A survey of inter-vehicle communication
- 格式:pdf
- 大小:137.85 KB
- 文档页数:12
signal range and drop out of the network, oth-er vehicles can join in, connecting vehicles to one another to create a mobile Internet. We de-termine that V ANET only covers a very small mobile network that is subject to mobility con-straints and the number of connected vehicles. Several characteristics of large cities, such as traffic jams, tall buildings, bad driver behav-iors, and complex road networks, further hin-der its use. Therefore, for V ANET, the objects involved are temporary, random and unstable, and the range of usage is local and discrete, i.e., VANET cannot provide whole (global) and sustainable services/applications for cus-tomers. Over the past several decades, there has not been any classic or popular implemen-tation of VANET. The desired commercial interests have not emerged either. Therefore, V ANET’s usage has begun to stagnate.In contrast to VANET, IoV has two main technology directions: vehicles’ neworking and vehicles’ intelligentialize. Vehicles’ net-working is consisting of V ANET (also called vehicles’ interconnection), Vehicle Telematics (also called connected vehicles) and Mobile Internet (vehicle is as a wheeled mobile termi-nal). Vehicles’ intelligence is that the integra-tion of driver and vehicle as a unity is more intelligent by using network technologies, which refers to the deep learning, cognitive computing, swarm computing, uncertainty artificial intelligence, etc. So, IoV focuses on the intelligent integration of humans, vehi-cles, things and environments and is a largerAbstract: The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the Internet of Vehicles (IoV). With the rapid development of computation and communication technologies, IoV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV , discusses the technologies required to create the IoV , presents different applications b a s e d o n c e r t a i n c u r r e n t l y e x i s t i n g technologies, provides several open research challenges and describes essential future research in the area of IoV .Keywords: internet of vehicles; VANET; vehicle telematics; network modelI. I NTRODUCTIONAccording to recent predictions 1, 25 billion “things” will be connected to the Internet by 2020, of which vehicles will constitute a significant portion. With increasing numbers of vehicles being connected to the Internet of Things (IoT), the conventional Vehicle Ad-hoc Networks (VANETs) are changing into the Internet of Vehicle (IoV). We explore the reasons for this evolution below.As is well-known, V ANET [1] turns every participating vehicle into a wireless router or mobile node, enabling vehicles to connect to each other and, in turn, create a network with a wide range. Next, as vehicles fall out of theAn Overview of Internet of VehiclesYANG Fangchun, WANG Shangguang, LI Jinglin, LIU Zhihan, SUN QiboState Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications, Beijing, ChinaV EHICULAR N ETWORKING1/7037738/The_Inter-net_of_Things_A_Study_in_Hype_Reality_Disrup-tion_and_Growtthe conventional Vehicle Ad-hoc Networks (V ANETs), Vehicle Telematics, and other con-nected vehicle networks have to evolve into the Internet of Vehicle (IoV). The question accordingly arises as to why such systems did not evolve into IoT, Internet or wireless mo-bile networks.The main reason is that some characteris-tics of IoV are different from IoT, Internet or wireless mobile networks. Firstly, in wireless mobile networks, most end-users’ trajectories follow a random walk model. However, in IoV , the trajectory of vehicles is subject to the road distributions in the city. Secondly, IoT focuses on things and provides data-aware-ness for connected things, while the Internet focuses on humans and provides information services for humans. However, IoV focuses on the integration of humans and vehicles, in which, vehicles are an extension of a human’s abilities, and humans are an extension of a vehicle’s intelligence. The network model, the service model, and the behavior model of human-vehicle systems are highly different from IoT, Internet or wireless mobile network. Finally, IoV interconnects humans within and around vehicles, intelligent systems on board vehicles, and various cyber-physical systems in urban environments, by integrating vehi-cles, sensors, and mobile devices into a global network, thus enabling various services to be delivered to vehicles and humans on board and around vehicles. Several researchers have referred to the vehicle as a manned computer with four wheels or a manned large phone in IoV. Thus, in contrast to other networks, ex-isting multi-user, multi-vehicle, multi-thing and multi-network systems need multi-level collaboration in IoV .In this paper, we first provide a network model of IoV using the swarm model and an individual model. We introduce existing re-search work focusing on activation and main-tenance of IoV. Then, we survey the various applications based on some currently existing technologies. Finally, we give several open re-search challenges for both the network model and the service model of human-vehicle sys-network that provides services for large cities or even a whole country. IoV is an open and integrated network system with high manage-ability, controllability, operationalization and credibility and is composed of multiple users, multiple vehicles, multiple things and multiple networks. Based on the cooperation between computation and communication, e.g., col-laborative awareness of humans and vehicles, or swarm intelligence computation and cog-nition, IoV can obtain, manage and compute the large scale complex and dynamic data of humans, vehicles, things, and environments to improve the computability, extensibility and sustainability of complex network systems and information services. An ideal goal for IoV is to finally realize in-depth integration of human-vehicle-thing-environment, reduce social cost, promote the efficiency of trans-portation, improve the service level of cities, and ensure that humans are satisfied with and enjoy their vehicles. With this definition, it is clear that V ANET is only a sub network of IoV. Moreover, IoV also contains Vehicle Telematics [2], which is a term used to define a connected vehicle interchanging electronic data and providing such information services as location-based information services, remote diagnostics, on-demand navigation, and au-dio-visual entertainment content. For IoV , Ve-hicle Telematics is simply a vehicle with more complex communication technologies, and the intelligent transportation system is an applica-tion of IoV , but vehicle electronic systems do not belong to IoV .In the last several years, the emergence of IoT, cloud computing, and Big Data has driven demand from a large number of users. Individ-ual developers and IT enterprises have pub-lished various services/applications. However, because V ANET and Vehicle Telematics lack the processing capacity for handling global (whole) information, they can only be used in short term applications or for small scale ser-vices, which limits the development and popu-lar demand for these applications on consumer vehicles. There is a desperate need for an openand integrated network system. Therefore,people who consume or provide services/ap-plications of IoV . Human do not only contain the people in vehicles such as drivers and pas-sengers but also the people in environment of IoV such as pedestrians, cyclists, and drivers’ family members. Vehicle in IoV terminology refers to all vehicles that consume or provide services/applications of IoV . Thing in IoV ter-minology refers to any element other than hu-man and vehicle. Things can be inside vehicles or outside, such as AP or road. Environment refers to the combination of human, vehicle and thing.The individual model focuses on one vehi-cle. Through the interactions between human and environment, vehicle and environment, and thing and environment, IoV can provide services for the vehicles, the people and the things in the vehicles. In the model, the in-tra-vehicle network is used to support the interaction between human and vehicle, and the interaction between vehicle and thing in that vehicle. The inter-vehicle network is usedtems, i.e., enhanced communication through computation and sustainability of service pro-viding, and outline essential future research work in the area of IoV .The rest of this paper is organized as fol-lows. Section 2 describes o ur proposed net-work model of IoV. The overview of IoV is presented from three different perspectives in Section 3. In Section 4, several open research challenges and essential future research work related to IoV are outlined. Finally, we present this paper’s conclusions in Section 5.II. N ETWORK M ODEL OF IOVAs shown in Fig. 1, we propose a network model of IoV based on our previous work [3], in which the model is composed of a swarm model and an individual model. The key as-pect of the network model is the integration between human, vehicle, thing, and environ-ment.Human in IoV terminology refers to all theFig.1Network model of IoVsignificantly improve the quality of vehicle service, while a bad wireless access may often lead to the breakdown of services. As is well-known, routing technology is the research core of traditional networks. For IoV , while routing is still the core of the inter-vehicle network, it is also essential for delivering the control message. Finally, IoV has the two most im-portant elements, i.e., users and network. For a simple IoV, wireless access is its user, and routing is its network. With the development of IoV , however, these elements might be less important, and other technologies may play a vital role, such as collaboration technology and swarm intelligence computing. However, due to page limitations, a detailed discussion is beyond this paper.Note that the technologies introduced in this section cannot cover the technologies of IoV , and most of them belong to V ANET [4] or Ve-hicle Telematics. The reason is that IoV is an open and integrated network system composed of multiple users, multiple vehicles, multiple things and multiple networks, and an integrat-ed IoV is not described. Hence, this section mainly focuses on existing technologies and applications, even if they do not represent the technologies and applications of IoV .3.1 Activation of IoVThere are many steps in the activation of IoV , but the most important step is to take the vehi-cles into the integrated network of IoV using wireless access technologies. At present, there are many existing wireless access technologies such as WLANs, WiMAX, Cellular Wireless, and satellite communications [5]. As shown in Fig. 1, most of these technologies are used to connect vehicles to each other in IoV .WLAN contains IEEE 802.11a/b/g/n/p standards. IEEE 802.11-based WLAN, which has achieved great acceptance in the market, supports short-range, relatively high-speed data transmission. The maximum achievable data rate in the latest version (802.11n) is ap-proximately 100 Mbps. IEEE 802.11p is a new communication standard in the IEEE 802.11 family which is based on the IEEE 802.11a.to support the interaction between human and environment, vehicle and environment, and thing and environment. Swarm model focus-es on multi-user, multi-vehicle, multi-thing and multi-network scenarios. Through swarm intelligence, crowd