ID |
原文 |
译文 |
17455 |
面向6G的物联网网络需要允许大量设备接入并支持海量数据传输,其鲁棒性和可扩展性至关重要。 |
As massive access and explosive data transmission are expected, the robustness and scalability are two key aspects for 6G IoT networks. |
17456 |
在物联网中,所述“事物”(用户)可以通过采用各种多功能无线传感器实时收集环境数据。 |
In IoT networks, the said“things” (users) can collect environmental data in real time by adopting various multi-functional wirelesssensors. |
17457 |
通常来说,收集的数据将反馈到中央单元以进行进一步处理。 |
Conventionally, the collected data are feedback to a central unit for further processing. |
17458 |
但是这一机制依赖于中央单元的正常工作,鲁棒性较差。 |
However, the performance of this scheme relies on the normal operation of the central unit, which is not robust to the malfunction of central unit. |
17459 |
该文提出一种分布式译码算法,该算法通过让各用户之间互相协作,交换信息来实现在各个用户处完成译码。 |
This paper proposes a distributed decoding algorithm that the decoding is done atlocal users by enabling the cooperation and information exchange between users. |
17460 |
利用分布式译码算法,每个用户可以得到与中心化处理相似的译码性能,从而提高了网络的鲁棒性和可扩展性。 |
As a result, each user achievesa decoding performance similar to that of the centralized approach which improves the robustness and thescalability of the network. |
17461 |
同时,相比传统分布式译码算法,该算法不需要每个用户了解网络的拓扑结构,因此为面向6G的高动态物联网提供了技术支撑。 |
Meanwhile, compared to the conventional distributed decoding approach, theproposed algorithm does not require that each user has the perfect knowledge of the network topology.Therefore, the proposed algorithm lays the foundation of 6G IoT networks. |
17462 |
随着网络安全技术的发展,越来越多网络安全协议出现,因此需要网络转发设备对网络安全协议提供支持。 |
With the development of network security technology, network security protocol emerges one by one,which requires functional support from network forwarding devices. |
17463 |
可编程数据平面由于其协议的无关性,能够实现安全协议的快速部署。 |
Due to the independence of protocols, theprogrammable data plane enables rapid deployment of security protocols. |
17464 |
但当前可编程数据平面存在包头多次解析、独占数据平面和密码算法实现难的问题。 |
However, the current programmabledata plane has the problem that the header is parsed multiple times, the exclusive data plane and thecryptographic algorithm are difficult to implement. |