Query Processing Over Peer-To-Peer Data Sharing Systems
Peer-to-peer communication between different types
专利名称:Peer-to-peer communication betweendifferent types of internet hosts发明人:Thomas P. Chu,Frank Feather,Yung-TerngWang申请号:US12059105申请日:20080331公开号:US07720976B2公开日:20100518专利内容由知识产权出版社提供专利附图:摘要:In one embodiment, a method for processing, at an enhanced Session Initiation Protocol (SIP) proxy (e-proxy), (1) a SIP INVITE message to a first user at an IPv4/IPv6dual-stack (DS) host, connected to an IPv6 network, from a second user at an IPv4 host, connected to an IPv4 network. The e-proxy receives the SIP INVITE message from the IPv4 network. When the e-proxy determines that Dual Stack Transition Mechanism (DSTM) service is required, the e-proxy obtains a temporary IPv4 address for the DS host, finds a suitable tunnel end-point (TEP), and sends a corresponding, but modified, INVITE message to the DS host. The modified INVITE message body includes invocation of DSTM service, the temporary IPv4 address, the TEP's IPv6 address, and the IPv4 host's IPv4 address. The e-proxy sends a BIND message to the TEP to bind the DS host's IPv6 address to the temporary IPv4 address for proper tunneling.申请人:Thomas P. Chu,Frank Feather,Yung-Terng Wang地址:Englishtown NJ US,Englishtown NJ US,Marlboro NJ US国籍:US,US,US代理机构:Mendelsohn, Drucker & Associates, P.C.代理人:Edward J. Meisarosh,Steve Mendelsohn更多信息请下载全文后查看。
上海市第三女子中学2021-2022学年高三下学期期中线上检测英语试卷
2021学年第二学期高三年级英语学科线上教学评估120 minutes | 满分140分I. Listening Comprehension (25%)Section A (10分)Directions: In Section A, you will hear ten short conversations between two speakers. At the end ofeach conversation, a question will be asked about what was said. The conversations and the questionswill be spoken only once. After you hear a conversation and the question about it, read the fourpossible answers on your paper, and decide which one is the best answer to the question you haveheard.1. A. Manager and secretary. B. Customer and salesgirl. C. Man and wife. D. Salesman and manufacturer.2. A. $240. B. $290. C. $250. D. $200.3. A. At a museum. B. At a library. C. At a bookstore. D. At a coffee shop.4. A. Tonight. B. On Friday night. C. On Saturday. D. Next week.5. A. Take care of the baby. B. Fix the air-conditioner. C. Stay in the room alone. D. Get a repairman.6. A. There is no convenient store nearby. B. Convenient stores may not sell phone chargers.C. The phone charger sold online is of poor quality.D. Nobody will be available at the convenient store.7. A. His membership is no longer valid. B. He is tired of that gym.C. He never went to that gym.D. He went to that gym only once.8. A. He might be a perfectionist. B. He is arguing with his colleagues.C. He is annoyed by the constant changes.D. He is not bright enough to understand the plan.9. A. More courses benefit the woman. B. The woman will be worn out if she takes 6 courses.C. The woman will have to book a room in the library.D. The woman should live in the library for the exams.10. A. She can only cook Chinese-style dishes. B. She learned her cooking from her mother.C. It always takes her a long time to prepare a meal.D. She will order some food for her house-warming party. Section BDirections:In Section B, you will hear two short passages and one longer conversation, and you will be asked several questions on each of the passages and the longer conversation. The passages and the longer conversation will be read twice, but the questions will be spoken only once. When you hear a question, read the four possible answers on your paper and decide which one would be the best answer to the question you have heard.Questions 11 through 13 are based on the following passage.11. A. Bad weather. B. Mistakes made by the air traffic controllers.C. The loss of control of the airplane.D. The duty of the pilot.12. A. The pilot of the second plane made a big mistake.B. They avoided each other by turning in different directions.C. They narrowly escaped crashing into each other.D. One plane was suddenly out of control.13. A. Air controllers are often careless. B. The importance of the pilots.C. Air travel is much safer than other means of travelling.D. The potential danger of air travel.Questions 14 through 16 are based on the following passage.14. A. Parents have little control over what children are watching or playing. B. The media are full of violence.C. Children think that violence and crime are normal.D. Young people are harder to discipline.15. A. They should keep their kids from watching movies or playing games.B. They should ask for help from the schools.C. They should speak out against the entertainment industry.D. They should take their children out for walks.16. A. The differences between the past and the present. B. People’s attitudes toward violence in the media.C. How violence in the media affects society.D. The necessity of keeping children from playing video games. Questions 17 through 20 are based on the following conversation.17. A. Something is wrong with the engine. B. The car never went wrong before.C. The car is too old to drive.D. She is not sure about the problem.18. A. In Japan. B. In Germany. C. In America. D. In Italy.19. A. The mechanic charged her a reasonable price. B. The mechanic gave her an unreasonable price.C. The mechanic overcharged her.D. The mechanic undercharged her.20. A. The mechanic is undependable. B. The mechanic is tricky.C. The mechanic is trustworthy.D. The mechanic is helpful.Ⅱ. Grammar and Vocabulary (20%)Section ADirections:After reading the passage below, fill in the blanks to make the passage coherent and grammatically correct. For the blanks with a given word, fill in each blank with the proper form of the given word; for the other blanks, use one word that best fits each blank.Tea in BritainTea may be thought as the most typical of English drinks, but it is actually a relative latecomer to British shores. Although the custom of drinking tea (21)______ (date) back to the 3rd millennium (一千年) BC in China, the drink didn’t appear in England until the mid-17th century.Curiously, it is said that it was the London coffee houses (22)______ were responsible for introducing tea to England. One of the first coffee house merchants (23)______ (offer) tea was Thomas Garway, who sold both liquid and dry tea to the public as early as 1657. Three years later, he issued a big brochure advertising the virtues of tea, (24)______ its positive effect on health.Tea gained popularity quickly in the coffee houses, and this distressed the pub owners (25)______ tea cut their sales of beer. At the same time, it was also bad news for the government officials, (26)______ ______ many depended on a steady stream of revenue from taxes on liquor sales. By 1750, tea (27)______ (become) the favored drink of Britain’s lower classes.A 1676 act taxed tea and required coffee house operators to apply for a license. The heavy taxation had the effect of creating a whole new industry — tea smuggling (走私). Even smuggled tea was expensive, however, and therefore extremely profitable, so many smugglers began to adulterate (掺假) the tea with other substances, such as willow andsloe leaves. (28)______ (use) tea leaves were also redried and added to fresh leaves.Finally, 1784 William Pitt the Younger determined to take (29)______ measures that could reverse the situation. He introduced the Commutation Act, which dropped the tax on tea from 119% to 12.5%, effectively ending smuggling. He also took many other measures, hoping that such attempts (30)______ stop adulteration. But adulteration remained a problem until the Food and Drug Act of 1875 brought in severe punishment for the practice.Section BDirections:Complete the following passage by using the words in the box. Each word can only be used once. Note that there is one word more than you need.A. modestB. creativeC. confirmD. paceE. increasinglyF. emergingG. scoring H. caps I. evenly J. access K. collapseBathroom Reveals Your Repayment AbilityBanks and other lenders typically look at borrowers’ credit histories, tax forms and other financial information to determine whether they will get paid back. In China, (31)______ lenders also look at borrowers’ bathrooms.As the economy slows, the government wants to develop a credit culture to get Chinese families spending instead of saving. While the country is getting wealthier, the financial system has not kept (32)______. Some people have had no (33)______ to credit card or mortgage, so lenders often have little reliable information about potential borrowers.To fill the gaps, one lender, China Rapid Finance, assigns its investigators to check for the number of toothbrushes or towels to determine how many people are living in a house. They look for dirty dishes in the kitchen. They take photos of a potential borrower at work to (34)______ employment status.A growing number of companies are trying to crack the credit code in China. The Internet giants Alibaba, Tencent and Baidu are developing credit (35)______ systems based on users’ online transactions (交易) and search histories.The World Bank estimated that 79 percent of China’s population above the age of 15 have bank accounts, while only 10 percent have ever borrowed from the formal financial system. China’s banks have a(n) (36)______ consumers lending business. Contrarily, online lenders are (37)______ as the pioneers, satisfying China’s rising con sumer class.Alibaba’s financial affiliate (隶属机构), Huabei, makes small loans to online shoppers and vendors (小贩) on its e-commerce platforms. Peer-to-peer platforms have proved hugely popular in China, but the industry’s reputation has been ruined by scandal, like the (38)______ of Ezubao (易租宝).After that, regulators have stepped up their supervision of online lenders, which includes setting (39)______ on the amounts that can be borrowed. The regulators’ tightening management is“something like a shepherd herding (放牧) his sheep into a(n) (40)______ narrowing pen (围栏),” said Mark Natkin, the founder and managing director at Marbridge Consulting, based in Beijing.Ⅲ. Reading ComprehensionSection ADirections:For each blank in the following passage there are four words or phrases marked A, B, C and D. Fill in each blank with the word or phrase that best fits the context.“It will be marvelous. It will be spiritual.” This is the41 tagline that Virgin Galactic used in 2004 to attract potential customers to its planned space tourism services. It promised that, within five years, it would take atotal of over 3,000 passengers on life-changing trips in its spaceships. On July 11, 2021, after a last 90-minute delay, Virgin Galactic finally began its fulfillment of that original 42 . For four minutes, its six temporarily weightless passengers, including the firm’s British co-founder, Sir Richard Branson, saw the planet against the blackness of outer space.Back on the ground, Sir Richard called the experience “magical”. He may have43 the fact that he was able to reach space earlier than Jeff Bezos, a fellow billionaire but much wealthier. On July 20, Bezos would go slightly higher, for slightly less time, in a vehicle that had been built by his own spacefaring company, Blue Origin.The two tycoons (大亨) are among a growing number of 44 who believe that space tourism’s time has come. Suborbital (亚轨道的) tourism is part of a broader space economy that has rapidly grown over the past decade 45 technological advances. However, it is highly 46 that this will be true.For now, Blue Origin and Virgin Galactic will offer 47 suborbital flights to paying customers. Blue Origin is focusing much more on the development of a large new rocket that will be used for the launching of satellites, on selling advanced rocket engines to other companies, and on bidding (投标) on NASA contracts such as the recently announced plan to send humans back to the moon. 48 , Bezos doesn’t see Blue Origi n as a provider of services to adventure-seekers.Even this 4-minute suborbital travels have a(n) 49 , apparently. A major survey found that nearly two in five people with a net worth of over five million dollars would consider paying $250,000, Virgin Galactic’s current price, for a ticket. The business could be 50 , once regular flights begin to offset (抵消)the rockets’ development costs. But how fast and by how much is 51 . Without tourist-friendly destinations to visit (the capacity of the International Space Station is strictly limited), orbital tourism, with its far higher ticket prices, will not be a huge earner.Another challenge —and the industry’s biggest remaining uncertainty —relates to 52 . History has shown that a disaster, 53 in the early stages of an industry, can set progress back by years. NASA 54 its plan to send the untrained to orbit in 1986 after a school teacher was killed along with the rest of the crew in the Challenger tragedy. It was another 15 years before the next untrained person would 55 the journey on a Russian craft.41. A. modest B. demanding C. motivational D. unclear42. A. obligation B. commitment C. requirement D. survey43. A. felt ashamed of B. kept an eye on C. felt content with D. got upset with44. A. optimists B. opponents C. experts D. objectors45. A. thanks to B. but for C. apart from D. in spite of46. A. impossible B. undoubted C. probable D. favorable47. A. long-lasting B. inexpensive C. automatic D. brief48. A. On the contrary B. What’s more C. In the long run D. Above all49. A. shortcoming B. limitation C. advantage D. appeal50. A. profitable B. uneconomic C. eco-friendly D. globalized51. A. predictable B. essential C. irrelevant D. uncertain52. A. development B. security C. stability D. novelty53. A. particularly B. critically C. precisely D. unforeseeably54. A. initiated B. drafted C. modified D. suspended55. A. brave B. abandon C. steer D. pauseSection BDirections:Read the following three passages. Each passage is by several questions or unfinished statements. For each of them there are four choices marked A, B, C and D. Choose the one that fits best according to the information given in the passage you have just read.(A)About a quarter of the world drives on the left, and the countries that do so are mostly old British colonies like Australia, and Ireland. But Thailand, Indonesia and Japan have also developed this habit.This strange quirk (奇事) puzzles the rest of the world; however, there is a perfectly good reason. Up to the late 1700s, everybody travelled on the left side of the road because it is the sensible option for violent, feudal (封建的) societies of mostly right-handed people. Soldiers with their swords under their right arms naturally passed on each other’s right, and if you passed a stranger on the road, you walked on the left to ensure that your protective sword arm was between you and him.Revolutionary France, however, did away with this practice as part of its sweeping social rethink, and thanks to Napoleon, this change was carried out all over continental Europe. Because he was left-handed, his armies had to march on the right so he could keep his sword arm between him and any opponent. From then on, any country colonized by the French took to driving on the right.After the American Revolutionary War (1775-1783), the US became independent and decided to make traffic drive on the right in order to cut all remaining links to its British colonial past. Once America became the center of the car industry, if you wanted a good reliable vehicle, you bought American right-hand-drive. From then on, many countries changed out of necessity.Today, the EU would like Britain to fall into line with the rest of Europe, but this is no longer possible. It would cost billions of pounds to change everything round. The last European country to convert to driving on the right was Sweden in 1967. This ironically caused a reduction in car accidents because everyone drove carefully while getting used to the new system.56. Why did people travel on the left before the late 18th century?A. They were required to do so.B. They were mostly left-landed.C. It was easier to cross the street.D. They could feel safer from attacks.57. What was Napoleon’s attitude about walking on the left?A. Support.B. Disapproval.C. Doubt.D. Indifference.58. For Americans, driving on the right was a way to show ______.A. the connection with France was brokenB. the US was no longer ruled by the UKC. the American Revolution War had endedD. America was the center of the car industry59. What is the main reason for UK’s resistance to the European system?A. It would cost too much to change.B. Its increasing traffic accidents.C. Its influence on colonies.D. Its fast-developing car industry.