Software Defined Radio: The Software Communications Architecture

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvp

The Software Communications Architecture (SCA) establishes an implementation-independent framework for the development of Joint Tactical Radio System software configurable radios. It specifies the Operating Environment, services and interfaces that applications use.

Software Defined Radio: The Software Communications Architecture focuses on the issues and benefits associated with developing a radio system in compliance with the SCA specification. This book provides a comprehensive, practical introduction to building a SCA-compliant system taking the reader through the historical and conceptual background to help filling in the gaps between the intent of the SCA specification and the practice.

Key features:
*Presents a practical approach to the Software Communications Architecture
*Provides an example-oriented understanding of the usage of the SCA and thus allows the reader to extend the concepts and practice to more complicated multi-processor distributed environments.
*Covers the Operating Environment: a Core framework, CORBA middleware, POSIX operating systems and Domain profiles.
*Features an accompanying website with appendices, and links to further information on the SCA.

This invaluable reference will provide applications programmers, designers, professional researchers, wireless manufacturers and operators with an indispensable guide to the Software Communications Architecture. Advanced undergraduate and postgraduate students on mobile and wireless communications courses will also find this to be an excellent guide to the topic.


http://rapidshare.com/files/35455744/0470865180.zip
http://depositfiles.com/files/983151
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Acknowledgments xv Foreword xvii Preface xix Audience xix Scope xx Conventions Used in this Book xx Source Code xx Terminology xxi Unified Modeline Language (UML) xxi Organization xxi Additional Material and Author Contact xxi PART I The Operating Environment (OE) 1 1 Introduction 3 1.1 Software Radios 3 1.1.1 Software Radio Aspects 4 1.2 The Software Communications Architecture 6 1.2.1 The Evolution of the SCA 6 1.2.2 What is the SCA? 9 1.2.3 Common SCA Perceptions 9 1.2.4 Why Use the SCA? 11 1.3 The Operating Environment 13 1.3.1 Conceptual Organization 14 1.3.2 OE Interface Constraints 14 1.4 The SCA Specification Structure 16 1.5 Summary 19 2 Operational Scenarios 21 2.1 Startup 22 2.2 Shutdown 26 2.3 Application (Un)Installation 28 2.4 Instantiate Application 30 2.5 Control Application 32 2.6 System Configuration 34 3 General Requirements and Services 37 3.1 Non-Functional Requirements 37 3.1.1 General Requirements 38 3.1.2 General Software Rules 39 3.1.3 Hardware Architecture Requirements 39 3.1.4 Interface Organization 40 3.2 Name Service 42 3.3 Event Service 44 3.3.1 Event Types 46 3.4 Log Service 47 3.4.1 Data Types 48 3.4.2 Exceptions 48 3.4.3 Types 50 3.4.4 LogStatus Operations 54 3.4.5 LogAdministrator