Adaptive Server Selection for Large Scale Interactive Online Games

合集下载

k-medoids 聚类公式字母公式

k-medoids 聚类公式字母公式

k-medoids 聚类算法是一种常用的基于距离的聚类方法,它主要用于将数据集中的数据点划分为若干个类别,使得同一类别内的数据点之间的相似度较高,不同类别之间的相似度较低。

与k-means 算法不同的是,k-medoids 算法使用代表性的数据点(medoids)来代表每个类别,从而使得对噪声和异常值更加稳健。

在k-medoids 聚类算法中,我们首先需要确定聚类的数量k,然后从数据集中随机选择k个数据点作为初始的medoids。

接下来的步骤是不断地迭代,直至收敛为止。

具体的迭代过程如下:1. 初始化:随机选择k个数据点作为初始的medoids。

2. 分配数据点:对于每个数据点,计算它与各个medoids 的距离,并将其分配到距离最近的medoids 所代表的类别中。

3. 更新medoids:对于每个类别,选择一个新的medoids 来代表该类别,使得该类别内所有数据点到新medoids 的距离之和最小。

4. 判断收敛:检查新的medoids 是否与旧的medoids 相同,若相同则停止迭代,否则继续进行迭代。

在k-medoids 聚类算法中,距离的计算可以使用各种不同的距离度量方式,例如欧氏距离、曼哈顿距离等。

对于大规模的数据集,k-medoids 算法可能会比k-means 算法更具有优势,因为它在每次迭代时只需要计算medoids 之间的距离,而不需要计算所有数据点之间的距离,从而可以减少计算量。

k-medoids 聚类算法是一种有效且稳健的聚类方法,它在处理一些特定情况下可以取得比k-means 更好的聚类效果。

通过对数据进行有效的分组和分类,k-medoids 聚类算法在数据挖掘和模式识别领域具有广泛的应用前景。

K-medoids clustering algorithm is a widely used distance-based clustering method for partitioning the data points in a dataset into several categories, in which the similarity of data points within the same category is relatively high, while the similarity between different categories is relatively low. Unlike the k-means algorithm, the k-medoids algorithm uses representative data points (medoids) to represent each category, making it more robust to noise and outliers.In the k-medoids clustering algorithm, the first step is to determine the number of clusters, denoted as k, and then randomly select k data points from the dataset as the initial medoids. The following steps involve iterative processes until the algorithm converges.The specific iterative process is as follows:1. Initialization: randomly select k data points as the initial medoids.2. Data point assignment: for each data point, calculate its distance to each medoid and assign it to the category represented by the nearest medoid.3. Update medoids: for each category, select a new medoid to represent the category, so that the sum of the distances from all data points in the category to the new medoid is minimized.4. Convergence check: check whether the new medoids are the same as the old medoids. If they are the same, stop the iteration; otherwise, continue the iteration.In the k-medoids clustering algorithm, various distance metrics can be used for distance calculation, such as Euclidean distance, Manhattan distance, etc. For large-scale datasets, the k-medoids algorithm may have advantages over the k-means algorithm because it only needs to calculate the distance betweenmedoids at each iteration, rather than calculating the distance between all data points, which can reduce theputational workload.In conclusion, the k-medoids clustering algorithm is an effective and robust clustering method that can achieve better clustering results than the k-means algorithm in certain situations. By effectively grouping and classifying data, the k-medoids clustering algorithm has wide application prospects in the fields of data mining and pattern recognition.Moreover, the k-medoids algorithm can be further extended and applied in various domains, such as customer segmentation in marketing, anomaly detection in cybersecurity, and image segmentation inputer vision. In marketing, k-medoids clustering can be used to identify customer segments based on their purchasing behavior, allowingpanies to tailor their marketing strategies to different customer groups. In cybersecurity, k-medoids can help detect anomalies by identifying patterns that deviate from the norm in network traffic or user behavior. Inputer vision, k-medoids can be used for image segmentation to partition an image into different regions based on similarity, which is useful for object recognition and scene understanding.Furthermore, the k-medoids algorithm can also bebined with other machine learning techniques, such as dimensionality reduction, feature selection, and ensemble learning, to improve its performance and scalability. For example, using dimensionality reduction techniques like principalponent analysis (PCA) can help reduce theputational burden of calculating distances in high-dimensional data, while ensemble learning methods like boosting or bagging can enhance the robustness and accuracy of k-medoids clustering.In addition, research and development efforts can focus on optimizing the k-medoids algorithm for specific applications and datasets, such as developing parallel and distributed versions of the algorithm to handle big data, exploring adaptive and dynamic approaches to adjust the number of clusters based on the data characteristics, and integrating domain-specific knowledge or constraints into the clustering process to improve the interpretability and usefulness of the results.Overall, the k-medoids clustering algorithm is a powerful tool for data analysis and pattern recognition, with a wide range of applications and potential for further advancements andinnovations. Its ability to handle noise and outliers, its flexibility in distance metrics, and its scalability to large-scale datasets make it a valuable technique for addressing real-world challenges in various domains. As the field of data science and machine learning continues to evolve, the k-medoids algorithm will likely remain an important method for uncovering meaningful insights fromplex data.。

德尔·艾美 S5148F-ON 25GbE 顶层架(ToR)开放网络交换机说明书

德尔·艾美 S5148F-ON 25GbE 顶层架(ToR)开放网络交换机说明书

The Dell EMC S5148 switch is an innovative, future-ready T op-of-Rack (T oR) open networking switch providing excellent capabilities and cost-effectiveness for the enterprise, mid-market, Tier2 cloud and NFV service providers with demanding compute and storage traffic environments.The S5148F-ON 25GbE switch is Dell EMC’s latest disaggregated hardware and software data center networking solution that provides state-of-the-art data plane programmability, backward compatible 25GbE server port connections, 100GbE uplinks, storage optimized architecture, and a broad range of functionality to meet the growing demands of today’s data center environment now and in the future.The compact S5148F-ON model design provides industry-leading density with up to 72 ports of 25GbE or up to 48 ports of 25GbE and 6 ports of 100GbE in a 1RU form factor.Using industry-leading hardware and a choice of Dell EMC’s OS10 or select 3rd party network operating systems and tools, the S5148F-ON Series offers flexibility by provision of configuration profiles and delivers non-blocking performance for workloads sensitive to packet loss. The compact S5148F-ON model provides multi rate speedenabling denser footprints and simplifying migration to 25GbE server connections and 100GbE fabrics.Data plane programmability allows the S5148F-ON to meet thedemands of the converged software defined data center by offering support for any future or emerging protocols, including hardware-based VXLAN (Layer 2 and Layer 3 gateway) support. Priority-based flow control (PFC), data center bridge exchange (DCBX) and enhanced transmission selection (ETS) make the S5148F-ON an excellent choice for DCB environments.The Dell EMC S5148F-ON model supports the open source Open Network Install Environment (ONIE) for zero touch installation of alternate network operating systems.Maximum performance and functionalityThe Dell EMC Networking S-Series S5148F-ON is a high-performance, multi-function, 10/25/40/50/100 GbE T oR switch purpose-built for applications in high-performance data center, cloud and computing environments.In addition, the S5148F-ON incorporates multiple architectural features that optimize data center network flexibility, efficiency, and availability, including IO panel to PSU airflow or PSU to IO panel airflow for hot/Key applications •Organizations looking to enter the software-defined data center era with a choice of networking technologies designed to deliver the flexibility they need• Use cases that require customization to any packet processing steps or supporting new protocols• Native high-density 25 GbE T oR server access in high- performance data center environments• 25 GbE backward compatible to 10G and 1G for future proofing and data center server migration to faster uplink speeds. • Capability to support mixed 25G and 10G servers on front panel ports without any limitations• iSCSI storage deployment including DCB converged lossless transactions• Suitable as a T oR or Leaf switch in 100G Active Fabric implementations• As a high speed VXLAN L2/L3 gateway that connects the hypervisor-based overlay networks with non-virtualized • infrastructure•Emerging applications requiring hardware support for new protocolsKey features •1RU high-density 25/10/1 GbE T oR switch with up to forty eight ports of native 25 GbE (SFP28) ports supporting 25 GbE without breakout cables• Multi-rate 100GbE ports support 10/25/40/50 GbE• 3.6 Tbps (full-duplex) non-blocking, cut-through switching fabric delivers line-rate performance under full load**• Programmable packet modification and forwarding • Programmable packet mirroring and multi-pathing • Converged network support for DCB and ECN capability • IO panel to PSU airflow or PSU to IO panel airflow • Redundant, hot-swappable power supplies and fans • IEEE 1588v2 PTP hardware supportDELL EMC NETWORKING S5148F-ON SERIES SWITCHProgrammable high-performance open networking top-of-rack switch with native 25Gserver ports and 100G network fabric connectivity• FCoE transit (FIP Snooping)• Full data center bridging (DCB) support for lossless iSCSI SANs, RoCE and converged network.• Redundant, hot-swappable power supplies and fans• I/O panel to PSU airflow or PSU to I/O panel airflow(reversable airflow)• VRF-lite enables sharing of networking infrastructure and provides L3 traffic isolation across tenants• 16, 28, 40, 52, 64 10GbE ports availableKey features with Dell EMC Networking OS10• Consistent DevOps framework across compute, storage and networking elements• Standard networking features, interfaces and scripting functions for legacy network operations integration• Standards-based switching hardware abstraction via Switch Abstraction Interface (SAI)• Pervasive, unrestricted developer environment via Control Plane Services (CPS)• Open and programmatic management interface via Common Management Services (CMS)• OS10 Premium Edition software enables Dell EMC layer 2 and 3 switching and routing protocols with integrated IP Services,Quality of Service, Manageability and Automation features• Platform agnostic via standard hardware abstraction layer (OCP-SAI)• Unmodified Linux kernel and unmodified Linux distribution• OS10 Open Edition software decoupled from L2/L3 protocol stack and services• Leverage common open source tools and best-practices (data models, commit rollbacks)• Increase VM Mobility region by stretching L2 VLAN within or across two DCs with unique VLT capabilities• Scalable L2 and L3 Ethernet Switching with QoS, ACL and a full complement of standards based IPv4 and IPv6 features including OSPF, BGP and PBR• Enhanced mirroring capabilities including local mirroring, Remote Port Mirroring (RPM), and Encapsulated Remote Port Mirroring(ERPM).• Converged network support for DCB, with priority flow control (802.1Qbb), ETS (802.1Qaz), DCBx and iSCSI TLV• Rogue NIC control provides hardware-based protection from NICS sending out excessive pause frames48 line-rate 25 Gigabit Ethernet SFP28 ports6 line-rate 100 Gigabit Ethernet QSFP28 ports1 RJ45 console/management port with RS232signaling1 Micro-USB type B optional console port1 10/100/1000 Base-T Ethernet port used asmanagement port1 USB type A port for the external mass storage Size: 1 RU, 1.72 h x 17.1 w x 18.1” d (4.4 h x 43.4 w x46 cm d)Weight: 22lbs (9.97kg)ISO 7779 A-weighted sound pressure level: 59.6 dBA at 73.4°F (23°C)Power supply: 100–240 VAC 50/60 HzMax. thermal output: 1956 BTU/hMax. current draw per system:5.73A/4.8A at 100/120V AC2.87A/2.4A at 200/240V ACMax. power consumption: 516 Watts (AC)T yp. power consumption: 421 Watts (AC) with all optics loadedMax. operating specifications:Operating temperature: 32° to 113°F (0° to 45°C) Operating humidity: 5 to 90% (RH), non-condensingFresh Air Compliant to 45CMax. non-operating specifications:Storage temperature: –40° to 158°F (–40° to70°C)Storage humidity: 5 to 95% (RH), non-condensingRedundancyHot swappable redundant power suppliesHot swappable redundant fansPerformanceSwitch fabric capacity: 3.6TbpsPacket buffer memory: 16MBCPU memory: 16GBMAC addresses: Up to 512KARP table: Up to 256KIPv4 routes: Up to 128KIPv6 routes: Up to 64KMulticast hosts: Up to 64KLink aggregation: Unlimited links per group, up to 36 groupsLayer 2 VLANs: 4KMSTP: 64 instancesLAG Load Balancing: User Configurable (MAC, IP, TCP/UDPport)IEEE Compliance802.1AB LLDPTIA-1057 LLDP-MED802.1s MSTP802.1w RSTP 802.3ad Link Aggregation with LACP802.3ae 10 Gigabit Ethernet (10GBase-X)802.3ba 40 Gigabit Ethernet (40GBase-X)802.3i Ethernet (10Base-T)802.3u Fast Ethernet (100Base-TX)802.3z Gigabit Ethernet (1000BaseX)802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN T agging, Double VLAN T agging,GVRP802.1Qbb PFC802.1Qaz ETS802.1s MSTP802.1w RSTPPVST+802.1X Network Access Control802.3ab Gigabit Ethernet (1000BASE-T) orbreakout802.3ac Frame Extensions for VLAN T agging802.3ad Link Aggregation with LACP802.3ae 10 Gigabit Ethernet (10GBase-X)802.3ba 40 Gigabit Ethernet (40GBase-SR4,40GBase-CR4, 40GBase-LR4, 100GBase-SR10,100GBase-LR4, 100GBase-ER4) on optical ports802.3bj 100 Gigabit Ethernet802.3u Fast Ethernet (100Base-TX) on mgmtports802.3x Flow Control802.3z Gigabit Ethernet (1000Base-X) with QSAANSI/TIA-1057 LLDP-MEDJumbo MTU support 9,416 bytesLayer2 Protocols4301 Security Architecture for IPSec*4302 I PSec Authentication Header*4303 E SP Protocol*802.1D Compatible802.1p L2 Prioritization802.1Q VLAN T agging802.1s MSTP802.1w RSTP802.1t RPVST+802.3ad Link Aggregation with LACPVLT Virtual Link TrunkingRFC Compliance768 UDP793 TCP854 T elnet959 FTP1321 MD51350 TFTP2474 Differentiated Services2698 T wo Rate Three Color Marker3164 Syslog4254 SSHv2791 I Pv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1191 Path MTU Discovery1305 NTPv41519 CIDR1812 Routers1858 IP Fragment Filtering2131 DHCP (server and relay)5798 VRRP3021 31-bit Prefixes3046 DHCP Option 82 (Relay)1812 Requirements for IPv4 Routers1918 Address Allocation for Private Internets2474 Diffserv Field in IPv4 and Ipv6 Headers2596 Assured Forwarding PHB Group3195 Reliable Delivery for Syslog3246 Expedited Assured Forwarding4364 VRF-lite (IPv4 VRF with OSPF andBGP)*General IPv6 Protocols1981 Path MTU Discovery*2460 I Pv62461 Neighbor Discovery*2462 Stateless Address AutoConfig2463 I CMPv62464 Ethernet Transmission2675 Jumbo grams3587 Global Unicast Address Format4291 IPv6 Addressing2464 Transmission of IPv6 Packets overEthernet Networks2711 IPv6 Router Alert Option4007 IPv6 Scoped Address Architecture4213 Basic Transition Mechanisms for IPv6Hosts and Routers4291 IPv6 Addressing Architecture5095 Deprecation of T ype 0 Routing Headers inI Pv6IPv6 Management support (telnet, FTP, TACACS,RADIUS, SSH, NTP)OSPF (v2/v3)1587 NSSA1745 OSPF/BGP interaction1765 OSPF Database overflow2154 MD52328 OSPFv22370 Opaque LSA3101 OSPF NSSA3623 OSPF Graceful Restart (Helper mode)*BGP 1997 Communities 2385 MD52439 Route Flap Damping 2796 Route Reflection 2842 Capabilities 2918 Route Refresh 3065 Confederations 4271 BGP-44360 Extended Communities 4893 4-byte ASN5396 4-byte ASN Representation 5492Capabilities AdvertisementLinux Distribution Debian Linux version 8.4Linux Kernel 3.16MIBSIP MIB– Net SNMPIP Forward MIB– Net SNMPHost Resources MIB– Net SNMP IF MIB – Net SNMP LLDP MIB Entity MIB LAG MIBDell-Vendor MIBTCP MIB – Net SNMP UDP MIB – Net SNMP SNMPv2 MIB – Net SNMP Network Management SNMPv1/2SSHv2FTP, TFTP, SCP SyslogPort Mirroring RADIUS 802.1XSupport Assist (Phone Home)Netconf APIs XML SchemaCLI Commit (Scratchpad)AutomationControl Plane Services APIs Linux Utilities and Scripting Tools Quality of Service Access Control Lists Prefix List Route-MapRate Shaping (Egress)Rate Policing (Ingress)Scheduling Algorithms Round RobinWeighted Round Robin Deficit Round Robin Strict PriorityWeighted Random Early Detect Security 2865 RADIUS 3162 Radius and IPv64250, 4251, 4252, 4253, 4254 SSHv2Data center bridging802.1QbbPriority-Based Flow Control802.1Qaz Enhanced Transmission Selection (ETS)*Data Center Bridging eXchange(DCBx) DCBx Application TLV (iSCSI, FCoE*)Regulatory compliance SafetyUL/CSA 60950-1, Second Edition EN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group DifferencesEN 60825-1 Safety of Laser Products Part 1: EquipmentClassification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication Systems FDA Regulation 21 CFR 1040.10 and 1040.11Emissions & Immunity EMC complianceFCC Part 15 (CFR 47) (USA) Class A ICES-003 (Canada) Class AEN55032: 2015 (Europe) Class A CISPR32 (International) Class AAS/NZS CISPR32 (Australia and New Zealand) Class AVCCI (Japan) Class A KN32 (Korea) Class ACNS13438 (T aiwan) Class A CISPR22EN55022EN61000-3-2EN61000-3-3EN61000-6-1EN300 386EN 61000-4-2 ESDEN 61000-4-3 Radiated Immunity EN 61000-4-4 EFT EN 61000-4-5 SurgeEN 61000-4-6 Low Frequency Conducted Immunity NEBSGR-63-Core GR-1089-Core ATT -TP-76200VZ.TPR.9305RoHSRoHS 6 and China RoHS compliantCertificationsJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2009, Class A Warranty1 Year Return to DepotLearn more at /Networking*Future release**Packet sizes over 147 BytesIT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, withinnovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & Design Let us analyze yourmultivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running cateEnsure your staff builds the right skills for long-termsuccess. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic IT environments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remote monitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at/Services。

