An Overview of Work by Pachet and Aucouturier on Timbre Similarity
- 格式:pdf
- 大小:19.01 KB
- 文档页数:4
附录AWith the new network technology and application of the continuous rapid development of the computer network should. Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human. More inseparable from the lives of the community's reliance on them will keep growing.In order for computers to communicate, they must speak the same language or protocol. In the early days of networking, networks were disorganized in many ways. Companies developed proprietary network technologies that had great difficulties in exchanging information with other or existing technologies; so network interconnections were very hard to build. To solve this problem, the International Organization for Standardization(ISO)created a network model that helps vendors to create networks compatible with each other.Finding the best software is not easy. A better understanding of what you need and asking the right questions makes it easier. The software should be capable of handling challenges specific to your company. If you operate multiple distribution centers, it may be beneficial to create routes with product originating from more than one depot. Few software providers though, are capable of optimizing routes using multiple depots. The provider should be able to support installation of its product. Make sure to clearly understand what training and software maintenance is offered.Obviously, selecting the right routing/scheduling software is critically important. Unfortunately, some companies are using software that may not be best suited to their operation. Logistics actives with responsibility for approving the software ought to be comfortable they've made the right decision. It is important to realize that not all routing/scheduling software is alike!There questions to ask are: Which operating system is used? How easy is the software to use? Here is a good way to tell. Ask if its graphical user interface(GUI)is flexible. Find out about installation speed - how long does it take? Is the software able to route third party customers with your core business?When was the software originally released and when was it last upgraded?In 1984, ISO released the Open Systems Interconnection(OSI)reference model, which is a well-defined set of specifications that ensures greater compatibility among various technologies. In fact, OSI is a description of network communication that everyone refers to. It is not the only network model, but it has become the primary model for network communication. You will see further in this chapter, that the TCP/IP model is only a reduced version of the OSI model. The OSI model consists of seven layers, each illustrating a particular network function.meanwhile, ASP continues to evolve. With the arrival of the millennium came the arrival of ASP version 3. 0. Version 3. 0 was released along with Internet Information Server(IIS)version 5. 0 as part of the highly anticipated Microsoft Windows 2000. By far, the most important new feature of version 3.0 is the addition of a seventh, intrinsic object called ASP Error which should greatly simplify error handling. Other new features include the addition of three new methods to the Server object, and two new methods to both the Application object and the Session object.When programmers design an image editor for example, they don't have to think about adding OSI Layer 7 capabilities to that software, because it has no need for communication with other computers. On the other hand, when creating an FTP client, they must add communication capabilities to that software. At Layer 7 we usually find Telnet, FTP, HTTP, SMTP, SNMP, or SSH. When we say, For Example, Layer 7 filtering, we refer to filtering application data, regardless of what port or computer it may come from.OSI will be a computer network architecture(architecture)is divided into the following seven:The first layer:physical layer(Physical Layer), provides communications equipment for the mechanical, electrical and functional characteristics and process for the establishment, maintenance and removal of the physical link connection. Specifically, the provisions of the mechanical properties required for network connectivity connector dimensions, pin number and order situation, etc. ;the provisions of the electrical characteristics of the physical connection in the bit stream transmission line signal level of the size, impedance matching , transfer rate from the constraints; features refers to the distribution of the various signals to the exact meaning of the signal, that is the definition of the DTE and DCE function between the various lines; order characteristics of the definition of the use of bit stream signal transmission lines for a group of rules refers to the physical connection of the establishment, maintenance, exchange of information, DTE and DCE on the circuit on double-action series. In this layer, data units known as bits (bit). Belong to the typical definition of the physical layer specification included: EIA / TIA RS-232, EIA / TIA RS-449, V. 35, RJ-45 and so on.The second layer: data link layer(Data Link Layer): in the physical layer bit stream to provide services based on adjacent node between the data link, through the provision of error control data frame(Frame)in the channel error-free transmission, and the action of the series circuit. Data link layer in the physical media is not reliable to provide reliable transmission. The role of this layer include: addressing the physical address, data framing, flow control, data error, such as re-issued. In this layer, data units known as the frame(frame). Data link layer protocol, including representatives of: SDLC, HDLC, PPP, STP, such as frame relay.The third layer is the network layerIn the computer network to communicate between two computers may be a lot of data link may also go through a lot of communication subnet. Network layer of the task is to choose a suitable inter-network routing and switching nodes, to ensure timely delivery of data. Network layer will provide the data link layer packet frame components, including network layer in the package header, which contains the logical address information - - the source site and destination site address of the network address. If you're talking about an IP address, then you are in dealing with the problem of Layer 3, which is “data packets”, rather than layer 2 of the “frame. ” IP is layer 3 part of the problem, in addition to a number of routing protocols and ARP(ARP). All things related to routing in Layer 3 processing. Address resolution and routing is an important objective of Level 3. Network layer can also achieve congestion control features such as Internet interconnection. In this layer, data packets as the unit(packet). Representatives of the network layer protocol, including: IP, IPX, RIP, OSPF, etc…The fourth tier is the transport layer process information. At fourth floor unit, also known as data packets(packets). However, when you talk about TCP protocol, such as concrete and specific when the name, TCP data unit known as paragraph(segments)and the UDP protocol data unit referred to as “datagram (data grams)”. This layer is responsible for obtaining all the information, therefore, it must be tracking data cell debris, out-of-order packets arrive in the transfer process and other possible risk. No. 4 for the upper layer to provide end-to-end(the end-user to end-users)of a transparent and reliable data transmission services. Transparent by means of transmission is transmitted in the communication process of the upper layer shielding the communication transmission system details. Representatives of the Transport Protocol: TCP, UDP, SPX, etc…The fifth layer is the session layerThis layer can also be known as the dialogue meeting between layers or layer, in the session layer and above the high-level, the data transmission is no longer the other named units, known collectively as the message. Session layer does not participate in specific transmission, It provides, including access to authentication and session management, including the establishment and maintenance of mechanisms for communication between applications. If the server to verify user login is completed by the session layer.The sixth layer is Presentation LayerThe main solution to support this level of information that the problem of syntax. For the exchange of data will be suitable for a user from the abstract syntax, into a system suitable for the use of OSI transfer syntax. To provide formatting and conversion of that data services. Data compression and decompression, encryption and decryption so that the layers are responsible for.The seventh layer application layer, application layer for the operating system, applications or network services access the network interface. Agreement on behalf of the application layer, including: Telnet, FTP, HTTP, SNMP, etc. .Through the OSI layers, information from a computer software application for transfer to another application. For example, computer A on the application to send information to the computer application B, then A computer application in information need to be sent to the Application Layer(seventh layer), and then this layer will be sent to that level of information(sixth floor), indicating that the data layer will be transferred to the session layer(fifth layer), and so continue until the physical layer(first layer). In the physical layer, data is placed in the physical network media and sent to computer B. The physical layer of computer B to receive data from the physical media, and then send information up to data link layer(second layer), data link layer and then to the network layer, until the information in order to arrive at the application layer of computer B. Finally, the application layer of computer B and then the application information to the receiving end, thus completing the communication process. The following describes the icons in the process.OSI's seven control the use of a wide range of information and other computer systems to communicate the corresponding layer. Control information contained in these special requests, and show that they correspond to the OSI layer exchange. Data at every level of the head and tail to bring the two basic forms of control information.For one to send down from the previous data, additional control information in the front as the head, attached to the back of the end of the control information is called. However, data from one level to increase the agreement and the agreement the end of the first of a OSI layer is not necessary.When the data transmission between each floor, each level in the data can be added to the head and tail, and these data have been included to increase the level of the head and tail. Agreement includes the first layer and the communication of information between layers. Head and tail as well as the data is associated with the concept, they depend on the analysis of the protocol layer module. For example, the transport layer header includes only the transport layer can be seen the information, the transport layer of the other layers below this only the first part of a data transmission. For the network layer, an information unit from the third layer composed of the first and data. The data link layer, network layer by passing down all the information that is the first and third data layer is seen as data. In other words, a given OSI layer, the information unit that contains the data from all parts of the upper head and tail, as well as data, referred to as packaging. For example, if computer A to a certain application data sent to computer B, the first data sent to the application layer. A computer in the application layer protocol data to add up and the application layer of computer B communications. Formed by the first information unit includes an agreement, data, and possibly the end of the agreement was sent to that layer, that layer of computer B and then add that layer of the control information to understand the agreement first. Information on the size of units in each level in agreement with the agreement the end of the first and add the increase in the first of these agreements and agreements contained in the computer B the end of the corresponding layers of control information to be used. In the physical layer, the entire information unit through the network transmission medium.Computer B in the physical layer unit of information received and sent to the data link layer; and B data link layer in computer A to read the data link layer protocol header added to the control of information;and then remove the agreement and the end of the first agreement, sent to the remainder of the network layer. Perform the same at every level of action: from the corresponding first layer to read the agreement and protocol tail, and remove, and then send the remaining first floor. End of application-layer implementation of these actions, the data sent to computer B on the application, the data and computer applications A is exactly the same as sent.An OSI layer and another layer of communication between the second layer is the use of the services completed. Services provided by adjacent layers help a OSI layer with another layer corresponds to the computer system to communicate. A particular layer of the OSI model is often associated with three other OSI layers contact: with the layer directly adjacent to and under the floor, as well as the objectives of the corresponding computer systems networking layer. For example, computer A's data link layer should be with the network layer, physical layer of computer B, as well as the data link layer communication.附录B为了让电脑来沟通,就必须讲同样的语言或议定书。
外文文献资料1、Software EngineeringSoftware is the sequences of instructions in one or more programming languages that comprise a computer application to automate some business function. Engineering is the use of tools and techniques in problem solving. Putting the two words together, software engineering is the systemtic application of tools and techniques in the development of computer-based applications.The software engineering process describes the steps it takes to deelop the system. We begin a development project with the notion that there is a problem to be solved via automation. The process is how you get from problem recognition to a working solution. A quality process is desirable because it is more likely to lead to a quality product. The process followed by a project team during the development life cycle of an application should be orderly, goal-oriented, enjoyable, and a learning experience.Object-oriented methodology is an approach to system lifecycle development that takes a top-down view of data objects, their allowable actions, and the underlying communication requirement to define a system architecture. The data and action components are encapsulated, that is , they are combined together, to form abstract data types Encapsulation means that if I know what data I want ,I also know the allowable processes against that data. Data are designed as lattice hierarchies of relationships to ensure that top-down, hierarchic inheritance and side ways relationships are accommodated. Encapsulated objects are constrained only to communicate via messages. At a minimum, messages indicate the receiver and action requested. Messages may be more elaborate, including the sender and data to be acted upon.That we try to apply engineering discipline to software development does not mean that we have all the answers about how to build applications. On the contrary, we still build systems that are not useful and thus are not used. Part of the reason for continuing problems in application development, is that we are constantly trying to hita moving target. Both the technology and the type of applications needed by businesses are constantly changing and becoming more complex. Our ability to develop and disseminate knowledge about how to successfully build systems for new technologies and new application types seriously lags behind technological and business changes.Another reason for continuing problems in application development is that we aren’t always free to do what we like and it is hard to change habits and cultures from the old way of doing things, as well as get users to agree with a new sequence of events or an unfamiliar format for documentation.You might ask then, if many organizations don’t use good software engineering practices, why should I bother learning them? There are two good answers to this question. First, if you never know the right thing to do, you have no chance of ever using it. Second, organizations will frequently accept evolutionary, small steps of change instead of revolutionary, massive change. You can learn individual techniques that can be applied without complete devotion to one way of developing systems. In this way, software engineering can speed changee in their organizations by demonstrating how the tools and techniques enhance th quality of both the product and the process of building a system.2、Data Base System1、IntroductionThe development of corporate databases will be one of the most important data-processing activities for the rest of the 1970s. Date will be increasingly regarded as a vital corporate resource, which must be organized so as to maximize their value. In addition to the databases within an organization, a vast new demand is growing for database services, which will collect, organize, and sell data.The files of data which computers can use are growing at a staggering rate. The growth rate in the size of computer storage is greater than the growth in the size or power of any other component in the exploding data processing industry. The more data the computers have access to, the greater is their potential power. In all walks of life and in all areas of industry, data banks will change the areas of what it is possiblefor man to do. In the end of this century, historians will look back to the coming of computer data banks and their associated facilities as a step which changed the nature of the evolution of society, perhaps eventually having a greater effect on the human condition than even the invention of the printing press.Some most impressive corporate growth stories of the generation are largely attributable to the explosive growth in the need of information.The vast majority of this information is not yet computerized. However, the cost of data storage hardware is dropping more rapidly than other costs in data processing. It will become cheaper to store data on computer files than to store them on paper. Not only printed information will be stored. The computer industry is improving its capability to store line drawing, data in facsimile form, photo-graphs, human speech, etc. In fact, any form of information other than the most intimate communications between humans can be transmitted and stored digitally.There are two main technology developments likely to become available in the near future. First, there are electromagnetic devices that will hold much more data than disks but have much longer access time. Second, there are solid-state technologies that will give microsecond access time but capacities are smaller than disks.Disks themselves may be increased in capacity somewhat. For the longer term future there are a number of new technologies which are currently working in research labs which may replace disks and may provide very large microsecond-access-time devices. A steady stream of new storage devices is thus likely to reach the marketplace over the next 5 years, rapidly lowering the cost of storing data.Given the available technologies, it is likely that on-line data bases will use two or three levels of storage. One solid-state with microsecond access time, one electromagnetic with access time of a fraction of a second. If two ,three ,or four levels of storage are used, physical storage organization will become more complex ,probably with paging mechanisms to move data between the levels; solid-state storage offers the possibility of parallel search operation and associativememory.Both the quantity of data stored and the complexity of their organization are going up by leaps and bounds. The first trillion bit on-line stores are now in use . in a few year’s time ,stores of this size may be common.A particularly important consideration in data base design is to store the data so that the can be used for a wide variety of applications and so that the way they can be changed quickly and easily. On computer installation prior to the data base era it has been remarkably difficult to change the way data are used. Different programmers view the data in different ways and constantly want to modify them as new needs arise modification , however ,can set off a chain reaction of changes to existing programs and hence can be exceedingly expensive to accomplish .Consequently , data processing has tended to become frozen into its old data structures .To achieve flexibility of data usage that is essential in most commercial situations . Two aspects of data base design are important. First, it should be possible to interrogate and search the data base without the lengthy operation of writing programs in conventional programming languages. Second ,the data should be independent of the programs which use them so that they can be added to or restructured without the programs being changed .The work of designing a data base is becoming increasing difficult , especially if it is to perform in an optimal fashion . There are many different ways in which data can be structured ,and they have different types of data need to be organized in different ways. Different data have different characteristics , which ought to effect the data organization ,and different users have fundamentally different requirements. So we need a kind of data base management system(DBMS)to manage data.Data base design using the entity-relationship model begins with a list of the entity types involved and the relationships among them. The philosophy of assuming that the designer knows what the entity types are at the outset is significantly different from the philosophy behind the normalization-based approach.The entity-relationship(E-R)approach uses entity-relationship diagrams. The E-Rapproach requires several steps to produre a structure that is acceptable by the particular DBMS. These steps are:(1) Data analysis(2) Producing and optimizing the entity model.(3) Logical schema development(4) Physical data base design process.Developing a data base structure from user requirements is called data bases design. Most practitioners agree that there are two separate phases to the data base design process. The design of a logical database structure that is processable by the data base management system(DBMS)d escribes the user’s view of data, and is the selection of a physical structure such as the indexed sequential or direct access method of the intended DBMS.Current data base design technology shows many residual effects of its outgrowth from single-record file design methods. File design is primarily application program dependent since the data has been defined and structured in terms of individual applications to use them. The advent of DBMS revised the emphasis in data and program design approaches.There are many interlocking questions in the design of data-base systems and many types of technique that one can use is answer to the question so many; in fact, that one often sees valuable approaches being overlooked in the design and vital questions not being asked.There will soon be new storage devices, new software techniques, and new types of data bases. The details will change, but most of the principles will remain. Therefore, the reader should concentrate on the principles.2、Data base systemThe conception used for describing files and data bases has varied substantially in the same organization.A data base may be defined as a collection of interrelated data stored together with as little redundancy as possible to serve on or more applications in an optimal fashion; the data are stored so that they are independent of programs which use thedata; a common and controlled approach is used in adding new data and in modifying and retrieving existing data within the data base. One system is said to contain a collection of data bases if they are entirely separate in structure.A data base may be designed for batch processing, real-time processing, or in-line processing. A data base system involve application program, DBMS, and data base.One of the most important characteristics of most data bases is that they will constantly need to change and grow. Easy restructuring of the data base must be possible as new data types and new applications are added. The restructuring should be possible without having to rewrite the application program and in general should cause as little upheaval as possible. The ease with which a data base can be changed will have a major effect on the rate at which data-processing application can be developed in a corporation.The term data independence is often quoted as being one of the main attributes of a data base. It implies that the data and the application programs which use them are independent so that either may be changed without changing the other. When a single set of data items serves a variety of applications, different application programs perceive different relationships between the data items. To a large extent, data-base organization is concerned with the representation of relationship between data items and records as well as how and where the data are stored. A data base used for many applications can have multiple interconnections between the data item about which we may wish to record. It can describes the real world. The data item represents an attribute, and the attribute must be associated with the relevant entity. We design values to the attributes, one attribute has a special significance in that it identifies the entity.An attribute or set of attribute which the computer uses to identify a record or tuple is referred to as a key. The primary key is defined as that key used to uniquely identify one record or tuple. The primary key is of great importance because it is used by the computer in locating the record or tuple by means of an index or addressing algorithm.If the function of a data base were merely to store data, its organization would be simple. Most of the complexities arise from the fact that is must also show the relationships between the various items of data that are stored. It is different to describe the data in logical or physical.The logical data base description is referred to as a schema .A schema is a chart of the types of data that one used. It gives the names of the entities and attributes, and specifics the