电子信息英文.docx
《电子信息英文.docx》由会员分享,可在线阅读,更多相关《电子信息英文.docx(20页珍藏版)》请在三一办公上搜索。
1、2. Normative referencesThe following referenced documents are indispensable for the application of this standard. For dated references,only the edition cited applies. For undated references, the latest edition of the referenced document(including any amendments or corrigenda) applies.2.1 IEEE docume
2、ntsIEEE Std 802, IEEE Standards for Local and Metropolitan Area Networks: Overview and Architecture.IEEE Std 802.15.2, IEEE Recommended Practice for Telecommunications and Information exchange between systemsLocal and metropolitan area networksSpecific RequirementsPart 15.2: Coexistence of Wireless
3、Personal Area Networks with Other Wireless Devices Operating in Unlicensed Frequency Band.2.2 ISO documentsISO/IEC 3309, Information technology Telecommunications and information exchange between systems High-level data link control (HDLC) procedures Frame structure.ISO/IEC 7498-1, Information techn
4、ology Open Systems Interconnection Basic Reference Model: The Basic Model.ISO/IEC 8802-2, Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 2: Logical link control.ISO/IEC 10039, Information technology O
5、pen Systems Interconnection Local Area Networks Medium Access Control (MAC) service definition.ISO/IEC 15802-1, Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Common specifications Part 1: Medium Access Control (MAC) service de
6、finition.2.3 ITU documentsITU-T Recommendation G.711, Pulse code modulation (PCM) of voice frequencies.ITU-T Recommendation O.150, Digital test patterns for performance measurements on digital transmission equipment.ITU-T Recommendation O.153, Basic parameters for the measurement of error performanc
7、e at bit rates below the primary rate.ITU-T Recommendation X.200, Information technologyOpen systems interconnectionBasic reference model: The basic model.2.4 Other documentsIETF RFC 1363, A Proposed Flow Specification.IETF RFC 1661, The Point-to-Point Protocol (PPP).IrDA Object Exchange Protocol (I
8、rOBEX), Version 1.23. DefinitionsFor the purposes of this standard, the following terms and definitions apply. The Authoritative Dictionary of IEEE Standards Terms, Seventh Edition B7, should be referenced for terms not defined in this clause.3.1 active slave broadcast (ASB): The logical transport t
9、hat is used to transport Logical Link Control and Adaptation Protocol (L2CAP) user traffic to all active devices in the piconet.3.2 ad hoc network: A network typically created in a spontaneous manner. An ad hoc network requires no formal infrastructure and is limited in temporal and spatial extent.3
10、.3 authenticated device: A device whose identity has been verified during the lifetime of the current link,based on the authentication procedure.3.4 authentication: A generic procedure based on link management profile authentication that determines whether a link key exists or, on Link Manager Proto
11、col (LMP) pairing, whether no link key exists.3.5 authorization: A procedure where a user of a device grants a specific (remote) device access to a specific service. Authorization implies that the identity of the remote device can be verified through authentication.3.6 authorize: The act of granting
12、 a specific device access to a specific service. It may be based upon user confirmation or given the existence of a trusted relationship.3.7 baseband (BB): The part of the system that specifies or implements the medium access control (MAC) layer and physical layer (PHY) procedures to support the exc
13、hange of real-time voice, data information streams, and ad hoc networking between devices.3.8 beacon train: A pattern of reserved slots within a basic or adapted piconet physical channel. Transmissions starting in these slots are used to resynchronize parked devices.3.9 Bluetooth device address (BD_
14、ADDR): The address used to identify a device conforming to this standard.3.10 Bluetooth wireless technology: The general term used to describe the technolgy orginally developed by the Bluetooth Special Interest Group (SIG). It defines a wireless communication link, operating in the unlicensed indust
15、rial, scientific, and medical (ISM) band at 2.4 GHz using a frequency hopping transceiver.The link protocol is based on time slots.3.11 bond: A relation between two devices defined by creating, exchanging, and storing a common link key The bond is created through the bonding or Link Manager Protocol
16、 (LMP) pairing procedures.3.12 channel: Either a physical channel or an Logical Link Control and Adaptation Protocol (L2CAP) channel,depending on the context.3.13 connect (to service): The establishment of a connection to a service. If not already done, this also includes establishment of a physical
17、 link, logical transport, logical link, and Logical Link Control and Adaptation Protocol (L2CAP) channel.3.14 connectable device: A device in range that periodically listens on its page scan physical channel and will respond to a page on that channel.3.15 connected devices: Two devices in the same p
18、iconet and with a physical link between them.3.16 connecting: A phase in the communication between devices when a connection between them is being established. (Connecting phase follows after the link establishment phase is completed.)3.17 connection: A connection between two peer applications or hi
19、gher layer protocols mapped onto a Logical Link Control and Adaptation Protocol (L2CAP) channel.3.18 connection establishment: A procedure for creating a connection mapped onto a channel.3.19 controller: A subsystem containing the physical layer (PHY), baseband (BB), resource controller, link manage
20、r (LM), device manager, and a host controller interface (HCI) conforming to this standard.3.20 coverage area: The area where two devices can exchange messages with acceptable quality and performance.3.21 creation of a secure connection: A procedure of establishing a connection, including authenticat
21、ion and encryption.3.22 creation of a trusted relationship: A procedure where the remote device is marked as a trusted device.This includes storing a common link key for future authentication and pairing (if the link key is not available).3.23 device: A device that is capable of short-range wireless
22、 communications using this standard.3.24 device address: A 48-bit address used to identify each device.3.25 device discovery: A procedure for retrieving the device address, clock, class-of-device field, and used page scan mode from discoverable devices.3.26 discoverable device: A device in range tha
23、t periodically listens on an inquiry scan physical channel and will respond to an inquiry on that channel. Discoverable devices are normally also connectable.3.27 estimated clock (CLKE): Estimate of another devices clock. CLKE may be a slaves estimate of a masters clock, a paging devicess estimate o
24、f the paged devices clock, or other such use.3.28 host: A computing device, peripheral, cellular telephone, access point to public switched telephone network (PSTN) or local area network (LAN), etc. A host attached to a controller may communicate with other hosts attached to their controllers as wel
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 电子信息 英文
链接地址:https://www.31ppt.com/p-2093045.html