Adaptive QoS Routing by Cross-Layer Cooperation in Ad Hoc Networks
德尔·艾美 S5148F-ON 25GbE 顶层架(ToR)开放网络交换机说明书
The Dell EMC S5148 switch is an innovative, future-ready T op-of-Rack (T oR) open networking switch providing excellent capabilities and cost-effectiveness for the enterprise, mid-market, Tier2 cloud and NFV service providers with demanding compute and storage traffic environments.The S5148F-ON 25GbE switch is Dell EMC’s latest disaggregated hardware and software data center networking solution that provides state-of-the-art data plane programmability, backward compatible 25GbE server port connections, 100GbE uplinks, storage optimized architecture, and a broad range of functionality to meet the growing demands of today’s data center environment now and in the future.The compact S5148F-ON model design provides industry-leading density with up to 72 ports of 25GbE or up to 48 ports of 25GbE and 6 ports of 100GbE in a 1RU form factor.Using industry-leading hardware and a choice of Dell EMC’s OS10 or select 3rd party network operating systems and tools, the S5148F-ON Series offers flexibility by provision of configuration profiles and delivers non-blocking performance for workloads sensitive to packet loss. The compact S5148F-ON model provides multi rate speedenabling denser footprints and simplifying migration to 25GbE server connections and 100GbE fabrics.Data plane programmability allows the S5148F-ON to meet thedemands of the converged software defined data center by offering support for any future or emerging protocols, including hardware-based VXLAN (Layer 2 and Layer 3 gateway) support. Priority-based flow control (PFC), data center bridge exchange (DCBX) and enhanced transmission selection (ETS) make the S5148F-ON an excellent choice for DCB environments.The Dell EMC S5148F-ON model supports the open source Open Network Install Environment (ONIE) for zero touch installation of alternate network operating systems.Maximum performance and functionalityThe Dell EMC Networking S-Series S5148F-ON is a high-performance, multi-function, 10/25/40/50/100 GbE T oR switch purpose-built for applications in high-performance data center, cloud and computing environments.In addition, the S5148F-ON incorporates multiple architectural features that optimize data center network flexibility, efficiency, and availability, including IO panel to PSU airflow or PSU to IO panel airflow for hot/Key applications •Organizations looking to enter the software-defined data center era with a choice of networking technologies designed to deliver the flexibility they need• Use cases that require customization to any packet processing steps or supporting new protocols• Native high-density 25 GbE T oR server access in high- performance data center environments• 25 GbE backward compatible to 10G and 1G for future proofing and data center server migration to faster uplink speeds. • Capability to support mixed 25G and 10G servers on front panel ports without any limitations• iSCSI storage deployment including DCB converged lossless transactions• Suitable as a T oR or Leaf switch in 100G Active Fabric implementations• As a high speed VXLAN L2/L3 gateway that connects the hypervisor-based overlay networks with non-virtualized • infrastructure•Emerging applications requiring hardware support for new protocolsKey features •1RU high-density 25/10/1 GbE T oR switch with up to forty eight ports of native 25 GbE (SFP28) ports supporting 25 GbE without breakout cables• Multi-rate 100GbE ports support 10/25/40/50 GbE• 3.6 Tbps (full-duplex) non-blocking, cut-through switching fabric delivers line-rate performance under full load**• Programmable packet modification and forwarding • Programmable packet mirroring and multi-pathing • Converged network support for DCB and ECN capability • IO panel to PSU airflow or PSU to IO panel airflow • Redundant, hot-swappable power supplies and fans • IEEE 1588v2 PTP hardware supportDELL EMC NETWORKING S5148F-ON SERIES SWITCHProgrammable high-performance open networking top-of-rack switch with native 25Gserver ports and 100G network fabric connectivity• FCoE transit (FIP Snooping)• Full data center bridging (DCB) support for lossless iSCSI SANs, RoCE and converged network.• Redundant, hot-swappable power supplies and fans• I/O panel to PSU airflow or PSU to I/O panel airflow(reversable airflow)• VRF-lite enables sharing of networking infrastructure and provides L3 traffic isolation across tenants• 16, 28, 40, 52, 64 10GbE ports availableKey features with Dell EMC Networking OS10• Consistent DevOps framework across compute, storage and networking elements• Standard networking features, interfaces and scripting functions for legacy network operations integration• Standards-based switching hardware abstraction via Switch Abstraction Interface (SAI)• Pervasive, unrestricted developer environment via Control Plane Services (CPS)• Open and programmatic management interface via Common Management Services (CMS)• OS10 Premium Edition software enables Dell EMC layer 2 and 3 switching and routing protocols with integrated IP Services,Quality of Service, Manageability and Automation features• Platform agnostic via standard hardware abstraction layer (OCP-SAI)• Unmodified Linux kernel and unmodified Linux distribution• OS10 Open Edition software decoupled from L2/L3 protocol stack and services• Leverage common open source tools and best-practices (data models, commit rollbacks)• Increase VM Mobility region by stretching L2 VLAN within or across two DCs with unique VLT capabilities• Scalable L2 and L3 Ethernet Switching with QoS, ACL and a full complement of standards based IPv4 and IPv6 features including OSPF, BGP and PBR• Enhanced mirroring capabilities including local mirroring, Remote Port Mirroring (RPM), and Encapsulated Remote Port Mirroring(ERPM).• Converged network support for DCB, with priority flow control (802.1Qbb), ETS (802.1Qaz), DCBx and iSCSI TLV• Rogue NIC control provides hardware-based protection from NICS sending out excessive pause frames48 line-rate 25 Gigabit Ethernet SFP28 ports6 line-rate 100 Gigabit Ethernet QSFP28 ports1 RJ45 console/management port with RS232signaling1 Micro-USB type B optional console port1 10/100/1000 Base-T Ethernet port used asmanagement port1 USB type A port for the external mass storage Size: 1 RU, 1.72 h x 17.1 w x 18.1” d (4.4 h x 43.4 w x46 cm d)Weight: 22lbs (9.97kg)ISO 7779 A-weighted sound pressure level: 59.6 dBA at 73.4°F (23°C)Power supply: 100–240 VAC 50/60 HzMax. thermal output: 1956 BTU/hMax. current draw per system:5.73A/4.8A at 100/120V AC2.87A/2.4A at 200/240V ACMax. power consumption: 516 Watts (AC)T yp. power consumption: 421 Watts (AC) with all optics loadedMax. operating specifications:Operating temperature: 32° to 113°F (0° to 45°C) Operating humidity: 5 to 90% (RH), non-condensingFresh Air Compliant to 45CMax. non-operating specifications:Storage temperature: –40° to 158°F (–40° to70°C)Storage humidity: 5 to 95% (RH), non-condensingRedundancyHot swappable redundant power suppliesHot swappable redundant fansPerformanceSwitch fabric capacity: 3.6TbpsPacket buffer memory: 16MBCPU memory: 16GBMAC addresses: Up to 512KARP table: Up to 256KIPv4 routes: Up to 128KIPv6 routes: Up to 64KMulticast hosts: Up to 64KLink aggregation: Unlimited links per group, up to 36 groupsLayer 2 VLANs: 4KMSTP: 64 instancesLAG Load Balancing: User Configurable (MAC, IP, TCP/UDPport)IEEE Compliance802.1AB LLDPTIA-1057 LLDP-MED802.1s MSTP802.1w RSTP 802.3ad Link Aggregation with LACP802.3ae 10 Gigabit Ethernet (10GBase-X)802.3ba 40 Gigabit Ethernet (40GBase-X)802.3i Ethernet (10Base-T)802.3u Fast Ethernet (100Base-TX)802.3z Gigabit Ethernet (1000BaseX)802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN T agging, Double VLAN T agging,GVRP802.1Qbb PFC802.1Qaz ETS802.1s MSTP802.1w RSTPPVST+802.1X Network Access Control802.3ab Gigabit Ethernet (1000BASE-T) orbreakout802.3ac Frame Extensions for VLAN T agging802.3ad Link Aggregation with LACP802.3ae 10 Gigabit Ethernet (10GBase-X)802.3ba 40 Gigabit Ethernet (40GBase-SR4,40GBase-CR4, 40GBase-LR4, 100GBase-SR10,100GBase-LR4, 100GBase-ER4) on optical ports802.3bj 100 Gigabit Ethernet802.3u Fast Ethernet (100Base-TX) on mgmtports802.3x Flow Control802.3z Gigabit Ethernet (1000Base-X) with QSAANSI/TIA-1057 LLDP-MEDJumbo MTU support 9,416 bytesLayer2 Protocols4301 Security Architecture for IPSec*4302 I PSec Authentication Header*4303 E SP Protocol*802.1D Compatible802.1p L2 Prioritization802.1Q VLAN T agging802.1s MSTP802.1w RSTP802.1t RPVST+802.3ad Link Aggregation with LACPVLT Virtual Link TrunkingRFC Compliance768 UDP793 TCP854 T elnet959 FTP1321 MD51350 TFTP2474 Differentiated Services2698 T wo Rate Three Color Marker3164 Syslog4254 SSHv2791 I Pv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1191 Path MTU Discovery1305 NTPv41519 CIDR1812 Routers1858 IP Fragment Filtering2131 DHCP (server and relay)5798 VRRP3021 31-bit Prefixes3046 DHCP Option 82 (Relay)1812 Requirements for IPv4 Routers1918 Address Allocation for Private Internets2474 Diffserv Field in IPv4 and Ipv6 Headers2596 Assured Forwarding PHB Group3195 Reliable Delivery for Syslog3246 Expedited Assured Forwarding4364 VRF-lite (IPv4 VRF with OSPF andBGP)*General IPv6 Protocols1981 Path MTU Discovery*2460 I Pv62461 Neighbor Discovery*2462 Stateless Address AutoConfig2463 I CMPv62464 Ethernet Transmission2675 Jumbo grams3587 Global Unicast Address Format4291 IPv6 Addressing2464 Transmission of IPv6 Packets overEthernet Networks2711 IPv6 Router Alert Option4007 IPv6 Scoped Address Architecture4213 Basic Transition Mechanisms for IPv6Hosts and Routers4291 IPv6 Addressing Architecture5095 Deprecation of T ype 0 Routing Headers inI Pv6IPv6 Management support (telnet, FTP, TACACS,RADIUS, SSH, NTP)OSPF (v2/v3)1587 NSSA1745 OSPF/BGP interaction1765 OSPF Database overflow2154 MD52328 OSPFv22370 Opaque LSA3101 OSPF NSSA3623 OSPF Graceful Restart (Helper mode)*BGP 1997 Communities 2385 MD52439 Route Flap Damping 2796 Route Reflection 2842 Capabilities 2918 Route Refresh 3065 Confederations 4271 BGP-44360 Extended Communities 4893 4-byte ASN5396 4-byte ASN Representation 5492Capabilities AdvertisementLinux Distribution Debian Linux version 8.4Linux Kernel 3.16MIBSIP MIB– Net SNMPIP Forward MIB– Net SNMPHost Resources MIB– Net SNMP IF MIB – Net SNMP LLDP MIB Entity MIB LAG MIBDell-Vendor MIBTCP MIB – Net SNMP UDP MIB – Net SNMP SNMPv2 MIB – Net SNMP Network Management SNMPv1/2SSHv2FTP, TFTP, SCP SyslogPort Mirroring RADIUS 802.1XSupport Assist (Phone Home)Netconf APIs XML SchemaCLI Commit (Scratchpad)AutomationControl Plane Services APIs Linux Utilities and Scripting Tools Quality of Service Access Control Lists Prefix List Route-MapRate Shaping (Egress)Rate Policing (Ingress)Scheduling Algorithms Round RobinWeighted Round Robin Deficit Round Robin Strict PriorityWeighted Random Early Detect Security 2865 RADIUS 3162 Radius and IPv64250, 4251, 4252, 4253, 4254 SSHv2Data center bridging802.1QbbPriority-Based Flow Control802.1Qaz Enhanced Transmission Selection (ETS)*Data Center Bridging eXchange(DCBx) DCBx Application TLV (iSCSI, FCoE*)Regulatory compliance SafetyUL/CSA 60950-1, Second Edition EN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group DifferencesEN 60825-1 Safety of Laser Products Part 1: EquipmentClassification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication Systems FDA Regulation 21 CFR 1040.10 and 1040.11Emissions & Immunity EMC complianceFCC Part 15 (CFR 47) (USA) Class A ICES-003 (Canada) Class AEN55032: 2015 (Europe) Class A CISPR32 (International) Class AAS/NZS CISPR32 (Australia and New Zealand) Class AVCCI (Japan) Class A KN32 (Korea) Class ACNS13438 (T aiwan) Class A CISPR22EN55022EN61000-3-2EN61000-3-3EN61000-6-1EN300 386EN 61000-4-2 ESDEN 61000-4-3 Radiated Immunity EN 61000-4-4 EFT EN 61000-4-5 SurgeEN 61000-4-6 Low Frequency Conducted Immunity NEBSGR-63-Core GR-1089-Core ATT -TP-76200VZ.TPR.9305RoHSRoHS 6 and China RoHS compliantCertificationsJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2009, Class A Warranty1 Year Return to DepotLearn more at /Networking*Future release**Packet sizes over 147 BytesIT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, withinnovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & Design Let us analyze yourmultivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running cateEnsure your staff builds the right skills for long-termsuccess. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic IT environments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remote monitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at/Services。
工控专业英语
泛非电讯联盟 Pan—African Telecom municatio ns Union PATU 否定确认Negative Acknowle dgement NCK方螺母Square Nut 否定通知Negative Notice防潮,防湿Moisture-Proof 服务GPRS支持节点Serving GPRS Support Node SGSN防腐蚀Corrosion -Proof 服务级别Grade of Service GOS防滑手套Slip-Proof Glove 服务接入点标识Service Access Point Indicator SAPI防火墙Firewall 服务质量Quality of Service QOS防静电地板Conductiv e Floor 服务状态Service Status防静电手环 Wrist strap 浮充Floating charge防静电手腕 Anti-staticWrist Strap, Wrist Strap 浮点型(数据)Float Type防雷接地夹Lightning Groundin g Clip 浮动螺母(M6) Floating Nut (M6)防蚀, 防腐蚀Corrosion -proof 浮动模式floating mode防鼠网Rodent-resistant Net 浮漂天线Buoyant Antenna防水尾缆Waterpro of Pigtail Cable 符号间干扰 Inter-symbol interferen ce防卫措施Protective Measures 符号间干扰,码间干扰 Inter-symbol Interferen ce访管中断Superviso r Call Interrupt 辅助控制单元Auxiliary Control Element访问,连接 Access 辅助控制单元Auxiliary Control Unit ACE访问地址寄存器Visitor Location Register VLR 辅助设备Auxiliary Equipmen t AUX访问控制AccessControl AC 付费电话Payphone访问码Access Code AC 付费电视Pay TV访问日志Access Log 负荷payload访问特权,接入特许Access Privileges 负荷,充电,电荷,计费,收费Charge放大自辐射噪声Amplified Self-Emission Noise ASE 负荷控制/限制 Load Control / Restrictio n放号Number allocation 负荷指针payload pointers飞线Jump Wire 负载,载重量 Load非GPRS 告警标识Non-GPRS Alert Flag NGAF 负载电压Load Voltage非标监控物料 Non-bid Monitor Materials 附加安全措施 Add-On Security非标准的Nonstand ard 附加程序Add-In Program非电话业务 Non-Voice Service 附加费Additional charge非对称数字用户线路Asymmetric Digital Subscribe r Line ADSL 附加费率Premium Rate PRM非法尝试计数器Wrong Attempt Counter WAC 附加计费Premium Charging PRMC非分组终端 Non-Packet Terminal NPT 附加计费率Additional charge rate PRM非服务状态 Out-Of-Service 附加文档Attached Documen t非归零码Non Return to Zero NRZ 附加文件Attached File非话终端Non-Voice Terminal 附加信息Additional Informatio n非恢复式通道倒换Non-revertivepath switching 附录Appendix非挥发性随机读写存储器Non-Volatile Random Access Memory NVRAM 附图Accompa nying/Atta ched Diagram非活动链Inactive Link 复合年增长率Composit e Annual Growth Rate CAGR非介入监控 non-intrusive monitorin g 复合网Compoun d Network非金属件Non-metallic compone nts 复接Multiplexi ng非金属件Non-metalwar e 复式计次Multi-Metering非晶体Non-crystal 复式计次计费Multi-Metering Charging非平衡接口 Non-balanced interface 复位Reset非屏蔽双绞线,无屏蔽双绞线Unshielde d Twisted-pair UTP 复位电路Reset Circuit RSC非同步网Asynchro nous Network 复位请求Reset Request RSR非阻塞Non-Blocking 复用,多路复用,多路传输Multiplex MUX菲利浦Philips 复用单元Multiplexi ng Unit MXU费尔码Fire code 复用段Multiplex Section MS费率索引值Charge Rate Index CHX 复用段保护Multiplex Section Protection MSP MSP费率修改索引 Rate Updating Index RID 复用段共享保护环multiplex section shared protection ring MS-SPRING分/插复用器 Add & Drop Multiplexe r ADM 复用段开销Multiplex Section OverHead MSOH分贝Decibel Db 复用段适配Multiplex section adaptatio n MSA分辨率Resolutio n 复用段终结Multiplex Section Terminati on MST分布功能平面Distribute d functional plane DFP 复用管理单元Multiplicat ion and Managem ent Unit MMU分布式Distribute d 复用器和分用器单元,复用分用器单元Multiplexe r and Demultipl exer Unit分布式数据库管理系统Distribute d Relational DBMS DRDBMS 复用器与去复用器Multiplexe r and The De-Multiplexe r分插,分出/插入,分路/插入Add/Drop D/I 复杂指令系统计算机Complex Instructio n System Computer CISC分插方式应用add/drop applicatio ns 复帧Multi-Frame分插复用器Add/Drop Multiplexe r ADM 复帧丢失Loss Of Multifram e LOM分段和重装子层Segment ation and Re-Assembly Sub-Layer SAR 复帧结构Multifram e Structure分段类型Segment Type ST 复帧失步Multi-frame out-of-sync.分光器Optical Splitter 副本Copy CC分机Extended Station, Extension 副机柜,辅助机柜Extension Cabinet分机代答Pickup分机号Extension Number 分机用户缺席通知Absent Extension Advice分机用户缺席转接Absent Extension Diversion 分机转接Extension Transit分级,系列,分层Hierarchy 分级编码Hierarchic al Coding 分级控制Hierarchic al Control 分级路由选择Hierarchic al Routing分级网,分层网,层次网Hierarchic al Network分级主/从同步Hierarchic al Master/S/ slave Synchroni zation分集射频端口Diversity RF Port 分检 Sort 分离Detach DET分量处理Compone nt Handling CHA分流器Current Divider分路器Divider分配(指信道分配)Allocation assignme nt分配点Distributio n Point DP分配关系数据库管理系统Distribute d Relational Data Base Managem ent System DRDMS 分配呼叫路由选择Distributio n Call Routing DCR分配命令Assignme nt Comman d分配器Distributo r分配请求Assignme nt Request 分配失败Assignme nt Failure 分配完成Assignme nt Complete 分频器Frequenc y Divider 分频锁相技术Frequenc y-Divided Phase Locking Technolo gy分散式Decentrali zed, distribute d分散型控制系统Distribute d Control System DCS分摊计费Split Charging SPL分线盒Junction Box, Connectio n Box, Connecto r Box分用器,分解器,分离器,去复用器Demultipl exer DEMUX 分组(包)交换 Packet Switching 分组TMSI Packet TMSI P-TMSI分组层Packet Layer Procedur e PLP分组处理函数Packet Handler Function PHF交换Packet Handling Switching PHS分组处理器 Packet Handler PH分组电路标识码Packet Circuit Identity Code PCIC分组定时提前控制信道Packet Timing advanced Control Channel PTCCH 分组复用Packet Multiplexi ng PMX 分组广播控制信道Packet Broadcast Control Channel PBCCH 分组交换公用数据网 Packet Switched Public Data Network PSPDN机 Packet Switching Exchange PSE分组接入允许信道Packet Access Grant Channel PAGCH 分组控制单元Packet Control Unit PCU 分组数据信道Packet Data Channel PDCH分组随机接入信道Packet Random Access Channel PRACH 分组随路控制信道Packet Associate d Control Channel PACCH 分组寻呼信道Packet Paging Channel PPCH数据信道Packet Data Traffic Channel PDTCH 分组终端Packet Terminal PT分组装/拆Packet Assembli ng/De-Assembli ng PAD 风机盒/配电盒 Fan Box/Powe r Distributio n Box风机盘Fan Unit 风扇盒Fan Box封闭用户群 Closed User Group CUG封装Encapsul ation Envelop 峰值信元率 Peak Cell Rate PCR蜂鸣器Buzzer蜂窝的,蜂窝电话的Cellular技术(移动通信) Cell Splitting Techniqu e蜂窝分组交换Cellular Packet Switching CPS蜂窝基站天线, 小区基站天线 Cell Base Station Antenna 蜂窝基站位置, 小区站位置Cell Base Station Location Both (ln)蜂窝式移动电话系统Cellular mobile telephone network蜂窝移动电话系统Cellular Mobile Telephon e System 蜂音 Buzz功 P副局长,副司长,副主任 Deputy Director功率因数校正 Power Factor Correction PFC覆盖 Coverage功能模块 Functional Module覆盖 Overwrite功能实体 Functional Entity FE覆盖范围,覆盖区,有效区 Coverage Area功能实体动作 Function Entity Action FEA盖板 Cover Plate功能实体接入管理 Function Entity Access Management 概要,方案, Scenario功能特性 Functional characteristic概要设计,初步设计 Preliminary Design供参考 For reference FYI干扰 Interference共电制 Common Battery (System) CB干扰信号比 Jam-to-signal ratio共路信令 Common Channel l Signaling CCS干扰源分集 Interferer diversity共路信令设备 Common Channel Signaling Equipment 干扰自适应系统 Interference-Adaptive System共路信令网 Common Channel Signaling Network干线效率 Trunking Efficiency共模电感器 Common-mode Inductor干燥剂 Desiccant共享管理知识 Shared Management Knowledge SMK感应电荷 Inductive charge共享内存 Shared Memory SMEM钢尺 Steel Ruler共享软件 Shareware钢钉 Steel Nail共享资源 Shared Resource钢锯 Hacksaw共用天线电视,电缆电视, 有线电视 Community Antenna钢锯条 Saw Blades钩子函数 Hook Function高保真度音响 High Fidelity Hifi骨干 Backbone骨干网 Backbone Network高比特率数字用户线 High-Bit-Rate Digital Subscriber Line HDSL高层兼容性 High Layer Compatibility HLC骨架,支架 Framework Bracket高电位差 High potential difference固定扳手 Spanner高端 High End固定比特率 Constant Bit Rate CBR高端存储区 High Memory Area HIMEM固定波长滤波器 Fixed Wavelength Filter固定胶 Fixing Glue高级数据链路控制(规程) High Level Data Link Control (Procedure) HDLC固定螺钉 Fastening Screw高级移动电话系统(美) Advanced Mobile Phone System AMPS固定台 Fixed station高级移动电话业务 Advanced Mobile Phone Service AMPS高技术,高新技术 High-Tech固定卫星业务 Fixed Satellite Services FSS高架地板,活动地板 Raised Floor, Elevated Floor固定无线接入 Fixed Wireless Access FWA 高架线路 Overhead line LOH固定信道分配 Fixed Channel Allocation FCA 高阶 high order HO固定信道指配 Fixed Channel Assignment高阶交叉连接 higher order cross connect固定组件 Fixation Kit高阶接口 Higher Order Interface HOI固态继电器 Solid-state Relay高阶连接监督 Higher order Connection Supervision HCS固体生产辅料 Solid Auxiliary Materials高阶通道适配 higher order path adaptation HOPA故障,错误 fault, error,failure, Bug高阶通路/高阶通道 Higher order Path HP故障闭塞 Fault Block故障处理 Troubleshooting高阶通路开销监视 Higher order Path Overhead Monitor HPOM高阶通路连接 Higher order Path Connection HPC故障的诊断和排除 Trouble Diagnosis and Elimination 高阶通路终结 Higher order Path Termination HPT故障定位 Failure Locating高阶组装 Higher Order Assembler HOA故障定位 Fault locating故障定位方法 Fault Locating Method高密度双极性码 High Density Bipolar of Order 3 Code HDB3高频 High Frequency HF故障隔离 Fault Isolation高频变压器 High-frequency Transformer故障申告受理 Fault Complaint Handling高频插装电感器 Leaded Power Inductors故障时间 Fault Time高频电路板 High-frequency Circuit Board故障诊断 Fault Diagnosis高频电源变压器 Switch Power Transformer挂机(电话) On-Hook, hang up高频段 High band挂孔(主机背后的三个挂孔) Hanger高斯频率偏移键 Gaussian Frequency Shift Key GFSK怪人过滤器 Bozo Filter关键字 Keyword高斯最小移频键控 Guassian Minimum Shift Keying GMSK高速本地网络 High Speed Local Network HSLN关口MSC Gateway Mobile-services Switching Centre G 高速骨干网 High Speed Backbone Network HSBN关联文档 Associated Document高速开关 Quick Switch QS关税 Customs Duties, tariff关税率 Tariff Rate高速率数字用户线 High-Bit-Rate Digital Subscriber Line HDSL高通公司(美) Qualcomm关系数据库 Relational database高增益功放板 High gain Power Amplifier board HPA关系数据库管理系统 Relational Database Management 高增益天线 High gain antenna管理单元 Administrative Unit AU告警 Alarm ALM管理单元指针 administration unit pointer AU PTR告警板 Alarm Board管理单元组 Administrative Unit Group AUG告警采集模块 Alarm collection module管理对象 Managed Object MO告警灯 Alarm indicator WBL管理禁止消息 Management Inhibit Message MIM告警级别 Alarm level管理数据库 Management Database MDB告警面板 Alarm panel管理信息库 Management Information Base MIB 告警模块 Alarm module管理域 Management domain告警人机命令 Alarming Man-Machine Command管理阻断 Management Blocking告警上下限 Upper/lower alarm limit灌封材料 Embedding Material告警台 Alarm Subsystem光泵浦器件 Pump Lasers告警箱 Alarm box光标 Cursor告警箱面膜 Front Film of Alarm Box光波长转换模块 Wavelength Conversion Modules 告警信号 Alarm signal AIS光波导分波器 optical waveguide router告警指示信号 Alarm Indication Signal AU-AIS光层交叉连接 Optical Layer Cross Connect OLXC 割接 Cut-over光传输 Optical transmission格码调制 Trellis Coded Modulation TCM光传输监控 Optical Transmission Supervision格式,格式化 Format光传输监控 Optical Transmission Supervision格式转换 Format Conversion光传输网 Optical Transmission Network OTN格状编码调制 Trellis Coding Modulation TCM光传输系统控制 Optical Transmission System Control 隔离器 Isolator光导纤维束 Fiber Optics cluster隔行扫描 Interlace Scanning光导纤维束 Optical Fiber Cluster个人编码 Personal Number PN光电处理 Opto-electronic process个人号码 Personal Number光电端机 Optoelectrical transceiver个人接入系统 Personal Access System PAS光电耦合器 Photocouplers个人身份号码 Personal Identification Number PIN光电器件 Optoelectronic Devices个人身份鉴权键 Individual subscriber authentication key Ki光电整机 Photoelectric Integrated Machine个人身份鉴权键 Personal authentication key光调制解调器 Optical Modem光端机 Optical transceiver (ln)个人身份识别码(无线) Personal Identification Number PIN个人识别码 Personal Identity Number PIN光多用表 Optical Multimeter光发射单元 Optical Transmit Unit OIU个人手持电话系统,双向无绳电话系统(日本) Personal Handyphone System PHS个人通信号码 Personal Telecommunication Number PTN光发射二级管 Light Emitting Diode LED光发送二极管 Optical Transmitting LEDs个人通信网,专用通信网 Personal Communications Network PCN个人通信系统 Personal Communications System PCS光发送模块 Opitcal Transmitters跟我转移 Follow-Me Diversion FMD光发送器件 Optical Transmitting Components更紧密频率覆用方式 Aggressive Frequency Re-use Pattern (AFR) AFR光放大器 Optical Amplifier OA光分波单元 Optical demultiplexing unit (ODU)工程竣工验收证明 Acceptance Certificate on Engineering Completion工程联络线(公务) Engineering Order-Wire EOW光分波器 Optical Demultiplexer Unit ODU工程设计文件 Engineering Design Manual光分插复用器 Optical Add/Drop Multiplexer OADM 工程手册 Engineering Manual光分路器 Optical Divider工具软件 Tool Software光分配点 Optical Distribution Point ODP工具箱 Toolbox光分配节点 Optical Distribution Node ODN工控机,工业控制微机 Industrial Computer光分配网络 Optical Distribution Network ODN工控机板卡 Card for Industrial Computer光分支装置 Optical Branching Device OBD工控机及工控机机箱 Industrial Computer and the Chassis光复用器 Optical Multiplexer工频变压器 Industrial Frequency Transformer光告警方式 Optical Alarming Mode工频电感器 Industrial Frequency Inductors光隔离器 Optical Isolator光功率差 Optical Power Difference工业标准结构总线 Industrial standard architecture (ISA) Bus工业布线系统 Industry Distribution System IDS光功率计 Optical Power Meter工业控制微机,工控机 Industrial Computer IPC光合波板 Optical Multiplexer Unit OMU工业水平尺 Industrial horizontal ruler光交叉连接(光互联) Optical Cross-connect OXC工作/备用状态 Active/Standby Status光接入网 Optical Access Network OAN工作波长 Working wavelength光接收模块 Optical Receivers工作单元 working unit光接收器件 Optical Receiving Components 工作地 Working Ground光开关 Optical Switch工作服 Union Suit光缆 Fiber Optic Cable工作量统计 Workload Account光连接器 Fiber Connectors工作频率 Working frequency光滤波器 Optical Filters工作站 Work Station WS光敏电阻 Optical Resistor光耦合器 Optical Couplers公共管理信息协议 Common Management Information Protocal CMIP光盘.