通信类英文文献及翻译.doc

合集下载

外文参考文献翻译-中文

外文参考文献翻译-中文

外⽂参考⽂献翻译-中⽂基于4G LTE技术的⾼速铁路移动通信系统KS Solanki教授,Kratika ChouhanUjjain⼯程学院,印度Madhya Pradesh的Ujjain摘要:随着时间发展,⾼速铁路(HSR)要求可靠的,安全的列车运⾏和乘客通信。

为了实现这个⽬标,HSR的系统需要更⾼的带宽和更短的响应时间,⽽且HSR的旧技术需要进⾏发展,开发新技术,改进现有的架构和控制成本。

为了满⾜这⼀要求,HSR采⽤了GSM的演进GSM-R技术,但它并不能满⾜客户的需求。

因此采⽤了新技术LTE-R,它提供了更⾼的带宽,并且在⾼速下提供了更⾼的客户满意度。

本⽂介绍了LTE-R,给出GSM-R与LTE-R之间的⽐较结果,并描述了在⾼速下哪种铁路移动通信系统更好。

关键词:⾼速铁路,LTE,GSM,通信和信令系统⼀介绍⾼速铁路需要提⾼对移动通信系统的要求。

随着这种改进,其⽹络架构和硬件设备必须适应⾼达500公⾥/⼩时的列车速度。

HSR还需要快速切换功能。

因此,为了解决这些问题,HSR 需要⼀种名为LTE-R的新技术,基于LTE-R的HSR提供⾼数据传输速率,更⾼带宽和低延迟。

LTE-R能够处理⽇益增长的业务量,确保乘客安全并提供实时多媒体信息。

随着列车速度的不断提⾼,可靠的宽带通信系统对于⾼铁移动通信⾄关重要。

HSR的应⽤服务质量(QOS)测量,包括如数据速率,误码率(BER)和传输延迟。

为了实现HSR的运营需求,需要⼀个能够与 LTE保持⼀致的能⼒的新系统,提供新的业务,但仍能够与GSM-R长时间共存。

HSR系统选择合适的⽆线通信系统时,需要考虑性能,服务,属性,频段和⼯业⽀持等问题。

4G LTE系统与第三代(3G)系统相⽐,它具有简单的扁平架构,⾼数据速率和低延迟。

在LTE的性能和成熟度⽔平上,LTE- railway(LTE-R)将可能成为下⼀代HSR通信系统。

⼆ LTE-R系统描述考虑LTE-R的频率和频谱使⽤,对为⾼速铁路(HSR)通信提供更⾼效的数据传输⾮常重要。

通信类中英文翻译、外文文献翻译

通信类中英文翻译、外文文献翻译

美国科罗拉多州大学关于在噪声环境下对大量连续语音识别系统的改进---------噪声环境下说话声音的识别工作简介在本文中,我们报道美国科罗拉多州大学关于噪声环境下海军研究语音词汇系统方面的最新改进成果。

特别地,我们介绍在有限语音数据的前提下,为了了解不确定观察者和变化的环境的任务(或调查方法),我们必须在提高听觉和语言模式方面努力下工夫。

在大量连续词汇语音识别系统中,我们将展开MAPLR自适应方法研究。

它包括单个或多重最大可能线形回归。

当前噪声环境下语音识别系统使用了大量声音词汇识别的声音识别引擎。

这种引擎在美国科罗拉多州大学目前得到了飞速的发展,本系统在噪声环境下说话声音系统(SPINE-2)评价数据中单词错识率表现为30.5%,比起2001年的SPINE-2来,在相关词汇错识率减少16%。

1.介绍为获得噪声环境下的有活力的连续声音系统的声音,我们试图在艺术的领域做出计算和提出改善,这个工作有几方面的难点:依赖训练的有限数据工作;在训练和测试中各种各样的军事噪声存在;在每次识别适用性阶段中,不可想象的听觉溪流和有限数量的声音。

