1 System Monitor for Network of Workstations
剑六词汇test1-2
1.demolish demolishereg: Australian sports teams win more than their fair share of titles, demolishing rivals with semming ease.→destroyeg: The heavy rain destroyed all hope of a picnic.→shattereg: The outcome of the conflict shattered our dreams of peace and prosperity.→wreckeg: No one can wreck the friendship between us.2.extensive extensively adv. extensiveness n.eg: A big part of the secret is an extensive and expensive network of sporting academies underpinned by science and medicine.3.underpin underpinning n.eg: A big part of the secret is an extensive and expensive network of sporting academies underpinned by science and medicine.4.youngstereg: Hundreds of younsters and pros live and train under the eyes of coaches.→minoreg: They said their insurance doesn’t cover minors.→youtheg: a youth of twenty5.intensive intensively adv. intensiveness n.eg: Both provide intensive coaching, training facilities and nutritinal advice.6.collaborate collaborator/collaboration n. collaborative adj.eg: The AIS employs more than 100 sports scientists and doctors, and collaborates with scores of others in universities and research centers.→cooperateeg: I advise you not to cooperate with that deceitful businessman.7.instrumenteg: They are baced up by technicians who design instruments to collect data from athletes.→tooleg: The computer is now an indispensable tool in many businesses.→deviceeg: The device will be in production by the end of the year.→apparatuseg: There are some electrical apparatus in the room.→applianceeg: A manual containing operating instructions, as for an appliance or a machine.8.focus focuser n.eg: They all focus on one aim: winning.→concentrateeg: The threat of going bankrupt is very unpleasant but it certainly concentrates the mind.9.slight slighter n. slightish adj. slightness n.eg: No gain is too slight to bother with.→tinyeg: She has a tiny mole on her cheek.10.gradual gradually adv. gradualness n.eg: It's the tiny, gradual improvements that add up to world-beating results.→little by little11.demonstrate demonstratedly adv.eg: To demonstrate how the system works, Bruce Mason at AIS shows off the prototype of a 3D analysis tool for arms moving in slow motion.→showeg: Her laziness showed in her exam results.→clarifyeg: The teacher's explanation clarify the puzzling problem.→proveeg: The old methods proved best after all.12.impact impaction n.eg: With the Cooperative Research Center for Micro Technology in Melbourne, they are developing unobtrusive sensors that will be embedded in an athlete’s clothes or running shoes to monitor heart rate, sweating, heat production or any other factor that might have an impat on an athlete’s ability to run.→affecteg: The climate affected his health.13.remarkably remarkability n. remarkableness n.eg: Since the tests were introduced, AIS athletes in all sports have been remarkably successful at staying healthy.→unusuallyeg: It won't have escaped your notice that I've been unusually busy recently.plex complexly adv. complexness n.eg: Using data is a complex business.→complicatedeg: The tax laws are so complicated that only an expert can provide enlightenment.15.overalleg: All the training is then geared towards making the athlete hit those targets, both overall and for each segment of the race.→totaleg: Add this numbers together and give me the total.→wholeeg: The whole country was anxious for peace.16.transformeg: Techniques like these have transformed Australia into arguably the world’s most sucessful sporting nation.→altereg: The weather alters almost daily.→changeeg: changed the yard into a garden.eg: The solar cell can convert the energy of sunlight into electric energy.17.fixeg: But Australia’s success story is about more than easily copied technological fixes, and up to now no nation has replicated its all-encompassing system.→mendingeg: He had three tries at mending the lock and gave up.18.vast vastly adv. vastness n.eg: The vast expansion in international trade owes much to a revolution in the business of mocing freigt.→enormouseg: They overlooked the enormous risks involved.→giganticeg: The company has made gigantic losses this year, and will probably be out of business.→hugeeg: The atomic explosion is always accompanied by huge fireball.19.expand expandable adj. expander n.eg: While global economy has been expanding at a bit over 3% a year, the volume of of trade has been resing at a compound annual rate of about twice that.→extendeg: My garden extends as far as the river.merceeg: What lies behind this explosion in international commerce?→businesseg: They've done some business together.→tradeeg: China does a lot of trade with many countries.21.declineeg: The general worldwide decline in trade barriers, such as customs and import quotas, is surely one explanation.→descenteg: There was a descent of temperature after rain.→falleg: A fall of rocks blocked the road.22.boomeg: But one force behind the import-export boom has passed all but unnoticed.→groweg: The coat is too big for him now, but he will grow into it.→increaseeg: The government is alarmed by the dramatic increase in violent crime.→thriveeg: A business cannot thrive without good management.23.instantlyeg: Goods, once they have been made, are assumed to move instantly and at no cost from place to→immemdiatelyeg: He began to look for another position immediately.24.dominateeg: International commerce was therefore dominated by raw materials, such as wheat, wood and iron ore, or processed commodities, such as meat and steel.→commandeg: The army is under the king's direct command.→controleg: The government has imposed strict controls over the import of luxury goods.25.requireeg: As a result, less transportation is required for every dollar’s worth of imports or exports.→commandeg: The army is under the king's direct command.→demandeg: This work demands your immediate attention.→ordereg: The chairman ordered silence.26.concentrateeg: Most of the world’s disk-drive manufacturing is concentrated in south-east Asia.→focuseg: Bring the object into focus if you want a sharp photograph.27.purchaseeg: Computer manufactures in Japan or Texas will not face hugely bigger greight bils if they import dreves from Singapore rather than purchasing them on the domestic market.→buyeg: Money can't buy happiness.28.transmiteg: Computer software can be “exported”without ever loading it onto a ship, simply by transmitting it over telephone lines from one country to antoher, so freight rates and cargo-handing schedules become insignificant factors in deciding where to make the product.→dispatcheg: A messenger was dispatched to take the news to the soldiers at the front.→transfereg: He was soon transferred to another post.29.insignificanteg: Computer software can be “exported”without ever loading it onto a ship, simply by transmitting it over telephone lines from one country to antoher, so freight rates and cargo-handing schedules become insignificant factors in deciding where to make the product.→littleeg: He is little known as an artist.→meaninglesseg: His promises were just so much meaningless talk.→slightlyeg: My interest in music has languished slightly.→eg: The damage to my car is negligible.30.swifteg: But, behind the scenes, a series of technological innovations known broadly as containerisation and internodal transportation has led to swift productivity improvement in cargo-handling.→fasteg: They run faster and faster.→hastyeg: She made a hasty lunch.→quickeg: He gave a quick answer to the teacher's question.31.incidenteg: Unusual incidents are being reported across the arctic.→eventeg: This article discussed the events that led to her suicide.→occurrenceeg: It is more a made-up story than a real occurrence.32.isolateeg: There are reports of igloos losing their insulating properties as the snow drips and refreezes, of lakes draining into the sea as permafrost melts, and sea ice bresking up earlier than usual, carring seels beyond the reach of hunters.→isolateeg: Scientists have isolated the virus causing the epidemic.→separateeg: The war separated many families.33.presenteg: Climate change may still be a rather abstract idea to most of us, but in the arctic it is already hacing gramatic effects-if summertime ice continues to shrink at its present rate, the arctic ocean could become vietually ice-free in summer.→currenteg: This word is no longer in current use.34.urgenteg: For the Inuit the problem is urgent.→crucialeg: A crucial problem.→vitaleg: It is vital that we move quickly.35.precariouseg: They live in precarious balance with one of the toughest environments on earth.→unstableeg: Most of the countries in the region have unstable economies.36. tougheg: They live in precarious balance with one of the toughest environments on earth.→hardeg: That was a hard time.→difficulteg: The child is going through a difficult phase.bineeg: They believe their best hope of survival in this changing environment lies in combining their ancestral knowledge with the best of modern science.→blendeg: The poem blends the separate ingredients into a unity.→connecteg: I was surprised to hear them mentioned together: I've never connected them before.→uniteeg: The more of the masses we unite with, the better.38.vasteg: The Canadian arctic is a vast, tressless polar desert that’s convered with snow for most of the year.→largeeg: He has a large number of reference books at his disposal.→hugeeg: The destructive force of the storm is huge.→enormouseg: Long ago enormous animals lived on the earth.39.vanisheg: Somestimes the colonists were successful, sometimes they failed and vanished.→disppeareg: Many beautiful fish are fast disappearing because of the severe pollution.→fadeeg: The closing music fades out when the hero rides off into the sunset.40.emergeeg: But around a thousand years age, one group emerged that was uniquely well adapted to cope with the arctic environment.→appeareg: Mr. Green had to appear before the committee to explain his behavior .41.harsheg: Life for the descendants of the Thule people is still harsh.→rougheg: They complained rough handling by the police.42.abandoneg: Over the past 40 years, most have abandoned their nomadic ways and settled in the territory’s 28 isolated communities, but they still rely heavily on nature to provide food and clothing.→ceaseeg: As suddenly as it began, the rain ceased.→departeg: Jane is filled with sympathy for the misanthropic Rochester. Nevertheless, she realizes shemust now depart.→evacuateeg: The region near the erupting volcano was evacuated rapidly.43.obtaineg: It would cost a family around 7000 pounds a year to replace meat they obtained themselves through hunting with imported meat.→geteg: I've got a cold.→gaineg: He has gained rich experience in these years.→earneg: His skill in negotiating earned him a reputation as a shrewd tactician.→acquireeg: The collector has acquired a fine collection of impressionist paintings.44.scarceeg: Economic opportunities are scarce, and for many prople state benefits are their only income. →rareeg: It's very rare for him to be so late.→sparceeg: The television coverage of the event was rather sparse.45.curtaileg: While the Inuit may not actually starce if hunting and trapping are curtailed by climate change, there has certainly been an impact on people’s health.→compresseg: It is impossible to compress the story of the First World War into a few pages.→condenseeg: Condense this paragraph into a few sentences.46.vitaleg: Having survived there for centuries, they believe their wealth of traditional knowledge is vital to the task..→essentialeg: Food is essential to life.→fundamentaleg: A knowledge of economics is fundamental to any understanding of this problem.47.figureeg: They just figured these people don’t know very much so we won’t ask them.→reckoneg: I reckon this will be a hot summer.→estimateeg: My estimate of the length of the room was 10 feet.48.agendaeg: In fact it is now a requirement for anyone hoping to get premission to do rearch that they consult the communities,who are helping to set the researvh agenda to reflect their most important concerns.eg: His busy schedule made him completely inaccessible to his students.49.turn downeg: They can turn down applications from scientists they believe will work against their interests,or research projects that will impinge too much on their daily lives and traditional activities.→rejecteg: I absolutely reject the management's line on this.→refuseeg: I refuse to be dictated to by you.50.resolveeg: IQ could help to bridge the gap and resolve the tremendous uncertainty about how much of what we’re seeing is natural capriciousness and how much is the consequence of human activity.→settleeg: The two companies settled out of court.→solveeg: Something is bound to happen one way or another to end the conflict or solve the problem. 51.conducteg: A new study conducted for the world bank by murdoch university’s institute for science and technology policy has demonstrated that public transport is more efficient than cars.→manageeg: In spite of these insults, she managed not to get angry.52.demonstrateeg: Technology policy has demonstrated that publiv transport is more efficient than cars.→clarifyeg: A restatement of a text or passage in another form or other words, often to clarify meaning.→displayeg: There will be a display of bronze statuary in this museum next week.→illustrateeg: He pointed at the diagram to illustrate his point.53.maintaineg: This included both the public and private costs of building, maintaining and using a transport system.→sustaineg: The foundations were not strong enough to sustain the weight of the house.→holdeg: Hold yourself still for a moment while I take your photograph.54.demandeg: The explosion in demand for accommodation in the inner suburbs of melbourne suggestes a recent cahnge in many people’s preferences as to where they live.→requireeg: All passengers are required to show their tickets.55.issueeg: Newan says this is a new, broader way of considering public transport issues.eg: The problem is when to get the money we need.→quesitoneg: A new bicycle is out of the question we can't afford it.→caseeg: In your case, we are prepared to be lenient.56.grosslyeg: The auto-dependent city model is inefficient and grossly inadequate in economic as well as environmental terms.→veryeg: She likes Beethoven very much.→quiteeg: It was quite wonderful.57.particulareg: It is common for supporters of road networks to reject the models of cities with good public transport by arguing than such systems would not work in their particular city.→specialeg: This is a special case, deserving special treatment.→peculiareg: There was this peculiar man sitting opposite me in the train.58.featureeg: When it comes to physical features, road lobbies are on stronger ground.→characteristiceg: Her predominant characteristic is honesty.59.favoreg: The more democratic the process, the more public transport is favored.→approveeg: We can't approve of this sort of thing/these sorts of things/things of this sort.→prefereg: He chose Germany, but personally I'd prefer to go to Spain.60.initiallyeg:Trains and cars initally allowed people to live at greater distances without taking longer to reach their destination.→beginningeg: Did democracy have its beginnings in Athens?→primarilyeg: This building was primarily intended to be a dinning hall.61.massiveeg: However, public infrastructure did not keep pace with urban sprawl, causing massive congestion pronlems which now make commuting times far higher.→bigeg: New Y ork is a big commercial city.→hugeeg: The atomic explosion is always accompanied by huge fireball.eg: He has a large number of reference books at his disposal.62.viableeg: There is a widespread belief that increasing wealth encourages people to live farther out where cars are the only viable transport.→practicableeg: The mountain route is practicable only in summer.→feasibleeg: The plan did not seem feasible.63.generateeg: They are often wealthier than their American counterparts but have not generated the same level of car use.→causeeg: What caused his illness?→createeg: We've created a beautiful new building from out of an old ruin.→produceeg: He hopes to find the money to produce a film about Japan.64.starklyeg: A new study makes this point even more starkly.→completelyeg: The plan of the ground floor is completely symmetrical.→entirelyeg: Nowadays with the help of modern instruments fishing is no longer entirely dependent on the weather.→fullyeg: The civil war lasted fully four years.65.approacheg: It found that pushing everyone into the city centre was not the best approach.→accesseg: Citizens may have free accessto the library.66.revealeg: The results of a 14-year study to beannounced later this month reveal that the diseases associated with old age are afflecting fewer and fewer people and when they do strike, it is much later in life.→demonstrateeg: How do you demonstrate that the earth is round?→displayeg: The bottles of whisky on display are all dummies.→exposeeg: He exposed the plan to the newspapers.67.gathereg: In the last 14 years, the national long-term health care survey has gathered data on the health and lifestyles of more than 20000 men and women over 65.→assembleeg: The students assembled in the school garden.→collecteg: Before you begin to make a speech, you should collect your thoughts and ideas.→clustereg: She held out her hand, a small tight cluster of fingers.68.factoreg: But there may be other contributing factors.→elementeg: There is not the least element of truth in his account of what happened.→ingredienteg: Honeysuckle is often an ingredient of some herbal medicine.69.strikingeg: The survey also assessed how independent people over 65 were, and again found a striking trend.→attractiveeg: I think she is a very attractive girl.→outstandingeg: He is a an outstanding writer→noticeableeg: The scar on her forehead is hardly noticeable.→obviouseg: an obvious advantage70.representeg: That represents a significant drop in the number of disabled old people in the population.→symbolizeeg: The poet has symbolized his lover with a flower.→characterizeeg: This kind of behaviour characterizes the criminal mind.71.drawbackeg: But independence can have drawbacks.→disadvantageeg: The school labors under the disadvantage of not having enough textbooks.→flaweg: a flaw in an otherwise perfect character→shortcomingeg: Not being punctual is his greatest shortcoming.→obstacleeg: Her father's opposition remained only their obstacle.72.feateg: One of the first great feast of a young child is learning how to talk, closely followed by learning how to count.→accomplishmenteg: Developing the supersonic jet was quite an accomplishment.→achievementeg: Flying across the Atlantic for the first time was a great achievement.73.facilityeg: From earliest childhood we are so bound up with our system of numeration that it is a feat of immagination to consider the problem faced by early humans who had not yet eveloped this facility.→installationeg: The price of these product will just compensate the cost of equipment and installation of the line.74.sufficienteg: Even the earliest of tribes had a system of numeration that, if not adcanced, was suffient for the tasks that they had to perform.→adequateeg: The town is now counting the cost of its failure to provide adequate flood protection.→enougheg: There is enough food for everybody.→plentyeg: We have plenty of time to finish the job.75.indigenouseg: The indigenous peoples of Tasmania were only able to count one, two, many.→nativeeg: The kangaroo is a native of Australia.→originaleg: The original owner of the house moved out.76.ancienteg: The ancient gothic word for ten, tachund, id used to express the number 100 as tachund tachund.→oldeg: Don’t play the old tricks.→agedeg: Aged people are always envious of young people's energy.→elderlyeg: He was rather elderly with grey hair and clear blue eyes.77.averageeg: The average person in the seventh century in Europe was not as familiar with numbers as we are today.→ordinaryeg: An ordinary subway train, approaching the station, can be twice as loud as the loudest jet.→mediumeg: This cloth is of medium quality.78.fundamentaleg: Perhaps the most fundamental step in developing a sense of number is not the ability to count, but rather to see that a number is really an abstract idea instead of a simple attachment to a group of particular objects.→basiceg: In this course, students receive instruction in basic engineering.→elementaryeg: This elementary school is affiliated to a university.→essentialeg: Her most essential quality is kindness.→primaryeg: He only accepted the primary education off and on in his childhood.79.conceiveeg: It must have been within the grasp of the earliest humans to conceive that four birds are distinct from two birds, however, it is not an elementary step to associate the number 4, as connected with four birds, to the number 4, as connected with four rocks.→thinkeg: If you want to make money you've got to think money.→believeeg: We believe in his ability.→considereg: In judging him you should consider his youth.80.ultimatelyeg: All counting ultimately involves refernce to something other than the things being counted.→finallyeg: Finally the team from Argentina won the championship.→at lasteg: The big moment has come at last!。
CommScope VIRTUAL SMARTZONE产品简介说明书
The Virtual SmartZone network controller—everything you love about SmartZone with the flexibility, on-demand scalability, and low upfront costs of the cloud.
• Reduce IT workloads: Control wired switches, wireless APs, private cloud NaaS offerings, and enterprise network elements all from a single dashboard. Manage the complete network lifecycle—configuration, monitoring, provisioning, discovery, planning, troubleshooting, performance management, security and reporting. SmartZone’s intuitive web interface gives you visibility from the wireless edge to the network core.
The challenge
Large wired and wireless networks can get very complicated in a hurry. Before you know it, you’re managing hundreds or even thousands of wireless access points (APs) and wired switches and supporting multiple Wi-Fi and network-as-a-service (WaaS/NaaS) businesses across complex multitenant architectures.
