物联网专业英语参考答案

更新时间:2023-11-18 23:17:01 阅读量: 教育文库 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

参考答案

Unit 1

Text A Exercises

I. Answer the following questions according to the text.

1. The Internet of Things refers to uniquely identifiable objects (things) and their virtual representations in an Internet-like structure. The term Internet of Things was first used by Kevin Ashton in 1999.

2. It stands for Radio-frequency identification. It is often seen as a prerequisite for the Internet of Things.

3. Casagras is a global network infrastructure, linking physical and virtual objects through the exploitation of data capture and communication capabilities. This infrastructure includes existing and evolving Internet and network developments.

4. In the IoT, physical and virtual ?things? have identities, physical attributes, and virtual personalities.

5. The original idea of the Auto-ID Center is based on RFID-tags and unique identification through the Electronic Product Code.

6. The next generation of Internet applications which use Internet Protocol Version 6 would be able to communicate with devices attached to virtually all human-made objects because of the extremely large address space of IPv6.

7. In the future the Internet of Things may be a nondeterministic and open network in which auto-organized or intelligent entities (Web services, SOA components), virtual objects will be interoperable and able to act independently (pursuing their own objectives or shared ones) depending on the context, circumstances or environments. 8. Embedded intelligence can be more clearly defined as: leveraging the capacity to collect and analyze the digital traces left by people when interacting with widely deployed smart things to discover the knowledge about human life, environment

1

参考答案

interaction, as well as social connection/behavior.

9. In an Internet of Things, the precise geographic location of a thing — and also the precise geographic dimensions of a thing — will be critical.

10. Currently, Internet of Things frameworks seem to focus on real time data logging solutions like Pachube: offering some basis to work with many \interact. Future developments might lead to specific software development environments to create the software to work with the hardware used in the Internet of Things.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. deploy 1. v.展开,配置 2. 3. 4. 5. 6. 7. 8. 9. 10.

capability framework tag

n.索引vi.做索引 barcode identify Intranet n.体系结构 sensor

2. 3. 4. 5. 6. 7. 8. 9. 10.

n.(实际)能力,性能,容量,接受力 n.构架,框架,结构 n.标签,标识 index n.条形码 vt.识别,鉴别 n.内联网 architecture n.传感器

III. Fill in the blanks with the words given below.

1. interconnected 2. technology 3. development 4. predicting 5. communications 6. devices 7. size 8. speed 9. affordable 10. seamless

IV. Translate the following passages from English to Chinese.

Passage One

在计算中,物联网指物(如家用电器)的网络。它通常是自配置的无线网络。物联网起源于Auto-ID Center,该中心创建于1999年,以麻省理工学院(MIT)为基础。

该想法简单应用却困难。如果所有的罐头、书本、鞋子或汽车部件都装备微小的识别设备,我们的日常生活会出现变化。因为我们可以精确地知道地球另一边的消费,就不会有脱销品和废品。因为我们总是掌握产品的位置,偷窃也就不存在了。同样包裹在邮寄过程中也不会丢失。

如果生活中的全部物体,从酸奶酪到飞机,都装备无线标签,它们可以被计算机识别和管理,与人做的一样。下一代因特网应用(IPv6协议)能识别物体比当前使用的IPv4更多。这个系统能够瞬间识别任何一种物体。

2

参考答案

物体的因特网能够编码500亿到1000000亿物体并跟踪这些物体的移动。每个人周围都有1000到5000个物体。

Passage Two

物联网——这就是我们要去的地方

憧憬未来,每个“物”都可以连接到互联网。物联网将带来革命性的变换,改变我们与环境交互的方式,更重要的是改变我们的生活方式。

每个东西都连接到互联网的想法并不新鲜,但正逐步成为现实。当2008年连入互联网“物”的数量超过人的数量时,物联网就来临了。

技术空想家把物联网描绘为有数不清好处的事物。那些通过增加每个东西的联通性而获得收益的公司都支持他们。

通用的连通性、传感器和计算机可以收集、分析并按照这些数据行动,这将在健康、食品生产中取得进展。它甚至也许能减少贫困。

另一方是怀疑论者,他们警告说物联网的不断增长以及我们对它的日益依赖都具有固有的危险。

Text B Exercises

I. Answer the following questions according to the text.

1. The first large scale application of the Internet of Things technologies will be to replace the bar code in retail.

2. The retailers will have item identification unified from the producer, through the storage, the shop floor, cashier and check out, as well as theft protection.

