FILTERING IMPORT A BASIC MECHANISM FOR REUSABILITY
- 格式:pdf
- 大小:880.63 KB
- 文档页数:8
Unit 1Reading A The Human complex— A Never –failing Source of Wonderment(人类的复杂性——一个永远不会失去惊叹的话题)“ In my view, ” wrote Thomas Jefferson in 1814 , “no knowledge can be more satisfactory to a man that of his own frame, its parts, their functions and action s. ” Distinguished thinkers before and since Jefferson have held this belief, but curiously, it is not one that the average person wholeheartedly shares.Man’s attitude toward his own body—his single most precious possession—is decidedly ambivalent. At one and the same time he is fascinated by it and fearful of it, partly in echo of ancient taboos, partly in the conviction that the body is too complicated to understand.( “在我看来,”托马斯杰佛逊于1814年写道:“对人来说,没有什么知识会比了解自身的架构、部件、功能和作用更能使他满足。
”包括杰佛逊在内的杰出思想家均持有这个观点,但有趣的是,这个观点并不为普罗大众所由衷地接受。
人们对自己的身体,这个对他自身来说最为宝贵的财富,态度其实是充满矛盾的。
单相滤波器原理A single-phase filter is a type of electronic filter designed to improve the quality of power and eliminate unwanted noise and harmonics in single-phase power systems. 单相滤波器是一种电子滤波器,旨在提高电力质量,并消除单相电力系统中不需要的噪音和谐波。
These filters are commonly used in residential, commercial, and industrial applications to improve power factor, reduce electromagnetic interference, and protect sensitive equipment. 这些滤波器通常用于住宅、商业和工业领域,以提高功率因数,减少电磁干扰,并保护敏感设备。
There are various types of single-phase filters, including passive filters, active filters, and hybrid filters, each with its own unique characteristics and applications. 单相滤波器有各种类型,包括无源滤波器、有源滤波器和混合滤波器,每种类型都有其独特的特点和应用。
Understanding the principles of single-phase filters can help users choose the right type of filter for their specific needs and ensure the reliable operation of their power systems. 理解单相滤波器的原理可以帮助用户选择适合其特定需求的滤波器类型,并确保其电力系统的可靠运行。
These instructions must be thoroughly read and understood before installing and operating this product. All installation, operation, and maintenance activities should be performed by suitable personnel using reasonable care. If you have any questions or concerns, please call the Technical Services Department at 800-343-4048, 8AM to 5PM Eastern Time or email at*****************************(NorthAmerica).Forotherlocations,pleasecontactyourlocal representative.Please save product packaging for future use.The filter-regulator should be installed on the compressed gas line as close as possible to the point of use. If there is sufficient liquid entrained in the gas to coalesce and drain from the filter cartridge, the filter-regulator must be installed vertically, with the drain port down. If liquid drainage is not expected, the filter-regulator may be mounted horizontally (except for those models equipped with an automatic float drain). If the compressed air supply contains excessive amounts of water and compressor oils, a drip leg and a properly sized prefilter should be installedupstream from the filter regulator. (Request the FNS Catalog or call your local Representative for more information.)Use only non-detergent mineral base oils with assemblies containing polycarbonate e of any other types of oils could lead to dangerous failure of the product.Pipe the gas to be regulated to the inlet port (marked “IN”, or as indicated by a flow arrow). The remaining three ports will be at the regulated pressure. Use the port opposite the inlet as the outlet, use one of the remaining two ports as the gage port, and plug the unused port.Set the desired outlet pressure by adjusting the knob or T-handle at the top of the regulator. Set the pressure under flow conditions, rather than no-flow conditions. If the regulator setting is fixed for no-flow conditions, the control pressure will decrease rather sharply when flow starts and then hold relatively constant close to the maximum flow capacity of the regulator.If the pressure control setting is reduced, the excess pressure downstream from the regulator will be relieved through the regulator and vented to the atmosphere. The regulator is protected by the filter and does not require routine maintenance (other than filter cartridge replacement). To avoid damaging the regulator, do not use the regulator when the filter cartridge is not installed in the filter housing. In the event of damage to the regulator, a complete regulator repair kit may be purchased (see Replacement Parts list).Turn off compressed air flow to the filter regulator and depressurize the filter housing prior to performing maintenance activities on the product.The only preventive maintenance required for the Balston filter-regulator is changing the filter cartridge on an annual basis (or more often, as dictated by the cleanliness of the gas supply).A Balston Microfibre ® Filter Cartridge continues to filter at its original efficiency even when it is wet with liquids. The life of the filter cartridge is determined by the increase in flow resistance resulting from trapped solids in the filter cartridge. The filter cartridge should be changed every 12 months. Part numbers for replacement cartridges are shown in the table on the reverse side of this data sheet.Changing filter cartridges more frequently will translate into direct energy savings and reduced operating costs.Annual electricity costs to operate a typical 100 HP compressor can be as high as $50,000. Pressure drop in the system adds to this expense. A system operating at 100 psig that is experiencing a 2 psig pressure drop through a filter, requires an additional 1% in operating energy costs or approximately $500.00+ per year.Failure of the filter cartridge resulting from a high pressure drop or excessive solids loading may cause damage to the filter housing and/or any downstream equipment.Balston Microfibre Filter Cartridges are sealed into place by compression against a flat surface. No gaskets are required between the filter cartridge and the filter housing. The filter cartridge is securely sealed by tightening the element retainer by hand. It is not necessary to use excessive force in tightening the element retainer, and no tools should be used.!InstallationOperationMaintenance!Balston Filter-Regulator Model AFR-940Installation, Operation, and Maintenance Manual®Bulletin TI-131RParker Hannifin CorporationFiltration and Separation Division Haverhill, MA • 1-800-343-4048/balstonFilter-Regulator Replacement Cartridges AFR-940, 940A050-05-BXERegulator Repair Kit93532ReplacementFilter CartridgesControl Range0-30 psig (0-2.1 barg)5-60 psig (0.5-4.1 barg)10-130 psig (1.0-9.0 barg) AFR-940AFR-940-30AFR-940-60AFR-940-130AFR-940A AFR-940A-30AFR-940A-60AFR-940A-130OptionalAccessoriesDescription Part NumberAuxiliary Prefilter2002N-1B1-DXMaterials of ConstructionPort Gauge Max.Max.ShippingSize Ports Head Bowl Bonnet Internals Temp.Press. (1)WeightAFR-9401/4" NPT1/8" NPT Anod. Alum.Polycarb.Polycarb.Brass/Buna220°F (104°C)150 psig (10.3 barg)0.5 lbs (0.2 kg) AFR-940A1/4" NPT1/8" NPT Anod. Alum.Anod. Alum.Polycarb.Brass/Buna220°F (104°C)250 psig (17.2 barg)0.5 lbs (0.2 kg)Parker Filtration & SeparationFiltration Group EuropeHermitage Court, Hermitage LaneMaidstone, Kent ME16 9NT, EnglandTel: +44 (01622) 723300 Fax: +44 (01622) 728703/pagCopyright© Parker Hannifin Corporation 1987, 2008Printed in U.S.A. Bulletin TI-131R Parker Hannifin CorporationFiltration and Separation Division242 Neck Road, P.O. Box 8223Haverhill, MA 01835-0723Tel: 978-858-0505 Fax: 978-556-7501/balstonNotes:1 Maximum pressure ratings are fortemperatures to 130°F (54°C). Pleaseconsult the factory for maximum pressureratings at elevated temperatures.Bulletin TI-131R Installation, Operation and Maintenance Manual Technical Information Balston Filter-Regulator Model AFR-940When reading the control characteristics chart, first determinethe initial outlet pressure that will be used at zero flow. Find theappropriate pressure curve. Follow the curve until it intersectsthe desired flow. This point is the outlet pressure at thedesired flow rate.。
