[2008]Attribute-Based content distribution with hidden policy
【计算机应用】_调用方法_期刊发文热词逐年推荐_20140727
科研热词 面向方面编程 聚类分析 系统调用 图形用户界面 vb 面向服务的架构 面向服务架构 面向接口编程 静态分析 钩子 遗传算法 进程 软硬件协同综合 软硬件划分 软件测试 资源环境模型 调度命令系统 访问控制 行为分析 虚拟现实 虚拟机 自定义标签 绘图 空间分析 移动agent 神经网络 硬件透明编程模型 硬件方法 界面操作 生存性分析系统 物流实验室 漏洞扫描 消息格式转换 测试用例生成 测试用例修复 流媒体共用讨论板 水平井 横切关注点 模型集成 模型 标签额外信息类 标签处理程序 权能模块 服务发现 有色petri网 曲线拟合 映射文件 方面挖掘 文件监控 整合 数据挖掘 数据拟合
2010年 序号 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52
2009年 序号 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
ISA-2008
ISA 优化配置学校校园网功能(2008-04-12 14:26:00)转载标签:分类:windows serveritMicrosoft Internet Security and Acceleration (ISA) Server是微软公司2001年发布的一款功能强大的高级应用程序层防火墙,虚拟专用网络 (VPN) 和 Web 缓存解决方案.目前,用的最多的版本是ISA Server 2004 ,许多学校都应用它建立了校园网的防火墙.不过,相当多的学校只是应用当初刚安装时所提供的一小部分功能,白白浪费掉了ISA其它方面的强大功能,为了更好的管理和安全,我们做了一些有益的探索,与大家共勉.为了更好的使ISA2004发挥更大作用,我选用了Windows 2003+Microsoft ISA 2004 Server,本文就学校日常常遇到的几个问题,谈谈ISA在学校应用中的几个功能,希望你能从中得到启发,把学校网络维护的更好.一 ,在ISA SERVER本机配置上网ISA SERVER2004安装后,默认不允许任何连接,可以通过5个预定义的网络模板向导快速进行配置,方法不再重复,但是对于HTTP访问,还有一个URL限制,默认情况下,ISA只允许*等三个网站才可以安全访问,若要进行其它站点的访问,必须手动添加新的URL站点,方法如下:1,选择"防火墙策略",在右侧工具箱选择网络对象,点击"新建"-"URL"集,名称任意取(本例假设取名为"permit all"),在URL集包含的URL中输入http://* ).2,选择"防火墙策略"右侧的任务,点击"编辑系统策略",在"不同的"组下面选择"允许的站点",右栏中选择"到",然后点击"填加",选择"URL"集中的"permit all",然后确定,如图所示.应用就可以上网了.3,许多时候,我们都用ISA 发布自己的WEB服务器,配置完成后,外部主机都可以访问,自己却不能访问,不是已经修改过"URL集"了吗为什么内部主机还是不能访问自己发布的WEB等服务,原因是ISA服务器上配置WEB服务器,内网对防火墙上WEB等服务的访问也受控于防火墙安全策略,标准模块创建的访问策略中只有内部到外部的安全策略允许,但"外部"定义中并不包括自己,因此,应该修改防火墙的出站策略,将"到"也运用到本机.如图所示.二,利用ISA,代理上网通常情况下,想做代理服务,需要有两个独立的网卡,而使用ISA,我们只要有一个INTERNET 出口的情况下,就可以为其做代理服务.1.在ISA Server2004的管理控制台中,鼠标右键单击"防火墙策略"-"新建"-"服务器发布规则",在向导对话框中输入"PROXY server"名称2.输入"服务器IP地址",这里我们输入内网的IP地址192.168.0.1,在选择协议页,选择"http,https",用户选择"所有用户".在IP地址页选中"外部(所有IP)".完成发布.3.选择"配置"-"网络",双击"内部",在"内部属性"页中进入"WEB代理",确保"启用WEB代理客户"和"启用HTTP"被选中,同时"HTTP端口"号为"8080",然后确定返回.4.在需要使用代理的客户机上,设置IE浏览器的"工具"-"INTERNET选项"-"连接"-"局域网设置",在"代理服务器"下的为LAN使用代理服务器,并且在地址字段后面输入"192.168.0.1"端口为"8080".三,控制师生员工上网权限大家都知道,除非是特殊行业,否则学校不会允许员工无限制,无限时的上网的,因此,我们需要分别对待:行政管理人员与计算机技术人员全天候上网部分老师只在特定的时间段上网其实要实现以上的功能,我们只需要用同样的方法建立几个不同的用户组即可.再分别根据不同的需要设置不同的访问规则.1,我们先来分别建立"行管和计算机组",在防火墙策略选项的右边工具栏中,选择用户对象,再在其下表中选择新建用户,在"用户集名称"中输入用户名,再分别根据需要选择相应的域帐号或组,即可完成帐号的建立.2,建立访问规则来控制师生上网权限,我们为防火墙策略新添加了名称为"教师限时上网"的规则,内容是这样的:所有内部的网络(安装ISA时设定的地址范围和本地主机)访问外部网络.用户只能选择"教师"组,在计划中我们选择"上班时间",如图所示,具体配置步骤略.3,同样的办法,设置"行管组和计算机专业人员"全部时间段访问策略.四,使用访问规则来禁止学生对某些网站的访问1, 我们来建立要禁止网站的域名集,在防火墙策略选项的右边工具栏中,选择网络对象,再在其下表中选择新建一个域名集.下来的工作就是把我们要禁止掉的一些网站的域名输入到这个集中.在实际的工作中,我们是不断的积累和完善这个集合,特别是在防止访问含有木马,病毒的网站中往往能及时的补救过来,把危险降低到最低程度.建立的集合如下图所示.2,我们为防火墙策略新添加了名称为禁止上某一网站的规则,内容是这样的:拒绝所有受保护的网络(安装ISA时设定的地址范围和本地主机)访问被我们禁止的网站.这些站点主要考虑不健康网站或可能带木马网页的网页,为了安全我们不让客户端访问.如图6所示,具体配置步骤略.五,禁止公用机房上外部网站,只上校园网比如说我们在学校机房上课的时候,或者学生在电子阅览室都只能访问校内资源等.这时都需要做这种设置,以节约和保护学校有限的网络带宽.现在我们在网络对象中新建一个URL 集,只要求我们客户端上校园网络,在这里我们的校园网址为:,在这里我们的URL集建立办法前面已经介绍过了.在建立访问网络规则前,我们还需定义一个公用机房的网络.这里我们以"STUDENT"为例来加以说明.在防火墙策略选项的右边工具栏中,选择网络对象,再在其下表中选择新建一个网络,在打开的向导对话框中先命名为"student",接下来输入公网的IP地址集合,这里我们输入我校机房学生IP地址:192.168.5.1-192.168.5.255和192.168.6.1-192.168.6.255.完成后属性如下图所示.下来我们还要建立一个名为访问校园网的规则:即只允许公用机房客户端student能通过出站通讯来访问我们的校园网内部资源.如果要访问外部资源,只必须要通过身份验证.具体步骤略.Win7中IIS7和ASP的安装配置和使用有些高端用户也许会用到IIS,Win7和Vista一样都内置了最新的IIS7,那么ISS7要如何安装配置和使用呢?在IIS7下ASP又该如何配置呢?本站整理了相关操作步骤,如下。
Multicamera People Tracking with a Probabilistic Occupancy Map
Multicamera People Tracking witha Probabilistic Occupancy MapFranc¸ois Fleuret,Je´roˆme Berclaz,Richard Lengagne,and Pascal Fua,Senior Member,IEEE Abstract—Given two to four synchronized video streams taken at eye level and from different angles,we show that we can effectively combine a generative model with dynamic programming to accurately follow up to six individuals across thousands of frames in spite of significant occlusions and lighting changes.In addition,we also derive metrically accurate trajectories for each of them.Our contribution is twofold.First,we demonstrate that our generative model can effectively handle occlusions in each time frame independently,even when the only data available comes from the output of a simple background subtraction algorithm and when the number of individuals is unknown a priori.Second,we show that multiperson tracking can be reliably achieved by processing individual trajectories separately over long sequences,provided that a reasonable heuristic is used to rank these individuals and that we avoid confusing them with one another.Index Terms—Multipeople tracking,multicamera,visual surveillance,probabilistic occupancy map,dynamic programming,Hidden Markov Model.Ç1I NTRODUCTIONI N this paper,we address the problem of keeping track of people who occlude each other using a small number of synchronized videos such as those depicted in Fig.1,which were taken at head level and from very different angles. This is important because this kind of setup is very common for applications such as video surveillance in public places.To this end,we have developed a mathematical framework that allows us to combine a robust approach to estimating the probabilities of occupancy of the ground plane at individual time steps with dynamic programming to track people over time.This results in a fully automated system that can track up to six people in a room for several minutes by using only four cameras,without producing any false positives or false negatives in spite of severe occlusions and lighting variations. As shown in Fig.2,our system also provides location estimates that are accurate to within a few tens of centimeters, and there is no measurable performance decrease if as many as20percent of the images are lost and only a small one if 30percent are.This involves two algorithmic steps:1.We estimate the probabilities of occupancy of theground plane,given the binary images obtained fromthe input images via background subtraction[7].Atthis stage,the algorithm only takes into accountimages acquired at the same time.Its basic ingredientis a generative model that represents humans assimple rectangles that it uses to create synthetic idealimages that we would observe if people were at givenlocations.Under this model of the images,given thetrue occupancy,we approximate the probabilities ofoccupancy at every location as the marginals of aproduct law minimizing the Kullback-Leibler diver-gence from the“true”conditional posterior distribu-tion.This allows us to evaluate the probabilities ofoccupancy at every location as the fixed point of alarge system of equations.2.We then combine these probabilities with a color and amotion model and use the Viterbi algorithm toaccurately follow individuals across thousands offrames[3].To avoid the combinatorial explosion thatwould result from explicitly dealing with the jointposterior distribution of the locations of individuals ineach frame over a fine discretization,we use a greedyapproach:we process trajectories individually oversequences that are long enough so that using areasonable heuristic to choose the order in which theyare processed is sufficient to avoid confusing peoplewith each other.In contrast to most state-of-the-art algorithms that recursively update estimates from frame to frame and may therefore fail catastrophically if difficult conditions persist over several consecutive frames,our algorithm can handle such situations since it computes the global optima of scores summed over many frames.This is what gives it the robustness that Fig.2demonstrates.In short,we combine a mathematically well-founded generative model that works in each frame individually with a simple approach to global optimization.This yields excellent performance by using basic color and motion models that could be further improved.Our contribution is therefore twofold.First,we demonstrate that a generative model can effectively handle occlusions at each time frame independently,even when the input data is of very poor quality,and is therefore easy to obtain.Second,we show that multiperson tracking can be reliably achieved by processing individual trajectories separately over long sequences.. F.Fleuret,J.Berclaz,and P.Fua are with the Ecole Polytechnique Fe´de´ralede Lausanne,Station14,CH-1015Lausanne,Switzerland.E-mail:{francois.fleuret,jerome.berclaz,pascal.fua}@epfl.ch..R.Lengagne is with GE Security-VisioWave,Route de la Pierre22,1024Ecublens,Switzerland.E-mail:richard.lengagne@.Manuscript received14July2006;revised19Jan.2007;accepted28Mar.2007;published online15May2007.Recommended for acceptance by S.Sclaroff.For information on obtaining reprints of this article,please send e-mail to:tpami@,and reference IEEECS Log Number TPAMI-0521-0706.Digital Object Identifier no.10.1109/TPAMI.2007.1174.0162-8828/08/$25.00ß2008IEEE Published by the IEEE Computer SocietyIn the remainder of the paper,we first briefly review related works.We then formulate our problem as estimat-ing the most probable state of a hidden Markov process and propose a model of the visible signal based on an estimate of an occupancy map in every time frame.Finally,we present our results on several long sequences.2R ELATED W ORKState-of-the-art methods can be divided into monocular and multiview approaches that we briefly review in this section.2.1Monocular ApproachesMonocular approaches rely on the input of a single camera to perform tracking.These methods provide a simple and easy-to-deploy setup but must compensate for the lack of 3D information in a single camera view.2.1.1Blob-Based MethodsMany algorithms rely on binary blobs extracted from single video[10],[5],[11].They combine shape analysis and tracking to locate people and maintain appearance models in order to track them,even in the presence of occlusions.The Bayesian Multiple-BLob tracker(BraMBLe)system[12],for example,is a multiblob tracker that generates a blob-likelihood based on a known background model and appearance models of the tracked people.It then uses a particle filter to implement the tracking for an unknown number of people.Approaches that track in a single view prior to computing correspondences across views extend this approach to multi camera setups.However,we view them as falling into the same category because they do not simultaneously exploit the information from multiple views.In[15],the limits of the field of view of each camera are computed in every other camera from motion information.When a person becomes visible in one camera,the system automatically searches for him in other views where he should be visible.In[4],a background/foreground segmentation is performed on calibrated images,followed by human shape extraction from foreground objects and feature point selection extraction. Feature points are tracked in a single view,and the system switches to another view when the current camera no longer has a good view of the person.2.1.2Color-Based MethodsTracking performance can be significantly increased by taking color into account.As shown in[6],the mean-shift pursuit technique based on a dissimilarity measure of color distributions can accurately track deformable objects in real time and in a monocular context.In[16],the images are segmented pixelwise into different classes,thus modeling people by continuously updated Gaussian mixtures.A standard tracking process is then performed using a Bayesian framework,which helps keep track of people,even when there are occlusions.In such a case,models of persons in front keep being updated, whereas the system stops updating occluded ones,which may cause trouble if their appearances have changed noticeably when they re-emerge.More recently,multiple humans have been simulta-neously detected and tracked in crowded scenes[20]by using Monte-Carlo-based methods to estimate their number and positions.In[23],multiple people are also detected and tracked in front of complex backgrounds by using mixture particle filters guided by people models learned by boosting.In[9],multicue3D object tracking is addressed by combining particle-filter-based Bayesian tracking and detection using learned spatiotemporal shapes.This ap-proach leads to impressive results but requires shape, texture,and image depth information as input.Finally, Smith et al.[25]propose a particle-filtering scheme that relies on Markov chain Monte Carlo(MCMC)optimization to handle entrances and departures.It also introduces a finer modeling of interactions between individuals as a product of pairwise potentials.2.2Multiview ApproachesDespite the effectiveness of such methods,the use of multiple cameras soon becomes necessary when one wishes to accurately detect and track multiple people and compute their precise3D locations in a complex environment. Occlusion handling is facilitated by using two sets of stereo color cameras[14].However,in most approaches that only take a set of2D views as input,occlusion is mainly handled by imposing temporal consistency in terms of a motion model,be it Kalman filtering or more general Markov models.As a result,these approaches may not always be able to recover if the process starts diverging.2.2.1Blob-Based MethodsIn[19],Kalman filtering is applied on3D points obtained by fusing in a least squares sense the image-to-world projections of points belonging to binary blobs.Similarly,in[1],a Kalman filter is used to simultaneously track in2D and3D,and objectFig.1.Images from two indoor and two outdoor multicamera video sequences that we use for our experiments.At each time step,we draw a box around people that we detect and assign to them an ID number that follows them throughout thesequence.Fig.2.Cumulative distributions of the position estimate error on a3,800-frame sequence(see Section6.4.1for details).locations are estimated through trajectory prediction during occlusion.In[8],a best hypothesis and a multiple-hypotheses approaches are compared to find people tracks from 3D locations obtained from foreground binary blobs ex-tracted from multiple calibrated views.In[21],a recursive Bayesian estimation approach is used to deal with occlusions while tracking multiple people in multiview.The algorithm tracks objects located in the intersections of2D visual angles,which are extracted from silhouettes obtained from different fixed views.When occlusion ambiguities occur,multiple occlusion hypotheses are generated,given predicted object states and previous hypotheses,and tested using a branch-and-merge strategy. The proposed framework is implemented using a customized particle filter to represent the distribution of object states.Recently,Morariu and Camps[17]proposed a method based on dimensionality reduction to learn a correspondence between the appearance of pedestrians across several views. This approach is able to cope with the severe occlusion in one view by exploiting the appearance of the same pedestrian on another view and the consistence across views.2.2.2Color-Based MethodsMittal and Davis[18]propose a system that segments,detects, and tracks multiple people in a scene by using a wide-baseline setup of up to16synchronized cameras.Intensity informa-tion is directly used to perform single-view pixel classifica-tion and match similarly labeled regions across views to derive3D people locations.Occlusion analysis is performed in two ways:First,during pixel classification,the computa-tion of prior probabilities takes occlusion into account. Second,evidence is gathered across cameras to compute a presence likelihood map on the ground plane that accounts for the visibility of each ground plane point in each view. Ground plane locations are then tracked over time by using a Kalman filter.In[13],individuals are tracked both in image planes and top view.The2D and3D positions of each individual are computed so as to maximize a joint probability defined as the product of a color-based appearance model and2D and 3D motion models derived from a Kalman filter.2.2.3Occupancy Map MethodsRecent techniques explicitly use a discretized occupancy map into which the objects detected in the camera images are back-projected.In[2],the authors rely on a standard detection of stereo disparities,which increase counters associated to square areas on the ground.A mixture of Gaussians is fitted to the resulting score map to estimate the likely location of individuals.This estimate is combined with a Kallman filter to model the motion.In[26],the occupancy map is computed with a standard visual hull procedure.One originality of the approach is to keep for each resulting connex component an upper and lower bound on the number of objects that it can contain. Based on motion consistency,the bounds on the various components are estimated at a certain time frame based on the bounds of the components at the previous time frame that spatially intersect with it.Although our own method shares many features with these techniques,it differs in two important respects that we will highlight:First,we combine the usual color and motion models with a sophisticated approach based on a generative model to estimating the probabilities of occu-pancy,which explicitly handles complex occlusion interac-tions between detected individuals,as will be discussed in Section5.Second,we rely on dynamic programming to ensure greater stability in challenging situations by simul-taneously handling multiple frames.3P ROBLEM F ORMULATIONOur goal is to track an a priori unknown number of people from a few synchronized video streams taken at head level. In this section,we formulate this problem as one of finding the most probable state of a hidden Markov process,given the set of images acquired at each time step,which we will refer to as a temporal frame.We then briefly outline the computation of the relevant probabilities by using the notations summarized in Tables1and2,which we also use in the following two sections to discuss in more details the actual computation of those probabilities.3.1Computing the Optimal TrajectoriesWe process the video sequences by batches of T¼100frames, each of which includes C images,and we compute the most likely trajectory for each individual.To achieve consistency over successive batches,we only keep the result on the first 10frames and slide our temporal window.This is illustrated in Fig.3.We discretize the visible part of the ground plane into a finite number G of regularly spaced2D locations and we introduce a virtual hidden location H that will be used to model entrances and departures from and into the visible area.For a given batch,let L t¼ðL1t;...;L NÃtÞbe the hidden stochastic processes standing for the locations of individuals, whether visible or not.The number NÃstands for the maximum allowable number of individuals in our world.It is large enough so that conditioning on the number of visible ones does not change the probability of a new individual entering the scene.The L n t variables therefore take values in f1;...;G;Hg.Given I t¼ðI1t;...;I C tÞ,the images acquired at time t for 1t T,our task is to find the values of L1;...;L T that maximizePðL1;...;L T j I1;...;I TÞ:ð1ÞAs will be discussed in Section 4.1,we compute this maximum a posteriori in a greedy way,processing one individual at a time,including the hidden ones who can move into the visible scene or not.For each one,the algorithm performs the computation,under the constraint that no individual can be at a visible location occupied by an individual already processed.In theory,this approach could lead to undesirable local minima,for example,by connecting the trajectories of two separate people.However,this does not happen often because our batches are sufficiently long.To further reduce the chances of this,we process individual trajectories in an order that depends on a reliability score so that the most reliable ones are computed first,thereby reducing the potential for confusion when processing the remaining ones. This order also ensures that if an individual remains in the hidden location,then all the other people present in the hidden location will also stay there and,therefore,do not need to be processed.FLEURET ET AL.:MULTICAMERA PEOPLE TRACKING WITH A PROBABILISTIC OCCUPANCY MAP269Our experimental results show that our method does not suffer from the usual weaknesses of greedy algorithms such as a tendency to get caught in bad local minima.We thereforebelieve that it compares very favorably to stochastic optimization techniques in