中兴 ZXR10 8900E 系列交换机数据手册说明书
ZTE ZXR10 8900E Series Switch Data Sheet Updated: Sep 27, 2017Product OverviewThe ZXR10 8900E Series switch is high-end modular switch featuring big switching capacity, L2/L3/MPLS service capability, high-performance, superior reliability and enhanced security. The ZXR10 8900E Series switch is designed for core and aggregation layer of next-generation campus network scenario. The ZXR10 8900E Series switch allows fast, non-blocking switching and has full IPv6 feature. In addition, The ZXR10 8900E Series switch offers a variety of technologies to fulfill better reliability, easy maintenance and low power consumption: VSC2.0(Virtual Switch Cluster), BFD (Bi-directional Forwarding Detection), Zero-touch provisioning, IEEE 802.3az Energy Efficient Ethernet (EEE) etc, which help customer to build future-oriented low TCO(Total Cost of Ownership) networks.The ZXR10 8900E Series switch uses advanced hardware architecture and modular design, up to 10.24Tbps wire-speed switching capacity with high capacity service cards including: 48 x10GE interfaces, 8 x 40GE interfaces, and 4 x100GE interfaces.Coupled with distributed ROSng Software Platform, the ZXR10 8900E Series switch delivers the following products:● 8902E: 2 interface board slots, 2 control board slots and 2 power supply module slots. 4RU, side-to-side airflow.● 8905E: 5 interface board slots, 2 control switching slots and 3 power module slots. 10RU, side-to-side airflow.● 8908E: 8 interface board slots, 2 control switching slots and 3 power module slots. 13RU, side-to-side airflow.8902E 8905E 8908E 8912E 8908E‐H 8912E‐H● 8912E: 12 interface board slots, 2 control switching slots and 3 power module slots. 17RU, side-to-side airflow.● 8908E-H: 8 interface board slots, 2 control board slots, 4 independent switching fabric board slots and 3 power module slots. 17RU, side-to-side airflow.● 8912E-H: 12 interface board slots, 2 control board slots, 4 independent switching fabric board slots and 3 power module slots. 21RU, side-to-side airflow.Product Features• Up to 10.24Tbps Wire-speed Switching Capacity, 4 x 100GE/ 48 x 10GEInterface Card-The ZXR10 8900E Series switch supports up to 10.24Tbps wire-speed switching capacity with up to 1.28Tbps switching capacity per slot. It can deliver customer a sustainable high-performance campus core and aggregation network and carrier aggregation network for next 5 years. -The ZXR10 8900E Series switch line cards covers diverse Ethernet interfaces including: FE/GE/10GE/ 40GE/100GE.The high capacity line cards such as 48 ports wire-speed 10GE, 8 ports wire-speed 40GE and 4 ports wire-speed 100GE can bring customers with infinite bandwidth capability. Meanwhile, in the scenario that only need a few 10GE and GE interfaces, the 10GE and GE interface mixed line card can be deployed in order to help customer increase the line card usage and save investment.• Innovative VSC2.0 (Virtual Switch Cluster) Technology-VSC2.0 Capability: Stacking bandwidth between the VSC switches can be up to 320Gbps, which can solve the bandwidth bottleneck of VSC and deliver customer a real-time non-blocking VSC system. By using optical Ethernet interface for stacking, the stacking distance can be up to 80km and even more, it helps customer to get rid of distance restriction while designing a reliable VSC system. -Reliability: Independent out-band management makes the control plane and forwarding plane separated. Through real-time control information hot-standby technology, the VSC system can achieve seamless switchover when failure happens.- Saving investments: No need special stacking line card, the normal line card can be used for VSC connecting. When some interfaces are used for VSC, the other interfaces on this line card can also be used for traffic forwarding. No interfaces are wasted and that helps customer to save investments.- Flexibility: Master and slave in VSC2.0 works in 1+N redundancy mode, MAD(Multi-active Detect) technology is used to detect and avoid dual master in VSC system when failure happens. Together with real-time hot-standby and seamless switchover it brings customer a more flexible VSC network.• Powerful Service Bearing Capability-By supporting rich L2 switching and L3 routing functions and low latency forwarding, The ZXR10 8900E Series switch can bear lots of service including WLAN, Internet, Voice, Video, Enterprise private network and other data services. -Support distributed L2/L3 MPLS VPN; support VPLS, H-VPLS and VPWS. The ZXR10 8900E Series switch can also support MCE. By supporting these features, it delivers customer VPN service capability. -Support comprehensive L2/L3 Multicast protocols; support PIM-SM, PIM-DM, PIM-SSM, MLD and IGMP Snooping, fulfill the requirements for IPTV, multi-terminal high-definition video surveillance and video conferencing services. -Support POE/POE+ interface card, which delivers customer more flexible service access choice.• Comprehensive IPv6 Solution-The ZXR10 8900E Series switch has passed IPv6 Ready Phase 2 Gold Medal Certification issued by IPv6 Forum. -Support rich IPv6 unicast routing protocols: IPv6 static routing, RIPng, OSPFv3, IS-ISv6, and BGP4+ and multicast features: MLD v1/v2, MLD snooping, PIMv6, etc. -Support rich IPv4-to-IPv6 tunnel technologies: IPv6 manual tunnels, 6-to-4 tunnel, ISATAP tunnel and IPv4-compatible automatic tunnel, etc.• Enhanced Reliability, Multi-Dimensional Security-Control plane and forwarding plane are physically separated on the ZXR10 8900E-H Series switch. -All the key components of the ZXR10 8900E Series switch are redundant design and hot pluggable, including: main control boards, switching boards, power supply modules, fan modules. -Support GR (Graceful Restart) to realize non-stop forwarding for OSFP/BGP/IS-IS to reduce the affection brought by network failures. -Support Ethernet OAM, including IEEE 802.3ah, 802.1ag, Y .1731, and help to monitor network real-time operating status and fulfill fast fault detection, fault location. -Support various authentication methods such as 802.1x, Radius, TACACS+. Support CPU overload protection, anti-DDOS, deliver customer a security network. -The ZXR10 8900E supports MAC security (MACSec) that enables hop-by-hop secure data transmission. Therefore, the ZXR10 8900E can be applied to scenarios that need high requirements on data confidentiality, such as government and finance sectors.• Easy Maintenance, Saving OPEX-Support independent monitoring plane, which can monitor the working temperature, fan situation, power situation, etc. It can help customer hold the network running status in real time. -Support Zero-touch provisioning, the software and the configuration files can be loaded automatically, Reduce provision process and man power requirement. -Support the SQA (Service Quality Analyzer), detecting the network quality periodically or in real time. In order to provide better quality of service for more valuable services.• Green for More-Support IEEE 802.3az EEE (Energy Efficient Ethernet), via chip-grade power management, interfaces and line card can automatically sleep when no traffic.- Side-to-side shoot-through airflow increases the heat dissipation efficiency. Save up to12% overall power consumption.- The fan rotational speed can be automatically and manually adjusted by 5 levels in accordance with the temperatures inside the switch. It not only saves the power consumption, but also reduces the noise and extends the life cycle of fans.- Complying with ROHS, WEEE and ISO14001 certification, No plumbum (Pb) in not only product materials but also the whole processing technic. Meanwhile, use re-cycles degradable packing materials, practice green for more.System SpecificationParameters 8902E 8905E 8908E 8912E 8908E-H 8912E-H Height 4RU 10RU 13RU 17RU 17RU 20RU Dimensions (H*W*D, mm) 175*442* 420 442*442* 446 575*442* 446 753*442* 446 753*442* 446 889*442* 446 Switching Capacity 960Gbps4.8Tbps7.68Tbps7.68Tbps10.24Tbps10.24TbpsPacket ForwardingRate 720Mpps 3,600Mpps 5,760Mpps 5,760Mpps 7,680Mpps 7,680MppsNumber of Line Card Slots 2 5 8 12 8 12Number of Main ControlSlots 2 2 2 2 2 2Number of Switching Card Slots N/A N/A N/A N/A 4(3+1) 4(3+1)Interface Type FE/GE RJ45; GE SFP; 10GE SFP+; 40GE CFP; 40GE QSFP+; 100GE CFP2 Weight <24kg<51.8kg<65.5kg<90.6kg<77.4kg<98.9kgAC Power Supply Rated input voltage range: 100V~240V,50Hz~60Hz Max input voltage range: 90V~286V, 47Hz~63HzDC Power SupplyRated input voltage: -48V/-60V Input voltage range: -72V ~ -40VParameters 8902E 8905E 8908E 8912E 8908E-H 8912E-HHVDC Power Supply 240V/336VPower Consumption <576W <1,589W <2,278W <3,217W <2,624W <3,565W Max POE Consumption 1300W 4250W5100W5100W5100W5100WPower Redundancy Pattern AC/ DC: 1+1AC/DC :2+1/1+1Heat Dissipation Pattern Fan cooling,independent fan subracks, Side-to-Side AirflowHeat Dissipation <1,611 BTU/h <4,445 BTU/h <6,373 BTU/h <9,000 BTU/h <8,471 BTU/h <9,425 BTU/hWorking Temperature Long term working temperature: -5o C ~ +45o C; Short term working temperature: -10o C ~ +55o C;Storage temperature -40o C ~ +70o C Working Humidity 5%~95% (non-condensing)Working Altitude <3,000 metersMTBF/MTTR>200,000 hours/ <30 minutesService SpecificationFunctionThe ZXR10 8900E Series SwitchL2 Features Support IEEE 802.1p (COS), IEEE 802.1q (VLAN), IEEE 802.3x Support IEEE 802.1d (STP)/ 802.1w (RSTP)/ 802.1s (MSTP) Support IEEE 802.1ad (QinQ), Selective QinQSupport IEEE 802.3ad (LACP), MC-LAG (Multi-Chassis Link Aggregation Group)Support IEEE 802.3z (1000BASE-X) / 802.3ab (1000BaseT) Support IEEE 802.3ae (10Gbase), Support IEEE 802.3ba (40Gbase) Support IEEE 802.3ba (100Gbase)Support IEEE 802.3af (PoE), IEEE 802.3at (PoE+)Support Port mirroring, Traffic mirroring Support VLAN switching, VLAN translation Support PVLAN, SuperVLAN Support GVRP Support LLDPL3 FeaturesSupport IPv4 routing protocols, such as Static routing, Policy based routing , RIP, OSPF, BGP, and IS-ISSupport DHCP server/ relay/proxy, DHCP snoopingSupport IPv6 dynamic routing protocols, such as Static routing, Policy based routing , RIPng, OSPFv3, ISISv6, and BGP4+ Support ND, DHCPv6, PMTUSupport manual IPv6 tunnel, 6to4 tunnel, 6PE, ISATAP tunnel MulticastSupport IGMP v1/v2/v3, IGMPv1/v2/v3 snoopingSupport PIM-SM, PIM-DM, PIM-SSM, MSDP, MBGP, Any-RPSupport administratively scoped multicast/ IPTV, MVR, Support MLD V1/V2、MLD V1/V2 Snooping Support PIMv6MPLSSupport basic MPLS functions, LDPSupport MCESupport VPLS,VPWS, H-VPLS Support MPLS L2 VPN, MPLS L3 VPNQOSSupport traffic classification based on Layer 2 headers, Layer 3 protocols, Layer 4 protocols, and 802.1p prioritySupport queue scheduling algorithms, such as SP, WRR, DWRR, SP+WRR Support congestion avoidance mechanisms, such as WRED and tail drop Support policing/shaping based on port/flow SecuritySupport L2-L4 ACLSupport Ingress/ Egress ACLSupport 802.1x authentication and 802.1x serverSupport MAC authenticationSupport AAA/ RADIUS and TACACS+ authentication for login users Support SSH v1.0/v2.0 serverSupport CPU anti-attack, CPU overload protection, Support STP Root Guard, BPDU guard,Support URPFSupport RIP/OSPF/BGP MD5 encryption checking Support MACsecEquipment managementSupport CLI, Telnet, SSH, Local and remote (Radius/Tacacs+) authentication of user Support SNMP v1/v2/v3Support RMON Support NTP Support Syslog, Sflow Support openflow1.3ReliabilitySupport VSC2.0(Virtual Switch Cluster)Support 1+1/2+1 Redundant Control module/Power supply/Fan module Support 3+1 redundancy switching boards (Only 8900E-H) Support Hot plugging Support LACP , MC-LAGSupport ZESR/ZESR+ (ZTE Ethernet Switch Ring) Support ERPS V2Support VRRP,VRRPv3,VRRPE Support NSF/GR for OSFP/BGP/IS-IS Support BFD for VRRP/ BGP/ IS-IS/ OSPF Support Ethernet OAM (802.1ag and 802.3ah) Support ITU-Y.1731Application ScenarioAggregation in Campus NetworkThe ZXR10 8900E Series switch can be used in the next-generation campus network aggregation scenarios as the core/aggregation layer devices. The ZXR10 8900E Series switch supports powerful service capability such as L2/L3/MPLS, IPv6, POE, which provides 100GE, 40GE, high-density 10GE interfaces and fulfills the bearing requirements of WLAN, Voice, Video, Surveillance etc. It can be used to build the high-reliability, extendable, secure, manageable data switching network to provide the comprehensive product solution.Order InformationChassisRS-8902E-CHS 8902E assembly chassis 8905E-CHS2-AC 8905E AC assembly chassis 8905E-CHS2-DC 8905E DC assembly chassis 8908E-CHS2-AC 8908E AC assembly chassis 8908E-CHS2-DC 8908E DC assembly chassis 8912E-CHS2-AC8912E AC assembly chassis8912E-CHS2-DC8912E DC assembly chassis 8908E-H-CHS-AC8908E-H AC assembly chassis 8908E-H-CHS-DC8908E-H DC assembly chassis 8912E-H-CHS-AC8912E-H AC assembly chassis 8912E-H-CHS-DC 8912E-H DC assembly chassisControl Switching Board 8902EMCS1A8902E 1A type control switching board 8902EMCS1D8902E 1D type control switching board 8905EMCS1A8905E 1A type control switching board 8905EMCS1D8905E 1D type control switching board 8905EMCS3A8905E 3A type control switching board 8905EMCS3E8905E 3E type control switching board 8908EMCS1A8908E 1A type control switching board 8908EMCS1D8908E 1D type control switching board 8908EMCS3A8908E 3A type control switching board 8908EMCS3E8908E 3E type control switching board 8912EMCS1A8912E 1A type control switching board 8912EMCS1D8912E 1D type control switching board 8912EMCS3A8912E 3A type control switching board 8912EMCS3E 8902E 3E type control switching boardMain Control Board8900EHMCUA 8900E-H main control board Switching Fabric Board8900EHSFU3A8900E-H Type A switching fabric board 8900EHSFU3E 8900E-H Type B switching fabric board Power Supply Module8902E-ACPWA8902E AC power supply module 8902E-DCPWA8902E DC power supply module 8900E-ACPWA8905E/8908E/8912E/8908E-H/8912E-H AC power supply module 8900E-DCPWA 8905E/8908E/8912E/8908E-H/8912E-H DC power supply module Fan Supply Module8902E-FAN8902E fan subracks 8905E-FAN8905E fan subracks 8908E-FAN8908E fan subracks 8912E-FAN8912E fan subracks 8908E-H-FAN8908E-H fan subracks 8912E-H-FAN 8912E-H fan subracks100M/1000M Ethernet electrical interface cardsS1GT24A24-port 10/100/1000 BASE-T interface card (S1, RJ45) S1GT48A 48-port 10/100/1000 BASE-T interface card (S1, RJ45) S1GP48A48-port 10/100/1000 BASE-T interface card (S1, RJ45, POE/POE+) H1GT48A48-port 10/100/1000 BASE-T interface card (H1, RJ45) H2GT48D 48-port 10/100/1000 BASE-T interface card (H2, RJ45)100M/1000M Ethernet optical interface cardsS1GF24A24-port 100/1000 BASE-X interface card (S1, SFP) S1GF48A 48-port 100/1000 BASE-X interface card (S1, SFP)H1GF24A24-port 100/1000 BASE-X interface card (H1, SFP) H1GF48A48-port 100/1000 BASE-X interface card (H1, SFP) H2GF24D24-port 100/1000 BASE-X interface card (H2, SFP) H2GF48D 48-port 100/1000 BASE-X interface card (H2, SFP)10GE Ethernet optical interface cards S1XF12A12-port 10G BASE-X interface card (S1, SFP+) S2XF48A48-port 10G BASE-X interface card (S2, SFP+) H1XF4A4-port 10G BASE-X interface card (H1, SFP+) H1XF8A8-port 10G BASE-X interface card (H1, SFP+) H1XF16A16-port 10G BASE-X interface card (H1, SFP+) H1XF32A32-port 10G BASE-X interface card (H1, SFP+) H2XF8D8-port 10G BASE-X interface card (H2, SFP+) H2XF48C48-port 10G BASE-X interface card (H2, SFP+) H3XF12D 12-port 10G BASE-X interface card (H3, SFP+) 10 GE and GE optical/electrical interface cardsH1GF28C12X2C2-port 10GE BASE-X and 28-port GE BASE-X (12-port Combo) interface card (H1,SFP+/SFP/RJ45) H1GF28C12X4C4-port 10GE BASE-X and 28-port GE BASE-X (12-port Combo) interface card (H1,SFP+/SFP/RJ45) H1GT28C12X2B2-port 10GE BASE-X and 28-port GE BASE-T (12-port Combo) interface card (H1,SFP+/SFP/RJ45) H1GT28C12X4B 4-port 10GE BASE-X and 28-port GE BASE-T (12-port Combo) interfacecard (H1,SFP+/SFP/RJ45)40GE Ethernet optical interface cardsS2LQ6L2A 8-port 40GE BASE-X interface card (S2, 2 port CFP, 6 port QSFP+) 100GE Ethernet optical interface cardsH2UC2C2-port 100GE BASE-X interface card (H2, 2 port CFP2) H2UC4C 4-port 100GE BASE-X interface card (H2, 2 port CFP2) 10GE WAN optical interface cardsH1XW4B 4-port 10G BASE-X interface card (H1, SFP+) Software R8900E-SW-BASIC8900E Basic System Software R8900E-SWUD8900E Basic System Software Upgrade SWLIC-MPLS 8900E MPLS Software ServiceNO. 55, Hi-tech Road South,ShenZhen,P. R. China Postcode: 518057Web: Tel: +86-755-26770000Fax: +86-755-26771999。
介绍北斗卫星导航系统的研发应用英语作文
介绍北斗卫星导航系统的研发应用英语作文全文共10篇示例,供读者参考篇1Hi everyone, do you know about the Beidou Satellite Navigation System? It's super cool and I'm going to tell you all about it!The Beidou Satellite Navigation System is a super smart system that helps us know where we are and how to get where we want to go. It was developed by China and has been in the works for a long time. The Beidou system has a bunch of satellites up in space that send signals to our devices to show us where we are on a map. Isn't that amazing?The Beidou system is not just for helping us find our way, it also has a lot of other uses too. It can be used for things like tracking ships and airplanes, monitoring weather conditions, and even helping with disaster relief efforts. The Beidou system is like a superhero up in space, always ready to help us when we need it.I think the Beidou Satellite Navigation System is super cool and I can't wait to see what else it can do in the future. It's likehaving a super smart friend who always knows where to go and how to get there. I hope you learned something cool about the Beidou system too!篇2North Star Satellite Navigation System is super cool! It was developed by super smart scientists and engineers to help us find our way around the world. Isn't that awesome?First of all, let me tell you what the North Star Satellite Navigation System is. It's a system of satellites that orbit the Earth and send signals to our phones, cars, and other devices. These signals help us figure out where we are and how to get where we want to go. It's like having a super smart friend who knows all the roads and shortcuts!The North Star Satellite Navigation System is super important because it helps us in so many ways. For example, when we go on a road trip with our family, we can use it to find the best route and avoid getting lost. We can also use it to find our friends' houses, restaurants, and other cool places. It's like having a magical map that shows us everything!But wait, there's more! The North Star Satellite Navigation System is also used in airplanes, ships, and even self-driving cars.It helps them navigate safely and efficiently, making travel much easier for everyone. It's so cool to think that something up in space can help us down here on Earth.In conclusion, the North Star Satellite Navigation System is super awesome and super helpful. It's like having a superpower that helps us find our way in the world. So next time you use your phone to get directions, remember to thank the super smart scientists and engineers who made it all possible. Thank you, North Star Satellite Navigation System!篇3Hey guys, do you know about the Beidou Satellite Navigation System? It's a really cool system that helps us find our way around using satellite technology. Let me tell you more about it!The Beidou Satellite Navigation System is a space-based satellite navigation system developed by China. It was named after the Chinese term for the Big Dipper constellation, which is also known as the Northern Star. Just like how we use the stars to navigate, the Beidou system uses a network of satellites to provide accurate positioning, navigation, and timing services to users all around the world.One of the coolest things about the Beidou system is that it can be used for a variety of purposes. For example, it can be used for transportation, such as guiding ships at sea or helping airplanes navigate safely. It can also be used for disaster relief efforts, as it can help rescue teams locate people in need of help. And it can even be used for everyday activities like hiking or driving, to make sure we don't get lost!The Beidou system is constantly being improved and upgraded to make sure it continues to provide accurate and reliable services. With more satellites being launched into space and new technologies being developed, the Beidou system is becoming even more powerful and useful for people all over the world.So next time you're traveling or just exploring your neighborhood, remember to thank the Beidou Satellite Navigation System for helping you find your way! It's like having your own personal guide in the sky. Cool, right?篇4Hey guys, have you ever heard of the BeiDou Satellite Navigation System? It's super cool and I'm gonna tell you all about it!satellite navigation system developed by China. It provides global positioning, navigation, timing, and short messaging services to users around the world. The system consists of a network of satellites that orbit the Earth and communicate with ground stations to provide accurate positioning information.One of the main applications of the BeiDou Satellite Navigation System is in transportation. It helps drivers navigate to their destination using GPS technology, making it easier to find your way around unfamiliar places. This is especially useful for long road trips or when driving in a busy city.Another cool application of the BeiDou system is in agriculture. Farmers can use the system to track their crops, monitor soil conditions, and optimize irrigation and fertilization. This helps increase crop yields and reduce waste, making farming more efficient and sustainable.The BeiDou system is also used in disaster management. During natural disasters such as earthquakes or floods, the system can provide real-time positioning information to emergency responders, helping them locate and rescue people in need. This can save lives and reduce the impact of disasters on communities.useful technology that makes our lives easier and safer. Next time you're lost or need help, just remember that BeiDou is there to guide you!篇5Hello everyone! Today I'm going to talk about the Beidou Satellite Navigation System. Have you heard of it before? It's a really cool system that helps us find our way around using satellites in space.The Beidou Satellite Navigation System was developed in China and it's similar to the GPS system that you might have on your phone. It uses a network of satellites to determine your location and give you directions to where you want to go. Isn't that amazing?One of the great things about the Beidou system is that it's not just for regular people like us to use. It's also used in all kinds of different industries, like transportation, agriculture, and even in emergency situations. For example, it can help ships navigate the seas, assist farmers in planting crops more efficiently, and provide accurate location information for search and rescue operations.The Beidou system has been in development for many years and it's constantly being improved to make it even better. With more satellites being launched into space, the system is becoming more accurate and reliable than ever before. This means that we can rely on it to help us find our way no matter where we are.So next time you're using a map on your phone or getting directions from your car's GPS, remember that it's all thanks to amazing technology like the Beidou Satellite Navigation System. It's truly a wonder of modern science that makes our lives easier and more convenient. Let's give a big round of applause to all the scientists and engineers who have worked hard to make it possible! Thank you for listening!篇6Hello everyone, today I want to introduce to you the Beidou Satellite Navigation System. Have you ever heard of it before? It's a really cool technology that helps us find our way around using satellites in space.The Beidou Satellite Navigation System was developed by China and it is similar to the GPS system in the United States. It has been in development for many years and now it is used notonly for navigation purposes, but also for things like weather forecasting, agriculture, and even helping with disaster relief efforts.One of the coolest things about the Beidou system is that it is made up of a network of satellites that orbit the Earth. These satellites send signals to devices like our smartphones or GPS devices, which then use those signals to determine our location. This is how we can use our phones to get directions, find nearby restaurants, or even track our exercise routes.The Beidou system has also been used in many other applications. For example, farmers can use it to optimize the use of water and fertilizers in their fields, which can help increase crop yields. It is also used in transportation to track vehicles and improve logistics efficiency. In emergency situations, like natural disasters, the Beidou system can be used to coordinate rescue efforts and deliver aid to people in need.Overall, the Beidou Satellite Navigation System is a really amazing technology that has many important applications. It is changing the way we navigate, communicate, and even help others in times of need. I think it's really cool that we have this kind of technology available to us and I can't wait to see what other ways it will be used in the future. Thank you for listening!篇7Hey guys, do you know about the Beidou Satellite Navigation System? It's a really cool technology that helps us figure out where we are on the Earth! Today, I'm going to introduce to you all about the research and applications of the Beidou Satellite Navigation System.The Beidou Satellite Navigation System is a Chinese satellite navigation system that was developed by China Aerospace Science and Technology Corporation. It is made up of a network of satellites that orbit around the Earth and send out signals to our devices on the ground. These signals help us determine our exact location, speed, and direction.One of the main uses of the Beidou Satellite Navigation System is in transportation. It helps pilots to navigate their airplanes, ships to find their way at sea, and even helps us find our way when driving in our cars. The Beidou System is also used in agriculture to help farmers plant crops more efficiently and monitor their fields. It can even help us with emergency services, like finding people who are lost in the wilderness.The Beidou Satellite Navigation System is constantly being improved and expanded. China is planning to launch moresatellites to improve the accuracy and coverage of the system. They are also working on integrating the Beidou System with other satellite navigation systems, like GPS, for even better performance.In conclusion, the Beidou Satellite Navigation System is a super cool technology that helps us navigate our way around the world. It's constantly being improved and expanded, and who knows what other amazing things it will help us do in the future!