Overview GuideTable of ContentsChapter 1. Introduction (1)Chapter 2. DOCA Libraries (2)2.1. DOCA App Shield (2)2.2. DOCA Arg Parser (2)2.3. DOCA Comm Channel (2)2.4. DOCA Compress (3)2.5. DOCA Core (3)2.6. DOCA DMA (3)2.7. DOCA DPA (3)2.8. DOCA DPI (3)2.9. DOCA Erasure Coding (4)2.10. DOCA Ethernet (4)2.11. DOCA Flow (4)2.12. DOCA GPUNetIO (4)2.13. DOCA IPsec (5)2.14. DOCA RDMA (5)2.15. DOCA RegEx (5)2.16. DOCA Rivermax (5)2.17. DOCA SHA (5)2.18. DOCA Telemetry (5)2.19. DOCA UCX (6)Chapter 1.IntroductionDOCA programming guides provide the full picture of DOCA libraries and their APIs. Each guide includes an introduction, architecture, API, and many more library-specific information with the aim of making DOCA libraries easy to use.Chapter 2.DOCA LibrariesDOCA libraries are designed to serve DOCA-based software such as the provided example applications. For optimal performance, it is recommended to run these applications on the DPU. However, if necessary, DOCA libraries can be run on the host.In addition, built-in gRPC support for DOCA allows certain libraries to be used by gRPC clients running on the host that communicates with a matching gRPC server which implements the library's functionality on the DPU.2.1. DOCA App ShieldDOCA App Shield library API offers intrusion detection capabilities using the built-in hardware services of the DPU to collect data from the host's memory space. App Shield makes it possible to detect attacks on critical services in the host system. This library leverages the DPU's direct memory access (DMA) capability to monitor the host's memory space directly without involving the host's operating system nor CPU.2.2. DOCA Arg ParserDOCA Arg Parser library offers DOCA-based programs an easy and simple command-line interface. Arg Parser supports both regular command-line arguments and a JSON mode that accepts a JSON file containing the required arguments.2.3. DOCA Comm ChannelDOCA Comm Channel library creates a secure, network-independent communication channel between the host and the DPU. Comm Channel provides a client-server API. Comm Channel is reliable and message-based. It offers a notification mechanism that can be used by Linux system calls (e.g., epoll, poll, select) and support for multiple connections on the server-side.2.4. DOCA CompressThe DOCA Compress library offers a hardware-accelerated way to compress and decompress data on both DPU and host.2.5. DOCA CoreThe DOCA Core library provides a unified interface to construct standardized DOCA workflows that other libraries and applications can build upon.2.6. DOCA DMAThe DOCA Direct Memory Access (DMA) library offers an API for copying data buffers between the host and the DPU using hardware acceleration, supporting both local and remote copy. DMA allows the execution of complex memory operations in an optimized, hardware-accelerated manner.2.7. DOCA DPAThe DOCA Erasure Coding library provides an API to encode and decode data using hardware acceleration, supporting both the host and NVIDIA® BlueField® DPU memory regions.DOCA Erasure Coding recovers lost data fragments by creating generic redundancy fragments (backup). Each redundancy block that the library creates can help recover any block in the original data should total loss of a fragment occur.DOCA Erasure Coding increases data redundancy and reduces data overhead.2.8. DOCA DPIDOCA Deep Packet Inspection (DPI) library offers a deep examination of data packets as they traverse a monitored network checkpoint. DPI provides a robust mechanismfor enforcing network packet filtering, as it can be used to identify or block a range of complex threats due to efficient data stream inspection.DPI leverages the RegEx engine on the DPU which can very efficiently parse regular expressions found in packets.DOCA DPI has built-in gRPC support.2.9. DOCA Erasure CodingThe DOCA Erasure Coding library provides an API to encode and decode data using hardware acceleration, supporting both the host and NVIDIA® BlueField® DPU memory regions.DOCA Erasure Coding recovers lost data fragments by creating generic redundancy fragments (backup). Each redundancy block that the library creates can help recover any block in the original data should total loss of a fragment occur.DOCA Erasure Coding increases data redundancy and reduces data overhead.2.10. DOCA EthernetThe DOCA Ethernet library provides two APIs for receiving Ethernet packets on an RX queue and for sending Ethernet packets on a TX queue respectively.The library collects the user configuration data on the host CPU side, creates TX/RX objects, and exports them to the GPU side for execution in the data-path.2.11. DOCA FlowDOCA Flow library is the most fundamental API for building generic execution pipes in hardware. The main building block of the library is a pipe. Each pipe consists of match criteria, monitoring, and a set of actions. Pipes can be chained to create a set of complex actions to be performed on ingress packets.This library serves as an abstraction layer API for network acceleration and should be used by applications intended to offload packet processing from the operating system Kernel directly to the user space.DOCA Flow has a built-in gRPC-support.2.12. DOCA GPUNetIOThe DOCA GPUNetIO library offers building blocks to create a GPU-centric packet processing network application where CUDA kernels are capable of directly interacting with the network card without involving the CPU in the main critical path.This library provides CUDA device functions to send and receive packets. Additionally, an object named semaphore is provided to allow message passing across CUDA kernels or a CUDA kernel and a CPU thread.This library also allow allocating memory on the GPU that would be accessible from the CPU and vice versa.2.13. DOCA IPsecThe DOCA IPsec library provides an API to create the security association (SA) objects required for DOCA Flow's hardware-accelerated encryption and decryption.2.14. DOCA RDMADOCA RDMA enables direct access to the memory of remote machines, without interrupting the processing of their CPUs or operating systems. Avoiding CPU interruptions reduces context switching for I/O operations, leading to lower latency and higher bandwidth compared to traditional network communication methods.2.15. DOCA RegExDOCA RegEx library provides regular expression pattern matching to DOCA programs. It provides access to the regular expression processing (RXP) engine, a high-performance hardware-accelerated engine available on the DPU.RegEx allows the execution of complex regular expression operations in an optimized, hardware-accelerated manner.2.16. DOCA RivermaxThe DOCA Rivermax library provides an API for using NVIDIA® Rivermax®, an optimized networking SDK for media and data streaming applications. Rivermax leverages the DPU hardware streaming acceleration technology which allows data to be transferred to and from the GPU to deliver best-in-class throughput and latency.2.17. DOCA SHAThe DOCA SHA library provides a flexible and unified API to leverage the secure hash algorithm offload engine present in the NVIDIA® BlueField®-2 DPU. The SHA hardware engine supports SHA-1, SHA-256, and SHA-512 algorithms either as "single shot" or stateful calculations.2.18. DOCA TelemetryDOCA Telemetry library offers a fast and convenient way to transfer user-defined data to the DOCA Telemetry