3. For the consumers they offer the possibility of avoiding long check-out lines and having the product history available, which will improve food safety and protect consumer rights in case of failing products.

4. Today almost every phone sold is equipped with some kind of short range radio communication like Bluetooth, or more specifically near field communication (NFC) specifically designed for reading RFID tags.

5. The innovation in logistics normally does not change the industry fundamentally. It allows improving efficiency of processes or enables new value adding features.

6. Executable codes in the tags enable the thing in transit to make intelligent decisions on its routing based on information received either via readers or positioning systems. 7. Present day logistics is based on established supply chains from manufacturer to consumer.

8. Smart biodegradable dust embedded inside pills may interact with the intelligent tag on the box allowing the latter to monitor the use and abuse of medicine and inform the

3

参考答案

pharmacist when new supply is needed.

9. The public began to pay attention to food safety.

10. The recent global food crisis highlighted that the feedback mechanisms in food market do not work as well as in other commodity markets, which makes the food availability oscillate between periods of overproduction and shortage.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. fundamentally 1. 2. coexistence 2. 3. feedback 3. 4. 供应链 4. 5. intervention 5. 6. 条形码 6. 7. incompatible 7. 8. assemble 8. 9. stability 9. 10. flexibility

10.

4

adv.基础地,根本地 n.共存 n.反馈,反应 supply chain n.干涉 bar code

adj.不兼容的;不相容的;互斥的 vt.集合,聚集,装配 n.稳定性

n.弹性,适应性,机动性,柔性

参考答案

Unit 2

Text A Exercises

I. Answer the following questions according to the text.

1. The first component of the Internet is hardware and the second is the protocols. 2. Machines that store the information we seek on the Internet are servers. 3. Protocols are sets of rules that machines follow to complete tasks.

4. Two of the most important protocols are the transmission control protocol (TCP) and the Internet protocol (IP).

5. It stands for hypertext transfer protocol.

6. One machine can find another through the massive network by the IP address each device connected to the Internet has.

7. The version of IP most of us use today is IPv4, which is based on a 32-bit address system. One big problem with this system is that we're running out of addresses.

8. Packets are parts of a file that range between 1,000 and 1,500 bytes. Packets don't necessarily all take the same path -- they'll generally travel the path of least resistance. 9. Because packets can travel multiple paths to get to their destination, it's possible for information to route around congested areas on the Internet.

10. Phone calls over the Internet also convert conversations into packets using the voice over Internet protocol (VoIP).

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. packet 1. n.数据包 2. 3.

conversation fiber

2. 3.

n.会话,交谈 n.光纤

5

参考答案

4. 5. 6. 7. 8. 9. 10.

超文本传输协议 route 传输线 protocol peripheral transmit device

4. 5. 6. 7. 8. 9. 10.

hypertext transfer protocol n.路线,路程,通道v.发送 transmission line n.协议

adj.外围的n.外围设备

vt.传输,发射,传播vi.发射信号,发报 n.装置,设备

III. Fill in the blanks with the words given below.

1. remote 2. office 3. protected 4. ordering 5. meet 6. technologies 7. offer 8. relationships 9. secure 10. resources

IV. Translate the following passage from English to Chinese.

主页

对于网络用户来说,主页就是启动像网景公司的Navigator或微软公司的 Internet Explorer这样的浏览器时首先显示的那个页面。浏览器通常预先设置浏览器厂家的第一个页面作为主页。但是,你也可以设置它打开任何一个网站。例如,你可以特别设置“http://www.yahoo.com”或“http://whatis.com”为你的主页。也可以特别指定无主页(将显示一个空白页),这样可以从书签列表中选择第一个页面或者输入网址。

Text B Exercises

I. Fill in the blanks with the information given in the text.

1. a network gateway server

2. no incoming request can get directly at private network resources. 3. a network point, host nodes, gateway nodes 4. device, forwarded, any gateway