在2000年11月的SPIN-1和2001年11月SPIN-2中,海军研究词汇通过DARPT在工作上给了很大的帮助。

在2001年参加评估的种类有:SPIIBM,华盛顿大学,美国科罗拉多州大学,AT&T,奥瑞哥研究所,和梅隆卡内基大学。

它们中的许多先前已经报道了SPINE-1和SPLNE-2工作的结果。

在这方面的工作中不乏表现最好的系统.我们在特性和主模式中使用了自适应系统,同时也使用了被用于训练各种参数类型的多重声音平行理论(例如MFCC、PCP等)。

其中每种识别系统的输出通常通过一个假定的熔合的方法来结合。

这种方法能提供一个单独的结果,这个结果的错误率将比任何一个单独的识别系统的结果要低。

美国科罗拉多州大学参加了SPIN-2和SPIN-1的两次评估工作。

我们2001年11月的SPIN-2是美国科罗拉多州大学识别系统基础上第一次被命名为SONIC(大量连续语音识别系统)的。

(完整word版)英文文献及翻译:计算机程序

(完整word版)英文文献及翻译:计算机程序

姓名:刘峻霖班级:通信143班学号:2014101108Computer Language and ProgrammingI. IntroductionProgramming languages, in computer science, are the artificial languages used to write a sequence of instructions (a computer program) that can be run by a computer. Simi lar to natural languages, such as English, programming languages have a vocabulary, grammar, and syntax. However, natural languages are not suited for programming computers because they are ambiguous, meaning that their vocabulary and grammatical structure may be interpreted in multiple ways. The languages used to program computers must have simple logical structures, and the rules for their grammar, spelling, and punctuation must be precise.Programming languages vary greatly in their sophistication and in their degree of versatility. Some programming languages are written to address a particular kind of computing problem or for use on a particular model of computer system. For instance, programming languages such as FORTRAN and COBOL were written to solve certain general types of programming problems—FORTRAN for scientific applications, and COBOL for business applications. Although these languages were designed to address specific categories of computer problems, they are highly portable, meaning that the y may be used to program many types of computers. Other languages, such as machine languages, are designed to be used by one specific model of computer system, or even by one specific computer in certain research applications. The most commonly used progra mming languages are highly portable and can be used to effectively solve diverse types of computing problems. Languages like C, PASCAL and BASIC fall into this category.II. Language TypesProgramming languages can be classified as either low-level languages or high-level languages. Low-level programming languages, or machine languages, are the most basic type of programming languages and can be understood directly by a computer. Machine languages differ depending on the manufacturer and model of computer. High-level languages are programming languages that must first be translated into a machine language before they can be understood and processed by a computer. Examples of high-levellanguages are C, C++, PASCAL, and FORTRAN. Assembly languages are intermediate languages that are very close to machine languages and do not have the level of linguistic sophistication exhibited by other high-level languages, but must still be translated into machine language.1. Machine LanguagesIn machine languages, instructions are written as sequences of 1s and 0s, called bits, that a computer can understand directly. An instruction in machine language generally tells the computer four things: (1) where to find one or two numbers or simple pieces of data in the main computer memory (Random Access Memory, or RAM), (2) a simple operation to perform, such as adding the two numbers together, (3) where in the main memory to put the result of this simple operation, and (4) where to find the next instruction to perform. While all executable programs are eventually read by the computer in machine language, they are not all programmed in machine language. It is extremely difficult to program directly in machine language because the instructions are sequences of 1s and 0s. A typical instruction in a machine language might read 10010 1100 1011 and mean add the contents of storage register A to the contents of storage register B.2. High-Level LanguagesHigh-level languages are relatively sophisticated sets of statements utilizing word s and syntax from human language. They are more similar to normal human languages than assembly or machine languages and are therefore easier to use for writing complicated programs. These programming languages allow larger and more complicated programs to be developed faster. However, high-level languages must be translated into machine language by another program called a compiler before a computer can understand them. For this reason, programs written in a high-level language may take longer to execute and use up more memory than programs written in an assembly language.3. Assembly LanguagesComputer programmers use assembly languages to make machine-language programs easier to write. In an assembly language, each statement corresponds roughly to one machine language instruction. An assembly language statement is composed with the aid of easy to remember commands. The command to add the contents of the storage register A to the contents of storage register B might be written ADD B, A in a typical assembl ylanguage statement. Assembly languages share certain features with machine languages. For instance, it is possible to manipulate specific bits in both assembly and machine languages. Programmers use assemblylanguages when it is important to minimize the time it takes to run a program, because the translation from assembly language to machine language is relatively simple. Assembly languages are also used when some part of the computer has to be controlled directly, such as individual dots on a monitor or the flow of individual characters to a printer.III. Classification of High-Level LanguagesHigh-level languages are commonly classified as procedure-oriented, functional, object-oriented, or logic languages. The most common high-level languages today are procedure-oriented languages. In these languages, one or more related blocks of statements that perform some complete function are grouped together into a program module, or procedure, and given a name such as “procedure A.” If the same sequence of oper ations is needed elsewhere in the program, a simple statement can be used to refer back to the procedure. In essence, a procedure is just amini- program. A large program can be constructed by grouping together procedures that perform different tasks. Procedural languages allow programs to be shorter and easier for the computer to read, but they require the programmer to design each procedure to be general enough to be usedin different situations. Functional languages treat procedures like mathematical functions and allow them to be processed like any other data in a program. This allows a much higher and more rigorous level of program construction. Functional languages also allow variables—symbols for data that can be specified and changed by the user as the program is running—to be given values only once. This simplifies programming by reducing the need to be concerned with the exact order of statement execution, since a variable does not have to be redeclared , or restated, each time it is used in a program statement. Many of the ideas from functional languages have become key parts of many modern procedural languages. Object-oriented languages are outgrowths of functional languages. In object-oriented languages, the code used to write the program and the data processed by the program are grouped together into units called objects. Objects are further grouped into classes, which define the attributes objects must have. A simpleexample of a class is the class Book. Objects within this class might be No vel and Short Story. Objects also have certain functions associated with them, called methods. The computer accesses an object through the use of one of the object’s methods. The method performs some action to the data in the object and returns this value to the computer. Classes of objects can also be further grouped into hierarchies, in which objects of one class can inherit methods from another class. The structure provided in object-oriented languages makes them very useful for complicated programming tasks. Logic languages use logic as their mathematical base. A logic program consists of sets of facts and if-then rules, which specify how one set of facts may be deduced from others, for example: If the statement X is true, then the statement Y is false. In the execution of such a program, an input statement can be logically deduced from other statements in the program. Many artificial intelligence programs are written in such languages.IV. Language Structure and ComponentsProgramming languages use specific types of statements, or instructions, to provide functional structure to the program. A statement in a program is a basic sentence that expresses a simple idea—its purpose is to give the computer a basic instruction. Statements define the types of data allowed, how data are to be manipulated, and the ways that procedures and functions work. Programmers use statements to manipulate common components of programming languages, such as variables and macros (mini-programs within a program). Statements known as data declarations give names and properties to elements of a program called variables. Variables can be assigned different values within the program. The properties variables can have are called types, and they include such things as what possible values might be saved in the variables, how much numerical accuracy is to be used in the values, and how one variable may represent a collection of simpler values in an organized fashion, such as a table or array. In many programming languages, a key data type is a pointer. Variables that are pointers do not themselves have values; instead, they have information that the computer can use to locate some other variable—that is, they point to another variable. An expression is a piece of a statement that describe s a series of computations to be performed on some of the program’s variables, such as X+Y/Z, in which the variables are X, Y, and Z and the computations are addition and division. An assignment statement assigns a variable a value derived fromsome expression, while conditional statements specify expressions to be tested and then used to select which other statements should be executed next.Procedure and function statements define certain blocks of code as procedures or functions that can then be returned to later in the program. These statements also define the kinds of variables and parameters the programmer can choose and the type of value that the code will return when an expression accesses the procedure or function. Many programming languages also permit mini translation programs called macros. Macros translate segments of code that have been written in a language structure defined by the programmer into statements that the programming language understands.V. HistoryProgramming languages date back almost to the invention of the digital computer in the 1940s. The first assembly languages emerged in the late 1950s with the introduction of commercial computers. The first procedural languages were developed in the late 1950s to early 1960s: FORTRAN, created by John Backus, and then COBOL, created by Grace Hopper The first functional language was LISP, written by John McCarthy4 in the late 1950s. Although heavily updated, all three languages are still widely used today. In the late 1960s, the first object-oriented languages, such as SIMULA, emerged. Logic languages became well known in the mid 1970swith the introduction of PROLOG6, a language used to program artificial intelligence software. During the 1970s, procedural languages continued to develop with ALGOL, BASIC, PASCAL, C, and A d a SMALLTALK was a highly influential object-oriented language that led to the merging ofobject- oriented and procedural languages in C++ and more recently in JAVA10. Although pure logic languages have declined in popularity, variations have become vitally important in the form of relational languages for modern databases, such as SQL.计算机程序一、引言计算机程序是指导计算机执行某个功能或功能组合的一套指令。

本科毕业论文中英文翻译--Wireless-Communications无线通信【范本模板】

本科毕业论文中英文翻译--Wireless-Communications无线通信【范本模板】

Wireless Communications*byJoshua S。

Gans,Stephen P。

King and Julian Wright1. IntroductionIn 1895, Guglielmo Marconi opened the way for modern wireless communications by transmitting the three—dot Morse code for the letter ‘S’ over a distance of th ree kilometers using electromagnetic waves。

From this beginning,wireless communications has developed into a key element of modern society. From satellite transmission, radio and television broadcasting to the now ubiquitous mobile telephone,wireless communications has revolutionized the way societies function.This chapter surveys the economics literature on wireless communications。

Wireless communications and the economic goods and services that utilise it have some special characteristics that have motivated specialised studies。

First, wireless communications relies on a scarce resource –namely,radio spectrum –the property rights for which were traditionally vested with the state. In order to foster the development of wireless communications (including telephony and broadcasting)those assets were privatised。