Service (DTS). Telemetry API provides the user a choice between several different outputs including saving the data directly to storage, NetFlow, Fluent Bit forwarding, or Prometheus endpoint.2.19. DOCA UCXUnified Communication X (UCX) is an optimized point-to-point communication framework. UCX exposes a set of abstract communication primitives that makes the best use of available hardware resources and offloads. UCX facilitates rapid development by providing a high-level API, masking the low-level details, while maintaining high performance and scalability.NoticeThis document is provided for information purposes only and shall not be regarded as a warranty of a certain functionality, condition, or quality of a product. NVIDIA Corporation nor any of its direct or indirect subsidiaries and affiliates (collectively: “NVIDIA”) make no representations or warranties, expressed or implied, as to the accuracy or completeness of the information contained in this document and assume no responsibility for any errors contained herein. NVIDIA shall have no liability for the consequences or use of such information or for any infringement of patents or other rights of third parties that may result from its use. This document is not a commitment to develop, release, or deliver any Material (defined below), code, or functionality.NVIDIA reserves the right to make corrections, modifications, enhancements, improvements, and any other changes to this document, at any time without notice.Customer should obtain the latest relevant information before placing orders and should verify that such information is current and complete.NVIDIA products are sold subject to the NVIDIA standard terms and conditions of sale supplied at the time of order acknowledgement, unless otherwise agreed in an individual sales agreement signed by authorized representatives of NVIDIA and customer (“Terms of Sale”). NVIDIA hereby expressly objects to applying any customer general terms and conditions with regards to the purchase of the NVIDIA product referenced in this document. No contractual obligations are formed either directly or indirectly by this document.NVIDIA products are not designed, authorized, or warranted to be suitable for use in medical, military, aircraft, space, or life support equipment, nor in applications where failure or malfunction of the NVIDIA product can reasonably be expected to result in personal injury, death, or property or environmental damage. NVIDIA accepts no liability for inclusion and/or use of NVIDIA products in such equipment or applications and therefore such inclusion and/or use is at customer’s own risk.NVIDIA makes no representation or warranty that products based on this document will be suitable for any specified use. Testing of all parameters of each product is not necessarily performed by NVIDIA. It is customer’s sole responsibility to evaluate and determine the applicability of any information contained in this document, ensure the product is suitable and fit for the application planned by customer, and perform the necessary testing for the application in order to avoid a default of the application or the product. Weaknesses in customer’s product designs may affect the quality and reliability of the NVIDIA product and may result in additional or different conditions and/or requirements beyond those contained in this document. NVIDIA accepts no liability related to any default, damage, costs, or problem which may be based on or attributable to: (i) the use of the NVIDIA product in any manner that is contrary to this document or (ii) customer product designs.No license, either expressed or implied, is granted under any NVIDIA patent right, copyright, or other NVIDIA intellectual property right under this document. Information published by NVIDIA regarding third-party products or services does not constitute a license from NVIDIA to use such products or services or a warranty or endorsement thereof. Use of such information may require a license from a third party under the patents or other intellectual property rights of the third party, or a license from NVIDIA under the patents or other intellectual property rights of NVIDIA.Reproduction of information in this document is permissible only if approved in advance by NVIDIA in writing, reproduced without alteration and in full compliance with all applicable export laws and regulations, and accompanied by all associated conditions, limitations, and notices.THIS DOCUMENT AND ALL NVIDIA DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESSED, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL NVIDIA BE LIABLE FOR ANY DAMAGES, INCLUDING WITHOUT LIMITATION ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF ANY USE OF THIS DOCUMENT, EVEN IF NVIDIA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Notwithstanding any damages that customer might incur for any reason whatsoever, NVIDIA’s aggregate and cumulative liability towards customer for the products described herein shall be limited in accordance with the Terms of Sale for the product.TrademarksNVIDIA, the NVIDIA logo, and Mellanox are trademarks and/or registered trademarks of Mellanox Technologies Ltd. and/or NVIDIA Corporation in the U.S. and in other countries. The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world¬wide basis. Other company and product names may be trademarks of the respective companies with which they are associated.Copyright© 2023 NVIDIA Corporation & affiliates. All rights reserved.NVIDIA Corporation | 2788 San Tomas Expressway, Santa Clara, CA 95051。
阀体body 蝶板disk 阀轴(轴)shaft(stem) 密封圈压板retainer(sealing retaining ring) 涡轮传动装置worm gear actuator 传动装置actuator 手轮hand wheel 方头square head 手动装置manual actuator 阀体密封圈body ring 一级电动装置1st electric actuator 二级传动装置2nd actuator 伸缩管flexible tube 0形密封圈“0”sealing ring 附法兰体additive flange 电动装置motor-driven(electric)actuator 超扭矩机构over torque device 电动机motor 行程控制器travel(stroke)controller 电源微动开关sensitive switch power 螺杆bolt 压盖(填料)gland 法兰盘flange 套sleeve 管道法兰pipeline flange 定位螺钉dog screw 螺帽nut 气动或液动装置pneumatic or hydraulic actuator 对开环holding ring 顶帽end cap 备用手轮spare hand wheel 蝶阀下部lower part of butterfly valve 阀封圈压板retaining ring 一、二级传动装置1st、2nd transmission device 下阀轴lower valve shaft 上阀轴upper valve shaft 控制箱control box 百叶板louver disk 连杆机构connecting rool mechanism 搬把handle 锁紧螺母lock nut 摇杆rocker 扫除口cleaning hole 摇杆机构rocker mechanism 支座supporting 传动支座supporting for actuator(transmission support)销pin 密封圈sealing ring 阀座seat 锥销taper pin 手柄装置leverage 四方头帽square head cap 微型电动装置mini-electric-actuator 锁定油缸locking cylinder 液压操纵箱hydraulic operating case 重锤heavy hammer/weight(hammer)摆动油缸rocking goil cylinder 液控箱hydraulic operating case 压缩弹簧press spring 电控箱electric case 测试装置inspecting device 液动装置hydraulic device 连杆connecting rod 液压站hydraulic device 弹簧装置spring device 接座actuator support 异径弯头reducing elbow 口盖hole cover 调整轴套adjustable axle 轴(2)shaft(2)排污排砂阀inud and sand exhausting 控制箱control box 闸板密封圈disk seal ring 闸板disk/gate 阀杆stem 填料packing 填料压盖gland 立柱support 阀杆螺母stem nut 螺母轴承压盖nut bearing gland 螺母nut 四方套square sleeve 阀盖bonnet 防尘罩dust cover 链轮chain wheel 旁通阀by-pass valve 万向顶universal supporter 螺母轴承nut bearing 阀门连接装置valve connecting device 垫片gasket 伞齿轮传动装置bevel gear transmission device 扫除盖cleaning cover 限位块positive position block 活塞杆piston stem 油缸cylinder 顶楔upper(wedge)螺母轴承盖nut bearing cover 油箱oil box 高压软管high pressure flexible pipe 调整螺杆adjustable thread rod 活塞piston 水压筒hydraulic barrel 导杆guide rod 螺柱bolt 水压筒盖cylinder cover 吊环suspension ring 指示盘indicating plate 齿轮gear 齿轮架gear frame 小伞齿轮small bevel gear 大伞齿轮large bevel gear 下楔板lower wedge board 上楔板upper wedge board 小齿轮small gear 