A Framework for Multi-objective SLA Compliance Monitoring

合集下载

信息技术服务管理认证试卷

信息技术服务管理认证试卷

信息技术服务管理认证试卷(答案见尾页)一、选择题1. 信息技术服务管理认证中,哪个要素是服务连续性管理的重要组成部分?A. 事件管理B. 配置管理C. 变更管理D. 问题管理2. 在信息安全管理体系中,哪个标准提供了关于服务连续性的详细描述?A. ISO/IEC 27001B. ISO/IEC 20000-1C. ISO/IEC 22301D. SWOT分析3. 服务级别管理的目标是确保客户对服务的满意度达到或超过预定的标准,这通常通过什么来衡量?A. 故障响应时间B. 服务恢复时间C. 报告的可用性百分比D. 服务水平协议(SLA)的遵守情况4. 在服务质量差距模型中,服务提供者与客户之间的差距通常是什么?A. 服务质量标准B. 客户期望C. 服务交付D. 组织沟通5. 以下哪个选项是服务水平管理的关键组成部分,用于评估和调整服务以满足客户需求?A. 服务目录B. 服务级别协议(SLA)C. 服务报告D. 服务改进6. 在信息技术服务管理中,哪个流程负责确保服务连续性计划的准确性和完整性?A. 变更管理B. 配置管理C. 事件管理D. 问题管理7. 服务级别管理是如何在服务提供商和客户之间建立信任关系的?A. 通过服务水平协议的条款和条件B. 通过定期的服务评审和审计C. 通过提供高质量的服务D. 通过透明的沟通和报告8. 以下哪个选项是服务持续性和灾难恢复计划之间的关系?A. 服务持续性和灾难恢复计划是相同的概念B. 服务持续性好可以保证灾难恢复计划的成功实施C. 灾难恢复计划是服务持续性的一个子集D. 两者之间没有直接关系9. 在ISO/IEC -中,哪个流程负责评估服务提供者的服务连续性管理能力?A. 服务连续性管理流程B. 服务报告流程C. 业务连续性管理流程D. 变更管理流程10. 服务水平管理如何帮助组织实现其业务目标?A. 通过确保服务按需提供B. 通过提高客户满意度C. 通过减少服务中断的时间D. 通过降低运营成本11. 信息技术服务管理的核心是什么?A. 技术支持B. 客户服务C. 系统维护D. 变更管理12. 以下哪个选项是信息技术服务管理体系(ITSM)的基础?A. ISO/IEC 20000-1B. ISO/IEC 27001C. PMPD. ITIL13. 在ITSM中,服务台的主要职责是什么?A. 接待客户咨询B. 提供技术支持C. 监控和报告服务性能D. 实施服务改进措施14. 以下哪个选项不是ITIL框架中的流程?A. 事件管理B. 问题管理C. 变更管理D. 风险管理15. ITIL认为最佳实践是由什么组成的?A. 流程B. 模块C. 指南D. 作业指导书16. 在ITSM中,服务级别管理的目标是确定什么?A. 服务的可用性B. 服务的完整性C. 服务的性能D. 服务的成本17. 以下哪个选项不是信息技术服务管理认证中常用的评估方法?A. 审计B. 问卷调查C. 测试D. 专家评审18. ITIL的版本包括哪几个?A. ITIL v2B. ITIL v3C. ITIL v4D. ITIL v519. 在ITSM中,服务策略定义了什么?A. 服务提供的方式B. 服务的目标C. 服务的优先级D. 服务的预算20. 以下哪个选项不是ITIL框架中的关键活动?A. 服务设计B. 服务转换C. 服务运营D. 服务持续改进21. 信息技术服务管理体系(ITSM)的基础定义是什么?A. ITSM是一种服务管理模型,它通过整合IT服务和流程,提高企业的IT交付能力和客户满意度。

CloudResearch(云服务)_15

CloudResearch(云服务)_15

Do Clouds Compute?A Framework for Estimating the Value of Cloud ComputingMarkus Klems, Jens Nimis, Stefan TaiFZI Forschungszentrum Informatik Karlsruhe, Germany f klems,nimis, tai g @fzi.de•IntroductionOn-demand provisioning of scalable and reliable compute services, along witha cost model that charges consumers based on actual service usage, hasbeen an objective in distributed computing research and industry for a while.Cloud Computing promises to deliver on this objective: building on compute and storage virtualization technologies, consumers are able to rent infrastructure \in the Cloud"as needed, deploy applications and store data, and access them via Web protocols on a pay-per-use basis.In addition to the technological challenges of Cloud Computing there is a need for an appropriate, competitive pricing model for infrastructure-as-a-service. The acceptance of Cloud Computing depends on the ability to im-plement a model for value co-creation. In this paper, we discuss the need for valuation of Cloud Computing, identify key components, and structure these components in a framework. The framework assists decision makers in esti-mating Cloud Computing costs and to compare these costs to conventional IT solutions.•ObjectiveThe main purpose of our paper is to present a basic framework for estimat-ing value and determine bene ts from Cloud Computing as an alternative to conventional IT infrastructure, such as privately owned and managed IT hard-ware. Our e ort is motivated by the rise of Cloud Computing providers and the question when it is pro table for a business to use hardware resources \in the Cloud". More and more companies already embrace Cloud Computing services as part of their IT infrastructure [1]. However, there is no guide to tell when outsourcing into the Cloud is the way to go and in which cases it does not make sense to do so. With our work we want to give an overview of economic and technical aspects that a valuation approach to Cloud Computing must take into consideration.Valuation is an economic discipline about estimating the value of projects1and enterprises [2]. Corporate management relies on valuation methods in or-der to make reasonable investment decisions. Although the basic methods are rather simple, like Discounted Cash Flow (DCF) analysis, the di culties lie in appropriate application to real world cases.Within the scope of our paper we are not going to cover speci c valuation methods. Instead, we present a generic framework that serves for cost compar-ison analysis between hardware resources \in the Cloud"and a reference model, such as purchasing and installing IT hardware. The result of such a compari-son shows the value of Cloud Computing associated with a speci c project and measured in terms of opportunity costs. In later work the framework must be eshed out with metrics, such as project free cash ows, EBITDA, or other suit-able economic indicators. Existing cost models, such as Gartner's TCO seem promising candidates for the design of a reference model [3].•ApproachA systematic, dedicated approach to Cloud Computing valuation is urgently needed. Previous work from related elds, like Grid Computing, does not con-sider all aspects relevant to Cloud Computing and can thus not be directly applied. Previous approaches tend to mix business objectives with technologi-cal requirements. Moreover, the role of demand behavior and the consequences it poses on IT requirements needs to be evaluated in a new light. Most impor-tant, it is only possible to value the bene t from Cloud Computing if compared to alternative solutions. We believe that a structured framework will be helpful to clarify which general business scenarios Cloud Computing addresses.Figure 1 illustrates our framework for estimating the value of Cloud Com-puting. In the following, we describe in more detail the valuation steps suggested with the framework.2.1 Business ScenarioCloud Computing o ers three basic types of services over the Internet: virtual-ized hardware resources in form of storage capacity and processing power, plus data transfer volume. Since Cloud Computing is based on the idea of Internet-centric computing, access to remotely located storage and processors must be encompassed with su cient data transfer capacities.The business scenario must specify the business domain (internal processes, B2B, B2C, or other), key business objectives (cost e ciency, no SLA viola-tions, short time to market, etc.), the demand behavior (seasonal, temporary spikes, etc.) and technical requirements that follow from business objectives and demand behavior (scalability, high availability, reliability, ubiquitous access, se-curity, short deployment cycles, etc.).23(2) Business DomainIT resources are not ends in themselves but serve speci c business objectives. Organizations can bene t from Grid Computing and Cloud Computing in di er-ent domains: internal business processes, collaboration with business partners and for customer-faced services (compare to [14]). [1] Business ObjectivesOn a high level the typical business bene ts mentioned in the context of Cloud Computing are high responsiveness to varying, unpredictable demand behavior and shorter time to market. The IBM High Performance on Demand Solu-tions group has identi ed Cloud Computing as an infrastructure for fostering company-internal innovation processes [4]. The U.S. Defense Information Sys-tems Agency explores Cloud Computing with the focus on rapid deployment processes, and as a provisionable and scalable standard environment [5].z Demand BehaviorServices and applications in the Web can be divided into two disjoint categories: services that deal with somewhat predictable demand behavior and those that must handle unexpected demand volumes respectively. Services from the rst category must be built on top of a scalable infrastructure in order to adapt to changing demand volumes. The second category is even more challenging, since increase and decrease in demand cannot be forecasted at all and sometimes occurs within minutes or even seconds.Traditionally, the IT operations department of an organization must master the di culties involved in scaling corporate infrastructure up or down. In prac-tice it is impossible to constantly fully utilize available server capacities, which is why there is always a tradeo between resource over-utilization, resulting in glaring usability e ects and possible SLA violations, and under-utilization, leading to negative nancial performance [6]. The IT department dimensions the infrastructure according to expected demand volumes and in a way such that enough space for business growth is left. Moreover, emergency situations, like server outages and demand spikes must be addressed and dealt with. Asso-ciated with under- and over-utilization is the notion of opportunity costs. The opportunity costs of under-utilization are measured in units of wasted compute resources, such as idle running servers. The opportunity costs of over-utilization are the costs of losing customers or being sued as a consequence of a temporary server outage.Expected Demand: Seasonal DemandAn online retail store is a typical service that su ers from seasonal demand spikes. During Christmas the retail store usually faces much higher demand vol-umes than over the rest of the year. The IT infrastructure must be dimensioned such that it can handle even the highest demand peaks in December.Expected Demand: Temporary E ect4Some services and applications are short-lived and targeted to single or sel-dom events, such as Websites for the Olympic Games 2008 in Beijing. As seen with seasonal demand spikes, the increase and decrease of demand volume is somewhat predictable. However, the service only exists for a comparably short period of time, during which it experiences heavy tra c loads. After the event, the demand will decrease to a constant low level and the service be shut down eventually.Expected Demand: Batch ProcessingThe third category of expected demand scenarios are batch processing jobs. In this case the demand volume is usually known beforehand and does not need to be estimated.Unexpected demand: Temporary E ectThis scenario is similar to the \expected temporary e ect", except for one major di erence: the demand behavior cannot be predicted at all or only short time in advance. A typical example for this scenario is a Web start-up company that becomes popular over night because it was featured on a news network. Many people simultaneously rush to the Website of the start-up company, caus-ing signi cant tra c load and eventually bringing down the servers. Named after two famous news sharing Websites this phenomenon is known as \Slash-dot e ect"or \Digg e ect".[12] Technical RequirementsBusiness objectives are put into practice with IT support and thus translate into speci c IT requirements. For example, unpredictable demand behavior translates to the need for scalability and high availability even in the face of signi cant tra c spikes; time to market is directly correlated with deployment times.z Costs of Cloud ComputingAfter having modeled a business scenario and the estimated demand volumes, it is now time to calculate the costs of a Cloud Computing setting that can ful ll the scenario's requirements, such as scalability and high availability.A central point besides the scenario properties mentioned in section3.1.3 is the question: how much storage capacity and processing power is needed in order to cope with demand and how much data transfer will be used? The numbers might either be xed and already known beforehand or are unknown and must be estimated.In a next step a Utility Computing model needs to de ne compute units and thus provides a metric to convert and compare computing resources between the Cloud and alternative infrastructure services. Usually the Cloud Comput-ing provider de nes the Utility Computing model, associated with a pricing scheme, such as Amazon EC2 Compute Units (ECU). The vendor-speci c model can be converted into a more generic Utility Computing unit, such as FLOPS, I/O operations, and the like. This might be necessary when comparing Cloud5Computing o ers of di erent vendors. Since Cloud Computing providers charge money for their services based on the Utility Computing model, these pricing schemes can be used in order to determine the direct costs of the Cloud Com-puting scenario. Indirect costs comprise soft factors, such as learning to use tools and gain experience with Cloud Computing technology.3. Costs of the Reference IT Infrastructure ServiceThe valuation of Cloud Computing services must take into account its costs as well as the cash ows resulting from the underlying business model. Within the context of our valuation approach we focus on a cost comparison between infrastructure in the Cloud and a reference infrastructure service. Reaching or failing to reach business objectives has an impact on cash ows and can therefore be measured in terms of monetary opportunity costs.The reference IT infrastructure service might be conventional IT infrastruc-ture (SME or big business), a hosted service, a Grid Computing service, or something else. This reference model can be arbitrarily complex and detailed, as long as it computes the estimated resource usage in a similar manner as in the Cloud Computing scenario of section 3.2. The resource usage will not in all cases be the same as in the Cloud Computing scenario. Some tasks might e.g. be computed locally, thus saving data transfer. Other di erences could result from a totally di erent approach that must be taken in order to ful ll the business objectives de ned in the business scenario.In the case of privately owned IT infrastructure, cost models, such as Gart-ner's TCO [3], provide a good tool for calculations [8]. The cost model should comprise direct costs, such as Capital Expenditures for the facility, energy and cooling infrastructure, cables, servers, and so on. Moreover, there are Opera-tional Expenditures which must be taken into account, such as energy, network fees and IT employees. Indirect costs comprise costs from failing to meet busi-ness objectives, e.g. time to market, customer satisfaction or Quality of Service related Service Level Agreements. There is no easy way to measure how this can be done and will vary from case to case. More sophisticated TCO models must be developed to mitigate this shortcoming. One approach might be to compare cash ow streams that result from failing to deliver certain business objectives, such as short time to market. If the introduction of a service o ering is delayed due to slow deployment processes, the resulting de cit can be calculated as a discounted cash ow.When all direct and indirect costs have been taken into account, the total costs of the reference IT infrastructure service can be calculated by summing up. Finally, costs of the Cloud Computing scenario and the reference model scenario can be compared.64. Evaluation and DiscussionEarly adopters of Cloud Computing technologies are IT engineers who work on Web-scale projects, such as the New York Times TimesMachine [9]. Start-ups with high scalability requirements turn to Cloud Computing providers, such as Amazon EC2, in order to roll out Web-scale services with comparative low entry costs [7]. These and other examples show that scalability, low market barriers and rapid deployment are among the most important drivers of Cloud Computing.5. New York Times TimesMachineIn autumn 2007 New York Times senior software engineer Derek Gottfrid worked on a project named TimesMachine. The service should provide access to any New York Times issue since 1851, adding up to a bulk of 11 million articles which had to be served in the form of PDF les. Previously Gottfrid and his colleagues had implemented a solution that generated the PDF les dynamically from already scanned TIFF images of the New York Times articles. This approach worked well, but when tra c volumes were about to increase signi cantly it would be better to serve pre-generated static PDF les.Faced with the challenge to convert 4 Terabyte of source data into PDF, Derek Gottfrid decided to make use of Amazon's Web Services Elastic Compute Cloud (EC2) and Simple Storage Service (S3). He uploaded the source data to S3 and started a Hadoop cluster of customized EC2 Amazon Machine Images (AMIs). With 100 EC2 AMIs running in parallel he could complete the task of reading the source data from S3, converting it to PDF and storing it back to S3 within 36 hours.How does this use case t in our framework?Gottfrid's approach was motivated by the simplicity with which the one-time task could be accomplished if performed \in the Cloud". No up-front costs were involved, except for insigni cant expenditures when experimenting if the endeavor was feasible at all. Due to the simplicity of the approach and the low costs involved, his superiors agreed without imposing bureaucratic obstacles.Another key driver was to cut short deployment times and thereby time to market. The alternative to Amazon EC2 and S3 would have been to ask for permission to purchase commodity hardware, install it and nally run the tasks - a process that very likely would have taken several weeks or even months. After process execution, the extra hardware would have to be sold or used in another context.This use case is a good example for a one-time batch-processing job that can be performed in a Grid Computing or Cloud Computing environment. From the backend engineer's point of view it is favorable to be able getting started without much con guration overhead as only the task result is rele vant. The data storage and processing volume is known beforehand and no measures have to be taken to guarantee scalability, availability, or the like.7In a comparative study researchers from the CERN-based EGEE project argue that Clouds di er from Grids in that they served di erent usage patterns. While Grids were mostly used for short-term job executions, clouds usually sup-ported long-lived services [10]. We agree that usage patterns are an important di erentiator between Clouds and Grids, however, the TimesMachine use case shows that this not a question of service lifetime. Clouds are well-suited to serve short-lived usage scenarios, such as batch-processes or situational Mash-up ser-vices.1 Major League BaseballMLB Advanced Media is the company that develops and maintains the Major League Baseball Web sites. During the 2007 season, director of operations Ryan Nelson received the request to implement a chat product as an additional service to the Web site [11]. He was told that the chat had to go online as soon as possible. However, the company's data center in Manhattan did not leave much free storage capacity and processing power.Since there was no time to order and install new machines, Nelson decided to call the Cloud Computing provider Joyent. He arranged for 10 virtual machines in a development cluster and another 20 machines for production mode. Nelson's team developed and tested the chat for about 2 months and then launched the new product. When the playo s and World Series started, more resources were needed. Another 15 virtual machines and additional RAM solved the problem.Ryan Nelson points out two major advantages of this approach. First, the company gains exibility to try out new products quickly and turn them o if they are not a success. In this context, the ability to scale down shows to be equally important as scaling up. Furthermore, Nelson's team can better respond to seasonal demand spikes which are typical for Web sites about sports events. 6) Related WorkVarious economic aspects of outsourcing storage capacities and processing power have been covered by previous work in distributed computing and grid comput-ing [12], [13], [14], [15]. However, the methods and business models introduced for Grid Computing do not consider all economic drivers which we identi ed relevant for Cloud Computing, such as pushing for short time to market in the context of organization inertia or low entry barriers for start-up companies.With a rule of thumb calculation Jim Gray points to the opportunity costs of distributed computing in the Internet as opposed to local computations, i.e. in LAN clusters [12]. In his scenario $1 USD equals 1 GB sent over WAN or alter-natively eight hours CPU processing time. Gray reasons that except for highly processing-intensive applications outsourcing computing tasks into a distributed environment does not pay o because network tra c fees outnumber savings in processing power. Calculating the tradeo between basic computing services can be useful to get a general idea of the economies involved. This method can8910easily be applied to the pricing schemes of Cloud Computing providers. For $1 USD the Web Service Amazon EC2 o ers around 6 GB data transfer or 10 hours CPU processing 1. However, this sort of calculation only makes sense if placed in a broader context. Whether or not computing services can be performed locally depends on the underlying business objective. It might for example be necessary to process data in a distributed environment in order to enable online collaboration. George Thanos, et al evaluate the adoption of Grid Computing technology for business purposes in a more comprehensive way [14]. The authors shed light on general business objectives and economic issues associated with Grid Computing, such as economies of scale and scope, network externalities, market barriers, etc. In particular, the explanations regarding the economic rationale behind complementing privately owned IT infrastructure with utility comput-ing services point out important aspects that are also valid for our valuation model. Cloud Computing is heavily based on the notion of Utility Computing where large-scale data centers play the role of a utility that delivers computing services on a pay-per-use basis. The business scenarios described by Thanos, et al only partially apply to those we can observe in Cloud Computing. Important bene ts associated with Cloud Computing, such as shorter time to market and responsiveness to highly varying demand, are not covered. These business objec-tives bring technological challenges that Cloud Computing explicitly addresses, such as scalability and high availability in the face of unpredictable short-term demand peaks.4 Conclusion and Future Work Cloud Computing is an emerging trend of provisioning scalable and reliable services over the Internet as computing utilities. Early adopters of Cloud Com-puting services, such as start-up companies engaged in Web-scale projects, intu-itively embrace the opportunity to rely on massively scalable IT infrastructure from providers like Amazon. However, there is no systematic, dedicated ap-proach to measure the bene t from Cloud Computing that could serve as a guide for decision makers to tell when outsourcing IT resources into the Cloud makes sense. We have addressed this problem and developed a valuation framework that serves as a starting point for future work. Our framework provides a step-by-step guide to determine the bene ts from Cloud Computing, from describing a business scenario to comparing Cloud Computing services with a reference IT solution. We identify key components: business domain, objectives, demand behavior and technical requirements. Based on business objectives and technical requirements, the costs of a Cloud Computing service, as well as the costs of a reference IT solution, can be calculated and compared. Well-known use cases of1According to the Amazon Web Service pricing in July 2008 one GB of outgoing tra c costs $0.17 for the rst 10 TB per month. Running a s mall AMI instance w ith the compute capacity of a 1.0-1.2 GHz 2007 Xeon or Opteron processor for one hour costs $0.10 USD.11Cloud Computing adopters serve as a means to discuss and evaluate the validity of our framework.In future work, we will identif y and analyze concrete valuation methods that can be applied within the context of our framework. Furthermore, it is necessary to evaluate cost models that might serve as a template for estimating direct and indirect costs, a key challenge that we have only mentioned.References1. Amazon Web Services: Customer Case Studies,/Success-Stories-AWS-home-page/b/ref=sc_fe_l_1?ie=UTF8&node=182241011&no=34406612. Titman, S.,Martin, J.: Valuation. The Art & Science of CorporateInvest-ment Decisions, Addison-Wesley (2007)3. Gartner TCO, /TCO/index.htm4. Chiu, W..: From Cloud Computing to the New Enterprise Data Center,IBM High Performance On Demand Solutions (2008)[5] Pentagon's IT Unit Seeks to Adopt Cloud Comput-ing, New York Times,/idg/IDG_852573C400693880002574890080F9EF.html?ref=technology[6] Schlossnagle, T.: Scalable Internet Architectures, Sams Publishing (2006)[7] PowerSet Use Case, /b?ie=UTF8&node=331766011&me=A36L942TSJ2AJA[8] Koomey, J.: A Simple Model for Determining True Total Cost ofOwnership for Data Centers, Uptime Institute (2007)[9] New York Times TimesMachine use case, /2007/11/01/self-service-prorated-super-computing-fun/[10] Begin, M.: An EGEE Comparative Study: Grids and Clouds - Evolution orRevolution?, CERN Enabling Grids for E-Science (2008)[11] Major League Baseball use case, /news/2007/121007-your-take-mlb.html[12] Gray, J.: Distributed Computing Economics. Microsoft ResearchTechnical Report: MSRTR- 2003-24, Microsoft Research (2003)[13] Buyya, R.,Stockinger, H.,Giddy, J.,Abramson, D.: Economic Models forManagement of Resources in Grid Computing, ITCom (2001)121 Thanos, G., Courcoubetis, C., Stamoulis, G.: Adopting the Grid forBusi-ness Purposes: The Main Objectives and the Associated Economic Is-sues, Grid Economics and Business Models: 4th International Workshop, GECON (2007)2 Hwang, J.,Park, J.: Decision Factors of Enterprises for Adopting GridComputing, Grid Economics and Business Models: 4th International Work-shop, GECON (2007)13。