sensing and crowd sourc-ing, and social computing, IoV can provide services/applications. Moreover, in this model, the interaction between human and human, ve-hicle and vehicle, and thing and thing, all need an integrated network to collaborate with each other and with the environment. Note that IoV has a computation platform for providing vari-ous decisions for whole network, and there are many virtual vehicles with drivers correspond-ing to physica vehicles and drivers. Then we call the virtual vehicle with driver as Autobot. In the IoV, Autobot can interact with each other by using swarm computing technologies and provide decision-making information for IoV in the computation platform.III. T ECHNOLOGY AND A PPLICATION OF IOVOver a decade ago, both industrial and aca-demic researchers proposed many advanced technologies for the application layer, the mo-bile model & the channel model, the physical layer & the data link layer, the network layer & the transport layer, and security & privacy; these technologies are all used in IoV . In this section, we only focus on giving an overview of the technologies and their applications in IoV, and do not describe the details of the technologies. The overview describes the acti-vation of the IoV , maintenance of the IoV , and IoV applications.For the activation and maintenance of the IoV, we only summarize the wireless access technology and the routing technology. There are several reasons for focusing on these two technologies. Firstly, most researchers working on IoV focus on wireless access and routing, for which the number of proposed re-search works are the highest. Secondly, wire-less access technologies play an important role in IoV . A good wireless access technology canquality of service, even for non-line-of-sight transmissions. The key advantage of WiMAX compared to WLAN is that the channel access method in WiMAX uses a scheduling algo-rithm in which the subscriber station needs to compete only once for initial entry into the network.Cellular wireless comprises of 3G, 4G and LTE. Current 3G networks deliver data at a rate of 384 kbps to moving vehicles, and can go up to 2 Mbps for fi xed nodes. 3G sys-tems deliver smoother handoffs compared to WLAN and WiMAX systems, and many nota-ble works have been proposed. For example, Chao et al. [8] modeled the 3G downloading and sharing problem in integration networks. Qingwen et al. [9] made the first attempt in exploring the problem of 3G-assisted data delivery in V ANETs. However, due to central-ized switching at the mobile switching center (MSC) or the serving GPRS support node (SGSN), 3G latency may become an issue for many applications. Vinel [3] provided an an-IEEE 802.11p is designed for wireless access in the vehicular environment to support intel-ligent transport system applications. The use of wireless LANs in V ANETs requires further research. For example, Wellens et al. [6] pre-sented the results of an extensive measure-ment campaign evaluating the performance of IEEE 802.11a, b, and g in car communication scenarios, and showed that the velocity has a negligible impact, up to the maximum tested speed of 180 km/h. Yuan et al. [7] evaluated the performance of the IEEE 802.11p MAC protocol applied to V2V safety communica-tions in a typical highway environment. Wi-MAX contains IEEE 802.16 a/e/m standards. IEEE 802.16 standard-based WiMAX are able to cover a large geographical area, up to 50 km, and can deliver significant bandwidth to end-users - up to 72 Mbps theoretically. While IEEE 802.16 standard only supports fixed broadband wireless communications, IEEE 802.16e/mobile WiMAX standard supports speeds up to 160 km/h and different classes of Fig.2 Wireless access technologies in IoVAPManagement and Control on the APIEEE 802.16WiMax DatabaseAP Management and Control on the APAPManagement and Control on the APCellular NetworkCellular NetworkDatabaseSatellite NetworkSatellite Network DatabaseAPManagement and Control on the APIEEE 802.11WLAN DatabaseVehicleVehicleVehicleVehicleCentralized Management and Control Unitand Control Unit (CMCU)NetworkDatabaseCMCUIoV3.2 Maintenance of IoVThere are also many aspects to the mainte-nance of IoVs, such as data-awareness, virtual networks, and encoding, but the most im-portant aspect is the switching of the control message for IoV. Routing technology is the suitable solution, and in IoV , is dependent on a number of factors such as velocity, density, and direction of motion of the vehicles. As shown in Fig. 1, vehicles can either be the source or the destination during the process of routing, and various standards have been built to accomplish the task of routing. With the growing needs of the users to access various resources during mobility, efficient techniques are required to support their needs and keep them satisfied.Topology based maintenance: Because of the large overhead incurred for route discovery and route maintenance for highly mobile unco-ordinated vehicles, only a few of the existing routing protocols for inter-vehicle networks are able to handle the requirements of safety applications [10,11]. An important group of routing protocols for ad-hoc networks is based on topology, and needs the establishment of an end-to-end path between the source and the destination before sending any data packet. Due to rapid changes in the network topology and highly varying communication channel conditions, the end-to-end paths determined by regular ad-hoc topology-based routing pro-tocols are easily broken. To solve this prob-lem, several routing protocols have been pro-posed [12,13] [14,15] [16] [17]. For example, Namboodiri and Gao [12] proposed a predic-tion-based routing for V ANETs. The PBR is a reactive routing protocol, which is specifically tailored to the highway mobility scenario, to improve upon routing capabilities without us-ing the overhead of a proactive protocol. The PBR exploits the deterministic motion pat-tern and speeds, to predict roughly how long an existing route between a “node” vehicle and a “gateway” vehicle will last. Using this prediction, the authors pre-emptively create new routes before the existing route lifetimealytical framework which allows comparing 802.11p/WA VE and LTE protocols in terms of the probability of delivering the beacon before the expiration of the deadline. Lei et al. [4] studied the potential use cases and technical design considerations in the operator con-trolled device-to-device communications. The potential use cases were analyzed and classi-fied into four categories. Each use case had its own marketing challenges and the design of related techniques should take these fac-tors into consideration. Gerla and Kleinrock [5] discussed LTE cellular service in a future urban scenario with very high bandwidth and broad range. The so-called cognitive radios will allow the user to be “best connected” all the time. For instance, in a shopping mall or in an airport lounge, LTE will become congested, and the user’s cognitive radio will disconnect from LTE. For vehicles, due to large costs, sat-ellite communications are barely used, except for GPS. It is only a supplement for temporary and emergency uses, when other communica-tion technologies are invalid or unavailable. Looking at the wireless access technologies described above, we think that the 4G or LTE should be the most efficient technology to launch the inter-vehicle network and to acti-vate the IoV . The reasons are as follows. First-ly, 4G or LTE is the most used communication standard, and has been deployed by most countries to provide access services. Obvious-ly, any vehicle can use it to connect to the IoV . Secondly, in the context of high buildings and a complex city environment, the performance of 4G or LTE is the best among all wireless access technologies. Finally, in the past ten years, the development of VANET has been very slow, and can barely be used in the real world. The main reason is that the connected vehicles cannot maintain V ANET in city roads because the goals of drivers are random and different. To maintain the V ANET, all vehicles must access the integrated network of IoV, after which IoV can be activated to provide services for users.which combines store-carry-and-forward tech-nique with routing decisions based on geo-graphic location. These geographic locations are provided by GPS devices. In GeoSpray, authors proposed a hybrid approach, mak-ing use of a multiple copy and a single copy routing scheme. To exploit alternate paths, GeoSpray starts with multiple copy schemes which spread a limited number of bundle cop-ies. Afterwards, it switches to a single copy scheme, which takes advantage of additional opportunities. It improves delivery success and reduces delivery delay. The protocol ap-plies active receipts to clear the delivered bun-dles across the network nodes. Compared with other geographic location-based schemes, and single copy and non-location based multiple copy routing protocols, it was found that Geo-Spray improves delivery probability and re-duces delivery delay. In contrast to the above work, Bernsen and Manivannan proposed [20] a routing protocol for V ANETs that utilizes an undirected graph representing the surrounding street layout, where the vertices of the graph are points at which streets curve or intersect, and the graph edges represent the street seg-ments between those vertices. Unlike existing protocols, it performs real-time, active traffic monitoring and uses these data and other data gathered through passive mechanisms to as-sign a reliability rating to each street edge. Then, considering the different environments, a qualitative survey of position-based rout-ing protocols was made in [21], in which the major goal was to check if there was a good candidate for both environments or not. An-other perspective was offered by Liu et al. [22], who proposed a relative position based message dissemination protocol to guarantee high delivery ratio with acceptable latency and limited overhead. Campolo et al. [23] used the time, space and channel diversity to improve the efficiency and robustness of network ad-vertisement procedures in urban scenarios. Clustering based maintenance: In this type of routing scheme, one of the nodes among the vehicles in the cluster area becomes a clusterhead (CH), and manages the rest ofexpires. Toutouh et al. [13] proposed a well-known mobile ad hoc network routing proto-col for V ANETs to optimize parameter settings for link state routing by using an automatic optimization tool. Nzounta et al.