德尔·韦玛网络S4048T-ON交换机说明书

德尔·韦玛网络S4048T-ON交换机说明书

The Dell EMC Networking S4048T-ON switch is the industry’s latest data center networking solution, empowering organizations to deploy modern workloads and applications designed for the open networking era. Businesses who have made the transition away from monolithic proprietary mainframe systems to industry standard server platforms can now enjoy even greater benefits from Dell EMC open networking platforms. By using industry-leading hardware and a choice of leading network operating systems to simplify data center fabric orchestration and automation, organizations can tailor their network to their unique requirements and accelerate innovation.These new offerings provide the needed flexibility to transform data centers. High-capacity network fabrics are cost-effective and easy to deploy, providing a clear path to the software-defined data center of the future with no vendor lock-in.The S4048T-ON supports the open source Open Network Install Environment (ONIE) for zero-touch installation of alternate network operating systems, including feature rich Dell Networking OS.High density 1/10G BASE-T switchThe Dell EMC Networking S-Series S4048T-ON is a high-density100M/1G/10G/40GbE top-of-rack (ToR) switch purpose-builtfor applications in high-performance data center and computing environments. Leveraging a non-blocking switching architecture, theS4048T-ON delivers line-rate L2 and L3 forwarding capacity within a conservative power budget. The compact S4048T-ON design provides industry-leading density of 48 dual-speed 1/10G BASE-T (RJ45) ports, as well as six 40GbE QSFP+ up-links to conserve valuable rack space and simplify the migration to 40Gbps in the data center core. Each40GbE QSFP+ up-link can also support four 10GbE (SFP+) ports with a breakout cable. In addition, the S4048T-ON incorporates multiple architectural features that optimize data center network flexibility, efficiency and availability, including I/O panel to PSU airflow or PSU to I/O panel airflow for hot/cold aisle environments, and redundant, hot-swappable power supplies and fans. S4048T-ON supports feature-rich Dell Networking OS, VLT, network virtualization features such as VRF-lite, VXLAN Gateway and support for Dell Embedded Open Automation Framework.• The S4048T-ON is the only switch in the industry that supports traditional network-centric virtualization (VRF) and hypervisorcentric virtualization (VXLAN). The switch fully supports L2 VX-• The S4048T-ON also supports Dell EMC Networking’s Embedded Open Automation Framework, which provides enhanced network automation and virtualization capabilities for virtual data centerenvironments.• The Open Automation Framework comprises a suite of interre-lated network management tools that can be used together orindependently to provide a network that is flexible, available andmanageable while helping to reduce operational expenses.Key applicationsDynamic data centers ready to make the transition to software-defined environments• High-density 10Gbase-T ToR server access in high-performance data center environments• Lossless iSCSI storage deployments that can benefit from innovative iSCSI & DCB optimizations that are unique only to Dell NetworkingswitchesWhen running the Dell Networking OS9, Active Fabric™ implementation for large deployments in conjunction with the Dell EMC Z-Series, creating a flat, two-tier, nonblocking 10/40GbE data center network design:• High-performance SDN/OpenFlow 1.3 enabled with ability to inter-operate with industry standard OpenFlow controllers• As a high speed VXLAN Layer 2 Gateway that connects thehypervisor based ovelray networks with nonvirtualized infrastructure Key features - general• 48 dual-speed 1/10GbE (SFP+) ports and six 40GbE (QSFP+)uplinks (totaling 72 10GbE ports with breakout cables) with OSsupport• 1.44Tbps (full-duplex) non-blocking switching fabric delivers line-rateperformance under full load with sub 600ns latency• I/O panel to PSU airflow or PSU to I/O panel airflow• Supports the open source ONIE for zero-touch• installation of alternate network operating systems• Redundant, hot-swappable power supplies and fansDELL EMC NETWORKING S4048T-ON SWITCHEnergy-efficient 10GBASE-T top-of-rack switch optimized for data center efficiencyKey features with Dell EMC Networking OS9Scalable L2 and L3 Ethernet switching with QoS and a full complement of standards-based IPv4 and IPv6 features, including OSPF, BGP and PBR (Policy Based Routing) support• Scalable L2 and L3 Ethernet switching with QoS and a full complement of standards-based IPv4 and IPv6 features, including OSPF, BGP andPBR (Policy Based Routing) support• VRF-lite enables sharing of networking infrastructure and provides L3traffic isolation across tenants• Increase VM Mobility region by stretching L2 VLAN within or across two DCs with unique VLT capabilities like Routed VL T, VLT Proxy Gateway • VXLAN gateway functionality support for bridging the nonvirtualizedand the virtualized overlay networks with line rate performance.• Embedded Open Automation Framework adding automatedconfiguration and provisioning capabilities to simplify the management of network environments. Supports Puppet agent for DevOps• Modular Dell Networking OS software delivers inherent stability as well as enhanced monitoring and serviceability functions.• Enhanced mirroring capabilities including 1:4 local mirroring,• Remote Port Mirroring (RPM), and Encapsulated Remote PortMirroring (ERPM). Rate shaping combined with flow based mirroringenables the user to analyze fine grained flows• Jumbo frame support for large data transfers• 128 link aggregation groups with up to 16 members per group, usingenhanced hashing• Converged network support for DCB, with priority flow control(802.1Qbb), ETS (802.1Qaz), DCBx and iSCSI TLV• S4048T-ON supports RoCE and Routable RoCE to enable convergence of compute and storage on Active FabricUser port stacking support for up to six units and unique mixed mode stacking that allows stacking of S4048-ON with S4048T-ON to providecombination of 10G SFP+ and RJ45 ports in a stack.Physical48 fixed 10GBase-T ports supporting 100M/1G/10G speeds6 fixed 40 Gigabit Ethernet QSFP+ ports1 RJ45 console/management port with RS232signaling1 USB 2.0 type A to support mass storage device1 Micro-USB 2.0 type B Serial Console Port1 8 GB SSD ModuleSize: 1RU, 1.71 x 17.09 x 18.11”(4.35 x 43.4 x 46 cm (H x W x D)Weight: 23 lbs (10.43kg)ISO 7779 A-weighted sound pressure level: 65 dB at 77°F (25°C)Power supply: 100–240V AC 50/60HzMax. thermal output: 1568 BTU/hMax. current draw per system:4.6 A at 460W/100VAC,2.3 A at 460W/200VACMax. power consumption: 460 WattsT ypical power consumption: 338 WattsMax. operating specifications:Operating temperature: 32°F to 113°F (0°C to45°C)Operating humidity: 5 to 90% (RH), non-condensing Max. non-operating specifications:Storage temperature: –40°F to 158°F (–40°C to70°C)Storage humidity: 5 to 95% (RH), non-condensingRedundancyHot swappable redundant powerHot swappable redundant fansPerformance GeneralSwitch fabric capacity:1.44Tbps (full-duplex)720Gbps (half-duplex)Forwarding Capacity: 1080 MppsLatency: 2.8 usPacket buffer memory: 16MBCPU memory: 4GBOS9 Performance:MAC addresses: 160KARP table 128KIPv4 routes: 128KIPv6 hosts: 64KIPv6 routes: 64KMulticast routes: 8KLink aggregation: 16 links per group, 128 groupsLayer 2 VLANs: 4KMSTP: 64 instancesVRF-Lite: 511 instancesLAG load balancing: Based on layer 2, IPv4 or IPv6headers Latency: Sub 3usQOS data queues: 8QOS control queues: 12Ingress ACL: 16KEgress ACL: 1KQoS: Default 3K entries scalable to 12KIEEE compliance with Dell Networking OS9802.1AB LLDP802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN T agging, Double VLAN T agging,GVRP802.1Qbb PFC802.1Qaz ETS802.1s MSTP802.1w RSTP802.1X Network Access Control802.3ab Gigabit Ethernet (1000BASE-T)802.3ac Frame Extensions for VLAN T agging802.3ad Link Aggregation with LACP802.3ae 10 Gigabit Ethernet (10GBase-X) withQSA802.3ba 40 Gigabit Ethernet (40GBase-SR4,40GBase-CR4, 40GBase-LR4) on opticalports802.3u Fast Ethernet (100Base-TX)802.3x Flow Control802.3z Gigabit Ethernet (1000Base-X) with QSA 802.3az Energy Efficient EthernetANSI/TIA-1057 LLDP-MEDForce10 PVST+Max MTU 9216 bytesRFC and I-D compliance with Dell Networking OS9General Internet protocols768 UDP793 TCP854 T elnet959 FTPGeneral IPv4 protocols791 IPv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1305 NTPv31519 CIDR1542 BOOTP (relay)1812 Requirements for IPv4 Routers1918 Address Allocation for Private Internets 2474 Diffserv Field in IPv4 and Ipv6 Headers 2596 Assured Forwarding PHB Group3164 BSD Syslog3195 Reliable Delivery for Syslog3246 Expedited Assured Forwarding4364 VRF-lite (IPv4 VRF with OSPF, BGP,IS-IS and V4 multicast)5798 VRRPGeneral IPv6 protocols1981 Path MTU Discovery Features2460 Internet Protocol, Version 6 (IPv6)Specification2464 Transmission of IPv6 Packets overEthernet Networks2711 IPv6 Router Alert Option4007 IPv6 Scoped Address Architecture4213 Basic Transition Mechanisms for IPv6Hosts and Routers4291 IPv6 Addressing Architecture4443 ICMP for IPv64861 Neighbor Discovery for IPv64862 IPv6 Stateless Address Autoconfiguration 5095 Deprecation of T ype 0 Routing Headers in IPv6IPv6 Management support (telnet, FTP, TACACS, RADIUS, SSH, NTP)VRF-Lite (IPv6 VRF with OSPFv3, BGPv6, IS-IS) RIP1058 RIPv1 2453 RIPv2OSPF (v2/v3)1587 NSSA 4552 Authentication/2154 OSPF Digital Signatures Confidentiality for 2328 OSPFv2 OSPFv32370 Opaque LSA 5340 OSPF for IPv6IS-IS1142 Base IS-IS Protocol1195 IPv4 Routing5301 Dynamic hostname exchangemechanism for IS-IS5302 Domain-wide prefix distribution withtwo-level IS-IS5303 3-way handshake for IS-IS pt-to-ptadjacencies5304 IS-IS MD5 Authentication5306 Restart signaling for IS-IS5308 IS-IS for IPv65309 IS-IS point to point operation over LANdraft-isis-igp-p2p-over-lan-06draft-kaplan-isis-ext-eth-02BGP1997 Communities2385 MD52545 BGP-4 Multiprotocol Extensions for IPv6Inter-Domain Routing2439 Route Flap Damping2796 Route Reflection2842 Capabilities2858 Multiprotocol Extensions2918 Route Refresh3065 Confederations4360 Extended Communities4893 4-byte ASN5396 4-byte ASN representationsdraft-ietf-idr-bgp4-20 BGPv4draft-michaelson-4byte-as-representation-054-byte ASN Representation (partial)draft-ietf-idr-add-paths-04.txt ADD PATHMulticast1112 IGMPv12236 IGMPv23376 IGMPv3MSDP, PIM-SM, PIM-SSMSecurity2404 The Use of HMACSHA- 1-96 within ESPand AH2865 RADIUS3162 Radius and IPv63579 Radius support for EAP3580 802.1X with RADIUS3768 EAP3826 AES Cipher Algorithm in the SNMP UserBase Security Model4250, 4251, 4252, 4253, 4254 SSHv24301 Security Architecture for IPSec4302 IPSec Authentication Header4303 ESP Protocol4807 IPsecv Security Policy DB MIBdraft-ietf-pim-sm-v2-new-05 PIM-SMwData center bridging802.1Qbb Priority-Based Flow Control802.1Qaz Enhanced Transmission Selection (ETS)Data Center Bridging eXchange (DCBx)DCBx Application TLV (iSCSI, FCoE)Network management1155 SMIv11157 SNMPv11212 Concise MIB Definitions1215 SNMP Traps1493 Bridges MIB1850 OSPFv2 MIB1901 Community-Based SNMPv22011 IP MIB2096 IP Forwarding T able MIB2578 SMIv22579 T extual Conventions for SMIv22580 Conformance Statements for SMIv22618 RADIUS Authentication MIB2665 Ethernet-Like Interfaces MIB2674 Extended Bridge MIB2787 VRRP MIB2819 RMON MIB (groups 1, 2, 3, 9)2863 Interfaces MIB3273 RMON High Capacity MIB3410 SNMPv33411 SNMPv3 Management Framework3412 Message Processing and Dispatching forthe Simple Network ManagementProtocol (SNMP)3413 SNMP Applications3414 User-based Security Model (USM) forSNMPv33415 VACM for SNMP3416 SNMPv23417 Transport mappings for SNMP3418 SNMP MIB3434 RMON High Capacity Alarm MIB3584 Coexistance between SNMP v1, v2 andv34022 IP MIB4087 IP Tunnel MIB4113 UDP MIB4133 Entity MIB4292 MIB for IP4293 MIB for IPv6 T extual Conventions4502 RMONv2 (groups 1,2,3,9)5060 PIM MIBANSI/TIA-1057 LLDP-MED MIBDell_ITA.Rev_1_1 MIBdraft-grant-tacacs-02 TACACS+draft-ietf-idr-bgp4-mib-06 BGP MIBv1IEEE 802.1AB LLDP MIBIEEE 802.1AB LLDP DOT1 MIBIEEE 802.1AB LLDP DOT3 MIB sFlowv5 sFlowv5 MIB (version 1.3)DELL-NETWORKING-SMIDELL-NETWORKING-TCDELL-NETWORKING-CHASSIS-MIBDELL-NETWORKING-PRODUCTS-MIBDELL-NETWORKING-SYSTEM-COMPONENT-MIBDELL-NETWORKING-TRAP-EVENT-MIBDELL-NETWORKING-COPY-CONFIG-MIBDELL-NETWORKING-IF-EXTENSION-MIBDELL-NETWORKING-FIB-MIBIT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, withinnovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & Design Let us analyze yourmultivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running cateEnsure your staff builds the right skills for long-termsuccess. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic IT environments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remote monitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at/lifecycleservicesLearn more at /NetworkingDELL-NETWORKING-FPSTATS-MIBDELL-NETWORKING-LINK-AGGREGATION-MIB DELL-NETWORKING-MSTP-MIB DELL-NETWORKING-BGP4-V2-MIB DELL-NETWORKING-ISIS-MIBDELL-NETWORKING-FIPSNOOPING-MIBDELL-NETWORKING-VIRTUAL-LINK-TRUNK-MIB DELL-NETWORKING-DCB-MIBDELL-NETWORKING-OPENFLOW-MIB DELL-NETWORKING-BMP-MIBDELL-NETWORKING-BPSTATS-MIBRegulatory compliance SafetyCUS UL 60950-1, Second Edition CSA 60950-1-03, Second Edition EN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group Differences EN 60825-1, 1st EditionEN 60825-1 Safety of Laser Products Part 1:Equipment Classification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication Systems FDA Regulation 21 CFR 1040.10 and 1040.11EmissionsInternational: CISPR 22, Class AAustralia/New Zealand: AS/NZS CISPR 22: 2009, Class ACanada: ICES-003:2016 Issue 6, Class AEurope: EN 55022: 2010+AC:2011 / CISPR 22: 2008, Class AJapan: VCCI V-3/2014.04, Class A & V4/2012.04USA: FCC CFR 47 Part 15, Subpart B:2009, Class A RoHSAll S-Series components are EU RoHS compliant.CertificationsJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2009, Class A Available with US Trade Agreements Act (TAA) complianceUSGv6 Host and Router Certified on Dell Networking OS 9.5 and greater IPv6 Ready for both Host and RouterUCR DoD APL (core and distribution ALSAN switch ImmunityEN 300 386 V1.6.1 (2012-09) EMC for Network Equipment\EN 55022, Class AEN 55024: 2010 / CISPR 24: 2010EN 61000-3-2: Harmonic Current Emissions EN 61000-3-3: Voltage Fluctuations and Flicker EN 61000-4-2: ESDEN 61000-4-3: Radiated Immunity EN 61000-4-4: EFT EN 61000-4-5: SurgeEN 61000-4-6: Low Frequency Conducted Immunity。

阿鲁巴6000无线网络控制器说明书

阿鲁巴6000无线网络控制器说明书

The Aruba 6000 is a modular, full-featured wireless LAN mobility controller that aggregates up to 512 controlled Access Points (APs) and delivers mobility, centralized control, convergence services and security for wireless deployments. The Aruba 6000 is designed to support large deployments in a scaleable manner, and can be easily deployed as an overlay without any disruption to the existing wired network. The device is managed using the ArubaOS or Aruba Mobility Management System.The Aruba 6000 can be deployed as an identity-based security gateway to authenticate wired and wireless users, enforce role-based access control policies and quarantine unsafe endpoints from accessing the corporate network. Guest users can be easily and safely supported with the built-in captive portal server and advanced network services. Features that allow the Aruba 6000 to create a secure networking environment without requiring additional VPN/firewall devices include integrated site-to-site VPN, split-tunneling, ICSA-compliant stateful firewall and NAT. Site-to-site VPN can be integrated with all leading VPN concentrators to provide seamless integration into existing corporate VPNs. In addition, advanced convergence features such as Call Admission Control (CAC), voice-aware RF management and strict over-the-air QoS allow the Aruba 6000 to deliver mobile VoIP capabilities.Controller Performance and CapacityControlled APs Up to 512 Users Up to 8192 MAC addresses Up to 128,000 VLAN IP interfaces 128 Fast Ethernet ports (10/100) Up to 72 Gigabit Ethernet ports (GBIC) Up to 6 Active firewall sessions Up to 512,000 Concurrent IPSEC tunnels Up to 8,192 Firewall throughput Up to 8 Gbps Encrypted throughput (3DES & AES-CCM) Up to 7.2Gbps Wireless LAN Security and Control Features• 802.11i security (WFA certified WPA2 and WPA)• 802.1X user and machine authentication• EAP-PEAP, EAP-TLS, EAP-TTLS support• Centralized AES-CCM, TKIP and WEP encryption• 802.11i PMK caching for fast roaming applications• EAP offload for AAA server scalability and survivability• Stateful 802.1X authentication for standalone APs• MAC address, SSID and location based authentication• Per-SSID bandwidth contracts• SSID-based RADIUS server selection• Secure AP control and management over IPSEC or GRE• CAPWAP compatible and upgradeable• Distributed WLAN mode for remote AP deployments• Simultaneous centralized and distributed WLAN supportIdentity-based Security Features• Wired and wireless user authentication• Captive portal, 802.1X and MAC address authentication• Username, IP address, MAC address and encryption keybinding for strong network identity creation• Per-packet identity verification to prevent impersonation• Endpoint posture assessment, quarantine and remediation• Microsoft NAP, Cisco NAC, Symantec SSE support• RADIUS and LDAP based AAA server support• Internal user database for AAA server failover protection• Role-based authorization for eliminating excess privilege• Robust policy enforcement with stateful packet inspection• Role-based MAC/Ethertype ACLs• Per-user session accounting for usage auditing• Web-based guest enrollment with Aruba GuestConnect™• Configurable acceptable use policies for guest access • XML-based API for external captive portal integration • xSec option for wired LAN authentication and encryption (802.1X authentication, 256-bit AES-CBC encryption)Convergence Features• Voice and data on a single SSID for converged devices • Flow-based QoS using Voice Flow Classification™• SIP, Spectralink SVP, Cisco SCCP and Vocera ALGs • Strict priority queuing for over-the-air QoS• 802.11e support – WMM, U-APSD and T-SPEC• QoS policing for preventing network abuse via 802.11e • SIP authentication tracking• Diffserv marking and 802.1p support for network QoS • On-hook and off-hook VoIP client detection• Voice-aware 802.1x authentication• VoIP call admission control (CAC) using VFC• Call reservation thresholds for mobile VoIP calls• Voice-aware RF management for ensuring voice quality • Fast roaming support for ensuring mobile voice quality • SIP early media and ringing tone generation (RFC 3960)• Per-user and per-role rate limits (bandwidth contracts)Adaptive Radio Management™ (ARM) Features • Automatic channel and power settings for controlled APs • Simultaneous air monitoring and end user services• Self-healing coverage based on dynamic RF conditions • Dense deployment options for capacity optimization• AP load balancing based on number of users• AP load balancing based on bandwidth utilization• Coverage hole and RF interference detection• 802.11h support for radar detection and avoidance• Automated location detection for Active RFID tags• Built-in XML based Location API for RFID applicationsThe Aruba 6000 Mobility ControllerWireless Intrusion Protection Features• Integration with WLAN infrastructure• Simultaneous or dedicated air monitoring capabilities • Rogue AP detection and built-in location visualization • Automatic rogue, interfering and valid AP classification • Over-the-air and over-the-wire rogue AP containment • Adhoc WLAN network detection and containment • Windows client bridging and wireless bridge detection • Denial of service attack protection for APs and stations • Misconfigured standalone AP detection and containment • 3rd party AP performance monitoring and troubleshooting • Flexible attack signature creation for new WLAN attacks • EAP handshake and sequence number analysis • Valid AP impersonation detection• Frame floods, Fake AP and Airjack attack detection• ASLEAP , death broadcast, null probe response detection • Netstumbler-based network probe detectionStateful Firewall Features• Stateful packet inspection tied to user identity or ports • Location and time-of-day aware policy definition • 802.11 station awareness for WLAN firewalling• Over-the-air policy enforcement and station blacklisting • Session mirroring and per-packet logs for forensic analysis • Detailed firewall traffic logs for usage auditing • ICSA corporate firewall 4.1 compliance• Application Layer Gateway (ALG) support for SIP , SCCP , RTSP , Vocera, FTP , TFTP , PPTP• Source and destination Network Address Translation (NAT)• Dedicated flow processing hardware for high performance • TCP , ICMP denial of service attack detection and protection • Policy-based forwarding into GRE tunnels for guest traffic • External service interface for 3rd party security integration for inline anti-virus, anti-spam and content filtering apps • Heath checking and load balancing for external servicesVPN Server Features• Site-to-site VPN support for branch office deployments• Site-to-site interoperability with 3rd party VPN servers • VPN server emulation for easy integration into WLAN • L2TP/IPSEC VPN termination for Windows VPN clients • Mobile edge client shim for roaming with RSA Tokens • XAUTH/IPSEC VPN termination for 3rd Party clients • PPTP VPN termination for legacy VPN integration• RADIUS and LDAP server support for VPN authentication • PAP , CHAP , MS-CHAP and MS-CHAPv2 authentication • Hardware encryption for DES, 3DES, AES, MPPE • Secure point-to-point xSec tunnels for L2 VPNs • RFC 3706 IKE Dead Peer DetectionNetworking Features and Advanced Services• L2 and L3 switching over-the-air and over-the-wire • VLAN pooling for easy, scalable network designs • VLAN mobility for seamless L2 roaming• Proxy mobile IP and proxy DHCP for L3 roaming • Built-in DHCP server and DHCP relay• VRRP based N+1 controller redundancy (L2)• AP provisioning based N+1 controller redundancy (L3)• Wired access concentrator mode for centralized security • Etherchannel support for link redundancy • 802.1d Spanning Tree ProtocolController-based Management Features• RF Planning and AP Deployment Toolkit• Centralized AP provisioning and image management • Live coverage visualization with RF heat maps • Detailed statistics visualization for monitoring • Remote packet capture for RF troubleshooting• Interoperable with Ethereal, Airopeek and AirMagnet analyzers • Multi-controller configuration management • Location visualization and device tracking • System-wide event collection and reportingController Administration Features• Web-based user interface access over HTTP and HTTPS • Quickstart screens for easy controller configuration • CLI access using SSH, Telnet and console port• Role-based access control for restricted admin access • Authenticated access via RADIUS, LDAP or Internal DB • SNMPv3 and SNMPv2 support for controller monitoring • Standard MIBs and private enterprise MIBs• Detailed message logs with syslog event notificationController Power Supply Options • Power Consumption Max. 466 Watts per PSU • HW-PSU-200 AC power supplies deliver 200W of power• AC Input Voltage 90-132VAC, 170-264VAC • AC Input Frequency 47-63 Hz • AC input current 5A @ 110VAC • HW-PSU-400 AC power supplies deliver 400W of power • AC Input Voltage 85-264 VAC, Auto-sensing • AC Input Frequency 47-63 Hz • AC input current: 5A @ 110VACOperating Specifications and Dimensions • Operating temperature range0° to 40° C• Storage temperature range10° to 70° C • Humidity, non-condensing 5 to 95% • Height 5.75˝ (146 mm) • Width 17.4˝ (444 mm) • Depth 12.5˝ (317.5 mm) • Weight30 lbs. (unboxed)Warranty• Hardware 1 year parts/labor• Software90 daysRegulatory and Safety Compliance• FCC part 15 Class A CE • Industry Canada Class A • VCCI Class A (Japan)• EN 55022 Class A (CISPR 22 Class A), EN 61000-3,• EN 61000-4-2, EN 61000-4-3, EN 61000-4-4, • EN 61000-4-5, EN 61000-4- 6, EN 61000-4-8, • EN 61000-4-11, EN 55024, AS/NZS 3548• UL 60950• CAN/CSA 22.2 #609501322 Crossman AvenueSunnyvale, California 94089Tel: 408.227.4500 • Fax: 408.227.4550 © 2007 Aruba Networks, Inc. All rights reserved. Specifications are subject to change without notice.Ordering InformationPart number Description6000-BASE-2PSU-200 Aruba 6000 Base System (Standard Power) 6000-BASE-2PSU-400 Aruba 6000 Base System (SPOE Power)SC-48-C1 Aruba Supervisor Card I (48 AP Support)SC-128-C1 Aruba Supervisor Card I (128 AP Support)SC-256-C2 Aruba Supervisor Card II (256 AP Support)LC-2G Aruba 2xGE Line CardLC-2G24F Aruba 2xGE/24FE Line CardLC-2G24FP Aruba 2xGE/24 FE Line Card SPOELC-GBIC-T Aruba GBIC Interface Adapter - TLC-GBIC-SX Aruba GBIC Interface Adapter - SXLC-GBIC-LX Aruba GBIC Interface Adapter – LXHW-CHAS Aruba 5000 & 6000 Series Base 4-SlotChassis Excludes Fan Tray)HW-PSU-200 Aruba 5000 & 6000 Series Power Supply200 WattHW-PSU-400 Aruba 5000 & 6000 Series Power Supply400 WattHW-FT Aruba 5000 & 6000 Series ReplacementFan TrayHW-SC-LC-BLANK Aruba 5000 & 6000 Series Supervisor /Line Card Slot Blank PanelHW-PSU-BLANK Aruba 5000 & 6000 Series Power SupplyUnit Slot Blank PanelAK-5000-NA Aruba 5000 & 6000 Accessory Kit(HW Installation Guide & 19” Rack Mount Kit) HW-MNT-19 Aruba 5000 & 6000 Series Replacement19” Equipment Rack Mounting KitSC-48-C1-UG-128 Aruba Supervisor Card I System Upgrade(48 AP to 128 AP Support)LIC-SC1-SEC-48* Security Software Bundle for Supervisor Card I (48 AP License)LIC-SC1-ADV-48** Advanced Security Software Bundle forSupervisor card I (48 AP License)LIC-SC1-PEF-48 Policy Enforcement Firewall Module for Aruba Supervisor Card I (48 AP)LIC-SC1-VPN-48 VPN Server Module for Aruba Supervisor Card I (48 AP)LIC-SC1-WIP-48 Wireless Intrusion Protection Module for Aruba Supervisor Card I (48 AP)LIC-SC1-VOC-48 Voice Services Module for ArubaSupervisor Card I (48 AP)LIC-SC1-ESI-48 External Services Interface Module for Aruba Supervisor Card I (48 AP)LIC-SC1-CIM-48 Client Integrity Module for ArubaSupervisor Card I (48 AP)LIC-SC1-XSC-48 xSec Module for Aruba SupervisorCard I (48 AP)LIC-SC1-SEC* Security Software Bundle for Supervisor Card I (128 AP License)LIC-SC1-ADV** Advanced Security Software Bundle forSupervisor Card I (128 AP License)LIC-SC1-PEF Policy Enforcement Firewall Module for Aruba Supervisor Card I (128 AP)LIC-SC1-VP VPN Server Module for Aruba SupervisorCard I (128 AP)LIC-SC1-WIP Wireless Intrusion Protection Module forAruba Supervisor Card I (128 AP)LIC-SC1-VOC Voice Services Module for Aruba Supervisor Card I (128 AP)LIC-SC1-ESI External Services Interface Module for Aruba Supervisor Card I (128 AP)LIC-SC1-CIM Client Integrity Module for Aruba Supervisor Card I (128 AP)LIC-SC2-SEC* Security Software Bundle for Supervisor Card II(256 AP License)LIC-SC2-ADV** Advanced Security Software Bundle for Supervisor Card II (256 AP License)LIC-SC2-PEF Policy Enforcement Firewall Module for ArubaSupervisor Card II (256 AP)LIC-SC2-VPN VPN Server Module for Aruba Supervisor Card II (256 AP)LIC-SC2-WIP Wireless Intrusion Protection Module for ArubaSupervisor Card II (256 AP)LIC-SC2-VOC Voice Services Module for Aruba SupervisorCard II (256 AP)LIC-SC2-ESI External Services Interface Module for ArubaSupervisor Card II (256 AP)LIC-SC2-CIM Client Integrity Module for Aruba Supervisor Card II (256 AP)LIC-SC1-SEC-UG-1* Security Software for Supervisor Card I(Upgrade 48 AP to 128 AP)LIC-SC1-ADV-UG-1** Advanced Security Software for Supervisor Card I (Upgrade 48 AP to 128 AP)LIC-SC1-PEF-UG-1 Policy Enforcement Firewall for Supervisor Card I (Upgrade 48 AP to 128 AP)LIC-SC1-VPN-UG-1 VPN Server Module for Supervisor Card I(Upgrade 48 AP to 128 AP)LIC-SC1-WIP-UG-1 Wireless Intrusion Protection for Sup. Card I(Upgrade 48 AP to 128 AP)LIC-SC1-VOC-UG-1 Advanced AAA Module for Supervisor Card I(Upgrade 48 AP to 128 AP)LIC-SC1-ESI-UG-1 External Services Interface for Supervisor Card I (Upgrade 48 AP to 128 AP)LIC-SC1-CIM-UG-1 Client Integrity Module for Supervisor Card I(Upgrade 48 AP to 128 AP)LIC-1-RAP Remote Access Point License (Single AP License) LIC-4-RAP Remote Access Point License (4 AP License)LIC-6-RAP Remote Access Point License (6 AP License)LIC-8-RAP Remote Access Point License (8 AP License)LIC-16-RAP Remote Access Point License (16 AP License)LIC-24-RAP Remote Access Point License (24 AP License)LIC-48-RAP Remote Access Point License (48 AP License)LIC-64-RAP Remote Access Point License (64 AP License)LIC-128-RAP Remote Access Point License (128 AP License) LIC-256-RAP Remote Access Point License (256 AP License)*Includes Policy Enforcement Firewall (PEF) and Wireless IntrusionProtection (WIP)**Includes Policy Enforcement Firewall (PEF), Wireless Intrusion Protection (WIP) and VPN Server (VPN)Please contact your Aruba Networks Sales representative for more information on configuring and ordering this productSS_6000_US_070611。