激光唱盘 Compact Disc CD公共管理信息业务单元 Common Management Information Service Element CMISE公共空中接口 Common Air Interface CAI光盘驱动器 CD-ROM CD-ROM公共控制信道 Common Control Channel CCCH光配线架 Optical Distribution Frame公共陆地移动网 Public Land Mobile Network PLMN光配线网 Optical Distribution Network ODN公共数据网 Public Data Network PDN光前置放大板 Optical Preamplifier OPA公共信道干扰 Common Channel Interference光时域反射计 Optical Time-Domain Reflectometer OTD公头(电源线) Male光收发板 Optical Transceiver Board OTB公务板 Order wire board OW光收发模块 Optical Transceivers公务板,开销处理板 Overhead processing board光输入口允许频偏 Permitted frequency deviation of opti公务电话 Orderwire Phone光探测器 Photodetector公务电话板 Order Wire Card OW光通道 Optical channel OCh公务通道 Orderwire Channel SC光网络单元 Optical Network Unit ONU公务通信,勤务通信 Order Wire Communication光无源器件 Optical Passive Devices公务线 Order Wire光纤 Optical Fiber/Optic fiber公用电话 Public Telephone光纤包层 Cladding of Fiber光纤布拉格光栅 Fiber Bragg Grating FBG公用电路交换数据网 Circuit Switched Public Data Network CSPDN公用陆地移动网络 Public Land Mobile Network PLMN光纤到办公室 Fiber To The Office FTTO公用密钥,公开密钥 Public key光纤到大楼 Fiber To The Building FTTB公用数据交换网 Public Switched Data Network PSDN光纤到服务区 Fiber To The Service Area FSA 公用数据网 Public data network光纤到家 Fiber To The Home FTTH功放单元 Power Amplifier Unit PAU光纤到路边 Fiber To The Curb FTTC功放模块 Power Amplification Module光纤到远端 Fiber to the Remote FTTR功率分配结构 Distributed Power Architecture DPA光纤的 Fiber-optic功率分配显示 Power Distribution Display PDD光纤放大器 Optical Fiber Amplifier功率合成 Power Synthesis光纤分布式数据接口 Fiber Distributed Data Interface FD 功率受限区(地域) Power Limited Region光纤固定衰减器 Optical Fixed Attenuator功率因数 Power Factor光纤管道 Fiber Conduit光纤光缆 Optical fiber cable光纤光栅 Fiber Grating光纤基带快速以太网 FastEthernet, 100baseX光纤接口 Fiber Interface FBI光纤连接器 Fiber Connector FC光纤耦合器 Fiber Coupler光纤熔接盒 Fiber splice tray光纤衰减器 Fiber Attenuator光纤同轴混合网 Hybrid Fiber and Coax Network HFC光纤尾纤 Fiber Pigtail光纤引入线 Fiber Optic Drop光纤用户环路 Fiber In The Loop光纤载波等级3 OC-3 OC-3光线路 Optical Line OL光线路板 Optical Line Board OL光线路放大器 Optical Line Amplifier OLA光线路收发板 Optical Line Transceiver Board OLT光线路终端 Optical line terminal OLT光信号 Optical Signal光学器件 Optics光学字符识别 Optical Character Recognition OCR光载波第1级 Optical Carrier Level 1 OC-1光载波第N级 Optical Carrier Level N OC-N光栅 (fiber) grating光支路接口 optical tributary interface光支路接口单元 optical interface units广播,呼叫全体 Broadcast Call广播电视 Broadcast Television广播方式应用 broadcasting applications广播控制信道 Broadcast Control Channel BCCH广播模块 Broadcasting Module BCST广域集中用户交换机业务 Wide Area Centrex WAC广域信息服务器 Wide Area Information Server WAIS归档备份 Archive Backup归零二进制码 Return-to-zero Binary Code归零制 Return-to-zero归一化响应模式 Normalized Response Mode NRM归一化信噪比 Normalized Signal/Noise Ratio归属MSC Anchor MSC归属PLMN Home PLMN HPLMN归属陆地移动通信网 Home PLMN HPLMN归属位置存储器 Home Location Register HLR规程 Procedure规定容限,可接受容限 Tolerance规范和描述语言 Specification & Description Language S 规范书, 规格书 Specifications规则脉冲激励长期预测 Regular Pulse Excited Long-Ter 硅钢片 Silicon Steel Sheet硅谷 Silicon Valley硅控整流器 Silicon Control Rectifierection PFC硅脂 Silicon柜组 Cabinet Group滚动条 Scroll Bar国标 National Standard GBy Access Management FEAM国际标准化组织 International Standardization Organization ISO国际电报电话咨询委员会 The Consultative Committee of International Telegra国际电信联盟 International Telecommunications Union ITU国际电信联盟-电信标准部 International Telecommunication Union-Telecomgnaling CCS国际电子技术委员会 International Electronic-Technical Committee IECSignaling Equipment国际互联网内容提供商 Internet Content Provider ICPignaling Network国际互联网学会 Internet Society ISOC国际接口局,国际通信进出口局 International gatewayent Knowledge SMK国际移动用户标识 International Mobile Subscriber Identity IMSI国际移动终端设备标识 International Mobile station Equipment Identity IMEI国际移动组标识 International mobile group identity IMGI国际转接交换局 International Transit Exchange国家代码 Country Code电视 Community Antenna Television,Cable TV CATV国家法定假日 National Holidays国家管理当局 National Regulatory Authority NRA国家和城市长途区号表 Country and City Toll Call Area Code Table国家信息基础设施,信息高速通道 National Information Infrastructure NII国内长途号码 National Toll Number国内地区使用消息 National Area Message NAM国内呼叫监视消息 National Call Supervision Message NCB国内漫游 National roaming国内目的地代码 National Destination Code国内网拥塞 National Network Congestion过欠压 Over-/Under-Voltage过压保护 Over-Voltage Protectionocation FCA海绵块、海绵垫 Sponge Block, Sponge Cushion海外培训费用 Overseas Training Charge汉化 Chinesization ,Chinesize焊接 Weld焊接材料 Welding Auxiliary Materials焊片 Soldering Flake焊锡丝 Solder, Solder Wire航天电子学 Aerospace Electronics nosis and Elimination毫秒 Millisecond ms毫微米, 纳米 Nano-Meter NM毫微秒 Nanosecond ns嗥鸣音 Howler tone号码存储键 Number Storing Key号码段 Number Segment号码分析表 Number Analysis Table号码移动性 Number portability号盘话机 Dial Phone Set耗材 Consumable合并的链路层管理 Consolidated Link Layer Management CLLM合波器/分波器 Optical Multiplexer/Demultiplexerces Switching Centre GMSC合法性 Legality, Validity合法性检查 Validity Check合分路单元 Combining and distribution unit合分路器 Combiner/divider unit合格产品清单 Qualified Product List Database Management System RDBMS合格概率(验收) Acceptance Probability合格零部件 Qualified Partspointer AU PTR合格证 Certificate of Approval合格证 Certificate of Quality合路器 Combinerbit Message MIM合席 Combined Position核心功能 Core Function CFation Base MIB盒体、盒盖 Box Body, Box Cover赫兹 Hertz Hz赫兹 Hertz Hz黑白图像 Black-And-White Image黑客 Hacker很小容量市话局 Very Small Local Exchange VSLE nversion Modules很早分配 Very Early Allocation VEA恒温晶振 Constant-temperature Crystal Oscillator ss Connect OLXC红外端口 Infrared Port宏病毒 Macro Virusesn Supervision宏单元,大区,宏蜂窝区 Macro Celln Supervision宏蜂窝 Macro cellNetwork OTN侯选小区 Candidate cellssion System Control后端 Back End后端处理机 Back-End Processor后进先出 Last In-First Out (LIFO)后门板 Rear Door后面板 Back Panel后视图,背视图 Rear View, Rear Elevation后台网络 Background Network后向挂机信号 Clear Back signal CBK后向监视信号 Backward Supervision signal后向信号 Backward Signal后续地址消息 Subsequent Address Message SAM后延, (脉冲的)下降边(脉冲的) Back Edge厚膜 Thick Film候选响应(BSSMAP) Candidate response (BSSMAP)呼出限制(新业务,用户控制) Outgoing call barring OCB Components呼出限制(由局方控制) Call restriction呼号状态显示 Call Number Status Indicationng unit (ODU)呼叫,主叫(主叫方,主叫用户) Calling呼叫保持(补充业务) Call hold HOLDMultiplexer OADM呼叫插入,强插 Call Break-in呼叫成功 Call Succeeded呼叫冲突,呼叫碰撞 Call Collision呼叫处理 Call Processing CPNetwork ODN呼叫处理程序 Call Processing Program, Caller Handler呼叫代答,分机代接 Call Pick-Up呼叫到达 Call Delivery呼叫登录 Call Logging LOG呼叫等待(补充业务) Call Waiting CW呼叫点 Point in Call PIC呼叫分配 Call Distribution CD呼叫功能键区 Call Function Keyss-connect OXC呼叫故障 Call failure呼叫-故障信号, 呼叫失败信号 Call-Failure Signal CFL 呼叫观察 Call Observation呼叫管理 Call Management CM呼叫间隙 Call Gapping GAP呼叫建立 Call Set-Up呼叫接续控制 Call Connection control CC呼叫截接,呼叫代答 Pickup呼叫控制 Call Control CC呼叫控制接入功能 Call Control Access Function CCAF呼叫来源 Calling Source呼叫类别 Call type呼叫路由选择 Call Routing呼叫排队 Call Queueing QUE呼叫前转 Call Forwarding CFain Reflectometer OTDR呼叫清除 Call clear CCLDD呼叫识别 Call identification呼叫实例数据 Call instance Data CIDquency deviation of optical input interface呼叫实例数据字段批示语 Call instance Data File Pointer CIDFP呼叫释放的请求 Call release request REL呼叫损失 Call loss呼叫无应答前转 Call Forwarding No Reply呼叫限制器 Call Limiter LIM呼叫修改拒绝 Call Modification Rejected CMRJ呼叫修改完成 Call Modification Completed CMC呼叫拥塞 Call Congestion呼叫遇忙前转 Call Forwarding On Busy呼叫证实信号 Call-Confirmation Signalice Area FSA呼叫中途挂机, 未接通暂停 Call abandon呼叫重选路由分配 Call Rerouting Distribution CRD呼叫转移(拍叉) Call Transfer CT呼入 Incoming CallCall in呼损率 Call loss ratio buted Data Interface FDDIet, 100baseXd Coax Network HFCceiver Board OLTRecognition OCRChannel BCCHArea Centrex WACmation Server WAISponse Mode NRM/Noise Ratio。
华为词汇汇总(中-英) (3)
替换键盘 | [hw] alternate keyboard
替换路径 | [hw] alternate path
替换地址映射机制 | [hw] alternative address mapping mechanism
AES 进程资源标签 | [hw] aes process resource tag
AFP 模块 | [hw] afp module
AFP 权限 | [hw] afp rights
AFP 服务器 | [hw] afp server
AFP 服务器名称 | [hw] afp server name
高级任务 | [hw] advanced tasks
广告(名),做广告(动) | [hw] advertise
自我广告 | [hw] advertise itself
广告包 | [hw] advertising packet
广告打印服务器 | [hw] advertising print server
分配等待 | [hw] allocate wait
按 AVAIL 分配的 | [hw] allocated from avail
按 LRU 分配的 | [hw] allocated from lru
分配 | [hw] allocation
分配器 | [hw] allocator
帐户 ID | [hw] account id
帐户极限 | [hw] account limits
已锁帐户 | [hw] account locked
帐户经管员 | [hw] account manager
信息类专业英语翻译
Dynamic topology:As the channel of communicationchanges, some of the neighbors who were reachable on theprevious channel might not be reachable on the currentchannel and vice versa. As a result the topology of the network changes with the change in frequency of operation resulting in route failures and packet loss.Heterogeneity:Different channels may support differenttransmission ranges, data rates and delay characteristics.Spectrum-Handoff delay:For each transition from onechannel to another channel due to the PU’s activity, thereis a delay involved in the transition called Spectrum- Handoff delay.All these factors decrease the predictability of the cause oftransit-delay and subsequent packet loss on the network. Thetime latency during channel hand-off in cognitive networksmight cause the TCP round trip timer to time out. TCP willwrongly recognize the delays and losses due to the abovefactors as network congestion and immediately take steps toreduce the congestion window size knowing not the cause ofpacket delay. This reduces the efficiency of the protocol insuch environments.动态技术:随着信道通信的变化,一些邻进信道的用户在原信道没有发生变化而在新信道发生变化,或者相反。
机会路由综述2014.6
机会路由综述机会路由是针对无线多跳网络信道广播特性、有损特性提出的一种MAC层路由协议,机会路由的各转发节点由多个候选节点的竞争选择产生,由此带来了比传统固定路径无线路由更高的传输可靠性以及端到端的吞吐量[1][2]。
2005年,MIT计算机科学与人工智能实验室的Sanjit Biswas和Robert Morris在SIGCOMM会议发表的论文首次提出了一种机会路由——ExOR[1](Extremely Opportunistic Routing)。
ExOR协议运行过程为:已知源节点准备将一信息包传输到多跳外的目的节点。
源节点广播信息包,协议选择一节点子集接收信息包,节点子集中离目的节点最近的节点再次广播信息包,协议选择下一节点子集,其中接收到该信息包的离目的节点最近的节点接收信息包并转发,循环运行该过程直到目的节点接收到信息包。
ExOR使用改进的ETX(expected transmission count)作为链路质量的衡量指标,经典的ETX指标:其中d f为前向链路投递率,代表信息包被成功接收的概率; d r为反向链路投递率,代表接收节点回复ACK被成功接收的概率。
ExOR中改进的ETX假设反向链路投递率100%,简化了衡量指标的计算,但也产生了忽略反向链路的缺点。
ExOR中令每个节点的ETX值为该点到目的节点路径上所有链路ETX之和的最小值,而我认为用链路ETX之和的最小值表示一节点的ETX值并不合理,因为该值并不能代表该节点到目的节点的路径质量,路径质量应与路径上所有链路的投递率的乘积相关。
因而,对ETX指标进行修正可能会带来更好的路由协议性能。
ExOR协议在MIT搭建的满足802.11b协议的室外无线网络Roofnet中进行了评估验证,证明了在相同的网络容量下,ExOR相比传统路由带来了更高的吞吐量。
Roofnet结构为:整个区域紧密分布着3到4座老房子,网络中大部分节点的天线比房子烟囱高23英尺,整个区域中还有几座高楼,有5个Roofnet节点分布在网络边界的高楼上,少数节点天线安装在窗口。
synopsys iC Compiler II 数据手册说明书
DATASHEETOverview IC Compiler™ II is the industry leading place and route solution that delivers best-in-class quality-of-results (QoR) for next-generation designs across all market verticals and process technologies while enabling unprecedented productivity. IC Compiler II includes innovative for flat and hierarchical design planning, early design exploration, congestion aware placement and optimization, clock tree synthesis, advanced node routing convergence, manufacturing compliance, and signoff closure.IC Compiler II is specifically architected to address aggressive performance, power, area (PPA), and time-to-market pressures of leading-edge designs. Key technologies include a pervasively parallel optimization framework, multi-objective global placement, routing driven placement optimization, full flow Arc based concurrent clock and data optimization, total power optimization, multi-pattern and FinFET aware flow and machine learning (ML) driven optimization for fast and predictive design closure. Advanced Fusion technologies offer signoff IR drop driven optimization, PrimeTime ® delay calculation within IC Compiler II, exhaustive path-based analysis (PBA) and signoff ECO within place and route for unmatched QoR and design convergence. F U S I O N D E S I G N P L A T F O R M PrimeTime, StarRC, PrimePower,IC Validator, RedHawk Analysis Fusion Fusion Compiler IC Compiler II Design Compiler NXT TestMAX F o r m a l i t y ECO Fusion S i g n o f f F u s i o n S i g n o f f F u s i o n Test Fusion Figure 1: IC Compiler II Anchor in Synopsys Design PlatformAccelerating DesignClosure on AdvancedDesignsIC Compiler II Industry Leading Place and Route SystemKey BenefitsProductivity• The highest capacity solution that supports 500M+ instances with a scalable and compact data model• A full suite of design planning features including transparent hierarchical optimization• Out-of-the-box simple reference methodology for easy setup• Multi-threaded and distributed computing for all major flow steps• Golden signoff accuracy with direct access to PrimeTime delay calculationPPA• Unified TNS driven optimization framework• Congestion, timing, and power-driven logic re-synthesis• IEEE 1801 UPF/multi-voltage support• Arc-based concurrent clock and data optimization• Global minima driven total power optimizationAdvanced Nodes• Multi-pattern and FinFET aware design flow• Next generation advanced 2D placement and legalization• Routing layer driven optimization, auto NDR, and via pillar optimization• Machine learning driven congestion prediction and DRC closure• Highest level of foundry support and certification for advanced process nodes• IC Validator in the loop signoff driven DRC validation and fixingAdvanced Fusion Technology• Physically aware logic re-synthesis• IR drop driven optimization during all major flow steps• PrimeTime delay calculation based routing optimization for golden accuracy• Integrated PrimeTime ECO flow during routing optimization for fastest turnaround timeEmpowering Design Across Diversified ApplicationsThe dizzying pace of innovation and highly diversified applications across the design spectrum is forcing a complete rethink of the place and route systems to design and implement differentiated designs in a highly competitive semiconductor market on schedule. Designers on emerging process nodes must meet aggressive PPA and productivity goals. It essentially means efficient and intelligent handling of 100s of millions of place-able instances, multiple levels of hierarchy, 1000s of hard macros, 100s of clocks, wide busses, and 10s of modes and corners power domains and complex design constraints and process technology mandates. Emphasis on Designer ProductivityIC Compiler II is architected from the ground up for speed and scalability. Its hierarchical data model consumes 2-3X less memory than conventional tools, boosting the limits of capacity to 500M placeable instances and beyond. Adaptive abstraction and on-the-fly data management minimize memory requirements and enable fast responsive data manipulation. Near-linear multi-core threading of key infrastructural components and core algorithms such as database access and timing analysis speed up optimization at all phases of design. Patented, lossless compact modeling and independent R and C extraction allow handling more modes and corners (MCMM scenarios) with minimal runtime impact.IC Compiler II has built-in Reference Methodology(RM) that ensures fast flow bring up. This RM Flow is Foundry Process/Design Type specific to ensure a robust starting point and seamless bring up. IC Compiler II has direct access to the Golden PrimeTime delay calculation engine to minimize ECO iterations.IC Compiler II’s new data model enables designers to perform fast exploration and floorplanning with complex layout requirements. IC Compiler II can create bus structures, handle designs with n-levels of physical hierarchy, and support Multiply Instantiated Blocks (MIBs) in addition to global route driven pin assignment/feedthrough flow, timing driven macro placement, MV area design planning.A design data mismatch inferencing engine analyzes the quality of inputs and drives construct creation on the fly, delivering design insights even with “incomplete” data early in the design cycle. Concurrent traversal of logical and physical data models enables hierarchical Data-Flow Analysis (DFA) and fast interactive analysis through multi-level design hierarchies and MIBs. Data flow and feedthrough paths highlighted in Figure 2 allow analysis and manipulation through n-levels of hierarchy to complete early design exploration and prototyping.Figure 2: Fast interactive analysis through multiple-levels of physical hierarchy and MIBPipeline-register-planning shown in Figure 3, provides guidance for optimal placement to meet the stringent timing requirementsof high-performance designs. Interactive route editor integrated which is advanced node aware shown in Figure 4, allows intricate editing and routing functions, including the creation of special signal routes, buses, etc.Figure 3: Pipeline register placement enables superior QoR for designs with complex busesAchieving Best Performance, Power, Area, and TATIC Compiler II features a new optimization framework built on global analytics. This Unified TNS Driven Optimization framework is shared with Design Compiler NXT synthesis to enable physically-aware synthesis, layer assignment, and route-based optimization for improved PPA and TAT. Multi-Corner Multi-Mode (MCMM) and Multi-Voltage (MV) aware, level-based analytical algorithms continuously optimize using parallel heuristic algorithms. Multi-factor costing functions deliver faster results on both broad and targeted design goals. Concurrent PPA driven logic remapping, rewiring, and legalization interleaved with placement minimizes congested logic, resulting in simple localized logic cones that maximize routability and QoR.IC Compiler II minimizes leakage with fast and efficient cell-by-cell power selection across HVT, SVT and LVT cells and varying channel lengths. Activity-driven power optimization uses VCD/ SAIF, net toggle rates, or probability functions to drive placement decisions and minimize pin capacitances. Multi-bit register banking optimizes clock tree structures, reduces area, and net length, while automatically managing clock, data, and scan chain connections.Advanced modeling of congestion across all layers highlighted in Figure 4 provides accurate feedback throughput the flow from design planning to post- route optimization.Figure 4: Intelligent and accurate analysis for congestion and powerIC Compiler II introduces a new Concurrent Clock and Data (CCD) analysis and optimization engine that is built-in to every flow step resulting in meeting both aggressive performance and minimizing total power footprint. ARC-based CCD optimization performs clock tree traversal across all modes/corners in path-based fashion to ensure optimal delay budgeting.Robust support for clock distribution enables virtually any clock style, including mesh, multi-source, or H-tree topologies. Advanced analysis and debugging features perform accurate clock QoR analysis and debugging as highlighted in Figure 5.Figure 5: Accurate clock QoR analysis and debugging (a & b) Abstracted clock graph and schematic.(c) Latency clock graph. (d) Colored clock tree in layout.IC Compiler II features many innovative technologies that make it the ideal choice for high-performance, energy-efficient Arm®processor core implementation, resulting in industry-best milliwatts/megahertz (mW/MHz) for mobile and other applications across the board. Synopsys and Arm work closely together to offer optimized implementation of popular Arm cores for IC Compiler II,with reference flows available for Arm Cortex®-A high-performance processors and Mali GPUs. In addition, Arm offers off-the-shelf Artisan® standard cell and memory models that have been optimally tuned and tested for fast deployment in an IC Compiler II environment. Continuous technology innovation and close collaboration makes IC Compiler II the leading choice for Arm-based high- performance design.Highest Level of Advanced Node Certification and SupportIC Compiler II provides advanced node design enablement across major foundries and technology nodes—including 16/14nm,12/10nm, 7/5nm, and sub-5nm geometries. Zroute digital router technology ensures early and full compliance with the latest design rules required for these advanced node technologies. Synopsys collaborates closely with all the leading foundries to ensure that IC Compiler II is the first to deliver support for early prototype design rules and support for the final production design rules. IC Compiler II design technologies maximize the benefits of new process technologies and offer optimal return on investment for cutting-edge silicon applications.IC Compiler II advanced node design support includes multi-pattern/FinFET aware placement and routing, Next-generation advanced 2D placement and legalization, routing layer driven optimization, auto NDR, and via pillar optimization. IC Validator in the loop provides signoff DRC feedback during Implementation.Foundry fill Track based fillFigure 6: IC Validator In-Design metal fill color aware metal fill, optimized for density and foundry requirementsMachine learning driven congestion prediction and DRC closure allow for fastest routing convergence with best PPA. Multiple sets of training data are used to extract key predictive elements that guide the pre-route flow.Advanced Fusion TechnologyThe Fusion Design Platform™ delivers unprecedented full-flow QoR and time-to-results (TTR) to accelerate the next wave of semiconductor industry innovation. The industry’s first AI-enhanced, cloud-ready Design Platform with Fusion Technology™ isbuilt from Synopsys’ market-leading, massively-parallel digital design tools, and augmented with innovative capabilities to tacklethe escalating challenges in cloud computing, automotive, mobile, and IoT market segments and accelerate the next wave of industry innovation.Fusion Technology redefines conventional EDA tool boundaries across synthesis, place-and-route, and signoff, sharing integrated engines across the industry’s premier digital design products. It enables designers to accelerate the delivery of their next-generation designs with the industry-best QoR and the TTR.©2019 Synopsys, Inc. All rights reserved. Synopsys is a trademark of Synopsys, Inc. in the United States and other countries. A list of Synopsys trademarks isavailable at /copyright.html . All other names mentioned herein are trademarks or registered trademarks of their respective owners.。
通信专业英语词汇