[15] proposed a class of road-based VANET routing proto-cols. These protocols leverage real-time ve-hicular traffic information to create paths. Fur -thermore, geographical forwarding allows the use of any node on a road segment to transfer packets between two consecutive intersections on the path, reducing the path’s sensitivity to individual node movements. Huang et al. [16] examined the efficiency of node-disjoint path routing subject to different degrees of path coupling, with and without packet redundancy. An Adaptive approach for Information Dis-semination (AID) in VANETs was presented in [14], in which each node gathered the in-formation on neighbor nodes such as distance measurements, fixed upper/lower bounds and the number of neighboring nodes. Using this information, each node dynamically adjusts the values of local parameters. The authors of this approach also proposed a rebroadcast-ing algorithm to obtain the threshold value. The results obtained show that AID is better than other conventional schemes in its cate-gory. Fathy et al. [17] proposed a QoS Aware protocol for improving QoS in VANET. The protocol uses Multi-Protocol Label Switching (MPLS), which runs over any Layer 2 technol-ogies; and routers forward packets by looking at the label of the packet without searching the routing table for the next hop.Geographic based maintaining. The geo-graphic routing based protocols rely mainly on the position information of the destination, which is known either through the GPS sys-tem or through periodic beacon messages. By knowing their own position and the destination position, the messages can be routed directly, without knowing the topology of the network or prior route discovery. V . Naumov et al. [18] specifically designed a position-based routing protocol for inter-vehicle communication in a city and/or highway environment. Soares et al. [19] proposed the GeoSpray routing protocol,dynamic transmission range, the direction of vehicles, the entropy, and the distrust value parameters. Wang et al. [26] refined the orig -inal PC mechanism and proposed a passive clustering aided mechanism, the main goal of which is to construct a reliable and stable clus-ter structure for enhancing the routing perfor-mance in V ANETs. The proposed mechanism includes route discovery, route establishment, and data transmission phases. The main idea is to select suitable nodes to become cluster-heads or gateways, which then forward route request packets during the route discovery phase. Each clusterhead or gateway candidate self-evaluates its qualification for clusterhead or gateway based on a priority derived from athe nodes, which are called cluster members. If a node falls in the communication range of two or more clusters, it is called a border node. Different protocols have been proposed for this scheme, and they differ in terms of how the CH is selected and the way the routing is done. R. S. Schwartz et al. [24] proposed a dissemination protocol suitable for both sparse and dense vehicular networks. Suppression techniques were employed in dense networks, while the store-carry-forward communication model was used in sparse networks. A. Daein-abi [25] proposed a novel clustering algorithm - vehicular clustering - based on a weighted clustering algorithm that takes into consider-ation the number of neighbors based on theavoidance. At present, collision avoidance technologies are largely vehicle-based systems offered by original equipment manufacturers as autonomous packages which broadly serve two functions, collision warning and driver assistance. The former warns the driver when a collision seems imminent, while the latter partially controls the vehicle either for steady-state or as an emergency intervention [41]. To be specific, collision warning includes notifi -cations about a chain car accident, warnings about road conditions such as slippery road, and approaching emergency vehicle warning [5]. On the one hand, collision warnings could be used to warn cars of an accident that oc-curred further along the road, thus presenting a pile-up from occurring. On the other hand, they could also be used to provide drivers with early warnings and prevent an accident from happening in the first place. Note that driving near and through intersections is one of the most complex challenges that drivers face be-cause two or more traffic flows intersect, and the possibility of collision is high [42]. The intelligent intersection, where such conven-tional traffic control devices as stop signs and traffic signals are removed, has been a hot area of research for recent years. Vehicles coordi-nate their movement across the intersection through a combination of centralized and dis-tributed real-time decision making, utilizing global positioning, wireless communications and in-vehicle sensing and computation 1. A number of solutions for collision avoidance of multiple vehicles at an intersection have been proposed. A computationally efficient control law [43-45] has been derived from ex-ploitation of the monotonicity of the vehicles’ dynamics, but it has not been applied to more than two vehicles. An algorithm that addresses multi-vehicle collisions, based on abstraction, has been proposed in [46]. An algorithmic ap-proach to enforcing safety based on a time slot assignment, which can handle a larger number of vehicles, is found in [41]. Colombo et al. [47] designed a supervisor for collision avoid-ance, which is based on a hybrid algorithm that employs a dynamic model of the vehiclesweighted combination of the proposed metrics. P. Miao [27] proposed a cooperative commu-nication aware link scheduling scheme, with the objective of maximizing the throughput for a session in C-V ANETs. They let the RSU schedule the multi-hop data transmissions among vehicles on highways by sending small sized control messages.Based on the above overview, we provide a relative comparison of all routing protocols in Tab 1. In this table, Route length is the total distance between source and destination. PDR is the packet delivery ratio. Latency is the in-terval of time between the first broadcast and the end of the last host’s broadcast. Latency includes buffering, queuing, transmission and propagation delays.3.3 IoV applicationsWith the rapid development of numeric infor-mation technology and network technology, it is brought forward that theautomatization and intelligentization of vehicle.This gives birth to lots of applications which combine safe driving with service provision. For example, Apple CarPlay, originally introduced as iOS in vehicles, offer full-on automobile integration for Apple’s Maps and turn-by-turn navigation, phone, iMeessage, and music service 5. Similar to CarPlay, Google Android Auto provides a distraction-free interface that allows drivers enjoy the services by connecting Android de-vices to the vehicle. Chinese Tecent recently launched its homegrown navigation app Lu-bao that features user generated contents and social functions 7. For demonstration purposes, in this paper, IoV applications can be divided into two major categories: Safety applications and User applications. Applications that in-crease vehicle safety and improve the safety of the passengers on the roads by notifying the vehicles about any dangerous situation in their neighborhood are called safety applications. Applications that provide value-added services are called User applications.Technologies to enhance vehicular and passenger safety are of great interest, and one of the important applications is collision。
《跨境电商基础》(英)课程教学大纲一、课程基本信息课程代码: 16060702课程名称: 跨境电商基础(英)英文名称: Fundamentals to Cross-border Ecommerce课程类别: 专业选修课学时: 32学分: 2适用对象: 商务英语专业、英语专业(国际商务管理方向)考核方式: 考查、开卷案例分析或产品调研报告先修课程: 国际商法(英)、当代商学概论(英)二、课程简介跨境电商作为推动经济一体化, 贸易全球化的重要途径具有非常重要的战略意义。
高校担负着培养跨境电商人才的责任, 高校培养的人才不仅应当具备知识和技能, 还应当具备良好的思想, 品德和社会公德和职业道德, 应当具备与全世界交流的大国自信。
《跨境电商基础(英)》这门课程是基于互联网和电子商务背景, 涉及到外贸必须的外语和外贸技巧和能力, 同时这些专业能力和技巧采用讲述辅以典型实战案例, 采用案例分析、情景演练和互动模式, 学生在教师引导下进行网上操作和亲身体验, 力求学习课堂与工作岗位实现无缝对接。
本课程开办的目的是使即将进入外贸职业岗位的毕业生了解跨境电商的基本概念、趋势, 针对岗位的能力和素质需求, 切实掌握跨境电商找客户、让客户找上门、将客户询盘最大限度地转化为订单, 同时通过主流商务平台了解收费平台的使用, 学会在网商外贸过程中进行国际在线支付, 以及提高风险意义和风险控制能力等跨境电商方法和技巧, 缩短毕业生进入相关职业岗位的“不适期”。
As an important way to promote economic integration and trade globalization, the course of Cross-Border E-Commerce has strategic significance.Colleges and universities bear the responsibility of cultivating cross-border e-commerce talents.The talents should not only obtain knowledge and skills, but also empower themselves with morals, social ethics, professional ethics, and possess the confidence of a big country to communicate with the world.This course, Fundamentals to Cross-border Ecommerce (English) is based on the Internet and e-commerce background.It involves the foreign language and foreign trade skills and abilities necessary for foreign trade.At the same time, these professional abilities and skills are supplemented by typical practical cases and case studies.Situational exercises and interactive modes, students conduct online operations and personal experience under the guidance, and strive to achieve seamless integration between classrooms and future jobs.The purpose of this course is to enable the seniors who are about to enter foreign trade careers to understand the basic concepts and trends of cross-border e-commerce, to meet the ability and quality needs of the relative posts, to effectively grasp the concept and process of cross-border e-commerce to find customers actively, to be found by the potential business partners by some passive marketing, mainly via the mainstream cross-border electronic commercial platforms.Then to maximize the possibility to transform customers’inquiries and requirements into real orders is another vital concern.The use of toll platforms is understood through the mainstream business platform.International online payment is taught in the process of foreign trade of online merchants, and cross-border e-commerce methods and techniques such as improving risk significance and risk control capabilities are shortened.Graduates enter the “discomfort period”of relevant professional positions. Course assessment is based on the weighted average of class participation 40% and final term case analysis 60%.Marks for class participation will be determined by five parts --- students’in-class group presentation, group case discussion, and individual in-class question-answering, written assignment and class attendance.三、课程性质与教学目的《跨境电商基础(英)》是外国语学院为商务英语专业以及英语专业(国际商务管理方向)学生开设的专业选修课。
2011届英语专业毕业生论文跨文化方向选题汇总1.Culture Awareness in English Learning英语学习中的文化意识2.Features of Tourism English and Its Translation旅游英语的特点及其翻译3.Making Use of Resources on the Internet in English Study英语学习中网络资源的利用4.Body Language in English Teaching英语教学中的肢体语言5.On Translation of English Idioms英语习语的翻译6.Body Language and Nonverbal Communication肢体语言与非言语交际7.Interaction in Oral English Teaching and Learning英语口语教学中的互动8.On Developing English Reading Skills论英语阅读技能的培养9.Extracurricular Activities and English Learning课外活动与英语学习10.C ommunicative Approach and English Grammar Teaching交际法与英语语法教学11.C ulture Lead-in in Middle School English Teaching中学英语教学中的文化导入12.P sychological Factors in English Teaching at Middle School中学英语教学中的心理因素13.T he Differences of Family Values Between Chinese and Western Cultures中西文化间家庭价值观的差异14.T he Comparison of Chinese and Western Interpersonal Relationships中西人际关系的比较15.A View on the Differences Between Chinese and English Cultures with Regard toTaboos (or Etiquette)中英文化中关于禁忌语(或礼节)方面的差异之我见16.O n Bilingual Teaching in College Classroom试论大学课堂上的双语教学17.A Survey on Students’ Motivation of English Learning学生英语学习动机的调查报告18.C omparison of Euphemism in Wording of Sino-Western letters中西书信用语的委婉语比较19.中英电视广告中的非言语文化对比A Comparison of the Nonverbal Languagein English and Chinese Television Advertisement20.中英平面广告中的非言语文化对比A Comparison of the Nonverbal Languagein English and Chinese Print Advertisement21.非言语交际在中英商务谈判中的体现The Application of Nonverbal Languagein Sino-U.S. Business Negotiation22.中美价值观对商务谈判方式的影响The Influence of Different Values onSino-U.S. Business Negotiation23.浅析中英问候语的差异A Study on the Difference of Greeting Words in Englishand Chinese24.英文服饰广告在中国全球本土化可行性研究Feasibility of Glocalizing EnglishClothing and Accessories Advertisement in China25.