杰瑞(JAEGER) iSeries温度计用户指南选择说明书

杰瑞(JAEGER) iSeries温度计用户指南选择说明书

I3200-DCi8/iS8 - 1/8 DIN Meteri8C/iS8C - 1/8 DIN Ultra Compact Case i8DV/iS8DV - 1/8 DIN Dual Display Vertical i8DH/iS8DH - 1/8 DIN Dual Display Horizontal i16/iS16 - 1/16 DIN Single & Dual Display i32/iS32 - 1/32 DIN MeterRD4/RD6 - 1/8 DIN Remote Display/Programmer iLD - Big Display1/32 DINi Series Selection Guide PDFFor Temp.UnitsHigh QualityiSERIES MANUALS/CONFIGURATION SOFTWARE•MANUALS i32/iS32 Monitor, Controller & Quickstarts• MANUALS iSeries Communication Manual • SOFTWARE CONFIGURATION• SOFTWARE ADVANCED CONFIGURATION • SOFTWARE ACTIVE X COMPONENT FOR EXCEL• SOFTWARE OPC Server• SPECS i32 - COMMON SPECS - PDF • PRICE• MECHANICAL SPECS & CAD FILES - Temperature/Process • MECHANICAL SPECS & CAD FILES - StrainREQUIRES ADOBE ACROBAT - HELP5-year WarrantyHigh Accuracy ±0.5°C (0.9°F), 0.03% ReadingFull Autotune PID ControlUser Friendly, Simple to Configure Free Software, Active X ControlsUniversal Inputs: Thermocouple, RTD, Process Voltage/Current, Strain2 Control or Alarm Outputs (Optional) - dc Pulse- Solid State Relays (SSR's) - Mechanical Relays- Analog Voltage and CurrentFirst 1/32 DIN Instrument with Totally Programmable Color Displays (Standard)First 1/32 DIN Instrument Offering Both RS-232 and RS-485 Serial Communications in One Instrument (Optional)First 1/32 DIN Instrument with Analog Output Selectable as a Control Output or as Retransmission of Process VariableFirst 1/32 DIN Instrument with Built-in Excitation, 24 Vdc, Standard ±0.04°C/°C RTD and ±0.05°C /°C TC @ 25°C (77°F) NEMA-4, IP65 Front BezelFront Removable and Plug ConnectorsThe NEWPORT ® i32 is the i Series meter (i3200) and controller (i32) in the extremely compact and increasingly popular 1/32 DIN size. The i32 is the most sophisticated and accurate instrument available in the small 1/32 DINpackage, yet is still easy to configure.The i32 introduces a number of unique features not yet found on any other 1/32 DIN instrument. The i32 is the first 1/3 DIN controller with a totally programmable display that can change color at any set point or alarm point. The unique 9-segment LED characters greatly improves alphanumeric representations.The i32 handles more thermocouple, RTD, process voltage and current inputs than any other 1/32 DIN controller.The i32is the first 1/32 DIN controller with built-in excitation for transmitters or other devices, 24 Vdc @ 25mA.The i32 is the first 1/32 DIN controller offering 2 SPDT (Single Pole Double Throw) Form C relays, instead of the single throw relays on typical 1/32 DIN controllers. The i32 is the first to offer both RS-232 and RS-422/485 serial communications in one instrument (-C24 option). Both ASCII protocol and modbus protocol are selectable from the menu.The "iServer" is a DIN rail mounted device which can be a hub connecting up to 32instruments to the Ethernet and Internet. The “i Server” is both a Web Server and anEthernet-Serial bridge. To connect to the i Server, iSeries devices must feature the "-C24" Serial Communications option.i Series FAMILYThe NEWPORT®i Series is a family of microprocessor-based instruments offered inthree DIN sizes with NEMA-4, IP65 rated front bezels. All of the instruments share thesame set-up and configuration menu and method of operation, a tremendous timesaver for integration of a large system.The i Series displays feature unique 9-segment LED characters which greatlyimproves alphanumeric representations. The 7-segment LED characters found onmost instruments are adequate for presenting numbers, but not letters. Words are easier to read with the unique 9-segment LED characters on the i Series, which makes operating and programming simpler and easier.Programmable Color DisplayThe NEWPORT®i Series are the first complete series of 1/8, 1/16 and 1/32 DIN process control instruments with totally programmable color displays. The display can be programmed to change color at any set point or alarm point.i Series Change Color at any SetpointFor example, the instrument can be programmed to display the process value in GREEN during warm-up, switchingto AMBER to signal the normal operating range, and in RED to signal an alarm condition. The changes in color are quickly seen from a distance, and machine operators can intuitively react to changing conditions. The colors can be programmed to change back when the value drops back below the alarm point or to "latch" on until being reset by the operator.The instrument can also be programmed to display only one unchanging color: GREEN ,AMBER , or RED . This is a useful way to let an operator identify, at a glance, process values in three separate locations, or to display three different measurements such as Temperature, Pressure, and Flow.The innovative NEWPORT ® i Series of meters/controllers features an extended Five (5) YEAR warranty at no extra charge. The i Series packs a wealth of power and features into the smallest of packages, utilizing COB (chip-on-board)and SMT (surface mount technology) assembly techniques and automation. Every i Series instrument is thoroughly calibrated and tested at several stages throughout production. The i Series offers the highest accuracy for industrial instrumentation at 0.03% of reading. The analog-to-digital conversion utilizes proprietary 20-bit ASIC (application specific integrated circuit) patented algorithms and smart filtering.Universal InputsThe innovative i Series offers the broadest selection of signal inputs available on one industrial instrument. The choices are easily selected from the Menu with four front panel pushbuttons, or by serial communications.The Universal Temperature & Process instrument (model "i ") handles ten common types of thermocouples: K , J , T , E , R , S , B , C , N , and J DIN , multiple RTD's , and several Process (dc) Voltage ranges : 0-100 millivolt, 0-1 Volt, 0-10 Volt; Process Current range: 0-20 mA. Thismodel also features built-in excitation ,*****************'swidechoiceofsignalinputs,this model is an excellent choice for measuring or controlling temperature with a thermocouple,RTD, or 4-20mA transmitter.The Strain & Process instrument (model "iS ") measures inputs from Load Cells, Pressure Transducers, and most any strain gauge sensor as well as several Process (dc) Voltage ranges : 0 to 100 mVdc, -100 mVdc to 1Vdc and 0 to 10 Vdc; Process Current range: 0-20 mA. The "iS" has built-in excitation of 5 Vdc @ 40mA or 10 Vdc @ 60mA for bridge transducers. This "iS" model supports 4 and 6 wire bridge configurations, ratiometric and non-ratiometricmeasurements. The "iS" features fast and easy "in-process" calibration/scaling of the signal inputs to any engineering units. This model also features 10 Point Linearization which allows the user to linearize the signal input from extremely nonlinear transducers of all kinds.The MIL Standard Nickel RTD with MIL-T-7990B curve is available as a Factory Setup.Ordering Example: iS3233-C24-FS (FS : preset for MIL-T-7990B curve, please specify range and accuracy).Analog OutputThe optional analog output can be programmed within a range of 0-10 Vdc or 0-20 mA. It is selectable as either a control output or as a calibrated retransmission of the process value-a unique feature among controllers.Built-in Excitation StandardAny excitation voltage between 5 and 24 Vdc is available by special order. Built-in excitation is not available with optional -C24 isolated RS-232/ RS-485 serial communications or -DC option.Control FunctionsThe i Series can control simple manual operation to ON-OFF and full Autotune PID control. (Selectable preset tune, adaptive tune, PID, PI, PD control modes.) The dual control outputs can be configured for a variety of independent control and alarm applications such as heat/heat, heat/cool, heat/alarm, cool/cool, cool/alarm or alarm/alarm. The rampto-setpoint feature allows the user to define the rate of rise to setpoint, minimizing thermal shock to the load duringstart-up. Maximum ramp time: 99.59 (HH.MM), Soak: 00.00 to 99.59 (HH.MM), Damping: 1 to 8 in unit steps.For applications that do not require PID control, i Series controllers are available in two special models that offer simplified programming. The i Series“Limit Alarm” model (specify–AL option) is a conventional limit alarm.The i Series “Simplified Menu” model (specify–SM option) offers simplified programming. The menu flowchart is simila to programmable digital panel meters that are used for on/off control or alarms. (Please see the i Series operator’s manuals for programming details.)Free SoftwareFree software is provided for easy set-up, configuration and data acquisition with the NEWPORT®i Series.Free ActiveX Controls are provided for the i Series, making it easy to integratethe i Series with information systems using "ActiveX Containers" such as MicrosoftVisual Basic and Microsoft Excel as well as with popular OLE and OPC compliantdata acquisition, process control, and industrial automation software fromNEWPORT®, GE Fanuc, Intellution, Rockwell Automation, iconics, and Wonderwareamong others.Optional Isolated RS-232 and RS-485 Serial CommunicationsThe i Series are the first i ntelligent i ndustrial i nstruments to offer both RS-232 and RS-485 serial communications in one instrument which can be selected from the menu. The i Series features both the i Series serial protocol and MODBUS serial protocol.Factory Setup and ConfigurationMake installing your i Series meter or controller easier by ordering it preconfigured by the factory. You specify the input types, scaling if applicable, set points, alarm points, etc. and we will program the instruments to your specific requirements in our calibration lab prior to shipment. For a checklist of factory setup parameters, please consultyour NEWPORT® applications engineers.Custom ConfigurationsCustom color bezels and enclosures are available for Original Equipment Manufacturers. Enhance the appearance ofyour equipment design with custom colors. Consult the NEWPORT® OEM Group.Part Number Descriptioni32001/32 DIN Temperature/Process Monitor, No Output,Standard power input: (90 to 240 Vac/dc)i32221/32 DIN Temperature/Process Controller with 2 ControlOutputs (Two SSR : 0.5 A @ 120/240 Vac continuous),Standard power input: (90 to 240 Vac/dc)i3233-C241/32 DIN Temperature/Process Controller with 2 ControlOutputs (2 Relays: Form “C” SPDT 3 A @ 120 Vac, 3 A@ 240 Vac), Standard power input: (90 to 240 Vac/dc),Isolated RS-232 and RS-485/422 serial communicationoption.i3244-DC1/32 DIN Temp/Process Controller with 2 ControlOuptuts (two pulsed 10 Vdc @ 20 mA, for use withexternal SSR) Low Voltage Power Option: (12 to 36 Vdc,24 Vac)i32521/32 DIN Temp/Process Controller with 2 ControlOutputs (Analog Output selectable as either control orretransmission of process value; 0 to 10 Vdc or 0-20 mA@ 500 ohm max. and SSR)iS32001/32 DIN Strain/Process Monitor, No Output, Standardpower input: (90 to 240 Vac/dc)-FSFactory Setup and Configuration, $50 ChargeNote: 1) -DC or -C24 not available with excitation.2) Analog Output (Option 5) is not available with -AL units. 3) Strain iS32 is not available with -SM units.Part Number BuilderOption Descriptions (((I3200-DC。

alteryxserver

alteryxserver

For most organizations using analytics today, personal desktops or laptops deliver sufficient computing power to handle their requirements. But if your organization needs to blend together huge amounts of data from an ever-growing number of data sources or requires large, complicated workflows with multiple analytic tools, your analysts need more. More computing power, more speed, more scalability, and more reliability. And that means moving analytic processing to a server that can run these processes and workflows with ease, enabling you to get the deep insights you need in order to make timely business decisions and outsmart your competition.Alteryx Server combines the data processing power of a server-based analytic solution with the ease of access and interaction of business-ready analytic applications to make data-driven decision-making a reality. By offloading data-intensive analytic processing to a scalable, reliable server architecture, you speed up time-to-insight, eliminate wasted time, and increase your analytic capabilities. What’s more, with Alteryx Server you can share resulting insights with otherdepartments and business decision-makers, giving everyone in your organization the power and flexibility to run his or her own analytic apps and customize the output to his or her specific requirements—all while harnessing the power of analytics throughout the organization.Scale to Meet Data and Analysis RequirementsLarge-scale data and highly complex analytics can use copious amounts of processing and memory, bogging down analysts’ desktops for hours at a time. Plus, workflows and applications that reside on individuals’ desktop computers can mean a delay in receiving answers to pressing business questions or even lost business opportunities due to system shut-downs at the end of the workday or during vacations. And what if your primary analyst takes her laptop with her on an international business trip and the laptop is stolen or compromised?With Alteryx Server , you can easily run workflows with as many data sources as your business requires —harnessing as much server computing power as you need. The built-in controller lets you manage and process jobs simultaneouslyAlteryx ServerWith Alteryx Server, you can:• Scale your critical analytic workflows to meet data and analytic requirements• Schedule multiple concurrent workflows for up-to-date analysis and optimal use of resources • Publish and share analytic applications within your organization in a secure, custom gallery to bring the power of analytics to key decision-makersa scalable fashion, so that data- intensive processes could run at the same time, speeding up your time-to-insight and eliminating analyst downtime?Alteryx Server lets you use your organization’s existing server infrastructure to efficiently process multiple analytic workflows without waiting for each individual process to complete. You can schedule and the most critical decisions. What’s more, data analysts spend too much timere-running and customizing existing reports for different decision-makers instead of adding business value by working on new analytics projects. What if you could eliminate both problems at once, giving everyonein your organization access to the powerful analytics they need—and freeing up your analysts from tedious, repetitive report customization?Alteryx is a registered trademark of Alteryx, Inc. 8/15230 Commerce, Ste. 250, Irvine, CA 92602+1 714 516 2400 About AlteryxAlteryx is the leader in data blending and advanced analytics software. Alteryx Analytics provides analysts with an intuitive workflow for data blending and advanced analytics that leads to deeper insights in hours, not the weeks typical of traditional approaches. Analysts love the Alteryx analytics platform because they can deliver deeper insights by seamlessly blending internal, third-party, and cloud data, and then analyze it using spatial and predictive drag-and-drop tools. This is all done in a single workflow, with no programming required. Thousands of customers, including Experian, Kaiser, Ford, and McDonald’s, and 200,000+ users worldwide rely on Alteryx daily. Visit or call 1-888-836-4274.Server System Requirements Recommended• Microsoft Windows Server 2008R2 or later (64-bit)• Quad Core i7 (single chip)• 3GHz or faster processor • 8GB RAM• > 1 TB free disk space High Performance• Microsoft Windows Server 2008R2or later with current service pack (64-bit)• Quad Core i7 (single chip)• 3GHz or faster processor • 16GB RAM• > 1 TB free disk spaceSupported File Formats Flat Files • ASCII• CSV – Comma Separated Value• MDB/ACCDB – Microsoft ® Access database • DBF – dBASE File format• XLS/XLSX – Microsoft Excel ® spreadsheet • HTM/HTML/XML – Hyper Text/Extensible Markup Language • QVX – Qlik• SAV – IBM SPSS file format• SAS7BDAT – SAS binary file format • TDE – TableauRelational Database Files• ODBC – Open Database Connectivity • OLE-DB – Object Linking and Embedding Database • OCI – Oracle ® Spatial Files• GRD/GRC – Grid and Classified Grid• KML – Google Keyhole Markup Language • MDB/PGDB – ESRI Personal Geodatabase ®• MID/MIF – MapInfo Professional ® Interchange Format• SDF – Autodesk ® Spatial Data Files• SHP – ESRI ® ArcMap ® Shape (includes .SHP,* .DBF,* .SHX,* .PRJ*)• SZ – Alteryx Spatial Zip• TAB – MapInfo Professional Table (includes .T AB,* .DAT,* .MAP,* .ID,* .IND*)Supported Databases• Apache Hive (read-only support)• Amazon Redshift**• Amazon S3**• Cassandra***• Cloudera Impala• ESRI GeoDatabase (read-only support)*• Google BigQuery• Hadoop Distributed File System • Hortonworks • HP Vertica**• IBM DB2• IBM Netezza ®*• Microsoft SQL Server ®*• MongoDB • MySQ ®• NetSuite • Oracle* **• Pivotal Greenplum Database • SAP Hana • SQ ite • Sybase ®• Teradata ®• Teradata Aster In-Database Support • Amazon Redshift • Impala• Microsoft SQL Server • Oracle • Spark SQL • TeradataReporting Formats• PNG – Portable Network Graphics • HTML – Hyper Text Markup Language • PCXML – Alteryx Markup Language• PDF – Adobe ® Portable Document Format • RTF – Rich Text Format• DOC/DOCX – Microsoft Word • XLS/XLSX – Microsoft Excel• PPT/PPTX – Microsoft PowerPoint Tools/Macros • Foursquare• Google Analytics • Marketo• • Sharepoint Lists• Twitter and Twitter Gnip* Includes support for vendor-specific spatial functionality ** Includes bulk load support *** ODBC driver available upon request。

adaptive training sample selection

adaptive training sample selection

adaptive training sample selectionAdaptive training sample selection is a process used in machine learning and artificial intelligence systems to enhance the performance and efficiency of training data selection. This approach aims to select the most relevant and informative samples from a large dataset to improve the learning process and reduce computational costs. In this article, we will discuss the concept of adaptive training sample selection and provide some relevant reference content.1. Introduction to Adaptive Training Sample Selection: Adaptive training sample selection is a technique used to dynamically select the most appropriate samples for inclusion in the training dataset. It involves analyzing the characteristics and patterns in the data to identify the samples that are most representative and informative for the specific learning task. By selecting the most relevant samples, adaptive training sample selection can improve the learning process and enhance the performance of machine learning models.2. Importance of Adaptive Training Sample Selection:Adaptive training sample selection is essential for machine learning models, as it helps to reduce computational costs and improve the efficiency of the learning process. By selecting the most relevant samples, the model can focus on learning from informative data and avoid redundancy or noise present in the dataset. This technique also enables the model to adapt to different learning tasks and scenarios, leading to better generalization and performance.3. Techniques for Adaptive Training Sample Selection:There are several techniques for adaptive training sample selection used in machine learning. Some of the commonly used methods include:a. Uncertainty Sampling: This approach selects samples that the model is most uncertain about, typically measured by the model's confidence or probability distribution. By focusing on uncertain samples, the model can learn from informative and challenging examples, potentially improving its performance.b. Active Learning: Active learning involves iteratively selecting samples for annotation by an oracle (e.g., human expert) to query labels for the most uncertain or informative instances. This approach allows the model to actively select data points that improve its learning and subsequently reduce the need for manual annotation.c. Diversity Sampling: Diversity sampling selects samples that cover a wide range of different patterns or characteristics in the data. By including diverse samples, the model can learn from a broader context and generalize well to unseen data.4. Applications of Adaptive Training Sample Selection: Adaptive training sample selection has various applications across different domains and industries. Some of the common applications include:a. Image Classification: Adaptive training sample selection can be used to select representative and diverse images for training deeplearning models in image classification tasks. By including informative samples, the model can improve its ability to classify images accurately and efficiently.b. Natural Language Processing: In the field of natural language processing, adaptive training sample selection can be used to select diverse and representative text samples for training models, such as sentiment analysis or text classification. This approach can help the models to better understand and generalize across different text patterns and contexts.c. Anomaly Detection: In anomaly detection tasks, adaptive training sample selection can be used to identify and select diverse samples that represent normal and abnormal behavior. By including informative anomalous samples, the model can improve its ability to detect anomalies accurately and effectively.5. Conclusion:Adaptive training sample selection is a crucial component in machine learning and artificial intelligence systems, as it helps to improve the learning process and reduce computational costs. By selecting the most relevant and informative samples, models can perform better on various learning tasks and generalize well to unseen data. Understanding and implementing adaptive training sample selection techniques can significantly enhance the performance of machine learning models across different domains and applications.。