篇8Hey guys! Do you know about the Beidou Satellite Navigation System? It's super cool and I'm going to tell you all about it!The Beidou Satellite Navigation System is a satellite navigation system developed by China. It consists of a network of satellites that provide positioning, navigation, and timing services to users all over the world. The system is similar to GPS, which many of you might be familiar with, but Beidou is more accurate and reliable.The Beidou system has many different applications. One of the most important is in transportation. It helps people navigate while driving, flying, or even sailing. This way, people can reachtheir destinations more easily and safely. It also helps with things like tracking the movement of cars, ships, and airplanes.Another cool thing about the Beidou system is that it can be used for things like agriculture. Farmers can use it to track their crops, monitor weather conditions, and even control irrigation systems. This helps them increase their crop yields and make their farms more efficient.The Beidou system is also used in disaster relief. When there's a natural disaster like an earthquake or a flood, the system can help rescue teams locate people in need of help. This can save lives and ensure that aid gets to the right places quickly.In conclusion, the Beidou Satellite Navigation System is an amazing technology that has many important applications. It's making our lives easier, safer, and more efficient. So next time you're out and about, remember to thank Beidou for helping you get where you need to go!篇9Hello everyone, today I'm going to talk about something super cool - the BeiDou Satellite Navigation System!The BeiDou Satellite Navigation System is like a super smart GPS that helps us find our way around. It was developed by China and has been in the works for many years. The system uses a network of satellites to provide accurate positioning, navigation, and timing services to users all over the world.One of the main reasons why the BeiDou Satellite Navigation System is so awesome is because it can provide more accurate and reliable navigation services compared to other navigation systems. This is super important for things like driving, flying, and even for activities like hiking and camping. With BeiDou, we can always find our way home!Another cool thing about the BeiDou Satellite Navigation System is that it has been used in a variety of applications. For example, it's used in transportation to help vehicles navigate and avoid traffic jams. It's also used in agriculture to help farmers optimize their planting and harvesting schedules. And it's even used in search and rescue operations to locate people in distress.In addition to all these applications, the BeiDou Satellite Navigation System is also being used in scientific research and exploration. Scientists use the system to track the movement of glaciers, study earthquakes, and even monitor the migrationpatterns of animals. It's incredible how this technology is being used to help us understand and protect our planet.Overall, the BeiDou Satellite Navigation System is agame-changer in the world of navigation and positioning. It's reliable, accurate, and versatile, making it an essential tool for so many different industries and activities. I can't wait to see how this amazing technology continues to evolve and improve in the future!That's all for my introduction to the BeiDou Satellite Navigation System. I hope you enjoyed learning about this incredible technology. Thanks for listening!篇10Hello everyone! Today I want to talk to you about the BeiDou Satellite Navigation System. Have you ever heard of it before? It's a really cool system that helps us find our way around using satellites in the sky!First of all, let me tell you a little bit about how the BeiDou system works. There are a bunch of satellites up in space that send signals down to Earth. Our phones or cars can pick up these signals and use them to figure out where we are and how to getto where we want to go. It's like having a map that knows exactly where you are all the time!The BeiDou system was developed in China and has been used for all kinds of things. For example, it helps farmers figure out where to plant their crops and how to take care of them. It also helps drivers navigate busy roads and find the fastest way to get to their destination. And in emergencies, it can even be used to send out distress signals and get help quickly.But the BeiDou system isn't just for practical things – it's also used in all kinds of fun ways. For example, people use it to play games where they have to find hidden treasures using their GPS. And some athletes use it to track their workouts and see how far they've run or cycled.In conclusion, the BeiDou Satellite Navigation System is a really amazing invention that helps us in so many different ways. Whether we're trying to get to a new place or just having fun exploring, BeiDou is always there to guide us. So next time you're out and about, remember to thank the satellites up in space for helping you find your way!。
How_These_5_Countries_and_Regions_Are_Fighting_Des
China
F
irst on our list of how countries are fighting Research shows that currently 27.4% of land in China has undergone deserti-fication, affecting about 400 million 五地治理荒漠化的经验
扫码听读
8 为阻止荒漠化,约旦正在落实由北约和平与安全科学计划资助的一项工程。
科学家目前正在巴迪亚地区1400平方千米的耶尔穆克盆地开展研究。
由于风和水的侵蚀,这一地区大部分土地正处于土壤急速流失的危机之中,这会造成荒漠化。
研究人员将采用遥感工具和地理信息系统模型,开发出一个监控土壤、水、植被和气候变化的系统。
这样便可以提醒约旦政府关注正在发生。
一个支持proactive特性的通用型事件监控系统
第32卷 第4期2009年4月计 算 机 学 报C HIN ESE J OU RNAL OF COM PU TERSVol.32No.4Apr.2009收稿日期:2008212208;最终修改稿收到日期:2009201215.本课题得到国家“八六三”高技术研究发展计划项目基金(2006AA01Z451,2007AA01Z474)、信息产业部电子发展基金(信部运[2006]634号)资助.刘家红,男,1980年生,博士研究生,主要研究方向为分布对象计算、面向服务的计算、事件流处理.E 2mail :kahon @.吴泉源,男,1941年生,教授,博士生导师,主要研究领域为分布对象计算、人工智能.ProSPer :一个支持proactive 特性的通用型事件监控系统刘家红 吴泉源(国防科学技术大学计算机学院网络与信息安全研究所 长沙 410073)摘 要 大规模网络安全监控应用中需要对网络安全态势进行动态评估,在网络出现重大安全风险前进行proac 2tive 特性的有效防范.把网络安全监控系统建模为事件监控系统,对满足复合时序和属性值逻辑关系的多个事件进行关联,把多个原子事件复合为语义更丰富、更抽象的复合安全事件.已有研究提出了不同的复合事件检测模型,但缺乏proactive 的事件监控能力.基于时序关系并不能提高事件监控的预测能力的假设,设计了基于top 2k 复合事件检测模型的事件监控系统ProSPer ,为网络安全监控等应用系统提供proactive 特性的事件监控能力.与已有的复合事件检测系统相比,ProSPer 检测复合事件时无需读取全部成分事件,这种proactive 特性是非常有意义的设计.关键词 网络安全;事件监控;事件流处理;复合事件;proactive 特性中图法分类号TP311 DOI 号:10.3724/SP.J.1016.2009.00773ProSPer :A Proactive Event Monitor for G eneral PurposesL IU Jia 2Hong WU Quan 2Yuan(I nstit ute of N et w ork Technolog y &I nf ormation S ecurit y ,S chool of Com puter ,N ational Universit y of Def ense Technolog y ,Changsha 410073)Abstract Network security monitor of large scale demands dynamic ,continuous evaluation of security sit uation ,proactive protection against app roaching network risks.If t he aut hors model security monitors as continuo us Event Monitor Systems ,t hat is to say ,to correlate multiple e 2vent s in complex temporal relationship and att ribute logic relationship to richer semantic ,more abst ract complex event in security domain.Much works has st udied to design complex event de 2tection model but t hey lack t he proactive capability to monitor event.Based on t he assumption t hat temporal relationship does not improve t he p redictive ability of event monitor ,t he aut hors design a p roactive event monitor system Pro SPer for application do mains like sit uation evaluation for network security and present a fast top 2k based algorit hm to detect complex event s.Current event detection techniques require t he f ully read of relevant records ,while t he new met hod only needs partial read ,t hus t his p roactive capability is desirous.K eyw ords network security ;event monitor ;event st ream processing ;complex event ;p roactive capability1 引 言Proactive 特性是与reactive 相对的,指能感知状态变化,并在这些变化产生对自身的影响前主动采取行动的一种特性.在基于监控的应用中,存在很多需要p roactive 特性的需求.例如,大规模网络安全监控应用中需要对网络安全态势进行动态评估,在网络出现重大安全风险前进行有效防范以减小损失.实时企业为了主动、准确且详细地获取关于库存、生产、市场等相关信息,以便企业能及时决策,实现企业最大效益,通常会使用RFID 、无线传感器网络等智能物件来对生产、物流情况进行全局把握和预测[1];使用业务流程监控系统来主动地获取业务运营情况,以保证业务流程的合规性,留住客户,同时还可以发现潜在客户,拓展业务[2].这些应用通过对连续到达的领域信息进行分析处理,为了最大化收益和最小化损失,通常需要proactive 特性的处理能力.2 动 机事件监控系统处理的通常都是连续到达的信息,需要对这些信息进行实时、连续的监控和分析.事件流处理是对快速连续到达的事件进行计算的技术,用于事件系统运行时对事件进行监控以及辅助构造事件驱动系统.根据应用领域的不同需求,事件流处理对连续到达的信息有不同的数据模型以及相应的处理模型.这些模型在结构模型和处理模型上都是事件驱动处理的特例,区别在于其对连续到达信息的速率的承受能力和对一致性的保证[3].连续到达的信息的复合时序关系和时序关系上值属性的逻辑关系代表上层应用感兴趣的复合事件,体现了上层应用的业务逻辑,事件流处理系统依此对这些复合事件进行检测,连续输出经过复合后的结果事件,以触发相应的后继处理[3].目前,在线事件流处理系统通常采用图1所示的体系结构.对复合事件E =A op B 的检测过程大致如下,其复合事件的检测是观察到复合事件的终结事件(成分事件中时序上最后一个事件)时开始的:(1)当事件类型B 的实例b 进入系统时,监控器注意到复合事件E 的终结事件实例出现,告知事件处理器;(2)事件处理检查复合事件表达式,获知复合事件由两个顺序的原子事件组成,即A ,B ;(3)根据事件表达式,考察事件历史,以检查是否事件类型A 的实例在历史中;(4)在历史中找到a ,执行事件实例消费,并更新事件历史;(5)检测复合事件实例e 成功,输出.图1 在线事件流处理体系结构 当外部输入速率高,注册的复合事件表达式数目多时,复合事件的检测存在以下问题:①对复合事件的检测依赖于终结事件,其监控缺乏主动式的proac 2tive 特性;②每个复合事件表达式在内存中都会载入一个监控器,内存开销大,只要有新的输入事件到达监控器时都会去搜索复合事件表达式,效率低下.计算资源是有限的,把所有可能发生的复合事件都检测出来不太实际,有时也没有必要.一个可能的解决方案是:只列出k 个最可能发生的复合事件,即为了尽早评估复合事件发生与否,支持proactive 特性的事件流处理,使用索引技术找出外部事件到达时可能受影响的复合事件,并根据连续到达的输入事件对复合事件发生的影响累积概率,在索引上执行top 2k 选择,找出目前为止发生概率较大即较可能发477计 算 机 学 报2009年生的复合事件,实现proactive 的事件监控能力.网络安全中,主动防御包含两方面的含义:一是能检测出未知的安全威胁,二是能在安全威胁发生前预警.Pro SPer 这两方面对主动防御的支持如下.2.1 未知模式的检测图2 ProSPer 系统结构基于统计分析的方法是检测未知安全威胁非常具有代表性的方法,主要通过已经收到的历史告警信息,基于概率来建立关于告警事件的预测模型.然后,通过训练出的预测模型去计算新告警信息与哪个正处于关联过程中的攻击序列最接近,从而完成整个告警关联的工作.该方法引入了基于时间序列分析的预测方法[4].本文也是基于类似的机制,区别在于Pro SPer 弱化处理时序信息,另外ProSPer 的检测模型是基于数据流的实时、连续方式,并使用了索引技术来提高检测性能.2.2 预警以安全模型P2DR [5]为例探讨Pro SPer 的预警能力.P2DR 是目前信息安全领域具有代表性的安全模型,基本原理为:信息安全相关的所有活动,不管是攻击行为、防护行为、检测行为和响应行为等,都与时间密切相关,因此可以用时间来衡量一个体系的安全性和安全能力.如果防护时间大于检测时间和响应的时间的和,即P t >D t +R t ,也就是在入侵者对攻击目标造成实际的危害之前就能被检测到,若及时处理,则系统是安全的.如前所述,若把安全威胁建模为复合事件,则其不需所有成分事件全部发生,即安全威胁出现苗头但又未发生前,ProSPer 通过动态评估发生概率最大的top 2k 个安全威胁的形式,尽早报告最可能发生的安全威胁告警.基于此动机,本文设计并实现了支持proactive 特性的事件监控系统ProSPer (Proactive Stream Processer ).ProSPer 构建在服务计算平台上,可对运行时服务和服务计算平台本身进行监控.第3节给出本文设计的假设以及ProSPer 的系统结构;第4节给出ProSPer 用于复合事件检测的top 2k 算法TCHy 2brid ,给出了正确性证明和示例;随后给出了算法的实验性能;最后对相关工作进行总结.3 假设与ProSPer 系统结构3.1 假 设麻省理工大学的T apia 在其硕士论文中使用复合事件检测来实现基于对象的活动识别,其研究表明,原子事件的顺序并不提高复合事件检测算法的预测能力[6].本文基于此结论,在事件监控系统的复合事件检测中,把时间上相邻发生的事件看作一个整体,而不考究其复合时序关系.另外,上层应用感兴趣的复合事件对应用的重要程度显然是不同的,因此应5774期刘家红等:ProSPer :一个支持proactive 特性的通用型事件监控系统当在复合事件检测中引入事件的重要性这一因素.最后,本文借鉴信息检索中的相关技术,把检测时需要查找的元数据均存储在数据库中,为其构建索引,以提高检测性能.3.2 系统结构ProSPer构建和运行在面向服务计算平台InforSI B上.InforSI B基于Java开发,是一个支持服务总线和事件通信的面向服务的应用集成开发和运行平台[7].ProSPer对外部触发的应用层事件、业务流程和流程内部服务触发的事件均能进行监控.如图2所示,安全监控等业务领域的应用通过管理控制台向ProSPer注册其感兴趣的安全态势即复合事件.Pro SPer为管理控制台构建底层的事件监控查询表达式,结合查询描述文件中定义的用于检索的元数据,动态生成相应的索引列表.外部事件流输入后,也可以触发相应的索引列表构建动作,同时ProSPer会为其构建时间窗口.时间窗口划分为多个等分时长的更小单元,初始化后每次滑动的单位为一个小单元,如此时间窗口可以重用其中的多个小单元.Top2k处理器根据构建的时间窗口中到达的原子事件来查找索引列表,根据查找的概率以及重要性信息,动态评估此时最可能发生的k个安全态势的发生概率.结果返回到管理控制台,同时复合事件还可持久化,便于之后的离线分析.4 用于复合事件检测的top2k算法传统的基于聚集排序top2k查询算法[8]中,排序访问是指对已排序序列至顶向下的依次访问,随机访问是指从序列中随机获取某个对象的值.FA 必须在排序访问阶段得到至少k个匹配才会停止,不适合proactive特性的事件监控;TA算法至少要比FA停止得早,但是其随机访问开销大;NRA无随机访问,不能用于最后精确输出top2k个复合事件;CA算法权衡了随机访问和排序访问的代价,可看作TA与NRA算法的结合,然而其需要内存来记录很多的中间结果,会加重算法的内存消耗,因此也不适合直接应用于复合事件检测.使用top2k算法进行复合事件检测存在以下两个难点:(1)top2k数据集是多维的,包含了引发事件发生的主体.事件元组的关键字属性和引发主体的组合是区分元组唯一性的要素;(2)top2k查询是根据用户指定的单调聚集函数从数据集中找出函数值最高的前k个结果.简单的概率累加函数是不满足聚集函数性质的.因此,下文先给出复合事件定义的元数据、为复合事件设计的内部数据结构和聚集函数,然后再讨论两阶段算法.4.1 事件元数据在事件监控系统的复合事件检测过程中需要查找事件元数据,其中包括用于触发事件发生的事件主体、原子事件描述、复合事件描述、复合事件重要性、原子事件发生对复合事件发生的条件概率.这些元数据用数据库模式表示,如图3所示.图3 事件定义用到的数据库表4.2 内部数据结构时间窗口中的top2k查询项是原子事件实例,而被查询的数据结构是按事件类型保存的,内部数据结构作为中间层,以桥接事件实例和事件类型定义.另外,到达的安全事件作为原子,还与导致其发生的主体有关,相同主体上发生的原子事件间相互关联,组合成安全态势即复合事件.因此,需要内部数据结构来区分不同的安全事件主体.如图2所示,原始事件流输入到Pro SPer后,Pro SPer为之构建相应的、由多个等长的小单元组成的时间窗口.每个小单元中发生的原子事件均有指针指向索引列表.索引列表分为两层,事件主体为区分事件的第一层,另外,再根据态势即复合事件的步骤数来对数据进行第二层索引,如图4所示.内部数据结构维护top2k查询执行时的运行数据,根据top2k查询来cache数据,保存在cache的数据能提高访问的速度.另外内部数据结构还负责访问数据库.为了进一步提高访问速度,同一事件类型的所有实例共享一个数据库连接(cache).提供的内部数据结构具体如图4所示.677计 算 机 学 报2009年图4 内部数据结构4.3 Top 2k 聚集函数设每个原子事件都对应一张概率表,表示其发生时相应的复合事件发生的条件概率,表按降序排列.复合事件由多个原子事件组合而成.假设原子事件的发生不是互斥的,则原子事件都发生时复合事件发生的概率依据条件概率计算公式来计算.但条件概率的计算不是单调的,因此不能用来进行top 2k 事件查找.另一种方案则把复合事件看为原子事件所代表的不同子阶段的组合,每个子阶段的权重是平等的,把所有子阶段的概率累加,以得到复合事件发生的概率.此时的函数是单调的.设复合事件C x 由n 个原子事件E 1,…,E n (n Ε1)组合而成,C x 的重要性为I m p.C x 的发生概率可定义为∑ni =1Pi+I m p.因为每个复合事件其含有的原子事件个数n 是不定的,可考虑复合事件发生概率计算为∑ni =1P i /n +I m p.在事件检测过程中,假设E 1,…,E m (1Φm Φn )是已经发生的原子事件,C x 的发生概率可通过连续地计算∑mi =1P i /n +I m p 得到.但m 是不确定的,最后修正聚集函数为∑mi =1S i +I m p ,其中S i 是指对复合事件出现概率的实时打分值,将在后面详细介绍.4.4 两阶段算法:TCH ybrid两阶段算法介于TA 算法和CA 算法[8]之间.第一阶段使用排序访问来找出可能的复合事件候选列表,第二阶段使用随机访问来剪枝候选列表以得到最后的k 个复合事件.一方面,排序访问阶段尽量剔除无关的复合事件,因此随机访问阶段所基于的候选列表比TA 算法更具选择性,另一方面,与CA 相比,并不使用周期性的排序和随机访问,因此记录的中间结果要少.TC Hybrid 算法可分为5步,其中语句1,2,3对应步骤1,用于创建并初始化候选列表.语句3调用初始化候选列表算法,在随后详细给出.语句4对应步骤2,根据得到的候选列表计算阈值τ.阈值τ表示当前候选列表中第k 个最大的打分值.语句5与6对应步骤3,维护一个矩阵,矩阵中每个单元根据不同事件主体和事件的子阶段数来区分.矩阵的每个单元包含综合打分值最高的分组,每个分组是一个索引列表.W H IL E 循环中的语句8用于处理对应的最高打分值的分组g .循环语句中的其余语句对应步骤5,用于更新候选列表、阈值、最高分数.当最高打分值低于阈值或索引列表均扫描完毕时循环中止.算法TCHybrid输入:时间窗口tw输出:包含k 个元素的复合事件候选列表topList 1.OwnerListByStage olbs =getOwnerListByStage (tw ,MAX_PECOUN T -1)2.T opList topList =new TopList (k Value ,elbs.getOwnerListSize (),MAX_PECOUN T -1)7774期刘家红等:ProSPer :一个支持proactive 特性的通用型事件监控系统3.initialize TopList(elbs,topList)4.float threshold=topList.get Threshold()5.Coordinates co=topList.getNext FetchItem()6.float next High=co.get HighValue()7.W HIL E((next High>=threshold)&&(!topList.isFinished()))8.processAccording ToCo(co,elbs,topList,timeWindow.get TypeList())9.co=topList.getNext FetchItem()10.threshold=topList.get Threshold()11.next High=co.get HighValue()12.ENDW HIL E13.randomPhase(topList,elbs)4.4.1 排序访问排序访问主要是对复合事件候选列表进行初始化.循环包含两个主要的步骤:第1步对应代码第3~17行,获得当前需处理的原子事件对应的索引列表,包括相应的概率索引列表和重要性索引列表,对所有这些列表进行处理,根据索引列表中的信息,若综合打分值高于阈值,则创建相应的复合事件实例,若在候选列表topList中已有相应的复合事件实例,则更新其打分值和综合打分值;第2步对应18~28行,返回最高的综合打分值,对由主体和子阶段所分组的矩阵进行维护,因此下一次循环可以知道从哪个扫描深度进行.4.4.2 随机访问随机访问阶段同时使用了对候选列表进行剪枝的两种方法.第1种剪枝方法是初步剪枝,把综合打分值低于阈值的复合事件从候选列表中删除.第2种剪枝方法包括两个步骤:首先对候选列表进行预处理,把候选列表分为两个按综合打分值降序排列的表,一个表包含k个最高的值,另一个表包含其余的项;其后的操作对bl进行处理,提取bl 中综合打分值最高的复合事件实例,然后检查内存中的数据并随机访问以得到此事件实例的分数,如果综合打分值高于阈值τ,则此复合事件被插入到tl 中,同时更新τ,如果bl尾部的项的综合打分值低于新阈值τ,剪枝这些项.第2步将循环执行,直至bl 为空.算法Initialize TopList输入:时间窗口tw输出:复合事件候选列表topList1.FOR i=0to olbs.getOwnerListSize()2.FOR j=0to olbs.getNumberOf Stages()3.peT ype=olbs.getOwnerStageList(i).getInverted2ListsOfStage(j)4.High TypeList htl=new High TypeList()float highValueForOwnerStage=0f5.//构造High Value List,得到分数高的列表6.FOR n=0to pe Types.size()7.htl.insert(((Stage TypeList)pe Types.get(n)).get2PEType(),((Stage TypeList)pe Types.get(n)).getCachedRowAt(0).get Probability())8.EL SE typeIndicator++9.W HIL E((htl.get Pointer()!=null)&&(times<j+2))10.highValueForOwnerStage+=htl.get Pointer().get H2ighValue()11.times++;htl.step Forward()12.ENDW HIL E13.htl.reset Pointer()14.//获得重要性列表索引,更新打分值,把hvl表中最高的j个值和重要性值累加15.IF(getCachedImp RowSets(j).size()>0)16.topList.insertByParas(…)17.highValueForOwnerStage+=getCachedImp Row(j,0).get Importance()18.//对每个原子事件对应的索引列表,执行初始化,候选列表按打分值降序排列19.FOR n=0to pe Types.size()20.IF(((Stage TypeList)pe Types.get(n)).getNum2berOfCachedRows()>0)21.ceid=…;probability=…;peid=…22.topList.insertByParas(ceid,j+2,olbs.getOwnerStageList(i).get EventObject(),probability,peid,htl,getCachedImp Row(j,0).get Importance())23.ENDIF24.ENDFOR25.topList.set Indicator(i,j,highValueForOwner2Stage)26.IF(typeIndicator<pe Types.size())27.topList.set FetchDepth(i,j,0)28.EL SE topList.addOne To FinishedCount()29.ENDFOR30.ENDFOR4.4.3 检测结果的正确性证明定理1. 最终的top2k个复合事件输出肯定在排序访问阶段结束后得到的候选列表中.证明. 通过逆否命题来证明.(1)在候选列表topList中,可以得到阈值τ,其意义为第k大的当前打分值.因此在候选列表to2 pList中有k个可能的复合事件,其最终打分值不小于τ.(2)取不属于topList的复合事件ce0,其包含p 个原子事件,其所在的索引列表分组在g p中.因此ce0的最终打分值为S ce=∑pi=1S cei+I ce.(3)在索引分组g p中会一直扫描,直到组中其余项的最高打分值小于τ.因此,设当前组g p的扫描深度为d,则有∑pi=1S dm axi+I d<τ.877计 算 机 学 报2009年 (4)所有成分事件中g p 分组深度d 之前的复合事件均已添加到候选列表.设ce 0的任何成分事件被扫描到的深度为d 0,则d 0不小于d.设ce 0在组g p 中对应的索引列表为l 1,…,l p ,由于列表是降序排列的,则Πi ∈{1,2,…,p},S d 0i ΦS di 且I ce 0ΦI d .累加函数是单调的,因此∑pi =1S ce i Φ∑pi =1S d 0i Φ∑pi =1S d 0i .由(3),∑pi =1Sdm ax i+I d <τ,S dm ax i 是组g p 中深度d 扫描的最大值,因此∑pi =1Sd iΦ∑pi =1S dm ax i .与(2)、(4)结合,则S ce 0=∑pi =1Sce i+I ce 0Φ∑pi =1Sd i+I d Φ∑pi =1Sdm ax i+I d Φτ.又由(1),已有k 个复合事件其打分值大于τ,因此ce 0肯定不在最后的top 2k 集合中.定理1得证.证毕.定理2. 随机访问阶段结束后,最终能从候选列表中找到top 2k 个复合事件证明. 随机访问阶段首先把候选列表topList 分成两个列表,当前打分值最大的k 个复合事件放在列表tl 中,并按打分值降序排列.候选列表中其余的项放在另一列表bl 中.通过对bl 继续扫描更新打分值,如果其实际打分值比tl 表中最小的值要高,把tl 表中的最小值项替换为此项,并从bl 中剪枝此项.更新tl 的阈值.任选候选列表中的元素ce 且ce |tl ,有两种方式来剪枝ce ,或者直接从候选列表中直接剪枝,或者从tl 中剪枝.第1种剪枝方法中,ce 的综合打分值小于当前阈值τ.不需计算,显然ce 的实际打分值S ce 不会大于估计的综合打分值B S ce ,而B S ce 小于τ,因此ce 必定不在最终的k 个结果中.第2种剪枝方法中,ce 的实际打分值S ce 需要计算出来,但其小于τ,不在最终的k 个结果中.定理2得证.证毕.算法RandomPhase输入:候选列表topList ,分组的主体类型列表olbs 输出:包含最终k 个复合事件项的排序列表tl1.first Filter (topList )2.ReviewedCEMap rcm =new ReviewedCEMap ()//访问过的复合事件cache3.ReviewedImpMap rim =new ReviewedImpMap ()//重要性cache 4.ReviewedProbMap rpm =new ReviewedProbMap ()//概率cache 5.//第1步6.SortedList tkl =new SortedList ()7.SortedList bsl =new SortedList ()plexEvent InstanceIncomplete ceii9.FOR i =0to topList.get K ()10.ceii =topList.removeFirst ()11.IF (ceii !=null )//访问过的复合事件12.//添加概率13.//添加重要性14.topList.insert (new SortedObject (ceii ,ceii.getCur 2rentScore ()))15.ENDIF16.EL SE //未访问过的复合事件17.String exp =rs.getString ("expression")18.rcm.insertMapping (ceid ,exp )19.//查找数据库中的复合事件表达式,判断原子事件是否在复合事件表达式中,同时查找其它概率和重要性信息,并添加进来20.ENDFOR 21.//第2步22.float kthScore =tkl.get KthScore (k )23.W HIL E (tl.getSize ()>0)24.ceii =tl.removeFirst ()25.bsl.insert (new S ortedObject (ceii ,ceii.getBestScore ()))26.ENDW HIL E27.W HIL E ((bsl.getSize ()>0)&&(bsl.getLargestScore ()>kthScore ))28.ceii =bsl.removeFirst ()29.//余下操作类同于第一步,忽略30.…31.ENDW HIL E4.4.4 算法的proactive 特性要分析TCHybrid 算法的p roactive 预警能力,只需分析算法的检测窗口内,对于检测出的k 个,各含有n i (i =1,2,…,k )个成分事件的复合事件,运行算法需要检测的原子事件数目m (其中包含了与检测出的复合事件相关的成分事件数目为t i )与n i 的关系.因为TCHybrid 算法有剪枝策略,若m >n i ,最佳打分值B S 为∑t ij =1S j +∑m i -t ip =1H Sp,其中S j 为对相关的成分事件的概率,H S p 为从逆向索引列表中获取的可能最佳打分值,此时访问了t i 次数据库,对逆向索引列表的m i -t i 次访问的时间开销是可忽略的;若m <n i ,最佳打分值B S 为∑t ij =1S j +∑m i -t ip =1H Sp,同理,访问了t i 次数据库,对逆向索引列表的m i -t i 次访问的时间开销也是可忽略的.综合来说,算法检测时9774期刘家红等:ProSPer :一个支持proactive 特性的通用型事件监控系统对于一个有n i 个成分事件的复合事件,实际输入时出现t i 个事件,若t i <n i ,则以t i 次的数据库访问加索引访问的时间就能实现对其的检测,达到预警的目标.t i =n i 时只需要访问索引的延迟时间,则可近实时地将其检测,此时检测的proactive 特性体现在基于统计分析安全事件报警关联上,能实现对未知模式的检测.实际上,对于网络安全的主动防御来说,多源告警信息关联得到的复合事件通常都是多步骤、时间跨度比较大的.Pro SPer 设置的时间窗口大小(通常为1min 内)一般小于其时间跨度,实际运行时报告k 个最可能发生的复合事件时两个阶段(排序访问和随机访问)只涉及到时间窗口内发生的成分事件,因此实际检测时检测的原子事件数目通常是小于ni 的.这说明了TCHybrid 算法的预警能力.4.4.5 示 例下面给出一个示例,设时间窗口内待考察的3个原子事件P E 1、P E 2、P E 3,其内部数据结构如图5左侧所示.事件的重要性其内部数据结构和算法处理与此处的事件概率类似,为简单起见,此处不再涉及.为每个复合事件计算此时发生的概率.综合打分值为累加此扫描深度时所有的复合事件发生概率,k 为2时阈值为第k 个最大的概率,综合打分值和阈值都会随着扫描深度增加而递减,扫描直至综合打分值小于阈值结束.扫描深度1时综合打分值为018+019+017=214,阈值为018.到扫描深度3时,综合打分值112小于阈值114,扫描结束.图5 3个原子事件时的算法运行过程示例4.4.6 内存访问开销当一个原子事件进入系统时,若按如下方式处理:(1)检查复合事件表达式定义;(2)检查复合事件定义中出现在此原子事件之前的事件实例是否发生;(3)使用随机访问来获取之前事件的概率;(4)累积发生的事件的概率.假设有k 个复合事件包含原子事件E x ,上述处理方式处理一个原子事件实例的I/O 成本为∑k1C i(C i 为处理复合事件i 的成本).建立一个复合事件id 上的索引表,则C i =1+∑t11+C j(t 为已发生的原子事件实例数,C j 表示查找索引的成本).因此在出现t 个原子事件后处理一个原子事件实例E x 的总成本为C =k +kt +∑ki =1∑tj =1Ci j.但如果表中存储∑ti =1Si+I m p ,若原子事件到达,则系统只需把表中的值与阈值比较,然后只处理那些比阈值大的值.此时的I/O 成本大大减小.假设有p 个条目的值大于阈值,则处理原子事件实例E x 的成本为1+p ,p νk.5 实 验我们对Pro SPer 的性能进行了模拟实验(环境配置如表1).实验使用不同规模的数据集,规模1~4分别包含了40,60,80,100个原子安全事件以及相应的1200,3000,5000,10000个复合事件.复合事件和原子事件的表示都沿用了前文的实验所用的安全事件格式,但复合事件中未使用表达式D ,因为其中的否定在Pro SPer 中无法检测[7].Pro SPer 解析这些表达式,获知其含有的成分事件数目.另外,ip 地址作为识别所有事件的owner 2id.所有的实验均测试10次,取其平均值.表1 实验环境配置项配置情况 操作系统Windows XP SP2硬件配置Pentium 4312GHz ,1G B RAM J VM 版本J RE 11510Update6数据库MySQL Server 510087计 算 机 学 报2009年。
Enphase移动连接安装指南
Enphase Mobile Connect Installation Guide (M1-06)This guide provides instructions on how to install the Enphase™ Mobile Connect cell modem CELLMODEM-M1-06 family with the Enphase Envoy-S and the Enphase IQ Gateway for North America. This guide is intended for use by professional installation personnel. For details about the Envoy-S or IQ Gateway, refer to the Installation and Operation Manual. Read all safety warnings before installing the Enphase Mobile Connect cell modem (hereafter referred to as Mobile Connect).Visit (now part of T -Mobile) or for a detailed coverage map.The basic cell modem plan is available for systems of up to 64 Enphase Microinverters. To monitor systems of more than 64 microinverters, additional charges apply.The Enphase Mobile Connect cannot be transferred to a different IQGateway after initial installation. Any attempt to do so will deactivate the modem.Installation Guidelines• Enphase recommends that you install the IQ Gateway (Or Envoy-S) and the Enphase Mobile Connect in a non-metal enclosure.• For outdoor installations, you must use an outdoor rated enclosure.• Only IQ Gateway software 7.X and later support theCELLMODEM-M1-06.Updating IQ Gateway software can take up to 30 minutes,so be sure to do this before installing Enphase Mobile Connect CELLMODEM-M1-06.The Enphase Mobile Connect is a modem package that connects to the Enphase Envoy-S or IQ Gateway, and eliminates the need for an on-site Internet connection to monitor an Enphase Microinverter System. The addition of The Enphase Mobile Connect to an Enphase System enables greater installation flexibility and provides reliable system monitoring independent of the Internet service on site.The Enphase Mobile Connect is preconfigured for data service and becomes activated when connected to the IQ Gateway.The IQ Gateway collects module-level and system-level production data, and, if configured, consumption data, at predefined periods of time, typically at 15-minute intervals.The report setting for an IQ Gateway with The Enphase Mobile Connect is low bandwidth mode , which transmits data to Enphase App four times a day. The transmission times occur within a five-minute window, at 3 am (03:00), 9 am (09:00), 3 pm (15:00), 9 pm (21:00). After transmission, the data may take several minutes to display in Enphase Enlighten™ monitoring platform.About the Enphase Mobile ConnectThe IQ Gateway paired with the Enphase Mobile Connect provides plug and play connectivity to the Enphase Enphase App monitoring platform. The Enphase Mobile Connect includes the following:• 4G-L TE CAT M1/2G CELLMODEM-M1-06 family (indicated by SKU formatCELLMODEM-M1-06-AB-CD, where AB and CD can change) with Five-year M2M data plan. CELLMODEM-M1-06-AT -05 has AT&T SIM and CELLMODEM-M1-06-SP-06 has T -Mobile data plan• SIM card - industrial grade, preconfigured, tested, and installed• USB cable: 2.3 foot USB type A Female to Type A Male. The IQ Gateway connects to the modem using this cable, which also powers the modem.• Mounting hardware (plastic mounting rail and two rivets)The Enphase Mobile Connect (CELLMODEM-M1-06) is designed to install inside an Enphase Combiner, Enphase Combiner +, Enphase Combiner 3, Enphase Combiner 3C, Enphase Combiner 3C-ES, Enphase Combiner 4C or on a table top.Supported combiner models include IQ Combiner (X-IQ-AM1-240-B), IQ Combiner + (X-IQ-AM1-240-2), IQ Combiner 3 (X-IQ-AM1-240-3), IQ Combiner 3C (X-IQ-AM1-240-3C), IQ Combiner 3C-ES (X-IQ-AM1-240-3C-ES) AND IQ Combiner 4C (X-IQ-AM1-240-4C).Supported IQ Gateway models include IQ Gateway for North America(ENV-IQ-AM1-240), Envoy-S Standard for North America (ENV-S-AB-120-A), Envoy-S Metered for North America (ENV- S -AM1-120), IQ GatewayStandard for Rest of the World (ENV-S-WB-230), IQ Gateway Metered for Rest of the World (ENV-S-WM-230).Both Sprint/T -Mobile and AT&T variants provide coverage in regions where there is adequate cellular service in installation area, including the US, Canada, Mexico, Puerto Rico, the US virgin islands, Australia, NewZealand, France, United Kingdom, Netherlands, Germany, Austria, Belgium,Switzerland, Spain, Portugal, and Italy.How Enphase Mobile Connect worksEnphaseInstaller App© 2021 Enphase Energy. All rights reserved. Enphase, the Enphase logo, Enphase IQ Gateway, IQ Combiner, IQ Microinverter, Installer Toolkit, Enlighten and other trademarks or service names are the trademarks of Enphase Energy, Inc. Data subject to change. Rev03-10-23-2021Environmental ProtectionELECTRONIC DEVICE: DO NOT THROW AWAY . Waste elec-trical products should not be disposed of with household waste. Refer to your local codes for disposal requirements.CELLULAR MODEM TERMS AND CONITIONSThese following Cellular Modem Terms and Conditions (“Terms andConditions”) will apply to anyone who purchases and/or uses (“you”, “your”) the Enphase Cell Modem to enable internet connectivity for an Enphase IQ Gateway device (“Cell Modem Terms”). These Cell Modem Terms are incorporated into and made an integral part of the Agreement.1. Cellular Modem Description, Use, Unauthorized Use Limitationon Use. The Cellular Modem must be used only in conjunction withEnphase’s IQ Gateway/IQ Combiner products. The Cellular Modem shall not be used for any unlawful purpose(s).2. Limited Warranty. The Cellular Modem comes with and is covered bya 5-year Limited Warranty which is included in the standard Enphase Limited Warranty which can be found at /warranty (“Limited Warranty”). Except as expressly provided in this Section, to the maximum extent permitted by applicable law, the Cellular Modem is provided on an “AS IS ” basis without warranty whatsoever, and Enphase expressly disclaims all warranties, express, implied, and stat -utory including the implied warranties of merchantability, satisfactory quality, fitness for a particular purpose, title, and non-infringement. Any use of the Cellular Modem other than as expressly stated in these Terms and Conditions shall constitute a breach of the limited warranty and render it null and void. The Cellular Modem will contain a SIM card provided by a network provider. The SIM Card (a) must not be removed from the Cellular Modem, nor (b) used with any other de-vice. Any such removal or use shall constitute a breach of the limited Warranty and render the Limited Warranty null and void.3. Territory. The Cellular Modem shall only be used in the countries list-ed on this quick installation guide (QIG). Enphase in its sole discretion reserves the right to amend the QIG to add or delete counties wherein the Cellular Modem may be used.4. Network Coverage. Network Coverage is dependent upon networkavailability which is the responsibility of the network service provider. Enphase shall have no responsibility, nor any liability to any end user for network service provider’s non-coverage, lack of coverage, defective coverage, or termination of the coverage.5. Connectivity. Cellular Modem connectivity is subject to the telecom-munication regulations and policies and terms of the network service providers, and the applicable laws of the country in which the Cell Modem is located and installed. Enphase makes no representation or warranties as to such connectivity and Enphase shall have no responsibility, nor any liability to you for network service provider’s failure to provide connectivity nor any responsibility or liability due to network service provider’s termination of connectivity.6. Acceptable Use Policy. You must conform to the applicable accept-able use policy (“AUP”) posted on the applicable network providers website, and you alone will be responsible for ensuring compliance with its terms. You will indemnify, defend and hold Enphase harmless against any claims or losses suffered by Enphase because of your breach of the AUP . For Cell Modems with:AT & T connectivity – The terms available at https:///legal/terms.aup.html shall apply.T -Mobile connectivity – The terms available at https://www.sprint.com/en/legal/acceptable-use-policy.html3. Slide the modem into the groove in the mounting rail.Mount the Modem on a Flat SurfaceYou can also rest the modem on a flat, stable surface using the four rubber feet, with the status LEDs pointing up.A. Mounting the ModemMount the modem in a supported IQ Combiner or place it on a flat surface.Inside IQ Combiner series1. Open the IQ Combiner and locate the mounting recess on the deadfront ofthe IQ Combiner.2. Remove the black rivets and existing cellular modem (if pres -ent) from the IQ Combiner deadfront and discard them. NOTE : The rivets shipped with CELLMO-DEM-01, 03, and M1 are not compatiblewith CELLMODEM-M1-06. If you have CELLMODEM-01, 03 or M1 installed with the IQ combiner 3 or IQ combiner 4, remove the existing rivets and use the rivets shipped with CELLMODEM-M1-06.3. Attach the mounting tab to thecombiner using the included snap rivets.4. Position the new modem(CELLMODEM-M1-06) on the mountingtab and snap it on.Mounting the modem on a wall or flat surfaceEnphase recommends that you install the IQ Gateway and Mobile Connect in a non-metal enclosure. For outdoor installations, you must use an outdoor rated enclosure.