A:Amplifier 放大器A:Attendance员工考勤A:Attenuation衰减AA:Antenna amplifier 开线放大器AA:Architectural Acoustics建筑声学AC:Analogue Controller 模拟控制器ACD:Automatic Call Distribution 自动分配话务ACS:Access Control System出入控制系统AD:Addressable Detector地址探测器ADM:Add/Drop Multiplexer分插复用器ADPCM:Adaptive Differential ulse Code Modulation 自适应差分脉冲编码调制AF:Acoustic Feedback 声反馈AFR:Amplitude /Frequency Response 幅频响应AGC:Automati Gain Control自动增益控制AHU:Air Handling Unit 空气处理机组A-I:Auto-iris自动光圈AIS:Alarm Indication Signal 告警指示信号AITS:Acknowledged Information Transfer Service确认操作ALC:Automati Level Control 自动平衡控制ALS:Alarm Seconds 告警秒ALU:Analogue Lines Unit 模拟用户线单元AM:Administration Module管理模块AN:Access Network 接入网ANSI:American National Standards Institute美国国家标准学会APS:Automatic Protection Switching 自动保护倒换ASC:Automati Slope Control 自动斜率控制A TH:Analogue Trunk Unit 模拟中继单元A TM:Asynchrous Transfer Mode 异步传送方式AU- PPJE:AU Pointer Positive Justification 管理单元正指针调整AU:Administration Unit 管理单元AU-AIS:Administrative Unit Alarm Indication SignalAU告警指示信号AUG:Administration Unit Group 管理单元组AU-LOP:Loss of Administrative Unit Pointer AU指针丢失AU-NPJE:AU Pointer Negative Justification管理单元负指针调整AUP:Administration Unit Pointer管理单元指针A VCD:Auchio &Video Control Device 音像控制装置AWG:American Wire Gauge美国线缆规格BA:Bridge Amplifier桥接放大器BAC:Building Automation & Control net建筑物自动化和控制网络BAM:Background Administration Module后管理模块BBER:Background Block Error Ratio背景块误码比BCC:B-channel Connect ControlB通路连接控制BD:Building DistributorBEF:Buiding Entrance Facilities 建筑物入口设施BFOC:Bayonet Fibre Optic Connector大口式光纤连接器BGN:Background Noise背景噪声BGS: Background Sound 背景音响BIP-N:Bit Interleaved Parity N code 比特间插奇偶校验N位码B-ISDN:Brand band ISDN 宽带综合业务数字网B-ISDN:Broad band -Integrated Services Digital Network 宽带综合业务数字网BMC:Burst Mode Controller 突发模式控制器BMS:Building Management System 智能建筑管理系统BRI:Basic Rate ISDN 基本速率的综合业务数字网BS:Base Station基站BSC:Base Station Controller基站控制器BUL:Back up lighting备用照明C/S: Client/Server客户机/服务器C:Combines 混合器C:Container 容器CA:Call Accounting电话自动计费系统CA TV:Cable Television 有线电视CC:Call Control 呼叫控制CC:Coax cable 同轴电缆CCD:Charge coupled devices 电荷耦合器件CCF:Cluster Contril Function 簇控制功能CD:Campus Distributor 建筑群配线架CD:Combination detector 感温,感烟复合探测器CDCA:Continuous Dynamic Channel Assign 连续的动态信道分配CDDI:Copper Distributed Data 合同缆分布式数据接口CDES:Carbon dioxide extinguisbing system 二氧化碳系统CDMA:Code Division Multiplex Access 码分多址CF:Core Function 核心功能CFM:Compounded Frequency Modulation 压扩调频繁CIS:Call Information System 呼叫信息系统CISPR:Internation Special Conmittee On Radio Interference 国际无线电干扰专门委员会CLNP:Connectionless Network Protocol 无连接模式网络层协议CLP:Cell Loss Priority信元丢失优先权CM:Communication Module 通信模块CM:Configuration Management 配置管理CM:Cross-connect Matrix交叉连接矩阵CMI:Coded Mark Inversion传号反转码CMISE:Common Management Information Service公用管理信息协议服务单元CPE:Convergence protocol entity 会聚协议实体CR/E:card reader /Encoder (Ticket reader )卡读写器/编码器CRC:Cyclic Redundancy Check 循环冗佘校验CRT:Cathode Ray Tabe 显示器,监视器,阴极射线管CS: Convergence service 会聚服务CS:Cableron Spectrum 旧纳档块化技术CS:Ceiling Screen 挡烟垂壁CS:Convergence Sublayer合聚子层CSC:Combined Speaker Cabinet 组合音响CSCW:Computer supported collaborative work 计算机支持的协同工作CSES:Continuius Severely Errored Second 连续严重误码秒CSF:Cell Site Function 单基站功能控制CTB:Composite Triple Beat 复合三价差拍CTD:Cable Thermal Detector 缆式线型感温探测器CTNR:carrier to noise ratio 载波比CW:Control Word 控制字D:Directional 指向性D:Distortion 失真度D:Distributive 分布式DA:Distribution Amplifier 分配的大器DBA:Database Administrator数据库管理者DBCSN:Database Control System Nucleus数据库控制系统核心DBOS:Database Organizing System 数据库组织系统DBSS:Database Security System 数据库安全系统DC:Door Contacts大门传感器DCC:Digital Communication Channel数字通信通路DCN:Data Communication Network 数据通信网DCP-I:Distributed Control Panel -Intelligent智能型分散控制器DCS:Distributed Control System集散型控制系统DDN:Digital Data Network 数字数据网DDS:Direct Dignital Controller直接数字控制器DDW:Data Describing Word 数据描述字R]RDRAM 高频DRAMRAID 冗余独立磁盘阵列Registry 注册表RISC CPU 精简指令集CPURegistry 注册表RDRAM Rambus动态随机存取内存RSA Data Security RSA数据安全性RSA数据安全性Routing Protocols 路由选择协议Routing Information Protocol 路由选择信息协议Routing,OSI OSI的路由选择Routing,NetWare NetWare的路由选择Routing,Internet Internet路由选择Routing,IBM IBM路由选择Routing,AppleTalk AppleTalk路由选择AppleTalk路由选择Routers 路由器RJ-11and RJ-45 Connections RJ-11和RJ-45连接Ring Network Topology 环网拓扑结构环网拓扑结构Rights(Permissions)in Windows NT Windows NT权限(准许权限)Rightsin Windows for Workgroups Windows for Workgroups中的权限Rightsin Novell NetWare Novell NetWare中的权限RG-62 Coaxial Cable RG-62同轴电缆RG-58 Coaxial Cable RG-58同轴电缆Replication 复制Repeater 中继器,重复器Remote Procedure Call 远程过程调用Remote Access Software 远程访问软件Regional Bell Operating Companies(RBOC)地方贝尔运营公司Redundant Arrays of Inexpensive Disks(RAID)廉价磁盘冗余阵列Reduced Instruction Set Computer 精简指令系统(集)计算机Redirector 重定向器(程序)RAM Mobile Data RAM 移动数据公司Radio Networks 无线电网络-------------------------------------------------------------------------------- [S]SSL 安全套层SAA 系统应用架构SMP 对称多处理结构SET 安全电子商务协议SNA 系统网络结构Subnet 子网SSL 安全套接层协议Server 服务器SMP 对称式多处理器Serial Interface 串行接口SOHO 小型办公与家庭办公Scanner 扫描仪Search Engine 搜索引擎Screen Saver 屏幕保护程序Socket 7 接口结构SONET 同步光纤网SMTP 简单邮件传送协议SCSI 小型计算机系统接口SGRAM 同步图形动态随机存取内存SDRAM 同步动态随机存取内存SystemView,IBM IBM的SystemView网络管理系统Systems Network Architecture(SNA),IBM IBM 系统网络体系结构Systems Application Architecture 系统应用体系结构System Object Model(SOM),IBM IBM的系统对象模型(SOM)System Fault Tolerance 系统容错Synchronous Optical Network 同步光纤网Synchronous Data Link Control 同步数据链路控制(规程)Synchronous Communication 同步通信Symmetrical Multiprocessing 对称多处理Switching Hubs 交换式集线器Switched Virtual Circuit 交换式虚电路Switched Services 交换式服务Switched Multimegabit Data Service 交换式多兆位数据服务Switched-56 Services Switched-56服务,交换式56服务Surge Suppressors 浪涌电压抑制器,电涌抑制器Supervisor 超级用户,监管员SunOS,SunSoft SunSoft的SunOS操作系统SunNet Manager,Sun Microsystems,Inc.Sun公司的SunNet Manager Sun Microsystems,Inc.Sun 微系统公司SunLink Network Sunlink网--------------------------------------------------------------------------------[T]TFT 有源矩阵彩色显示器TFTP 小文件传输协议Transport layer 传输层Taskbar 任务条Twisted-Pair Cable 双绞线,双绞线电缆Tuxedo,UNIX System Laboratories UNIX系统实验室的Tuxedo中间件Tunneling 管道传送,隧道,管道传输Trustees 受托者Troubleshooting 故障诊断与维修,排错Trivial File Transfer Protocol 普通文件运输协议Transport Protocol 传输协议Transport Layer Interface 运输层接口Transport Layer,OSI Model OSI模型的运输层Transmission Media,Methods,and Equipment 传输介质、方法和设备Transmission Control Protocol/Internet Protocol 传输控制协议/Internet协议Transfer Rates 传输率Transceiver,Ethernet 以太网收发器,以太网的接收发送器Transaction Processing 事务处理Topology 拓扑结构Token Ring NetWork 令牌环网Token Bus NetWork 令牌总线网Token and Token Passing Access Methods 令牌和令牌传递访问方式Time Synchronization Services 时间同步服务Time Domain Reflectometer 时域反射计(仪,器)Throughput 吞吐率,处理能力Threads 线程Testing Equipment and Techniques 测试设备和技术Terminator 终端器,终结器,终止器Terminal Servers 终端服务器Terminal 终端Telnet Telnet程序Telenet Telenet网Telecommunication 电信,远程通信Technical Office Protocol 技术办公系统协议TeamLinks,DEC DEC的群件TeamLinksTaligent Taligent公司T1/T3 Services T1/T3服务--------------------------------------------------------------------------------[U]UDA 统一数据读取UML 统一建模语言UTP 无屏蔽双绞线URL 统一资源定位格式UPS 不间断电源Ultra DMA 33 同步DMA协定UNIX 32位操作系统UNIX 操作系统USB 通用串行总线Users and Groups 用户和(小)组User Datagram Protocol 用户数据报协议User Agent 用户代理USENET USENET网Unshielded Twisted Pair 非屏蔽双绞线UNIX-to-UNIX Copy Program UNIX系统间文件拷贝程序UNIX System Laboratories UNIX系统实验室UNIX International UNIX国际UNIX UNIX操作系统Unit of Work 作业单元,工作单元Uninterruptible Power Supply 不间断电源Unified Network Management Architecture(UNMA),AT&T A T&T的统一网络管理体系结构--------------------------------------------------------------------------------[V]Virtual Desktop 虚拟桌面V oxML 语音标记语言Video Compression 视频压缩Virtual reality 虚拟现实VOD 视频传播系统VESA 视频电子标准协会VRML 虚拟现实建模语言VESA 视频电子标准V olume Spanning 卷宗的跨越V olumes,NetWare NetWare的卷宗Virtual Terminal(VT)虚拟终端Virtual Telecommunication Access Method 虚拟远程通信访问方法Virtually Integrated Technical Architecture Lifecycle 虚拟集成技术体系结构生命周期Virtual File Systems 虚拟文件系统Virtual Data Networks 虚拟数据网Virtual Circuit 虚电路VINES,Banyan Banyan的VINES操作系统Videoconferencing and Desktop Video 电视会议和台式(桌面)视频系统Very Small Aperture Terminals(VSA Ts)卫星小站电路设备Vertical Wiring 垂直布线系统Vendor Independent Messaging (VIM),Lotus Lotus 的厂商无关消息传递应用程序编程接口“V dot”Standards,CCITT CCITT(ITU)的“V点”标准V AX,Digital Equipment Corporation(DEC)数字设备公司(DEC)的V AXValue-Added Carrier 增值网[K]Key recovry 密钥恢复Knowbots Knowbots智能程序Key Encryption Technology 密钥加密技术Kernel 操作系统内核Kermit Kermit文件运输协议Kerberos Authentication Kerberos鉴别--------------------------------------------------------------------------------[L]LCD 液晶显示屏Light Cabel 光缆Leased line 专线LPT 打印终端LPT 打印终端接口LAN 局域网LU 6.2 LU 6.2协议Lotus Notes Lotus的Notes软件Logons and Logon Accounts 用户登录和登录帐号Login Scripts 登录原语Logical Units 逻辑单元Logical Links 逻辑链路LocalTalk LocalTalk网Local Procedure Calls 本地过程调用Local Loops 局部环路Local Groups 本地组Local Exchange Carrier 本地交换电信局Local Area Transport 局域传输协议Local Area NetWorks 局域网Local Access and Transport Area 本地访问和传输区域Load-Balancing Bridges 负载平衡桥接器,负载平衡网桥Link State Routing 链路状态路由选择Link Services Protocol,NetWare NetWare的链路服务协议Link Layer 链路层Link Access Procedure 链路访问规程Line Conditioning 线路调节Licensing Server API 许可证服务器APILegacy Systems 保留系统Leased Line 租用线路Learning Bridges 自学习桥接器Leaf Objects 叶对象Layered Architecture 分层体系结构Large Internetwork Packet Exchange 大型网间分组交换Laptop Connections 膝上机联网LAN Workplace Products,Novell Novell的LAN Workplace产品,Novell的局域网Workplace 产品LAN Troubleshooting 局域网故障诊断LANtastic LANtastic局域网操作系统LAN Server 局域网服务器LAN Requester 局域网请求解释器LAN Manager,Microsoft Microsoft的局域网管理器,Microsoft的LAN Manager--------------------------------------------------------------------------------[M]Mosaic 摩塞克浏览器MO 磁性光盘Mac OS Mac操作系统MO 磁光盘MCSE 微软认证系统工程师MUD 分配角色的游戏环境Mainbus 系统总线Mainboard 主板MAN 城域网Memory Stick Memory Stick 存储棒MSI MSI 微星科技Multistation Access Unit 多站访问部件Multipurpose Internet Mail Extension Internet多功能邮件传递扩展标准Multiprotocol Transport Network(MPTN),IBM IBM的多协议传输网络Multiprotocol Router 多协议路由器Multiprotocol Networks 多协议网络Multiprocessor Systems 多处理器系统Multiprocessing 多处理器处理Multiplexing 多路复用技术Multimedia 多媒体Multidrop(Multipoint)Connection 多点连接MOTIS(Message Oriented Text Interchange System)MOTIS(面向消息的文本交换系统)Motif Motif 工具Modems 调制解调器Mobile Computing 移动计算Mirroring 镜像Middleware 中间件Microwave Communication 微波通信Micro-to-Mainframe Connectivity 微型计算机到大型计算机的互联性Microsoft At Work Architecture Microsoft At Work体系结构Microsegmentation 微分段Microkernel 微内核Microcom Networking Protocol(MNP)Microcom的联网协议MicroChannel Architecture(MCA)Bus 微通道体系结构(MCA)总线Metropolitan Area Networks 城域网Messaging Application Programming Interface 消息应用程序编程接口Messaging API,Inter-Application 应用程序间的消息传递APIMessaging API,E-mail E-mail的消息传递APIMessage Transfer Agent 消息传送代理Message Queuing Interface(MAI),IBM IBM的消息排队接口--------------------------------------------------------------------------------[N]NOC 网络操作中心NAT 网址解析NOC 网络操作中心NAT 网址解析NDIS 网络驱动程序接口Network Architecture 网络体系结构NSR 渲染引擎NFS 网络文件系统NAT 网址转换NWLink IPX/SPX协议微软执行部分NetBIOS 网络基本输入/输出系统Network interface card 网卡NTFS(New Technology File System)NTFS(新技术文件系统)Novell Novell公司Node 节点,结点,网点Network Troubleshooting 网络故障诊断与维修Network Service Protocol,DEC DEC网络服务协议Networks 网络NetWork Management 网络管理Network Layer,OSI Model OSI模型的网络层Network Interface Card 网络接口卡Networking Blueprint 联网方案Network File System 网络文件系统Network Dynamic Data Exchange 网络动态数据交换Network Driver Standards 网络驱动程序标准Network Driver Interface Specification 网络驱动程序接口规范NetWork Control Program 网络控制程序Network Architecture 网络体系结构NetWare Volumes NetWare的(文件)卷宗NetWare Shell NetWare工作站外壳程序NetWare SFT Level ⅢNetWare的三级系统容错NetWare Products NetWare软件产品NetWare Loadable Module NetWare的可装入模块NetWare Link Service Protocol NetWare的链路服务协议NetWare Electronic Software Distribution NetWare的电子软件分发NetWare Disks,Partitions,and V olumes NetWare的磁盘、分区和卷宗NetWare Core Protocol NetWare的核心协议NetWare NetWare网络操作系统NetView,IBM IBM的NetView网络管理系统NetLS(Network License Server)NetLS(网络许可权服务器)-------------------------------------------------------------------------------- [O]OEM 原装备生产厂商OH 调制解调器连线OSD 屏幕视控系统OAW 光学辅助温式技术OA 办公自动化Open Source 开放源代码OSF/1,Open Software Foundation 开放软件基金会OSF/1操作系统OS/2 OS/2操作系统Organization Containers 机构包容器对象Optical Libraries 光盘库,光盘存储库Optical Fiber 光纤Open View Management System,Hewlett-Packard HP的Open VieW管理系统Open Systems Interconnection(OSI)Model 开放式系统互联(OSI)模型Open Systems 开放式系统Open Software Foundation(OSF)开放软件基金会(OSF)Open Shortest Path First(OSPF)Protocol 优先开放最短路径(OSPF)协议Open Network Computing(ONC),SunSoft SunSoft的开放式网络计算环境Open Messaging Interface(OMI)开放消息传递接口Open Document Architecture 开放文档体系结构OpenDoc Alliance,Apple Apple的OpenDoc联盟OPEN DECconnect Structured Wiring 开放DECconnect结构化布线系统OpenData-link Interface 开放数据链路接口Open Database Connectivity(ODBC),Microsoft Microsoft的开放式数据库互联性Open Collaborative Environment(OCE),Apple Apple的开放协作环境On-line Transaction Processing 联机(在线)事务处理Objects,NetWare Directory Services NetWare目录服务中的对象Objects 对象,目标,实体Object Request Broker 对象请求代管者Object-Oriented echnology 面向对象技术Object-Oriented Interfaces and Operating Systems 面向对象接口和操作系统Object-Oriented Database 面向对象数据库Object Management Group 对象管理组织Object Management Architecture 对象管理体系结构Object Linkingand Embedding 对象链接与嵌入Object Broker,DEC DEC的对象代理者软件,DEC的Object Broker软件--------------------------------------------------------------------------------[P]Packetsniffer 包嗅探器PHP4 嵌入式脚本描述语言Push Technology 推技术PVM 并行虚拟机Path 路径、通路PKI 公开密钥基础设施Pull-down Menu 下拉菜单PAP 密码验证协议PnP 即插即用PCL 打印机指令语言PDS 个人数字系统PCI 周边元件扩展接口POP3 高级网络协议PHP 服务器端编程语言Plasma Display Plasma Display 等离子显示器Punchdown Block 穿孔板,分线盒Pulse-Code Modulation 脉码调制,脉冲代码调制Public Switched Data NetWork 公共交换数据网Public Key Cryptographic Systems 公开密钥加密系统Public Data NetWorks(PDNs)公用数据网(PDN)PU2.1 物理单元(PU)2.1Protocol Stack 协议栈Protocols,Communication 通信协议Protocol Data Unit 协议数据单元Protocol Converters 协议转换器Protocol Analyzers 协议分析器(程序)Protected of Data 数据的保护Protected Mode (受)保护模式Properties of Objects 对象的性质,对象的特性Propagation Delay 传播延迟Project DOE(Distributed Objects Everywhere)企业(工程)DOE(全分布式对象)Private Network 私用网,专用网Private Key Cryptography 私用密钥密码学Privacy Enhanced Mail 增强安全的私人函件Print Server 打印服务器Printingon NetWare Networks NetWare网上打印(服务)Premises Distribution System 规整化布线系统Preemptive Multitasking 抢先多任务处理PowerPC PowerPC微处理里器系列PowerOpen Environment PowerOpen环境。
Mellanox IS5030 Switch System产品简介说明书
SWITCH SYSTEMIS503036-port Non-blocking Managed 40Gb/s InfiniBand Switch SystemIS5030©2011 Mellanox Technologies. All rights reserved.350 Oakmead Parkway, Suite 100, Sunnyvale, CA 94085Tel: 408-970-3400 • Fax: 3348PB Rev 1.1© Copyright 2011. Mellanox Technologies. All rights reserved.Mellanox, BridgeX, ConnectX, CORE-Direct, InfiniBlast, InfiniBridge, InfiniHost, InfiniRISC, InfiniScale, InfiniPCI, PhyX, Virtual Protocol Interconnect and Voltaire are registered trademarks of Mellanox Technologies, Ltd.FabricIT is a trademark of Mellanox Technologies, Ltd. All other trademarks are property of their respective owners.* Also available through Mellanox Certified Resellers and Distributors* Also available in short depth form factor and with 2 power supplies. Consult your Mellanox Sales Representative for further details.SAFETY–US/Canada: cTUVus –EU: IEC60950 –International: CB EMC (EMISSIONS) –USA: FCC, Class A –Canada: ICES, Class A –EU: EN55022, Class A –EU: EN55024, Class A –EU: EN61000-3-2, Class A –EU: EN61000-3-3, Class A –Japan: VCCI, Class A ENVIRONMENTAL–EU: IEC 60068-2-64: Random Vibration –EU: IEC 60068-2-29: Shocks, Type I / II –EU: IEC 60068-2-32: Fall TestOPERATING CONDITIONS –Operating 0ºC to 45ºC, Non Operating -40ºC to 70ºC –Humidity: Operating 5% to 95%, –Altitude: Operating -60 to 2000m,–Noise: 55dB - Noise reduction by controlling fan speed ACCOUSTIC –ISO 7779 –ETS 300 753 OTHERS–RoHS-5 compliant –Rack-mountable, 1U –1-year warrantyINFINIBAND SWITCH–36 QDFP non blocking switch with aggregate throughput of up to 2.88 Tb/s –Port-to-port latency < 100ns –IBTA 1.21 compliant–9 Virtual lanes: 8 data + 1 management –Adaptive routing –Congestion control –Port mirroring–48K entry linear forwarding data base MANAGEMENT PORTS –RS232 Console (RJ45) –Ethernet (RJ45) –USB portCONNECTORS AND CABLING –QSFP connectors–Passive/Active copper or fiber cable –Fiber media adapters INDICATORS–Per port status LED: Link, Activity –System status LED:Fan and power supplies LEDs POWER SUPPLY –Dual redundant slots –Hot plug operation–Input range: 100 - 240VAC–Frequency: 50-60Hz, single phase AC FANS–Front-to-rear or rear-to-front cooling option –Hot-swappable fan unit–Auto-heat sensing for silent fan operation –Fan speed controlled through management softwareCOMPLIANCEHARDWAREINFINIBAND–IBTA Specification 1.2.1 compliant–Integrated subnet manager agent–Adaptive routing–Congestion control–256 to 4Kbyte MTU–9 virtual lanes: 8 data + 1 management –48K entry linear forwarding data base –Port Mirroring MANAGEMENT–Fast and efficient fabric bring-up–Fabric-wide bandwidth verification–Comprehensive chassis management –Mellanox API for 3rd party integration –Intuitive CLI and GUI for easy access ©2011 Mellanox Technologies. All rights reserved.。
demonstra
QoS-Aware Cross-Layer Multicasting for Optical Packet-Switched Networks: Simulation Exploration and Test-BedDemonstrationCaroline P. Lai(1), Balagangadhar G. Bathula(2), Vinod M. Vokkarane(2), and Keren Bergman(1)(1)Dept.ofElectricalEngineering,ColumbiaUniversity,NewYork,NY;********************.edu(2) Dept. of Computer and Information Science, University of Massachusetts, Dartmouth, MAAbstract Cross-layer quality-of-service-aware packet multicasting is investigated for optical packet-switching network fabrics. We present both a numerical simulation exploration of the cross-layer routing algorithms and an experimental demonstration on an optical switching test-bed with 10×10-Gb/s wavelength-striped packets.IntroductionA novel Internet architecture will be essential toaccommodate the exploding bandwidthdemands faced by the current infrastructure.The next-generation design should leverageinnovative optical technologies to offer a moreintelligent, programmable optical layer withflexible bandwidth allocation and dynamicinteraction with higher network layers1. Weenvision an integrated platform for optical cross-layer (OCL) network communication and control(Fig. 1). OCL enhanced designs will facilitate theextraction of optical performance monitoring(OPM) measurements directly from the optical layer to optimize performance2. These OCL routing protocols must also invoke quality-of-service (QoS) classes on the optical layer. Ultimately, the OCL-optimized algorithms must provision for the data’s QoS as well as for the physical-layer performance and impairments2-5.The future Internet should also engage emerging physical-layer technologies, such as optical packet switching (OPS)6. OPS networks comprise a favourable technology approach to enable the flexible high-bandwidth, low-latency interconnections required by future Internet applications. OPS fabrics may be deployed within optical network routers to support high-bandwidth multi-wavelength packet streams between line cards. Additionally, OPS fabrics may achieve a high level of programmability to transparently route wavelength-division-multiplexed (WDM) packets entirely in the optical domain. A significant application that may leverage the greater functionality and programmable flexibility is broadband packet multicasting. We define packet multicasting as the ability to simultaneously transmit broadband multi-wavelength optical messages from a single source to multiple output destinations7. Multicasting may be advantageous in high-bandwidth applications, such as networked gaming and real-time diagnostic telemedicine.Broadband QoS-based packet multicasting constitutes an important functionality for future OPS networks. Notably, for bandwidth and latency sensitive applications, such as real-time collaboration, high-QoS packet transmission may be leveraged to provide a high-quality communication link. Here, we explore an OCL-enabled platform whereby a packet multicasting operation is realized accounting for both the message’s QoS and physical-layer degradation. The concept of cross-layer QoS-aware multicasting is investigated both in simulation and with a test-bed demonstration. We first provide a simulation-based comparative analysis between shortest distance and minimum hop routing algorithms using the NSF network. We then experimentally demonstrate the OPS fabric within one NSF node, validating the error-free operation of cross-layer QoS-based multicasting with bit-error rates (BERs) less than 10-12 and a power penalty of 2 dB. Simulation ValidationThe proposed OCL algorithms for QoS-aware packet multicasting are first investigated in simulation. One-way signaling is used to reduce the end-to-end packet transmission latency. The 14-node NSF network topology (Fig. 2) is Fig. 1: Cross-layer-optimized stack, indicating thebidirectional information flow between the application(top), network and routing (middle), and optical layers (bottom) enhanced to provide QoS guarantees.ECOC 2010, 19-23 September, 2010, Torino, Italy Th.9.A.5 978-1-4244-8534-5/10/$26.00 ©2010 IEEEnumerically simulated using a global control plane to track each node’s QoS performance. A centralized routing and wavelength assignment(RWA) scheme is realized. Packets areassumed wavelength-striped, using tenwavelength channels each at 10 Gb/s.Packets are simulated as discrete events 3. The packets follow a Poisson arrival rate and depart with exponential service times. Upon an arrival event, each packet is assigned to a request and then routed based on a minimum distance routing (MDR) or a minimum hop routing (MHR) algorithm. The necessary QoS parameters are retrieved from the application layer. Optical packets reaching the destination ensure that the threshold requirements imposed by the application layer are met 8. The QoS is embedded in the control signal and is updated as the packet propagates through the network. The QoS parameters consist of its BER, latency, priority, and the reliability of the link. At each node, the QoS of the routed packet is computed online and compared with the threshold requirement of the application. If the QoS parameters are violated, the packet is dropped or rerouted on an alternate path if available. Multicasting is initiated as required.An intelligent, efficient control plane acts as a middleware between the application and optical layers 8. Based on the control plane decision, the optical packet is routed on the link.Using the parameters in Tab. 1, the BER is estimated based on the optical-signal-to-noise-ratio (OSNR). Since the BER is a nonlinear function, we compute the link’s noise factor. The overall noise factor of the lightpath is computed as a product of the individual noise factors of the links 8. The overall latency of the packet is the sum of the individual latencies of the links. The reliability of the switch is based on the downtime and path restoration time. The priority parameter enables possible packet routing on alternate network paths.The performance of the proposed QoS-aware cross-layer multicasting is simulated using the NSF network with the distances scaled down by a factor of ten, due to the lack ofregenerators at the node’s switching fabrics. InFig. 3, we compare the performance of the NSFtopology in terms of packet loss, averagelatency of the packet, hop count, and execution time for the routing algorithm. The x-axis for all the plots in Fig. 3 is the offered network load in Erlang, defined as the ratio of the arrival rate to the departure rate. In Fig. 3(a), we observe that MHR offers lower loss compared to MDR at low network loads. This indicates that packets routed based on hopcount show a higher probability of successfully guaranteeing the QoS imposed by the application layer. The average latency (Fig. 3(b)) of MHR is higher than MDR; this may not be problematic if the latency threshold is still satisfied. Thus, the routing layer can adopt ahop-routing at lower network loads. As the load increases, the packet loss for both algorithms converges (Fig. 3(a)). In order to optimize performance, the application layer can instruct the routing layer to switch to distance routing at higher network loads. Thus, cross-layer communication helps to achieve design trade-offs and provide the necessary QoS. We also compare the average hop count for the two routing methods. It is evident that the hop countfor the MHR is lower than MDR (Fig. 3(c)). A decrease at higher loads indicates that providing QoS for optical packets that traverse longer hops is more problematic. Fig. 3(d) shows the execution time (in hours) required for the simulations using a 2.33-GHz Quad Core Xeon processor with Hyper-Threading and 8-GB RAM.Fig. 2: NSF topology with bidirectional links between thenodes, each carrying 10×10-Gb/s packets.Tab. 1: Simulation Parameters. Parameter Value Number of Packets 106BER 10-9Latency 1 msInput Optical Power -10 dBmInline Amplifier Gain 14 dBSwitch Crosstalk Ratio 25 dBStarting Wavelength 1537.4 nmWavelength Spacing 2.8 nmFig. 3:Performance of the scaled NSF network.Experimental DemonstrationThe QoS-based broadband packet multicasting operation is experimentally demonstrated on a multicast-capable OPS fabric test-bed 7 (Fig.4). The fabric test-bed represents the optical switching fabric deployed within one node of the NSF network. The multistage test-bed is implemented with 2×2 photonic switches, which use semiconductor optical amplifiers (SOAs). Wavelength-striped packets are supported, with control information (e.g. frame, address, QoS) encoded on a subset of wavelengths and the payload segmented and modulated at a high data rate (e.g. 10 Gb/s) on the rest of the band. The 2×2 switches detect the control information at the packet’s rising edge using filters and receivers. The packet’s header bits are processed electronically at each stage. The routing control logic gates the correct SOAs to provide the desired routing. No optical buffers are used. The multicast-capable fabric 7 is realized with a multistage design, using differing packet routing (PR) and packet multicasting (PM) stages. The stages have distinct control logic that depends on the recovered header bits. An SOA-based receiver is realized 4 whereby the real-time performance of optical packets can be monitored. Switching is triggered on the per-packet QoS and signal degradation (here, BER). Low-QoS/high-BER packets are detected by the cross-layer receiver and rerouted on an alternate path. The pseudo-BER signal is generated offline in place of an OPM, though a real-time packet OSNR monitor may be used 2. The QoS-aware packet multicasting is validated on the 4×4 optical fabric test-bed with two PR and three PM stages. The 10×10-Gb/s wavelength-striped packets are 120-ns long, analogous to the Ethernet MTU. The 1500-B packets are modulated by a LiNbO 3 modulator with 27-1 PRBS; the payload wavelengths range from 1537.4 to 1564.0 nm. Fig. 5 depicts the pattern of optical packets injected in the multicast-capable fabric with two QoS levels (high/low priority). The QoS and packet signal quality are assessed and a real-time decision is made to forward or reroute the message on aprotection path. At the output, we verify that error-free QoS-based packet multicasting is achieved. BERs<10-12 are obtained on all ten payload wavelengths. BER curves for the system show a 2-dB power penalty (Fig. 6). ConclusionsFuture networks will require a QoS-aware cross-layer protocol stack. This work confirms that broadband packet multicasting can be realized accounting for physical-layer access in a cross-layer-optimized approach. Numerical results and a demonstration on a fabric test-bed show that packet multicasting can be performed based on QoS and signal degradation. This exploration leverages an OCL-optimized platform and novel optical technologies to achieve performance gains for next-generation networks.We acknowledge support from the CIAN NSF ERC (subaward Y503160); BBN, GENI Project Office (agreement 1631); and the NSF SOON project (grant CNS-0626798).References1 CIAN, 2 i et al., Proc. OFC’10, OTuM2 (2010).3 F.Fidler et al., Proc. ECOC’09, 2.5.2 (2009).4 i et al., Proc. ECOC’09, 2.5.3 (2009).5 S.Azodolmolky et al., Proc. ONDM’09 (2009).6 E.W.M.Wong et al., JLT 27 (14) (2009). 7 i et al., Proc. OFC’10, OWI4 (2010).8 B.G.Bathula et al., TON 18 (1) (2010).Fig. 4: Experimentally implemented multicast-capablefabric architecture and test-bed photograph.Fig. 6: Sensitivity curves with insets of the 10-Gb/s eyediagrams (input: left, output: right).Fig. 5: Optical waveforms corresponding to the QoS-aware packet multicasting operation.。