光纤通信系统Optical_Fiber_Communications_英文资料及中文翻译

光纤通信系统Optical_Fiber_Communications_英文资料及中文翻译

光纤通信系统Optical Fiber Communications英文资料及中文翻译Communication may be broadly defined as the transfer of information from one point to another .When the information is to be conveyed over any distance a communication system is usually required .Within a communication system the information transfer is frequently achieved by superimposing or modulating the information on to an electromagnetic wave which acts as a carrier for the information signal .This modulated carrier is then transmitted to the required destination where it is received and the original information signal is obtained by demodulation .Sophisticated techniques have been developed for this process by using electromagnetic carrier waves operating at radio requites as well as microwave and millimeter wave frequencies.The carrier maybe modulated by using either optical an analog digital information signal.. Analog modulation involves the variation of the light emitted from the optical source in a continuous manner. With digital modulation, however, discrete changes in the length intensity are obtained (i.e. on-off pulses). Although often simpler to implement, analog modulation with an optical fiber communication system is less efficient, requiring a far higher signal to noise ratio at the receiver than digital modulation. Also, the linearity needed for analog modulation is mot always provided by semiconductor optical source, especially at high modulation frequencies .For these reasons ,analog optical fiber communications link are generally limited to shorter distances and lower bandwidths than digital links .Initially, the input digital signal from the information source is suitably encoded for optical transmission .The laser drive circuit directly modulates the intensity of the semiconductor last with the encoded digital signal. Hence a digital optical signal is launched into the optical fiber cable .The avalanche photodiode detector (APD) is followed by a front-end amplifier and equalizer or filter to provide gain as well as linear signal processing and noise bandwidth reduction. Finally ,the signal obtained isdecoded to give the original digital information .Generating a Serial SignalAlthough a parallel input-output scheme can provide fast data transfer and is simple in operation, it has the disadvantage of requiring a large number of interconnections. As an example typical 8 bit parallel data port uses 8 data lines, plus one or two handshake lines and one or more ground return lines. It is fairly common practice to provide a separate ground return line for each signal line, so an 8 bit port could typically use a 20 core interconnection cable. Whilst such a multi way cable is quite acceptable for short distance links, up to perhaps a few meters, it becomes too expensive for long distance links where, in addition to the cost of the multiword cable, separate driver and receiver circuits may be required on each of the 10 signal lines. Where part of the link is to be made via a radio link, perhaps through a space satellite, separate radio frequency channels would be required for each data bit and this becomes unacceptable.An alternative to the parallel transfer of data is a serial in which the states of the individual data bits are transmitted in sequence over a single wire link. Each bit is allocated a fixed time slot. At the receiving end the individual bit states are detected and stored in separate flip-flop stages, so that the data may be reassembled to produce a parallel data word. The advantage of this serial method of transmission is that it requires only one signal wire and a ground return, irrespective of the number of bits in the data word being transmitted. The main disadvantage is that the rate at which data can be transferred is reduced in comparison with a parallel data transfer, since the bits are dealt with in sequence and the larger the number of bits in the word, the slower the maximum transfer speed becomes. For most applications however, a serial data stream can provide a perfectly adequate data transfer rate . This type of communication system is well suited for radio or telephone line links, since only one communication channel is required to carry the data.We have seen that in the CPU system data is normally transferred in parallel across the main data bus, so if the input -output data is to be in serial form, then a parallel to serial data conversion process is required between the CPU data bus andthe external I/O line. The conversion from parallel data to the serial form could be achieved by simply using a multiplexed switch, which selects each data bit in turn and connects it to the output line for a fixed time period. A more practical technique makes use of a shift register to convert the parallel data into serial form.A shift register consists of a series of D type flip-flops connected in a chain, with the Q output of one flip-flop driving the D input of the next in the chain. All of the flip-flops ate clocked simultaneously by a common clock pulse, when the clock pulse occurs the data stored in each flip-flop is transferred to the next flip-flop to the right in the chain. Thus for each clock pulse the data word is effectively stepped along the shift register by one stage, At the end of the chain the state of the output flip-flop will sequence through the states of the data bits originally stored in the register. The result is a serial stream of data pulses from the end of the shift register.In a typical parallel to serial conversion arrangement the flip-flops making up the shift register have their D input switchable. Initially the D inputs are set up in a way so that data can be transferred in parallel from the CPU data bus into the register stages. Once the data word has been loaded into the register the D inputs are switched so that the flip-flops from a shift register .Now for each successive clock pulse the data pattern is shifted through the register and comes out in serial form at the right hand end of the register.At the receiving end the serial data will usually have to be converted back into the parallel form before it can be used. The serial to parallel conversion process can also be achieved by using a shift register .In this case the serial signal is applied to the D input of the stage at the left hand end of the register. As each serial bit is clocked into the register the data word again moves step by step to the right, and after the last bit has been shifted in the complete data word will be assembled within the register .At this point the parallel data may be retrieved by simply reading out the data from individual register stages in parallel It is important that the number of stages in the shift register should match the number of bits in the data word, if the data is to be properly converted into parallel form.To achieve proper operation of the receiving end of a serial data link, it isimportant that the clock pulse is applied to the receive shift register at a time when the data level on the serial line is stable. It is possible to have the clock generated at either end of the link, but a convenient scheme is to generate the clock signal at the transmitting end (parallel-serial conversion )as the master timing signal. To allow for settling time and delays along the line, the active edge of the clock pulse at the receive end is delayed relative to that which operates the transmit register. If the clock is a square wave the simples approach might be to arrange that the transmit register operates on the rising edge of the clock wave, and the receive register on the falling edge, so that the receiver operates half a clock period behind the transmitter .If both registers operate on arising edge, the clock signal from the transmitter could be inverted before being used to drive the receive shifty register.For an 8 bit system a sequence of 8 clock pulses would be needed to send the serial data word .At the receiving end the clock pulses could be counted and when the eighth pulse is reached it might be assumed that the data in the receive register is correctly positioned, and may be read out as parallel data word .One problem here is that, if for some reason the receive register missed a clock pulse ,its data pattern would get out of step with the transmitted data and errors would result. To overcome this problem a further signal is required which defines the time at which the received word is correctly positioned in the receive shift register and ready for parallel transfer from the register .One possibility is to add a further signal wire along which a pulse is sent when the last data bit is being transmitted, so that the receiver knows when the data word is correctly set up in its shift register. Another scheme might be to send clock pulses only when data bits are being sent and to leave a timing gap between the groups of bits for successive data words. The lack of the clock signal could then be detected and used to reset the bit counter, so that it always starts at zero at the beginning of each new data word.Serial and Parallel Data lion is processed. Serial indicates that the information is handled sequentially, similar to a group of soldiers marching in single file. In parallel transmission the info The terms serial and parallel are often used in descriptions of data transmission techniques. Both refer to the method by which information isdivided in to characters, words, or blocks which are transmitted simultaneously. This could be compared to a platoon of soldiers marching in ranks.The output of a common type of business machine is on eight—level punched paper tape, or eight bits of data at a time on eight separate outputs. Each parallel set of eight bits comprises a character, and the output is referred to as parallel by bit, serial by character. The choice of cither serial or parallel data transmission speed requirements.Business machines with parallel outputs, how—ever, can use either parallel outputs, how—ever, can use either direct parallel data trans—mission or serial transmission, with the addition of a parallel—to—serial converter at the interface point of the business machine and the serial data transmitter. Similarly, another converter at the receiving terminal must change the serial data back to the parallel format.Both serial and parallel data transmission systems have inherent advantages which are some—what different. Parallel transmission requires that parts of the available bandwidth be used as guard bands for separating each of the parallel channels, whereas serial transmission systems can use the entire linear portion of the available band to transmit data, On the other hand, parallel systems are convenient to use because many business machines have parallel inputs and outputs. Though a serial data set has the added converters for parallel interface, the parallel transmitter re—quires several oscillators and filters to generate the frequencies for multiplexing each of the side—by—side channels and, hence, is more susceptible to frequency error.StandardsBecause of the wide variety of data communications and computer equipment available, industrial standards have been established to provide operating compatibility. These standards have evolved as a result of the coordination between manufacturers of communication equipment and the manufacturers of data processing equipment. Of course, it is to a manufacturer’s advantage to provide equipment that isuniversally acceptable. It is also certainly apparent that without standardization intersystem compatibility would be al—most impossible.Organizations currently involved in uniting the data communications and computer fields are the CCITT, Electronic Industries Association (EIA), American Standards Association (ASA), and IEEE.A generally accepted standard issued by the EIA, RS—232—B, defines the characteristics of binary data signals, and provides a standard inter—face for control signals between data processing terminal equipment and data communications equipment. As more and more data communications systems are developed, and additional ways are found to use them, the importance ways are found to use them, the importance of standards will become even more significant.Of the most important considerations in transmitting data over communication systems is accuracy. Data signals consist of a train of pulses arranged in some sort of code. In a typical binary system, for example, digits 1 and 0 are represented by two different pulse amplitudes. If the amplitude of a pulse changes beyond certain limits during transmission, the detector at the receiving end may produce the wrong digit, thus causing an error.It is very difficult in most transmission systems to completely avoid. This is especially true when transmission system designed for speech signals. Many of the inherent electrical characteristics of telephone circuits have an adverse effect on digital signals.Making the circuits unsatisfactory for data transmission—especially treated before they can be used to handle data at speeds above 2000 bits per second.V oice channels on the switched (dial—up) telephone network exhibit certain characteristics which tend to distort typical data signal waveforms. Since there is random selection of a particular route for the data