(NEMA 3R/IP54) The IQ Gateway data sheets and installa-tion guides list acceptable enclosure types.Mount the modem, either on a wall using the mounting rail, or attach the rubber feet and place on a flat surface. You can mount the modem differently than described here.Using a Mounting rail1. Place the mounting rail on the mounting surface.2. Secure to the surface using the holes at each end of the mounting tab B. Connecting the USB Cable1. First, connect the USB cable to the USB port(s) on the IQ Gateway.2. Then, connect the type A USB connector to the Enphase Mobile Connect.C. Checking Connection Status and Cellular Signal StrengthAn IQ Gateway with the Enphase Mobile Connect automatically reports to Enlighten. When the IQ Gateway establishes an Internet connection through the cellular modem, the IQ Gateway Network Communications LED lights solid green.You can use the Enphase Installer App to check the modem status and cellular signal strength. The IQ Gateway’s AP (Access Point) Wi-Fi network allows you to connect your mobile device (smart phone or tablet) to the IQ Gateway.1. On the IQ Gateway, the AP Mode LED lights solid green whenthe network is available. If the AP Mode LED is not lit, press theAP Mode button.2. On your mobile device, go to Settings and join the Wi-Fi network“IQ Gateway_nnnnnn” (where “nnnnnn” represents the final sixdigits of the IQ Gateway serial number).3. Launch Enphase Installer App and tap Connect to IQ Gateway.4. Tap Network.5. Under Network Configuration, tap Cellular.The app displays Connection Status and an indication of signalstrength.6. Check the connection status and verify that signal strength is atleast two bars for adequate data transmission. Enphase Mobile Connect DimensionsREGULATORY NOTICESFCC StatementThis equipment has been tested and found to comply with the limitsfor a Class B digital device, pursuant to part 15 of the FCC Rules. Theselimits are designed to provide reasonable protection against harmfulinterference in a residential installation. This equipment generates, usesand can radiate radio frequency energy and, if not installed and used inaccordance with the instructions, may cause harmful interference toradio communications. However, there is no guarantee that interferencewill not occur in a particular installation. If this equip m ent does causeharmful interference to radio or television reception, which can bedetermined by turning the equipment off and on, you are encouraged totry to correct the interference by one or more of the following measures:• Reorient or relocate the cell modem.• Increase the separation between the equipment and the receiver.• Connect the equipment into an outlet on a circuit different fromthat to which the receiver is connected.• Contact Enphase Customer Support for assistance (https:///contact/support).Changes or modifications not expressly approved by the partyresponsible for compliance may void the user’s authority to operate theequipment.This Class B digital apparatus complies with Industry Canada ICES-003.EMC, Safety, and R&TTE Directive ComplianceThe CE mark is affixed to this product to confirm compliance with thefollowing European Community Directives:Council Directive 2004/108/EC of 15 December 2004 on theapproximation of the laws of Member States relating to electromagneticcompatibility;andCouncil Directive 2006/95/EC of 12 December 2006 on theharmonization of the laws of Member States relating to electricalequipment designed for use within certain voltage limits;andCouncil Directive 2011/65/EU on the restriction of the use of certainhazardous substances in electrical and electronic equipment;andCouncil Directive 1999/5/EC of 9 March 1999 on radio equipment andtelecommunications terminal equipment and the mutual recognition oftheir conformity.Restriction of the Use of Hazardous Substances (RoHS)Enphase Energy, Inc.Certificate of Compliance2011/65/EUEnphase Energy, Inc. confirms that its embedded products complywith the chemical concentration limitations set forth in the directive2011/65/EU of the European Parliament (Restriction of the use of certainHazardous Substances in electrical and electronic equipment - RoHS).These Enphase products do not contain the following banned chemicals:• Lead¹, [Pb] < 1000 PPM• Mercury, [Hg] < 1000 PPM• Hexavalent Chromium, [Cr+6] < 1000 PPM• Cadmium, [Cd] < 100 PPM• Polybrominated Biphenyl, [PBB] < 1000 PPM• Polybrominated Diphenyl Ether, [PBDE] < 1000 PPMEnvironmental Considerations:• Moisture Sensitivity Level (MSL) =1• Maximum Soldering Temperature = 260C (in SMT reflow oven)¹Lead usage in some components is exempted by the following RoHSannex, therefore higher lead concentration would be found in somemodules (>1000 PPM);Resistors containing lead in a glass or ceramic matrix compound.Mounting Rail and RivetsThe modem power LED lights when the modem has power. After about twominutes, the Link Status LED flashes to indicate a network connection. TheSignal LEDs indicate signal strength according to the Signal LED table.No additional configuration is needed. The IQ Gateway automatically startsreporting to Enlighten via the cellular modem.On the Envoy-S or IQ Gateway, check the Network Communication LED toverify connectivity to Enlighten. See the first page of this document for IQGateway LED status indications.CES SOR Y - ITEE518193SAFETY WARNINGSGeneral SafetyDANGER: Risk of electric shock. Risk of fire. Do not attempt to repair theEnphase Mobile Connect; it contains no user-serviceable parts. Tamperingwith or opening the Enphase Mobile Connect will void the warranty. War-ranty void if cover removed. If the Enphase Mobile Connect fails, contactEnphase Customer Support for assistance (https:///contact/support).DANGER: Risk of electric shock. Do not use Enphase equip m ent in amanner not specified by the manufacturer. Doing so may cause death orinjury to persons, or damage to equip m ent.WARNING: Perform all installation in accordance with all national andlocal regulations regarding the use of radio equipment.WARNING: This cellular device may cause interference with other elec-tronic equipment if the equipment is inadequately protected.WARNING: Follow restrictions imposed for any environment in whichthe device may operate, such as fuel depot, chemical plants, or whereblasting operations are in process.Potential Interference with Pacemakers and Other Medical DevicesRadio frequency energy (RF) from cellular devices can interact with someelectronic devices, causing electromagnetic interference (EMI). The FDAhelped develop a detailed test method to measure EMI of implanted cardiacpacemakers and defibrillators from cellular devices. This test method ispart of the Association for the Advancement of Medical Instrumentation(AAMI) standard. This standard allows manufacturers to ensure that cardiacpacemakers and defibrillators are safe from cellular device EMI.The FDA continues to monitor cellular devices for interactions with othermedical devices. If harmful interference occurs, the FDA will assess theinterference and work to resolve the problem.Precautions for Pacemaker WearersEMI can affect a pacemaker in one of three ways:• Stop the pacemaker from delivering the stimulating pulses thatregulate the heart’s rhythm.• Cause the pacemaker to deliver the pulses irregularly.• Cause the pacemaker to ignore the heart’s own rhythm and deliverpulses at a fixed rate.Based on current research, cellular devices do not pose a significanthealth problem for most pacemaker wearers. However, people withpacemakers may want to take simple precautions to avoid EMI fromcellular devices:• Keep the device on the opposite side of the body from the pacemaker toadd extra distance between the pacemaker and the device.• Avoid placing a turned-on device next to the pacemaker (forexample, don’t carry the device in a shirt or jacket pocket directlyover the pacemaker).Device Maintenance• DANGER: Risk of electric shock. Risk of fire. Only qualified personnelshould troubleshoot the Enphase Mobile Connect cell modem.• DANGER: Risk of equipment damage. Choose an area forinstallation where the ambient temperature does not exceed 46º C.• WARNING: To ensure optimal reliability and to meet warrantyrequirements, you must install the Enphase Mobile Connectaccording to the instructions in this guide.• WARNING: Risk of equipment damage. Exposure to liquids candamage the cell modem.• WARNING: DO NOT place the cell modem near computer discs,credit or travel cards or other magnetic media. It may affect theinformation contained in the magnetic media.。
Linux下系统如何监控服务器硬件、操作系统、应用服务和业务
Linux下系统如何监控服务器硬件、操作系统、应⽤服务和业务1.Linux监控概述Linux服务器要保证系统的⾼可⽤性,需要实时了解到服务器的硬件、操作系统、应⽤服务等的运⾏状况,各项性能指标是否正常,需要使⽤各种LINUX命令。
做到⾃动化运维就需要,将上述各项监控指标在同⼀个软件中展显出来,图形化监控,消息报警机制,⽇志检看,资产管理等等2.Linux监控的对象2.1 硬件监控(1)服务器:如电源,风扇,磁盘,CPU等,可以使⽤IPMI监控,在LINUX下安装IPMITOOL不同的服务器⼚商都在服务器上配有远程控制卡BMC: 如DELL(iDRAC) ,IBM (IMM) ,HP(ILO)LINUX下只需安装:#yum install -y OpenIPMI ipmitool 这⼆个⼯具就可以IPMI命令可以在服务器本地运⾏,也可以通过⽹络远程调⽤,IPMI在服务器上可以配置单独的IP地址和访问密码(2)⽹络设备:交换机,防⽕墙,路由器等,使⽤SNMP进⾏监控在被监控的设备上开启SNMP代理,到时可以通过⼯具进⾏获取数据,如ZABBIX1.LINUX上安装#yum list |grep snmp#yum install -y net-snmp net-snmp-utils安装好后要配置snmpd.conf⽂件rocommunity snmptest 172.16.20.89 #172.16.20.89表⽰仅这IP地址才可以来访问snmp信息#systemctl start snmpd 启动SNMP ,netstat -nulp ,netstat -ntlp 查看snmp启来的端⼝udp=161 ,TCP=199通过SNMP命令可以获取监控信息:#snmpget -v2c -c snmptest 172.16.20.89 1.3.6.1.2.1.1.3.0 #1.3.6.1.2.1.1.3.0为OID2.交换机上开启snmp-server community public ro(3)定期机房巡检,查看设备运⾏情况2.2 操作系统监控安装sysstat⼯具,包括了iostat、vmstat、sar、mpstat、nfsiostat、pidstat (yum install -y sysstat #rpm -ql sysstat)(1)CPU (CPU调度上下⽂切换,运⾏队列负载,CPU使⽤率)确定服务类型:IO密集型(如:数据库),CPU密集型(如:WEB)1.cpu利⽤率内核态: 30%和⽤户态:70%2.cpu运⾏队列:1~3线程 1CPU=4核队列不超过12个3.上下⽂切换:尽量少,结合cpu利⽤率4.#top命令(显⽰CPU和内存信息,M按内存使⽤率排序,P按CPU使⽤率排序,Q退出)CPU百分⽐各项指标: us:⽤户态 sy:内核态 ni:进程间优先级更换 id:空闲 wa:IO等待 hi:硬中断 si:软件中 st:虚拟5.CPU监控的各种命令:top ,vmstat , mpstat, uptime ,ps cpu进程情况,pstree 以树形结构显⽰进程之间的关系(2)内存1. free -m :显⽰内存信息2.vmstat :来监控虚拟内存 #vmstat 1 10 每隔1秒共10次获取监控信息(3)磁盘1.iostat:命令⽤来显⽰存储⼦系统的详细信息,通常⽤它来监控磁盘 I/O 的情况。
Omron Sysmac CVM1 PLC Multi-Link 网络设置指南说明书
OPERATOR INTERFACE PRODUCTSAPPLICATION NOTESubject: Steps to Setup a Multi-Link Network with GP/GLC AN# 1106 Date: July 24, 2001Name: Michael McLarenPage: 1 of 4Description: The steps to set up a Multi-Link system with a specific example using an Omron Sysmac CVM1 PLC.Affected Products:GP and GLC series models when connecting to a Multi-Link PLC (usually RS422) -Mitsubishi, Omron Sysmac, Hitachi Hidic, Matsushita MEWNET, Yokogawa Factory Ace, Toshiba Prosec T, AB SLC500, Keyence KZ 300/350.Problem:What are the steps to configure the GPs, GLCs, and the PLC for Multi-Link communication?Solution:The outline of the steps:1.Confirm that the PLC type is supported2.Make the physical cable connections3.Configure the Communication Parameters4.Make a GP project for each GP in the network using Pro/PB Win5.Configure the Multi-Link settings for each GP (in GP Setup)6.Configure the Multi-Link settings for the PLC or Link Unit7.Write the enable bits on the PLC to start communications.Confirm that PLC type is supportedLook at the “Connectable PLCs” in the table in section 4.2 of the PLC Connection Manual to confirm that the PLC type you wish to connect is in that table. Also confirm the link unit which is required. The example here was done on an OmronCVM1CPU01, and connected to the Link Unit on the CPU.OPERATOR INTERFACE PRODUCTSOPERATOR INTERFACE PRODUCTSAPPLICATION NOTE•Set the System Address to D0000•Set the Read Area to 0 (we will not use it in this example)•Set the Machine Number to 3.•Set the Link Protocol Type to N:1 Note the settings below that become available.•Set the Node Number to 0 (which will be different from the other GP unit)•Set the Transmission Status Register to D0020For GP2:•Set the System Address to D0040 (must not overlap the other GP’s System block, which is usually about 20 words.)•Set the Read Area to 0•Set the Machine Number to 3 as for the other GP. This is the link unit to communicate with on the multi-drop connection.•Set the Link Protocol Type to N:1 Note the settings below that become available.•Set the Node Number to 1 (different from GP1)•Set the Transmission Status Register to D0020 (identical to all GPs in this network) Now, save each project (prw file) and download to the appropriate physical GP. Configure the Multi-Link settings for the PLC or Link UnitOther than the data format, and environmental settings already discussed earlier, there are two things that must be done on the PLC for Multi-Link to operate:1.The Node Number or Link Unit Machine number must be set, or determined forsettings on the GPs. (For the example here the Machine Number was set to 3 in the PLC and on the GPs)AND…Write the enable bits on the PLC to start communications.2.When the network is starting up, the PLC must write bits in the Transmission StatusRegister address to enable specific GP units for communication. For our system with the two GPs involved, we would write the value 3 (or binary 0011) into the register D0020. This enables GP units 0, and 1 for communication on this Multi-Drop network.At this point, the switches on the GP’s should appear, and the value displays (numeric readout parts) should have values showing in them. Try pushing the switches, and see the results.OPERATOR INTERFACE PRODUCTS。
国家开放大学《理工英语4》形考任务1-8参考答案
国家开放大学《理工英语4》单元自测1-8参考答案单元自测1一、选择填空:阅读下面的对话或句子,从A、B、C三个选项中选出一个能填入空白处的最佳选项。
1、—I wonder if Icould use your tablet tonight?—________________. I’m not using it right now.a. It doesn’t matter.b. No, thank you.c. Sure, here you are.2、—Thank you ever so much for the Apple Watchyou sent me.— ________________a. No thanks.b. I’m glad you like it.c. Please don’t say so.3、—How is your business going?—_________________a. Good, it's growing all the time.b. Thank you.c. I’m going to Beijing.4、If you want to download this app, you need to connect your mobile phone _______ Internet first.a. tob. forc. with5、__________ this multimedia product has some shortcomings, it has also some good points.a. Whileb. Ifc. Not only6、—Do you mind my using my mobile phone here?— ________________.a. Yes, use it please.b. No, of course not7、—Oh. Dear! I’ve lost my new watch.—_________________a. I’m sad.b. That’s all right.c. What a pity!8、They are _______ make an announcement later on today.a. wish tob. expected toc. looking forward to9、So ________that millions of people queue to buy it.a. popularis the smartphoneb. popular the smartphone isc. the smartphone is popular10、The speed with which digital cameras can take, process and _______ an image is phenomenal.a. transmitb. transactc. translate11、Heremotelycontrols my mobile phone _______ he can set up it for me.a. thatb. so thatc. in order to12、My assistant will now______________ the machine in action.a. domesticb. demobilizec. demonstrate13、You will quickly get used to_______ this new digital camera.a. useb. usingc. be ran14、Considering the needsof the new generation, we propose the concept of the _______ network.a. wearingb. wearablec. weared15、_______, he knows a lot about computer.a. As he is a childb. Child as is hec. Child as he is16、The BBC has just successfully demonstrated a ________ radio transmission system.a. digestiveb. dignityc. digital二、阅读理解:这是客服人员帮助客服创建进入个人账户的场景,请在空格内填入字母将对话排序。
TLE987x评估板用户手册说明书
TLE987x EvalBoardAbout this documentScope and purposeThis user manual is intended to help users using the TLE987x EvalBoard. This EvalBoard is designed to evaluate hardware and software functionalities of the TLE987x device family.This manual provides additional information about the layout, jumper settings, interface and debug options. It introduces the evaluation platform as well as how to write software and download it to the TLE987x.The TLE987x is available in VQFN and a brand-new TQFP package, this document is valid for both.Intended audienceThis document is for everyone who works with the TLE987x EvalBoard.Abbreviations and definitionsAbbreviation DefinitionBLDC Brushless direct currentBSL Bootstrap loaderCOSN Cosinusoidal TMR output negativeCOSP Cosinusoidal TMR output positiveCS Chip SelectCSA Current sense amplifierGH1-3Gate high-side MOSFETs for phases 1-3 GND GroundGL1,-3Gate low-side MOSFETs for phase 1-3 GPIO General Purpose Input / OutputISP In-system programmerLED Light Emitting DiodeLIN Local Interconnect NetworkMISO Master Input Slave OutputMON MonitorMOSI Master Output Slave InputN.C.Not connectedn/u Not usedOP1Negative operational amplifier inputOP2Positive operational amplifier input PORST Power-on ResetSCLK Serial ClockSH1-3Source high-side MOSFET 1-3SINN Sinusoidal TMR output negativeSINP Sinusoidal TMR output positiveSL Source low-side MOSFETSWD Arm® serial wire debugTMS Test mode selectTMR Tunnel Magneto ResistanceUART Universal Asynchronous Receiver Transmitter USB Universal Serial BusVAREF Reference voltageVBAT Battery voltage supplyVCOM Virtual COM-portAbbreviation DefinitionVCP Voltage charge pumpVDDC Core supplyVDDEXT External voltage supply output VDDP I/O port supplyVDH Voltage drain high-side MOSFETVS Battery supply inputVSD Battery supply input for MOSFET driverTable of contentsTable of contentsAbout this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1Abbreviations and definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2Table of contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 1Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 2Interconnects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 3Test points and LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 4Jumper settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 5Communication interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 5.1LIN (via banana jack and uIO BSL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 5.2Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 6Software toolchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 6.1Keil µVision5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 6.2Infineon ConfigWizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 6.3TLE987x SDK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 6.4Debug connection setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 7Technical data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 8Optional additional placements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 9Schematics and layout baseboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 9.1Schematics baseboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 9.2Layout baseboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28 10Schematics and layout VQFN socket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 10.1Schematics VQFN socket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 10.2Layout VQFN socket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31 11Schematics and layout TQFP socket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 11.1Schematics TQFP socket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 11.2Layout TQFP socket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33 12Revision history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .351 ConceptConcept1This board is designed to provide a simple, easy-to-use tool for getting familiar with Infineon's Embedded Power IC TLE987x devices. A socket provides the possibility to test and evaluate all ICs of the TLE987x family. Every pin of the IC is connectable via rows of pin headers. The board is protected against reverse polarity of the input voltage supply.Three MOSFET half bridges are placed on the board to drive a BLDC motor. The board is ready to be connected to a car supply or similar and offers an USB port to use the on-board SWD debugger.The evaluation board can be operated by standard laboratory equipment, since the power supply and LIN communication are connected using via banana jacks.A LED indicates that the board is connected correctly to the power supply. The integrated reverse polarity protection secures the board from damage by cross connection.2InterconnectsG r o u n dS P ILINPhase 1Phase 2Phase 3V B A TuIO stickUSBSWDH A L L T M RFigure 2InterconnectsBanana jacks for ground, supply and LINMultiple jacks are available in different colors for ground, supply (max. 28 V) and LIN communication via banana jack.Banana jacks for motor connectionThe three jacks for Phase 1, Phase 2 and Phase 3 provide access to the three half bridges and for driving a brushless motor.uIO Stick connectorThe uIO bootstrap loader is a 16-pin header (2 × 8) with 2.54 mm pitch.This interface can be used to programming the TLE987x via LIN (see /uio or /uio ).Figure 3Pin configuration uIO BSLUSB for on-board debuggerThe on-board connector can be accessed with a micro-USB cable, connected to a PC.Pin header for SWDThe 10-pin header (2 × 5) with 1.27 mm can be used for debugging if the on-board debugger is not available or if it cannot be used.Figure 4Pin configuration SWD interfacePin header for SPIThe 12-pin header (2 × 6) with 2.54 mm pitch can be used for controlling an external IC with the SPI. In order to access the SPI, the jumpers P0.4 and P1.2 have to be set in position 2.Figure 5Pin configuration SPIPin header for Hall sensor interfaceThe 10-pin header (2 × 5) with 2.54 mm pitch can be used for controlling external Hall sensors. In order to access the Hall sensor interface, the jumpers P0.4 and P1.2 have to be set in position 1.Figure 6Pin configuration Hall sensor interfacePin header for TMR sensor interfaceThe 10-pin header (2 × 5) with 2.54 mm pitch can be used for controlling external TMR sensors. In order to access the TMR sensor interface, the jumpers SINN and SINP have to be set.Figure 7Pin configuration TMR sensor interface3Test points and LEDsGNDGNDGND GNDOP1GNDGNDVBATSH3SH2SH1SH1VDHGH1GH2VDHSH2GNDGL2GH2VDHGNDSH3VCPVS GL1OP2GL3LEDCOMLEDBAT LED VDDEXTLED1-8Figure 8Test pointsTest points •2× VBAT •1× VS •1× VCP •8× GND•2× SH1, 2× SH2, 2× SH3•2× GH1, 2× GH2, 2× GH3 (for gate-current supervision)•3× GH1, 3× GH2, 3× GH3 (for gate-current supervision).•OP1, OP2•3× VDHLEDs •LEDBAT (supply voltage active)•LEDCOM (on-board debugger communication active)•LEDVDDEXT (VDDEXT active)•LED1-8 can be connected to GPIOs (see Table 1)3 Test points and LEDs4Jumper settingsLEDs & PINsJP5JP2ILoadVSILoadVSDVDDEXT_LEDJP3SINNSINPP0.4P1.2POTI SUPPLYPOTI SIGNAL Debugger JumperFigure 9JumpersJP2Set this jumper to connect RESET button to RESET pin.Open it to disconnect RESET button from RESET pin.JP3Set this jumper to terminate TLE987x in daughter board as LIN master.Open it to terminate TLE987x in daughter board as LIN slave.JP5Set this jumper to connect MON button to MON pin.Open it to disconnect MON button from MON pin.VDDEXT_LED Set this jumper to enable LED operation at VDDEXT.ILoadVSThis jumper is closed by default.If this jumper is left open the device is not supplied.Target is to measure the current flowing into the TLE987x device.ILoadVSDThis jumper is closed by default.If this jumper is left open the charge-pump is not supplied.Target is to measure the charge-pump current consumption.SINN/PSet to use TMR sensor interface.Debugger JumperOpen debugger jumper to use off-board SWD debugger.4 Jumper settings4 Jumper settingsFigure 10Jumper positionJumper Position 1Position 2 POTI SUPPLY VDDEXT VDDP POTI SIGNAL P2.3P2.4P0.4HALL B CSP1.2HALL CMISO Array Figure 11Jumper position for LEDs and PINsSet jumper as shown in Figure 11 to connect the according PINs and LEDs.Table 1LEDs and PORTs jumperPIN LEDP0.1LED1P0.2LED2P0.3LED3P1.2LED4P1.0LED5P1.3LED6P1.4LED7P0.4LED85 Communication interfaces5Communication interfaces5.1LIN (via banana jack and uIO BSL)The integrated LIN transceiver is connected to a banana jack and additionally to the uIO BSL interface. In order to integrate the device in a LIN network, it is sufficient to use the single wire banana interface. The BSL interface programs the device via LIN. For further information about the uIO interface is available at/uio or /uio.5.2DebuggingDebugging is possible via the on-board debugger that can be connected via an USB cable and the SWD interface; the signals are routed through the 10-pin header SWD interface.6Software toolchainThe Software toolchain can be installed following the explanation bellow, or visiting /tle987x and search for Tools & Software.6.1Keil µVision5The recommended Integrated Software Development Environment is Keil® µVision5®.Infineon’s Embedded Power family is supported. More information about the installation process is available at .6.2Infineon ConfigWizardIn addition to the IDE, Infineon provides a solution to speed-up the IC programming, called "ConfigWizard". This tool is designed for code configuration in combination with the IDE. Infineon ConfigWizard can be downloaded via the Infineon Toolbox. The Infineon Toolbox allows to download and update all your Infineon tools. It can be downloaded from /toolbox.6.3TLE987x SDKAll Embedded Power products can be installed to Keil® µVision5® via "Pack Installer". Browsing to the Infineon chapter in "All Devices" will lead to the "TLE98xx Series". The ".pack" file comes with several code examples to provide an easy start up and speed up software development.6.4Debug connection setupFor a proper Flash and Debug Connection, install V5.10 (or newer) from: /jlink-software.html. Keil® µVision5® has to be configured in the IDE Menu "Options for Target". After connecting the USB cable and powering up the EvalBoard, go to the "Debug" register-card, choose "J-LINK / J-TRACE Cortex" and press "Settings".Figure 12Debug and flash configurationIf the board is connected successfully, the Arm® IDCODE will be visible in the SW Device Window. If theconnection fails, "Connect & Reset Options" and "Port" window has to be checked.7 Technical data7Technical dataTable 2Technical dataVoltage supply max. 28 V Motor current max. 30 A Pin ports 5 V8Optional additional placementsCXTAL1CXTAL2Y2RSBHS1CSBHS1CGDHS1CGSHS1RSBLS1CSBLS1CGDLS1CGSLS1RSBHS1CSBHS1CGDHS1CGSHS1RSBLS1CSBLS1CGDLS1CGSLS1RSBHS1CSBHS1CGDHS1CGSHS1RSBLS1CSBLS1CGDLS1CGSLS1Figure 13Additional placements' positionsValues for optional additional placements have to be determined depending on application.Table 3Additional