电信英文缩写
物联网在安全和隐私方面的新挑战
英文文献Internet of Things–New security and privacy challengesRolf H. WeberUniversity of Zurich, Zurich, Switzerland, and University of Hong Kong, Hong KongabstractThe Internet of Things,an emerging global Internet-based technical architecture facilitating the exchange of goods and services in global supply chain networks has an impact on the security and privacy of the involved stakeholders. Measures ensuring the architecture’s resilience to attacks, data authentication, access control and client privacy need to be established. An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable. The contents of the respective legislation must encompass the right to information, provisions prohibiting or restricting the use of mechanisms of the Internet of Things, rules on IT-security-legislation, provisions supporting the use of mechanisms of the Internet of Things and the establishment of a task force doing research on the legal challenges of the IoT.a 2010 Prof Rolf H. Weber. Published by Elsevier Ltd. All rights reserved. Keywords:Data protection,Internet of Things,Privacy,RFID,Security1. Internet of Things: notion and technical backgroundThe Internet of Things (IoT) is an emerging global Internet-based information architecture facilitating the exchange of goods and services in global supply chain networks.1Forexample, the lack of certain goods would automatically be reported to the provider which in turn immediately causes electronic or physical delivery. From a technical point of view,the architecture is based on data communication tools,primarily RFID-tagged items (Radio-Frequency Identification).The IoT has the purpose of providing an IT-infra-structure facilitating the exchanges of ‘‘things’’ in a secure and reliable manner.The most popular industry proposal for the new IT-infra-structure of the IoT is based on an Electronic Product Code(EPC), introduced by EPC global and GS1.The ‘‘things’’ are physical objects carrying RFID tags with a unique EPC; the infrastructure can offer and query EPC Information Services(EPCIS) both locally and remotely to subscribers.The information is not fully saved on an RFID tag, but asupply of the information by distributed servers on the Internet is made available through linking and cross-linking with the help of an Object Naming Service (ONS).The ONS is authoritative (linking meta data and services) in the sense that the entity having – centralized – change control over the information about the EPC is the same entity that assigned the EPC to the concerned item.8Thereby, the architecture can also serve as backbone for ubiquitous computing,enabling smart environments to recognize and identify objects, and receive information from the Internet to facilitate their adaptive functionality.The central ONS root is operated by the (private) company VeriSign, a provider of Internet infrastructure services.The ONS is based on the well-known Domain Name System (DNS). Technically, in order to use the DNS to find information about an item, the item’s EPC must be converted into a format that the DNS can understand, which is the typical, ‘‘dot’’ delimited, left to right form of all domain names.Since EPC is encoded into syntactically correct domain name and then used within the existing DNS infra-structure, the ONS can be considered as subset of the DNS. For this reason, however, the ONS will also inherit all of the well-documented DNS weaknesses, such as the limited redundancy in practical implementations and the creation of single points of failure.2. Security and privacy needs2.1. Requirements related to IoT technologyThe described technical architecture of the IoT has an impact on the security and privacy of the involved stakeholders.Privacy includes the concealment of personal information aswell as the ability to control what happens with this information.12The right to privacy can be considered as either a basic and inalienable human right, or as a personal right or possession.The attribution of tags to objects may not be known tousers, and there may not be an acoustic or visual signal to draw the attention of the object’s user. There by, individuals can be followed without them even knowing about it and would leave their data or at least traces thereof in cyberspace.Further aggravating the problem, it is not anymore only the state that is interested in collecting the respective data, but also private actors such as marketing enterprises.15Since business processes are concerned, a high degree of reliability is needed. In the literature, the following security and privacy requirements are described:Resilience to attacks: The system has to avoid single points of failure and should adjust itself to node failures.Data authentication: As a principle, retrieved address and object information must be authenticated.Access control: Information providers must be able to implement access control on the data provided.Client privacy: Measures need to be taken that only the information provider is able to infer from observing the use of the lookup system related to a specific customer; at least,inference should be very hard to conduct.Private enterprises using IoT technology will have to include these requirements into their risk management concept governing the business activities in general.2.2. Privacy enhancing technologies (PET)The fulfilment of customer privacy requirements is quite difficult. A number of technologies have been developed in order to achieve information privacy goals. These Privacy Enhancing Technologies (PET) can be described in short as follows: Virtual Private Networks (VPN) are extranets established by close groups of business partners. As only partners have access, they promise to be confidential and have integrity.However, this solution does not allow for a dynamic global information exchange and is impractical with regard to third parties beyond the borders of the extranet.Transport Layer Security (TLS), based on an appropriate global trust structure, could also improve confidentiality and integrity of the IoT. However, as each ONS delegation step requires a new TLS connection, the search of information would be negatively affected by many additional layers.DNS Security Extensions (DNSSEC) make use of public-key cryptography to sign resource records in order to guarantee origin authenticity and integrity of delivered information.However, DNSSEC could only assure global ONS information authenticity if the entire Internet community adopts it.Onion Routing encrypts and mixes Internet traffic from many different sources, i.e. data is wrapped into multiple encryption layers, using the public keys of the onion routers on the transmission path. This process would impede matching a particular Internet Protocol packet to a particular source. However, onion routing increases waiting times and thereby results in performance issues.Private Information Retrieval (PIR) systems conceal which customer is interested inwhich information, once the EPCIS have been located. However, problems of scalability and key management, as well as performance issues would arise in a globally accessible system such as the ONS, which makes this method impractical.A further method to increase security and privacy are Peer-to-Peer (P2P) systems, which generally show good scalability and performance in the applications. These P2P systems could be based on Distributed Hash Tables (DHT). Access control,however, must be implemented at the actual EPCIS itself, not on the data stored in the DHT, as there is no encryption offered by any of these two designs.20Insofar, the assumption is reasonable that encryption of the EPCIS connection and authentication of the customer could be implemented without major difficulties, using common Internet and web service security frameworks.In particular, the authentication of the customer can be done by issuing shared secrets or using public-key cryptography.It is important that an RFID tag having been attached to an object can – at a later stage – be disabled in order to allow for customers to decide whether they want to make use of the tag.RFID tags may either be disabled by putting them in a protective mesh of foil known a s a ‘‘Faraday Cage’’ which is impenetrable by radio signals of certain frequencies or by‘‘killing’’ them,i.e.removing and destroying them.However,both options have certain disadvantages. While putting tags in a special cage is relatively safe, it requires that every tag from every single product is put in that cage if a customer desires so. Chances are that certain tags will be overlooked and left with the client and that he/she could still be traced.Sending a ‘‘kill’’ command to a tag leaves room to the po ssibility of reactivation or that some identifying information could be left on the tag. Furthermore, businesses may be inclined to offer clients incentives for not destroying tags or secretly give them tags.Instead of killing tags, the dissolution of the connection between the tag and the identifiable object could be envisaged. The information on ONS is deleted to protect the privacy of the owner of the tagged object. While the tag can still be read, further information with potential information concerning the respective person, however, are not retrievable.Moreover, transparency is also needed for non-personally identifiable information retrieved by RFID. An active RFID can for example trace movements of visitors of an event real time without identifying the persons as such who remain anonymous; nevertheless, the question remains whether such information not coveredby traditional privacy laws might be collected without any restriction.2.3. Legal course of actionThe European Commission is aware of the security and privacy issues related to the RFID and the IoT. In a Recommendation of May 12, 2009 on the implementation of privacy and data protection principles in applications supported by radio-frequency identification27the European Commission invites the Member States to provide for guidance on the design and operation of RFID applications in a lawful, ethical and socially and politically acceptable way, respecting the right to privacy and ensuring protection of personal data (No.1). In particular, the Recommendation outlines measures to betaken for the deployment of RFID application to ensure that national legislation is complying with the EU Data Protection Directives 95/46, 99/5 and 2002/58 (No. 2). Member States should ensure that industry in collaboration with relevant civil society stakeholders develops a framework for privacy and data protection impact assessments (PIA; No. 4); this framework should be submitted to the Article 29 Data Protection Working Party within 12 months. Industry and civil society stakeholders are in the process of establishing the requested framework PIA until late 2009. The objectives of the PIA are designed to identify the implications of the application on privacy and data protection, to determine whether the operator has taken appropriate technical and organizational measures to ensure respective protection, to document the measures implemented with respect to the appropriate protection, and to serve as a basis for a PIA report that can be submitted to the competent authorities before deployment of the application. Presumably, the framework should serve to determine a common structure and content of reports. In particular, RFID application description and scope, RFID application governing practices, accountability and analysis and resolution seem to be of importance. Furthermore, operators are asked to conduct an assessment of the implications of the application implementation for the protection of personal data and privacy and take appropriate technical and organizational measures to ensure the protection of personal data and privacy (No. 5), and a person within a business needs to be designated for the review of the assessments and the continued appropriateness of the technical and organizational measures. In addition, Member States are invited to support the EU Commission in identifying those applications that might raise information security threats with implications for the general public (No. 6). Additional provisions of the Recommendation concern the information and transparency on RFID use, the RFIDapplications used in the retail trade, the awareness raising actions, research and development as well as follow-up actions (Nos. 7–18).In its specific Communication to the European Parliament,the Council, the European Economic and Social Committee and the Committee of the Regions on the Internet of Things(an Action Plan for Europe), the EU Commission again points to the importance of security and privacy in the IoT frame-work.The particular Line of Action 2 encompasses the continuous monitoring of the privacy and the protection of personal data questions; as part of Line of Action 3 the EU Commission is envisaging to launch a debate on the technical and the legal aspects of the ‘‘right to silence of the chips’’ and expresses t he idea that individuals should be able to disconnect from their networked environment at any time.estones of an adequate legal frameworkThe implementation of the IoT architecture and the use of RFID pose a number of legal challenges; the basic questions of the agenda can be phrased as follows: Is there a need for (international or national) state law or are market regulations of the concerned businesses sufficient?If legislation is envisaged: Would existing/traditional legislation be sufficient or is there a need for new laws?If new laws are to be released: Which kind of laws are required and what is the time frame for their implementation?These legal challenges need to be embedded into the human rights and constitutional framework. Insofar, the decision of the German Supreme Court of 27 February 2008 constituting an independent fundamental right of confidentiality and integrity related to info-technical systems merits attention.3.1. Systematic approachThe establishment and implementation of an appropriate legal framework31calls for a systematic approach in relation to the legislative process. Thereby, the following aspects should be taken into account:Facts about RFID using scenarios are to be systematically developed; only under the condition that the facts are sufficiently known, adequate legal provisions can be drafted.A systematization of the legal problems potentially occur-ring can be done by coordination along the below discussed four technical axes, namely globality,verticality, ubiquity and technicity.The legal challenges of security and privacy issues related to the IoT and RFID are to be qualitatively classified.In particular, the question must be addressed how much privacy the civil society is prepared to surrender in order to increase security. Solutions should be looked for allowing considering privacy and security not as opposites, but as principles affecting each other.In light of the manifold factual scenarios, it appears to be hardly possible to come to a homogenous legal framework governing all facets of the IoT and RFID. Moreover, a heterogeneous and differentiated approach will have to be taken into account. Thereby, the technical environment can be crystallized along the four axes, representing the most important challenges to the establishment of regulation: Globality is based on the fact that goods and services in the IoT context will be globally marketed and distributed. The RFID technology is also ‘‘global’’ in the sense that the same technical processes are applied all over the world. Consequently, business and trade would be heavily complicated if differing national laws would be in place. If the RFID-tagged products are available on a global level, the legal systems need to be synchronized.Verticality means the potential durability of the technical environment. In particular, it is important for the life of the IoT that RFID-tagged products are lasting long enough to not only use them in the supply chain until the final customer, but also for example in the waste management. For the time being,this requirement is not sufficiently met in the EPC traffic.Ubiquity refers to the extent of the RFID-tagged environment; technically, RFID could indeed be used ubiquitously encompassing persons, things, plants, and animals.Technicity is an important basis for the development of rules protecting privacy objectives. Several differentiations can be taken into account, namely (i) the complexity of the tag(active and passive, rewritable, processing and sensor provided products), (ii) the complexity of background devices (reader or other linked media) and the maximum reading range which is particularly designed to cover transparency demands.These four requirements have to be taken into account when establishing a legal framework binding all participants of the IoT. Resulting from these four requirements, the framework to be established has to be global, i.e. Established by an internationallegislator, and applicable to every object on earth from its becoming until its destruction. The ubiquity needs to be addressed in particular if various objects are put together to form a new ‘‘thing’’.This new ‘‘thing’’ can either be attributed with a new tag, or the creation can carry multiple tags. While the first scenario is more practical, this solution may leave businesses with the problem that individual parts cannot be traced back to their origin.A solution may be that the one tag attached to the object makes reference to the different sources of all individual parts. A global consensus needs to be found, which is then generally applied. The question raised is also connected to the fourth requirement, technicity. If composed objects keep all the tags of integrated parts, tracing all relevant information concerning that object becomes extremely complex and difficult. As this discussion demonstrates,determining an appropriate legal framework raises various technical questions. Therefore, the inclusion of technical experts in the process-making seems inevitable. Furthermore,the discussion also shows that the framework needs to be established at an international level and address all fundamental issues. Otherwise, the IoT becomes impractical and cannot be used efficiently.The following conclusion for a potential legislation can be drawn from the mentioned systematic approach: A unique strategy will not be suitable to satisfactorily cope with the privacy challenges of the IoT. Inevitably, legislators have to make good use of several of them. In particular, due consideration of technicity seems to be of major importance.Furthermore, data protection and privacy need communication strategies establishing an effective platform for dialogue between state legislators, non-governmental organizations,public interest groups and the international private sector.3.2. State law or self-regulationThe establishment of an adequate legal framework for the protection of security and privacy in the IoT is a phenomenon giving rise to the question of the appropriate legal source.Various regulatory models are available in theory: Apart from the possibility of no regulation at all, which cannot be considered as a real ‘‘solution’’, the choice is principally between traditional national regulation, international agreements and self-regulation.As mentioned, national regulation has the disadvantage of not meeting the globalization needs of an adequate legal framework in view of the fact that transactions through the IoT are usually of a cross-border nature.(i) So far, the regulatory model in the IoT is based on self-regulation through manifold business standards, starting from technical guidelines and leading to fair information practices. In particular, the EPC-Guidelines rely on components like ‘‘Consumer Notice’’, ‘‘Consumer Education’’ and ‘‘Retention and IT-Security Policy’’.Consequently, the compliance with the EPC-Guidelines is driven by a self-control strategy.This self-regulatory model follows the well-known principle of subsidiarity,meaning that the participants of a specific community try to find suitable solutions (structures, behaviors) them-selves as long as government intervention has not taken place.The legitimacy of self-regulation is based on the fact that private incentives lead to a need-driven rule-setting process. Furthermore, self-regulation is less costly and more flexible than State law.In principle, self-regulation is justified if it is more efficient than state law and if compliance with rules of the community is less likely than compliance with self-regulation.The theoretical approaches to the self-regulatory model show a multifaceted picture: In many cases, self-regulation is not more than a concept of a private group, namely a concept occurring within a framework that is set by the government (directed self-regulation or audited self-regulation). This approach has gained importance during the last decade: if the government provides for a general framework which can be substantiated by the private sector often the term ‘‘co-regulation’’ is used. The state legislator does not only set the legal yardsticks or some general pillars of the legal framework, but eventually the government remains involved in the self-regulatory initiatives at least in a monitoring function supervising the progress and the effectiveness of the initiatives in meeting the perceived objectives.In this context, the legal doctrine has developed the notion‘‘soft law’’ for private commitments expressing more than just policy statements, but less than law in its strict sense, also possessing a certain proximity to law and a certain legal relevance.Nevertheless, the term ‘‘soft law’’ does not yet have a clear scope or reliable content. Particularly in respect to the enforceability of rules, law is either in force (‘‘hard law’’) or not in force (‘‘no law’’), meaning that it is difficult to distinguish between various degrees of legal force. Generally, it can only be said that soft law is a social notion close to law and that it usually covers certain forms of expected and acceptable.codes of conduct.This concept of self-regulation cannot overcome the lack of an enforcement strategy if compliance is not done voluntarily.Therefore, theinvolvement of the legislator seems to be inevitable.While self-regulation has gained importance during the last years, there are still critics thereof, pointing out that self-regulatory mechanisms only regulate those motivated or principled enough to take part in them as market pressure is not yet strong enough to oblige everyone to adopt the respective rules. Furthermore, it is argued that self-regulation is only adopted by stakeholders to satisfy their own interests and is therefore not effective in the protection of privacy.