MX行业领先云管理系统说明书

MX行业领先云管理系统说明书

INDUSTRY-LEADING CLOUD MANAGEMENT• Unified firewall, switching, wireless LAN, and mobile device man-agement through an intuitive web-based dashboard• Template based settings scale easily from small deployments to tens of thousands of devices• Role-based administration, configurable email alerts for a variety of BRANCH GATEWAY SERVICES• Built-in DHCP, NAT, QoS, and VLAN management services • Web caching: accelerates frequently accessed content• Load balancing: combines multiple WAN links into a single high-speed interface, with policies for QoS, traffic shaping, and failover FEATURE-RICH UNIFIED THREAT MANAGEMENT (UTM) CAPABILITIES• Application-aware traffic control: bandwidth policies for Layer 7 application types (e.g., block Y ouTube, prioritize Skype, throttle BitTorrent)• Content filtering: CIPA-compliant content filter, safe-seach enforcement (Google/Bing), and Y ouTube for Schools• Intrusion prevention: PCI-compliant IPS sensor using industry-leading SNORT® signature database from Cisco• Advanced Malware Protection: file reputation-based protection engine powered by Cisco AMP• Identity-based security policies and application managementINTELLIGENT SITE-TO-SITE VPN WITH MERAKI SD-WAN• Auto VPN: automatic VPN route generation using IKE/IPsec setup. Runs on physical MX appliances and as a virtual instance within the Amazon AWS or Microsoft Azure cloud services• SD-WAN with active / active VPN, policy-based-routing, dynamic VPN path selection and support for application-layer performance profiles to ensure prioritization of the applications types that matter • Interoperates with all IPsec VPN devices and services• Automated MPLS to VPN failover within seconds of a connection failure• Client VPN: L2TP IPsec support for native Windows, Mac OS X, iPad and Android clients with no per-user licensing feesOverviewCisco Meraki MX Security & SD-WAN Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution fordistributed sites, campuses or datacenter VPN concentration. Since the MX is 100% cloud managed, installation and remote management are simple. The MX has a comprehensive suite of network services, eliminating the need for multiple appliances. These services includeSD-WAN capabilities, application-based firewalling, content filtering, web search filtering, SNORT® based intrusion detection and prevention, Cisco Advanced Malware Protection (AMP), web caching, 4G cellular failover and more. Auto VPN and SD-WAN features are available on our hardware and virtual appliances, configurable in Amazon Web Services or Microsoft Azure.Meraki MXCLOUD MANAGED SECURITY & SD-WANRedundant PowerReliable, energy efficient design with field replaceable power suppliesWeb Caching 128G SSD diskDual 10G WAN Interfaces Load balancing and SD-WAN3G/4G Modem Support Automatic cellular failover1G/10G Ethernet/SFP+ Interfaces 10G SFP+ interfaces for high-speed LAN connectivityEnhanced CPU Layer 3-7 firewall and traffic shapingAdditional MemoryFor high-performance content filteringINSIDE THE CISCO MERAKI MXMX450 shown, features vary by modelModular FansHigh-performance front-to-back cooling with field replaceable fansManagement Interface Local device accessMulticolor Status LED Monitor device statusFRONT OF THE CISCO MERAKI MXMX450 shown, features vary by modelCryptographic AccelerationReduced load with hardware crypto assistCisco Threat Grid Cloud for Malicious File SandboxingIdentity Based Policy ManagementIronclad SecurityThe MX platform has an extensive suite of security features including IDS/IPS, content filtering, web search filtering, anti-malware, geo-IP based firewalling, IPsec VPN connectivity and Cisco Advanced Malware Protection, while providing the performance required for modern, bandwidth-intensive yer 7 fingerprinting technology lets administrators identifyunwanted content and applications and prevent recreational apps like BitT orrent from wasting precious bandwidth.The integrated Cisco SNORT® engine delivers superior intrusion prevention coverage, a key requirement for PCI 3.2 compliance. The MX also uses the Webroot BrightCloud® URL categorization database for CIPA / IWF compliant content-filtering, Cisco Advanced Malware Protection (AMP) engine for anti-malware, AMP Threat Grid Cloud, and MaxMind for geo-IP based security rules.Best of all, these industry-leading Layer 7 security engines and signatures are always kept up-to-date via the cloud, simplifying network security management and providing peace of mind to IT administrators.Organization Level Threat Assessment with Meraki Security CenterSD-WAN Made SimpleTransport independenceApply bandwidth, routing, and security policies across a vari-ety of mediums (MPLS, Internet, or 3G/4G LTE) with a single consistent, intuitive workflowSoftware-defined WAN is a new approach to network connectivity that lowers operational costs and improves resource us-age for multisite deployments to use bandwidth more efficiently. This allows service providers to offer their customers the highest possible level of performance for critical applications without sacrificing security or data privacy.Application optimizationLayer 7 traffic shaping and appli-cation prioritization optimize the traffic for mission-critical applica-tions and user experienceIntelligent path controlDynamic policy and perfor-mance based path selection with automatic load balancing for maximum network reliability and performanceSecure connectivityIntegrated Cisco Security threat defense technologies for direct Internet access combined with IPsec VPN to ensure secure communication with cloud applications, remote offices, or datacentersCloud Managed ArchitectureBuilt on Cisco Meraki’s award-winning cloud architecture, the MX is the industry’s only 100% cloud-managed solution for Unified Threat Management (UTM) and SD-WAN in a single appliance. MX appliances self-provision, automatically pulling policies and configuration settings from the cloud. Powerful remote management tools provide network-wide visibility and control, and enable administration without the need for on-site networking expertise.Cloud services deliver seamless firmware and security signature updates, automatically establish site-to-site VPN tunnels, and provide 24x7 network monitoring. Moreover, the MX’s intuitive browser-based management interface removes the need for expensive and time-consuming training.For customers moving IT services to a public cloud service, Meraki offers a virtual MX for use in Amazon Web Services and Microsoft Azure, enabling Auto VPN peering and SD-WAN for dynamic path selection.The MX67W, MX68W, and MX68CW integrate Cisco Meraki’s award-winning wireless technology with the powerful MX network security features in a compact form factor ideal for branch offices or small enterprises.• Dual-band 802.11n/ac Wave 2, 2x2 MU-MIMO with 2 spatial streams • Unified management of network security and wireless • Integrated enterprise security and guest accessIntegrated 802.11ac Wave 2 WirelessPower over EthernetThe MX65, MX65W, MX68, MX68W, and MX68CW include two ports with 802.3at (PoE+). This built-in power capability removes the need for additional hardware to power critical branch devices.• 2 x 802.3at (PoE+) ports capable of providing a total of 60W • APs, phones, cameras, and other PoE enabled devices can be powered without the need for AC adapters, PoE converters, or unmanaged PoE switches.MX68 Port ConfigurationVirtual MX is a virtual instance of a Meraki security appliance, dedicated specifically to providing the simple configuration benefits of site-to-site Auto VPN for customers running or migrating IT services to the public cloud. A virtual MX is added via the Amazon Web Services or Azure marketplace and then configured in the Meraki dashboard, just like any other MX. It functions like a VPN concentrator, and features SD-WAN functionality like other MX devices.• An Auto VPN to a virtual MX is like having a direct Ethernetconnection to a private datacenter. The virtual MX can support up to 500 Mbps of VPN throughput, providing ample bandwidth for mission critical IT services hosted in the public cloud, like Active Directory, logging, or file and print services.• Support for Amazon Web Services (AWS) and AzureMeraki vMX100MX68CW Security ApplianceLTE AdvancedWhile all MX models feature a USB port for 3G/4G failover, the MX67C and MX68CW include a SIM slot and internal LTE modem. This integrated functionality removes the need for external hardware and allows for cellular visibility and configuration within the Meraki dashboard.• 1 x CAT 6, 300 Mbps LTE modem • 1 x Nano SIM slot (4ff form factor)• Global coverage with individual orderable SKUs for North America and WorldwideMX67C SIM slotSmall branch Small branch Small branch Small branch50250 Mbps250 Mbps250 Mbps200 Mbps1Requires separate cellular modemMX67MX67C MX68MX68CW 1Requires separate cellular modemMedium branch Large branch Campus orVPN concentrator Campus orVPN concentratorRack Mount Models 1Requires separate cellular modemVirtual AppliancesExtend Auto-VPN and SD-WAN to public cloud servicesAmazon Web Services (AWS) and Microsoft Azure1 + VirtualIncluded in the BoxPackage Contents Platform(s)Mounting kit AllCat 5 Ethernet cable (2)AllAC Power Adapter MX64, MX64W, MX65, MX65W, MX67, MX67W, MX67C, MX68, MX68W, MX68CWWireless external omni antenna (2)MX64W, MX65W, MX67W, MX68W250W Power Supply (2)MX250, MX450System Fan (2)MX250, MX450SIM card ejector tool MX67C, MX68CWFixed external wireless and LTE paddle antennas MX68CWRemovable external LTE paddle antennas MX67CLifetime Warranty with Next-day Advanced ReplacementCisco Meraki MX appliances include a limited lifetime hardware warranty that provides next-day advance hardware replacement. Cisco Meraki’s simplified software and support licensing model also combines all software upgrades, centralized systems management, and phone support under a single, easy-to-understand model. For complete details, please visit /support.ACCESSORIES / SFP TRANSCEIVERSSupported Cisco Meraki accessory modulesNote: Please refer to for additional single-mode and multi-mode fiber transceiver modulesPOWER CABLES1x power cable required for each MX, 2x power cables required for MX250 and MX450. For US customers, all required power cables will beautomatically included. Customers outside the US are required to order power cords separately.SKUMA-PWR-CORD-AUThe Cisco Meraki MX84, MX100, MX250, MX450 models support pluggable optics for high-speed backbone connections between wir-ing closets or to aggregation switches. Cisco Meraki offers several standards-based Gigabit and 10 Gigabit pluggable modules. Each appliance has also been tested for compatibility with several third-party modules.Pluggable (SFP) Optics for MX84, MX100, MX250, MX450AccessoriesManagementManaged via the web using the Cisco Meraki dashboardSingle pane-of-glass into managing wired and wireless networksZero-touch remote deployment (no staging needed)Automatic firmware upgrades and security patchesTemplates based multi-network managementOrg-level two-factor authentication and single sign-onRole based administration with change logging and alertsMonitoring and ReportingThroughput, connectivity monitoring and email alertsDetailed historical per-port and per-client usage statisticsApplication usage statisticsOrg-level change logs for compliance and change managementVPN tunnel and latency monitoringNetwork asset discovery and user identificationPeriodic emails with key utilization metricsDevice performance and utilization reportingNetflow supportSyslog integrationRemote DiagnosticsLive remote packet captureReal-time diagnostic and troubleshooting toolsAggregated event logs with instant searchNetwork and Firewall ServicesStateful firewall, 1:1 NAT, DMZIdentity-based policiesAuto VPN: Automated site-to-site (IPsec) VPN, for hub-and-spoke or mesh topologies Client (IPsec L2TP) VPNMultiple WAN IP, PPPoE, NATVLAN support and DHCP servicesStatic routingUser and device quarantineWAN Performance ManagementWeb caching (available on the MX84, MX100, MX250, MX450)WAN link aggregationAutomatic Layer 3 failover (including VPN connections)3G / 4G USB modem failover or single-uplinkApplication level (Layer 7) traffic analysis and shapingAbility to choose WAN uplink based on traffic typeSD-WAN: Dual active VPN with policy based routing and dynamic path selection CAT 6 LTE modem for failover or single-uplink1MX67C and MX68CW only Advanced Security Services1Content filtering (Webroot BrightCloud CIPA compliant URL database)Web search filtering (including Google / Bing SafeSearch)Y ouTube for SchoolsIntrusion-prevention sensor (Cisco SNORT® based)Advanced Malware Protection (AMP)AMP Threat Grid2Geography based firewall rules (MaxMind Geo-IP database)1 Advanced security services require Advanced Security license2 Threat Grid services require additional sample pack licensingIntegrated Wireless (MX64W, MX65W, MX67W, MX68W, MX68CW)1 x 802.11a/n/ac (5 GHz) radio1 x 802.11b/g/n (2.4 GHz) radioMax data rate 1.2 Gbps aggregate (MX64W, MX65W), 1.3Gbps aggregate (MX67W,MX68W, MX68CW)2 x 2 MU-MIMO with two spatial streams (MX67W, MX68W, MX68CW)2 external dual-band dipole antennas (connector type: RP-SMA)Antennagain:*************,3.5dBi@5GHzWEP, WPA, WPA2-PSK, WPA2-Enterprise with 802.1X authenticationFCC (US): 2.412-2.462 GHz, 5.150-5.250 GHz (UNII-1), 5.250-5.350 GHZ (UNII-2), 5.470-5.725 GHz (UNII-2e), 5.725 -5.825 GHz (UNII-3)CE (Europe): 2.412-2.484 GHz, 5.150-5.250 GHz (UNII-1), 5.250-5.350 GHZ (UNII-2)5.470-5.600 GHz, 5.660-5.725 GHz (UNII-2e)Additional regulatory information: IC (Canada), C-Tick (Australia/New Zealand), RoHSIntegrated Cellular (MX67C and MX68CW only)LTE bands: 2, 4, 5, 12, 13, 17, and 19 (North America). 1, 3, 5, 7, 8, 20, 26, 28A, 28B, 34, 38, 39, 40, and 41 (Worldwide)300 Mbps CAT 6 LTEAdditional regulatory information: PTCRB (North America), RCM (ANZ, APAC), GCF (EU)Power over Ethernet (MX65, MX65W, MX68, MX68W, MX68CW)2 x PoE+ (802.3at) LAN ports30W maximum per portRegulatoryFCC (US)CB (IEC)CISPR (Australia/New Zealand)PTCRB (North America)RCM (Australia/New Zealand, Asia Pacific)GCF (EU)WarrantyFull lifetime hardware warranty with next-day advanced replacement included.Specificationsand support). For example, to order an MX64 with 3 years of Advanced Security license, order an MX64-HW with LIC-MX64-SEC-3YR. Lifetime warranty with advanced replacement is included on all hardware at no additional cost.*Note: For each MX product, additional 7 or 10 year Enterprise or Advanced Security licensing options are also available (ex: LIC-MX100-SEC-7YR).and support). For example, to order an MX64 with 3 years of Advanced Security license, order an MX64-HW with LIC-MX64-SEC-3YR. Lifetime warranty with advanced replacement is included on all hardware at no additional cost.*Note: For each MX product, additional 7 or 10 year Enterprise or Advanced Security licensing options are also available (ex: LIC-MX100-SEC-7YR).and support). For example, to order an MX64 with 3 years of Advanced Security license, order an MX64-HW with LIC-MX64-SEC-3YR. Lifetime warranty with advanced replacement is included on all hardware at no additional cost.*Note: For each MX product, additional 7 or 10 year Enterprise or Advanced Security licensing options are also available (ex: LIC-MX100-SEC-7YR).。

多功能无线接入点130系列产品说明说明书

多功能无线接入点130系列产品说明说明书

data sheetMultifunctional 130 series wireless access points (APs) maximize mobile device performance in extremely high-density Wi-Fi environments.These ultra-high-performance 802.11n APs deliver wireless data rates up to 450 Mbps per radio and employ three spatial streams to support 50% more throughput and mobile devices than previous-generation APs.The AP-135 and IAP-135 APs feature a 2.4-GHz and 5-GHz radio, each with 3x3 MIMO and three integrated omni-directional downtilt antennas. The AP-134 and IAP-134 models feature the same radios with three (combined, diplexed) external antenna connectors.WI-FI CLIeNt OPtIMIZatIONTo eliminate sticky client behavior, every Aruba AP comes with ClientMatch™ technology, which continuously gathers session performance metrics and utilizes this data to steer mobile devices to the best AP and radio on the WLAN, even while users roam.Best-IN-CLass RF MaNaGeMeNtAll Aruba APs include Adaptive Radio Management™ technology, which is essential to creating the most reliable, high-performance WLANs. ARM™ manages the 2.4-GHz and 5-GHz radio bands to optimize Wi-Fi client performance and ensures that APs stay clear of RF interference.The 130 series can be configured to provide part-time or dedicated air monitoring for spectrum analysis and wireless intrusion protection, VPN tunnels to extend remote locations to corporate resources, and wireless mesh connections where Ethernet drops are not available.ARubA 130 SERIES ACCESS POINTSMaximize the performance of mobile devicesChOOse YOUR OPeRatING MOdeThe 130 series of APs offers a choice of operating modes to meet your unique management and deployment requirements.• Controller-managed mode. When managed by Aruba Mobility Controllers, 130 series APs offer centralized configuration, data encryption, policy enforcement and network services, as well as distributed and centralized traffic forwarding. Please refer to the Aruba Mobility Controller data sheets for more details.• Aruba Instant™ mode. In Aruba Instant mode, a single AP automatically distributes the network configuration to other Instant APs in the WLAN. Simply power-up one Instant AP, configure it over the air, and plug in the other APs – the entire process takes about five minutes. For large installations across multiple sites, the Aruba Activate™ service significantly reduces deployment time by automating device provisioning, firmware upgrades, and inventory management. With Aruba Activate, Instant APs are factory-shipped to any site and configure themselves when powered up.If WLAN and network requirements change, a built-in migration path allows 130 series Instant APs to become partof a WLAN that is centrally managed by a Mobility Controller.advaNCed FeatURes• Spectrum Analysis: -Spectrum analyzer remotely scans the 2.4-GHz and5-GHz radio bands to identify sources of RF interference. • Security: -With an OpenDNS service subscription, Aruba Instantdelivers integrated web filtering, malware and botnetprotection to every device connected to the WLAN -Integrated Trusted Platform Module (TPM) for securestorage of credentials and keys -SecureJack-capable for secure tunneling of wiredEthernet trafficOPeRatING MOdes• 802.11a/b/g/n Aruba Instant AP• 802.11a/b/g/n Mobility Controller-managed AP• Air monitor (AM)• Secure enterprise mesh• Remote AP (RAP) when used with a Mobility Controller WIReLess RadIO sPeCIFICatIONs• AP type: Dual-radio, dual-band 802.11n indoor• Software-configurable dual radio supports 2.4 GHzand 5 GHz• 3x3 MIMO 802.11n with three spatial streams and up to450 Mbps per radio• Supported frequency bands (country-specificrestrictions apply): -2.400 to 2.4835 GHz -5.150 to 5.250 GHz -5.250 to 5.350 GHz -5.470 to 5.725 GHz -5.725 to 5.850 GHz• Available channels: Dependent upon configuredregulatory domain• Dynamic frequency selection (DFS) optimizes the use ofavailable RF spectrum• Supported radio technologies: -802.11b: Direct-sequence spread-spectrum (DSSS) -802.11a/g/n: Orthogonal frequency divisionmultiplexing (OFDM) -802.11n: 3x3 MIMO with three spatial streams• Supported modulation types: -802.11b: bPSK, QPSK, CCK -802.11a/g/n: bPSK, QPSK, 16-QAM, 64-QAM• Transmit power: Configurable in increments of 0.5 dBm• Maximum (aggregate, conducted total) transmit power(limited by local regulatory requirements): -2.4-GHz band: +23 dbm (18 dbm per chain) -5-GHz bands: +23 dbm (18 dbm per chain)• Maximum ratio combining (MRC) for improvedreceiver performance• Cyclic delay diversity for improved downlink RF performance • Short guard interval for 20-MHz and 40-MHz channels • Space-Time block Coding (STbC) for increased range and improved reception• Low-density parity check (LDPC) for high-efficiency errorcorrection and increased throughput• Transmit beam-forming (TxbF) for increased reliabilityin signal delivery (Supported in hardware; currently notenabled in software)• Association rates (Mbps): -802.11b: 1, 2, 5.5, 11 -802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54 -802.11n: MCS0 to MCS23 (6.5 Mbps to 450 Mbps)• 802.11n high-throughput (HT) support: HT 20/40• 802.11n packet aggregation: A-MPDu, A-MSDu POWeR• 48 volts DC 802.3af power over Ethernet (PoE) or802.3at PoE+ -Note: when using 802.3af POE, the second Ethernet port is disabled. It is enabled when using an 802.3at POEpower source (or direct DC power).• 12 volts DC external AC supplied power (adaptersold separately)• Maximum power consumption: 12.5 watts aNteNNas• AP-134 and IAP-134: Three RP-SMA connectors forexternal dual-band antennas. Internal loss betweenradio interface and external antenna connectors (due to diplexing circuitry): 1.5 db in 2.4 GHz and 3.0 db in 5 GHz. • AP-135 and IAP-135: Six integrated downtilt omni-directional antennas for 3x3 MIMO with maximumantenna gain of 3.5 dbi in 2.4 GHz and 4.5 dbi in 5 GHz INteRFaCes• Network: Two 10/100/1000bASE-T Ethernet (RJ-45),auto-sensing link speed and MDI/MDX• Ethernet ports support 802.3az Energy Efficient Ethernet (EEE)• 48 volts DC 802.3af PoE or 802.3at PoE+ interoperablewith intellisource power sourcing equipment (both ports)• Other: One RJ-45 console interfaceMOUNtING• Included with AP: -Mounting brackets for attaching to 9/16” and 15/16”T-bar drop-tile ceiling -Kensington security lock point• Optional mounting kits: -AP-130-MNT: Aruba 130 series AP mount kit containsone flat-surface wall/ceiling mount bracket. -AP-130-MNT-C2: Aruba 130 series AP mount kit containstwo ceiling-grid rail adapters for interlude and silhouettestyle rails. -AP-130-MNT-W2: Aruba 130 series AP mount kit contains one flat-surface wall/ceiling secure mount cradle. MeChaNICaL• Dimensions/weight (unit): -170 mm x 170 mm x 45 mm (6.69” x 6.69” x 1.77”) -760 g (1.68 lb)• Dimensions/weight (shipping): -285 mm x 240 mm x 70 mm (11.22” x 9.45” x 2.76”) -1,050 g (2.31 lb)eNvIRONMeNtaL• Operating: -Temperature: 0° C to +50° C (+32° F to +122° F) -Humidity: 5% to 95% non-condensing• Storage and transportation temperature range: -Temperature: -40° C to +70° C (-40° F to +158° F) ReGULatORY• FCC/Industry of Canada• CE Marked• R&TTE Directive 1995/5/EC• Low Voltage Directive 72/23/EEC• EN 300 328• EN 301 489• EN 301 893• uL/IEC/EN 60950• EN 60601-1-1, EN60601-1-2For more country-specific regulatory information and approvals, please see your Aruba representative.CeRtIFICatIONs• Cb Scheme Safety, cTuVus• uL2043 plenum rating• Wi-Fi certified 802.11a/b/g/nWaRRaNtY• Limited lifetime warrantyMINIMUM aRUBaOs veRsION• ArubaOS 6.1.1.0 on an Aruba Mobility Controller • Aruba Instant 2.0.0.3 softwareMaximum capability of the hardware provided. Maximum transmit power is limited by local regulatory settings. RF performance numbers for IAP-134 and AP-134 are slightly lower due to additional internal RF circuitry.2.450 GHz5.500 GHzIaP-135 aNd aP-135 aNteNNa PatteRN PLOtsH-Plane, 20 degrees down-tilt2.450 GHz 5.500GHzE-plane, AP facing down©2014 Aruba Networks, Inc. Aruba Networks®, Aruba The Mobile Edge Company® (stylized), Aruba Mobilty Management System®, People Move. Networks Must Follow.®, Mobile Edge Architecture®, RFProtect®, Green Island®, ETIPS®, ClientMatch®, bluescanner™ and The All Wireless Workspace Is Open For business™ are all Marks of Aruba Networks, Inc. in the united States and certain other countries. The preceding list may not necessarily be complete and the absence of any mark from this list does not mean that it is not an Aruba Networks, Inc. mark. All rights reserved. Aruba Networks, Inc. reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While Aruba Networks, Inc. uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba Networks, Inc. will assume no responsibility for any errors or omissions. DS_AP130Series_0922141344 CrossmAn Ave | sunnyvAle, CA 940891.866.55.AruBA | T: 1.408.227.4500 | FAX: 1.408.227.4550 |**********************。

sybasease15.5集群安装指南官方中文版linux

sybasease15.5集群安装指南官方中文版linux
计划安装 ..............................................................9 获取许可证 ...................................................10 访问 SPDC ..............................................11 安装新的许可证服务器 ......................................14 启用和更改电子邮件通知 ...................................16 服务器的系统要求 ...........................................16 使用私有互连技术时的系统要求 ....................18 客户端的系统要求 ...........................................19
服务器安装的预安装任务 .........................................21 调整操作系统的共享内存参数 ..............................22 获取 SySAM 主机 ID ..........................................23
安装指南
Adaptive Server® Enterprise Cluster Edition 15.5
Linux
文档 ID: DC01101-01-1550-02 最后修订日期: 2010 年 6 月 版权所有 © 2010 Sybase, Inc. 保留所有权利。 本出版物适用于 Sybase 软件和任何后续版本,除非在新版本或技术声明中另有说明。 此文档中的信息如有更改, 恕不另行通知。 此处说明的软件按许可协议提供,其使用和复制必须符合该协议的条款。 若要订购附加文档,美国和加拿大的客户请拨打客户服务部门电话 (800) 685-8225 或发传真至 (617) 229-9845。 持有美国许可协议的其它国家/地区的客户可通过上述传真号码与客户服务部门联系。 所有其他国际客户请与 Sybase 子公司或当地分销商联系。 仅在定期安排的软件发布日期提供升级。 未经 Sybase, Inc. 的事先书面许可,本书的 任何部分不得以任何形式、任何手段(电子的、机械的、手动、光学的或其它手段)进行复制、传播或翻译。 可在位于 /detail?id=1011207 的“Sybase 商标页”(Sybase trademarks page) 查看 Sybase 商标。 Sybase 和本文档中列出的标记均为 Sybase, Inc. 的商标。® 表示已在美国注册。 Java 和所有基于 Java 的标记都是 Sun Microsystems, Inc. 在美国和其它国家/地区的商标或注册商标。 Unicode 和 Unicode 徽标是 Unicode, Inc. 的注册商标。 IBM 和 Tivoli 是 International Business Machines Corporation 在美国和/或其它国家/地区的注册商标。 提到的所有其它公司和产品名均可能是与之相关的相应公司的商标。

