: Cable Communications,Twisted pair, coaxial cable and so on.And long-distance telephone communication. Modulation: SSB / FDM. Based on the PCM time division multiple coaxial digital base-band transmission technology. Will gradually replace the coaxial fiber.Microwave relay communications:Comparison of coaxial and easy to set up, low investment, short-cycle. Analog phone microwave communications mainly SSB / FM /FDM modulation, communication capacity of 6,000 road / Channel. Digital microwave using BPSK, QPSK and QAM modulation techniques. The use of 64QAM, 256QAM such as multi-level modulation technique enhance the capacity of microwave communications can be transmitted at 40M Channel 1920 ~ 7680 Telephone Rd PCM figure.Optical Fiber Communication: Optical fiber communication is the use of lasers in optical fiber transmission characteristics of long-distance with a large communication capacity, communication, long distance and strong anti-interference characteristics. Currently used for local, long distance, trunk transmission, and progressive development of fiber-optic communications network users. At present, based on the long-wave lasers and single-mode optical fiber, each fiber road approach more than 10,000 calls, optical fiber communication itself is very strong force. Over the past decades, optical fiber communication technology develops very quickly, and there is a variety of applications, access devices, photoelectric conversion equipment, transmission equipment, switching equipment, network equipment and so on. Fiber-optic communications equipment has photoelectric conversion module and digital signal processing unit is composed of two parts.Satellite communications: Distance communications, transmission capacity, coverage, and not subject to geographical constraints and high reliability. At present, the use of sophisticated techniques Analog modulation, frequency division multiplexing and frequency division multiple access. Digital satellite communication using digital modulation, time division multiple road in time division multiple access.Mobile Communications: GSM, CDMA. Number of key technologies for mobile communications: modulation techniques, error correction coding and digital voice encoding. Data Communication Systems.1.4 Five basic types of data communication system:(1)Off-line data transmission is simply the use of a telephone or similar link to transmit data without involving a computer system.The equipment used at both ends of such a link is not part of a computer, or at least does not immediately make the data available for computer process, that is, the data when sent and / or received are 'off-line'.This type of data communication is relatively cheap and simple.(2)Remote batch is the term used for the way in which data communication technology is used geographically to separate the input and / or output of data from the computer on which they are processed in batch mode.(3)On-line data collection is the method of using communications technology to provide input data to a computer as such input arises-the data are then stored in the computer (say on a magnetic disk) and processed either at predetermined intervals or as required.(4)Enquiry-response systems provide, as the term suggests, the facility for a user to extract information from a computer.The enquiry facility is passive, that is, does not modify the information stored.The interrogation may be simple, for example, 'RETRIEVE THE RECORD FOR EMPLOYEE NUMBER 1234 'or complex.Such systems may use terminals producing hard copy and / or visual displays.(5)Real-time systems are those in which information is made available to and processed by a computer system in a dynamic manner so that either the computer may cause action to be taken to influence events as they occur (for example as in a process control application) or human operators may be influenced by the accurate and up-to-date information stored in the computer, for example as in reservation systems.2 Signal spectrum with bandwidthElectromagnetic data signals are encoded, the signal to be included in the data transmission. Signal in time for the general argument to show the message (or data) as a parameter (amplitude, frequency or phase) as the dependent variable. Signal of their value since the time variables are or not continuous, can be divided into continuous signals and discrete signals; according to whether the values of the dependent variable continuous, can be divided into analog signals and digital Signal.Signals with time-domain and frequency domain performance of the two most basic forms and features. Time-domain signal over time to reflect changing circumstances. Frequency domain characteristics of signals not only contain the same information domain, and the spectrum of signal analysis, can also be a clear understanding of the distribution ofthe signal spectrum and share the bandwidth. In order to receive the signal transmission and receiving equipment on the request channel, Only know the time-domain characteristics of the signal is not enough, it is also necessary to know the distribution of the signal spectrum. Time-domain characteristics of signals to show the letter .It’s changes over time. Because most of the signal energy is concentrated in a relatively narrow band, so