(B)Amaze Y ourself, Amaze the WorldA job at Apple is unlike any other you’ve had. You’ll be challenged. You’ll be inspired. And you’ll be proud. Because whatever your job is here, you’ll be part of something big.Every detail matters.Every piece of packaging. Every swipe of the finger. Every “How can I help you?” Everything.And it doesn’t matter just some of the time. It matters all of the time. That’s how we do things at Apple. The result is some of the best-loved products in the world.Simplicity isn’t simple.Ask anyone here. It’s hard work. It means forever asking, “Why is it this way?” and “How can it be better?” It means rethinking every customer experience until the clutter has fallen away — until all that remains is what’s essential, useful and beautiful. That might be a new product feature that delights even die-hard fans. It might be a customer support call, or even a display in an Apple store, arranged and lit exactly so.Creativity from every corner.When you imagine the creative process at Apple, at first you may not picture someone in HR, or operations, or finance. But we expect creative thinking and solutions from everyone here, no matter what their responsibilities are. Innovation takes many forms, and our people seem to find new ones every day.60. Where will you probably find this passage?A. In a booklet introducing Apple’s management.B. On the official website of Apple Inc.C. In the help-wanted ads section of a newspaper.D. In a magazine telling business stories.61. The word “clutter” probably means ______.A. customers’ complaintB. simple questionC. unnecessary partD. old feature62. According to the passage, employees are expected to pay attention to the following EXCEPT ______.A. the wrapping of apple’s ne w productsB. a customer support callC. the accomplishments of AppleD. the lighting of an Apple store(C)The tendency to look for some outside group to blame for our misfortunes is certainly common and it is often strengthened by social prejudice. There seems to be little doubt that one of the principal causes of prejudice is fear —in particular the fear that the interests of our own group are going to be endangered by the actions of another. This is less likely to be the case in a stable, relatively unchanging society in which the members of different social and occupational groups know what to expect of each other and know what to expect for themselves. In times of rapid racial and economic change, however, new occupations and new social roles appear, and people start looking jealously at each other to see whether their own group is being left behind.When a community begins to feel unsure of its future, it becomes especially likely to turn in upon itself, to imagine that surrounding groups are threatening and unfriendly. At a time like this, distorted (扭曲的) ideas about theother community are readily believed and are passed on as statements of fact. One of the tragic things about intercommunal (社区间的)conflict is that both parties quickly find themselves “moral rationalization (合理化解释).” Each side insists and believes that its own actions are inspired by noble ideals, even when they are really acting out of pure self-interest. To a third party, neutral to the conflict, it may seem obvious that both are behaving unreasonably; but when one’s emotions are involved, and especially the emotion of fear, it is extremely difficult to remain sensible.Once prejudice develops, it is hard to stop, because there are often social forces at work which actively encourage unfounded attitudes of unfriendliness and fear towards other groups. One such force is education: We all know that children can be taught history in such a way as to keep alive old hatred and old prejudices between racial and political groups. Another social influence that has to be taken seriously is the pressure of public opinion. People often think and act differently in groups from the way they would do as individuals. It takes a considerable effort of will, and often calls for great courage, to stand o ut against one’s fellows and insist that they are wrong.Why is it that we hear so much more about the failures of relationships between communities than we do about the successes? I am afraid it is partly due to the increase in communication which radio, television and the popular press have brought about. In those countries where the media of mass communication are commercial enterprises, they tend to measure success by the size of their audience; and people are more likely to buy a newspaper, for instance, if their attention is caught by something dramatic, or something that can arouse their anxiety or interest as much as failures of intercommunal relationships do. And popular public speakers, especially if they are politicians addressing a relatively innocent audience, know that the best way to arouse such an audience is to frighten them.Where there is a real or imaginary threat to economic security, this is especially likely to arouse group prejudice. It is important to remember economic factors if we wish to lessen prejudice between groups, because unless they are dealt with directly, it will be little use simply advising people not to be prejudiced against other groups whom they see as their competitors, if not their enemies.63. People in a society of rapid racial and economic change ______.A. blame others for their recent misfortunesB. fear the loss of interests endangered by prejudiceC. are at a loss as to what to expect of others and themselvesD. are jealous of the new occupations and social roles64. Which of the following statements is NOT true about a community feeling unsure of its future?A. Distorted ideas about the other community are considered as facts.B. It’s extremely difficult for a third party to remain sensible and fearless.C. Old hatred and prejudices are passed on through history education.D. The pressure of public opinion makes people think and act in groups.65. The failures of relationships between communities are ______.A. commercial products of the media of mass communicationB. considered dramatic and arousingC. lessened due to real or imaginary threat to economic securityD. dealt with directly by advising people not to be prejudiced66. The passage is mainly about ______.A. how to eliminate social prejudiceB. what a sensible society is likeC. what causes social prejudiceD. how to build a sensible societySection CDirections:Read the following passage. Fill in each blank with a proper sentence given in the box. Each sentence can be used only once. Note that there are two more sentences than you need.A. She believes that grief and joy can coexist.B. She believes that joy is nowhere to be found.C. Heart-broken, her mother decided to try to give meaning to her grief.D. The training was really a way of going even deeper into others’ grief and joy.E. Rather, they support clients emotionally, physically, spiritually and practically.F. But the longer she took part in the program, the more she realized that she was only an expert in her grief.As parents of a child with a progressive and potentially fatal illness, Maryanne and Nick O’Hara lived on hope. Hope that their daughter, Caitlin, who was diagnosed with cystic fibrosis at age 2, would receive the lung transplant she spent two and a half years waiting for in her early 30s. Hope that her body wouldn’t reject it. That hope faded on Dec. 20, 2016, when Caitlin died of a brain bleed, two days post-transplant. She was 33.67 And so she signed for a certificate program to become an end-of-life doula (陪护), or “death doula”, working with individuals and families as they moved from this life into whatever is next.Unlike hospital workers, doulas don’t get involved in medical issu es. 68 And they step in whenever needed. That could be a few days before someone dies, sitting with them in their last hours, giving hand massages, chatting with them or even making snacks. Or it could be months or even years earlier, after someone receives a terminal diagnosis. They keep them company, listen to their life stories, or plan funerals.As for Ms. O’Hara, who is also a novelist, she is primarily helping people write their life stories.“I went into it thinking ‘I’ve been a volunteer with people who are dying. I’ve lost my loved one. I’m an expert in grief,’” she said.69“You really can’t tell anyone else how to feel grief,” Ms. O’Hara said. “You can offer advice, but there is no timeline for grief. As soon as people get a diagnosis, they are grieving. Their way of life is over.”70 “My grief is never going to go away,” she said. “I wouldn’t want it to. Grief and joy and love —it’s part of the same spectrum (图谱). I’m grieving because I loved someone so much.”Ⅳ. Summary Writing (10%)Directions:Read the following passage. Summarize the main idea and the main point(s) of the passage in no more than 60 words. Use your own words as far as possible.71. Coco-Cola’s Innovative Solution to Plastic PollutionPlastic pollution has become one of the most pressing problems of the 21st century with plastic waste almost everywhere. It is estimated that just in 2016, the world produced over 320 million tons of plastic, and this number is set to double by 2034.Plastic waste even makes its way into our oceans with 8 million pieces of plastic pollution per day polluting our waters and destroying the habitat for hundreds of species. It is now believed that there may be around 5.25 trillion pieces of plastic in the ocean weighing in total up to 269,000 tons.It’s been crystal clear for a long time that the situation is horrible, and something needs to be done, and fast.Luckily, Coca-Cola stepped up to the challenge and came up with one innovative and rather effective solution. The firm is replacing its plastic wrapping in Europe with a new paper board technology.This new tech is called the KeelClip and it is a first for the non-alcohol ready-to-drink (NARTD) industry. Using KeelClips, Coca-Cola aims to remove all plastic wrap from its can multipacks in all European Union markets by the end of 2021. The firm is optimistic that the move will save 2,000 tons of plastic and 3,000 tons of CO2 annually.“Innovation is a key principle of our sustainable packaging work and the application of this fully recyclable paperboard KeelClip™, which is composed of a top board that the cans clip into and a central cardboard ‘keel’ —similar to a ship’s keel — that stabilizes the pack, is another example of how we are delivering on our commitment to remove all unnecessary and hard-to-recycle single-use plastic from our products. We hope this eco-friendly initiative is a conscious approach to dealing with plastic pollution,” said Joe Franses, Vice President, Sustainability at Coca-Cola European Partners.Ⅴ. Translation (15%)Directions:Translate the following sentences into English, using the words given in the brackets.72. 随着经济的增长,人们对于奢侈品的需求也随之增长。
Peer-To-Peer介绍最近几年,Peer-to-Peer(对等计算,简称P2P)迅速
Peer-T o-Peer 介绍最近几年,Peer-to-Peer (对等计算,简称P2P) 迅速成为计算机界关注的热门话题之一,财富杂志更将P2P列为影响Internet未来的四项科技之一。
“Peer”在英语里有“对等者”和“伙伴”的意义。
因此,从字面上,P2P可以理解为对等互联网。
国内的媒体一般将P2P翻译成“点对点”或者“端对端”,学术界则统一称为对等计算。
P2P可以定义为:网络的参与者共享他们所拥有的一部分硬件资源(处理能力、存储能力、网络连接能力、打印机等),这些共享资源通过网络提供服务和内容,能被其它对等节点(Peer)直接访问而无需经过中间实体。
在此网络中的参与者既是资源(服务和内容)提供者(Server),又是资源获取者(Client)。
客观地说,这种计算模式并不是什么新技术,自从上个世纪70年代网络产生以来就存在了,只不过当时的网络带宽和传播速度限制了这种计算模式的发展。
90年代末,随着高速互联网的普及、个人计算机计算和存储能力的提升,P2P技术重新登上历史舞台并且带来了一场技术上的革命。
许多基于P2P技术的杀手级应用应运而生,给人们的生活带来了极大的便利。
从计算模式上来说,P2P打破了传统的Client/Server (C/S)模式,在网络中的每个结点的地位都是对等的。
每个结点既充当服务器,为其他结点提供服务,同时也享用其他结点提供的服务。
P2P与C/S模式的对比如下图所示:图1 Client/Server模式图2 Peer to Peer 模式P2P技术的特点体现在以下几个方面[1]:∙非中心化:网络中的资源和服务分散在所有结点上,信息的传输和服务的实现都直接在结点之间进行,可以无需中间环节和服务器的介入,避免了可能的瓶颈。
P2P的非中心化基本特点,带来了其在可扩展性、健壮性等方面的优势。
∙可扩展性:在P2P网络中,随着用户的加入,不仅服务的需求增加了,系统整体的资源和服务能力也在同步地扩充,始终能比较容易地满足用户的需要。
VPX-COME主板引脚定义
VPX-COME主板引脚定义计算机一个相当重要的外部设备接口,最常用来连接的设备那就要算是打印机了,另外,有许多型号的扫描仪也是通过并口来与计算机连接的。
并口也是25针的,与25针串口不同的是,并口是25个孔,所以常称为“母头”,而像串口就常称为“公头”。
并口的针脚定义如下:1 STROBE选通2-9 DATA0-DATA7数据0-710 ACKNLG确认11 BUSY忙12 PE缺纸13 SLCT选择14 AUTO FEED自动换行15 ERROR错误16 INIT初始化17 SLCT IN选择输入\18-25 GND地线显示器VGA接口显示器当然是很重要的设备了,显示器使用的是15针的连接公头,因为显示器属于一种较为独立的电子器件,所以它的接头定义也有很多较专业的部分,具体针脚定义如下:1红2绿3蓝4空脚5地6红-接地7绿-接地8蓝-接地9空脚10接地11接地12 SDA13水平同步14垂直同步15 SCL网卡(LAN)接口IEEE1394火线接口IEEE1394接口是由APPLE和TI公司开始的高速串行接口标准,Apple称之为FireWire(火线),Sony称之为i.Link,TexasInstrum ents称之为Lynx,中文译名为火线接口(firewire)。
IEEE1394通常有两种接口方式,一种是六角型的六针接口,另一种是四角的四针接口,其区别就在于六针接口除了两条一对共两对的数据线外还多了一对电源线,可直接向外设供电,多使用于苹果机和台式电脑,而四针接口多用于DV或笔记本电脑等设备。
使用方便,支持热插拔,即插即用,无需设置设备ID号,从Wi n98 SE以上版本的操作系统开始内置IEEE1394支持核心,无需驱动程序。
数据传输速度快,IEEE1394a高达400Mbps,后续的IEEE1394b 标准可将速度提升到800Mbps、1.6Gbps甚至3.2Gbps。
自带供电线路,能提供8—40V可变电压,允许通过最大电流也达到1.5A左右,因此它能为耗电量要求小的设备进行供电。
peer的用法和搭配
peer的用法和搭配一、什么是Peer?在计算机科学领域中,Peer是指通过网络连接在同一等级的计算机或服务之间进行通信和共享资源的节点。
Peer可以是个人电脑、服务器、移动设备或其他任何具有网络连接能力的设备。
与传统的客户端-服务器模式不同,Peer之间是对等关系,彼此之间具有相似的功能和权限。
这种去中心化的架构使得信息的传输更加高效且有弹性。
二、Peer的用途1. 文件共享:Peer-to-Peer网络最为人熟知的用途就是文件共享。
用户可以通过P2P软件(例如BitTorrent)将文件分割成小块,并从其他用户那里下载和上传这些数据块。
由于每个用户都同时充当发送者和接收者,所以整个过程更快速和可靠。
2. 实时通信:Peer-to-Peer技术还被广泛应用于实时通信领域,例如音频或视频聊天应用程序。
在此类应用中,对等节点直接建立连接,并通过直接数据传输来实现即时沟通。
3. 分布式计算:借助P2P技术,多台计算机可以组成一个网格系统(Grid),共同完成复杂任务。
每个节点贡献自己的处理能力,将整个计算任务分割为小块,在对等节点之间进行并行计算,大大提高了计算速度和资源利用率。
4. 虚拟货币:区块链技术的实现离不开Peer-to-Peer网络。
在比特币和其他加密货币中,所有交易信息都通过对等节点互相广播和共享,确保账本的完整性和安全性。
5. 文件备份与恢复:借助Peer-to-Peer网络,用户可以将重要文件备份到其他节点上。
当某个节点出现故障或丢失数据时,还可以从其他节点恢复。
6. CDN(内容分发网络):使用P2P架构的CDN可以提供高质量、快速的内容分发服务。
通过将内容缓存在许多局部对等服务器上,用户可以更快地获取所需资源。
三、Peer的搭配方式1. 纯中心式模式:在纯中心式Peer-to-Peer模式下,需要一个中心服务器来协调所有对等节点之间的通信和资源共享。
这种模式适合于小规模应用或需要集中管理的情况。
07、数据通信技术-实训手册
实习单元 2 三层交换机 VLAN 配置............................................................................................. 19 2.1 实训说明.................................................................................................................................... 19
实习单元 3 三层交换机链路聚合配置...........................................................................................21 3.1 实训说明....................................................................................................................................... 21
1
4
3.1.1 实训目的................................................................................................................................. 21 3.1.2 实训时长................................................................................................................................. 21 3.1.3 实训准备................................................................................................................................. 21 3.2 实训规划................................................................................................................................................. 21 3.2.1 网络拓扑和数据规划.............................................................................................................21 3.3 实训任务及步骤..................................................................................................................................... 21 3.3.1 任务 1:静态聚合..................................................................................................................21 3.3.2 任务 2:动态聚合..................................................................................................................22 3.3.3 任务 3:验证方法..................................................................................................................22 3.4 总结与思考............................................................................................................................................. 23 3.4.1 实训总结................................................................................................................................. 23
peer是什么意思
peer是什么意思peer既能做名词也能做动词,那么你知道它们分别都是什么意思吗?下面店铺为大家带来peer的英语意思和相关用法,欢迎大家一起学习!peer的英语音标英 [pɪə(r)]美 [pɪr]peer的时态过去分词: peered过去式: peered现在分词: peeringpeer的意思n. 贵族;同等的人;同龄人n. (Peer)人名;(英、巴基)皮尔vi. 凝视,盯着看;窥视vt. 封为贵族;与…同等peer的近义词porepeer的词语辨析peer, glance, stare, gaze, glare这组词都有“看,瞧”的意思,其区别是peer 指眯着眼睛仔细地或略为吃力地看。
glance 指匆匆地或粗略地一看,侧重心不在焉地、匆忙地看一眼。
stare 侧重因惊奇、好奇、粗鲁无礼等而睁大眼睛看。
gaze 指出于羡慕、感兴趣、关心或惊异而长时间目不转睛地看。
glare 指用愤恨、凶狠或含敌意的眼光死死看着某人。
peer的词汇搭配peer review 同业互查peer to peer 对等的;[计]端对端peer pressure 来自同辈的压力peer group 同辈群体;同龄群体peer at 凝视peer的英语例句1. Lord Swan was made a life peer in 1981.斯旺勋爵于1981年受封终身贵族。
2. He was made a life peer in 1991.他于1991年被封为终身贵族。
3. She gets on well with her peer group.她和同龄人相处融洽。
4. He is a peer.他是一个贵族.5. The queen created him a peer.女王封他为贵族.6. She leaned her bike against the stone wall and stood on tiptoe to peer over it.她把自行车斜靠在石墙上,踮起脚往墙内张望。
3GPP TS 36.331 V13.2.0 (2016-06)
3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。
网贷对大学生的影响英语作文
网贷对大学生的影响英语作文(中英文实用版){z}Title: The Impact of Peer-to-Peer Lending on College StudentsPeer-to-peer lending, an innovative financial service that connects borrowers and lenders online, has gained significant popularity in recent years.This essay aims to explore the impact of peer-to-peer lending on college students, considering both its advantages and disadvantages.One of the main advantages of peer-to-peer lending for college students is the access to affordable credit.Traditional banks often have stringent requirements for loan approval, making it difficult for students with limited credit histories to secure loans.Peer-to-peer lending platforms, on the other hand, tend to have less strict criteria, allowing students to obtain the funds they need for various purposes, such as tuition, textbooks, or living expenses, at lower interest rates compared to credit cards.Moreover, peer-to-peer lending can also help students build their credit scores.By repaying loans on time, students demonstrate their creditworthiness to future lenders, which can be beneficial when they apply for mortgages, car loans, or other forms of credit in the future.However, there are also potential disadvantages to consider.One significant risk is the possibility of defaulting on loans.Since peer-to-peer lending platforms often have less stringent approval processes, somestudents may take on more debt than they can manage, leading to default and a damaged credit score.Additionally, peer-to-peer lending platforms are relatively new and may not have the same level of regulatory oversight as traditional banks.This lack of regulation can expose students to potential scams or unfair lending practices.In conclusion, peer-to-peer lending can offer college students access to affordable credit and an opportunity to build their credit scores.However, students should be cautious and ensure they can manage their debt responsibly to avoid the risks of default and potential exploitation from less reputable lenders.As with any financial decision, it is crucial for students to research and understand the terms and conditions of peer-to-peer lending before participating.。