general and more specifically particle filtering,which usually requires careful tuning of metaparameters.3.2Stochastic ModelingWe will show in Section 4.2that since we process individual trajectories,the whole approach only requires us to define avalid motion model P ðL n t þ1j L nt ¼k Þand a sound appearance model P ðI t j L n t ¼k Þ.The motion model P ðL n t þ1j L nt ¼k Þ,which will be intro-duced in Section 4.3,is a distribution into a disc of limited radiusandcenter k ,whichcorresponds toalooseboundonthe maximum speed of a walking human.Entrance into the scene and departure from it are naturally modeled,thanks to the270IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,VOL.30,NO.2,FEBRUARY 2008TABLE 2Notations (RandomQuantities)Fig.3.Video sequences are processed by batch of 100frames.Only the first 10percent of the optimization result is kept and the rest is discarded.The temporal window is then slid forward and the optimiza-tion is repeated on the new window.TABLE 1Notations (DeterministicQuantities)hiddenlocation H,forwhichweextendthemotionmodel.The probabilities to enter and to leave are similar to the transition probabilities between different ground plane locations.In Section4.4,we will show that the appearance model PðI t j L n t¼kÞcan be decomposed into two terms.The first, described in Section4.5,is a very generic color-histogram-based model for each individual.The second,described in Section5,approximates the marginal conditional probabil-ities of occupancy of the ground plane,given the results of a background subtractionalgorithm,in allviewsacquired atthe same time.This approximation is obtained by minimizing the Kullback-Leibler divergence between a product law and the true posterior.We show that this is equivalent to computing the marginal probabilities of occupancy so that under the product law,the images obtained by putting rectangles of human sizes at occupied locations are likely to be similar to the images actually produced by the background subtraction.This represents a departure from more classical ap-proaches to estimating probabilities of occupancy that rely on computing a visual hull[26].Such approaches tend to be pessimistic and do not exploit trade-offs between the presence of people at different locations.For instance,if due to noise in one camera,a person is not seen in a particular view,then he would be discarded,even if he were seen in all others.By contrast,in our probabilistic framework,sufficient evidence might be present to detect him.Similarly,the presence of someone at a specific location creates an occlusion that hides the presence behind,which is not accounted for by the hull techniques but is by our approach.Since these marginal probabilities are computed indepen-dently at each time step,they say nothing about identity or correspondence with past frames.The appearance similarity is entirely conveyed by the color histograms,which has experimentally proved sufficient for our purposes.4C OMPUTATION OF THE T RAJECTORIESIn Section4.1,we break the global optimization of several people’s trajectories into the estimation of optimal individual trajectories.In Section 4.2,we show how this can be performed using the classical Viterbi’s algorithm based on dynamic programming.This requires a motion model given in Section 4.3and an appearance model described in Section4.4,which combines a color model given in Section4.5 and a sophisticated estimation of the ground plane occu-pancy detailed in Section5.We partition the visible area into a regular grid of G locations,as shown in Figs.5c and6,and from the camera calibration,we define for each camera c a family of rectangular shapes A c1;...;A c G,which correspond to crude human silhouettes of height175cm and width50cm located at every position on the grid.4.1Multiple TrajectoriesRecall that we denote by L n¼ðL n1;...;L n TÞthe trajectory of individual n.Given a batch of T temporal frames I¼ðI1;...;I TÞ,we want to maximize the posterior conditional probability:PðL1¼l1;...;L Nül NÃj IÞ¼PðL1¼l1j IÞY NÃn¼2P L n¼l n j I;L1¼l1;...;L nÀ1¼l nÀ1ÀÁ:ð2ÞSimultaneous optimization of all the L i s would beintractable.Instead,we optimize one trajectory after theother,which amounts to looking for^l1¼arg maxlPðL1¼l j IÞ;ð3Þ^l2¼arg maxlPðL2¼l j I;L1¼^l1Þ;ð4Þ...^l Nüarg maxlPðL Nül j I;L1¼^l1;L2¼^l2;...Þ:ð5ÞNote that under our model,conditioning one trajectory,given other ones,simply means that it will go through noalready occupied location.In other words,PðL n¼l j I;L1¼^l1;...;L nÀ1¼^l nÀ1Þ¼PðL n¼l j I;8k<n;8t;L n t¼^l k tÞ;ð6Þwhich is PðL n¼l j IÞwith a reduced set of the admissiblegrid locations.Such a procedure is recursively correct:If all trajectoriesestimated up to step n are correct,then the conditioning onlyimproves the estimate of the optimal remaining trajectories.This would suffice if the image data were informative enoughso that locations could be unambiguously associated toindividuals.In practice,this is obviously rarely the case.Therefore,this greedy approach to optimization has un-desired side effects.For example,due to partly missinglocalization information for a given trajectory,the algorithmmight mistakenly start following another person’s trajectory.This is especially likely to happen if the tracked individualsare located close to each other.To avoid this kind of failure,we process the images bybatches of T¼100and first extend the trajectories that havebeen found with high confidence,as defined below,in theprevious batches.We then process the lower confidenceones.As a result,a trajectory that was problematic in thepast and is likely to be problematic in the current batch willbe optimized last and,thus,prevented from“stealing”somebody else’s location.Furthermore,this approachincreases the spatial constraints on such a trajectory whenwe finally get around to estimating it.We use as a confidence score the concordance of theestimated trajectories in the previous batches and thelocalization cue provided by the estimation of the probabil-istic occupancy map(POM)described in Section5.Moreprecisely,the score is the number of time frames where theestimated trajectory passes through a local maximum of theestimated probability of occupancy.When the POM does notdetect a person on a few frames,the score will naturallydecrease,indicating a deterioration of the localizationinformation.Since there is a high degree of overlappingbetween successive batches,the challenging segment of atrajectory,which is due to the failure of the backgroundsubtraction or change in illumination,for instance,is met inseveral batches before it actually happens during the10keptframes.Thus,the heuristic would have ranked the corre-sponding individual in the last ones to be processed whensuch problem occurs.FLEURET ET AL.:MULTICAMERA PEOPLE TRACKING WITH A PROBABILISTIC OCCUPANCY MAP2714.2Single TrajectoryLet us now consider only the trajectory L n ¼ðL n 1;...;L nT Þof individual n over T temporal frames.We are looking for thevalues ðl n 1;...;l nT Þin the subset of free locations of f 1;...;G;Hg .The initial location l n 1is either a known visible location if the individual is visible in the first frame of the batch or H if he is not.We therefore seek to maximizeP ðL n 1¼l n 1;...;L n T ¼l nt j I 1;...;I T Þ¼P ðI 1;L n 1¼l n 1;...;I T ;L n T ¼l nT ÞP ðI 1;...;I T Þ:ð7ÞSince the denominator is constant with respect to l n ,we simply maximize the numerator,that is,the probability of both the trajectories and the images.Let us introduce the maximum of the probability of both the observations and the trajectory ending up at location k at time t :Èt ðk Þ¼max l n 1;...;l nt À1P ðI 1;L n 1¼l n 1;...;I t ;L nt ¼k Þ:ð8ÞWe model jointly the processes L n t and I t with a hidden Markov model,that isP ðL n t þ1j L n t ;L n t À1;...Þ¼P ðL n t þ1j L nt Þð9ÞandP ðI t ;I t À1;...j L n t ;L nt À1;...Þ¼YtP ðI t j L n t Þ:ð10ÞUnder such a model,we have the classical recursive expressionÈt ðk Þ¼P ðI t j L n t ¼k Þ|fflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl}Appearance modelmax P ðL n t ¼k j L nt À1¼ Þ|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}Motion modelÈt À1ð Þð11Þto perform a global search with dynamic programming,which yields the classic Viterbi algorithm.This is straight-forward,since the L n t s are in a finite set of cardinality G þ1.4.3Motion ModelWe chose a very simple and unconstrained motion model:P ðL n t ¼k j L nt À1¼ Þ¼1=Z Áe À k k À k if k k À k c 0otherwise ;&ð12Þwhere the constant tunes the average human walkingspeed,and c limits the maximum allowable speed.This probability is isotropic,decreases with the distance from location k ,and is zero for k k À k greater than a constantmaximum distance.We use a very loose maximum distance cof one square of the grid per frame,which corresponds to a speed of almost 12mph.We also define explicitly the probabilities of transitions to the parts of the scene that are connected to the hidden location H .This is a single door in the indoor sequences and all the contours of the visible area in the outdoor sequences in Fig.1.Thus,entrance and departure of individuals are taken care of naturally by the estimation of the maximum a posteriori trajectories.If there are enough evidence from the images that somebody enters or leaves the room,then this procedure will estimate that the optimal trajectory does so,and a person will be added to or removed from the visible area.4.4Appearance ModelFrom the input images I t ,we use background subtraction to produce binary masks B t such as those in Fig.4.We denote as T t the colors of the pixels inside the blobs and treat the rest of the images as background,which is ignored.Let X tk be a Boolean random variable standing for the presence of an individual at location k of the grid at time t .In Appendix B,we show thatP ðI t j L n t ¼k Þzfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflffl{Appearance model/P ðL n t ¼k j X kt ¼1;T t Þ|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}Color modelP ðX kt ¼1j B t Þ|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl}Ground plane occupancy:ð13ÞThe ground plane occupancy term will be discussed in Section 5,and the color model term is computed as follows.4.5Color ModelWe assume that if someone is present at a certain location k ,then his presence influences the color of the pixels located at the intersection of the moving blobs and the rectangle A c k corresponding to the location k .We model that dependency as if the pixels were independent and identically distributed and followed a density in the red,green,and blue (RGB)space associated to the individual.This is far simpler than the color models used in either [18]or [13],which split the body area in several subparts with dedicated color distributions,but has proved sufficient in practice.If an individual n was present in the frames preceding the current batch,then we have an estimation for any camera c of his color distribution c n ,since we have previously collected the pixels in all frames at the locations272IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,VOL.30,NO.2,FEBRUARY2008Fig.4.The color model relies on a stochastic modeling of the color of the pixels T c t ðk Þsampled in the intersection of the binary image B c t produced bythe background subtraction and the rectangle A ck corresponding to the location k .。
content-security-policy 参数-概述说明以及解释
content-security-policy 参数-概述说明以及解释1. 引言1.1 概述Content-Security-Policy (CSP) 是一种用于增加web应用程序安全性的标准。
通过在网站的HTTP响应标头中设置CSP参数,开发人员可以控制浏览器如何加载资源和执行脚本,从而帮助防止常见的网络攻击,如跨站脚本攻击(XSS)和数据注入攻击。
随着网络安全威胁的不断增加,实现一个健壮的CSP策略变得至关重要。
在本文中,我们将深入讨论CSP参数的作用、常见的配置选项以及如何设置CSP策略来提高web应用程序的安全性。
1.2 文章结构文章结构是指文章整体框架和组织形式,它包括文章的标题、段落分布、论证顺序等方面。
在本文中,文章结构主要分为三个主要部分:引言、正文和结论。
- 引言部分主要包括概述、文章结构和目的。
在引言部分,我们将介绍Content-Security-Policy参数的背景和重要性,以及本文要探讨的内容。
- 正文部分会详细解释什么是Content-Security-Policy参数、其作用以及常见的配置方式。
通过对这些内容的深入探讨,读者将能够更好地理解Content-Security-Policy参数的作用和影响。
- 结论部分将对文章的主要内容进行总结,提出应用建议,并展望未来Content-Security-Policy参数的发展方向。
通过对文章整体内容的回顾和展望,读者能够更全面地了解和应用Content-Security-Policy参数。
1.3 目的:Content-Security-Policy 参数旨在帮助网站管理员减少潜在的网络攻击风险。
通过合理配置Content-Security-Policy参数,网站可以限制页面内容加载,防止恶意代码注入和跨站脚本攻击。
此外,Content-Security-Policy参数还可以提高网站的安全性和隐私保护水平,使用户数据更加安全可靠。
IEC-61854架空线.隔离层的要求和检验
NORMEINTERNATIONALECEI IEC INTERNATIONALSTANDARD 61854Première éditionFirst edition1998-09Lignes aériennes –Exigences et essais applicables aux entretoisesOverhead lines –Requirements and tests for spacersCommission Electrotechnique InternationaleInternational Electrotechnical Commission Pour prix, voir catalogue en vigueurFor price, see current catalogue© IEC 1998 Droits de reproduction réservés Copyright - all rights reservedAucune partie de cette publication ne peut être reproduite niutilisée sous quelque forme que ce soit et par aucunprocédé, électronique ou mécanique, y compris la photo-copie et les microfilms, sans l'accord écrit de l'éditeur.No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical,including photocopying and microfilm, without permission in writing from the publisher.International Electrotechnical Commission 3, rue de Varembé Geneva, SwitzerlandTelefax: +41 22 919 0300e-mail: inmail@iec.ch IEC web site http: //www.iec.chCODE PRIX PRICE CODE X– 2 –61854 © CEI:1998SOMMAIREPages AVANT-PROPOS (6)Articles1Domaine d'application (8)2Références normatives (8)3Définitions (12)4Exigences générales (12)4.1Conception (12)4.2Matériaux (14)4.2.1Généralités (14)4.2.2Matériaux non métalliques (14)4.3Masse, dimensions et tolérances (14)4.4Protection contre la corrosion (14)4.5Aspect et finition de fabrication (14)4.6Marquage (14)4.7Consignes d'installation (14)5Assurance de la qualité (16)6Classification des essais (16)6.1Essais de type (16)6.1.1Généralités (16)6.1.2Application (16)6.2Essais sur échantillon (16)6.2.1Généralités (16)6.2.2Application (16)6.2.3Echantillonnage et critères de réception (18)6.3Essais individuels de série (18)6.3.1Généralités (18)6.3.2Application et critères de réception (18)6.4Tableau des essais à effectuer (18)7Méthodes d'essai (22)7.1Contrôle visuel (22)7.2Vérification des dimensions, des matériaux et de la masse (22)7.3Essai de protection contre la corrosion (22)7.3.1Composants revêtus par galvanisation à chaud (autres queles fils d'acier galvanisés toronnés) (22)7.3.2Produits en fer protégés contre la corrosion par des méthodes autresque la galvanisation à chaud (24)7.3.3Fils d'acier galvanisé toronnés (24)7.3.4Corrosion causée par des composants non métalliques (24)7.4Essais non destructifs (24)61854 © IEC:1998– 3 –CONTENTSPage FOREWORD (7)Clause1Scope (9)2Normative references (9)3Definitions (13)4General requirements (13)4.1Design (13)4.2Materials (15)4.2.1General (15)4.2.2Non-metallic materials (15)4.3Mass, dimensions and tolerances (15)4.4Protection against corrosion (15)4.5Manufacturing appearance and finish (15)4.6Marking (15)4.7Installation instructions (15)5Quality assurance (17)6Classification of tests (17)6.1Type tests (17)6.1.1General (17)6.1.2Application (17)6.2Sample tests (17)6.2.1General (17)6.2.2Application (17)6.2.3Sampling and acceptance criteria (19)6.3Routine tests (19)6.3.1General (19)6.3.2Application and acceptance criteria (19)6.4Table of tests to be applied (19)7Test methods (23)7.1Visual examination (23)7.2Verification of dimensions, materials and mass (23)7.3Corrosion protection test (23)7.3.1Hot dip galvanized components (other than stranded galvanizedsteel wires) (23)7.3.2Ferrous components protected from corrosion by methods other thanhot dip galvanizing (25)7.3.3Stranded galvanized steel wires (25)7.3.4Corrosion caused by non-metallic components (25)7.4Non-destructive tests (25)– 4 –61854 © CEI:1998 Articles Pages7.5Essais mécaniques (26)7.5.1Essais de glissement des pinces (26)7.5.1.1Essai de glissement longitudinal (26)7.5.1.2Essai de glissement en torsion (28)7.5.2Essai de boulon fusible (28)7.5.3Essai de serrage des boulons de pince (30)7.5.4Essais de courant de court-circuit simulé et essais de compressionet de traction (30)7.5.4.1Essai de courant de court-circuit simulé (30)7.5.4.2Essai de compression et de traction (32)7.5.5Caractérisation des propriétés élastiques et d'amortissement (32)7.5.6Essais de flexibilité (38)7.5.7Essais de fatigue (38)7.5.7.1Généralités (38)7.5.7.2Oscillation de sous-portée (40)7.5.7.3Vibrations éoliennes (40)7.6Essais de caractérisation des élastomères (42)7.6.1Généralités (42)7.6.2Essais (42)7.6.3Essai de résistance à l'ozone (46)7.7Essais électriques (46)7.7.1Essais d'effet couronne et de tension de perturbations radioélectriques..467.7.2Essai de résistance électrique (46)7.8Vérification du comportement vibratoire du système faisceau/entretoise (48)Annexe A (normative) Informations techniques minimales à convenirentre acheteur et fournisseur (64)Annexe B (informative) Forces de compression dans l'essai de courantde court-circuit simulé (66)Annexe C (informative) Caractérisation des propriétés élastiques et d'amortissementMéthode de détermination de la rigidité et de l'amortissement (70)Annexe D (informative) Contrôle du comportement vibratoire du systèmefaisceau/entretoise (74)Bibliographie (80)Figures (50)Tableau 1 – Essais sur les entretoises (20)Tableau 2 – Essais sur les élastomères (44)61854 © IEC:1998– 5 –Clause Page7.5Mechanical tests (27)7.5.1Clamp slip tests (27)7.5.1.1Longitudinal slip test (27)7.5.1.2Torsional slip test (29)7.5.2Breakaway bolt test (29)7.5.3Clamp bolt tightening test (31)7.5.4Simulated short-circuit current test and compression and tension tests (31)7.5.4.1Simulated short-circuit current test (31)7.5.4.2Compression and tension test (33)7.5.5Characterisation of the elastic and damping properties (33)7.5.6Flexibility tests (39)7.5.7Fatigue tests (39)7.5.7.1General (39)7.5.7.2Subspan oscillation (41)7.5.7.3Aeolian vibration (41)7.6Tests to characterise elastomers (43)7.6.1General (43)7.6.2Tests (43)7.6.3Ozone resistance test (47)7.7Electrical tests (47)7.7.1Corona and radio interference voltage (RIV) tests (47)7.7.2Electrical resistance test (47)7.8Verification of vibration behaviour of the bundle-spacer system (49)Annex A (normative) Minimum technical details to be agreed betweenpurchaser and supplier (65)Annex B (informative) Compressive forces in the simulated short-circuit current test (67)Annex C (informative) Characterisation of the elastic and damping propertiesStiffness-Damping Method (71)Annex D (informative) Verification of vibration behaviour of the bundle/spacer system (75)Bibliography (81)Figures (51)Table 1 – Tests on spacers (21)Table 2 – Tests on elastomers (45)– 6 –61854 © CEI:1998 COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE––––––––––LIGNES AÉRIENNES –EXIGENCES ET ESSAIS APPLICABLES AUX ENTRETOISESAVANT-PROPOS1)La CEI (Commission Electrotechnique Internationale) est une organisation mondiale de normalisation composéede l'ensemble des comités électrotechniques nationaux (Comités nationaux de la CEI). La CEI a pour objet de favoriser la coopération internationale pour toutes les questions de normalisation dans les domaines de l'électricité et de l'électronique. A cet effet, la CEI, entre autres activités, publie des Normes internationales.Leur élaboration est confiée à des comités d'études, aux travaux desquels tout Comité national intéressé par le sujet traité peut participer. Les organisations internationales, gouvernementales et non gouvernementales, en liaison avec la CEI, participent également aux travaux. La CEI collabore étroitement avec l'Organisation Internationale de Normalisation (ISO), selon des conditions fixées par accord entre les deux organisations.2)Les décisions ou accords officiels de la CEI concernant les questions techniques représentent, dans la mesuredu possible un accord international sur les sujets étudiés, étant donné que les Comités nationaux intéressés sont représentés dans chaque comité d’études.3)Les documents produits se présentent sous la forme de recommandations internationales. Ils sont publiéscomme normes, rapports techniques ou guides et agréés comme tels par les Comités nationaux.4)Dans le but d'encourager l'unification internationale, les Comités nationaux de la CEI s'engagent à appliquer defaçon transparente, dans toute la mesure possible, les Normes internationales de la CEI dans leurs normes