江南大学研究生开题报告范文

江南大学研究生开题报告范文
江南大学 研究生论文开题报告





研究方向


研究生姓名
学位级别
导师姓名
工科 机械工程
硕士
填表日期 2017 年 9 月 25 日
注:此表为研究生在导师或指导小组的指导下,由研究生本人填写,经导师、教研 室主任、院(系)分管研究生工作的负责人审阅后,报研究生院备案,非经同意不得改动。
论文题目
基于云平台的汽车检测装备制造服务优选与系统开发
本人已查阅过哪些科研资料及调研情况:
参考文献:
[1] 杨 沁 ,杨 成, 许程 鹏 .一种 基于 复杂 网络 社团 发现 的产 品模 块划 分方 法 [J]. 现代制 造工 程, 2015(11):64-70. [2] 余杰,吉卫喜,陈高俊.面向 MES 的外协企业决策支持系统研究[J].成组技术与生产现代化, 2013(3):21-26. [3] 刘东.整车制造企业第三方物流服务商的优选分析[D].南京农业大学, 2012. [4] 罗 永 亮 , 张 霖 , 陶 飞 . 云 制 造 模 式 下 制 造 能 力 建 模 的 关 键 技 术 [J]. 计 算 机 集 成 制 造 系 统 , 2012(7):1357-1367. [5] 崔晓康,马军,李立伟.基于动态集成框架的云制造服务过程追溯与匹配研究[J].制造业自动化, 2014(8):9-11,14. [6] 余杰,吉卫喜,孙斌.基于熵值法 TOPSIS 的外协供货商评价系统设计与实现[J].机械制造, 2014(6):55-59. [7] 尹超,黄必清,刘飞.中小企业云制造服务平台共性关键技术体系[J].计算机集成制造系统, 2011(3):495-503. [8] 周涛.面向复杂创新环境的汽车企业供货商评价体系研究[D].重庆大学, 2015. [9] 刘汉生.汽车外协件供货商综合能力评价研究[D].上海交通大学, 2007. [10] 柯沁.A 公司供货商选择评价研究[D].华东理工大学, 2011. [11] 杨男.面向中小企业的云制造平台关键技术研究[D].南京理工大学, 2013. [12] 郭亮.面向机械加工的云制造服务平台关键技术研究[D].重庆大学, 2017. [13] 姜云霞.云制造环境下加工制造资源虚拟化关键技术研究[D].哈尔滨理工大学, 2015. [14] 杨财.云制造环境下的企业生产管理模式研究[D].浙江大学, 2014. [15] 朱哲岐.云制造环境下制造资源的优化匹配研究[D].重庆大学, 2014. [16] 黄剑.云制造环境下制造资源的建模及优化配置研究[D].南昌大学, 2014. [17] 江平宇,刘超.社群化工厂的内涵体系架构与运行逻辑探讨[J].航空制造技术, 2017(7): 26-30. [18] 刘明周,王强,凌琳.基于分层任务网络的云制造任务分解方法[J].中国机械工程, 2017(8): 924-930. [19] 刘婷婷,李长仪.基于多维模糊决策的云制造服务优选模型[J].山东理工大学学报(自然科学版), 2017(5):73-78. [20] 胡艳娟,武理哲,张霖.云制造服务评价理论与方法研究综述[J].计算机集成制造系统, 2017 (3):640-649. [21] 何林燕.云制造环境下柔性作业车间调度算法的研究[D].哈尔滨理工大学, 2017. [22] 程思遥.面向云制造的资源服务管理模式研究及原型系统开发[D].浙江大学, 2013.

A self-adaptive negative selection algorithm used for anomaly detection

A self-adaptive negative selection algorithm used for anomaly detection


R
e s u
lt s
h ib ite d th a t
o u n
o u r
n o
p
o s e
a
a
pp
r o a c
h
o u
tp
c a
e r
fo
m
r m s
the pre
io

u s
te
h n iq
◎ 2008 N
t io

n a
l N
r
a
tu r a l
S c ie
n c e
d a tio
f C h in
Av
a
il a b l e

o n 扩
l in
e
a
t
w w w

s c ie n c e
d ir e
c
t

c o m
黉一
A
se
j i
e s s
著 S c ie n c e D i r e c t
in N
a
P ro g Na t u
re s s
ra
in I S c ie
/o l
n c e
P
r o
gr
t u r a l S c ie
c
i a l im
m u n e
s
y s t e m ;A
n o m a
ly d e t e c t io
n
;N e g
a
t iv e s e le c t i o n
a
lg o r it h m
1. n tr I

拉雷尔电子有限公司产品说明书

拉雷尔电子有限公司产品说明书

LAUREL ELECTRONICS, INC.Ethernet & 4-20 mA Output Transmitterfor Process & Ratio SignalsFeatures•Ethernet Serial Data I/O, Modbus TCP or Laurel ASCII protocol•4-20 mA or 0-10V transmitter output, 16 bits, jumper selectable, isolated•Ratiometric mode for bridges and potentiometers•Dual 120 mA solid state relays for alarm or control, isolated•5V, 10V or 24V dc transducer excitation output, isolated•200 mV, 2V, 20V, 200V, 300V & 600V DC voltage input ranges•2, 20, 200 mA and 5A DC current input ranges•All ranges factory calibrated•Digital span adjust from 0 to ±99,999, zero adjust from -99,999 to +99,999•Analog output resolution 0.0015% of span (16 bits), accuracy ±0.02% of span•Universal 85-264 Vac / 90-300 Vdc or 10-48 Vdc / 12-32 Vac power•Power over Ethernet (PoE) jumper selectable with 10-48 Vdc supply DescriptionThe Laureate 4-20 mA output, process input transmitter provides zero and span adjustment for use with a wide range of industrial transducers. Six DC voltage and four DC current input ranges are jumper selectable. The two most sensitive voltage ranges, 200 mV and 2V, provide a high input impedance of1 GΩ to minimize the load on the voltage signal.The transmitter can be set to a ratio mode (or potentiometer follower mode) by making selections at the connector and in software. In this mode, the transmitter output tracks a ratio of the applied excitation voltage and is unaffected by changes in the excitation voltage. This capability is used for resistive bridge sensors and voltage dividers, such as potentiometers which track wiper position.Fast read rate at up to 50 or 60 conversions per second while integrating the signal over a full power line cycle is provided by Concurrent Slope (Pat 5,262,780) analog-to-digital conversion. High read rate is ideal for peak or valley capture and for real-time computer interface and control. Digital signal filtering modes are selectable for stable readings in electrically noisy environments. The internal digital readings and analog output can be individu-ally selected to be either unfiltered or filtered.Digital signal filtering modes are selectable for stable readings in electrically noisy environments. The internal digital readings and analog output can be individually selected to be either unfiltered or filtered.•An unfiltered selection updates after each conversion for fastest response, up to 60/sec, while integrating the inputsignal over a full power cycle. Fast read rate provides truepeak and valley readings and aids in control applications. • A batch average filter selection averages each 16 conversions for an update every 1/4 sec.•An adaptive moving average filter selection provides a choice of 8 time constants from 80 ms to 9.6 s. When asignificant change in signal level occurs, the filter adapts by briefly switching to the shortest time to follow the change, then reverts back to its selected time constant. Another choice is Auto, which provides an automatic time constant selectionbased on the signal noise characteristics.Standard features of Laureate LTE transmitters include:•Ethernet I/O, isolated. Supported protocols are ModbusRTU and ASCII (tunneled via Modbus TCP) and Laurel ASCII.The latter is simpler than the Modbus protocol and is recom-mended when all devices are Laureates. Note that RS232 or RS485 data I/O in lieu of Ethernet is provided by our LT Series transmitters.•4-20 mA, 0-20 mA or 0-10V analog transmitter output, isolated, jumper-selectable and user scalable. All selections provide 16-bit (0.0015%) resolution of output span and 0.02% output accuracy of a reading from -99,999 to +99,999 counts that is also transmitted digitally. Output isolation from signal and power grounds eliminates potential ground loop problems.The supply can drive 20 mA into a 500 ohm (or lower) load for 10V compliance, or 10V into a 5K ohm (or higher) load for2 mA compliance.•Dual solid state relays, isolated. Available for local alarm or control. Rated 120 mA at 130 Vac or 180 Vdc.•Universal 85-264 Vac power. Low-voltage 10-48 Vdc or 12-32 Vac power is optional.Discovery and configuration of Laureate Ethernet Nodes is easily achieved with Laurel's Node Manager Software, and the discovered transmitters can then be programmed using Laurel's Instrument Setup Software. Both softwares run on a PC under MS Windows and can be downloaded at no charge.SpecificationsAnalog Input Range Resolution Accuracy Input OhmsDC Voltage ± 200.00 mV± 2.0000 V± 20.000 V± 200.00 V± 600.0 V10 µV100 µV1 mV10 mV100 mV± 0.01% FS± 2 counts1 GΩ1 GΩ10 MΩ10 MΩ10 MΩDC Current ± 2.0000 mA± 20.000 mA± 200.00 mA0.1 µA1 µA10 µA± 0.01% FS± 2 counts100 Ω10 Ω1 Ω ± 5.000 A 1 mA± 0.1% FS± 2 counts0.01 ΩInput Resolution Update Rate, Max Max applied voltage Over-current protection 16 bits (65,536 steps)50/sec at 50 Hz, 60/sec at 60 Hz600 Vac for 20, 200 & 600 V ranges, 125 Vac other ranges 25x for 2 mA, 8x for 20 mA, 2.5x for 200 mA, 1x for 5 AAnalog Output (standard)Output Levels Compliance, 4-20 mA Compliance, 0-10V Output Resolution Output Accuracy Output Isolation Step response time 0-20 mA or 0-10 Vdc (selectable)10V (0-500Ω load)2 mA (5 kΩ load)16 bits (65,536 steps)0.02% of output span plus conversion accuracy 250V rms working, 2.3 kV rms per 1 minute test 50 msDual Relay Output (standard)Relay Type Load Rating Two solid state relays, SPST, normally open, Form A 120 mA at 140 Vac or 180 VdcTransducer Excitation Output (standard)Output Levels Output Isolation 5V@100 mA, 10V@120 mA, 24V@50 mA (jumper selectable) 50V from signal groundSerial Data Output (standard)TypeData RatesOutput Isolation Serial Protocols Modbus Compliance Digital Addresses 10/100Base-T Ethernet per IEEE 802.3300, 600, 1200, 2400, 4800, 9600, 19200 baud250V rms working, 2.3 kV rms per 1 min testModbus TCP, Modbus RTU, Modbus ASCII, Laurel ASCII Modbus over Serial Line Specification V1.0 (2002)247 for Modbus, 31 for Laurel ASCIIPower InputStandard Power Low Power Option Power Frequency Power Isolation Power Consumption 85-264 Vac or 90-300 Vdc10-48 Vdc or 12-32 VacDC or 47-63 Hz250V rms working, 2.3 kV rms per 1 min test 2W typical, 3W with max excitation outputMechanicalDimensions MountingElectrical Connections 129 x 104 x 22.5 mm case35 mm rail per DIN EN 50022 Plug-in screw-clamp connectorsEnvironmental Operating TemperatureStorage Temperature Relative Humidity Cooling Required0°C to 55°C-40°C to 85°C95% at 40°C, non-condensingMount transmitters with ventilation holes at top and bottom. Leave 6 mm (1/4") between transmitters, or force air with a fan.PinoutMechanicalPotentiometer Follower ApplicationIn potentiometric (or potentiometer follower) appli-cations, the signal from a sliding contact voltage divider can be converted to engineering units such as position, level or percentage. By operating in a ratiometric mode, the transmitter removes any effects caused by variations in the excitation supply.For use with a 1 kΩ potentiometer, the recommend-ed applied excitation voltage is 10V. A 2 kΩ resistor should be placed in series with the excitation output and excitation return leads. This will allow the trans-mitter's 2V scale with a high input impedance of 1 GΩ to be used.Ordering GuideCreate a model a model number in this format: LTE20PTransmitter Type LTE Laureate 4-20 mA & Ethernet TransmitterMain Board2 Standard Main Board4 Extended Main BoardNote: Extended allows custom curve linearization and rate from successive readings.Power0 Isolated 85-264 Vac or 90-300 Vdc1 Isolated 12-32 Vac or 10-48 VdcSignal Input Process Signals (e.g., 4-20 mA, 0-5V)P Field scalable. Default scaling is 0-200V in = 4-20 mA outP1 Custom Scaling. Specify min input, min output; max input, max outputNote: The same DC signal conditioner can be user configured for process, strain orpotentiometer follower signals, as well as DC Volts or DC Amps. It is precalibrated inEEPROM for all DC Volt and DC Amp ranges listed for DC transmitters.。

非极大值一致 nms的工作流程英语

非极大值一致 nms的工作流程英语

非极大值一致 nms的工作流程英语Non-Maximum Suppression (NMS)。

Non-maximum suppression (NMS) is a technique used in object detection to remove redundant bounding boxes that overlap with each other. It aims to retain only the most confident bounding boxes that are likely to contain the object of interest.Workflow of Non-Maximum Suppression.The workflow of NMS involves the following steps:1. Input: NMS takes as input a set of bounding boxes and their corresponding confidence scores.2. Sort Confidence Scores: The bounding boxes are sorted in descending order of their confidence scores.3. Iterate Over Bounding Boxes: The algorithm iteratesover the bounding boxes in descending order of their confidence scores.4. Select Best Bounding Box: The bounding box with the highest confidence score is selected as the best bounding box.5. Calculate Overlap: For each subsequent bounding box in the iteration, the algorithm calculates the overlap between it and the best bounding box.6. Suppress Overlapping Boxes: If the overlap between a subsequent bounding box and the best bounding box exceeds a predefined threshold, the subsequent bounding box is suppressed and removed from the list of bounding boxes.7. Repeat Until No Overlap: Steps 5 and 6 are repeated until there are no more overlapping bounding boxes.8. Output: The output of NMS is a set of non-overlapping bounding boxes that represent the most confident object detections.Threshold Selection.The threshold used for overlap calculation is crucialfor the effectiveness of NMS. A low threshold can result in excessive suppression, while a high threshold may lead to missed detections. The optimal threshold value depends on the specific object detection task and the size of the bounding boxes.Variations of Non-Maximum Suppression.There are several variations of the basic NMS algorithm, including:Soft NMS: This variation allows for partialsuppression of overlapping bounding boxes, preserving bounding boxes with lower confidence scores but higher overlap.Adaptive NMS: This variation adjusts the suppression threshold based on the size of the bounding boxes toaccommodate scale variations.Weighted NMS: This variation assigns weights to the bounding boxes based on their confidence scores and spatial locations to prioritize suppression of less important bounding boxes.Applications of Non-Maximum Suppression.NMS is widely used in object detection and computer vision applications, such as:Object localization.Image classification.Facial detection.Pedestrian detection.Vehicle detection.Scene understanding.Additional Notes:NMS is a greedy algorithm, meaning it makes locally optimal decisions at each step without considering thelong-term impact on the result.NMS can be computationally expensive for large sets of bounding boxes.Alternative approaches to NMS for removing redundant bounding boxes include grouping and clustering techniques.。