placementsComponent Description Y1External oscillator CXTAL1Oscillator capacitor 1CXTAL2Oscillator capacitor 2RSBHS1Resistance snubber high-side MOSFET phase 1CSBHS1Capacitor snubber high-side MOSFET phase 1CGDHS1Gate-drain capacitor high-side MOSFET phase 1CGSHS1Gate-source capacitor high-side MOSFET phase 1RSBLS1Resistance snubber low-side MOSFET phase 1CSBLS1Capacitor snubber low-side MOSFET phase 1CGDLS1Gate-drain capacitor low-side MOSFET phase 1CGSLS1Gate-source capacitor low-side MOSFET phase 1RSBHS2Resistance snubber high-side MOSFET phase 2Table 3Additional placements (continued)Component DescriptionCSBHS2Capacitor snubber high-side MOSFET phase 2 CGDHS2Gate-drain capacitor high-side MOSFET phase 2 CGSHS2Gate-source capacitor high-side MOSFET phase 2 RSBLS2Resistance snubber low-side MOSFET phase 2 CSBLS2Capacitor snubber low-side MOSFET phase 2 CGDLS2Gate-drain capacitor low-side MOSFET phase2 CGSLS2Gate-source capacitor low-side MOSFET phase 2 RSBHS3Resistance snubber high-side MOSFET phase 3 CSBHS3Capacitor snubber high-side MOSFET phase 3 CGDHS3Gate drain capacitor high-side MOSFET phase 3 CGSHS3Gate-source capacitor high-side MOSFET phase 3 RSBLS3Resistance snubber low-side MOSFET phase 3 CSBLS3Capacitor snubber low-side MOSFET phase 3 CGDLS3Gate-drain capacitor low-side MOSFET phase 3 CGSLS3Gate-source capacitor low-side MOSFET phase 39Schematics and layout baseboard 9.1Schematics baseboardFigure 14Schematics Sheet 1Figure 15Schematics Sheet 2Figure 16Schematics Sheet 3Figure 17Schematics Sheet 4Figure 18Schematics Sheet 5Figure 19Schematics Sheet 6Figure 20Schematics Sheet 7Figure 21Schematics Sheet 8Figure 22Schematics Sheet 9Figure 23Schematics Sheet 109.2Layout baseboardFigure 24Top layerFigure 25Power layerFigure 26Ground layerFigure 27Bottom layer10 Schematics and layout VQFN socket10Schematics and layout VQFN socketSchematics VQFN socket10.1 Array Figure 28Schematics VQFN socket10.2Layout VQFN socketFigure 29Top layer VQFN socketFigure 30Bottom layer VQFN socket (mirrored)11Schematics and layout TQFP socket 11.1Schematics TQFP socketFigure 31Schematics TQFP socket11.2Layout TQFP socketFigure 32Top layer TQFP socketFigure 33Bottom layer TQFP socket (mirrored)12 Revision history12Revision historyRevision Date Changesv1.02020-07-30Initial creation.TrademarksAll referenced product or service names and trademarks are the property of their respective owners.Edition 2020-07-30Published byInfineon Technologies AG 81726 Munich, Germany© 2020 Infineon Technologies AG All Rights Reserved.Do you have a question about any aspect of this document? Email: ********************Document referenceIFX-jqv1591900179776IMPORTANT NOTICEThe information given in this document shall in noevent be regarded as a guarantee of conditions orcharacteristics (“Beschaffenheitsgarantie”) .With respect to any examples, hints or any typical valuesstated herein and/or any information regarding theapplication of the product, Infineon Technologieshereby disclaims any and all warranties and liabilities ofany kind, including without limitation warranties ofnon-infringement of intellectual property rights of anythird party.In addition, any information given in this document issubject to customer’s compliance with its obligationsstated in this document and any applicable legalrequirements, norms and standards concerningcustomer’s products and any use of the product ofInfineon Technologies in customer’s applications.The data contained in this document is exclusivelyintended for technically trained staff.It is theresponsibility of customer’s technical departments toevaluate the suitability of the product for the intendedapplication and the completeness of the productWARNINGSDue to technical requirements products may containdangerous substances. For information on the typesin question please contact your nearest InfineonTechnologies office.Except as otherwise explicitly approved by InfineonTechnologies in a written document signed byauthorized representatives of Infineon Technologies,Infineon Technologies’ products may not be used inany applications where a failure of the product orany consequences of the use thereof can reasonablybe expected to result in personal injury.。
SCOPEPILOT NCU-7000 : PENTAX Medical 的下一代3D导航系统说明书
SCOPEPILOTThe next generation 3D navigation systemIn order to maximize the detection power and optimize the quality indica-tors in colonoscopy, it is important to improve the examination technique and quality of bowel preparation. In addition advanced imaging technologies should be engaged such as High-Defi nition endoscopy, digital and optical chromoendoscopy, and navigation solutions like the SCOPEPILOT.SCOPEPILOT is designed to support an optimal navigation for an effi cient, safe and comfortable procedure to improve patient compliance and satis-faction.SCOPEPILOT NCU-7000 is the next generation Navigation system techno-logy by PENTAX Medical designed to provide a true 3D live representation of the colonoscope shape and position inside the patient´s bowel tract. SCOPEPILOT provides pinpoint navigation and differentiation of the IFT segments for an effi cient, safe and comfortable procedure.With true 3D representation of the endoscope and crisp image quality, SCOPEPILOT supports accurate scope tracking, loop managementand caecum intubation rate increasing the patient compliance and level of satisfaction.True 3D and responsive representationComprehensive colonoscopy solution3Perfectly suited to assist with everyday practice, SCOPEPILOT works with other innovative PENTAX Medical technologies to support the whole clinical pathway.1True 3D responsive imageTrue 3D representation of the colonoscope for accurate insertion tracking and effective loop management.Advanced Orientation2SCOPEPILOT system provides advanced orientation features to support the quality standards in colonoscopy and training.Explore a new way to navigateTrue 3D responsive imageAdvanced orientationTrue 3D image• T he 3D image is generated by integrated multidimensional sensors which are induced by a magnetic fi eld generated and transmitted to the control unit to be processed and displayed in real time during the procedure.• T he SCOPEPILOT image provides a 3-dimensional image with high depth of fi eld in order to differentiate the loop confi guration.• R eal time representation of the scope shape and position for a dynamic trackability and handling control.Empowered by education• T he SCOPEPILOT system provides advanced orientation features to support the quality standards for training and trainers. • S COPEPILOT is part of the Training for Excellence, a wide range ofprofessional education programs, across Europe, Middle East and Africa, spreading best practice endoscopy supported by PENTAX Medical. Learn more at www.training-for-excellence.eu and fi nd detailed information about the program, training courses and registration.SCOPEPILOT features different functions to provide the highest quality standards in colonoscopy and training.Easy setup• S COPEPILOT sensors are integrated in the colonoscope, keeping the working channel free for the advanced therapeutic procedures.• S COPEPILOT does not need a dedicated monitor, which makes setting up the system simple and quick and also minimizes the need for extra equipment in the procedure.• S COPEPILOT can be activated remotely from the panel or remote control anytime during the procedure.• I mage rotation on horizontal and vertical axis for an improved differenti-ation of the insertion tube.• S plit screen allows simultaneous viewing of the anterior and superior positions to better explain complex anatomies.• Z oom-in and zoom-out functionality for improved loops evaluation, enhanced training and procedure reports that are easily comprehensible.• T he external position sensor (EPS) helps to correctly apply abdominal pressure to support and overcome any diffi culty during the intubation.• L ength markers along the colonoscope help to understand the insertion length and those areas of interest during the procedure.SCOPEPILOT allows to view the endoscopic image and the 3D image simultaneously.Field generator unitRemote control unitData management fl exibility and traceability• S creenshots can be captured with a single press of a button and be saved to a memory stick.• P atient data can be stored together with the image capture and saved on memory sticks or the network, making it easier to trace images to patientsand reports.Split screen for simultaneous view of anterior and superior positions.Learn moreSCOPEPILOT works with other innovative PENTAX Medical technologies to support the whole clinical pathwayN C U -7000 S C O P E P I L O TE P K -i 7010 – O P T I V I S T AR A D I A N C E ®U L T R A 27”Navigation UnitHD processorsEndoscopesNavigation Control Unit designed to provide 3D representation of the endoscope shape and position inside the patient’s bowel tract during colonoscopies.A complete diagnostic tool, bringing together thebest of digital and optical enhancement for compli-mentary use in pattern and vessel visualization.The Radiance ® Ultra series transform advancedvisualization technology capabilities and features into a clinical solution.i10 series: Bigger working channel and Close Focus, all combined in an i10 HD+ endoscope, the high performance endoscopes series, for the day-to-day advanced endoscopy practice.MonitorsE P K i -500A High-Defi nition video processor offeringstandard functionality supported by state-of-the-art imaging technology.Comprehensive colonoscopy solutionSupporting the complete clinical pathwayCourtesy of Dr. Silvia Sanduleanu, Maastricht UMC+, The NetherlandsAdvanced ImagingThe SCOPEPILOT EC38-i10N Video Colonoscope is part of the latest PENTAX Medical HD+ Series.• T he i10 colonoscopes include the next generation megapixel CCD for a crisp, clear and bright HD+ image and together with Close Focus allows for a detailed examination of the mucosa up to 2 mm.• S COPEPILOT together with OPTIVISTA – EPK-i7010 Video Processor is the ultimate solution for improved diagnosis, advanced therapeutics and training on a unique platform of optical (i-scan OE) and digital enhance-ments (i-scan) supporting improved in vivo diagnosis.The secret behind improved handlingColonoscopy requires a high degree of skill and precision – not just from the professionals performing the procedure, but also from the devices they use. PENTAX Medical insertion tube is designed to provide the perfect balance between fl exibility and torque response through its proprietary i-FLEX TM and TrueTorque TM technologies.• P ENTAX Medical i-FLEX TM technology provides a graduated fl exibility of the insertion tube characteristics for an effi cient maneuvering through the tight twists and turns of the sigmoid colon. • T rueTorque TM provides a higher tactile feel with the endoscopes ensuring a predictable movement to reach the caecum quickly and effi ciently.i 10 S E R I E SL C M /01/06/16/320192/02TÜV Süd CE0123 Medical device class: IIa This product must be used only by healthcare professionals. Before usage and for detailed product specifications, please refer to the instructionsfor use. In the interest of technical process, specifications may change without notice.NetherlandsPENTAX Nederland B.V.Edisonring 66669NB Dodewaard Tel.: +31 88 / 5 30 30 30Fax: +31 88 / 5 30 30 40E-mail:*****************ItalyPENTAX Italia S.r.l.Via Dione Cassio, 1520138 MilanoTel.: +39 / 02 50 99 58 1Fax: +39 / 02 50 99 58 60E-mail:**********************************SpainSIMMEDICA – Sistemas Integrales de Medicina, S.A.Avenida del Sistema Solar 2528830 San Fernando de Henares · Madrid Tel.: +34 91 / 301 62 40Fax: +34 91 / 751 31 15E-mail:*****************RussiaMoscow Representative officeof PENTAX Europe GmbH (Germany)1-ya Tverskaya-Yamskaya ulitsa, 25, stroenie 1, 6th floor 125047, MoscowTel.: +7 495 995 10 91Fax: +7 495 995 10 91 (fax ext. 234)TurkeyPENTAX TurkeyVeko Giz Plaza, Meydan Sokak No:3/43 343396Maslak – IstanbulTel.: +90 212 / 705 05 26Fax: +90 212 / 705 05 00JapanHOYA Corporation 6-10-1 Nishi-shinjuku Shinjuku-kuTokyo 160-00231EMEA Headquarter GermanyPENTAX Europe GmbH Julius-Vosseler-Straße 10422527 HamburgTel.: +49 40 / 5 61 92 - 0Fax: +49 40 / 5 60 42 13E-mail:***************************United Kingdom PENTAX U.K. Limited PENTAX HouseHeron Drive, Langley Slough SL3 8PNTel.: +44 17 53 / 79 27 33Fax: +44 17 53 / 79 27 94E-mail:****************************FrancePENTAX France Life Care S.A.S.116 quai de Bezons B.P. 20495106 ARGENTEUIL CEDEX Tel: +33 1 / 3025 7575Fax: +33 1 / 3025 7445E-mail:*************************。
Poly G200 1.2.0用户手册说明书
RELEASE NOTES 1.2.0 | June 2020 | 3725-32916-003A Poly G200ContentsWhat’s New (2)Release History (3)Security Updates (4)Supported Browsers (4)Products Tested with This Release (4)System Constraints and Limitations (5)Resolved Issues (6)Known Issues (7)Get Help (9)Privacy Policy (10)Copyright and Trademark Information (10)PLANTRONICS + POLYCOMNOW TOGETHER AS POLY 1What’s NewPoly G200 1.2.0 includes the features and functionality of previous releases and includes the following new features.Poly Studio USB Video Bar SupportPoly G200 1.2.0 supports the Poly Studio USB video bar as the system’s camera, microphone, and speakerphone. You can configure the camera settings from the G200 system web interface.The Poly Studio remote control can mute, answer, or end a call.Note: To avoid conflicts between peripherals, d on’t use Poly Studio with another USB camera or a headset.HDMI as Camera Input (AVC only)You can configure the G200 camera settings to use the HDMI input as the video input and still share content from the Polycom Content App. You can also connect an HDCI camera to the HDMI port on your G200 system using the following accessories:•Polycom RealPresence Digital Breakout, camera adapter (part number: 3820-68485-001)•Polycom power supply (part number: 1465-52748-040)The G200 system only accepts one type of video input. You can choose to use HDMI or USB on the Camera Settings page.Turning On/Off Camera Tracking from the Remote ControlDuring a call, you can press the Menu button on the remote control to display the meeting control panel. From there, you can enable or disable the camera tracking feature.USB Headset SupportYou can use a wired or wireless USB headset for your system’s audio input and output with Poly G200 1.2.0. Once enabled, the headset becomes the primary audio device of your G200 system.Supported USB headsets:•Plantronics Blackwire 3210 USB-A•Plantronics Blackwire 3220 USB-A•Plantronics Blackwire 5210 USB-A•Plantronics Blackwire 5220 USB-A•Plantronics Voyager 3200 UC•Plantronics Voyager 4220 USB-A•Plantronics Voyager 5200 UC•Plantronics Voyager Focus UC Bluetooth•Plantronics Voyager 6200 UCPerformance Enhancement in SVC ModePoly G200 1.2.0 adopts SirenLPR-64 support in SVC mode for better network resiliency, as well as dynamic bandwidth detection and allocation of both downlink and uplink for better user experiences. More Display in SVC MeetingsYou can choose how to display the participants’ names in the meeting at System Settings > Call Settings > Display Name.A name card displays when there’s no video of a participant.Firewall or NAT TraversalPoly G200 1.2.0 supports basic firewall or network address translation (NAT) traversal in SVC mode. Meeting participants behind or outside the firewall can join the same SVC call via the Poly RealPresence Clariti Ensemble server.You can configure the ports at Admin Settings > NAT Settings.Release HistoryThis following table lists the release history of Poly G200.Release History1.2.0 May 2020 Support for Poly StudioSupport for HDMI as camera inputCamera tracking switch from the remote controlSupport for USB headsetsPerformance enhancement in SVC modeMore display options in SVC meetingsFirewall or NAT Traversal1.1.0 January 2020 Support of Poly EagleEye Cube USB cameraContent sharing from Polycom Content App in AVC modeProvisioning enhancementSVC conferencing and interoperability with Poly RealPresenceClariti Ensemble1.0.0 September 2019 Initial releaseSecurity UpdatesPlease refer to the Polycom Security Center for information about known and resolved security vulnerabilities.Supported BrowsersYou can access the G200 system web interface with the following browsers:•Google Chrome 79•Apple Safari 13.0.4•Microsoft Internet Explorer 11•Mozilla Firefox 71.0Products Tested with This ReleasePoly G200 systems are tested extensively with a wide range of products. The following list isn’t a complete inventory of compatible equipment. It indicates the products that have been tested for compatibility with this release.Note: Poly recommends that you upgrade your Poly devices with the latest software versions, as compatibility issues may already have been addressed by software updates. See the CurrentPolycom Interoperability Matrix to match product and software versions..Products Tested with This ReleasePolycom RealPresence Access Director 4.2.5 N/A10.0, 10.1 N/APolycom RealPresence Distributed MediaApplication (DMA)Polycom RealPresence DMA (edge configuration) 10.0 N/A8.7.5, 8.8.0, 8.8.1 N/APolycom RealPresence Collaboration Server (RMX)1800/2000/40008.8.0 N/APolycom RealPresence Collaboration Server, VirtualEdition8.5.13 N/APolycom RealPresence Collaboration Server2000/4000 with MPMx cardPolycom VBP 7301 Series 14.8.10 N/APolycom HDX series 3.1.14 N/APolycom RealPresence Desktop 3.10.2 N/AN/A Polycom RealPresence Mobile 3.10.1 (Android)3.11.1 (iOS)Polycom RealPresence Group Series 6.2.1, 6.2.2 N/APolycom RealPresence Web Suite 2.2.2 N/AHARMAN Media Suite 2.8.2 N/APoly RealPresence Clariti Ensemble N/A 1.1.0 Poly EagleEye Cube USB camera 1.2.0 1.2.0Poly EageEye Cube HDCI camera 1.0.1 N/APolycom EagleEye IV HDCI camera Group Series bundled N/APolycom EagleEye Mini USB camera 9.0.21 9.0.21 Polycom Content App 1.3.2 N/APoly Studio X30/X50 3.2.0 N/APoly G7500 3.0.1 N/APoly Studio 1.3.0 1.3.0 System Constraints and LimitationsThis section provides information on constraints and limitations when using Poly G200 1.2.0.Switching Between Monitor ModesPoly G200 doesn’t support switching between monitor modes by hot swapping (or hot plugging) HDMI output. If you plug a monitor in or out during a call, the system may not work correctly. For example, the layout retains single-monitor mode even if you plug in a second monitor.Monitor LimitationTo provide expected system performance, your monitor must have built-in speakers and support 1080p. For some monitors that don’t support the Consumer Electronics Control (CEC) function, after you wake up the G200 system, use the monitor remote control to wake up the monitor manually.Content LimitationPoly G200 doesn’t support H.263 content in H.323-based or SIP-based meetings. To avoid issues, Poly suggests setting the content protocol to H.264 only or enabling content transcoding in the conference template of your MCU or media application device.Single Camera LimitationPoly G200 only supports one USB camera at a time. If you connect two cameras to the G200 system, the video output may not work properly. If you experience video issues, you must unplug one camera and reboot the system.HDMI Video InputIf you connect a camera via the HDMI port and configure it as the video input, you can’t control the camera or change the camera’s resolution. You may also need to reboot the system before the camera works properly.Video Color LimitationColor reproduction accuracy can vary based upon environmental conditions and camera sensor capabilities.Polycom RealPresence Mobile and Polycom RealPresence DesktopPoly G200 doesn’t support SmartPairing with RealPresence Mobile or RealPresence Desktop. Resolved IssuesThe following table lists the resolved issues in Poly G200 1.2.0.Resolved IssuesAudio EN-159029 1.1.0 Sometimes if you plug in the expansion microphone during a call oran audio meter test, it doesn’t pick up t he audio.Camera EN-163897 1.1.0 During a call, if you connect an outdated camera, the system can’tupgrade the camera after the call.Content EN-149372 1.0.0 In dual monitor mode, if you share 720p content then unplug theHDMI input and switch to 1080p content, the secondary monitordisplays a black screen.Content EN-164060 1.1.0 In an encrypted SIP meeting, if someone shares content while youhave shared content for more than 10 minutes, you see black screeninstead of the newly sent content.Network EN-176363 1.1.0 Sometimes G200 disconnects itself from Zoom meetings.Provisioning EN-164114 1.1.0 In SVC mode, if you modify any settings on the Call Settings orGeneral page of a provisioned G200 system, the provisioning statusbecomes unregistered.Software EN-148494 1.0.0 When you change the local interface language using the system webinterface, the following issues may happen:•The camera status shows as disconnected.•In dual monitor mode, the second monitor shows a blackscreen.In dual monitor mode, after you press the reset button, the screendoesn’t show the remote control pairing page.Upgrade EN-148306 1.0.0 If you connect the EagleEye Mini USB camera with an outdatedsoftware version to a sleeping G200 system, the upgrade d oesn’tstart automatically.Upgrade EN-148492 1.0.0 Occasionally, the upgrade process may get stuck at the reboot page.Video EN-148737 1.0.0 Sometimes during a P2P call between two G200 systems, the farend may see frozen video.Video EN-163193 1.1.0 Sometimes when the RealPresence Clariti Ensemble server isheavily loaded, the received video frame rate slumps and recovers ina few seconds.Known IssuesThe following table lists known issues in this release.Note: These release notes do not provide a complete listing of all known issues that are included in the software. Issues not expected to significantly impact customers with standard voice and videoconferencing environments may not be included. In addition, the information in these releasenotes is provided as-is at the time of release and is subject to change without notice.Known IssuesAudio EN-147361 When you use G200 with HDMI content sharing from aMac and reboot the G200 system while the HDMI inputcable is plugged in, the system audio switches to theMac instead of the monitor. Reconnect the monitor’s HDMI cable.Audio EN-161139 If you locate the monitor with an EagleEye Cube camerain a huddle room with a glass wall at the opposite side ofthe camera, due to complex reflections of sound, the farend hears echoes in calls.Relocate the camera.Audio EN-171902 During a meeting, if you play music near themicrophone, the audio quality at the other end drops. Turn down the volume of the music.Calling EN-179315 When using RealPresence Collaboration Server 2000running software version 8.8.1 and you host aconference with a Chinese language name,RealPresence Collaboration Server fails to dial out toG200 systems for AVC calls.Do one of the following: •Rename theconference using anEnglish name. •Use the G200system to dial in tothe conference.Camera EN-157938 Sometimes the local view is black when you use anEagleEye Cube USB camera. Reboot the camera. If the issue persists, reboot the G200 system.Content EN-147731 If you use a third-party DP-HDMI cable connecting theG200 system to a Mac, the screen may not showcontent after waking up and reconnecting the power.Reboot the system.Content EN-148522 If you send colorful Excel content in a meeting, thecontent may be blurry when you use the followingresolution rates:•720p15 content with 512 Kbps content rate•1080p15 content with 1024 Kbps content rate Wait one or two minutes until the content restores.Content EN-157200 When you send 1080p and 720p content in a 3 × 3layout during an SVC meeting, the content rate may notreach 30 fps.None.Content EN-162536 Sometimes the G200 system can’t send content and theCVTX frame rate in Call Statistics is zero.Reboot the system.Content EN-170719 In an SVC call at 512 Kbps, when the far end sharescontent, you still see the video instead of the content.Raise the call speed.Monitor EN-138834 Philips 220TS2LB monitors may not play audio fromG200 correctly. Reconnect the monitor’s HDMI cable.Monitor EN-147744 Samsung UA40HU5920J monitors can’t wake up fromsleeping.Reboot the monitor.Monitor EN-148739 In dual monitor mode, LG 42LD450C-CA monitors maynot work as the second monitor after the G200 systemwakes up from sleeping. Reconnect the monitor’s HDMI cable.Remote Control EN-163763 Sometimes when the remote control stays idle or sleepsfor a long time, it loses connection with the system.Re-pair the remotecontrol.Video EN-161901 In an AVC call using RealPresence Collaboration Server(RMX) 8.5, when you pause the video, the far end seesthe last frame of the video instead of the muted videopicture.None.Video EN-178544 When connected with Poly Studio, the video sometimesshows a black screen.None.Video EN-180375 In an SVC call, some networks with heavy jitters maycause video to become stuck briefly.None.Get HelpFor more information about installing, configuring, and administering Poly/Polycom products or services, go to the Poly Online Support Center.Related Poly and Partner ResourcesSee the following sites for information related to this product.●The Poly Online Support Center is the entry point to online product, service, and solution supportinformation including Video Tutorials, Documents & Software, Knowledge Base, CommunityDiscussions, Poly University, and additional services.●The Polycom Document Library provides support documentation for active products, services, andsolutions. The documentation displays in responsive HTML5 format so that you can easily access and view installation, configuration, or administration content from any online device.●The Poly Community provides access to the latest developer and support information. Create anaccount to access Poly support personnel and participate in developer and support forums. You can find the latest information on hardware, software, and partner solutions topics, share ideas, and solve problems with your colleagues.●The Poly Partner Network are industry leaders who natively integrate the Poly standards-basedRealPresence Platform with their customers' current UC infrastructures, making it easy for you to communicate face-to-face with the applications and devices you use every day.●The Polycom Collaboration Services help your business succeed and get the most out of yourinvestment through the benefits of collaboration.Privacy PolicyPoly products and services process customer data in a manner consistent with the Poly Privacy Policy. Please direct comments or questions to ****************.Copyright and Trademark Information© 2020 Plantronics, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Plantronics, Inc.Plantronics, Inc. (Plantronics + Polycom, Now together as Poly)345 Encinal StreetSanta Cruz, California95060Poly and the propeller design are trademarks of Plantronics, Inc. All other trademarks are the property of their respective owners.。
网络安全与防火墙 英文文献翻译