relations between them. It is a framework into which the values of the data-items can be fitted.We must distinguish between a record type and a instance of the record. When we talk about a “personnel record”,this is really a record type.There are no data values associated with it.The term schema is used to mean an overall chart of all of the dataitem types and record types stored in a data he uses. Many different subschema can be derived from one schema.The schema and the subschema are both used by the data-base management system, the primary function of which is to serve the application programs by executing their data operations.A DBMS will usually be handing multiple data calls concurrently. It must organize its system buffers so that different data operations can be in process together. It provides a data definition language to specify the conceptual schema and most likely, some of the details regarding the implementation of the conceptual schema by the physical schema. The data definition language is a high-level language, enabling one to describe the conceptual schema in terms of a “data model” .The choice of a data model is a difficult one, since it must be rich enough in structure to describe significant aspects of the real world, yet it must be possible to determine fairly automatically an efficient implementation of the conceptual schema by a physical schema. It should be emphasized that while a DBMS might be used to build small data bases, many data bases involve millions of bytes, and an inefficient implementation can be disastrous.We will discuss the data model in the following.3、Three Data ModelsLogical schemas are defined as data models with the underlying structure of particular database management systems superimposed on them. At the present time, there are three main underlying structures for database management systems. These are :RelationalHierarchicalNetworkThe hierarchical and network structures have been used for DBMS since the 1960s. The relational structure was introduced in the early 1970s.In the relational model, the entities and their relationships are represented by two-dimensional tables. Every table represents an entity and is made up of rows and columns. Relationships between entities are represented by common columns containing identical values from a domain or range of possible values.The last user is presented with a simple data model. His and her request are formulated in terms of the information content and do not reflect any complexities due to system-oriented aspects. A relational data model is what the user sees, but it is not necessarily what will be implemented physically.The relational data model removes the details of storage structure and access strategy from the user interface. The model provides a relatively higher degree of data. To be able to make use of this property of the relational data model however, the design of the relations must be complete and accurate.Although some DBMS based on the relational data model are commercially available today, it is difficult to provide a complete set of operational capabilities with required efficiency on a large scale. It appears today that technological improvements in providing faster and more reliable hardware may answer the question positively.The hierarchical data model is based on a tree-like structure made up of nodes and branches. A node is a collection of data attributes describing the entity at that point.The highest node of the hierarchical tree structure is called a root. The nodes at succeeding lower levels are called children .A hierarchical data model always starts with a root node. Every node consists of one or more attributes describing the entity at that node. Dependent nodes can follow the succeeding levels. The node in the preceding level becomes the parent node of the new dependent nodes. A parent node can have one child node as a dependent or many children nodes. The major advantage of the hierarchical data model is the existence of proven database management systems that use the hierarchical data model as the basic structure. There is a reduction of data dependency but any child node is accessible only through its parent node, the many-to –many relationship can be implemented only in a clumsy way. This often results in a redundancy in stored data.The network data model interconnects the entities of an enterprise into a network. In the network data model a data base consists of a number of areas. An area contains records. In turn, a record may consist of fields. A set which is a grouping of records, may reside in an area or span a number of areas. A set type is based on the owner record type and the member record type. The many-to many relation-ship, which occurs quite frequently in real life can be implemented easily. The network data model is very complex, the application programmer must be familiar with the logical structure of the data base.4、Logical Design and Physical DesignLogical design of databases is mainly concerned with superimposing the constructs of the data base management system on the logical data model. There are three mainly models: hierarchical, relational, network we have mentioned above.The physical model is a framework of the database to be stored on physical devices. The model must be constructed with every regard given to the performance of the resulting database. One should carry out an analysis of the physical model with average frequencies of occurrences of the grou pings of the data elements, with expected space estimates, and with respect to time estimates for retrieving and maintaining the data.The database designer may find it necessary to have multiple entry points into a database, or to access a particular segment type with more than one key. To provide this type of access; it may be necessary to invert the segment on the keys. Thephysical designer must have expertise in knowledge of the DBMS functions and understanding of the characteristics of direct access devices and knowledge of the applications.Many data bases have links between one record and another, called pointers. A pointer is a field in one record which indicates where a second record is located on the storage devices.Records that exist on storage devices is a given physical sequence. This sequencing may be employed for some purpose. The most common pupose is that records are needed in a given sequence by certain data-processing operations and so they are stored in that sequences.Different applications may need records in different sequences.The most common method of ordering records is to have them in sequence by a key —that key which is most commonly used for addressing them. An index is required to find any record without a lengthy search of the file.If the data records are laid out sequentially by key, the index for that key can be much smaller than they are nonsequential.Hashing has been used for addressing random-access storages since they first came into existence in the mid-1950s. But nobody had the temerity to use the word hashing until 1968.Many systems analysis has avoided the use of hashing in the suspicion that it is complicated. In fact, it is simple to use and has two important advantages over indexing. First, it finds most records with only one seek and second, insertion and deletions can be handled without added complexity. Indexing, however, can be used with a file which is sequential by prime key and this is an overriding advantage, for some batch-pro-cessing applications.Many data-base systems use chains to interconnect records also. A chain refers to a group of records scatters within the files and interconnected by a sequence of pointers. The software that is used to retrive the chained records will make them appear to the application programmer as a contiguous logical file.The primary disadvantage of chained records is that many read operations areneeded in order to follow lengthy chains. Sometimes this does not matter because the records have to be read anyway. In most search operations, however, the chains have to be followed through records which would not otherwise to read. In some file organizations the chains can be contained within blocked physical records so that excessive reads do not occur.Rings have been used in many file organizations. They are used to eliminate redundancy. When a ring or a chain is entered at a point some distance from its head, it may be desirable to obtain the information at the head quickly without stepping through all the intervening links.5、Data Description LanguagesIt is necessary for both the programmers and the data administrator to be able to describe their data precisely; they do so by means of data description languages. A data description language is the means of declaring to data-base management system what data structures will be used.A data description languages giving a logical data description should perform the folloeing functions:It should give a unique name to each data-item type, file type, data base and other data subdivision.It should identify the types of data subdivision such as data item segment , record and base file.It may define the type of encoding the program uses in the data items (binary , character ,bit string , etc.)It may define the length of the data items and the range of the values that a data item can assume .It may specify the sequence of records in a file or the sequence of groups of record in the data base .It may specify means of checking for errors in the data .It may specify privacy locks for preventing unauthorized reading or modification of the data .These may operate at the data-item ,segment ,record, file or data-base level and if necessary may be extended to the contents(value) of individual data items .The authorization may , on the other hand, be separate defined .It is more subject to change than the data structures, and changes in authorization proceduresshould not force changes in application programs.A logical data description should not specify addressing ,indexing ,or searching techniques or specify the placement of data on the storage units ,because these topics are in the domain of physical ,not logical organization .It may give an indication of how the data will be used or of searching requirement .So that the physical technique can be selected optimally but such indications should not be logically limiting.Most DBMS have their own languages for defining the schemas that are used . In most cases these data description languages are different to other programmer language, because other programmer do not have the capability to define to variety of relationship that may exit in the schemas.附录 B 外文译文1、软件工程软件是指令的序列,该指令序列由一种或者多种程序语言编写,它能使计算机应用于某些事物的运用自动化。
TOSCA Job Finished with an ErrorIntroductionIn the world of cloud computing and automation, TOSCA (Topology and Orchestration Specification for Cloud Applications) is an important standard that allows developers to describe and deploy complex cloud applications. However, sometimes TOSCA jobs can finish with an error, indicating a problem in the deployment process. In this article, we will explore the reasons behind TOSCA job errors and discuss potential solutions to resolve them.Understanding TOSCA Job ErrorsWhat is a TOSCA Job?Before we delve into the specifics of TOSCA job errors, it is essential to understand what a TOSCA job is. In the context of TOSCA, a job refers to a deployment or orchestration task that is executed to manage a cloud application’s lifecycle. This can include tasks like crea ting, updating, or deleting cloud resources, as well as other management operations.Common TOSCA Job Errors1.Syntax Errors: One of the most common types of errors in TOSCAjobs is syntax errors. These errors occur when the TOSCAdefinition contains incorrect or invalid syntax, preventing thejob from being executed successfully. Examples of syntax errorsinclude missing or misplaced keywords, incorrect indentations, ormismatched data types.2.Resource Conflicts: TOSCA jobs may also encounter errors due toresource conflicts. This can happen when multiple jobs are tryingto modify the same cloud resource simultaneously, leading toconflicts and failures. Resource conflicts can be caused by manual changes made to resources outside of the TOSCA framework or evenconcurrent execution of multiple TOSCA jobs.3.Dependency Issues: TOSCA deployments often involve a complexnetwork of interdependent resources. If there are dependencyissues between different resources or components specified in the TOSCA template, it can result in job errors. For example, if aTOSCA job tries to create a virtual machine before creating anetwork subnet, it will fail due to the missing dependency. Resolving TOSCA Job ErrorsTroubleshooting Syntax Errors1.Verify Syntax: The first step to resolving syntax errors is tovalidate the TOSCA template’s syntax. There are various toolsavailable that can help in validating TOSCA templates andidentifying syntax errors. It is crucial to carefully review the error messages and fix any syntax issues accordingly.2.Check Data Types: Another common cause of syntax errors isincorrect data types. Ensure that the data types specified in the TOSCA template match the expected types for each field. Forexample, if a field expects an integer but receives a string, it will cause a syntax error.Managing Resource Conflicts1.Locking Mechanisms: To avoid resource conflicts, it is essentialto implement locking mechanisms that prevent concurrentmodification of resources. This can be achieved by usingdistributed lock managers or other concurrency control techniques.2.Audit Trails: Implementing audit trails can provide visibilityinto resource changes made outside of the TOSCA framework. Bymonitoring the changes and notifying stakeholders, potentialconflicts can be detected early and resolved before they impactTOSCA jobs.Addressing Dependency Issues1.Analyze Dependencies: Thoroughly analyze the dependencies betweenresources and components defined in the TOSCA template. Identify any missing or incorrect dependencies that may be causing joberrors. Tools like TOSCA dependency graph generators can assist in visualizing and analyzing dependencies.2.Parallel Execution: If possible, modify the TOSCA template toallow parallel execution of independent resources. This can helpimprove deployment speed and reduce the chances of dependency-related errors.ConclusionTOSCA job errors can often hinder the smooth deployment andorchestration of complex cloud applications. By understanding the common types of errors and implementing appropriate troubleshooting techniques, these errors can be resolved efficiently. Through thorough validation of syntax, careful management of resource conflicts, and effective handling of dependencies, TOSCA job errors can be minimized, resulting in successful and error-free deployments.。
职责范围,工作任务,工作产出英文回答:Responsibility Scope, Job Tasks, and Job Outputs.Responsibility Scope:As an employee, my responsibility scope refers to the range of duties and tasks that I am accountable for in my role. It outlines the areas and aspects of the job that I am expected to handle and be responsible for. This includes the specific tasks, projects, and responsibilities that are assigned to me.For example, as a marketing manager, my responsibility scope may include overseeing marketing campaigns, conducting market research, managing social media accounts, and developing marketing strategies. These tasks fallwithin my responsibility scope and are part of my job description.Job Tasks:Job tasks refer to the specific activities and actions that I need to perform as part of my role. These tasks are directly related to the responsibilities outlined in my job description and contribute to the overall goals and objectives of the organization.For instance, as a marketing manager, my job tasks may include creating marketing materials, analyzing market trends, coordinating with the creative team for campaign designs, conducting competitor analysis, and monitoring the performance of marketing campaigns. These tasks are essential for the successful execution of marketing initiatives.Job Outputs:Job outputs are the tangible or intangible results and deliverables that are produced as a result of performing the assigned tasks. These outputs can be measured andevaluated to assess the effectiveness and efficiency of my work.Continuing with the marketing manager example, some of the job outputs may include the successful launch of a marketing campaign, an increase in brand awareness, growth in social media engagement, higher website traffic, and improved lead generation. These outputs demonstrate the impact and value of my work and contribute to the overall success of the marketing department.中文回答:职责范围、工作任务和工作产出。
(完整版)川大软院计网选择题答案Chapter1(含答案)1.1 In the following options, which does not define in protocol? ( D )A the format of messages exchanged between two or more communicatingentitiesB the order of messages exchanged between two or more communicating entitiesC the actions taken on the transmission of a message or other eventD the transmission signals are digital signals or analog signals1.2 In the following options, which is defined in protocol? ( A )A the actions taken on the transmission and/or receipt of a message or other eventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts1.3 An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes (C ).A flow controlB congestion-controlC reliable data transferD connection-oriented service1.4 The Internet’s connection-oriented service has a name, it is ( A ).A TCPB UDPC TCP/IPD IP1.5 The Internet’s connectionless service is called ( B ).A TCPB UDPC TCP/IPD IP1.6 Which of the following nodes belongs to the network core?CA. a Web ServerB. a Host with Win2003 ServerC. a Router with NAT serviceD. a Supernode on Skype Network1.7 In the Internet, the equivalent concept to end systems is ( )A.A hostsB serversC clientsD routers1.8 In the Internet, end systems are connected together by ( C ).A copper wireB coaxial cableC communication linksD fiber optics1.9 End systems access to the Internet through its (C ).A modemsB protocolsC ISPD sockets1.10 In the following options, which belongs to the network core? ( B )A end systemsB routersC clientsD servers1.11 End systems, packet switches, and other pieces of the Internet, run ( D ) that control the sending and receiving of information within the Internet.A programsB processesC applicationsD protocols1.12 The internet allows ( D ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications1.13 The protocols of various layers are called ( A ).A the protocol stackB TCP/IPC ISPD network protocol1.14 In the OSI reference model, the upper layers of the OSI model are, in correct orderDA Session, application, presentationB Session, presentation, applicationC Session, application, presentation, physicalD Application, presentation, session1.15 The lower layers of the OSI model are, in correct orderDA physical, system, network, logicalB physical, logical, network, systemC physical, transport, network, data linkD physical, data link, network, transport1.16 The Internet Protocol (IP) generally corresponds to which OSI layer?AA Network (layer three)B Transport (layer four)C Data link (layer two)D Session (layer five)1.17 What layer of the OSI model is designed to perform error detection functions?BA PhysicalB Data linkC NetworkD transport1.18 Which of the following protocol layers is not explicitly part of the Internet Protocol Stack? _____B____A. application layerB. session layerC. data link layerD. transport layer1.19 The 5-PDU is called__A_A. messageB. segmentC. datagramD. frame1.20 The Internet’s network l ayer is responsible for moving network-layer packets known as B( ) from one host to another.A frameB datagramC segmentD message1.21 Transport-layer packets are called:BA. messageB. segmentC. datagramD. frame1.22 The units of data exchanged by a link-layer protocol are called ( A).A FramesB SegmentsC DatagramsD bit streams1.23 There are two fundamental approaches to building a network core, ( B ) and packet switching.A electrical current switchingB circuit switchingC data switchingD message switching1.24 Datagram networks and virtual-circuit networks differ in that ( C ).A datagram networks are circuit-switched networks, and virtual-circuit networksare packet-switched networks.B datagram networks are packet-switched networks, and virtual-circuit networksare circuit-switched networks.C datagram networks use destination addresses and virtual-circuit networks useVC. numbers to forward packets toward their destination.D datagram networks use VC. numbers and virtual-circuit networks usedestination addresses to forward packets toward their destination.1.25 (A ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM1.26 In ( C ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration of the communication session.A packet-switchedB data-switchedC circuit-switchedD message-switched1.27 In ( A ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched1.28 In a circuit-switched network, if each link has n circuits, for each link used by the end-to-end connection, the connection gets ( A) of the link’s bandwidth for the duration of theconnection.A a fraction 1/nB allC 1/2D n times1.29 For (C ), the transmission rate of a circuit is equal to the frame rate multiplied by the number of bits in a slot.A CDMAB packet-switched networkC TDMD FDM1.30 The network that forwards packets according to host destination addresses is called ( D) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram1.31 The network that forwards packets according to virtual-circuit numbers is called ( C ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram1.32 The time required to propagate from the beginning of the link to the next router is ( C).A queuing delayB processing delayC propagation delayD transmission delay1.33 Processing delay does not include the time to (B ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet1.34 In the following four descriptions, which one is correct? ( C)A The traffic intensity must be greater than 1.B The fraction of lost packets increases as the traffic intensity decreases.C If the traffic intensity is close to zero, the average queuing delay will be closeto zero.D If the traffic intensity is close to one, the average queuing delay will be closeto one.1.35 Suppose, a is the average rate at which packets arrive at the queue, R is the transmission rate, and all packets consist of L bits, then the traffic intensity is ( B ),A LR/aB La/RC Ra/LD LR/a1.36 Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing delay, propagation delay, and processing delay.) ( A )A L/R1+L/R2B L/R1C L/R2D none of the above1.37 We are sending a 30 Mbit MP3 file from a source host to a destination host. Suppose there is only one link between source and destination and the link has a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Also suppose that message switching is used, with the message consisting of the entire MP3 file. How many bits will the source have transmitted when the first bit arrives at the destination?CA. 1 bitB. 30,000,000 bitsC. 500,000 bitsD. none of the above1.38 In the following entries, which is not a kind of access network?(D )A residential accessB company accessC wireless accessD local access1.39 The following technologies may be used for residential access, exceptDA. HFCB. DSLC. Dial-up modemD. FDDI1.40 Which kind of media is not a guided media? ( D)A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel。
软考题⽬-软件设计师英⽂题⽬,卧槽怎么选⼀个错⼀个2019-08-09英语⾃认为还算可以,不好也不差。
但是做软考英⽂题⽬题,选⼀个错⼀个啊。
备受打击。
题⽬如下:A project is a [temporary] 【temporary:临时的】(Sequence) of unique 【unique:独特的】,complex,and connected activities having one goal or purpose and that must be completed by a specific【specific:具体的】 time,within budget【预算】,and according to (Specifications).【specifications:规范】Project management is the process of scoping【范围】,planning,staffing,organizing,directing,and controlling the development of a(n) ( acceptable)【可接受的】 system at a minimum cost within a specified tiem frame.For any systems development project,effective project management is necessary to ensure that the project meets the (deadline)【⼯期,结束⽇期】,is developed within an acceptable budget,and fullfills customer expectations and specifications .Project management is a process that starts at the beginning of a project,extends through a project and doesn't culminate【最终导致】 until the project is completed. The prerequisite【先决条件】 for good project management is a well-defined system development process.Process management is an ongoing activity that documents ,manages the use of ,and imporves an organization's chosen methodology【⽅法】(the process) for system development.Process management is concerned with the activities,delierables,and quality standards to be applied to ( all )【所有】 project(s).。