Journal of Economic Behavior & Organization

Journal of Economic Behavior & Organization

Journal of Economic Behavior&OrganizationV ol.53(2004)319–331Deductive versus inductive equilibrium selection:experimental resultsErnan Haruvy a,∗,Dale O.Stahl ba School of Management,University of Texas at Dallas,Richardson,TX75080,USAb Department of Economics,University of Texas at Austin,Austin,TX78712,USAReceived24June2002;received in revised form10September2002;accepted22October2002 AbstractThe debate in equilibrium selection appears to have culminated in the formation of two schools of thought:those who favor equilibrium selection based on rational coordination and those who favor zero-rationality adaptation.We examine four deductive selection principles andfind that each fails to explain experimental data.We propose an inductive selection principle based on simple learning ing out-of-sample maximum likelihood parameters,the predictive performance of one such dynamic is shown to be dramatically better than the deductive selection principles.However, this selection principle is not always definitive,since no dynamic is guaranteed to converge.©2003Elsevier B.V.All rights reserved.JEL classification:B41;C14;C51;C72;C90Keywords:Deductive selection;Adaptive dynamics1.IntroductionEquilibrium selection has been in the forefront of game theory in recent years,with the need for a salient selection method increasing as new economic and social problems involving multiple equilibria are being modeled.There are two main schools of thought in the area of equilibrium selection:On the one hand we have deductive selection—selection based on reasoning and coordination on focal points—and on the other hand we have inductive selection—selection based on adaptive dynamics.The debate between these two camps appears to have reached an impasse.Whereas existing deductive selection rules have been shown to do poorly in experiments(Van Huyck et al.,1990,1991;Straub,1995), inductive selection principles appear more promising.∗Corresponding author.E-mail address:eharuvy@(E.Haruvy).0167-2681/$–see front matter©2003Elsevier B.V.All rights reserved.doi:10.1016/j.jebo.2002.10.001320 E.Haruvy,D.O.Stahl/J.of Economic Behavior&Org.53(2004)319–331The deductive equilibrium selection literature attempts to explain and predict which of the equilibria surviving refinements should be expected in different classes of games.A common conjecture is that decision-makers apply some deductive principle to identify a specific Nash equilibrium.One such deductive selection principle is payoff-dominance (Harsanyi and Selten,1988,p.81;Schelling,1960,p.291).Applying this principle,one expects the equilibrium outcome in a coordination game to be the highest Pareto-ranked equilibrium.The major limitation of payoff dominance(PD)lies in its failure to take into consideration off-equilibrium payoffs.To remedy this deficiency,equilibrium selection principles have been developed that are based on“riskiness,”the most famous of which is Harsanyi and Selten’s(1988)risk dominance(RD)selection principle.Schelling was thefirst to note that the salience of a selection principle used in a particular game is largely an empirical question.His support of experimental methods came from his conviction that“some essential part of the study of mixed motive games is empirical.”Further,“the principles relevant to successful play,the strategic principles,the proposi-tions of a normative theory,cannot be derived by purely theoretical means from a priori considerations”(Schelling,1960,p.162).Experimental results[for prominent examples see Cooper et al.(1990);Van Huyck et al. (1990,1991);henceforth,VHBB),Van Huyck et al.(1994,1997);henceforth,VHCB),and Straub,1995]do not appear to favor deductive principles.A possible explanation for the apparent failure of deductive principles is that they assume decision-makers possess be-liefs consistent with some equilibrium without attempting to explain the process by which decision-makers acquire these equilibrium beliefs.Other experimental works[Stahl and Wilson(1994,1995);henceforth,SW),Stahl(1996);Haruvy et al.(2001);henceforth, HSW),and Haruvy(2002)]reject the hypothesis that all experimental subjects generally begin with equilibrium beliefs.Hence,it would seem that an equilibrium outcome is gener-ally not the result of choices made by decision-makers with equilibrium beliefs but rather the result of a dynamic process that begins withfirst period play by less-than-super-rational decision-makers.Until recently,deductive selection principles that do not allow a role for the history of play or learning have dominated the equilibrium selection literature.The failure of deductive principles has shifted interest to learning and evolutionary dynamics as possible tools for equilibrium prediction.The basis for these inductive selection principles is the idea that in cases where decision-makers initially fail to coordinate on some equilibrium,repeated interaction may allow them to learn to coordinate.Having some experience in the game provides a decision-maker with observations that can be used to reason about the equilibrium selection problem in the continuation game.This experience may influence the outcome of the continuation game by focusing expectations on a specific equilibrium point.Some experimental studies of games with multiple equilibria have found that relatively simple adaptive learning dynamics often yield good equilibrium predictions.In these exper-iments,knowledge of the initial distribution of play was sufficient to predict the equilibrium outcome(see VHBB,VHCB,and Roth and Erev,1995).However,even with a good char-acterization of dynamics,one must specify the initial distribution of play before predicting thefinal outcome.Recent research(Haruvy and Stahl,2000)has attempted tofill this gap by studying alternative theories(a priori specifications)of initial conditions.Theyfind that specifying uniform initial conditions for“period0”(i.e.afictitious period prior to the actualE.Haruvy,D.O.Stahl/J.of Economic Behavior&Org.53(2004)319–331321first period of play)and using the dynamic model to predict play for period1onward is a robust and parsimonious specification thatfits the dynamics quite well.Stahl(1999)conducted a horse race among seven action-reinforcement learning models and found that a simple four-parameter logit best-reply with inertia and adaptive expec-tations(LBRIAE)dynamic outperformed all others both in sample and out-of-sample by several measures.We therefore focus on the LBRIAE dynamic model in this paper as a can-didate for an inductive equilibrium selection principle;if the LBRIAE dynamic converges, then we call the limit point the LBRIAE equilibrium.The Harsanyi and Selten tracing procedure has both deductive and inductive features. Their algorithm adjusts arbitrary prior beliefs into equilibrium beliefs through gradual move-ment in the direction of best response to the prior beliefs.It is important to recognize,how-ever,that their underlying dynamic process occurs in the mind of the player before thefirst period of play,so it is independent of empirical histories in a given game.Further,unlike LBRIAE dynamics,dominated strategies have no effect on their predictions—an implication that has been strongly refuted by experimental data(e.g.Cooper et al.,1990).Nonetheless, we adopt the spirit of their approach,suggesting simple initial conditions and moving in a dynamic manner,to arrive at an ex-ante prediction based on game properties alone.We describe four deductive selection principles in Section2and our inductive approach in Section3.Section4describes some simple games that test existing notions of deduc-tive selection against our proposed alternative and the experimental procedure.Section5 describes the results,and Section6concludes.2.Deductive equilibrium selection principlesIn this section we briefly review the main deductive selection principles in the literature: payoff dominance,security(SEC)and risk dominance.The premise behind the deductive selection principles is that players choose an action from the set of Nash equilibrium actions according to various criteria.If all players apply the same criterion,the equilibrium outcome can be predicted without any consideration of dynamics.2.1.Payoff dominanceThe payoff dominance principle relies on the idea that“rational individuals will cooperate in pursuing their common interests if the conditions permit them to do so”(Harsanyi and Selten,1988,p.356).In the symmetric normal-form games we study,the payoff dominant equilibrium corresponds to the Nash equilibrium action with the largest diagonal payoff. Experimental studies by Cooper et al.(1990,1992),VHBB(1990,1991)and Straub(1995) on coordination games provide substantial evidence that players often fail to coordinate their actions to obtain a Pareto-optimal equilibrium in experimental settings.2.2.SecurityA secure action is one that maximizes the minimum possible payoff(Van Huyck et al., 1990).Thus,when each act is appraised by looking at the worst state for that act,the secure322 E.Haruvy,D.O.Stahl/J.of Economic Behavior&Org.53(2004)319–331action is the action with the best worst state.This idea is the pure-strategy version of V on Neumann and Morgenstern’s(1947)maximin criterion.It is important to note that in games with non-Nash actions,there is no reason to assume that the secure action should be in the support of some Nash equilibrium.Therefore,to make the security criterion an equilibrium selection principle,it must be modified to exclude actions that are not in the support of some equilibrium.We restrict the security criterion to equilibrium actions by defining the secure equilibrium action as that equilibrium action that satisfiesU kj(1) arg max mink∈NE j∈NEwhere U is a J×J matrix of game payoffs for the row player in a given game and NE denotes the set of Nash equilibrium actions.This specification applies the security criterion to the game after the deletion of non-equilibrium actions.In accordance with this restriction,the security selection principle is an equilibrium selection principle that predicts the maximin action after restricting attention to the set of equilibrium actions.2.3.Risk dominanceThe Harsanyi and Selten risk dominance selection criterion is concerned with pair-wise comparisons of Nash equilibria.The equilibrium with the highest Nash-product is selected out of each pair,where the term Nash-product refers to the product of the deviation losses of both players at a particular equilibrium.Unfortunately,there are difficulties when attempting to apply this definition to general n×n games with more than two equilibria because the pair-wise risk dominance(PRD)relation is not necessarily transitive.One solution is to redefine risk dominance in accordance with Harsanyi and Selten’s heuristic justification,in which selection of an equilibrium results from postulating an initial state of uncertainty where the players have uniformly distributed second order beliefs(i.e., each player believes that the other players’beliefs are uniformly distributed on the relevant space of priors).Briefly,given a symmetric n×n game with payoff matrix U,let NE denote the set of Nash equilibrium actions,and let∆NE denote the simplex on NE.For each j∈NE,define q RD j as the relative proportion of∆NE for which action j is the best response to some belief in∆NE.Then the action k∈NE that maximizes U k q RD(where U k is the k th row of the payoff matrix)is the risk-dominant NE action.This solution coincides with the pair-wise definition in2×2games and ensures transitivity of the risk dominance relation in symmetric n×n games.We shall refer to this extension simply as risk dominance.To illustrate the difference between the two concepts,consider game1in Fig.1.There are three equilibria in this game.The Nash product for equilibrium A in pair(A,B)is102 and for equilibrium B in that pair it is202.Hence B dominates A.The Nash product for equilibrium A in pair(A,C)is302and for equilibrium C in that pair it is102.Hence A dominates C.The Nash product for equilibrium B in pair(B,C)is602and for equilibrium C in that pair it is502.Hence B dominates C.Therefore,B is the pair-wise risk dominance solution.For the RD solution,the RD prior is q RD=(0.73,0.22,0.05),corresponding to the relative areas of the best response regions for each equilibrium,and the expected payoffsE.Haruvy,D.O.Stahl /J.of Economic Behavior &Org.53(2004)319–331323Game 1 (5 ses)Game 4 (5 ses) 118 0 6 1 118 2 A 70 60 90 L1, SEC, RD, LBRIAEA 70 30 20 PDB 60 80 50PRD B 60 60 30 L1, RD, LBRIAE C 40 20 100 PD C 45 45 40 SECGame 13 (7 ses)Game 14 (5 ses) 22 11 142 3 88 32 A 60 60 30 L1 A 50 0 0 DOMB 30 70 20 PD, RD B 70 35 35 L1, SEC, LBRIAEC 70 25 35 SEC, LBRIAE C 0 25 55 PD, RDGame 19 (5 ses)11 108 5A 80 60 50 PRDB 60 70 90 L1, SEC, RD LBRIAEC 0 0 100 PDKey : PD = Payoff dominant Nash equilibrium strategyRD = Risk dominant Nash equilibrium strategyPRD = Pair-wise risk dominant strategy (only indicated when distinct from RD)SEC = Security Nash equilibrium strategyL1 = Level-1 StrategyLBRIAE = large-population limit distribution with no tremblesUnderlined numbers are the aggregate choices.Fig.1.The game matrices,number of sessions and aggregate choices.are 68.8,63.9and 38.6for A,B,and C,respectively.Therefore,A is the best response to the RD prior and is the prediction for the RD principle.In the games we study,the Harsanyi–Selten pair-wise definition of risk dominance yields a unique solution that we denote as pair-wise risk dominance .Harsanyi and Selten also introduce a tracing procedure as a risk dominance approach for more general games.In our games,the Harsanyi–Selten tracing procedure would pick the PRD equilibrium.It is important to note that the selection principle promoted by Harsanyi and Selten would in fact select the unique PD equilibrium over any of the risk dominance concepts.We nonetheless isolate the risk dominance notion as a principle worth investigating for its own merits.324 E.Haruvy,D.O.Stahl/J.of Economic Behavior&Org.53(2004)319–3313.Inductive selection principlesBy inductive selection principles we refer to dynamic models and their limit points.We begin by addressing several methodological issues concerning the predictions of a dynamic model.We then present the LBRIAE model as an example and our preferred inductive principle.3.1.Inductive processes as selection principlesThough several models of dynamics have been proposed in the literature in the context of coordination in games with multiple equilibria,few authors have focused on dynamic models as a solution to the equilibrium selection problem.One exception is Van Huyck et al.(1997)who studied adaptive behavior in a generic game with multiple Pareto ranked equilibria.They found that(i)behavior diverged at the separatrix—the border separating the basins of attraction for each equilibrium—predicted by thefictitious play dynamic, and(ii)the equilibrium selected was sensitive to small differences in initial conditions. However,they made no characterization of the appropriate initial conditions.Obviously, such sensitivity is an impediment to using inductive processes to define selection principles. Unlike the standard dynamic literature reliance on one-period-ahead measures of likeli-hood,the focus in the application of dynamics to equilibrium selection is on T-period-ahead prediction,or the ex-ante prediction prior to the start of the game of the period T frequency of choice.To compute the exact theoretical probability distribution for such a T-period-ahead prediction,we would need to integrate out the T−1periods prior to T.Although such a feat may be impossible analytically,it can be approximated to any desired degree of accuracy by simulating a large number of paths of play.Given afinite population and a positive probability(ε)of trembles,every T-period path has a strictly positive probability.Therefore,our integration procedure will put positive probability on every stable Nash equilibrium.This indeterminacy is clearly a drawback to an inductive selection principle.One way to generate more definitive predictions is to simulate paths of play for a large population(thereby reducing the multinomial variance), and to reduce the probability of trembles,taking the limit as the population size increases indefinitely and goes to zero.The limit dynamics are those of a deterministicfirst-order difference equation on the simplex.Starting with initial conditions for the choice frequency p(0),if the limit dynamics converge,then the limit point is the inductive selection principle’s prediction.There are two caveats of this limit approach.First,the limit predictions are not nec-essarily reliable forfinite populations and positive trembles.For small populations with non-negligible trembles,historical accidents could have a permanent effect on the long-run outcome by bumping the path out of one basin of convergence into another.Hence,when attempting predictions for small populations,it would be safer to use simulations for the actual population size and tremble likelihood.Second,the predictions may be highly sensitive to the initial conditions p(0).To see this,consider a game for which p(0)is very close to a separatrix.Slightly perturbing the initial conditions so they lie on the other side of the separatrix will result in dramatically differentfinal outcomes for the limit dynamics.Thus,unless one is extremely confidentE.Haruvy,D.O.Stahl/J.of Economic Behavior&Org.53(2004)319–331325in the specification of initial conditions,one should be concerned about the robustness of the limit results to initial conditions.While using simulations for the actual population size and empirically measured tremble probability will mitigate this problem somewhat,a better approach would be direct sensitivity analysis:e.g.,draw initial priors from a multinomial distribution as if period0were real.3.2.The LBRIAE inductive selection principleStahl(1999)proposed the logit best-reply with inertia and adaptive expectations model. The population is assumed to be comprised of two types.One type either sticks with last period’s choice or imitates the most recent empirical frequency of the whole population, p(t−1).Given afixed propensity to stick or imitate,the resulting behavior of this type is afirst-order dynamic process that has the same structural form as an adaptive expectations process for beliefs.The second type is assumed(i)to have beliefs given by the adaptive process of thefirst type(as if they believe everyone else is of thefirst type),and(ii)to choose a noisy(logistic)best-reply to this belief.To accommodate trembles by all types, the probability choice function is mixed with the uniform distribution over the actions. Furthermore,unlike the standard assumption of uniform initial conditions for period1, LBRIAE imposes the uniformity assumption on afictitious period0and uses the dynamic model to predictfirst period behavior.Defining the LBRIAE prediction as the limit of the large population dynamics as the tremble probability goes to zero,the prediction is a logit-response equilibrium of the game (McKelvey and Palfrey,1995)that will depend on the predetermined values of the LBRIAE parameters.We hasten to point out that there is no guarantee that the limit dynamics will converge.We agree with VHCB that simple“better-response”dynamics should be expected to predict well for many games with multiple equilibria,and we deem the four-parameter LBRIAE model to belong to this class.Moreover,it appears that the tremble structure and the herd behavior of this model result in a much betterfit of experimental data than other leading models(Stahl,1999).While thefinal equilibrium outcome for most of our games is predicted equally well by all leading dynamic models,we will see in Section5that LBRIAE outperforms Anderson et al.(2001);Roth and Erev(1995),and Camerer and Ho(1999) for one of the games.Hence,we focus on the inductive selection principle derived from the LBRIAE model.We nevertheless briefly describe the other three learning models.The reader should refer to the original paper for a more detailed description.3.3.Other learning modelsLBRIAE could be classified as a belief learning model since players are modeled as forming beliefs about the probabilities of opponent choices based on information about past opponent choices,irrespective of the choice actually played by the individual player forming the beliefs.A simpler version of belief learning,which we call the logit form of replicator dynamics,is derived from the idea of stochasticfictitious play with inertia(see Fudenberg&Levine,1998;Anderson et al.,2001).The choice rule is stochastic,and beliefs are updated with depreciation of past beliefs by a constant.326 E.Haruvy,D.O.Stahl/J.of Economic Behavior&Org.53(2004)319–331In contrast to belief learning,Roth and Erev presented what has come to be known as the reinforcement learning model.In their model,players update propensities based only on realized payoffs to the strategies actually played.Camerer and Ho’s model is presented as a hybrid approach between belief and reinforcement learning,where the two schools are described as differing on the weight given by human players to foregone payoffs in updating propensities.As noted by Camerer and Ho,belief learning does not distinguish foregone from realized payoffs in the updating of propensities,whereas players in reinforcement learning models do not pay any attention to foregone payoffs.The idea behind the EW A model is that players evaluate the performance of each possible action in the last period and update their propensities to use each action accordingly.However,the action actually played by each player receives greater attention in the evaluation process.Hence,actions are reinforced according to past performance,but actions actually played receive some additional reinforcement.4.The games and experimental procedureWe selectedfive games that discriminate among the deductive equilibrium selection principles of payoff dominance,risk dominance,pair-wise risk dominance,and security. For the LBRIAE selection principle and all other learning models,we use parameters estimated in Stahl(1999)for a totally different data set and produce10,000simulations for a large population and vanishing trembles.1Thefive games are(using HS99numbering):1, 4,13,14and19,shown in Fig.1.These are symmetric normal-form games,so all players read the payoff matrix as“row”players.That is,the choices A,B,and C are row choices, where A is the top row,B is the middle row,and C is the bottom row.The numbers in each row give the payoff if everyone else chooses A,B or C,respectively.Thesefive games all have the property that each of the selection principles makes a unique prediction as indicated in Fig.1.2The aggregated choices are displayed as underlined numbers above each payoff matrix in Fig.1.A“mean-matching”protocol was used.3In each period,a participant’s token payoff was determined by her choice and the percentage distribution of the choices of all other participants,p(t),as follows.The row of the payoff matrix corresponding to the participant’s choice was multiplied by the vector of choice distribution of the other participants.Token payoffs were in probability units for afixed prize of US$2.00per period of play.In other 1Since the equal-probable point is not close to any separatrix for these games,the limit predictions are robust to the initial conditions.2While the limit point of the LBRIAE model is a logit equilibrium,since the estimated precision of the logit best-replies is high enough to put the limit point very close to a pure-strategy Nash equilibrium,for the pur-pose of comparisons with the deductive selection principles,we identify the LBRIAE prediction as that closest pure-strategy Nash equilibrium.3While pure theory would hold that playing against a single opponent randomly selected from the population is equivalent to playing against thefield,the latter protocol makes asymmetric equilibria highly unlikely.Friedman (1996)finds very little difference between the two protocols in learning-by-doing experiments;if anything,the limiting behavior is slightly more Nash-like when playing against thefield.Recently,the mean-matching protocol has been found to promote strategic and individualistic(money-maximizing)behavior(Stahl and Haruvy,2002a, 2002b).E.Haruvy,D.O.Stahl/J.of Economic Behavior&Org.53(2004)319–331327 words,the token payoff for each period gave the percentage chance of winning US$2for that period.The lotteries that determinedfinal monetary payoffs were conducted following the completion of both runs using dice.Specifically,a random number uniformly distributed on[00.0,99.9]was generated by the throw of three10-sided dice.A player won US$2.00 if and only if his token payoff exceeded his generated dice number.Payment was made in cash immediately following each session.Participants were seated at private computer terminals separated so that no participant could observe the choices of other participants.The relevant game,or decision matrix, was presented on the computer screen.Each participant could make a choice by click-ing the mouse button on any row of the matrix,which then became highlighted.In addi-tion,each participant could make hypotheses about the choices of the other players.An on-screen calculator would then calculate and display the hypothetical payoffs to each available action given each hypothesis.Participants were allowed to make as many hy-pothetical calculations and choice revisions as time permitted.Following each time pe-riod,each participant was shown the aggregate choices of all other participants and could view a record screen with the history of the aggregate choices of other participants for the entire run.5.ResultsWefirst examine the aggregatefinal-period choices and compute the proportion of those choices(aggregated over all experimental sessions of a game)that are consistent with equilibrium selection principle P,where P∈{PD,RD,PRD,SEC,LBRIAE}.Because we have a different number of experimental sessions for the various games,wefirst average results for each game over the sessions of that game andfinally take the simple average of these averages(Table1).We observe that PD performs worse by this criterion,since only8.4%of the aggregate final-period choices are consistent with the PD principle.The LBRIAE selection principle4 clearly performs best by this criterion,since at least70%of the aggregatefinal-period choices are consistent with the LBRIAE principle.While RD and SEC perform well above the50%level,there are games for which these principles perform dismally(13and4,re-spectively).To see the robustness of these results across the games,note that the LBRIAE column weakly dominates the other four columns and that the RD column weakly dom-inates PR and PRD;thus,these rankings are invariant to any distribution across these games.An alternative criterion for evaluating selection principles is by“outcomes”determined on a session-by-session basis.We say that thefinal outcome is x in session i of a game when at least75%of thefinal-period choices are x;here x stands for the action corresponding to4It is important to stress again that LBRIAE is used here with predetermined values from another set of games in another paper(Stahl,1999),as are all other learning models considered here.As such,LBRIAE and the other learning models are selection principles in the purest definition of the term,rather thanfitted on the data.The latter approach would put the inductive principles at an unfair advantage over the deductive principles(which cannot be fitted).。

iAnywhere Adaptive Server Anywhere 错误消息 说明书

iAnywhere Adaptive Server Anywhere 错误消息 说明书

Adaptive Server Anywhere错误消息部件号: 32065-01-0802-01上次修改时间: 2002 年 10 月版权所有 © 1989-2003 Sybase,Inc. Portions 版权所有© 2001-2002 iAnywhere Solutions,Inc. 保留所有权利。

未经 Sybase,Inc. 事先书面许可,不得以任何形式、任何手段(电子的、机械的、手工的、光学的或其它方式)复制、传播或翻译本书的任何部分。

Sybase、SYBASE(徽标)、AccelaTrade、ADA Workbench、Adaptable Windowing Environment、Adaptive Component Architecture、Adaptive Server、Adaptive Server Anywhere、Adaptive Server Enterprise、Adaptive Server Enterprise Monitor、Adaptive Server Enterprise Replication、Adaptive Server Everywhere、Adaptive Server IQ、Adaptive Warehouse、AnswerBase、Anywhere Studio、Application Manager、AppModeler、APT Workbench、APT-Build、APT-Edit、APT-Execute、APT-FORMS、APT-Library、APT-Translator、ASEP、Backup Server、BayCam、Bit-Wise、BizTracker、Certified PowerBuilder Developer、Certified SYBASE Professional、Certified SYBASE Professional(徽标)、ClearConnect、Client Services、Client-Library、CodeBank、Column Design、ComponentPack、Connection Manager、Convoy/DM、Copernicus、CSP、Data Pipeline、Data Workbench、DataArchitect、Database Analyzer、DataExpress、DataServer、DataWindow、DB-Library、dbQueue、Developers Workbench、Direct Connect Anywhere、DirectConnect、Distribution Director、Dynamo、e-ADK、E-Anywhere、e-Biz Integrator、E-Whatever、EC-GATEWAY、ECMAP、ECRTP、eFulfillment Accelerator、Electronic Case Management、Embedded SQL、EMS、Enterprise Application Studio、Enterprise Client/Server、Enterprise Connect、Enterprise Data Studio、Enterprise Manager、Enterprise SQL Server Manager、Enterprise Work Architecture、Enterprise Work Designer、Enterprise Work Modeler、eProcurement Accelerator、eremote、Everything Works Better When Everything Works Together、EWA、Financial Fusion、Financial Fusion Server、First Impression、Formula One、Gateway Manager、GeoPoint、iAnywhere、iAnywhere Solutions、ImpactNow、Industry Warehouse Studio、InfoMaker、Information Anywhere、Information Everywhere、InformationConnect、InstaHelp、Intellidex、InternetBuilder、iremote、iScript、Jaguar CTS、jConnect for JDBC、KnowledgeBase、Logical Memory Manager、MainframeConnect、Maintenance Express、MAP、MDI Access Server、MDI Database Gateway、media.splash、MetaWorks、MethodSet、ML Query、MobiCATS、MySupport、Net-Gateway、Net-Library、New Era of Networks、Next Generation Learning、Next Generation Learning Studio、O DEVICE、OASiS、OASiS(徽标)、ObjectConnect、ObjectCycle、OmniConnect、OmniSQL Access Module、OmniSQL Toolkit、Open Biz、Open Business Interchange、Open Client、Open Client/Server、Open Client/Server Interfaces、Open ClientConnect、Open Gateway、Open Server、Open ServerConnect、Open Solutions、Optima++、Partnerships that Work、PB-Gen、PC APT Execute、PC DB-Net、PC Net Library、PhysicalArchitect、Pocket PowerBuilder、PocketBuilder、Power Through Knowledge、Power++、power.stop、PowerAMC、PowerBuilder、PowerBuilder Foundation Class Library、PowerDesigner、PowerDimensions、PowerDynamo、Powering the New Economy、PowerJ、PowerScript、PowerSite、PowerSocket、Powersoft、Powersoft Portfolio、Powersoft Professional、PowerStage、PowerStudio、PowerTips、PowerWare Desktop、PowerWare Enterprise、ProcessAnalyst、Rapport、Relational Beans、Replication Agent、Replication Driver、Replication Server、Replication Server Manager、Replication Toolkit、Report Workbench、Report-Execute、Resource Manager、RW-DisplayLib、RW-Library、S Designor、S-Designor、S.W.I.F.T. Message Format Libraries、SAFE、SAFE/PRO、SDF、Secure SQL Server、Secure SQL Toolset、Security Guardian、SKILS、smart.partners、smart.parts、smart.script、SQL Advantage、SQL Anywhere、SQL Anywhere Studio、SQL Code Checker、SQL Debug、SQL Edit、SQL Edit/ TPU、SQL Everywhere、SQL Modeler、SQL Remote、SQL Server、SQL Server Manager、SQL Server SNMP SubAgent、SQL Server/CFT、SQL Server/DBM、SQL SMART、SQL Station、SQL Toolset、SQLJ、Stage III Engineering、、STEP、SupportNow、Sybase Central、Sybase Client/Server Interfaces、Sybase Development Framework、Sybase Financial Server、Sybase Gateways、Sybase Learning Connection、Sybase MPP、Sybase SQL Desktop、Sybase SQL Lifecycle、Sybase SQL Workgroup、Sybase Synergy Program、Sybase User Workbench、Sybase Virtual Server Architecture、SybaseWare、Syber Financial、SyberAssist、SybMD、SyBooks、System10、System11、System XI(徽标)、SystemTools、Tabular Data Stream、The Enterprise Client/Server Company、The Extensible Software Platform、The Future Is Wide Open、The Learning Connection、The Model For Client/Server Solutions、The Online Information Center、The Power of One、TradeForce、Transact-SQL、Translation Toolkit、Turning Imagination Into Reality、UltraLite、UNIBOM、Unilib、Uninull、Unisep、Unistring、URK Runtime Kit for UniCode、Viewer、Visual Components、VisualSpeller、VisualWriter、VQL、Warehouse Control Center、Warehouse Studio、Warehouse WORKS、WarehouseArchitect、Watcom、Watcom SQL、Watcom SQL Server、Web Deployment Kit、Web.PB、Web.SQL、WebSights、WebViewer、WorkGroup SQL Server、XA-Library、XA-Server 以及 XP Server 是 Sybase,Inc. 或其子公司的商标。