英语作文-如何在互联网上建立健康知识的传播方式选择策略
英语作文-如何在互联网上建立健康知识的传播方式选择策略In the age of information overload, establishing healthy knowledge dissemination strategies on the internet is paramount. With the vast array of information available online, it's crucial to navigate through it effectively to promote accurate and beneficial knowledge. Here, we explore strategies for fostering healthy knowledge dissemination on the internet.Understanding Audience Dynamics:To effectively disseminate knowledge online, it's essential to understand the dynamics of your target audience. Consider factors such as age, education level, cultural background, and interests. Tailoring content to resonate with your audience increases engagement and encourages knowledge uptake.Promoting Critical Thinking:Encouraging critical thinking skills is vital in the online sphere. Rather than passively consuming information, individuals should be empowered to analyze, evaluate, and question the content they encounter. Providing tools and resources for critical thinking cultivates a discerning audience capable of filtering misinformation.Collaborating with Credible Sources:Collaborating with credible sources enhances the reliability of the knowledge being disseminated. Partnering with reputable organizations, experts, and institutions lends authority and credibility to your content. Additionally, citing sources and providing references instills trust and transparency among your audience.Utilizing Multiple Platforms:Diversifying the platforms used for knowledge dissemination ensures broader reach and accessibility. From social media platforms to educational websites and forums,leveraging various channels caters to different audience preferences and browsing habits. Additionally, adapting content formats to suit each platform optimizes engagement.Creating Engaging and Accessible Content:Engaging and accessible content is more likely to capture the attention of online users. Utilize multimedia elements such as videos, infographics, and interactive quizzes to convey information effectively. Moreover, ensuring content accessibility for individuals with disabilities promotes inclusivity and widens the audience reach.Fostering Community Engagement:Building a community around your knowledge dissemination efforts fosters interaction, discussion, and collaboration. Establishing forums, discussion groups, or social media communities encourages knowledge sharing and peer-to-peer learning. Active participation within these communities strengthens the dissemination network and sustains interest over time.Implementing Ethical Guidelines:Adhering to ethical guidelines is imperative when disseminating knowledge online. Respect intellectual property rights, privacy concerns, and cultural sensitivities in your content creation and sharing practices. Upholding ethical standards reinforces trust and integrity within the online community.Monitoring and Evaluating Impact:Continuous monitoring and evaluation are essential to gauge the impact of knowledge dissemination efforts. Utilize analytics tools to track audience engagement, reach, and feedback. Adjust strategies based on insights gained to optimize effectiveness and relevance over time.In conclusion, establishing healthy knowledge dissemination strategies on the internet requires a multifaceted approach encompassing audience understanding, critical thinking promotion, collaboration with credible sources, platform diversification, engaging content creation, community engagement, ethical considerations, and impactassessment. By adopting these strategies, we can contribute to a more informed and empowered online community.。
Peer-to-Peer Communication Across Network Address Translators
Peer-to-Peer Communication Across Network Address TranslatorsBryan Ford Massachusetts Institute of Technology baford@Pyda SrisureshCaymas Systems,Inc. srisuresh@Dan Kegel dank@J’fais des trous,des petits trous...toujours des petits trous-S.GainsbourgAbstractNetwork Address Translation(NAT)causes well-known difficulties for peer-to-peer(P2P)communication,since the peers involved may not be reachable at any globally valid IP address.Several NAT traversal techniques are known,but their documentation is slim,and data about their robustness or relative merits is slimmer.This paper documents and analyzes one of the simplest but most ro-bust and practical NAT traversal techniques,commonly known as“hole punching.”Hole punching is moderately well-understood for UDP communication,but we show how it can be reliably used to set up peer-to-peer TCP streams as well.After gathering data on the reliability of this technique on a wide variety of deployed NATs, wefind that about82%of the NATs tested support hole punching for UDP,and about64%support hole punching for TCP streams.As NAT vendors become increasingly conscious of the needs of important P2P applications such as V oice over IP and online gaming protocols,support for hole punching is likely to increase in the future.1IntroductionThe combined pressures of tremendous growth and mas-sive security challenges have forced the Internet to evolve in ways that make life difficult for many applications. The Internet’s original uniform address architecture,in which every node has a globally unique IP address and can communicate directly with every other node,has been replaced with a new de facto Internet address architecture, consisting of a global address realm and many private ad-dress realms interconnected by Network Address Transla-tors(NAT).In this new address architecture,illustrated in Figure1,only nodes in the“main,”global addressrealmFigure1:Public and private IP address domains can be easily contacted from anywhere in the network, because only they have unique,globally routable IP ad-dresses.Nodes on private networks can connect to other nodes on the same private network,and they can usually open TCP or UDP connections to“well-known”nodes in the global address realm.NATs on the path allocate temporary public endpoints for outgoing connections,and translate the addresses and port numbers in packets com-prising those sessions,while generally blocking all in-coming traffic unless otherwise specifically configured. The Internet’s new de facto address architecture is suit-able for client/server communication in the typical case when the client is on a private network and the server is in the global address realm.The architecture makes it diffi-cult for two nodes on different private networks to contact each other directly,however,which is often important to the“peer-to-peer”communication protocols used in ap-plications such as teleconferencing and online gaming. We clearly need a way to make such protocols function smoothly in the presence of NAT.One of the most effective methods of establishing peer-to-peer communication between hosts on different private networks is known as“hole punching.”This technique is widely used already in UDP-based applications,but es-sentially the same technique also works for TCP.Contrary to what its name may suggest,hole punching does not compromise the security of a private network.Instead, hole punching enables applications to function within the the default security policy of most NATs,effectively sig-naling to NATs on the path that peer-to-peer communica-tion sessions are“solicited”and thus should be accepted. This paper documents hole punching for both UDP and TCP,and details the crucial aspects of both application and NAT behavior that make hole punching work. Unfortunately,no traversal technique works with all ex-isting NATs,because NAT behavior is not standardized. This paper presents some experimental results evaluating hole punching support in current NATs.Our data is de-rived from results submitted by users throughout the In-ternet by running our“NAT Check”tool over a wide va-riety of NATs by different vendors.While the data points were gathered from a“self-selecting”user community and may not be representative of the true distribution of NAT implementations deployed on the Internet,the results are nevertheless generally encouraging.While evaluating basic hole punching,we also point out variations that can make hole punching work on a wider variety of existing NATs at the cost of greater complexity. Our primary focus,however,is on developing the simplest hole punching technique that works cleanly and robustly in the presence of“well-behaved”NATs in any reason-able network topology.We deliberately avoid excessively clever tricks that may increase compatibility with some existing“broken”NATs in the short term,but which only work some of the time and may cause additional unpre-dictability and network brittleness in the long term. Although the larger address space of IPv6[3]may eventually reduce the need for NAT,in the short term IPv6is increasing the demand for NAT,because NAT it-self provides the easiest way to achieve interoperability between IPv4and IPv6address domains[24].Further, the anonymity and inaccessibility of hosts on private net-works has widely perceived security and privacy benefits. Firewalls are unlikely to go away even when there are enough IP addresses:IPv6firewalls will still commonly block unsolicited incoming traffic by default,making hole punching useful even to IPv6applications.The rest of this paper is organized as follows.Section2 introduces basic terminology and NAT traversal concepts. Section3details hole punching for UDP,and Section4 introduces hole punching for TCP.Section5summarizes important properties a NAT must have in order to enable hole punching.Section6presents our experimental re-sults on hole punching support in popular NATs,Section7 discusses related work,and Section8concludes.2General ConceptsThis section introduces basic NAT terminology used throughout the paper,and then outlines general NAT traversal techniques that apply equally to TCP and UDP.2.1NAT TerminologyThis paper adopts the NAT terminology and taxonomy de-fined in RFC2663[21],as well as additional terms de-fined more recently in RFC3489[19].Of particular importance is the notion of session.A session endpoint for TCP or UDP is an(IP address,port number)pair,and a particular session is uniquely identi-fied by its two session endpoints.From the perspective of one of the hosts involved,a session is effectively identi-fied by the4-tuple(local IP,local port,remote IP,remote port).The direction of a session is normally theflow di-rection of the packet that initiates the session:the initial SYN packet for TCP,or thefirst user datagram for UDP. Of the variousflavors of NAT,the most common type is traditional or outbound NAT,which provides an asym-metric bridge between a private network and a public network.Outbound NAT by default allows only out-bound sessions to traverse the NAT:incoming packets are dropped unless the NAT identifies them as being part of an existing session initiated from within the private network. Outbound NAT conflicts with peer-to-peer protocols be-cause when both peers desiring to communicate are“be-hind”(on the private network side of)two different NATs, whichever peer tries to initiate a session,the other peer’s NAT rejects it.NAT traversal entails making P2P sessions look like“outbound”sessions to both NATs. Outbound NAT has two sub-varieties:Basic NAT, which only translates IP addresses,and Network Ad-dress/Port Translation(NAPT),which translates entire session endpoints.NAPT,the more general variety,has also become the most common because it enables the hosts on a private network to share the use of a single pub-lic IP address.Throughout this paper we assume NAPT, though the principles and techniques we discuss apply equally well(if sometimes trivially)to Basic NAT.Figure2:NAT Traversal by Relaying2.2RelayingThe most reliable—but least efficient—method of P2P communication across NAT is simply to make the com-munication look to the network like standard client/server communication,through relaying.Suppose two client hosts A and B have each initiated TCP or UDP connec-tions to a well-known server S,at S’s global IP address 18.181.0.31and port number1234.As shown in Figure2, the clients reside on separate private networks,and their respective NATs prevent either client from directly initiat-ing a connection to the other.Instead of attempting a di-rect connection,the two clients can simply use the server S to relay messages between them.For example,to send a message to client B,client A simply sends the message to server S along its already-established client/server con-nection,and server S forwards the message on to client B using its existing client/server connection with B. Relaying always works as long as both clients can con-nect to the server.Its disadvantages are that it consumes the server’s processing power and network bandwidth, and communication latency between the peering clients is likely increased even if the server is well-connected.Nev-ertheless,since there is no more efficient technique that works reliably on all existing NATs,relaying is a useful fall-back strategy if maximum robustness is desired.The TURN protocol[18]defines a method of implementing relaying in a relatively secure fashion.2.3Connection ReversalSome P2P applications use a straightforward but limited technique,known as connection reversal,to enable com-munication when both hosts have connections to awell-Figure3:NAT Traversal by Connection Reversal known rendezvous server S and only one of the peers is behind a NAT,as shown in Figure3.If A wants to ini-tiate a connection to B,then a direct connection attempt works automatically,because B is not behind a NAT and A’s NAT interprets the connection as an outgoing session. If B wants to initiate a connection to A,however,any direct connection attempt to A is blocked by A’s NAT.B can instead relay a connection request to A through a well-known server S,asking A to attempt a“reverse”connection back to B.Despite the obvious limitations of this technique,the central idea of using a well-known ren-dezvous server as an intermediary to help set up direct peer-to-peer connections is fundamental to the more gen-eral hole punching techniques described next.3UDP Hole PunchingUDP hole punching enables two clients to set up a direct peer-to-peer UDP session with the help of a well-known rendezvous server,even if the clients are both behind NATs.This technique was mentioned in section5.1of RFC3027[10],documented more thoroughly elsewhere on the Web[13],and used in recent experimental Internet protocols[17,11].Various proprietary protocols,such as those for on-line gaming,also use UDP hole punching.3.1The Rendezvous ServerHole punching assumes that the two clients,A and B,al-ready have active UDP sessions with a rendezvous server S.When a client registers with S,the server records two endpoints for that client:the(IP address,UDP port)pair that the client believes itself to be using to talk with S, and the(IP address,UDP port)pair that the server ob-Figure4:UDP Hole Punching,Peers Behind a Common NATserves the client to be using to talk with it.We refer to the first pair as the client’s private endpoint and the second as the client’s public endpoint.The server might obtain the client’s private endpoint from the client itself in afield in the body of the client’s registration message,and obtain the client’s public endpoint from the source IP address and source UDP portfields in the IP and UDP headers of that registration message.If the client is not behind a NAT, then its private and public endpoints should be identical.A few poorly behaved NATs are known to scan the body of UDP datagrams for4-bytefields that look like IP addresses,and translate them as they would the IP address fields in the IP header.To be robust against such behav-ior,applications may wish to obfuscate IP addresses in messages bodies slightly,for example by transmitting the one’s complement of the IP address instead of the IP ad-dress itself.Of course,if the application is encrypting its messages,then this behavior is not likely to be a problem.3.2Establishing Peer-to-Peer Sessions Suppose client A wants to establish a UDP session di-rectly with client B.Hole punching proceeds as follows:1.A initially does not know how to reach B,so A asksS for help establishing a UDP session with B.2.S replies to A with a message containing B’s publicand private endpoints.At the same time,S uses its UDP session with B to send B a connection request message containing A’s public and private endpoints.Once these messages are received,A and B know each other’s public and private endpoints.3.When A receives B’s public and private endpointsfrom S,A starts sending UDP packets to both of these endpoints,and subsequently“locks in”whichever endpointfirst elicits a valid response fromB.Similarly,when B receives A’s public and pri-vate endpoints in the forwarded connection request,B starts sending UDP packets to A at each of A’sknown endpoints,locking in thefirst endpoint that works.The order and timing of these messages are not critical as long as they are asynchronous.We now consider how UDP hole punching handles each of three specific network scenarios.In thefirst situation, representing the“easy”case,the two clients actually re-side behind the same NAT,on one private network.In the second,most common case,the clients reside behind dif-ferent NATs.In the third scenario,the clients each reside behind two levels of NAT:a common“first-level”NAT de-ployed by an ISP for example,and distinct“second-level”NATs such as consumer NAT routers for home networks. It is in general difficult or impossible for the applica-tion itself to determine the exact physical layout of the network,and thus which of these scenarios(or the many other possible ones)actually applies at a given time.Pro-tocols such as STUN[19]can provide some information about the NATs present on a communication path,but this information may not always be complete or reliable,espe-cially when multiple levels of NAT are involved.Never-theless,hole punching works automatically in all of these scenarios without the application having to know the spe-cific network organization,as long as the NATs involved behave in a reasonable fashion.