5. an asynchronous transfer mode (ATM) network, combined with a router 6. the same protocol, on a LAN

7. data arrives from one or more directions, 8. that channels incoming data

9. the layer 2 or Data-Link layer function 10. a hop

6

参考答案

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. frame 1. 2. 包交换网络

2. 3. local area network (LAN) 3. 4. desktop switch

4. 5. wide area network (WAN) 5. 6. hop

6. 7. network bridge 7. 8. subnetwork

8. 9. 环形网络 9. 10. brouter

10.

n.帧,框架,画面 packet-switched network

局域网 桌面交换 广域网

v.中继段

网桥

n.子网 ring network n.桥式路由器

7

参考答案

Unit 3

Text A Exercises

I. Answer the following questions according to the text.

1. The Internet of Things needs an open architecture to maximize interoperability among heterogeneous systems and distributed resources.

2.The IoT architecture should be designed to be resilient to disruption of the physical network and should also anticipate that many of the nodes will be mobile, may have intermittent connectivity and may use various communication protocols at different times to connect to the IoT. 3. Issues to be addressed:

·Distributed open architecture with end to end characteristics, interoperability of heterogeneous systems, neutral access, clear layering and resilience to physical network disruption.

·Decentralized autonomic architectures based on peering of nodes.

·Architectures moving intelligence at the very edge of the networks, up to users? terminals and things.

·Cloud computing technology, event-driven architectures, disconnected operations and synchronization.

·Use of market mechanisms for increased competition and participation

4. The research on nano-electronics devices will be used for implementing wireless identifiable systems with the focus on miniaturization, low cost and increased functionality.

5. Silicon IC technology will be used for systems with increased functionality and requirements for more non volatile memory used for sensing and monitoring ambient parameters.

6. Two trends emerging for wireless identifiable devices for IoT applications are:

·Increasing use of “embedded intelligence” ? ·Networking of embedded intelligence

7. For ultra low cost tags with very limited features, the information is centralized on data servers managed by service operators. Value resides in the data management.

8. For smart systems (sensing/monitoring/actuating) on tags, the information is

8

参考答案

centralized on the data tag itself. Value resides in the communication management.

9. One of the most promising micro operating systems for constrained devices is Contiki 10. One of challenges in building IoT applications lies in the lack of a common software fabric underlying how the software in the different environments can be combined to function into a composite system and how to build a coherent application out of a large collection of unrelated software modules.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. Thin Film Transistors (TFTs) 1. 薄膜晶体管 2. 3. 4. 5. 6. 7. 8. 9. 10.

distributed module

communication protocols stack

volatile memory binding adaptive 云计算技术 有源标签,主动标签

2. 3. 4. 5. 6. 7. 8. 9.

adj.分布式的 n.模块 通信协议

n.堆,一堆,堆栈v.堆叠 非永久性存储器,易失存储器 n.绑定,捆绑 adj.适应的

Cloud computing technology

10. active tag

III. Fill in the blanks with the words given below.

1. tags 2. circuits 3. reader 4. frequencies 5. electromagnetic 6. manufactured 7. passive 8. storage 9. overwritten 10. range

IV. Translate the following passage from English to Chinese.

DNS(域名服务器):DNS是域名服务器的缩写,它是一个机器,负责维护把因特网域名与数字互译的列表。DNS让你用域名替代实际的IP地址,以便更容易重新获得。

ESN(电子序列号): 蜂窝设备的唯一序列号,以便CDMA系统可以识别它,定位并接受呼叫。

MMS(彩信):与SMS类似,但除了纯文本外,MMS也可以包含多媒体元素,如图片、视频和音频。这些多媒体元素可以包含在信息中,而不是像电子邮件那样作为附件。

射频指纹识别:一个电子处理,可以通过检查每个无线手机唯一的无线电传输特征来识别它。因为非法设备不能复制合法设备的射频指纹,所以用它可以减少欺诈。

9

参考答案

VPN(虚拟专用网络):VPN利用公共通信网络实现私有数据通信。大多数VPN使用因特网作为公共基础结构,并使用多种专用协议支持通过因特网的私有通信。

Text B Exercises

I. Answer the following questions according to the text.

1. The function of identification is to map a unique identifier or UID (globally unique or unique within a particular scope), to an entity so as to make it without ambiguity identifiable and retrievable.