signal with each dialed connection, transmission parameters will generally change, sometimes upsetting the effect of built—in compensationNetworks. In addition, the switched network cannot be used of for large multipleaddress data systems using time sharing. Because of these considerations, specially treated voice bandwidth circuits are made available for data use. The characteristics and costs of these point—to—point private lines are published in document called tariffs, which are merely regulatory agreements reached by the FCC, state public utilities commissions, and operating telephone companies regarding charges for particular types of telephone circuits. The main advantage of private or dedicated facilities is that transmission characteristics are fixed and remain so for all data communications operations.Correlative TechniqueCorrelative data transmission techniques, particularly the Duobinary principle, have aroused considerable interest because of the method of converting a binary signal into three equidistant levels. This correlative scheme is accomplished in such a manner that the predetermined level depends on past signal history, forming the signal so that it never goes from one level extreme to another in one bit interval.The most significant property of the Duobinary process is that it affords a two—to—one bandwidth compression relative to binary signaling, or equivalently twice the speed capability in bits per second for a fixed bandwidth. The same speed capability for a multilevel code would normally require four levels, each of which would represent two binary digits.The FutureIt is universally recognized that communication is essential at every level of organization. The United States Government utilizes vast communications network for voice as well as data transmission. Likewise, business need communications to carry on their daily operations.The communications industry has been hard at work to develop systems that will transmit data economically and reliably over both private—line and dial up telephone circuits. The most ardent trend in data transmission today is toward higher speeds over voice—grade telephone channels. New transmission and equalization techniques now being investigated will soon permit transmitting digital data over telephone channels at speeds of 4800 bits per second or higher.To summarize: The major demand placed on telecommunications systems is for more information-carrying capacity because the volume of information produced increases rapidly. In addition, we have to use digital technology for the high reliability and high quality it provides in the signal transmission. However, this technology carries a price: the need for higher information-carrying capacity.The Need for Fiber-Optic Communications Systems The major characteristic of a telecommunications system is unquestionably its information-carrying capacity, but there are many other important characteristics. For instance, for a bank network, security is probably more important than capacity. For a brokerage house, speed of transmission is the most crucial feature of a network. In general, though, capacity is priority one for most system users. And there’s the rub. We cannot increase link capacity as much as we would like. The major limit is shown by the Shannon-Hartley theorem,Where C is the information-carrying capacity(bits/sec), BW is the link bandwidth (Hz=cycles/sec), and SNR is the signal-to-noise power ratio.Formula 1.1 reveals a limit to capacity C; thus, it is often referred to as the “ Shannon limit.” The formula, which comes from information theory, is true regardless of specific technology. It was first promulgated in 1948 by Claude Shannon, a scientist who worked at Bell Laboratories. R. V. L. Hartley, who also worked at Bell Laboratories, published a fundamental paper 20 years earlier, a paper that laid important groundwork in information theory, which is why his name is associated with Shannon’s formula.The Shannon-Hartley theorem states that information-carrying capacity is proportional to channel bandwidth, the range of frequencies within which the signals can be transmitted without substantial attenuation.What limits channel bandwidth? The frequency of the signal carrier. The higher the carrier’s frequency, the greater the channel bandwidth and the higher the information-carrying capacity of the system. The rule of thumb for estimating possible order of values is this: Bandwidth is approximately 10 percent of the carrier-signal frequency. Hence, if a microwave channel uses a 10-GHz carrier signal.Then its bandwidth is about 100 MHz.A copper wire can carry a signal up to 1 MHz over a short distance. A coaxial cable can propagate a signal up to 100 MHz. Radio frequencies are in the range of 500 KHz to 100 MHz. Microwaves, including satellite channels, operate up to 100 GHz. Fiber-optic communications systems use light as the signal carrier; light frequency is between 100 and 1000 THz; therefore, one can expect much more capacity from optical systems. Using the rule of thumb mentioned above, we can estimate the bandwidth of a single fiber-optic communication link as 50 THz.To illustrate this point, consider these transmission media in terms of their capacity to carry, simultaneously, a specific number of one-way voice channels. Keep in mind that the following precise value. A single coaxial cable can carry up to 13,000 channels, a microwave terrestrial link up to 20,000 channels, and a satellite link up to 100,000 channels. However, one fiber-optic communications link, such as the transatlantic cable TAT-13, can carry 300,000 two-way voice channels simultaneously. That’s impressive and explains why fiber-optic communications systems form the backbone of modern telecommunications and will most certainly shape its future.To summarize: The information-carrying capacity of a telecommunications system is proportional to its bandwidth, which in turn is proportional to the frequency of the carrier. Fiber-optic communications systems use light-a carrier with the highest frequency among all the practical signals. This is why fiber-optic communications systems have the highest information-carrying capacity and this is what makes these systems the linchpin of modern telecommunications.To put into perspective just how important a role fiber-optic communications will be playing in information delivery in the years ahead, consider the following statement from a leading telecommunications provider: “ The explosive growth of Internet traffic, deregulation and the increasing demand of users are putting pressure on our customers to increase the capacity of their network. Only optical networks can deliver the required capacity, and bandwidth-on-demand is now synonymous with wavelength-on-demand.” Th is statement is true not only for a specific telecommunications company. With a word change here and there perhaps, but withthe same exact meaning, you will find telecommunications companies throughout the world voicing the same refrain.A modern fiber-optic communications system consists of many components whose functions and technological implementations vary. This is overall topic of this book. In this section we introduce the main idea underlying a fiber-optic communications system.Basic Block DiagramA fiber-optic communications system is a particular type of telecommunications system. The features of a fiber-optic communications system can be seen in Figure 1.4, which displays its basic block diagram.Information to be conveyed enters an electronic transmitter, where it is prepared for transmission very much in the conventional manner-that is, it is converted into electrical form, modulated, and multiplexed. The signal then moves to the optical transmitter, where it is converted into optical detector converts the light back into an electrical signal, which is processed by the electronic receiver to extract the information and present it in a usable form (audio, video, or data output).Let’s take a simple example that involves Figures 1.1, 1.3, and 1.4 Suppose we need to transmit a voice signal. The acoustic signal (the information) is converted into electrical form by a microphone and the analog signal is converted into binary formby the PCM circuitry. This electrical digital signal modulates a light source and the latter transmits the signal as a series of light pulses over optical fiber. If we were able to look into an optical fiber, we would see light vary between off and on in accordance with the binary number to be transmitted. The optical detector converts the optical signal it receives into a set of electrical pulses that are processed by an electronic receiver. Finally, a speaker converts the analog electrical signal into acoustic waves and we can hear sound-delivered information.Figure 1.4 shows that this telecommunications system includes electronic components and optical devices. The electronic components deal with information in its original and electrical forms. The optical devices prepare and transmit the light signal. The optical devices constitute a fiber-optic communications system.TransmitterThe heart of the transmitter is a light source. The major function of a light source is to convert an information signal from its electrical form into light. Today’sfiber-optic communications systems use, as a light source, either light-emitting diodes (LEDs) or laser diodes (LDs). Both are miniature semiconductor devices that effectively convert electrical signals are usually fabricated in one integrated package. In Figure 1.4, this package is denoted as an optical transmitter. Figure 1.5 displays the physical make-up of an LED, an LD, and integrated packages.Optical fiberThe transmission medium in fiber-optic communications systems is an optical fiber. The optical fiber is the transparent flexible filament that guides light from a transmitter to a receiver. An optical information signal entered at the transmitter end of a fiber-optic communications system is delivered to the receiver end by the optical fiber. So, as with any communication link, the optical fiber provides the connection between a transmitter and a receiver and, very much the way copper wire and coaxial cable conduct an electrical signal, optical fiber “ conducts” light.The optical fiber is generally made from a type of glass called silica or, less commonly nowadays, from plastic. It is about a human hair in thickness. To protect very fragile optical fiber from hostile environments and mechanical damage, it is usually enclosed in a specific structure. Bare optical fiber, shielded by its protective coating, is encapsulated use in a host of applications, many of which will be covered in subsequent chaptersReceiver The key component of an optical receiver is its photodetector. The major function of a photodetector is to convert an optical information signal back into an electrical signal (photocurrent). The photodetector in today's fiver-optic communications systems is a semiconductor photodiode (PD). This miniature device is usually fabricated together with its electrical circyitry to form an integrated package that provides power-supply connections and signal amplification. Such an integrated package is shown in Figure 1.4 as an optical receiver. Figure 1.7 shows samples of a photodiode and an integrated package.The basic diagram shown in Figure 1.4 gives us the first idea of what a fiber-optic communications system is and how it works. All the components of this point-to-point system are discussed in detail in this book. Particular attention is given to the study of networks based on fiber-optic communications systems.The role of Fiber-Optic Communications Technology has not only already changed the landscape of telecommunications but it is still doing so and at a mind-boggling pace. In fact, because of the telecommunications industry's insatiable appetite for capacity, in recent years the bandwidth of commercial systems has increased more than a hundredfold. The potential information-carrying capacity of a single fiber-optic channel is estimated at 50 terabits a second (Tbit/s) but, from apractical standpoint, commercial links have transmitted far fewer than 100 Gbps, an astoundingamount of data in itself that cannot be achieved with any other transmission medium. Researchers and engineers are working feverishly to develop new techniques that approach the potential capacity limit.Two recent major technological advances--wavelength-division multiplexing (WDM) anderbium-doped optical-fiber amplifiers (EDFA)--have boosted the capacity of existing system sand have brought about dramatic improvements in the capacity of systems now in development. In fact,' WDM is fast becoming the technology of choice in achieving smooth, manageable capacity expansion.The point to bear in mind is this: Telecommunications is growing at a furious pace, and fiber-optic communications is one of its most dynamically moving sectors. While this book refleets the current situation in fiber-optic communications technology, to keep yourself updated, you have to follow the latest news in this field by reading the industry's trade journals, attending technical conferences and expositions, and finding the time to evaluate the reams of literature that cross your desk every day from companies in the field.光纤通信系统一般的通信系统由下列部分组成:(1) 信息源。