Trane SRV-SVX007B-GB 适应频率驱动器操作维护指南说明书

Trane SRV-SVX007B-GB 适应频率驱动器操作维护指南说明书

Adaptive Frequency Drive forRTAC / RTAD / RTWD / RTUD / RTWB / RTUB ChillersSRV-SVX007B-GBTable of ContentsIntroduction (4)Foreword (4)Warranty (4)Reception (4)General Information (4)General Features (4)Documentation (4)Parts list (5)Parts to be ordered (5)Kits components details (7)Oil (7)Electrical kit (7)Additional material (10)Recommended parts list (10)Mechanical installation (11)Lifting and moving instructions (11)Lifting weight and dimensions (11)Oil change (13)Temperature sensors (13)Pressure transducer (13)Electrical installation (14)Wiring diagram (14)On site connection (14)Power wiring (15)Control wiring (15)Bus wiring (16)Wiring installation instructions (16)Control card connection (RTAC and RTWD chiller only) (18)Commissioning (20)AFD confi guration (20)Binding (20)Confi guration (20)Acoustic and vibration (20)Chiller operation with Adaptive Frequency Drive (24)Chiller operating map (24)Specifi c installation (24)ForewordThese instructions are given as a guide to good practice in the installation and maintenance of the T rane Adaptive Frequency Drive retrofi t kit. T hey do not contain thefull service procedures necessary for the continued successful operation of this equipment. T he servicesof a qualifi ed service technician should be employed, through the medium of a maintenance contract with a reputable service company.WarrantyWarranty is based on the general terms and conditions of the constructor. T he warranty is void if the equipment is modifi ed or repaired without the written approval of the constructor, if the operating limits are exceeded, or if the control system or the electrical wiring is modifi ed. Damage due to misuse, lack of maintenance, or failureto comply with the manufacturer’s instructions, is not covered by the warranty obligation. If the user does not conform to the instructions given in this document, it may entail cancellation of warranty and liabilities by the constructor.ReceptionOn arrival, inspect the parts before signing the delivery note. Specify any damage on the delivery note, and send a registered letter of protest to the last carrier of the goods within 72 hours of delivery. Notify the local T rane sales offi ce at the same time. T he parts should be totally inspected within 7 days of delivery. If any concealed damage is discovered, send a registered letter of protest to the carrier within 7 days of delivery and notify the local T rane sales offi ce.Important notice: No shipping claims will be accepted by Trane if the above mentioned procedure is not respected. Note: More stringent national rules may apply in some countries. For more information, refer to the general sales conditions of your local T rane sales offi ce.General InformationCautions appear at appropriate places in this instruction manual. Y our personal safety and the proper operation of this machine require that you follow them carefully. The constructor assumes no liability for installations or servicing performed by unqualifi ed personnel General FeaturesThis document describes the material required and the procedure to install on site Adaptive Frequency Driveon RTAC, RTAD and RTWD units. Support of a qualifi ed Trane technician is required to install and commission the Adaptive Frequency Drive.DocumentationThis document is intended to guide T rane techniciansto retrofi t a RTAC, RTAD or RTWD chiller with Adaptive Frequency Drive.Refer to offi cial T rane documentation concerning operation and maintenance of the chillers.WARNING!Hazardous Voltage!Disconnect all electric power before servicing.Failure to disconnect power before servicing canresult in severe personal injury or death caused by electrocution.WARNING!Capacitors inside. Wait for 30 minutes after switchingoff power before servicing the chiller or the Adaptive Frequency Drive.IntroductionParts listThe parts list below does not mention all parts. Only the kit main components are listed in the document. Parts to be orderedT able 1 - Parts list250OIL003172KIT1775E1KIT1776E1 * Standard effi ciency units** High and premium effi ciency units+ Standard evap temperature (>5°C) - High condenser (>35°C)++ Low evap temperature (<5°C) - Standard condenser (<35°C)Note: Kit for RTUD are the same as for RTWD with HiVi compressorParts listKits components detailsOilHere is a description of oil currently used (existing oil) and oil to be replaced when using Adaptive Frequency Drive (New oil).pailL 18.918.9Electrical kitTable 3 - Electrical kit description Panel designFigure 1 - RTAD/RTWB panelFigure 2 - RTAC/RTWD panelParts list8K3-C18K2-C18K1-C28K3-C28K2-C18A5-18A4-C18A2-18K1-C18A4-C28A8-1(OPTION)8A2-18A3-C18A5-18A8-1(OPTION)FusesThe large sizes of Adaptive Frequency Drive (110 kW to 132 kW) are mounted with high speed fuses (gG type). Other AFD (30 kW to 90 kW) do not have fuses. Therefore existing fuses must be changed on units using smaller AFD (sizes 30 kW to 90 kW).Adaptive Frequency DriveCaution! Different data for RTWD using HiVi or LoVi compressors- H iVi compressors used when digit 15 = B / C ordigit 21 = 2/3- LoVi compressors used when digit 15 = A or digit 21 = 1Parts listTable 5 - RTAD / RTAC / RTWB AFD selectionParts listWiringEach electrical kit is provided with appropriate power wiring to connect electrical kit to the unit. 10 m of standard power wiring and 10m of shielded power wiring are provided for each circuit.Figure 3 - Standard and shielded power wiringY/GFigure 4 - Control wiringFigure 5 - Bus WiringAdditional materialThe following material is not provided within T rane kit and has to be locally supplied:−Cable tray−Fitting accessories for AFD panel T ools−Cable cutter for large section wiring− C rimping tool to connect terminal lug to power wiring − D rill or knock out tool to adapt cable glands holes into compressor terminal box − 2 pipe wrench to lock cable glands−Female lugs (faston) to connect control card −Grinder to remove paint from terminal box− R over converter (RS485). Switch position = half duplex (2 wire) without echo¡S1: ON ¡S2: OFF ¡S3: OFF¡S4: OFFConnection from AFD control card (8A5-1) to Rover converter: J2-3 to terminal 2 / J2-4 to terminal 1Recommended parts listParts listMechanical installationLifting and moving instructionsFigure 6 - AFD kit lifting Trane recommends the following lifting method for theAdaptive Frequency Drive retrofi t kit:• The kit is delivered on a skid• T he minimum lifting capacity of material used must behigher than the tabulated kit shipping weight• C AUTION! Lift and handle with care. Avoid shockswhile handling.• L ifting rings are available on each drive. Use theserings to lift the AFD kit as per drawing below.Lifting weight and dimensionsExternal dimensions of the kit are:Height = 1385 mmWidth = 1137.5 mmDepth = 500 mmMechanical installation Figure 7 - AFD kit external dimensionsBOTTOM VIEWMechanical installationOil changeChange oil prior to electrical change.Compressor oil can be changed without removing the refrigerant. It is required to drain the maximum oil and replace by the new oil supplied with the kit. Respect the following steps when changing oil:Step 1: Run the unit for 30 minStep 2: Drain the oilStep 3: Measure the volume of the old oil recoveredStep 4: Fill the tank with the same volume of new oil as measured in step 3.It is authorized to have a mix of old and new oil. Tolerance limit of old oil is set at 20%.When doing an AFD retrofi t, two oil changes (drain/refi ll) are required to ensure proper oil viscosity. We recommend doing an oil analysis to check oil viscosity after each oil change and after running the unit during30 minutes.CAUTION!: Compressor longevityIn each chiller circuit, oil viscosity must be above 100 cSt at 40°C for AFD application.T emperature sensorsTwo temperature sensors are supplied within the kit. They must be mounted on the chiller and connected to the retrofi t kit control panel.Mounting instructions:−Use thermal paste−Mount sensor on thermal paste−Maintain sensor with cable tie−Cover sensor with thermal insulationRTAC, RTAD and RTWBOne temperature sensor must be mounted on each circuit discharge line. T he temperature sensor must be mounted as close as possible to the compressor as per picture below.Figure 8 - Refrigerant temperature sensor mounting on RTAC / RTAD / RTWB units RTWDOne temperature sensor must be mounted on each oil line. T he temperature sensor must be mounted as close as possible to the compressor between oil separator (or oil cooler when available) and compressor.Figure 9 - Oil temperature sensor mounting on RTWD unitsPressure transducerRTAD and RTWB unitsPressure transducers are provided and required for RTAD units only. T hey have to be mounted on the Schraedervalve of each oil separator.Refrigerantdischarge lineCompressorCompressorOil return lineElectrical installationWiring diagramThe kit wiring diagram (including wire type and location) is available in pdf and AutoCAD formats.• RTAC: 23113535• RTAD: 23113536• RTWB: 23113966• RTUB: 23113967Wiring diagrams for the chiller retrofi t are available as pdf and AutoCAD formats:• RTAC: 23113532• RTAD: 23113534• RTWB: 23113968On site connectionNew partsExisting partsFigure 10 - Installation schematics for RTAC unitsPanelStandard power wiringShielded power wiringControl wiringFigure 11 - Wiring connection for AFD kitsPower wiring10m standard power wiring and 10m shielded power wiring are supplied for each circuit within the kits:• S tandard power wiring to be installed from the main electrical panel to the AFD.• S hielded power wiring to be installed from the AFD to the compressor.Caution!: when tightening the screw terminal lug. Respect fastening torque:• K & L compressor: 11.3 Nm • M & N compressor: 27.1 NmControl wiringEMC compatibilityControl wiring and power wiring must be separated by 30cm minimum and positioned in separated cable trays.Figure 12 - Wiring installationAFD 2AFD 1To Compressor 2To Compressor 1Power supply from main control boxPower supply from main control boxControl cables to compressorControl cables to main Control boxBus wiringThe bus leaving the kit panel must be connected to the existing bus on the chiller. A “Y” connector is provided within the kit to ensure such connection.Connect temperature and pressure sensors on the auxiliary bus. T he bus cable is provided within the kit.Wiring installation instructionsIt is required to have wires follow a straight line as much as possible and being as short as possible. T he cable must be placed as close to the unit metallic frame as possible.Installing EMC cable glandShield continuityWhen using the reducer after the EMC cable gland, make sure shielding is connected to the cable gland.Figures 13 - Shielded power wiring installation into EMC cable glandSTEP 1: Remove the sheath without damaging the shield and maintain remaining sheathSTEP 2: Leave only 10 cm of shield and maintain it withtape. It will be easier to place cable gland afterwards.STEP 3: Place the cable gland. Ensure the shield is connected to the cable gland. Warning!: Do not damage the shield.Wiring installation to the AFDChiller operationThe shield must be removed and connected to cable glands prior going through the current transformer and chokes.Figure 14 -Wiring connection to AFDEarthchokesCurrent transformersShieldFigures 15 - Installing EMC cable gland to compressor terminal boxSTEP 1: Scratch paint around holes into the terminal boxSTEP 2: Install adaptive plate provided within the kit anddrill at appropriate diameter (according to cable glandsdimensions)Control card connection (RTAC and RTWD chiller only)RTACIt is required to cut the “COM” part of the control board A14-1 and A14-2 as per drawing below and as shown on wiring diagram 23113532.Figure 16 - Starter card adaptationTherefore Control card A14-1 and A14-2 must be at the end of bus daisy chain as per drawing below.Figure 17 - New bus connection into RTAC control panel Current wiring Modifi ed wiringAll connections on J3 to card A14-1 and A14-2 must be moved to another card (ie. A10) to ensure power and communication.A14-1 and A14-2 are starter cards. New cards are available into the AFD kit control panel. T he cardsavailable into the original electrical panel are no longer used.RTWDIt is required to cut the “COM” part of the control board 1A3 and 1A4 as per drawing below and as shown on wiring diagram 23113531.Therefore caxrd 1A3 and 1A4 must be placed at one endof the bus daisy chain as per drawing below.A5-3A4-3A5-2A7-2A2-1A6-3A6-2A6-1A10A14-1A14-2A4-1A4-2A7-1A8-1A8-2A8-3A9A5-3A4-3A5-2A7-2A2-1A6-3A6-2A6-1A10A14-1A14-2A4-1A4-2A7-1A8-1A8-2A8-3A9Figure 18 - New bus connection into RTWD control panelCommissioningAFD confi gurationConfi gurations are to be made using MCT10 software.Confi gurations are available on the T echnical ServiceSharepoint.BindingStarter CardBinding using T echview or Kestrelview.Additional card bindingControl binding must be made using GP2 VFD softwareavailable on T echnical Service SharePoint.Confi gurationT able 8 - Unit confi guration change using T echview orKestrelviewstarter type• D isable starter integrity test• D isable phase unbalance protection• D isable phase reversal protectioncurrent reduction • D isable phase unbalance protection• D isable phase reversal protectionDepending on the system characteristics, machine gain settings (CH530 or UCM-CLD) should be adjusted to avoid chiller system instability.New controlThe latest application is loaded from factory into the controller card (8A5-1). T he application software update is available on the T echnical Service SharePoint if required.Use GP2 VFD softwareConfi guration loadingUse GP2 VFD softwareAcoustic and vibrationOnce the chiller has been commissioned, a frequency sweep must be performed to detect any excessive vibration liable to damage the chiller. T he below guidelines must be followed to avoid any risk.Methodology• D etect vibration location: Perform a frequency sweep from 30Hz to 50Hz and examine piping (suction and discharge line) to detect any important vibration or disturbing noise issues. In case of any abnormal operation record the location and frequency where vibrations are prevalent.• V ibration measurement: T ake vibration velocity measurement, compare it to the design criteria and examine the characteristics. Identify the types of piping vibration:¡D irectly excited by the compressor’s harmonics are:• Harmonic 1 (30Hz 50Hz)• Harmonic 2 (60Hz to 100 Hz)• Harmonic 5 (150Hz to 250Hz)• harmonic 10 (300Hz to 500Hz)¡I dentify by the hammer test (FRF test) asstructural resonance of the piping¡Compare to appropriate screening criteria• E valuate potential solutions: Once the frequency is well defi ned, you can apply an AFD frequency skip. Once the cause of the resonance frequency is wellidentifi ed, you can apply a line weight on the piping to shift down the resonance frequency and to reduce the vibration level.Measurement device requirement for resonance determinationTo measure the vibrations velocity and determine if there is some level above the design criteria and examine the characteristics, the below devices should be used.• Vibration acquisition system with (FFT analyzer)¡ 4 to 8 channels measurements¡M inimum bandwidth from 0 Hz to 1000 Hz with f=1Hz¡R amp up or ramp down measurement function (no stationary measurements)¡Hit test function (FRF)¡T achometric channel for speed compressor measurement (optional)• Sensors¡A ccelerometers 3 axis or mono axis with at leasta sensibility of 10 mV/g, 50 mV/ or 100 mV/g,¡H ammer test with frequency excitation from10 Hz to 1000 Hz with 0.2 mV/N with a weight of1 kg. (Example PCB 086D05).• Unit¡V ibration velocity measurement must be in mm/s RMS¡V ibration displacement measurement must in mm peak to peakFigure 19 - Operational vibration velocity (mm/s) exampleFigure 20 - Frequency response function of the discharge line (hit test) In g/N or m/s²/N exampleMeasurement points locationBelow are point location recommendations for RTAD and RTAC units. If vibration areas are noticed in other locations, measurement levels at these locations should be performed.Figure 21 - RTAD 085 SE - points locationsFigure 22 – RTAC 200 - points locationsAccelerometer location on circuit 1Accelerometer location on circuit 2Frequency sweepBefore performing a frequency sweep it is recommended to:• C heck that the load is high (slide valve must be at full load, set point at leaving temperature not reachable)• Check that load is constant on the system• M ake a ramp down from 50 Hz to 30 Hz on a 10 minperiod.Figure 23 - Select “Set VFD inhibit timer” in the AFD toolFom the AFD operator display:−Select ‘Hand On’ key on AFD−Select ‘Main Menu’−S elect Parameter ‘342’ (Ramp 1 Ramp-down time) and set at 600 s for example−Select ‘Status’−Come back to Auto menu once trial is done. Screening criteriaTrane developed general vibration level criteria to check piping stress level. Stress level is defi ned as a maximum displacement level measurement in peak to peak.The general vibration level criteria are defi ned at 10 Mils Peak-to-Peak which is equivalent to 0.2 mm (peak to peak).Figure 24 – Screening criteria for RTAC/RTAD/RTWD If vibration levels are measured above the criteria:• S kip the frequency range where there is high vibration level• A nd/or place a line weight on the line. T his action requires additional measurement:¡H it test on the line to make sure there is no resonance frequency a few hertz lower¡O peration vibration measurement to make sure vibration criterion is respected from30 Hz to 50 Hz.Important note: T he vibration criteria are related to the risks of failure of the piping due to a resonance. T hey are not related to the noise. It is possible to respect criteria and have an important noise occurrence related to a piping resonance.Vibration displacements in general are linked to low frequency mode (<250 Hz) whereas occurrences of acoustic noise resonance are linked to higher frequency mode (>250 Hz).Skip frequency procedureThere are two methods to skip frequency (maximum2 hz):• Using MCT10 software¡Select menu ‘all parameters’¡Select sub menu ‘4-** Limits/Warning’¡Select ‘4-6 speed bypass’¡Bypass disturbing frequenciesIt is recommended to bypass frequencies instead of speed.• Set parameters in the AFD display¡Select ‘Main Menu’ button¡Select menu ‘4-** Limits/warning’¡Select ‘4-6 speed bypass’It is possible to set up to 4 frequency jumps in specifying the starting and ending frequency (in Hz) - parameters 461-0 to 461-3 (start from …) and 463-0 to 462-3 (end to …) The AFD will bypass the speed or frequency during loading or unloading phasesAdding a line weightT able 9 - Line weight to be used to solve vibration or noise issuesPart number Line diameterMAS0008E2’’5/8MAS0020E3’’1/8MAS0002E2’’1/8Typically line weight can be located as shown in fi gures25 and 26.Figure 25 – Recommended line weight location for RTACFigure 26 – Recommended line weight location for RTADChiller operation with Adaptive Frequency DriveAdding an Adaptive Frequency Drive might change the operating parameters of the chiller. Information available in the original Maintenance guide and User guide are still valid. T his document should be considered as an addendum to original unit documentation.Chiller operating mapThe chiller operating maps do not change whenoperating with Adaptive Frequency Drive. However it is recommended to select the appropriate kit according to the maximum ambient temperature at your location (Refer to T able 1).Specifi c installationNeutral connectionCAUTION!Units must not be linked to the neutralwiring of the installation. Units are compatible with the following neutral operating conditions.• The fi rst letter indicates the neutral connection type T : Direct connection to Earth I: Isolated from Earth• The second letter indicates the mass connection T : connection to earth N: connection to neutralRTAD T otal Heat Recovery and hydraulic moduleT able 11 - Additional material to be supplied by localand accessoriesTable 12 - Connection to be made on each circuitNO)A71, J5, Terminal 1D1Figure 27 - New relay connectionsRelay 2Relay 3Relay 1K22-1RTWD power meterThe power meter feature is disabled with AFD.Trane optimizes the performance of homes and buildings around the world. A business of Ingersoll Rand, the leader in creating and sustaining safe, comfortable and energy efficient environments, Trane offers a broad portfolio of advanced controls and HVAC systems, comprehensive building services and parts. F or more information visit © 2016 T rane All rights reserved SRV-SVX007B-GB_0216 Supersedes SRV-SVX007A-GB_0715We are committed to using environmentally conscious print practices that reduce waste.Ingersoll-Rand International Limited - 170/175 Lakeview Drive, Airside Business Park, Swords, Co. Dublin, Ireland。

杰森(Eaton)的合作伙伴(Power) VR-32单相步压电压调节器说明说明书

杰森(Eaton)的合作伙伴(Power) VR-32单相步压电压调节器说明说明书
– RS232 – Fiber Optic - ST – RS485 Ethernet communications interfaces: – Fiber Optic - LC, MTRJ, ST, and SC – Copper - RJ45 Communications protocols: – DNP
enclosure door)
Control
Automatic Pressure-Relief Device (not shown) Pole-Mounting Bracket (Units up to 250 kVA.) (not shown)
Ground Pad
Drain Valve and Insulating Fluid Sampling Device
MOV-Type Series Arrester Bushing Connectors
Threaded-Stud Bushing Terminals
Bushings
Internal Assembly Lifting Eyes
Upper Filter Press Connection
Regulator Lifting Lugs
CA225001EN-2 /cooperpowerseries
Single-phase step voltage regulators
Catalog Data CA225001EN
Effective February 2015
Standard features
A sealed-tank construction allows the use of 65 °C rise insulation system in 55 °C rise rated designs to provide an additional 12% capacity above the nameplate rating without loss of normal insulation life. Additional load capacity is stated on the nameplate, this ADD-AMP™ feature is available as long as the tap-changer’s maximum current rating is not exceeded. The unit construction cover suspends the internal assembly consisting of the core-and-coil assembly, tap-changer, and the reactor for ease of inspection and maintenance. All Eaton's Cooper Power series voltage regulators are manufactured and tested to the IEEE Std C57.15™-2009 standard. CL-7 control Tap changer with motor and power supply Position indicator with ADD-AMP adjustment Two laser-etched nameplates Lifting lugs Oil drain valve and sampling device Upper filter press connection Oil sight gauge Mounting provisions for shunt arresters High-creep bushings with clamp-type connectors Bolt-down provisions (overhead units) Pole-type mounting brackets (overhead units) Substation base (substation units) External series arrester Automatic pressure relief device Handhole Control cabinet with removable front panel Ratio correction transformer Conformally coated circuit boards