间充质干细胞治疗阿尔茨海默症的研究进展

间充质干细胞治疗阿尔茨海默症的研究进展

间充质干细胞治疗阿尔茨海默症的研究进展云南省基础研究计划-青年项目(2019FD106)*通讯作者:曹宁 Email:******************摘要:阿尔茨海默症是一种神经退行性疾病,目前还没有找到有效的治疗方法。

间充质干细胞作为一种有着广泛应用前景的细胞治疗技术,近年来引起了研究人员的关注。

间充质干细胞是一种具有自我更新和多向分化潜能的细胞,它们还能分泌多种细胞因子,这些因子有助于促进神经再生和修复。

本文就间充质干细胞治疗阿尔茨海默症的研究进展做一综述,以期为未来的临床应用提供更深入的了解和指导。

关键词:间充质干细胞;阿尔茨海默症;治疗;研究进展阿尔茨海默症(Alzheimer's disease,AD) 是一种进行性神经退行性疾病,以进行性记忆力减退和获得性知识丧失、直至完全丧失日常生活活动能力为特征,正迅速成为老年人残疾和死亡的主要原因之一。

2022年国际阿尔茨海默病协会(Alzheimer's Disease International, ADI)发布报告[1],截至2019年,全球约有2019年患痴呆的人数估计为5500万人,预计2050年将增至1.39亿。

ADI评估,全球75%的AD患者未被确诊,在一些中低收入国家,这一比例高达90%。

世界卫生组织估计,2019年全球痴呆症的社会成本为1.3万亿美元[2]。

1.阿尔茨海默症的治疗现状AD的两大病理特征是Aβ沉积形成老年斑(Senile plaque, SP)和Tau蛋白缠结形成神经原纤维缠结(Neurofibrillary tangles, NFTs),另外还有神经退行性疾病的共有特征,即大量神经元的凋亡[3]。

目前,治疗阿尔茨海默病(AD)的主要药物包括乙酰胆碱酯酶抑制剂,如多奈哌齐、利瓦斯汀和加兰他敏,以及NMDA受体的部分拮抗剂美金刚。

这些药物的作用是通过不同的机制来改善AD患者的症状和延缓疾病的进展。

英语七年级教研组活动(3篇)

英语七年级教研组活动(3篇)

第1篇Introduction:The English Department at [School Name] has recently organized a comprehensive教研组活动 (research group activity) aimed at enhancingthe teaching techniques and collaboration among the 7th-grade English teachers. This event was a platform for sharing best practices, discussing innovative teaching methods, and fostering a collaborative environment that promotes continuous professional development. The following report outlines the key aspects of the activity.Objective:The primary objective of the教研组活动 was to:1. Improve the overall quality of English teaching in the 7th grade.2. Promote a culture of collaboration and sharing among teachers.3. Explore and implement innovative teaching strategies to engage students more effectively.4. Provide a space for teachers to reflect on their teaching practices and seek feedback from their peers.Activity Outline:1. Opening Remarks and Welcome- The head of the English Department, Mr. [Last Name], opened the session with a warm welcome and emphasized the importance of continuous improvement in teaching methods.- He highlighted the role of the教研组活动 in achieving the department's goals.2. Workshop on Teaching Techniques- A workshop was conducted by Ms. [Last Name], a seasoned English teacher with extensive experience in the 7th grade. The workshop focused on various teaching techniques such as:- Inquiry-based learning- Flipped classroom approach- Gamification of learning- Differentiated instruction- Participants engaged in interactive activities and discussions, sharing their experiences and challenges in implementing these techniques.3. Case Studies and Best Practices- Three teachers from the 7th grade presented case studies of successful teaching strategies they had used in their classrooms. The case studies included:- Effective use of technology in language learning- Implementing project-based learning to enhance student engagement- Utilizing peer tutoring to improve student performance- The presentations were followed by a Q&A session, where other teachers asked questions and sought advice on how to replicate these strategies in their own classrooms.4. Collaborative Planning Session- The group divided into smaller teams to plan a joint project that would involve multiple teachers and classes. The project aimed to create a cohesive learning experience for the 7th-grade students.- Each team discussed the project's objectives, activities, and assessment methods. They also shared their ideas on how to involve students in the planning process.- The teams presented their plans to the larger group, receiving feedback and suggestions for improvement.5. Feedback and Reflection- Each participant filled out a feedback form, sharing their thoughts on the activity and suggesting areas for future improvement.- A reflection session was held, where teachers discussed the highlights of the activity and how they planned to apply the new knowledge and skills in their teaching.6. Closing Remarks- Mr. [Last Name] concluded the activity by thanking all participants for their active involvement and commitment to improving their teaching practices.- He encouraged teachers to continue collaborating and supporting each other in their professional journey.Conclusion:The 7th-grade English教研组活动 was a resounding success, providing a valuable opportunity for teachers to enhance their teaching techniques and collaborate effectively. The event fostered a positive and supportive environment, where teachers felt comfortable sharing their experiences and learning from each other. The strategies and resources discussed during the activity are expected to have a significant impact on the quality of English teaching in the 7th grade at [School Name]. The English Department is committed to organizing similar activities in the future, ensuring that teachers continue to grow professionally and provide the best possible education to their students.第2篇Introduction:The English Department of our school has always attached great importance to the research and teaching of English for Grade 7 students. In order to improve the teaching quality and promote the development of our students, we held an English Grade 7 Research and Teaching Group Activity recently. This activity aimed to share teaching experiences, discuss teaching methods, and explore new ideas for English teaching.I. Activity Objectives:1. Enhance the teaching quality of English for Grade 7 students.2. Promote the communication and exchange of teaching ideas among teachers.3. Explore new teaching methods and strategies for English teaching.4. Improve the students' English proficiency and interest in learning.II. Activity Content:1. Opening RemarksThe activity was opened by the head of the English Department, who emphasized the importance of teaching English for Grade 7 students and the significance of this activity. He also expressed his expectationsfor the activity and encouraged all teachers to actively participate and share their experiences.2. Sharing Teaching ExperiencesSeveral experienced teachers shared their teaching experiences and strategies. They discussed various aspects of teaching English for Grade 7 students, including classroom management, vocabulary teaching, reading comprehension, and writing skills. The following are some of the key points they shared:(1) Classroom management: Teachers should create a positive and engaging classroom atmosphere to encourage students to participate actively in class. They can use various teaching aids, such as multimedia, games, and group activities, to make the classroom more interesting.(2) Vocabulary teaching: Teachers should focus on teaching practical and useful vocabulary, and encourage students to use new words in theirdaily life. They can use word cards, flashcards, and word games to help students memorize new words.(3) Reading comprehension: Teachers should guide students to develop their reading skills, such as skimming, scanning, and intensive reading.They can provide various reading materials, such as short stories, news articles, and poems, to meet the diverse interests of students.(4) Writing skills: Teachers should teach students the basic structure of writing and encourage them to express their thoughts and ideas in English. They can use various writing activities, such as journal writing, story writing, and essay writing, to improve students' writing skills.3. Discussion on Teaching MethodsThe teachers engaged in a lively discussion on various teaching methods, such as project-based learning, flipped classroom, and cooperative learning. They shared their experiences and thoughts on these methods, and explored how to effectively implement them in their teaching practice.4. Workshops and TrainingWorkshops and training sessions were organized to provide teachers with practical skills and knowledge. These sessions covered topics such as grammar teaching, pronunciation, and test preparation. The teachers actively participated in these sessions and gained valuable insights.5. Conclusion and SummaryThe activity concluded with a summary of the key points discussed and a discussion on the future direction of English teaching for Grade 7 students. The head of the English Department expressed his gratitude to all the teachers for their active participation and contribution to the activity.III. Activity Evaluation:1. The activity achieved its objectives, as the teachers shared their experiences and discussed various teaching methods, which will undoubtedly improve the teaching quality of English for Grade 7 students.2. The communication and exchange of teaching ideas among teachers were fruitful, and they gained valuable insights from each other's experiences.3. The teachers actively participated in the workshops and training sessions, which will help them improve their teaching skills and knowledge.Conclusion:The English Grade 7 Research and Teaching Group Activity was a great success, as it provided a platform for teachers to share their experiences, discuss teaching methods, and explore new ideas for English teaching. We believe that this activity will contribute to the continuous improvement of our students' English proficiency and interest in learning. In the future, we will continue to hold such activities to promote the development of English teaching in our school.第3篇IntroductionThe English Language教研组 (Research and Development Group) of our school has always been committed to fostering a dynamic and engaging learning environment for our seventh-grade students. With the aim of enhancing the quality of English language education, we organized a comprehensive教研活动 to explore innovative teaching strategies and share best practices. This report outlines the objectives, activities, and outcomes of the event.Objectives1. To identify and discuss effective teaching strategies that promote active learning in English language classes.2. To explore the integration of technology in English language education.3. To share experiences and best practices among the教研组 members.4. To develop a collaborative framework for continuous professional development within the group.Activity Details1. Opening SessionThe session began with a welcoming address by the教研组长, who emphasized the importance of continuous improvement in teaching methods. The group was reminded of the diverse learning styles and needs of seventh-grade students, highlighting the need for tailored teaching approaches.2. Workshops and Presentationsa. Workshop on Project-Based Learning (PBL): facilitated by Mr. Zhang, a seasoned English teacher. The workshop focused on the benefits of PBL in fostering critical thinking and collaborative skills. Participants engaged in a practical activity, designing a PBL project for a seventh-grade class.b. Interactive Presentation on Technology Integration: presented by Ms. Liu, a technology specialist. The presentation covered various digital tools and platforms that can enhance language learning, such as educational apps, online dictionaries, and virtual reality experiences.c. Case Study Sharing: three teachers shared their experiences of implementing innovative strategies in their classrooms. The case studies highlighted the use of flipped classrooms, peer teaching, and differentiated instruction.3. Group Discussions and ReflectionsParticipants were divided into small groups to discuss the following topics:- The impact of technology on language learning.- Strategies for promoting student engagement and motivation.- The role of the teacher as a facilitator of learning.Each group presented their findings, and the entire group engaged in a lively debate on the best approaches to teaching English in the seventh grade.4. Action Plan DevelopmentBased on the discussions and presentations, the教研组 developed anaction plan to implement the following initiatives:- Introduce a minimum of two technology tools in each English class.- Encourage the use of project-based learning in at least one unit per term.- Organize regular workshops for teachers to share best practices and receive professional development.OutcomesThe教研活动取得了以下成果:1. Enhanced Collaboration: The event fostered a collaborative environment where teachers felt comfortable sharing their experiencesand ideas.2. Increased Awareness: Participants gained a deeper understanding of innovative teaching strategies and their potential impact on student learning.3. Improved Professional Development: The action plan will provide a structured framework for continuous professional growth within the教研组.4. Enhanced Student Learning: The implementation of the proposed initiatives is expected to lead to improved student engagement, motivation, and academic performance.ConclusionThe seventh-grade English Language教研组活动圆满结束,取得了显著的成效。