计算机与网络英汉对照词典[A]Alphamosic Graphics字母镶嵌图形Active Directory动态目录ADSI动态目录服务接口Autosizing自动调整大小Anonymous FTP 匿名文件传输Access Control 访问控制ARP 地址解析协议API 应用程序界面ACL 访问控制表Attenuation 衰减ARP 地址解析协议Adapter 适配器Average seek time 平均寻道时间Authorization 授权,认证Adapter 适配器A3D 3D定位音效技术Acrobat Adobe阅读软件AC97 音响数字/模拟转换ACL 访问控制表A3D Aureal声音技术ATAPI AT附件包接口aliasing 混淆utoexec.bat 自动批处理文件API 应用程序设计接口ASP 服务器开发专用脚本ADSL 非对称数字用户线路AVI 影音文件ADSL 非对称数字用户环线Algorithm 算法Alpha DEC公司微处理器Authorwsre Authorware 多媒体创作软件AMI BIOS BIOS基本输入/输出系统AGP 加速图形接口Aactive matrix 动态矩阵Aactive Network 动态网络Authentication and Authorization 鉴别与授权Auditing 审计,计审At Work Architecture,Microsoft Microsoft的At Work体系结构-------------------------------------------------------------------------------- [B]BISDN宽带综合业务数字网BRI基本速率接口BIS商务信息系统Bundled Software捆绑软件Bluetooth蓝牙Back Door 后门Bridge 网桥Bit 比特Backup 备份Beta Test Beta测试Bookmark 书签BASIC 编程语言B2B 商务对商务Bandwidth 带宽BBS 电子布告栏系统Beta 测试第二版bit 位Bug 程序缺陷、臭虫Byte-Oriented Protocol 面向字节规程Bus Topology 总线拓扑Bursts 突发传送Burst Mode,NetWare NetWare的突发方式Bulletin Board System 公告牌系统Brouter(Bridge/router)桥路器(桥接器/路由器)Broadcast Storm 广播风暴Broadcast 广播Broadband Services 宽带(通信)服务Broadband ISDN 宽带综合业务数字网Bridging 桥接Breakout BoX 中断盒Border Gateway Protocol 边界网关协议BNC Connector BNC连接器Block Suballocation 磁盘块再分配Bit-Oriented Protocol 面向位协议BITNET BITNET网Bindery 装订Binary Synchronous Communications 二进制同步通信(规程)Bell Operating Companies 贝尔运营公司Bell modem Standards 贝尔调制解调器标准Bellman-Ford Distance-Vector Routing Algorithm Bellman-Ford距离向量--------------------------------------------------------------------------------[C]CFTV付费电视CDMA码分多址技术CRC循环冗余检查CD-ROM只读光盘机CMIP 通用管理信息协议Cable 电缆Cable Modem 电缆调制解调器Chipset 芯片组CNNIC 中国互联网络信息中心CRT 阴极射线管Cache 高速缓冲存储器Client/Server 客户机/服务器Cookie 网络小甜饼Cache 高速缓冲存储器CMOS 可读写芯片CGI 公共网关接口Cryptography 密码术;密码学Corporation for Open Systems 开放系统公司Copper Distri but ed Data Interface 铜质分布式数据接口Cooperative Accessing 协同处理Controlled Access Unit 受控访问单元Contention 争用Container Objects 所有者对象Connection-Oriented and Connectionless Protocols 面向连接和无连接协议Connectionless Network Protocol 无连接网络协议Connectionless and Connection-Oriented Transactions 无连接和面向连接事务Configuration Management 配置管理Conditioning 调节Concentrator Devices 集中器设备Compression Techniques 压缩技术Compound Documents 复合文档Complex Instruction Set Computer 复杂指令系统计算机Communication Services 通信服务Communication Server 通信服务器Communication Controller 通信控制器Communication 通信Common Programming Interface for Communication IBM IBM的通信公用编程接口Common Open Software Environment 公用开放软件环境Common Object Request Broker Architecture 公用对象请求代管者体系结构Common Object Model 公用对象模型--------------------------------------------------------------------------------[D]Dvorak Keyboard Dvorak键盘DDR双倍速率SDRAMDAO 数据访问对象Daemon 后台程序DTR 数据终端就绪DASD 直接访问存储设备DMI 桌面管理界面DPI 打印分辨率DHCP 动态主机配置协议Driver 驱动程序DDN 数字数据网络DRAM 动态随机存取内存DSL 数字用户环线Desktop 桌面、台式电脑Download 下载Digital camera Digital camera 数码相机Dynamic Routing 动态路由选择Dynamic Data Exchange 动态数据交换Duplex Transmission 双工传输Duplexed Systems 双工系统Downsizing 向下规模化,下移DOS Requester,NetWare NetWare礑OS请求解释器Domains 域Domain Name Service 域名服务Document Management 文档管理Document Interchange Standards 文档交换标准Distri but ed System Object Model 分布式系统对象模型Distri but ed Relational Database Architecture 分布式关系数据库体系结构Distri but ed Queue Dual Bus 分布式队列双总线Distri but ed Processing 分布式处理Distri but ed Objects EveryWhere(DOE),SunSoft SunSoft的全分布式对象Distri but ed Object Management Systems 分布式对象管理系统Distri but ed Object Management Facility(DOMF),Hewlett-Packard HP的分布式对象管理设施Distri but ed Name Service,DEC DEC的分布式命名服务Distri but ed Management Environment 分布式管理环境Distri but ed Management 分布式管理Distri but ed File Systems 分布式文件系统Distri but ed File System,OSF DCE OSF DCE的分布式文件系统Distri but ed Database 分布式数据库Distri but ed Computing Environment(DCE),OSF 开放软件基金会(OSF)的分布式计算环境--------------------------------------------------------------------------------[E]Edge Device 边界设备Email Filter 电子邮件过滤器EPP 增强型并行端口Extranet 外联网EISA总线扩展工业标准结构External Bus 外部总线EDO RAM 动态存储器Ethernet 以太网Email client 电子邮件客户端程序Exterior Gateway Protocols 外部网关协议Extended Industry Standard Architecture Bus 扩展工业标准体系结构(EISA)总线EtherTalk EtherTalk 适配器Ethernet100VG-AnyLAN(Voice Grade)100VG-AnyLAN(语音级)以太网Ethernet 100Base-X 100Base-X以太网Ethernet 10BaSe-T(Twisted-pair)10Base-T(双绞线)以太网Ethernet 10Base-5(Thicknet)10Base-5(粗电缆)以太网Ethernet 10Base-2(Thinnet)10Base-2(细电缆)以太网Ethernet 以太网Error Detection and Correction 检错和纠错Enterprise System Connections(SCON),IBM IBM的企业级系统连接Enterprise System Architecture,IBM IBM的企业级系统体系结构Enterprise Networks 企业网Enterprise Management Architecture,DEC DEC的企业(点)管理体系结构End System-to-Intermediate System(ES-IS)Routing 端系统对中间系统Encryption 加密Encina Encina应用程序Encapsulation 封装E-Mail 电子函件Elevator Seeking 电梯式查找[寻道]算法Electronic Software Distri but ion(ESD)and Licensing 电子软件分发(ESD)和特许(ESL)Electronic Mail Broadcasts to a Roaming Computer 对漫游计算机的电子函件广播Electronic Mail 电子函件Electronic Industries Association 电子工业协会Electronic Data Interchange 电子数据交换Electromagnetic Interference 电磁干扰EISA(Extended Industry Standard Architecture)Bus EISA(扩展工业标准体系结构)总线EIA/TIA 568 Commercial Building Wiring Standard EIA/TIA 568 商用建[F]File Server文件服务器FCC & BCC转发与密送Flash动画制作软件Failback 自动恢复FAT 文件分配表FTP Server 文件传输服务器Fax modem 传真调制解调器FDDI 光纤分布式数据接口FAT 文件分配表FLASH 动感网页制作工具FTP 文件传输协议FAT32 32位文件分配表Firewall 防火墙Flash FlashFull-Duplex Transmissions 全双工传输Front-End System 前端(台)系统Front-End Processor 前端(台)处理机Frequency Division Multiplexing 频分多路复用Frames in Communication 通信帧Frame Relay 帧中继Fractional T1/Fractional T3 部分T1/部分T3Forwarding 转发Flow Control Methods 流控方法FINGER FINGER实用程序Filtering 筛选,过滤File Transfer Protocol 文件传输协议File Transfer Access and Management 文件传输访问和管理File Systems in the Network Environment 网络环境中的文件系统File Systems,Distri but ed 分布式文件系统Filesharing 文件共享File Server 文件服务器Fileand Directory Permissions,Windows NT Windows NT的文件和目录许File and Directory Attri but es,NetWare NetWare的文件和目录属性Fiber Channel 光纤通道Fiber-Optic Cable 光缆Fiber Distri but ed Data Interface 光纤分布式数据接口Federated Naming Services,SunSoft ONC SunSoft ONC的联合命名服务Federated Database 联合数据库Federal Information Processing Standards 联邦信息处理标准FAX Servers 传真服务器--------------------------------------------------------------------------------[G]GPRS通用分组无线业务GPRS通用分组无线业务3G 第三代移动通信GUI 图形用户界面Gateway 网关Groupware 群件Groups 组Grounding Problems 接地问题Government OSI Profile 政府OSI框架文件Glue,Oracle Oracle的Glue解决方法Global Naming Services 全局命名服务Gateway-to-Gateway Protocol 网关对网关协议Gateway 网关,信关--------------------------------------------------------------------------------[H]HDF 层次型数据格式Hardware 硬件HTTP 超文本传输协议Hacker 黑客HTML 超文本标记语言HUB 集线器HTTP 超文本传输协议HTML 超文本链接标示语言Hard Disk 硬盘Hubs Hub,集线器,集中器Hub Management Interface Hub管理接口Hot Fix,Novell NetWare Novell NetWare的热修复Host 主机Horizontal Wiring System 水平布线系统Hop 跳跃(计)数,过路数,中继数Homogeneous Network Environments 同构网络环境Home Directory 私人目录High-Speed Serial Interface 高速串行接口High-Speed Networking 高速联网高速网包括传输速度高于在1990年前占主导地位的传统传输速度的LAN和WHigh Performance Routing(HPR),IBM IBM 的高性能路由选择High Performance Parallel Interface 高性能并行接口High Performance File System 高性能文件系统High-Level Data Link Control 高级数据链路控制(规程)High Capacity Storage System(HCSS),Novell NetWare Novell NetWare的大容量存储系统High-bit-rate Digital Subscriber Line 高位速率数字用户专用线Heterogeneous Network Environments 异构网络环境Hermes,Microsoft Microsoft的企业网管理系统Handshaking 握手,联络,信号交换Half-Duplex Transmission 半双工传输--------------------------------------------------------------------------------[I]IMAP4信息访问协议4Insert Mode插入模式iPAQ Pocket PCIIS Internet信息服务器IB 智能大厦IrDA 红外线传输装置IIS 网络信息服务器IA 信息家电INF File 适配器安装信息文件Instructions Cache 指令缓存INF File 信息文件Internet backbone Internet骨干网Interface 界面Icon 图标Icon 图标Icon 图标Icon 图标Icon 图标IT 信息技术产业Internal Bus 内部总线IIS Internet信息服务器IT 信息技术IDE 集成驱动电子设备IP 网络协议IRC 互联网中转聊天ICP 互联网内容提供商ICP 互联网内容提供商Isohronous Service 等时服务IS-IS Interdomain Routing Protocol IS-IS域间路由选择协议ISDN/B-ISDN 综合业务数字网/宽带综合业务数字网Iridium System 铱系统Interrupts 中断Interprocess Communication 进程间通信Interoperability 互操作性,互用性Internetwork Routing 网间路由选择Internetwork Packet Exchange 网间分组交换Internetworking 网络互联Internet Protocol Internet网络协议,因特网协议Internet Engineering Task Force Internet工程任务组Internet Internet网因特网-------------------------------------------------------------------------------- [J]JPEG 联合图像专家组规范JSP 网页控制技术Java 编程语言Jukebox Optical Storage Device 自动换盘光盘存储设备Jabber 超时传输,Jabber传输[K]Key recovry 密钥恢复Knowbots Knowbots智能程序Key Encryption Technology 密钥加密技术Kernel 操作系统内核Kermit Kermit文件运输协议Kerberos Authentication Kerberos鉴别-------------------------------------------------------------------------------- [L]LCD 液晶显示屏Light Cabel 光缆Leased line 专线LPT 打印终端LPT 打印终端接口LAN 局域网LU 6.2 LU 6.2协议Lotus Notes Lotus的Notes软件Logons and Logon Accounts 用户登录和登录帐号Login Scripts 登录原语Logical Units 逻辑单元Logical Links 逻辑链路LocalTalk LocalTalk网Local Procedure Calls 本地过程调用Local Loops 局部环路Local Groups 本地组Local Exchange Carrier 本地交换电信局Local Area Transport 局域传输协议Local Area NetWorks 局域网Local Access and Transport Area 本地访问和传输区域Load-Balancing Bridges 负载平衡桥接器,负载平衡网桥Link State Routing 链路状态路由选择Link Services Protocol,NetWare NetWare的链路服务协议Link Layer 链路层Link Access Procedure 链路访问规程Line Conditioning 线路调节Licensing Server API 许可证服务器APILegacy Systems 保留系统Leased Line 租用线路Learning Bridges 自学习桥接器Leaf Objects 叶对象Layered Architecture 分层体系结构Large Internetwork Packet Exchange 大型网间分组交换Laptop Connections 膝上机联网LAN Workplace Products,Novell Novell的LAN Workplace产品,Novell的局域网Wo rkplace产品LAN Troubleshooting 局域网故障诊断LANtastic LANtastic局域网操作系统LAN Server 局域网服务器LAN Requester 局域网请求解释器LAN Manager,Microsoft Microsoft的局域网管理器,Microsoft的LAN Manager--------------------------------------------------------------------------------[M]Mosaic 摩塞克浏览器MO 磁性光盘Mac OS Mac操作系统MO 磁光盘MCSE 微软认证系统工程师MUD 分配角色的游戏环境Mainbus 系统总线Mainboard 主板MAN 城域网Memory Stick Memory Stick 存储棒MSI MSI 微星科技Multistation Access Unit 多站访问部件Multipurpose Internet Mail Extension Internet多功能邮件传递扩展标准Multiprotocol Transport Network(MPTN),IBM IBM的多协议传输网络Multiprotocol Router 多协议路由器Multiprotocol Networks 多协议网络Multiprocessor Systems 多处理器系统Multiprocessing 多处理器处理Multiplexing 多路复用技术Multimedia 多媒体Multidrop(Multipoint)Connection 多点连接MOTIS(Message Oriented Text Interchange System)MOTIS(面向消息的文本交换系统)Motif Motif 工具Modems 调制解调器Mobile Computing 移动计算Mirroring 镜像Middleware 中间件Microwave Communication 微波通信Micro-to-Mainframe Connectivity 微型计算机到大型计算机的互联性Microsoft At Work Architecture Microsoft At Work体系结构Microsegmentation 微分段Microkernel 微内核Microcom Networking Protocol(MNP)Microcom的联网协议MicroChannel Architecture(MCA)Bus 微通道体系结构(MCA)总线Metropolitan Area Networks 城域网Messaging Application Programming Interface 消息应用程序编程接口Messaging API,Inter-Application 应用程序间的消息传递APIMessaging API,E-mail E-mail的消息传递APIMessage Transfer Agent 消息传送代理Message Queuing Interface(MAI),IBM IBM的消息排队接口--------------------------------------------------------------------------------[N]NOC网络操作中心NAT网址解析NOC网络操作中心NAT 网址解析NDIS 网络驱动程序接口Network Architecture 网络体系结构NSR 渲染引擎NFS 网络文件系统NAT 网址转换NWLink IPX/SPX协议微软执行部分NetBIOS 网络基本输入/输出系统Network interface card 网卡NTFS(New Technology File System)NTFS(新技术文件系统)Novell Novell公司Node 节点,结点,网点Network Troubleshooting 网络故障诊断与维修Network Service Protocol,DEC DEC网络服务协议Networks 网络NetWork Management 网络管理Network Layer,OSI Model OSI模型的网络层Network Interface Card 网络接口卡Networking Blueprint 联网方案Network File System 网络文件系统Network Dynamic Data Exchange 网络动态数据交换Network Driver Standards 网络驱动程序标准Network Driver Interface Specification 网络驱动程序接口规范NetWork Control Program 网络控制程序Network Architecture 网络体系结构NetWare Volumes NetWare的(文件)卷宗NetWare Shell NetWare工作站外壳程序NetWare SFT Level ⅢNetWare的三级系统容错NetWare Products NetWare软件产品NetWare Loadable Module NetWare的可装入模块NetWare Link Service Protocol NetWare的链路服务协议NetWare Electronic Software Distri but ion NetWare的电子软件分发NetWare Disks,Partitions,and Volumes NetWare的磁盘、分区和卷宗NetWare Core Protocol NetWare的核心协议NetWare NetWare网络操作系统NetView,IBM IBM的NetView网络管理系统NetLS(Network License Server)NetLS(网络许可权服务器)--------------------------------------------------------------------------------[O]OEM原装备生产厂商OH调制解调器连线OSD 屏幕视控系统OAW 光学辅助温式技术OA 办公自动化Open Source 开放源代码OSF/1,Open Software Foundation 开放软件基金会OSF/1操作系统OS/2 OS/2操作系统Organization Containers 机构包容器对象Optical Libraries 光盘库,光盘存储库Optical Fiber 光纤Open View Management System,Hewlett-Packard HP的Open VieW管理系统Open Systems Interconnection(OSI)Model 开放式系统互联(OSI)模型Open Systems 开放式系统Open Software Foundation(OSF)开放软件基金会(OSF)Open Shortest Path First(OSPF)Protocol 优先开放最短路径(OSPF)协议Open Network Computing(ONC),SunSoft SunSoft的开放式网络计算环境Open Messaging Interface(OMI)开放消息传递接口Open Document Architecture 开放文档体系结构OpenDoc Alliance,Apple Apple的OpenDoc联盟OPEN DECconnect Structured Wiring 开放DECconnect结构化布线系统OpenData-link Interface 开放数据链路接口Open Database Connectivity(ODBC),Microsoft Microsoft的开放式数据库互联性Open Collaborative Environment(OCE),Apple Apple的开放协作环境On-line Transaction Processing 联机(在线)事务处理Objects,NetWare Directory Services NetWare目录服务中的对象Objects 对象,目标,实体Object Request Broker 对象请求代管者Object-Oriented echnology 面向对象技术Object-Oriented Interfaces and Operating Systems 面向对象接口和操作系统Object-Oriented Database 面向对象数据库Object Management Group 对象管理组织Object Management Architecture 对象管理体系结构Object Linkingand Embedding 对象链接与嵌入Object Broker,DEC DEC的对象代理者软件,DEC的Object Broker软件--------------------------------------------------------------------------------[P]Packetsniffer包嗅探器PHP4嵌入式脚本描述语言Push Technology推技术PVM并行虚拟机Path 路径、通路PKI 公开密钥基础设施Pull-down Menu 下拉菜单PAP 密码验证协议PnP 即插即用PCL 打印机指令语言PDS 个人数字系统PCI 周边元件扩展接口POP3 高级网络协议PHP 服务器端编程语言Plasma Display Plasma Display 等离子显示器Punchdown Block 穿孔板,分线盒Pulse-Code Modulation 脉码调制,脉冲代码调制Public Switched Data NetWork 公共交换数据网Public Key Cryptographic Systems 公开密钥加密系统Public Data NetWorks(PDNs)公用数据网(PDN)PU2.1 物理单元(PU)2.1Protocol Stack 协议栈Protocols,Communication 通信协议Protocol Data Unit 协议数据单元Protocol Converters 协议转换器Protocol Analyzers 协议分析器(程序)Protected of Data 数据的保护Protected Mode (受)保护模式Properties of Objects 对象的性质,对象的特性Propagation Delay 传播延迟Project DOE(Distri but ed Objects Everywhere)企业(工程)DOE(全分布式对象)Private Network 私用网,专用网Private Key Cryptography 私用密钥密码学Privacy Enhanced Mail 增强安全的私人函件Print Server 打印服务器Printingon NetWare Networks NetWare网上打印(服务)Premises Distri but ion System 规整化布线系统Preemptive Multitasking 抢先多任务处理PowerPC PowerPC微处理里器系列PowerOpen Environment PowerOpen环境[Q]|龙哥救急呀,我的Win2k(professional)中了“红色代码III”病毒,该如何手动清除?Quadrature Amplitude Modulation 正交振幅调制,正交调幅--------------------------------------------------------------------------------[R]RDRAM高频DRAMRAID 冗余独立磁盘阵列Registry 注册表RISC CPU 精简指令集CPURegistry 注册表RDRAM Rambus动态随机存取内存RSA Data Security RSA数据安全性RSA数据安全性Routing Protocols 路由选择协议Routing Information Protocol 路由选择信息协议Routing,OSI OSI的路由选择Routing,NetWare NetWare的路由选择Routing,Internet Internet路由选择Routing,IBM IBM路由选择Routing,AppleTalk AppleTalk路由选择AppleTalk路由选择Routers 路由器RJ-11and RJ-45 Connections RJ-11和RJ-45连接Ring Network Topology 环网拓扑结构环网拓扑结构Rights(Permissions)in Windows NT Windows NT权限(准许权限)Rightsin Windows for Workgroups Windows for Workgroups中的权限Rightsin Novell NetWare Novell NetWare中的权限RG-62 Coaxial Cable RG-62同轴电缆RG-58 Coaxial Cable RG-58同轴电缆Replication 复制Repeater 中继器,重复器Remote Procedure Call 远程过程调用Remote Access Software 远程访问软件Regional Bell Operating Companies(RBOC)地方贝尔运营公司Redundant Arrays of Inexpensive Disks(RAID)廉价磁盘冗余阵列Reduced Instruction Set Computer 精简指令系统(集)计算机Redirector 重定向器(程序)RAM Mobile Data RAM 移动数据公司Radio Networks 无线电网络--------------------------------------------------------------------------------[S]SSL安全套层SAA系统应用架构SMP 对称多处理结构SET 安全电子商务协议SNA 系统网络结构Subnet 子网SSL 安全套接层协议Server 服务器SMP 对称式多处理器Serial Interface 串行接口SOHO 小型办公与家庭办公Scanner 扫描仪Search Engine 搜索引擎Screen Saver 屏幕保护程序Socket 7 接口结构SONET 同步光纤网SMTP 简单邮件传送协议SCSI 小型计算机系统接口SGRAM 同步图形动态随机存取内存SDRAM 同步动态随机存取内存SystemView,IBM IBM的SystemView网络管理系统Systems Network Architecture(SNA),IBM IBM 系统网络体系结构Systems Application Architecture 系统应用体系结构System Object Model(SOM),IBM IBM的系统对象模型(SOM)System Fault Tolerance 系统容错Synchronous Optical Network 同步光纤网Synchronous Data Link Control 同步数据链路控制(规程)Synchronous Communication 同步通信Symmetrical Multiprocessing 对称多处理Switching Hubs 交换式集线器Switched Virtual Circuit 交换式虚电路Switched Services 交换式服务Switched Multimegabit Data Service 交换式多兆位数据服务Switched-56 Services Switched-56服务,交换式56服务Surge Suppressors 浪涌电压抑制器,电涌抑制器Supervisor 超级用户,监管员SunOS,SunSoft SunSoft的SunOS操作系统SunNet Manager,Sun Microsystems,Inc.Sun公司的SunNet Manager Sun Microsystems,Inc.Sun 微系统公司SunLink Network Sunlink网--------------------------------------------------------------------------------[T]TFT 有源矩阵彩色显示器TFTP 小文件传输协议Transport layer 传输层Taskbar 任务条Twisted-Pair Cable 双绞线,双绞线电缆Tuxedo,UNIX System Laboratories UNIX系统实验室的Tuxedo中间件Tunneling 管道传送,隧道,管道传输Trustees 受托者Troubleshooting 故障诊断与维修,排错Trivial File Transfer Protocol 普通文件运输协议Transport Protocol 传输协议Transport Layer Interface 运输层接口Transport Layer,OSI Model OSI模型的运输层Transmission Media,Methods,and Equipment 传输介质、方法和设备Transmission Control Protocol/Internet Protocol 传输控制协议/Internet协议Transfer Rates 传输率Transceiver,Ethernet 以太网收发器,以太网的接收发送器Transaction Processing 事务处理Topology 拓扑结构Token Ring NetWork 令牌环网Token Bus NetWork 令牌总线网Token and Token Passing Access Methods 令牌和令牌传递访问方式Time Synchronization Services 时间同步服务Time Domain Reflectometer 时域反射计(仪,器)Throughput 吞吐率,处理能力Threads 线程Testing Equipment and Techniques 测试设备和技术Terminator 终端器,终结器,终止器Terminal Servers 终端服务器Terminal 终端Telnet Telnet程序Telenet Telenet网Telecommunication 电信,远程通信Technical Office Protocol 技术办公系统协议TeamLinks,DEC DEC的群件TeamLinksTaligent Taligent公司T1/T3 Services T1/T3服务--------------------------------------------------------------------------------[U]UDA统一数据读取UML 统一建模语言UTP 无屏蔽双绞线URL 统一资源定位格式UPS 不间断电源Ultra DMA 33 同步DMA协定UNIX 32位操作系统UNIX 操作系统USB 通用串行总线Users and Groups 用户和(小)组User Datagram Protocol 用户数据报协议User Agent 用户代理USENET USENET网Unshielded Twisted Pair 非屏蔽双绞线UNIX-to-UNIX Copy Program UNIX系统间文件拷贝程序UNIX System Laboratories UNIX系统实验室UNIX International UNIX国际UNIX UNIX操作系统Unit of Work 作业单元,工作单元Uninterruptible Power Supply 不间断电源Unified Network Management Architecture(UNMA),AT&T AT&T的统一网络管理体系结构--------------------------------------------------------------------------------[V]Virtual Desktop虚拟桌面VoxML语音标记语言Video Compression 视频压缩Virtual reality 虚拟现实VOD 视频传播系统VESA 视频电子标准协会VRML 虚拟现实建模语言VESA 视频电子标准Volume Spanning 卷宗的跨越Volumes,NetWare NetWare的卷宗Virtual Terminal(VT)虚拟终端Virtual Telecommunication Access Method 虚拟远程通信访问方法Virtually Integrated Technical Architecture Lifecycle 虚拟集成技术体系结构生命周期Virtual File Systems 虚拟文件系统Virtual Data Networks 虚拟数据网Virtual Circuit 虚电路VINES,Banyan Banyan的VINES操作系统Videoconferencing and Desktop Video 电视会议和台式(桌面)视频系统Very Small Aperture Terminals(VSATs)卫星小站电路设备Vertical Wiring 垂直布线系统Vendor Independent Messaging (VIM),Lotus Lotus 的厂商无关消息传递应用程序编程接口“V dot”Standards,CCITT CCITT(ITU)的“V点”标准VAX,Digital Equipment Corporation(DEC)数字设备公司(DEC)的VAXValue-Added Carrier 增值网[W]WINS IP解析WYSIWYG 所见即所得WEB VOD WEB视频点播Wizard 向导Wavetable 波表合成WindowsCE 操作系统WAP 无线应用协议Workstation 工作站Workplace OS Workplace操作系统Workgroups 工作组,(用户)组Workflow Software 工作流软件Wiring 布线Wireless Mobile Communication 无线移动通信Wireless LAN Communication 无线局域网通信Windows Telephony Application Interface Windows 电话应用程序接口Windows Sockets API Windows套节字(嵌套字)APIWindows Open System Architecture(WOSA)Windows开放式系统体系结构(WOSA)Windows NT Advanced Server,Microsoft Microsoft的Windows NT高级服务器操作系统Windows NT,Microsoft Microsoft的Windows NT操作系统Windows for Workgroups,Microsoft Microsoft的Windows for Workgroups操作系统Wide Area Networks 广域网WHOIS(“Who Is”)WHOIS数据库--------------------------------------------------------------------------------[X]XUL扩展用户接口语言XON/XOFF异步通信协议X2/DSL调制解调器XSLT XSL变换描述XUL 扩展用户接口语言XQL XML查询语言XML 扩展标签语言X Window X窗口,X Windows图形用户接口X/Open X/Open公司,X/Open国际联盟有限公司XMODEM Protocol XMODEM协议Xerox Network System Xerox网络系统X.500 Directory Services X.500目录服务X.400 Message Handling System X.400消息处理系统X.25 X.25 协议--------------------------------------------------------------------------------[Y]Ymodem Ymodem协议--------------------------------------------------------------------------------[Z]Zmodem Zmodem协议Zip Drive Zip驱动器ZIP 压缩文件格式Zone Multicast Address,AppleTalk AppleTalk的区广播地址Zone Information Table(ZIT),AppleTalk AppleTalk 的区信息表Zone Information Protocol(ZIP),AppleTalk AppleTalk的区信息协议Zone,AppleTalk AppleTalk 的区,AppleTalk的域ZMODEM Protocol ZMODEM 协议Aabsolute positioning 絕對定位abstract windows toolkit 抽象窗口工具庫accumulator 累加器active multi-media 動態多媒體address 地址,[台]位址AI-searching 智能搜索引擎alphamosic graphics 字母鑲嵌圖形alphanumeric 字母數字,[台]文數American on Line 美國在線,美國連線,[台]美國線上American Standard Code for Information Interchange 美國信息交換標準代碼analog 模擬,[台]類比AND gate 與門,[台]及閘AOL (American on Line) 美國在線,美國連線,[台]美國線上API (application programming interface) 應用編程接口,應用編程界面,[台]應用程式介面,[港]應用程式編寫介面applet 支程序,小應用程序application-oriented language 面向應用的語言,[台]應用導向語言application programming interface 應用編程接口,應用編程界面,[台]應用程式介面,[港]應用程式編寫介面application service provider 應用服務提供商[港]應用服務供應商ASCII (American Standard Code for Information Interchange) 美國信息交換標準代碼ASP (application service provider) 應用服務提供商[港]應用服務供應商assembler 匯編器,匯編程序,[台]組譯器,組合程式asynchronous transfer mode 異步傳輸模式,[台]非同步傳輸模式ATM (asynchronous transfer mode) 異步傳輸模式,[台]非同步傳輸模式audio card 聲卡AWT (abstract windows toolkit) 抽象窗口工具庫Bbackground 後台,[台]背景,次優bandwidth 帶寬,通訊頻帶,[台/港]頻寬baseband 基帶,[台/港]基頻BBS (bulletin board system) 公告牌系統,電子公告系統,電子公告欄,電子佈告系統,[台]電子佈告欄BFT (binary file transfer) 二進制文件傳輸Big-5 大五碼,[台]五大碼,大五碼binary file transfer 二進制文件傳輸binary runtime environment for wireless 無線二進制碼,[港]無�二位元?#92;行環境軟件bit 位,比特,[台]位元,數元bit-slice 位片,[台]位元切片,位片劃分bluetooth ?#123;牙,[港]?#123;芽boot 引導bootstrap 引導程序,引導指令,輔助程序,[台]啟動程式BREW (binary runtime environment for wireless) 無線二進制碼,[港]無�二位元? #92;行環境軟件broadband 寬帶,[台/港]寬頻broken link 斷鏈browser 瀏覽器buffer 緩存器,[台/港]緩衝器bulletin board system 公告牌系統,電子公告系統,電子公告欄,電子佈告系統,[台]電子佈告欄bus 總線,匯流排bus network 總線網,[港]幹線網絡byte 字節,[台]位元組,數元組byte code 字節碼CC-MARC format (Chinese machine readable cataloging format) [台]中國機讀編目格式cable modem 線纜?#123;制解?#123;器,[港]電纜數據機calendar server 日歷服務器call on motion 動態監測cascading style sheets 層疊樣式表,串接樣式表,級聯風格表單CASE (compter aided software engineering) 計算機輔助軟件工程,[港]電腦軟件輔助工程case sensitive 區分大小寫CCCII (Chinese Character Code for Information Interchange) 漢字信息交換碼,[台]漢字資訊交換碼,中文資訊交換碼CD-E (compact disc-erasable) [台/港]可擦除式光碟CD-I 交互式光盤CD-R (compact disc-recordable) 光盤刻錄機,[港]光碟燒錄機CD-ROM 光盤,唯讀光盤,只讀光盤,[台/港]光碟,唯讀光碟CD-ROM drive 光盤驅動器,[港]光碟機,[台]唯讀光碟機CD-RW (compact disc-rewritable) 可擦寫刻錄機,[港]可重寫光碟燒錄機CDMA (code division multiple access) 碼分多址certificate server 認證服務器CERNET (China Education and Research Network) 中國教育和科研計算機網CGI (common gateway interface) 通用網關接口,公用網關接口,公共網關接口channel definition format 通道定義格式,頻道定義格式character 字符,[台]字元China Education and Research Network 中國教育和科研計算機網China machine readable cataloging format 中國機讀目錄格式China MARC format (China machine readable cataloging format)中國機讀目錄格式Chinanet 中國公用計算機交互網Chinese Character Code for Information Interchange 漢字信息交換碼,[台]漢字資訊交換碼,中文資訊交換碼Chinese machine readable cataloging format [台]中國機讀編目格式Chinese MARC format (Chinese machine readable cataloging format) [台]中國機讀編目格式CIMS (computer integrated manufacturing system) 計算機集成制造系統click 點擊,[港]按掣client 客戶,客戶機,客戶端,[台]客戶端,用戶端,用者端CMOS RAM (complementary metal oxide semiconductor random access memory)互補金屬氧化物半導體隨機存儲器code division multiple access 碼分多址code snippet 代碼片斷cold link 冷鏈接collabra 新聞閱讀器collabra server 新聞組服務器COM (component object model) 組件對象模式,組件對象模型common gateway interface 通用網關接口,公用網關接口,公共網關接口compact disc-erasable [台/港]可擦除式光碟compact disc-recordable 光盤刻錄機,[港]光碟燒錄機compact disc-rewritable 可擦寫刻錄機,[港]可重寫光碟燒錄機compatibility 兼容性,[台]相容性,互換性complementary metal oxide semiconductor random access memory 互補金屬氧化物半導體隨機存儲器component object model 組件對象模式,組件對象模型computer aided software engineering 計算機輔助軟件工程,[港]電腦軟件輔助工程computer integrated manufacturing system 計算機集成制造系統computer supported cooperative work 計算機支持的協同工作,[台]電腦輔助群體合作computer-to-plate 電腦直接製版技術computing 計算corporate user [港]公司用戶cracker 闖入者,[港]破網客cross-platform 跨平臺cross platform extension 跨平臺擴展器CSCW (computer supported cooperative work) 計算機支持的協同工作,[台]電腦輔助群體合作CSS (cascading style sheets) 層疊樣式表,層疊樣式單,串接樣式表,級聯風格表單cyber cash 電子貨幣cyberspace 信息空間,電腦空間,網絡空間DDAB (digital audio broadcasting) 數字音頻廣播,[港]數碼音頻廣播,數字音訊廣播data 數據,[台]資料data exchange interface 數據交換接口data mining 數據開發,數據採集,數據採掘,[台]資料探勘,[港]數據開拓data sharing 數據共享data warehouse 數據?#125;庫,[台]資料?#125;儲data warehousing [港]數據貯存database 數據庫,[台]資料庫,資料基daughter card 子卡deadlock 死鎖,[台]死結,停滯debug 排錯,[台]除錯,[港]偵錯,除蟲demand paging 請求?#123;頁,[台]需量播叫DEN (directory enabled network) 目錄驅動網絡dense wavelength division multiplexing 高密度波分多路?#125;用,密集波分多路?#125;用,[港]密集波分?#125;用技術destination document 目的地文件DHCP (Dynamic Host Configuration Protocol) 動態主機配置協議,[港]動態主機配置協定DHTML (dynamical hypertext markup language) 動態超文本置標語言digerati [港]數位精英digital audio broadcasting 數字音頻廣播,[港]數碼音頻廣播,數字音訊廣播digital library 數字化圖書館,數字圖書館,[台]數位圖書館,電子圖書館,[港]數碼圖書館digital loop carrier [台]數位迴路載波器digital nervous system 數字神經系統,[港]數位神經系統digital right management 數字內容權利保護,數碼權利管理,[港]數碼權益管理digital signal processor 數字信號處理器digital subscriber line 數字用戶線,[港]數碼用戶線路digital video disc 數字視盤,[港]數碼影像光碟,數碼視像光碟,數碼影碟direct memory access 直接內存存取directory 目錄,[台]目錄,指南directory enabled network 目錄驅動網絡directory server 目錄服務器directory service 目錄服務,名錄服務DIS (distri but ed interactive simulation) 分佈式交互仿真disassembler 反匯編,[台]分解器diskette 軟磁盤,[台]軟磁片,[港]軟磁碟distri but ed interactive simulation 分佈式交互仿真。
PacketCable™ OSS OverviewTechnical Report PKT-TR-OSSI-V02-991201NoticeThis PacketCable technical report is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. (CableLabs®) for the benefit of the cable industry. Neither CableLabs, nor any other entity participating in the creation of this document, is responsible for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this document by any party. This document is furnished on an AS-IS basis and neither CableLabs, nor other participating entity, provides any representation or warranty, express or implied, regarding its accuracy, completeness, or fitness for a particular purpose.