大齿轮big gear 涨顶expanding 贮油箱oil storage box 马鞍saddle 密封环seal ring 阀帽(stem)cap 左阀箱left valve case 放散阀purge valve 液压马达hydraulic motor 顶开油缸open up cylinder 右阀箱right valve case 位置检测机构position inspecting mechanism 顶开压紧机构open-up pressing mechanism 销轴(甲)pin shaft(A)销轴(乙)pin shaft(B)双向阻尼油缸double direction damping cylinder 阀瓣disc 阀瓣密封垫disc seal gasket 橡胶密封圈rubber sealing ring 连接法片joint flange 过滤网filtering net 隔板spacer 缓冲油缸buffering cylinder 杠杆lever 储油筒oil tank 阻尼油缸damping (oil)cylinder 罩cover 节流螺杆throttle screw(stem)转臂turn-arm 助推油缸boosting oil-cylinder 电磁换向阀magnetic valve 行程开关travel switch 助推气缸boosting air cylinder 控制阀control valve 油雾器装置oil sprayer device 缓冲装置buttering device 旋启式阀瓣swing clack 节流阀throttle plug 触销contact pin 避震缸shock-proof cylinder 导向键guide position key 丝杠套screw sleeve 手轮轴shaft of hand wheel 导向杆guide position rod 缓冲座buttering seats 调节阀adjust piston 缓冲缸活塞piston of buttering cylinder 缓冲缸buttering cylinder 缓冲缸弹簧springs of butteringcylinder 连接轴connecting shaft 连接套connecting sleeve 支座support 下轴lower shaft 活塞门piston gate 活塞密封圈piston sealing 出口短管exit foint 自控电动装置automatical electric-driven actuator 塞子plug 浮球(浮体)floating tub 密封嘴垫sealing nozzle 排气咀nozzle 上盖upper cover 导向托架guiding bracket 浮桶floating tub 排气咀exhaust nozzle 密封盖sealing cover 导向套guiding sleeve 防尘罩dust proof cover 密封垫sealing gasket 手柄handle 轴套shaft sleeve 压板retainer 端盖end cover 顶杆pillar 转换滑块exchange slide 支轴support 顶帽upper cover 定位板fixing plate 法兰flange 支架support frame 阀盖bonnet 导槽架guide way frame 凸轮cam 接盘joint plate 齿轮轴座gear shaft frame 旋塞plug 减速器decelerator 电机(一)/(二)motor 门框frame 闸门gate 导轨(一)guide 压块pressing block 吊块hang block 阀杆stem 支承架support 立柱column 闸框frame 楔紧装置gripping device 付导轨vice-guide 伞齿轮传动装置bevel gear device 闸板gate 螺纹销screw pin 导轨板guide plate 启闭机headstock 压紧机构compress mechanism 堰框体frame body 导轨guide track 堰板weir gate 密封条sealing strip 堰门销weir gate pin 堰杆stem 横梁crossbeam 行程撞块travel colliding block 框架frame 插板plate 底板bottom plate 工字槽、框架I slot frame 吊架hanger 吊钩hook 门板gate 平法兰plat flange 附法兰体auxiliary flange 短管short pipe 螺柱blot 连接盘connecting ring 套环sleeve ring 双头螺柱stud bolt 垫圈gasket 联接管connecting pipe 主体管main pipe 密封环seal ring 注入剂poured juice 螺塞screw plug 球头ball head 轴瓦bush 外套组件accessory 可拆进料口removable port of supply 后座back seatDT- DN800-2000蝶阀成套装置complete sets of fittings for butterfly valve 蝶阀butterfly valve 法兰承口flanged female end 单法兰插管(三)one-flanged inserting joint (3)柔口flexible joint 单法兰插管(一)one flanged inserting joint 法兰插口flanged inserting endKT- DN800/600—2000/1800跨越管成套装置cross pipe complete sets of fittings 法兰插口flanged female end 单法兰插管one-flanged inserting joint(A)柔口flexible joint 蝶阀butterfly valve 双法兰管both-flanged joint 蝶阀butterfly valve 单法兰插管二one-flanged joint 柔口flexible joint 全法兰丁字管full-flanged T joint 法兰承口flanged female endNT- DN800/300—2000/800排泥管成套装置completes sets of fittings for mud pipe 排泥管mud pipe 双法兰管both-flanged joint 蝶阀butterfly valve 单法兰管one flanged jointQT DN800/80—2000/20排气阀成套装置completes sets of fittings for air valve 丁字管T pipe 手动闸阀manual gate valve 快速排气阀quick air release valve扭矩限制机构torque controlling mechanism 主刻度板dial indicator 动作板acting plate 齿轴gear shaft 微动开关sensitive switch 指针indicating pointer 转臂rotary arm 调整螺钉adjusting screw 扭簧torsional spring 底盘base plate 定位螺钉dog screw 扭矩限制板torque control plate 限位销retaining pin公称通径nominal diameter 公称压力nominal pressure 试验压力testing pressure 壳体body shell 密封seal 适用介质suitable medium 水、海水water、sea water 适用温度suitable temperature 安装方式installing direction 立式、卧式、2A型只能卧式安装horizontal、vertical、2A horizontal 介质流速medium flow rate 工作压力working pressure 含尘烟气、空气等smoke with dust、air etc 烟气、空气等smoke、air etc 型号type 煤气(coal)gas 天然气natural gas 蒸汽steam/vapour 清水clean water 污水foul water 盐水salt water 食品foods 药物medicine 油品oil products 各种酸碱类various acids &alkalies 无腐蚀饱和水蒸汽non-corrosion saturated water vapour 真空浅漏率vacuum leaking rate 含微量粉尘空气、蒸汽、水air with tiny dust、vapour、water 含尘空气air of containing dust 快关时间quick closing time 慢关时间slow closing time 慢开时间slow opening time T-水T-water W-油品W-oil 高炉煤气等furnace gas etc 工作水头(m水柱)working water head(m water column)过热水等over-heat water etc 灵敏度误差sensitivity error 最快响应时间the fastest respend time 正向front 反向opposite 单向承压bearing pressure in single direction 双向承压bearing pressure in double direction 源水natural water 渗漏量beakage 符合AWW A C501标准conform to ANSI/AWWA C 501standard 最大补偿量maximum compensating length 单向one-way 双向two-way 球头最大折曲角maximum bending angle of ball head。
dpdk报文处理流程English Answer:1. Packet Processing Flow.Receive Packets: DPDK uses a polling-based mechanism to receive packets from NICs. This means that the CPU actively checks for incoming packets, rather than waiting for an interrupt.Enqueue Packets: Once received, packets are enqueued into a ring buffer. Ring buffers are circular buffers that allow packets to be efficiently queued and dequeued.Process Packets: Packets are dequeued from the ring buffer and processed by DPDK packet processing cores. These cores can perform a variety of operations on packets, such as forwarding, filtering, and modifying.Send Packets: After processing, packets are sent outthe appropriate NIC.2. Benefits of DPDK Packet Processing.High Performance: DPDK bypasses the operating system kernel and uses optimized code to achieve high packet processing speeds.Low Latency: DPDK's polling-based mechanism reduces packet latency by eliminating the need for interrupts.Scalability: DPDK can be scaled to multi-core andmulti-socket systems, allowing for high throughput and low latency even in demanding environments.Flexibility: DPDK provides a modular architecture that allows users to customize the packet processing pipeline to meet their specific requirements.Chinese Answer:1. 报文处理流程。
firewall packet-filter inbound 理解-回复Firewall packet filter, inbound understandingIn today's interconnected world, network security is of paramount importance. Organizations and individuals alike must take proactive measures to protect their networks and systems from unauthorized access, malicious attacks, and data breaches. One of the primary tools used to safeguard networks is a firewall, which acts as a gatekeeper between the internal and external networks. In this article, we will delve into the concept of a firewall packet filter with a focus on inbound traffic. We will explore what a firewall is, how it works, and the importance of inbound packet filtering.To begin, let us first understand what a firewall is. In simple terms, a firewall is a security device or software that monitors and controls the flow of network traffic between a trusted internal network and an untrusted external network. It acts as a barrier, inspecting each incoming and outgoing packet of data, and determines whether it should be allowed or denied based on predefined security rules or policies.Now that we have a basic understanding of a firewall, let us moveon to the concept of packet filtering. Packet filtering is a mechanism used by firewalls to examine the header information of each individual packet and decides whether to allow or block it based on specified criteria. These criteria may include the source and destination IP addresses, port numbers, protocol types, and other attributes. Packet filtering can be performed either on inbound traffic, outbound traffic, or both.In the context of inbound traffic, packet filtering refers to the examination of packets arriving at the firewall from the external network and destined for the internal network. The purpose of inbound packet filtering is to identify and block potential threats or unauthorized access attempts to the internal network. By filtering inbound packets, a firewall can prevent malicious traffic from entering the network, reducing the risk of a security breach.There