英文奢侈品广告在中国全球本土化可行性研究Feasibility of GlocalizingEnglish Luxury Goods Advertisement in China26.英文化妆品广告在中国全球本土化可行性研究Feasibility of GlocalizingEnglish Cosmetics Advertisement in China27.从情景喜剧看中西青少年价值观的异同之处A Study on the Similarities andDifferences between Western and Chinese Teenagers from Sitcoms28.英文情景喜剧中幽默方式研究A Study on the Humor Style in English Sitcom29.从英文综艺节目看美国人的价值观A Study on the American Values in EnglishVariety Shows30.中英成语中的不同动物形象研究Similarities and differences in the CulturalConnotation of Animal Words in English and Chinese Idioms31.中英习语中的数字文化对比研究Similarities and Differences in the CulturalConnotation of Numbers in English and Chinese Idioms32.浅谈思维定势对英语学习的影响The Impact of Stereotype on English Learning33.中国学生在英语课堂上的小组活动的表现研究A Study on the Group WorkPerformance of Chinese Student in English class34.浅谈如何在英语课堂上提高中国学生的跨文化交际能力The Improvement ofChinese S tudents’ Cross-Cultural Communication Ability in English Class35.全球化背景下对中国大学生价值观取向的探讨The Value Orientation ofChinese College Student Under the Circumstances of Globalization36.从饮食文化看中西价值观的异同之处Similarities and Differences in theCultural Connotation of English and Chinese Food Culture37.从中国食物的英译看中国文化对英语国家的影响The Influence of ChineseCulture on English-speaking Countries from the Translation of Chinese Food38.文化差异与英语写作Cultural Difference and English Writing39.英语习语中的人名浅探Tentative analysis on names from English Idioms40.汉英回应赞美语策略差异及原因分析An Analysis on the Different ResponsiveStrategies Used by the Chinese and Westerners and the Reasons Concerned41.从文化差异看合作原则与礼貌原则On Cooperative Principle and PolitenessPrinciple on the Basis of Cultural Difference42.称赞语及其应答语的跨文化对比研究Contrastive Cross-Cultural Study ofCompliments and Compliment Responses43.谈跨文化交际中的文化现象Cultural Phenomena in Inter-cultureCommunications44.中西体态语差异的文化透析An analysis on body language conflict betweenChina and Western countries45.跨文化商务沟通中身势语的文化解读On Body Language in InterculturalBusiness Communication from a Cultural Perspective46.跨文化交际的有效策略Effective strategies for intercultural communication47.跨文化交际障碍产生的主要原因及对策On the Cause of InterculturalCommunicative Obstacles and Counter Measures48.跨文化交际中的中美价值观比较——小议集体主义与个人主义Comparison of Values between China and American in Cross-cultural Communication: Discussion on Collectivism and Individualism49.中英婚俗文化及差异Comparative Study of the Marriage Custom Differencebetween Chinese and British Culture50.身份和跨文化交际Identity in Cross-cultural Communication51.口译与跨文化意识Cross-cultural Awareness in Interpretation52.中西节日文化之比较The Comparison of Festival Cultures between China andWestern Countries53.论李安电影的中西文化认同On the Cultural Identity between Chinese andWestern in Ang Lee’s movies54.A Study on Culture Inputs in Integrated English Class 综合英语课堂上文化信息植入研究55.A Study on Culture Input in Listening Class for English Majors英语专业听力课上文化信息植入研究56.T he Fostering of Intercultural Awareness in Integrated English Class 综合英语教学中跨文化意识的培养57.T he Fostering of Intercultural Awareness in Oral Class for English Majors英语专业口语教学中跨文化意识的培养58.A n Analysis on the Presentation and Usage of Culture-related Information inIntegrated English Textbooks 综合英语课本文化信息表现方式与使用探讨59.A n Analysis on the Presentation and Usage of Culture-related Information inBusiness Textbooks商业类型课本文化信息表现方式与使用探讨60.A n Analysis on the Opening Paragraph of English Compositions Written byChinese Students 中国学生英语作文开篇手段分析61.A n Analysis on the Concluding Paragraph of English Compositions Written byChinese Students中国学生英语作文结尾手段分析62.A n Analysis on the Cultural Value Orientation Concerning Textbooks for EnglishMajors 英语专业课程教材中的文化价值取向63.A n Analysis on the Cultural Value Orientation Concerning TEM8 ReadingComprehension 英语专业八级考试中阅读理解题目的文化价值取向64.A n Exploration on English Majors Interpretation of Culture Presentation inEnglish Poems 英语专业学生对英语诗歌文化表象的解读探讨65.A n Exploration on English Majors Interpretation of Culture Presentation inEnglish Texts英语专业学生对英语课文中文化表象的解读探讨66.T he Comparison between the Reporting Strategies in Chinese Media and EnglishMedia中西新闻报道策略的比较67.T he Comparison on the Diction in Chinese News Repots and English NewsReport---A Case Study中英新闻中措词方式的个案研究68.T he Comparison on the Diction in Chinese News Headlines and EnglishHeadlines中英新闻中标题措词方式的研究69.A Discussion on the Presentation and Function of Chinese Elements in HollyFilms 好莱坞电影中的中国元素呈现与功能探讨70.A Discussion on the Presentation and Function of Chinese Characters in AmericanMovies 美国电影中的中国角色的呈现与功能探讨71.论中美日商务谈判中的跨文化交际因素A Study on the Intercultural FactorsAmong Chinese, American and Japanese Negotiation72.论跨文化广告翻译On Cross-cultural communication on AdvertisementTranslation73.从跨文化角度看中西广告特征及翻译Features and Translation of Western andChinese Ads from the Perspective of Cross-cultural Theory74.中英商务信函格式对比A comparative study on the format of Chinese andEnglish business letters75.中美广告的价值观对比A comparison on Ads between China and America values76.从《刮痧》看中西价值观差异On the Difference between Chinese and WesternValues in Guasha77.从《刮痧》看中西文化中的孝顺On the Cultural Difference about Filial Piety inGuasha78.论身势语在跨国企业的语用功能On the Pragmatic Function of Body Languagein Multinational Companies79.空间语言在商务谈判中的应用On the Application of Spatial Language inBusiness Negotiation80.英汉文化差异与误译Chinese and English Cultural Difference and Mistranslation81.英汉数字“一”的文化对比与翻译The Comparison and Translation of “One” inChinese and Western Culture82.中英文化差异对国际商务礼仪的影响The Influences of Chinese-BritishCultural Differences on International Business Protocol83.从集体主义和个人主义看国际商务谈判的文化差异Cultural Differences inInternational Business Negotiations: from the perspective of Collectivism and Individualism84.国际商务交流的文化障碍Cultural Barriers in International BusinessCommunication85.商务沟通中的文化休克现象:问题与对策Cultural Shock in BusinessCommunications and Its Countermeasures86.汉英称谓语中的文化差异Cultural Differences in Chinese and EnglishAddress Forms87.从跨文化角度谈汉英思维及表达方式的差异 A Cross-cultural Study onThinking Patterns and Expressing Modes of Chinese and English88.跨文化交际中英汉礼貌与面子 A Study On Politeness and “Face”inCross-cultural Communications89.商务信函中委婉语的跨文化研究 A Cross-cultural Study of Euphemisms inEnglish and Chinese Business Correspondence90.商务沟通中非言语交际的跨文化研究 A Cross-cultural Study of NonverbalCommunication in Business Context91.从广告用语看中西文化价值观的差异Chinese and Western Culture Values inAdvertising Language92.中美商务谈判中的文化冲突现象与应对策略Cultural Conflicts in Sino-U.S.Business Negotiation and Countermeasures93.英汉姓名的跨文化研究A Cross-cultural Study of English and Chinese Names94.中美商务谈判中的时空观的差异分析A Cross-cultural Study on Views of Timeand Space in Sino-U.S. Business Negotiations95.中西广告文化内涵比较分析A Comparison of Cultural Connotations in Chineseand English Advertisements96.从中英谚语看中西方的文化差异On Chinese and English Proverbs: from aCross-cultural Perspective。
vets实用英语交际职业技能等级考试中级模拟题二VETS Practical English Communication Skills Level Examination Intermediate Mock Test 21. IntroductionThe VETS Practical English Communication Skills Level Examination is designed to assess an individual's English language proficiency for effective communication in various professional contexts. In this article, we will explore a mock test for the intermediate level of the examination. The test will cover a range of communication skills necessary for success in a veterinary setting.2. Veterinary TerminologyOne of the essential aspects of communication in the veterinary field is the use of accurate and appropriate terminology. Veterinary professionals need to be able to communicate effectively with colleagues, clients, and other stakeholders. It is important to understand the correct terminology to describe different animal species, conditions, and treatments. Additionally, the ability to explain complex medical concepts in simple and understandable terms is crucial.3. Communicating with ColleaguesCollaboration and teamwork are essential in a veterinary practice. Effective communication with colleagues is vital for the smooth functioning of the workplace. In the VETS examination, candidates will be tested on their ability to engage in discussions, express opinions, and provide constructive feedback to their peers. They will be evaluated on their ability to listen actively, ask relevant questions, and contribute to the resolution of problems and conflicts.4. Communicating with ClientsVeterinary professionals often need to communicate with clients who may be worried, emotional, or confused about their pets' health. In this section of the examination, candidates will be assessed on their ability to demonstrate empathy, active listening, and clear communication. They should be able to provide information about diagnoses, treatment options, and preventative care, using language that is easily understood by clients with various levels of medical knowledge.5. Written CommunicationWritten communication skills are equally important in the veterinary field. Professionals need to be able to write clear and concise medical records, emails, reports, and other forms of written communication. Candidates in the VETS examination will be evaluated on their ability to convey information accurately, organize their thoughts logically, and use appropriate language and tone. They will also be assessed on their ability to effectively communicate through written instructions and guidelines.6. Handling Difficult SituationsIn the veterinary profession, professionals often encounter difficult and emotionally charged situations. The ability to handle such situations with professionalism and empathy is crucial. In this section of the examination, candidates will be tested on their ability to de-escalate conflicts, deliver bad news sensitively, and manage client expectations. They should be able to maintain composure, show empathy, and provide appropriate support and guidance to clients during challenging times.7. Cross-Cultural CommunicationIn today's globalized world, veterinary professionals may work with clients and colleagues from diverse cultural backgrounds. The ability to communicate effectively across cultures is a valuable skill. Candidates in the VETS examination will be assessed on their ability to adapt their communication style, show respect for cultural differences, and avoid miscommunication due to cultural misunderstandings. They should be able to navigate cultural nuances, customs, and expectations to build effective relationships.8. ConclusionThe VETS Practical English Communication Skills Level Examination at the intermediate level is designed to assess a candidate's ability to communicate effectively in a veterinary setting. The examination covers various aspects of communication, including veterinary terminology, collaboration with colleagues, interaction with clients, written communication, handling difficult situations, and cross-cultural communication. By demonstrating proficiency in these areas, candidates can showcase their ability to excel in the veterinary profession and provide high-quality care to animals and their owners.。
中考英语交通工具改进单选题50题1. We need to improve the ____ of our cars to reduce fuel consumption.A. speedB. performanceC. sizeD. color答案:B。
本题考查交通工具性能相关词汇。
选项A“speed”指速度;选项B“performance”有性能的意思,符合语境,强调汽车整体性能的提升以降低油耗;选项C“size”指尺寸;选项D“color”指颜色,均与降低油耗的性能改进无关。
2. The new technology can greatly enhance the ____ of the buses.A. safetyB. comfortC. beautyD. cost答案:A。
本题围绕交通工具性能改进。
选项A“safety”意为安全,新技术能提升公交车的安全性;选项B“comfort”指舒适;选项C“beauty”指美观;选项D“cost”指成本,而题干说的是新技术对公交车性能的提升,安全性能更符合。
3. To make the trains more efficient, we should focus on improving their ____.A. enginesC. seatsD. lights答案:A。
本题考查火车性能改进的重点。