美国赛博空间作战行动Cyberspace _Operations

美国赛博空间作战行动Cyberspace _Operations
Challenges to the Joint Force’s Use ofCyberspace..................................................I-11
CHAPTER II
CYBERSPACE OPERATIONS CORE ACTIVITIES
Introduction................................................................................................................II-1
3.应用
a、本出版物中确立的联合原则适用于联合参谋部、作战司令部指挥官、下属统一司令部、联合特遣部队、这些司令部的下属部门、各军种和作战支持机构。
b、本出版物中的指南具有权威性;因此,除非指挥官认为特殊情况另有规定,否则将遵循这一原则。如果本出版物的内容与出版物的内容发生冲突,则以本出版物为准,除非参谋长联席会议通常与其他参谋长联合会成员协调,提供了更为现行和具体的指导。作为多国(联盟或联盟)军事指挥部一部分的部队指挥官应遵循美国批准的多国原则和程序。对于未经美国批准的条令和程序,指挥官应评估并遵循多国司令部的条令与程序,如果适用并符合美国法律、法规和条令。
•联合职能部门和网络空间运作
第三章权限、角色和职责
•简介III-1
•当局III-2
•角色和职责
•法律考虑因素III-11
第四章规划、协调、执行和评估
•联合规划过程和网络空间运营
•网络空间运营规划考虑因素
•对网络空间的情报和操作分析支持
运营计划IV-6
•针对性IV-8
•网络空间部队的指挥与控制

二语习得(L1)

二语习得(L1)

Course components
Lectures Discussions Assignments Research
Course assessment
Attendance and participation in class discussion (10%) Assignment (20%) Course paper (70%)
Course outline
L1 Introduction to SLA and SLA research L2 The role of the first language L3 The ‘natural’ route of development L4 Contextual variation in language-learner language L5 Individual learner differences L6 The role of the input L7 Learner processes(Learner strategies) L8 Learner processes(The universal hypothesis and SLA) L9 The role of formal instruction L10 Theories of second language acquisition
Students will be able to better describe the psychological and linguistic processes of second language acquisition Students will be able to better identify what internal and external factors help account for why learners do or do not acquire a second language Students will be able to better explain how such factors affect students' classroom performance Students will be able to have a greater understanding of the literature in the field of second language acquisition and develop greater skills in critically reading, understanding, and dissecting that literature Students will be able to relate issues discussed in class to past, current, and prospective learning/teaching experiences and to their future formal and informal research

二语习得引论-读书笔记-chapter-1-2

二语习得引论-读书笔记-chapter-1-2

一.概论Chapter 1. Introducing SLA1.Second language acquisition (SLA)2.Second language (L2)(也可能是第三四五外语) also commonly called a target language (TL)3.Basic questions:1). What exactly does the L2 learner come to know?2). How does the learner acquire this knowledge?3). Why are some learners more successful than others?4.linguistic; psychological; social.Only one (x) Combine (√)Chapter 2. Foundations of SLAⅠ. The world of second languages1.Multi-; bi-; mono- lingualism1)Multilingualism: the ability to use 2 or more languages.(bilingualism: 2 languages; multilingualism: >2)2)Monolingualism: the ability to use only one language.3)Multilingual competence (Vivian Cook, Multicompetence)Refers to: the compound state of a mind with 2 or more grammars.4)Monolingual competence (Vivian Cook, Monocompetence)Refers to: knowledge of only one language.2.People with multicompetence (a unique combination) ≠ 2 monolingualsWorld demographic shows:3.Acquisition4.The number of L1 and L2 speakers of different languages can only beestimated.1)Linguistic information is often not officially collected.2)Answers to questions seeking linguistic information may not bereliable.3) A lack of agreement on definition of terms and on criteria foridentification.Ⅱ. The nature of language learning1.L1 acquisition1). L1 acquisition was completed before you came to school and thedevelopment normally takes place without any conscious effort.2). Complex grammatical patterns continue to develop through the1) Refers to: Humans are born with an innate capacity to learnlanguage.2) Reasons:♦Children began to learn L1 at the same age and in much the same way.♦…master the basic phonological and grammatical operations in L1 at 5/ 6.♦…can understand and create novel utterances; and are not limited to repeating what they have heard; the utterances they produce are often systematically different from those of the adults around them.♦There is a cut-off age for L1 acquisition.♦L1 acquisition is not simply a facet of general intelligence.3)The natural ability, in terms of innate capacity, is that part oflanguage structure is genetically “given” to every human child.3. The role of social experience1) A necessary condition for acquisition: appropriate socialexperience (including L1 input and interaction) is2) Intentional L1 teaching to children is not necessary and may havelittle effect.3) Sources of L1 input and interaction vary for cultural and socialfactors.4) Children get adequate L1 input and interaction→sources has littleeffect on the rate and sequence of phonological and grammatical development.The regional and social varieties (sources) of the input→pronunciationⅢ. L1 vs. L2 learningⅣ. The logical problem of language learning1.Noam Chomsky:1)innate linguistic knowledge must underlie language acquisition2)Universal Grammar2.The theory of Universal Grammar:Reasons:1)Children’s knowledge of language > what could be learned from theinput.2)Constraints and principles cannot be learned.3)Universal patterns of development cannot be explained bylanguage-specific input.Children often say things that adults do not.♦Children use language in accordance with general universal rules of language though they have not developed the cognitive ability to understand these rules. Not learned from deduction or imitation.♦Patterns of children’s language development are not directly determined by the input they receive.。

纹理物体缺陷的视觉检测算法研究--优秀毕业论文

纹理物体缺陷的视觉检测算法研究--优秀毕业论文

摘 要
在竞争激烈的工业自动化生产过程中,机器视觉对产品质量的把关起着举足 轻重的作用,机器视觉在缺陷检测技术方面的应用也逐渐普遍起来。与常规的检 测技术相比,自动化的视觉检测系统更加经济、快捷、高效与 安全。纹理物体在 工业生产中广泛存在,像用于半导体装配和封装底板和发光二极管,现代 化电子 系统中的印制电路板,以及纺织行业中的布匹和织物等都可认为是含有纹理特征 的物体。本论文主要致力于纹理物体的缺陷检测技术研究,为纹理物体的自动化 检测提供高效而可靠的检测算法。 纹理是描述图像内容的重要特征,纹理分析也已经被成功的应用与纹理分割 和纹理分类当中。本研究提出了一种基于纹理分析技术和参考比较方式的缺陷检 测算法。这种算法能容忍物体变形引起的图像配准误差,对纹理的影响也具有鲁 棒性。本算法旨在为检测出的缺陷区域提供丰富而重要的物理意义,如缺陷区域 的大小、形状、亮度对比度及空间分布等。同时,在参考图像可行的情况下,本 算法可用于同质纹理物体和非同质纹理物体的检测,对非纹理物体 的检测也可取 得不错的效果。 在整个检测过程中,我们采用了可调控金字塔的纹理分析和重构技术。与传 统的小波纹理分析技术不同,我们在小波域中加入处理物体变形和纹理影响的容 忍度控制算法,来实现容忍物体变形和对纹理影响鲁棒的目的。最后可调控金字 塔的重构保证了缺陷区域物理意义恢复的准确性。实验阶段,我们检测了一系列 具有实际应用价值的图像。实验结果表明 本文提出的纹理物体缺陷检测算法具有 高效性和易于实现性。 关键字: 缺陷检测;纹理;物体变形;可调控金字塔;重构
Keywords: defect detection, texture, object distortion, steerable pyramid, reconstruction
II

快递公司与客户高峰期运营保障协议书范本

快递公司与客户高峰期运营保障协议书范本

快递公司与客户高峰期运营保障协议书范本In order to establish an effective and transparent agreement between a courier company and its customersduring peak operational periods, it is crucial to draft a comprehensive service level agreement (SLA) that outlinesthe terms, conditions, and responsibilities of both parties involved. This document serves as a guiding framework for ensuring smooth operations and customer satisfaction. Through this SLA, the courier company can set clear expectations for service quality and delivery timelines, while customers can understand their rights and limitations.为了在快递公司与客户之间,在高峰运营期间建立一个有效和透明的协议,起草一份全面的服务水平协议(SLA)是至关重要的。

该文件用于确保运营顺利、客户满意,规定了双方的条款、条件和责任。

通过这份SLA,快递公司可以明确服务质量和交货时间的期望值,而客户则可以了解他们的权益和限制。

The SLA should start by defining the scope of services that the courier company will provide during peak periods. Thisincludes specifying the types of deliveries covered, suchas standard or express shipments, as well as any additional services such as tracking or insurance options. It is important to clearly state the limitations or exclusions in terms of weight restrictions, prohibited items, or hazardous materials.SLA应该从定义快递公司在高峰期间提供的服务范围开始。

目标和实际的英文缩写

目标和实际的英文缩写

目标和实际的英文缩写目标和实际的英文缩写如下:1. KPI - Key Performance Indicator: A measurable value that demonstrates how effectively a company or individual is achieving key business objectives.2. OKR - Objectives and Key Results: A goal-setting framework that defines objectives and tracks measurable results to measure progress and align teams.3. SMART - Specific, Measurable, Achievable, Relevant, Time-bound: A mnemonic acronym used to guide the setting of objectives, ensuring they are well-defined and achievable.4. ROI - Return on Investment: A performance metric that measures the profitability of an investment, indicating the percentage return on the initial investment.5. TQM - Total Quality Management: A management approach that focuses on continuous improvement of quality in all processes and involves all employees in the quality improvement efforts.6. CAGR - Compound Annual Growth Rate: A measure of the average annual growth rate over a specific period of time, often used in business and investing to evaluate investment returns or revenue growth.7. SLA - Service Level Agreement: A contract between a service provider and a customer that defines the level of service expected,including quality, availability, and response times.8. SWOT - Strengths, Weaknesses, Opportunities, Threats: A strategic planning framework that helps identify and analyze the internal and external factors that can impact the success of a project or organization.9. CRM - Customer Relationship Management: A strategy and set of technologies used to manage a company's interactions with current and potential customers, often involving the use of customer data and analytics.10. SWOT - Strengths, Weaknesses, Opportunities, Threats: A strategic planning framework that helps identify and analyze the internal and external factors that can impact the success of a project or organization.11. MBO - Management by Objectives: A management approach that involves setting specific objectives and monitoring progress towards achieving them, often done through regular performance reviews.12. PMO - Project Management Office: A department or team within an organization that is responsible for implementing and maintaining standardized project management practices and providing support to project managers.13. P&L - Profit and Loss: A financial statement that summarizes the revenues, costs, and expenses incurred during a specific period, indicating whether a company has made a profit or loss.14. R&D - Research and Development: Activities undertaken by a company to innovate and create new products, services, or processes, often involving scientific or technological research and experimentation.15. JIT - Just-in-Time: A method of inventory management that aims to reduce waste and improve efficiency by having materials arrive exactly when needed in the production process.These acronyms and abbreviations are commonly used in the business and management field to discuss and track goals, performance, and strategies. They provide a concise and standardized way to refer to specific concepts and frameworks.。

从国外二语习得理论研究看外语教学中的问题杨连瑞中国海洋【精选】

从国外二语习得理论研究看外语教学中的问题杨连瑞中国海洋【精选】

SLA and Classroom Teaching by Yang Lianrui
第一语 言
语言输入
第二语言 大脑处理过程
语言输出
SLA and Classroom Teaching by Yang Lianrui
研究的意义
1. 二语习得理论使研究英语教学的角度发生了转换 2. 二语习得研究促进了英语教学方法研究的改进 3. 二语习得理论使英语教学界对英语教学的目的有了更清楚的认识 4. 二语习得理论改变了英语教师对学生所犯语言错误的看法。 5. 促进相关学科的发展
strategies
knowledge of
linguistic
SLA and Classroom Tuenacivheinrgsablys
Yang Lianrui
general factors (e.g.motivation)
learner strategies
情景因素
输入
学习过程
语言输出
ቤተ መጻሕፍቲ ባይዱ
个体差异
SLA and Classroom Teaching by Yang Lianrui
第二语言习得目标
描写: 描写第二语言学习者的整体语言能力 和各项具体语言技能的习得和发展过程;
解释: 解释学习者为什么能够习得第二语言 以及外在因素和内在因素对二语习得的作 用等。
SLA and Classroom Teaching by Yang Lianrui
Area 2
Area 3
Learner-external Learner-internal
factors
mechanisms
Area 4 language learner