most of our energy focused on the signal that Paragraph referred to as the effective band Bandwidth, or bandwidth. Have any signal bandwidth. In general, the greater the bandwidth of the signal using this signal to send data Rate on the higher bandwidth requirements of transmission medium greater. We will introduce the following simple common signal and bandwidth of the spectrum.More or less the voice signal spectrum at 20 Hz ~ 2000 kHz range (below 20 Hz infrasound signals for higher than 2000 KHz. For the ultrasonic signal), but with a much narrower bandwidth of the voice can produce an acceptable return, and the standard voice-frequency signal gnal 0 ~ 4 MHz, so the bandwidth of 4 MHz.As a special example of the monostable pulse infinite bandwidth. As for the binary signal, the bandwidth depends on the generalThe exact shape of the signal waveform, as well as the order of 0,1. The greater the bandwidth of the signal, it more faithfully express the number of sequences.3 The cut-off frequency channel with bandwidthAccording to Fourier series we know that if a signal for all frequency components can be completely the same through the transmission channel to the receiving end, then at the receiving frequency components of these formed by stacking up the signal and send the signal side are exactly the same, That is fully recovered from the receiving end of the send-side signals. But on the real world, there is no channel to no wear and tear through all the Frequency components. If all the Fourier components are equivalent attenuation, then the signal reception while Receive termination at an amplitude up Attenuation, but the distortion did not happen. However, all the transmission channel and equipment for different frequency components of the degree of attenuation is differentSome frequency components almost no attenuation, and attenuation of some frequency components by anumber, that is to say, channel also has a certain amount of vibrationIncrease the frequency characteristics, resulting in output signal distortion. Usually are frequency of 0 Hz to fc-wide channel at Chuan harmonic lost during the attenuation does not occur (or are a very small attenuation constant), whereas in the fc frequency harmonics at all above the transmission cross Decay process a lot, we put the signal in the transmission channel of the amplitude attenuation of a component to the original 0.707(that is, the output signal Reduce by half the power) when the frequency of the corresponding channel known as the cut-off frequency (cut - off frequency).Cut-off frequency transmission medium reflects the inherent physical properties. Other cases, it is because people interested in Line filter is installed to limit the bandwidth used by each user. In some cases, because of the add channel Two-pass filter, which corresponds to two-channel cut-off frequency f1 and f2, they were called up under the cut-off frequency and the cut-off frequency.This difference between the two cut-off frequency f2-f1 is called the channel bandwidth. If the input signal bandwidth is less than the bandwidth of channel, then the entire input signal Frequency components can be adopted by the Department of channels, which the letter Road to be the output of the output waveform will be true yet. However, if the input signal bandwidth greater than the channel bandwidth, the signal of a Frequency components can not be more on the channel, so that the signal output will be sent with the sending end of the signal is somewhat different, that is produced Distortion. In order to ensure the accuracy of data transmission, we must limit the signal bandwidth.4 Data transfer rateChannel maximum data transfer rate Unit time to be able to transfer binary data transfer rate as the median. Improve data transfer rate means that the space occupied by each Reduce the time that the sequence of binary digital pulse will reduce the cycle time, of course, will also reduce the pulse width.The previous section we already know, even if the binary digital pulse signal through a limited bandwidth channel will also be the ideal generated wave Shape distortion, and when must the input signal bandwidth, the smaller channel bandwidth, output waveformdistortion will be greater. Another angle Degree that when a certain channel bandwidth, the greater the bandwidth of the input signal, the output signal the greater the distortion, so when the data transmissionRate to a certain degree (signal bandwidth increases to a certain extent), in the on-channel output signal from the receiver could not have been Distortion of the output signal sent to recover a number of sequences. That is to say, even for an ideal channel, the limited bandwidth limit System of channel data transfer rate.At early 1924, H. Nyquist (Nyquist) to recognize the basic limitations of this existence, and deduced that the noise-free Limited bandwidth channel maximum data transfer rate formula. In 1948, C. Shannon (Shannon) put into the work of Nyquist 1 Step-by-step expansion of the channel by the random noise interference. Here we do not add on to prove to those now seen as the result of a classic.Nyquist proved that any continuous signal f (t) through a noise-free bandwidth for channel B, its output signal as a Time bandwidth of B continuous signal g (t). If you want to output digital signal, it must be the rate of g (t) for interval Sample. 