2. A unique identifier for an object can translate to a single permanent assigned name for the life of an object.

3. Combinations of things will create “family tree” identification schemes where parts and components that are incorporated within composite/complex products such as computers, vehicles, and buildings have many different components, each with their own unique ID and life history.

4. By assigning each thing participating in the Internet of Things a unique identity (UID) or potentially several unique identities, it is possible to refer to each thing as an individual, each having its own characteristics, life history and information trail, its own flow pattern through the real world and its own sequence of interactions with other things.

5. It is important that the Internet of Things support unique identifiers in a way that it is also possible to refer to a particular class of things as well as individual things within that class, in order to be able to retrieve or refer to class-level information and services provided for the class of things as well as serial-level information and services provided for each individual thin.

6. We recognise that many industry sectors have already begun assigning unique identifiers to objects and that significant investment has been made in information systems and collection of information about various kinds of things, using those existing unique identifiers as keys to lookup and retrieve that information.

7. Because there can be multiple addresses of information and services related to an individual thing, it is probably more helpful to ensure that each thing is given a unique name and to use lookup mechanisms and referral services to obtain addresses of information and services.

8. The traffic in the Internet of Things networks for queries about unique identifiers will

10

参考答案

be many times higher than that for DNS queries in the current Internet.

9. In the IoT security, scalability, and cross platform compatibility between diverse networked systems will be essential.

10. Protocol gateways are inherently complex to design, manage, and deploy and with the end to end architecture of IP, there are no protocol translation gateways involved.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. scalability 1. n.可量测性 2. 3. 4. 5. 6. 7. 8. 9. 10.

inductive 数字身份 capacitive identifier family tree 跨平台兼容性 tamper resistance assign

short-range wireless technology

2. 3. 4. 5. 6. 7. 8. 9.

adj.电感的,感应的 digital identity adj.电容性的 n.标识符

系谱,系谱图,族谱,族谱图 cross platform compatibility 抗干扰 vt.分配,指派

10. 短距离无线技术

11

参考答案

Unit 4

Text A Exercises

I. Answer the following questions according to the text.

1. In addition to taking the hardware with you, they are designing a ubiquitous networking system that allows your program applications to follow you wherever you go.

2. By using a small radio transmitter and a building full of special sensors, your desktop can be anywhere you are, not just at your workstation.

3. The ultrasonic location tracking system has three basic parts. They are:

·Bats - small ultrasonic transmitters worn by users

·Receivers - ultrasonic signal detectors embedded in ceiling ·Central controller - coordinates the bats and receiver chains

4. Bats are 3 inches long (7.5 cm) by 1.4 inches wide (3.5 cm) by 0.6 inches thick (1.5 cm), or about the size of a pager.

5. Since the speed of sound through air is known, the position of the bat is calculated by measuring the speed at which the ultrasonic pulse reached three other sensors.

6. The central controller can determine which way a person is facing by analyzing the pattern of receivers that detected the ultrasonic signal and the strength of the signal.

7. The computer uses a spatial monitor to detect if a user?s zone overlaps with the zone of a device. If the zones do overlap, then the user can become the temporary owner of the device.

8. The system will help us store and retrieve data in an \

9. By using a digital camera that is connected to the network, a user can store his photographs immediately in his or her timeline.