are several key steps involved in the inbound packet filtering process. Let us examine these steps in detail:1. Packet arrival: When a packet arrives at the firewall from the external network, it is initially examined to determine which rule or set of rules it should be evaluated against. The firewall's rule base isa collection of predefined rules that define the desired security policies.2. Rule evaluation: In this step, the firewall matches the characteristics of the incoming packet against the rules in its rule base. The rules may specify criteria such as source and destination IP addresses, port numbers, protocol types, and more. If a match is found, the packet will be subjected to further evaluation. If no match is found, the default action specified in the firewall's policy will be applied (usually block or deny).3. Deep packet inspection: Once a packet matches a rule, the firewall performs a more detailed inspection of its contents. This inspection involves examining the packet payload and looking for any suspicious or malicious data. Advanced firewalls may employ techniques such as intrusion detection systems (IDS) or antivirus scanning to detect and prevent potential threats.4. Action determination: Based on the results of the rule evaluation and deep packet inspection, the firewall determines the appropriate action for the packet. Common actions include allow, block, drop, or log. An allowed packet is forwarded to the internalnetwork, whereas a blocked or dropped packet is discarded. Logged packets are recorded for auditing and troubleshooting purposes.5. Logging and alerting: Inbound packet filtering often includes the logging and alerting of certain events. This allows network administrators to monitor and analyze the traffic patterns, identify potential security threats, and make informed decisions regarding network security policies.In conclusion, inbound packet filtering is a crucial aspect of firewall functionality that plays a significant role in protecting networks from unauthorized access and potential security threats. By carefully evaluating each incoming packet against predefined rules and conducting deep packet inspection, firewalls can effectively mitigate the risk of security breaches. Understanding the process of inbound packet filtering helps organizations enhance their network security posture and ensure the confidentiality, integrity, and availability of their valuable data.。
DiMaggio Paul J., Powell Walter W. …The Iron Cage Revisited : Institutional Isomorphism and Collective Rationality in Organizational Fields‟ –American Sociological Review, Vol.48, April 1998, No. 2, p.147-161.-p.147 Once a set of organizations emerges as a field, a paradox arises : rational actors make their organizations increasingly similar as they try to change them. (…) three isomorphic processes: coercive, mimetic, normative.-p.147 Once a set of organizations emerges as a field, a paradox arises : rational actors make their organizations increasingly similar as they try to change them.-Three isomorphic processes: coercive, mimetic and normative.-Weber: iron cage-We argue that causes of bureaucratisation and rationalization have changed. (….) Today, however, structural change seems less and less driven by competition or by the need for efficiency. (…) change occur[s] as the result of processes that make organizations more similar without necessarily making them more efficient.Bureaucratization and other forms of homogenisation emerge, we argue, out of the structuration of organizational fields. This process (….)is effected largely by the state and the professions, which have become the great rationalizers of the second half of the twentieth century.1. Organizational theory and organizational diversity-p.148 Hannan and Freeman begin a major theoretical paper with the question “Why are there so many kinds of organization?” (….) We ask, instead why there is such startling homogeneity, not variation.-What we see in each of these cases is the emergence and structuration of an organizational field as a result of the activities of a diverse set of organizations;and, second, the homogenisation of these organizations, and of new entrants as well, once field is established.-By organizational field, we mean those organizations that, in the aggregate, constitute a recognized area of institutional life: key suppliers, resource and product consumers, regulatory agencies, and other organizations that produce similar services or products. (….)Virtue of this unit of analysis is that it directs our attention to the totality of relevant actors. By doing this, the field idea comprehends the importance of both connectedness and structural equivalence.The structure of an organizational field cannot be determined a priori but must be defined on the basis of empirical investigation. Fields only exist to the extent that they are institutionally defined.-The process of institutional definition, or “structuration” consists o f four parts.1)increase in the extent of interaction among organizations in the field 2)emergence of sharply defined interorganizational structures of domination and patterns of coalition 3) increase in the information load 4) development of amutual awareness (of being involved in a common enterprise) In my PhD, I make a distincition between structuration and institutional definition, or rather, not exactly a distinction but more a nuance. I use the term …structuration‟ to describe the origin and shaping of the organisational fields (European org field and CIS org field), and the term …institutional definition‟ in relation to the periphery of the org fields, and their first steps of becoming part of, or taking part in, (the structuration of) the organisational fields. Important distinction!Mention this in beginning of Chapter 5 of PhD.-But, in the long run, organizational actors making rational decisions construct around themselves an environment that constrains their ability to change further in later years.-p.148-149 Thus organizations may try to change constantly; but, after a certain point in the structuration of an organizational field, the aggregate effect of individual change is to lessen the extent of diversity within the field.-Freeman suggests that older, larger organizations reach a point where they can dominate their environments rather than adjust to them. The concept that best captures the process of homogenisation is isomorphism. In Hawley‟s (1968) description, isomorphism is a constraining process that forces one unit in a population to resemble other units that face the same set of environmental conditions. (….) Hannan and Freeman‟s focus is almost solely on the first process: selection. Following Meyer (1979) and Fenell (1980) we maintain that there are two types of isomorphism: competitive and institutional.-p.150 For this purpose it must be supplemented by an institutional view of isomorphism of the sort introduced by Kanter (1972:152-54) in her discussion of the forces pressing communes toward accommodation with the outside world.(….) Organizations compete not just for resources and customers, but for political power and institutional legitimacy, for social as well as economic fitness.The concept of institutional isomorphism is a useful tool for understanding the politics and ceremony that pervade much organizational life.a. Three mechanisms of Institutional Isomorphic change-p.150 1.) coercive isomorphism that stems from political influence and the problem of legitimacy; 2.) mimetic isomorphism resulting form standard responses to uncertainty 3.) normative isomorphism, associated with professionalization. This typology is an analytical one: the types are not always empirically distinct. (….) Yet, while the three types intermingle in empirical setting, they tend to derive from different conditions and may lead to different outcomes.Coercive Isomorphism-p.150 ….In some circumstances, organizational change is a direct response to government mandate….