水生通讯与网络的研究进展英语原版及翻译

水生通讯与网络的研究进展英语原版及翻译

Recent Advances in Underwater Acoustic Communications & Networking水声通信与网络研究进展Abstract– The past three decades have seen a growing interest in underwater acousticcommunications. Continued research over the years has resulted in improved performance androbustness as compared to the initial communication systems. Research has expanded frompoint-to-point communications to include underwater networks as well. A series of review papers provide an excellent history of the development of the field until the end of the last decade. In this paper, we aim to provide an overview of the key developments, both theoretical and applied, in the field in thepast two decades. We also hope to provide an insight into some of the open problems and challenges facingresearchers in this field in the near future.抽象过去三十年来,在水声通信的兴趣与日俱增。

5G无线通信网络中英文对照外文翻译文献

5G无线通信网络中英文对照外文翻译文献

5G无线通信网络中英文对照外文翻译文献(文档含英文原文和中文翻译)翻译:5G无线通信网络的蜂窝结构和关键技术摘要第四代无线通信系统已经或者即将在许多国家部署。

然而,随着无线移动设备和服务的激增,仍然有一些挑战尤其是4G所不能容纳的,例如像频谱危机和高能量消耗。

无线系统设计师们面临着满足新型无线应用对高数据速率和机动性要求的持续性增长的需求,因此他们已经开始研究被期望于2020年后就能部署的第五代无线系统。

在这篇文章里面,我们提出一个有内门和外门情景之分的潜在的蜂窝结构,并且讨论了多种可行性关于5G无线通信系统的技术,比如大量的MIMO技术,节能通信,认知的广播网络和可见光通信。

面临潜在技术的未知挑战也被讨论了。

介绍信息通信技术(ICT)创新合理的使用对世界经济的提高变得越来越重要。

无线通信网络在全球ICT战略中也许是最挑剔的元素,并且支撑着很多其他的行业,它是世界上成长最快最有活力的行业之一。

欧洲移动天文台(EMO)报道2010年移动通信业总计税收1740亿欧元,从而超过了航空航天业和制药业。

无线技术的发展大大提高了人们在商业运作和社交功能方面通信和生活的能力无线移动通信的显著成就表现在技术创新的快速步伐。

从1991年二代移动通信系统(2G)的初次登场到2001年三代系统(3G)的首次起飞,无线移动网络已经实现了从一个纯粹的技术系统到一个能承载大量多媒体内容网络的转变。