Operations 56 3.4.6 LogProducer Operations 58 3.4.7 LogConsumer Operations 61 3.5 FileSystem 63 3.5.1 Exceptions 64 3.5.2 Types and Constants 64 3.5.3 Types 66 3.5.4 Operations 67 3.6 File 75 3.6.1 Exceptions 76 3.6.2 Attributes 77 3.6.3 Operations 78 4 Foundation Interfaces and Data Types 83 4.1 TestableObject 83 4.1.1 Exceptions 83 4.1.2 Operations 84 4.2 PortSupplier 86 4.2.1 Exceptions 87 4.2.2 Operations 87 4.3 LifeCycle 88 4.3.1 Exceptions 88 4.3.2 Operations 88 4.4 PropertySet 89 4.4.1 Exceptions 89 4.4.2 Operations 90 4.5 Resource 92 4.5.1 Exceptions 92 4.5.2 Attributes 93 4.5.3 Operations 93 4.6 ResourceFactory 95 4.6.1 Exceptions 95 4.6.2 Attributes 96 4.6.3 Operations 96 4.7 Port 99 4.7.1 Exceptions 101 4.7.2 Operations 102 5 Devices and the Device Manager 105 5.1 Introduction 105 5.1.1 SCA Device Abstraction 106 5.2 Device 108 5.2.1 Exceptions 109 5.2.2 Types and Constants 109 5.2.3 Attributes 110 5.2.4 Operations 118 5.3 LoadableDevice 121 5.3.1 Types 122 5.3.2 Exceptions 123 5.3.3 Operations 123 5.4 ExecutableDevice 127 5.4.1 Types and Constants 127 5.4.2 Exceptions 128 5.4.3 Operations 130 5.5 AggregateDevice 134 5.5.1 Types and Attributes 134 5.5.2 Operations 134 5.6 DeviceManager 135 5.6.1 Types 136 5.6.2 Attributes 137 5.6.3 Operations 140 6 Domain Management 151 6.1 DomainManager 151 6.1.1 Types 151 6.1.2 Exceptions 153 6.1.3 Attributes 155 6.1.4 DomainManager Instantiation 157 6.1.5 Operations 158 6.2 FileManager 178 6.2.1 Types 180 6.2.2 Exceptions 180 6.2.3 Operations 181 6.3 The ApplicationFactory 183 6.3.1 Exceptions 184 6.3.2 Attributes 184 6.3.3 Operations 185 6.4 Application 192 6.4.1 Types 192 6.4.2 Attributes 193 6.4.3 Operations 195 6.4.4 General Requirements 199 7 Operating Environment Security 201 7.1 Core Framework Security Requirements 201 7.1.1 Application 201 7.1.2 ApplicationFactory 202 7.1.3 DomainManager 203 8 Certification 205 8.1 Certification Process 205 8.2 Operating Environment Certification 206 8.2.1 OE-1 206 8.2.2 OE-2 208 8.2.3 OE-3 209 8.3 Waveform Assessment and Certification 210 PART II The Domain Profile 213 9 The Domain Profile 215 9.1 Overview 215 9.2 SCA Domain Profile XML 215 9.3 Domain Profile Data Types 218 10 Base Descriptor Files 219 10.1 Properties Descriptor 219 10.1.1 Simple 219 10.1.2 Simple Sequence 222 10.1.3 Struct 222 10.1.4 Struct Sequence 224 10.1.5 Test 224 10.2 softpkg 225 10.2.1 title 226 10.2.2 author 226 10.2.3 description 226 10.2.4 propertyfile 226 10.2.5 descriptor 227 10.2.6 implementation 227 10.3 Software Component Descriptor 230 10.4 Device Package Descriptor 232 11 Device Configuration Descriptor 235 11.1 Overview 235 11.2 deviceconfiguration 235 11.2.1 description 236 11.2.2 devicemanagersoftpkg 236 11.2.3 componentfiles 236 11.2.4 partitioning 237 11.2.5 connections 239 11.2.6 domainmanager 239 11.2.7 filesystemnames 239 12 The Domain Manager Descriptor 241 12.1 Overview 241 13 The Software Assembly Descriptor 243 13.1 Overview 243 PART III Building an SCA-Compliant System 251 14 The POSIX Operating System 253 14.1 An