选项A“engines”指引擎,改进引擎能使火车更高效;选项B“windows”指窗户;选项C“seats”指座位;选项D“lights”指灯光,这三个选项都不是影响火车效率的关键因素。
4. The improvement of the ____ can make the planes fly longer distances.A. wingsB. cabinsC. enginesD. pilots答案:C。
本题关于飞机性能改进。
选项A“wings”指机翼;选项B“cabin”指机舱;选项C“engines”指引擎,改进引擎能使飞机飞得更远;选项D“pilots”指飞行员,飞行员不是飞机能飞更远的直接改进因素。
军事英文军:Army;师:division;旅:brigade;团:regiment/corps;营:battalion;连:company;排:platoon;班:squad。
陆军Army一级上将General First上将General中将Lieutenant General少将Major General大校Senior Colonel上校Colonel中校Lieutenant Colonel少校Major上尉Captain中尉First Lieutenant少尉Second Lieutenant军事长Master Sergeant专业军士Specialist Sergeant上士Sergeant, First Class中士Sergeant下士Corporal上等兵Private, First Class列兵Private海军Navy一级上将Admiral, First Class上将Admiral中将Vice Admiral少将Rear Admiral大校Senior Captain上校Captain中校Commander少校Lieutenant Commander上尉Lieutenant中尉Lieutenant, Junior Grade少尉Ensign军事长Chief Petty Officer专业军士Specialist Petty Officer 上士Petty Officer, First Class中士Petty Officer, Second Class 下士Petty Officer, Third Class上等兵Seaman, First Class列兵Seaman, Second Class空军Air Force一级上将General, First Class上将General中将Lieutenant General少将Major General大校Senior Colonel上校Colonel中校Lieutenant Colonel少校Major上尉Captain中尉First Lieutenant少尉Second Lieutenant军事长Master Sergeant专业军士Specialist Sergeant上士Technical Sergeant中士Staff Sergeant下士Corporal上等兵Airman, First Class列兵Airman, Second Class军棋military chess工兵sapper排长platoon commander(中尉lieutenant)连长company commander ( 上尉captain )营长battalion commander (少校major)团长colonel(上校)旅长brigadier (准将)师长division commander军长army commander司令chief commander军旗army flag/ensign地雷landmine炸弹bomb行营field headquarter大本营supreme headquarter和平使命-2009: Peace Mission 2009联合军事演习: joint military drill, joint military exercise, joint military manoeuvre海军海上封锁: naval blockade,maritime blockade隔离作战演练: isolation drill两栖登陆: amphibious landing装备: hardware战舰: military vessel驱逐舰: destroyer护卫舰: frigate登陆艇: landing ship, landing craft潜艇: submarine猎潜艇: submarine hunter反潜舰: anti-submarine vessel海军舰队: naval fleet"沙波什尼科夫海军元帅"号大型反潜舰: submarine-hunting ship Marshall Shaposhnikov武装直升机: armed helicopter战斗机: battle plane轰炸机: bomber, cargo jets运输机: freighter远程预警机: long-range early warning aircraft反潜鱼雷: anti-sub torpedo深水炸弹: depth charge海陆空军: amphibious force水陆坦克: amphibious tank海军陆战队: marine corp炮兵: artillery空降部队: paratroop, airborne troop地面进攻: ground attack特种部队: special taskforce实弹: live ammunition滩头阵地: beachhead潜望镜periscope鱼雷torpedoes电动机鱼雷electric torpedo航空鱼雷aerial torpedo火箭助飞鱼雷rocket-assisted torpedo线导鱼雷wire-guided torpedo发射机transmitter自导控制组件self-directing unit装药和电子组件charge and electron unit待发装置actuator指令控制组件command control unit陀螺控制组件gyro-control unit电源控制组件power-supply control unit燃烧室combustor舵rudder推进器propeller潜艇submarine鱼雷舱torpedo room鱼雷发射管firing tube声纳sonar操纵线control wire 水雷submarine mine自航式水雷mobile mine锚雷mooring mine触发锚雷moored contact mine触角antenna雷索mine-mooring cable沉底水雷ground mine漂雷floating mine深水炸弹depth charge; depth bomb航空母舰aircraft carrier核动力航空母舰nuclear-powered aircraft 阻拦装置arrester飞行甲板flight deck雷达天线radar antenna导航室island舰桥bridge机库hangar升降机口aircraft lifts; elevators舰载机起飞弹射装置catapults油料舱fuel bunker弹药舱ammunition store贮存舱storage hold通信中心室communication center核反应堆nuclear reactor生活舱accommodation巡洋舰cruiser护卫舰escort vessel; frigate导弹护卫舰missile frigate战列舰battleship护卫艇corvette供应舰tender ship; depot ship舰队补给舰fleet depot ship海上补给船sea depot ship运输舰transport ship汽油运输船gasoline transport ship扫雷舰mine sweeping vessel扫雷艇minesweeper鱼雷艇torpedo boat导弹快艇missile speedboat导弹潜艇guided-missile submarine核动力潜艇nuclear-powered submarine 潜艇救护舰submarine lifeguard ship猎潜艇submarine chaser登陆舰landing ship坞式登陆舰dock landing ship电子侦察船electronic reconnaissance ship 情报收集船information-collecting ship测量船survey vessel调查船research ship打捞回收船salvage vessel核动力破冰船nuclear-powered icebreaker 气垫巡逻船patrol hovercraft导弹军导弹missiles洲际导弹intercontinental missile中程导弹mediurn-range missile巡航导弹cruise missile核弹头nuclearwerhead地对地导弹surface to-surface missile地对空导弹surface-to-air missile战略导弹: strategic missile舰对空导弹ship-to-air missile空对空导弹air-to-air missile空对地导弹air-to-surface missile反幅射导弹anti-radiation missile反舰导弹anti-ship missile反潜导弹anti-submarine missile自导鱼雷homing torpado弹翼missile wing减速伞drag parachute制导装置guidance device弹体guided missile doby固体火箭发动机solid propellant rocket尾翼tail fin飞行弹道trajectory发射制导装置launching guidance device 发射管launching tube反弹道导弹anti-ballistic missile集束炸弹bomb-cluster地下井missile silo移动式井盖sliding silo door火箭发射场rocket launching site发射塔launching tower勤务塔service tower陆军核武器nuclear weapons燃料库fuel depot; fuel reservoir指挥室command post通气道air vent; ventilation shaft多级火箭multistage rocket再入大气层飞行器re-entry vehicle原子弹atomic bomb氢弹hydrogen bomb引爆装置igniter 热核燃料fusionable material蘑菇状烟云mushroom cloud冲击波shock wave; blast wave放射性落下灰尘radioactive fallout核爆炸观测仪nuclear explosion observation device 辐射仪radiation gauge辐射级仪radiation level indicator钢珠弹bomb with steel balls; container bomb unit 化学炸弹chemical bomb主战坦克capital tank重型坦克heavy tank中型坦克medium tank轻型坦克light tank水陆两用坦克amphibious tank喷火坦克flame-throwing tank架桥坦克bridge tank扫雷坦克mine-sweeping tank坦克推土机tankdozer侦察坦克reconnaissance tank无炮塔坦克turretless tank坦克牵引车recovery tank坦克修理后送车repair-service tank反坦克障碍物anti-tank obstacle桩寨pile stockade鹿寨abatis反坦克断崖anti-tank ditch反坦克崖壁anti-tank precipice反坦克三角锥anti-tank pyramids炮手gunner坦克兵tank soldier炮口muzzle炮管barrel清烟器fume extractor炮塔turret瞄准镜gun sight发动机散热窗radiator grille备用油箱reserve fuel tank主动轮driving wheel遮护板shield负重轮loading wheel烟幕弹发射筒smoke bomb discharger诱导轮inducer空军low Earth orbit 近地轨道lunar module 登月舱lunar rover 月球车main landing field/ primary landing site 主着陆场manned space 载人航天计划manned space flight 载人航天manned spaceship/ spacecraft 载人飞船Milky Way 银河系multi-manned and multi-day spaceflight 多人多天太空飞行multistage rocket 多级火箭NASA(The National Aeronautics and Space Administration) 美国航空航天管理局nozzle of the main engine 主发动机喷嘴orbit 轨道orbit the earth 绕地球飞行orbital module 轨道舱emergency oxygen apparatus 应急供氧装置Experimental Spacecraft 试验太空船fine-tune orbit 调整轨道geosynchronous satellite 地球同步人造卫星hatch 舱口Hubble Space Telescope 哈勃太空望远镜International Space Station 国际空间站ladder 扶梯landing area 着陆区landing pad 着陆架launch a satellite 发射卫星launch pad 发射台life support system 生命维持系统LM-maneuvering rockets 登月舱机动火箭Long March II F carrier rocket 长征二号F运载火箭access flap 接口盖antenna 天线Apollo 阿波罗号宇宙飞船ascent stage 上升段astronaut 航天员capsule 太空舱carrier rocket 运载火箭rocket launcher 火箭发射装置;火箭发射器CAST(the Chinese Academy of Space Technology) 中国空间技术研究院CNSA(China National Space Administration)中国航天局command module 指令舱,指挥舱communication satellite 通信卫星descent stage 下降段directional antenna 定向天线outer space; deep space 外太空payload capability 有效载荷能力propelling module 推进舱recoverable satellite 返回式卫星re-entry module 返回舱remote sensing satellite 遥感卫星satellite in Sun-synchronous orbit 太阳同步轨道卫星second stage 第二级service module 服务舱Shenzhou VI spacecraft 神舟六号solar cell 太阳电池solar panel 太阳能电池板space elevator 太空升降舱space food 太空食物space outfits(space suits, gloves, boots, helmet etc.)太空服space physics exploration 空间物理探测space shuttle 航天飞机spacecraft 航天器Telstar 通讯卫星third stage 第三级unmanned spaceship / spacecraft 无人飞船weather satellite 气象卫星launch a satellite 发射卫星artificial satellite 人造卫星airliner 班机monoplane 单翼飞机glider 滑翔机trainer aircraft 教练机passenger plane 客机propeller-driven aircraft 螺旋桨飞机jet (aircraft) 喷射飞机amphibian 水陆两用飞机seaplane, hydroplane 水上飞机turbofan jet 涡轮风扇飞机turboprop 涡轮螺旋桨飞机turbojet 涡轮喷射飞机transport plane 运输机helicopter 直升机supersonic 超音速hypersonic 高超音速transonic 跨音速subsonic 亚音速Airbus 空中客车Boeing 波音Concord 协和Ilyusin 依柳辛McDonald-Douglas 麦道Trident 三叉戟Tupolev 图波列夫军事卫星military satellite侦察卫星reconnaissance satellite预警卫星early warning satellite电子侦察卫星electronic reconnaissance satellite导航卫星navigation satellite测地卫星geodesic satellite军用通讯卫星military communications satellite军用气象卫星military meteorological satellite卫星通信车satellite communications vehicle宇宙空间站space station警戒雷达warning radar引导雷达director radar制导雷达guidance radar目标指示雷达target radar测高雷达height finding radar三坐标雷达three-dimensional radar弹道导弹预警相控阵雷达ballistic missile early-warning phased-array radar导航雷达navigation radar机载截击雷达airborne intercept radar炮瞄雷达gun-pointing radar对空警戒雷达aircraft-warning radar航海雷达marine radar对海管戒雷达naval warning radar侦察雷达reconnaissance radar卫星通信天线satellite communication antena驱逐舰destroyer歼击机fighter plane; fighter空速管airspeed head; pilot tube陀螺gyroscope无线电罗盘radio compass平视显示机head-up display火箭弹射座椅ejector seat副翼aileron襟翼flap燃油箱fuel tank垂直尾翼tail fin; vertical stabilizer阻力伞舱drag parachute housing水平尾翼horizontal stabilizer液压油箱hydraulic oil container副油箱auxiliary fuel tank主起落架main landing gear机翼整体油箱integral wing tank机炮machine gun; cnnon进气道系统air-inlet system前起落架front landing gear空气数据计算机air-data computer迎角传感器angle of attack sensor进气口头锥air-inlet nose cone 战斗机combat aircraft截击机interceptor强击机attacker歼击轰炸机fighter-bomber轻型轰炸机light bomber战略轰炸机strategic bomber电子战机electronic fighter高速侦察机high-speed reconnaissance plane空中加油机tanker aircraft运输机transport plane; air-freighter水上飞机seaplane; hydroplane反潜巡逻机anti-submarine patrol aircraft教练机trainer aircraft; trainer垂直起落飞机vertical take-off and landing无尾飞机tailless aircraft隐形轰炸机stealth bomber可变翼机adjustable wing plane动力滑翔机power glider扫雷直升机mine-sweeping helicopter旋翼rotor机身fuselage抗扭螺旋桨anti-torque tail rotor航空炸弹aerobomblight water 轻水light water reactor (LWR) 轻水反应堆limited nuclear option 有限的核被选方案Long March 2E rocket with strap-on boosters [PRC] 长征二E捆绑火箭[中国]long-range ballistic missile (LRBM) 远程弹道导弹low earth orbit (LEO) 卫星低轨道;近地卫星low frequency (LF) 低频low level missile target drone 低空导弹目标声low-enriched uranium 低浓缩铀maneuverable reentry vehicle (MARV) 可操纵返航运载工具marine corps 登陆队;陆战队maritime rights 海洋权materials test reactor 物质试验反应堆material unaccounted-for (MUF) 材料损失Maverick air-to-surface missile [US] 小牛空对地导弹[美国] maximum range 最大射程measurement and control 测控mechanized 机械化mediate 调停medium-range ballistic missile (MRBM) 中程弹道导弹mid-course guidance 飞行中段制导military bloc 军事集团military hardware 武器装备military spending 军事开支; 军费military use 军用military-industrial complex (MIC) 军事工业复合体mine detector 探雷器minelaying machine; minelayer 布雷器mini-nuke 小型核武器missile fast attack craft 导弹快艇missile silo 导弹地下发射井mixed-oxide fuel 混氧燃料mobile formation 机动编队mobile missile 机动导弹moderator 减速器moon craft 月球探测机multilateral disarmament 多边裁军multinational technical means 多国技术手段multiple independently targeted re-entry vehicle (MIRV) 多弹头分导再入飞行器multiple protective shelter (MPS) 多重保护壳multiple reentry vehicle (MRV) 多弹头返航运载工具multiple rocket launcher (MRL) 多管火箭炮multiple-launcher rocket system 多管火箭系统multiple-tube rocket gun 多管火箭炮multiple-warhead missile 多弹头导弹multipolarity 多级化mutual non-aggression 互不侵犯mutual non-interference 互不干涉national defense 国防national security 国家安全national sovereignty 国家主权national technical means 国家技术手段natural uranium 天然铀naval aviation corps 海军航空兵部队naval space surveillance (NA VSPASUR) 海军空间监测NBC protective clothing 三防服near-site verification 近场核查negative security assurance 消极安全保证neutron 中子neutron bomb 中子弹no first use 不首先使用nominal weapon 低威力核武器(2万吨级以下)non-interference in each other's internal affairs 互不干涉内政non-nuclear weapon states (NNWS) 非核武器国家non-proliferation 不扩散non-proliferation policy 不扩散政策non-use assurance 不使用核武器保证nuclear air-burst 空中核爆炸nuclear attack submarine 核动力攻击潜艇nuclear deterrent 核威慑力量nuclear device 核装置nuclear doctrine 核条令nuclear fuel 核燃料nuclear fuel cycle capacities 核燃料循环容量nuclear proliferation 核扩散nuclear radiation 核辐射nuclear reactor 核反应堆nuclear stockpile 核武器储备nuclear testing 核试验nuclear weapon states (NWS) 核武器国nuclear weapon-free zone 无核区nuclear yield 核当量nuclear, biological, and chemical weapons/warfare (NBC) 核,生物和化学武器/战争off-line refueling 线外式加燃料off-site monitoring 远距离监视once-through fuel cycle (核)燃料单一循环on-line refueling 线内式加燃料on-site inspection (OSI) 实地核查;现场核查optimum height 最佳高度optimum security threshold 最适当安全门槛orbit 轨道outguessing regress (核打击决策)猜测循环over pressure 超压力over-the-horizon missile attack 超视距导弹攻击pace of proliferation 扩散步幅parameter 参数parity 均势pathfinder 航向指示器Patriot missile 爱国者导弹payload 有效荷载peaceful coexistence 和平共处peaceful nuclear explosion (PNE) 和平用途核爆炸peaceful use 和平利用penetration aids 突防用具perigee 近地点perimeter acquisition radar (PAR) 环形搜索雷达perimeter portal monitoring 进出口周边监视permissive action link 允许行动联系Perry-class guided missile frigate [US] 派里级导弹巡航舰[美国]phased-array radar 相位阵列雷达physical protection (of nuclear materials) 核物质保护pilotless target aircraft 无引行目标飞行器pin-point bombing; precision bombing 定点轰炸planned aggregate yield 计划总当量plutonium fuel cycle 钚燃料循环plutonium production reactor 钚生产反应堆plutonium-239 钚239plutonium-240 钚240point of impact 弹着点polar orbiting geophysical observatory (POGO) 极地轨道地球物理观测卫星polar space launch vehicle (PSLV) 极地空间发射器Polaris missile 北极星导弹Polaris submarine 北极星潜艇positive security assurance 积极安全保证; 肯定句安全保障power politics 强权政治power reactor 动力反应堆precision guided munitions (PGM) 精确导向武器Prithvi guided missile [India] 蟮氐嫉?