网络安全与防火墙英文文献翻译Research of Network Security and Firewalls TechniquesAbstract:As the key facility that maintains the network security , firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. In this paper , the computer network security and the techniques of firewalls were mainly discussed, the concept and classification of the firewalls were introduced. It also introduced three kind's of basic implement techniques of the firewalls: Packet filtering , Application Proxy and Monitor model in detail. Finally described the trend of development of the firewalls techniques in Internet briefly.Key words: network security, firewalls, Packet filtering, monitor1. IntroductionNow with the computer network and e-commerce used widely, network security has become an important problem that we must consider and resolve. More and more professions. enterprises and individuals surfer from the security problem in different degree. they are looking for the more reliable safety solution . In the defense system adopted by networksecurity at present, the firewalls stand the very important position.As the key facility that maintains the network security. firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice.All the firewalls have the function to filter the IP address. This task checks the IP packet, makes the decision whether to release or to abandon it according to the source address and destination address of the IP. Shown in Fig.I, there is a firewall between two network sections, an UNIX computer is on one side of the firewall, and the other side is a PC client. While the PC client asks a telnet request for the UNIX computer, the client procedure of telnet in the PC produces a TCP packet and passes the packet to the local protocol stack to prepare to send. The protocol stack fills it in one IP packet. then, sends it to UNIX computer through the path defined by the TCP/IP stack of PC. The IP packet can't reach the UNIX computer until it passes the firewall between the PC and the UNIX computer.Fig. I Ip Address FilteringThe application firewall is a very efficient means of network security on Internet, it is installed between the trust and trustless network, can isolate the connection between the trust and trustless network, and doesn't hamper people's access to the trustless network at the same time. It can isolate the connection between the risk area namelythere may be a certain risk on Internet and the safe area LAN , and doesn't hamper people's access to the risk area at the same time. Firewall can monitor the traffic flowing in and out from the network to finish the task seemingly impossible;it only allows the safe and checked information to enter into, and meanwhile resists on the data that may bring about the threat to enterprise. As the fault and defect of the security problem become more and more general, the invasion to the network not only comes from the super attack means, but also may be from the lower-level mistakes or improper password selections on the configuration. So, the function of the firewalls is preventing the communication that not hoped and authorized passes in and out of the network protected. forcing the companies to strengthen their own network security policy. The general firewalls can achieve the following purposes: First, restraining others from entering the inside network, filtering the unsafe service and illegal user; Second, preventing the invaders from closing to your defense installation; Third,limiting the user to access the special site; Fourth,providing convenience for monitoring the Internet security.2. The classification and implement technology of firewallsAn integrated firewalls system usually consists of screening router and proxy server. The screening router is a multi-port IP router. it check the each coming IP packet according to the group regular to judge whether to transmit it. The screening router gets information from thepacket. fot example the protocol number. the IP address and port number that receiving and sending massages. the flag of link even some other IP selections. filtering IP packet. The proxy server are server process in the firewall. it can replace the network user to finish the specific TCP/IP function. A proxy server is naturally a gateway of application layer. a gateway of two networks joined specific network application. Users contact with proxy server by one of the TCP/IP application such as Telnet or FTP. the proxy server ask the users for the name of the remote host. which users want to access. After the users have answered and offered the correct users' identities and authentication information, the proxy server communicates the remote host, act as the relay between two communication sites. The whole course can be totally transparent to users.There are mainly three types in the firewalls: packet filtering. application gateways and state detection.Packet filtering firewall works on the network layer.it can filter the source address. destination address. source port and destination port of TCP/IP data packet. It has advantages such as the higher efficiency.transparent to user. and users might not feel the existence of the packer filtering firewall, unless he is the illegal user and has been refused. The shortcomings are that it can't ensure the security to most services and protocols, unable to distinguish the different users of thesame IP address effectively,and it is difficult to be configured, monitored and managed. can't offer enough daily records and warning.The application gateways firewall performs its function on the application layer, it connects with specific middle-joint firewall by a client procedure, and then the middle-joint connects with the server actually. Unlike the packet filtering firewall. when using the firewall of this kind. there is no direct connection between the outside networks. so even if the matter has happened in the firewall. the outside networks can't connect with networks protected. The application gateway firewall offers the detailed daily records and auditing function, it improved the security of the network greatly. and provides the possibility to improve the security performance of the existing software too. The application gateways firewall solves the safety problem based on the specific application program. the products based on Proxy will be improved to configure the service in common use and non-standard port. However. so long as the application program needs upgrading. the users based on Proxy will find that they must buy new Proxy server. As a technique of network safety. Firewall combined with proxy server has simple and practical characteristics, can reach a certain security request in case of not revising the original network application system. However. if the firewall system is broken through. the network protected is in having no state of protecting. And if an enterprise hopes to launch the businessactivity on Internet and carry on communication with numerous customers. it can't meet the demands. In addition, the firewall based on Proxy Service will often makes the performance of the network obviously drop.The third generation of firewall takes the detection technique of state as the core, combines the packet filtering firewall and application gateways firewall. The state detection firewall accesses and analyzes the data achieved from the communication layer through the module of state detection to perform its function. The state monitor act as firewall technique. it is best in security perfonnance, it adopts a software engine.which executes the tactics of network security on the gateways, called the detection module. On the premise of not influencing the network to work normally, detection module collects the relevant data to monitor each of the network communication layers, collects a part of data, namely status information, and stores the data up dynamically for the reference in making security decision afterward. Detection modulesupports many kinds of protocols and application program, and can implement the expansion of application and service very easily. Different from other safety schemes, before the user's access reaches the operating system of network gateways, the state monitor should collect the relevant data to analyze, combine network configuration and safety regulation to make the decisions of acceptance, refutation, appraisal or encrypting tothe communication etc Once a certain access violates the security regulation, the safety alarm will refuse it and write down to report the state of the network to the system management device. This technology has defects too, namely the configuration of the state monitor is very complicated, and will decelerate the network.3. New generation technique of firewallsAccording to the present firewalls market, the domestic and international manufacturers of firewall can all support the basic function of the firewall well,including access control, the network address transform, proxy, authentication, daily records audit etc. However, as stated before, with the attack to the network increasing, and user's requisition for network security improving day by day, the firewall must get further development. Combine the present experience of research and development and the achievement,some relevant studies point out, according to the development trend of application and technology, how to strengthen the security of firewall, improve the performance of firewall, enrich the function of firewall, will become the problem that the manufacturer of firewalls must face and solve next.The purpose of the new generation firewall is mainly combining the packet filtering and proxy technology, overcoming the defects in the safety respect of two; being able to exert the omnidirectional control from the layer of data chain to the application layer; implementing themicro-kernel of TCP/IP protocol to perform all the security control on the layer of TCP/IP protocol; based on the micro-kernel above, making the speed to exceed thetraditional packet filtering firewall; Offering the transparent mode of proxy. lightening the configuration work on the client; Supporting the data encryption and decryption DES and RSA , offering the strong support to the Virtual Private Network VPN; hiding the Inside information totally; producing a new firewall theory.The new techniqe of firewalls has not only covered all the functions of traditional packet filtering firewalls, but also has remarkable advantages in opposing overall the attack means of IP deception, SYN Flood, ICMP. ARP, etc. strengthening proxy service, merging it with packet filtering, then adding the intelligence filtering technology to make the security of the firewall rising to another height.4. ConclusionNow the firewall has already been widely used on Internet, and because of its characteristic of not limited to the TCP/IP protocol, it has more vitality outside Internet progressively too. To be subjective, the firewall is not the omnipotent prescription of solving the problem of network security, but only a component of the network security policy and tactics. However, understanding the technology of firewall and learning to use it in actual operation, believing that every net friend may bebenefited a lot from the network life in the new century.外文资料翻译译文摘要:作为关键设施,维护网络的安全性,防火墙采取建立信任与不可靠的网络障碍的目的,并落实相应的安全策略。
NetApp存储安装、配置和维护手册
文档信息本安装和维护手册为##X定制,为NetApp标准文档之补充.1作业规划步骤12配置步骤32.1设置磁盘归属,创建ROOT卷32.2检查并更新各部件的firmware系统版本152.3检查并更新存储操作系统版本192.4输入软件许可232.5执行SETUP进行初始化设置232.6调整ROOT卷的大小282.7配置VLAN292.8修改HOSTS文件302.9修改/etc/rc文件312.10配置AutoSupport服务332.11配置SSH342.12配置SNMP352.13配置NTP352.14配置MTA362.15配置IPspace362.16配置MultiStore362.17配置CIFS412.18配置ISCSI432.19配置FCP442.20配置NFS452.21配置重复数据删除462.22配置Snaprestore472.23容灾实现Snapmirror513日常维护543.1正常开关机54Page I3.2维护手段543.2.1Filerview 图形管理接口543.2.2命令行<CLI>543.3空间管理:Aggr, Volume和lun的介绍553.4常用命令基本应用553.5日常系统检查553.5.1目测553.5.2例行系统检查553.6autosupport功能简介和配置564故障处理流程584.1支持方式584.1.1NetApp on the web <NOW> site和服务584.1.2GSC< Global Support Center 全球支持中心>58 4.2案例开立流程584.3损坏部件更换流程591 作业规划步骤Page 12 配置步骤配置参数表2.1 设置磁盘归属,创建ROOT卷2.2 检查并更新各部件的firmware系统版本2.3 检查并更新存储操作系统版本2.4 输入软件许可使用license add ######X命令添加许可,全部输入后,使用license命令进行检查.鉴于许可的##性,此处不截屏日志.2.5 执行SETUP进行初始化设置2.6 调整ROOT卷的大小2.7 配置VLAN2.8 修改HOSTS文件2.9 修改/etc/rc文件2.10 配置AutoSupport服务2.11 配置SSH2.12 配置SNMP2.13 配置NTP2.14 配置MTA2.15 配置IPspace2.16 配置MultiStore2.17 配置CIFS2.18 配置ISCSI2.19 配置FCP2.20 配置NFS2.21 配置重复数据删除2.22 配置Snaprestore。
Android智能手机系统的文件实时监控技术
Android 智能手机系统的文件实时监控技术王志国,侯银涛,石荣刚(西安通信学院,陕西 西安 710106)摘 要:通过对Android 智能手机操作系统的研究,提出了应用于该系统的基于系统调用的文件实时监控技术,并详述了该技术的基本原理及其关键实现细节。
实验测试表明,其能够达到实时监测文件访问的目的。
关键词: 文件实时监控;Android ;系统调用;智能手机The File Real-time Monitoring Technology Based on the Android Smart Phone SystemWANG Zhi-guo,HOU Yin-tao,SHI Rong-gang(Communication institute of Xi’an, Xi’an ,Shaanxi 710106,China)Abstract : According to the research of the Android smart phone system, the paper has given the file real-time monitoring technology based on system calls used in Android, and discusses this technology’s basic principle and the key implementations in detail. Through the experimental test, it is proved that it can monitor the real-time operation of files. Key words : file real-time monitoring; Android ;system call ;smart phone1 前言随着手机技术的不断发展,功能越来越强大,向智能方向发展,手机与个人电脑之间的界限越来越模糊,许多用户将自己的私密信息甚至商业机密存放在手机中,因此对这些文件的保护得到了越来越多的重视。
Belimo Energy Valve 2 智能能源控制阀门说明书
Belimo Energy Valve™Belimo Energy Valve™2The Belimo Energy Valve™ provides pressure-independent flow andpower control and transparent monitoring of heating or cooling sys-tems, ensuring that they are not operated with a temperature spreadthat is too low (low delta T syndrome). The Belimo Energy Valve™ isan IoT device (IoT: Internet of Things), i.e. an intelligent pressure-independent valve that can be connected to the Belimo Cloud. Uniquefunctions such as the delta T manager or the possibility of directpower control provide clarity, enhance efficiency and reduce costs.I ntegrated sensors and logic provide accurate data on heat exchanger power. Energy monitoring data is used to verify system performance throughout the entireservice life and to optimise it as necessary.T he Belimo Cloud application monitors energy con-sumption and provides evaluations to improve product and system quality. Communication via Modbus, B ACnet, MP-Bus or analogue connection enables flexi-ble system integration.EfficientI ncreased efficiency thanks to power monitoring. Withthe Belimo Energy Valve™ you always know where theenergy is going. The power control enables pressureand temperature-independent control of the power out-put at the heat exchanger.Know wherethe energy is going.“The default works well;if you want to go a stepfurther, however, tailoredsolutions are required.Thanks to the BelimoEnergy Valve™, we canrecognise the preciseenergy requirements ofthe heating system andproduce exactly theamount of heat that isactually needed.”Samuel Lorez, Technical ManagerLenzerheide Bergbahnen AG3Belimo Energy Valve™The multifunctional all-in-one solution.The Belimo Energy Valve™, which consists of a 2-way characterised control valve, a volumetric flow meter, two temperature sensors and an actuator with integrated logic, combines several functions in one single, easy-to-install unit.This all-in-one solution reduces investment costs compared to conventional solutions. Furthermore, installation costs are lower, hydronic balancing is considerably simplified and easy adaptation ispossible for conversions.I ntegrated sensors for measuring the temperature spread, the flow (incl. glycol content compensation)and thereby the power.C ontrol the valve position, flow or power to perfectlycontrol the heat exchanger.T he Belimo Energy Valve™ always ensures the correct amount of water – even if there are differential pressurechanges and during partial load operation.No leakages thanks to an air-bubble tight-closingcharacterised control valve.E nergy monitoringH ighlighting of optimisation potential through recording of all system data.Shopping list1 Belimo Energy Valve P1 Control valve 1 Balancing valve 1 Flow sensor2 Temperature sensors 1 Complex calculation 30 min hydronic balancing 30 min for installation Expenses for cloud connectionBelimo Energy Valve™4Where power control iseasier than ever before.Controlling and balancingControl of valve position, flow or power for perfect modulation ofthe coil.Additional fail-safe functionprovides security for safetys equences upon a loss of power.Multi-bus connectionBus connection to BACnet, MP-Bus and Modbus with the same valve.Power control and delta T managerlogic built-in monitor coilp erformance and optimise the available energy of the coil bymaintaining the delta T.Integrated webserverUser interface with an intuitive installation setup to make it readyin only a few steps.5Belimo Energy Valve™Glycol monitoring & compensationis an exclusive Belimo Energy Valve™feature that utilises an embedded temperature sensor and advanced logic algorithms to monitor the percentageof glycol content in the HVAC system.Flow measurementFlow sensor for accuratem easurement over the entire range.Temperature measurementTwin sensors for a better differential temperature measurement.ShuttingAir bubble-tight characterisedcontrol valve.Belimo Energy Valve™6Added value with theBelimo Energy Valve™.Facilitating work, minimising expenses and preventing sourcesof error were all important aspects in the development of theBelimo Energy Valve™.Your advantages asConsulting engineers:—Reduced planning effort and time savings throughsimple valve selection—Automatic hydronic balancing at every load condition—Easy adaptations to power changes possible—Specially designed planning aids and documents toassist you in your day-to-day work—Cost reduction and time savings with anall-in-one solution—No complicated hydronic balancing necessary—E asy commissioning in just a few steps with anintuitive start-up assistantSystem integrators:—Free choice of control (BACnet, Modbus, MP-Bus oranalogue signal)—Energy optimisation through data transparency—Connection to the Belimo Cloud—Real-time function monitoring—High transparency and efficiency through energyand system monitoring—System safety guaranteed by measuring the glycolcontent and fail-safe—Optimisation options during operation—Maximum comfort with minimum operating coststhroughout the entire life cycle7Belimo Energy Valve™Consulting engineersInstallersSystem integratorsOperatorsAutomatic hydronic balancing Measurement of glycol content Optimisation via cloud Time savings System monitoring Transparency Easy conversion Flexible installation Energy efficiency Delta t management All-in-one solutionThe most important features and functions at a glanceA look at the four areas of planning, installation, integration and operation uncovers the benefits of the unique Belimo Energy Valve™.Belimo Energy Valve™8Modern hydraulics invarious applications.To ensure high-energy performance in buildings, efficient heating and cooling systems are becoming increasingly important.For energy-efficient operation in heating and cooling systems, hydraulics is of enormous importance as it forms the link between generation, distribution and the consumer system. Modern hydraulics withintelligent componentsUtilising appropriate circuits and selecting the right components, such as variable-speed pumps or pressure-independent valves, make it possible to implement a modern system that is adapted to all system components. “Intelligent” components are necessary to make energy flows transparent and prevent over- or undersupply of system components. Thus, a cycle of measuring and adapting is inevitable.The all-in-one features of the Belimo Energy Valve™ provide power control for pressure and temperature-independent operation.PROPERTIES FOR OPTIMALAND ENERGY-EFFICIENT POWER TRANSMISSION:– C omplete system observation (e.g.consumer impact on the generatingsystem)– S uitable hydronic circuits (distributors, consumers)– C onsistent temperature and volumetric flow measurement for accurate power control– S uitable pump behaviour(proportionally regulated pump)2-way applicationsFlow control (injection circuit)Air heater (injection circuit)Throttling circuitT he Belimo Energy Valve™ symbol is available for CAD planning tools (standard colour black).9Belimo Energy Valve™Operational optimisation made easy.The low delta T syndromeMonitoring the temperature spread (delta T) is necessary to ensureefficient operation of a system over its entire life cycle. If a heatingor cooling system is operated with too much water, this cannot beconverted into higher heating or cooling capacity. In this case, thetemperature spread between supply and return decreases. The so-called low delta T syndrome occurs. This impairs the efficiency ofthe entire system and increases the energy requirement of thepumps and generating system. Possible causes of low delta Tsyndrome are operational soiling of the heat exchanger, incorrectlydimensioned control valves, lack of hydronic balancing and differen-tial pressure fluctuations.Power output Temperature spreadDelta T management from BelimoThe delta T manager integrated in the Belimo Energy Valve™ is a function that continuously measures the temperature spread and compares it with the system-specific limiting value. If it falls below this, the Belimo Energy Valve™ automatically adjusts the flow so that only the amount of water actually needed to achieve the de-sired power is used. As a result, the integrated logic prevents the occurrence of the low delta T syndrome and ensures maximum comfort with the lowest possible energy consumption. All values can be conveniently viewed via the Belimo Cloud and can also be adjusted at any time during operation. For even better energy effi-ciency, delta T management can also be performed by Belimo ex-perts through the Belimo Cloud.The buildings and buildings construction sectors combined are responsible for 36% of global final energy consumption and nearly 40% of total direct and indirect CO2 emissions.(Source: International Energy Agency, 2019, /topics/energyefficiency/buildings)Belimo Energy Valve™10Added value throughintelligent networking.The potential of connected buildingsBelimo uses IoT technology to meet the future needs of connectedbuildings for greater efficiency and convenience. With the help ofthe cloud connection or versatile bus communication, buildings canbe more easily optimised, managed and maintained thanks to theBelimo Energy Valve™.The multifunctional Belimo Energy Valve™with connection to the Belimo CloudOptimisation in the Belimo Cloud fully exploits the energy potential.Cloud-based evaluations provide the recommended delta T set-tings for efficient operation. System performance and stability areimproved.In addition, Belimo Support assists with commissioning and opti-mally adjusting the Belimo Energy Valve™ in all operating phases.Experienced technicians from Belimo help users solve technicalproblems.The Belimo Cloud provides easy access to all data throughout thelifecycle of the Belimo Energy Valve™. Online software updatesensure that the Belimo Energy Valve™ is always up-to-date. Perfor-mance reporting also offers a clear report that presents current andpast performance data, such as flow, energy consumption, powerrequirements and delta T. Another advantage of the cloud connec-tion is the extension of the guarantee from five to seven years.Versatile bus communicationNot only can the Belimo Energy Valve™ be controlled via the cloud,but it also supports all common building automation communica-tion protocols (BACnet, Modbus, Belimo MP-Bus). Even with con-ventional control by means of analogue positioning signals, the buscommunication can be used for monitoring and override.11Belimo Energy Valve™Proven logic with exclusive functions.Flow measurement with glycol compensationThe Belimo Energy Valve™ provides accurate and reproducible flowmeasurement of water and water-glycol mixtures in all HVAC appli -cations. The integrated patented logic for temperature and glycolcompensation eliminates the need for manual calibration. Addi -tionally, the measured glycol content can be output for monitoringp urposes.Characterised control valve technology The tight-sealing characterised control valve prevents internal leak -age in the closed state and thus unwanted consumption at zero load. The self-cleaning effect prevents the control element from sticking and ensures reliable activation of the cooling or heatingpower. Even low heating or cooling capacities (lowest partial loadrange) are very easy to control, since there is no input jump in theopening range of the valve. The small height reduces the space re -quirement and accordingly increases the freedom of design.Fluid temperature: −10...120 °C System pressure (p s ): 1600 kPaOur proven Belimo Energy Valve™ is also available in DN 15...50 as a 2-way and 3-way solution.Now with Thermal Energy Meter (see separate brochure).ADVANTAGES AT A GLANCE:– Q uick and reliable selection as well as simple commissioning – E nergy saving, thanks to automatic andpermanent hydronic balancing– I ncreased room comfort by ensuringthe correct amount of water fordifferential pressure changes and inpartial load operation– E fficient operation guaranteed with thedelta T manager– I ntelligent networkingAll inclusive.E N – 08.2023 – S u b j e c t t o t e c h n i c a l m o d i fi c a t i o n s 5-year guarantee Complete product range Short delivery time On site around the globe Tested quality Comprehensive support BELIMO Asia Pacific Ltd.**************************Belimo as a global market leader develops innovative solutions for the controlling of heating, ventilation and air-conditioning systems. Actuators, valves and sensors represent our core business.Always focusing on customer added value, we deliver more than only products. We offer you the complete product range for theregulation and control of HVAC systems from a single source. At the same time, we rely on tested Swiss quality with a five-year warranty. Our worldwide representatives in over 80 countries guarantee short delivery times and comprehensive support through the entire product life. Belimo does indeed include everything.The “small” Belimo devices have a big impact on comfort, energy efficiency, safety, installation and maintenance.In short: Small devices, big impact.。
高中英语寒假作业阅读培优小卷:北京专用01 阅读培优小卷 (原卷版)
高一英语寒假作业阅读培优小卷北京专用01第一部分阅读理解(共两节,满分50分)第一节(共15小题;每小题2.5分,满分37.5分)阅读下列短文,从每题所给的四个选项(A、B、C和D)中,选出最佳选项。