-The existence of a common legal environment affects many aspects of an organization‟s behavior and structure.-Meyer and Rowan (1997) have argued persuasively that as rationalized states and other large rational organizations expand their dominance over more arenas of social life, organizational structures increasingly come to reflect rules institutionalised and legitimated by and within the state (….).-p.151 We have so far referred only to the direct and explicit imposition of organizational models on dependent organizations. Coercive isomorphism, however, may be more subtle and less explicit than these examples suggest.Mimetic processes-p.151 Not all inst isom., however, derives from coercive authority. Uncertainty is also a powerful force that encourages imitation. When organizational technologies are poorly understood (March & Olsen, 1976), when goals are ambiguous, or when the environment creates symbolic uncertainty, organizations may model themselves on other organizations.-Modeling, as we use the term, is a response to uncertainty. The modeled organization may be unaware of the modeling or may have no desire to be copied; it merely serves as a convenient source of practices that the borrowing organization may use. Models may be diffused unintentionally, indirectly through employee transfer or turnover, or explicitly by organizations such as consulting firms or industry trade associations. Even innovation can be accounted for by organizational modeling.-EXAMPLE!! 'One of the most dramatic instances of modeling was the effort of Japan‟s modernizers in the late nineteenth century to model new governmental initiatives on apparently successful western prototypes.-p.152 Organizations tend to model themselves after similar organizations in their field that they perceive to be more legitimate or successful. The ubiquity of certain kinds of structural arrangements can more likely be credited to the universality of mimetic processes than to any concrete evidence that the adopted models enhance efficiency. John Meyer (1981) contends that it is easy to predict the organization of a newly emerging nation‟s administration without knowing anything about the nation itself, since “peripheral nations are far more isomorphic – in administrative form and economic pattern – than any theory of the wor ld system or economic division of labor would lead one to expect.”Normative pressures (>professionalization)-Two aspects of professionalization are important sources isomorphism. One is the resting of formal education and of legitimation in a cognitive base producedby university specialists; the second is the growth and elaboration of professional networks that span organizations and across which new models diffuse rapidly.-One important mechanism for encouraging normative isomorphism is the filtering of personnel.-p.153. It is important to note that each of the institutional isomorphic processes can be expected to proceed in the absence of evidence that they increase internal organizational efficiency.-p.154. Organizational fields that include a large professionally trained labor force will be driven primarily by status competition. Organizational prestige and resources are key elements in attracting professionals. This process encourages homogenization as organizations seek to ensure that they can provide the same benefits as their competitors.2. Predictors of Isomorphic Changeanizational-level predictors-Hypothesis A-1: The greater the dependence of an organization on another organization, the more similar it will become to that organization in structure, climate, and behavioral focus.-Hypothesis A-2: The greater the centralization of organization A‟s resource supply, the greater the extent to which organization A will change isomorphically to resemble the organizations which it depends for resources.( coercive isomorphism)-Hypothesis A-3: The more uncertain the relationship between means and ends the greater the extent to which an organization will model itself after organizations it perceives to be successful.-p.155 Hypothesis A-4: The more ambiguous the goals of an organization, the greater the extent to which the organization will model itself after organizations that it perceives to be successful.( mimetic isomorphism)-Hypothesis A-5: The greater the reliance on academic credentials in choosing managerial and staff personnel, the greater the extent to which an organization will become like other organizations in its field.-Hypothesis A-6: The greater the participation of organizational managers in trade and professional associations, the more likely the organization will be, or become, like other organizations in its field. (This hypothesis is parallel to the institutional view that the more elaborate the relational networks among organizations and their members, the greater the collective organization of the environment (Meyer and Rowan, 1977)( normative isomorphism)B. Field-level predictors-The following six hypotheses describe the expected effects of several characteristics of organizational fields on the extent of isomorphism in a particular field. Since the effect of isomorphism is homogenization, the best indicator of isomorphic change is a decrease in variation and diversity, which could be measured by lower standard deviations of the values of selected indicators in a set of organizations. The key indicators would vary with the nature of the field and the interests of the investigator. In all cases, however, field-level measures are expected to affect organizations in a field regardless of each organization‟s scores on related organizational-level measures.-Hypothesis B-1: The greater the extent to which an organizational field is dependent upon a single (or several similar) source of support for vital resources, the higher the level of isomorphism.-Hypothesis B-2: The greater the extent to which the organizations in a field transact with agencies of the state, the greater the extent of isomorphism in the field as a whole.( homogenization, decrease in variation/diversity))-Hypothesis B-3: The fewer the number of visible alternative organizational models in a field, the faster the rate of isomorphism in that field.-p.156 Hypothesis B-4: The greater the extent to which technologies are uncertain or goals are ambiguous within a field, the greater the rate of isomorphic change. ( uncertainty and modelling)-Hypothesis B-5:The greater the extent of professionalization in a field, the greater the amount of institutional isomorphic change.-Hypothesis B-6: The greater the extent of structuration of a field, the greater the degree of isomorphics. (while structuration may not lend itself to easy measurement, it might be tpped crudely with the use of such familiar measures as concentration ratios, reputational interview studies, or data on network characteristics)( professional filtering, socialization, and structuration))3. Implications for Social Theory- A comparison of macrosocial theories of functionalist or Marxist orientation with theoretical and empirical work in the study of organizations yields a paradoxical conclusion. Societies (or elites), so it seems, are smart, while organizations are dumb.-Despite the findings of organizational research, the image of society as consisting of tightly and rationally coupled institutions persists throughout much of modern social theory.