[印度]production reactor 生产反应堆projectile 射弹propellant 火箭推进剂propelled rocket ascent mine (PRAM) 动力式火箭助生水雷proton 质子pursuit 追击radar cross-section 雷达有效区radar intelligence (RADINT) 雷达情报radar ocean reconnaissance satellite 雷达海洋侦察卫星radioisotope 放射性同位素radius of action 活动半径Rafale fighter[France] 飚风战斗机[法国]ramjet 冲压式喷气发动机range 距离; 射程range finder 测距仪rapprochement 解冻ratification 批准; 认可reactor core 反应堆芯reactor-grade plutonium 反应堆级钚reconnaissance 侦察recycled nuclear fuel 再生核燃料; 回收核燃料red fuming nitric acid (RFNA) 浓硝酸(发红烟硝酸)reduced blast (enhanced radiation) 弱冲击波(强辐射)reentry vehicle (RV) 重返大气层飞行器reflective particle tag (R&D by Sandia Lab) 发射粒子标签(Sandia 实验室研制)refueling (再) 加燃料regime 政体regional disarmament 区域裁军reliability (e.g., of nuclear weapons) 可靠性remotely-piloted vehicle 遥控飞行器remote sensing technology 遥感技术render-safe experiments 原始核装置拆卸的安全reprocessing (of plutonium) (钚)再处理research and development (R&D) 研究与发展research reactor 研究反应堆residual radiation 剩余(原子核) 辐射retaliation 报复ricin (WA) 蓖麻毒素rocket 火箭rocket engine 火箭发动机roll and yaw departure 侧滚脱离外加偏航脱离routine inspection 例行视察safeguarded facility 受保障监督的设施safeguards 保障监督satellite (space) launch vehicle 卫星发射器(空间运载火箭) satellite data system 卫星数据系统satellite defense 卫星防御satellite inspector system 卫星监视器系统sea cobra helicopter 海眼镜蛇直升飞机sea knight helicopter 海武士直升飞机sea stallion helicopter 海种马直升飞机second strike 核反击security dilemma 安全困境;安全两难security guarantees 安全保证self-defense 自卫semi-synchronous orbit 卫星半同步轨道sense and destroy armor (SADARM) 反装甲弹sensitive materials 敏感物质short-range attack missile 近程攻击导弹short-range ballistic missile (SRBM) 短程弹道导弹Shrike antiradar air-to-surface missile [USA] 百舌鸟空对地反雷达导弹[美国]Sidewinder air-to-air missile [US] 响尾蛇空对空导弹[美国] sighting device 瞄准器signals intelligence (SIGINT) 信号情报Silkworm missile series (short/medium-range coastal defense missile) 蚕式飞弹系列(近/中程海防飞弹)silo 发射井simulation (e.g., nuclear test) 模拟single integrated operational plan (SIOP) 统一攻击目标计划single-role mine hunter (SRMH) 单一任务猎雷舰smooth-bore gun 滑堂炮sortie 飞机架次sound surveillance system (SOSUS) 声响监测系统space-based 天基space-based interceptor 太空截击体space detection and tracking system (SPADATS) 空间探测与跟踪系统space mine 天雷special inspections 特别视察;专门视察spent fuel 乏燃料spent fuel rods 乏燃料棒spent fuel storage 乏燃料储存splash down ?q辅staphylococcal entotoxin 葡萄球菌毒素Sting missile [USA] 刺针飞弹[美国]stockpile 储存; 储备strategic forces 战略部队strategic nuclear weapon 战略核武器strategic offense 战略进攻strategy 战略Styx missile 冥河式导弹sub-kiloton weapon 亚千吨兵器submarine reactor 海底反应堆submarine-launched ballistic missile (SLBM) 潜艇发射的弹道导弹submarine-launched cruise missile (SLCM) 潜艇发射的巡航导弹super high frequency (SHF) 超高频superpowers 超级大国supersonic anti-ship missile 超音速反舰导弹supplier countries 供应国surface-to-air missile (SAM) 地对空导弹surface-to-surface missile (SSM) 地对地导弹synthetic aperture radar (SAR) 合成口径雷达tactical nuclear weapons (TNW) 战术核武器tactical operations center (TOC) 战术作战中心telemetry intelligence (TELINT) 遥测信息temper (原子弹)惰层terminal guidance 末端制导terrain contour matching (TERCOM) 地形轮廓匹配theater 战区theater nuclear forces 战区核武器部队thermal reactor 热核反应堆thermonuclear weapon 热核武器thorium 钍three principles of nuclear export 核出口三项原则throw-weight 发射重量Tbilisi aircraft carrier [USSR] 第比利斯号航空母舰[苏联] time-over-target (TOT) 抵达目标时间trajectory ?u?Dtransatmospheric vehicle 空中交通工具transceiver 透明度transparency 透明度transporter-erector-launcher (TEL) 运输-竖起-发射装置triad 三合一战略报复力量Trinitrotoluene (TNT) 三硝基甲苯tritium 氚turbojet engine 涡轮式喷气发动机ultra high frequency (UHF) 超高频ultralong wave 超长波ultrashort wave 超短波underground nuclear test 地下核试验unilateral disarmament 单边裁军universal multiple launcher (A V-LMU) 通用多重发射器unsymmetrical dimethyl-hydrazine (rocket fuel) 不对称二甲基肼(火箭燃料)upper-tier 高层uranium dioxide 二氧化铀uranium enrichment 铀浓缩uranium hexafluoride (UF6) 六氟化铀uranium mining and milling 铀矿开采与选矿uranium tetrafluoride (UF4) 四氟化铀uranium-233 铀233uranium-235 铀235uranium-238 四氟化铀user operational uation system (UOES) 铀233verification 铀235verification regime 铀238军事英语之枪械篇.38 Special revolver 三八左轮枪9 mm pistol 九0手枪AA T (Arme Automatique Transformable) 通用机枪Accelerator 枪机加速器Accuracy 准确度Accuralize 准确化Accurize: 精准化. 使枪械更精确.ACOG (Advanced Combat Optical Gunsight) 先进光学战斗瞄准具ACP (Automatic Colt Pistol) 柯尔特自动手枪弹ACP: Automatic Colt Pistol, 柯尔特自动手枪子弹.Action shooting 战斗射击Action 枪机Action: 枪机。
A Survey of Inter-Vehicle CommunicationJun Luo Jean-Pierre HubauxSchool of Computer and Communication SciencesEPFL,CH-1015Lausanne,SwitzerlandTechnical Report IC/2004/24AbstractAs a component of the intelligent transportation system(ITS)and one of the concrete applications of mobile ad hoc networks,inter-vehicle communication(IVC)has attractedresearch attention from both the academia and industry of,notably,US,EU,and Japan.The most important feature of IVC is its ability to extend the horizon of drivers andon-board devices(e.g.,radar or sensors)and,thus,to improve road traffic safety andefficiency.This paper surveys IVC with respect to key enabling technologies rangingfrom physical radio frequency to group communication primitives and security issues.The mobility models used to evaluate the feasibility of these technologies are also brieflydescribed.We focus on the discussion of various MAC protocols that seem to be indis-pensable components in the network protocol stack of IVC.By analyzing the applicationrequirements and the protocols built upon the MAC layer to meet these requirements,wealso advocate our perspective that ad hoc routing protocols and group communicationprimitives migrated from wired networks might not be an efficient way to support theenvisioned applications,and that new coordination algorithms directly based on MACcould be designed for this purpose.1IntroductionInter-vehicle communication(IVC),on one hand,is an important component of the intelligent transportation system(ITS)architecture.It enables a driver(or its vehicle)to communicate with other drivers(or their vehicles)that locate out of the range of line of sight(LOS)(or even out of the radio range if a multihop network is built among several vehicles).As a result, information gathered through IVC can help improve the road traffic safety and efficiency. On the other hand,moving vehicles equipped with communication devices form exactly an instance of long envisioned mobile ad hoc networks[25].Benefiting from the large capacities (in terms of both space and power)of vehicles,the nodes of these networks can have long transmission ranges and virtually unlimited lifetimes.Also,many existing protocols designedfor ad hoc networks and experiences learned from related researches can be applied,such that results staying so far in academia are put into practice.One of the earliest studies on IVC was started by JSK(Association of Electronic Tech-nology for Automobile Traffic and Driving)of Japan in the ter,well-known research results on platooning1have been demonstrated by California PATH[13]and Chauf-feur of EU[12].The cooperative driving systems of Japan in the late1990s and2000(e.g., DEMO2000[33])exhibit another set of important applications of IVC.A related topic is adaptive cruise control(ACC).Traditional solutions to this issue involve mainly automatic control systems for individual vehicles[34],but IVC can help to make the coordination more efficient.Recently,the transmission of information about incidents,emergencies,or conges-tion from(a)preceding vehicle(s)to vehicles following behind also became an important application of IVC(e.g.,[24]).The newly initiated European Project CarTALK2000[26] tries to cover problems related to safe and comfortable driving based on IVC.It focuses on the design,test and evaluation of co-operative driver assistance systems by taking into account both IVC and road-to-vehicle communication(RVC),where RVC is used to provide vehicles with access tofixed networks[23].CarTALK2000also co-operates with other projects like German FleetNet[9]for the development of IVC.The main applications of IVC,as summarized by[26],can be roughly categorized into three classes:•Information and warning functions:Dissemination of road information(including incidents,congestion,surface condition,etc.)to vehicles distant from the subjected site.•Communication-based longitudinal control:Exploiting the“look-through”capa-bility of IVC to help avoiding accidents and platooning vehicles for improving road capacity.•Co-operative assistance systems:Coordinating vehicles at critical points such as blind crossings(a crossing without light control)and highway entries.There are also“added value”applications,such as location-based services and multiplayer games.Considering the tight coupling between a specific application and its supporting mech-anisms,we will not devote a section to describe applications,we rather mention applications when their enabling mechanisms are discussed instead.The remainder of this paper is structured as follows.Section2discusses the radio bands used in IVC physical layer.Section3details various proposals for IVC MAC.Section4 presents several routing protocols dedicated to IVC.Section5overviews application of group 1Platooning is by definition the technique of coupling two or more vehicles together electronically to form a train.This means that the total headway for vehicles going in the same direction could be reduced,and the capacity of the road would consequently be increased.communication in IVC.Section6discusses security issues.Section7briefly describes different mobility models used in IVC simulations.Finally,Section8concludes the paper.2Radio Frequency SpectrumIn this section,we discuss the frequency spectra used by different IVC systems rather than the technical issues such as the antenna and modulation in physical layer.As the media for the IVC,both infrared and radio waves have been studied and employed for experimental systems.The radio waves include VHF,micro,and millimeter waves.The communication with infrared and millimeter waves are within the range of LOS and usually directional,whereas those with VHF and microwaves are of broadcast type.Although VHF waves such as220MHz band have been used because of their long communication distance, the mainstream nowadays is microwaves.The dedicated short range communication(DSRC) in US,allocated by FCC,spans over75MHz of spectrum in the5.9GHz band.In Japan,5.8 GHz DSRC was used by DEMO2000and60GHz millimeter wave has been tested to evaluate its performance