© Copyright 1999 Cable Television Laboratories, Inc.All rights reserved.PacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-991201ii Cable Labs ®12/01/99Document Status Sheet Document Control Number:PKT-TR-OSSI-V02-991201Document Title:PacketCable™ OSS Overview Technical ReportRevision History:V01 – Released October 30, 1999V02 – Released December 1, 1999Date:December 1, 1999PKT-TR-OSSI-V02-991201PacketCable™ OSS Overview Technical ReportContents1 INTRODUCTION (1)1.1 Purpose (1)1.2 Background (2)1.3 Scope (3)1.4 Document Overview (4)1.5 Requirements Syntax (4)2 ARCHITECTURAL OVERVIEW (6)2.1 Typical Network Elements (8)2.1.1 PacketCable Network Elements (8)2.1.2 DOCSIS Network Elements (8)2.1.3 Standard Internet Elements (8)2.2 PacketCable Element Management System (EMS) (9)2.3 PacketCable Network Management System (NMS) (9)2.4 DOCSIS Element Management System (EMS) (10)2.5 DOCSIS Network Management System (NMS) (11)2.6 Internet Management System (11)2.7 Policy Services (11)2.8 Telephone Number (TN) Admin Database (12)2.9 Network Inventory / Topology Database (12)2.10 Name Server Database (12)2.11 Customer Records Database (13)2.12 Device Provisioning (13)2.13 Customer Interface (13)2.14 3rd Party Interconnect (Bonding Gateway) (13)2.15 Asset and Work Force Management (13)2.16 Customer Care (14)2.17 Customer Service Management (14)2.18 Trouble Management (14)2.19 Billing (14)2.20 Network Planning and Engineering (15)2.21 Field Technician (15)3 MAPPING INTO THE TMN MODEL (16)12/01/99Cable Labs®iiiPacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-9912013.1 Business Management Layer (16)3.2 Service Management Layer (17)3.3 Network Management Layer (17)3.4 Element Management Layer (17)3.4.1 SNMPv3 (18)3.4.2 PacketCable MIBs (18)3.5 Network Element Layer (18)4 OPERATIONAL PROCESSES (19)4.1 Phase 1 Processes (20)4.1.1 Device Provisioning (20)4.1.2 Customer Service Provisioning (a.k.a. Order Handling) Process (20)4.1.3 Accounting (aka Invoicing and Collections) Process (25)4.2 Phase 2 Processes (27)4.2.1 Network Planning & Development (27)4.2.2 Network Provisioning (27)4.2.3 Network Inventory Management (28)4.2.4 Network Testing, Maintenance & Restoration (28)4.3 Out of Scope Processes (28)4.3.1 Customer Care and Contact Management (28)4.3.2 Sales Process (28)4.3.3 Problem Handling Process (28)4.3.4 Customer QoS Management (29)4.3.5 Service Planning and Development Process (29)4.3.6 Service Problem Resolution Process (29)4.3.7 Service Quality Management Process (29)4.3.8 Rating and Discounting Process (29)4.3.9 Content Provider Management (29)5 CONCLUDING REMARKS (30)APPENDIX A. ACKNOWLEDGEMENTS (31)APPENDIX B. REFERENCES AND BIBLIOGRAPHY (32)APPENDIX C. GLOSSARY (34)APPENDIX D. REVISIONS (45)iv Cable Labs®12/01/99PKT-TR-OSSI-V02-991201PacketCable™ OSS Overview Technical ReportFiguresFigure 1-1. PacketCable Network Component Reference Model (partial) (2)Figure 4-1.TM Forum’s High Level Process Breakdown (19)Figure 4-2. Billing – Process Flow Diagram (26)12/01/99Cable Labs®vPKT-TR-OSSI-V02-991201PacketCable™ OSS Overview Technical Report 1 INTRODUCTION1.1 PurposeThe primary purpose of this overview document is to introduce a high-level Operations Support System (OSS) framework for PacketCable™ products and services. This document describes at a very high level the key processes involved in an end-to-end Operations Support System / Backoffice Support System (OSS/BSS) management system for a PacketCable network.Strictly speaking, the terms OSS and BSS refer to different types of management functions. The term OSS refers to facilities management or network management functions and typically includes fault management, performance management, and security management. The term BSS refers to business management functions and typically includes accounting management and configuration management.A number of organizations have proposed frameworks for conceptually organizingOSS/BSS management functions in an attempt to clearly identify interfaces both internal to and between these management functions. Both the ITU and the TeleManagement Forum (formerly the NMF) have developed frameworks that organize combined OSS/BSS functions into the following areas: business management, service management, network management and element management.In these frameworks, the separation of OSS and BSS functions are no longer strictly enforced, and all of these functions are generally classified as OSS functions.Throughout the remainder of this document, the term OSS will be used to refer to all OSS/BSS functionality.It is the intent of this document to facilitate discussions among the CableLabs®member companies and other interested parties concerning PacketCable OSS requirements. The reference architecture for the PacketCable Network is shown in Figure 1-1 below:12/01/99Cable Labs®1PacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-991201Figure 1-1. PacketCable Network Component Reference Model (partial)1.2 BackgroundThis section describes a typical OSS environment from the viewpoint of three traditional service providers: telco, data network, and cable operator. Some level of convergence must occur within these three environments in order to gain a common understanding of the OSS requirements of a PacketCable network. This document discusses OSS functions in terms of the operational processes that are required to deliver voice, video and other multimedia services on a PacketCable network.It is difficult to define a “typical” OSS for a traditional telephone company environment. Some telcos have very large, very well integrated OSSs. Other telco OSS environments may contain several completely independent and stand-alone systems. Back-office management systems may focus on high-level processes such as order entry and billing. Operations management systems may require manual entry of information such as customer telephone number and other configuration parameters.These manual systems tend to be difficult to incorporate into newer, more automated systems. The large, very well integrated telephony OSSs are optimally designed to support telephony services and cannot be easily extended to support mixed services such as voice, video and data.A traditional IP data network OSS environment typically relies on informationgenerated by routers, switches, or other network elements. Most routers are capable of logging usage, fault, security, accounting, performance and other information. Often this data is written to log files stored on the network equipment or accessed via a network management system.2Cable Labs®12/01/99PKT-TR-OSSI-V02-991201PacketCable™ OSS Overview Technical Report It is difficult to define the typical OSS for a traditional cable environment. Typical cable OSSs are centered around the billing system. The billing system tends to incorporate all the provisioning, customer care, and trouble ticket functions.Experience has shown that these monolithic billing systems are not easily extensible to support new mixed services such as voice, video and data. Provisioning functions, such as activating pay-per-view, tend to be reasonably simple and more easily automated. Commonly available HFC network management and monitoring tools for network inventory and topological mapping are available.In an effort to provide a common understanding of a PacketCable OSS environment, this document will provide both a top-down and bottom-up view of an OSS. The top-down approach is best described in the process-based OSS framework currently used by the TeleManagement Forum. The bottom-up approach is best described in the ITU’s layer-based TMN framework. A combined approach using key concepts from both frameworks has been selected to best describe the PacketCable OSS while keeping current with industry-accepted OSS frameworks in a rapidly converging service provider environment.1.3 ScopeA number of documents and specifications describe the PacketCable project. The“PacketCable Architecture Framework” [17] is the starting point for understanding the PacketCable project and the various PacketCable Interface Specifications, technical reports and other PacketCable documents.The main areas of concern for any OSS are fault management, performance management, security management, accounting management, and configuration management. These topics will not be addressed in detail in this OSS overview document, but will be addressed in PacketCable documents and/or specifications developed by the PacketCable Primary Line, Security, and Billing focus teams.The scope of this PacketCable OSS overview document is limited to providing the starting point for understanding the PacketCable OSS at a high level. This document defines terminology, architecture, operational processes, interfaces and data flows. It also introduces a plausible range of operational processes that a cable operator might employ to launch and manage PacketCable products and services. The operational processes contained in the architectural model identified in this document are not intended to be prescriptive—they comprise one possible OSS model. It is understood that each cable operator may use the architectural model described in this document as a guideline. Each cable operator may then determine which operational processes are required and the timeframe in which these processes will be phased into their OSS to best meet their specific business needs.The operational processes and interfaces examined in detail in section 4 of this document have been identified by CableLabs member companies as critical to the operation of a PacketCable network. For this reason, these interfaces warrant further specification to ensure multi-vendor interoperability. Interface specification details are described in PacketCable PKT-OSSI specification documents. The ultimate 12/01/99Cable Labs®3PacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-991201 objective of the PKT-OSSI Specifications is to enable prospective PacketCable vendors to address the OSS requirements in a uniform and consistent manner necessary for the commercial deployment of PacketCable products and services.In an effort to keep pace with the larger PacketCable project and interface specification development effort, the OSS operational processes and interfaces are addressed in a phased approach. Phase one processes are required to support interface specifications developed for phase one of the PacketCable project. It should also be understood that not every operational process or interface within an operational process requires detailed analysis.For a complete list of PacketCable specifications, please refer to URL .From time to time this document refers to the voice communications capabilities of a PacketCable network in terms of “IP Telephony.” The legal/regulatory classification of IP-based voice communications provided over cable networks and otherwise, and the legal/regulatory obligations, if any, borne by providers of such voicecommunications, are not yet fully defined by appropriate legal and regulatoryauthorities. Nothing in this document is addressed to, or intended to affect, those issues. In particular, while this document uses standard terms such as “call,” “call flow,” “telephony,” etc., it should be recalled that while a PacketCable networkperforms activities analogous to these PSTN functions, the manner by which it does so differs considerably from the manner in which they are performed in the PSTN by telecommunications carriers, and that these differences may be significant forlegal/regulatory purposes. Moreover, while reference is made here to “IP Telephony,”it should be recognized that this term embraces a number of different technologies and network architecture, each with different potential associated legal/regulatory obligations. No particular legal/regulatory consequences are assumed or implied by the use of this term.1.4 Document OverviewSection 1 - IntroductionSection 2 - Architectural overviewSection 3 - Mapping into the TMN modelSection 4 - Operational Processes1.5 Requirements SyntaxT hroughout this document, words that are used to define the significance of particular requirements are capitalized. These words are:“MUST”T his word or the adjective “REQUIRED” means that the item is an absoluterequirement of this specification.“MUST NOT”T his phrase means that the item is an absolute prohibition of this specification.4Cable Labs®12/01/99PKT-TR-OSSI-V02-991201PacketCable™ OSS Overview Technical Report “SHOULD”T his word or the adjective “RECOMMENDED” means that there may exist valid reasons in particular circumstances to ignore this item, but the full implications shouldbe understood and the case carefully weighed before choosing a different course.“SHOULD NOT”T his phrase means that there may exist valid reasons in particular circumstances when the listed behavior is acceptable or even useful, but the full implications should beunderstood and the case carefully weighed before implementing any behavior describedwith this label.“MAY”T his word or the adjective “OPTIONAL” means that this item is truly optional.One vendor may choose to include the item because a particular marketplace requires it orbecause it enhances the product, for example; another vendor may omit the same item.O ther text is descriptive or is explanatory.12/01/99Cable Labs®5PacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-9912012 ARCHITECTURAL OVERVIEWT his section provides an overview of the functional components required to implement a PacketCable capable OSS. The functional components listed in this section are considered the minimum set required to efficiently and effectively managea PacketCable network to provide services to a customer. These functionalcomponents may be performed by manual and/or automated procedures. They may be resident on a single piece of hardware or distributed across multiple pieces of hardware.F igure 2-1 depicts the functional components of the PacketCable OSS and theinteraction with the typical PacketCable network elements. The typical PacketCable network elements are described in the PacketCable Architecture document [17] and will not be discussed in detail in this document. Shaded components in the diagram are part of the PacketCable OSS. Each component is described in detail in the sections following the diagram.6Cable Labs®12/01/99PacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-991201 Figure 2-1 shows the interaction between the logical OSS components. The figure shows both Policy Services as well as Network Planning and Engineering spanning all layers.This figure does not explicitly show redundant components. In order to provide carrier-grade service, many key OSS and PacketCable components must be redundant. Carrier-grade requirements are addressed in the PacketCable Primary Line focus team documents.This figure does not explicitly show security or other authentication servers. These issues will be addressed in the PacketCable Security focus team documents.2.1 Typical Network Elements2.1.1 PacketCable Network ElementsThe PacketCable network elements are described in detail in the PacketCable Architecture document [17]. A brief explanation is included in this section for completeness.MTA – multimedia terminal adapter (MTA) which contains the media interface to voice and/or video devices. Two types of MTAs exist – a standalone MTA with a subscriber LAN interface to access the PacketCable service (e.g. ethernet), or an embedded MTA with an embedded DOCSIS CM MAC and PHY.CMS – The Call Management Server (CMS) provides signaling services used in voice communications applications. The primary purpose of the CMS is to establish standard “calls.” The media servers also provide support services for the media streams such as conference mixing bridges and announcement servers.PSTN Gateway – The PSTN gateway provides access from the subscriber network into the PTSN network.2.1.2 DOCSIS Network ElementsThe DOCSIS network elements are described in detail in the DOCSIS Radio Frequency Interface Specification [20].2.1.3 Standard Internet Elements•DNS – Domain Name System Server maps IP addresses to ASCII domain names •DHCP – Dynamic Host Configuration Protocol Server dynamically allocates IP addresses and client configuration information to IP devices.•TOD – Time of Day Server•TFTP – Trivial File Transfer Protocol Server transfers files to client devices.8Cable Labs®12/01/99PKT-TR-OSSI-V02-991201PacketCable™ OSS Overview Technical Report2.2 PacketCable Element Management System (EMS)T he PacketCable Element Management System is made up of SNMPv3 managers for agents at the element layer. Other processes may transfer data from the PacketCable network elements up to processes in higher layers. The SNMPv3 agent typicallyhandles fault, configuration and provisioning, accounting, performance and security data for the element it is managing.P lease refer to the PacketCable MIB framework document [28] for more information on PacketCable’s use of SNMPv3.Element fault management can be defined as the processes used to manage and repair or temporarily work around faults (hardware and software) within a network element.This includes such things as device alarm reporting/suppression, and routine or on-demand diagnostic testing. The element management system must forward faultindications (these may be correlated and filtered indications rather than the original indications) to the network management system for the network management system to determine the impact the element fault will have on the network.E lement configuration and provisioning management can be defined as the processesused to configure network element. This includes such things as componentmanagement and device provisioning.E lement accounting management can be defined as the processes that monitors deviceusage. This includes such things as how much of a device’s resources are used on a per call and/or per customer basis.E lement performance management can be defined as the processes that monitor thenetwork element. Information collected should include device utilization,transmission faults, packet loss and/or delay and, for voice communicationsapplications, such things as dropped or blocked calls. Monitoring of network element may also be used to determine marginal network components and in conjunction with fault management schedule maintenance before failures occur.E lement security management can be defined as the processes that police access tonetwork elements. Element security management determines who or what has access to the device it manages and the breadth of access. For example, a service technician may be allowed to monitor the status of a particular device, where as the policymanagement system may be given complete access to configure or update the device.2.3 PacketCable Network Management System (NMS)T he PacketCable Network Management System functional component is responsible for interfacing to one or more PacketCable Element Management Systems. ThePacketCable NMS typically handles network-wide fault, configuration andprovisioning, accounting, performance and security issues for the EMS or collection of EMS to which it interfaces. A single PacketCable NMS may interface with a single or multiple PacketCable EMSs. For example, a single PacketCable NMS mayinterface with multiple MTA EMSs and/or multiple CMS EMSs and/or other EMSs such as announcement servers. Alternatively, one NMS may handle the CMS EMSs 12/01/99Cable Labs®9PacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-991201 in a geographic region while a different NMS may handle the HFC cable plant EMSs for that same region. Many different logical configurations can be envisioned and will not be enumerated in this document.I t’s possible that a PacketCable NMS may interface with zero or more DOCSISEMSs. It’s possible that a PacketCable NMS would interface with a larger Network Management System or a “Manager of Managers".N etwork fault management can be defined as the processes used to manage and repair or temporarily work around faults in the network. This includes such things as alarm filtering and correlation as well as network diagnostic testing. The Network Fault management system must be able to handle faults reported either automatically by the network element managers or from external human interfaces (e.g. customer-reported faults). The correlation of faults and alarms reported within a system, especiallymultiple faults may be either manual or automatic but does require access to some type of network inventory and topological map of the network. This topic includes redundancy management, protection schemes, routine maintenance, trouble tickets and trouble tracking.N etwork configuration and provisioning management can be defined as the processes used to configure network resources. This includes such things as path/linkmanagement and call provisioning.N etwork accounting management can be defined as the processes that monitorsnetwork usage. This includes such things as the volume and duration of networkresources used per call and/or per customer.N etwork performance management can be defined as the processes that monitor the network. Information collected should include network devices, network utilization.The information collected can be used to plan network evolution and ensure service level agreements and customer service contracts (QoS) are being met. Networkperformance management also includes capacity monitoring, and performanceplanning.N etwork security management can be defined as the processes that restricts access to network services. Network security management determines who or what has access to which sections of the network. Network security management can also provide various levels of control to different sections of the network on a per user or persystem basis.2.4 DOCSIS Element Management System (EMS)A DOCSIS 1.0 EMS typically is an SNMPv1 or SNMPv2 agent that communicatesdirectly with the DOCSIS network elements. A DOCSIS 1.1 EMS requires the use of SNMPv3 agents.The DOCSIS element management systems (EMS) are described in detail in theDOCSIS Radio Frequency Interface Specification [20].10Cable Labs®12/01/99PKT-TR-OSSI-V02-991201PacketCable™ OSS Overview Technical Report2.5 DOCSIS Network Management System (NMS)The DOCSIS network management systems (NMS) are described in detail in theDOCSIS Radio Frequency Interface Specification [20].2.6 Internet Management SystemThe Internet Management Server manages the IP servers required to provision the PacketCable MTA and the DOCSIS CM. The typical components managed by the Internet management system are the ToD, TFTP, DNS and DHCP servers.Please refer to the PacketCable MTA provisioning spec [4] for a detailed description of device provisioning.This system may allow creation and modification of the configuration files that are sent to the MTA and CM using TFTP. This component may support both the DOCSIS and PacketCable provisioning requirements. This would also manage the IP address ranges.The Internet Management System functionality may be performed manually by a network administrator using the standard interfaces to the ToD, TFTP, DNS and DHCP servers.2.7 Policy ServicesThe policy services system(s) contain(s) information about a service provider’s physical network, service capabilities of these physical elements, and customer information such as services to which a customer is allowed. A policy services system is critical for QoS because it defines the priorities used by the CMS and CMTS for the DOCSIS upstream and downstream service class names. Routing policies may be defined that pertain to congestion conditions which would allow traffic routing to alternative routes based on traffic conditions.Seamless integration of the policy system databases into a single end-to-end OSS architecture is a complicated task. In practice, pieces of the policy services system functionality are often found in multiple parts of the overall OSS, and often redundantly. For example, the information required to describe a new service may need to be stored in an order entry system in one format and again in the billing system in a different format. Ideally, both the order entry system and the billing system would both access a single logical database to obtain the information describing the new service. The Policy Services System, when used effectively, should allow complete centralized administration of all common data and service details which would otherwise have to be manually entered or duplicated in multiple other OSS components.In general, the policy services system has significant impact on network configuration/provisioning and service deployment.12/01/99Cable Labs®11PacketCable™ OSS Overview Technical Report PKT-TR-OSSI-V02-9912012.8 Telephone Number (TN) Admin DatabaseThe Telephone Number (TN) Admin Database contains the service provider’s block of available numbers, information describing which customer is assigned to which number, which blocks of numbers are reserved for particular services such as residential use or PBX use, TN aging schedules, etc.This data is typically accessed by the customer service and customer care systems.Service Availability DatabaseThe Service Availability Database contains mapping of services that can be presented to a customer based on network topology and CPE. (for example, CMS#1 supports 3-way calling, CMS#2 and CMS#3 support caller-id, Bob Smith’s CPE only supportsG.711 and we can’t offer CD-quality sound). This implies a relationship with theNetwork Inventory/Topology database.This information defines the services or features the provider may offer. This data is typically accessed by the customer services and customer care systems.2.9 Network Inventory / Topology DatabaseThe Network Inventory/Topology Database typically contains HFC network inventory information such as a description of headend equipment, fiber nodes, amplifiers, as well as physical location of these devices. HFC network configuration information such as RF bandwidth allocation may also be included. A description of subscriber CPE equipment may be stored in this database. Although not depicted on this picture, access to this database is required by both “fault/performance management” and “customer service management”.The Network Inventory database can be a static representation of the physical inventory currently deployed in the field as well as additional inventory on-hand for upgrades, etc.Network inventory can be differentiated into physical and assignable inventory.Physical inventory is created at network provisioning and tends be static. Assignable inventory is derived from the physical inventory and is the dynamic state of that equipment with relationship to the services that have been activated.The topology database describes how the physical inventory is interconnected.Network management topology is derived from the physical topology and used to reflect the real-time state of the network. The existence of physical inventory may be obtained by auto-discovery mechanisms.2.10 Name Server DatabaseThe Name Server Database is the IP equivalent of the TN Admin database. It contains the unique Fully Qualified Domain Name (FQDN) name for customer names which will be used to do the dynamic IP address allocation. An example of a FQDN might be a tuple such as (3035551212@, Joe User).12Cable Labs®12/01/99。