nationales et régionales. Toute divergence entre la norme de la CEI et la norme nationale ou régionale correspondante doit être indiquée en termes clairs dans cette dernière.5)La CEI n’a fixé aucune procédure concernant le marquage comme indication d’approbation et sa responsabilitén’est pas engagée quand un matériel est déclaré conforme à l’une de ses normes.6) L’attention est attirée sur le fait que certains des éléments de la présente Norme internationale peuvent fairel’objet de droits de propriété intellectuelle ou de droits analogues. La CEI ne saurait être tenue pour responsable de ne pas avoir identifié de tels droits de propriété et de ne pas avoir signalé leur existence.La Norme internationale CEI 61854 a été établie par le comité d'études 11 de la CEI: Lignes aériennes.Le texte de cette norme est issu des documents suivants:FDIS Rapport de vote11/141/FDIS11/143/RVDLe rapport de vote indiqué dans le tableau ci-dessus donne toute information sur le vote ayant abouti à l'approbation de cette norme.L’annexe A fait partie intégrante de cette norme.Les annexes B, C et D sont données uniquement à titre d’information.61854 © IEC:1998– 7 –INTERNATIONAL ELECTROTECHNICAL COMMISSION––––––––––OVERHEAD LINES –REQUIREMENTS AND TESTS FOR SPACERSFOREWORD1)The IEC (International Electrotechnical Commission) is a worldwide organization for standardization comprisingall national electrotechnical committees (IEC National Committees). The object of the IEC is to promote international co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and in addition to other activities, the IEC publishes International Standards. Their preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with may participate in this preparatory work. International, governmental and non-governmental organizations liaising with the IEC also participate in this preparation. The IEC collaborates closely with the International Organization for Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.2)The formal decisions or agreements of the IEC on technical matters express, as nearly as possible, aninternational consensus of opinion on the relevant subjects since each technical committee has representation from all interested National Committees.3)The documents produced have the form of recommendations for international use and are published in the formof standards, technical reports or guides and they are accepted by the National Committees in that sense.4)In order to promote international unification, IEC National Committees undertake to apply IEC InternationalStandards transparently to the maximum extent possible in their national and regional standards. Any divergence between the IEC Standard and the corresponding national or regional standard shall be clearly indicated in the latter.5)The IEC provides no marking procedure to indicate its approval and cannot be rendered responsible for anyequipment declared to be in conformity with one of its standards.6) Attention is drawn to the possibility that some of the elements of this International Standard may be the subjectof patent rights. The IEC shall not be held responsible for identifying any or all such patent rights. International Standard IEC 61854 has been prepared by IEC technical committee 11: Overhead lines.The text of this standard is based on the following documents:FDIS Report on voting11/141/FDIS11/143/RVDFull information on the voting for the approval of this standard can be found in the report on voting indicated in the above table.Annex A forms an integral part of this standard.Annexes B, C and D are for information only.– 8 –61854 © CEI:1998LIGNES AÉRIENNES –EXIGENCES ET ESSAIS APPLICABLES AUX ENTRETOISES1 Domaine d'applicationLa présente Norme internationale s'applique aux entretoises destinées aux faisceaux de conducteurs de lignes aériennes. Elle recouvre les entretoises rigides, les entretoises flexibles et les entretoises amortissantes.Elle ne s'applique pas aux espaceurs, aux écarteurs à anneaux et aux entretoises de mise à la terre.NOTE – La présente norme est applicable aux pratiques de conception de lignes et aux entretoises les plus couramment utilisées au moment de sa rédaction. Il peut exister d'autres entretoises auxquelles les essais spécifiques décrits dans la présente norme ne s'appliquent pas.Dans de nombreux cas, les procédures d'essai et les valeurs d'essai sont convenues entre l'acheteur et le fournisseur et sont énoncées dans le contrat d'approvisionnement. L'acheteur est le mieux à même d'évaluer les conditions de service prévues, qu'il convient d'utiliser comme base à la définition de la sévérité des essais.La liste des informations techniques minimales à convenir entre acheteur et fournisseur est fournie en annexe A.2 Références normativesLes documents normatifs suivants contiennent des dispositions qui, par suite de la référence qui y est faite, constituent des dispositions valables pour la présente Norme internationale. Au moment de la publication, les éditions indiquées étaient en vigueur. Tout document normatif est sujet à révision et les parties prenantes aux accords fondés sur la présente Norme internationale sont invitées à rechercher la possibilité d'appliquer les éditions les plus récentes des documents normatifs indiqués ci-après. Les membres de la CEI et de l'ISO possèdent le registre des Normes internationales en vigueur.CEI 60050(466):1990, Vocabulaire Electrotechnique International (VEI) – Chapitre 466: Lignes aériennesCEI 61284:1997, Lignes aériennes – Exigences et essais pour le matériel d'équipementCEI 60888:1987, Fils en acier zingué pour conducteurs câblésISO 34-1:1994, Caoutchouc vulcanisé ou thermoplastique – Détermination de la résistance au déchirement – Partie 1: Eprouvettes pantalon, angulaire et croissantISO 34-2:1996, Caoutchouc vulcanisé ou thermoplastique – Détermination de la résistance au déchirement – Partie 2: Petites éprouvettes (éprouvettes de Delft)ISO 37:1994, Caoutchouc vulcanisé ou thermoplastique – Détermination des caractéristiques de contrainte-déformation en traction61854 © IEC:1998– 9 –OVERHEAD LINES –REQUIREMENTS AND TESTS FOR SPACERS1 ScopeThis International Standard applies to spacers for conductor bundles of overhead lines. It covers rigid spacers, flexible spacers and spacer dampers.It does not apply to interphase spacers, hoop spacers and bonding spacers.NOTE – This standard is written to cover the line design practices and spacers most commonly used at the time of writing. There may be other spacers available for which the specific tests reported in this standard may not be applicable.In many cases, test procedures and test values are left to agreement between purchaser and supplier and are stated in the procurement contract. The purchaser is best able to evaluate the intended service conditions, which should be the basis for establishing the test severity.In annex A, the minimum technical details to be agreed between purchaser and supplier are listed.2 Normative referencesThe following normative documents contain provisions which, through reference in this text, constitute provisions of this International Standard. At the time of publication of this standard, the editions indicated were valid. All normative documents are subject to revision, and parties to agreements based on this International Standard are encouraged to investigate the possibility of applying the most recent editions of the normative documents indicated below. Members of IEC and ISO maintain registers of currently valid International Standards.IEC 60050(466):1990, International Electrotechnical vocabulary (IEV) – Chapter 466: Overhead linesIEC 61284:1997, Overhead lines – Requirements and tests for fittingsIEC 60888:1987, Zinc-coated steel wires for stranded conductorsISO 34-1:1994, Rubber, vulcanized or thermoplastic – Determination of tear strength – Part 1: Trouser, angle and crescent test piecesISO 34-2:1996, Rubber, vulcanized or thermoplastic – Determination of tear strength – Part 2: Small (Delft) test piecesISO 37:1994, Rubber, vulcanized or thermoplastic – Determination of tensile stress-strain properties– 10 –61854 © CEI:1998 ISO 188:1982, Caoutchouc vulcanisé – Essais de résistance au vieillissement accéléré ou à la chaleurISO 812:1991, Caoutchouc vulcanisé – Détermination de la fragilité à basse températureISO 815:1991, Caoutchouc vulcanisé ou thermoplastique – Détermination de la déformation rémanente après compression aux températures ambiantes, élevées ou bassesISO 868:1985, Plastiques et ébonite – Détermination de la dureté par pénétration au moyen d'un duromètre (dureté Shore)ISO 1183:1987, Plastiques – Méthodes pour déterminer la masse volumique et la densitérelative des plastiques non alvéolairesISO 1431-1:1989, Caoutchouc vulcanisé ou thermoplastique – Résistance au craquelage par l'ozone – Partie 1: Essai sous allongement statiqueISO 1461,— Revêtements de galvanisation à chaud sur produits finis ferreux – Spécifications1) ISO 1817:1985, Caoutchouc vulcanisé – Détermination de l'action des liquidesISO 2781:1988, Caoutchouc vulcanisé – Détermination de la masse volumiqueISO 2859-1:1989, Règles d'échantillonnage pour les contrôles par attributs – Partie 1: Plans d'échantillonnage pour les contrôles lot par lot, indexés d'après le niveau de qualité acceptable (NQA)ISO 2859-2:1985, Règles d'échantillonnage pour les contrôles par attributs – Partie 2: Plans d'échantillonnage pour les contrôles de lots isolés, indexés d'après la qualité limite (QL)ISO 2921:1982, Caoutchouc vulcanisé – Détermination des caractéristiques à basse température – Méthode température-retrait (essai TR)ISO 3417:1991, Caoutchouc – Détermination des caractéristiques de vulcanisation à l'aide du rhéomètre à disque oscillantISO 3951:1989, Règles et tables d'échantillonnage pour les contrôles par mesures des pourcentages de non conformesISO 4649:1985, Caoutchouc – Détermination de la résistance à l'abrasion à l'aide d'un dispositif à tambour tournantISO 4662:1986, Caoutchouc – Détermination de la résilience de rebondissement des vulcanisats––––––––––1) A publierThis is a preview - click here to buy the full publication61854 © IEC:1998– 11 –ISO 188:1982, Rubber, vulcanized – Accelerated ageing or heat-resistance testsISO 812:1991, Rubber, vulcanized – Determination of low temperature brittlenessISO 815:1991, Rubber, vulcanized or thermoplastic – Determination of compression set at ambient, elevated or low temperaturesISO 868:1985, Plastics and ebonite – Determination of indentation hardness by means of a durometer (Shore hardness)ISO 1183:1987, Plastics – Methods for determining the density and relative density of non-cellular plasticsISO 1431-1:1989, Rubber, vulcanized or thermoplastic – Resistance to ozone cracking –Part 1: static strain testISO 1461, — Hot dip galvanized coatings on fabricated ferrous products – Specifications1)ISO 1817:1985, Rubber, vulcanized – Determination of the effect of liquidsISO 2781:1988, Rubber, vulcanized – Determination of densityISO 2859-1:1989, Sampling procedures for inspection by attributes – Part 1: Sampling plans indexed by acceptable quality level (AQL) for lot-by-lot inspectionISO 2859-2:1985, Sampling procedures for inspection by attributes – Part 2: Sampling plans indexed by limiting quality level (LQ) for isolated lot inspectionISO 2921:1982, Rubber, vulcanized – Determination of low temperature characteristics –Temperature-retraction procedure (TR test)ISO 3417:1991, Rubber – Measurement of vulcanization characteristics with the oscillating disc curemeterISO 3951:1989, Sampling procedures and charts for inspection by variables for percent nonconformingISO 4649:1985, Rubber – Determination of abrasion resistance using a rotating cylindrical drum deviceISO 4662:1986, Rubber – Determination of rebound resilience of vulcanizates–––––––––1) To be published.。
Windows2008R2 IIS7.5 PHP5.3.22安装配置 错误0x800736b1
前言:本人在配置的时候遇到了很多问题所以整理了本文,用以记录存档,也可以方便能看到本文档的朋友,如果您遇到了类似问题可以少走弯路。
文章末尾有一个注意事项,请一定留意,建议看完本前言之后先看注意事项(本文核心)。
本文章内容并非我自己一字一字敲出来的,多来自网络(技术博客、微软官方帮助、PHP支持等)如有侵权请告知笔者:杞都天子。
另:微软的PHP配置说明:/zh-cn/library/hh994592#Install_PHP1.安装IIS1.1单击“开始”,指向“管理工具”,然后单击“服务器管理器”。
1.2在“角色摘要”中,单击“添加角色”。
1.3使用“添加角色”向导添加 Web 服务器角色。
1.4此处较为简单,而且网上参考文献也较多,所以本文点到为止。
2.安装配置PHP2.1下载php-5.3.22-nts-Win32-VC9-x86.zip并解压到D: \php53222.2复制php.ini-development,并修改文件名为php.ini,进行如下修改:extension_dir = <PATH TO EXTENSIONS>Extension_dir 指向存储 PHP 扩展的目录。
此路径可以是完全限定路径(例如,D:\php5322\ext\)或相对路径(例如,.\ext)。
在 Php.ini 文件中的较低级别指定的扩展位于 extension_dir 中。
如果指定的扩展未位于 extension_dir 中,则 PHP 会在开始执行脚本时显示一条警告消息,并且应用程序可能会因缺少功能而显示错误。
extension = xxxxxx.dll对于启用的每个扩展,对应的 extension= 指令(用于告知 PHP 在启动时要加载extension_dir 中的哪些扩展)是必需的。
将自己需要安装的组件前的”;”去掉。
例如一般是extension=php_gd2.dllextension=php_mbstring.dllextension=php_mysql.dlllog_errors = On(可以不设置此项,笔者未设置)PHP 错误还会记录到 PHP 错误日志记录设施中。
数据库系统及应用教程(SQL Server 2008)习题1-8章答案
习题11.名词解释:DB:是长期存储在计算机内、有组织的、统一管理的相关数据的集合。
DBMS:是位于用户与0S之间的一层数据管理软件,它为用户或应用程序提供访问DB 的方法。
DBS:是实现有组织地、动态地存储大量关联数据、方便多用户访问的计算机硬件、软件和数据资源组成的系统,即采用数据库技术的计算机系统。
外模式:是用户用到的那部分数据的描述。
概念模式:数据库中全部数据的整体逻辑结构的描述。
内模式:DB在物理存储方面的描述。
实体:客观存在、可以相互区别的事物称为实体。
属性:实体有很多特性,每一个特性称为一个属性。
实体标识符:能惟一标识实体的属性或属性集,称为实体标识符。
分布式数据库:是由一组数据组成的,这组数据分布在计算机网络的不同计算机上,网络中的每个结点具有独立处理的能力(称为场地自治),可以执行局部应用。
同时,每个结点也能通过网络通信子系统执行全局应用。
2.文件系统阶段的数据管理有哪些特点?答:文件系统阶段主要有5个特点:数据以“文件”形式长期保存;数据的逻辑结构与物理结构有了区别;文件组织已多样化;数据面向应用;对数据的操作以记录为单位。
3.文件系统阶段的数据管理有些什么缺陷?试举例说明。
答:主要有3个缺陷:数据冗余;数据不一致性;数据联系弱。
例如学校里教务处、财务处、保健处建立的文件中都有学生详细资料,如联系电话,家庭住址等。
这就是“数据”冗余;如果某个学生搬家,就要修改3个部门文件中的数据,否则会引起同一数据在3个部门中不一致;产生上述问题的原因是这3个部门的文件中数据没有联系。
4.数据库阶段的数据管理有哪些特色?答:主要有5个特点:采用数据模型可以表示复杂的数据结构;有较高的数据独立性;为用户提供了方便的用户接口;提供了4个方面的数据控制功能;对数据的操作以数据项为单位,增加了系统的灵活性。
5.实体之间联系有哪几种?分别举例说明?答:1:1联系:如果实体集El中每个实体至多和实体集E2中的一个实体有联习,反之亦然,那么El和E2的联系称为“l:1联系”。
G.984.4标准补充修订
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T G.984.4TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Amendment 1(06/2009)SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKSDigital sections and digital line system – Optical line systems for local and access networksGigabit-capable passive optical networks (G-PON): ONT management and control interface specificationAmendment 1Recommendation ITU-T G.984.4 (2008) – Amendment 1ITU-T G-SERIES RECOMMENDATIONSTRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKSINTERNATIONAL TELEPHONE CONNECTIONS AND CIRCUITS G.100–G.199GENERAL CHARACTERISTICS COMMON TO ALL ANALOGUE CARRIER-G.200–G.299TRANSMISSION SYSTEMSG.300–G.399INDIVIDUAL CHARACTERISTICS OF INTERNATIONAL CARRIER TELEPHONESYSTEMS ON METALLIC LINESGENERAL CHARACTERISTICS OF INTERNATIONAL CARRIER TELEPHONE SYSTEMSG.400–G.449ON RADIO-RELAY OR SATELLITE LINKS AND INTERCONNECTION WITH METALLICLINESCOORDINATION OF RADIOTELEPHONY AND LINE TELEPHONY G.450–G.499TRANSMISSION MEDIA AND OPTICAL SYSTEMS CHARACTERISTICS G.600–G.699DIGITAL TERMINAL EQUIPMENTS G.700–G.799DIGITAL NETWORKS G.800–G.899DIGITAL SECTIONS AND DIGITAL LINE SYSTEM G.900–G.999General G.900–G.909Parameters for optical fibre cable systems G.910–G.919Digital sections at hierarchical bit rates based on a bit rate of 2048 kbit/s G.920–G.929Digital line transmission systems on cable at non-hierarchical bit rates G.930–G.939Digital line systems provided by FDM transmission bearers G.940–G.949Digital line systems G.950–G.959Digital section and digital transmission systems for customer access to ISDN G.960–G.969Optical fibre submarine cable systems G.970–G.979Optical line systems for local and access networks G.980–G.989Access networks G.990–G.999G.1000–G.1999MULTIMEDIA QUALITY OF SERVICE AND PERFORMANCE – GENERIC AND USER-RELATED ASPECTSTRANSMISSION MEDIA CHARACTERISTICS G.6000–G.6999DATA OVER TRANSPORT – GENERIC ASPECTS G.7000–G.7999PACKET OVER TRANSPORT ASPECTS G.8000–G.8999 ACCESS NETWORKS G.9000–G.9999For further details, please refer to the list of ITU-T Recommendations.Recommendation ITU-T G.984.4Gigabit-capable passive optical networks (G-PON): ONT managementand control interface specificationAmendment 1SummaryAmendment 1 to Recommendation ITU-T G.984.4 contains various updates to ITU-T G.984.4 (2008). A number of editorial corrections and clarifications are included, along with the following substantive changes and extensions to G-PON OMCI.• OMCI for reach extenders• PM extensions for Ethernet bridge ports and circuit emulation services (pseudowires)• Update of OMCI to align with Recommendation ITU-T G.997.1 (2009)• Revision of the VLAN tagging filter data managed entity• A managed entity to control out-of-band file transfer through OMCI• Extended descriptions and OMCI extensions on traffic management and quality of service • A number of additional minor extensions to OMCISourceAmendment 1 to Recommendation ITU-T G.984.4 (2008) was approved on 6 June 2009 by ITU-T Study Group 15 (2009-2012) under Recommendation ITU-T A.8 procedures.Rec. ITU-T G.984.4 (2008)/Amd.1 (06/2009) iFOREWORDThe International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis.The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics.The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1.In some areas of information technology which fall within ITU-T's purview, the necessary standards are prepared on a collaborative basis with ISO and IEC.NOTEIn this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency.Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other obligatory language such as "must" and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party.INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process.As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http://www.itu.int/ITU-T/ipr/.© ITU 2010All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU.ii Rec. ITU-T G.984.4 (2008)/Amd.1 (06/2009)CONTENTSPage1)Clause 2, References (1)2)Clause 3, Definitions (1)3)Clause 4, Abbreviations (1)4)Clause 8.1, Managed entities (2)5)Clause 8.2, Managed entity relation diagrams (3)6)Clause 8.2.4, xDSL service (6)7)New clause 8.2.10 (7)8)Clause 9.1.1, ONT-G (9)9)Clause 9.1.2, ONT2-G (10)10)Clause 9.1.5, Cardholder (10)11)Clause 9.1.10, Protection data (11)12)Clause 9.2.1, ANI-G (12)13)Clause 9.2.3, GEM port network CTP (12)14)Clause 9.2.4, GEM interworking termination point (14)15)Clause 9.2.6, GEM port performance monitoring history data (16)16)Clause 9.3, Layer 2 data services (17)17)Clause 9.3.10, 802.1p mapper service profile (18)18)Clause 9.3.11, VLAN tagging filter data (19)19)Clause 9.3.12, VLAN tagging operation configuration data (22)20)Clause 9.3.13 , Extended VLAN tagging operation configuration data (22)21)Clause 9.3.27, Multicast operations profile (25)22)New clauses 9.3.30 and 9.3.31 (26)23)Clause 9.7, xDSL services (28)24)Clause 9.7.3, xDSL line configuration profile part 1 (28)25)Clause 9.7.5, xDSL line configuration profile part 3 (30)26)Clause 9.7.6, VDSL2 line configuration extensions (32)27)Clause 9.7.7, xDSL channel configuration profile (34)28)Clause 9.7.12, xDSL line inventory and status data part 1 (35)29)Clause 9.7.16, VDSL2 line inventory and status data part 1 (36)30)Clause 9.7.17, VDSL2 line inventory and status data part 2 (37)31)Clause 9.7.19, xDSL channel downstream status data (37)32)Clause 9.7.20, xDSL channel upstream status data (38)33)Clause 9.7.21, xDSL xTU-C performance monitoring history data (38)34)Clause 9.7 (38)Rec. ITU-T G.984.4 (2008)/Amd.1 (06/2009) iiiPage35)Clause 9.8, TDM services (48)36)Clause 9.8.1, Physical path termination point CES UNI (49)37)Clause 9.8.4, CES physical interface performance monitoring history data (51)38)Clause 9.8 (53)39)Clause 9.11.1, Priority queue-G (56)40)Clause 9.11.3, GEM traffic descriptor (58)41)Clause 9.12 (60)42)New clause 9.14 (62)43)Clause 11.1.6, Message identifier (75)44)Clause I.1.1, MIB data sync increase (76)45)Clause I.1.4, Alarm audit and resynchronization (76)46)Clause I.1.5, Table attributes (76)47)Clause I.1.9, Performance monitoring (76)48)Clause I.2.7, Software image download (77)49)Clause II.2.33, End software download (79)50)Clause II.2.27, Test (79)51)Clause II.2.45, Test result (79)52)Appendix III (81)53)Bibliography (83)iv Rec. ITU-T G.984.4 (2008)/Amd.1 (06/2009)Recommendation ITU-T G.984.4Gigabit-capable passive optical networks (G-PON): ONT managementand control interface specificationAmendment 11) Clause 2, Referencesa) Modify the following reference as shown:[ITU-T G.997.1] Recommendation ITU-T G.997.1 (2009), Physical layer management for digital subscriber line (DSL) transceivers.b) Add the following references:[ITU-T G.704] Recommendation ITU-T G.704 (1998), Synchronous frame structures used at 1544, 6312, 2048, 8448 and 44 736 kbit/s hierarchical levels.