二语习得复习汇总

二语习得复习汇总

A General ReviewⅠ. Short & Long answers1.what is the difference between monolingual and multilingual communicative competence?Differencese between monolingual and multilingual communicative competence are due in part to the different social functions of first and second language learning, and to the differences between learning language and learning culture.The differences of the competence between native speakers and nonative speakers include structural differences in the linguisitc system, different rules for usage in writing or conversation, and even somewhat divergent meanings for the “same”lexical forms. Further, a multilingual speaker ’totals communicative competence differs from that of a monolingual in including knowledge of rules for the appropriate choice of language and for switching between languages, given a particular social context and communicative purpose.2.what are the microsocial factors that affect SLA?a) L2 variation b) input and interaction c) interaction as the genesis of language3.What is the difference between linguistic competence & communicative competence (CC)?Linguistic competence- It was defined in 1965 by Chomsky as a speaker's underlying ability to produce grammaticallycorrect expressions. Linguistic competence refers to knowledge of language. Theoretical linguistics primarily studieslinguistic competence: knowledge of a language possessed by-listener“an ideal”. speakCommunicative competence- It is a term in linguistics which refers to“ whateakerspneeds to know to communicate appropriately within a particular language community” , such as a language user's grammaticalsyntaxknowledge, o morphology , phonology and the like, as well as social knowledge about how and when to use utterances appropriately.4. Why is CC in L1 different from L2?L1 learning for children is an integral part of their sociolization into their native language community. L2 learningmay be part of second culture learning and adaptation, but the relationship of SLA to social and cultural learning differs greatly with circumstances.5. What is Accommodation Theory? How does this explain L2 variation?Accommodation theory: Speakers (usually unconsciously) change their pronunciation and even the grammaticalcomplexity of sentences they use to sound more like whomever they are talking to. This accounts in part for why native speakers tend to simply their language when they are talking to a L2 learner who is not fluent, and why L2 learnersmay acquire somewhat different varieties of the target language when they have different friends.6. Discuss the importance of input & interaction for L2 learning. How could this affect the feedback providedto students?. a) From the perspective of linguistic approaches: (1) behaviorist: they consider input to form the necessary stimuliand feedback which learners respond to and imitate; (2) Universal Grammar: they consider exposure to input anecessary trigger for activating internal mechanisms; (3) Monitor Model: consider comprehensible input not onlynecessary but sufficient in itself to account for SLA;b) From the perspective of psychological approaches: (1) IP framework: consider input which is attended to as essential data for all stages of language processing; (2) connectionist framework: consider the quantity or frequency ofinput structures to largely determine acquisitional sequencing;c)From the perspective of social approaches: interaction is generally seen as essential in providing learners withthe quantity and quality of external linguistic input which is required for internal processing.ⅱ. Other types of interaction which can enhance SLA include feedback from NSs which makes NNs aware that theirusage is not acceptable in some way, and which provides a model for“ correctness” . While children rarely rece negative evidence in L1, and don’ t require it to achieve full native competence, corrective feedback is common in L and may indeed be necessary for most learners to ultimately reach native-like levels of proficiency when that isthe desired goal.7.Explain ZPD. How would scaffolding put a student in ZPD?Zone of Proximal Development, this is an area of potential development, where the learner can achieve that potentialonly with assistance. Mental functions that are beyond an individual's current level must be performed in collaborationwith other people before they are achieved independently. One way in which others help the learner in language development within the ZPD is through scaffolding. Scaffolding refers to verbal guidance which an expert provides tohelp a learner perform any specific task, or the verbal collaboration of peers to perform a task which would be toodifficult for any one of them individually. It is not something that happens to learners as a passive recipient, buthappens with a learner as an active participant.8.Explain why some learners are more successful than others from the perspective of S-C theory?The S-C framework supports the view that some learners may be more successful than others because of their levelof access to or participation in a learning community, or because of the amount of mediation they receive from expertsor peers, and because of how well they make use of that help.9.What are the macrosocial factors that influence SLA?(1)Global and national status of L1 and L2(2)Boundaries and identities(3)Institutional forces and constraints(4)Social categories(5)Circumstances of learning10. What are the advantages of young learners and old learners respectively?Young L2 learners are more likely to acquire the language in a naturalistic setting; they are more likely to use the L2in highly contextualized face-to-face situation. Older learners succeed in SLA t o the level of being able to “ pass ” native speaker when social motivation is strong enough.11. What are the similarities and differences between linguists, psycholinguist, sociolinguists and socialpsycholinguists?( 1) Linguists emphasize the characteristics of the differences and similarities in the languages that are being learned, and the linguistic competence (underlying knowledge) and linguistic performance (actual production) oflearners at various stages of acquisition.(2) Psychologists and psycholinguists emphasize the mental or cognitive processes involved in acquisition,and the representation of languages in the brain.(3) Sociolinguists emphasize variability communicative competence (underlying competence).in learner linguistic performance, and extend the scope of study to knowledge that additionally accounts for language use, or pragmatic(4) Social psychologists emphasize group-related phenomena, such as identity and social motivation, and the interactional and larger social contexts of learning.12.What are the differences between second language, foreign language, library language and auxiliary language?(1)A second language is typically an official or societally dominant language needed for education, employment, and other basic purposes. It is often acquired by minority group members or immigrants who speak anotherlanguage natively. In this more restricted sense, the term is contrasted with other terms in this list.(2) A foreign language is one not widely used in the learners' immediate social context which might be used for future travel or other cross-cultural communication situations, or studied as a curricular requirement or elective in school, but with no immediate or necessary practical application.(3) A library language is one which functions primarily as a tool for future learning through reading, especially when books or journals in a desired field of study are not commonly published in the learners' native tongue.(4) An auxiliary language is one which learners need to know for some official functions in their immediatepolitical setting, or will need for purposes of wider communication, although their first language serves most other needs in their lives.13. Why are some learners more (or less) successful than others?The intriguing question of why some L2 learners are more successful than others requires us to unpack the broad label “ learners ” for some dimensions of discussion. Linguistics may distinguish categories of learners defined by the identity and relationship of their L1 and L2; psycholinguists may make distinctions based on individual aptitude for L2 learning, personality factors, types and strength of motivation, and different learning strategies; sociolinguists may distinguish among learners with regard to social, economic, and political differences and learner experiences innegotiated interaction; and social psychologists may categorize learners according to aspects of their group identity and attitudes toward target language speakers or toward L2 learning itself.14.List at least five possible motivations for learning a second language at an older age.The motivation may arise from a variety of conditions, including the following:Invasion or conquest of one’ s country by speakers of another language;A need or desire to contact speakers of other languages in economic or other specific domains;Immigration to a country where use of a language other than one's L1 is required;Adoption of religious beliefs and practices which involve use of another language;A need or desire to pursue educational experiences where access requires proficiency in another language;A desire for occupational or social advancement which is furthered by knowledge of another language;An interest in knowing more about peoples of other cultures and having access to their technologies orliteratures.15.What are the two main factors that influence the language learning?(1) The role of natural ability: Humans are born with a natural ability or innate capacity to learn language.(2) The role of social experience: Not all of L1 acquisition can be attributed to innate ability, forlanguage-specific learning also plays a crucial role. Even if the universal properties of language arepreprogrammed in children, they must learn all of those features which distinguish their L1 from all other possiblehuman languages. Children will never acquire such language-specific knowledge unless that language is usedwith them and around them, and they will learn to use only the language(s) used around them, no matter whattheir linguistic heritage. American-born children of Korean or Greek ancestry will never learn the language of their grandparents if only English surrounds them, for instance, and they will find their ancestral language just as hard to learn as any other English speakers do if they attempt to learn it as an adult. Appropriate social experience,including L1 input and interaction, is thus a necessary condition for acquisition.16.What is the initial state of language development for L1 and L2 respectively?The initial state of L1 learning is composed solely of an innate capacity for language acquisition which may or may not continue to be available for L2, or may be available only in some limited ways. The initial state for L2 learning, on the other hand, has resources of L1 competence, world knowledge, and established skills for interaction, which can be both an asset and an impediment.17.How does intermediate states process?The cross-linguistic influence, or transfer of prior knowledge from L1 to L2, is one of the processes that is involved in interlanguage development. Two major types of transfer which occur are: (1) positive transfer, when an L1structure or rule is used in an L2 utterance and that use is appropriate or “ correct in ”the L2; and (2) negativetransfer (or interference), when an L1 structure or rule is used in an L2 utterance and that use isinappropriate and considered an“ error”.18.What is a necessary condition for language learning (L1 or L2)?Language input to the learner is absolutely necessary for either L1 or L2 learning to take place. Childrenadditionally require interaction with other people for L1 learning to occur. It is possible for some individuals toreach a fairly high level of proficiency in L2 even if they have input only from such generally non-reciprocal sources as radio, television, or written text.19.What is a facilitating condition for language learning?While L1 learning by children occurs without instruction, and while the rate of L1 development is not significantly influenced by correction of immature forms or by degree of motivation to speak, both rate and ultimate level of development inL2 can be facilitated or inhabited by many social and individual factors, such as (1) feedback, including correction of L2 learners' errors; (2) aptitude, including memory capacity and analytic ability; (3) motivation, or need and desire to learn; (4) instruction, or explicit teaching in school settings.20.Give at least 2 reasons that many scientists believe in some innate capacity for language.The notion that innate linguistic knowledge must underlie language acquisition was prominently espoused byNoam Chomsky. This view has been supported by arguments such as the following:(1)Children ’ s knowledge of language goes beyond what could be learned from the input they receive: Childrenoften hear incomplete or ungrammatical utterances along with grammatical input, and yet they are somehowable to filter the language they hear so that the ungrammatical input is not incorporated into their L1 system.Further, children are commonly recipients of simplified input from adults, which does not include data for allof the complexities which are within their linguistic competence. In addition, children hear only a finite subset ofpossible grammatical sentences, and yet they are able to abstract general principles and constraints which allowthem to interpret and produce an infinite number of sentences which they have never heard before.(2) Constraints and principles cannot be learned: Children access ’to generals constraints and principles whichgovern language could account for the relatively short time it takes for the L1 grammar to emerge, and for thefact that it does so systematically and without any “ wild divergences”. This could be so because innateprinciples lead children to organize the input they receive only in certain ways and not others. In addition to thelack of negative evidence , constraints and principles cannot be learnt in part because children acquire a firstlanguage at an age when such abstractions are beyond their comprehension; constraints and principles arethus outside the realm of learning process which are related to general intelligence.(3) Universal patterns of development cannot be explained by language-specific input: In spite of the surfacedifferences in input, there are similar patterns in child acquisition of any language in the world. The extent of this similarity suggests that language universals are not only constructs derived from sophisticated theoriesand analyses by linguists, but also innate representations in every young child’ s mind.21. Linguists have taken an internal and/or external focus to the study of language acquisition. What is the differencebetween the two?Internal focus emphasizes that children begin with an innate capacity which is biologically endowed, as well as the acquisition of feature specification as a part of lexical knowledge; while external focus emphasizes theinformation content of utterances, and considers language primarily as a system of communication.22.What are the two main factors for learning process in the study of SLA from a psychological perspective?(1)Information Processing, which assumes that L2 is a highly complex skill, and that learning L2 is not essentiallyunlike learning other highly complex skills. Processing itself is believed to cause learning;(2)Connectionism, which does not consider language learning to involve either innate knowledge or abstractionof rules and principles, but rather to result from increasing strength of associations (connections) between stimuli and responses.23.What are the two foci for the study of SLA from the social perspective?(1)Microsocial focus: the concerns within the microsocial focus relate to language acquisition and use inimmediate social contexts of production, interpretation, and interaction.(2)Macrosocial focus: the concerns of the macrosocial focus relate language acquisition and use to broaderecological contexts, including cultural, political, and educational settings.24.What are the characteristics of an interlanguage?1)Systematic. At any particular point or stage of development, the IL is governed by rules which constitute thelearner ’ s internal grammar.2)Dynamic. The system of rules which learners have in their minds changes frequently, or is in a state of flux,resulting in a succession of interim grammars.3)Variable. Although IL is systematic, differences in context result in different patterns of language use.4)Reduced system, both in form and function.25.What are the five components of language knowledge?Linguists have traditionally divided language into the following five components for purposes of description and analysis:(1)vocabulary(lexicon)(2)morphology(word structure)(3)phonology(sound system) (4)syntax(grammar)(5)discourse(ways to connect sentences and organize information)Please do3, 5, 7, 8, 9, 10, 12, 14, 15, 16, 17, 18, 19, 21, 23, 24, 25 (共 17 题)in your exercisebooks.Ⅱ.Definition1. Second Language Acquisition (SLA): a term that refers both to the study of individuals and groups who are learninga language subsequent to learning their first one as young children, and to the process of learning that language.2. First language/native language/mother tongue (L1): A language that is acquired naturally in early childhood,usually because it is the primary language of a child’ s family. A child who grows up in a multilingual s have more than one“ first” language.3. Second language (L2) : A language that is acquired naturally in early childhood, usually because it is the primarylanguage of a child ’familys. A child who grows up in a multilingual setting may have more than one “ first ”language.4. Target language :The language that is the aim or goal of learning.5. Foreign language :A second language that is not widely used in the learners ’ immediate social context, but ratherone that might be used for future travel or other cross-cultural communication situations, or one that might be studied be studied as a curricular requirement or elective in school with no immediate or necessary practical application.6. Library language: A second language that functions as a tool for further learning, especially when books andjournals in a desired field of study are not commonly published in the learner’ s L1.7. Auxiliary language:A second language that learners need to know for some official functions in their immediate sociopolitical setting. Or that they will need for purposes of wider communication, although their first languageserves most other needs in their lives.8. Linguistic competence:The underlying knowledge that speakers/hearers have of a language. Chomskydistinguishes this from linguistic performance.9. Linguistic performance:The use of language knowledge in actual production.10. Communicative competence: A basic tenet ( 原则、信条、教条) of sociol inguistics defined as“ what a speakerneeds to know to communicate appropriately within a particular language community-Troike 2003)” (Saville11.Pragmatic competence:Knowledge that people must have in order to interpret and convey meaning withincommunicative situations.12. Multilingualism : The ability to use more than one language.13. Monolingualism :The ability to use only one language.14. Simultaneous multilingualism :Ability to use more than one language that were acquired during early childhood.15. Sequential multilingualism :Ability to use one or more languages that were learned after L1 had already beenestablished.16. Innate capacity :A natural ability, usually referring to children ’ s natural ability to learn or acquire langua17. Child grammar :Grammar of children at different maturational levels that is systematic in terms of productionand comprehension.18.Initial state: The starting point for language acquisition; it is thought to include the underlying knowledge aboutlanguage structures and principles that are in learners’ heads at the very start of L1 or L2 acquisition.19. Intermediate state:I t includes the maturational changes which take place in “ child grammar” ,and the L2developmental sequence which is known as learner language.20.Final state: The outcome of L1 and L2 leaning, also known as the stable state of adult grammar.21.Positive transfer: Appropriate incorporation of an L1 structure or rule in L2 structure.22.Negative transfer: I nappropriate influence of an L1 structure or rule on L2 use. Also called interference.23.Phonology : The sound systems of different languages and the study of such systems generally.24.Syntax: The linguistic system of grammatical relationships of words within sentences, such as ordering andagreement.25.Semantics: The linguistic study of meaning.26.Lexicon: The component of language that is concerned with words and their meanings.27. Principles and Parameters (model): The internally focused linguistic framework that followed Chomsky’ sTransformational-Generative Grammar . It revised specifications of what constitutes innate capacity to include more abstract notions of general principles and constraints common to human language as part of a UniversalGrammar.28. Minimalist program: The internally focused linguistic framework that followed Chomsky’ sPrinciples andParameters model. This framework adds distinctions between lexical and functional category development, as well as more emphasis on the acquisition of feature specification as a part of lexical knowledge.29.Variation theory: A microsocial framework applied to SLA that explores systematic differences in learner productionwhich depend on contexts of use.30. Accommodation theory: A framework for study of SLA that is based on the notion that speakers usuallyunconsciously change their pronunciation and even the grammatical complexity of sentences they use to sound more like whomever they are talking to.31.Sociocultural theory (SCT) : An approach established by Vygotsky which claims that interaction not only facilitateslanguage learning but is a causative force in acquisition. Further, all of learning is seen as essentially a socialprocess which is grounded in sociocultural settings.nguage community: A group of people who share knowledge of a common language to at least some extent.2.Foreigner talk: Speech from L1 speakers addressed to L2 learners that differs in systematic ways from languageaddressed to native or very fluent speakers.3.Interaction Hypothesis: The claim that modifications and collaborative efforts which take place in social interationfacilitate SLA because they contribute to the accessibility of input for mental processing.4. Symbolic mediation: A link between a person ’ s current mental state and higher order functions that is providedprimarily by language; considered the usual route to learning (of language, and of learning in general). Part ofVygosky ’ s Sociocultural Theory.5. Linguistic context: Elements of language form and function associated with the variable element.6. Microsocial context: features of setting/situation and interaction which relate to communicative events withinwhich language is being produced, interpreted, and negotiated.7. ZPD: Zone of Proximal Development, an area of potential development where the learner can only achieve thatpotential with assistance. Part of Vygosky al’TheorysSociocultur.8.Scaffolding: Verbal guidance which an expert provides to help a learner perform any specific task, or the verbalcollaboration of peers to perform a task which would be too difficult for any one of them in individualperformance.9. Intrapersonal interaction: communication that occurs within an individual's own mind, viewed by Vygosky as asociocultural phenomen.10.Interpersonal interaction: Communicative events and situations that occur between people.11.Social institutions:The systems which are established by law, custom, or practice to regulate and organize thelife of people in public domains: e.g. politics, religion, and education.12.Acculturation: learning the culture of the L2 community and adapting to those values and behavioral patterns.13.Formal L2 learning: formal/instructed learning generally takes place in schools, which are social institutions thatare established in accord with the needs, beliefs, values, and customs of their cultural settings.need to interact with —speakers of another language.1.Contrastive Analysis (CA) : an approach to the study of SLA which involves predicting and explaining learnerproblems based on a comparison of L1 and L2 to determine similarities and differences.2.Stimulus-Response-Reinforcement (S-R-R): learners respond to the stimulus (linguistic input), and reinforcement strengthens the response; they imitate and repeat the language that they hear, and when they are reinforced for that response, learning occurs.3.Interference:There will be transfer in learning of elements acquired in L1 to L2. When the L1 structure is used inappropriately in the L2, the transfer is called interference.4. Error Analysis (EA):the first approach to the study of SLA which includes an internal focus on learnersability to construct language. It is based on the description and analysis of the actual learner errors in L2.6. Interlanguage (IL):is the intermediate state of a learner’ s language as it moves toward the target L2. It has the following characteristics: systematic; dynamic; variable; reduced system, both in form and function.Ⅲ. Final exam questions1.Choose the best answer from the three possible choices(.每小题 2 分,共 20 分)2.Define the following terms (每小题 5 分,共 25 分)3.Short & Long answers (每小题 8 分,共 40 分)4.Answer the following questions, you should write at least 200 words. (每小题 15 分,共 15 分)。