under the hidden terminal situation.In Europe,Chauffeur chose2.4GHz at the beginning;it changed also to5.8GHz later.CarTALK/FleetNet chose UTRA TDD because of the availability of an unlicensed frequency band at2010–2020MHz in Europe.It is worth to note that infrared,in spite of its various drawbacks,has been adopted by most projects including JSK,PATH,and CarTALK,typically for co-operative driving.3MAC/PHY Layer:(W)LAN vs.3GCurrently,there are two main approaches in developing wireless MAC for IVC.They differ in the adopted radio interface.One approach is based on existing wireless LAN physical layers,such as the one of IEEE802.11or Bluetooth.An alternative approach is to extend3G cellular technology,i.e.,CDMA,for decentralized access.The advantage of thefirst approach is its inherent support for distributed coordination in ad hoc mode,but theflexibility of radio resource assignment and of transmission rate control is low.On the contrary,3G extensions have the potential of high granularity for data transmission andflexible assignment of radio resources due to the CDMA component,but suffer from the complexity of designing coordination function in ad hoc mode.We now discuss these two approaches separately.3.1WLAN ExtensionAlthough it is possible to directly use WLAN standards for RVC[23],the outcome might not be satisfactory for IVC since,for example,these mechanisms are designed without having mo-bility in mind.Migrating a WLAN technology for vehicular applications requires development in the following areas:a.Resistance to potentially more severe multipath effectsb.Time synchronization between nodes susceptible to move rapidlyc.Distributed resource allocation in a network of highly dynamic topology.While a)and b)depend much on the development of hardware and proper physical layer, there are proposals that tried to solve c)and d)solely within the MAC layer.We hereafter discuss several proposals that inherit certain parts of the existing standards but try to solve some aforementioned aspect(s)by adding new features.Lee et al.[16]from PATH suggest the use of a token ring protocol similar to IEEE802.4 to solve the contention of radio resources.The protocol includes the mechanism to construct, recovery,join,and leave a ring,as well as the token circulation,recovery and multiple token resolution in the ring.Although this protocol is claimed to be adaptive to dynamic topology and rely only on the physical layer of IEEE802.11,the performance evaluations did not take mobility into account and the protocol evaluated is implemented on top of IEEE801.11DCF. Therefore,convincing proof would be necessary to show that this protocol is suitable for IVC.Katragadda et al.[15]propose a Location-based Channel Access(LCA)protocol.As-suming the availability of location-aware devices with each node,the LCA protocol divides a geographical area into cellular structure with each cell having a unique channel associated with it.Within a given cell,any multiple access schemes,including CSMA,CDMA,and TDMA,can be used.In this sense,LCA is not simply an extension of WLAN.Considering the similarity between LCA and the spatial division multiple access(SDMA)in traditional cellular networks,a doubt may be raised about the protocol’s adaptability to high mobility scenarios like in IVC.There are other proposals based on some traditional LAN technologies such as the non-or p-persistent CSMA used by DOLPHIN[32].The contribution of this work is to show that the non-persistent CSMA outperforms the p-persistent one regarding packet loss in those cases usually involved in IVC.As a result,the non-persistent CSMA is adopted as the IVC protocol of the DEMO2000co-operative driving[33].Numerous proposals are concerned with modifying IEEE802.11for some specific case(s). We do not discuss them here due to their minor significance to IVC.3.23G ExtensionIt is impossible to directly apply3G technologies,because they are designed for cellular networks,which are inherently centralized.The following problems have to be addressed in order to extend3G technologies for IVC:a.Distributed radio resource managementb.Power control algorithmsc.Time synchronizationAll these problems are due to the absence of centralized infrastructure.Therefore,the solution should rely on distributed media access control.Many proposals suggest to use Reservation ALOHA(R-ALOHA)for distributed chan-nel assignment.R-ALOHA has higher throughput than slotted-ALOHA,since a node that catches a slots can use it in subsequent frames as long as it has packets to send.However, there are two problems to be solved in order to make traditional R-ALOHA work for IVC. On one hand,R-ALOHA has a potential risk of instability in the case of many participating nodes and frequent reservation attempts due to short packet trains.Lott et al.[17]solve this problem by letting every node reserve a small part of transmit capacity permanently even if it has no packets to send.This results in a circuit-switched broadcast connection primarily used for signaling purposes.The time synchronization is built upon the information from GPS and additional synchronization sequence in parallel to data transmission.Further system evalua-tion under high node mobility can be found in[27].On the other hand,traditional R-ALOHA needs a broadcast environment for all nodes to receive all the transmitted signals and,most important,to get the status information of slots.Since IVC suffers from the hidden terminal problem,destructive interference with already established channels can occur and accessing nodes have no idea about the outcome of their transmission.To overcome these problems, Borgonovo et al.[4]are currently studying a new protocol,named Reliable R-ALOHA(or RR-ALOHA).This protocol transmits additional information to let all nodes be aware of the status of each slot,thus safely allows the same reservation procedure of R-ALOHA to happen in IVC.The two-hop relaying that propagates the status information is very similar to what is used in ad hoc routing to let a node know the neighbor information of its neighbors.However, since this work is very recent and is still under study,nofield test or simulation results are reported,leading to the question about its performance under high mobility networks.Both protocols are based on UTRA TDD,which is chosen by CarTALK/FleetNet as the target system.Several MAC protocols for ad hoc networks combine CDMA with random channel access (e.g.,[29]).These protocols usually start their transmission immediately,irrespectively of the state of the channel.Under appropriate code assignment and spreading-code schemes, primary collisions(i.e.,two nodes with the same code try to access the channel together)can be avoided.However,Muqattash and Krunz[21]pointed out that RA-CDMA(random access CDMA)suffers from multi-access interference(MAI),resulting in secondary collisions(also known as near-far problem in the literature)at a receiver.As a consequence,CA-CDMA[21] uses a modified RTS/CTS reservation mechanism.The channel is split into control and data channels.RTS/CTS is transferred over control channels to let all potentially interfering nodes be aware of the channel status.In contrast to IEEE802.11,interfering nodes may be allowed to transmit concurrently depending on some criteria.The protocol also exploits knowledge of the power levels of the overheard RTS/CTS to perform power control that intends toalleviate near-far problem.According to the simulation results(especially the comparison between CA-CDMA and IEEE802.11),this protocol is a quite promising MAC for ad hoc networks,but simulations(or evenfield tests)that take mobility into account are necessary to justify its deployment in IVC.Summary Although a number of MAC protocols have been proposed,more efforts will be needed to put them into practice.Currently,IEEE802.11b is still the one used for demonstration[10],and IEEE802.11a is chosen by ASTM(American Society for Testing and Materials)to be the basis for its standard of DSRC[1].However,the MAC protocol based on UTRA TDD,promoted by CarTALK,could be another promising solution for IVC(at least in the EU).4Network Layer:The Role of Location AwarenessAlmost all unicast routing protocols proposed for IVC are position-based.Basically,any existing position-based routing protocol for ad hoc networks[30]can be applied to IVC, but the protocols can be optimized by taking into account the special features of vehicles. For example,GPS,Geographic Information System(GIS),and digital map can help a node to be aware of its location and the surrounding,like road topology.Since the road topology somewhat implies the network topology in IVC,this knowledge does help to make the routing protocol more efficient[31,7].Furthermore,one of the most recent results on position-based routing[11]proposes a forwarding scheme avoiding the need of beacons for improved efficiency. One of the real implementations,demonstrated by FleetNet[10](or see[20]),has not exploited these special features of vehicles yet.Their protocol behaves like a reactive routing protocol by requesting the location of a destination when sending a packet.Then greedy geographical forwarding is used to forward packets.We also notice that most people try to solve the problem of unicast routing just because“it is challenging in ad hoc networks”.Actually,by looking at those applications mentioned in Section1(which involve almost group-oriented rather than pairwise communications),we are really wondering if unicast routing still has the same significance as in“general”ad hoc networks.The application of broadcast is usually to disseminate traffic information.Most literatures suggest scoped-flooding for broadcasting.Thanks to the peculiarity of this application,certain optimizations can be applied.For example,Wischhof et al.[35]adaptively change the inter-transmission interval according to the significance of the event conveyed by the message in transmission,while Briesemeister et al.