[ITU-T G.826] Recommendation ITU-T G.826 (2002), End-to-end error performanceparameters and objectives for international, constant bit-rate digital paths andconnections.[ITU-T G.984.6] Recommendation ITU-T G.984.6 (2008), Gigabit-capable passive opticalnetworks (GPON): Reach extension.2) Clause 3, DefinitionsAdd the following clause:3.5 shaping and policing: A shaper causes a flow of input packets to conform to a given PIR/PBS by controlling the release rate/burst size of output packets. This typically results in queuing delay; packets may be dropped if there is a queue overflow because the input rate or burst size is too great.A policer causes a flow of input packets to conform to a given PIR/PBS by immediately dropping packets that exceed PIR/PBS. This typically results in packet loss; packets may be further marked as drop eligible if they exceed CIR/CBS.3) Clause 4, AbbreviationsAdd the following acronyms in alphabetic order:ACL Access Control ListCBS Committed Block SizeDMT Discrete MultitoneFDL Facility Data LinkLBO Line BuildoutBlockSizePBS PeakPCP Priority Code PointR'/S' Reach extender interface to optical trunk lineRAD Rate Adaptation DownshiftRec. ITU-T G.984.4 (2008)/Amd.1 (06/2009) 1RAU Rate Adaptation UpshiftRE ReachExtenderS'/R' Reach extender interface to optical distribution network SRA Seamless Rate Adaptation4) Clause 8.1, Managed entitiesAdd the following entries in alphabetic order to Table 8-1:Table 8-1 – Managed entities of the OMCIManaged entity Required/OptionalDescription ClauseRE ANI-G CR Used for mid-span PON reach extender ANI 9.14.1 Physical path termination pointRE UNICR Used for mid-span PON reach extender UNI 9.14.2RE upstream amplifier CR Used for mid-span PON reach extender upstreamoptical amplifier9.14.3RE downstream amplifier CR Used for mid-span PON reach extenderdownstream optical amplifier9.14.4RE config portal CR Used for non-OMCI configuration method onmid-span PON reach extenders9.14.5RE common amplifier parameters CR Used for monitoring and maintenance of PONreach extender optical amplifiers9.14.6File transfer controller O Used to control out-of-band file transfers 9.12.13 CES physical interfaceperformance monitoringhistory data 2O Used for PM of DS1, E1 and similar CESs 9.8.12CES physical interfaceperformance monitoringhistory data 3O Used for PM of DS1, E1 and similar CESs 9.8.13Ethernet frame performance monitoring history data upstream O Used for PM of upstream Ethernet flows on abridge port9.3.30Ethernet frame performance monitoring history data downstream O Used for PM of downstream Ethernet flows on abridge port9.3.31VDSL2 line configurationextensions 2O Used to configure additional VDSL2 parameters 9.7.26xDSL impulse noise monitorperformance monitoringhistory dataO Used for impulse noise monitoring PM 9.7.27xDSL line inventory and status data part 5 CR Additional xDSL test parameters for G.992.3,G.992.5 Annex C9.7.28xDSL line inventory and status data part 6 CR Additional xDSL test parameters for G.992.3,G.992.5 Annex C9.7.29xDSL line inventory and status data part 7 CR Additional xDSL test parameters for G.992.3,G.992.5 Annex C9.7.302Rec. ITU-T G.984.4 (2008)/Amd.1 (06/2009)5) Clause 8.2, Managed entity relation diagramsa) Throughout clause 8.2, replace the indicated figures with the following:GEM portnetwork CTPFigure 8.2.2-6 − Illustration of N:M bridge-mappingRec. ITU-T G.984.4 (2008)/Amd.1 (06/2009) 3GEM port network CTPGEM portnetwork CTPFigure 8.2.2-7 − Illustration of 1:MP map-filtering4Rec. ITU-T G.984.4 (2008)/Amd.1 (06/2009)Figure 8.2.2-10 − Illustration of multicast serviceb) Add the following figure at the end of clause 8.2.2:GEM portnetwork CTPFigure 8.2.2-11 − Illustration of downstream broadcast configuration6) Clause 8.2.4, xDSL serviceReplace Figure 8.2.4-1 with the following:7) New clause 8.2.10Add the following new clause at the end of clause 8.2:8.2.10 Mid-span PON reach extendersThe PON reach extender is modelled as an ONT (the management entity) containing cardholders and circuit packs whose functions are to extend the reach of one or more PONs. The PON reach extender's own management ONT is understood to exist as a member of one of the extended PONs.Figure 8.2.10-1 – Mid-span PON reach extender core (repeater)NOTE 1 – In many cases, the RE ANI-G and PPTP RE UNI will be implemented on the same circuit pack. If so, the port mapping package can be used to create the hybrid line card.Figure 8.2.10-2 – Mid-span PON reach extender core (optical amplifier)NOTE 2 – In many cases, the RE upstream amplifier and RE downstream amplifier will be implemented on the same circuit pack. If so, the port mapping package can be used to create the hybrid line card.Figure 8.2.10-3 – Mid-span PON reach extender core (hybrid)Figure 8.2.10-4 – Mid-span PON reach extender core (hybrid)Figure 8.2.10-5 – In-band management for mid-span PON reach extender8) Clause 9.1.1, ONT-Ga) Replace:Traffic management option:This attribute identifies the upstream traffic management function implemented in the ONT. There are two options:0 Priority controlled and flexibly scheduled upstream traffic. The trafficscheduler and priority queue mechanism are used for upstream traffic.1 Rate controlled upstream traffic. The maximum upstream traffic ofeach individual connection is guaranteed.With:Traffic management option:This attribute identifies the upstream traffic management function implemented in the ONT. There are three options:0 Priority controlled and flexibly scheduled upstream traffic. The trafficscheduler and priority queue mechanism are used for upstream traffic.1 Rate controlled upstream traffic. The maximum upstream traffic ofeach individual connection is guaranteed by shaping.2 Priority and rate controlled. The traffic scheduler and priority queuemechanism are used for upstream traffic. The maximum upstream traffic of each individual connection is guaranteed by shaping.b) Add the following new attribute:ONT survival time:This attribute indicates the minimum guaranteed time in milliseconds between the loss of external power and the silence of the ONT. This doesnot include survival time attributable to a backup battery. The value zeroimplies that the actual time is not known. (R) (optional) (1 byte)9) Clause 9.1.2, ONT2-GReplace:OMCC version: This attribute identifies the version of the OMCC protocol being used by the ONT. This allows the OLT to manage a network with ONTs that supportdifferent OMCC versions. Release levels of this Recommendation may besupported with the following code points:0x80 G.984.4 (06/04).NOTE – For historic reasons, this codepoint may also appear in ONTs that supportlater versions of G.984.4.0x81 G.984.4 Amd.1 (06/05)0x82 G.984.4 Amd.2 (03/06)0x83 G.984.4 Amd.3 (12/06)0x84 G.984.4 (02/2008)(R) (mandatory) (1 byte)With:OMCC version:This attribute identifies the version of the OMCC protocol being used by the ONT. This allows the OLT to manage a network with ONTs that supportdifferent OMCC versions. Release levels of this Recommendation may besupported with the following code points:0x80 G.984.4 (06/04).NOTE – For historic reasons, this codepoint may also appear in ONTs that supportlater versions of G.984.4.0x81 G.984.4 Amd.1 (06/05)0x82 G.984.4 Amd.2 (03/06)0x83 G.984.4 Amd.3 (12/06)0x84 G.984.4 (02/08)0x85 G.984.4 (2008) Amd.1 (06/09)(R) (mandatory) (1 byte)10) Clause 9.1.5, CardholderWhere Table 9.1.5-1 presently reads:Table 9.1.5-1 − Circuit pack typesCoding Content Description224..242 ReservedModify it to read:Table 9.1.5-1 – Circuit pack types Coding Content Description 224..238 Reserved239 Mid-span PON reachextender UNI The UNI of a mid-span PON reach extender, 2488 Mbit/s downstream and 1244 Mbit/s upstream240 Mid-span PON reachextender ANI The ANI of a mid-span PON reach extender, 2488 Mbit/s downstream and 1244 Mbit/s upstream241 Mid-span PON reachextender upstream opticalamplifierThe 1310 nm wavelength optical amplifier242 Mid-span PON reachextender downstreamoptical amplifierThe 1490 nm wavelength optical amplifier11) Clause 9.1.10, Protection dataModify the description of this managed entity to read as follows:This managed entity models the capability and parameters of PON protection. An ONT that supports PON protection automatically creates an instance of this managed entity.NOTE 1 – Equipment protection is modelled with the equipment protection profile and cardholder managed entities.NOTE 2 – For ONTs that implement reach extender functions, this ME can be used to describe OMCI protection, reach extender R'/S' protection, or both. For reach extender R'/S' protection, the protection type must be 1:1 without extra traffic, because the switching is done on a link-by-link basis, and the protection link is in cold stand-by mode. The instance that pertains to OMCI protection has ME ID = 0. RelationshipsOne instance of this managed entity is associated with two instances of the ANI-G, RE ANI-G or RE upstream amplifier. One of the ANI managed entities represents the working side; the other represents the protection side.AttributesManaged entity id:This attribute uniquely identifies each instance of this managed entity.This ME is numbered in ascending order from 0. (R) (mandatory)(2 bytes)Working ANI-G pointer:This attribute points to the ANI-G, RE ANI-G or RE upstream amplifier managed entity that represents the working side of PON protection. (R) (mandatory) (2 bytes)Protection ANI-G pointer:This attribute points to the ANI-G, RE ANI-G or RE upstream amplifier managed entity that represents the protection side of PON protection.(R) (mandatory) (2 bytes)(Remainder of description remains unchanged)12) Clause 9.2.1, ANI-G Replace:Piggyback DBA reporting:This attribute indicates the ONT's piggyback DBA reporting format capabilities. [ITU-T G.984.3] defines three possible piggyback reporting modes. For reporting mode 0, the single field is the entire report. For reporting mode 1, the DBA report is two fields long. For reporting mode 2, the DBA report is four fields long. Mode 0 is mandatory for ONTs that utilize the piggyback DBA reporting method; modes 1 and 2 are optional. The following coding indicates the ONT's piggyback DBA reporting mode capabilities:0 Mode 0 only1 Modes 0 and 12 Modes 0 and 23 Modes 0, 1 and 24 Piggyback DBA reporting not supported(R) (mandatory) (1 byte)Whole ONT DBA reporting:This attribute indicates that the ONT supports whole ONT DBA reporting (1) as specified in [ITU-T G.984.3], or that it does not (0). (R) (mandatory) (1 byte)With:Piggyback DBA reporting:This attribute indicates the ONT's piggyback DBA reporting format capabilities. [ITU-T G.984.3] defines two possible piggyback reporting modes. For reporting mode 0, the single field is the entire report. For reporting mode 1, the DBA report is two fields long. Mode 0 is mandatory for ONTs that utilize the piggyback DBA reporting method; mode 1 is optional. The following coding indicates the ONT's piggyback DBA reporting mode capabilities:0 Mode 0 only1 Modes 0 and 12 Deprecated3 Deprecated4 Piggyback DBA reporting not supported(R) (mandatory) (1 byte)Whole ONT DBA reporting:This attribute is deprecated. It should be set to 0 by the ONT and ignored by the OLT. (R) (mandatory) (1 byte)13) Clause 9.2.3, GEM port network CTPa) Replace:Port id value:This attribute is the port ID of the GEM port associated with this CTP.(R, W, Set-by-create) (mandatory) (2 bytes)Port id value:This attribute is the port ID of the GEM port associated with this CTP.NOTE 1 – While nothing forbids the existence of several GEM port networkCTPs with the same port id value, downstream traffic is modelled as beingdelivered to all such GEM port network CTPs. Be aware of potential difficultiesassociated with defining downstream flows and aggregating PM statistics.(R, W, Set-by-create) (mandatory) (2 bytes)b) Replace:Traffic management pointer for upstream:If the traffic management option attribute in the ONT-G ME is 0 (priority controlled), this pointer specifies the priority queue-G ME serving this GEM port network CTP. If the traffic management option attribute is 1 (rate controlled), this attribute redundantly points to the T-CONT serving this GEM port network CTP. (R, W, Set-by-create) (mandatory) (2 bytes)Traffic descriptor profile pointer:This attribute points to the instance of the GEM traffic descriptor managed entity that contains the traffic parameters used for this GEM port network CTP ME. This attribute is used when the traffic management option attribute in the ONT-G ME is 1 (rate controlled). (R, W, Set-by-create) (optional) (2 bytes)See also Appendix III.With:Traffic management pointer for upstream:If the traffic management option attribute in the ONT-G ME is 0 (priority controlled) or 2 (priority and rate controlled), this pointer specifies the priority queue-G ME serving this GEM port network CTP. If the traffic management option attribute is 1 (rate controlled), this attribute redundantly points to the T-CONT serving this GEM port network CTP. (R, W, Set-by-create) (mandatory) (2 bytes)Traffic descriptor profile pointer for upstream:This attribute points to the instance of the GEM traffic descriptor managed entity that contains the upstream traffic parameters used for this GEM port network CTP ME. This attribute is used when the traffic management option attribute in the ONT-G ME is 1 (rate controlled), specifying the PIR/PBS to which the upstream traffic is shaped. This attribute is also used when the traffic management option attribute in the ONT-G ME is 2 (priority and rate controlled), specifying the CIR/CBS/PIR/PBS to which the upstream traffic is policed. (R, W, Set-by-create) (optional) (2 bytes) See also Appendix III.c) Replace:Priority queue pointer for downstream:This attribute points to the instance of the priority queue-G used for this GEM port network CTP in the downstream direction. (R, W, Set-by-create) (mandatory) (2 bytes)Priority queue pointer for downstream:This attribute points to the instance of the priority queue-G used for this GEM port network CTP in the downstream direction. It is the responsibility of the OLT to provision the downstream pointer in a way that is consistent with bridge and mapper connectivity. If the pointer is undefined, downstream queueing is determined by other mechanisms in the ONT. (R, W, Set-by-create) (mandatory) (2 bytes)NOTE 3 – If the GEM port network CTP is associated with more than one UNI (downstream multicast), the downstream priority queue pointer defines a pattern (e.g., queue number 3for a given UNI) to be replicated (i.e., to queue number 3) at the other affected UNIs.d) Add the following additional attribute:Traffic descriptor profile pointer for downstream:This attribute points to the instance of the GEM traffic descriptor managed entity that contains the downstream traffic parameters used for this GEM port network CTP ME. This attribute is used when the traffic management option attribute in the ONT-G ME is 2 (priority and rate controlled), specifying the CIR/CBS/PIR/PBS to which the downstream traffic is policed. (R, W, Set-by-create) (optional) (2 bytes)See also Appendix III.14) Clause 9.2.4, GEM interworking termination pointa) Replace:Interworking option:This attribute identifies the type of non-GEM function that is being interworked. The options are:0 UnstructuredTDM1 MAC bridge LAN2 Reserved for future use3 IP data service4 Video return path5 802.1pmapper(R, W, Set-by-create) (mandatory) (1 byte)Service profile pointer:This attribute points to an instance of a service profile, such as:CES service profile-G if interworking option = 0MAC bridge service profile if interworking option = 1IP router service profile if interworking option = 3Video return path service profile if interworking option = 4802.1p mapper service profile if interworking option = 5(R, W, Set-by-create) (mandatory) (2 bytes)Interworking option:This attribute identifies the type of non-GEM function that is being interworked. The options are:0 UnstructuredTDM1 MAC bridge LAN2 Reserved for future use3 IP data service4 Video return path5 802.1pmapper6 Downstreambroadcast(R, W, Set-by-create) (mandatory) (1 byte)Service profile pointer:This attribute points to an instance of a service profile, such as:CES service profile-G if interworking option = 0MAC bridge service profile if interworking option = 1IP router service profile if interworking option = 3Video return path service profile if interworking option = 4802.1p mapper service profile if interworking option = 5Null pointer if interworking option = 6(R, W, Set-by-create) (mandatory) (2 bytes)b) Replace:GAL profile pointer:This attribute points to an instance of the GAL profile. The relationship between the interworking option and the related GAL profile is:Interworking option GAL profile type0 GAL TDM profile1 GAL Ethernet profile2 Reserved for future use3 GAL Ethernet profile for data service4 GAL Ethernet profile for video returnpath5 GAL Ethernet profile for 802.1pmapper(R, W, Set-by-create) (mandatory) (2 bytes)GAL loopback configuration:This attribute sets the loopback configuration when using GEM mode: 0 Noloopback.1 Loopback of downstream traffic after GAL.The default value of this attribute is 0. (R, W) (mandatory) (1 byte)GAL profile pointer:This attribute points to an instance of the GAL profile. The relationship between the interworking option and the related GAL profile is:Interworking option GAL profile type0 GAL TDM profile1 GAL Ethernet profile2 Reserved for future use3 GAL Ethernet profile for data service4 GAL Ethernet profile for video returnpath5 GAL Ethernet profile for 802.1pmapper6 Nullpointer(R, W, Set-by-create) (mandatory) (2 bytes)GAL loopback configuration:This attribute sets the loopback configuration when using GEM mode:0 Noloopback1 Loopback of downstream traffic after GALThe default value of this attribute is 0. When the interworking option is 6 (downstream broadcast), this attribute is not used. (R, W) (mandatory) (1 byte)15) Clause 9.2.6, GEM port performance monitoring history dataReplace:Lost packets:This attribute counts background GEM frame loss. It does notdistinguish between packets lost because of header bit errors or bufferoverflows; it records only loss of information. (R) (mandatory)(4 bytes)Misinserted packets:This attribute counts GEM frames misrouted to this GEM port. (R)(mandatory) (4 bytes)Received packets:This attribute counts GEM frames that were received correctly at themonitored GEM port. (R) (mandatory) (5 bytes)Received blocks:This attribute counts GEM blocks that were received correctly at themonitored GEM port. (R) (mandatory) (5 bytes)Transmitted blocks:This attribute counts GEM blocks originated by the transmitting endpoint (i.e., backward reporting is assumed). (R) (mandatory) (5 bytes) Impaired blocks:This severely errored data block counter is incremented whenever oneof the following events takes place: the number of misinserted packetsreaches its threshold, the number of bipolar violations reaches itsthreshold, or the number of lost packets reaches its threshold.Threshold values are based on vendor-operator negotiation. (R)(mandatory) (4 bytes)。
RFID和ZigBee技术基于的猪屠宰跟踪系统说明书