(“Reasonable”behavior for NATs will be described later in Section5.)Figure5:UDP Hole Punching,Peers Behind Different NATs3.3Peers Behind a Common NATFirst consider the simple scenario in which the two clients (probably unknowingly)happen to reside behind the same NAT,and are therefore located in the same private IP ad-dress realm,as shown in Figure4.Client A has estab-lished a UDP session with server S,to which the com-mon NAT has assigned its own public port number62000. Client B has similarly established a session with S,to which the NAT has assigned public port number62005. Suppose that client A uses the hole punching technique outlined above to establish a UDP session with B,using server S as an introducer.Client A sends S a message requesting a connection to B.S responds to A with B’s public and private endpoints,and also forwards A’s pub-lic and private endpoints to B.Both clients then attempt to send UDP datagrams to each other directly at each of these endpoints.The messages directed to the public end-points may or may not reach their destination,depending on whether or not the NAT supports hairpin translation as described below in Section3.5.The messages directed at the private endpoints do reach their destinations,however, and since this direct route through the private network is likely to be faster than an indirect route through the NAT anyway,the clients are most likely to select the private endpoints for subsequent regular communication.By assuming that NATs support hairpin translation,the application might dispense with the complexity of trying private as well as public endpoints,at the cost of making local communication behind a common NAT unnecessar-ily pass through the NAT.As our results in Section6show, however,hairpin translation is still much less common among existing NATs than are other“P2P-friendly”NAT behaviors.For now,therefore,applications may benefit substantially by using both public and private endpoints.3.4Peers Behind Different NATsSuppose clients A and B have private IP addresses be-hind different NATs,as shown in Figure5.A and B have each initiated UDP communication sessions from their lo-cal port4321to port1234on server S.In handling these outbound sessions,NAT A has assigned port62000at its own public IP address,155.99.25.11,for the use of A’s session with S,and NAT B has assigned port31000at its IP address,138.76.29.7,to B’s session with S.In A’s registration message to S,A reports its private endpoint to S as10.0.0.1:4321,where10.0.0.1is A’s IP address on its own private network.S records A’s re-ported private endpoint,along with A’s public endpoint as observed by S itself.A’s public endpoint in this case is155.99.25.11:62000,the temporary endpoint assigned to the session by the NAT.Similarly,when client B regis-ters,S records B’s private endpoint as10.1.1.3:4321and B’s public endpoint as138.76.29.7:31000.Now client A follows the hole punching procedure de-scribed above to establish a UDP communication session directly with B.First,A sends a request message to S ask-ing for help connecting with B.In response,S sends B’s public and private endpoints to A,and sends A’s public and private endpoints to B.A and B each start trying to send UDP datagrams directly to each of these endpoints. Since A and B are on different private networks and their respective private IP addresses are not globally routable,the messages sent to these endpoints will reach either the wrong host or no host at all.Because manyFigure6:UDP Hole Punching,Peers Behind Multiple Levels of NATNATs also act as DHCP servers,handing out IP addresses in a fairly deterministic way from a private address pool usually determined by the NAT vendor by default,it is quite likely in practice that A’s messages directed at B’s private endpoint will reach some(incorrect)host on A’s private network that happens to have the same private IP address as B does.Applications must therefore authen-ticate all messages in some way tofilter out such stray traffic robustly.The messages might include application-specific names or cryptographic tokens,for example,or at least a random nonce pre-arranged through S.Now consider A’sfirst message sent to B’s public end-point,as shown in Figure5.As this outbound message passes through A’s NAT,this NAT notices that this is the first UDP packet in a new outgoing session.The new ses-sion’s source endpoint(10.0.0.1:4321)is the same as that of the existing session between A and S,but its desti-nation endpoint is different.If NAT A is well-behaved,it preserves the identity of A’s private endpoint,consistently translating all outbound sessions from private source end-point10.0.0.1:4321to the corresponding public source endpoint155.99.25.11:62000.A’sfirst outgoing mes-sage to B’s public endpoint thus,in effect,“punches a hole”in A’s NAT for a new UDP session identified by the endpoints(10.0.0.1:4321,138.76.29.7:31000)on A’s pri-vate network,and by the endpoints(155.99.25.11:62000, 138.76.29.7:31000)on the main Internet.If A’s message to B’s public endpoint reaches B’s NAT before B’sfirst message to A has crossed B’s own NAT, then B’s NAT may interpret A’s inbound message as un-solicited incoming traffic and drop it.B’sfirst message to A’s public address,however,similarly opens a hole in B’s NAT,for a new UDP session identified by the end-points(10.1.1.3:4321,155.99.25.11:62000)on B’s pri-vate network,and by the endpoints(138.76.29.7:31000, 155.99.25.11:62000)on the Internet.Once thefirst mes-sages from A and B have crossed their respective NATs, holes are open in each direction and UDP communica-tion can proceed normally.Once the clients have verified that the public endpoints work,they can stop sending mes-sages to the alternative private endpoints.3.5Peers Behind Multiple Levels of NATIn some topologies involving multiple NAT devices,two clients cannot establish an“optimal”P2P route between them without specific knowledge of the topology.Con-sider afinal scenario,depicted in Figure6.Suppose NAT C is a large industrial NAT deployed by an internet ser-vice provider(ISP)to multiplex many customers onto a few public IP addresses,and NATs A and B are small consumer NAT routers deployed independently by two of the ISP’s customers to multiplex their private home net-works onto their respective ISP-provided IP addresses. Only server S and NAT C have globally routable IP ad-dresses;the“public”IP addresses used by NAT A and NAT B are actually private to the ISP’s address realm, while client A’s and B’s addresses in turn are private to the addressing realms of NAT A and NAT B,respectively. Each client initiates an outgoing connection to server S as before,causing NATs A and B each to create a single pub-lic/private translation,and causing NAT C to establish a public/private translation for each session.Now suppose A and B attempt to establish a direct peer-to-peer UDP connection via hole punching.The optimal routing strategy would be for client A to send messages to client B’s“semi-public”endpoint at NAT B,10.0.1.2:55000in the ISP’s addressing realm,and for client B to send messages to A’s“semi-public”end-point at NAT B,namely10.0.1.1:45000.Unfortunately, A and B have no way to learn these addresses,because server S only sees the truly global public endpoints of the clients,155.99.25.11:62000and155.99.25.11:62005re-spectively.Even if A and B had some way to learn these addresses,there is still no guarantee that they would be usable,because the address assignments in the ISP’s pri-vate address realm might conflict with unrelated address assignments in the clients’private realms.(NAT A’s IP address in NAT C’s realm might just as easily have been 10.1.1.3,for example,the same as client B’s private ad-dress in NAT B’s realm.)The clients therefore have no choice but to use their global public addresses as seen by S for their P2P com-munication,and rely on NAT C providing hairpin or loop-back translation.When A sends a UDP datagram to B’s global endpoint,155.99.25.11:62005,NAT Afirst trans-lates the datagram’s source endpoint from10.0.0.1:4321 to10.0.1.1:45000.The datagram now reaches NAT C, which recognizes that the datagram’s destination address is one of NAT C’s own translated public endpoints.If NAT C is well-behaved,it then translates both the source and destination addresses in the datagram and“loops”the datagram back onto the private network,now with a source endpoint of155.99.25.11:62000and a destination endpoint of10.0.1.2:55000.NAT Bfinally translates the datagram’s destination address as the datagram enters B’s private network,and the datagram reaches B.The path back to A works similarly.Many NATs do not yet support hairpin translation,but it is becoming more common as NAT vendors become aware of this issue.3.6UDP Idle TimeoutsSince the UDP transport protocol provides NATs with no reliable,application-independent way to determine the lifetime of a session crossing the NAT,most NATs simply associate an idle timer with UDP translations,closing the hole if no traffic has used it for some time period.There is unfortunately no standard value for this timer:some NATs have timeouts as short as20seconds.If the appli-cation needs to keep an idle UDP session active after es-tablishing the session via hole punching,the application must send periodic keep-alive packets to ensure that the relevant translation state in the NATs does not disappear. Unfortunately,many NATs associate UDP idle timers with individual UDP sessions defined by a particular pair of endpoints,so sending keep-alives on one session will not keep other sessions active even if all the sessions orig-inate from the same private endpoint.Instead of sending keep-alives on many different P2P sessions,applications can avoid excessive keep-alive traffic by detecting when a UDP session no longer works,and re-running the original hole punching procedure again“on demand.”4TCP Hole PunchingEstablishing peer-to-peer TCP connections between hosts behind NATs is slightly more complex than for UDP,but TCP hole punching is remarkably similar at the protocol level.Since it is not as well-understood,it is currently supported by fewer existing NATs.When the NATs in-volved do support it,however,TCP hole punching is just as fast and reliable as UDP hole punching.Peer-to-peer TCP communication across well-behaved NATs may in fact be more robust than UDP communication,because unlike UDP,the TCP protocol’s state machine gives NATs on the path a standard way to determine the precise life-time of a particular TCP session.4.1Sockets and TCP Port ReuseThe main practical challenge to applications wishing to implement TCP hole punching is not a protocol issue but an application programming interface(API)issue.Be-cause the standard Berkeley sockets API was designed around the client/server paradigm,the API allows a TCP stream socket to be used to initiate an outgoing connection via connect(),or to listen for incoming connections via listen()and accept(),but not both.Further, TCP sockets usually have a one-to-one correspondence to TCP port numbers on the local host:after the application binds one socket to a particular local TCP port,attempts to bind a second socket to the same TCP port fail.For TCP hole punching to work,however,we need to use a single local TCP port to listen for incoming TCP connections and to initiate multiple outgoing TCP con-nections concurrently.Fortunately,all major operating systems support a special TCP socket option,commonly named SO_REUSEADDR,which allows the application to bind multiple sockets to the same local endpoint as long as this option is set on all of the sockets involved.BSDsystems have introduced a SO_REUSEPORT option thatcontrols port reuse separately from address reuse;on such systems both of these options must be set.4.2Opening Peer-to-Peer TCP Streams Suppose that client A wishes to set up a TCP connection with client B.We assume as usual that both A and B already have active TCP connections with a well-known rendezvous server S.The server records each registered client’s public and private endpoints,just as for UDP.At the protocol level,TCP hole punching works almost ex-actly as for UDP:1.Client A uses its active TCP session with S to ask Sfor help connecting to B.2.S replies to A with B’s public and private TCP end-points,and at the same time sends A’s public and private endpoints to B.3.From the same local TCP ports that A and B used toregister with S,A and B each asynchronously make outgoing connection attempts to the other’s public and private endpoints as reported by S,while simul-taneously listening for incoming connections on their respective local TCP ports.4.A and B wait for outgoing connection attempts tosucceed,and/or for incoming connections to appear.If one of the outgoing connection attempts fails due to a network error such as“connection reset”or“host unreachable,”the host simply re-tries that connection attempt after a short delay(e.g.,one second),up to an application-defind maximum timeout period. 5.When a TCP connection is made,the hosts authen-ticate each other to verify that they connected to the intended host.If authentication fails,the clients close that connection and continue waiting for others to succeed.The clients use thefirst successfully au-thenticated TCP stream resulting from this process. Unlike with UDP,where each client only needs one socket to communicate with both S and any number of peers simultaneously,with TCP each client application must manage several sockets bound to a single local TCP port on that client node,as shown in Figure7.Each client needs a stream socket representing its connection to S, a listen socket on which to accept incoming connections from peers,and at least two additional stream sockets with which to initiate outgoing connections to the other peer’s public and private TCP endpoints.Consider the common-case scenario in which the clients A and B are behind different NATs,as showninFigure7:Sockets versus Ports for TCP Hole Punching Figure5,and assume that the port numbers shown in the figure are now for TCP rather than UDP ports.The outgo-ing connection attempts A and B make to each other’s pri-vate endpoints either fail or connect to the wrong host.As with UDP,it is important that TCP applications authenti-cate their peer-to-peer sessions,due of the likelihood of mistakenly connecting to a random host on the local net-work that happens to have the same private IP address as the desired host on a remote private network.The clients’outgoing connection attempts to each other’s public endpoints,however,cause the respective NATs to open up new“holes”enabling direct TCP com-munication between A and B.If the NATs are well-behaved,then a new peer-to-peer TCP stream automat-ically forms between them.If A’sfirst SYN packet to B reaches B’s NAT before B’sfirst SYN packet to A reaches B’s NAT,for example,then B’s NAT may in-terpret A’s SYN as an unsolicited incoming connection attempt and drop it.B’sfirst SYN packet to A should subsequently get through,however,because A’s NAT sees this SYN as being part of the outbound session to B that A’sfirst SYN had already initiated.4.3Behavior Observed by the Application What the client applications observe to happen with their sockets during TCP hole punching depends on the tim-ing and the TCP implementations involved.Suppose that。
Peer-to-peer (P2P) and internet content digital ac
专利名称:Peer-to-peer (P2P) and internet contentdigital acknowledgement trigger used forfile transfer发明人:Robert O'Kane,Chris Ricci申请号:US10002267申请日:20011121公开号:US20030097299A1公开日:20030522专利内容由知识产权出版社提供专利附图:摘要:A system and method is disclosed for information sharing via a peer-to-peer communication network. The system provides for a way to track DIGITAL MEDIA files(a.k.a. video, audio and yet to be determined digital source) over global and through, or hosted on, a local or remote network server. Each download has a unique digital software trigger, or “digital acknowledgement trigger” which is software originated. This trigger is induced by the end user of that particular computer or network related computer or server. Each tag is unique based upon the source IP address and file name requested for download, as well as invisible to the user, and with each user the “software trigger”, or “digital acknowledgement trigger” is activated at the time the Digital File is used or opened without damaging the original file from which the download file was “shared 申请人:O'KANE ROBERT,RICCI CHRIS更多信息请下载全文后查看。
黑龙江省哈尔滨市2022-2023学年高三下学期三模英语试题含答案
Britain's most popular and recognizable artists, painted the words “Love Life” on the final wall of the show.