A(2022春·北京·高一北京市陈经纶中学)Love the way you walkListen carefully to the footsteps in the family home, and you can probably work out who is walking about. The features most commonly used to identify people are faces, voices and fingerprints. But the way they walk is also a giveaway.Researchers have used video cameras and computers to analyze people’s gaits, and are now quite good at it. But translating such knowledge into a practical identification system can be tricky.Cameras are often visible, are difficult to set up, require good lighting and may have their view blocked by other people. A team led by Dr. Ozanyan and Dr. Scully have been looking for a better way to recognize gait. Their answer: pressure-sensitive mats.Such mats are nothing new. They have been a part of security system. But Ozanyan and Scully use a complicated version that can record the amount of pressure applied in different paces as someone walks across it. These measurements form a pattern unique to the walker. The researchers turned to an artificial-intelligence system to recognize such patterns, and it seemed to work. In a study in 2018, they tested the system on a database of footsteps of 127 people. They found its error rate in identifying who was a mere 0. 7%. And Scully says even without a database of footsteps to work with, the system can determine some’s sex and, with reasonable accuracy, a subject’s age.One application of the mat-based gait-recognition system might be in health care, particularly for the elderly.A mat placed in a nursing home or an old person’s own residence could monitor changes in an individual’s gait that indicate certain illnesses. That would provide early warning of someone being at greater risk of falling over.Gait analysis might also be used as a security measure in the workplace, monitoring access to restricted areas, such as parts of military bases, server farms or laboratories dealing with dangerous materials.Perhaps the most interesting use of the mats, though, would be in public places, such as airports. For that to work, the footsteps of those to be recognized would need to have been stores in a database, which would be harder to arrange than the collection of photographs and fingerprints that existing airport security systems rely on. Many aircrew or preregistered frequent flyers would welcome anything that speeded up one of the most tiresome modern travel.1.What is mainly talked about in Paragraph 2?A.Research equipment B.Research findings.C.Research assumptions(假设)D.Research background.2.According to Paragraph 3, the mat is used to ________ .A.collect data B.ensure safety C.determine age D.analyse pressure3.The gait-recognition system might be applied to________.A.monitor security work progress B.find potential health problemsC.keep track of travelling frequency D.warn passengers of possible dangers4.The main purpose of the passage is to ________.A.compare and educate B.examine and assess(评估)C.discuss and persuade D.explain and informB(2022春·北京·高一北师大二附中)All I had to do for the two dollars was clean her house for a few hours after school. It was a beautiful house, too, with a plastic-covered sofa and chairs, wall-to-wall blue-and-white carpeting, a white enamel stove, a washing machine and a dryer—things that were common in her neighborhood, absent in mine. In the middle of the war, she had butter, sugar, steaks, and seam-up-the-back stockings.I knew how to scrub floors on my knees and how to wash clothes in our zinc tub, but I had never seen a Hoover vacuum cleaner or an iron that wasn’t heated by fire.Part of my pride in working for her was earning money I could squander (浪费): on movies, candy, paddle balls, jacks, ice-cream cones. But a larger part of my pride was based on the fact that I gave half my wages to my mother, which meant that some of my earnings were used for real things—an insurance-policy payment or what was owed to the milkman or the iceman. The pleasure of being necessary to my parents was profound. I was not like the children in folktales: burdensome mouths to feed, nuisances to be corrected, problems so severe that they were abandoned to the forest. I had a status that doing routine chores in my house did not provide—and it earned me a slow smile, an approving nod from an adult. Confirmations that I was adultlike, not childlike.In those days, the forties, children were not just loved or liked; they were needed. They could earn money; they could care for children younger than themselves; they could work the farm, take care of the herd, run errands (差事), and much more. I suspect that children aren’t needed in that way now. They are loved, doted on, protected, and helped. Fine, and yet...Little by little, I got better at cleaning her house—good enough to be given more to do, much more. I was ordered to carry bookcases upstairs and, once, to move a piano from one side of a room to the other. I fell carrying the bookcases. And after pushing the piano my arms and legs hurt so badly. I wanted to refuse, or at least to complain, but I was afraid she would fire me, and I would lose the freedom the dollar gave me, as well as the standing I had at home—although both were slowly being eroded. She began to offer me her clothes, for a price. Impressed by these worn things, which looked simply gorgeous to a little girl who had only two dresses to wear to school, I bought a few. Until my mother asked me if I really wanted to work for castoffs. So I learned to say “No, thank you”to a faded sweater offered for a quarter of a week’s pay.Still, I had trouble summoning (鼓起) the courage to discuss or object to the increasing demands she made. And I knew that if I told my mother how unhappy I was she would tell me to quit. Then one day, alone in the kitchen with my father, I let drop a few whines about the job. I gave him details, examples of what troubled me, yet although he listened intently, I saw no sympathy in his eyes. No “Oh, you poor little thing.”Perhaps he understood that what I wanted was a solution to the job, not an escape from it. In any case, he put down his cup of coffee and said, “Listen. You don’t live there. You live here. With your people. Go to work. Get your money. And come on home.”That was what he said. This was what I heard:Whatever the work is, do it well—not for the boss but for yourself.You make the job; it doesn’t make you.Your real life is with us—your family.You are not the work you do; you are the person you are.I have worked for all sorts of people since then, geniuses and morons, quick-witted and dull, big-hearted and narrow. I’ve had many kinds of jobs, but since that conversation with my father I have never considered the level of labor to be the measure of myself, and I have never placed the security of a job above the value of home. 5.According to the article, which of the following is true about children in the 1940s and now?A.Children become needed, loved and liked when they are at forty.B.Children in modern times are less likely to be spoiled by parents.C.Children in 1940s are capable as they can handle various daily routine.D.Children in modern times aren’t needed to do daily works any more.6.What did the author’s father make her understand?A.Don’t escape from difficulties at work.B.Whatever decision she made, her father would support her.C.Convey her dissatisfaction with her work.D.Make a distinction between work and life.7.Which of the following corresponds to the author’s views in the passage?A.Don’t regard work achievement as a criterion for evaluating oneself.B.Hard work is a struggle for a better future in your limited life.C.Parents are the best teachers of children.D.Job security is less valuable when compared with family.C(2022春·北京·高一北大附中)Carnival: One Day in RioLast year I went to the Rio de Janeiro Carnival, and it blew my mind. It had been my dream to attend thefamous carnival for many years, so I was excited. However, the moment I arrived, I was a little bit nervous because there were so many people on the streets. They say that five or six million people come to Rio during carnival time and about two million of them are on the streets on any given day. Luckily, I had a local guide, my sister’s friend Ronnie. He said he would take care of me and show me all the highlights. He did not let me down.Well, the carnival is most definitely all about the samba. It’s a style of music and dance which has its roots in Africa. Lots of Africans were used as slave labor by the Portuguese when Brazil was being colonized, so this mixed culture of African, Latin and European styles is really strong here. Samba music is usually fast and exciting with a lot of drums and harmonic vocals. It’s the kind of music that you can’t help dancing to, and I was learning that as I followed Ronnie through the crowd, my hips and shoulders were swinging almost involuntarily.Ronnie had got us tickets for the samba parade, the icon of Brazilian culture, inside the Sambadrome where the top samba schools compete for the championship title, but we still had a long way to go through the street parties. He said most people enjoy the carnival by making their own parties in the street. About the samba parade, twelve main teams compete for the championship, and if they win, their performance will be talked about for years to come. So, you must be wondering how it was. Well, I’m afraid I can’t tell you. Ronnie and I never made into the Sambadrome. We spent the day moving from one street party to another. There were more snacks, more drinks and lots of dancing. Do I regret missing the main parade? Not at all. I experienced the carnival like the locals, and it was truly amazing.8.What was the main cause for the author’s tension in the beginning?A.The doubts about the visit.B.The nervousness over the crowd.C.The inability to find a local guide.D.The anxiety about visiting a new country.9.What can we learn about samba from this passage?A.Samba has its roots in America.B.Samba is not the taste of the writer.C.Samba has a long and mixed culture.D.Samba music is usually slow and soft.10.The author didn’t regret missing the parade because ________.A.she met some amazing local peopleB.she didn’t have the tickets for the paradeC.she celebrated the festival in a local wayD.she enjoyed the carnival by making her own parties11.According to the passage, which of the following words can best describe Ronnie?A.Modest and determined.B.Humorous and ambitious.C.Creative and sympathetic D.Reliable and considerate.D(2022春·北京·高一北京二十中)In over 25 years, DeSimone has spun his research findings into commercial gold by launching several businesses. As a faculty member at the University of North Cai’olina, he provided scientific advice and held equity in the businesses. But he has never actually managed his companies. His employers bar him from simultaneously holding an academic post and an executive position. The dual roles can present huge conflicts.Conflicts of interest (COIs)occur when an individual’s personal interests—family, friendships, financial, or social factors—could compromise his or her judgment, decisions, or actions in the workplace, and it makes sound career sense to think about how to manage them. Researchers should disclose potential or existing conflicts across all aspects of academic life.In most places, COI management runs on an honor system. Researchers decide which financial holdings and relationships to disclose to university administrators. Journals and funders adopt a similar system when they ask authors and peer reviewers about potential conflicts related to manuscript or grant approvals.Most research institutions offer training to help faculty members to understand what constitutes a potential or existing conflict. Administrators then decide whether the interest presents a conflict, and whether that conflict can be handled. If so, they create a management plan to address it. If not, researchers must abandon the work, partner with researchers at other institutions, or leave their university.Perception plays a part in defining a potential conflict, warns Walt, a chemist at Tufts University. Investigators who develop a technology in the laboratory and then transfer it to their company could create a conflict of interest in the eyes of their students, Walt says. But the potential conflict can be avoided by drafting a licensing agreement that bars discoveries from automatically being transferred to the investigator’s company. Walt created such an arrangement to assure his students that they weren’t actually working for his private companies.Relationships can pose conflicts when conference organizers are choosing speakers. Members of the American Society for Human Genetics program committee, which selects abstracts and talks for their annual meeting, must recuse(要求回避)themselves from considering talks by, for example, researchers at their current and past institutions, close collaborators and those with whom they have personal or familial ties.Even differing points of view can play a part. Scacheri, a geneticist who chairs the committee, says that members who have disagreed personally with potential speakers might also be obliged to recuse themselves: “If you feel like you can’t be an impartial (公正的)reviewer, that is considered a COI.”Handling COIs can be burdensome. COI managers emphasize that the goal is not to suppress innovation, but to expose potential conflicts so that they can be managed. “Nothing about the process is meant to be prohibitive,” says Grewal, a COI officer at MIT. Her institution wants to enable good science and the betterment of humanity. “During that process,” she says, “if you make some money, that’s good as well.”12.The example of DeSimone in Paragraph 1 is used mainly to________.A.raise a question B.report a findingC.introduce a topic D.present a theory13.To better deal with COIs,________.A.researchers have to quit their job at the universityB.researchers should report the conflicts that possibly existC.institutions need to monitor the staff’s career and relationshipsD.institutions should train researchers to create management plans14.What can we leam from the passage?A.Grewal considers COI management exhausting and costly.B.Walt arranged to transfer discoveries at his lab to his companies.C.Conference organizers should avoid inviting unqualified speakers.D.Scacheri believes personal viewpoints may impact a reviewer’s decision.15.What can we infer from the passage?A.COIs can be defined depending on interpretations.B.COIs benefit scientific innovation and better humanity.C.COIs arise primarily due to the pursuit of financial gains.D.COIs can be got rid of by promoting fairness in workplaces.第二节(共5小题;每小题2.5分,满分12.5分)根据短文内容,从短文后的选项中选出能填入空白处的最佳选项。
莫卡产品说明书
Copyright © 2019 Moxa Inc. Released on August 14, 2019About MoxaMoxa is a leading manufacturer of industrial networking, computing, and automationsolutions. With over 25 years of industry experience, Moxa has connected more than 30 million devices worldwide and has a distribution and service network that reaches customers in more than 70 countries. Moxa delivers lasting business value byempowering industry with reliable networks and sincere service for automation systems. Information about Moxa’s solutions is available at . You may also contact Moxa by email at *************. How to Contact Moxa Tel: +886-2-8919-1230 How to Use the TIA Portal to Set a Siemens PLC and the MGate 5103Moxa Technical Support Team****************Contents1 Application Description ...................................................................2 2 System Topology .............................................................................3 3Required Equipment and Components (4)A. TIA Portal V14 ............................................................................................ 4B.Modbus Slave (4)C. MGate 5103 Firmware .................................................................................. 4 D. MGate 5103’s GSDML File .. (4)4MGate 5103 Settings (5)A. Protocol Conversion ..................................................................................... 5B.Configure Modbus Commands (5)C. Configure PROFINET Setting ......................................................................... 7 D. I/O Data Mapping . (7)5 Siemens PLC Setting ....................................................................... 8 6Communication Test (21)A. Status Monitoring ...................................................................................... 21 B. Fault Protection .. (26)1Application DescriptionThe TIA Portal is Siemens’s new software platform to configure and program S7-300/400/1200/1500 PLCs. This technical note demonstrates how to configure the Siemens S7-300 to connect with the MGate 5103 in TIA Portal V14.The MGate 5103 supports a variety of maintenance functions, such as ProtocolDiagnostics, Traffic Monitoring, Status Monitoring, and Fault Protection. The Status Monitoring function notifies a PLC/DCS/SCADA system when a Modbus device getsdisconnected or does not respond. If a command has run successfully, the status bit’s value will be 1. If a command has failed, the status bit’s value will then be 0. In this case, themaster device will be aware of the failure status of the slave device. When a PROFINETconnection is disconnected, the Fault Protection function executes actions on end devices identified by a pre-defined value set by the user.This technical note also demonstrates how the PROFINET IO controller (Siemens PLC) receive these Modbus command statuses by sending PROFINET Acyclic Read commands, as well as how the Fault Protection function works. We also demonstrated how to use the Protocol Diagnostics and Traffic Monitoring functions for troubleshooting.2System TopologyThis technical note demonstrates how to exchange data between a PROFINET IO controller and six Modbus RTU slaves. The Modbus RTU slave IDs 1-3 use Modbus Read command, and shows the Status Monitoring function. The Modbus RTU slave IDs 4-6 use Modbus Write command, and shows the Fault Protection function.We use Siemens S7-300 as the PROFINET IO controller to connect the MGate 5103. Ona PC, we run Modbus Slave tools to simulate Modbus RTU slaves and connect to the MGate5103’s serial port.3Required Equipment and ComponentsA.TIA Portal V14As a registered Siemens’s customer, you can download the trial software for the TIAPortal V14 and test it for 21 days.Version: V14Download Website:https:///cs/document/109740158/simatic-step-7-(tia-portal)-v14-trial-download?dti=0&lc=en-WWB.Modbus SlaveModbus Slave is a very popular Modbus slave simulator to test and debug of yourModbus devices. It supports Modbus RTU/ASCII and Modbus TCP/IP.Version: V6+Download Website:/download.htmlC.MGate 5103 FirmwareVersion: V.1.0 or higherDownload Website: D.MGate 5103’s GSDML FileThe GSDML (General Station Description Mark-Up Language) file is an electronic devicedatasheet or device database file that identifies the PROFINET IO device. This file can beinstalled into the PROFINET Engineering Tool, e.g., the TIA Portal, so that this PROFINETEngineering Tool can configure the PROFINET IO Device.Version: GSDML-V2.2-Moxa-Device0202-20170502.xml/GSDML-V2.3-Moxa-Device0202-20170502.xmlDownload Website: Note: For wiring, please refer to the MGate 5103’s User’s Manual.4 MGate 5103 SettingsFor details, please refer to the MGate 5103 user’s manual. You can download it from A. Protocol ConversionLog in to the MGate 5103’s Web Console. Set Protocol Conversion : Role 1 as PROFINET IO Device , Role 2 as Modbus RTU/ASCII Master .B. Configure Modbus CommandsUnder Modbus RTU/ASCII setting , set Modbus as RTU , Max. retry as 0. The default of this value is 3. Change this value to 0 in order to quickly detect when a Modbus command failed.Then add the commands below to poll Slave ID1-ID3’s register 0, and add Function Code 06 commands to write Slave ID4-ID6’s register 0.For ID4 command’s Fault Protection, keep it as Keep latest data.For ID5 command’s Fault Protection, choose Clear all data bit to 0 and set Fault timeout as 10000 ms.For ID6 command’s Fault Protection, choose Set to user defined value and set Fault value as 0xFF 0xFF . Fault timeout is set as 10000 ms.C.Configure PROFINET SettingOnly the Device Name needs to be set. Set it as mgate-dev.D.I/O Data MappingAllow the MGate to automap the data on both sides of the MGate’s IO Internal Memory.Check I/O Data Mapping with Data flow direction: PROFINET IO Controller →Modbus RTU/ASCII Slave or PROFINET IO Controller ← Modbus RTU/ASCIISlave. Make sure the PROFINET Output or Input Slot Size is fully and correctlymapped to Modbus Internal Address.5Siemens PLC Setting(1)Create a new project.(2)After the project is successfully created, click Configure a device to add thePLC.According to the actual PLC’s CPU model, select it from “Controllers → S7-300 →CPU ” as below:(3) Click PLC’s PROFINET interface_1 to set its IP Address .(4) Click Add new subne t to create subnet as PN/IE_1.(5) Click Options Manage general station description to install the MGate5103’s GSD file.Select the latest version of the MGate 5103, V2.3, and then click Install .Make sure the installation is successful.(6) In the Hardware catalog window, filter “moxa” to search the MGate 5103. Choose the Moxa PROFINET Device 0202 device icon, and drag and drop to PN/IE_1 subnet.(7)Under Network view, it shows that the MGate 5103 is in the PN/IE_1subnet. Click Not assigned to assign the MGate 5103 to PN/IE_1.Then MGate 5103 is set into the PLC_1’s PROFINET IO System.If your MGate 5103 Device Name is not mgate-dev, you can modify it via Properties → General → Name”.(8)Under the MGate 5103’s Device view, drag and drop Input 006 Byte to Slot 1. Assign the I address to 0-5.Drag and drop Output 006 Byte to Slot 2. Assign the Q address to 0-5.(9)We want to get the register values of Modbus ID1- ID3 and make sure these Modbus commands’ responses are valid. If a Modbus command’s response is invalid or times out, the register value will show 0xFFFF . We will show the details later . We created these tags below:Click Main [OB1] to edit program.Drag and Drop the RDREC function block to Network 1. DB setting pops up to add RDREC Instance. Click OK to apply it.Fill in the input/output parameters as below:Parameter descriptions:①.REQ: If this bit is true, the request will be sent to the MGate 5103.②.VALID: Bit memory M11.1 indicates whether a new data record was received andvalid.③.BUSY: Bit memory M11.2 indicates whether the read process has been terminated.④.ERROR: Bit memory M11.3 indicates whether an error occurred while processing thefunction.⑤.STATUS: The bit memory - double word MD12 contains block status or errorinformation.⑥.ID: It is the PN-IO diagnostic address, which is 2041, as below. This address isused for PROFINET acyclic read/write for the MGate 5103 to do some pre-define diagnoses.If you use the CPU 1200 or 1500 Series, then the ID should be taken from System constants or the General->PROFINET interface->Hardware identifier field.⑦. INDEX: Data record number . For the MGate 5103, the command status startingaddress is 30000.⑧. MLEN: The maximum length of bytes of the data record information to be fetched.In this demo, we only need one byte to get command 1-3 status (Bit 0-2). ⑨. RECORD: The destination area for the read data record. We use MB10 to store it.Other Networks’ programs are illustrated as below:(10)Execute Compile and make sure there is no error.(11)Execute Download.Click Start Search to search an accessible PLC.When an accessible PLC has been found, execute Load .The TIA Portal will check hardware and software consistency. After checking for any errors, click Load to download.After loading, enable Start all to start modules, then click Finish.6Communication TestA.Status Monitoring(1)PC runs the Modbus Slave tool to connect to the MGate 5103’s Serial port.Add slave ID1-ID3 and set each one’s register 0’s value as 1, 2, 3, respectively.(2)Click Add new watch table to create the Watch table_1.Add the tags below to be monitored:(3)Click Go online,then click Monitor all.If ReqBit status is not True, you can input True under the Modify value column, click the Modify button to enable send request.We can see RecordByte shows a value of 7, pointing out that the commands 1-3 are successful. The ID1Value-ID3Value are running as 1, 2, 3, respectively.(4) We can use the MGate’s Protocol Diagnostics tool on the Web Console to checkModbus and PROFINET communication status:Via System Monitoring → Protocol Status → Modbus RTU/ASCII Diagnose , we can see its Received Valid response counter is equal to the Sent request counter .Via System Monitoring → Protocol Status → Modbus RTU/ASCII Traffic , we can log Modbus RTU communication traffic:Via System Monitoring → Protocol Status → PROFINET Diagnose, we can see its Connected PLC MAC Address:Via System Monitoring → Protocol Status → I/O Data View, we can choose PROFINET IO Controller ← Modbus RTU/ASCII Slave data flow side to see theModbus slave input data:(5)Disable Modbus Slave ID 2 on Modbus Slave tool, so Modbus Command 2can’t receive any responses. Check Watch table, RecordByte shows a value of 5 and ID2value is updated as 0xFFFF.Check Modbus RTU/ASCII Diagnose, the Timeout counter is increasing:B.Fault Protection(1)Add slave ID4-ID6 on the Modbus Slave tool as below:(2)On Watch table, we set Modify value under QW0 as 0x0004, QW2 as 0x0005,QW4 as 0x0006. Then click the Modify button.(3)Check Modbus Slave ID 4-ID6; they are updated as 0x0004, 0x0005, 0x0006.Via System Monitoring → Protocol Status → I/O Data View, we can choosePROFINET IO Controller → Modbus RTU/ASCII Slave data flow side to see thePROFINET output data:(4)Shut down the PLC. After 10000 ms, the Fault Timeout is on. Check whetherModbus Slave ID 4’s register 0 value still is 0x0004. Slave ID 5’s register 0value is updated as 0x0000, and Slave ID 6’s register 0 value is updated as0xFFFF.Check PROFINET IO Controller Modbus RTU/ASCII Slave data flow side; they all updated as its Fault Value:Check PROFINET Diagnose. Its Connected PLC MAC Address shows NotConnected:。
HD 火车站防护有限公司:Chetak系列移动泡沫拖车说明说明书