Pig Slaughtering Traceability System Based on RFID and ZigBee TechnologyWusheng JiInstitute of Antenna and Microwave Techniques, Tianjin University of Technology and EducationTianjin, China******************Hong GuoSchool of Computer and Communication, Lanzhou University of TechnologyLanzhou, China****************Fengchen ZhangSchool of Computer and Communication, Lanzhou University of TechnologyLanzhou, China****************Abstract—In order to improve the management of information slaughterhouse and automation, ensure the safety of pork production, design the wireless RFID reader devices system based on CC2530 by integrating the radio frequency identification technology and the ZigBee network which is used in pig slaughter traceability information. Use CC2530 and MF RC522 to build a wireless RFID reader, build slaughter traceability system software on the Visual Studio 2008 platform. System integration tests showed that the use of ZigBee wireless transmission technology can transmit data with two-way so that the reader system applications more flexible. The system of pig slaughter traceability has high stability of the system, identify the long distance, scalable and improve the pig slaughtering traceability management efficiency. At the same time, the traceability system has a certain reference value applications in the study of domestic food safety issues. It's useful for improving the level of China's food industry information.Keywords-Traceable system; ZigBee; RFID reader; CC2530; MF RC522I. I NTRODUCTIONIn recent years, the production of livestock appears steady and healthy development However, during the process of pork production, not-standardized corporate governance and product safety issues trigger animal food safety incidents occurs[1]. Therefore, building a perfect traceability monitoring platform is useful to guarantee food security, improve the economy and living standards. Currently, the food traceability generally use RFID radio frequency electronic identification. Since the existing RFID reader is generally based on the cable transmission, there are disadvantages of fixed position reader, poor flexibility, short-distance transmission and high equipment costs. Comparing with cable transmission system , using zigbee wireless transmission technology can achieve two-way wireless data transmission, the reader system applications are more flexible.At present, China's animal product traceability system based on the theory and practice made significant progress and breakthroughs, and applied to product traceability.Wang PeiQiang , etc. analyze and design pork traceabilitymanagement system based on RFID and bar codetechnology[2], and develop a workable traceability codingrules, associated with the entire logistics chain. But thereis no detailed study and design for hardware systemsproduct traceability and traceability information collectedinformation. Bao Xiao Cheng, etc. theoretically analyze traceability of pork products, key factors and traceabilityinformation systembut[3], but did not realize the systemand applied to actual production traceability process.In this article, we design a portable wireless RFIDreader by intergerating ZigBee wireless communicationtechnology and RFID technology. This will make up for the shortcomings of traditional RFID, and it’s useful toimprove real-time monitoring and network slaughterhousewith the use of ZigBee wireless network technology.Based on C/S we develop traceability system applicationsoftware on the Visual Studio 2008 platform, and recordinformation of pig slaughter, quarantine and split intothe segmentation database center through a wireless RFIDreader to achieve production information management; Meanwhile, information inquiry terminal provides information services for enterprise manageent, and managers can query the corporate information, employee information and product information through the terminal.II. S YSTEM A RCHITECTUREA.System DesignSlaughter traceability system consists of a wirelessRFID reader, ZigBee wireless sensor networks and C / S application software developed on the Visual Studio 2008 development platform. Based on the production process of meat processing factory in Lanzhou, consider HACCP system as theoretical basis [4], combining with the actual production process, to determine the function of the system. With this traceability system record the information of production process into the database, achieve inqury and management of the enterprise andInternational Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014)employee-related and maintenance of the system-relatedFigure 1. Slaughterhouser traceability system structureB.Main system flow chartThroughout the system, ZigBee coordinator form entire ZigBee communication network, waiting for routers and end nodes to join it. During slaughter surveillance process wireless RFID reader collects related node information, and then send it to the first bit machine through ZigBee network, and finally store related information into the database. The main system flow chart is shown in Fig. 2.Figure 2. System main program flow chart In wireless RFID reader, RF chip MF RC522 communicate with electronic tags following the communication protocol of ISO/IEC14443A . Through SPI(Serial Peripharal Interface), CC2530 controls communication between MF RC522 and type matched cards within the range of the antenna, and reads information in card, dealts with the information accordingly to make it compliant with the ZigBee protocol packets[5-6], and then sends the packets to the coordinator in ZigBee network following IEEE 802.15.4[7-10]. Coordinator connectes with the host computer via the UART interface, and ultimately send the data to PC for processing. Similarly, the host computer can send control commands to cooperate the electronic label, such as modification of the information.II.D ESIGN OF W IRELESS RFID R EADER The main function of mobile RFID reader is information collection, transmission and modification of slaughterhouse traceability. Hardware design of Wireless RFID reader system is about to design RF communication module circuit and ZigBee terminal node and ZigBee coordinator circuit.A.Design of RF Communication CircuitRF function consists of the microprocessor and RF chips, its main function is to communicate with the electronic tag for completing the exchange of the tag information [11]. The core chip of RF module is Philips MF RC522, electronic tags is M1 card produced by Philips. Fig. 3 shows RF communication module circuit.Figure 3. RFID read-write system radio frequency communicationmoduleFig.3 shows that RF power module 13.56MHz carrier signal modulated envelope signal sends to antenna module via pin TX1 and TX2. EMC filter circuit consisted of L1, L2, C11 and C12 ,with C5-C10 component drive the antenna, and then send out the signal. In the receiving end , stabilize the DC input voltage of RX pin stabilize through C3 and R2, and adjust the AC input voltage through C3 and C4.B.Wireless ZigBee module circuit designThe main function of ZigBee module is to send and receive data. The system uses a CC2530 With low power consumption produced by TI/Chipcon, It integrates IEEE 802.15.4/ZigBee RF transceiver and industry-standard enhanced 8051MCU kernel, the kernel control circuit is shown in Fig. 4.Figure 4. ZigBee core control circuit designC. Hardware interface circuit of CC2530 and MF RC522The system uses 32MHz crystal oscillator as a clock signal of CC2530 core controller, CC2530 communicates with RF module through SPI, P1_7 picks SDA end in RF chip MF RC522 as a signal control line. P0_1, P1_3 and P0_4 respectively pick D5, D6 and D7 end in MF RC522, control MF522 related registers write and read through SPI. P0_5 pick Reset pin of MF RC522 for the controller reset. Fig. 5 shows I/O interface connection of CC2530 and MF RC522.D. RFID reader application software designIn VS2008 development platform, we develop a PC reader software based on serial communication, and use the application software to read electronic label and specified block data, and midify specified block data.The PC reader application software is shown in Fig. 6.Figure 6. RFID readerapplication softwareThe process that user determine to modify data block 00 in sector 01 explain process of PC writing card. In specified data block, select data block in sector 01. Write data in the application software interface "modified data" column "01888888882510199990000251110088", clickon "Edit Data" button, the data is encoded as "19A2FFFFFFFFFFFF0401888888882510199990000251110088". Account for one byte of every two numbers, where "19" represents 25 bytes sending to the reader, "A2" indicates the data write instruction to be executed, "FFFFFFFFFFFF" is the initial cryptographic data block, "04" represents the fourth block of data block, PC software encodes the control command string for sending data into a binary format, the serial port is sent to the ZigBee coordinator through the PC, and then sent to the ZigBee coordinator through the terminal nodes, terminal nodes control MF RC522 store the data in electronic tag into the corresponding data block. In order to verify whether the data is correct or not, we can read the data in the specified block where just write into it. As Fig. 6 shows,select sector number, data block number ,click “read data ”, “data read ” box can show the data just written.E. The test results of Wireless RFID reader systemIn order to verify the stability and accuracy of the system, both indoors and outdoors to test the system. Indoor test is to detect the reader transmission distance through the wall, and outdoor is used to detect the reader transmission distance with no obstacle in open area . At temperature 28 ℃ and Zigbee nodes transmit power is 4.5dbm, the use of electronic tag reader system for reading and writing tests. The test results are shown in Table I, from the test results, the data transfer distance for system is 80m-100m in outdoor, the transmit distance through walls is 30m-50m, effectively improve the recognition distance of the reader.TABIE I. T HE TEST RESULTS OF W IRELESS RFID READER SYSTEMTest numb er Test environm ent Test distan ce Test frequenc y(read, write) Receive frequen cy(read, write) Packet loss rate 1 Indoor 30m 50、50 50、50 0 2 Indoor 40m 50、50 49、50 1% 3 Indoor 50m 50、50 48、49 3% 4 Indoor 55m 50、50 45、43 12% 5 outdoor 80m 50、50 50、50 0 6 outdoor 90m 50、50 50、49 1% 7 outdoor 100m 50、50 49、48 3% 8outdoor105m 50、50 44、4313%III. S YSTEMS N ETWORK COMMUNICATION STRUCTURE The existing RFID reader systems are generally based on the cable transmission [14-15], by RS232 or Ethernet interface [16-17] to communicate with the host computer. Because of the RFID reader has poor anti-jamming capability, susceptible to environmental factors. In this paper, it establishs a network based on ZigBee wireless RFID reader by integrating radio frequency identification technology and wireless communication technology. The wireless RFID reader can be achieved related information collection and transmission for the slaughterhouse. The communication system is shown in Fig. 7:(b) The basic structure of wireless RFID read-write device(a) System network communication structureFigure 7. System communication structureNetwork communication structure of the system is shown in Fig 7 (a) , including: ① wireless RFID reader: collecting the traceability information, then transmitting them to the ZigBee router node by the ZigBee terminal node. At the same time, terminal node According to transmission over the ZigBee router operating instructions to control the RFID reader to the appropriate action. ② ZigBee router node: responsible for transmitting information. ③ ZigBee coordinator node: responsible for starting the entire ZigBee network, ZigBee router sends the information via the serial port to the host computer system, while the host computer sends control information to ZigBee terminal node. ④ PC: install the application software and achieve human-computer interaction. The basic structure of wireless RFID reader is shown in Fig. 7 (b), including: ① electronic label: Record label card data and pork products information. ② reader: consists of the core control chip and CC2530 RF chip. CC2530 RF chip by controlling the electronic tag identification data, and to read and write and other operations related information. Traceability management system is mainly used to pigs slaughter, quarantine, the segmentation, and other real-time information into database center; At the same time, management corporate information, employee information and product information .ZigBee is based on the IEEE802.15.4 standard low-power personal area network protocol. The ZigBee protocol stack is Z-Stack 2007 by TI, development program in its application layer. To complete the network and product traceability information. The establish network of ZigBee is shown in Fig. 8:Figure 8. ZigBee network flow chartIV. T HE DESIGN OF TRACEABILITY MONITORINGSYSTEM A. The slaughterhouse Information Query SystemCorporate managers can query enterprise information, staff and product information by systems. In the query system, select the check content and the conditions can query to the need information. Information query System module processes is shown in Fig. 9:Figure 9. Query module of information system flow chartB. The quarantine information of slaughterhouse into the systemThe relevant information of quarantine is entered into slaughterhouse by the quarantine information module. the quarantine Information module is divided into two parts: quarantine departments and veterinary sectors.To record aspects related indicators are qualified, and recorded the indicators in the central management database. Fig. 10 (a) is a pig carcass visceral the quarantine system modules.Veterinary review the quarantine result for departments and submits audit results to the central database. The the veterinary quarantine system modules is shown in Fig. 10 (b).(a) department of quarantine system(b) The veterinary quarantine systemFigure 10. Information module of quarantine inspection C.The Information Maintenance System ofslaughterhouseThe information maintenance system is mainly divided into three parts: 1, new employees registered. The new employee's information is recorded into database, and set staff numbers, passwords, access permissions and job sectors. 2, the old employee data updates. When older employees personal information change, using software update records. 3, pigs information management. Use PC software to encode the pigs, and the encoded information is written to the electronic tag, simultaneously recorded into database, the data collection and management systeminterface is shown in Fig. 11:Figure 11. Slaughterhouse data acquisition management systemV.CONCLUSIONThe safety issue of food has been much attention to people, establish a complete food traceability system is necessary. In this paper, it designs wireless RFID reader and reader applications based on CC2530 by integrating radio frequency identification technology and wireless communication technology. Not only overcome the shortcoings that the RFID reader short distance, poor anti-interference and susceptible to environmental impacts, but also improve the real-time monitoring of slaughterhouses and network. Development and maintenance the quarantine information subsystem, the information input subsystem and information query subsystem, which based on C/S structure in the Visual Studio 2008 platform.Meanwhile, adopt the CC2530 chip as micro controller of the reader. so that reduces the cost and power consumption, also eliminates the hassle of wiring. Experiment shows that high stability of the system, long identification distance, application flexibility and extensibility, with the very high economic and practical value.A CKNOWLEDGMENTThis work was supported by the City Development Institute of Gansu Prov(2010-GSCFY-KJ07) and the Science and Technology Development Program of Lanzhou (2010-1-226).REFERENCES[1]Cao Z Y, Zhou Y, Li X B, etal. Farm management system designbased on traceability technology[J]. Journal of Guangdong Agricultural Science, 2010;37 (6):1-2.[2]Feng X Z, Wang P Q. Based on RFID and barcode technology ofpork traceability management information system analysis and design[D]. Beijing: Software College, Beijing University of Technology, 2012.[3]Bao X C. Pork food supply chain traceability system based oninternet of things researc[J]h. Changsha: Management Science and Engineering College, Changsha University of Science and Technology, 2013 : 20-28.[4]Qian H, Wang W J. HACCP principle and implemention[M].Beijing: China Light Industry Press, 2003.[5]Freescale Semiconductor,inc. 2.4 GHz Low Power Transceiver forthe IEEE 802.15.4 Standard Reference Manual[EB/OL].2005.8 [2014.3]./html-pdf/129572/FREESCALE/MC13 192/486/1/MC13192.html.[6]Texas Instruments .CC2420 2.4GHz IEEE802.15.4/ZigBee-readyRF Transceiver[OL].2013.4 [2014.3] ./product/cn/cc2420.[7]Li B, Li W F. WSN can be integrated with the RFID technologyresearch[J]. Computer Engineering, 2008; 34 (9):127-129.[8]Li W. Based on the ZigBee wireless sensor networkcommunication protocol stack design and implementation[D].Chengdu: College of Automation Engineering, University of Electronic Science and Technology, 2009.[9]Liu Y, Peng G, WANG T. A method of building network based onZigBee technology RFID system[J]. Journal of Guangxi Academy of Sciences. 2010; 26 (4) :455-457.[10]Zhang W C, Yu X W. Based on CC2530 and ZigBee protocolstack design wireless sensor nodes[J]. Computer System Application.2011; 20(7):184-187.[11]Huang J X, Tao W Q. RFID reader module design based onMFRC522[J]. Micro Computer and Applications, 2010;29 (22):16 -18.[12]Jiang T, Zhao C L. Purple wasp technology and its application[M].Beijing: Beijing University of Posts and Telecommunications Publishing House, 2006: 15-19.[13]Ji W S, Li Y M. RFID pig slaughtering the traceability systemresearch[J]. Computer system application,2012;21 (12):131-132. [14]Cha S. Research on wireless sensor network gateway based onZigBee technology and implementation[D]. Dalian: Institute of communication and information, Dalian university of technology, 2007.[15]Jiang T, Zhao C L. Purple wasp technology and its application[M].Beijing: Beijing University of Posts and Telecommunications Publishing House, 2006:53-100.[16]Su P, Jiang T, Zhang Y S, etal. RFID read-write device based onthe technology of ZigBee network construction[J]. Journal of Guangxi Academy of Sciences,2009;25(4):291-293.[17]Zhang T, Xiong Z. A bus based RFID research and implementationof interconnected system[J]. Journal of Microelectronics and Computers, 2007; 24 (4):151-155.。
ISO15484Y2008