Influence of the discarding the out-of-profilepackets policy on TCP trafficVasil Hnatyshin, Joshua Ogren, Jonathan Pucci, and Christopher Clement.hnatyshin@, {ogrenj54, puccij25, clement55}@Computer Science DepartmentRowan UniversityGlassboro, NJ 08071AbstractIn the recent year a variety of approaches for QoS support in the Internet such as Integrated Services [1], Differentiated Services [2], Bandwidth Distribution Scheme (BDS) [3], and others have been proposed. Most of the proposed approaches rely on the traffic policing unit, which may mark, delay, or drop packets that arrive above their reserved rate. The packets that arrive above their reserved rate are often referred to as out-of-profile packets. Often the policer limits the transmission rate of the flows that enter the network by dropping all out-of-profile packets. The Transport Control Protocol (TCP) [4] treats packet loss as an indication of congestion and reduces the flow’s congestion window. Reducing the flow’s congestion window effectively reduces the transmission rate of that flow. Thus, dropping out-of-profile packet may have a double effect on the transmission rate of the flow: the flow’s rate is reduced by the traffic policer and by the congestion control mechanism of TCP. In this paper we examine the influence of the traffic policer that drops out-of-profile packets on the TCP traffic. We examine the performance of the traffic policer within the BDS framework using the OPNET Modeler network simulator [5].Keywords: Bandwidth distribution, traffic policing, token bucket, TCP.1. IntroductionAs the Internet expands and diversifies, the current best effort approach to Quality of Service (QoS) in the Internet is no longer able to address the growing needs of the new emerging applications. To solve the problem of providing Quality of Service in the Internet, a number of service differentiation models have been proposed. The Integrated Services (IntServ) model[1], the Differentiated Service (DiffServ) approach[2], and the Bandwidth Distribution Scheme (BDS) [3] are just examples of the few among many approaches that have been introduced in the last two decades. Generally, to guarantee a particular level of service the network negotiates a traffic profile with the user and then enforces it in the network routers. Often the traffic profile is included as a part of the Service Level Agreement (SLA).When a packet arrives at the router it is being classified to identify the SLA the packet belongs to, metered to determine if the packet conforms to its profile, and then policed according to the rules specified in the SLA. The traffic meter differentiates between the packets that conform to their profiles (these packets are called in-profile) and the packets that do not conform to their profile (these packets are called out-of-profile). The traffic policer forwards all in-profile packets to their corresponding outgoing interfaces and “punishes” all the out-of-profile packets. The “punishment” of an out-of-profile packet may include shaping the packet (e.g. delaying the packet until it becomes in-profile), marking the packet to indicate that it arrived at the rate outside of the negotiated profile, or simply dropping the packet.The policy of dropping out-of-profile packets may have a negative effect on the TCP traffic because TCP treats packet loss as an indication of congestion. When TCP perceives that the packet was lost it reduces the congestion window of the flow, which effectively lowers thetransmission rate of that flow. Thus, discarding the out-of-profile packets may have a double effect on the flows: the transmission rates of the flows are reduced by the traffic policer and by the congestion control mechanism of TCP [4].This paper investigates the effects of the policy of dropping the out-of-profile packets on the TCP traffic. We perform this study within the BDS framework that employs traffic policer at the network edges. In the BDS approach the traffic rates are dynamically adjusted based on the network characteristics and are strictly enforced at the network edges: the edge routers discard all out-of-profile packets. The rest of the paper is organized as follows. Section 2 presents an overview of the Bandwidth Distribution Scheme and a summary of TCP congestion control. Section 3 describes the simulation set-up and collected results. Finally, Section 4 analyzes collected results and provides summary and conclusions.2. The overview of the Bandwidth Distribution SchemeThe Bandwidth Distribution Scheme[3] was developed to provide per-flow bandwidth guarantees in a scalable manner. The BDS core routers do not maintain per-flow information (e.g. bandwidth requirements of individual flows); instead core routers keep aggregate flow requirements. The amount of information kept in the network core is proportional not to the number of flows but to the number of edge routers, which we believe does not raise scalability concerns. The edge nodes maintain per-flow information and fairly allocate network resources (e.g. bandwidth) among individual flows according to the flow requirements and resource availability. The dynamic resource allocation at the edge routers is enabled by the network feedback which consists of periodic path probing and explicit congestion notifications. Overall, the BDS architecture consists of: the admission control mechanism, which determines if a new flow can be admitted into the network, the resource management mechanism, which fairly distributes available bandwidth among individual flows, and the protocol for distribution of the aggregate flow requirements, which provides feedback to the network routers about the changes of network characteristics.In the BDS approach, it is assumed that each user-flow negotiates (e.g. requests) the bandwidth range called the Requested Bandwidth Range (RBR). The RBR of flow f , f RBR , consists of two values: a minimum rate, f b , below which the flow cannot operate normally, and the maximum rate,f B , that the flow can utilize.],[f f f B b RBR =(1) The BDS approach guarantees that each flow would receive at least its minimum requested rate f b . The excess bandwidth, (e.g. what is left after each flow is allocated its minimum requested rate) is fairly distributed among the flows that may benefit from it. The BDS resource management mechanism computes the transmission rate of the flow f that travels on the path P with the bottleneck link l as follows:()()l l f l f f f P b C b B R −+=ϕ,min (2)In equation (2), l C is the capacity of bottleneck link l , l b is the aggregate of the minimum requested rates of the flows that travel through l , and f l ϕ is the fair share of flow f on l . The fairshare of flow f on link l is usually computed as the ratio between the RBR of flow f and the aggregate RBR on l.The BDS edge routers classify, meter, and then police all incoming traffic. By default, the edge routers drop all the packets that arrive above the flow’s transmission rate f P R computed by equation (2). The BDS edge routers implement the per-flow traffic policers as an array of tokenbuckets (e.g. one token bucket per flow). The token bucket is configured with the tokengeneration rate f P fTB R R = and the token bucket size TB S . If the BDS edge router receives packet p of flow f at time i T and the previous packet of flow f arrived at time 1−i T then the edge router will discard packet p of flow f only if:)()(1p size S T T R TB i i f TB <+−− (3)In this paper we examine how the above BDS resource management mechanisms influence the TCP traffic. The TCP congestion control employs so called “additive increase – multiplicative decrease” approach. In the absence of congestion, TCP increments transmission rates of individual flows (congestion window) by one full-sized segment per round-trip time (RTT) (linear increase during congestion avoidance). However, when congestion occurs, TCP cuts the flow transmission rates in half [4]. TCP treats each packet loss as an indication of congestion which may conflict with the discard all out-of-profile policy of the BDS traffic policer.3. Simulation configuration and results3.1. Topology ConfigurationIn this study we use the “dumbbell”-like topology shown in Figure 1. In this topology source nodes client_1, client_2, and client_3 send traffic to destination nodes server_1, server_2, and server_3. The generated traffic traverses the bottleneck link router_0 – router _1. We examine performance of the BDS discarding policy using UDP and TCP transport protocols. In particular, we examine how the BDS approach distributes available bandwidth among individual flows. It should be noted, that the value of the link capacity is not the same as the amount of bandwidth provisioned for BDS traffic. In this study we assume that the network administrator provisions a portion of the link capacity for the BDS traffic. Thus, the BDS attempts to utilize all the bandwidth allocated for its traffic.Figure1. Simulation Topology.3.2. UDP scenarioIn this set of experiments the client nodes were configured to establish video conferencing sessions with their corresponding server nodes. The video traffic has strict Quality of Service requirements in terms of throughput and jitter and because of that it uses UDP as its transport protocol. In this scenario the bottleneck link between router_0 and router_1 was provisioned with 4 Mbps of bandwidth for BDS traffic. Each flow was transmitting traffic at the constant rate that was slightly above the flow’s maximum RBR. We ran simulation for 100 seconds. Table 1 shows the summary of scenario’s configuration.Source Destination Start Time End Time Min RBR Max RBR client_1 server_1 10 sec 100 sec 500 Kbps 1000 Kbps client_2 server_2 10 sec 85 sec 1000 Kbps 1500 Kbps client_3server_310 sec60 sec2000 Kbps 2500 KbpsTable 1. Configuration of UDP scenario.UDP is an unreliable transport protocol and does not react to the data losses. That is why we expected that each flow will receive exactly its fair share as computed by the BDS resource management mechanism. Table 2 shows the computed fair share for the initial [10 sec, 60 sec] time period. Figure 2 illustrates achieved individual flow throughput for UDP scenario. As expected, during the initial 60 seconds the traffic flows observed the throughput that was equal to their fair shares as computed in Table 2. Such bandwidth distribution consumed 100% of the bandwidth allocated for the BDS traffic.When flow client_3 – server_3 terminated at time 60 seconds, the aggregated maximum requested rate of remaining BDS flows was larger than the BDS capacity. According to equation (2), the BDS flows cannot transmit above their maximum requested rates. Thus, after termination of flow client_3 – server_3, the remaining flows client_1 – server_1 and client_2 – server_2 were allocated the amount of bandwidth equal to their corresponding maximum requested rates of 1000 Kbps and 1500 Kbps, respectively.Source Destination Bandwidth Shareclient_1 server_1 500 + (4000 – 3500) * (1000 – 500)/(5000 – 3500) = 633 Kbps client_2 server_2 1000 + (4000 – 3500) * (1500 – 1000)/(5000 – 3500) = 1133 Kbps client_3 server_3 2000 + (4000 – 3500) * (2500 – 2000)/(5000 – 3500) = 2133 KbpsTable 2. Computed flow fair shares during [10 sec, 60 sec] time period.5000001000000150000020000002500000112234455677889Time (sec)B a n d w i d t h (b p s )Figure 2. Flow throughput for UDP scenario.This simple scenario shows that when using UDP transport protocol the policy of discarding the out-of-profile traffic does not interfere with the BDS resource distribution mechanism and allows each flow to achieve the throughput that corresponds to its fair share.3.3. TCP scenario configurationIn this scenario the client nodes were configured to upload a large file to their corresponding server using the FTP application. Each flow transmitted traffic until the FTP upload was completed. Simulations were run for 300 seconds. FTP applications are very sensitive to loss and thus require reliable data transfer offered by TCP transport protocol. Since FTP applications do not require as much bandwidth as video traffic we adjusted the RBR of individual flows as well as the amount of bandwidth provisioned for BDS traffic in the network. We allocated 300 Kbps of available bandwidth for the BDS traffic on the bottleneck link. We set the individual client RBR to roughly correspond to the current connection types. Table 3 summarizes the flow configuration for TCP scenario.Source Destination FTP Upload Min RBR Max RBR Connection Type client_1 server_1 1 MByte 28 Kbps 56 Kbps Dial-upclient_2 server_2 2 MByte 80 Kbps 160 Kbps DSLclient_3 server_3 4 MByte 100 Kbps 200 Kbps CableTable 3. Flow configuration of TCP scenario.3.4. Flow throughput vs. link capacityFirst, we examined the performance of the FTP applications for two different BDS capacity settings: 300 Kbps and 1000 Kbps. In this simulation we used the New Reno flavor of TCP. Table 4 briefly summarized configuration of New Reno and other TCP flavors used in this study.TCP Flavor MTU(bytes)Receiver buffer(bytes)FastRetransmitFastRecoverySelectiveAcknowledgementTahoe 512 64 K OFF OFF OFFReno 512 64 K ON Reno OFFNew Reno 512 64 K ON New Reno OFFSACK 512 64 K ON New Reno ONTable 4. Summary of TCP flavor settings.Table 5 presents the results collected in this scenario. The results showed that regardless of the capacity allocated for the BDS traffic, the actual throughput achieved by individual FTP applications was below their allocated fair shares. In some cases the simulation reported that the flow throughput was below the flow’s minimum requested rate.Capacity = 300 Kbps Capacity = 1000 Kbps Source RBR(Kbps) Fair Share Throughput Fair Share Throughput client_1 [28, 56] 40.38 Kbps 18.82 Kbps 56 Kbps 20.95 Kbpsclient_2 [80, 160] 115.4 Kbps 79.22 Kbps 160 Kbps 98.84 Kbpsclient_3 [100, 200] 144.2 Kbps 76.68 Kbps 200 Kbps 120.36 KbpsTable 5. Fair Shares and Achieved Throughput for TCP flows.3.5. Flow throughput vs. TCP flavorIn this section we examined the throughput achieved by individual flows when using different TCP flavors. In particular, we examine achieved throughput when using the following TCP flavors: Tahoe, Reno, New Reno, and Selective Acknowledgement (SACK).The Tahoe flavor of TCP does not implement the fast recovery/fast retransmit mechanism. TCP Tahoe identifies the TCP segment loss based on the expiration of the retransmission timer. TCP Reno implements the fast recovery/fast retransmit mechanism and identifies the segment loss as follows. When the sender receives three consecutive acknowledgements (ACK) for the same segment then it assumes that the segment was lost and immediately re-transmits that segment without waiting for the timeout.TCP New Reno also implements the fast recovery/fast retransmit mechanism. However, if during the fast-retransmit procedure another segment loss occurs, the fast-retransmit procedure is NOT terminated and restarted as in TCP Reno. If a partial segment acknowledgement (e.g. an ACK for a recently lost and re-transmitted packet arrives but not for subsequent packets) then TCP assumes that the following packet was also lost. This packet is being retransmitted without waiting for 3 duplicate ACKs and without restarting fast retransmit. Finally, the SACK flavor of TCP uses the same fast recovery/fast retransmit mechanism as TCP New Reno but instead of returning a cumulative ACK for each received TCP segment, it returns an ACK that lists the sequence numbers of successfully received TCP segment within its window. TCP SACK allows faster identification of the packet and thus faster response to congestion.Table 6 display the achieved application throughput for different TCP flavors. These results were collected using flow configuration of Table 3 and BDS capacity of 300 Kbps. We ran each simulation five time and averaged the results.Flow Throughput (Kbps)Source RBR (Kbps) Fair Share (Kbps) Tahoe Reno New Reno SACK client_1 [28, 56] 40.38 15.67 15.23 16.31 65.00 client_2 [80, 160] 115.4 60.72 49.81 52.35 122.90 client_3 [100, 200] 144.2 80.43 73.39 80.08 150.54Table 6. Fair Shares and Achieved Throughput for different TCP flavors.The collected results show that when using TCP Tahoe, Reno, or New Reno, the averageflow throughput is significantly smaller than the corresponding flow fair share. However, when using TCP SACK, the average flow throughput exceeded the corresponding flow fair share. We were not able to discover the reasons for such behavior and currently investigating this phenomenon.3.6. Flow throughput vs. TCP receiver windowFinally, we conducted a study that examines the achieved flow throughput for different TCP receiver window sizes. Reducing the TCP window size causes the actual TCP transmission rate to decrease. This, in turn reduces the number of TCP segments dropped by the BDS traffic policer and also limits the frequency of invocation the fast recovery/fast retransmit mechanism. Table 7 shows collected results for scenario flow configuration of Table 3 and BDS capacity of 300 Kbps. We ran each simulation five time and averaged the results. The collected results shown that regardless of the TCP receiver window size the flows were not able to achieve the throughput level that corresponds to their fair shares.Flow Throughput (Kbps) Source RBR (Kbps) Fair Share (Kbps) 8 Kbytes 16 Kbytes 32 Kbytes 64 Kbytes 128 Kbytesclient_1 [28, 56] 40.38 12.55 10.28 12.29 16.035 20.91 client_2 [80, 160] 115.4 54.17 65.56 83.84 64.00 46.14 client_3[100, 200] 144.275.9375.12 76.03 67.5071.35Figure 7. Fair Shares and Achieved Throughput for different Receiver window sizes4. Analysis and conclusionsIn this study we examined how the policy of discarding the out-of-profile traffic influences the throughput of TCP and UDP flows. We used the BDS token bucket traffic policer to discard the out-of-profile packets. When using UDP as transport protocol all the flows were able to achieve the throughput that corresponds to the flow’s fair share. The reason for this behavior is the “non-responsiveness” of the UDP. UDP ignores packet losses and continues to transmit traffic at the same rate.On the other hand, TCP reduces transmission rate of a flow whenever the flow experiences the packet loss. The TCP behavior causes data packets to arrive in bunches which causes the token bucket to discard consecutive packets. As the result, when token bucket drops multiple consecutive packets, the TCP congestion control mechanism reduces the TCP congestion window to 1 which slows down the flow’s transmission rate to almost a complete halt. This process repeats multiple times until TCP converges to the “optimal” window size. Unfortunately, most of the TCP flows are short lived (e.g. E-mail,. Telnet, HTTP, etc) and often terminate well before TCP converges, which prevents them from achieving their allocated fair share. In addition, TCP experiences segment loss even after it converged, causing the window size and the transmission rate of the flow to fluctuate and go below the flow’s allocated fair share. These facts explain why the TCP flows experience the throughout that is significantly lower than the flow fair share allocated by the BDS resource management mechanisms.In conclusion, this study showed that the policy of discarding the out-of-profile packets does not work well with TCP flows. Such policy has double negative effect on the TCP flows: first, the flow’s rate is reduced by the token bucket that drops all out-of-profile packets and then by the TCP’s congestion control that reduces transmission rate upon each packet loss. As the result, the throughput of the TCP flows is significantly lower than the corresponding rate limit enforced by token bucket. This study was the first step in out investigation of the packet discarding policies and their influence on TCP traffic. Currently, we plan to investigate other means for punishing the out-of-profile traffic. In particular, we plan to study mechanisms where the packets are delayed instead of being dropped, the edge routers notify TCP directly about the need to adjust transmission rates, and the traffic policer avoids discarding consecutive packets and distributes the packet loss of individual flows over a period of time.References:[1] R. Braden, D. Clark, S. Shenker, “Integrated Services in the Internet Architecture: an Overview”, June1994, IETF RFC 1633.[2] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. Weiss. "An Architecture for DifferentiatedServices," December 1998. IETF RFC 2475.[3] V. Hnatyshin and A.S. Sethi, “Scalable Architecture for Providing Per-flow Bandwidth Guarantees,"Proceedings of the IASTED conference on Communications, Internet and Information Technology (CIIT 2004), St. Thomas, Virgin Isles, November 2004.[4] Stallings, William. Computer Networking with Internet Protocols and Technology, Pearson PrenticeHall, Upper Saddle River New Jersey, 2004, p246-263.[5] Opnet Modeler, version 10.5. /。
Brewer, J.E., Zargham, M.R., Tragoudas, S., Tewksbury, S. “Integrated Circuits”The Electrical Engineering HandbookEd. Richard C. DorfBoca Raton: CRC Press LLC, 2000© 2000 by CRC Press LLC 25Integrated Circuits25.1Integrated Circuit TechnologyTechnology Perspectives •Technology Generations •NationalTechnology Roadmap for Semiconductors25.2Layout, Placement, and Routing What Is Layout?•Floorplanning Techniques •PlacementTechniques •Routing Techniques25.3Application-Specific Integrated Circuits Introduction •Primary Steps of VLSI ASIC Design •Increasing Impact of Interconnection Delays on Design •General Transistor-Level Design of CMOS Circuits •ASIC Technologies •Interconnection Performance Modeling •Clock Distribution •Power Distribution •Analog and Mixed-Signal ASICs Joe E. BrewerIntegrated circuit (IC) technology, the cornerstone of the modern electronics industry, is subject to rapid change.Electronic engineers, especially those engaged in research and development, can benefit from an understanding of the structure and pattern of growth of the technology.Technology PerspectiveA solid state IC is a group of interconnected circuit elements formed on or within a continuous substrate.While an integrated circuit may be based on many different material systems, silicon is by far the dominant material. More than 98% of contemporary electronic devices are based on silicon technology. On the order of 85% of silicon ICs are complementary metal oxide semiconductor (CMOS) devices.From an economic standpoint the most important metric for an IC is the “level of functional integration.”Since the invention of the IC by Jack Kilby in 1958, the level of integration has steadily increased. The pleasant result is that cost and physical size per function reduce continuously, and we enjoy a flow of new, affordable information processing products that pervade all aspects of our day-to-day lives. The historical rate of increase is a doubling of functional content per chip every 18 months.For engineers who work with products that use semiconductor devices, the challenge is to anticipate and make use of these enhanced capabilities in a timely manner. It is not an overstatement to say that survival in the marketplace depends on rapid “design-in” and deployment.For engineers who work in the semiconductor industry, or in its myriad of supporting industries, the challenge is to maintain this relentless growth. The entire industry is marching to a drumbeat. The cost of technology development and the investment in plant and equipment have risen to billions of dollars. Companies that lag behind face a serious loss of market share and, possibly, dire economic consequences.Joe E. BrewerNorthrop Grumman Corporation Medhi R. Zargham andSpyros TragoudasSouthern Illinois University Stuart Tewksbury West Virginia University© 2000 by CRC Press LLCTechnology GenerationsThe concept of a technology generation emerged from analysis of historical records, was clearly defined by Gordon Moore in the 1960s, and codified as Moore’s law. The current version of the law is that succeeding generations will support a four times increase in circuit complexity, and that new generations emerge at approximately 3-year intervals. The associated observations are that linear dimensions of device features change by a factor of 0.7, and the economically viable die size grows by a factor of 1.6.Minimum feature size stated in microns (micrometers) is the term used most frequently to label a technology generation. “Feature” refers to a geometric object in the mask set such as a linewidth or a gate length. The “minimum feature” is the smallest dimension that can be reliably used to form the entity.Figure 25.1 displays the technology evolution sequence. In the diagram succeeding generations are numbered using the current generation as the “0” reference. Because this material was written in 1996, the “0” generation is the 0.35 m m minimum feature size technology that began volume production in 1995.An individual device generation has been observed to have a reasonably well-defined life cycle which covers about 17 years. The first year of volume manufacture is the reference point for a generation, but its lifetime actually extends further in both directions. As shown in Fig. 25.2, one can think of the stages of maturity as ranging over a linear scale which measures years to production in both the plus and minus directions. The 17-year life cycle of a single generation, with new generations being introduced at 3-year intervals, means that at any given time up to six generations are being worked on. This tends to blur the significance of research news and company announcements unless the reader is sensitive to the technology overlap in time.To visualize this situation, consider Fig. 25.3. The top row lists calendar years. The second row shows how the life cycle of the 0.35 m m generation relates to the calendar. The third row shows the life cycle of the 0.25 m m generation vs. the calendar. Looking down any column corresponding to a specific calendar year, one can see which generations are active and identify their respective life cycle year.FIGURE 25.1Semiconductor technology generation time sequence.FIGURE 25.2Life cycle of a semiconductor technology generation.FIGURE 25.3Time overlap of semiconductor technology generations.One should not interpret the 17-year life cycle as meaning that no work is being performed that is relevant to a generation before the 17-year period begins. For example, many organizations are conducting experiments directed at transistors with gate lengths smaller than 0.1 m m. This author’s interpretation is that when basic research efforts have explored technology boundary conditions, the conditions are ripe for a specific generation to begin to coalesce as a unique entity. When a body of research begins to seek compatible materials and processes to enable design and production at the target feature size, the generation life cycle begins. This is a rather diffused activity at first, and it becomes more focused as the cycle proceeds.National Technology Roadmap for SemiconductorsThe National Technology Roadmap for Semiconductors (NTRS) is an almost 200-page volume distributed by the Semiconductor Industry Association (SIA). Focused on mainstream leading edge technology, the roadmap provides a common vision for the industry. It enables a degree of cooperative precompetitive research and development among the fiercely competitive semiconductor device manufacturers. It is a dynamic document which will be revised and reissued to reflect learning on an as-needed basis.The NTRS is compiled by engineers and scientists from all sectors of the U.S. IC technology base. Industry, academia, and government organizations participate in its formulation. Key leaders are the Semiconductor Research Corporation (SRC) and SEMATECH industry consortia. The roadmap effort is directed by the Roadmap Coordinating Group (RCG) of the SIA.The starting assumption of the NTRS is that Moore’s law will continue to describe the growth of the technology. The overall roadmap comprises many individual roadmaps which address defined critical areas of semiconductor research, development, engineering, and manufacturing. In each area, needs and potential solutions for each technology generation are reviewed. Of course, this process is more definitive for the early generations because knowledge is more complete and the range of alternatives is restricted.The NTRS document provides a convenient summary table which presents some of the salient characteristics of the six technology generations ranging from 1995 to 2010. That summary is reproduced (with minor variations in format) as Table 25.1.Year of First DRAM Shipment/Minimum Feature (m m)MemoryBits/chip (DRAM/Flash) 64M 256M 1G 4G 16G 64G Cost/bit @ volume (millicents) 0.017 0.007 0.003 0.001 0.0005 0.0002 Logic (high-volume microprocessor)Logic transistors/cm2 (packed) 4M 7M 13M 25M 50M 90M Bits/cm2 (cache SRAM) 2M 6M 20M 50M 100M 300M Cost/transistor @ volume (millicents) 1 0.5 0.2 0.1 0.05 0.02 Logic (low-volume ASIC)Transistors/cm2 (auto layout) 2M 4M 7M 12M 25M 40M Non-recurring engineering 0.3 0.1 0.05 0.03 0.02 0.01 Cost/transistor (millicents)Number of chip I/OsChip to package (pads) high performance 900 1350 2000 2600 3600 4800 Number of package pins/ballsMicroprocessor/controller 512 512 512 512 800 1024 ASIC (high performance) 750 1100 1700 2200 3000 4000 Package cost (cents/pin) 1.4 1.3 1.1 1.0 0.9 0.8Chip frequency (MHz)On-chip clock, cost performance 150 200 300 400 500 625 On-chip clock, high performance 300 450 600 800 1000 1100 Chip-to-board speed, high performance 150 200 250 300 375 475 Chip size (mm2)DRAM 190 280 420 640 960 1400 Microprocessor 250 300 360 430 520 620© 2000 by CRC Press LLCMax number wiring levels (logic)On-chip4–555–666–77–8 Electrical defect density (d/m2)24016014012010025 Minimum mask count182020222224 Cycle time days (theoretical)91010111112 Maximum substrate diameter (mm)Bulk or epitaxial or SOI wafer200200300300400400 Power supply voltage (V)Desktop 3.3 2.5 1.8 1.5 1.20.9 Battery 2.5 1.8–2.50.9–1.80.90.90.9 Maximum powerHigh performance with heatsink (W)80100120140160180 Logic without heatsink (W)5710101010 Battery (W) 2.5 2.5 3.0 3.5 4.0 4.5 Design and testVolume tester cost/pin ($K) 3.3 1.7 1.30.70.50.4 Number of test vectors (m P/M)16–3216–3216–328–164–84% IC function with BIST/DFT254050709090+Related Topics1.1 Resistors•23.1 ProcessesFurther InformationThe NTRS is available from the SIA, 181 Metro Drive, Suite 450, San Jose, CA 95110, telephone 408-436-6600, fax 408-436-6646. The document can also be accessed via the SEMATECH home page at <>. Information concerning the IC life cycle can be found in Larrabee, G. B. and Chatterjee, P. “DRAM Manu-facturing in the 90’s — Part 1: The History Lesson” and “Part 2: The Roadmap,” Semiconductor International, pp. 84–92, May 1991.Mehdi R. Zargham and Spyros TragoudasVery large scale integrated (VLSI) electronics presents a challenge, not only to those involved in the development of fabrication technology, but also to computer scientists, computer engineers, and electrical engineers. The ways in which digital systems are structured, the procedures used to design them, the trade-offs between hardware and software, and the design of computational algorithms will all be greatly affected by the coming changes in integrated electronics.A VLSI chip can today contain millions of transistors and is expected to contain more than 100 million transistors in the year 2000. One of the main factors contributing to this increase is the effort that has been invested in the development of computer-aided design (CAD) systems for VLSI design. The VLSI CAD systems are able to simplify the design process by hiding the low-level circuit theory and device physics details from the designer, and allowing him or her to concentrate on the functionality of the design and on ways of optimizing it.A VLSI CAD system supports descriptions of hardware at many levels of abstraction, such as system, subsystem, register, gate, circuit, and layout levels. It allows designers to design a hardware device at an abstract level and progressively work down to the layout level. A layout is a complete geometric representation (a set of rectangles) from which the latest fabrication technologies directly produce reliable, working chips. A VLSI © 2000 by CRC Press LLC© 2000 by CRC Press LLC CAD system also supports verification, synthesis, and testing of the design. Using a CAD system, the designer can make sure that all of the parts work before actually implementing the design.A variety of VLSI CAD systems are commercially available that perform all or some of the levels of abstraction of design. Most of these systems support a layout editor for designing a circuit layout . A layout-editor is software that provides commands for drawing lines and boxes, copying objects, moving objects, erasing unwanted objects, and so on. The output of such an editor is a design file that describes the layout. Usually, the design file is represented in a standard format, called Caltech Intermediate Form (CIF), which is accepted by the fabrication industry.What Is Layout?For a specific circuit, a layout specifies the position and dimension of the different layers of materials as they would be laid on the silicon wafer. However, the layout description is only a symbolic representation, which simplifies the description of the actual fabrication process. For example, the layout representation does not explicitly indicate the thickness of the layers, thickness of oxide coating, amount of ionization in the transistors channels, etc., but these factors are implicitly understood in the fabrication process. Some of the main layers used in any layout description are n -diffusion, p -diffusion, poly, metal-1, and metal-2. Each of these layers is represented by a polygon of a particular color or pattern. As an example, Fig. 25.4 presents a specific pattern for each layer that will be used through the rest of this section.As is shown in Fig. 25.5, an n -diffusion layer crossing a poly layer implies an nMOS transistor, and a p -diffusion crossing poly implies a pMOS transistor.Note that the widths of diffusion and poly are represented with a scalable parameter called lambda. These measurements, referred to as design rules, are introduced to prevent errors on the chip, such as preventing thin lines from opening (disconnecting) and short circuiting.FIGURE 25.4Different layers.FIGURE 25.5Layout and fabrication of MOS transistors.© 2000 by CRC Press LLCImplementing the design rules based on lambda makes the design process independent of the fabrication process. This allows the design to be rescaled as the fabrication process improves.Metal layers are used as wires for connections between the components. This is because metal has the lowest propagation delay compared to the other layers. However, sometimes a poly layer is also used for short wires in order to reduce the complexity of the wire routing. Any wire can cross another wire without getting electrically affected as long as they are in different layers. Two different layers can be electrically connected together using contacts. The fabrication process of the contacts depends on types of the layers that are to be connected.Therefore, a layout editor supports different types of contacts by using different patterns.From the circuit layout, the actual chip is fabricated. Based on the layers in the layout, various layers of materials, one on top of the others, are laid down on a silicon wafer. Typically, the processing of laying down each of these materials involves several steps, such as masking, oxide coating, lithography and etching [Mead and Conway, 1980]. For example, as shown in Fig. 25.6(a), for fabricating an nMOS transistor, first two masks,one for poly and one for n -diffusion, are obtained from the circuit layout. Next, the n -diffusion mask is used to create a layer of silicon oxide on the wafer [see Fig. 25.6(b)]. The wafer will be covered with a thin layer of oxide in places where the transistors are supposed to be placed as opposed to a thick layer in other places. The poly mask is used to place a layer of polysilicon on top of the oxide layer to define the gate terminals of the transistor [see Fig. 25.6(c)]. Finally, the n -diffusion regions are made to form the source and drain terminals of the transistor [see Fig. 25.6(d)].To better illustrate the concept of layout design, the design of an inverter in the CMOS technology is shown in Fig. 25.7. An inverter produces an output voltage that is the logical inverse of its input. Considering the circuit diagram of Fig. 25.7(a), when the input is 1, the lower nMOS is on, but the upper pMOS is off. Thus, the output becomes 0 by becoming connected to the ground through the nMOS. On the other hand, if the input is 0, the pMOS is on and the nMOS is off, so the output must find a charge-up path through the pMOS to the supply and therefore becomes 1. Figure 25.7(b) represents a layout for such an inverter. As can be seen from this figure,the problem of a layout design is essentially reduced to drawing and painting a set of polygons. Layout editors provide commands for drawing such polygons. The commands are usually entered at the keyboard or with a mouse and, in some menu-driven packages, can be selected as options from a pull-down menu.FIGURE 25.6Fabrication steps for an nMOS transistor.© 2000 by CRC Press LLCIn addition to the drawing commands, often a layout system provides tools for minimizing the overall area of the layout (i.e., size of the chip). Today a VLSI chip consists of a lot of individual cells, with each one laid out separately. A cell can be an inverter, a NAND gate, a multiplier, a memory unit, etc. The designer can make the layout of a cell and then store it in a file called the cell library. Later, each time the designer wants to design a circuit that requires the stored cell, he or she simply copies the layout from the cell library. A layout may consist of many cells. Most of the layout systems provide routines, called floorplanning, placement and routing routines, for placing the cells and then interconnecting them with wires in such a way that minimizes the layout area. As an example, Fig. 25.8 presents the placement of three cells. The area between the cells is used for routing. The entire routing surface is divided into a set of rectangular routing areas called channels. The sides of each channel consist of a set of terminals. A wire that connects the terminals with the same ID is called a net. The router finds a location for the wire segments of each net within the channel. The following sections classify various types of placement and routing techniques and provide an overview of the main steps of some of these techniques.Floorplanning TechniquesThe floorplanning problem in Computer Aided Design of Integrated Circuits is similar to that in Architecture and the goal is to find a location for each cell based on proximity (layout adjacency) criteria to other cells. We FIGURE 25.7An inverter.FIGURE 25.8Placement and routing.,© 2000 by CRC Press LLCconsider rectangular floorplans whose boundaries are rectangles. It is desirable to obtain a floorplan that minimizes the overall area of the layout.An important goal in floorplanning is the cell sizing problem where the goal is to determine the dimensions of variable cells whose area is invariant. All cells are assumed to be rectangular, and in the cell sizing problem the goal is to determine the width and height of each cell subject to predetermined upper and lower bounds on their ratio, and to their product being equal to its area, so that the final floorplan has optimal area.One of the early approaches in floorplanning is the hierarchical, where recursive bipartition or partition into more than two parts is recursively employed and a floorplan tree is constructed. The tree simply reflects the hierarchical construction of the floorplan. Figure 25.9 shows a hierarchical floorplan and its associated tree.The partitioning problem and related algorithms are discussed extensively later in this section.Many early hierarchical floorplanning tools insist that the floorplan be sliceable. A sliceable floorplan is recursively defined as follows: (a) a cell or (b) a floorplan that can be bipartitioned into two sliceable floorplans with either a horizontal or vertical line. Figure 25.10 shows a sliceable floorplan whose tree is binary.Many tools that produce sliceable floorplans are still in use because of theirsimplicity. In particular, many problems arising in sliceable floorplanning are solv-able optimally in polynomial time [Sarrafzadeh and Wong, 1996]. Unfortunately,sliceable floorplans are rarely optimal (in terms of their area), and they often resultin layouts with very difficult routing phases. (Routing is discussed later in thissection.) Figure 25.11 shows a compact floorplan that is not sliceable.Hierarchical tools that produce nonsliceable floorplans have also been proposed[Sarrafzadeh and Wong, 1996]. The major problem in the development of suchtools is that we are often facing problems that are intractable and thus we have to rely on heuristics in order to obtain fast solutions. For example, the cell sizing problem can be tackled optimally in sliceable floorplans [Otten, 1983 and Stock-meyer, 1983] but the problem is intractable for general nonsliceable floorplans.A second approach to floorplanning is the rectangular dual graph. The idea here is to use duality arguments and express the cell adjacency constraints in terms of a graph, and then use an algorithm to translate the graph into a rectangular floorplan. A rectangular dual graph of a rectangular floorplan is a planar graph G = (V ,E),where V is the set of cells and E is the set of edges, and an edge (C 1,C 2) is in E if and only if cells C 1 and C 2are adjacent in the floorplan. See Fig. 25.12 for a rectangular floorplan and its rectangular dual graph G.FIGURE 25.9 A hierarchical floorplan and its associated tree. The root node has degree 5. The internal node labeled with |indicates a vertical slicing. The internal node labeled with — indicates a horizontal slicing.FIGURE 25.10A sliceable floorplan and its associated binary tree.FIGURE 25.11 A com-pact layout that is notsliceable.© 2000 by CRC Press LLC Let us assume that the floorplan does not contain cross junctions. Figure 25.13 shows a cross junction. This restriction does not significantly increase the area of a floorplan because, as Fig. 25.13 shows, a cross junction can be replaced by two T-junctions by simply adding a short edge e.It has been shown that in the absence of cross junctions the dual graph is planar triangulated (PT), and every T-junction corresponds to a triangulated face of the dual PT graph. Unfortunately, not all PT graphs have a rectangular floorplan. For example, in the graph of Fig. 25.14 we cannot satisfy the adjacency require-ments of edges (a,b), (b,c) and (c,a) at the same time. Note that the later edges form a cycle of length three that is not a face. It has been shown that a PT graph has a rectangular floorplan if and only if it does not contain such cycles of length three. Moreover, a linear time algorithm to obtain such a floorplan has been presented [Sarrafzadeh and Wong, 1996]. The rectangular dual graph approach is a new method for floorplan-ning, and many floorplanning problems, such as the sizing problem, have not been tackled yet.Rectangular floorplans can be obtained using simulated annealing and genetic algorithms. Both techniques are used to solve general optimization problems for which the solution space is not well understood. The approaches are easy to implement, but the algorithms have many parameters which require empirical adjust-ments, and the results are usually unpredictable.A final approach to floorplanning, which unfortunately requires substantial computational resources and results to an intractable problem, is to formulate the problem as a mixed-integer linear programming (LP).Consider the following definitions:W i ,H i ,R i : width, height and area of cell C iX i ,Y i : coordinates of lower left corner of cell C iX,Y : the width and height of the final floorplanA i ,B i : lower and upper bound for the ratio W i /H i of cellC iP ij , Q ij : variables that take 0/1 values for each pair of cells C i and C jThe goal is to find X i ,Y i ,W i , and H i for each cell so that all constraints are satisfied and XY is minimized.The latter is a nonlinear constraint. However, we can fix the width W and minimize the height of the floorplan as follows:FIGURE 25.12 A rectangular floorplan and its associated dual planer graph.FIGURE 25.13 A cross junction can be replaced by 2 T-junctions.FIGURE 25.14For a cycle of size 3 that is not a face we cannot satisfy all constraints.min YX i + W i £ WY ³ Y i + H iThe complete mixed-integer LP formulation is [Sutanthavibul et al., 1991]:min YX i ,Y i ,W i ³ 0P ij ,Q ij = 0 or 1X i + W i £ WY ³ Y i + H iX i + W i £ X j + W(P ij + Q ij )X j + W j £ X i + W(1-P ij + Q ij )Y i + H i £ Y j + H(1 + P ij -Q ij )Y j + H j £ Y i + H(2-P ij -Q ij )When H i appears in the above equations, it must be replaced (using first-order approximation techniques)by H i = D i W i + E i where D i and E i are defined below:W min = W max = H min = H max = D i = (H max – H min )/(W min – W max )E i = H max – D i W minThe unknown variables are X i , Y i , W i , P ij , and Q ij . All other variables are known. The equations can then befed into an LP solver to find a minimum cost solution for the unknowns.Placement TechniquesPlacement is a restricted version of floorplanning where all cells have fixed dimension. The objective of aplacement routine is to determine an optimal position on the chip for a set of cells in a way that the totaloccupied area and total estimated length of connections are minimized. Given that the main cause of delay ina chip is the length of the connections, providing shorter connections becomes an important objective in placinga set of cells. The placement should be such that no cells overlap and enough space is left to complete all theconnections.All exact methods known for determining an optimal solution require a computing effort that increasesexponentially with number of cells. To overcome this problem, many heuristics have been proposed [Preas andLorenzetti, 1988]. There are basically three strategies of heuristics for solving the placement problem, namely,constructive, partitioning, and iterative methods. Constructive methods create placement in an incrementalmanner where a complete placement is only available when the method terminates. They often start by placinga seed (a seed can be a single cell or a group of cells) on the chip and then continuously placing other cellsbased on some heuristics such as size of cells, connectivity between the cells, design condition for connectionlengths, or size of chip. This process continues until all the cells are placed on the chip. Partitioning methodsdivide the cells into two or more partitions so that the number of connections that cross the partition boundariesR i A iR i B iR i B i¤R i A i¤is minimized. The process of dividing is continued until the number of cells per partition becomes less than a certain small number. Iterative methods seek to improve an initial placement by repeatedly modifying it. Improvement might be made by transforming one cell to a new position or switching positions of two or more cells. After a change is made to the current placement configuration based on some cost function, a decision is made to see whether to accept the new configuration. This process continues until an optimal (in most cases a near optimal) solution is obtained. Often the constructive methods are used to create initial placement on which an iterative method subsequently improves.Constructive MethodIn most of the constructive methods, at each step an unplaced cell is selected and then located in the proper area. There are different strategies for selecting a cell from the collection of unplaced cells [Wimer and Koren, 1988]. One strategy is to select the cell that is most strongly connected to already placed cells. For each unplaced cell, we find the total of its connections to all of the already placed cells. Then we select the unplaced cell that has the maximum number of connections. As an example consider the cells in Fig. 25.15. Assume that cells c1 and c2 are already placed on the chip. In Fig. 25.16 we see that cell c5 has been selected as the next cell to be placed. This is because cell c5 has the largest number of connections (i.e., three) to cells c1 and c2.FIGURE 25.15 Initial configuration.FIGURE 25.16 Selection based on the number of connections.。
Memorandum ofUnderstanding1for the implementation of theCross-Cutting Activity (CCA):How to address the increasing challenge of science communication ina diverse European landscape?1In line with CSO Decision COST 076/18 and based on ‘A Quick Guide to Tasks and Decisions of Management Committees’OPENING STATEMENTCOST presents this Memorandum of Understanding (MoU) outlining the rationale, objective and specific objectives, working groups, deliverables and budget for the CCA network on science communication.The MoU is based on the input received from participants at the Cross-Cutting Activity (CCA) scoping event on science communication, held at the COST premises on 1-2 July 2019.The CCA network on science communication will operate in the context of a limited timeframe and resources.The timeline of activities, including the organisation of network meetings and production of deliverables, will be decided by the CCA network at the kick-off meeting.The CCA network will aim to achieve maximum engagement from its members for the full duration of its lifetime.CCA DETAILS•CSO approval date: 7-8 November 2018;•Start of the CCA network on science communication: 2 October 2019;•End of the CCA network on science communication: 1 October 2021;•Network activities and budget spending are subject to approval of the COST Association;•Network members may suggest additional stakeholders to join the CCA, bearing in mind that new members will have to be approved by the COST Director;•Leader of the CCA network will be presented at the kick-off meeting on 2 October. RATIONALE FOR THIS CCAEvery year, hundreds of EU-funded research projects are facing the challenge to achieve impact and communicate with relevant target audiences, whether they are policy makers, the private sector, NGOs, or the general public. Project participants, at that stage, have often not yet built relationships with these audiences and are not familiar with the appropriate channels or most effective communication options available to them.At the same time, science journalists are constantly looking for news and background stories which could be interesting for their audiences. It is often a lengthy and challenging process to incorporate the perspectives of an appropriate range of experts and stakeholders.While communicating the (potential) impacts of the sciences is an important goal, there is a need for an increased focus on reflection, dialogue, debate and participation (e.g. through co-creation) in the context of science communication practices. In this context, efforts should be made to involve and mobilise a wide range of relevant stakeholders, with the aim to obtain research results and innovations which are coherent, sustainable, transparent and relevant for society.A related challenge can be found in the need to better facilitate appropriately science-informed policy development and implementation processes at both national and international levels. The substantial increase of the science base, and the pace of innovation is both an opportunity and a challenge for societies and governments.Considering these challenges, the need for effective, high-quality, evidence-based science communication has never been greater. In order to address this need and maximise the impactof science communication, the CCA network will organise its activities from an interdisciplinary, cross-sectoral perspective, working on the basis of existing efforts and focusing on achieving tangible deliverables for specific target groups.For the purposes of this CCA network, ‘science communication’ is defined as follows (Bakker et al. 2020):Science communication describes the many ways in which the process, outcomes, and implications of the sciences –broadly defined –can be shared or discussed with audiences. Science communication involves interaction, with the goal of interpreting scientific or technical developments or discussing issues with a scientific or technical dimension.That is, the CCA network takes an expansive view of science communication, spanning journalistic, event and other face-to-face or digital methods of engaging with audiences on topics relating to research and innovation.KEYWORDS•Science communication•Researchers•EU and national policy•Media•Public engagement•Young researchers•Science informed policy adviceOBJECTIVEThe main aim and objective of the CCA network on science communication is to achieve high-quality, evidence-based and cross-sectoral science communication to enhance the societal value of research and innovation across Europe. In this context, the network will encourage stakeholder engagement and dialogue across Europe, set priorities, and define tools and channels necessary to connect researchers, journalists, diverse stakeholders and citizens and policymakers.The CCA network on science communication will facilitate exchange between researchers, journalists, media centres, policy makers, research funding bodies, stakeholder organisations and public institutions in order to meet the objectives outlined below as well as to facilitate ‘matchmaking’ of relevant actors across Europe to enhance the effectiveness of the sector.In order to maximise the impact of R&I investments, policy makers,researchers and civil society need to work together and engage in dialogue in an effective way. The CCA network on science communication will work towards this overall objective, which is reflected in all activities carried out by the network.SPECIFIC OBJECTIVESTo achieve the main objectives described in this MoU, the following specific objectives shall be accomplished:1. Create learning tools to enhance the value and impact of public engagementwith science• Develop evidence-based tools and guidelines to engage with the public and tailorscientific messages to the appropriate target audience;• Explore new opportunities and methods for engaging audiences with research andinnovation processes and outputs, based on the best available research in science communication;• Encourage interactive engagement with the public via approaches that have beenshown to be effective for particular purposes when employed appropriately, for example, citizen science, dialogue and new and innovative media platforms.2. Explore ways of achieving high-quality, evidence-based, interdisciplinaryscience communication, targeting diverse audiences• Present tools and best practices for science communication rooted in robust sciencecommunication research and theory;• Develop innovative frameworks and strategies for communicating about the scienceswith non-expert audiences, based on research about ‘what works and why’;• Consider how to increase trust in the science-society relationship, striking the rightbalance between working with stakeholders on EU, national and local levels;• Explore reward systems aimed at recognising and encouraging effective practices inscience communication, including rewarding the time that researchers and support staff invest in developing and delivering high quality science communication;• Encourage funding agencies to re-design incentives towards effective sciencecommunication.Science communicators/Journalists Citizens/StakeholdersPolicy makers3. Address the gap between the scientific community, policy makers, journalistsand citizens/stakeholders•Build bridges between researchers, policy makers, journalists and citizens/stakeholders by defining effective tools and channels for connecting these groups based on existing research;•Explore ways to foster fruitful knowledge exchange between researchers, policy makers and journalists/science communicators;•Identify productive processes, practices and ways of exchanging perspectives between researchers and science journalists/communicators, researchers and policy makers, stakeholders/citizens and policy makers;•Clarify ‘best practice’ advice on simple steps researchers can take to get more involved in science communication (e.g. how to ‘make themselves findable’ to appropriate science journalists and policy makers);•Identify ways of negotiating the gap between relatively slow research processes and the ‘fast fact’ needs of news media, which promote good science communication outcomes;•Identify practical steps to ‘mainstream’ key opportunities for engagement with science, rather than having science news segmented off in its own section.4. Develop high-quality training in science communication•Define target groups for training based on systematic analysis of empirical evidence (at EU, national and regional level);•Define training needs and objectives based on systematic analysis of empirical evidence;•Define the format and tools needed to address key demonstrated training needs based on the state of the art in science communication research and theory;•Explore opportunities to leverage greater impact through the ‘train the trainers’ principle;•Increase understanding, among researchers, of the range of communication tools available to them to address different communication challenges and teach them how to apply these tools effectively for specifically targeted audiences based on the best available research and theory in science communication.LIST OF WORKING GROUPS AND DELIVERABLESBased on the objectives and specific objectives outlined above, the following working groups and deliverables have been identified:BUDGETThe CCA network will organise its activities in line with the available budget. COST will make available EUR 180.000 for a 2-year period (subject to fund availability). This amount will be spent on the network’s activities, e.g. general network meetings, WG meetings, and dissemination activities of the network. All activities and related budget spending are subject to approval by the COST Association.Network members from institutions based in countries that are COST Full or Cooperating Member2 can request reimbursement for their participation in meetings. Network members will be reimbursed on the basis of a daily allowance and travel expenses (i.e. economy flights and first-class train tickets).Expenses related to your participation in this CCA network will be reimbursed according to the CCA Rules for reimbursement, available here: https://www.cost.eu/wp-content/uploads/2019/05/Travel-Reimbursement-Rules-Cross-Cutting-Activities.pdf .ROLE OF RAPPORTEURThe activities carried out by the network will be evaluated by an independent rapporteur, who will be appointed by the Director of the COST Association. The rapporteur will attend the network’s meetings where possible and will produce a final assessment report for the COST Committee of Senior Officials (CSO) at the end of the network’s lifetime.2Should you be a UK-affiliated participant, please note that in case of a no-deal Brexit, expenses incurred by UK-affiliated researchers in the framework of COST activities may become ineligible. UK-affiliated participants should not exclude that reimbursement could occur via other sources. For more information, please contact the UK COST National Coordinator, here: *************.uk .ANNEX 1: TIMELINE FOR ACTIVITIESAt the kick-off meeting on 2 October the CCA network will decide on the following: •the planning of general network meetings, and WG meetings;•the division of WG tasks and timeline for producing the deliverables. The WG tasks will be based on the objectives and deliverables that align with the respective WG (as outlined in the sections above).ANNEX 2: LIST OF CCA NETWORK MEMBERS33 Those institutions that will be represented by 2 people will alternate their participation in the CCA network meetings and activities between themselves.。