TRAILER MOUNTED MONITOR MODEL HD-CHETAKDESCRIPTIONHD-Chetak series mobile foam trailer is designed tomeet today’s industrial firefighting need. The unit is used for fast flexible emergency fire-fighting response in industries. Trailer is having two-wheel or four-wheel pneumatic tyres, depending on load on the trailer . The unit can be easily manoeuvred by two persons or pulled behind by light truck or jeep. The trailer has four stabilizer legs.The Chetak series of trailers are custom designed and manufactured to meet individual plant requirement. The trailer can be supplied in various combination of HD monitors with flow of 500 to 2,000 GPM and with or without concentrate storage tank. The monitor nozzle can be fixed-flow or variable flow type with self-inducting or with JRCP (Jet Ratio Controller Pump).Foam induction percentage provided is 3% for AFFF 3% or ARAFF 3x3% Foam Concentrate. For any other foam model or induction percentage requirement, check with HD Sales T eam.TECHNICAL DATAMODEL HD-CHETAK WATER/FOAM FLOW 500 to 2000 GPM (dependingon HD monitor model)MAX. OPERATING 175 PSI (12 Bar)PRESSURE FRAMING Structural steelDECKING Anti-skid checker plate TYRES Pneumatic radial load bearing BREAKS Manual with overrunmechanical break JAK Four Drop Leg, anti-slip WATERWAY Steel or stainless steel with 2.5 inch male instantaneous coupling with inbuilt swingcheck valveMONITOR 3, 4, 6 inch depending on CONNECTION flow requiredMONITOR ROTATION -5 to +85 deg elevation with & ELEVATION360 deg rotationAPPROVAL UL Listed or FM Approved Monitor PAINTING Red Epoxy painted • Ordering information• Monitor model• Flow • Storage Tank capacity • Foam Concentrate model• Special accessories if anyMonitor Jet reach shall depend on monitor model chosen and appropriate monitor and monitor nozzle catalogue needs to be referred for details.KEY FEATURES• Rugged 2 / 4 wheeled trailer with various capaci-ties of foam storage tank and monitor model • Easy manoeuvre ability by two persons or pulledbehind light truck, tractor , or jeep•80, 100, or 150 mm (3”, 4” or 6”) monitor with or without foam concentrate storage tank• Stainless steel foam concentrate storage tank 200 to 2000 litre capacity• Over run and manual mechanical brake • Low profile design for safety and stability• Four stabilizer leg for added safety• Trailer equipped with reflector Provision of manifoldhaving 2.5” or 4” BSP male instantaneous connection with inbuilt swing check valve at rear side of trailer for water supply to monitor from hydrant network • Non-skid deck • Epoxy paintedTrailer comes with independent suspension axis. The frame is fabricated with heavy duty steel channel with cross members. The tyres are pneumatic radial tyres as rated to road carrying weight. Manual break with overload mechanical braking system is provided. Two Jack stands are provided in the front and two at rear , for use during monitor operation and parking. A barbed ground pad is attached to the foot of jack to increase surface area contact with ground for sta-ble support during monitor operation. Chetak trailers are completely self-contained units, needing only inlet source of water for operation.Optional Accessories: Toolbox, Hoses with a hose box.LIMITED WARRANTYHD FIRE PROTECT PVT. L TD. hereby referred to as HD FIRE warrants to the original purchaser of the fire protection products manufactured by HD FIRE and to any other person to whom such equipment is transferred, that such products will be free from defect in material and workmanship under normal use and care, for two (2) years from the date of shipment by HD FIRE. Products or Components supplied or used by HD FIRE, but manufactured by others, are warranted only to the extent of the manufacturer’s warranty. No warranty is given for product or components which have been subject to misuse, improper installation, corrosion, unauthorized repair , alteration or un-maintained. HD FIRE shall not be responsible for system design errors or improper installation or inaccurate or incomplete information supplied by buyer or buyer’s representatives.HD FIRE will repair or replace defective material free of charge, which is returned to our factory, transportation charge prepaid, provided after our inspection the material is found to have been defective at the time of initial shipment from our works. HD FIRE shall not be liable for any incidental or consequential loss, damage or expense arising directly or indirectly from the use of the product including damages for injury to person, damages to property and penalties resulting from any products and components manufactured by HD FIRE. HD FIRE shall not be liable for any damages or labour charges or expense in making repair or adjustment to the product. HD FIRE shall not be liable for any damages or charges sustained in the adaptation or use of its engineering data & services. In no event shall HD Fire’s product liability exceed an amount equal to the sale price.The foregoing warranty is exclusive and in lieu of all other warranties and representation whether expressed, implied, oral or written, including but not limited to, any implied warranties or merchantability or fitness for a particular purpose. All such other warranties and representations are hereby cancelled.NOTICE :The equipment presented in this bulletin is to be installed in accordance with the latest publication standards of NFPA or other similar organisations and also with the provision of government codes or ordinances wherever applicable.The information provided by us is to the best of our knowledge and belief, and consist of general guidelines only. Site handling and installation control is not in our scope. Hence we give no guarantee for result and take no liability for damages, loss or penalties whatsoever , resulting from our suggestion, information, recommendation or damages due to our product.Product development is a continuous programme of HD FIRE PROTECT PVT. L TD. and hence the right to modify any specification without prior notice is reserved with the company.D-6/2, ROAD NO. 34, WAGLE INDUSTRIAL ESTATE, THANE 400 604, INDIA.• TEL: + (91) 22 2158 2600 • FAX: +(91) 22 2158 2602•EMAIL:***************• WEB: HD FIRE PROTECT PVT . LTD.Protecting What Matters Most to YouINSPECTION AND MAINTENANCEEnsure that trailers are visually inspected every month.Just like any equipment, a well-maintained trailer will perform better and last longer than a neglected one. Routine monthly visual and operational maintenance is recommended.The maintenance department must carry out routine jobs like lubricating moving parts and checking tyre pressure. Cleaning of trailers need to be carried out every month or as required to ensure smooth opera-tion. The unit must be operated at least once in six months or as per local authority having jurisdiction.1. Never start water flow unless the four drop legsare lowered and having full ground support and locked. Apply hand break. 2. Water flow must be started gradually and similarlymust be lowered gradually.3. The trailer is to be used inside industrial premises.HD Fire does not provide any vehicle/trailer road transport approval, certification, or registration, if applicable then owner/ buyer is responsible to obtain the same from local authority having juris-diction.NOTE ON FOAM CONCENTRATE:When using AFFF or AR-AFFF type foam concentrate in the storage tank, it is recommended by HD Fire that a thin layer (approximately 1/4 inch) of a qual-ity mineral oil be placed on the surface of the foam concentrate after filling the tank with the correct quantity. This alleviates the problem associated with evaporation of the foam concentrate.The foam concentrate should be inspected periodi-cally following any of these standards: NFPA 11, EN 13565-2, or any other relevant standards or as per authority having jurisdiction. For tanks containing mineral oil, special tools should be used during annual sampling exercise to make sure no oil is taken with the foam. Consult foam concentrate manufacturer .。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
System Monitor for Network of WorkstationsIsaac Cheng and Amy HsuComputer Science Division, University of California, Berkeley **E-mail: {isaacc, ashsu}@ This work is done as a term project for CS 262, taught by Professor Eric Brewer, Fall 1996.An experimental information management system is developed to monitor system data for a network of workstations, a heterogeneous computing environment consisting of more than a hundred machines. The information system is designed to help system administration and research activities by managing system configu-rations and keeping track of system load his-tory. It uses Informix database to store all the data and provide general SQL access. We integrated the information system with the existing system monitor to support system load visualization.1. IntroductionThis paper describes a prototype of an information management system developed to monitor system data for a network of workstations. The network of workstations (NOW) is a heterogeneous computing environment consisting of more than a hundred machines, and our information system is designed to help both system administration and research activities in NOW. Having interviewed three researchers, a system administrator, and a programmer, we set up the following goals to satisfy some of the information needs of the NOW community:• Manage the inventory and system configurations• Keep track of system load history •Support automated diagnosisTo support the first goal, we use a database to organize and store information like the number and speeds of processors, amount of memory, devices, operating system versions and patches, etc. To support the second goal, we integrated our prototype with the existing system monitor, Netwreak, to allow users to visualize load history of both individual hosts and clusters. Due to severe time constraint, our current implementation was unable to achieve the last goal. However, we believe that to support simple diagnosis like detection of load balancing failure, one can extend our prototype by writing a simple Perl script without any major change in the information infrastructure.The following two sections this paper describe the design and implementation of the information system. The “Usage Examples”section contains several examples to show what the information system currently can do. The next two sections of the paper talk about related works and possible future improvements.Finally, we will sum up what we have achieved in this project. The appendix of this paper is designed to be a brief technical reference of our information system for system administrators.2. MotivationThe existing NOW system monitor can only display current usage information. And once the data is being displayed, it is thrown away that there is no way of retrieving any load history.By having a database as the data repository, not only can we store the past load information, but we can also query the data. For example, we can query the database for a set of data from which the system monitor can produce a time series graph that would help both thevisualization and analysis of system load. Having a database also opens an avenue for automatic system diagnosis and automated problem fixing. The database can perform analysis on the system data that it had and execute some code to automatically fix the problems it identifies.People often ask questions such as which machine has what and how many workstations have a certain configuration. These questions cannot be answered easily if there is no organized bookkeeping of the system configurations. By having a database that will store all system configuration information for each machine, those questions can simply be answered by sending queries to the database. It will also simplify system administrators’ job of keeping track the equipment.3. DesignAs mentioned in the introduction, our information system is designed to perform two major tasks: manage system configurations and keep track of load history. To collect system configuration data, we wrote a Perl script that runs system commands on each of the machines in NOW. To collect load information, we wrote a Perl package that receives data from Netwreak. When a user requests Netwreak to plot some load data against time, the Perl package sends the appropriate time series to Netwreak. We store both the system configurations and the load history into an Informix database server. We will describe the software architecture in the implementation section. In the rest of this section, we will discuss some of the decisions that we made in the design of our information system.3.1 Database EngineA major design decision is the use of a commercial relational database engine instead of simpler choices, such as ASCII flat files or hash tables in Perl. The main reason for this choice is that we need to support ad hoc queries. When we interviewed our prospective users, it seemed to be very difficult for them to say in advance what kind of queries they would like to perform on our information system. A full-blown relational database engine with a general SQL interface provides the flexibility that they need. Hash tables in Perl require the programmer to hard-code what the search keys are. Using Perl hash tables, it would be hard to create secondary indices, and it would be rather inconvenient to perform joins among tables, which is required by many ad hoc queries. For example, finding the number of processors in each machine requires joining the machine table with the processor table in the database (see “Usage Examples” for more details). A flat-file database is slow for searching especially when we have large amount of data. It does not satisfy the long-term goals of the NOW community. 3.2 Programming LanguageAnother design decision is the choice of programming language. We use Perl for a number of reasons. First, Perl is a good for rapid prototyping. Compared with C, Perl generally allows programmers to say less and tell more. Second, Perl is extremely portable across different platforms. This is a significant advantage for a highly heterogeneous environment. Third, the existing monitor, Netwreak, was written in Perl/Tk, and using Perl made our integration simpler. If Netwreak was written as a Java applet, Java would be a better choice for our information system.3.3 Logical Database DesignA significant portion of the design of the information system is the logical database design. Our database schema is based on the relational data model. Our user’s needs do not seem to require any object-oriented extension to the database. We ensure that the schema is normalized (at least to the third level) by designing it using the popular entity-relationship (E-R) approach. Figure 1 is a simplified E-R diagram with all attributes and unnamed relationships omitted.The functions of most entities are obvious from their names. The entity DynamicData is used to temporarily store system load data as they arrive. As they are quantized into regular time slices, they are moved to AverageDynamicData,which is used for generating time series.In both DynamicData and AverageDynamicData, the data records are self-describing. For example, a record might say: “I am talking about the CPU utilization of the host u0 at noon on 11/7/1996, and my value is 3.0.”Since there is no dedicated field for each type of load data, the information system can be easily extended to include any type of system load,such as network traffic, without making any change to the database schema.4. Implementation4.1 Collection of System Configuration DataThe collection of system configuration data is done by a Perl script. The script runs system commands (sysinfo, psrinfo, and installpatch) on each host. We use system commands instead of directly interacting with the underlying network protocol for two reasons. First, our approach is much more portable across different network protocols. Second, without having to deal with the complexity of the underlying network protocol, the approach enhances rapidprototyping.Figure 1: A simplified entity-relationship diagramCurrently, the device information is automatically detected by sysinfo. While the automatic detection algorithm is not perfectly reliable, it is more cost effective than employing human operators keying in the information for every device installed on each host. Yet, the device information serves at least as a good approximation of reality.The current implementation of the data collection script resides on a single host, runs remote shells on each machine sequentially, and collects the data into flat files. We manually loaded the data into our Informix server. However, we believe that the data collection can be parallelized so that each host runs the system commands concurrently, and the script can directly interact with Informix in the same way that we implemented the collection of system load data (see the next section). It is also possible to change the script to run it as a corn job and automatically send e-mail to system administrators to notify them of any change in system configuration. The inelegance of the current implementation was merely due to our lack of experience with Informix.4.2 Collection of System Load DataThe collection of system load data is done by a Perl package that works with the existing system monitor, Netwreak. It receives data asynchronously from Netwreak, and send back a time series to Netwreak when it needs to display load graph to the user. The user only sees the user-interface of Netwreak, and the database manages the load history behind the scene. Figure 2 illustrates the software architecture.Netwreak spawns GLUnix jobs on each host, and it displays the load data on the screen as usual. Once a piece of data is displayed, it sends to the database, which timestamps it and stores it in the DynamicData table. There is a daemon process running in the background that read data from that table, quantize and average them, and store them into another table. Once the data are process, they are removed from the DynamicData table. When a user requests a plot from Netwreak, the database retrieves a time series for the appropriate time interval, host, and type of load data for plot. The granularity or the length of each time slice can be adjusted by modifying a text file, namedtimeSlice. Currently, users can onlyrequest plots for the load data of thecurrent day. However, the systemcan be enhanced to support plots inthe further past by changing thefunction convertTimeForInfomix inupdataDynamicData.Since Informix currently does not support SQL embedding in Perl,we worked around it using Perlbackticks to invoke dbaccess, whichis not an optimized programminginterface. This introduces the extraoverhead of spawning a temporaryprocess per SQL access.5. Usage ExamplesIn the previous sections, we have seen how the informationsystem was designed and built. In this section, we will see what we can do with it. It will start by showing a few examples of how one might request system configuration information from the database. Afterwards,we Figure 2: Collection of system load datawill see a couple examples of how one might visualize system load over a period of time.5.1 System Configuration QueriesA simple way to construct queries to find out system configuration information is to create a text file that contains an SQL query, and then invoke dbaccess with the file as the second argument. The command dbaccess is an SQL interface to Informix. The first argument is the name of the database, in our case, “monitor.”The following shows an example where a user logged on to the Informix account on NOW to query about processor information.One can query memory information the same way.The user can also ask for device information. Note that if one does not know the exact name of the device, as in the following example, one can perform a simple pattern matching using the “like” operator in SQL.operating systems.5.2 System LoadVisualizationUsers obtain plots of system load history via the graphical user-interface of Netwreak.Clicking a the icon of a host with the right mouse button pops up a menu. By choosing “Plot,” a dialog box that allows the user toadjust various parameters of the graph. After clicking “Ok,” the user closes the dialog box and creates a window that contains the plot he/she requested (Figure 3).If the user right-click a cluster icon instead of a host icon and follow the above steps, he/she will obtain a plot of the aggregated system load of the cluster instead of individual hosts (Figure 4).There are other ways to obtain the same plots. For example, a user can right-click the background of Netwreak and select “Plot.”Then, he/she can manually type in the name of any host or cluster depending what he/she wants to visualize.6. Related WorkAnderson, Goto, and Patterson [1]developed a system diagnostic console for the Networks of Workstations (NOW) to gather systemusage datasuch as load, CPU, and memory on a single or a cluster of machines.Currently, the data is being discarded once it is being collected and displayed to the diagnosticconsole. We extended the functionality of the NOW system monitor by setting up a database which will store previous load information into the database so that the data can be queried for future reference.UNIX Host Administration(UHA) system [2]also implemented aFigure 3: Load graph of a hostdata model in a database that tracks hardware and software configuration, users, and accounts. The system is developed to simplify common administrative tasks and improve the efficiency and integrity of processes that track users, accounts, and equipment in a scientific computing environment. But although UHA also stores system configuration information into the database, it does not keep any load information in its database.Walters [3] also presents a solution of keeping track of system configuration with a method which allows the workstations themselves to log their current hardware configuration with central host every time they boot. The method is implemented in Perl using sysinfo to extract information in a platform independent manner and using UNIX syslog to provide a simple client-server database capability.7. Future Works7.1 Tracking Network TrafficThe design of the information system has the flexibility to allow programmers to add additional types of load data without making any change to the database schema. A useful extension of this kind is to add network traffic as a new type of load data. All one needs to do is to add a few lines of Perl code into Netwreak.7.2 Updating System Configuration DataCurrently, our program collects system configuration through a single point and stores all information into the database at once. Although under this model, the system configuration cannot be updated, we can easily modify the Perl script to collect and update system configuration data in a cron job for each machine locally. By running the modified script periodically, information in the database can be updated to match the new configuration. And whenever the database detects a change in configuration for a machine, we can have the program generating an e-mail message which warns the system administrator about the change. Then later if the machine crashes, it may help the system administrator to determine the cause of the crash.7.3 Diagnostic SupportThe current database schema allows one to support detection of load-balancing failure by writing a Perl script that queries the database on load data and detects pathological cases where only a few machines in a large cluster have exceptionally heavy load. The database schema can be extended to store the uptime of each host, and one can write a Perl script that sends system administrators e-mail when some hosts are down.7.4 EfficiencyThe current prototype is rather slow for two major reasons:• There is no secondary index in the database.• Everything is written in Perl and communicates with Informix using a work-around interface.One can create secondary indices to speed up data retrieval. However, secondary indices may slow down the process of adding and deleting records. For frequently referenced fields in relatively static tables, such as the hostName field in table Machine, building a secondary index may be the right choice. Judicious creation of indices can sometimes improve performance by two orders of magnitude, but it usually requires some experimentation.Rewriting Perl code in C usually gains some efficiency. In our case, it would have the additional benefit that Informix supports an ESQL API for C but not Perl. However, C is a little harder to port than Perl as porting C code to a new platform requires recompilation.7.5 User InterfaceThe current user-interface for querying system configuration is SQL. Although it is a popular standard, it requires the users to know the moderately complex syntax of the query language. There are two possible improvements. A possible way is to build a graphical user-interface that looks likePowerBuilder. Another way is to use a natural-language query interface, such as English Wizard.7.6 Improve AvailabilityAt the moment, our database suffers from single-point failure since all data is currently stored on one server. To solve this problem, we can setup the Informix backup server which will continue to run in the case when master server goes down. By using the built-in Informix backup server, the problem of concurrency is taken care of automatically.Another alternative is to have multiple Informix servers storing multiple copies of data.A possible hierarchical structure is for each machine to have its own server storing its own data. Then the data of several lower level servers will be combined and stored in a single higher level server. This way, the data is being replicated across the different level. Under this model, the system can tolerate not only one but several simultaneous failures. But concurrency can be a problem.7.7 Saving Disk SpaceRight now, the load data will be averaged once for a certain period of time, and then that piece of data will reside in the database permanently. But usually, people care less about the data as time goes on, and so it may be wise to trade finer granularity of data with more space preservation in the database. And this can be done by quantizing the load data at different interval with different resolution so the older data will be stored with coarser granularity. 8. ConclusionWe have developed a prototype of an information management system to monitor system data for a network of workstations. It manages an inventory and system configurations of computers, and keeps track of system load history. It supports general SQL interface for querying system configuration information. Finally, we integrated our prototype with the existing monitor system for plotting system loads.9. AcknowledgmentsWe would like to thank Albert Goto for explaining Netwreak to us and spending long hours debugging with us during the integration of our information system with Netwreak. We appreciate the effort by Kim Keeton for installing an Informix server on NOW. We are grateful to Eric Fraser for telling us the important system commands, keeping the database server running, and letting us know the needs of system administrators. Many of our initial project ideas were due to Professor David Culler and Eric Anderson. Finally, we want to thank Douglas Ghormley for telling us the information needs of the GLUnix research group.10. References[1] E. Anderson, A. Goto, D. Patterson, "A System Diagnostic Console for Networks of Computers." LISA 1996.[2] G. Thomas, et. al., "UNIX Host Administration in a Heterogeneous Distributed Computing Environment." LISA 1996.[3] R. Walters, "Tracking Hardware Configurations in a Heterogeneous Network with syslogd." LISA 1995.11. Appendix11.1 Database Schema (Logical Structure)The fields and field types of each table can be looked up in the following SQL statements.11.2 Getting information about tables and columns in the databaseTo find out all the tables and columns in the monitor database, go to /usr/now/informix/now_database and type command allTables . allTables will list all the columns within the database along with the corresponding table name by querying the database with an SQL command.11.3 Adding and deleteing column from an existing tableTo add or delete columns from a table after its creation, use the SQL alter table command.Adding a new column:alter table "table name" add "column name" "type of the new column";e.g., alter table OperatingSystem add releaseLevel char(15);Updating the table:update"table name" set"column name" = "expression" (where "statement");e.g., update Machine set osversion = '5.5'; This sets all the osversion columns in table Machine to 5.5.e.g., update Machine set osversion = '5.5' where hostName = ‘’;This only sets the osversion columns to 5.5 for .Deleting a column:alter table "table name" drop "column name";e.g., alter table OperatingSystem drop releaseLevel;。