Explaining his actions, he said, “I love my work. And I think the work has love. Actually... I love life.”
whose money is going to be feeding their children and making sure they have a roof over their head,” Starks said.
“I wasn't expecting a big reaction. I thought Id maybe get five kids or so, but I didn't realize how huge the need
Starks says once the back to school rush is over, she plans to keep up the effort once a month for children all
over Nashville. “Doing this makes me happy,” she said. “The smile on the children's faces are priceless. It brings
35,” Starks said.
Her inbox was quickly flooded with requests for appointments and Starks found herself working every night
什么是P2P
什么是P2P1点对点技术(peer-to-peer,简称P2P)又称对等互联网络技术,是一种网络新技术,依赖网络中参与者的计算能力和带宽,而不是把依赖都聚集在较少的几台服务器上。
P2P 网络通常用于通过Ad Hoc连接来连接节点。
这类网络可以用于多种用途,各种档案分享软件已经得到了广泛的使用。
P2P技术也被使用在类似VoIP等实时媒体业务的数据通信中。
2 P2P是peer-to-peer的缩写,peer在英语里有“(地位、能力等)同等者”、“同事”和“伙伴”等意义。
这样一来,P2P也就可以理解为“伙伴对伙伴”的意思,或称为对等联网。
目前人们认为其在加强网络上人的交流、文件交换、分布计算等方面大有前途。
简单的说,P2P直接将人们联系起来,让人们通过互联网直接交互。
P2P使得网络上的沟通变得容易、更直接共享和交互,真正地消除中间商。
P2P就是人可以直接连接到其他用户的计算机、交换文件,而不是像过去那样连接到服务器去浏览与下载。
P2P 另一个重要特点是改变互联网现在的以大网站为中心的状态、重返“非中心化”,并把权力交还给用户。
P2P看起来似乎很新,但是正如B2C、B2B是将现实世界中很平常的东西移植到互联网上一样,P2P并不是什么新东西。
在现实生活中我们每天都按照P2P模式面对面地或者通过电话交流和沟通。
P2P的发展简史1999年,文件共享系统Napster诞生。
Napster是最早的P2P实用系统,参与系统的是大量个人计算机用户,每个用户将自己愿意共享的文件提供出来,同时可以下载其他用户共享的文件。
Napster需要解决的核心问题是必须知道哪些机器上有哪些文件,这样当用户提出文件搜索请求时才可以得到正确的匹配结果。
在Napster中使用一个中心服务器,称为目录服务器,存放所有文件的元数据信息(文件的标题和一些简单的描述信息)以及其存放结点的IP地址。
结点加入系统时首先要连接目录服务器并报告自身地址及共享的文件列表。
网络教学的好处英语作文
网络教学的好处英语作文英文回答:Benefits of Online Education.Online education offers numerous advantages over traditional face-to-face instruction. Firstly, it enhances convenience and flexibility, allowing learners to access educational resources from any location and at any time that suits them. This eliminates the need for physical commutes, rigid schedules, and geographical constraints.Secondly, online learning promotes personalized learning experiences. Students can progress at their own pace, revisiting concepts as needed and accessing additional resources to supplement their understanding. This self-paced approach empowers learners to customize their learning journey based on their individual needs and interests.Thirdly, online education expands access to education. It breaks down barriers of distance and physical disabilities, making it available to those who may not have the opportunity to attend traditional educational institutions. This inclusivity ensures that all learners have equal opportunities to pursue their educational aspirations.In addition, online learning fosters collaboration and peer-to-peer engagement. Through virtual discussion forums, group projects, and online simulations, students can connect with classmates from diverse backgrounds and engage in meaningful interactions. This collaborative environment promotes problem-solving skills, critical thinking, and the development of professional networks.Moreover, online education provides cost-effective and scalable learning solutions. Institutions can reach a wider audience without the need for extensive physical infrastructure and resources. Students can also save on transportation costs, accommodation expenses, and other associated expenses, making education more affordable.Finally, online education offers opportunities for lifelong learning. With the continuous advancements in technology, learners can access up-to-date content, courses, and certifications online. This enables individuals to stay abreast of industry trends, enhance their skills, andpursue personal enrichment throughout their careers.中文回答:网络教学的优势。
ptp名词解释
ptp名词解释PTP是Peer-to-Peer的缩写,是一种计算机网络架构,用于直接连接两个或多个计算机设备,而不经过中心服务器。
PTP is short for Peer-to-Peer, which is a computer network architecture used for directly connecting two or more computer devices without the need for a central server.1.我们使用PTP网络结构构建了一个直接的文件共享系统。
We built a direct file-sharing system using the PTP network architecture.2. PTP模型允许不同的计算机设备直接进行通信和数据交换。
The PTP model allows different computer devices to communicate and exchange data directly.3. PTP网络消除了传统客户端-服务器模型中的单点故障风险。
The PTP network eliminates the single point of failure risk in traditional client-server models.4.在PTP中,每个设备都可以同时作为客户端和服务器,实现对等的通信关系。
In PTP, each device can act as both a client and a server simultaneously, establishing a peer-to-peer communication relationship.5.使用PTP网络,我们可以更快、更安全地共享大型文件。
With the PTP network, we can share large files faster and more securely.6.由于PTP网络不依赖中心服务器,因此可以降低网络维护成本。
Peer-to-PeerProtocols and Systems
KaZaA: File Search
search(Xena.mp3) --> 123.2.22.50 123.2.22.50 Query Replies search(Xena.mp3) --> 123.2.0.18
Where is Xena.mp3?
123.2.0.18
28
KaZaA: Fetching
24
KaZaA: Overview
• “Smart” Query Flooding:
– Join: on startup, client contacts a “supernode” ... may at some point become one itself – Publish: send list of files to supernode – Search: send query to supernode, supernodes flood query amongst themselves. – Fetch: get the file directly from peer(s); can fetch simultaneously from multiple peers
20
• TTL limits propagation
Gnutella: Search
“I have XenaEpisode1.mpg”
Reply “I have XenaEpisode1.mpg”
Query “Where is XenaEpisode1.mpg?”
21
Gnutella: Discussion
15
Napster: Search
Query “Where is the Xena Theme song?” Fetch search(Xena) Reply
peer-to-peer
A logic-based approach for computing service executions plans inpeer-to-peer networksHenrik Nottelmann and Norbert FuhrInstitute of Informatics and Interactive Systems,University of Duisburg-Essen,47048Duisburg,Germany,{nottelmann,fuhr}@uni-duisburg.deAbstract.Today,peer-to-peer services can comprise a large and growing number of services,e.g.search ser-vices or services dealing with heterogeneous schemas in the context of Digital Libraries.For a given task,thesystem has to determine suitable services and their processing order(“execution plan”).As peers can join orleave the network spontaneously,static execution plans are not sufficient.This paper proposes a logic-basedapproach for dynamically computing execution plans:Services are described in the DAML-S language.Thesedescriptions are mapped onto Datalog.Finally,logical rules are applied on the service description facts fordetermining matching services andfinding an optimum execution plan.1IntroductionPeer-to-peer architectures have emerged recently as an alternative to centralised architectures.In the beginning, they have been mainly used for simple applications likefile sharing with only primitive retrieval capabilities. Nowadays,they are employed more and more for advanced IR applications.In the scenario used in this paper,users search for documents in a peer-to-peer network(a“retrieval task”).A user issues a query to the network.The query is routed through the network,and—without further interaction with the user—documents are retrieved and sent back to the user.Documents are structured through schemas.Thus,queries are also stated against a schema,and the retrieval task defines the schema of user queries and the schema of the result documents(requested by the user).In contrast to other approaches,we assume a heterogeneous peer-to-peer network.Each peer can use its own schema for representing its documents.In addition,a peer can offer different services which are specialised in solving a specific problem,e.g.for bridging the heterogeneity(mediating between different schemas),or for im-proving information access to Digital Libraries.So,here we deal with a heterogeneous network of services which are offered by peers.Nodes can spontaneously join and leave the peer-to-peer network,so they cannot be integrated in the system in a static way.Thus,a match-making component compares the(retrieval)task with all services which are available at that time,and computes an execution plan(the order of services to be invoked).An execution plan can include (besides search services)e.g.schema mapping services if the schema of the query and the search service differ. This paper proposes a logic-based approach for computing execution plans,which picks up some ideas from[6]: 1.DAML Services(DAML-S,[3])is the forthcoming standard for machine-readable service descriptions in theSemantic Web,and thus also employed in this approach.DAML-S defines the vocabulary(an upper ontology) for describing arbitrary(originally mostly business-oriented)services.A lower ontology for Digital Library services(i.e.,the description of actual services)is presented in this paper.2.In a next step,parts of the DAML-S descriptions are transformed into Datalog,a predicate horn logic.Logicalmatch-making rules can then be applied on the resulting facts for computing an execution plan(in this paper,a sequential order of services).For the scenario presented in this paper,considering only the input and outputtypes of services is sufficient for retrieval-like tasks.3.Similar to resource selection in federated Digital Libraries,the match-making component should consider thecosts of execution plans and compute an optimum selection.This paper presents an approach for cost-optimum service selection,based on probabilistic logics.Other authors have proposed logic-or RDF-based approaches forfinding suitable services before.In[7],services are modelled as processes using the MIT process Handbook ontology,providing similar modelling primitives as DAML-S(see Sec.2),and introduces a simple query language for retrieving suitable processes.As this query language only uses the syntactic model,semantics-preserving query-mutation operators(using e.g.specialisa-tion/generalisation)are introduced.In contrast,RDF(S)advertisements are used in[15]for both services and clients,so match-making is reduced to RDF graph matching.A lisp-like notation for logical constructs is used by [8]for both service capabilities descriptions and for the service request.An AI planning component can infer an execution plan by iteratively adding services which minimise the remaining effort.In[13],the quality-of-service of a service execution plan is considered.Similar to the decision-theoretic framework for service selection selection(“resource selection”)[11,4]and the general service selection model presented in this paper,costs are associated with each execution plan,and a local optimisation algorithm is applied forfinding the optimum execution plan.A user specifies a query w.r.t.virtual operations,for which matching web services are then found.A similar approach is taken in[18].Here,composite services,and thus execution plans,are modelled as state charts.Then,different quality criteria(e.g.monetary price,execution time,reliability,availability)are combined into an overall cost measure for an execution plan.As it is not feasible to consider every possible execution plan, linear programming is then employed forfinding an optimum execution plan.Edutella[9],a metadata infrastructure for the P2P network JXTA,combines RDF and Datalog.In contrast to[12], it does not work on an ontology level,and only maps RDF statements onto Datalog facts,without preserving the semantics of RDF modelling primitives.When the RDF model contains a DAML-S service description,the derived Datalog facts can be used for searching for services with known properties.In contrast,the approach presented in this paper combines DAML-S,probabilistic Datalog,a probabilistic ex-tension to predicate horn logic,and a decision-theoretic model forfinding the cost-optimum execution plans in heterogeneous peer-to-peer networks.This paper is organised as follows:The next section gives a brief introduction into DAML Services.Section3 extends DAML-S by a lower ontology for library services.These models will be transformed into probabilistic Datalog in Sec.4.Match-making rules(see Sec.5)can then be used for computing an optimum execution plan. 2DAML Services(DAML-S)DAML-S defines a vocabulary for describing services(an upper ontology).The service model is expressed in DAML+OIL.E.g.,DAML-S contains classes for processes and properties for defining their input and output types.However,it does not contain any description of actual services;they have to be defined in application-specific lower ontologies.Service descriptions in DAML-S consist of three different parts:Profile:It describes what the services actually do,mainly by means of input and output parameters,preconditions and effects.In addition,different service types can be used for categorisation.The service profile will be used for match-making.Process model:Processes describe how services work internally.They can be described either as atomic processes or as compositions of other services.Advanced match-making components can use the process model for an in-depth analysis.Service grounding:The grounding can be used for calling the service.E.g.,WSDL descriptions can be included in the service groundings.Together with the service process mode,it can be used for actually invoking the service.This implementation aspect is out of the scope of this paper.2.1Service ProfileEvery service has an associated profile.The profile(Fig.1)gives a high-level description of the functionality of a service,and is intended to be used for match-making.Fig.1.DAML-S profile definitionThe contact information aims at developers who want to contact the responsible person(e.g.the system adminis-trator)of the server,and can be neglected here.The parameter descriptions are more interesting.DAML-S supports four different kinds of service parameters: input parameters,output parameters,preconditions which have to be fulfilled in the physical world before the service can be executed,and effects the service has on the physical world.Preconditions and effects mainly aim at E-Commerce applications.For a book selling service,the ordered book must be on stock,and after the service execution,the book will be delivered to the customer.In the Digital Library setting used in this paper(pure retrieval task),preconditions and effects do not play any role.Thus,only inputs and outputs are used.1Each parameter has a name(a string),is restricted to a specific type(a DAML+OIL class or an XML Schema data-type),and refers to one parameter in the process model(see below).2.2Process ModelThe process model(Fig.2)gives a more detailed view on the service.As said before,it can be used by a match-making component for an in-depth analysis of the services.Similar to the profile,a process is described by input and output parameters,preconditions and effects.Profile parameter descriptions can correspond to these process parameters.The definition of a parameter is shorter than in the profile.The property URI is used for identification,no additional string is specified.In addition,each process parameter is a sub-property of one predefined properties input,output,etc.DAML-S basically contains two types(as sub-classes)of processes:atomic and composite processes.Atomic processes are viewed as black boxes(like profiles).Composite processes are defined as compositions of control constructs and other processes.Examples for control constructs are sequences of other control constructs(or processes),repetitions,conditions(if-then-else),or parallel execution of control constructs(or processes)with a synchronisation point at the end.Thus,composite processes 1This could easily be extended so that preconditions and effects are also considered.Fig.2.DAML-S process definitionallow for describing a service as a complex composition of other services.This is comparable to the usage of scripting code which glues together existing software components.3Lower ontology for library servicesIn addition to the DAML-S upper ontology,a domain-specific lower ontology is required.This lower ontology defines types of services(processes)which are used in the specific application area.This section briefly describes a simple lower ontology for library services.As the parameter definition in the process model is simpler than in the profile,atomic processes are employed here for the service descriptions.3.1Search servicesSearch services are among the important services in distributed Digital Libraries.They receive a user query,retrieve useful documents from their associated collection,and return them to the caller.A simple process model of search services is depicted in Fig.3(upper part).A search process is a special case (a DAML+OIL sub-class)of an atomic process.Every search process has exactly