二语习得引论读书笔记chapter

二语习得引论读书笔记chapter

二语习得引论读书笔记c h a p t e r文件管理序列号:[K8UY-K9IO69-O6M243-OL889-F88688]一.概论Chapter 1. Introducing SLA1.Second language acquisition (SLA)2.Second language (L2)(也可能是第三四五外语)also commonly called a target language (TL)Refers to: any language that is the aim or goal of learning.3.Basic questions:1). What exactly does the L2 learner come to know2). How does the learner acquire this knowledge3). Why are some learners more successful than othersDifferent answers from different fields4.3 main perspectives:linguistic; psychological; social.Only one (x) Combine (√)Chapter 2. Foundations of SLAⅠ. The world of second languages1.Multi-; bi-; mono- lingualism1)Multilingualism: the ability to use 2 or more languages.(bilingualism: 2 languages; multilingualism: >2)2)Monolingualism: the ability to use only one language.3)Multilingual competence (Vivian Cook, Multicompetence)Refers to: the compound state of a mind with 2 or more grammars.4)Monolingual competence (Vivian Cook, Monocompetence)Refers to: knowledge of only one language.2.People with multicompetence (a unique combination) ≠ 2monolingualsWorld demographic shows:3.Acquisition4.The number of L1 and L2 speakers of different languages canonly be estimated.1)Linguistic information is often not officially collected.2)Answers to questions seeking linguistic information maynot be reliable.3)A lack of agreement on definition of terms and on criteriafor identification.Ⅱ. The nature of language learning1.L1 acquisition1). L1 acquisition was completed before you came to schooland the development normally takes place without anyconscious effort.2). Complex grammatical patterns continue to develop throughthe school years.< < 3 years old Master an awareness of basic discourse patterns< 3 years old Master most of the distinctive sounds of L1< 5 or 6 years old Control most of the basic L1 grammatical patterns2. The role of natural ability1) Refers to: Humans are born with an innate capacity tolearn language.2) Reasons:Children began to learn L1 at the same age and in much thesame way.…master the basic phonological and grammatical operations in L1 at 5/ 6.…can understand and create novel utterances; and are not limited to repeating what they have heard; the utterances they produce are often systematically different fromthose of the adults around them.There is a cut-off age for L1 acquisition.L1 acquisition is not simply a facet of generalintelligence.3)The natural ability, in terms of innate capacity, is thatpart of language structure is genetically “given”to every human child.3. The role of social experience1) A necessary condition for acquisition: appropriate socialexperience (including L1 input and interaction) is2) Intentional L1 teaching to children is not necessary andmay have little effect.3) Sources of L1 input and interaction vary for cultural andsocial factors.4) Children get adequate L1 input and interaction→sourceshas little effect on the rate and sequence of phonological and grammatical development.The regional and social varieties (sources) of the input→pronunciationⅢ. L1 vs. L2 learning1.L1 and L2 development:Final state NativeMultilingual competencecompetence2.Understanding the statesⅣ. The logical problem of language learning1.Noam Chomsky:1)innate linguistic knowledge must underlie languageacquisition2)Universal Grammar2.The theory of Universal Grammar:Reasons:1)Children’s knowledge of language > what could be learnedfrom the input.2)Constraints and principles cannot be learned.3)Universal patterns of development cannot be explained bylanguage-specific input.Children often say things that adults do not.Children use language in accordance with generaluniversal rules of language though they have notdeveloped the cognitive ability to understand theserules. Not learned from deduction or imitation.Patterns of children’s language development are notdirectly determined by the input they receive.Ⅴ. Frame works for SLA。

Consensus and Cooperation in Networked Multi-Agent Systems

Consensus and Cooperation in Networked Multi-Agent Systems

Consensus and Cooperation in Networked Multi-Agent SystemsAlgorithms that provide rapid agreement and teamwork between all participants allow effective task performance by self-organizing networked systems.By Reza Olfati-Saber,Member IEEE,J.Alex Fax,and Richard M.Murray,Fellow IEEEABSTRACT|This paper provides a theoretical framework for analysis of consensus algorithms for multi-agent networked systems with an emphasis on the role of directed information flow,robustness to changes in network topology due to link/node failures,time-delays,and performance guarantees. An overview of basic concepts of information consensus in networks and methods of convergence and performance analysis for the algorithms are provided.Our analysis frame-work is based on tools from matrix theory,algebraic graph theory,and control theory.We discuss the connections between consensus problems in networked dynamic systems and diverse applications including synchronization of coupled oscillators,flocking,formation control,fast consensus in small-world networks,Markov processes and gossip-based algo-rithms,load balancing in networks,rendezvous in space, distributed sensor fusion in sensor networks,and belief propagation.We establish direct connections between spectral and structural properties of complex networks and the speed of information diffusion of consensus algorithms.A brief introduction is provided on networked systems with nonlocal information flow that are considerably faster than distributed systems with lattice-type nearest neighbor interactions.Simu-lation results are presented that demonstrate the role of small-world effects on the speed of consensus algorithms and cooperative control of multivehicle formations.KEYWORDS|Consensus algorithms;cooperative control; flocking;graph Laplacians;information fusion;multi-agent systems;networked control systems;synchronization of cou-pled oscillators I.INTRODUCTIONConsensus problems have a long history in computer science and form the foundation of the field of distributed computing[1].Formal study of consensus problems in groups of experts originated in management science and statistics in1960s(see DeGroot[2]and references therein). The ideas of statistical consensus theory by DeGroot re-appeared two decades later in aggregation of information with uncertainty obtained from multiple sensors1[3]and medical experts[4].Distributed computation over networks has a tradition in systems and control theory starting with the pioneering work of Borkar and Varaiya[5]and Tsitsiklis[6]and Tsitsiklis,Bertsekas,and Athans[7]on asynchronous asymptotic agreement problem for distributed decision-making systems and parallel computing[8].In networks of agents(or dynamic systems),B con-sensus[means to reach an agreement regarding a certain quantity of interest that depends on the state of all agents.A B consensus algorithm[(or protocol)is an interaction rule that specifies the information exchange between an agent and all of its neighbors on the network.2 The theoretical framework for posing and solving consensus problems for networked dynamic systems was introduced by Olfati-Saber and Murray in[9]and[10] building on the earlier work of Fax and Murray[11],[12]. The study of the alignment problem involving reaching an agreement V without computing any objective functions V appeared in the work of Jadbabaie et al.[13].Further theoretical extensions of this work were presented in[14] and[15]with a look toward treatment of directed infor-mation flow in networks as shown in Fig.1(a).Manuscript received August8,2005;revised September7,2006.This work was supported in part by the Army Research Office(ARO)under Grant W911NF-04-1-0316. R.Olfati-Saber is with Dartmouth College,Thayer School of Engineering,Hanover,NH03755USA(e-mail:olfati@).J.A.Fax is with Northrop Grumman Corp.,Woodland Hills,CA91367USA(e-mail:alex.fax@).R.M.Murray is with the California Institute of Technology,Control and Dynamical Systems,Pasadena,CA91125USA(e-mail:murray@).Digital Object Identifier:10.1109/JPROC.2006.8872931This is known as sensor fusion and is an important application of modern consensus algorithms that will be discussed later.2The term B nearest neighbors[is more commonly used in physics than B neighbors[when applied to particle/spin interactions over a lattice (e.g.,Ising model).Vol.95,No.1,January2007|Proceedings of the IEEE2150018-9219/$25.00Ó2007IEEEThe common motivation behind the work in [5],[6],and [10]is the rich history of consensus protocols in com-puter science [1],whereas Jadbabaie et al.[13]attempted to provide a formal analysis of emergence of alignment in the simplified model of flocking by Vicsek et al.[16].The setup in [10]was originally created with the vision of de-signing agent-based amorphous computers [17],[18]for collaborative information processing in ter,[10]was used in development of flocking algorithms with guaranteed convergence and the capability to deal with obstacles and adversarial agents [19].Graph Laplacians and their spectral properties [20]–[23]are important graph-related matrices that play a crucial role in convergence analysis of consensus and alignment algo-rithms.Graph Laplacians are an important point of focus of this paper.It is worth mentioning that the second smallest eigenvalue of graph Laplacians called algebraic connectivity quantifies the speed of convergence of consensus algo-rithms.The notion of algebraic connectivity of graphs has appeared in a variety of other areas including low-density parity-check codes (LDPC)in information theory and com-munications [24],Ramanujan graphs [25]in number theory and quantum chaos,and combinatorial optimization prob-lems such as the max-cut problem [21].More recently,there has been a tremendous surge of interest V among researchers from various disciplines of engineering and science V in problems related to multia-gent networked systems with close ties to consensus prob-lems.This includes subjects such as consensus [26]–[32],collective behavior of flocks and swarms [19],[33]–[37],sensor fusion [38]–[40],random networks [41],[42],syn-chronization of coupled oscillators [42]–[46],algebraic connectivity 3of complex networks [47]–[49],asynchro-nous distributed algorithms [30],[50],formation control for multirobot systems [51]–[59],optimization-based co-operative control [60]–[63],dynamic graphs [64]–[67],complexity of coordinated tasks [68]–[71],and consensus-based belief propagation in Bayesian networks [72],[73].A detailed discussion of selected applications will be pre-sented shortly.In this paper,we focus on the work described in five key papers V namely,Jadbabaie,Lin,and Morse [13],Olfati-Saber and Murray [10],Fax and Murray [12],Moreau [14],and Ren and Beard [15]V that have been instrumental in paving the way for more recent advances in study of self-organizing networked systems ,or swarms .These networked systems are comprised of locally interacting mobile/static agents equipped with dedicated sensing,computing,and communication devices.As a result,we now have a better understanding of complex phenomena such as flocking [19],or design of novel information fusion algorithms for sensor networks that are robust to node and link failures [38],[72]–[76].Gossip-based algorithms such as the push-sum protocol [77]are important alternatives in computer science to Laplacian-based consensus algorithms in this paper.Markov processes establish an interesting connection between the information propagation speed in these two categories of algorithms proposed by computer scientists and control theorists [78].The contribution of this paper is to present a cohesive overview of the key results on theory and applications of consensus problems in networked systems in a unified framework.This includes basic notions in information consensus and control theoretic methods for convergence and performance analysis of consensus protocols that heavily rely on matrix theory and spectral graph theory.A byproduct of this framework is to demonstrate that seem-ingly different consensus algorithms in the literature [10],[12]–[15]are closely related.Applications of consensus problems in areas of interest to researchers in computer science,physics,biology,mathematics,robotics,and con-trol theory are discussed in this introduction.A.Consensus in NetworksThe interaction topology of a network of agents is rep-resented using a directed graph G ¼ðV ;E Þwith the set of nodes V ¼f 1;2;...;n g and edges E V ÂV .TheFig.1.Two equivalent forms of consensus algorithms:(a)a networkof integrator agents in which agent i receives the state x j of its neighbor,agent j ,if there is a link ði ;j Þconnecting the two nodes;and (b)the block diagram for a network of interconnecteddynamic systems all with identical transfer functions P ðs Þ¼1=s .The collective networked system has a diagonal transfer function and is a multiple-input multiple-output (MIMO)linear system.3To be defined in Section II-A.Olfati-Saber et al.:Consensus and Cooperation in Networked Multi-Agent Systems216Proceedings of the IEEE |Vol.95,No.1,January 2007neighbors of agent i are denoted by N i ¼f j 2V :ði ;j Þ2E g .According to [10],a simple consensus algorithm to reach an agreement regarding the state of n integrator agents with dynamics _x i ¼u i can be expressed as an n th-order linear system on a graph_x i ðt Þ¼X j 2N ix j ðt ÞÀx i ðt ÞÀÁþb i ðt Þ;x i ð0Þ¼z i2R ;b i ðt Þ¼0:(1)The collective dynamics of the group of agents following protocol (1)can be written as_x ¼ÀLx(2)where L ¼½l ij is the graph Laplacian of the network and itselements are defined as follows:l ij ¼À1;j 2N i j N i j ;j ¼i :&(3)Here,j N i j denotes the number of neighbors of node i (or out-degree of node i ).Fig.1shows two equivalent forms of the consensus algorithm in (1)and (2)for agents with a scalar state.The role of the input bias b in Fig.1(b)is defined later.According to the definition of graph Laplacian in (3),all row-sums of L are zero because of P j l ij ¼0.Therefore,L always has a zero eigenvalue 1¼0.This zero eigenvalues corresponds to the eigenvector 1¼ð1;...;1ÞT because 1belongs to the null-space of L ðL 1¼0Þ.In other words,an equilibrium of system (2)is a state in the form x üð ;...; ÞT ¼ 1where all nodes agree.Based on ana-lytical tools from algebraic graph theory [23],we later show that x Ãis a unique equilibrium of (2)(up to a constant multiplicative factor)for connected graphs.One can show that for a connected network,the equilibrium x üð ;...; ÞT is globally exponentially stable.Moreover,the consensus value is ¼1=n P i z i that is equal to the average of the initial values.This im-plies that irrespective of the initial value of the state of each agent,all agents reach an asymptotic consensus regarding the value of the function f ðz Þ¼1=n P i z i .While the calculation of f ðz Þis simple for small net-works,its implications for very large networks is more interesting.For example,if a network has n ¼106nodes and each node can only talk to log 10ðn Þ¼6neighbors,finding the average value of the initial conditions of the nodes is more complicated.The role of protocol (1)is to provide a systematic consensus mechanism in such a largenetwork to compute the average.There are a variety of functions that can be computed in a similar fashion using synchronous or asynchronous distributed algorithms (see [10],[28],[30],[73],and [76]).B.The f -Consensus Problem and Meaning of CooperationTo understand the role of cooperation in performing coordinated tasks,we need to distinguish between un-constrained and constrained consensus problems.An unconstrained consensus problem is simply the alignment problem in which it suffices that the state of all agents asymptotically be the same.In contrast,in distributed computation of a function f ðz Þ,the state of all agents has to asymptotically become equal to f ðz Þ,meaning that the consensus problem is constrained.We refer to this con-strained consensus problem as the f -consensus problem .Solving the f -consensus problem is a cooperative task and requires willing participation of all the agents.To demonstrate this fact,suppose a single agent decides not to cooperate with the rest of the agents and keep its state unchanged.Then,the overall task cannot be performed despite the fact that the rest of the agents reach an agree-ment.Furthermore,there could be scenarios in which multiple agents that form a coalition do not cooperate with the rest and removal of this coalition of agents and their links might render the network disconnected.In a dis-connected network,it is impossible for all nodes to reach an agreement (unless all nodes initially agree which is a trivial case).From the above discussion,cooperation can be infor-mally interpreted as B giving consent to providing one’s state and following a common protocol that serves the group objective.[One might think that solving the alignment problem is not a cooperative task.The justification is that if a single agent (called a leader)leaves its value unchanged,all others will asymptotically agree with the leader according to the consensus protocol and an alignment is reached.However,if there are multiple leaders where two of whom are in disagreement,then no consensus can be asymptot-ically reached.Therefore,alignment is in general a coop-erative task as well.Formal analysis of the behavior of systems that involve more than one type of agent is more complicated,partic-ularly,in presence of adversarial agents in noncooperative games [79],[80].The focus of this paper is on cooperative multi-agent systems.C.Iterative Consensus and Markov ChainsIn Section II,we show how an iterative consensus algorithm that corresponds to the discrete-time version of system (1)is a Markov chainðk þ1Þ¼ ðk ÞP(4)Olfati-Saber et al.:Consensus and Cooperation in Networked Multi-Agent SystemsVol.95,No.1,January 2007|Proceedings of the IEEE217with P ¼I À L and a small 90.Here,the i th element of the row vector ðk Þdenotes the probability of being in state i at iteration k .It turns out that for any arbitrary graph G with Laplacian L and a sufficiently small ,the matrix P satisfies the property Pj p ij ¼1with p ij !0;8i ;j .Hence,P is a valid transition probability matrix for the Markov chain in (4).The reason matrix theory [81]is so widely used in analysis of consensus algorithms [10],[12]–[15],[64]is primarily due to the structure of P in (4)and its connection to graphs.4There are interesting connections between this Markov chain and the speed of information diffusion in gossip-based averaging algorithms [77],[78].One of the early applications of consensus problems was dynamic load balancing [82]for parallel processors with the same structure as system (4).To this date,load balancing in networks proves to be an active area of research in computer science.D.ApplicationsMany seemingly different problems that involve inter-connection of dynamic systems in various areas of science and engineering happen to be closely related to consensus problems for multi-agent systems.In this section,we pro-vide an account of the existing connections.1)Synchronization of Coupled Oscillators:The problem of synchronization of coupled oscillators has attracted numer-ous scientists from diverse fields including physics,biology,neuroscience,and mathematics [83]–[86].This is partly due to the emergence of synchronous oscillations in coupled neural oscillators.Let us consider the generalized Kuramoto model of coupled oscillators on a graph with dynamics_i ¼ Xj 2N isin ð j À i Þþ!i (5)where i and !i are the phase and frequency of the i thoscillator.This model is the natural nonlinear extension of the consensus algorithm in (1)and its linearization around the aligned state 1¼...¼ n is identical to system (2)plus a nonzero input bias b i ¼ð!i À"!Þ= with "!¼1=n P i !i after a change of variables x i ¼ð i À"!t Þ= .In [43],Sepulchre et al.show that if is sufficiently large,then for a network with all-to-all links,synchroni-zation to the aligned state is globally achieved for all ini-tial states.Recently,synchronization of networked oscillators under variable time-delays was studied in [45].We believe that the use of convergence analysis methods that utilize the spectral properties of graph Laplacians willshed light on performance and convergence analysis of self-synchrony in oscillator networks [42].2)Flocking Theory:Flocks of mobile agents equipped with sensing and communication devices can serve as mobile sensor networks for massive distributed sensing in an environment [87].A theoretical framework for design and analysis of flocking algorithms for mobile agents with obstacle-avoidance capabilities is developed by Olfati-Saber [19].The role of consensus algorithms in particle-based flocking is for an agent to achieve velocity matching with respect to its neighbors.In [19],it is demonstrated that flocks are networks of dynamic systems with a dynamic topology.This topology is a proximity graph that depends on the state of all agents and is determined locally for each agent,i.e.,the topology of flocks is a state-dependent graph.The notion of state-dependent graphs was introduced by Mesbahi [64]in a context that is independent of flocking.3)Fast Consensus in Small-Worlds:In recent years,network design problems for achieving faster consensus algorithms has attracted considerable attention from a number of researchers.In Xiao and Boyd [88],design of the weights of a network is considered and solved using semi-definite convex programming.This leads to a slight increase in algebraic connectivity of a network that is a measure of speed of convergence of consensus algorithms.An alternative approach is to keep the weights fixed and design the topology of the network to achieve a relatively high algebraic connectivity.A randomized algorithm for network design is proposed by Olfati-Saber [47]based on random rewiring idea of Watts and Strogatz [89]that led to creation of their celebrated small-world model .The random rewiring of existing links of a network gives rise to considerably faster consensus algorithms.This is due to multiple orders of magnitude increase in algebraic connectivity of the network in comparison to a lattice-type nearest-neighbort graph.4)Rendezvous in Space:Another common form of consensus problems is rendezvous in space [90],[91].This is equivalent to reaching a consensus in position by a num-ber of agents with an interaction topology that is position induced (i.e.,a proximity graph).We refer the reader to [92]and references therein for a detailed discussion.This type of rendezvous is an unconstrained consensus problem that becomes challenging under variations in the network topology.Flocking is somewhat more challenging than rendezvous in space because it requires both interagent and agent-to-obstacle collision avoidance.5)Distributed Sensor Fusion in Sensor Networks:The most recent application of consensus problems is distrib-uted sensor fusion in sensor networks.This is done by posing various distributed averaging problems require to4In honor of the pioneering contributions of Oscar Perron (1907)to the theory of nonnegative matrices,were refer to P as the Perron Matrix of graph G (See Section II-C for details).Olfati-Saber et al.:Consensus and Cooperation in Networked Multi-Agent Systems218Proceedings of the IEEE |Vol.95,No.1,January 2007implement a Kalman filter [38],[39],approximate Kalman filter [74],or linear least-squares estimator [75]as average-consensus problems .Novel low-pass and high-pass consensus filters are also developed that dynamically calculate the average of their inputs in sensor networks [39],[93].6)Distributed Formation Control:Multivehicle systems are an important category of networked systems due to their commercial and military applications.There are two broad approaches to distributed formation control:i)rep-resentation of formations as rigid structures [53],[94]and the use of gradient-based controls obtained from their structural potentials [52]and ii)representation of form-ations using the vectors of relative positions of neighboring vehicles and the use of consensus-based controllers with input bias.We discuss the later approach here.A theoretical framework for design and analysis of distributed controllers for multivehicle formations of type ii)was developed by Fax and Murray [12].Moving in formation is a cooperative task and requires consent and collaboration of every agent in the formation.In [12],graph Laplacians and matrix theory were extensively used which makes one wonder whether relative-position-based formation control is a consensus problem.The answer is yes.To see this,consider a network of self-interested agents whose individual desire is to minimize their local cost U i ðx Þ¼Pj 2N i k x j Àx i Àr ij k 2via a distributed algorithm (x i is the position of vehicle i with dynamics _x i ¼u i and r ij is a desired intervehicle relative-position vector).Instead,if the agents use gradient-descent algorithm on the collective cost P n i ¼1U i ðx Þusing the following protocol:_x i ¼Xj 2N iðx j Àx i Àr ij Þ¼Xj 2N iðx j Àx i Þþb i (6)with input bias b i ¼Pj 2N i r ji [see Fig.1(b)],the objective of every agent will be achieved.This is the same as the consensus algorithm in (1)up to the nonzero bias terms b i .This nonzero bias plays no role in stability analysis of sys-tem (6).Thus,distributed formation control for integrator agents is a consensus problem.The main contribution of the work by Fax and Murray is to extend this scenario to the case where all agents are multiinput multioutput linear systems _x i ¼Ax i þBu i .Stability analysis of relative-position-based formation control for multivehicle systems is extensively covered in Section IV.E.OutlineThe outline of the paper is as follows.Basic concepts and theoretical results in information consensus are presented in Section II.Convergence and performance analysis of consensus on networks with switching topology are given in Section III.A theoretical framework for cooperative control of formations of networked multi-vehicle systems is provided in Section IV.Some simulationresults related to consensus in complex networks including small-worlds are presented in Section V.Finally,some concluding remarks are stated in Section VI.RMATION CONSENSUSConsider a network of decision-making agents with dynamics _x i ¼u i interested in reaching a consensus via local communication with their neighbors on a graph G ¼ðV ;E Þ.By reaching a consensus,we mean asymptot-ically converging to a one-dimensional agreement space characterized by the following equation:x 1¼x 2¼...¼x n :This agreement space can be expressed as x ¼ 1where 1¼ð1;...;1ÞT and 2R is the collective decision of the group of agents.Let A ¼½a ij be the adjacency matrix of graph G .The set of neighbors of a agent i is N i and defined byN i ¼f j 2V :a ij ¼0g ;V ¼f 1;...;n g :Agent i communicates with agent j if j is a neighbor of i (or a ij ¼0).The set of all nodes and their neighbors defines the edge set of the graph as E ¼fði ;j Þ2V ÂV :a ij ¼0g .A dynamic graph G ðt Þ¼ðV ;E ðt ÞÞis a graph in which the set of edges E ðt Þand the adjacency matrix A ðt Þare time-varying.Clearly,the set of neighbors N i ðt Þof every agent in a dynamic graph is a time-varying set as well.Dynamic graphs are useful for describing the network topology of mobile sensor networks and flocks [19].It is shown in [10]that the linear system_x i ðt Þ¼Xj 2N ia ij x j ðt ÞÀx i ðt ÞÀÁ(7)is a distributed consensus algorithm ,i.e.,guarantees con-vergence to a collective decision via local interagent interactions.Assuming that the graph is undirected (a ij ¼a ji for all i ;j ),it follows that the sum of the state of all nodes is an invariant quantity,or P i _xi ¼0.In particular,applying this condition twice at times t ¼0and t ¼1gives the following result¼1n Xix i ð0Þ:In other words,if a consensus is asymptotically reached,then necessarily the collective decision is equal to theOlfati-Saber et al.:Consensus and Cooperation in Networked Multi-Agent SystemsVol.95,No.1,January 2007|Proceedings of the IEEE219average of the initial state of all nodes.A consensus algo-rithm with this specific invariance property is called an average-consensus algorithm [9]and has broad applications in distributed computing on networks (e.g.,sensor fusion in sensor networks).The dynamics of system (7)can be expressed in a compact form as_x ¼ÀLx(8)where L is known as the graph Laplacian of G .The graph Laplacian is defined asL ¼D ÀA(9)where D ¼diag ðd 1;...;d n Þis the degree matrix of G with elements d i ¼Pj ¼i a ij and zero off-diagonal elements.By definition,L has a right eigenvector of 1associated with the zero eigenvalue 5because of the identity L 1¼0.For the case of undirected graphs,graph Laplacian satisfies the following sum-of-squares (SOS)property:x T Lx ¼12Xði ;j Þ2Ea ij ðx j Àx i Þ2:(10)By defining a quadratic disagreement function as’ðx Þ¼12x T Lx(11)it becomes apparent that algorithm (7)is the same as_x ¼Àr ’ðx Þor the gradient-descent algorithm.This algorithm globallyasymptotically converges to the agreement space provided that two conditions hold:1)L is a positive semidefinite matrix;2)the only equilibrium of (7)is 1for some .Both of these conditions hold for a connected graph and follow from the SOS property of graph Laplacian in (10).Therefore,an average-consensus is asymptotically reached for all initial states.This fact is summarized in the following lemma.Lemma 1:Let G be a connected undirected graph.Then,the algorithm in (7)asymptotically solves an average-consensus problem for all initial states.A.Algebraic Connectivity and Spectral Propertiesof GraphsSpectral properties of Laplacian matrix are instrumen-tal in analysis of convergence of the class of linear consensus algorithms in (7).According to Gershgorin theorem [81],all eigenvalues of L in the complex plane are located in a closed disk centered at Áþ0j with a radius of Á¼max i d i ,i.e.,the maximum degree of a graph.For undirected graphs,L is a symmetric matrix with real eigenvalues and,therefore,the set of eigenvalues of L can be ordered sequentially in an ascending order as0¼ 1 2 ÁÁÁ n 2Á:(12)The zero eigenvalue is known as the trivial eigenvalue of L .For a connected graph G , 290(i.e.,the zero eigenvalue is isolated).The second smallest eigenvalue of Laplacian 2is called algebraic connectivity of a graph [20].Algebraic connectivity of the network topology is a measure of performance/speed of consensus algorithms [10].Example 1:Fig.2shows two examples of networks of integrator agents with different topologies.Both graphs are undirected and have 0–1weights.Every node of the graph in Fig.2(a)is connected to its 4nearest neighbors on a ring.The other graph is a proximity graph of points that are distributed uniformly at random in a square.Every node is connected to all of its spatial neighbors within a closed ball of radius r 90.Here are the important degree information and Laplacian eigenvalues of these graphsa Þ 1¼0; 2¼0:48; n ¼6:24;Á¼4b Þ 1¼0; 2¼0:25; n ¼9:37;Á¼8:(13)In both cases, i G 2Áfor all i .B.Convergence Analysis for Directed Networks The convergence analysis of the consensus algorithm in (7)is equivalent to proving that the agreement space characterized by x ¼ 1; 2R is an asymptotically stable equilibrium of system (7).The stability properties of system (7)is completely determined by the location of the Laplacian eigenvalues of the network.The eigenvalues of the adjacency matrix are irrelevant to the stability analysis of system (7),unless the network is k -regular (all of its nodes have the same degree k ).The following lemma combines a well-known rank property of graph Laplacians with Gershgorin theorem to provide spectral characterization of Laplacian of a fixed directed network G .Before stating the lemma,we need to define the notion of strong connectivity of graphs.A graph5These properties were discussed earlier in the introduction for graphs with 0–1weights.Olfati-Saber et al.:Consensus and Cooperation in Networked Multi-Agent Systems220Proceedings of the IEEE |Vol.95,No.1,January 2007。