-How can it be that the confused and contentious bumblers that populate the pages of organizational case studies and theories combine to construct the elaborate and well-(p.157) proportioned social edifice that macro-theoristsdescribe? The conventional answer to this paradox has been that some version of natural selection occurs in which selection mechanisms operate to weed out those organizational forms that are less fit. (….) A second approach to the paradox that we have identified comes from Marxists and theorists who assert that key elites guide and control the social system through their command of crucial positions in major organizations (e.g., the financial institutions that dominate monopoly capitalism)-We reject neither the natural-selection nor the elite-control arguments out of hand. Elites do exercise considerable influence over modern life and aberrant or inefficient organizations sometimes do expire. But we contend that neither of these processes is sufficient to explain the extent to which organizations have become structurally more similar. We argue that a theory of institutional isomorphism may help explain the observations that organizations are becoming more homogeneous, and that elites often get their way, while at the same time enabling us to understand the irrationality, the frustration of power, and the lack of innovation that are so commonplace in organizational life.- A focus of institutional isomorphism can also add a much needed perspective on the political struggle for organizational power and survival that is missing from much of population ecology.-….our attention should be directed to two forms of power. The first, as March and Simon (1958) and Simon (1957) pointed out years ago, is the power to set premises, to define the norms and standards which shape and channel behavior.The second is the point of critical intervention (Domhoff, 1979) at which elites can define appropriate models of organizational structure and policy which then go unquestioned for years to come (see Katz, 1975).-p.158 We believe there is much to be gained by attending to similarity as well as to variation among organizations and, in particular, to change in the degree of homogeneity or variation over time. Our approach seeks to study incremental change as well as selection.。
ArcSight SmartConnectorsSoftware Version:8.4.3Configuration Guide for Microsoft DNS DGA Trace Log Multiple Server File SmartConnectorDocument Release Date:October2023Software Release Date:October2023Legal NoticesOpen Text Corporation275Frank Tompa Drive,Waterloo,Ontario,Canada,N2L0A1Copyright NoticeCopyright2023Open Text.The only warranties for products and services of Open Text and its affiliates and licensors(“Open Text”)are as may be set forth in the express warranty statements accompanying such products and services.Nothing herein should be construed as constituting an additional warranty.Open Text shall not be liable for technical or editorial errors or omissions contained herein.The information contained herein is subject to change without notice. Trademark Notices“OpenText”and other Open Text trademarks and service marks are the property of Open Text or its affiliates.All other trademarks or service marks are the property of their respective owners.Documentation UpdatesThe title page of this document contains the following identifying information:l Software Version numberl Document Release Date,which changes each time the document is updatedl Software Release Date,which indicates the release date of this version of the softwareTo check for recent updates or to verify that you are using the most recent edition of a document,go to:https:///support-and-services/documentationContentsConfiguration Guide for Microsoft DNS DGA Trace Log Multiple Server FileSmartConnector4Product Overview5 Supported Version5Configuration6 Using Server Debug Logging Options6Installing the SmartConnector9 Preparing to Install the SmartConnector9 Installing the SmartConnector9 Map Files10Device Event Mapping to ArcSight Fields12 Microsoft DNS DGA Trace Log Multiple Server File Mappings to ArcSight ESMFields12 Send Documentation Feedback14Configuration Guide for Microsoft DNS DGA Trace Log Multiple Server File SmartConnector Configuration Guide for Microsoft DNS DGA Trace Log Multiple Server File SmartConnectorThis guide provides information for installing the SmartConnector for Microsoft DNS DGA Trace Log Multiple Server File and configuring the device for event collection.Intended AudienceThis guide provides information for IT administrators who are responsible for managing the ArcSight software and its environment.Additional DocumentationThe ArcSight SmartConnector documentation library includes the following resources: l Technical Requirements Guide for SmartConnector,which provides information about operating system,appliance,browser,and other support details for SmartConnector.l Installation and User Guide for SmartConnectors,which provides detailed information about installing SmartConnectors.l Configuration Guides for ArcSight SmartConnectors,which provides informationabout configuring SmartConnectors to collect events from different sources.l Configuration Guide for SmartConnector Load Balancer,which provides detailedinformation about installing Load Balancer.For the most recent version of this guide and other ArcSight SmartConnectordocumentation resources,visit the documentation site for ArcSight SmartConnectors8.4.Contact InformationWe want to hear your comments and suggestions about this book and the otherdocumentation included with this product.You can use the comment on this topic link at the bottom of each page of the online documentation,or send an email to MFI-***********************************.For specific product issues,contact Open Text Support for Micro Focus products.Product OverviewProduct OverviewThe Domain Name System(DNS)is a hierarchical distributed database and an associated set of protocols that define a:l Mechanism for querying and updating the databasel Mechanism for replicating the information in the database among serversl Schema of the databaseWith DNS,the host names reside in a database that can be distributed among multiple servers,decreasing the load on any one server and providing the ability to administer this naming system on a per-partition basis.DNS supports hierarchical names and allows registration of various data types in addition to host name to IP address mapping used in HOSTS files.This ArcSight SmartConnector lets you import events generated by the Microsoft DNS Trace Log Multiple Server File device into the ArcSight System.See the section"Device Event Mapping to ArcSight Data Fields"later in this document for the specific events mapped to fields in the ArcSight database.The new feature enables users to apply a Domain Generation Algorithm(DGA)and:l Whitelist filters on real timel Filter and drop events prior a license checkl Use the Connector immediately after installation.Required files are pre-configured.l Populate a dga_whitelist.txt locally or remotely(via ArcMC)to avoid getting eventsfrom trusted domainsl Add Map files to/user/agent/map/to extend connector functionalitiesSee the section"Map Files"later in this document for more information. Supported VersionMicrosoft's Domain Name Service(DNS)included with Microsoft Windows2008,Microsoft Windows2012,Microsoft Windows2016and Microsoft Windows2012R2are supported.ConfigurationFor information about DNS Monitoring,see /en-us/library/cc783975(WS.10).aspx.The primary tool used to manage DNS servers is the