[6]use a randomized interval.If the locations of vehicles are again taken into consideration,a multiresolution data structure can be used to express information in the message[19].The intuition here is that the further a vehicle is from the event,the less detail it needs.Summary Considering the application requirements for IVC,broadcast routing that dis-seminates information to a set of nodes that could be far from each other seems to be a necessary supporting mechanism;it could be optimized according the requirement of an ap-plication.On the contrary,unicast routing might be superfluous in most cases.5Group Communication:Promising but Unattended AreaAlthough two of the main applications of IVC,namely platooning and co-operative driving, imply the need of group communication,researchers seldom pay attention to this area.While broadcast protocols mentioned in the previous section perform group-oriented information dissemination,group communication primitives would still be welcome for IVC,because re-liability could be important in certain critical situations.We hereby overview a few related works and try to envision some potential research aspects.Briesemeister[5]suggests reducing the group membership service to the local environment of a node,due to the impossibility result of primary-component group membership in asyn-chronous systems with crash failures(which is the situation with IVC).The localized group membership service(LGMS)only tracks the membership of neighbors and installs a local view at each node.Obviously,the views of different nodes differ from each other.Although LGMS provides an interesting solution to the problem that the author aims at,i.e.,congestion area detection,its weak properties(e.g.,no agreement on the membership)make it hard to apply to a broad context.Actually,this service does not support any functions with a reliability requirement due to the lack of global view of the group.Gorman[22]raises a very interesting problem about coordinating vehicles at a blind cross-ing,which he terms4way stop(4WS)problem,and tries to apply group communication to perform coordination functions.While the problem itself is intriguing since it is an important aspect of co-operative driving,the proposed solution may not be adequate.It is not clear whether all the properties mentioned in the thesis,which are direct migrations from tradition group communication system,could work in IVC environment.People from the theoretical research area of distributed computing also notice the impor-tance of applying group communication in IVC.Meier and Cahill[18]proposed an event-based middleware to support group oriented applications.They focus on small groups that are ap-parently abstracted from scenarios in IVC2.However,the underlying membership service that attempts to locate all nodes in a given geographical area is a bit costly(in terms of commu-nication consumption),and it is not clear if applications really need this kind of membership service.Baehni et al.[2]consider the problem of sharing certain resources among a group of vehicles.They propose an algorithm that solves the problem in a synchronous model.Their another important contribution is to prove the impossibility of achieving fairness and concur-rency at the same time as well as the impossibility of solving the problem in an asynchronous 2Unfortunately,they implement their experiments only in a RVC scenario.model.Summary Group communication is definitely an important component of IVC,but it has seldom been touched.The experiences from existing proposals show that potential design considerations could include:(i)building the system directly upon the MAC layer and(ii) tracking membership in a more lightweight way than a global tracking.6Security:An Emerging Research TopicSecurity of IVC has been ignored so far by the research community.The only publication we couldfind is by El Zarki et al.[36].The paper proposes a system called DAHNI(Driver Ad Hoc Networking Infrastructure),to be mounted(in the long run)on each vehicle.DAHNI includes both processing and wireless communication facilities,allowing each car to constitute a local communication area around itself.In this way,each car can exchange vital signs with the neighboring vehicles.The authors discuss the security implications of such a solution.One of their conclusions is a bit surprising:they mention that no confidentiality is needed,thereby neglecting the tremendous privacy concerns that such a solution is likely to raise.They mention that no key distribution is necessary,which is true for the scenarios they consider;but if vehicles need to securely estimate the distance between them,the establishment of symmetric keys is required.Recently,we have shown that the wireless identification of vehicles is likely to rely more and more on electronic licence plates[14].We have identified the attacks against such a scheme, including those against the privacy of vehicle drivers;we have sketched appropriate techniques to thwart them.We have shown that this principle enables fundamental mechanisms such as location verification;it also supports secure distance estimation.Finally,we have explained how these mechanisms can support cooperative driving.7Mobility Model:Basis of Protocol SimulationThe mobility pattern underlying an inter-vehicle network is quite different from the“random waypoint”model that is intensively used for ad hoc network simulations.Fortunately,re-searchers of applied mathematics have already proposed many tools for traffic modeling(e.g., [3]provides a survey of these approaches),which can be used to extend network simulators such as ns-2and GloMoSim.Note that the simulations for MAC protocols of IVC should also take mobility into account[27],which is not necessarily the case for traditional MAC protocol(even wireless MAC like IEEE802.11).Usually,mathematical modeling for traffic can be classified into three categories[3],ac-cording to the phenomenological observation of the system:(i)microscopic modeling,(ii) statistical description,and(iii)macroscopic description.We are not going to give detailsabout each method,but rather provide examples where certain protocols are simulated.Mi-croscopic modeling is suitable for simulating group communications,because the applications of these protocols are often concerned with local behaviors of vehicles.For example,Briese-meister applies a microscopic model in her thesis[5],which describes the velocity and position of each vehicle at a given time.Many other papers discussing routing protocols use macro-scopic model where the mobility pattern is defined by four parameters:average vehicle speed v in m/s,traffic densityρin vehicles/km,trafficflow q in vehicles/s,and net time gapτin ually,assumptions are made on two of them since the other two can be calculated subsequently.For example,Rudack et al.[28]assume a v of normal distribution and aτof exponential distribution,while Briesemeister et al.[6]assign uniform distribution for both v andρ.All the aforementioned models deal with one-dimensional cases,but the real mobility pattern of vehicle is in a two(even three)dimensional space.To this purpose,the cellular automaton approach[8],combined with road patterns created based on certain maps,is adopted by FleetNet to simulate their Self-Organizing Traffic Information System(SOTIS) [35].This approach is based on Markov chain theory to emulate the vehicles’behavior at a cross road.Summary The application context has to be taken into account when choosing a mobility model to evaluate certain protocols.8ConclusionVarious aspects of IVC are surveyed in this paper.The paper shows that the design of communication protocols in the framework of IVC is extremely challenging due to the variety of application requirements and the tight coupling between an application and its supporting protocols.Most existing proposals are concerned with MAC and routing protocols.While MAC is definitely an important component of the IVC protocol stack,we are not convinced that routing protocols are necessary in most cases,as they are supposed to be in general ad hoc networks.In many situations,especially those related to co-operative driving,local but distributed coordination functions sitting directly upon MAC would be more efficient solutions.In addition,since vehicles will get more“smart”,partially due to the installation of IVC systems,security and privacy are becoming new concerns that both academia and industry should pay attention to.Finally,mathematical models for road traffic are important tools in developing IVC systems,because simulations are still necessary in testing large scale communication systems.References[1]ASTM E22123-02.Telecommunications and information exchange between roadside andvehicle systems.In ASTM International,2001..[2]S.Baehni,R.Baldoni,B.Pochon,and R.Guerraoui.The driving philosophers.TechnicalReport IC/2004/15,EPFL,2004.[3]N.Bellomo and M.Delitala.On the mathematical theory of vehicular trafficflow I:Fluiddynamic and kinetic modelling.Mathematical Models and Methods in Applied Sciences, 12(2):1801–1843,2002.[4]F.Borgonovo,A.Capone,M.Cesana,and L.Fratta.ADHOC MAC:A new,flexibleand reliable MAC architecture for ad-hoc networks.In Proc.of IEEE Wireless Commu-nications and Networking Conference(WCNC’03),2003.[5]L.Briesemeister.Group membership and communication in highly mobile ad hoc net-works.PhD thesis,School of Electrical Engineering and Computer Science,Technical University of Berlin,2001.[6]L.Briesemeister,L.Schafers,and G.Hommel.Deissemination messages among highlymobile hosts bsed on inter-vehicle communication.In Proc.of IEEE Intelligent Vehicle Symposium(IV’00),2000.[7]A.Cheng and K.Rajan.A digital map/GPS based routing and addressing scheme forwireless ad hoc networks.In Proc.of IEEE Intelligent Vehicle Symposium(IV’03),2003.[8]B.Chopard,P.O.Luthi,and P.-A.Queloz.Cellular automata model of car traffic ina two-dimensional street network.Journal of Physics A:Mathematical and General,29(10):2325–2336,1996.[9]W.Franz,R.Eberhardt,and T.Luckenbach.Fleetnet-internet on the road.InProc.of the8th World Congress on Intelligent Transportation Systems(ITS’01),2001.http://www.fleetnet.de.[10]H.Fubler,H.Hartenstein,W.Franz,W.Enkelmann,M.Moske,and C.Wagner.TheF leetnet demonstrator.In Demos of the9th ACM/IEEE international conference onMobile Computing and Networking(MobiCom’03),2003.[11]H.Fubler,J.Widmer,M.Kasemann,M.Mauve,and H.Hartenstein.Contention-basedforwarding for mobile ad-hoc networks.Elsevier’s Ad-Hoc Networks,1(4):351–369,2003.[12]O.Gehring and H.Fritz.Practical results of a longitudinal control concept for truckplatooning with vehicle to vehicle communication.In Proc.of the1st IEEE Conference on Intelligent Transportation System(ITSC’97),pages117–122,1997.[13]J.K.Hedrick,M.Tomizuka,and P.Varaiya.Control issues in automated highway sys-tems.IEEE Control Systems Magazine,14(6):21–32,1994.[14]J.-P.Hubaux,S.ˇCapkun,and J.Luo.The security and privacy of smart vehicles.IEEESecurity&Privacy Magazine,2(3),2004.[15]S.Katragadda,G.Murthy,R.Rao,M.Kumar,and R.Sachin.A decentralized location-based channel access protocol for inter-vehicle communication.In Proc.of the57th IEEE Semiannual Vehicular Technology Conference(VTC’03Spring),2003.[16]D.Lee,R.Attias,A.Puri,R.Sengupta,S.Tripakis,and P.Varaiya.A wireless tokenring protocol for intelligent transportation systems.In Proc.of the IEEE Intelligent Transportation System Conference(ITSC’01),2001.[17]M.Lott,R.Halfmann,E.Schulz,and M.Radimirsch.Medium access and radio re-source management for ad hoc networks based on UTRA TDD.In Proc.of the2nd ACM/SIGMOBILE Symposium on Mobile Ad Hoc Networking&Computing(Mobi-Hoc’01),2001.[18]R.Meier and V.Cahill.Exploiting proximity in event-based middleware for collaborativemobile applications.In Proc.of the4th IFIP International Conference on Distributed Applications and Interoperable Systems(DAIS’03),LNCS2893,2003.[19]L.B.Michael.Adaptive layered data structure for inter-vehicle communciation in ad-hoccommuncation networks.In Proc.of the8th World Congress on Intelligent Transporta-tion Systems(ITS’01),2001.[20]M.Moske.Real-world evaluation of a vehicular ad hoc network using position-basedrouting.Master’s thesis,Department of Computer Science,University of Mannheim, 2003.[21]A.Muqattash and M.Krunz.CDMA-based MAC protocol for wireless ad hoc networks.In Proc.of the4nd ACM/SIGMOBILE Symposium on Mobile Ad Hoc Networking& Computing(MobiHoc’03),2003.[22]Eoin O’ing group communication to support inter-vehicle coordination.Mas-ter’s thesis,Department of Computer Science,University of Dublin,2002.[23]J.Ott and D.Kutscher.Drive-thru Internet:IEEE802.11for“Automobile”users.InProc.of the23rd IEEE INFOCOM,2004.[24]C.Passmann,C.Brenzel,and R.Meschenmoser.Wireless vehicle to vehicle warningsystem.In SAE2000World Congress,2002.[25]C.Perkins,editor.Ad hoc networking.Addison-Wesley,2001.。