10. Smart posters will be used to control any device that is plugged into the network.

12

参考答案

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. piezoelectric 1. adj.压电的 2. 3. 4. 5. 6. 7. 8. 9. 10.

workstation redirect 方格网,方栅 pulse ubiquitous n.接收器,收信机 back up bidirectional information hopper

2. 3. 4. 5. 6. 7. 8. 9. 10.

n.工作站

vt.使改道,使改变方向,重寄 square grid n.脉冲

adj.泛在的,到处存在的,普遍存在的 receiver 备份 adj.双向的 信息料斗,信息仓

III. Fill in the blanks with the words given below.

1. sharing 2. LAN 3. hardware 4. adapters 5. operating 6. configure 7. package 8. multiplayer 9. accommodate 10. subnets

IV. Translate the following passage from English to Chinese.

广域网(WAN)是一个覆盖广泛区域的通信网络(如任何一个连接大都市、地区或国与国之间的网络),商业机构和政府组织利用WAN在不同地理位置的雇员、客户、买家和供应商之间传输数据。实际上,这种通信模式让商业机构高效完成日常运作而不受位置影响。

这与个人局域网、局域网、校园网或者城域网形成对照,通常后者只能分别用于一个房间、楼宇、校园或特定的都市。

Text B Exercises

I. Fill in the blanks with the information given in the text.

1. VPN stands for virtual private network. A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together.

2. Several years ago, the most common way to connect computers between multiple offices was by using a leased line.

3. Scalability is a major advantage that VPNs have over leased lines. The distance doesn't matter, because VPNs can easily connect multiple geographic locations worldwide.

13

参考答案

4. A VPN's purpose is providing a secure and reliable private connection between computer networks over an existing public network, typically the Internet.

5. A remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers.

6. A remote-access VPN requires two components. The first is a network access server (NAS, usually pronounced \conversationally), also called a media gateway or a remote-access server (RAS), the other required component of remote-access VPNs is client software.

7. A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. 8. There are two types of site-to-site VPNs. They are:

·Intranet-based -- If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN.

·Extranet-based-- When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets. 9. Tunneling is the process of placing an entire packet of data file within another packet before it's transported over the Internet.

10. The purpose of the tunneling protocol is to add a layer of security that protects each packet on its journey over the Internet.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. expand 1. v.扩展 2. 3. 4. 5. 6. 7. 8. 9. 10.

14

v.封装

v.加密,将...译成密码 tunnel performance tunnel interface maintain transport protocol leased line outsource

2. 3. 4. 5. 6. 7. 8. 9. 10.

encapsulate encrypt

n.通道,隧道,地道 n.履行,执行,性能 隧道接口 vt.维持,维修 传输协议 租用线,专用线 vt.把…外包vi.外包

参考答案

Unit 5

Text A Exercises

I. Answer the following questions according to the text.

1. A barcode is an optical machine-readable representation of data, which shows data about the object to which it attaches.

2. The very first scanning of the now ubiquitous Universal Product Code (UPC) barcode was on a pack of Wrigley Company chewing gum in June 1974.

3. Because it helps track items and also reduces instances of shoplifting involving price tag swapping.

4. A capable cellphone might be used to read the pattern and browse the linked website, which can help a shopper find the best price for an item in the vicinity. 5. The mapping between messages and barcodes is called a symbology. 6. They are continuous vs. discrete and Two-width vs. many-width. 7. The most common 2D symbologies are matrix codes.

8. 2-D symbologies cannot be read by a laser as there is typically no sweep pattern that can encompass the entire symbol.

9. Barcode scanners can be classified into three categories based on their connection to the computer. They are RS-232 barcode scanner, keyboard interface scanners and USB scanners.

10. In point-of-sale management, barcode systems can provide detailed up-to-date information on the business, accelerating decisions and with more confidence.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. automate 1. v.使自动化,自动操作

15

参考答案

Unit 10

Text A Exercises

I. Answer the following questions according to the text.

1. As an executive at a large corporation, your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs.

2. A cloud computing system can be divided into two sections. They are the front end and the back end.

3. The front end includes the client's computer (or computer network) and the application required to access the cloud computing system.

4. The back end of the system includes the various computers, servers and data storage systems that create the \

5. By maximizing the output of individual servers, server virtualization reduces the need for more physical machines.

6. Cloud computing systems need at least twice the number of storage devices it requires to keep all its clients' information stored because these devices, like all computers, occasionally break down.

7. Making copies of data as a backup is called redundancy.

8. You wouldn't need to buy the fastest computer with the most memory, because the cloud system would take care of those needs for you.