4G无线系统被设计出来用来满足IMT-A技术使用IP面向所有服务的需求。

在4G系统中,先进的无线接口被用于正交频分复用技术(OFDM),多输入多输出系统(MIMO)和链路自适应技术。

4G无线网络可支持数据速率可达1Gb/s的低流度,比如流动局域无线访问,还有速率高达100M/s的高流速,例如像移动访问。

LTE系统和它的延伸系统LTE-A,作为实用的4G系统已经在全球于最近期或不久的将来部署。

然而,每年仍然有戏剧性增长数量的用户支持移动宽频带系统。

通信类英文文献及翻译

通信类英文文献及翻译

姓名:峻霖班级:通信143班学号:2014101108附录一、英文原文:Detecting Anomaly Traffic using Flow Data in thereal VoIP networkI. INTRODUCTIONRecently, many SIP[3]/RTP[4]-based VoIP applications and services have appeared and their penetration ratio is gradually increasing due to the free or cheap call charge and the easy subscription method. Thus, some of the subscribers to the PSTN service tend to change their home telephone services to VoIP products. For example, companies in Korea such as LG Dacom, Samsung Net- works, and KT have begun to deploy SIP/RTP-based VoIP services. It is reported that more than five million users have subscribed the commercial VoIP services and 50% of all the users are joined in 2009 in Korea [1]. According to IDC, it is expected that the number of VoIP users in US will increase to 27 millions in 2009 [2]. Hence, as the VoIP service becomes popular, it is not surprising that a lot of VoIP anomaly traffic has been already known [5]. So, Most commercial service such as VoIP services should provide essential security functions regarding privacy, authentication, integrity andnon-repudiation for preventing malicious traffic. Particu- larly, most of current SIP/RTP-based VoIP services supply the minimal security function related with authentication. Though secure transport-layer protocols such as Transport Layer Security (TLS) [6] or Secure RTP (SRTP) [7] have been standardized, they have not been fully implemented and deployed in current VoIP applications because of the overheads of implementation and performance. Thus, un-encrypted VoIP packets could be easily sniffed and forged, especially in wireless LANs. In spite of authentication,the authentication keys such as MD5 in the SIP header could be maliciously exploited, because SIP is a text-based protocol and unencrypted SIP packets are easily decoded. Therefore, VoIP services are very vulnerable to attacks exploiting SIP and RTP. We aim at proposing a VoIP anomaly traffic detection method using the flow-based traffic measurement archi-tecture. We consider three representative VoIP anomalies called CANCEL, BYE Denial of Service (DoS) and RTP flooding attacks in this paper, because we found that malicious users in wireless LAN could easily perform these attacks in the real VoIP network. For monitoring VoIP packets, we employ the IETF IP Flow Information eXport (IPFIX) [9] standard that is based on NetFlow v9. This traffic measurement method provides a flexible and extensible template structure for various protocols, which is useful for observing SIP/RTP flows [10]. In order to capture and export VoIP packets into IPFIX flows, we define two additional IPFIX templates for SIP and RTP flows. Furthermore, weadd four IPFIX fields to observe 802.11 packets which are necessary to detect VoIP source spoofing attacks in WLANs.II. RELATED WORK[8] proposed a flooding detection method by the Hellinger Distance (HD) concept. In [8], they have pre- sented INVITE, SYN and RTP flooding detection meth-ods. The HD is the difference value between a training data set and a testing data set. The training data set collected traffic over n sampling period of duration Δ t.The testing data set collected traffic next the training data set in the same period. If the HD is close to ‘1’, this testing data set is regarded as anomaly traffic. For using this method, they assumed that initial training data set did not have any anomaly traffic. Since this method was based on packet counts, it might not easily extended to detect other anomaly traffic except flooding. On the other hand, [11] has proposed a VoIP anomaly traffic detection method using Extended Finite State Machine (EFSM). [11] has suggested INVITE flooding, BYE DoS anomaly traffic and media spamming detection methods. However, the state machine required more memory because it had to maintain each flow. [13] has presented NetFlow-based VoIP anomaly detection methods for INVITE, REGIS-TER, RTP flooding, and REGISTER/INVITE scan. How-ever, the VoIP DoS attacks considered in this paper were not considered. In [14], an IDS approach to detect SIP anomalies was developed, but only simulation results are presented. For monitoring VoIP traffic, SIPFIX [10] has been proposed as an IPFIX extension. The key ideas of the SIPFIX are application-layer inspection andSDP analysis for carrying media session information. Yet, this paper presents only the possibility of applying SIPFIX to DoS anomaly traffic detection and prevention. We described the preliminary idea of detecting VoIP anomaly traffic in [15]. This paper elaborates BYE DoS anomaly traffic and RTP flooding anomaly traffic detec-tion method based on IPFIX. Based on [15], we have considered SIP and RTP anomaly traffic generated in wireless LAN. In this case, it is possible to generate the similiar anomaly traffic with normal VoIP traffic, because attackers can easily extract normal user information from unencrypted VoIP packets. In this paper, we have extended the idea with additional SIP detection methods using information of wireless LAN packets. Furthermore, we have shown the real experiment results at the commercial VoIP network.III. THE VOIP ANOMALY TRAFFIC DETECTION METHODA. CANCEL DoS Anomaly Traffic DetectionAs the SIP INVITE message is not usually encrypted, attackers could extract fields necessary to reproduce the forged SIP CANCEL message by sniffing SIP INVITE packets, especially in wireless LANs. Thus, we cannot tell the difference between the normal SIP CANCEL message and the replicated one, because the faked CANCEL packet includes the normal fields inferred from the SIP INVITE message. The attacker will perform the SIP CANCEL DoS attack at the same wireless LAN, because the purpose of the SIP CANCEL attack is to prevent the normal call estab-lishment when a victim is waiting for calls. Therefore, as soonas the attacker catches a call invitation message for a victim, it will send a SIP CANCEL message, which makes the call establishment failed. We have generated faked SIP CANCEL message using sniffed a SIP INVITE message.Fields in SIP header of this CANCEL message is the same as normal SIP CANCEL message, because the attacker can obtain the SIP header field from unencrypted normal SIP message in wireless LAN environment. Therefore it is impossible to detect the CANCEL DoS anomaly traffic using SIP headers, we use the different values of the wireless LAN frame. That is, the sequence number in the 802.11 frame will tell the difference between a victim host and an attacker. We look into source MAC address and sequence number in the 802.11 MAC frame including a SIP CANCEL message as shown in Algorithm 1. We compare the source MAC address of SIP CANCEL packets with that of the previously saved SIP INVITE flow. If the source MAC address of a SIP CANCEL flow is changed, it will be highly probable that the CANCEL packet is generated by a unknown