The development of the computer key technologies and mobile technology.doc

上传人:gs****r 文档编号:1709609 上传时间:2019-03-12 格式:DOC 页数:14 大小:134KB
下载 相关 举报
The development of the computer key technologies and mobile technology.doc_第1页
第1页 / 共14页
The development of the computer key technologies and mobile technology.doc_第2页
第2页 / 共14页
The development of the computer key technologies and mobile technology.doc_第3页
第3页 / 共14页
The development of the computer key technologies and mobile technology.doc_第4页
第4页 / 共14页
The development of the computer key technologies and mobile technology.doc_第5页
第5页 / 共14页
点击查看更多>>
资源描述

1、1The development of the computer key technologies and mobile technologyAbstract. Human society is in the information age, the information revolution has full rise. Human society changed from the value calculated into a comprehensive problem solving. Human being is gradually put information into a co

2、mputer system for the process of transplantation, resulting in the need of information management, information engineering, information exchange, and other branches of science. For the rapidly expanding range of problem-solving, the existing computer functions are a serious shortage, lack of intelli

3、gence. The lack of intelligence in computer science has been unable to generalize the entire contents of the information science. This paper mainly explains the development and application of computers in mobile technology. Key words: computer; mobile technology; wireless Internet 1.Computer NS simu

4、lation architecture of a mobile communication network In mobile communication network, the two roles of the 2nodes are hosts and routers. On one hand, the node works as a host running related protocols and applications; On the other hand, the node works as a router which need to run the routing prot

5、ocol, route discovery and route maintenance these common routing operations, the forwarding destination is not their own grouping. Compared to the mobile communication network and common fixed wire line network and wireless LAN, it has unique characteristics of the network, such as self-organizing,

6、random movement of nodes produce dynamic network topology hoc, , multi-hop, wireless broadband resource-constrained, distributed control network ,security is poor. Refer to the OSI seven-layer network reference model. In this architecture, the physical layer need complete the coding and decoding of

7、a radio signal, transmitting and receiving. The data link layer control access to the shared radio channel. The network layer is the focus of the ad hoc network, where is the main difference with other existing networks, which IPV4 protocol, IPV6 protocol, or other network layer protocol network lay

8、er data offer services; routing protocol finish the data packet transponder and transceiver correctly, ensure communication between nodes; internetworking support the interconnection between network and other existing network; QoS provides 3guaranteed QoS services; routing security provides security

9、 routing protocol. The upper layer application protocols provide user-oriented collaborative applications. 2.The use and the development of wireless Internet access and two-dimensional code technology We all know that the two-dimensional code technology, most of its research is conducted in a foreig

10、n country, the end of the 1980s; two large companies in the United States and Japan teamed up to jointly develop. His widely used only last 20 years, and now, the world of the two-dimensional code system has more than one hundred kinds. 20 of these are more commonly used such as QRCode, DataMatrix,

11、and PDF417. QR Code successfully developed by Denso Corporation of Japan in September 1994, this technology basically accounted for the Japanese market. The DataMatrix code (DM code) is the main application in Korea. South Korea and Japan, the 3G technology is quite perfect, general phone dimensiona

12、l code are applying through several forms as follows: electronic ticketing, mobile payment, barcode coupons. This provides a great convenience to peoples lives, for example, people go to the cinema can download seat number of the two-dimensional code in the cinema 4website ,so in the admission time

13、can remove from the queue trouble to buy a ticket ,it can directly scan reading phone dimensional code. When travel, people do not need to be online query or to ask a guide in order to gain an understanding of the points of interest, instead we can sweep the attractions set of two-dimensional code u

14、sing a mobile phone. There are many ways you can take advantage of the two-dimensional code, such as mobile phone ring tones, pictures can be obtained by shooting a two-dimensional code on a print ad. Those bring a great deal of convenience for the peoples lives, and this technology should also be l

15、inked to the development of technology and wireless Internet access. 3.The direction of the future development of mobile technology Mobile phone barcode business achieved great success in Japan and South Korea, and “ubiquitous network“ has begun to take shape, but it does not mean we can copy the su

16、ccessful experience of Japan and South Korea. There are several factors that are critical to promote mobile barcode business: price positioning and preferential policies for Chinas domestic mobile phone Internet costs relative to national income is still too high, the price impact on the popularity

17、of high-end 5mobile phones. Compared to approximate 100% mobile phone penetration rate in Japan and South Korea, Chinas mobile phone penetration rate is less than 30%, including 70% of the holders of low-end mobile phones. Chinese operators can consider launching more preferential access to the Inte

18、rnet business, use phone subsidies, and attract users to their own business system at the same time, but also lay a solid user base for the era of 3G mobile data services. At present, for user consumption habits cultivation, Chinese consumers on the two-dimensional code do not quite agree, the key i