9. Some companies rent physical space to store servers and databases because they don't have it available on site.

10. The biggest concerns about cloud computing are security and privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format -- each user can access only the data and applications relevant to

31

参考答案

his or her job.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. cloud computing 1. 云计算 2. 3. 4. 5. 6. 7. 8. 9. 10.

n.浏览器 n.服务器 remote

grid computing system 数字化存储设备 interface authentication storage n.句柄

2. 3. 4. 5. 6. 7. 8. 9.

browser server

adj.远程的,遥远的 网格计算系统 digital storage device n.接口,界面 n.认证,证明,鉴定 n.存储

10. handle

III. Fill in the blanks with the words given below.

1. messages 2. warehouse 3. retrieve 4. manipulate 5. maintenance 6. redundancy 7. same 8. supply 9. space 10. survives

IV. Translate the following passage from English to Chinese.

对一些拥有计算机的人来说,找到足够的空间来保存他们收集到的全部数据确实是一个挑战。有些人买更大的硬盘。另外一些人喜欢用外部存储设备,如优盘或光盘。性急的计算机拥有者可能删除包含有价值的旧文件的整个文件夹,以便为新信息腾出空间。但也有一些人选择依靠不断增长的云存储。

云存储听起来与天气和风暴有关,它实际上指把数据保存于第三方维护的别的存储系统。不是把信息存储在你的计算机硬盘或其它本地存储设备中,而是将它保存在远程数据库中。因特网提供了你的计算机与该数据库之间的连接。

表面上,云存储与传统数据存储相比有几个优点。例如,如果把数据存储在云存储系统中,你就可以从能够连接因特网的任何地方得到那些数据。不需要把物理存储设备带在身边,也不用在同一个计算机上保存和检索信息。用合适的存储系统,你甚至可以让其他人访问该数据,把一项个人项目变成集体协作项目。

Text B Exercises

I. Fill in the blanks with the information given in the text.

32

参考答案

1. fourth generation in mobile technologies, International Telecommunications Union (ITU).

2. no more than 30 seconds 3. at least 100 Mbit/s 4. youtube, facebook

5. the technology of themselves, that of networks - information bottlenecks 6. capital expenditure on resources, work smoothly 7. powerful computers, upload, download 8. Internet of Things (IoT), get networked

9. dramatically altered, more fun and interactive 10. the citizen, government information

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. nominal data rate 1. 标称数据率 2. 3. 4. 5. 6. 7. 8. 9. 10.

station

data transfer rate adj.无缝的 channel bandwidth adj.交互式的 data theft

social networking site n.宽带 downlink

2. 3. 4. 5. 6. 7. 8. 9. 10.

n.基站 数据传输率 seamless

频道带宽,通道带宽 interactive 数据失窃 社交网站 broadband n.下行线

33

参考答案

Unit 7

Text A Exercises

I. Answer the following questions according to the text.

1. The radios used for WiFi communication are very similar to the radios used for walkie talkies, cell phones and other devices.

2. They transmit at frequencies of 2.4 GHz or 5 GHz. They use 802.11 networking standards

3. If the router fails or if too many people try to use high-bandwidth applications at the same time, users can experience interference or lose their connections.

4. If your laptop doesn't built-in wireless transmitters, you can buy a wireless adapter that plugs into the PC card slot or USB port. Desktop computers can use USB adapters, or you can buy an adapter that plugs into the PCI slot inside the computer's case. Many of these adapters can use more than one 802.11 standard.

5. If you already have several computers networked in your home, you can create a wireless network with a wireless access point. 6. A wireless router contains:

1) A port to connect to your cable or DSL modem 2) A router

3) An Ethernet hub 4) A firewall

5) A wireless access point

7. A wireless router allows you to use wireless signals or Ethernet cables to connect your computers to one another, to a printer and to the Internet.

8. If you set your router to create an open hotspot, anyone who has a wireless card will be able to use your signal.

21

参考答案

9. WiFi Protected Access (WPA) is a step up from WEP and is now part of the 802.11i wireless network security protocol. It uses temporal key integrity protocol (TKIP) encryption.