2B samples per second times faster than are meaningless, because the signal bandwidth B is higher than the high-frequency component other than a letter has been Road decay away. If g (t) by V of discrete levels, namely, the likely outcome of each sample for the V level of a discrete one, The biggest channel data rate Rm ax as follows:Rmax = 2Blog 2 V (bit / s)For example, a 3000 Hz noise bandwidth of the channel should not transmit rate of more than 6,000 bits / second binary digital signal.In front of us considered only the ideal noise-free channel. There is noise in the channel, the situation will rapidly deteriorate. Channel Thermal noise with signal power and noise power ratio to measure the signal power and noise power as the signal-to-noise ratio (S ignal - to -- Noise Ratio). If we express the signal power S, and N express the noise power, while signal to noise ratio should be expressed as S / N. However, people Usually do not use the absolute value of signal to noise ratio, but the use of 10 lo g1 0S / N to indicate the units are decibels (d B). For the S / N equal 10 Channel, said its signal to noise ratio for the 1 0 d B; the same token, if the channel S / N equal to one hundred, then the signal to noiseratio for the 2 0 d B; And so on. S hannon noise channel has about the maximum data rate of the conclusions are: The bandwidth for the BH z, signal to noise ratio for the S / N Channel, the maximum data rate Rm ax as follows:Rmax = Blog 2 (1 + S / N) (bits / second)For example, for a bandwidth of 3 kHz, signal to noise ratio of 30 dB for the channel, regardless of their use to quantify the number of levels, nor Fast sampling rate control, the data transfer rate can not be greater than 30,000 bits / second. S h a n n o n the conclusions are derived based on information theory Out for a very wide scope, in order to go beyond this conclusion, like you want to invent perpetual motion machine, as it is almost impossible.It is worth noting that, S hannon conclusions give only a theoretical limit, and in fact, we should be pretty near the limit Difficult.SUMMARYMessage signals are (or data) of a magnetic encoder, the signal contains the message to be transmitted. Signal according to the dependent variable Whether or not a row of values, can be classified into analog signals and digital signals, the corresponding communication can be divided into analog communication and digital communication.Fourier has proven: any signal (either analog or digital signal) are different types of harmonic frequencies Composed of any signal has a corresponding bandwidth. And any transmission channel signal attenuation signals will, therefore, Channel transmission of any signal at all, there is a data transfer rate limitations, and this is Chengkui N yquist (Nyquist) theorem and S hannon (Shannon) theorem tells us to conclusions.Transmission medium of computer networks and communication are the most basic part of it at the cost of the entire computer network in a very Large proportion. In order to improve the utilization of transmission medium, we can use multiplexing. Frequency division multiplexing technology has many Road multiplexing, wave division multiplexing and TDM three that they use on different occasions.Data exchange technologies such as circuit switching, packet switching and packetswitching three have their respective advantages and disadvantages. M odem are at Analog phone line for the computer's binary data transmission equipment. Modem AM modulation methods have, FM, phase modulation and quadrature amplitude modulation, and M odem also supports data compression and error control. The concept of data communications Data communication is based on "data" for business communications systems, data are pre-agreed with a good meaning of numbers, letters or symbols and their combinations.参考文献[1]C.Y.Huang and A.Polydoros,“Two small SNR classification rules for CPM,”inProc.IEEE Milcom,vol.3,San Diego,CA,USA,Oct.1992,pp.1236–1240.[2]“Envelope-based classification schemes for continuous-phase binary Frequency-shift-keyed modulations,”in Pr oc.IEEE Milcom,vol.3,Fort Monmouth,NJ,USA,Oct.1994,pp. 796–800.[3]A.E.El-Mahdy and N.M.Namazi,“Classification of multiple M-ary frequency-shift keying over a rayleigh fading channel,”IEEE m.,vol.50,no.6,pp.967–974,June 2002.[4]Consulative Committee for Space Data Systems(CCSDS),Radio Frequency and Modulation SDS,2001,no.401.[5]E.E.Azzouz and A.K.Nandi,“Procedure for automatic recognition of analogue and digital modulations,”IEE mun,vol.143,no.5,pp.259–266,Oct.1996.[6]A.Puengn im,T.Robert,N.Thomas,and J.Vidal,“Hidden Markov models for digital modulation classification in unknown ISI channels,”in Eusipco2007,Poznan,Poland, September 2007,pp.1882–1885.[7]E.Vassalo and M.Visintin,“Carrier phase synchronization for GMSK signals,”I nt.J.Satell. Commun.,vol.20,no.6,pp.391–415,Nov.2002.[8]J.G.Proakis,Digital Communications.Mc Graw Hill,2001.[9]L.Rabiner,“A tutorial on hidden Markov models and selected applications in speechrecognition,”Proc.IEEE,vol.77,no.2,pp.257–286,1989.英文译文:数据通信Gildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerlandfgildas.avoine, philippe.oechsling@ep.ch摘要数据通信是通信技术和计算机技术相结合而产生的一种新的通信方式。