one query as input(the car-dinality restrictions are omitted in the graph)and exactly one result(meant as a set of documents)as output. Thus,sub-properties of input and output are used.The ranges of these new properties are restricted to(generic) DAML+OIL classes Query and Result.They have to be defined in the lower ontology,too,but left out as the exact definitions do not touch this discussion.In a heterogeneous setting,search services probably use different schemas for expressing queries and representing documents.Typically some search services adhere to Dublin Core(DC),e.g.those operating on Open Archives data.Other services might use specialised schemas,e.g.the ACM digital library,or services providing retrieval in art collections.Thus,the description must also contain the schema the search service uses.This is modelled by creating schema-specific sub-classes for queries and results[10].In the internal presentation,a library schema directly relates to a DAML+OIL“schema”.For match-making,it is sufficient to consider the specific sub-types of queries and results. The lower part in Fig.3shows the description of an ACM search service.Obviously,ACMSearch is a sub-class of the generic class Search.The ranges of the input and output properties are restricted to ACM-specific query/result sub-classes.Fig.3.Process model for search servicesWith this extended description,a match-making component can clearly distinguish between search services using different schemas,and can plan accordingly.3.2Other library servicesIn large peer-to-peer-systems,where a large number of DLs has to be federated,heterogeneity of DLs,especially w.r.t.the underlying schema,becomes a major issue.Each search service may use a different document structure. In federated Digital Libraries,e.g.MIND[10],users may query DLs in their preferred schema,and the system(i.e, schema mapping services)must perform the necessary transformations for each individual DL.Each schema mapping service mediates between exactly two different schemas(“input schema”,“output schema”). If there is no schema mapping service available for a required mapping,then several schema mapping services have to be chained(with at least one intermediary schema).There are two different kinds of schema mapping services:–Query transformation services take a query referring to one specific schema as input and return the same query in another specific schema.In this paper,a service DC2ACMQuery is considered which transforms a DC query into an ACM query.–In a similar way,a result transformation service like ACM2DCResult transforms a result(set of documents) adhering to one specific schema(here:ACM)into another schema(here:DC).Finally,query modification services compute a new query for a given query based on some given relevance judge-ments, e.g.by applying a query expansion algorithm.This scenario only contains one such service DCQueryModification working on DC queries and results.4DAM+OIL and DatalogThis sectionfirst introduces deterministic and probabilistic Datalog.Then,it describes how DAML-S models are transformed into Datalog facts which can then be exploited by match-making rules.4.1DatalogDatalog[16]is a variant of predicate logic based on function-free Horn clauses.Negation is allowed,but its use is limited to achieve a correct and complete model(see below).Rules have the form h←b1∧···∧b n,where h(the “head”)and b i(the subgoals of the“body”)denote literals2with variables and constants as arguments.A rule can be seen as a clause{h,¬b1,...,¬b n}:father(X,Y):-parent(X,Y)&male(X).This denotes that father(x,y)is true for two constants x and y if both parent(x,y)and male(x)are true.This rule has the head father(X,Y)and two body literals(considered as a conjunction)parent(X,Y)and male(X).In addition,negated literals start with an exclamation mark.Variables start with an uppercase character,constants with a lowercase character.Thus the rule expresses that fathers are male parents.A fact is a rule with only constants in the head and an empty body:parent(jo,mary).The semantics are defined by well-founded models[17],which are based on the notion of the greatest unfounded set.Given a partial interpretation of a program,this is the maximum set of ground literals that can be assumed to be false.Negation is allowed in Datalog as long as the program is modularly stratified[14](in contrast to Prolog).In contrast to global stratification,modular stratification is formulated w.r.t.the instantiation of a program for its Herbrand universe.The program is modularly stratified if there is an assignment of ordinal levels to ground atoms such that whenever a ground atom appears negatively in the body of a rule,the ground atom in the head of that rule is of strictly higher level,and whenever a ground atom appears positively in the body of a rule,the ground atom in the head has at least that level.4.2Probabilistic DatalogIn probabilistic Datalog[5],every fact or rule has a probabilistic weight attached,prepended to the fact or rule: 0.5male(X):-person(X).0.5male(jo).Semantics of pDatalog programs are defined as follows:The pDatalog program is modelled as a probability distri-bution over the set of all“possible worlds”.A possible world is the well-founded model of a possible deterministic program,which is formed by the deterministic part of the program and a subset of the indeterministic part.As for deterministic Datalog,only modularly stratified programs are allowed.Computation of the probabilities is based on the notion of event keys and event expressions,which allow for recognising duplicate or disjoint events when computing a probabilistic weight.Facts and instantiated rules are basic events(identified by a unique event key).Each derived fact is associated with an event expression that is a Boolean combination of the event keys of the underlying basic events.E.g.,the event expressions of the subgoals of a rule form a conjunction.If there are multiple rules for the same head,the event expressions corresponding to the rule bodies form a disjunction.By default,events are assumed to be independent,so the probabilities of events in a conjunction can be multiplied.2Literals in logics are different from literals in DAML+OIL!4.3Transforming DAML-S models into DatalogThe services described by DAML-S have to be transformed into a Datalog program which can be used for match-making.Afirst step for such a mapping from DAML+OIL onto a four-valued variant of probabilistic Datalog is proposed in[12]:DAML+OIL classes(concepts in description logics)are mapped onto unary Datalog predicates, properties(roles in description logics)onto binary Datalog predicates,and instances and DAML+OIL literals onto Datalog constants.In addition,Datalog rules preserving the DAML+OIL semantics for several DAML+OIL con-structs have been presented.In contrast,Edutella[9]only maps RDF triples onto Datalog facts,without preserving the semantics of RDF modelling primitives.When the RDF model contains a DAML-S service description,the partial model can be used for searching for services with known properties.This paper proposes a simple match-making approach which only considers the input and output types of the services.3Thus,only these parts of the DAML-S description are transformed by introducing a new ternary auxiliary relation service.Itsfirst argument contains the service name,the second one describes the type of the input parameter,and the last argument represents the output parameter type.If a service has more than one input or output value,the types are concatenated.Obviously,these facts can easily be derived from the existing knowledge. service(dl:DCQueryModification,dl:DCQuery_DCResult,dl:DCQuery).service(dl:DC2ACMQuery,dl:DCQuery,dl:ACMQuery).service(dl:ACMSearch,dl:ACMQuery,dl:ACMResult).service(dl:ACM2DCResult,dl:ACMResult,dl:DCResult).Similar,the given task is defined by a ternary relation task:task(mytask,dl:DCQuery_DCResult,dl:DCResult).As shown above,deterministic Datalog is sufficient for modelling services and tasks.Probabilistic Datalog will be employed later for computing optimum execution plans.5Computing service execution plansFor retrieval-like tasks as assumed in this paper,it is sufficient to consider sequential lists of services as execution plans.The assumption is that each invoked service can only rely on the output of the previous service execution. Thus,the input type of a service must match the output type of the previous service in the plan(or the user input if it is thefirst service),i.e.every single type in the input must be a sub-set of one of the types in the output.More formally:Let the output type of a service be OT:=OT1×OT2×···×OT k and the input type of another service be IT:=IT1×IT2×···×IT l.Then,OT and IT match if and only if for each1≤i≤l there is a1≤j≤k so that IT j is a sub-set of OT j,i.e.IT i⊆OT j.In Datalog,this is encoded by facts match(OT,IT):match(dl:DCQuery_DCResult,dl:DCQuery).match(dl:DCQuery_DCResult,dl:DCResult).match(dl:ACMQuery,dl:ACMQuery).match(dl:ACMQuery,dl:Query)....The goal then is to define Datalog rules which can be used for computing an execution plan for a given task.These rules can then be applied directly on the facts which are generated from the DAML-S descriptions of the available services.3Future versions of this approach can employ more information,e.g.the service type or the service composition.5.1Computing service chainsThis section introduces an algorithm for computing execution plans,in using Datalog rules and the facts created from the service descriptions.The basic idea is to start by determining all lists of services which can be executed in sequential order(“service chain”).The service chains whose input and output types match the input and output types of the user task then form the execution plans.Unlike Prolog,Datalog does not allow for creating lists directly,thus service chains have to be defined recursively. The ternary relation chain encodes such a service chain.Thefirst argument defines the service at the front,the third argument the service at the end of the chain.The second argument defines an arbitrary service somewhere in the middle(or equals null,if there is no other service).As a consequence,the chainDCQueryModification→DC2ACMQuery→ACMSearch→ACM2DCResultcan be represented by the following facts:chain(dl:DCQueryModification,dl:DC2ACMQuery,dl:ACM2DCResult).chain(dl:DCQueryModification,null,dl:DC2ACMQuery).chain(dl:DC2ACMQuery,ACMSearch,dl:ACM2DCResult).chain(dl:DC2ACMQuery,null,dl:ACMSearch).chain(dl:ACMSearch,null,dl:ACM2DCResult).Computing service chains starts withfinding chains of exactly two services with matching input and output types. Longer chains can be derived by computing the transitive closure of the chain relation:If there are two service chains where the last service in one chain equals thefirst service in the other service chain,then obviously both chains can be combined into one single service chain.In Datalog,this can be encoded by two rules,one for the chains consisting of two services,and another recursive one for computing the transitive closure:chain(S1,null,S2):-service(S1,I1,O1)&service(S2,I2,O2)&match(O1,I2).=>chain(dl:DCQueryModification,null,dl:DC2ACMQuery).chain(dl:DC2ACMQuery,null,dl:ACMSearch).chain(dl:ACMSearch,null,dl:ACM2DCResult).chain(S1,S,S2):-chain(S1,S11,S)&chain(S,S22,S2).=>chain(dl:DCQueryModification,dl:DC2ACMQuery,dl:ACMSearch).chain(dl:DCQueryModification,dl:DC2ACMQuery,dl:ACM2DCResult).chain(dl:DCQueryModification,dl:ACMSearch,dl:ACM2DCResult).chain(dl:DC2ACMQuery,dl:ACMSearch,dl:ACM2DCResult).5.2Computing execution plansAn execution plan for a given task is a service chain where the input type of the task is a super-set of the input type of the chain,and the output type of the chain is a super-set of the output type of the task.Thus,execution plans are encoded by the4-ary predicate plan.Thefirst argument contains the task related to the execution plan, the other three arguments contain the three arguments of the corresponding service chain(i.e.,thefirst service,the last service,and a service somewhere in the middle of the service chain).Computation of execution plans is straight-forward if service chains are already computed:plan(T,S1,S,S2):-task(T,TI,TO)&chain(S1,S,S2)&service(S1,I,O1)&match(TI,I)&service(S2,I2,O)&match(O,TO).=>plan(dl:DCQueryModification,dl:ACMSearch,dl:ACM2DCResult).plan(dl:DCQueryModification,dl:DC2ACMQuery,dl:ACM2DCResult).plan(dl:DC2ACMQuery,dl:ACMSearch,dl:ACM2DCResult).The two service literals are introduced only to check that the input and output types of the chain match those of the task.Thus,the free variables O1(output type of thefirst service in the chain)and I2(input type of the last service in the chain)are unused.The complete execution plan(all services in the correct order)can be determined by iteratively traversing the chain relation.The fact database is queried for services between two services for which it is already known that they are in the plan.The algorithm starts with thefirst and the intermediary service:?-chain(dl:DCQueryModification,S,dl:ACMSearch).=>(dl:DC2ACMQuery).Thus,the plan contains the DC2ACM query transformation service between the query modification and the ACM search service.It is still unclear if there are other services in that part of the chain,so the procedure has to be repeated:?-chain(dl:DCQueryModification,S,dl:DC2ACMQuery).=>(null).?-chain(dl:DC2ACMQuery,S,dl:ACMSearch).=>(null).Thus,the query modification and the DC2ACM query transformation service have to be executed directly one after another.The same holds for the query transformation and the search service.Now,the second part of the chain has to be investigated.The result is that DC2ACMQuery and ACMSearch have to be executed without any service between them:?-chain(dl:ACMSearch,S,dl:ACM2DCResult).=>(null).Thus,all complete execution plans can be determined based on the logic program.5.3Optimum execution plan selectionThe match-making component might compute a large number of potential execution plans,and only one of them should be selected and executed.In the context of search service selection,the concept of costs(combining e.g. time,money,quality)has been used for computing an optimum selection in the decision-theoretic framework [11,4].This framework gives a theoretical justification for selecting the best search services.In this paper,a similar approach is applied to the more general problem of execution plan selection.Again,the no-tion of costs(of an execution plan)is used.For computation reasons,time and money(“effort”)are separated from the number of relevant documents(“benefit”).The costs are later computed as the weighted difference between the effort and the benefier-specific weights ec and bc allow for choosing different selection policies(e.g.good results,fast results).In this paper,we do not describe how the costs of a service can be computed.Methods for estimating costs of search services have been proposed in[11].Currently we are working on methods for estimating costs for query and document transformation services.In this paper,we assume that effort and benefit of all services are given.If a service chain consists of two services,where each of them has its designated effort,then the effort of the service chain is the sum of the efforts of the two services.Its benefit has to be computed as the product of the benefits of the two services,as non-search services,e.g.query modification services,do not retrieve afixed number of relevant documents.So,their benefit must be specified relatively to the benefit of a search service.Typically,only distributions for the effort and benefit are given instead of exact values.Thus,two binary relations effort and benefit are used for specifying the distributions independently:0.7effort(dl:ACMSearch,10).0.3effort(dl:ACMSearch,12).0.6benefit(dl:ACMSearch,20).0.4benefit(dl:ACMSearch,30).For computing the costs of execution plans,the relation chain is extended by two additional arguments for the effort and benefit of the whole service chains,plan is extended by one argument for the costs of the execution plan:chain(S1,null,S2,E,B):-service(S1,I1,O1)&effort(S1,E1)&benefit(S1,B1)&service(S2,I2,O2)&effort(S2,E2)&benefit(S2,B2)&match(O1,I2)&add(E,E1,E2)&mult(B,B1,B2).chain(S1,S,S2,E,B):-chain(S1,S11,S,E1,B1)&chain(S,S22,S2,E2,B2)&add(E,E1,E2)&mult(B,B1,B2).plan(T,S1,S,S2,C):-task(T,TI,TO)&chain(S1,S,S2,E,B)&service(S1,I,O1,SE1,SB1)&match(TI,I)&service(S2,O2,O,SE2,SB2)&match(O,TO)&mult(SE,E,ec)&mult(SB,B,bc)&sub(C,SE,SB).When only distributions for the effort and benefit are given,the rules compute the distribution of the costs.These distributions can be used for computing expected costs for every execution plan(outside logics).Finally,the exe-cution plan with lowest expected costs has to be selected.In the example,only exact efforts and benefits are considered for the other services(for simplicity):effort(dl:DCQueryModification,4).benefit(dl:DCQueryModification,1.2).effort(dl:DC2ACMQuery,5).benefit(dl:DC2ACMQuery,0.8).effort(dl:ACM2DCResult,5).benefit(dl:ACM2DCResult,0.8).。