19、s the lack of a good application. Develop welcomed application content is a top priority of the wireless communication network operators. The main customer groups can not only locate in the young people who love fun stimulate, but to the mobility of the elderly, housewives who do not often go out an

20、d group of young adults who are busy. To develop truly convenient application will attract more consumer group to use the two-dimensional code, and stay longer. 4. Key issues of mobile technology and mode 4.1 file server application mode In the 1980s, the personal computer went into the business are

21、na, computer applications has become broad range .At this 6time, the local area network and file server technology have come out. In the structure of the file server system, the file server only provides centralized management of the resources and access means, and the application is running on the

22、client workstation. The characteristic of this structure is centralized managing the shared data resources, while dispersing the application on each clients workstation. Advantages of the file server institutions: lower cost, flexible configuration, which can easily increase or decrease LAN client w

23、orkstations. As the file server only provides file services, all application processing should be carried out on clients, which requires that the client computer has the ability to execute programs, meanwhile, it need the client computer constantly upgraded to improve the performance of your applica

24、tion. 4.2 Network computer server on Linux technology needs Linux has gradually become one of the most widely used operating system in the world. It exists everywhere from the network server, Linux tables, and PC to a variety of embedded devices. The Linux is a high performance network operating sys

25、tem, Linux tables has a certain distance from the Window, but it has reached the degree of write applications, it will 7extend rapidly in Chinas e-government, enterprises, schools, and other areas. Therefore, achieving the network server on Linux NCS, offer suffers for NC on Linux, especially tables

26、 application have practical significance. Now the tables on the Linux application platform is based on the X Window, X Window System network is transparency, it allows user interface of application to withdraw the display on the remote device, so you can make the remote device to use Linux applicati

27、ons, however. This makes several inherent problems exist in the X Window System is not suitable for the NC architecture. 4.3 Computational domain analysis Computer sub-domain achieve the main routing functionality, just the switch sends a routing request to the computer side, the computer selects th

28、e route and then inform the switch to subsequent processing. First, the computational domain notify the switched domain can be routed, and then, through the computational domain routing function, the Route Request Service (routing request service) , Route select services, and response to the rerouti

29、ng request, re-routing services, until establish the route available routes, the last ,the Route routing end. 5. Network architecture of 8security server 5.1 Establish a strong network security system Occupies a very important position in the schools network server in the network, it is the core com

30、ponent of the network, so you can not separate the server to protect or to open with other equipment , the server should be co-ordination with other devices as a whole planning. So, we should establish a strong network security system, to implement the overall protection of the entire computer netwo

31、rk. Only the entire network is clearly the implementation of a unified network security system, we can be more effective to protect on all parts of the network. In addition, it should be noted that all make the school faculty are clearly understood and strictly enforce security system. A complete se

32、curity system is composed of two parts by the safety management and safety technology. Safety management is to manage some writing, such as the rules and regulations and constraints network behavior; safety technology from the technical aspects of network behavior to regulate, for example, using ant

33、i-virus or firewall software to protect the entire normal operation of the network. 5.2 Establish the necessary protective base 9External network attacks begin with the loopholes in the network, so the presence of network vulnerability led to the network security issues. In order to better ensure th

34、e security of the network and server, we must establish a network protection infrastructure, but also to try to use the already developed security technology to ensure the security of the server and the whole network, so that we can make a protective effect to the server fundamentally.。For the illeg

35、al invasion of visitors, compared to the disk data is stored in the NTFS format disk data , stored in the FAT format more easily be destroyed, so, if the server disk partitions using FAT format to be stored is very dangerous practice. Practices were conducive to networking and server, set the networ

36、k disk partition on the server all to NTFS format, especially some of the sensitivity characteristics of the disk containing the data partition should be converted to NTFS format. 5.3 The combination of computer communication network is the computer technology and communication technology Computer c

37、ommunication network is the computer technology and communication technology combined to form a new communication, primarily to meet the needs of the data transmission. It will be different geographic locations, with 10the independent features multiple computer terminals and ancillary hardware (rout

38、ers, switches) connected to the communication link with the appropriate network software, in order to achieve the sharing of resources in the communication process and the formation of the communication system. It is not only to meet a local enterprises, companies, schools and office data, file tran

39、sfer needs, but also on a national and even worldwide information exchange, storage and handling, at the same time can provide voice, data and images integrated services, is the only way for the development of information technology in the future. 6.Analog communications and digital communications s

40、ystem In the system of the channel transmit analog signals known as analog communication systems. It contains two important transformations, first, changes the original message into electrical signals, second,converted the unsuitable transmission of the base band signal into a frequency band signal through the modulator; at the same time both transformation should go through the inverse transform at the end. 6.1The characteristics of the digital communication With respect to the analog communication system, digital

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 学术论文资料库 > 学科论文

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。