Oracle Fusion Middleware产品介绍说明书

Oracle Fusion Middleware产品介绍说明书

Adapters
Apps DB Legacy
B2B
Partners
Coherence Cache
J2EE Application Server
(Oracle AS, WebLogic, WebSphere, JBoss)
Enterprise Manager
System
GOMVoEnRitoNrAinNgCE
Using Oracle SOA Suite and Oracle BPEL Process Manager to Integrate and Extend Oracle Siebel CRM
Basheer Khan President and CEO Innowave Technologies
Nishit Rao Group Product Manager Oracle Fusion Middleware
• Service Virtualization
• Configuration
• Any to Any Protocol, Payload
• Policy Enforcement
• High Availability & Scale
Oracle Business Activity Monitoring
• Analyze events as they occur
• Correlate events & KPIs • Identify trends as they emerge • Alert users to bottlenecks & solutions
• Act on current conditions
LLeevveerraaggeeEExxisisttininggInInvveessttmmeennttssinin HHeetteerrooggeenneeoouussEEnnvviriroonnmmeennttss

地下水模拟软件GMS中文使用手册

地下水模拟软件GMS中文使用手册

2.1.1 纲要....................................................................................................................................... 17
2.2 开始.............................................................................................................................................. 18 2.3 属性对象...................................................................................................................................... 18
1.12.1 创建概念模型..................................................................................................................... 13 1.12.2 根据 GIS 数据作图............................................................................................................. 13
2.4 结论.............................................................................................................................................. 24 25 3 MODFLOW—概念模型法................................................................................................................ ................................................................................................................25 3.1 简介.............................................................................................................................................. 26

二语习得介绍1

二语习得介绍1

NNS: I need you to write a recommendation for me.
Second Language Acquisition: An Overview
III. Issues in SLA
the role of the first language the “natural” route of development individual learner differences the role of input learner processes the role of formal instruction
Second Language Acquisition: An Overview
I. What is Second Language Acquisition (SLA)? 2. The Definition of SLA:
the process learning another language after the learning of the native language second language (L2) any language learned after learning the L1 L2 can refer to non-native language learnt after the L1 acquisition, regardless of whether it is the second, third language.
I. What is Second Language Acquisition (SLA)? 2. The Definition of SLA:
the process learning another language after the learning of the native language (both in naturalistic and instructed setting) foreign language acquisition the learning of a nonnative language in the environment of one’s native language (mainly in instructed setting)

Multiobjective optimization using non-dominated sorting in genetic algorithms

Multiobjective optimization using non-dominated sorting in genetic algorithms
One way to solve multiobjective problems is to scalarize the vector of objectives into one objective by averaging the objectives with a weight vector. This process allows a simpler optimization algorithm to be used, but the obtained solution largely depends on the weight vector used in the scalarization process. Moreover, if available, a decision maker may be interested in knowing alternate solutions. Since genetic algorithms (GAs) work with a population of points, a number of Pareto-optimal solutions may be captured using GAs. An early GA application on multiobjective optimization by Scha er (1984) opened a new avenue of research in this eld. Though his algorithm, VEGA, gave encouraging results, it su ered from biasness towards some Pareto-optimal solutions. A new algorithm, Nondominated Sorting Genetic Algorithm (NSGA), is presented in this paper based on Goldberg's suggestion (Goldberg 1989). This algorithm eliminates the bias in VEGA and thereby distributes the population over the entire Pareto-optimal regions. Although there exist two other implementations (Fonesca and Fleming 1993; Horn, Nafpliotis, and Goldberg 1994) based on this idea, NSGA is di erent from their working principles, as explained below.