wifi证书信任设置
wifi证书信任设置篇一:Windows7 设置校园网wifi 认证V2Windows7 设置校园网wifi 认证V2一、首先打开我们的无线连接管理:1、控制面板\网络和Internet\管理无线网络点击添加如图2、输入响应的wifi-SSID 名称,和安全类型必须一致为“WPA2 –企业”,加密类型“AES”。
完成之后点击下一步。
3、更改初次连接的设置,点击更改“更改连接设置”。
4、校验安全认证。
5、点击-设置按钮。
依次将“验证服务器证书” 和“配置”内的选项去掉。
然后确定。
6、高级设置- 设置,“选择用户身份验证“。
OK这就好了7、搜索到SSID后选择正确的连接。
8、点击连接认证!2013年12月16日星期一℡龙龙录入ll@篇二:WIFI认证测试IEEE /b/g双频带WorldRadio设计已经完成Wi-Fi多媒体的Wi-Fi认证。
WMM通过控制网络音频、视频与数据的优先传送次序与缩短延迟时间提供给无线多媒体应用卓越的服务品质,这个认证程序同时也可以确保取得WMM 认证的产品具有互通性,将有助于Wi-Fi 技术在消费性电子市场的普及。
对Wi-Fi联盟WMM认证程序Wi-Fi联盟展开Final 认证测试计划Wi-Fi 联盟将于2009年9月30日展开Final 认证测试计划,并提供90天的缓冲期间。
简而言之,在2009年9月30日至12月29日这段缓冲期间内,会员可选择Draft 版或Final 版进行认证。
自12月29日后,会员则需依照11n Final 版进行认证。
并先行公布了Wi-Fi CERTIFIED n 新的标志。
更新之后的dual-stream或multi-stream Wi-Fi CERTIFIED 标志,现已可在此连结进行下载。
若会员欲使用由TG提案小组认可的feature matrix format,请由下载网址进入并提出matrix copy 之要求。
*请注意,新的标志在2009年9月30日前是禁止被使用的,先行公布是为了协助会员能提早准备包装上的新标志或其他相关事项。
移动支付改变了我们的生活英语作文
移动支付改变了我们的生活英语作文英文回答:Mobile payment has revolutionized our lives in countless ways, transforming the way we conduct financial transactions, shop, interact with businesses, and manage our finances.One of the most significant impacts of mobile payment has been the ease and convenience it offers. With a few simple taps on a smartphone, users can make payments, transfer funds, and access a range of financial services, all without the need for cash or physical cards. This has greatly simplified and streamlined financial transactions, saving time and effort.Mobile payment has also enhanced the security of financial transactions. Unlike traditional payment methods, mobile payment systems often incorporate advanced security measures, such as biometrics, encryption, and frauddetection algorithms, to protect users' financial data and prevent unauthorized access. This has significantly reduced the risk of fraud and identity theft, giving users peace of mind.Moreover, mobile payment has paved the way for innovative and value-added services. Many mobile payment platforms offer features such as contactless payments,peer-to-peer transfers, and mobile wallets, which provide users with a comprehensive suite of financial tools attheir fingertips. This has not only enhanced user experience but has also created new opportunities for businesses to engage with their customers.The widespread adoption of mobile payment has also had a profound impact on the retail sector. It has enabled businesses to accept payments more efficiently and quickly, reducing queues and enhancing customer satisfaction. Moreover, mobile payment has facilitated the emergence ofe-commerce and online shopping, providing consumers with more choice and convenience.In summary, mobile payment has transformed our lives by enhancing convenience, increasing security, and providing new and innovative services. Its impact has been feltacross various aspects of our personal and professional lives, making it an indispensable tool in today's digital world.中文回答:移动支付改变了我们的生活,改变了我们进行金融交易、购物、与商家互动以及管理财务的方式。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Query Processing Over Peer-To-Peer DataSharing SystemsO.D.S¸ahin A.Gupta D.Agrawal A.El AbbadiDepartment of Computer ScienceUniversity of California at Santa Barbaraodsahin,abhishek,agrawal,amr@ Abstract Peer-to-peer systems are mainly used for object sharing currently, but they can provide the infrastructure for many other applications.In this paper, we extend the idea of object sharing to data sharing on a peer-to-peer system. We propose a method,which is based on the CAN[9]system,for efficiently evaluating range queries on such a system.The answers of the range queries are cached at the peers and then they are used to answer further range queries.The scalability and efficiency of our design is shown through simulation.Keywords:Peer-to-peer Systems,Distributed Systems,Distributed Databases, Range Queries,Distributed Hashing.1IntroductionPeer-to-peer systems have been increasing in popularity in recent years as they are used by millions of users as they allow the exchange of massive amounts of data over the Internet.These systems are generally used forfile sharing,such as Napster[8]and Gnutella[1],which allow users to share theirfiles with other users.There are two challenges to be resolved for sharing objects on a peer-to-peer system:Data Location:Given the name of an object,locate the corresponding ob-ject.Routing:Once the possible location of the object is found,how to route the query to that location.Napster uses a centralized design to resolve these issues.A central server maintains the index for all objects in the system.New peers joining the system1register themselves with the server.Every peer in the system knows the identityof the central server while the server keeps information about all the nodes andobjects in the system.Whenever a peer wants to lookup an object,it sends therequest(name of the object)to the central server which returns the IP addresses ofthe peers storing this object.The requesting peer then uses IP routing to pass therequest to one of the returned peers and downloads the object directly from thatpeer.There are several shortcomings of the centralized design of Napster.Firstof all,it is not scalable since the central server needs to store information aboutall the peers and objects in the system.Second,it is not fault tolerant because thecentral server is the single point of failure.A different approach is followed by Gnutella to get around the problem ofcentralized design.There is no centralized server in the system.Each peer in theGnutella network knows only about its neighbors.Aflooding model is used forboth locating an object and routing the request through the peer network.Peersflood their requests to their neighbors and these requests areflooded for a certainthreshold.The problems associated with this design are the high overhead on thenetwork as a result offlooding and the possibility of missing some requests evenif the requested objects are in the system.These designs,including Napster,Gnutella,and some other variants are re-ferred to as unstructured peer-to-peer systems[4,7],because the data placementand network construction are done randomly in these systems.Another group ofpeer-to-peer designs are referred to as structured peer-to-peer systems and includesystems such as CAN[9],and Chord[10].These systems are based on implement-ing a distributed data structure called Distributed Hash Table(DHT)[9,10,11]which supports a hash-table like interface for storing and retrieving objects.CAN[9]uses a d-dimensional virtual address space for data location and rout-ing.Each peer in the system owns a zone of the virtual space and stores the objectsthat are mapped into its zone.Each peer stores routing information about O(d)other peers,which is independent of the number of peers,,in the system.Eachobject is mapped to a point in d-dimensional space and then the request is routedtoward the mapped point in the virtual space.Each peer on the path passes the re-quest to one of its neighbors which is closer to the destination in the virtual space.The average routing path has hops which is the lookup time for exact match queries.Chord[10]assigns unique identifiers to both objects and peers inthe system.Given the key of an object,it uses these identifiers to determine thepeer responsible for storing that object.Each peer keeps routing information about other peers,and resolves all lookups via messages,where N is the number of peers in the system.Since peer-to-peer systems have emerged as a powerful paradigm for datasharing over the Internet,a natural question arises if the power of peer-to-peersystems can be harnessed to support database functionality over peer-to-peer sys-2tems.Indeed,several research initiatives are underway to answer this question. For example,Gribble et al.[2]in their position paper titled“What can peer-to-peer do for databases,and vice versa?”outline some of the complexities that need to be addressed before peer-to-peer systems can be exploited for database query processing.Similarly,in a recent paper Harren et al.[5]explore the issue of supporting complex queries in DHT-based peer-to-peer systems.Harren et al. report the implementation of database operations over CAN by performing a hash join of two relations using DHT.The underlying technique basically exploits the exact-name lookup functionality of peer-to-peer systems.The work reported in this paper has similar goals as that of Harren et al.,in that we are interested in supporting database query processing over peer-to-peer systems.Most data-sharing approaches designed for peer-to-peer systems are concerned with exact lookup of data associated with a particular keyword.Our contention is that in order to achieve the larger goal of data-sharing in the context of a DBMS over peer-to-peer systems,we need to extend the current peer-to-peer designs that only support exact name lookups to range searches.Range searches or range selection is one of the fundamental functionality that is needed to support general purpose database query processing.The main motivation for this is that the selection operation is typically involved at the leaves of a database query plan and hence is a fundamental operation to retrieve data from the database.As-suming that such data partitions of a relation are extensively replicated at the peers due to prior queries,we would like to retrieve the data from the peer-to-peer sys-tem instead of fetching it from the base relation at the data source.In this paper we propose to extend peer-to-peer systems to support more general queries on po-tentially more complex and more structured datasets.Unlike previous approaches for the design of distributed databases,our approach aims to support the man-agement of loosely synchronized datasets that support more general queries in a peer-to-peer environment.Unfortunately,DHTs were designed for exact match queries.In this paper,we will extend the idea of object sharing to data sharing and propose a method for efficiently answering range queries on a peer-to-peer data sharing system.Our general long term goal is to support the various types of complex queries used by DBMSs so that general peer-to-peer data support can be a reality.The rest of the paper is organized as follows:Section2formulates the prob-lem.Section3introduces the basic concepts of our design,which is explained in detail in Section4.The experimental results are presented in section5.The last section concludes the paper and discusses future work.32Problem FormulationCurrent peer-to-peer systems focus on object sharing and use object names for lookup.Our goal,on the other hand,is to design a general purpose peer-to-peer data sharing system.We consider a database with multiple relations whose schema is globally known to all peers in the system.The peers cooperate with each other to facilitate the retrieval and storage of datasets.A straightforward extension and application of object naming is to use the relation name to locate the data in the system.However,such an approach will result in large amounts of data being stored redundantly and often unnecessarily throughout the network.A more desirable approach is to use peers to store the answers of the previous queries.Whenever a new query is issued,the peers are searched to determine if the query can be answered from the prior cached answers.This is similar to the known database problem often referred to as Answering Queries using Views[6]. Since the problem of answering queries using views is computationally hard even in centralized systems,we will instead focus at a restricted version by extending the exact lookup functionality of peer-to-peer systems to the range lookup of a given dataset.Hence,our goal is to develop techniques that will enable efficient evaluation of range queries over range partitions that are distributed(and perhaps replicated)over the peers in a peer-to-peer system.We assume that initially the database is located at a known site,or a known set of sites.All queries can be directed to this database.However,such a centralized approach is prone to overloading.Furthermore,the location of the data may be quite remote in the peer-to-peer network,and hence response time may be slow. Our goal is for the peers to cooperatively store range partitions of the database, which are later used to respond to user queries.Of course the challenge is how to track down where the various data range partitions are located.A straight-forward approach would be to maintain a centralized index structure such as an interval tree that has the global knowledge about the locations of range partitions distributed over the network.However,such an approach would violate the key requirement of peer-to-peer systems,which is to ensure that the implementation is scalable,decentralized,and fault-tolerant.Typically when an SQL query is formulated,a query plan is designed in the form of a query tree.A common optimization technique is to push the selection operations down to the leaves of the tree to minimize the data that has to be re-trieved from the DBMS.A similar approach is used here to minimize the amount of data retrieved from other peers for range queries.Rather than retrieving all possible tuples from the actual database for each range query,the answers stored at the peers are searched tofind a smaller set of tuples that is a superset of the query.For example,if the answer of a range query for a given attribute is4stored at a peer,then future queries such as can be answered using the result of.Since the range subsumes the range,it is enough to examine the tuples in the result of,without any data retrieval from the database.In this way,less tuples are checked to compute the answer and all the tuples to be examined are retrieved directly from a single peer.This also decreases the load on the database since it is not accessed for every query.The problem can now be stated as follows:Problem.Given a relation,and a range attribute,we assume that the results of prior range-selection queries of the form are stored at the peers.When a query is issued at a peer which requires the retrieval of tuples from in the range,we want to locate any peers in the system which already store tuples that can be accessed to compute the answer.In order to adhere to the peer-to-peer design methodology,the proposed solution for range lookup should also be based on distributed hashing.A nice property of DHT-based approach is that the only knowledge that peers need is the function that is used for hashing.Once this function is known to a peer,given a lookup request the peer needs to compute the hash value locally and uses it to route the request to a peer that is likely to contain the answer.Given this design goal,a naive approach would be to use a linear hash function over the range query schema,i.e., a linear hash function over,,or both and.A simple analysis reveals that such a hash function will only enable exact matches of given range requests.However we are also interested in the results of the range queries that may contain the given range,i.e.,the ranges that are a superset for the given query range lookup.In the following sections we develop a DHT approach that enables range lookups that are not exact matches.In[3],we use locality preserving hash functions for range lookups that are based on similarity and hence provide approx-imate answers to range queries.In this paper,however,our technique ensures that a range lookup will always yield a range partition that is a superset of the query range,if one exists.3System ModelOur system is based on CAN[9]and uses a2d