(ii) Therefore, even if the manifold merits of self-regulation are to be honoured, some pillars of the legal framework in the context of security and privacy need to be set by the legislator. Such law would have to be introduced on an international level. Contemporary theories addressing international law aspects tend to acknowledge a wide definition of international law, according to which this field is no longer limited merely to relations between nation states but generally accepts the increasing role of other international players such as individual human beings, international organizations and juridical entities.Since customary rules can hardly develop in a fast moving field such as the IoT, the main legal source is to beseen in the general principles of law, such as good will,equal treatment, fairness in business activities, legal validity of agreements etc.These general principles can be illustrated as ‘‘abstractions form a mass of rules’’which have been ‘‘so long and so generally accepted as tobe no longer directly connected with state practice’’.To some extent, basic legal principles are considered to be an expression of ‘‘natural law’’; practically, general legal principles may be so fundamental that they can be found in virtually every legal system.The specific problem in view of security and privacy,however, consists in the appreciation that privacy concerns are not identical in the different regions of the world which makes the application of general principles difficult in cross-border business activities. Therefore, a basic legal framework should be introduced by an international legislator; however,the details of the legal rules for the protection of security and privacy needs are to be developed by the private sector.The IoT being a new system itself, the idea of entrusting a body with its legislation and governing that is new, too, is not far-fetched. A new body would be in the position to take into account all the characteristics of the IoT. Furthermore,considering the complexity of the IoT, this body could be construed in a way to dispose of the necessary capacities.The alternative to the creation of a newbody is to integrate the task of international legislator for the IoT in an existing organization. Bearing in mind the globality of the IoT, this organization has to have a certain scope of territorial application. Furthermore, the organization should have a structure that allows for the inclusion of a body only responsible for the IoT. Finally, legislation and governing of the IoT should be encompassed by the overhead responsibilities of the organization to be appointed. When considering these requirements, the World Trade Organization(WTO) and the Organization for Economic Co-Operation and Development (OECD) come to mind. A special Committee responsible for rule-setting and supervision in the IoT could be established as an answer to the question of an international legislator. This Committee would be made up of representatives of WTO or OECD member States, thereby assuring an international approach. The Committee could,after deliberations, issue formal agreements, standards and models, recommendations or guidelines on various issues of the IoT.This evaluation coincides with the experiences made in the field of Internet governance in general. An internationally binding agreement covering privacy and data protection does not yet exist. Even if international human rights instruments usually embody the essence of privacy, at least to a certain extent, the protection cannot be considered as being sufficient; only ‘‘extreme’’ warranties are legally guaranteed, such as the respect for private life or the avoidance of exposure to arbitrary or unlawful interference.Therefore, it is widely accepted that co-regulation is needed to secure the implementation of effective principles of privacy in the online world. Possible elements of a self-regulatory scheme may include codes of conduct containing rules for best practices worked out in accordance with substantive data protection principles, the establishment of internal control procedures(compliance rules), the setting-up of hotlines to handle complaints from the public, and transparent data protection policies.Many international instruments, such as the Guidelines of the OECD and Art. 27 of the EC Directive on the Protection of Personal Data (1995),mention self-regulation as an appropriate tool.Nevertheless, security and the protection of privacy is nota matter to be addressed exclusively by a legislator. Research and development in the field of information technology should also consider ethical consequences of new inventions.3.3. Legal categories and scenariosFuture legislation encompassing privacy and data protection issues of the IoT。
华为USG6000V虚拟服务网关数据手册说明书
Gateway DatasheetHuawei Technologies Co., Ltd.Copyright © Huawei Technologies Co., Ltd. 2018. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.Trademarks and Permissionsand other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders.NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied.The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.Huawei Technologies Co., Ltd.Address: Huawei Industrial BaseBantian, LonggangShenzhen 518129People's Republic of ChinaWebsite: Email: ******************With wide application of cloud computing technology, IT and CT are rapidly converged. Consequently, requirements for public and private cloud deployment, quick service provisioning, on-demand service migration, and tailored attack defense increase sharply. Conventional service gateways with dedicated hardware can hardly meet the deployment requirements of the cloud network architecture.Huawei USG6000V is a virtual (software-based) service gateway based on the network functions virtualization (NFV). It features high virtual resource usage because the virtualization technology allows a large number of tenants to concurrently use the resources. In addition, the USG6000V provides abundant virtualized gateway services, such as vFW, vIPsec, vLB, vIPS, vA V, and vURL Remote Query. It can be flexibly deployed to meet service requirements.Huawei USG6000V series virtual service gateway is compatible with most of mainstream virtual platforms. It provides standard application platform interfaces (APIs), together with the OpenStack cloud platform, SDN Controller, and MANO to achieve intelligent solutions for cloud security. It meets the requirements of flexible service customization, elastic and on-demand resource allocation, visualized network management, rapid rollout and frequent changes of security service, and simple and efficient O&M.HighlightsIntegrated functions and fine-grained managementThe USG6000V provides multiple functions, including security protection to data centers at the virtualization layer and value-added security services for tenants.●Multi-purpose: The USG6000V integrates the traditional firewall, VPN, intrusionprevention, antivirus, data leak prevention, bandwidth management, and online behaviormanagement functions all in one device, simplifying device deployment and improvingmanagement efficiency.●IPS: The USG6000V can detect and defend against over 5000 vulnerabilities. It canidentify and defend against web application attacks, such as cross-site scripting and SQLinjection attacks.●Antivirus: The high-performance antivirus engine of the USG6000V can defend againstover five million viruses and Trojan horse. The virus signature database is updated daily.●Anti-DDoS: The USG6000V can identify and defend against over 5 million viruses andover 10 types of DDoS attacks, such as SYN flood and UDP flood attacks.●Online behavior management: The USG6000V implements cloud-based URL categoryfiltering to prevent threats caused by users' access to malicious websites and control users'online behavior, such as posting. The USG6000V has a predefined URL category databasethat contains over 120 million URLs. In addition, the USG6000V audits users' networkaccess records, such as posting and FTP operations.●Secure interconnection: The USG6000V supports various VPN features, such as IPsec,SSL, L2TP, MPLS, and GRE VPN to ensure high-availability and secure interconnectionbetween enterprise headquarters and branch offices.●QoS management: The USG6000V flexibly controls upper and lower traffic thresholds andimplements policy-based routing and QoS marking by application. It supports QoSmarking for URL categories. For example, the packets for accessing financial websites areassigned a higher priority.●Load balancing: The USG6000V supports server load balancing. In a multi-egress scenario,the USG6000V can implement load balancing with the egresses for applications accordingto link quality, bandwidth, and weights.Flexible deployments of services achieved by elastic and on-demand principlesVirtualization: The USG6000V supports the virtualization of many security services, such as firewall, intrusion prevention, antivirus, and VPN. Users can separately conduct personal managements on the same physical device. The USG6000V8 can be divided to 500 virtual systems to achieve one-to-many virtualization. It requires less investment from small-scale tenants by providing fine-grained service resources.Automation: It supports such plug-ins as NETCONF and OpenStack, and connects to Agile Controller or Openstack cloud platform through standard interfaces. With one-click configuration and delivery of network parameters on the portal, it spares users the nuisances of configuring complicated commands of specific network devices.It achieves seamless orchestration among computing, storage, and network by providing faster deployment of network resources. Network services roll out within minutes with manual configuration being reduced by 90%.Service provisioning process of Huawei DCN security solutionIntegrated management and visualized O&M●Security policy management: Users configure security service rules based on security groups.The Agile Controller generates and automatically delivers security policies.●Visualized O&M: It provides topology visibility for network-wide virtual and physicalresources to quickly locate network fails. It also provides visualized network management based on tenants to meet compliance requirements of visualized network topology, quota, traffic, and alarms.Visualized Agile Controller management of Huawei DCN security solutionBuilding an ecosystem available to be integrated widelyBy adopting standard APIs, it achieves zero transportation and zero cable layouts in the deployment of data centers. With this effortless deployment experience, it accelerates service deployments and supports migration among multiple virtual platforms. It provides automatic service scheduling and other functions by supporting comprehensive northbound interface protocols to realize wide connection to various kinds of standard controllers.●Various virtualization platforms: Supports mainstream virtualization platforms, such asthe VMware, KVM, XEN, Hyper-V, and Huawei FusionSphere, as well as inst allation of bare machine.●Multiple file formats: Supports software packages in multiple formats(including .vmdk, .iso, .qcow2, and .ovf) for deployment in various environments.●API friendliness:Supports the management using NETCONF and RESTCONF NBIsand the OpenStack platform for NFV interconnection.●Solutions: Supports solutions of Huawei DCN.●Public cloud platform: Supports public cloud platforms of AWS, Azure and Huawei. Typical Application ScenarioHuawei DCN security solutionTenants subscribe to value-added services on the service portal; MANO deploys the USG6000V; the Agile Controller predefines the network and delivers security policies based on Layer 4 through 7. All of the procedures for rolling out the services are automated. The USG6000V deployed on the border of the VPC of tenants provides such services as remote access, value-added security, and load balancing. It protects the north-south traffic among tenants from threat transmissions emanated from the data center.The USG6000V supports as many as 500 virtual systems. It provides fine-grained security resources based on virtual systems to small-scale tenants, greatly lowering the threshold for investment.Specifications1. VM resources refer to resources provided by deployed VMs, including vCPUs, memory, hard disks, and virtual interfaces.2. The vCPU indicates the logical CPU virtualized by the Intel x86 64-bit CPU that supports VT. One core corresponds to two vCPUs.3. All performance indicators are tested under the specified hardware environment, namely, RH2288, V3, X86 series-3200MHz-1.8V-64bit-135000mW-Haswell EP Xeon E5-2667 v3-8Core-with heatsink.4. In SR-IOV mode, the SR-IOV technology is used, and the test environment is the KVM platform. In vSwitch mode, the USG6000V is connected to the vSwitch, and the test environment is the VMware platform.5. The maximum throughput is obtained by testing 1518-byte or 1420-byte packets in ideal conditions. The specifications may vary depending on live network environments.6. The maximum throughput is obtained by testing 64-byte packets in ideal conditions. The specifications may vary depending on live network environmentsOrdering Guide2018-11-3Huawei Confidential Page11 of 11About the PublicationThe publication is for reference only and does not constitute a warranty of any kind, express or implied. All trademarks, pictures, logos, and brands in this publication are the property of Huawei Technologies Co., Ltd. or an authorized third party.Copyright © Huawei Technologies Co., Ltd. 2017. All rights reserved.。
Mellanox SN4000系列云数据中心交换机说明书
SN4000 SeriesIdeal Data Center Switches for Cloud, Ethernet Storage Fabrics, and Machine Learning Solutions††For illustration only. Actual products may vary.Based on Mellanox Spectrum ®-3 ASIC, the SN4000 series switches support industry-leading features and performance at speeds 1GbE through 400GbE.SWITCH SYSTEMFeatures without Compromise•Advanced Network Virtualization with high performancesingle pass VXLAN routing and IPv6 segment routing • Comprehensive Layer-2, Layer-3 and RoCE•Programmable Pipeline with the ability to programmatically parse, process and edit packets • Deep Packet Inspection - 512B Deep •Cloud Scale NAT – 100K+ sessionsPerformance without Compromise•Fully shared packet buffer provides fair, predictable andhigh-performance data path - essential for scale out software defined storage and modern multi-tenant cloud deployments •Robust RoCE transport to power NVMe over fabric and Machine Learning applications that leverage GPUdirect • Consistent and low cut-through latency•Intelligent hardware-accelerated data transport and load balancing such as adaptive routing, ECN and PFCScale without Compromise•Best in class VXLAN scale with 10X more tunnels and tunnel endpoints than other solutions • Up to 1M IPv4 route entries•512K shared forwarding entries that can be flexibly shared across ACL, LPM routes, Host routes, MAC, ECMP and Tunnel applicationsVisibility without Compromise•Reduced Mean Time to Recovery/Innocence.- Detailed and contextual telemetry with What Just Happened (WJH) - Instant answers to issues: When, What, Who, Where and Why •Hardware-accelerated histograms track and summarize queue depths at sub-microsecond granularity, avoiding false-alerts common to simple watermarks/thresholds • Inband Network Telemetry (INT)-ready hardware • Streaming Telemetry•512K on-chip flow countersSN4000 SWITCHES - BUILD YOUR CLOUD NETWORK WITHOUT COMPROMISEHARDWAREOS InstallerAPPLICATIONSOPERATING SYSTEMSLinux SwitchFigure 1. Open Ethernet Operating System and HardwareNETWORK DISAGGREGATION: OPEN ETHERNETOpen Ethernet breaks the paradigm of traditional switch systems,eliminating vendor lock-in. Instead of forcing network operators to use the specific software that is provided by the switch vendor, Open Ethernet offers the flexibility to use a choice of operating systems on top of Ethernet switches, thereby re-gaining control of the network, and optimizing utilization, efficiency and overall return on investment. Open Ethernet adopts the same principles as standard open solutions for servers and storage, and applies them to the world of networking infrastructure. It encourages an ecosystem of open source, standard network solutions. These solutions can then be easily deployed into the modern data center across network equipment that eases management and ensures full interoperability.With a range of system form factors, and a rich software ecosystem, SN4000 series allows you to pick and choose the right components for your data center.SN4000 PLATFORMSMellanox SN4000 series platforms are based on the high-performance Mellanox Spectrum-3 ASIC with a switching capacity of 12.8 Tb/s. SN4000 platforms are available in a range of configurations, each delivering high performance combined with feature-rich layer 2 and layer 3 forwarding,ideally suited for both top-of-rack leaf and fixed configuration spines. The Mellanox SN4000 series provides full wire speed, cut through-mode latency, on-chip fully-shared 64MB packet buffering, and flexible port use in addition to advanced capabilities. Combining a wide range of innovations in the area of programmability, telemetry, and tunneling with industry leading performance, Mellanox SN4000 series is capable of addressing today’s data center’s complex networking requirements.OVERVIEWThe SN4000 series switches are the 4th generation of Mellanox Spectrum switches, purpose-built for leaf/spine/super-spine datacenter applications. Allowing maximum flexibility, SN4000 series provides port speeds spanning from 1GbE to 400GbE, and a port density that enables full rack connectivity to any server at any speed. In addition, the uplink ports allow a variety of blocking ratios to suit any application requirement.The SN4000 series is ideal for building wire-speed and cloud-scale layer-2 and layer-3 networks. The SN4000 platforms deliver high performance, consistent low latency along with support for advanced software defined networking features, making it the ideal choice for web scale IT, cloud, hyperconverged storage and data analytics applications.SN4700Mellanox SN4700 spine/super-spine offers 32 ports of 400GbE in a compact 1U form factor. Itenables connectivity to endpoints at varying speeds and carries a throughput of 25.6Tb/s, with alandmark 8.4Bpps processing capacity. As an ideal spine solution, the SN4700 allows maximum flexibility, with port speeds spanning from 1GbE to 400GbE per port.SN4600Mellanox SN4600 is a 2U 64-port 200GbE spine that can also be used as a high density leaf, fully splittable to up to 128 x 10/25/50 GbE ports when used with splitter cables. SN4600 allows for maximum flexibility, with ports spanning from 1GbE to 200GbE and port density that enables full rack connectivity to any server at any speed, and a variety of blocking ratios.SN4800Mellanox SN4800 is a modular switch platform that is well-suited to answer the challenging needs of large virtualized data centers and cloud environments, allowing flexibility and customization with up to 8 line cards and a single management card. Demonstrating a landmark 8.4Bpps processing capacity and up to 25.6Tb/s throughput in a versatile 4U form factor. The SN4800 offers diverse connectivity in combinations of 1/10/25/40/50/100/200/400 GbE. Available line cards include 16x100 GbE (QSFP28), 4x400 GbE (QSFP-DD) and 8x200 GbE (QSFP56).Front panel viewsHIGH AVAILABILITYMellanox SN4000 series switches are designed with the following features for high availability both from a software and hardware perspective:• 1+1 hot-swappable power supplies and N+1 hot-swappable fans • Color coded PSUs and fans• Up to 128x100/50/25/10/1 GbE, 64x200GbE or 32x400GbE • Multi-chassis LAG for active/active L2 multi-pathing • 128-way ECMP routing for load balancing and redundancyPLATFORM SOFTWARE OPTIONSSN4000 series platforms are available out of the factory in three different flavors:• Preinstalled with Mellanox Onyx™, a home-grown operating systemutilizing common networking user experiences and an industry standard CLI. • Preinstalled with Cumulus™ Linux, a revolutionary operating system,taking the Linux user experience from servers to switches and providing a rich routing functionality for large scale applications. • Bare metal including ONIE image, installable with any ONIE-mounted OS. ONIE-based platforms utilize the advantages of Open Networking and the Mellanox Spectrum-3 ASIC capabilities.MELLANOX ONYXMellanox Onyx is a high performance, flexible and cloud-scale switch operating system, designed to meet the demands of next-generation data centers. Whether building a robust storage fabric, cloud, financial or media & entertainment fabric, customers can leverage the flexibility of Mellanox Onyx to tailor their network platform to their environment. With built-in workflow automation, monitoring and visibility tools, enhanced high availability mechanisms, and more, Mellanox Onyx simplifies network processes and workflows, increasing efficiencies and reducing operating expenses and time-to-service.Onyx leverages capabilities of the SN4000 series to provide greater magnitudes of scale, with up to 512K ACLs, state-of-the-art telemetry, enhanced QoS, exceptional programmability that enables a flexible pipeline supporting both new and legacy protocols, a larger fully-shared buffer, and more.DOCKER CONTAINERSMellanox Onyx allows the running of third party containerizedapplications on the switch system itself. The third party application has complete access to the bare-metal switch via its complete access to the SDK. Alternately, the application can use JSON APIs to communicate with the system through the Onyx operating system. Mellanox Onyx support enables the customer to share selected storage spaces between the various containers and Onyx itself.CUMULUS-LINUXCumulus Linux embodies native Linux networking. Supercharged versions of the kernel and other networking-related packages encompass the latest industry thinking in networking while retaining compatibility with the full range of software available in Debian. The SN4000 series running Cumulus Linux provides standard networking functions such as bridging, routing, VLANs, MLAGs, IPv4/IPv6, OSPF/BGP , access control, VRF and VXLAN overlays. Cumulus Linux running on top of the Mellanox SN4000 series is a perfect fit for customers with a need for automated-cloud deployments, Routing on the Host deployments and “infrastructure as code” data centers.ONIEThe Open Network Install Environment (ONIE) is an Open Compute Project open source initiative driven by a community to define an open “install environment” for bare metal network switches, such as the Mellanox SN4000 series. ONIE enables a bare metal network switch ecosystem where end users have a choice of different network operating systems.SONiCMicrosoft open-source switch Operating System for Open Networking in the Cloud (SONiC) is the first solution to break monolithic switch software into multiple containerized components. At its core, SONiC is aimed at cloud networking scenarios, where simplicity and managing at scale are the highest priority. All together with monitoring and diagnostic capabilities, SONiC is a perfect fit for the Mellanox SN4000 series. Among other capabilities, SONiC on SN4000 series enables fine-grained failure recovery and in-service upgrades (ISSU), with zero downtime.LINUX SWITCH and LINUX DENTLinux Switch enables users to natively install and use any standard Linux distribution as the switch operating system, such as DENT, a Linux-based networking OS stack that is suitable for campus and remote networking. Linux Switch is based on a Linux kernel driver model for Ethernetswitches (Switchdev). It breaks the dependency of using vendor-specific, closed-source software development kits. The open-source Linux driver is developed and maintained in the Linux kernel, replacing proprietary APIs with standard Linux kernel interfaces to control the switch hardware. This allows off-the-shelf Linux-based networking applications to operate on Mellanox Spectrum-based switches for L2 switching and L3 routing, including open source routing protocol stacks, such as FRR (Quagga), Bird and XORP , OpenFlow applications, or user-specific implementations.Figure 2. Docker Containers SupportSN4000 SERIES: A RICH SOFTWARE ECOSYSTEMPERFORMANCE WITHOUT COMPROMISE Packet buffer architecture has a major impact on overall switch performance. The Mellanox Spectrum-3 packet buffer is fully shared across all ports, supporting cut-through line rate traffic from all ports, without compromising scale or features. With its fast packet buffer, Mellanox Spectrum-3 is able to provide a high-performance fair and bottleneck-free data path for mission-critical applications. PERVASIVE VISIBILITY FOR SIMPLIFIEDOPERATIONS (WHAT JUST HAPPENED) Mellanox Spectrum-3 provides deep and contextual network visibility, which enables network operators to proactively manage issues and reduce mean time to recovery/innocence. Mellanox Spectrum’s What Just Happened (WJH) feature leverages the underlying silicon and software capability to provide granular and event-triggered information about infrastructure issues. In addition, the rich telemetry information from Mellanox Spectrum-3 is readily available via open APIs that are integratable with third party software tools and work flow engines. FEATURES WITHOUT COMPROMISEFor modern data center infrastructure to be software defined and agile, both its compute and network building blocks need to be agile. Mellanox Spectrum-3 features a unique feature rich and efficient packet processing pipeline that offers rich Data Center Network virtualization features without compromising on performance or scale. Mellanox Spectrum-3 is a programmable pipeline and a deep packet parser/editor that can process payloads up to the first 512B. Mellanox Spectrum-3 supports single pass VXLAN routing as well as bridging. Additionally, Mellanox Spectrum-3 supports advanced virtualization features such as IPv6 segment routing, and Network Address Translation (NAT). SCALE WITHOUT COMPROMISEThe number of endpoints in the data center is increasing exponentially. With the current shift from virtual machine-based architectures to container-based architectures, the high-scale forwarding tables required by modern data centers and mega-clouds increase by up to an order of magnitude or more. To answer these needs for scalability and flexibility, Mellanox Spectrum-3 uses intelligent algorithms and efficient resource sharing, and supports unprecedented forwarding table, counters and policy scale.