服务等级协议SLA模板

服务等级协议SLA模板

Appendix (SS)<PPP Project Name> Service Level Agreementbetween<Sponsor Agency>&< The Private Partner>Prepared By: <Author> Document Version:<N.N>Date: <Month, Year>This template is made to help complete the cycle of contract preparation and management in the PPP projects to be carried out by the e-Government of Saudi Arabia.Service Level Agreements (SLA) is considered an important attachment or a separate document to PPP projects. All clauses in the contract that encourages a performance and service level management schemes will have a reference in this Agreement.TABLE OF CONTENTS1TEMPLATE INTRODUCTION (2)2INTRODUCTION (4)2.1P URPOSE AND O BJECTIVES (4)2.2P ARTIES TO THE A GREEMENT (4)2.3C OMMENCEMENT D ATE (4)2.4D URATION OF THE A GREEMENT (5)2.5D EFINITIONS (5)3PERIODIC REVIEW (6)4SERVICES DESCRIPTIONS (7)5AGENCY RESPONSIBILITIES (8)6PRIVATE PARTNER RESPONSIBILITIES (9)7SERVICE MANAGEMENT (10)7.1SERVICE AVAILABILITY (10)7.2SERVICE MAINTENANCE (10)7.3SERVICE MEASUREMENT (11)7.4SERVICE REPORTING (12)8SUPPORTING DOCUMENTATION (15)9AGREEMENT APPROVAL (18)LIST OF TABLESTable 1: Service Descriptions 7 Table 2: Agency Responsibilities 8 Table 3: Private Partner Reponsibilities 9 Table 4: Service Availability 10 Table 5: Service Maintenance 11 Table 6: Service Measurement 12 Table 7: Service Reporting 13 Table 8: Supporting Documentation 15< The SLA should contain a brief statement on the purpose and objectives of the Agreement being drawn up between the two parties.The drawing up of a detailed SLA achieves a number of objectives: •It defines the terms and basis under which the Services will be delivered.•It states how the Service performance levels will be measured.•It specifies the Services to be delivered.>Example<It is necessary to identify the parties involved in this Agreement along with their addresses.>Example2.3COMMENCEMENT DATE<It is necessary to specify the commencement date of this Agreement as this is the effective date of the legal Agreement between both parties. This date is usually the same as the commencement date specified in the PPP Contract.> Example1 The SLA commencement date is usually the same as the commencement date of the PPP Contract.2.4DURATION OF THE AGREEMENT<This section of the Agreement shall specify the duration of this Agreement and is usually the same as in the PPP Contract.>Example<It is necessary for the terms used in the Agreement to be clear to prevent any misunderstandings. The terms and their definitions shall be negotiated and agreed upon between both parties.>< This section of the Agreement shall specify the periodic reviews and amendments to this Agreement, who updates the document and where is the document stored/located.>Example2 Refer to the PPP Contract for the definitions and clauses related to the Contract Duration andSignature Date.3< This section of the Agreement shall provide a full description of the Services provided by the Private Partner to the Agency. This should include all specific activities that will be required to properly implement the Agreement including how specific services are to be provided, resource requirements, adhering to the defined schedule of activities and all service delivery processes used/supported by the Private Partner.>Example<This section of the Agreement shall specify the responsibilities of the Agency in support of this Agreement.>Example<This section of the Agreement shall specify the responsibilities of the Private Partner in support of this Agreement.>Example< This section of the Agreement shall specify the Service Availability, Maintenance, Measurement, and Reporting>< This section shall specify and agree the availability of required services. Availability can be specified as percentage of time or as a period which is free from operational failures. This section shall specify clearly the availability specification for all Services as mentioned in Clause 5: Services Descriptions, and may be broken down by application, environment or categories specific to Agency requirements or Private Partner constraints >ExampleA good example is to specify this section in a table format where each service is assigned an operational period as agreed between the Parties or each service is assigned a percentage.< This section of the Agreement shall document specific times the Private Party requires service restrictions. These restrictions include provisions for normal system maintenance and details of unscheduled system downtime.>ExampleAvailability restrictions specific to the Services covered under this Agreement are as follows:[Holiday and Weekend Schedule][Scheduled Maintenance Windows][Unscheduled Maintenance Windows][Back up Window]7.3SERVICE MAINTENANCE< This section of the Agreement shall specify the Maintenance Windows for all services if applicable.To meet the Service Level expectations, maintenance is a must procedure. Maintenance will sometimes render the service unavailable to the public. It is a good practice to agree on these Maintenance Windows in the SLA as not to count them as unavailability.>ExampleIt is a good practice to specify for each service a table that sets out the maintenance periods. The periods can be specified as days, weeks, or months. This depends actually on the service itself and the need for maintenance.< This section shall establish the measurements to be used to make sure the optimal provision of services. Measurements can be defined in terms of service availability (i.e. uptime), service performance (i.e. throughput, response time) and service quality (i.e. number of unscheduled outages, customer surveys).>Example7.5SERVICE REQUESTS< This section of the Agreement shall establish the response by the Private Partner to the Agency based on an request submitted by the Agency. Reference to the service support policies, processes and related procedures may be included. Specific incident and/or request parameters, thresholds and/or samples may be inserted here for additional clarification. >Example:In support of services outlined in this Agreement, the Private Partner will respond to service related incidents and/or requests submitted by the Agency within the following time frames:•One (1) hour (during business hours) for issues classified asCritical.•Two (2) hours (during business hours) for issues classified as High priority.•Four (4) hours (during business hours) for issues classified as Medium priority.•Eight (8) hours (during business hours) for issues classified as Low priority.• Twenty Four (24) hours (during business hours) for a generalservice Request.< This section of the Agreement shall specify the reporting needed by the Private Partner to the Agency. Reporting is necessary to make sure that agreed service levels are maintained. These reports must align with the service measurements set forth described section 7.4 above and support these measurements. All recipients and responsible parties should be outlined with contact information.>ExampleThe following areresponsible for the deployment and ongoing support of this agreement: (contact information may include E-mail address, phone number, support line, pager, etc.)7.7 SERVICE LEVEL CREDITS<This section of the Agreement relates to the failure of the supplier/the basic partner to meet service levels which have been monitored and measured under the SLA, providing the customer a credit or rebate (“Service Credits”) if the supplier fails to meet certain defined thresholds. The Service Credits which are calculated by reference to the supplier's charges for providing the Service. However, Service Credits play a significant role in encouraging the right behavior between parties. If the service credits are set too low, the customer is likely to become frustrated by the basic partner/the supplier's failure to perform and to look for opportunities to terminate. If they are too high then the supplier might become overly focused on perform ing to the “letter of the contract”, rather than providing an overall service. The most rational approach is for service credits to be negotiated by reference to the risk and responsibility apportioned between the parties, rather than by reference to the basic partner/the supplier's profit. >7.8SERVICE CONTINUITY MANAGEMENT<This section of the Agreement contains service recovery plans and related details if required. This section should identify the requirements of Service Continuity Management including the time frame for restoring key business functions and the timeframe for restoring all business function.>< This section of the Agreement shall specify the documentation that is associated with this Agreement.>Example< This section of the Agreement addresses provisions to define the events that will trigger termination, other than termination of the PPP Contract in accordance with Section 2.4. For example, a persistent failure to meet the service levels over a period of time will give rise to a right of termination. It is common for services contracts to include a right of te rmination for “material” breach, however, this term is not always easy to define and may not introduce the level of certainty required. A “material breach” is subjective and will depend upon the terms and duration of the agreement, the nature and consequences of the breach and the factual background. It is likely that a “material” breach is something less than a repudiatory breach (giving rise to a right of termination under the general law) but, in the absence of a contractual definition, the materiality of a breach is difficult to measure. This will need to be negotiated on a case by case basis based on the relevant PPP Contract. ><This section of the Agreement encompasses standard terms and provisions which shall be included in each Agreement and are not subject to change.(a) Severability. If any provision of this Agreement is declared by a court of competent jurisdiction to be invalid or unenforceable, such determination shall not affect the validity or enforceability of any other provision hereof.(b) Entire Agreement. This Agreement, together with the PPP Contract, represents the entire agreement of the parties with respect to the subject matter hereof and any other previous understanding, commitments, or agreement, oral or written, between the Agency and the Private Partner with respect to the subject matter hereof.(c) Notices. Any notices given hereunder shall be given pursuant to and as provided in the PPP Contract.(d) Waiver. No failure by either party to insist upon the strict performance of any covenant, term or condition of this Agreement, or to exercise any right or remedy, shall constitute a waiver of such right or remedy on any subsequent occasion.(e) Governing Law. The validity, construction, scope and performance of this Agreement shall be governed by the laws of the Kingdom of Saudi Arabia, exclusive of its choice of law provisions.(f) Amendments. This Agreement may not be amended except in writing executed by duly authorized representatives of both the Agency and the Private Partner.(g) Assignment. This Agreement may not be assigned by either party except in connection with and under the circumstances permitted under the PPP Contract. Subject to the foregoing, this Agreement will be binding on the parties and their respective successors and permitted assigns.(h) Counterparts. This Agreement may be signed in one or more counterpart copies, all of which together shall constitute one Agreement and each of which shall constitute an original.><This section is the last section of the Agreement and it includes the signatories and date for each signatory.>Example__________________________ _____________________ Agency deputy Date__________________________ _____________________ Private Partner deputy Date。

【新教材】人教2019版高中英语选择性必修2第二册单词表带音标

【新教材】人教2019版高中英语选择性必修2第二册单词表带音标

新教材2019版人教版新课标高中英语选择性必修2Unit 1cholera[ˈkɒlərə]n霍乱severe[sɪˈvɪə]adj极为恶劣的;十分严重的;严厉的diarrhoea[ˌdaɪəˈrɪə]n腹泻dehydration[ˌdiːhaɪˈdreɪʃən]n脱水frustrated[frʌsˈtreɪtɪd]adj懊恼的;沮丧的;失意的once and for all最终地;彻底地contradictory[ˌkɒntrəˈdɪktəri]adj相互矛盾的;对立的;不一致的infection[ɪnˈfɛkʃən]n感染;传染infect[ɪnˈfɛkt]vt使感染;传染germ[ʤɜːm]n微生物;细菌;病菌subscribe[səbˈskraɪb]vi认购(股份);定期订购;定期交纳(会费)subscribe to同意;赞同proof[pruːf]n证据;证明;检验multiple[ˈmʌltɪpl]adj数量多的;多种多样的pump[pʌmp]n泵;抽水机;打气筒water pump[ˈwɔːtəpʌmp]水泵household[ˈhaʊshəʊld]n一家人;家庭;同住一所(套)房子的人suspect[ˈsʌspɛkt]v t&vi. 怀疑;疑有;不信任。

