期刊问答网 论文发表 期刊发表 期刊问答

无线通信网络论文范文英文

  • 回答数

    3

  • 浏览数

    169

糊涂虫1989
首页 > 期刊问答网 > 期刊问答 > 无线通信网络论文范文英文

3个回答 默认排序1
  • 默认排序
  • 按时间排序

蔡世楠

已采纳
先给你翻译一部分,你认为可以就继续: 摘要Abstract: 随着计算机网络技术的日趋成熟,计算机的网络化应用已成为计算机发展的必然趋势。网络技术向高速,宽带方向发展已成为网络发展的必然趋势。 With the computer network technology more and more maturing, computer networking applications have become an inevitable trend in the development of the computer, 网络技术向高速,宽带方向发展已成为网络发展的必然趋势。 as has the network technology toward the development of high speed and broadband 计算机网络通讯技术从20世纪60年代诞生至今,得到了极大的发展,尤其是进入20世纪90年代以来得到了飞速的发展。 From the birth in 1960s, especially in 1990s, the computer network communication technology has been greatly and rapidly 众所周知,计算机网络通讯技术正在以人们意想不到的速度迅速发展着,网络通讯技术日新月异,Internet也逐渐渗透到人们生活和工作的每一个角落。 As is known to all, the computer network communication technology has developed in an unexpected rapid speed with each passing day, and the Internet also permeates gradually into people's lives and work in every

无线通信网络论文范文英文

139 评论(10)

笑我太深情

近几年来,移动Ad-hoc网络作为新兴的无线通信网络,逐渐吸引了业界的注意力,成为研究的热点。Ad Hoc网络可以在没有基础设施支持的情况下灵活方便的通信,这种技术拓宽了移动通信的领域,具有光明的前景。Ad Hoc网络最初应用于军事领域,随着无线网络的发展,Ad Hoc网在民用领域也开始得到发展。移动Ad-hoc网络不需要任何无线基础设施的支持,节点开机就可以快速自动组网,节点可以任意移动,随时加入或离开网络。Ad Hoc网还具有组网速度快、抗毁自愈能力强等优点,在军事和民用领域得到越来越广泛的应用。 由于移动Ad hoc网络采用无线信道,节点的自由性,网络的结构等各方面的技术特点,使得Ad Hoc 网更容易被窃听,拒绝服务等攻击,使其在安全方面存在隐患。要建立安全的Ad-Hoc网络,研究其入侵检测及响应技术十分必要的,具有重要意义。 基于Ad Hoc网的特点建立一种一分组为基础的新型的网络结构。本文就分组的基本概念及分组的实现进行了阐述,并根据分组的特点,建立了基于分组的安全模型,并阐述了门限认证的基本概念,结合分组特点和门限认证技术来实现一个无线Ad hoc网络分组内进行门限认证的安全解决方案。 In recent years, mobile Ad hoc networks as emerging - wireless communication network, gradually attracting attention of industry, become the focus of Ad Hoc network infrastructure support in no circumstances is flexible and convenient communications, the technology of mobile communication area expanded, with bright Ad Hoc networks in the military field application initially, along with the development of wireless network, Ad Hoc network in civil field also began to get Mobile Ad hoc networks - do not need any wireless infrastructure support, node can be on any mobile networking, node can add or leave, Ad Hoc network also has netted speed, invulnerability self-healing capability advantages in military and civilian areas, get more and more Due to the mobile Ad hoc network using wireless channel, freedom, network structure, etc, the technical characteristics of Ad hoc network more easily to be tapped, denial of service attacks, which are hidden in the To establish a secure network Ad Hoc - its intrusion detection and response technology necessary, has the vital Based on the Ad Hoc network characteristics to establish a new one packet basis of network Based on the basic concept and the group of grouping is discussed, and according to the characteristics of the group, established the security model based on group, and expounds the basic concept, threshold certification group characteristics and threshold combining authentication technology to realize a wireless Ad hoc network group within the threshold of authentication security Keywords: Ad Hoc networks, Network security strategy, Group, Threshold authentication
210 评论(12)