Reference number ISO 15484:2008(E)INTERNATIONAL STANDARD ISO 15484First edition 2008-08-01Road vehicles — Brake lining friction materials — Product definition and quality assuranceVéhicules routiers — Matériaux de friction pour garnitures de freins — Définition du produit et assurance qualitéISO 15484:2008(E)PDF disclaimerThis PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed butshall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this area.Adobe is a trademark of Adobe Systems Incorporated.Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.COPYRIGHT PROTECTED DOCUMENT© ISO 2008All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body in the country of the requester. ISO copyright officeCase postale 56 • CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyright@ Web Published in Switzerland--`,,```,,,,````-`-`,,`,,`,`,,`---ISO 15484:2008(E)Contents PageForeword (iv)Introduction (v)1Scope (1)2Normative references (1)3Terms and definitions (2)4Symbols and abbreviated terms (2)5Product quality preplanning and test plan (3)5.1General (3)5.2Procedure (3)5.3Phases of product quality preplanning (4)5.4Test plan (4)6Checks and requirements — Brake lining complete (8)6.1General (visual, dimensional and material checks) (8)6.2Physical properties (9)6.3Corrosion (backing plate and shoe surface treatment) (12)6.4Friction performance passenger cars (12)6.5Friction performance commercial vehicles (13)7Documentation in the lining data sheet (LDS) (14)8Ongoing production monitoring (14)Annex A (informative) Example of lining data sheet (LDS) (15)Bibliography.....................................................................................................................................................20--` , , ` ` ` , , , , ` ` ` ` -` -` , , ` , , ` , ` , , ` ---ISO 15484:2008(E)ForewordISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of technical committees is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote.Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any or all such patent rights.ISO 15484 was prepared by Technical Committee ISO/TC 22, Road vehicles , Subcommittee SC 2, Braking systems and equipment .--`,,```,,,,````-`-`,,`,,`,`,,`---ISO 15484:2008(E)IntroductionDrum and disc brake friction materials are important functional parts of the wheel brakes. They are pressed against the rotating brake drum or disc by a clamping force applied by the actuating mechanism of the brake during a braking operation. The kinetic energy of the vehicle is thereby largely transformed into heat. The brake pad or lining is of essential importance for the effectiveness and user comfort of the brake system. Disc brake pads consist of the friction material itself, the pad carrier plate and, in some cases, silencing parts, pad wear warning devices and retaining or guiding elements. The friction material is usually permanently bonded to the backing plate by a bonding process in which the friction material is subjected to both heat and pressure.Underlayers can be inserted between the friction material and backing plate to improve bond strength and other properties. Drum brake linings consist of the friction material itself, usually shaped to match the radius of the brake shoe onto which it is subsequently attached. The friction material is usually attached to the supporting brake shoe either by bonding or by the use of rivets. Conventional friction materials consist mainly of fibrous materials, bonding agents, anti-seize agents, metals and other fillers. The friction material type, and any backing plates, anti-noise measures, pad springs and pad wear warning devices, etc., are defined in the relevant figure.The basic aim of this International Standard is:⎯to ensure the product is verified and validated during all project phases for transfer into series production;⎯to increase product reliability and at the same time limit the cost of testing;⎯to identify the necessary test standards to equally cover brake performance and noise.Visibility of production spread and the opportunity to select parts for testing from assorted areas of compressibility are the main reasons for the statistical evaluation. The procedures described in this International Standard are based on ISO/TS 16949 and encompass the entire product quality preplanning process, from the definition phase up to the determination of parameters for series production. These are defined in this International Standard as phases 1 to 7.--`,,```,,,,````-`-`,,`,,`,`,,`-----`,,```,,,,````-`-`,,`,,`,`,,`---INTERNATIONAL STANDARD ISO 15484:2008(E)Road vehicles — Brake lining friction materials — Product definition and quality assurance1 ScopeThe procedures in this International Standard apply to disc brake pads and drum brake linings for motor vehicles and describe systematic processes for the quality assurance of such brake linings.In conjunction with tolerance ranges, the test methods and results described in this International Standard permit a rapid assessment of disc brake pads.Uniform handling of the procedures through various phases ensures that the quality assurance requirements are clearly understood and that a global implementation is possible in the relationship between customers and suppliers.This International Standard relates to the completed friction material and is applicable during product development to the quality assurance of ongoing series production, focussing on the “component” friction material. It is advisable that tests with apparent “system” character be avoided.Raw material checks and processing control are outside the scope of this International Standard.2 Normative referencesThe following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.ISO 2812-1, Paints and varnishes — Determination of resistance to liquids — Part 1: Immersion in liquids other than waterISO 6310, Road vehicles — Brake linings — Compressive strain test methodISO 6312, Road vehicles — Brake linings — Shear test procedure for disc brake pad and drum brake shoe assembliesISO/PAS 22574, Road vehicles — Brake linings friction materials — Visual inspectionISO 26865, Road vehicles — Brake lining friction materials — Standard performance test procedure for commercial vehicles with air brakesISO 26866, Road vehicles — Brake lining friction materials — Standard wear test procedure for commercial vehicles with air brakesISO 26867, Road vehicles — Brake lining friction materials — Friction behaviour assessment for automative brake systemsISO 27667, Road vehicles — Brake lining friction materials — Evaluation of corrosion effects on painted backing plates and brake shoes--`,,```,,,,````-`-`,,`,,`,`,,`---ISO 15484:2008(E)JASO C458-86, Test procedure of pH for brake linings, pads and clutch facings of automobilesJIS D 4311, Clutch facings for automobileJIS D 4421, Method of hardness test for brake linings, pads and clutch facings of automobilesSAE J2598, Automotive disc brake pad natural frequency and damping testSAE J2694, Anti-noise shims: T-Pull test1)SAE J2707, Wear test procedure on inertia dynamometer for brake friction materialsSAE J2724, Measurement of disc brake friction material underlayer distribution3 Terms and definitionsFor the purposes of this document, the following terms and definitions apply.3.1density--`,,```,,,,````-`-`,,`,,`,`,,`---ρratio of the mass to the volume of the friction material under normal conditions3.2porosityPrelative volume proportion of cavities in a materialNOTE This includes open or enclosed pores of any size, shape and distribution.4 Symbols and abbreviated termsSymbol Definition Unit ρdensity g/cm3ρnet absolute or real density without pore volume g/cm3m a pad mass in air for density measurements gm w pad mass in water for density measurements gV pad volume for density measurements cm3P porosity %T R roomtemperature °Cp B brakepressure kPaM d torque NmW B padwear mm/gW s discwear mm/gµcoefficient of friction —1) In preparation.ISO 15484:2008(E)5 Product quality preplanning and test plan5.1 GeneralThe test requirements for the various phases are defined in the different test plans for passenger cars and commercial vehicles in 5.4.The development phase of prototypes (phases 1 to 4) describes the systematics and tests used in the manufacture of brake linings from tools not yet meeting series standards. The end of phase 4 is the technical product release.The production transfer and initial sampling (phases 5 and 6) describes the required scope of testing for the assessment of the initial production series with the tools and processes intended for the series.The validation of the manufacturing process is proven by documentation and assessment of the results during initial series production (phase 6).The test volume during the continuing series production monitoring (phase 7) lies within the responsibility of the pad manufacturer and is documented in the control plan (CP) which also includes the details for the in-process inspection as well as for the incoming inspection of purchased parts like raw materials, backing plates, shims and accessories.Based on the level of in-process controls, the test efforts on the final product should be minimized and some tests, such as friction tests, may not be needed for each single batch. In any case, the frequency and sample size has to be defined in the CP.The chemical-physical brake lining data of the tests listed below include performance and/or characteristic data which result from a process chain. Any requirements of process capability indices and statistical process control need to be agreed between the customer and the supplier. Agreed tolerances, however, have to be respected.5.2 Procedure5.2.1 General procedureThe approval of brake linings is made by vehicle testing and a concurrent determination of its properties by the test standards listed here.The manufacturer of brake linings ensures that the parameters, the composition and the monitoring of the specified process parameters are maintained by regulated and auditable procedures.The determination of performance data via the test standards listed here at the end of this process chain and comparison with the tolerance serves as confirmation that the prescribed procedures were correctly performed. The time delay between processing and testing does not permit process intervention such as SPC (statistical process control).Determination of performance data on completed brake linings during a batch test serves as continuing proof of conformity and permits the observation of trends.The tolerance range for these data is determined as described in 5.2.2 to 5.2.5 below. 5.2.2 Prototyping — Customer samples (phase 4)Initial specification of tolerances are determined from the values of the batch tests of the prototype sampling. The assessment takes account of the data of the variant then approved. The tolerances arising from the approved prototypes are registered in the lining data sheet (LDS).--`,,```,,,,````-`-`,,`,,`,`,,`---ISO 15484:2008(E)5.2.3 Specification/validation (phases 5 and 6)Results are obtained from the batches of the product transferred to series production, under the condition that the composition, the process, the brake, disc or drum and geometry are determined and comply with the state of the series. The results are verified with the customer. Variations to the tolerances shall be agreed with the customer and results shall be recorded on the lining data sheet (LDS). Specifications of tolerance are agreed with the customer viewing the data, using statistical analyses as appropriate.5.2.4 Series monitoring (phase 7)The ongoing surveillance of the series production (phase 7) shall be in accordance with the test frequencies and sample size which are fixed in a control plan by the manufacturer based on the process controls on series production.5.2.5 Review of toleranceA review of the tolerance following a number of batch tests to be determined can be performed by the friction material manufacturer and the customer.5.3 Phases of product quality preplanningThe phases of product quality preplanning are shown in Figure 1.Figure 1 — Phases of product quality preplanning5.4 Test plan5.4.1 GeneralSeparate test plans are made for passenger cars and commercial vehicles. The test plans differentiate four basic categories of tests:a) general;© ISO 2008 – All rights reserved5b) physical properties; c) corrosion;d) inertia dynamometer tests.This International Standard defines preferred test procedures. Because of established databases and practices, alternative and regional tests are accommodated in the test plans. The companies working in another region should respect local practices. The future goal is the complete harmonization of the test procedures.5.4.2 Test plan for passenger car disc brake padsThe test plan for passenger car disc brake pads is shown in Figure 2. MSDS Material Safety Data SheetIndex:A The values so designated are to be shown as a trend representation starting from phase 5B Within a Product audit as per manufacturer's control planC Frequency and sample size as manufacturer´s control planD Tests with new linings from each part numberE Tests with new linings from inner or outer sideF General process/machine tests with new linings from inner or outer side (n/n), not for each part numberG All pads for noise dyno testsH Selection of wear test option in agreement with customerNotes:1 Full dimensional inspection only for PPAP (initial sampling)2 Evaluation of statistical distribution; samples for further tests to be derived from statistical distribution3 1 test during production transfer, primarily the first batchRemarks:Test quantities are valid for each part number ! Separate for inner and outer pads. PPAP (Initial sampling) could be in-between or after Phase 5+6.The a.m. sampling quantities are the sufficient requirements. For prototypes, the sample can be reduced if there is a proven shortage of parts.For repeated sampling also tests can be left out, e.g. SAE J2707 wear testing.The complete test plan applies to new products or to friction material changes in existing products.Figure 2 — Test plan for passenger car disc brake padsCopyright International Organization for Standardization Provided by IHS under license with ISONot for ResaleNo reproduction or networking permitted without license from IHS--`,,```,,,,````-`-`,,`,,`,`,,`---6© ISO 2008 – All rights reserved5.4.3 Test plan for passenger car drum brake linings/lined shoesThe test plan for passenger car drum brake linings/lined shoes is shown in Figure 3. MSDS Material Safety Data SheetIndex:A The values so designated are to be shown as a trend representation starting from phase 5B Within a Product audit as per manufacturer's control planC Frequency and sample size as manufacturer´s control planD Tests with new linings from each part numberE General process/machine tests with new lined shoes, not for each part numberF Selection of wear test option in agreement with customerNotes:1 Full dimensional inspection only for PPAP (initial sampling)2 If applicable3 1 test during production transfer, primarily the first batchRemarks:Test quantities are valid for each part number !PPAP (Initial sampling) could be in-between or after Phase 5+6.The sampling quantities stated for brake linings are the minimum requirement. For prototypes, the sample can be reduced if there is a proven shortage of parts.For repeated sampling also tests can be left out, e.g. SAE J2707 wear testing.The complete test plan applies to new products or to friction material changes in existing products.Figure 3 — Test plan for passenger car drum brake linings/lined shoesCopyright International Organization for Standardization Provided by IHS under license with ISONot for ResaleNo reproduction or networking permitted without license from IHS--`,,```,,,,````-`-`,,`,,`,`,,`---© ISO 2008 – All rights reserved75.4.4 Test plan for commercial vehicle disc brake padsThe test plan for commercial vehicle disc brake pads is shown in Figure 4. MSDS Material Safety Data SheetIndex:A The values so designated are to be shown as a trend representation starting from phase 5B Within a Product audit as per manufacturer's control planC Frequency and sample size as manufacturer´s control planD Tests with new linings from each part numberE Tests with new linings from inner or outer sideF General process/machine tests with new linings from inner or outer side (n/n), not for each part numberG All pads for noise dyno testsH Selection of wear test option in agreement with customerNotes:1 Full dimensional inspection only for PPAP (initial sampling)2 1 test during production transfer, primarily the first batchRemarks:Test quantities are valid for each part number ! Separate for inner and outer pads. PPAP (Initial sampling) could be in-between or after Phase 5+6.The sampling quantities stated for brake pads are the minimum requirement. For prototypes, the sample can be reduced if there is a proven shortage of parts.For repeated sampling also tests can be left out, e.g. SAE J2707 wear testing.The complete test plan applies to new products or to friction material changes in existing products.Figure 4 — Test plan for commercial vehicle disc brake padsCopyright International Organization for StandardizationProvided by IHS under license with ISONot for ResaleNo reproduction or networking permitted without license from IHS--`,,```,,,,````-`-`,,`,,`,`,,`---8© ISO 2008 – All rights reserved5.4.5 Test plan for commercial vehicle drum brake liningsThe test plan for commercial vehicle drum brake linings is shown in Figure 5. MSDS Material Safety Data SheetIndex:A The values so designated are to be shown as a trend representation starting from phase 5B Within a Product audit as per manufacturer's control planC Frequency and sample size as manufacturer´s control planD Tests with new linings from each part numberE Tests with new leading or trailing segments or anchor or cam block G Selection of wear test option in agreement with customerNotes:1 Full dimensional inspection only for PPAP (initial sampling)2 1 test during production transfer, primarily the first batchRemarks:Test quantities are valid for each part number !PPAP (Initial sampling) could be in-between or after Phase 5+6.The sampling quantities stated for brake linings are the minimum requirement. For prototypes, the sample can be reduced if there is a proven shortage of parts.For repeated sampling also tests can be left out, e.g. SAE J2707 wear testing.The complete test plan applies to new products or to friction material changes in existing products.Figure 5 — Test plan for commercial vehicle drum brake linings6 Checks and requirements — Brake lining complete6.1 General (visual, dimensional and material checks)6.1.1 Visual inspectionBrake linings shall exhibit no faults which could impair their function. The brake linings are inspected in the “as supplied” condition. The characteristic features for the visual inspection are defined in ISO/PAS 22574. 6.1.2 Underlayer distributionThe test method shall be in accordance with SAE J2724.Copyright International Organization for StandardizationProvided by IHS under license with ISONot for ResaleNo reproduction or networking permitted without license from IHS--`,,```,,,,````-`-`,,`,,`,`,,`---© ISO 2008 – All rights reserved96.1.3 DimensionsThe dimensions of the brake linings which are to be tested shall comply with the appropriate current part drawing.6.1.4 MaterialThe brake lining manufacturer shall ensure and document the uniformity of material quality. The batch data of the approved initial samples are taken as a reference for all production batches. Potential test procedures in addition to raw material test results and certificates can be: ⎯ thermogravimetric analysis (TGA); ⎯ thermomechanical analysis (TMA); ⎯ pyrolytic gas chromatography (PGC); ⎯ differential-scanning-calorimetry (DSC); ⎯ electronic-differential-X-ray (EDX). This list does not exclude other test techniques.The material of the pad backing plate, the insulating shim, the retaining spring and the pad wear warning device shall comply with relevant drawing instructions.6.2 Physical properties6.2.1 Density 6.2.1.1Method of determinationThe density of friction materials is determined by the water displacement method. The procedure is based on the Archimedes principle. This states that a body fully immersed in water will exhibit an apparent loss of mass equivalent to the mass of the displaced water. Because 1 cm 3 of water weighs one gram at 4 °C, the loss of mass in water can be regarded as a numerical value equivalent to the volume. The density is therefore equal to the quotient of the mass in air and the mass of the displaced water.The test method in accordance with JIS D 4417 may be used as an alternative. 6.2.1.2 ApparatusA suitable underfloor weigher, by means of which the mass of the sample can be weighed in grams within a tolerance of 0,1 % and to whose weighing facility a thin wire, light wire basket or clasp can be attached without any adverse effects on the result.A water vessel in a size which allows the sample to be completely immersed in the water, without coming into contact with the bottom or side walls of the vessel. 6.2.1.3 Sample preparationThe friction material can be used wholly or in part for determining the density.Cut-out parts should have a minimum mass of 5 g. Rough surfaces shall be flat and smooth, to prevent the formation of bubbles when immersed in water. Care shall be taken that the samples are free from possible underlayer or bonding residue.Copyright International Organization for Standardization Provided by IHS under license with ISONot for ResaleNo reproduction or networking permitted without license from IHS--`,,```,,,,````-`-`,,`,,`,`,,`---10© ISO 2008 – All rights reserved6.2.1.4 ProcedureThe test is carried out at a temperature of (23 ± 2) °C. The water used is free from any suspended particles. Approximately 0,01 % of a wetting agent is added to the water in the water vessel in order to reduce its surface tension. If the water is visibly contaminated, it shall be replaced.First, the mass of the sample in air (m a ) shall be determined. Then the sample shall be completely immersed into the water by means of a wire, in a light wire basket, or using a clasp, and in the water its mass (m w ) shall be measured following an immersion period of 10 s. Ensure that no air bubbles adhere to the sample. 6.2.1.5 CalculationThe density, ρ, is calculated as follows:aa w m m m ρ≅−aV m ρ=a wwaterV m m ρ=−(1)wherem a is the pad mass in air; m w is the pad mass in water; Vis the pad volume.6.2.1.6 Test reportState the density figure for each product as a single numerical value to the nearest 0,01 g/cm 3. If portions (parts) of a pad are measured, the average of three sample results shall be taken as the density of the product. 6.2.2 Porosity 6.2.2.1Method of determinationThe measured density of the friction material is compared to the calculated density. The measured density is based on either the specific gravity of the sample or dimensional measurements to determine the sample volume and mass. The calculated density is based on the density of each of the brake lining components and the mass proportion in the formulation.The test method in accordance with JIS D 4418 may be used as an alternative. 6.2.2.2 Sample preparationIf the sample volume is to be determined by dimensional measurements, it shall be ground with flat parallel sides which allow acceptable thickness, length and width measurements to the nearest 0,1 % of the nominal sizes.Copyright International Organization for Standardization Provided by IHS under license with ISONot for ResaleNo reproduction or networking permitted without license from IHS--`,,```,,,,````-`-`,,`,,`,`,,`---© ISO 2008 – All rights reserved116.2.2.3 Procedure 6.2.2.3.1 Inspect the part for adequate grind.6.2.2.3.2 Measure the sample length, width and thickness, each to the nearest 0,1 %. 6.2.2.3.3Measure the mass of the sample to the nearest 0,1 %.6.2.2.3.4 Obtain the real density and the mass percentage of each raw material in the formulation. Do not include any fugitive materials such as solvents. 6.2.2.4 CalculationThe porosity, P , is calculated as follows:net 1100%P ρρ⎛⎞=−× ⎜⎟⎝⎠(2)whereρ is mass/(length × width × thickness);ρnet is the absolute or real density without pore volume, calculated from a weighted average of the realdensity of the pad lining components.6.2.2.5 Test reportReport porosity to the nearest 0,1 %. 6.2.3 pH-indexThe test method shall be in accordance with JASO C458-86. 6.2.4 Cold and hot compressibilityThe test method shall be in accordance with ISO 6310. 6.2.5 Swell and growthThe test method shall be in accordance with ISO 6310.The test method in accordance with SAE J160 may be used as an alternative/regional test. 6.2.6 Thermal transmissionThe test method shall be in accordance with ISO 6310. 6.2.7 Shear strengthThe test method shall be in accordance with ISO 6312. 6.2.8 T-pull test (bonded insulator)The test method shall be in accordance with SAE J2694.Constant cross-head speed is an alternative to constant ramp load.Copyright International Organization for StandardizationProvided by IHS under license with ISONot for ResaleNo reproduction or networking permitted without license from IHS--`,,```,,,,````-`-`,,`,,`,`,,`---。