Unit 10 readingNetwork and Computer SecurityIntroductionThis computer security tutorial is written based on my experiences with computer and network security along with my training and information I have read. The field of security is constantly changing so I cannot guarantee that information in this computer security tutorial will be current. This computer security tutorial will define some basic security issues and give insight into what causes security to be a constant issue. It will help you decide what to protect and provide some basic information about attacks that may be made against your network, computer systems, or data. It will also provide computer and network security recommendations for you or your organization. Although much useful information can be derived from this document without the reader having networking knowledge, to use this document in depth, I recommend that readers of this computer security tutorial have a fundamental knowledge about networking.In this computer security tutorial, the terms computer security and network security will be used often. When the term computer security is used, it specifically refers to the security of one computer, although the overall security of each individual computer is required for network security. When the term network security is used, it refers to the security of the network in general. This includes such issues as password security, network sniffing, intrusion detection, firewalls, network structure and so forth.1. Security Violation DefinitionComputer or network security has been violated when unauthorized access by any party occurs.2. Why Security?Computer security is required because most organizations can be damaged by hostile software or intruders. There may be several forms of damage which are obviously interrelated. These include:•Damage or destruction of computer systems.•Damage or destruction of internal data.•Loss of sensitive information to hostile parties.•Use of sensitive information to steal items of monetary value.•Use of sensitive information against the organization's customers which may result in legal action by customers against the organization and loss of customers.•Damage to the reputation of an organization.•Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's reputation.The methods used to accomplish these unscrupulous objectives are many and varied depending on the circumstances. This guide will help administrators understand some of these methods and explain some countermeasures.3. Security IssuesComputer security can be very complex and may be very confusing to many people. It can even be a controversial subject. Network administrators like to believe that their network is secure and those who break into networks may like to believe that they can break into any network. I believe that overconfidence plays an important role in allowing networks to be intruded upon. There are many fallacies that network administrators may fall victim to. These fallacies may allow administrators to wrongfully believe that their network is more secure than it really is.This guide will attempt to clarify many issues related to security by doing the following:•Help you determine what you are protecting.•Break computer security into categories.•Explain security terms and methods.•Point out some common fallacies that may allow administrators to be overconfident.•Categorize many common attacks against networks and computers.•Explain some attack methods.•Describe tools that can be used to help make a network more secure.4. Security InterdependenceThere are many different aspects to computer and network security. These different areas of computer security are interdependent on each other in order for a network to be secure. If one or more areas of computer security are ignored, then the entire security integrity of the organization's network may be compromised. A clear example of this is in the area of computer virus or worm protection. Computer virus protection programs can only filter known viruses or worms. There are viruses or worms that are not yet recognized as virus programs immediately after their release. The best way to make unrecognized virus or worm programs less effective is by quickly removing the vulnerabilities that they use. Some of these vulnerabilities are operating system and application program errors. When security patches are created for software, they should be quickly applied. In this way the vulnerability to viruses is minimized but noteliminated. There are other steps which may further reduce this vulnerability, but it can never be completely eliminated.5. Security Limitations and ApplicationsIf you are reading this document and are thinking that you can get all the information required to make your network completely secure, then you are sadly mistaken. In many ways, computer security is almost a statistical game. You can reduce but not eliminate the chance that you may be penetrated by an intruder or virus. This is mainly for one reason:No one can ever know all the software vulnerabilities of all software used on a system.This is why even those who consider themselves hackers will say that the number one computer security threat is the lack of quality in the applications and operating systems.The bottom line here is that unless you can remove all the application and operating system problems that allow viruses and intruders to penetrate networks, you can never secure your network. Additionally the users on your network are potentially a greater security risk than any programs. Obviously removing all vulnerabilities is impossible and will not secure your network against user errors. I have even considered the possibility that an operating system without a network interface can be completely secure, but even this cannot be guaranteed. Unknown viruses or Trojan programs can creep in with applications on CDs or floppies. This has been known to happen. Although an attacker may not be able to get data from the system, they can damage or destroy data.6. Layered SecurityThe fact that complete security is impossible is the reason security experts recommend "layered security". The idea is to have multiple ways of preventing an intrusion to decrease the chance that intrusions will be successful. For example, you should have virus protection on your client computers. To help layer this security you should also filter viruses at your email server. To help even more, you should block the most dangerous types of email attachments to prevent unrecognized viruses and other hostile software from entering your network. Another good defense layer would also include educating your users about viruses, how they spread, and how to avoid them.HackersThere are many documents that attempt to define the term hacker. I believe that the term hacker is a connotative term. This means that it is more defined by people's beliefs rather than by a dictionary. Some believe that a hacker is a very skilled computer person. Others believe that hackers are those that perform unauthorized break into computer systems. The media and many sources have caused many uninformed people to believe that a hacker is a threat to computer and network security while this is not the case. A hacker is no more likely to break the law than anyone else. I use the more accurate descriptive term, "intruder" to describe those who intrude into networks or systems without authorization.8. Physical SecurityThis guide will not talk about physical computer security beyond this paragraph. Your organization should be aware how physically secure every aspect of its network is because if an intruder gets physical access, they can get your data. Be sure that your organization properly secures locations and consider the following:•Servers - Contain your data and information about how to access that data.•Workstations - May contain some sensitive data and can be used to attack other computers.•Routers, switches, bridges, hubs and any other network equipment may be used as an access point to your network.•Network wiring and media and where they pass through may be used to access your network or place a wireless access point to your network.•External media which may be used between organizational sites or to other sites the organization does business with.•Locations of staff who may have information that a hostile party can use.•Some employees may take data home or may take laptops home or use laptops on the internet from home then bring them to work. Any information on these laptops should be considered to be at risk and these laptops should be secure according to proper policy when connected externally on the network.9. Some TermsThis paragraph describes some commonly used computer security terms.•Protocol - Well defined specification allowing computer communication.•Confidentiality - Information is available only to people with rightful access.•Integrity - Information can only be changed by authorized personnel. The receiver of the message should be able to tell the message was not modified.•Availability - Information is available to only those who need it.•Verification - nonrepudiation - There is proof that the sender sent the message •Authentification - The receiver of the message should be able to be sure of the origin of the message. Requires a digital signature (One way hash, public key algorithm, and symmetric algorithm) or a public key algorithm.•Spyware - A computer program whose purpose is to spy on your internet activities usually for marketing purposes and usually done by a shady corporate entity.•Malware - A computer program with some evil intent. It may on the surface have a good or useful intent, but may be a Trojan (with a hidden purpose) which can be used to gain unauthorized access to your computer.10 confidentiality n. 机密性10 nonrepudiation n. 认可10 authentification n. 证实;认可10 algorithm n. 运算法则10 hash n. 无用信息, 杂乱信号10 symmetric adj. 对称的,相称性的, 均衡的10 spyware n. 间谍程序10 shady adj. 搞阴谋的,阴暗的10 malware n. 表面友好却藏有歹心的软件Phrases10 computer security 计算机安全10 network security 网络安全10 network sniffing 网络监视10 intrusion detection 闯入探测10 statistical game 统计对策10 hostile software 敌对软件10 fall victim to…成为…的牺牲品或受害者10 security patch 安全补丁10 corporate entity 公司,实体10 bottom line 概要;帐本底线10 network interface 网络界面,网络接口10 Trojan programs 特洛伊程序病毒10 layered security 分层安全10 email attachment 电子邮件的附件Abbreviations10 CD Compact Disc 光盘〖BT3〗〖WTHZ〗Exercise to the Passage for Reading〖STHZ〗〖WTHZ〗[Ex 6]〖WTBX〗〖ST〗〓Decide whether the following statementsare true (T) or false (F) in relation to the information in the passage. 〖WTBZ〗Introduction1. 〓This computer security tutorial concentrates upon only the computer security. (F)2. 〓This tutorial will also tell us the causes why the computer security is a constant issue. (T)3. 〓It doesn’t matter whether you have a fundamental knowledge about networking or not before you begin to read this tutorial. (F)4. 〓The computer security and the network security are two terms often used in this tutorial. (T)1. Security Violation Definition5. 〓Unauthorized access to a computer or a network means security violation. (T)2. Why Security?6. 〓Almost all organizations can be damaged by hostile software or intruders, so computer security is required. (T)7. 〓There is no necessary relation between loss of sensitive information and monetary damage. (F)3. Security Issues8. 〓Network administrators can always defeat those who break into networks. (F)9. 〓A dministrators’overconfidence is the main cause of the intrusion into their networks. (T)4. Security Interdependence10. 〓Some areas of computer security are interdependent on each other, while some others are independent. (F)11. 〓Usually computer virus protection programs can recognize virus programs as soon as they appear online. (F)12. 〓By moving the vulnerabilities and applying security patches we can minimize the damage by unrecognized virus or worm programs. (T)13. 〓There are a lot of measures for you to eliminate all the unrecognized virus or worm programs as long as you can make full use of them. (F)5. Security Limitations and Applications14. 〓As long as you read this document seriously and put what you learn into practice you’ll have the chance to make your computer completely secure. (F)15. 〓You cannot know all the software vulnerabilities of all software used on your computer but a professional can. (F)16. 〓The computer that is not connected to the Internet can be completely secure. (F)6. Layered Security17. 〓This paragraph tells web administrators to adopt the idea of “layered security”. (T)18. 〓The so-called “layered security” is the idea of having multiple ways of preventing an intrusion. (T)7. Hackers19. 〓A hacker is a intruder. (F)20. 〓Hackers are those who are threats to computer and network security. (F)8. Physical Security21. 〓If an intruder gets physical access, your data can also be lost. (T)22. 〓Be careful almost every network equipment may be used as an access point to your network and your data can be faced with threats. (T)23. 〓The employees of your network who bring their laptops everywhere can be robbed of the data from their machines. (T)9. Some Terms24. 〓All the terms mentioned in this paragraph are about the computer security. (T)25. 〓Spyware and Malware are both used by shady corporate entities for marketing purposes. (F)26. 〓Malware is easier to recognize than spyware. (F)译文网络和计算机安全导言这本计算机安全指南是根据我的计算机和网络安全经验,外加自己所接受的培训以及我所读到到有关的信息写成的。
1. A ( D) protocol is used to move a packet over an individual 独立link.A. application-layerB. transport-layerC. network-layerD. link-layer2. Which of the following services can not offered by a link-layer protocol? ( )A. congestion controlB. Link AccessC. Error controlD. FramingHint:framing, link access,reliable delivery,flow control,error detection,error correction,half-duplex and full-duplex3. ( B ) protocol serves to 为……服务coordinate 协调the frame transmissionsof the many nodes when multiple nodes share a single broadcast link.A. ARPB. MACC. ICMPD. DNS4. Consider CRC error checking approach, the four bit generator G is 1011, andsuppose that the data D is 10101010, then the value of R is ( A).A. 010B. 100C. 011D. 1105. In the following four descriptions说明about random access protocol, whichone is not correct? ( A )A. In slotted ALOHA, nodes can transmit at random time.B. CSMA/CD cannot be implemented on a wireless channel.C. The maximum efficiency of a slotted ALOHA is higher than a pure ALOHA.D. In CSMA/CD, one node listens to the channel before transmitting.6. In the following descriptions about MAC address, which one is not correct?( D )A. The MAC address is the address of one node’s adapter.B. No two adapters have the same MAC address.C. The MAC address doesn’t change no matter where the adapter goes.D. MAC address has a hierarchical structure分层结构.MAC:flat structureIP:hierarchical structure7. The ARP protocol can translate ( ) into ( ). ( C )A. host name, IP addressB. host name, MAC addressC. IP address, MAC addressD. broadcast address, IP address8. The value of Preamble field in Ethernet frame structure is ( C)A. 10101010 10101010……10101010 11111111B. 10101011 10101011……10101011 10101011C. 10101010 10101010……10101010 10101011D. 10101010 10101010……10101010 101010109. In CSMA/CD, the adapter waits some time and then returns to sensing thechannel. In the following four times, which one is impossible? ( D)A. 0 bit timesB. 512 bit timesC. 1024 bit timesD. 1028 bit times10. The principal components of PPP include but not( D ).A. framingB. physical-control protocolC. link-layer protocolD. network-layer protocol11. Consider the data D is 01110010001, if use even parity checking approach, theparity bit is( ① ), if use odd parity checking approach, the parity bit is( ② ). ( D )A. ① 0 ② 1B. ① 0 ② 0C. ① 1 ② 1D. ① 1 ② 012. In the following four descriptions, which one is not correct? (B )A. Switches can interconnect different LAN technologies.B. Hubs can interconnect different LAN technologies.C. There is no limit to how large a LAN can be when switches are used tointerconnect LAN segments.D. There is restriction on the maximum allowable number of nodes in a collisiondomain when hubs are used to interconnect LAN segments.13. Which of the following devices is not a plug and play device? ( B )A. hubB. routerC. switchD. repeater14. Which device has the same collision domain? ( A )A. HubB. SwitchC. RouteD. Bridge15. In data link-layer, which protocol is used to share bandwidth? ( D)A. SMTPB. ICMPC. ARPD. CSMA/CD16. When two or more nodes on the LAN segments transmit at the same time, therewill be a collision and all of the transmitting nodes well enter exponential back-off, that is all of the LAN segments belong to the same( A ).A. collision domainB. switchC. bridgeD. hub17. In the following four descriptions about PPP, which one is not correct? ( D )A. PPP is required to detect and correct errors.B. PPP is not required to deliver frames to the link receiver in the same order inwhich they were sent by the link sender.C. PPP need only operate over links that have a single sender and a singlereceiver.D. PPP is not required to provide flow control.18. For ( A ) links that have a single sender at one end of the link and a singlereceiver at the other end of the link.A. point-to-pointB. broadcastC. multicastD. all of the above19. With(B )transmission, the nodes at both ends of a link may transmit packets atthe same time.A. half-duplexB. full-duplexC. simplex(单工)D.synchronous20. Which of the following is wrong? ( A )A. ARP table is configured by a system administratorB. ARP table is built automaticallyC. ARP table is dynamicD. ARP table maps IP addresses to MAC addresses21. In LAN, if UTP is used, the common connector is (C ).A. AUIB. BNCC. RJ-45D. NNI22. Which of the following four descriptions about MAC addresses is wrong? ( C )A. a MAC address is burned into the adapter’s ROMB. No two adapters have the same addressC. An adapter’s MAC address is dynamicD. A MAC address is a link-layer address23. In the CSMA/CD protocol, what condition on the transmission delay andthe propagation delay has to be satisfied to guarantee that a node always detects a collision? BA. B.C. D.。
Protocol Parsing SolutionIntroductionThe Protocol Parsing Solution is a software development approach that enables the interpretation and analysis of various protocols used in computer networks. This document aims to provide a comprehensive overview of this solution, discussing its key components, benefits, and implementation considerations.Key Components1.Protocol Specification: The first step in the protocol parsing solutionis to define the protocol specifications. This includes identifying the structure and format of the protocol messages, as well as the expected behavior andcommunication flow. The protocol specification is typically defined using aformal language, such as the Extended Backus-Naur Form (EBNF), which allows for clear and unambiguous definition of the protocol grammar.2.Parsing Engine: The parsing engine is responsible for interpretingthe protocol messages according to the defined protocol specification. Itprocesses the incoming network data, extracts relevant information from the protocol messages, and updates the internal state of the system accordingly.The parsing engine typically uses a variety of techniques, such as finite state machines, regular expressions, and context-free grammars, to analyze andparse the protocol messages.3.Message Validation: Message validation is an essential part of theprotocol parsing solution. It ensures that the received messages adhere to the defined protocol specification and are free from any errors or anomalies. The validation process involves checking the syntactic correctness, semanticintegrity, and conformance to the protocol rules. Any invalid or malformedmessages are rejected to maintain the reliability and integrity of the system.4.Data Extraction: The protocol parsing solution also includes theability to extract relevant data from the parsed protocol messages. This caninclude retrieving specific fields or parameters, calculating statistics or metrics, or performing more complex operations on the extracted data. The extracted data can be used for various purposes, such as monitoring networkperformance, generating reports, or triggering specific actions based onpredefined conditions.5.Logging and Monitoring: To facilitate troubleshooting and analysis,the protocol parsing solution should include logging and monitoringcapabilities. This allows the system to record the processed messages, anyvalidation errors or warnings, and other relevant information. Additionally, themonitoring component enables real-time monitoring of the protocol traffic,providing insights into the network behavior and performance.Benefits•Standardization: The protocol parsing solution brings standardization to the interpretation and analysis of various protocols. Bydefining the protocol specifications in a formal language, the solution ensures consistent and accurate interpretation of the protocol messages acrossdifferent systems and applications.•Efficiency: With an efficient parsing engine and optimized algorithms, the protocol parsing solution can handle high volumes of network trafficwithout compromising performance. This enables the real-time processing and analysis of the protocol messages, providing timely insights and actions.•Flexibility: The protocol parsing solution can be easily adapted to support different protocols by creating and integrating new protocolspecifications into the parsing engine. This flexibility allows for the seamless addition of new protocols or the modification of existing ones withoutsignificant changes to the overall solution architecture.•Reliability: By validating the received messages against the protocol specifications, the solution ensures that only valid and conforming messages are processed. This helps to prevent potential vulnerabilities, errors, ormalicious attacks that may result from the handling of invalid or malformedmessages.•Extensibility: The protocol parsing solution provides a foundation for implementing additional features and functionalities. For example, it can beextended to support protocol-specific optimizations, encryption or securitymechanisms, or integration with other systems or frameworks.Implementation ConsiderationsWhen implementing the protocol parsing solution, the following considerations should be taken into account:•Protocol Complexity: Different protocols may vary in complexity, with some protocols requiring more advanced parsing techniques orspecialized processing algorithms. The implementation should consider thecomplexity of the protocols that need to be supported and ensure that theparsing engine can handle them effectively.•Performance Optimization: To achieve optimal performance, the implementation should focus on using efficient data structures, algorithms, and processing techniques. This includes minimizing memory usage, reducingparsing overhead, and optimizing the handling of large or fragmented protocol messages.•Error Handling and Resilience: The protocol parsing solution should have robust error handling mechanisms to handle unexpected orerroneous situations. This includes proper handling of validation errors,graceful recovery from parsing failures, and appropriate logging and reporting of errors.•Security Considerations: As the protocol parsing solution deals with network traffic, security considerations are paramount. The implementation should include measures to mitigate potential security risks, such as inputvalidation, sanitization of parsed data, and protection against malicious attacks or exploits.•Testing and Validation: Comprehensive testing and validation are crucial to ensuring the correctness and reliability of the protocol parsingsolution. This includes both unit testing of individual parsing components and integration testing with real-world protocol traffic.ConclusionThe Protocol Parsing Solution provides a reliable and efficient approach to interpret and analyze various protocols used in computer networks. With its key components, such as the protocol specification, parsing engine, message validation, data extraction, and logging capabilities, the solution enables accurate protocol parsing, validation, and analysis. By considering implementation considerations, such as protocol complexity, performance optimization, error handling, security, and testing, a robust and scalable protocol parsing solution can be developed to meet specific requirements and provide valuable insights into network behavior.。