user. However, the source MAC address could be spoofed. Regarding 802.11 source spoofing detection, we employ the method in [12] that uses sequence numbers of 802.11 frames. We calculate the gap between n-th and (n-1)-th 802.11 frames. As the sequence number field in a 802.11 MAC header uses 12 bits, it varies from 0 to 4095. When we find that the sequence number gap between a single SIP flow is greater than the threshold value of N that will be set from the experiments, we determine that the SIP host address as been spoofed for the anomaly traffic.B. BYE DoS Anomaly Traffic DetectionIn commercial VoIP applications, SIP BYE messages use the same authentication field is included in the SIP IN-VITE message for security and accounting purposes. How-ever, attackers can reproduce BYE DoS packets through sniffing normal SIP INVITE packets in wireless LANs.The faked SIP BYE message is same with the normal SIP BYE. Therefore, it is difficult to detect the BYE DoS anomaly traffic using only SIP header information.After sniffing SIP INVITE message, the attacker at the same or different subnets could terminate the normal in- progress call, because it could succeed in generating a BYE message to the SIP proxy server. In the SIP BYE attack, it is difficult to distinguish from the normal call termination procedure. That is, we apply the timestamp of RTP traffic for detecting the SIP BYE attack. Generally, after normal call termination, the bi-directional RTP flow is terminated in a bref space of time. However, if the call termination procedure is anomaly, we can observe that a directional RTP media flow is still ongoing, whereas an attacked directional RTP flow is broken. Therefore, in order to detect the SIP BYE attack, we decide that we watch a directional RTP flow for a long time threshold of N sec after SIP BYE message. The threshold of N is also set from the experiments.Algorithm 2 explains the procedure to detect BYE DoS anomal traffic using captured timestamp of the RTP packet. We maintain SIP session information between clients with INVITE and OK messages including the same Call-ID and 4-tuple (source/destination IP Address and port number) of the BYEpacket. We set a time threshold value by adding Nsec to the timestamp value of the BYE message. The reason why we use the captured timestamp is that a few RTP packets are observed under 0.5 second. If RTP traffic is observed after the time threshold, this will be considered as a BYE DoS attack, because the VoIP session will be terminated with normal BYE messages. C. RTP Anomaly Traffic Detection Algorithm 3 describes an RTP flooding detection method that uses SSRC and sequence numbers of the RTP header. During a single RTP session, typically, the same SSRC value is maintained. If SSRC is changed, it is highly probable that anomaly has occurred. In addition, if there is a big sequence number gap between RTP packets, we determine that anomaly RTP traffic has happened. As inspecting every sequence number for a packet is difficult, we calculate the sequence number gap using the first, last, maximum and minimum sequence numbers. In the RTP header, the sequence number field uses 16 bits from 0 to 65535. When we observe a wide sequence number gap in our algorithm, we consider it as an RTP flooding attack.IV. PERFORMANCE EVALUATIONA. Experiment EnvironmentIn order to detect VoIP anomaly traffic, we established an experimental environment as figure 1. In this envi-ronment, we employed two VoIP phones with wireless LANs, one attacker, a wireless access router and an IPFIX flow collector. For the realistic performance evaluation, we directly used one of the working VoIP networks deployed in Korea where an 11-digit telephone number (070-XXXX-XXXX) has been assigned to a SIP phone.With wireless SIP phones supporting 802.11, we could make calls to/from the PSTN or cellular phones. In the wireless access router, we used two wireless LAN cards- one is to support the AP service, and the other is to monitor 802.11 packets. Moreover, in order to observe VoIP packets in the wireless access router, we modified nProbe [16], that is an open IPFIX flow generator, to create and export IPFIX flows related with SIP, RTP, and 802.11 information. As the IPFIX collector, we have modified libipfix so that it could provide the IPFIX flow decoding function for SIP, RTP, and 802.11 templates. We used MySQL for the flow DB.B. Experimental ResultsIn order to evaluate our proposed algorithms, we gen-erated 1,946 VoIP calls with two commercial SIP phones and a VoIP anomaly traffic generator. Table I shows our experimental results with precision, recall, and F-score that is the harmonic mean of precision and recall. In CANCEL DoS anomaly traffic detection, our algorithm represented a few false negative cases, which was related with the gap threshold of the sequence number in 802.11 MAC header. The average of the F-score value for detecting the SIP CANCEL anomaly is 97.69%.For BYE anomaly tests, we generated 755 BYE mes-sages including 118 BYE DoS anomalies in the exper-iment. The proposed BYE DoS anomaly traffic detec-tion algorithm found 112 anomalies with the F-score of 96.13%. If an RTP flow is terminated before the threshold, we regard the anomaly flow as a normal one. In this algorithm, we extract RTP session information from INVITE and OK or session description messages using the same Call-ID of BYE message. It is possible not to capture those packet, resulting in a few false-negative cases. The RTP flooding anomaly traffic detection experiment for 810 RTP sessions resulted in the F score of 98%.The reason of false-positive cases was related with the sequence number in RTP header. If the sequence number of anomaly traffic is overlapped with the range of the normal traffic, our algorithm will consider it as normal traffic.V. CONCLUSIONSWe have proposed a flow-based anomaly traffic detec-tion method against SIP and RTP-based anomaly traffic in this paper. We presented VoIP anomaly traffic detection methods with flow data on the wireless access router. We used the IETF IPFIX standard to monitor SIP/RTP flows passing through wireless access routers, because its template architecture is easily extensible to several protocols. For this purpose, we defined two new IPFIX templates for SIP and RTP traffic and four new IPFIX fields for 802.11 traffic. Using these IPFIX flow templates,we proposed CANCEL/BYE DoS and RTP flooding traffic detection algorithms. From experimental results on the working VoIP network in Korea, we showed that our method is able to detect three representative VoIP attacks on SIP phones. In CANCEL/BYE DoS anomaly trafficdetection method, we employed threshold values about time and sequence number gap for classfication of normal and abnormal VoIP packets. This paper has not been mentioned the test result about suitable threshold values. For the future work, we will show the experimental result about evaluation of the threshold values for our detection method.二、英文翻译:交通流数据检测异常在真实的世界中使用的VoIP网络一 .介绍最近,多SIP[3],[4]基于服务器的VoIP应用和服务出现了,并逐渐增加他们的穿透比及由于自由和廉价的通话费且极易订阅的法。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