• Fine-grained resource allocation to fit all specific needs, allowing up to 512K entries to be dynamically shared across MAC, ARP,IPv4/IPv6 routes, ACLs, ECMP, and Tunnels.• An innovative algorithmic TCAM optimized for data centers and cloud environments, which can scale the number of rules to up to half a million rules.MELLANOX SPECTRUM-3: BUILD YOUR CLOUD WITHOUT COMPROMISEEND-TO-END SOLUTIONThe SN4000 series is part of Mellanox’s complete end-to-end solution which provides 1GbE through 400GbE interconnectivity within the data center. Other devices in this solution include ConnectX®-based network interface cards and LinkX® copper or fiber cabling. This end-to-end solution is topped with the Mellanox NEO® management application that relieves some of the major obstacles when deploying a network. NEO enables a fully certified and interoperable design, speeds up time to service and eventually speeds up ROI. The SN4000 series introduces superior hardware capabilities including dynamic flexible shared buffers and predictable wire-speed performance with no packet loss at any packet size. The SN4000 series supports all standard compliances and is fully interoperable with third party systems.MELLANOX ONYX® FEATURE HIGHLIGHTSMulti chassis LAG (MLAG), MLAG with STP support User and management VRFs ZTPIGMPv2/v3, Snooping, Querier IPv4 & IPv6 routing Ansible, Puppet, SaltStackVLAN 802.1Q (4K) BGP, MP-BGP, OSPFv2, route maps FTP / TFTP / SCPQ-In-Q PIM-SSM, PIM-SM AAA , RADIUS / TACACS+ / LDAP802.1W Rapid Spanning Tree BFD JSON & CLI, Web UI• BPDU Filter, Root Guard VRRP, Multi Active Gateway Protocol (MAGP)SNMP v1,2,3• Loop Guard, BPDU Guard DHCPv4/v6 Relay In-band and OOB management802.1s Multiple STP ECMP, 64-way DHCP, SSHv2, TelnetRapid per VLAN STP and PVRST IGMPv2/v3 Snooping Querier SYSLOG802.3ad Link Aggregation (LAG) & LACP Consistent/Resilient Hashing*10/100/1000 Mb/s Ethernet RJ45 mng ports 802.1AB Link Layer Discovery Protocol (LLDP)USBStore & forward / cut-through mode of work Console port for managementHead of Queue LifeTime Limit (HLL)Dual SW imageJumbo Frames (9216 Bytes) Events historyStorm Control Open Network Install Environment (ONIE)Full SDK access through the containerPersistent container & shared storageContainer-secured mode of work:limit CPU, memory and SSD usage*Roadmap feature.Max. 400GbE Ports Up to 32 in full chassis 32---Max. 200GbE Ports Up to 64 in full chassis 6464Max. 100GbE Ports Up to 128 in full chassis 128128Max. 50GbE Ports Up to 128 in full chassis 128128Max. 40GbE Ports Up to 128 in full chassis 6464Max. 25GbE Ports Up to 128 in full chassis 128128Max. 10GbE Ports Up to 128 in full chassis 128128Wire Speed Switching [Bpps]8.4Bpps 8.4Bpps 8.4Bpps CPUMulti-core x86Quad-core x86Quad-core x86System Memory ---16GB 16GB SSD Memory 128GB 64GB 64GB Packet Buffer64MB 64MB 64MB 100/1000Mb/s Mgmt Ports 111Serial Ports 1 RJ45 1 RJ45 1 RJ45USB Ports111Hot-Swap Power Supplies 4 (2+2 redundant) 2 (1+1 redundant) 2 (1+1 redundant)Hot-Swappable Fans 8(N+1 redundant) 6 (N+1 redundant)Contact Mellanox Reversible Airflow Option Yes YesYesPower Supplies ---Frequency: 50-60Hz Input range: 100-264 AC Frequency: 50-60Hz Input range: 100-264 AC Size (H x W x D)--- 1.72’’ x 16.84’’ x 22’’(44mm x 428mm x 559mm)3.46’’ x 16.84’’ x 22’’(88mm x 428mm x 559mm)802.1Qaz ETS RFC 4188 BRIDGE-MIB RFC 3826 SNMP-USM-AES-MIB 802.1Qbb PFCRFC 4133 ENTITY-MIB Mellanox SMI MIB 802.3ad Link Aggregation with LACP RFC 3433 ENTITY-SENSOR-MIB Mellanox IF-VPI-MIB802.3baRFC 4268 ENTITY-STATE-MIB Mellanox enhanced ENTITY-MIB 802.3x Flow Control RFC 2572 SNMP-MPD-MIB Mellanox Power-Cycle-MIB 1000BASE-KXRFC 4293 IP-MIB Mellanox SW-Update-MIB 802.3ae 10 Gigabit EthernetRFC 4022 TCP-MIB Mellanox Config-MIBRFC 4113 UDP-MIB400GbE PAM4 QSFP-DD 400BASE-AOC3m-100m MFA1U60-Wxxx 400GbE to 2 x 200GbE QSFP561m-2m DAC MCP7H60-W0xxxxx 400GbE to 4 x 100GbE QSFP561m-2m DAC MCP7F60-W0xxxxx 400GbE to 4 x 100GbE SFP-DD1m-2m DAC MCP7F65-W0xxxxxx 400GbE to 8 x 50GbE SFP561m-2m DAC MCP7F80-W0xxxxx200GbE PAM4QSFP56200BASE-CR4 copper0.5m-2m LSZH DAC MCP1650-V0xxxxx 200BASE-AOC3m-100m MFS1S00-Vxxxx 200BASE-SR4850nm, MPO, up to 100m MMA1T00-VS 200BASE-FR41310nm, LC-LC, up to 2km MMS1W40-VM 200GbE to 4 x 50GbE SFP561m-3m DAC MCP7H70-V0xxxxx 200GbE to 2 x 100GbE QSFP561m-3m DAC MCP7H50-V0xxxxx 200GbE to 50GbE QSA56 pluggable adapter MAM1Q00A-QSA56100GbE NRZ QSFP28100BASE-CR4 copper0.5m-5m LSZH DAC MCP1600-C0xxxxxx 100BASE-AOC3m-100m MFA1A00-CXXX 100BASE-SR4850nm, MPO, up to 100m MMA1B00-C100D 100BASE-PSM41310nm, MPO, up to 500m MMS1C10-CM 100BASE-LR41310nm, LC-LC, up to 10km MMA1L10-CR100BASE-CWDM41310nm, LC-LC, up to 2km MMA1L30-CM 100GbE to 4 x 25GbE SFP281m-5m DAC MCP7F00-A0xxxxxx 100GbE to 4 x 25GbE SFP283m-30m AOC MFA7A50-Cxxx 100GbE to 2 x 50GbE QSFP281m-5m DAC MCP7H00-G0xxxxxxx 100GbE to 2 x 50GbE QSFP283m-20m AOC MFA7A20-Cxxx 100GbE to 25GbE QSA28 pluggable adapter MAM1Q00A-QSA2850GbE PAM4SFP5650GBASE-SR850nm, LC, up to 100m Contact Mellanox 50GBASE-AOC850nm, LC, up to 100m Contact Mellanox 50GBASE-CR (DAC)Up to 3m, DAC MCP2M50-G0xxxxxxx40GbE QSFP 40BASE-CR41m-5m DAC MC2210130-00X 40BASE-AOC3m-100m MC2210310-XXX 40BASE-SR4850nm, MPO, up to 100m MMA1B00-B150D850nm, MPO, up to 300m MC2210411-SR4E 40BASE-LR41310nm, LC-LC, up to 10km MC2210511-LR4 40GbE to 4 x 10GbE1m-5m DAC MC26091XX-00X 40GbE to 10GbE QSA pluggable adapter MAM1Q00A-QSA25GbE SFP2825BASE-CR0.5m-5m DAC MCP2M00-A0xxxxxxx 25BASE-AOC3m-100m MFA2P10-AXXX25BASE-SR850nm, LC-LC, up to 100m MMA2P00-AS25BASE-LR1310nm, LC-LC, up to 10km MMA2L20-AR10GbE SFP+10BASE-CR 1m-7m DAC MC3309xxx-00X 10BASE-SR 850nm, LC-LC, up to 300m MFM1T02A-SR 10BASE-LR1310nm, LC-LC, up to 10km MFM1T02A-LRMSN4700 Series:MSN4700-WS2F Mellanox Spectrum-3 based 400GbE 1U Open Ethernet Switch with Onyx, 32 QSFPDD ports, 2 Power Supplies (AC), x86 CPU, standard depth, P2C airflow, Rail Kit MSN4700-WS2R Mellanox Spectrum-3 based 400GbE 1U Open Ethernet Switch with Onyx, 32 QSFPDD ports, 2 Power Supplies (AC), x86 CPU, standard depth, C2P airflow, Rail Kit MSN4700-WS2FC Mellanox Spectrum-3 based 400GbE 1U Open Ethernet Switch with Cumulus Linux, 32 QSFPDD ports, 2 Power Supplies (AC), x86 CPU, standard depth, P2C airflow, Rail Kit MSN4700-WS2RC Mellanox Spectrum-3 based 400GbE 1U Open Ethernet Switch with Cumulus Linux, 32 QSFPDD ports, 2 Power Supplies (AC), x86 CPU, standard depth, C2P airflow, Rail Kit MSN4700-WS2FO Mellanox Spectrum-3 based 400GbE 1U Open Ethernet Switch with ONIE, 32 QSFPDD ports, 2 Power Supplies (AC), x86 CPU, standard depth, P2C airflow, Rail Kit MSN4700-WS2ROMellanox Spectrum-3 based 400GbE 1U Open Ethernet Switch with ONIE, 32 QSFPDD ports, 2 Power Supplies (AC), x86 CPU, standard depth, C2P airflow, Rail KitMSN4600 Series:MSN4600-VS2F Mellanox Spectrum-3 based 200GbE 2U Open Ethernet Switch with Onyx, 64 QSFP56 ports, 2 Power Supplies (AC), x86 CPU, standard depth, P2C airflow, Rail Kit MSN4600-VS2R Mellanox Spectrum-3 based 200GbE 2U Open Ethernet Switch with Onyx, 64 QSFP56 ports, 2 Power Supplies (AC), x86 CPU, standard depth, C2P airflow, Rail Kit MSN4600-VS2FC Mellanox Spectrum-3 based 200GbE 2U Open Ethernet switch with Cumulus Linux, 64 QSFP56 ports, 2 power supplies (AC), x86 CPU, standard depth, P2C airflow, Rail Kit MSN4600-VS2RC Mellanox Spectrum-3 based 200GbE 2U Open Ethernet switch with Cumulus Linux, 64 QSFP56 ports, 2 power supplies (AC), x86 CPU, standard depth, C2P airflow, Rail Kit MSN4600-VS2RO Mellanox Spectrum-3 based 200GbE 2U Open Ethernet switch with ONIE, 64 QSFP56 ports, 2 power supplies (AC), x86 CPU, standard depth, C2P airflow, Rail Kit MSN4600-VS2FOMellanox Spectrum-3 based 200GbE 2U Open Ethernet switch with ONIE, 64 QSFP56 ports, 2 power supplies (AC), x86 CPU, standard depth, P2C airflow, Rail KitAccessories & Replacement PartsRoHSRoHS compliant350 Oakmead Parkway, Suite 100, Sunnyvale, CA 94085Tel: 408-970-3400 • Fax: Additional InformationSupport services including next business day and 4-hour technician dispatch are available. For more information, please visit the Mellanox Technical Support User Guide . Mellanox offers installation, configuration, troubleshooting and monitoring services, available on-site or remotely delivered. For more information, please visit the Mellanox Global Services web site .Warranty InformationMellanox SN4000 series switches come with a one-year limitedhardware return-and-repair warranty, with a 14 business day turnaround after the unit is received. For more information, please visit the Mellanox Technical Support User Guide .© Copyright 2020. Mellanox Technologies. All rights reserved.Mellanox, Mellanox logo, Mellanox Spectrum, Mellanox Open Ethernet, Mellanox NEO, Mellanox Onyx, MLNX-OS, LinkX, ConnectX are registered trademarks of Mellanox Technologies, Ltd. All other trademarks are property of their respective owners.60372 BR Rev 1.0SN4700SN4600Power Supply (PS)MTEF-PSF-AC-F \ MTEF-PSR-AC-F MTEF-PSF-AC-F \ MTEF-PSR-AC-F Fan MTEF-FANF-C \ MTEF-FANR-C MTEF-FANF-F \ MTEF-FANR-F Rail Kit (RK)MTEF-KIT-JMTEF-KIT-G。
物联网的核心技术-传感器网络幻灯片PPT
成熟,集数据采集、处理,数据传输、
网络的突出特性是具备自组织能力。
通信等一体的无线传感器网络引起了 • 根据网络中节点是否可移动,无线Ad hoc
人们极大的重视。
网络又可分为两类(如图1): 一类为移
• 目前无线网络可分为两类:其一为有基 础设施网,需要有线连接的固定基站来
动Ad hoc网络(Mobile Ad hoc Network,简 称MANET),1997年IETF(网络工程任务组)
环境监测
© BLOVUE TOI LAB, All Rights Protected.
无线传感器网络典型应用
空中管制
FLOWERS BY HANDS FLOWERS IN EYES
海洋管制
© BLOVUE TOI LAB, All Rights Protected.
无线传感器网络典型应用
交通监控
无线传感器网络的特征与体系结构 与传统网络相比,传感器网络具有以下特征:
• 节点分布极其稠密且数目很大。 • 传感器网络中节点能量、存储空间及计算能力等资源非常有限,且能量资源等无法补
充。 • 在传感器网络中,传感节点在布置完毕后,除了少数节点需要移动以外,大部分节点
都是静止的。 • 多跳通信。由于低功率射频器件的信号传播范围有限,WSN 应该能支持多跳通信,下
• 物理层(Physical Layer) 无线通讯方式有射频(RF-radio frequency)和红外(IR-infrared)两种。由于红外方式的方向 性限制,使其应用更多的局限在点对点直接通讯,故无线传感器网络倾向于射频通讯。 在通迅频带使用上可参考免申请的ISM(Industrial Security Manual,工业安全手册)(工 业、科学和医疗)开放频段——2.4GHz(全球)、433MHz(欧洲)和917MHz(美国)。 当通讯网络工作在开放频带时也会受到其它外部系统的影响,使用时必须采取抗干扰 (微波炉、802.11b和蓝牙等设备)措施。
INTERNATIONAL JOURNAL OF WIRELESS AND MOBILE COMPUTING (IJWMC) 1 A Biologically Inspired Qo
A Biologically Inspired QoS Routing Algorithm forMobile Ad Hoc NetworksZhenyu Liu,Marta Z.Kwiatkowska,and Costas ConstantinouAbstract—This paper presents an Emergent Ad hoc Routing Algorithm with QoS provision(EARA-QoS).This ad hoc QoS routing algorithm is based on a swarm intelligence inspired routing infrastructure.In this algorithm,the principle of swarm intelligence is used to evolutionally maintain routing information. The biological concept of stigmergy is applied to reduce the amount of control traffic.This algorithm adopts the cross-layer optimisation concept to use parameters from different layers to determine routing.A lightweight QoS scheme is proposed to provide service-classified traffic control based on the data packet characteristics.The simulation results show that this novel routing algorithm performs well in a variety of network conditions.Index Terms—MANET,routing,QoS,swarm intelligence.I.I NTRODUCTIONM OBILE ad hoc networks(MANETs)are wireless mo-bile networks formed munication in such a decentralised network typically involves temporary multi-hop relays,with the nodes using each other as the relay routers without anyfixed infrastructure.This kind of network is veryflexible and suitable for applications such as temporary information sharing in conferences,military actions and disaster rescues.However,multi-hop routing,random movement of mobile nodes and other features unique to MANETs lead to enormous overheads for route discovery and maintenance.Furthermore, compared with the traditional networks,MANETs suffer from the resource constraints in energy,computational capacities and bandwidth.To address the routing challenge in MANETs,many ap-proaches have been proposed in the literature.Based on the routing mechanism for the traditional networks,the proactive approaches attempt to maintain routing information for each node in the network at all times[1]–[3],whereas the reactive approaches onlyfind new routes when required[4]–[6].Other approaches make use of geographical location information for routing[7],[8].Those previous works only provide a basic “best effort”routing functionality that is sufficient for con-ventional applications such asfile transfer or email download. To support real-time applications such as V oIP and video stream in MANETs,which have a higher requirement for delay,jitter and packet losses,provision of Quality-of-Service (QoS)is necessary in addition to basic routing functionality. Z.Liu and M.Z.Kwiatkowska is with School of Computer Science,The University of Birmingham,Birmingham,England B152TT.C.Constantinou is with the Department of Electronic Electrical and Computer Engineering,The University of Birmingham,Birmingham,England B152TT.Given the nature of MANETs,it is difficult to support real-time applications with appropriate QoS.In some cases it may be even impossible to guarantee strict QoS requirements.But at the same time,QoS is of great importance in MANETs since it can improve performance and allow critical information to flow even under difficult conditions.At present,the most fundamental challenges of QoS support in MANETs concern how to obtain the available bandwidth and maintain accurate values of link state information during the dynamic evolution of such a network[9].Based on common techniques for QoS provision in the Internet,some researchers proposed the integration of QoS provision into the routing protocols[10],[11].However,since these works implicitly assumed the same link concept as the one in wired networks,they still do not fully address the QoS problem for MANETs.In this paper,we propose a new version of the self-organised Emergent Ad hoc Routing Algorithm with QoS provisioning(EARA-QoS).This QoS routing algorithm uses information from not only the network layer but also the MAC layer to compute routes and selects different paths to a destination depending on the packet characteristics.The underlying routing infrastructure,EARA originally proposed in[12],is a probabilistic multi-path algorithm inspired by the foraging behaviour of biological ants.The biological concept of stigmergy in an ant colony is used for the interaction of local nodes to reduce the amount of control traffic.Local wireless medium information from the MAC layer is used as the artificial pheromone(a chemical used in ant communications) to reinforce optimal/sub-optimal paths without the knowledge of the global topology.One of the optimisations of EARA-QoS over EARA is the use of metrics from different layers to make routing decisions. This algorithm design concept is termed as the cross-layer design approach.Research[13]has shown the importance of cross-layer optimisations in MANETs,as the optimisation at a particular single layer might produce non-intuitive side-effects that will degrade the overall system performance.Moreover, the multiple-criteria routing decisions allow for the better usage of network characteristics in selecting best routes among multiple available routes to avoid forwarding additional data traffic through the congested areas,since the wireless medium over those hotspots is already very busy.The parameters for measuring wireless medium around a node depend largely on the MAC layer.In this paper,we focus on the IEEE802.11 DCF mode[14],since it is the most widely used in both cellular wireless networks and in MANETs.This cross-layer technique of using MAC layer information can be appliedeasily to other MAC protocols.In addition to the basic routing functionality,EARA-QoS supports an integrated lightweight QoS provision scheme.In this scheme,traffic flows are classified into different service classes.The classification is based on their relative delay bounds.Therefore,the delay sensitive traffic is given a higher priority than other insensitive traffic flows.The core technique of the QoS provision scheme is a token bucket queuing scheme,which is used to provide the high priority to the real-time traffic,and also to protect the lower-priority traffic from star-vation.Experimental results from simulation of mobile ad hoc networks show that this QoS routing algorithm performs well over a variety of environmental conditions,such as network size,nodal mobility and traffic loads.II.B ACKGROUNDIn this section,we give a brief introduction to background knowledge on ant colony heuristics,and the QoS provision techniques in MANETs.A.Foraging Strategies in AntsOne famous example of biological swarm social behaviour is the ant colony foraging [15](see Figure 1).Many ant species have a trail-laying,trail-following behaviour when foraging:individual ants deposit a chemical substance called pheromone as they move from a food source to their nest,and foragers follow such pheromone trails.Subsequently,more ants are attracted by these pheromone trails and in turn reinforce them even more.As a result of this auto-catalytic effect,the optimal solution emerges rapidly.In this food searching process a phenomenon called stigmergy plays a key role in developing and manipulating local information.It describes the indirect communication of individuals through modifying theenvironment.Fig.1.All Ants Attempt to Take the Shortest PathFrom the self-organisation theory point of view,the be-haviour of the social ant can be modelled based on four elements:positive feedback,negative feedback,randomness and multiple interactions [16].This model of social ants using self-organisation theories provides powerful tools to transfer knowledge about the social insects to the design of intelligent decentralised problem-solving systems.B.Quality-of-Service in MANETsQuality-of-Service (QoS)provision techniques are used to provide some guarantee on network performance,such as average delay,jitter,etc.In wired networks,QoS provision can generally be achieved with the over-provisioning of re-sources and with network traffic engineering [17].With the over-provisioning approach,resources are upgraded (e.g.fibre optic data link,advanced routers and network cards)to make networks more resistant to resource demanding applications.The advantage of this approach is that it is easy to be implemented.The main disadvantage of this approach is that all the applications still have the same priority,and the network may become unpredictable during times of bursting and peak traffic.In contrast,the idea of the traffic engineering approach is to classify applications into service classes and handle each class with a different priority.This approach overcomes the defect of the former since everyone is following a certain rule within the network.The traffic engineering approach has two complemen-tary means to achieve QoS provisioning,Integrated Services (IntServ)and Differentiated Services (DiffServ).IntServ [18]provides guaranteed bandwidth for flows,while DiffServ [19]provides hard guarantees for service classes.Both of the approaches rely on the possibility to make bandwidth reservations.The former was used in ATM (Asynchronous Transfer Mode)[20]and is today the method of achieving QoS in RSVP-IntServ [21].On the other hand,in the DiffServ approach,no reservation is done within the network.Instead,QoS is achieved by mechanisms such as Admission Control ,Policy Manager ,Traffic Classes and Queuing Schedulers .These mechanisms are used to mark a packet to receive a particular forwarding or dropping treatment at each node.Based on QoS provision techniques in wired networks,many QoS approaches are proposed to provide QoS services for MANETs.Flexible QoS Model for MANETs (FQMM)[22],is the first QoS approach for MANETs,which combines knowledge on IntServ/DiffServ in wired networks with con-sideration of MANETs.As an essential component to achieve the QoS provisioning,QoS routing algorithms tightly integrate QoS provisioning into routing protocols.The QoS version of AODV (QoS-AODV)[23],the Core-Extraction Distributed Ad Hoc Routing (CEDAR)protocol [10],the Multimedia Support for Mobile Wireless Networks (MMWN)protocol [11],and the ticket-based protocols [24]are examples of QoS routing algorithms proposed for MANETs.On the other hand,QoS signaling techniques are inde-pendent of the underlying routing protocols.The In-band Signalling for QoS in Ad-Hoc Mobile Networks (INSIGNIA)algorithm [25]is the typical signaling protocol designed exclusively for MANETS.The idea of CEDAR,MMWN,and ticket-based protocols is to disseminate link-state information across the network in order to enable other nodes to find routes that meet certain QoS criteria,like the minimum bandwidth.On the other hand,INSIGNIA piggybacks resource reservations onto data packets,which can be modified by intermediate nodes to inform the communication endpoint nodes in case of lack ofresources.All those approaches are based on the idea that the wireless links between mobile nodes have certain QoS related properties,in particular a known amount of available bandwidth,and that nodes are able to give guarantees for traffic traversing these links.III.C RITIQUE OF E XISTING Q O S A PPROACHES INMANET SNowadays,most of the QoS provisioning techniques are derived from the QoS approaches of the wired networks. However,QoS support approaches proposed in wired networks are based on the assumption that the link characteristics such as bandwidth,delay,loss rate and error rate must be available and manageable.However,given the challenges of MANETs, e.g.dynamic topology and time-varying link capacity,this assumption does not apply any longer.Thus,applying the concepts of wired traffic engineering QoS approaches directly to MANETs is extremely difficult.Generally,the situation in MANETs is completely different from those in wired networks.In wireless networks,the available bandwidth undergoes fast time-scale variations due to channel fading and errors from physical obstacles.These effects are not present in wired networks.In MANETs,the wireless channel is a shared-access medium,and the available bandwidth even varies with the number of hosts contending for the channel.Below we analyse why the IntServ/DiffServ models are not appropriate for MANETs respectively. IntServ based approaches are not applicable for MANETs mainly due to two factors,huge resource consumption and computation power limitation.Firstly,to support IntServ,a huge amount of link state information has to be built and main-tained for each mobile node.The amount of state information increases proportionally with the number offlows,which is also a problem with the current IntServ QoS scheme.Secondly, current wireless networks employ two major MAC techniques, the single-channel approach and the multiple channel ap-proach.With single-channel approach(e.g.IEEE802.11[14]), all nodes share the same channel and therefore potentially interfere with each other.With a multiple-channel approach (e.g.Bluetooth[26]or CDMA[27]),nodes can communicate on several channels simultaneously.Both of the two MAC techniques have a similar bandwidth reservation mechanism. This common mechanism requires a transmission schedule to define time slots,in which nodes take their turns periodically. For each slot,its duration and a set of possible simultaneous transmissions must be defined.However,in wireless networks, the problem offinding an optimal schedule is proved to be NP-complete[28],which is a fundamental limitation of QoS provisioning in wireless networks.On the other hand,the DiffServ approach is a lightweight QoS model for interior routers since