3GPP TS 36.331 V13.2.0 (2016-06)
3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。
__attribute__用法
__attribute__用法在C语言中,__attribute__是一种特殊的语法,用于给函数、变量、结构体等对象添加属性。
它可以用于告诉编译器一些额外的信息,帮助编译器进行优化或者进行静态检查。
在本文中,我们将对__attribute__的使用方法进行详细解析,并介绍一些常用的属性。
1. __attribute__((packed))__attribute__((packed))可以用于结构体或者联合体,它告诉编译器不要对结构体进行字节对齐。
在默认情况下,编译器会对结构体进行字节对齐,以提高读写效率。
但是在一些特殊情况下,我们需要按照实际占用的字节数来定义结构体,这时就可以使用packed属性。
例如,我们定义一个结构体来表示一个位域:```struct BitField {unsigned int a : 1;unsigned int b : 2;unsigned int c : 3;} __attribute__((packed));```在上面的例子中,由于使用了packed属性,结构体BitField的大小将是6个字节,而不是按照默认的对齐方式4个字节。
2. __attribute__((aligned(n)))__attribute__((aligned(n)))可以用于变量或者结构体,它告诉编译器将对象对齐到n字节边界。
默认情况下,编译器会按照最大基本类型的大小进行对齐,例如int型变量会按照4字节对齐。
例如,我们定义一个变量,并要求将其对齐到8字节边界:```int var __attribute__((aligned(8)));```在上面的例子中,变量var将被对齐到8字节边界。
3. __attribute__((noreturn))__attribute__((noreturn))用于告诉编译器一个函数不会返回。
这对于一些特殊的函数非常有用,如exit函数、abort函数等。
snort语法的content意思
一、概述在网络安全领域,Snort是一个广泛应用的开源网络入侵检测系统(NIDS),它可以实时监测网络流量,以发现可能存在的入侵行为。
而在Snort规则编写中,content语法则是一项非常重要的组成部分。
本文将对content语法的含义和用法进行详细的介绍,帮助读者更好地理解和应用Snort规则。
二、content语法的含义1. content语法是Snort规则中的一个关键字,它用于指定规则所要检测的数据内容。
2. 一般来说,content语法会跟随一个字符串参数,用于定义规则所要匹配的具体内容。
3. 当网络流量中包含了规则指定的内容时,Snort就会触发相应的警报。
三、content语法的用法1. 语法格式content: "some_content";2. 示例一个简单的Snort规则可以使用content来检测HTTP请求中是否包含"GET"方法:alert tcp any any -> any 80 (content: "GET"; sid: xxx;)四、content语法的注意事项1. 区分大小写在使用content语法时,需要注意字符的大小写,Snort是区分大小写的,因此在定义content时需要保持一致。
2. 负载数据content语法主要用于检测流量中的负载数据(Payload),因此在编写规则时,需要选择合适的协议和端口,并确保内容匹配的准确性。
3. 多个条件可以在一个规则中使用多个content语法,来匹配不同的数据内容,以更全面地检测可能的入侵行为。
五、总结通过本文的介绍,相信读者对于Snort规则中content语法的含义和用法有了更清晰的认识。
在实际应用中,合理地使用content语法可以有效提升规则的准确性,帮助网络管理员更有效地监控和防范潜在的安全威胁。
希望本文能为读者在网络安全防御方面提供一些参考和帮助。
【计算机工程与设计】_知识_期刊发文热词逐年推荐_20140726
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
蚁群算法 虚拟网络 虚拟知识社区 虚拟机 芯片设计 节点词 色彩空间 自适应 自然态 自动判卷 聚类 联合指挥控制通信信息交换数据模型 网络视频会议 网络本体语言 网络教学 网络学习 网站评价 网站拓扑 编码 综合评价 综合访问控制策略 维数约减 统计语言模型 统一建模语言 结构学习 组织符号学 繁殖 系统设计与分析 粗糙近似 粒度计算 粒度商 算法 策略 笔消息 笔式用户界面 窄带 空间知识 空中交通管理 程度粗糙集 短波跳频调制解调器 矩阵迭代 知识集成 知识表示 知识获取 知识检索模型 知识推理 知识地图 知识发现 知识单元 知识产权核 相位 相似性 相似上近似 目标知识库
行动推理 行业信息化建设知识 蚁群算法 虚拟试戴 虚拟数据库 自动调制识别 脉冲成形 背景噪声 背景信息 肤色检测 聚类分析 聚类 联机处理分析 联机分析挖掘 网络学习支持环境 网络备课 网络信息挖掘 编目 综合bayesian分类法 维度 组安全关联密钥管理协议 系统集成芯片 粗糙集理论 粗糙熵 粗糙度 簇 竞争神经网络 程序外驱动 移动教育 移动代理 神经网络 知识驱动 知识评价 知识继承 知识结构 知识粒度 知识熔接 知识模型 知识推理 知识产权核 知识 眼镜适配 眼镜试戴 相似性 直方图 疾病诊断系统 生命周期 现场可编辑逻辑阵列 特征提取 特征分析 点删除 灰色关联分析 滤波 混合推理
attributed by的用法 -回复
attributed by的用法-回复[attributed by的用法] 是指通过指定来源或者引用来表明某事物或某说法的来源。
在写作中,使用该短语可以增加文章的可信度,避免误导读者。
首先,我们来了解一下attributed的含义。
Attributed是英语单词attribute的过去分词形式,意为“归因于”或“归功于”。
当我们在文章中使用“attributed by”的短语时,我们要说明某个观点、说法或数据的来源,以确保读者能够获得准确和可信的信息。
在开始写作之前,我们应该对所讨论的主题或问题进行深入研究,并收集相关的资料和信息。
这些资料可以来自书籍、学术论文、专家采访、调查报告、新闻报道等。
一旦我们找到了合适的来源,我们就可以在文章中使用“attributed by”来引用这些资料,为我们的观点提供扎实的支持。
在文章的引言部分,我们可以使用“attributed by”来引用相关的研究或观点,以简要概括主题并引起读者的兴趣。
例如:“According to a study conducted by Smith and Johnson (2018), the correlation between sleep deprivation and decreased cognitive function has been well-established.”在这个例子中,我们通过使用“attributed by”指出了这个观点的来源,使读者了解到这个观点是经过研究和验证的。
在文章的主体部分,我们可以使用“attributed by”来引用和解释专家的观点、研究结果或者其他相关的数据。
这样可以增加我们的文章的可信度,并加强我们的论证。
例如:“John Doe, a renowned psychologist, argued that the rise in social media usage among teenagers can be attributed to the need for social validation and fear of missing out."在这个例子中,我们提到了心理学家John Doe的观点,并使用了“attributed by”来强调这个观点的来源。
attributed by的用法
attributed by的用法在英语中,我们常常会在句子中看到“attributed by...”这样的短语,它通常出现在引用、评论或者说明他人的观点、想法时。
这种结构可以清楚地表明信息或观点的来源,增加文章的权威性和可信度。
下面我们将深入探讨其用法,并举例说明如何在实际写作中使用它。
首先,我们需要了解“attributed by”的基本含义。
它指的是“由...归因于”,通常用于表示某观点、信息或数据是由某人、某组织或某机构提出的。
这种用法在引用他人的观点、评论或评论他人的观点时非常常见。
一、使用方法1. 明确指出来源:在“attributed by”后面,我们需要添加明确的来源信息,如人名、组织名、期刊名等。
确保来源清晰,有助于读者了解信息的可靠性。
2. 符合语法规则:在句子中,“attributed by”通常位于句子的末尾或句子的开头,需要遵循语法规则。
3. 避免滥用:虽然“attributed by”在表达引用、评论他人的观点时有其必要性和实用性,但我们不能滥用此用法。
只有当确实引用或评论了他人观点时,才使用该结构。
二、实际应用举例1. 引用学术论文:在描述一项科学实验的结果时,我们可以使用“attributed by”来明确指出某篇学术论文的研究成果。
例如:“The results of the recent study, attributed to Dr. Smith, suggest that increased exercise can significantly improve mental health.”2. 评论新闻报道:当我们对一则新闻报道进行评价时,可以使用“attributed by”来表明信息的来源。
如:“The claim that vaccines cau se autism is attributed to a fringe group of activists, not supported by scientific evidence.”3. 分享观点:在个人社交媒体帖子中,我们可以使用“attributed by”来表达对他人观点的认同。
DNS题库
QUESTION 14(DHCP)你的公司有四个运行Windows Server 2008 R2的DNS服务器。
每个服务器有一个静态的IP地址。
你必须防止将DNS服务器的地址分配给DHCP客户端。
你应该怎么做?A.为DNS服务器创建一个新的作用域。
B.创建一个DHCP服务器保留选项。
C.配置005名服务器配置作用域选项。
D.配置包含这四台DNS服务器IP地址的例外。
Answer: DQUESTION 15你有一台名称为server1的DHCP服务器和一台名称为server2的应用程序服务器。
这两台服务器运行Windows Server 2008 R2。
DHCP服务器包含一个作用域。
您需要确保Server2上总是收到相同的IP地址,Server2上也必须从server1上接收到DNS设置和WINS设置。
你应该怎么做?A.创建一个多播范围。
B.给Server2分配一个静态IP地址。
C.创建一个在DHCP范围之外的区域。
D.在DHCP作用域上创建一个DHCP保留。
Answer: DQUESTION 23您的公司使用Active Directory集成的DNS。
用户需要访问互联网。
您运行网络捕获,您注意到DNS服务器发送DNS名称解析查询到名为f.root - 服务器。
您需要阻止发送查询到f.root - DNS服务器。
服务器必须能够解析Internet主机名。
你应该执行哪两个动作?(每一个正确的答案代表解决方案的一部分。
选两项)。
A.启用转发到你的ISP的DNS服务器。
B.禁用DNS服务器上的根提示。
C.禁用DNS服务器上的网络掩码排序选项。
D.为网络中的IP子网配置反向查询区域。
Answer: ABQUESTION 24你的公司有一个单一的活动目录林,林中包含有六个域。
林中的所有DNS服务器运行Windows Server 2008 R2中。
您需要确保所有的公共DNS查询都通过一台唯缓存DNS服务器。
peoplesoft中putattachment
peoplesoft中putattachment
在PeopleSoft中,PUTATTACHMENT是一个用于将文件附加到记录中的API函数。
它允许开发人员将文件上传到数据库中,并将其与特定记录相关联。
使用PUTATTACHMENT函数,您需要提供以下参数:
1.记录标识符:这是要附加文件的记录的标识符,通常是主键值。
2.文件名:这是要上传的文件的名称。
3.文件内容:这是要上传的文件的实际内容。
PUTATTACHMENT函数将文件内容存储在数据库中,并将其与指定的记录相关联。
您可以使用其他PeopleSoft API函数来检索和检索附加的文件内容。
请注意,PUTATTACHMENT函数是PeopleSoft应用程序编程接口(API)的一部分,它允许开发人员与PeopleSoft应用程序进行交互和自定义。
因此,您需要具有适当的编程技能和经验才能使用PUTATTACHMENT函数。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Attribute-Based Content Distribution with HiddenPolicyShucheng Yu†,Kui Ren ,and Wenjing Lou††Department of ECE,Worcester Polytechnic Institute,MA01609{yscheng,wjlou}@Department of ECE,Illinois Institute of Technology,IL60616kren@Abstract—Access control in content distribution networks (CDNs)is a long-standing problem and has attracted extensive research.Traditional centralized access control approaches,such as reference monitor based approach,do not suit for CDNs as such networks are of large scale and geographically distributed in nature.Current CDNs usually resort to cryptographic-based distributed approaches for better fulfilling the goal of access con-trol.Hence,it is highly critical to design and adapt appropriate cryptographic primitives for such purpose.In this paper,we propose a novel distributed access control approach for CDNs by exploiting a new cryptographic primitive called Ciphertext Policy Attributed-Based Encryption(CP-ABE).Our approach provides flexible yetfine-grained access control(perfile level)so that the contents are available only to the authorized users.We further consider the protection of user privacy and enhance the current design of CP-ABE so that not only the contents themselves but also the access policies,which could lead to the revelation of sensitive user information,are well protected.I.I NTRODUCTIONThe emergence of content distribution networks(CDNs)has greatly bridged the gap between the content publishers and the end users.A typical CDN often consists of a large number of nodes deployed in geographically distributed locations across the global Internet.To optimize the delivery process,a CDN usually replicates content among its nodes.End users’requests for content are then algorithmically directed to nodes that meet certain predefined criteria such as minimal delay,minimal number of hops,etc.Among otherflavors,non-profitable CDNs[1]exploit the bandwidth of volunteers to balance the workload among network nodes in contrast to the commercial CDNs based on dedicated servers.When such a model makes content publish and access more efficient than ever,it also introduces particular challenges for access control of private contents restricted to only authorized users.Because CDN nodes are highly distributed,it is not possible to employ the traditional centralized access control approaches,such as reference monitor approach[2].And the fact that individual CDN nodes themselves may not be trustable makes it even harder to enforce reliable access control.Current solutions[3]–[5]usually follow the cryptographic-based approach where the contents are encrypted before being stored in CDNs,and the decryption keys are distributed only to respective authorized users.In the cryptographic-based approach,flexibility and granularity of content access control heavily relies on the underlying cryptographic primitives beingused.Solutions based on conventional pairwise key or groupkey primitives repeatedly exhibit difficulties in resolving thetension between the complexity of key management andgranularity of access control.For example,in[4],to achieveperfile access control,a symmetric key and an asymmetrickey-pair are generated for each newfile created.And the cor-responding decryption keys are then distributed to respectiveauthorized users.Obviously,the number of keys that has to bemanaged by each user is linear to that of the totalfiles.Whilesuch an approach can achievefine grained access control,itsapplicability in large scale is poor given the high complexityof key management.In[3],files are categorized into multiplefilegroup,and thefiles of the samefilegroup are all protectedwith the same key.This approach reduces the key managementcomplexity but can only offer coarse-grained access control asit requiresfilegroups to be relatively static and their numberto be small for avoiding heavy communication load for keyrequests due tofilegroup dynamics.Hence,it remains tofinda solution which provides bothfine-grained access control andlightweight key management simultaneously.In this paper,we propose a PKC-based solution aiming atresolving the above problem.To providefine-grained accesscontrol,we explore a novel cryptographic primitive calledciphertext policy attribute-based encryption(CP-ABE).In oursolution,each user is associated with a set of attributes basedon which the user’s secret key is generated.Files are encryptedunder CP-ABE such that only those whose attributes matchthe access policy are able to decrypt ing CP-ABE,ourprotocol is able to provide not only perfile grained accesscontrol,but also sophisticated access control semantics suchas“(manager∧(work experience>5y)∧know Spanish)∨((position>manager)∧HR department)”.Furthermore, key management in the proposed solution is kept simple asusers are only required to keep track of a single system-widesecret key information.To this end,a key chain is designedto record the evolution of the system secret so that users canalways get re-synchronized even after being off-line for a longperiod.Another salient feature is that our solution also protectsuser privacy by hidingfiles’access policies,which is knownonly to thefile owner himself.The rest of this paper is organized as follows.Section IIintroduces the required preliminaries.Section III presents ourscheme.Section IV briefly analyzes security and efficiency performance of our protocol.Section V concludes this paper.II.P RELIMINARIESThis section briefly introduces CP-ABE as well as the user revocation strategy used by our protocol.A.Ciphertext Policy Attribute-Based EncryptionIn CP-ABE[6],each user is associated with a set of attributes and her secret key is generated based on these attributes.When encrypting a message,the encryptor specifies the threshold access structure for her interested attributes. Message is then encrypted based on this access structure such that only those whose attributes satisfy the access structure can decrypt it.Unintended users,however,are not able to decrypt the cihpertext even if they collude.In current CP-ABE schemes,the access structure is sent in plaintext.A CP-ABE scheme consists of four algorithms:Setup This algorithm takes a security parameterκas input and generates the public key PK and a system master secret key MK.PK is used for encryption.MK is used to generate user secret keys1.It is known only to the central authority. Encrypt This algorithm takes as input the public key PK,a message M,and an access structure P.It outputs the cihphertext CT.KeyGen This algorithm takes as input a set of attributes S associated with the user and output a secret key SK that identifies with S.Decrypt This algorithm takes as input the ciphertext CT and a secret key SK for an attributes set S.If only S satisfies the access structure,does it return the message M.We refer to[6],[7]for more details.B.Member RevocationMember revocation is an important yet difficult issue in identity-based encryption and related schemes.In current construction of CP-ABE[6],member revocation is realized by associating each user’s secret key SK with an expiration date,say X.Message is encrypted on some date Y such that the user are able to decrypt if only X≥Y.This solution has a salient property that the access privilege of any user is automatically revoked after the expiration date.One drawback of this approach,on the other hand,is that it alone is not able to deal with early revocation(i.e.,revoke the user before his key expires)in case of malicious behavior detected or at the user’s will.To enable early user revocation,we need to update the system master secret key SK2for the remaining users while preventing the leaving user from being updated. As future content is encrypted under the new P K(and hence SK),the leaving users is not able to decrypt.In the following sections,we use a symbol K A to represent the CP-ABE public key and system master secret key.When we say“update K A”,we actually mean“update both the 1MK is also used when generating PK.2PK is updated accordingly as well.PK CP-ABE public key.MK CP-ABE system master secret key which is used to generate both PK and SK.SK CP-ABE user secret key.P,p Access policy/structure.K A A notation to represent PK and MK.Incremental of K AΔck Content encrypt key which is used to encrypt files.kek File-lockbox key which is used to protect each file’s content encrypt key ck.{m}k Encrypt message m using asymmetric key k.[m]k Encrypt message m using symmetric key k.kek_ab kek of version b for access policy a.KA_i K A of version i.notation meaningFig.1.Main notations and their meaningssystem master secret key and the public key”.Encrypting using CP-ABE is simply denoted by encrypting using K A.Figure1 lists our definition of main notations used in this paper.III.O UR C ONSTRUCTIONThis section introduces our design.We start with introduc-ing models and goals used in our design.Next we present our key management scheme independently since it is critical to our design.Then we describe the execution of our protocol. Finally,we give an enhanced design in which access policy of some critical content can be hidden at the content publisher’s choice.A.Models and GoalsOur network model,security goals,and adversary model are defined as follows.Network Model Three parties are involved in our pro-tocol:the content provider,CDN nodes,and end users.The content provider is the party who provides various kinds of content services such asfile download,multimedia broadcast, and etc.They could be commercial or non-commercial parties. Each of them has at least the same computational power than a modern commercial server.CDN nodes are the parties who are responsible for efficiently delivering contents to content consumers.They could be either commercial servers or vol-unteers.End users are parties who consume contents provided by CDNs.They each has at least the same computational power than a modern work connection is assumed to be broadband.We do not make security assumptions on communication channels.Security Goals The main security goal of our protocol is to prevent content from being accessed by unauthorized users. In particular,revoked users could not be allowed to access contents published after they leave.Content integrity is not our interest though it is another important security requirement in CDNs.We resort to some existing techniques to address it. Adversary Model In our protocol,adversaries could be unauthorized users or malicious CDN nodes.The main goal of the adversaries is to get access to contents that they are not authorized to.They may work independently or collude.B.Key Management SchemeTo fulfill the task offine-grained access control,our scheme relies on the following key management mechanisms. Hierarchical Key Our protocol encrypts eachfile3in a hierarchical way as follows:{kek}KA,[ck]kek,[file]ckIn this three layer hierarchy,eachfile is encrypted with a unique content encrypt key ck.Each ck is then encrypted with the file−lockbox key[3]kek(both ck and kek are symmetric keys).kek isfinally encrypted using CP-ABE such that only those having the intended attributes are able to decrypt it.If there were no member revocation,ck’s forfiles under the same access policy could be encrypted with the same kek. However,the following two factors should be considered in practice:On the one hand,when creating newfiles,system sometime needs to update kek to prevent them from being ac-cessed by revoked users.On the other hand,to avoid frequent re-encrypting ck’s offiles,we have to adopt a methodology called lazy revocation[3].Under this methodology,member revocation does not require immediate re-encrypting ck’s of oldfiles,following the logic that the revoked member may have already accessed the oldfiles accessible to her.This causes the fact that ck’s of oldfiles and newfiles