virtual space in a similar manner. Given the domain of a one dimensional attribute,the corresponding virtual hash space is a two dimensional square bounded by the coordinates,, ,and in the Cartesian coordinate space.Figure1shows the correspond-ing virtual hash space for a range attribute whose domain is[20,80].The corners of the virtual space are,,,and.5Figure1:Virtual Range Lookup Space for a range attribute with domain23561(20,20) (80,20)(80,80)(20,80)47355061304269Figure2:Partitioning of the virtual space shown in Figure1The virtual hash space is further partitioned into rectangular areas,each of which is called a zone.The whole virtual space is entirely covered by these zones and no two zones overlap.A zone can be identified by a pair() where is the bottom left corner coordinate whereas is the topright corner coordinate.Figure2shows a possible partitioning of the virtual space shown in Figure1.The virtual space is partitioned into7zones:zone-1 ,zone-2,zone-3,zone-4,zone-5,zone-6,and zone-7.Each zone is assigned to a peer in the system.Unlike original CAN,not all the peer nodes in the system participate in the partitioning.Those that participate are called the active nodes.Each active node owns a zone and stores the results of the range queries whose range hashes into the zone owned by this node.The rest of the peer nodes,which do not participate in the partitioning,are called passive nodes.For the purpose of routing requests in the system,each active node keeps a routing table with the IP addresses and zone coordinates of its neighbors,which are the owners of adjacent zones in the virtual hash space.In Figure2,the routing table of the owner of zone-2contains information about its four neighbors:zone-5, zone-3,zone-7and zone-4.Given a range query with range,it is hashed to point in the virtual hash space.This point is referred to as the target point.The target point is used to determine where to store the answer of a range query as well as where to initiate range lookups when searching for the result of a range query.The zone in which the target point lies and the node that owns this zone are called the target zone and the target node,respectively.The answer of each range query is stored6at the target node of this range.For example,according to Figure2,the range query is hashed into zone-3,so the set of tuples that form the answer to this query would be stored at the node that owns zone-3.Since the start point and end point of a range is hashed to and coordinates respectively,the coordinate of the target point is always greater than or equal to the coordinate.Hence,the target point never lies below line.Given two ranges,and that are hashed to target points and in the virtual hash space,the following observations can be made:1.If,then the coordinate of is smaller than the coordinate ofand hence lies to the left of in the virtual space.2.If,then the coordinate of is smaller than the coordinate ofand hence lies below in the virtual space.3.lies to the upper-left of if and only if range contains range.The third result can be concluded from the fact that by moving along the negative direction in the virtual hash space decreases the start point of the corresponding range while by moving along the positive direction increases the end point.Figure3:Range HashingFigure3shows a range query that is hashed into ing the above observations,we can assert that if there is any prior range query result that contains,then it must have been hashed to a point in the shaded region. Any zone that intersects the shaded region is therefore a candidate for potentially containing a result for this query.In thefigure,the zones,and inter-sect with the shaded region and may have a result that contains the given range7.Zone is of particular interest since it is guaranteed to store results that completely contain the answer to the desired range .Diagonal Zone.Consider a zone bounded by coordinates.We say that another zone bounded byis a diagonalzone of if and .Intuitively,is diagonally above the upper-left corner of .For example,is a diagonal zone of in Figure 3.If we require that zones cannot exist unless they are non-empty (i.e.,store at least one range selection),then a diagonal zone of a zone can answer all range queries that are hashed into .We now estimate the average routing distance for processing range queries in the proposed model.Let us assume that the 2d virtual hash space is partitioned into equal sized zones.If ,then each axis is divided into equal sized parts.Every path from a zone to another zone constitutes of steps in and directions (see Figure 4,the path is shown as a dottedline).l xl y12m12mFigure 4:A Path in 2d virtual hash space divided into equal sized zones In Figure 4,is the number of steps in direction and is the number of steps in direction.Then the total path length .The shortest possible path length is and the longest path length is ,which is steps in either direction.Now,we will compute how many ways a path of length can be generated.When ,and .A path of length in the direction can be generated in ways,and a path of length in the direction can be generated in ways.Hence the total number of ways inwhich a path of length can be generated whenis given by :8(1) Therefore,the total number of paths whose length is less than is:(2) And,the weighted sum of all path lengths less than is:(6)9The average path length.4Distributed Range HashingIn this section we describe the basic components that support the distributed im-plementation of range hashing.We assume that there are a set of computing nodes which participate in the distributed implementation of the range hash table(RHT). For simplicity,we are assuming that the range hash table is based on a relationfor a specific range attribute with range extent.If queries on other attributes or relations also need to be supported,we assume a separate instance of an appropriate RHT will be maintained.The nodes participating in the system are in one of the two modes–active/passive.Initially,only one active node man-ages the entire virtual hash space.Other nodes become active as the work load on the active node increases.Next we describe how zones in the virtual hash space are maintained on peers.Finally,we present the details of range query lookup processing in the system.4.1Zone MaintenanceThe partitioning of the virtual hash space into zones is at the core of both the data location and routing algorithms.Initially the entire hash space is a single zone and is assigned to one active node.The partitioning of the hash space is dynamic and changes over time as the existing zones split and new zones are assigned to passive nodes that become active and take responsibility for the new zone.A zone splits when it has a high load:it may have too many results to store(storage load) or it may get too many requests(processing load).The decision to split is made by the owner of the zone.Whenever a zone is to be split,the owner node contacts one of the passive nodes and assigns it a portion of its zone by transferring the corresponding results and neighbor lists.The split line,along which the zone10find x-median and y-median of the stored resultsdetermine if a split at x-median(parallel to y axis)or a split at y-median(paral-lel to x axis)results in better partitioning of the space and then split along this linecompute new coordinates of this zone and the new zone according to the split lineassign the new zone to a passive nodefor all results stored at this zone doif the result is mapped to the new zone thenremove from this node and send to the new nodeend ifend forfor all neighbors of this zone doif it is a neighbor of the new zone thenadd it to the neighbor list of new nodeend ifif it is no longer a neighbor of this node thenremove from the neighbor list of this nodeend ifend foradd new node to the neighbor list of this nodeadd this node to the neighbor list of new node3561(20,20)(80,20) (80,80) (20,80)4782Figure 5:Partitioning of the virtual hash space after zone-2of Figure 2splits 561(20,20) (80,20)(80,80)(20,80)478239Figure 6:Partitioning of the virtual hash space after zone-3of Figure 5splitsit is routed toward its target zone through the virtual space.Starting from the requesting zone,each zone passes the query to an adjacent zone until it reaches its target ing its neighbor lists and the target point of the query,each node on the route passes the query to one of its neighbors whose coordinates are the closest to the target point in the virtual space.Algorithm 2presents an outline of the routing algorithm.if the query range maps to this zone then return this zone elsefor all neighbors of this zone doCompute the closest Euclidean distance from the target point of the query to the zone of this neighbor in the virtual space if this is the minimum distance so far then keep a reference to this neighbor end if end forSend the query to the neighbor with minimum distance from the target point in virtual space end ifbetween the centers of the neighboring zones and the target point and forward the query to the neighbor with the least distance to the target.But as we show in the following discussion,the query might not always converge to the target.231t4Figure 7:With distance measured from center of zones,queries may not converge Figure 7shows a portion of the virtual hash space that has been divided among the four zones labeled and .The labels of the zones denote the centers of the corresponding zones.The point marks the target point in the virtual hash space and lies in zone-1.The query originates in zone-4and is forwarded to zone-2because the center of zone-2is closer to the target than that of zone-1.Once the query is at zone-2,it chooses zone-3among neighboring zones and because is closest to center of zone-3.Next,zone-3sends it back to zone-2because between zones and ,the target is closer to the center of zone-2.And the query keeps oscillating between zones and never reaching zone-1to which belongs.R1R2R3R4R5R6R7R8Z Figure 8:Measuring distance of a target point form a zone13The distance of target from a zone should be measured as the closest distance of from the entire zone.This is illustrated in Figure8.The target point may lie in one of the eight regions labeled.If lies in regionor then the closest distance of from the zone is its distance from the upper or lower edge of the zone rectangle respectively.Similarly,if lies in regionor then the closest distance is from the left or right edge of the zone rectangle respectively.If the target is in one of the regions or,then the closest distance of from the zone is its distance from the closest vertex of the zone rectangle.If lies in the interior of the zone or on the zone boundary,then its distance from the zone is.Since the target can lie in the interior of at most one zone that zone will have the least distance from and all other zones will have a positive distance from.Since,at each step of routing the query moves closer to the target,it will converge.In case the target point is on an edge of a zone,then the query corresponding to that point should be stored in both the zones sharing thatedge.Figure9:Routing and forwarding in the virtual hash spaceFigure9shows how a query is routed in the system.The range query is ini-tiated at zone-7and then routed through zone-2to its target zone,zone-10.The range queries in the system can be initiated from any zone.Since passive nodes do not participate in the partitioning,they send their queries to any of the active nodes from where the queries are routed toward the target zone.4.3ForwardingOnce a query reaches the target zone,the stored results at this zone are checked to see if there are any results whose range contains the query range.If such a result is found,only this result is examined to construct the query answer.Even if there is14no such local result,it is still possible that some other zones in the system do have such a result;so the search should be forwarded to other zones.Fortunately the search space can be pruned at this point.As a result of the mapping scheme,only the zones that lie to the upper left of the target point can have a result containing the given range.So if the result is not found locally,the query is forwarded to the left and top neighbors that may contain a potential result.Those nodes also check their local results and may forward the query to some of their neighbors in a recursive manner.Figure9shows how a query can be forwarded in the system.If the range query cannot be answered at its target zone,zone-10,then it is forwarded to zone-3and zone-5which may have a result for the query.Note that forwarding is only used if the query cannot be answered at the target zone.Forwarding is similar toflooding and has to be stopped at some point.For this purpose,a parameter called F orwarding Limit is used.F orwarding Limit is a real value between and used to determine how far the forwarding will go on. If it is set to,then only the target zone of the range query is checked and the query is not forwarded to any neighbor.If,on the other hand,it is set to,then the query is forwarded to all zones that are likely to have a result for the query;i.e.,all the zones which have some point that lies on the upper left of the target point of the query.For a zone,every zone is a diagonal zone for if and only if and.In Figure9,zone-8and zone-4are the diagonal zones for zone-10.However zone-3has no diagonal zone. It is obvious that a zone cannot have a diagonal zone if it lies on the left or top boundary of the virtual space.It is also possible that a zone may have no diagonal zone even if it has many zones to the upper left of itself.Figure10shows such a case where the zone-6at the bottom right corner has no diagonal zones.1356724Figure10:No Diagonal ZonesDiagonal zones are of particular interest since they are guaranteed to contain a15range including the desired answer set.This is the case because every point in the diagonal zone contains the query range and every zone in the system has at least one stored result.As the number of zones in the system increases,the possibility offinding a diagonal zone for a zone also increases.4.4DiscussionAn important routing improvement is Lookup During Routing.Since the request-ing zone and the target can be at any position with respect to each other(they can actually be the same zone),it is possible that a zone on the path from the request-ing zone to the target zone may already have a result containing the query.The system can be improved so that every zone on the route checks its local results if it has a possible result.If the result is found,then the query is not routed any further and the result is returned to the requesting node.This way,some routing and forwarding can be avoided.The routing path decisions can be changed so that the routed queries follow a path that may have zones with possible results.The effect of Lookup During Routing on the system performance is shown in Section 5.3.Some of the improvements for CAN[9]are also applicable for our approach. Multiple realities,better routing metrics,overloaded zone,topology-sensitive par-titioning can be incorporated into the system.Although our system is designed for answering range queries,it can also an-swer exact queries.Exact match queries can be answered by setting the start and end points of the range to the exact value and then querying the system with this range.For example,in order to search for the tuples with range attribute A=20, the system is queried for the range.Updates of tuples can be incorporated into the system in the following manner. When a tuple with range attribute is updated,an update message is sent to the target zone of the range.Since tuple is included in all the ranges such that and,the update message is forwarded to all zones that lie on the upper left of the target zone.Each zone receiving an update message,updates the corresponding tuple in the local results accordingly.All zones that contain the tuple will receive the update message and hence will update the tuple value in the stored data partition.5Experimental ResultsWe implemented a simulator in Java and then tested various aspects of our design. In this section,we present the test results.All experiments were performed on a Celeron MMX PC with466MHz CPU and132MBytes of main memory,running Linux RedHat7.3.16。