individual stateflows are aggregated into sets of service classes whose packets are treated differently at the routing nodes.This makes routing a lot easier in the network.Thus this approach could be a potential solution for MANETs.Even though it is not practical to provide a hard separation of different service classes in MANETs,relative prioritisation is possible in such a way that traffic of a certain class is given a higher or lower priority than traffic of other service classes.One solution would be to divide the traffic into a predefined set of service classes that are defined by their relative delay bounds,such as delay sensitive(realtime)and insensitive(bulk)traffic.Realtime traffic should be given higher priority than bulk traffic.No absolute bandwidth guarantees are provided.Some work based on service differentiation rather than resource reservations in MANETs already exists[29].IV.D ESCRIPTION OF EARA-Q O SEARA-QoS is an on-demand multipath routing algorithm for MANETs,inspired by the ant foraging intelligence.This algorithm incorporates positive feedback,negative feedback and randomness into the routing computation.Positive feed-back originates from destination nodes to reinforce the existing pheromone on good paths.Ant-like packets,analogous to the ant foragers,are used to locallyfind new paths.Artificial pheromone is laid on the communication links between nodes and data packets are biased towards strong pheromone,but the next hop is chosen probabilistically.To prevent old routing solutions from remaining in the current network status,expo-nential pheromone decay is adopted as the negative feedback. Each node using this algorithm maintains a probabilistic routing table.In this routing table,each route entry for the destination is associated with a list of neighbour nodes.A probability value in the list expresses the goodness of node as the next hop to the destination.For each neighbour, the shortest hop distance to the destination and the largest sequence number seen so far are also recorded.In addition to the routing table,each node also possesses a pheromone table.This table tracks the amount of pheromone on each neighbour link.The table may be viewed as a ma-trix with rows corresponding to neighbourhood and columns to destinations.There are three threshold values controlling the bounds on pheromone in the table.They are the upper pheromone that prevents extreme differences in pheromone, the lower pheromone,below which data traffic cannot be forwarded,and the initial pheromone that is assigned when a new route is found.In addition to the routing data structures present above,the following control packets are used in EARA-QoS to perform routing computation:Route Request Packet(RQ)containing destination ad-dress,source address and broadcast ID.Route Reply Packet(RP)containing source address,des-tination address,sequence number,hop account and life-time.Reinforcement Signal(RS)containing destination ad-dress,pheromone value and sequence number.Local Foraging Ant(LFA)containing source address (the node that sent LFA),the least hop distance from the source to the destination,stack of intermediate node address and hop count.Hello Packet(HELLO)containing source(the node that sent Hello)address and hop count(set to0).A.Parameters of Lower Layers1)The Average MAC Layer Utilisation:Thefirst metric is the average MAC layer utilisation for a node.This metric measures the usage of the wireless medium around that node. As the instantaneous MAC layer utilisation at a node is either (busy)or(idle),we average this value over a period of time window as follows:(1) where is the time when the medium is busy in the window.This average MAC utilisation indicates the degree to which the wireless medium around that node is busy or idle.We consider the instantaneous MAC layer utilisation level at a node to be1when the wireless medium around that node either detects physical carrier to be present or is deferring due to virtual carrier sensing,inter-frame spacing,or backoff.In addition,we also consider the medium is busy at any time when the node has at least one packet in the transmission queue.2)The Transmission Queue Heuristic:The second metric isa heuristic value that is calculated with the network interface transmission queue length in the current node.Apart from the media status,the transmission queue length is also a key factor that can affect the packet latency or packet drop due to the size limit on the queue length.We define the heuristic value with the following rules.If the outgoing network interface employs a single queue scheme,the heuristic value is defined as:(2) where is the length(in bytes waiting to be sent)of the interface queue in node,and is the maximum packet bytes allowed in the queue.If the network interface employs the multiple virtual queue scheme for each outgoing link,the heuristic value is defined as:(3)where is the length(in bytes waiting to be sent)of the virtual queue of the link in node and denotes the neighbourhood of node as a next-hop to some destination.3)The Average MAC Layer Delay:The last metric is the MAC layer delay for the link.The MAC layer delay is defined as the interval from when the RTS frame is sent at node to when the data frame is received successfully at node.The average MAC delay is obtained by averaging these values over a time window as follows:(4)where is the time interval in the window,and is a coefficient.This average MAC delay indicates the degree of interference.In regions where there is a lot of interference from other nodes,MAC delay is high due to the contentionof the channel.B.Data PropagationWhen multiple virtual queue scheme is employed,the rout-ing probability value is computed by the composition ofthe pheromone values,the local heuristic values and the linkdelays as follows:(5) where,and()are tunable parametersthat control the relative weight of pheromone trail,MAC delay and heuristic value,and is the neighbourhood as a next-hop to some destination.Incorporating the heuristic value and link delay in the rout-ing computation makes this algorithm possess the congestionawareness property.Based on the probabilistic routing table, data traffic will be distributed according to the probabilitiesfor each neighbour in the routing table.The routing algorithmexhibits load balancing behaviour.Nodes with a large number of packets in the buffer are avoided.The EARA-QoS algorithm consists of several components.They are the route discovery procedure,the positive and neg-ative reinforcement,and the local connectivity management.C.Route DiscoveryWe use a similar route discovery procedure as describedin[12].On initialisation,a neighbourhood for each node is built using the single-hop HELLO messages.Whenever atraffic source needs a route to a destination,it broadcastsroute request packets(RQ)across the network.Rather than simplyflooding the RQ packets,we adopt the probabilisticbroadcast scheme explored in[30]combined with the MAClayer utilisation.When a nodefirst receives a packet,with probability it broadcasts the packet to its neighbours,andwith probability it discards the packet.The probabilityvalue is calculated as(6) where()is the coefficient.This broadcast scheme helps to discover new routes avoiding congestion areas,but atthe cost of missing potential routes to the destination. During the course offlooding RQ packets to the destination ,the intermediate node receiving a RQ packetfirst sets up reverse paths to the source by recording the source addressand the previous hop node in the message cache.If a validroute to the destination is available,that is,there is at least one link associated with the pheromone trail greater than the lower pheromone bound,the intermediate node generates a route reply(RP).The RP is routed back to the source via the reverse paths.Otherwise,the RQ is rebroadcast.Other than just establishing a single forward path,whenthe destination node receives RQs it will send a RP to allthe neighbours from which it sees a RQ.In order to maintain multiple loop-free paths at each intermediate node,node(b) Path Reinforcement(c) Local Repair(a) Initial Pheromone Setup Fig.2.Illustrating Working Mechanism of EARA-QoSmust record all new forward paths that possess the latest sequence number but hold a lower hop-count in its routing table,and also send a RP to all the neighbours from which it saw a RQ.During the course of the RP tracking back to the source,an initial pheromone value is assigned to the corresponding neighbour node,which indicates a valid route to the destination.This process is illustrated in Figure2(a).D.Route ReinforcementAfter the destination node receives the data traffic sent by the source node,it begins to reinforce some good neighbour(s)in order to“pull”more data traffic through the good path(s)by sending reinforcement signal packets(RS) whenever it detects new good paths.When node receives a RS,it knows it has an outgoing link toward the destination ,which is currently deemed a good path.Subsequently, node updates the corresponding pheromone table entry with the value and forwards a RS packet to(at least one) selected neighbour locally based on its message cache,e.g.the neighbour(s)that saw the least hops of the incoming packets. The amount of the pheromone used to positively rein-force the previous hop neighbour is computed as follows.If the RS packet is sent by the destination to node,then is calculated using the upper bound pheromone value ,(7) If the RS packet is sent by an intermediate node towards node,the is calculated using the current largest pheromone value max()in node with the next hop to the destination in the pheromone table,max(8) where,and are parameters that control the relative weight of the relative source hop distance,the rel-ative packet number and the local queue heuristic. Incorporating the congestion-measuring metric into the reinforcement can lead data traffic to avoid the congestion areas.The relative source hop distance is calculated as follows:(9) where is the shortest hop distance from the source to the current node through node,and is the shortest hop distance from to.This parameter is used to ensure that paths with shorter hop distance from the source node to the current node are reinforced with more pheromone.The relative packet number is calculated as follows:(10) where is the number of incoming packets from neighbour to the destination,and is the total number of incomingpackets towards the destination.This parameter is used to indicate that the data forwarding capacity of a link also affects the reinforcement.The more data arrives,the stronger reinforcement is generated for the corresponding link.On receiving the RS from a neighbour,node needs to positively increase the pheromone of the link towards node.If the sequence number in the RS is greater than the one recorded in the pheromone table,node updates its corresponding pheromone with the value of carried on the RS:(11) If the sequence number is equal to the current one,then:ifotherwise(12)If the sequence number in RS is less than the current one in the pheromone table,then this RS is just discarded.Node also has to decide to reinforce(at least)one of its neighbours by sending the RS message based on its own message cache.This process will continue until reaching the source node.As a result of this reinforcement,good quality routes emerge,which is illustrated in Figure2(b).The same procedure can apply to any intermediate node to perform local link error repair as long as it has pheromone value that is greater than the lower bound.For instance,if an intermediate node detects a link failure from one of its upstream links, it can apply the reinforcement rules to discover an alternative path as shown in Figure2(c).There is also an implicit negative reinforcement for the pheromone values.Within every time interval,if there is no data towards a neighbour node,its corresponding pheromone value decays by a factor as follows:(13)E.Local Foraging AntsIn a dynamic network like MANET,the changes of the net-work topology create chances for new good paths to emerge.In order to make use of this phenomenon,this algorithm launcheslocal foraging ants(LFA)with a time interval to locallysearch for new routes whenever all the pheromone trails of a node towards some destination drop below the threshold.The LFA will take a random walk from its original node. During the course of its walk,if the LFA detects congestionaround a node(the average channel utilisation is greaterthan a predefined threshold value),then the LFA dies to avoid increasingly use the wireless medium.Otherwise,theLFA pushes the address of the nodes that it has travelledinto its memory stack.To avoid forming of loops,LFA will not choose to travel to the node that is already in.Before reaching the maximum hop,if LFA canfind a node with pheromone trails greater than and the hop distanceto destination not greater than the one from its original nest,itreturns to its’nest’following its memory stack and updates the corresponding paths with.Otherwise,it simply dies.F.Local Connectivity ManagementNodes maintain their local connectivity in two ways.When-ever a node receives a packet from a neighbour,it updates its local connectivity information to ensure that it includes thisneighbour.In the event that a node has not sent any packets toits neighbours within a time interval,it has to broadcast a HELLO packet to its neighbours.Failure to receive packetsfrom the neighbourhood in indicates changes in the local connectivity.If HELLO packets are not received from the nexthop along an active path,the node that uses that next hop issent notification of link failure.In case of a route failure occurring at node,cannot for-ward a data packet to the next hop for the intended destination .Node sends a RS message that sets ROUTE RERR tag to inform upstream nodes of the link failure.This RS signalassigns to the corresponding links the lower bound.Here, RS plays the role of an explicit negative feedback signal to negatively reinforce the upstream nodes along the failure path. This negative feedback avoids causing buffer overflow due to caching on-flight packets from upstream nodes. Moreover,the use of HELLO packets can also help to ensure that only nodes with bidirectional connectivity are deemed as neighbours.For this purpose,the HELLO packet sent by a node has an option to list the nodes from which it has heard HELLO packets,and nodes that receive the HELLO check to ensure that it uses only routes to neighbours that have sent HELLO packets.G.The QoS Provision SchemeThis section describes a lightweight approach to DiffServ. The basic idea is to classifyflows into a predefined set of service classes by their relative delay bounds.Admission control only works at the source node.There is no session orflow state information maintained at intermediate nodes. Once a realtime session is admitted,its packets are marked as RT(realtime service)and otherwise they are considered as best-effort bulk packets.As depicted in Figure3,each of these traffic classes is buffered in a logically separate queue.A simple novel queuing strategy,based on the token bucket scheme,provides high priority to realtime traffic,and also protects the lower-priority traffic from starvation.No absolute bandwidth guarantees are provided in this scheme.We explain this queuing strategy and its novelty below.The queues are scheduled according to a token bucket scheme.In this scheme,prioritisation is achieved with token balancing.Each traffic class has a balance of tokens,and the class with higher balance has a higher priority when dequeuing the next packet for transmission.For each transmission of a packet of class,an amount of tokens is subtracted from the class’token balance and an equal fraction thereof is added to every other class’balance such that the sum of all tokens is always the same.The weight value reflects the delay sensitivity assigned to the different classes.A higher weight value corresponds to a lower delay sensitivity.The size of the token balance together with the value determines the maximal length of a burst of traffic from one class.In this scheme,as long as the amount of delay-sensitive traffic does not grow too large,it is forwarded as quickly as possible,and if it does grow too large,starvation of other traffic classes is prevented.Setting the upper bound of a class’token balance depending on its delay-sensitivity enables further tuning of the describedmethod.Fig.3.Overview of Service Differentiation SchemeIn this packet scheduling scheme,routing protocol pack-ets are given unconditional priority before other packets. Moreover,realtime applications normally have stringent delay bounds for their traffic.This means that packets arriving too late are useless.From the application’s point of view,there is no difference between late and lost packets.This implies that it is actually useless to forward realtime packets that stay in a router for more than a threshold amount of time,because they will be discarded at the destination anyway.Dropping those packets instead has the advantage of reducing the load in the network.To our knowledge,this service classification based queuing scheme is the simplest implemented QoS provisioning technique designed exclusively for MANETs so far.V.C HARACTERISTICS OF THE A LGORITHMThis proposed protocol,implementing the cross-layer design concept,exhibits some properties that show itsfitness as a solution for mobile ad hoc networks:Loop-freeness:during the route discovery phase,the nodes record the unique sequence number of RP packets.。
无线英语词汇汇总及简写
Access Link Control Application Part接入链路控制应用部分ALCAP Access Point Name接入点名称APN Access Preamble接入前缀AP Access Service Class接入服务级别ASC Access service class接入业务类ASC Access Stratum接入层AS Accounting计费分配(归属环境,服务网络Acknowledged Mode确认模式AM Acknowledged mode data确认方式数据AMD Acknowledgement证实、确认ACK Acquisition Indication捕获指示AI Acquisition Indication Channel捕获指示信道AICH Acquisition Indicator捕获指示AI Acquisition Indicator Channel接入指示信道AICH ACTIVE State激活状态Adaptive MultiRate自适应多速率AMR Adaptive MultiRate (speech codec)适配多速率AMR Adaptive Multirate Codec自适应多速率编解码器AMR Address Translation and Mapping Function地址翻译和匹配功能Addressing of Managed Entities管理实体寻址Adjacent Channel Interference Ratio相邻信道干扰率ACIR Adjacent Channel Leakage Power Ratio邻道泄漏功率比ACLR Adjacent Channel Power Ratio邻道功率比ACPR Adjacent Channel Selectivity邻近信道选择性ACS Adjacent Channel Selectivity邻道选择ACS Administration of the SGSN - MSC/VLR AssociaSGSN - MSC/VLR关系管理Admission and load control准入和负载控制Admission Control Function允许控制功能Advanced Addressing高级寻址Air Interface User Data空中接口用户数据Algebraic code excitation linear prediction代数码激励线性预测ACELP Allowable PLMN允许接入PLMNAlternate procedures可变通规程American National Standard Institute美国国家标准组织ANSI Amplitude limitation for normalization归一化限幅AMR-Adaptive Multi-Rate codec自适应多速率编解码器Area Coverage Probability区域覆盖概率Associated Control Channel相关控制信道ACCH Association of Radio Industries and Business无线产品工商联合会(日)ARIB Attenuator衰减器Audit trail mechanism审计跟踪机制Authentication and Authorization Function鉴权和授权功能Authentication triplet/quintuple鉴权三元组/五元组Authentication vector鉴权矢量Automatic Establishment of Roaming Relations漫游关系的自动建立Autonomous Swap自动交换Average transmit power平均发射功率Average Transmitter Power Per Traffic Channe每业务信道平均发射功率Bandwidth on demand按需求分配带宽BoD baseline capabilities基线能力Baseline Implementation Capabilities基线实施能力Bearer IP service承载IP业务Best effort QoS最低限度服务质量,尽力而为的Best effort service最低限度业务Block error rate块误码率BLER Broadband signaling system #7宽带7号信令系统BB SS7 Broadcast channel (logical channel)广播信道 (逻辑信道)BCCH Broadcast channel (transport channel)广播信道 (传输信道)BCH Broadcast control functional entity广播控制功能实体BCFE Broadcast/Multicast Control protocol广播/多播控制协议BMC Burn-in room老化房Call Deflection呼叫偏转CD Camp on a cell驻扎于一个小区Capability Class能力类型Capacitance coupling电容耦合Card session板卡对话CDR redirection(including multi-redirectionCDR 重定向Cell Radio Network Temporary Identifier/Iden小区无线网络临时标识C-RNTI Cell Selection and Reselection小区选择和再选择Channel assignment indication channel信道分配指示信道CA-ICH Channel estimation信道估计Channel Identifier(AAL2)通道标识CID channel rotation correction信道纠偏/去信道衰落channelization mode信道化模式Chargeable Event可计费事件Charging Data Collection Function计费数据收集功能Charging Gateway Functionality计费网关功能CGF China wireless telecommunications standard g中国无线电信标准组CWTS Ciphering Algorithm加密算法Ciphering Function加密功能Ciphering key密钥CK Circuit Service电路业务CS Class-A mode of operation (A GSM GPRS MS caA类工作方式 (for GPRS)或A类手Class-B mode of operation B类工作方式 (for GPRS)或B类手Class-C mode of operation C类工作方式 (for GPRS)或C类手Code acquisition码询问Code Division Multiple Access码分多址接入CDMA Code Division Multiple Address Testbed码分多址测试床Code division test bed, EU research project码分测试床CODIT Code tracking码跟踪Coherence bandwidth相干带宽Coherence detection相干检测Coherence time相干时间Collision detection indication channel冲突检测指示信道CD-ICHCombined GPRS / IMSI attach联合GPRS / IMSI附着Combined GPRS / IMSI Attach Procedure联合GPRS/IMSI 附着规程Combined Hard Handover and SRNS Relocation P联合硬切换和SRNS重定位规程Combined Inter SGSN RA/LA Update联合SGSN 间路由区/位置区更新Combined RA/LA update联合路由区/位置区更新Combined RA/LA Updating联合路由区/位置区更新Common Channel公用信道Common Object Request Broker Architecture公共对象请求代理结构CORBA Common Part Convergence Sublayer公共部分汇聚子层CPCS Common transport channel公共传输信道CCH Communication bypath通信旁路CCBS Completion of Calls to Busy Subscriber用户忙呼叫结束,指忙用户呼叫完Compressed mode measurement procedure压缩模式测量规程Compression Function压缩功能Conducting cable导线Conformance Test遵从性测试Connected Mode已连接模式Connection Frame Number连接帧号CFN Connection mode连接模式Constant bandwidth恒定带宽CW Continuous Wave (unmodulated signal)持续波(未调制信号)/连续波(Control Radio Network Controller控制无线控制器CRNC Controlling RNC控制RNC CRNC Conversational service对话业务Cordless Telephony System - Fixed Part无绳电话系统-固定部分CTS-FP Core Network核心网络CN Corner effect角落效应Corporate code企业码Corporate personalization企业个体化CPCH status indication channel CPCH 状态指示信道CSICH Cross-talking串话Cryptographic Checksum密码校验和CS mode of operation (for UMTS MS)电路域工作方式 (for UMTS)CS Paging电路域寻呼CTS licence exempt frequencies CTS许可证免除载频CTS operator procedure for enrolment of CTS-无绳电话系统-固定部分登记运营CTS-MS originated calls无绳电话系统移动台发起呼叫CTS-MS terminated calls无绳电话系统移动台结束呼叫Cumulative distribution function累积分配功能CDF Current eaqualization output device均流输出装置Current LSA当前 LSACurrent-limiting impedance限流电阻Data Integrity Procedure数据一致性规程De-personalization去个人化De-pilot pattern去导频图案Decapsulation解封装Decision feedback决策反馈DFDedicated control functional entity专用控制功能实体DCFE Dedicated File专用文件DF Dedicated NBAP专用NBAP D-NBAP Dedicated Physical Channel专用物理信道DPCH Delay locked loop时延锁定环Delay spread时延扩展Delete Subscriber Data Procedure删除用户数据规程Delivered QoS交付服务质量Despreading解扩Destination user目的地用户Diagnostic Test诊断测试Digital enhanced cordless telephone数字增强型无绳电话DECT Digital Signature数字签名Direct sequence spreading spectrum-code divi直接序列扩频-码分多址DS-CDMA Direct-Sequence Code Division Multiple Acces直接序列码分多址接入DS-CDMA Discontinuous Reception非连续性接收DRX Discontinuous Transmission非连续性发射DTX Distribution service信息分发业务Diversity Handover分集切换DHO Domain Name Server Function域名服务器功能Doppler spread多普勒扩频Downlink下行DL Downlink Tunnel下行隧道Drift RNS漂浮RNS,漂移网络控制器DRNC DRX cycle DRX周期Dust granule灰尘颗粒Dust-proof plastic tape防尘橡胶条Dynamic Allocation of Radio Resources无线资源动态分配Dynamic channel allocation动态信道分配DCA Dynamic PDP Addresses动态 PDP地址EDGE Compact EDGE 压缩Electromagenetic wave radiation电磁波辐射Electromagnetic shielding电磁屏蔽Elementary File基础文件EF Elementary procedure基本规程EP embedded IP内嵌IP核EMC conformance specification EMC遵从规格Encapsulation function封装功能Encrypted connection加密连接Encryption and algorithm management加密和算法管理Enhanced Data rates for GSM Evolution GSM演进增强数据速率EDGE Enhanced full rate speech codec增强型全速率语音编解码器EFR Enhanced Multi-Level Precedence and Pre-empt增强型多层优先和抢占业务eMLPP Enrolment of CTS-FP无绳电话系统-固定部分登记Enrolment of CTS-MS无绳电话系统-移动台登记Equivalent Isotropic Radiated Power全向有效辐射功率EIRP Equivalent Isotropic Radiated Power等价同性辐射功率EIRPError concealment of lost frames失帧错误隐藏Error Vector aMplitude误差矢量幅度EVM Essential UE Requirement (Conditional)用户设备基本要求(有条件的)Essential UE Requirement (Unconditional)用户设备基本要求(无条件的)Exception procedures例外规程Exclusive access排他性(唯一)接入Explicit Call Transfer直接呼叫转移,显式呼叫转移ECT Explicit Diversity Gain (dB)显分集增益(dB)External PDN Address Allocation外部PDN地址分配Extra SDU delivery probability额外业务数据单元发送概率fading factor衰落因子Fast Uplink Signaling Channel快速上行信令信道FAUSCH File identifier文件标识First despreading预解扩Fixed Network User Rate固定网用户速率Floating point C-Code浮点C码Forward Access Channel前向接入信道FACH Forward error control前向差错控制Frame Error Rate误帧率FER Frame protocol帧协议FP Fraud Information Gathering System (FIG)虚假消息收集FIG Freedom Of Mobile multimedia