附录一、英文原文:Detecting Anomaly Traf?c using Flow Data in the realVoIP networkI. INTRODUCTIONRecently, many SIP[3]/RTP[4]-based VoIP applications and services haveappeared and their penetration ratio is gradually increasing due to the freeor cheap call charge and the easy subscription method. Thus, some of the subscribers to the PSTN service tend to change their home telephone servicesto VoIP products. For example, companies in Korea such as LGDacom, SamsungNet- works, and KT have begun to deploy SIP/RTP-based VoIP services. It is reportedthat more than ?ve million users have subscribed the commercial VoIP servicesand 50% of all the users are joined in 2009 in Korea [1]. According to IDC, itis expected that the number of VoIP users in US will increase to 27 millionsin 2009 [2]. Hence, as the VoIP service becomes popular, it is not surprisingthat a lot of VoIP anomaly traf ?c has been already known [5]. So, Most commercial service such as VoIP services should provide essential security functions regarding privacy, authentication, integrity and non-repudiation for preventing malicious traf ?c. Particu- larly, most of current SIP/RTP-based VoIP servicessupply the minimal security function related with authentication. Though secure transport-layer protocols such as Transport Layer Security (TLS) [6] or Secure RTP(SRTP) [7] have been standardized, they have not been fully implemented anddeployed in current VoIP applications because of the overheads of implementation and performance. Thus, un-encrypted VoIP packets could be easily sniffed andforged, especially in wireless LANs. In spite of authentication,the authentication keys such as MD5in the SIP header could be maliciously exploited, because SIP is a text-based protocol and unencrypted SIP packets are easilydecoded. Therefore, VoIP services are very vulnerable to attacks exploiting SIP and RTP. We aim at proposing a VoIP anomaly traf ?c detection method using the?ow-based traf ?c measurement archi-tecture. We consider three representativeVoIP anomalies called CANCEL,BYEDenial of Service (DoS) and RTP?ooding attacks in this paper, because we found that malicious users in wireless LANcould easily perform these attacks in the real VoIP network. For monitoring VoIP packets,we employ the IETF IP Flow Information eXport (IPFIX) [9] standard that is based on NetFlow v9. This traf ?c measurement method provides a ?exible and extensible template structure for various protocols, which is useful for observing SIP/RTP ?ows [10]. In order to capture and export VoIP packets into IPFIX ?ows, we de?ne two additional IPFIX templates for SIP and RTP ?ows. Furthermore, we add four IPFIX ?elds to observe packets which are necessary to detect VoIP source spoo?ng attacks in WLANs.II. RELATED WORK[8] proposed a ?ooding detection method by the Hellinger Distance (HD) concept. In [8], they have pre- sented INVITE, SYN and RTP?ooding detection meth-ods.The HD is the difference value between a training data set and a testing dataset. The training data set collected traf?c over n sampling period of duration testing data set collected traf?c next the training data set in the sameperiod. If the HD is close to ‘1’, this testing data set is regarded as anomaly traf ?c. For using this method, they assumed that initial training data set didnot have any anomaly traf ?c. Since this method was based on packet counts, itmight not easily extended to detect other anomaly traf ?c except ?ooding. On the other hand, [11] has proposed a VoIP anomaly traf ?c detection method using Extended Finite State Machine (EFSM). [11] has suggested INVITE ?ooding, BYEDoS anomaly traf ?c and media spamming detection methods. However, the statemachine required more memory because it had to maintain each ?ow. [13] has presented NetFlow-based VoIP anomaly detection methods for INVITE, REGIS-TER,RTP?ooding, and REGISTER/INVITEscan. How-ever, the VoIP DoSattacks consideredin this paper were not considered. In [14], an IDS approach to detect SIPanomalies was developed, but only simulation results are presented. For monitoring VoIP traf ?c, SIPFIX [10] has been proposed as an IPFIX extension.The key ideas of the SIPFIX are application-layer inspection and SDP analysisfor carrying media session information. Yet, this paper presents only the possibility of applying SIPFIX to DoS anomaly traf ?c detection and prevention. Wedescribed the preliminary idea of detecting VoIP anomaly traf ?c in [15]. This paper elaborates BYEDoSanomaly traf ?c and RTP?ooding anomaly traf ?c detec-tion method based on IPFIX. Based on [15], we have considered SIP and RTP anomalytraf ?c generated in wireless LAN. In this case, it is possible to generate thesimiliar anomaly traf ?c with normal VoIP traf ?c, because attackers can easilyextract normal user information from unencrypted VoIP packets. In this paper,we have extended the idea with additional SIP detection methods using informationof wireless LAN packets. Furthermore, we have shown the real experiment resultsat the commercial VoIP network.III. THE VOIP ANOMALY TRAFFIC DETECTION METHOD A. CANCEL DoS Anomaly Traf ?c DetectionAs the SIP INVITE message is not usually encrypted, attackers could extract ?elds necessary to reproduce the forged SIP CANCELmessage by snif ?ng SIP INVITE packets, especially in wireless LANs. Thus, wecannot tell the difference between the normal SIP CANCEL message and the replicated one, because the faked CANCEL packet includes the normal ?elds inferred from the SIP INVITE message. Theattacker will perform the SIP CANCELDoS attack at the samewireless LAN, because the purpose of the SIP CANCELattack is to prevent the normal call estab-lishment when a victim is waiting for calls. Therefore, as soon as the attacker catchesa call invitation message for a victim, it will send a SIP CANCELmessage, which makes the call establishment failed. Wehave generated faked SIP CANCELmessage using sniffed a SIP INVITE in SIP header of this CANCEL message is the sameas normal SIP CANCEL message, because the attacker can obtain the SIP header?eld from unencrypted normal SIP message in wireless LANenvironment. Therefore it is impossible to detect the CANCEL DoS anomaly traf ?c using SIP headers, we use the different values of the wireless LANframe. That is, the sequence number in the frame will tell the difference between a victim host and an attacker.Welook into source MACaddress and sequence number in the MAC frame including a SIP CANCEL messageas shown in Algorithm 1. We compare the source MAC address of SIP CANCEL packets with that of the previously saved SIP INVITE ?ow. If the source MAC address of a SIP CANCEL ?ow is changed, it will be highly probablethat the CANCEL packet is generated by a unknown user. However, the source MAC address could be spoofed. Regarding source spoo ?ng detection, we employ the method in [12] that uses sequence numbers of frames. We calculate the gapbetween n-th and (n-1)-th frames. As the sequence number ?eld in a MAC header uses 12 bits, it varies from 0 to 4095. When we ?nd that the sequence number gap between a single SIP ?ow is greater than the threshold value of N that willbe set from the experiments, we determine that the SIP host address as beenspoofed for the anomaly traf ?c.B. BYE DoS Anomaly Traf ?c DetectionIn commercial VoIP applications, SIP BYE messages use the same authentication ?eld is included in the SIP IN-VITE message for security andaccounting purposes. How-ever, attackers can reproduce BYEDoS packets through snif ?ng normal SIP INVITE packets in wireless faked SIP BYE message is samewith the normal SIP BYE. Therefore, it is dif ?cult to detect the BYEDoS anomaly traf ?c using only SIP header snif ?ng SIP INVITE message, the attacker at the same or different subnets could terminate the normal in- progress call, because it could succeed in generating a BYE message to the SIP proxy server. In theSIP BYE attack, it is dif ?cult to distinguish from the normal call termination procedure. That is, we apply the timestamp of RTP traf ?c for detecting the SIP BYE attack. Generally, after normal call termination, the bi-directional RTP?ow is terminated in a bref space of time. However, if the call terminationprocedure is anomaly, we can observe that a directional RTP media ?ow is still ongoing, whereas an attacked directional RTP?ow is broken. Therefore, in order to detect the SIP BYE attack, we decide that we watch a directional RTP ?ow for a long time threshold of N sec after SIP BYEmessage. The threshold of N is also set from the 2 explains the procedure to detect BYE DoS anomal traf ?c using captured timestamp of the RTPpacket. Wemaintain SIP session information between clients with INVITE and OK messages including the same Call-ID and 4-tuple(source/destination IP Address and port number) of the BYEpacket. Weset a time threshold value by adding Nsec to the timestamp value of the BYE message. Thereason why we use the captured timestamp is that a few RTP packets are observed under second. If RTP traf ?c is observed after the time threshold, this willbe considered as a BYE DoS attack, because the VoIP session will be terminatedwith normal BYEmessages. C. RTPAnomaly Traf ?c Detection Algorithm 3 describes an RTP ?ooding detection method that uses SSRC and sequence numbers of the RTP header. During a single RTPsession, typically, the sameSSRCvalue is maintained. If SSRCis changed, it is highly probable that anomaly has occurred. In addition,if there is a big sequence number gap between RTP packets, we determine thatanomaly RTPtraf ?c has happened. As inspecting every sequence number for a packet is dif ?cult, we calculate the sequence number gap using the ?rst, last, maximum and minimum sequence numbers. In the RTP header, the sequence number ?eld uses 16 bits from 0 to 65535. When we observe a wide sequence number gap in our algorithm, we consider it as an RTP ?ooding attack.IV. PERFORMANCE EVALUATIONA. Experiment EnvironmentIn order to detect VoIP anomaly traf ?c, we established an experimental environment as ?gure 1. In this envi-ronment, we employed two VoIP phones with wireless LANs, one attacker, a wireless access router and an IPFIX ?ow collector.For the realistic performance evaluation, we directly used one of the workingVoIP networks deployed in Korea where an 11-digit telephone number (070-XXXX-XXXX) has been assigned to a SIP wireless SIP phones supporting ,we could make calls to/from the PSTNor cellular phones. In the wireless access router, we used two wireless LAN cards- one is to support the AP service, andthe other is to monitor packets. Moreover, in order to observe VoIP packetsin the wireless access router, we modi ?ed nProbe [16], that is an open IPFIX?ow generator, to create and export IPFIX ?ows related with SIP, RTP, and information. As the IPFIX collector, we have modi ?ed libip ?x so that it could provide the IPFIX ?ow decoding function for SIP, RTP, and templates. We used MySQL for the ?ow DB.B. Experimental ResultsIn order to evaluate our proposed algorithms, we gen-erated 1,946 VoIP callswith two commercial SIP phones and a VoIP anomaly traf ?c generator. Table I showsour experimental results with precision, recall, and F-score that is the harmonic mean of precision and recall. In CANCEL DoS anomaly traf ?c detection, our algorithm represented a few false negative cases, which was related with thegap threshold of the sequence number in MAC header. The average of the F-score value for detecting the SIP CANCEL anomaly is %.For BYE anomaly tests, wegenerated 755 BYEmes-sages including 118 BYEDoSanomalies in the exper-iment. The proposed BYE DoS anomaly traf ?c detec-tion algorithm found 112 anomalieswith the F-score of %. If an RTP?ow is terminated before the threshold, we regard the anomaly ?ow as a normal one. In this algorithm, we extract RTP sessioninformation from INVITE and OK or session description messages using the sameCall-ID of BYE message. It is possible not to capture those packet, resultingin a few false-negative cases. The RTP ?ooding anomaly traf ?c detection experiment for 810 RTP sessions resulted in the F score of 98%.The reason offalse-positive cases was related with the sequence number in RTP header. If the sequence number of anomaly traf ?c is overlapped with the range of the normaltraf ?c, our algorithm will consider it as normal traf ?c.V. CONCLUSIONSWe have proposed a ?ow-based anomaly traf ?c detec-tion method against SIP and RTP-based anomaly traf ?c in this paper. We presented VoIP anomaly traf ?c detection methods with ?ow data on the wireless access router. Weused the IETF IPFIX standard to monitor SIP/RTP ?ows passing through wireless access routers, because its template architecture is easily extensible to several protocols.For this purpose, we de ?ned two new IPFIX templates for SIP and RTP traf ?c and four new IPFIX ?elds for traf ?c. Using these IPFIX ?ow templates,we proposed CANCEL/BYE DoS and RTP?ooding traf ?c detection algorithms. From experimental results on the working VoIP network in Korea, we showed that our method is able to detect three representative VoIP attacks on SIP phones. In CANCEL/BYE DoS anomaly traf ?cdetection method, we employed threshold values about time and sequence numbergap for class ?cation of normal and abnormal VoIP packets. This paper has notbeen mentioned the test result about suitable threshold values. For the futurework, we will show the experimental result about evaluation of thethreshold values for our detection method.二、英文翻译:交通流数据检测异常在真实的世界中使用的VoIP 网络一.介绍最近 , 许多 SIP[3],[4]基于服务器的VoIP应用和服务出现了,并逐渐增加他们的穿透比及由于自由和廉价的通话费且极易订阅的方法。

相关文档
最新文档