王启龙

Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, such as radio waves, for the carrier and this implementation usually takes place at the physical level or "layer" of the 1 T1 Wireless PAN2 Wireless MAN3 Wireless WAN4 Mobile devices networks2 Uses3 Environmental concerns and health hazard4 See also5 References6 Further reading7 External linksTypesWireless PANWireless Personal Area Networks (WPANs) interconnect devices within a relatively small area, generally within reach of a For example, Bluetooth provides a WPAN for interconnecting a headset to a ZigBee also supports WPAN Screenshots of Wi-Fi Network connections in Microsoft W Figure 1, left, shows that not all networks are encrypted (locked unless you have the code, or key), which means anyone in range can access Figures 2 and 3, middle and right, however, show that many networks are Wi-Fi: Wi-Fi is increasingly used as a synonym for 11 WLANs, although it is technically a certification of interoperability between 11 Fixed Wireless Data: This implements point to point links between computers or networks at two locations, often using dedicated microwave or laser beams over line of sight It is often used in cities to connect networks in two or more buildings without physically wiring the buildings Wireless MANWireless Metropolitan area networks are a type of wireless network that connects several Wireless LANWiMAX is the term used to refer to wireless MANs and is covered in IEEE 16d/Wireless WANWireless Wide Area Networks are wireless networks that typically cover large outdoor These networks can be used to connect branch offices of business or as a public internet access They are usually deployed on the 4 GHz A typical system is as per the one deployed by Gaiacom Wireless Networks contains base station gateways, access points and wireless bridging Other configurations are mesh systems where each access point acts as a relay When combined with renewable energy systems such as photo-voltaic solar panels or wind systems they can be stand alone Mobile devices networksWith the development of smart phones, cellular telephone networks routinely carry data in addition to telephone conversations:Global System for Mobile Communications (GSM): The GSM network is divided into three major systems: the switching system, the base station system, and the operation and support The cell phone connects to the base system station which then connects to the operation and support station; it then connects to the switching station where the call is transferred to where it needs to GSM is the most common standard and is used for a majority of cell Personal Communications Service (PCS): PCS is a radio band that can be used by mobile phones in North America and South A Sprint happened to be the first service to set up a PCSD-AMPS: Digital Advanced Mobile Phone Service, an upgraded version of AMPS, is being phased out due to advancement in The newer GSM networks are replacing the older UsesAn embedded RouterBoard 112 with UFL-RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers (WISPs) in the Czech RWireless networks have had a significant impact on the world as far back as World War II Through the use of wireless networks, information could be sent overseas or behind enemy lines easily, efficiently and more Since then, wireless networks have continued to develop and their uses have grown Cellular phones are part of huge wireless network People use these phones daily to communicate with one Sending information overseas is possible through wireless network systems using satellites and other signals to communicate across the Emergency services such as the police department utilize wireless networks to communicate important information People and businesses use wireless networks to send and share data quickly whether it be in a small office building or across the [5]Another important use for wireless networks is as an inexpensive and rapid way to be connected to the Internet in countries and regions where the telecom infrastructure is poor or there is a lack of resources, as in most developing Compatibility issues also arise when dealing with wireless Different components not made by the same company may not work together, or might require extra work to fix these Wireless networks are typically slower than those that are directly connected through an Ethernet A wireless network is more vulnerable, because anyone can try to break into a network broadcasting a Many networks offer WEP - Wired Equivalent Privacy - security systems which have been found to be vulnerable to Though WEP does block some intruders, the security problems have caused some businesses to stick with wired networks until security can be Another type of security for wireless networks is WPA - Wi-Fi Protected A WPA provides more security to wireless networks than a WEP security set The use of firewalls will help with security breaches which can help to fix security problems in some wireless networks that are more Environmental concerns and health hazardIn recent times, there have been increased concerns about the safety of wireless communications, despite little evidence of health risks so The president of Lakehead University refused to agree to installation of a wireless network citing a California Public Utilities Commission study which said that the possible risk of tumors and other diseases due to exposure to electromagnetic fields (EMFs) needs to be further 摘自wikipedia希望有所帮助
312 评论(9)

相关问答