Access FOMA移动电话FOMA Future radio wideband multiple access system未来无线宽带多址系统FRAMES Gateway GPRS Support Node网关GPRS支持节点GGSN Gateway Location Register网关位置寄存器GLR Gateway MSC关口MSC GMSC General Packet Radio Service(System)通用分组无线业务(系统)GPRS Generic Frequency List (GFL)通用载频列表Geographical routing地理选路GLObal NAvigation Satellite System全球导航卫星系统GLONASS Global Positioning System全球定位系统GPS GPRS attach when the MS is already IMSI-atta已IMSI附着的移动台GPRS附着GPRS Mobile IP Interworking GPRS 移动 IP 互通GPRS Tunnelling Protocol for User Plane GPRS 隧道协议用户面部分GTP-U Granularity period粒度周期Group call area组呼叫区域Group call initiator组呼(叫)发起方Group Call Register群组呼叫寄存器GCR Group identification (group ID)组标识Groupwise serial interference cancellation组系列干扰取消GSIC Guaranteed service可保证业务Handoff Gain/Loss (dB)切换增益/损耗Hard decision硬判决Hard handover硬切换Heartbeat detection circuit心跳检测电路Heartbeat path心跳路径Home Environment归属环境Home Environment Value Added Service Provide归属环境增值业务提供商HE-VASP Hot Billing热计费(实时计费)ID-1 SIM带ID的SIM 卡Identity Check Procedures身份检查规程IMEI check violation IMEI校验违规Immediate Service Termination (IST)即时业务终止IST Implementation capability实施能力INACTIVE State非激活状态Incompatible Encryption不兼容加密Independent Transmit Clock独立传输时钟ITC Information Data Rate信息数据速率Initial Convergence Time初始汇聚时间Initial paging information初始寻呼信息Initial paging occasion初始寻呼时机Insert Subscriber Data Procedure插入用户数据规程Insulation washer绝缘垫片Integrity key一致性密钥IKInter PLMN handover PLMN间切换Inter SGSN Intersystem Change SGSN间系统间变化Inter system handover系统间切换Inter-cell handover小区间切换Inter-path interference路径间干扰IPI inter-PLMN backbone network PLMN间骨干网Inter-SGSN Routing Area Update SGSN 间路由区更新Inter-symbol interference符号间干扰、码间干扰ISI Interactive service交互业务Intercept invocation截收/拦截激活Intercept of calls placed on HOLD (call wait呼叫保持(呼叫等待和多方业务Intercept of forwarding calls前转呼叫截收/拦截Intercept product截收/拦截产品Intercept related information截收/拦截相关信息intercept target截收/拦截目标Interception Area截收/拦截域IA Interference cancellation干扰抵消IC Interference rejection combining干扰拒绝合并IRC Interference Signal Code Power干扰信号码功率ISCP International mobile telephony国际移动电话业务Internet engineering task force因特网工程任务组IETF Intra SGSN Intersystem Change SGSN内系统间变化intra-PLMN backbone network PLMN内骨干网Intra-SGSN Routing Area Update SGSN 内路由区更新IP over ATM基于ATM的IP传输IPoA IRP Information Service IRP 信息业务IRP Solution Set IRP 解决方案集Joint Detection联合检测JDJoint Predistortion联合预矫正JPKey identification密钥标识Key pair密钥对Law enforcement agency合法拦截/截收实施机构LEA Lawful Interception合法截收Layer Functions分层功能Link budget链路预算Link level performance链路级性能Load factor负载因子local code本地码Local service本地业务Localized Service Area本地化业务区域LSA Localized service area support in active mod活动模式下本地化业务区域支持Localized service area support in idle mode空闲模式下本地化业务区域支持Location Dependent Interception与位置相关截收拦截Location Measurement Unit位置统计单元LMU Location Registration位置注册LR Location services位置业务LCS Logical Link Establishment Function逻辑链路建立功能Logical Link Maintenance Functions逻辑链路维护功能Logical Link Management Function逻辑链路管理功能Logical Link Release Function逻辑链路释放功能Logical Model逻辑模型Logical O&M逻辑操作维护Loose coupling松散耦合Low Bitrate Multimedia Telephony Service低比特率多媒体电话业务low-speed access and TransCoder Module低速接入及码变换模块TCM LSA exclusive access cell本地化业务区域唯一接入小区LSA only access LSA (本地化业务区域)唯一接LSA preferential access cell本地化业务区域优先接入小区LSA Priority LSA 优先级Macro cell宏蜂窝Macro diversity handover宏分集切换Malicious Reconfiguration of the GPRS DeviceGPRS设备恶意重配置Managed entities被管理的实体Management Information Model管理信息模型MIM Mandatory storage必要存储Mandatory UE Requirement必要用户设备要求Manufacturer-Dependent State与生产商相关状态Master File主文件MF Matched filter匹配滤波器、匹配过滤器MF Maximum likelihood sequence detection最大可能序列检测、最大或然序MLSD Maximum output power最大输出功率Maximum peak power最大峰值功率Maximum Total Transmitter Power (dBm)最大总发射功率Maximum Transmitter Power Per Traffic Channe每业务信道最大发射功率Mean bit rate平均比特速率Mean transit delay平均传输时延Measurement package(统计)测量包Measurement schedule(统计)测量进程安排Measurement task(统计)测量任务Measurement types(统计)测量类型Medium Access Control媒质接入控制MAC Medium Access Control-Common公共介质接入控制MAC-C Medium Access Control-Dedicated专用介质接入控制MAC-D Message Authentication Code信息鉴权码Message Screening Function消息过滤功能Message transfer part (broadband)消息传输部分-(宽带)MTP3b messaging service消息业务Minimum mean square error最小均方差MMSEMM Information Procedure移动性管理信息规程Mobile IP移动IP MIP Mobile Number Portability移动号码可携带性MNP Mobile-Originated Short Message移动起始短消息SM MO Mobile-originated SMS Transfer移动始发短消息业务转发Mobile-Terminated Short Message移动终结短消息SM MT Mobile-terminated SMS (MT SMS) Transfer移动终结短消息业务转发Mobility Management States移动性管理状态Mobility Management Timer Functions移动性管理定时器功能Modelling of measurement jobs(统计)测量任务建模Motion picture experts group动画专家组MPEG Movable floor活动地板MS Information Procedure移动台信息规程MS Network Capability移动台网络能力MS Radio Access Capability移动台无线接入能力MSC Basic Configuration MSC 基本配置MSBMulti mode terminal多模式终端Multicast service多播业务,多点传送业务Multimode and multimedia TDMA多模和多媒体 TDMAMultimode terminal多模终端Multipath多径Multipath selection多径提携、多径选择Multiple access interference多接入干扰MAI Multirate ACELP多速率ACELP MR-ACELP Multiuser detection多用户检测MUD Name Binding名称匹配,名字限定Narrowband Telephony Service窄带电话业务Near-far interference远近干扰Negotiated QoS协商业务质量Negotiation phase协商阶段Network Access Control Functions网络接入控制功能Network configuration evaluation网络配置评估Network Determined User Busy (condition)网络决定用户忙(条件)NDUB Network dimensioning网络规模Network Interworking网络互通Network operation modes I网络运营模式INetwork operator specific services网络运营商特有业务Network subset code网络子集码No Artefacts in Residual Noise残留噪音中无膺象No Degradation in Clean Speech无纯语音降级No Speech Clipping and no Reduction in Intel话音无剪切及话音可辩识性无降Node availability notification节点可用通知Node B3G 基站NodeB Application Part NodeB应用部分NBAP Noise Suppression噪音抑制Noise Suppression for the AMR Codec AMR编解码器噪音抑制Nomadic Operating Mode流动运营模式Non-Access Stratum非接入层NAS Non-pilot symbol非导频位、非导频符号Non-realtime Multimedia Messaging Service非实时多媒体消息业务Non-volatile memory非易失存储器Normal call or operation普通呼叫或运营Normal procedure正常规程Numbering Plan Identification编号方案标识NPID Octet Stream Protocol八位位组流协议One Stop Billing一次性(一站式)帐单Open Identification of MS (authentication re移动台开放标识(鉴权重试)Open loop power control开环功率控制Open Service Architecture开放的业务体系结构OSA Oppurtunity Driven Multiple Access机会驱动的多址接入ODMA Optimal Routing最佳路由Optional storage可选存储Optional UE Requirement用户设备可选要求Orthogonal factor正交因子Orthogonal Frequency Division Multiplex正交频分复用OFDM Orthogonal Variable Spreading Factor正交可变扩频因子OVSF Out-band带外Outage损耗(停工期)Outstanding Alarm突出告警P-TMSI Reallocation Procedure P-TMSI 再分配规程P-TMSI Signature P-TMSI 签名Packed encoding rules分组编码规则PER Packet Data Protocol(信息)包数据协议PDP Packet data protocol分组数据协议PDP Packet Data Protocol States分组数据协议状态Packet Domain Access Interfaces分组域接入界面Packet Domain Core Network Nodes分组域核心网节点Packet Domain PLMN Backbone Networks分组域PLMN骨干网Packet Routing and Transfer Functions分组路由和转发功能Packet switched paging procedures分组交换寻呼规程Packet Switched Service分组交换业务PS Packet Terminal Adaptation Function分组终端适配功能Packet transfer mode(信息)包传送模式Packet-TMSI分组TMSI P-TMSI Padding填充Page indicator寻呼指示(器)PI Paging and notification control function ent寻呼和通知控制功能实体PNFE Paging Block Periodicity寻呼块周期Paging Co-ordination寻呼协商(或寻呼协调)Paging Co-ordination for GPRS GPRS 寻呼协商Paging DRX cycle寻呼DRX周期Paging indicator channel寻呼指示信道PICH Paging Message Receiving Occasion寻呼消息接收时机Paket Data Convergence Protocol分组数据汇聚层协议PDCP Parallel Concatenated Convolutional Code并行卷积码PCCC Parallel interference cancellation并行干扰抵消PIC Path loss路径损耗PU Payload unit有效负载单元、净负载单元,有效PDP Context Activation PDP 上下文激活PDP context activation procedure PDP上下文激活规程PDP Context Deactivation PDP 上下文去激活PDP context deactivation procedure PDP上下文去激活规程PDP Context Modification PDP 上下文修改PDP context modification procedure PDP上下文修改规程PDP Context Preservation PDP 上下文保留PDP context preservation procedure PDP上下文预留规程Peak bit rate峰值比特速率Periodic RA Update Timer Function定时路由区更新定时器功能Personal communication systems个人通信系统PCS Personal digital cellular个人数字蜂窝PDC Personal Service Environment个人业务环境Physical channel data stream物理信道数据流Physical Common Packet Channel公共分组物理信道PCPCH Physical Downlink Shared Channel物理下行共享信道PDSCH Physical Downlink Shared Channel下行共享物理信道PDSCH Physical random access channel物理随机接入信道PRACH Physical shared channel物理共享信道PSCH Pico cell微微蜂窝Pilot pollution导频污染Pilot signal导频信号Plug-in SIM插入式SIM 卡PN-offset planning PN-偏差规划point-to-multipoint service点对多点业务Pole capacity极点容量Ported number转网号码Porting process转网过程Power Control Preamble功率控制前缀PCP Pre-defined virtual connection预定义虚拟连接PVC Pre-paging预寻呼Predictive service可预计业务Preferential access优先接入Primary Common Control Physical Channel主公共控制信道P-CCPCH Primary Common Pilot Channel主公共导频信道P-CPICH Processing Gain处理增益Propagation models传播模型PS mode of operation (for UMTS MS)分组域工作方式 (for UMTS)PS/CS mode of operation (for UMTS MS)分组域/电路域工作方式 (for U Pseudo-range伪范围Public impedance coupling公共阻抗耦合Pulse shaping脉冲形状Pulverized paint易粉化的涂料Purge Function清除功能QoS profile业务质量概况QoS Profile Negotiated协商的服务质量QoS session业务质量对话期Radio Access Bearer无线接入承载RAB Radio Access Network Application Part无线接入网络应用部分RANAP Radio Bearer无线承载RB Radio link addition无线链路增加Radio link controller无线链路控制器Radio link removal无线链路清除Radio Link Set无线链路集Radio Network Controller无线网络控制器Radio Network System无线网络系统RNS Radio Network System Application Part无线网络系统应用部分RNSAP Radio Network Temporary Identifier无线网络临时标识RNTI Radio Priority Levels无线优先级别Radio Resource Functionality无线资源功能Radio Resource Management无线资源管理RRM RAKE combination RAKE合并RAKE receiver RAKE 接收机RAN application part RAN应用部分RANAP Real time实时RT received signal code power接收信号码功率RSCP Received Signal Code Power接收信码功率RSSI Received Signal Strength Indicator接收信号强度指示/接收信号场强Receiver Antenna Gain (dBi)接收天线增益Receiver Noise Figure (dB)接收机噪音系数Receiver Sensitivity (dBm)接收机灵敏度Receiving Entity接收实体Recipient network接收网络Record pointer记录指针Reference configuration参考配置Regional Subscription区域签约Regionally Provided Service地区性业务Registration Area注册区域Registration Function登记功能Relay Function中继功能Relay/Seed Gateway中继/种子网关Relaylink中继链路Reliabilty and availability可靠性和可用性Renewable card续值卡Repeater转发器、中继器、直放站Reriodic RA updates定期路由区更新Residual error rate残余误码率、剩余差错率Resource access资源接入Resource availability资源可获得性Resource unit资源单元RU Reverse Link反向链路Rising edge active上跳沿有效RNS application part RNS应用部分RNSAP Roll-off factor滚动因子Root Relay根中继Routing Area Update路由区更新RAU Routing Function选路功能RRC Connection无线资源控制连接RRC State Machine无线资源状态机Saturation interval饱和区间SDU error probability业务数据单元误码概率SDU loss probability业务数据单元丢失概率SDU misdelivery probability业务数据单元误传送概率SDU transfer delay业务数据单元传输时延SDU transfer rate业务数据单传输速率Secondary Common Control Physical Channel辅助公共控制物理信道、“从”SCCPCH Secondary Common Control Physical Channel从公共控制信道S-CCPCH Secondary Common Pilot Channel从公共导频信道S-CPICH Secondary Synchronization Code从同步码Sector扇区Secured Packet安全包Security audit trail reports安全审计跟踪报告Security Header安全包头Security management object model安全管理对象模型Security measurement Object Model安全统计对象模型Security object classes安全对象类型Seed种子Segmentation And Reassembly分段和重组、分割重组SAR Selection mechanism选择机制Selective RA Update选择性路由区更新Sequence Number, Sequence-number序列号、顺序号码、序号SN Service accessibility performance业务可接入特性Service Announcements业务通知Service Area Identity服务区识别Service bit rate业务比特速率Service Capabilities业务能力Service category业务类别Service Continuity and Provision of VHE via业务连续性以及通过GSM/UMTS提Service delay业务时延Service Execution Environment业务执行环境Service Implementation Capabilities业务执行能力service integrity performance业务一致特性service operability performance业务可操作特性Service Request Procedure业务请求规程Service retainability performance业务可保持特性Service specific co-ordination function特定业务协调功能SSCF Service specific connection oriented protoco面向连接的特定业务协议SSCOP Service Specific Segmentation And Reassembly特定业务拆装子层SSSAR Service-less UE无业务用户设备Serving Mobile Location Center服务移动位置中心SMLC Serving RNC服务RNC SRNC Serving RNS Relocation Procedures服务RNS重定位规程Settlement结算Shannon capacity limit仙农容量限制Shared Resources Module共享资源模块SRM Short Message Mobile Originated短消息发送功能SMMO Short Message Mobile Terminated短消息接收功能SMMT Short Message Service Centre短消息(业务)中心SMSC Signal-Interference Ratio信干比SIR Signal-to-Interference Ratio信干比SIR Signal-to-noise ratio信噪比SNR Signaling ATM adaptation layer for network t网络-网络信令ATM 适配层SAAL-NNI Signaling ATM adaptation layer for user to n用户-网络接口信令ATM 适配层SAAL-UNI Signaling radio bearer信令无线承载SRB Signaling Virtual Connection信令虚拟连接SVC Signals Transfer Board信号转接板WSTB Silence indicator静默指示SID Simple control transmission protocol简单控制传输协议SCTP Simple Mail Transfer Protocol简单邮件传输(送)协议SMTP Simultaneous use of services业务的同时使用Site Selection Diversity TPC基站选择发射分集SSDT Site Selection Diversity Transmission位置选择分集发射SSDT SMS Advanced Cell Broadcast短消息业务高级小区广播Soft Blocking软阻塞Soft Handover软切换SHO Space division duplex空分双工SDD Space Time Transmit Diversity空间-时间发射分集STTD Space Time Transmit Diversity空时发分集STTD Spectral efficiency频谱效率Spectrum allocation频谱分配Spectrum efficiency频谱有效性Speech Path Delay话音路径延迟Spreading扩频Spreading and modulation扩频和调制Spreading code扩频码Spreading Frequency Multi-path composite Acc扩频多路复合接入SSMA SS7 ISUP Tunnelling7号信令系统ISUP隧道ITUN State Changed Event Report状态变更事件报告State Transitions状态迁移Stateless Address Autoconfiguration Procedur无状态地址自动配置规程Static PDP address静态 PDP地址Step步进Storage card存储卡Store-and-forward存储并转发Subscribed QoS预订的服务质量Subscriber Management Function用户管理功能Subscription checking for Basic Services基本业务预定检查Subscription checking for Supplementary Serv补充(附加)业务预定检查Successive interference cancellation连续干扰取消SIC Suitable Cell适合小区Supervision PlugBoard监控接插板XSPB Support of Localized Service Area本地化业务区域支持SoLSA Support of Private Numbering Plan专用编号支持方案SPNP Surface Acoustic Wave (SAW) filter声表面波滤波器Switched transmit diversity分集分组发送STTD Synchronous Transport Mode-1同步传输模式-1STM-1 System frame number系统帧号SFN System Frame Number系统帧号计数器SFN System information block系统消息块SIB Tandem Free Operation免(无)二次编解码操作TFO Target channel type field目标信道类域TCTF Technical specification(s)技术规范TS Telecommunication technology commission (Jap电信技术委员会(日本)TTC Telecommunications Technology Association (K电信技术协会(韩国)TTA Text telephony service文本电话业务TFO call免(无)二次编解码操作的呼叫The Shared InterWorking Function共享互通功能SIWF Time division CDMA, combined TDMA and CDMA时分码分多址TD/CDMA Time Division Duplex时分双工TDDTSTD Time Switched Transmit Diversity时间交换发射分集/时间切换发分Toolkit工具包Transit delay传输时延Transmission Convergence传输汇聚Transmission power control传输功率控制TPC Transmission Time Interval发射时间间隔、发送时间间隔、TTI Transmit adaptive antennas发送适配天线TxAA Transmit Format Combined Indicator发送格式组合指示TFCI Transmit Power Control发送功率控制TPC Transmitter Antenna Gain (dBi)发射天线增益Transparent mode透明模式TRTransport Block传输块Transport Block Set传输块集Transport format传输格式TF Transport Format Combination传输格式组合TFC Transport Format Combination Indicator传输格式组合指示TFCI Transport Format Combination Set传输格式组合集TFCS Transport Format Indicator传输格式指示TFI Transport Format Set传输格式集TFS Tunnel End Point Identifier隧道端点标识TEID Tunnelling Function隧道功能Tunnelling of non-GSM signaling Messages Fun非-GSM信令消息隧道功能Turning point probability转向点概率UE用户设备,用户终端UE Capability用户设备能力UE Service Capabilities用户设备业务能力UMTS Open Service UMTS 开放业务UMTS Subscriber identity module UMTS用户识别卡USIM UMTS Terrestrial radio access (ETSI)UMTS 陆地无线接入UTRA UMTS Terrestrial radio access network UMTS 陆地无线接入网UTRAN UMTS to GSM Inter SGSN Change UMTS to GSM SGSN间变化Unacknowledged Mode非确认模式UM Unconstrained Delay Data非强制时延数据Unencrypted connection未加密连接UMTS Universal Mobile Telecommunications System/U通用移动通讯系统/通用移动电信Universal resource locator通用资源定位器URL Universal Terrestrial radio access (3GPP)全球陆地无线接入UTRA Universal Terrestrial Radio Access Network全球陆地无线接入网UTRAN Unsecured Acknowledgement不安全确认Unstructured Supplementary Service Data未结构化补充(附加)业务数据USSD Unstructured Supplementary Service Data (USS非结构化附加业务数据增强Uplink shared channel上行共享信道USCH Uplink Tunnel上行隧道User Data and GMM/SM signaling Confidentiali用户数据和GMM/SM信令机密性User Determined User Busy (condition)用户决定用户忙(条件)UDUB User Identity Confidentiality用户身份机密性User Plane用户平面UP User procedure for enrolment of CTS-FP无绳电话系统-固定部分登记用户User Registration Area用户注册域URA UTRAN Radio Network Temporary Identifier UTRAN无线网络临时标识U-RNTI UTRAN Registration Area UTRAN 登记区URA UTRAN Registration Area Identity UTRAN 登记区识别Valid LSA合法LSAValid path有效径Variable bit rate service可变比特速率业务Videotelephony视频电话voice broadcast call语音广播呼叫Voice Broadcast Service语音广播业务VBSVoice group call语音组呼叫Voice Group Call Service语音群组呼叫业务VGCS Voice over IP基于IP的语音VoIP Voltage wave shape distortion电压波形失真Warrant reference number许可参照数(截收)Wideband Telephony Services宽带电话业务Wireless video无线视频Work Station工作站WS Zero Forcing迫零准则ZF无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)The process of apportioning charges无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)Adjacent channel interference ratio无线(WCDMA)Adjacent channel leakage ratio, cau无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)The purpose of admission control is无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)A PLMN which is not in the list of 无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)The average transmitter output powe无线(WCDMA)The mean of the total transmitted p无线(WCDMA)无线(WCDMA)Capabilities that are required for 无线(WCDMA)Set of Implementation capabilities,无线(WCDMA)无线(WCDMA)The lowest of all QoS traffic class无线(WCDMA)A service model which provides mini无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)burn-in无线(WCDMA)无线(WCDMA)The UE is in idle mode and has comp无线(WCDMA)A piece of information which indica无线(WCDMA)无线(WCDMA)A link between the card and the ext无线(WCDMA)无线(WCDMA)The C-RNTI is a UE identifier allo无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)An activity utilising telecommunica无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)A GSM GPRS MS can operate in one of无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)A Channel not dedicated to a specif无线(WCDMA)无线(WCDMA)Common Part无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)Connected mode is the state of User无线(WCDMA)无线(WCDMA)The type of association between two无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)A role an RNC can take with respect无线(WCDMA)An interactive service which provid无线(WCDMA)无线(WCDMA)An architectural term relating to t无线(WCDMA)无线(WCDMA)Code which when combined with the n无线(WCDMA)Allows a corporate customer to pers无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)Frequency band that may be allocate无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)The process of deactivating the per无线(WCDMA)无线(WCDMA)无线(WCDMA)无线(WCDMA)。
软件定义数据中心网络中自适应路由技术
软件定义数据中心网络中自适应路由技术
原迪
【期刊名称】《电子产品世界》
【年(卷),期】2022(29)9
【摘要】嵌入软件定义网络(software defined network,SDN)解耦分离架构体系的数据中心网络(data center network,DCN)虽然可为分布式网络控制提供诸多便利,但在应对随机突发数据流时依然面临数据流拥塞、时延等一些列服务质量(quality of service,QoS)问题。
针对该问题提出一种全局自适应路由(adaptive routing technology,ART)算法,助力全网链路以较低的代价成本平滑地转发随机突发模式下的大规模数据流业务。
算法通过设计调用函数提取信源信宿对的所有链路,并引入科学的评估机制对可用路由开展排序,最终筛选出代价最低的全局最佳路由。
考察结果证明,相对于主流研究方案,ART技术对于提升QoS具有良好的表现。
尤
其在应对大规模数据流转发时这样的优势愈加显著。
【总页数】4页(P74-76)
【作者】原迪
【作者单位】启明信息技术股份有限公司
【正文语种】中文
【中图分类】TP3
【相关文献】
1.软件定义数据中心网络混合路由机制
2.基于软件定义数据中心网络的节能路由算法
3.软件定义网络架构下基于流调度代价的数据中心网络拥塞控制路由算法
4.基于软件定义网络的电网数据中心路由策略研究
5.软件定义数据中心网络多约束节能路由算法
因版权原因,仅展示原文概要,查看原文内容请购买。
电信英语词汇大全
of frame
code; A:
Alignment
of frame;
Z: Zero-
string
suppression
; P:
Polarity
G:产生帧码 conversion;
A:帧定位 A: Alarm;
Z:零串抑制 C: Clock
P:极性转换 recovery;
A:告警 C: H: Hunt
时钟恢复 during
H:帧同步重 reframe; O:
搜索 O:局 Office
信令
signaling GAZPACHO
GPRS
GPRS支持节 Support
点
Node
GSN
GSM Public
GSM公众陆地 Land Mobile
移动网
Network GSM PLMN
Enhanced
Data rate
Internet
Message
Internet消 Access
息接入协议 Protocol
IN
Switching
IN交换管理 Management
IP
IP 电话 telephony
IP
multicast
IP 组播技术 technology
IP-policy
IP策略语句 statement
IPX ISP IANA IMAP IN-SM
High
Density
3阶高密度双 Bipolar of
极性码
order 3 HDB3
four-wire
trunk
4线制干线 circuit
No.7
7号信令 signaling
A律
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
662
EURASIP Journal on Wireless Communications and Networking and numerical results are discussed in Section 4. Finally, the summary is presented in Section 5. 2. SCHEME OVERVIEW
the physical properties of the transmission channel can lead to problems such as possible failure at high data loads. The network-data-link level approach is more promising because it combines information from both the network and datalink layer [7, 8]. However, due to dynamic changes in network topology and the difficulties in predicting link states, indirect or estimation approaches are often used (e.g., using signal strength and link lifetime as routing parameters [9]). The obvious problem with such approaches is that the impacts on QoS performance are hard to quantify, since the cross-layer behaviors of mobile networks are not considered. Therefore, most of the proposed routing schemes for mobile networks are only QoS aware, but do not guarantee QoS. To address this problem, appropriate cross-layer cooperation is required. We propose an adaptive scheme to provide QoS information by factoring the impacts of node mobility and lower-layer link parameters into QoS performance. There are many proposals for QoS routing in the literature [7, 10, 11]. Most approaches tend to focus on only one QoS parameter (e.g., packet loss, end-to-end delay, and bandwidth). For example, while many of the QoS-related schemes are successful in reducing packet loss by adding redundancy in the packet [12, 13, 14], they do this at the expense of end-to-end delay. Because packet loss and end-toend delay are inversely related, it may not be possible to find a path that simultaneously satisfies the delay, packet loss, and bandwidth constraints. Some proposed QoS routing algorithms [15, 16, 17] do consider multiple metrics, but without considering cross-layer cooperation. Multipath routing is another type of QoS routing that has received much attention, since it can provide load balancing, fault tolerance, and higher aggregate bandwidth [12, 18, 19]. Although this approach decreases packet loss and end-to-end delay, it is only efficient and reliable if a relationship can be found between the number of paths and QoS constraints. In this paper, we propose a cross-layer cooperation mechanism to support adaptive multipath routing with multiple QoS constraints in an ad hoc network. The cross-layer mechanism provides information on link performance for the QoS routing. It treats traffic distribution, wireless link characteristics, and node mobility in an integrated fashion. That is, it reflects the impacts of lower-layer parameters on QoS performance in higher layers, with emphasis on translating these parameters into QoS parameters for the higher-layer connections. A multiobjective optimization algorithm is used to calculate routing parameters using the cross-layer mechanism. These parameters are adapted to the current network status, determining the number of routing paths and code parity lengths for FEC. In addition, a traffic engineering strategy is used to evenly distribute traffic over multiple paths. The remainder of the paper is organized as follows. Section 2 provides an overview of our cross-layer routing architecture. Three functions (the routing, the local statistic computation, and the integrated decision-making functions) in the routing mechanism are introduced in Section 3. The layered network models used to support the implementation of these functions are also presented in this part. Simulation
EURASIP Journal on Wireless Communications and Networking 2005:5, 661–671 c 2005 H. Sun and H. D. Hughes
Adaptive QoS Routing by Cross-Layer Cooperation in Ad Hoc Networks
There are many routing algorithms proposed for wireless ad hoc networks; a good survey is provided in [1]. Prior work on ad hoc network routing can be categorized based on how the state information is maintained and how the search for feasible paths is carried out. General approaches include source routing [2], distributed routing [3], and hierarchical routing [4]. There are some hybrid methods [5, 6] reported in the literature, and these schemes have been shown to enhance network performance. QoS routing usually involves two tasks: collecting and maintaining up-to-date state information about the network and finding feasible paths for a connection based on its QoS requirements. There are currently several main approaches for QoS routing in ad hoc networks. These approaches can be classified as network level only and combined networkdata-link level [7]. An example of a network-level-only approach is given in [3]. However, it may suffer from several potential problems. For example, while the path is being discovered, only the link bandwidth between neighboring nodes is considered. Because transmissions between neighboring nodes also affect other nodes in ad hoc networks, nt of Computer Science, University of Calgary, Calgary, AB, Canada T2N 1N4 Email: sunh@cpsc.ucalgary.ca