5. A factor in the delay of a store-and-forward packet-switching system is how long it takes to store and forward a packet through a switch. If switching time is 10 µsec, is this likely to be a major factor in the response of a client-server system where the client is in New York and the server is in California? Assume the propagation speed in copper and fiber to be 2/3 the speed of light in vacuum.Solution:5. No. The speed of propagation is 200,000 km/sec or 200 meters/sec. In 10sec the signal travels 2 km. Thus, each switch adds the equivalent of 2 km of extra cable. If the client and server are separated by 5000 km, traversing even 50 switches adds only 100 km to the total path, which is only 2%. Thus, switching delay is not a major factor under these circumstances.13. What is the principal difference between connectionless communication andconnection-oriented communication?Solution:13. Connection-oriented communication has three phases. In the establishment phase a request is made to set up a connection. Only after this phase has been successfully completed can the data transfer phase be started and data transported. Then comes the release phase. Connectionless communication does not have these phases. It just sends the data.18. Which of the OSI layers handles each of the following:a. Dividing the transmitted bit stream into frames.b. Determining which route through the subnet to use.Solution:18. (a) Data link layer. (b) Network layer.21. List two ways in which the OSI reference model and the TCP/IP reference model are the same. Now list two ways in which they differ.Solution:21. Both models are based on layered protocols. Both have a network, transport, and application layer. In both models, the transport service can provide a reliable end-to-end byte stream. On the other hand, they differ in several ways. The number of layers is different, the TCP/IP does not have session or presentation layers, OSI does not support internetworking, and OSI has both connection-oriented and connectionless service in the network layer.22. What is the main difference between TCP and UDP?Solution:22. TCP is connection oriented, whereas UDP is a connectionless service.26. Why does ATM use small, fixed-length cells?Solution:26. Small, fixed-length cells can be routed through switches quickly, and completely in hardware. Small, fixed-size cells also make it easier to build hardware that handles many cells in parallel. Also, they do not block transmission lines for very long, making it easier to provide quality-of-service guarantees.6. What is the difference between a passive star and an active repeater in a fiber network? Solution:6. A passive star has no electronics. The light from one fiber illuminates anumber of others. An active repeater converts the optical signal to an electricalone for further processing.9.Is the Nyquist theorem true for optical fiber or only for copper wire?Solution:9. The Nyquist theorem is a property of mathematics and has nothing to do with technology. It says that if you have a function whose Fourier spectrum does not contain any sines or cosines above f, then by sampling the function at a frequency of 2f you capture all the information there is. Thus, the Nyquist theorem is true for all media.29.Why has the PCM sampling time been set at125 µsec?Solution:29. A sampling time of 125 sec corresponds to 8000 samples per second. According to the Nyquist theorem, this is the sampling frequency needed to capture all the information in a 4 kHz channel, such as a telephone channel.(Actually the nominal bandwidth is somewhat less, but the cutoff is not sharp.)22. An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed in the Ethernet frame, and if so, how many bytes?Solution:22. The minimum Ethernet frame is 64 bytes, including both addresses in the Ethernet frame header, the type/length field, and the checksum. Since the header fields occupy 18 bytes and the packet is 60 bytes, the total frame size is 78 bytes, which exceeds the 64-byte minimum. Therefore, no padding is used.24. Some books quote the maximum size of an Ethernet frame as 1518 bytes instead of 1500 bytes. Are they wrong? Explain your answer.Solution:The payload is 1500 bytes, but when the destination address, source address, type/length, and checksum fields are counted too, the total is indeed 1518.42.Briefly describe the difference between store-and-forward and cut-through switches. Solution:A store-and-forward switch stores each incoming frame in its entirety, then examines it and forwards it. A cut-through switch starts to forward incoming frames before they have arrived completely. As soon as the destination address is in, the forwarding can begin.43.Store-and-forward switches have an advantage over cut-through switches with respect to damaged frames. Explain what it is.Solution:43. Store-and-forward switches store entire frames before forwarding them. After a frame comes in, the checksum can be verified. If the frame is damaged, it is discarded immediately. With cut=through, damaged frames cannot be discarded by the switch because by the time the error is detected, the frame is already gone. Trying to deal with the problem is like locking the barn door after the horse has escaped.45.In Fig. 4-50 the switch in the legacy end domain on the right is a VLAN-aware switch. Would it be possible to use a legacy switch there? If so, how would that work? If not, why not?Solution:45. It would work. Frames entering the core domain would all be legacy frames, so it would be up to the first core switch to tag them. It could do this by using MAC addresses or IP addresses. Similarly, on the way out, that switch would have to untag outgoing frames.42. The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to 29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from 29.18.60.0 to 29.18.63.255 that are now suddenly assigned to a host using a different outgoing line. Is it now necessary to split up the aggregate address into its constituent blocks, add the new block to the table, and then see if any reaggregation is possible? If not, what can be done instead?Solution:It is sufficient to add one new table entry: 29.18.0.0/22 for the new block. If an incoming packet matches both 29.18.0.0/17 and 29.18.0.0./22, the longest one wins. This rule makes it possible to assign a large block to one outgoing line but make an exception for one or more small blocks within its range.27.Give one reason why a firewall might be configured to inspect incoming traffic. Give one reason why it might be configured to inspect outgoing traffic. Do you think the inspections are likely to be successful? SolutionIncoming traffic might be inspected for the presence of viruses. Outgoing traffic might be inspected to see if company confidential information is leaking out. Checking for viruses might work if a good antivirus program is used. Checking outgoing traffic, which might be encrypted, is nearly hopeless against a serious attempt to leak information.29. Suppose an organization uses VPN to securely connect its sites over the Internet. Is there a need for a user, Jim, in this organization to use encryption or any other security mechanism to communicate with another user Mary in the organization.SolutionIf Jim does not want to reveal who he is communicating with to anyone (including his own system administrator, then Jim needs to use additional security mechanisms. Remember that VPN provides security for communication only over the Internet (outside the organization). It does not provide any security for communication inside the organization. If Jim only wants to keep his communication secure from people outside the company, a VPN is sufficient.。
Chapter 1 - A Quick Description of Rope MakingRope machines typically come in three or four strand hook varieties, made of various amounts of wood and metal. Some of the machines are all metal and have gears to rotate the strand hooks several times per rotation of the hand crank. They all perform the same task – twist fibers into strands that get twisted into a rope. A later section discusses several machines from early 1900’s. There are several other pieces needed to complete the kit needed to make rope with the acquired rope machine.The rope machine must be mounted to something stable. Perhaps a farm wagon, table, post or sawhorse. The farmers of the 1900’s era made rope whenever and wherever the need arose. The cranking handle must be accessible to whoever is doing the cranking. More on this later.A hook on a movable “something” becomes the other end to complement the machine. Together, the two items form the “loom” for making the rope. This hook has to travel towards the machine during the rope forming process, hence the name “traveler”. It is needed for lay-up, or stringing, of the yarn, string or fibrous material being made into rope. Figure 1 depicts a hook mounted onto a crank, mounted onto a hand truck. The hook is positioned about the same height on the hand truck as the center of the rope machine. Other methods of providing the “hook” use a rope on a pulley, connecting the swivel hook to a ballast weight, or a hand held swiveling hook, or even a strand separator tool. These are discussed in a later section.The bucket shown in Figure 1 holds the ballast necessary to keep the hand truck from tipping over by the pull of the tension in the material laid between it and the machine.A correct amount of tension is needed to hold the strands up for winding. The quantity of ballast also depends on the smoothness of the work surface the hand truck rolls along and the thickness and suspended length of the rope being manufactured. Enough on ballast and variables for the moment.Yarn or string is strung between each strand hook on the machine and the traveling hook. The material is evenly distributed between the strand hooks being used in making the rope. A four strand hook machine can make a three or four strand rope, while a three strand hook machine can only make a three strand rope. There is a bit of artistry and craftsmanship in laying out the yarn evenly between strands and within each strand. This lay-up process directly affects the quality of the finished rope. A later section is devoted to this subject.When all the desired material has been applied to the hooks, the end of the yarn is tied to a hook to terminate the lay-up. The strand separator tool, like a strange comb, is placed between the strands to keep them separated and slid down to the traveler end before the winding starts.Figure 1 Rope Making Equipment and LayoutNow, the rope machine handle is cranked in a direction that has the strand hooks turning counter clockwise, if looking at the machine from the traveler hook. This creates a left hand twist, or lay, in the material of each strand and will make the resulting rope right hand lay. When the strands have become sufficiently twisted, the twist is pushed past the strand separator tool. When the strand twist meets similar strand twist energy from other strands, at the traveler hook, there is a twisting that occurs at the traveler hook. Hence the need for it to rotate, or swivel, while holding the tension of the laid up material.The separator is pulled toward the rope machine, as the machine is cranked at a slower pace, maintaining the strand rotation twist, while the formation and rotation of the rope, past the separator, removes some of the twist energy.The cranking continues till the separator reaches the rope machine. Then the rope is secured at each end with a whip knot or wrapped with tape. This prevents the rope from unraveling when removed from the hooks. Then the rope is removable from the hooks. If the lay-up was conducted correctly, the salvage end of the rope, at the traveler end, will have the yarns interlocked and resistant to raveling (won’t come apart). Applying tape or a whip knot at this end is still an acceptable practice.While this book discusses a lot of the knowledge necessary to make rope, the user must still practice making rope, and learn from shortcomings experienced in making rope. There are many variables in the process. Each can affect the quality of the rope being made.Practice making short ropes, with a lay-up length of four to five feet. Try laying up different materials. Try varying the strand twist amount versus rate of movement of the separator tool. Examine each rope made and make a list of the good, and bad, points about each rope.。
计算机英汉翻译外文原文Introduction to Javaautor:Martin Ngobye.source:Computing Static Slice for Java ProgramsJava is designed to meet the challenges of application development in the context of heterogeneous, network-wide distributed environments. Paramount among these challenges is secure delivery of applications that consume the minimum of system resources, can run on any hardware and software platform,and can be extended dynamically.Java originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, networkbasedend-userapplicationsinenvironmentsrangingfromnetwork-embedded devices to the World-Wide Web and the desktop.The design requirements of Java are driven by the nature of the computing environments in which software must be deployed.The massive growth of the Internet and the World-Wide Web leads us to a completely new way of looking at development and distribution of software. To live in the world of electronic commerce and distribution, Java must enablethe development of secure, high performance, and highly robust applications on multiple platforms in heterogeneous, distributed networks.Operating on multiple platforms in heterogeneous networks invalidates the traditional schemes of binary distribution, release, upgrade, patch, and so on. To survive in this jungle, Java must be architecture neutral, portable, and dynamically adaptable.The Java system that emerged to meet these needs is simple, so it can be easily programmed by most developers; familiar, so that current developers can easily learn Java; object oriented, to take advantage of modern software developmentmethodologies and to fit into distributed client-server applications; multithreaded, for high performance in applications that need to perform multiple concurrent activities, such as multimedia; and interpreted, for maximum portability and dynamic capabilities.Together, the above requirements comprise quite a collection of buzzwords, so let’s examine some of them and their respective benef its before going on.What’s completely new is the manner in which Java and its run-time system have combined them to produce a flexible and powerful programming system..Developing your applications using Java results in software that isportable across multiple machine architectures, operating systems, andgraphical user interfaces, secure, and high performance, With Java, your jobas a software developer is much easier―you focus your full attention on the end goal of shipping innovative products on time, based on the solidfoundation of Java. The better way to develop software is here, now, broughtto you by the Java language platform.Very dynamic languages like Lisp, TCL, and SmallTalk are often used for prototyping. One of the reasons for their success at this is that they arevery robust―you don’t have to worry about freeing or corrupting memory.Similarly, programmers can be relatively fearless about dealing with memory when programming in Java, The garbage collection system makes thep rogrammer’s job vastly easier; with the burden of memory management taken off the programmer’s shoulders, storage allocation errors go away. Another reason commonly given that languages like Lisp, TCL, and SmallTalk are good for prototyping is that they do n’t require you to pin down decisions early on―these languages are semantically rich.Java has exactly the opposite property: it forces you to make explicit choices. Along with these choices come a lot of assistance―you can write method invocations and, if you get something wrong, you get told about it at compile time. You don’t have to worry about method invocation error.中文翻译JAVA介绍作者:Martin Ngobye.出处:Computing Static Slice for Java ProgramsJava是被设计用来解决在上下文分布式的异构网络中应用程序开发的问题。
HCIP WLAN英文题库随着无线网络技术的不断发展,越来越多的人开始关注和学习无线网络相关的知识。
HCIP WLAN是华为认证体系中的一个重要认证,也是无线网络领域的专业认证之一。
为了帮助大家更好地备考HCIP WLAN认证,我们整理了一份HCIP WLAN英文题库。
以下是题库的详细内容:Part 1: Basic WLAN Knowledge1. What is the IEEE standard for WLAN?2. What are the differences between WLAN and LAN?3. Expl本人n the concept of SSID in WLAN.4. What are the basicponents of a WLAN system?5. How does WLAN security work and what are themon security protocols used in WLAN?Part 2: WLAN Planning and Deployment1. What are the key considerations for WLAN site survey and planning?2. Briefly expl本人n the process of WLAN deployment.3. What factors should be considered when determining WLAN coverage and capacity requirements?4. What are themon WLAN deployment strategies and theiradvantages and disadvantages?5. How to optimize WLAN performance and ensure quality of service?Part 3: WLAN Troubleshooting and M本人ntenance1. What are themon WLAN connectivity issues and how to troubleshoot them?2. Expl本人n the concept of WLAN interference and how to mitigate interference in WLAN.3. What are the key indicators of WLAN performance and how to monitor WLAN performance?4. How to perform regular m本人ntenance and upgrades for WLAN systems?5. What are the best practices for WLAN troubleshooting and m 本人ntenance?Part 4: Advanced WLAN Technologies and Applications1. What are the latest advancements in WLAN technology and their potential impact on WLAN deployment?2. Expl本人n the concept of WLAN roaming and how it works ina multi-AP environment.3. What are the key differences between traditional WLAN and cloud-managed WLAN?4. How does WLAN integrate with other wireless technologies such as Bluetooth and Zigbee?5. What are the emerging applications of WLAN in IoT, smart cities, and enterprise networking?Part 5: Case Studies and Practical Scenarios1. Analyze a real-world WLAN deployment case and identify the key challenges and solutions.2. Design a WLAN solution for a specific enterprise scenario, considering the coverage, capacity, and security requirements.3. Troubleshoot aplex WLAN issue and provide a step-by-step resolution plan.4. Evaluate the performance of an existing WLAN system and propose optimization strategies.5. Discuss the future trends and potential developments in WLAN technology and its impact on the industry.通过上述题库的学习和练习,相信大家可以更全面地了解HCIP WLAN考试的内容和要求,为考试做好充分的准备。
Rebecca Fiebrink10 March 2005An Overview of Work by Pachet and Aucouturier on Timbre Similarity IntroductionIn the last few years, there has been much research into developing frameworks for electronic music distribution and browsing systems that can best meet users’ needs. One vein of this research involves computing perceptually-based measures of music similarity. François Pachet and Jean-Julien Aucouturier, two researchers from the Sony Computer Science Laboratory in Paris, have contributed significantly to this body of work. This review outlines their main contributions to research on timbre similarity in particular.MotivationAucouturier and Pachet’s work on timbre similarity is motivated by the growing area of Electronic Music Distribution (EMD). EMD allows large numbers of music selections to be distributed to large user populations, but to be effective, it must be accompanied by means for users to efficiently browse through these electronic music collections. Aucouturier and Pachet argue that incorporating perceptual measures of musical similarity, specifically timbre similarity, can facilitate browsing through EMD systems. Musical taste is often associated with timbre, and timbre similarity is a useful and natural way to build relationships between music selections (Aucouturier and Pachet 2002a).Initial WorkTheir first work toward a timbre similarity system, published in 2002, involved the use of Mel Frequency Cepstral Coefficients (MFCCs) to compute a high-level timbre descriptor for each musical selection. This descriptor was built by finding the first eight MFCCs for every 50 milliseconds of audio and modeling the set of all MFCCs in the song as a 3-state Gaussian Mixture Model (GMM). The similarity between two songs is inversely related to the distance between the GMMs of the two songs, and this distance was computed by sampling using 1000 samples. The compact GMM information could be stored with each song in a database, and a similarity matrix could be computed offline for all pairs of songs for quick lookup by a user (Aucouturier and Pachet 2002a; 2002b).Aucouturier and Pachet evaluated the performance of the 2002 system favorably. The system often judged selections by the same artist or in the same genre to have similar timbre, which is to be expected for any timbre similarity measure. Additionally, the system proposed timbre matches such as a piece by Beethoven with a Beatles song. The authors described such matches as “interesting,” and argued that it was on those matches that would not be proposed based on artist or genre metadata alone that a timbre similarity measure proves most useful. There is difficulty inherent in testing a system such as this where no ground truth exists, but a study comparing this system to human listeners demonstrated agreement on similarity 80% of the time (Aucouturier and Pachet 2002a; 2002b).CUIDADO and the Music BrowserThis system was implemented within the European CUIDADO (Content-based Unified Interfaces and Descriptors for Audio/music Databases Available Online) project framework. This larger project, which lasted from 2001 to 2003, focused on music description structures, the development of extractors for high-level audio information, and the implementation of the Sound Palette and Music Browser applications (Vinet et al. 2002). 17, 075 popular music selections and associated metadata were accessible from the Music Browser, and work on the Browser continued through the duration of the CUIDADO project (Pachet et al. 2004). As part of their initial work, Aucouturier and Pachet (2002a; 2002b) integrated the timbre similarity measure so that users could directly search for songs that matched the timbre of a given song or generate playlists from a set of constraints, including constraints on timbre.Similar Work Through 2003Pampalk, Dixon, and Widmer’s paper discussed five perceptual music similarity measures, one of which was Aucouturier and Pachet’s 2002 system. While not all measures dealt specifically with timbre similarity, several also used MFCCs in similar computations. Aucouturier and Pachet’s system appeared to work relatively slowly but performed better than average (Pampalk, Dixon, and Widmer 2003).Improvements to the 2002 SystemIn 2004, Aucouturier and Pachet conducted a series of tests varying the algorithms and parameters used in their first system and evaluated the results within the Music Browser. They examined the extent of the improvements made possible by increasing the signal sampling rate and the GMM sampling rate, replacing GMM sampling with Earth Mover’s Distance, adjusting the number of MFCCs and GMM components, and changing the analysis window size. Even when they used their discovered optimum parameter values, they found that the system performance improved by only 16%. They also experimented with using a variety of speech processing algorithms, which offered at best a 2% increase, and they tried using hidden Markov models instead of GMMs, which offered no improvement (Aucouturier and Pachet2004a; 2004b).As a result of these tests, they concluded that little improvement was likely past 65% precision using the existing system framework. It is notable that this precision value is somewhat conservative, as they only considered same-genre matches to be correct for the purposes of evaluation. However, false-positives still seemed to be an issue in the 2004 system, and the authors proposed that further improvements might best be made through a greater focus on timbre perception. For instance, some frames of an audio signal might be more important than others in determining a piece’s perceived overall timbre quality, and some timbres may be more salient than others (Aucuturier and Pachet 2004a; 2004b).ConclusionsThe above studies suggest that timbre similarity systems, though in their infancy, can already provide us with effective and efficient supplements to existing music recommendation and browsing systems. However, existing systems based on MFCCdistributions are far from perfect, and their evaluation and improvement are frustrated by the difficulty of objective evaluation and by open questions regarding human timbre perception.ReferencesAucouturier, J., and F. Pachet. 2002a. Finding songs that sound the same. Proceedings of the First IEEE Benelux Workshop on Model Based Processing and Coding ofAudio, 91–98.———. 2002b. Music similarity measures: What’s the use? Proceedings of the International Conference on Music Information Retrieval.———. 2004a. Improving timbre similarity: How high’s the sky? Journal of Negative Results in Speech and Audio Sciences 1 (1).———. 2004b. Tools and architecture for the evaluation of similarity measures: Case study of timbre similarity. Proceedings of the International Conference on Music Information Retrieval.Pachet, F., A. La Burthe, A. Zils, and J. Aucouturier. 2004. Popular music access: The Sony music browser. Journal of the American Society for Information Science 55(12): 1037–44.Pampalk, E., S. Dixon, and G. Widmer. 2003. On the evaluation of perceptual similarity measures for music. Proceedings of the 6th International Conference on DigitalAudio Effects, 6-12.Vinet, H., P. Herrera, and F. Pachet. 2002. The CUIDADO project. Proceedings of the International Conference on Music Information Retrieval.。