Operating Environment 253 14.2 Linux 2.6 Kernel 256 14.2.1 Unavailable POSIX Calls 262 14.2.2 More Unavailable POSIX Calls 273 15 POSIX Threads 277 15.1 The Thread Object 278 15.2 Un-named Semaphores 282 15.3 Mutex Variables 285 15.4 Thread Attributes 290 15.5 Conditional Variables 295 15.6 Less Interesting Thread Calls 299 16 All ORBS are not Created Equal 303 16.1 CORBA Basics 305 16.1.1 Starting the Servant Object 307 16.1.2 Accessing the Object Reference 308 16.2 The Object Management Group 308 16.3 ‘C’ ORB versus C++ ORBs 310 16.4 Initial Services 311 16.4.1 Starting a Client 311 16.5 The Interface Repository 312 16.5.1 Type Codes 312 16.6 Minimum CORBA 313 16.7 The Portable Object Adapter (POA) 314 16.7.1 Policy 315 16.7.2 Run-time Performance 316 16.7.3 ORB Concurrency Models 317 16.7.4 One-ways, Two-ways, and Blocking 319 16.8 Real-time CORBA 319 16.9 Overview of Available ORBs 320 16.9.1 TAO ORB 320 16.9.2 ORBexpress 321 16.9.3 ORBit2 321 16.9.4 MICO 321 16.9.5 OMNI 322 17 The Services 325 17.1 Interoperable Naming Service 325 17.1.1 Universal Unique Identifiers 335 17.1.2 Core Framework Usage of the Naming Service 335 17.1.3 Application Usage of the Naming Service 336 17.2 Event Service 336 17.2.1 Core Framework Usage of the Event Service 349 17.2.2 Resource Usage of the Event Service 350 17.3 Log Service 350 17.3.1 Core Framework Usage of the Log Service 355 17.3.2 Resource Usage of the Log Service 357 18 Exploring the Domain 359 18.1 Application Factory Attributes 360 18.2 Application Attributes 362 18.3 DeviceManager Attributes 366 18.4 Device Attributes 368 18.5 AggregateDevice Attributes 370 18.6 DomainManager Attributes 371 18.7 Properties 373 18.8 Manipulating Ports 378 18.9 Summary 378 19 An SCA-compliant Application 383 19.1 Hello World Legacy Application 383 19.2 Legacy Hello World SPD 388 19.3 HMI Applications 391 19.4 Shutting Down 396 19.5 An SCA-compliant Hello World Application 397 19.5.1 An SCA-compliant Terminal Device 397 19.5.2 Domain Profile for Terminal Device 405 19.5.3 An SCA-compliant Talk Application 409 19.5.4 Multi-threaded Servant 414 19.5.5 Talk Application XML 417 19.5.6 Modifications for Minimum CORBA Compliance 423 19.5.7 Concluding Remarks 424 Appendix A Mandatory POSIX Calls 427 Appendix B References to Part III 429 Index 431
智慧校园整体解决方案是响应国家教育信息化政策,结合教育改革和技术创新的产物。该方案以物联网、大数据、人工智能和移动互联技术为基础,旨在打造一个安全、高效、互动且环保的教育环境。方案强调从数字化校园向智慧校园的转变,通过自动数据采集、智能分析和按需服务,实现校园业务的智能化管理。 方案的总体设计原则包括应用至上、分层设计和互联互通,确保系统能够满足不同用户角色的需求,并实现数据和资源的整合与共享。框架设计涵盖了校园安全、管理、教学、环境等多个方面,构建了一个全面的校园应用生态系统。这包括智慧安全系统、校园身份识别、智能排课及选课系统、智慧学习系统、精品录播教室方案等,以支持个性化学习和教学评估。 建设内容突出了智慧安全和智慧管理的重要性。智慧安全管理通过分布式录播系统和紧急预案一键启动功能,增强校园安全预警和事件响应能力。智慧管理系统则利用物联网技术,实现人员和设备的智能管理,提高校园运营效率。 智慧教学部分,方案提供了智慧学习系统和精品录播教室方案,支持专业级学习硬件和智能化网络管理,促进个性化学习和教学资源的高效利用。同时,教学质量评估中心和资源应用平台的建设,旨在提升教学评估的科学性和教育资源的共享性。 智慧环境建设则侧重于基于物联网的设备管理,通过智慧教室管理系统实现教室环境的智能控制和能效管理,打造绿色、节能的校园环境。电子班牌和校园信息发布系统的建设,将作为智慧校园的核心和入口,提供教务、一卡通、图书馆等系统的集成信息。 总体而言,智慧校园整体解决方案通过集成先进技术,不仅提升了校园的信息化水平,而且优化了教学和管理流程,为学生、教师和家长提供了更加便捷、个性化的教育体验。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值