may be encrypted under different kek’s.To efficiently manage kek’s under the same access policy,we adopt the key regression technique[5].Using this technique,users are able to derive old keys from new keys,while only the content provider herself is able to calculate new keys given old keys.In our key hierarchy, we only encrypt the latest kek with CP-ABE for each access policy.The advantages of using our key hierarchy can be summarized as follows:First,the number of keys each user needs to keep track of is minimized.As shown above,each user only needs to keep her CP-ABE secret key.Second, the vulnerability to known plaintext and known ciphertext attacks is further decreased because eachfile is encrypted with its unique ck.Third,it is computationally efficient since K A and ck are not directly correlated:On the one hand,K A update does not require re-encrypting ck’s;On the other hand, changing ck does not involve expensive CP-ABE operations.Key Chain As mentioned in Section II,CP-ABE supports member revocation by broadcasting a K A update message. However,using broadcast not only causes heavy communi-cation load in large scale systems,but also requires users to be always online.Those whose secret keys are not updated in time have to contact the content provider individually afterward,which turns out to cause extra communication load and demand the content provider to be always online.It is therefore desirable to adopt a technique such that users can get updated without contacting the content provider even after they have been off-line for a long period.3For convenience of expression,we use afile distribution system as an example to describe our protocol for CDNs.To address this problem,we employ a key chain to record the update history of K A as shown in Figure2.This key chain is stored in a public directory on the CDN nodes.Whenever users access thefiles on the CDN nodes,they update their secret keys to the correct version with the help of this key chain.When the content provider updates K A,she always updates the key chainfiles on the CDN nodes in a timely manner., p : access policyΔ: incremental of the key: stage: substagePFig.2.Key Chain for K AIn a key chain,we define stages for K A.On each stage, we record the incremental of K A(denoted byΔ)between the current stage and the last stage as well as the access policy (denoted by P or p)under which this incremental is encrypted. Between two consecutive stages,we also define substages which record the change history of the key in more detail.K A on any substage can be derived from the immediate previous stage via one step as shown in the Figure2.We also define active stages and historical stages.The term active stages refers to the range inside of which K A’s are active,i.e.,existingfiles are encrypted under some of these K A’s.The definition of historical stages is similar except that the K A’s in historical stages are obsolete.The content provider use historical stages to help the users who have not updated their secret key for a long period to update their secret keys.In historical stages,substages are removed.We use the term length to represent the number of stages in active stages or historical stages.The lengths of active stages and historical stages arefixed except for protocol setup ually,the length of active stages is short while that of historical stages is long.For example,if one stage represents a natural day,we can create a key chain having active stages for10days and historical stages for three months.The starting points of active stages and historical stages slide forward by one stage each time.If we assume stage to be a natural day,the starting points change everyday.When the starting points is sliding forward,three operations are executed on the key chainfile:First,files encrypted under K A’s between the oldest and the second oldest active stages are updated with the latest K A.Next,remove the substages between the oldest and the second oldest active stages and set the second oldest active stage as the new starting point of active stages.Finally, set the second oldest historical stage as the new starting point of historical stages and remove the oldest one.Because the “window”of the key chain keeps sliding forward,users whoPolicy Index TableAccess Policy Policy 1Policy kK A Version KEK {KEK_1x}KA_i{KEK_ky}KA_jFile Encrypt Key[k m ]KEK_1z[k n ]KEK_1xFile DescriptionFile m File nFile Index Table…...…...…...…...…...…...Event Flag File Index…...KEK Version …...x yKEK Version xz …...Fig.3.Index Table for Private File Managementhave not accessed the CDN for extremely long period may lose synchronization.In this case,they need to contact the content provider to get re-synchronized.Another concern is how to create a substage.Ideally,once a member revocation event occurs,the content provider should update K A and create a substage.However,this way may cause frequent update to the key chain if the member revocation event happens very frequently.The key chain file may expand to be extremely large as well.An appropriate way is to aggregate member revocation events and update the key chain in a reasonable interval,e.g.,update the key chain every 30minutes if any event happens.Once a new substage is created,system records the event such that new files can use this record to decide if they need to be encrypted under the latest K A .We will discuss it in detail in the next section.C.Protocol DescriptionThis part describes the execution of the protocol.In par-ticular,we discuss the protocol setup process and how the protocol reacts under events such as file access,file create,file delete,member join,member revocation.Before introducing the protocol itself,we discuss an important data structure of our system called index table .Index Table As shown in Figure 3,this data struc-ture contains two type of tables:policy index table and file index tables .The system has a unique policy index table.This table records all the access policies used by the files.Because the number of access policies used could not be larger than the number of the files,the size of this table is at the most comparable to that of the system directory file.Each item in this table has six fields:policy description,K A version,event flag,KEK version,KEK and file index.K A version records the version number of K A (version number is represented by stage and substage)used by current access policy.The event flag field records if any new subtage has been created since the latest upload of file under current access policy.Every time when a new substage is created,system marks the event flag field for each access policy.KEK version field records the latest kek ’s version for current access policy.KEK field records the corresponding credential of the latest version kek .File index field records the link to current access policy’s file index table ,which remembers all the files encrypted under current policy.Each item of the file index table has two columns:file description and the credential for current file’s ck .Now we discuss the execution of the protocol.Protocol Setup Before providing content service,the con-tent provider runs the setup algorithm to configure the system.This setup algorithm is as follows:•First,it defines a set of attributes for users and runs the CP-ABE setup algorithm.•Next,it creates empty index tables and a key chain file containing a start stage.Then,it uploads these files to CDN nodes.•Now the content provider is ready to serve the users.File Access When a file is being accessed,system first gets the access policy of this file and then looks up the policy index table for this ing the content contained in the policy index table,the user can decrypt the kek if she owns required attributes.Then the user reads the KEK version field of this file from file index table.If KEK version is older than that in the policy index table,the user derives the correct version kek from the one she decrypted using key regression method.With correct kek ,the user can decrypt ck and get access to the file.File Create When a file is being uploaded,system first generates a ck and encrypts this file with this ck .Then,system checks the policy index table to see if the access policy of this file has already been recorded.If not,system does the following:(1)create a new kek and encrypt it with the latest K A under the file’s access policy;(2)create a new item in the policy index table and update all the fields of this new item.In particular,the event flag field is set to unmarked status;(3)create an empty file index table and link it to the file index field in policy index table;(4)encrypt current file’s ck with kek and insert the credential to the file index table together with other information.If the file’s policy is already in the policy index table,system first checks the event flag field of current policy.If its status is unmarked,system just creates a new item and inserts it to the file index table for current file.Otherwise,system does the following:(1)generate a new kek based on current kek ;(2)encrypt the new kek with the latest K A ;(3)updates other fields for this access policy accordingly;(4)encrypt the new file’s ck with the new kek and insert it to the file index table together with other information.Uploading files in batch is more efficient than doing that one by one.File Delete To delete afile,system just removes the corresponding item from thefile index table.If currentfile is the last one in thefile index table,system also deletes the corresponding item from the policy index table.Member Join When a new user is to join,she contacts the content provider to obtain her attributes and secret key. The content provider gives this new user her secret key on the oldest active stage.The user can calculate her keys on the remaining stages by herself.In this paper,we assume the new user can contact the content provider via an out-of-band channel and run the CP-ABE algorithm correctly.Member Revocation When our protocol is to revoke a user,it just records the event.Member revocation events are aggregated and processed in batch.When processing the member revocation events,our protocol updates K A,creates a new substage,and sets the eventflag of all the items in policy index table as we discussed previously.D.Access Control with Hidden PolicyThis section considers applications in which access policies for somefiles should be hidden.Here is an example:Company C wants to offer a promotion to consumers of particular attributes.The promotion codefile is published on its server and encrypted such that only the intended consumers can decrypt it.If the access policy is disclosed to others,they may know to whom the promotion is aimed and thus the scale of this activity.To prevent competing companies from knowing this information,company C wants to hides the promotion codefile’s access policy.Similar examples are not hard to find in our life.Actually,if we have a CP-ABE scheme that supports hidden policy,we can embed aforementioned functionality in our protocol:In the policy index table,we just replace the policy descriptionfield with a pseudo policy ID while keeping other fields the same as before.Because the new CP-ABE algorithm can decrypt ciphertext without knowing the access policy,it can decrypt kek correctly and thus get access to thefile. Unfortunately,current constructions of CP-ABE[6],[7]do not support hidden policy.In this section,we will re-design[7]to support hidden policy in CP-ABE.For brevity,we do not present the original scheme in this paper.We refer to the original paper for details.Security Goals Intuitively,our security goal is to prevent users,intended or not,from knowing under which access policy the message is encrypted.They should not be able to obtain this information even if they collude.Our scheme achieves hidden policy based on the Symmet-ric External Diffie-Hellman(SXDH)[8]assumption between paired elliptic curve groups.Definition(SXDH)We say that the SXDH assumption holds if,given values y,y1,y2,y3∈G1,it is not computationally feasible to decide if there is an integer a∈Z p such that y1=y a and y3=y a2,i.e.,G1is a DDH-hard group.The same requirement must hold for G2,i.e.,it is also a DDH-hard group.CP-ABE with Hidden Policy We follow the same definition on the notations as[7].For completeness,we present them here:The set of attributes are defined as N:=1,...,n for some natural number n.Attribute i and their negations¬i are referred to as literals.Let I denote the set of attributes that are needed for decryption.The scheme considers access structures that consist of a single AND gate whose inputs are literals,denoted byi∈Ii,where every i is a literal(i.e.,i or¬i).SETUP.This algorithm selects bilinear groups G1and G2 of prime order p with generator g1and g2respectively.A bilinear map e:G1×G2→G T is defined on them.Next, it chooses random exponents y,t1,...,t2n∈Z p.The public key is published as:P K=(e,g1,g2,Y,T1,...,T2n)where Y=e(g1,g2)y,∀i∈Z2n:T i=g t i1.The master secret key is MK=(y,t1,...,t2n).In our construction,each attribution only has two occurrences:positive and negative.don t care element is discarded,while it is a key element in the original construction.ENCRYPT.Given a message M∈G T and an AND gate W=i∈Ii,the ciphertext is output as CT= (˜C,ˆC,{C i,0,C i,1|i∈N}),where˜C=M·Y s,ˆC=g s, and s is a random number in Z p.For each i∈I,C i,0and C i,1are computed as follows.•if i=i,C i,0=T s i,C i,1=T x n+i.•if i=¬i,C i,0=T x i,C i,1=T s n+i.x is a random number in Z p.For each i/∈I,C i,0=T s i and C i,1=T s n+i.KEYGEN.Let S denote the input attribute set.Every i/∈S is considered a negative attribute.The secret key is definedas SK=(ˆD,{D i|i∈N}),whereˆD=g y−r2,r=ni=1r i, r i is randomly selected from Z p.For each i∈N,D i=gr it i2 if i∈S;otherwise,D i=gr it n+i2.DECRYPT.Suppose the input ciphertext is of form CT= (˜C,ˆC,{C i,0,C i,1|i∈N}).Let SK=(ˆD,{D i|i∈N}).For each i∈N,if the user’s attribute is positive,thenF i=e(C i,0,D i)=e(g t i·s1,gr it i2=e(g1,g2)r i·s)If the user’s attribute is negative,thenF i=e(C i,1,D i)=e(g t n+i·s1,gr it n+i2=e(g1,g2)r i·s)Decryptfinishes as follows:M=˜CY s=˜Ce(g1,g2)y·s,wheree(g1,g2)y·s=e(g s1,g y−r2)·e(g1,g2)r·s=e(ˆC,ˆD)·ni=1F i.Above equations demonstrate how an intended user candecrypt the ciphertext.If the user is not the intended recipient,there is at least one attribute for which the user gets F i with theform e(g1,g2)r i·x.Therefore,she can not calculate e(g1,g2)y·s as shown in the above equation.Security Intuition As is shown above,ciphertext in ourconstruction does not include the access policy.In decryptalgorithm,the user uses all her attributes to decrypt theciphertext.If the user’s i th attribute is positive while C i,0has the form T x i,this user can not decrypt the ciphertext.However,because the user can not distinguish between T x i andT s i according to SXDH assumption,she is not able to knowwhich attributes are desired by the encryptor.Therefore,shecan not derive any information about the access policy.For thesame reason,an intended user only knows if she can decryptthe ciphertext while not knowing which attributes grant herthe access.Therefore,the access policy is hidden to all theusers.IV.D ISCUSSIONA.Security AnalysisIn our protocol,eachfile is encrypted by a three-layeredhierarchical key.To access afile,the adversaryfirst needs tobreak the CP-ABE scheme to harvest kek,which is hard sincecurrent CP-ABE[7]is proven to be secure even under CCA-2attacks.Moreover,known plaintext and known ciphertextattacks to ck’s andfiles are difficult since each of them isencrypted under a unique random key.Our enhanced CP-ABE with hidden policy is secure under SXDH assumptionas shown above.B.Performance AnalysisThe main concern in terms of performance of our schemeis the efficient implementation offile encryption and userrevocation using CP-ABE.In this paper,we introduce thehierarchical key and an index table to reduce the number ofthe expensive CP-ABE operations.With these techniques,filere-encryption does not involve CP-ABE encryption operations.Encryption offiles under the same access policy just involvesone CP-ABE encryption in total.To facilitate user revocation,we attach an expiration date to each user’s secret key.Inthis way,regular users can be automatically revoked afterthe expiration date.To further support early revocation,weupdate the system master secret key using a key chain.For thispurpose,we can define two attributes for each bit of the userID as is proposed by[9],[10].According to the experimentalresult in[10],the average message complexity for multipleuser revocation in this kind of solution is O(logM),where Mis the total number of users.The constant factor is about3.5.C.Related WorkUsing ABE,Traynor et.al.[11]proposed a conditional ac-cess scheme for massive-scale systems.This scheme is aimedfor massive-scale content distribution systems where contentencryption keys are frequently changed.The authors proposeda novel tired construction in which users are divided into groups.Each group is assigned a group attribute under which the content encrypt key is encrypted.When this construction improves the performance of key distribution,the inherent flexibility of ABE is greatly sacrificed since it mandatorily divide the user access privilege by the group.In addition,as this paper is based on a previous work on threshold ABE[12], which is vulnerable to collusion attacks as is addressed in the paper,its security strength is weakened.V.C ONCLUSIONIn this paper,we propose a PKC-based distributed access control protocol for CDNs.To providefine-grained access control,we explore a novel cryptographic primitive called CP-ABE.Each user is associated with a set of attributes. Eachfile is then encrypted under CP-ABE such that only those whose attributes match the access policy are able to decrypt it.Besides perfile grained access control,sophisticated access control semantics can be achieved in our protocol.Our protocol is also design with key management efficiency in mind.In our protocol,users are only required to keep track of a single system-wide secret key information.To further protect user privacy,our protocol also provides an option for content providers to encryptfiles with hidden policy.An important future work is to implement our protocol and evaluate its practical performance.A CKNOWLEDGMENTThis work was supported in part by the US National Science Foundation under grants CNS-0626601,CNS-0716306,and CNS-0831963.R EFERENCES[1]MU,“Existing cdns.”[Online].Available:http://www.cs.mu.oz.au/ap-athan/CDNs.html[2]J.P.Anderson,“Computer security planning study,”Technical Report73-51,Air Force Electronic System Division,1972.[3]M.Kallahalla,E.Riedel,R.Swaminathan,Q.Wang,and K.Fu,“Plutus:Scalable securefile sharing on untrusted storage,”in USENIX’02,San Francisco,CA,Dec.2002.[4] A.Harrington and C.Jensen,“Cryptographic access control in adistributedfile system,”in SACMAT’03.New York,NY,USA:ACM, 2003,pp.158–165.[5]K.Fu,“Integrity and access control in untrusted content distributionnetworks,”Ph.D.dissertation,MIT,September2005.[Online].Available:/kevinfu/papers/fu-phd-thesis.pdf [6]J.Bethencourt,A.Sahai,and B.Waters,“Ciphertext-policy attribute-based encryption,”in SP’07:Proceedings of the2007IEEE Symposium on Security and Privacy.Washington,DC,USA:IEEE Computer Society,2007,pp.321–334.[7]L.Cheung and C.Newport,“Provably secure ciphertext policy abe,”inCCS’07.New York,NY,USA:ACM,2007,pp.456–465.[8]L.Ballard,M.Green,B.de Medeiros,and F.Monrose,“Correlation-resistant storage via keyword-searchable encryption,”Cryptology ePrint Archive,Report2005/417,Nov.2005,/2005/417.[9]S.Yu,K.Ren,and W.Lou,“Attribute-based on-demand multicastgroup setup with membership anonymity,”in SecureComm’08,Istanbul, Turkey,Sep.2008.[10]L.Cheung,J.A.Cooley,R.Khazan,and C.Newport,“Collusion-resistant group key management using attribute-based encryption,”Cryp-tology ePrint Archive,Report2007/161,2007,/. [11]P.Traynor,K.Butler,W.Enck,and P.McDaniel,“Realizing massive-scale conditional access systems through attribute-based cryptosystems,”in NDSS’08,San Diego,CA,2008.[12]M.Pirretti,P.Traynor,P.McDaniel,and B.Waters,“Secure attribute-based systems,”in CCS’06,Alexandria,V A,Oct-Nov.2006.。