DNS console,which can be found in the Administrative Tools folder in the Start menu's Programs folder.DNS server event messages are separated and kept in their own system event log,the DNS server log.The DNS server log contains events logged by the DNS server service. Most critical DNS server service events are logged here,such as when the server starts but cannot locate initializing data.You can change the event types logged by DNS servers using the DNS console.You can also use the DNS console to selectively enable additional debug logging options for temporary trace logging to a text-based file of DNS server activity.Using Server Debug Logging OptionsBy default,all debug logging options are disabled.When selectively enabled,the DNS Server service can perform additional trace-level logging of selected types of events or messages for general troubleshooting and debugging of the server.Dns.log contains debug logging activity.By default,it is located in the windir\System32\Dns folder.The following DNS debug logging options are available:Packet Directionl OutgoingPackets sent by the DNS server are logged in the DNS server log file.l IncomingPackets received by the DNS server are logged in the log file.Packet Contentl Queries/TransfersSpecifies that packets containing standard queries(per RFC1034)are logged in the DNS server log file.l UpdatesSpecifies that packets containing dynamic updates(per RFC2136)are logged in the DNS server log file.l NotificationsSpecifies that packets containing notifications(per RFC1996)are logged in the DNS server log file.Transport Protocoll UDPSpecifies that packets sent and received over UDP are logged in the DNS server log file.l TCPSpecifies that packets sent and received over TCP are logged in the DNS server log file.Packet Typel RequestSpecifies that request packets are logged in the DNS server log file(a request packet is characterized by a QR bit set to0in the DNS message header).l ResponseSpecifies that response packets are logged in the DNS server log file(a response packet is characterized by a QR bit set to1in the DNS message header).Other Optionsl Filter packets by IP addressProvides additional filtering of packets logged in the DNS server log file.l DetailsSpecifies that all event details be logged in the DNS server log file.Log FileFile path and nameAllows you to specify the name and location of the DNS server log file.Log file maximum size limit enables you to set the maximum file size for the DNS server log file.To select and enable debug logging options on the DNS server:1.To open DNS,got to Control Panel>System and Security>Administrative Tools,then double-click DNS.2.In the console tree,right-click the applicable DNS server,then click Properties.3.Click the Debug Logging tab.4.To set the debug logging options,first select Log packets for debugging.To ensurecollecting the appropriate information for processing by ArcSight,select the optionsshown in the following figure:5.In addition to selecting events for the DNS debug log file,select the default values orspecify the file name,location,and maximum file size for the file.Installing the SmartConnectorThe following sections provide instructions for installing and configuring your selected SmartConnector.Connector Appliance/ArcSight Management Center supports mounting for Network File System(NFS)and CIFS(Windows)shares.When you install this connector on one of these devices,establish a CIFS mount on the device before adding the connector.Provide this share nameduring connector configuration.For more information,see Remote File Systems in theConnector Appliance or ArcSight Management Center Administrator's Guide.Preparing to Install the SmartConnectorBefore you install any SmartConnectors,make sure that the OpenText ArcSight products with which the connectors will communicate have already been installed correctly(such as ArcSight ESM or ArcSight Logger).For complete product information,refer to the Administrator's Guide to ArcSight Platform, available on ArcSight Documentation.If you are adding a connector to the ArcSight Management Center,see the ArcSight Management Center Administrator's Guide available on ArcSight Documentation for instructions.Before installing the SmartConnector,make sure that the following are available:l Local access to the machine where the SmartConnector is to be installedl Administrator passwordsInstalling the SmartConnectorThe installation steps described in this section are specific to the Microsoft DNS DGA Trace Log Multiple Server File SmartConnector.For detailed installation steps or for manual installation steps,see SmartConnector Installation and User Guide.To install and configure the SmartConnector:1.Start the installation wizard.2.Follow the instructions in the wizard to install the core software.3.Specify the relevant Global Parameters,when prompted.4.From the Type drop-down list,select Microsoft DNS DGA Trace Log Multiple Server File asthe type of connector,then click Next.Configuration Guide for Microsoft DNS DGA Trace Log Multiple Server File SmartConnector Installing the SmartConnector5.Enter the following device details to configure the SmartConnector and then click Next.6.Select a destination and configure parameters.7.Specify a name for the connector.8.(Conditional)If you have selected ArcSight Manager as the destination,the certificateimport window for the ArcSight Manager is displayed.Select Import the certificate to the connector from destination,and then click Next.The certificate is imported and the Add connector Summary window is displayed.Note:If you select Do not import the certificate to connector from destination,theconnector installation will end.9.Select whether you want to install the connector as a service or in the standalone mode.plete the installation.11.Run the SmartConnector.For instructions about upgrading the connector or modifying parameters,see Installation and User Guide for SmartConnector.Map FilesBy adding map files,users can increment the functionalities of the Connector.Installing the SmartConnectorNote:l Adjust the sequence numbers of your new map files based on any existing map files.For example,if the last map file in the connector is number3,the new DGA map file must be setto4and so on.l The domains are whitelisted based on the top-level domain.The domains that do not follow the Internet Assigned Numbers Authority(IANA)standard will not be processed.Map Files Page11of14Device Event Mapping to ArcSight FieldsThe following section lists the mappings of ArcSight data fields to the device's specific event definitions.See the ArcSight Console User's Guide for more information about the ArcSight data fields.Microsoft DNS DGA Trace Log Multiple Server File Mappings to ArcSight ESM FieldsDevice Event Mapping to ArcSight Fields Page12of14events.And the workaround is to apply older driver5.0.8,after that connector is able to received events.Microsoft DNS DGA Trace Log Multiple Server File Mappings to ArcSight ESM Page13of14Send Documentation FeedbackIf you have comments about this document,you can contact the documentation team by email.If an email client is configured on this computer,click the link above and an email window opens with the following information in the subject line:Feedback on Configuration Guide for Microsoft DNS DGA Trace Log Multiple Server File SmartConnector(SmartConnectors8.4.3)Just add your feedback to the email and click send.If no email client is available,copy the information above to a new message in a web mail client,and send your feedback to***************************************.We appreciate your feedback!Send Documentation Feedback Page14of14。