10. A clever hacker can spoof a MAC address -- that is, copy a known MAC address to fool the network that the computer he or she is using belongs on the network.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. frequency hop 1. 跳频 2. 3. 4. 5. 6. 7. 8. 9. 10.

wireless network n.频率,周率 detect 默认设置 n.带宽 decode adapter interference hub

2. 3. 4. 5. 6. 7. 8. 9.

无线网络 frequency

vt.探测,发觉, 探测 default setting bandwidth vt.解码,译解 n.适配器 n.冲突,干涉

10. n.网络集线器,网络中心

III. Fill in the blanks with the words given below.

1. exchange 2. products 3. synonym 4. smartphone 5. range 6. block 7. trademark 8. encryption 9. attacker 10. updated

IV. Translate the following passage from English to Chinese.

WiFi的优点

用WiFi部署局域网(LAN)比较便宜。也可以在不便布线的地方(如室外、古建筑)实现无线局域网。

厂商正在把无线网络装入大部分的便携机中。WiFi芯片组的价格持续下降,因此被装入更多设备中,构成经济型网络。

访问点和客户网络接口有多种竞争品牌,都可以实现基本的服务。由WIFi联盟指定“WiFi认证”的产品是向后兼容的。与手机不同,任何一个标准的WiFi设备都可以在世界的任何地方工作。

当前的WiFi保护访问(WPA2)的安全性被广泛认可,如果用户提供一个强有力的通行证。新的服务质量协议(WMM)使WiFi更适合于传输延迟应用(如语音和视频);并且,节电机制(WMM Power Save)也增加了电池寿命。

22

参考答案

Text B Exercises

I. Answer the following questions according to the text.

1.Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 2400-2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.

2. The radio technology Bluetooth uses is called frequency-hopping spread spectrum. 3. One master may communicate with up to 7 slaves in a piconet. All devices share the master's clock.

4. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots;

5. They do not have to be in visual line of sight of each other because the devices use a radio (broadcast) communications system.

6. Bluetooth profiles are definitions of possible applications and specify general behaviors that Bluetooth enabled devices use to communicate with other Bluetooth devices.

7. These profiles include settings to parameterize and to control the communication from start.

8. WiFi is intended as a replacement for cabling for general local area network access in work areas.

9. Bluetooth was intended for portable equipment and its applications.

10. Bluetooth exists in many products, such as the iPod Touch, Lego Mindstorms NXT, PlayStation 3, PSP Go, telephones, the Nintendo Wii, and some high definition headsets, modems, and watches.

II. Translate the following terms or phrases from English into Chinese and vice versa. 1. parameterize 1. vt.确定?的参数,用参数表示 2. 3. 4. 5. 6. 7.

transceiver master clock scatternet

能量消耗,功率消耗 piconet synchronization

2. 3. 4. 5. 6. 7.

n.收发器 主时钟

n.分布网,分散网 power consumption n.微微网 n.同步

23

参考答案

8. 9. 10.

sensitivity n.波长

serial communication

8. 9. 10.

n.灵敏度,灵敏性 wavelength 串行通信

24

参考答案

Unit 8

Text A Exercises

I. Answer the following questions according to the text.

1. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location.

2. Sensor nodes usually consist of a processing unit with limited computational power and limited memory, sensors or MEMS (including specific conditioning circuitry), a communication device (usually radio transceivers or alternatively optical), and a power source usually in the form of a battery.

3. They act as a gateway between sensor nodes and the end user as they typically forward data from the WSN on to a server.

4. Predominant standards commonly used in WSN communications include WirelessHART, ISA100, IEEE 1451 and ZigBee / 802.15.4.

5. One major challenge in a WSN is to produce low cost and tiny sensor nodes.

6. One is that wireless sensor networks are typically deployed with a particular application in mind, rather than as a general platform. The other is that a need for low costs and low power leads most wireless sensor nodes to have low-power microcontrollers ensuring that mechanisms such as virtual memory are either unnecessary or too expensive to implement.

7. In general, there are two ways to develop simulations of WSNs. Either use a custom platform to develop the simulation. And the second option is to develop one's own simulation.

8. Distributed control is used in WSNs for the following reasons:

25

本文来源:https://www.bwwdw.com/article/tv5v.html

Top