n犯罪嫌疑人;可疑对象blame[bleɪm]vt把……归咎于;责怪;指责。

n. 责备;指责handle[ˈhændl]n把手;拉手;柄。

vt. 处理;搬动;操纵(车辆、动物、工具等)intervention[ˌɪntə(ː)ˈvɛnʃən]n介入;出面;干涉link[lɪŋk]n联系;纽带。

vt. 把……连接起来;相关联raw[rɔː]adj未煮的;生的;未经处理的;原始的pure[pjʊə]adj干净的;纯的;纯粹的substantial[səbˈstænʃəl]adj大量的;价值巨大的;重大的decrease[ˈdiːkriːs]n减少;降低;减少量。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A Framework for Multi-objective SLA ComplianceMonitoringJoel Sommers∗,Paul Barford∗,Nick Duffield†,Amos Ron∗∗University of Wisconsin-Madison†AT&T Labs–ResearchAbstract—Service level agreements(SLAs)specify performance guar-antees made by service providers,typically in terms of packet loss,delay,delay variation,and network availability.While many tools have been developed to measure individual as-pects of network performance,there has been little work to directly address the issue of SLA compliance monitoring in an operational setting where accuracy,parsimony,and other related issues are of vital importance.This paper takes the following steps toward addressing this problem:(1)we introduce an architectural framework for integrating multiple discrete-time active measurement algorithms,an architecture that we call multi-objective monitoring;and(2),we introduce a new active measurement methodology to monitor the packet loss rate along a network path for determining compliance with specified performance targets which significantly improves accuracy over existing techniques.We present a prototype implementation of our monitoring framework,and demonstrate how a unified probe stream can consume lower overall bandwidth than if individual streams are used to measure different path properties.We demonstrate the accuracy and convergence properties of the loss rate monitoring capability of SLA M in a controlled laboratory environment using a range of background traffic scenarios and examine its accuracy improvements over existing techniques.I.I NTRODUCTIONIP networks have become indispensible to businesses,gov-ernments,and individuals,worldwide.Reflecting this impor-tance,it is increasingly common for service providers to offer transport-level performance guarantees using metrics such as packet loss,delay,and network network availability as part of their service level agreements(SLAs)[1]–[4].Meeting agreed-upon performance targets results in the collection of revenue for the service provider,whereas not meeting these objectives can result in credits and loss of revenue to the customer. Accurate network monitoring for the purpose of detecting compliance with performance goals is therefore critical to both parties.The problem of monitoring compliance with agreed-upon performance metrics is a key challenge of SLA engineering.A provider must design SLAs that can be accurately and efficiently monitored,while at the same time minimizing the possibility of non-compliance.For example,guaranteeing a very low loss rate might be possible only if loss rates can be estimated in a lightweight way with sufficiently high confidence.While passive measurements(e.g.,SNMP MIB counters)may provide adequate accuracy for a metric such as loss on a link-by-link basis,they are insufficient for estimating the actual performance experienced by customer traffic(e.g.,due to dynamic routing changes or hardware failures).Thus, although there are situations where active measurements may be too heavyweight or may yield inaccurate results[5]–[7], they nonetheless remain a key mechanism for SLA compliance monitoring.In this paper,we address the following question:can SLA compliance be accurately monitored with a single lightweight probe stream?There have been a number of active measure-ment tools and methodologies proposed over the years to estimate transport-level performance characteristics.Even so, there has been little work to directly address the problem of SLA compliance monitoring.In this context,measurement tool accuracy,parsimony,ability to report confidence bounds,and ability to quickly adapt to changing network conditions are of great importance.Thefirst contribution of this work is the introduction of a framework for integrating multiple discrete time-based active measurement algorithms.Modules for estimating individual path characteristics interact with a central probe scheduler such that a given probe may be used for multiple purposes.The result is a unified probe stream that can consume lower overall bandwidth than if individual streams are used.Moreover, each module operates independently,thus preserving desirable statistical and accuracy properties for each estimation method. We describe the implementation of our framework in a tool called SLA M(SLA M onitor).The second contribution of this paper is the introduction of a new active measurement methodology for estimating end-to-end packet loss rate.Starting from the geometric probe methodology described in[7],we develop a heuristic technique for estimating packet loss rate along a path that significantly improves accuracy over existing approaches.We implement this new methodology as a SLA M module.We demonstrate the properties of SLA M in a controlled laboratory environment using a range of background traffic scenarios.We compare SLA M’s loss estimation accuracy with both Poisson and periodic streams of the same rate,and exam-ine the convergence and robustness of SLA M loss estimates. Our experiments reveal that SLA M estimates the end-to-end loss rate with high accuracy and with good confidence bounds. For example,in a scenario using self-similar background traffic,the true loss rate over a15minute period is0.08% and the SLA M estimate is0.07%.In contrast,Poisson and periodic methods for estimating loss rate have errors of more than two orders of magnitude.II.R ELATED W ORKWhile many details of SLAs are considered proprietary, general aspects and structure of SLAs are discussed in[1], [8].Performance guarantees associated with SLAs range from network path availability,to transport-related metrics such as packet loss,to application-specific metrics such as web response times and voice stream quality.Such guarantees may be based on various statistics of the given metric,such as the mean,median,or a high quantile such as the95th percentile, computed over various time scales.Examples of the types of performance assurances offered by commercial providers are available online[2]–[4].To ensure that SLA performance targets are met with high probability,service providers collect measurements either passively within the network,by injecting measurement probes into the network,or by using a combination of both[9]–[12].While active measurement-based compliance monitoring has received some attention in the past,e.g.,[9],there has been little validation in realistic environments where a reliable basis for comparison can be established.Furthermore,practical issues such as balancing the impact of measurement tools on the network with estimation accuracy have seen less atten-tion.Our work also takes an active measurement approach, introducing a framework for simultaneous,or multi-objective, measurement of transport-level performance metrics which can reduce the overall impact of the measurement process. We further differentiate our work through validation in a controlled,realistic testbed.There has been a great deal of work on the problem of measuring end-to-end packet loss,e.g.,[13]–[20].While there has been limited work addressing the accuracy of common measurement approaches,exceptions are found in[5]–[7].The issue of accuracy clearly has serious implications for SLA compliance monitoring.III.M ULTI-OBJECTIVE P ROBINGIn this section,we introduce an architectural framework for integrating multiple discrete-time active measurement algo-rithms in a single probe scheduler to provide simultaneous estimation different network path properties.Consider an ISP that wishes to monitor packet loss using the algorithm of[7],and simultaneously monitor packet delay and delay variation.Assume that the packet delay and delay variation algorithms operate in discrete time.A typical ap-proach is to use three separate probe streams for monitoring these properties.However,since these algorithms operate in discrete time we may take advantage of the fact that they may send probes at the same time slot.We can accommodate such requests by tagging probes according to the estimator to which they apply.The effect is that a single probe packet may be used for multiple estimation objectives,thereby reducing overall impact of measurement traffic on the network.This is the intuition behind multi-objective probing.The basic architectureof our multi-objective probe sched-uler is depicted in Figure1.The central component of the architecture is a scheduler operating in discrete time thattimeFig.1.Multi-objective probe scheduler architecture.Algorithmic modules interact with a generic discrete-time probe scheduler to perform estimation of delay,delay variation,loss characteristics,or other properties of interest. provides callback and probe scheduling mechanisms.Indepen-dent probe modules interact with the scheduler to implement particular estimation algorithms, e.g.,B ADABING[7]Our probe scheduler design allows for logical separation among multiple,simultaneously operating measurement methods and for optimizations of network bandwidth.We implemented this architecture in a tool called SLA M(SLA M onitor).SLA M sends UDP packets in a one-way manner between a sender and receiver.The scheduler consists of about1,500lines of C++.Two important implementation decisions were made in the SLA M probe sender.First,the scheduler must accommodate estimation techniques that use multi-packet probes,such as B ADABING[7]which uses them to obtain an improved esti-mate of instantaneous congestion.Second,the scheduler must arbitrate among probe modules that may use different packet sizes.At present,the smallest packet size scheduled to be sent at a given time slot is used.For example,suppose three packets of size600bytes have been scheduled to be sent at time slot i for loss estimation and that one packet of size100bytes has also been scheduled for the same time slot i for delay estimation.When time slot i arrives,the scheduler will send a sequence of three packets of sizes100,600,and600bytes.Thefirst packet will tagged for delay estimation,and all three packets will be tagged for loss estimation.At the receiver(assuming these packets are not lost in transit),the delay estimator module will receive one packet of size100bytes,and the loss estimator module will receive three packets of sizes100,600,and600bytes. We discuss implications of these implementation decisions in Section V.IV.P ACKET L OSS R ATE M ONITORING M ETHODOLOGY We now describe the basic assumptions and method for estimating packet loss rate along an end-to-end path.Our objective is to develop an accurate,robust estimator based on a discrete-time probe process to be implemented as a module of SLA M.The methodology described in[7]was shown to yield accu-rate estimates of congestion event frequency( F)and duration ( D)along an end-to-end path.It was noted that the primary difficulty in estimating end-to-end packet loss rate(number of lost packets divided by total number of packets over agiven time interval)—the loss performance metric specified in SLAs—is that it is unclear how to measure demand along the path,particularly during congestion periods.Therefore,we propose the following heuristic approach.Starting from the geometric probe stream in[7],which initiates a probe pair at a given time slot with probability p loss, we measure the loss rate l of the probes during congestion episodes.Since the estimation techniques in[7]do not directlyidentify individual congestion episodes we take an empirical approach,treating consecutive probes in which at least one packet is lost as indication of a congestion episode.As in[7], we assume that the end-to-end loss rate L is stationary and ergodic.Given an estimate of the frequency of congestion F, we estimate the end-to-end loss rate asL= F l.The key assumption of this heuristic is that we treat the probe stream as a markerflow,namely,that the loss rate observed by thisflow has a meaningful relationship to other flows along the path.As a basis for this assumption,we note that the probes in[7]consist of multiple packets(3by default),which has some similarity to a TCP stream where delayed ACKs cause a sender to release two very closely-spaced packets.While we do not claim that the probe stream is,in general,the same as a TCP stream,our results below demonstrate that such an assumption may be reasonable in this context.Finally,we note that using previous work which analyzed the variance of the frequency estimator,we can similarly derive confidence intervals on this loss rate estimator(details omitted due to space constraints)[21].V.SLA M E VALUATIONWe now describe the experimental evaluation of SLA M in a controlled laboratory environment.In our experiments,we fixed the SLA M loss rate module with parameter p loss=0.3 and packet sizes of600bytes,unless otherwise specified. These settings were found to give good loss characteristic estimates[7].We verified the results regarding the setting of the parameter p loss but omit detailed results in this paper. A.Testbed and Traffic ScenariosOur laboratory testbed,depicted in Figure2,consisted of commodity workstation end hosts and commercial IP routing systems configured in a dumbbell-like topology.We used 10workstations on each side of the topology for producing background traffic and one workstation at each side to run SLA M.Each workstation has a Pentium4processor running at 2GHz or better,with at least1GB RAM and an Intel Pro/1000 network interface card and was configured to run either FreeBSD5.4or Linux2.6.The SLA M hosts were configured with a default installation of FreeBSD5.4.Background traffic and probe trafficflowed over separate paths through a Cisco 6500enterprise router(hop A)and was multiplexed onto a bottleneck OC3(155Mb/s)link at a Cisco GSR12000(hop B).Packets exited the OC3via another Cisco GSR12000hop identifier A B C Dboratory testbed.Probes and cross traffic are multiplexed onto a bottleneck OC3(155Mb/s)link.Synchronized Endace DAG monitors are used to collect traces for calculation of true loss and delay values.(hop C)and passed to receiving hosts via a Cisco6500(hop D).NetPath[22]is used between hops C and D to emulate propagation delays for the background traffic hosts in the testbed.We used a uniform distribution of delays with a mean of50msec,minimum of20msec,and maximum of80msec. The bottleneck output queue at the Cisco GSR at hop B was configured to perform tail drop with a maximum of624 packets of size1500bytes,or about50msec of buffer space at155Mb/s.The SLA M workstations were synchronized to a Stratum0NTP server configured with a TrueTime GPS card. We used the synchronization software developed by Corell et al.[23]to provide accurate timestamps for SLA M.All management traffic for the systems in Figure2flowed over a separate network(not pictured in thefigure).An important aspect of our testbed is the ability to establish a reliable“ground truth”for our experiments.Optical splitters were attached to the links between hops A and B and to the link between hops B and C and synchronized Endace DAG4.3 (Gigabit Ethernet)and3.8(OC3)passive monitoring cards were used to capture packet traces entering and leaving the bottleneck node.By comparing packet header information,we were able to identify which packets were lost at the congested output queue during experiments.We used four background traffic scenarios in our experi-ments.For thefirst scenario,we used Iperf[24]to produce constant-bit rate(CBR)UDP traffic for creating a series of approximately constant duration(about65msec)loss episodes that were spaced randomly at exponential intervals with mean of10seconds over a10minute period.The second scenario consisted of100long-lived TCP sources run over a10minute period.For thefinal two scenarios,we used Harpoon[25] with a heavy-tailedfile size distribution to create self-similar traffic approximating a mix of web-like and peer-to-peer traffic commonly seen in today’s networks.We used two different offered loads of60%and75%of the bottleneck OC3. Experiments using the self-similar traffic scenario were run for 15minutes.For all scenarios,we discarded thefirst30and last 30seconds of the traces.Note that the SLA M parameters used in our experiments result in only about0.3%of the bottleneck OC3consumed for measurement traffic.B.Multi-Objective Probing EvaluationWefirst evaluate the bandwidth savings that can arise due to multi-objective probing.As we noted in Section III,if multiple probe modules each wish to send a probe at a given time slot,the smallest packet size of each of the modules is used.An effect of this implementation decision is that the overall bandwidth requirement for the multi-objective stream may be less than the aggregate bandwidth requirement for individual probe modules,were they to be used separately.Assume that we wish monitor packet loss rate using the algorithm described in Section IV.Assume also that we wish to send afixed-rate periodic probe stream for monitoring,e.g., delay or delay variation.We set the probe packet sizes at600 bytes for the loss probe and100bytes for the periodic probe. We compare probe rates using two different parameter sets:in parameter set A,p loss is0.3and the periodic probe interval is 100milliseconds,and for parameter set B,p loss is0.2and the periodic probe interval is20milliseconds.Table I shows the results for these experiments.The table shows,for example, that for parameter set A,the the loss probe stream is separately about345Kb/s,and the delay probe stream is about40Kb/s: a sum of385Kb/s.With SLA M,the probe stream is about 297Kb/s,a savings of23%.While the savings is parameter dependent(as shown in the table),there are clearly obtainable bandwidth savings.TABLE IE XAMPLES OF AVERAGE BANDWIDTH REQUIREMENTS FOR INDIVIDUAL MEASUREMENT METHODS AND FOR MULTI-OBJECTIVE PROBE STREAM. T HE DISCRETIZATION TIME INTERVAL IS SET TO5MILLISECONDS,AND PROBE PACKET SIZES ARE CHOSEN TO BE600BYTES FOR THE LOSS PROBE AND100BYTES FOR A PERIODIC PROBE STREAM.F ORPARAMETER SET A,p loss IS SET TO0.2AND THE PERIODIC PROBE INTERVAL IS SET TO20MILLISECONDS.F OR PARAMETER SET B,p loss IS SET TO0.3AND THE PERIODIC PROBE INTERVAL IS SET TO100MILLISECONDS.A LL VALUES ARE IN K B/S.Parameter Loss Periodic Sum(separate SLA M Savingsset stream streams)A3454038529788(23%)B489849747423(5%)C.Loss Rate Estimation AccuracyWe now examine the accuracy of the loss rate estimates for SLA M,comparing SLA M’s accuracy with standard Poisson-modulated[20]and periodic streams of the same rate as the SLA M stream.Table II compares the true loss rate measured using the passive traces with the loss rate estimates of SLA M and the Poisson and periodic probe streams.Values are shown for each of the four traffic scenarios and are average loss rates over the duration of each experiment.Note that differences in true values are due to inherent variability in traffic sources. We see that for all four scenarios,the Poisson and periodic streams yield very poor estimates of the true loss rate.In all but one case,the estimates are off by more than two orders of magnitude—a significant relative error.In fact,the Poisson and periodic estimates are generally close to zero—a phenomenon consistent with earlier experiments[7]and primarily due to the fact that single packet probes generally yield poor indications of congestion along a path.(Note that these accuracy improvements are consistent with experiments described in[7].)The estimates produced by SLA M are significantly better,with a maximum relative error in the caseof the CBR background traffic.Both SLA M loss rate estimatesfor the self-similar background traffic have relative errors of about10%or less.TABLE IIC OMPARISON OF LOSS RATE ESTIMATION ACCURACY FOR SLA M,P OISSON,AND PERIODIC PROBE STREAMS.V ALUES ARE AVERAGE LOSS RATES OVER THE FULL EXPERIMENT DURATION.Probe stream→SLA M Poisson periodic Traffic scenario↓true estimate true estimate true estimate CBR0.00510.00730.00510.00170.00510.0017 Long-lived TCP0.01630.01890.01630.00620.01630.0050 Harpoon self-similar0.00080.00070.00170.00000.00180.0000 (60%load)Harpoon self-similar0.00490.00500.00550.00000.00600.0011 (75%load)D.Robustness of Loss EstimationEstimation accuracy over relatively long time periods(e.g.,10minutes)is clearly desirable from the standpoint of SLA compliance monitoring.Also important are the dynamic prop-erties of an active measurement estimator,i.e.,how well the method adapts to changing network conditions and how quickly the estimator converges to the average path state.In this section,we examine the time varying nature of the SLA M estimates for packet loss.Figure3shows the true loss rate and SLA M-estimated loss rate over the duration of experiments using long-lived TCP traffic(top)and self-similar traffic at60%offered load (bottom).As above,true loss rate estimates are shown for10 second intervals and estimates for SLA M are shown for30 second intervals.Results for CBR traffic are not shown but are consistent with plots in Figure3.The upper and lower bars for SLA M indicate estimates of one standard deviation above and below the mean using the variance estimates derived from[21].For the SLA M estimates we see the narrowing of variance bounds as an experiment progresses,and that the true loss rate is,with few exceptions,within these bounds.We also see that SLA M tracks the loss rate over time quite well,withits estimated mean closely following the true loss mean.VI.D ISCUSSION AND C ONCLUSIONSSLA monitoring is of significant interest to both customers and providers to ensure that the network is operating within acceptable bounds.This paper introduces a new frameworkfor multi-objective SLA compliance monitoring using active measurements and introduces a new method for measuring end-to-end packet loss rate.We implemented the probing framework and loss rate methodology in a tool called SLA M and evaluated the tool in a controlled laboratory setting.Our results demonstrate the bandwidth savings that can result dueto multi-objective probing.Our results also show that SLA M packet loss rate estimates are much more accurate than loss rate estimates obtained through standard periodic or Poisson probe streams,and that these standard techniques may notqqq qqq qq qq q qq q q qq qq q q qq q q q q q q q q q q q q q q q qq q q q q q q q q q q q q q q 1002003004005000.0000.0100.0200.030time (seconds)l o s s r a t e−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−qtrue loss rate SLAm estimateqqqq q qqq q q q qq q q q q q q q q q q q qq q q q qq q q qq q q qqq q q q q q q q q qq q q qq qq q qq q q qq qq qq q qq qqq qq qq qq qqqq q02004006008000.0000.0050.0100.0150.020time (seconds)l o s s r a t e−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−qtrue loss rate SLAm estimateparison of true loss rate with SLA M estimates over time.True loss rates are plotted using 10second intervals.SLA M estimates are plotted using 30second intervals.Plots shown for long-lived TCP (top)and self-similar traffic at 60%offered load (bottom)traffic scenarios.The upper and lower bars for SLA M indicate estimates of one standard deviation above and below the mean using the variance formulation of [21].provide an accurate estimate of the state of the network,thereby preventing an accurate assessment of SLA compliance.Furthermore,we illustrated the convergence and robustness properties of the loss rate estimates of SLA M which make it useful in an operational setting.We believe that SLA M represents a significant step toward accurate,low-impact SLA compliance monitoring using active measurements.However,there are a number of issues that this work does not address.First,there are several other end-to-end properties of interest for SLA compliance monitoring such as delay and delay variation.We intend to enhance SLA M to estimate these characteristics in the future.Second,our focus is on monitoring in the context of a single end-to-end path.In a typical operational settings,however,a network consisting of many links and paths must be monitored.In this context,a deployment strategy must be developed to coordinate probe streams so that links internal to the network are not carrying “too much”measurement traffic.A detailed analysis of this issue is a focus of future work.Next,our validation and calibration of SLA M is performed in a controlled laboratory environment.This setting incorporates many realistic aspects of live networks,including commercial IP routers,commodity workstations and a range of traffic conditions,and provides the critical ability to compare SLA M output with “ground truth”.Performance tests with SLA M in the live Internet are also a subject of future work.Another key question is the following:given a daily (or based on some other time scale)budget of probes that may be used to monitor compliance with a SLA,what are the considerations for optimizing the probe process?Should the probing period be over a relatively long time scale(e.g.,the entire interval of interest),thus potentially limitingthe accuracy of estimates,or should the probing period be over a shorter time scale,potentially improving estimation accuracy but at the cost of not probing over the entire interval,thus potentially missing important events?We intend to consider this issue in future work.R EFERENCES[1] A.Shaikh and A.Greenberg,“Operations and Management ofIP Networks:What Researchers Should Know.Tutorial Ses-sion,ACM SIGCOMM ’05./∼albert/sigcomm05-greenberg-shaikh-tute.pdf,August,2005.”[2]“Sprint NEXTEL service level agreements,”/business/support/serviceLevelAgreements.jsp,2006.[3]“AT&T Managed Internet Service (MIS),”http://new.serviceguide.att.com/mis.htm,2006.[4]“NTT Communications Global IP Network Service Level Agreement(SLA),”/products/sla/sla ts.cfm,2006.[5]M.Roughan,“Fundamental bounds on the accuracy of network perfor-mance measurements,”in ACM SIGMETRICS ,June 2005.[6]P.Barford and J.Sommers,“Comparing probe-and router-based packetloss measurements,”IEEE Internet Computing ,September/October 2004.[7]J.Sommers,P.Barford,N.Duffield,and A.Ron,“Improving accuracyin end-to-end packet loss measurement,”in Proceedings of ACM SIG-COMM ’05,2005.[8]J.Martin and A.Nilsson,“On service level agreements for IP networks,”in IEEE INFOCOM 2002,vol.2,2002.[9]L.Ciavattone,A.Morton,and G.Ramachandran,“Standardized activemeasurements on a tier 1IP backbone,”IEEE Communications ,vol.41,no.6,pp.90–97,June 2003.[10]T.Zseby,“Deployment of sampling methods for SLA validation withnon-intrusive measurements,”in Proceedings of Passive and Active Measurement Workshop ,2001.[11]M.Chan,Y .Lin,and X.Wang,“A scalable monitoring approach forservice level agreements validation,”in IEEE International Conference on Network Protocols (ICNP),2000,pp.37–48.[12]M.Aida,N.Miyoshi,and K.Ishibashi,“A scalable and lightweightQoS monitoring technique combining passive and active approaches,”in Proceedings of IEEE INFOCOM ’03,March 2003.[13]J.Bolot,“End-to-end packet delay and loss behavior in the Internet,”inProceedings of ACM SIGCOMM ’93,San Francisco,September 1993.[14] A.Pasztor and D.Veitch,“A precision infrastructure for active probing,”in Passive and Active Measurement Workshop ,2001.[15]Y .Zhang,N.Duffield,V .Paxson,and S.Shenker,“On the constancy ofInternet path properties,”in Proceedings of ACM SIGCOMM Internet Measurement Workshop ’01,San Francisco,November 2001.[16]M.Yajnik,S.Moon,J.Kurose,and D.Towsley,“Measurement andmodeling of temporal dependence in packet loss,”in Proceedings of IEEE INFOCOM ’99,New York,NY ,March 1999.[17]V .Paxson,“Measurements and analysis of end-to-end Internet dynam-ics,”Ph.D.dissertation,University of California Berkeley,1997.[18]Internet Protocol Performance Metrics,“/ippm/index.html,”2006.[19]V .Paxson,G.Almes,J.Mahdavi,and M.Mathis,“Framework for IPperformance metrics,”IETF RFC 2330,1998.[20]G.Almes,S.Kalidindi,and M.Zekauskas,“A one way packet lossmetric for IPPM,”IETF RFC 2680,September 1999.[21]J.Sommers,P.Barford,N.Duffield,and A.Ron,“A geometric ap-proach to improving active packet loss measurement,”December 2005,submitted to ACM/IEEE Transactions on Networking.[22]S.Agarwal,J.Sommers,and P.Barford,“Scalable network pathemulation,”in Proceedings of IEEE MASCOTS ’05,September 2005.[23] E.Corell,P.Saxholm,and D.Veitch,“A user friendly TSC clock,”in Proceedings of Passive and Active Measurement Conference ,March 2006.[24] A.Tirumala, F.Qin,J.Dugan,J.Ferguson,and K.Gibbs,“Iperf1.7.0–the TCP/UDP bandwidth measurement tool,”/Projects/Iperf,2006.[25]J.Sommers and P.Barford,“Self-configuring network traffic gen-eration,”in Proceedings of ACM SIGCOMM Internet Measurement Conference ’04,2004.。

相关文档
最新文档