国际商务英文-吉利收购沃尔沃

国际商务英文-吉利收购沃尔沃

国际商务英⽂-吉利收购沃尔沃Exam Questions (50% each)1)Gili, a Chinese car maker, is spending a very large amount of money buying another foreign car producer. According to the theories in this course, do you think this is a good deal?Take Chinese Geely close to Volvo acquisition for example, I don't believe it's in the best interest for Chinese carmakers.Chinese carmaker Geely is said to be in the final spurt to acquire Sweden -based Volvo Cars from Ford-but analysts are already criticizing the deal.1.Mergers and acquisitions (abbreviated M&A) is an aspect of corporate strategy, corporate finance and management dealing with the buying, selling, dividing and combining of different companies and similar entities that can help an enterprise grow rapidly in its sector or location of origin, or a new field or new location, without creating a subsidiary, other child entity or using a joint venture. The distinction between a "merger" and an "acquisition" has become increasingly blurred in various respects (particularly in terms of the ultimate economic outcome), although it has not completely disappeared in all situations.Firstly, the acquisition extend the transaction cost.In economics and related disciplines, a transaction cost is a cost incurred in making an economics exchange or the cost of participating in a market.A number of kinds of transaction cost have come to be known by particular names:Search and information costs are costs such as those incurred in determining that the required good is available on the market, which has the lowest price, etc. For ?Bargaining costs are the costs required to come to an acceptable agreement with the other party to the transaction, drawing up an appropriate contract and so on. In game theory this is analyzed for instance in the game of chicken. On asset markets and in market microstructure, the transaction cost is some function of the distance between the bid and ask.Policing and enforcement costs are the costs of making sure the other party sticks to the terms of the contract, and taking appropriate action if this turns out not to be the case.2.Asset specificity is a term related to the inter-party relationships of a transaction. It is usually defined as the extent to which the investments made to support a particular transaction have a higher value to that transaction than they would have if they were redeployed for any other purpose. Asset specificity has been extensively studied in a variety of management and economics areas such as marketing, accounting, organizational behavior and management information systems.MultidimensionalityScholars have acknowledged the multidimensional property of asset specificity. For example, Williamson (1983) identified four dimensions of asset specificity:Site specificity, e.g. a natural resource available at a certain location and movable only at great cost;Physical asset specificity, e.g. a specialized machine tool or complex computer system designed for a single purpose;Human asset specificity, i.e., highly specialized human skills, arising in a learning by doing fashion; andDedicated assets, i.e. a discrete investment in a plant that cannot readily be put to work for other purposes.Malone et al. (1987) made an important addition to the above list:Time specificity, an asset is time specific if its value is highly dependent on its reaching the user within a specified, relatively limited period of time.Joskow (1988) pointed out that these different categories point to essentially the same phenomenon, but that it is instructive in empirical analyses to treat each category distinctly. Joskow's series of papers have looked at contract structuring in order to examine how contracts mitigate transaction costs inherent in a market based relationship Zaheer and Venkatraman (1994) acknowledge four asset specificity dimensions: site, human, physical, and dedicated assets. In addition, they define two dimensions of asset specificity in their study: human asset specificity and the newly-developed "procedural asset specificity", whereHuman asset specificity deals with the degree to which skills, knowledge and experience of the agency's personnel are specific to the business process.Procedural asset specificity incorporates notions of human asset specificity and refers to the degree that an agency's workflows and processes are customized toexploit the other party's capabilities.Most theoretical work focus on the relationships between asset specificity and sunk cost effects, transaction costs, vertical integration, and uncertainties./doc/85725bdc6f1aff00bed51e62.html pare with outsourcingOutsourcing is the process of contracting an existing business process which an organization previously performed internally to an independent organization, where the process is purchased as a service. Though this practice of purchasing a business function - instead of providing it internally - is a common feature of any modern economy, the term outsourcing became popular in America near the turn of the 21st century. An outsourcing deal may also involve transfer of the employees involved to the outsourcing business partner.Although the definition of outsourcing includes both foreign or domestic contracting, the term is sometimes used exclusively referring to the former. The more clear term for this is offshoring, which is described as “a company taking a function out of their business and relocating it to another country,” whether the external country is physically offshore or not.The opposite of outsourcing is called insourcing, and is sometimes accomplished via vertical integration.The most common reasons why companies decide to outsource include cost reduction and cost savings, the ability to focus its core business, access to more knowledge, talent and experience, and increased profits.Many companies decide to outsource because it cut costs such as labor costs, regulatory costs, and training costs. Foreign countries tend to have workers who will complete thesame amount of work as in the United States, but for less than half the salary that an American employee will make . This motivates companies to outsource overseas to find foreign workers who are willing to work for these lower wages. The company can spend up to half the usual cost to train these workers to become experts in a different country . Lower regulatory costs are an addition to companies saving money when outsourcing. Comparing the costs to employing a worker in the United States to a worker in China, it is noticed that an employer in the U.S. has to pay higher taxes (social security, Medicare, safety protection (OSHA regulations) and also FICA (taxes)).Companies are able to focus their money and resources more towards improving the core aspects of its business when outsourced. For example an insurance company may outsource its landscaping functions to a service provider that specializes in landscaping since it is irrelevant to the core operations of insurance. The landscaping is performed by an expert outsourced organization and the insurance company can focus on doing what it specializes in. This allows the outsourcing company to build onto its core functions that keep the business running smoothly. Another example is that companies and public entities such as a public school district that outsources functions, such as their payroll offices to companies like ADP or Ceridian, which specialize in payroll functions.In the case of outsourcing, firms may find that workers in other countries can provide better customer support than their domestic counterparts. For example, an online coffee shop owner who moved his calling center to the Philippines found that his customers received better customer support from workers in this country.Revenue and profit plays a large role in the reason for a company outsourcing. Since the costs are cheaper in different countries for a corporation to run it, as well as to train the employees, this saves the company a large sum of money. More profit comes in when the vendors are able to purchase products at a less expensive rate and continue to sell them at a reasonable price for consumers. The prices are reduced for services as well as products when purchased at a cheaper price.RisksWhen companies offshore services, even though it may not be the core parts of the business, those jobs leave the home country for foreign countries. . Outsourcing may increase the risk of leakage, reduce confidentiality, as well as introduce additional privacy and security concerns.AdvantagesCompanies are able to provide services and products to consumers at a cheaper price while still having a large margin for profit. This profit margin benefits both the company as well as the consumer. The cheaper prices lead to an increase a company’s economy. Although losing jobs hurts the economy because more citizens become unemployed, the cheaper prices allows customers to purchase more products and services which helps to rebuild an economy[2)As CEO of large Chinese firm, you are developing a strategy to establish branches in all major oversea markets. Now theissue is how to select an appropriate cultural management orientation for your international ventures. Please show us how you will make the selection by providing a detailed discussion with consideration of all the significant factors.Culture management orientation can be defined as the general philosophy or approach taken by top management of the MNC in the design of its overall international management strategy, including those to be adopted in all overseas affiliates. There are three CM orientations, adaptive, exportive, and integrative ones.1.Adaptive CM orientation is one in which top management tries to create management systems for affiliates that reflect the local environment (low internal consistency with therest of the firm and high external consistency with the local environment). With this orientation, there is almost no transfer of management philosophy,polices or practices either from the parent firm to its overseas affiliates or between overseas affiliates.2.Exportive CM orientation is one in which top management prefers a wholesales transfer of the parent firm's management system to its overseas affiliates(high internal consistency and low external consistency ), replicating in its overseas affiliates the management policies and practices used by the MNCs in its home country.3.Integrative CM orientation is one in which top management takes "the best "of the above orientations and use them throughout the organization in the creation of the worldwide system (high internal consistency and moderate external consistency). It represents a global integration with an allowance for some local differentiation and transfer of good management knowledge from other affiliates.1.Ethnocentric: A national philosophy of management whereby the values and interests of the parent company guide strategic decisions.2.Polycentric: A philosophy of management whereby strategic decisions are tailored to suit the cultures of host countries.3.Regiocentric: A philosophy of management whereby the company tries to blend its own interests with those of its subsidiaries on a regional basis.4.Geocentric: A philosophy of management whereby the company tries to integrate a global systems approach to decision making.5.Parochialism: The tendency to view the world through one's eyes and perspective.6.Simplification: The process of exhibiting the same orientation toward different cultural groups.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Adaptive Server Selection for Large Scale InteractiveOnline GamesKang-Won Lee IBM T.J.Watson Research Hawthorne,NY kangwon@Bong-Jun KoColumbia UniversityNew Y ork,NYkobj@Seraphin CaloIBM T.J.Watson ResearchHawthorne,NYscalo@ABSTRACTIn this paper,we present a novel distributed algorithm that dynamically selects game servers for a group of game clients participating in large scale interactive online games.The goal of server selection is to minimize server resource usage while satisfying the real-time delay constraint.We developa synchronization delay model for interactive games and formulate the server selection problem,and prove that the considered problem is NP-hard.The proposed algorithm, called zoom-in-zoom-out,is adaptive to session dynamics (e.g.clients join and leave)and lets the clients select appro-priate servers in a distributed manner such that the numberof servers used by the game session is ing simulation,we present the performance of the proposed al-gorithm and show that it is simple yet effective in achieving its design goal.In particular,we show that the performanceof our algorithm is comparable to that of a greedy selection algorithm,which requires global information and excessive computation.Categories and Subject DescriptorsC.2.1[Network Architecture and Design]:Network communications;C.2.4[Distributed Systems]:Client/server General TermsAlgorithms,Performance,DesignKeywordsMMOG,Server selection,Distributed algorithm,Synchro-nization delay model1.INTRODUCTIONLarge scale interactive online games,such as Massively Multi-player Online Games(MMOG),aim to support a very large number of clients.In practice,MMOG providers often are required to support tens of thousands of geographically Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on thefirst page.To copy otherwise,to republish,to post on servers or to redistribute to lists,requires prior specific permission and/or a fee.NOSSDAV’04,June16–18,2004,Cork,Ireland.Copyright2004ACM1-58113-801-6/04/0006...$5.00.distributed users simultaneously.In this respect,MMOG providers have so far focused on developing a highly scal-able game server architecture and supporting network in-frastructure that spans wide geographical regions while sat-isfying loose real time requirements[5,16].Recently,how-ever,MMOGs are beginning to incorporate more interactive features and action sequences to attract users[12];thus it becomes increasingly important to provision enough server resources to support real-time interaction between users. There are several challenges in augmenting MMOGs with such interactive features.First,unlike in online First-Person-Shooting(FPS)-type games where a small number of nearby users are assigned to the same game session,MMOG games must maintain a persistent virtual world view for a large number of game players that are distributed over the net-work.Second,the maintenance of a long-lived persistent world mandates a server-based game architecture,where clients interact with a central server that keeps track of the game states.However,this conventional server-client archi-tecture does not scale well as the number of clients increases. To overcome this limitation,a mirrored server architecture has been proposed[7,2,10],where a set of distributed game servers are orchestrated to support a large number of dis-tributed clients.In this architecture,the game servers are typically interconnected via well provisioned network links, and each game client is directed to connect to the closest game server.In parallel with this architectural develop-ment,proposals have been made to dynamically provision game servers on thefly exploiting emerging Grid technolo-gies[14,5].According to these on-demand game architec-tures,game servers can be provisioned to accommodate the capacity requirements as the user demand changes.Thus it now becomes an important issue to dynamically provision and utilize server resources in an efficient manner.In this paper,we present a novel distributed algorithm that selects game servers for a group of game clients partic-ipating in large scale interactive online games.The goal of the server selection algorithm is to select the minimum num-ber of servers while satisfying the real-time delay constraint of the game session.To this end,we develop a synchroniza-tion delay model for interactive games,formulate the server selection problem,and prove thatfinding an optimal solu-tion to the considered problem is NP-hard.The proposed algorithm,called zoom-in-zoom-out,is adaptive to session dynamics(e.g.clients join and leave)and lets the clients select appropriate servers in a distributed manner such that the number of servers used by the game session is minimized. Using simulation,we present the performance of the pro-posed algorithm with various zoom-in-zoom-out techniques and show that it is simple yet effective in achieving its de-sign goal.In particular,we show that the performance of our algorithm is comparable to that of a greedy selection algorithm,which requires global information and excessive computation.The remainder of this paper is organized as follows.Sec-tion2presents synchronization delay model and problem formulation.Section3presents the proposed server selection algorithm.Section4presents the performance of the pro-posed algorithm in comparison with more expensive greedy algorithm.Section5presents an overview of related work, andfinally Section6concludes the paper.2.PROBLEM FORMULATION2.1System modelIn our model,a server refers to an entity that calculates and simulates the game states based on the players’actions, and a client refers to an entity that renders and presents the game states to the player.We assume that a virtual persistent world of the game is divided into multiple regions, where there are relatively few game players(compared to the number of users in the entire game world)in each region interact with one another in a direct manner.We call the persistent state of a region as the sessions.For simplicity,we assume a mirrored-server architecture, where multiple game servers are interconnected via well pro-visioned links.In this architecture,each client is assigned to one of the servers,called the contact server,which is re-sponsible for forwarding the client’s action data to all the other servers participating in the same game session.This effectively defines a one-to-one mapping from a client to a server.We call this mapping an allocation.Upon receiving all clients’actions that belong to the same time slot,each game server independently calculates a new game state and sends the updated state to the directly connected clients. For accurate game simulation and presentation,game eve-nts generated by the players must be ordered according to a global clock.In many practical game systems,however, time is divided into discrete slots and events that have been generated during the same time slot are considered to have happened simultaneously[8,9].We define the synchroniza-tion delay between a client and a server as the time differ-ence between the instance that the client sends its players’actions and the instance that the client renders a new game state in response to the actions sent to the server.This syn-chronization delay depends on the network latency from the client to the server(upstream latency),processing time at the server,and the network latency from the server to the client(downstream latency).To synchronize game play and interaction amongst all players participating in the same session,the game system must take into account synchronization delays between all clients in the session and the corresponding servers.More specifically,a game server must calculate a new game state after action data from the farthest client have arrived.Oth-erwise,the action from the farthest client will not be syn-chronized with others.Similarly,at the client side,a new game state should not be presented to the players until the same game state is delivered to the farthest client from the server.Otherwise,the game simulation becomes unfair to the farthest clients[3].2.2Delay model and problem statementLet C denote a set of game clients that participate in the game session and let S denote a set of available game servers. Servers in S form an undirected connected graph,called the server network.Let d s(j,k)denote the shortest distance(or latency)between servers s j and s k,and let d c(i,j)denote the distance between a client c i and a server s j.Suppose client c i is mapped to server s j in some allocation A.Then we say server s j serves client c i under A.We define C j⊂C as the set of clients that are directly connected to the server s j,i.e.,C j={c i∈C|s j serves c i}.We also define the session server set,S(A)under the allocation A as the set of servers that serve at least one client in C,i.e.,S(A)={s j∈S|C j=φ}.Let D u(i,k)be the upstream distance between a client c i and a server s k.We note that D u(i,k)is defined not only for a client and a server that are directly connected,but also for a client and a server connected indirectly via some other servers forwarding the client c i’s actions to server s k through the shortest path in the server graph,i.e.,D u(i,k)=d c(i,j)+ d s(j,k),where s j is the contact server for c i.On the other hand,the downstream distance from s j to a client c i∈C j is just d c(i,j)as c i receives game states from its contact server s j.We now consider the overall synchronization delay for a session.As previously discussed,for a server to simulate game state in a fair manner it must wait until all the action data from all the clients in the session to arrive.In other words,a server s j must wait for max i∈C D u(i,j)before game simulation.Then it processes the action data and sends out updates to all the clients it serves.This game state update takes up to max i∈Cjd c(i,j)for the farthest client. Since this condition must hold for all servers,the overall session synchronization delay D s(A)under allocation A can be written as:D s(A)=maxj∈S(A){maxi∈CD u(i,j)+maxi∈C jd c(i,j)}Based on this session synchronization model,we now for-mulate our problem.Our goal in this paper is to minimize the number of servers allocated to a session,while satisfying a given synchronization delay requirement.Formally stated, given a network topology consisting of a set of servers S and a set of clients C,and a real-time delay requirement∆,find a server allocation A min that minimizes|S(A)|subject to D s(A)≤∆and|S(A)|≥1.This problem is NP-hard as it generalizes the set-covering problem[6].Theorem 1.The considered server allocation problem is NP-hard.Proof.Consider,in our model,the case when the dis-tance between every pair of servers is zero.Then the opti-mization goal in this specific case would be to minimize the number of servers subject to the condition that every client is within distance∆/2from the server,to which it is allo-cated,where∆is the sync-delay bound in our model.This is exactly a set-covering problem,in which a set is defined by the set of clients that are within the distance∆/2from each server.Since our problem generalizes the NP-hard set-covering problem,it is also NP-hard.(a)Thetopology(b)Allocation A1(c)Allocation A2(d)Allocation A3Figure1:Examples of game server allocation3.SERVER SELECTION ALGORITHM3.1Impact of Server AllocationIn this section,wefirst analyze the impact of server al-location using an example.Figure1illustrates a simpleexample with3servers,s1,s2,and s3,and2clients,c1andc2.Figure1(a)shows a network configuration,where thesolid lines represent the latency between the servers in theserver network,and the dashed lines represent the latencybetween each server-client pair.Figures1(b)–1(d)show three different server allocations,A1,A2,and A3,where allocated session servers are markedin gray.According to the session delay model,the overall de-lay for allocation A1is10with both maximum upstream anddownstream delays being5(between c2and s1).Allocatings2instead of s1as the session server(allocation A2)re-duces the synchronization delay to6(upstream/downstream3each).Note that,though the end-to-end distance betweenthe clients are the same in A1and A2,the synchronizationdelay is reduced by placing the server at the center of thenetwork.Finally,if we allocate two servers at the edges ofthe server network as in allocation A3,the synchronizationdelay decreases to4with the upstream latency3(e.g.,alongthe path c1-s1-s2-s3)and the downstream latency reducedto1.In this case,the reduction comes from placing theservers near the clients at the expense of using two servers.From this example,we can draw the following intuition todesign our server selection algorithm:•If we had to choose only one server to minimize theoverall synchronization delay,then it would be opti-mal to select a server that minimizes the maximumdistance(not the average)to all clients.In graph the-ory,such a node is called the center of a network.Inthis paper,we call it a core server.•If it is faster to forward packets via the contact serverover the server network than to send packets to a re-mote server directly,allocating servers near the“edge”of the server network(and close to the clients)reducesthe overall synchronization delay.However,this comesat the expense of increasing the number of servers inthe session.Based on these observations,we design a distributed serverselection algorithm as follows.3.2Server Selection AlgorithmGiven a set of clients C,a set of servers S,and delayrequirement∆,do the following:•STEP1:Initially allocate each client c i∈C to theclosest server in S.Denote this initial contact serverof c i by s0(c i).This produces an initial allocationA.We assume that the session has been provisionedto satisfy the delay requirement∆,i.e.,D s(A)≤∆.Otherwise,note the violation,and call for a high levelsession regrouping.•STEP2:Find the core server,s∗∈S,of the sessionthat minimizes the maximum distance to the clients.Finding the core of a network in a distributed sys-tem has many interesting applications(e.g.core-basedmulticast tree construction),and thus has been stud-ied in various contexts.In this paper we employ atournament-based method studied in[17].•STEP3(Zoom-In):For each client c i,do the fol-lowing.Let s k(c i)be the current contact server of c i.Also,among the servers that are further from c i thans k(c i)but are closer to s∗,find the closest server toc i,and denote it by s k+1(c i).Then probe s k+1(c i)tosee whether the session synchronization delay wouldstill be within the bound∆if the client migrated tos k+1(c i).If yes,s k+1(c i)is the new contact server forc i.Repeat this step for all clients until no client canmigrate to a server that is closer to s∗.•STEP4(Zoom-Out):For each client c i,do the fol-lowing.Let s k(c i)be the current contact server ofc i,and S be the current set of contact servers forall clients.Then among the servers in S that arecloser to c i than s k(c i),find the farthest server fromc i,and denote it by s k+1(c i).Then probe s k+1(c i)tosee whether the session synchronization delay wouldstill be within the bound∆if the client migrated tos k+1(c i).If yes,s k+1(c i)is the new contact server forc i.Repeat this step for all clients until no client canmigrate to a server that is farther from s∗.The procedure in STEP3has the effect of moving a clus-ter of the session servers toward the core server.With thiszoom-in procedure,the overall synchronization delay tendsto increase.When this step cannot proceed without increas-ing the synchronization delay beyond the real-time delay,this zoom-in process terminates.By performing the proce-dure in STEP4,we seek to further reduce the number ofsession servers.This is possible because after the zoom-inprocedure,servers near the core server are most likely tohave been selected.However,some of them can be removedwithout affecting the overall synchronization delay.The computation overhead incurred at each client is nottoo severe.The step1requires the communication overheadof O(|S|)for each client for exact computation.In mostpractical situations,however,it will be O(k)where k |S|is the number of servers in the client’s region.The step2(a)Initial allocation(b)Zoom-In(c)Zoom-Out(d)Final allocationFigure2:ZIZO algorithmrequires a total of log2|S|tournaments for the entire session.The step3requires either O(1)or O(k)depending on thetype of the zoom-in algorithm(see Section3.3).The step4requires O(m)where m |S|is the number of sessionservers.Figure2illustrates the above procedure through an exam-ple.In Figure2(a),each of5clients,c0,···,c4is initiallyallocated to the closest server.In this allocation,we have5servers participating in a game session by the clients.Now,in Figure2(b),each client incrementally probes servers thatare closer to the core server,for example,client c2migratestwice toward the core server as long as the delay bound issatisfied.As a result of the zoom-in procedure,three serversnear the core server are selected.Now,clients further seekto reduce the number of session servers by moving out fromthe core server.For example,in Figure2(c),two clients,c1and c2,were able to migrate to the session servers closerthan the core server,with s∗no longer being allocated toany client.Thefinal server allocation is shown in Figure2(d),with only two servers being selected by the procedure.3.3Implementing the Selection AlgorithmThere are several issues when one tries to implement theabove mentioned server selection algorithm.This subsectionbriefly discusses them.Thefirst issue concerns game session migration.Althougha game architecture based on on-demand technologies en-ables our dynamic server selection,migrating a game sessionfrom one server to another is a relatively expensive proce-dure.As a result,probing a new server and trying to migratethe game session in each zoom-in and zoom-out step by aclient is not a good idea.We address this issue by handlingthe probing and zoom-in zoom-out steps in the control andmanagement plane,not in the actual game session plane.Tosupport this operation,a server that has been probed by aclient runs a simulation on synchronization delay computa-tion and maintains a virtual state.The clients keep probingthe next possible server following the server selection algo-rithm until they reach a steady state.Only when the entirezoom-in and zoom-out process terminates,do the clients co-ordinate and move the game session to the newly allocatedservers.In this way,we can minimize the management andsession migration cost.Secondly,the performance of the“zoom-in”and“zoom-out”procedures in our proposed algorithm relies on the ef-fectiveness of the server search algorithm.We consider twotypes of search methods.Thefirst method is a full searchof all servers in S.This may be costly if S is large,butwill provide the most accurate result.The second method isan approximation based on a hypothesis that when a clientselects the next server,it will be most likely on the short-est path from the client to the core server.For the secondmethod,once we discover a core server s∗,wefirst constructa shortest-path tree spanning all the servers in S(A)with s∗being the root.This tree may include a non-session serverbut all the leaf nodes are session servers.We migrate theclients along this tree when they zoom-in or zoom-out.Moreprecisely,when zooming in,each client probes the parent ofthe current contact server in the tree.Similarly,when zoom-ing out,a client probes the server that is closest to the clientamong the children of the current contact server.Finally,we consider two different types of client migrationstrategies for the zoom-in and zoom-out process.In a naiveimplementation,each client may individually probes candi-date servers and make a decision on migration.In this case,it is possible that,while some clients connected to a servercould change their contact server,others may fail to mi-grate because it would violate the overall delay constraints.Therefore this uncoordinated migration of clients may resultin a suboptimal result by temporarily increasing the numberof servers allocated to the session.An alternative approachwe consider in this paper is to coordinate the migration ofall clients on the same server simultaneously,and move themonly when all the clients can migrate to new servers.In thenext section,we present the effectiveness of the considereddesign alternatives using a simulation-based study.4.PERFORMANCE EV ALUATIONIn this section,we evaluate the performance of the pro-posed algorithm through simulations.For simulation,we usea two-level,Internet-like topology generated by the BRITEtopology generator[4].Out of5,000nodes(50AS×100nodes per AS)generated by BRITE,we randomly select atotal of100servers and50clients to participate in the samegame session.Note that we have selected a relatively smallnumber of clients(with respect to that of the servers)in thesimulation since our goal is to evaluate the performance ofthe algorithm for a“single”session.In the aggregate,therewill be many such sessions and the total number of clientswill be much larger than that of servers.We measure theperformance results by repeating each simulation100times.To emulate the well-provisioned server network with littlecongestion,the inter-server latency is set to be smaller thanthe client-to-server latency.In particular,we show the casewhen the latency between two servers is reduced to25%ofthe latency in underlying topology given by the topologygenerator,while ourfindings hold regardless of the particu-lar reduction factor.For evaluation,we first compare the performance of the proposed algorithm to a centralized algorithm that performs the server selection in a greedy manner.To briefly describe the idea,the greedy algorithm tries to add a new server to a session server set by exhaustively searching for a server that,when added,results in the minimum increase in the synchronization delay.When a new server is added,each client calculates the delay to the new server and connects to it if it gives lower synchronization delay.In this way,the synchronization delay is guaranteed to decrease mono-tonically as the number of servers increases.This greedy algorithm is similar to the one presented in [13]in the con-text of the Web server replica placement problem,which has been shown to perform closely to the optimal solution.Note that this greedy algorithm is not only impractical to be applied in a distributed networking environment,but also is computationally expensive because it must evaluate the new synchronization delay for each of the servers that have not yet been added to the session server set.In the results shown in this section,we use some abbre-viated indices to indicate different ways of migrating the clients as explained in Section 3.3:-Tr (migrate clients along a tree)and -Sr (migrate clients by “search”)distinguish two different ways of selecting the next server to migrate to,and -C (migrate each client individually)and -S (migrate all clients in a coordinated manner)represent two different ways in moving clients from one server to another.05101520253025303540455055# s e r v e r s s e l e c t e ddelay bound (msec)(a)server capacity unlimited0510********303540455055# s e r v e r s s e l e c t e ddelay bound (msec)ZIZO-Tr-C ZIZO-Tr-S ZIZO-Sr-C ZIZO-Sr-S(b)server capacity limitedFigure 3:The number of servers allocated as a func-tion of delay boundFigure 3depicts the number of servers allocated by the proposed algorithms and the greedy algorithm.We vary the sync delay bound ∆along the x -axis.Figure 3(a)shows the results when the servers’capacity is unbounded,i.e.,each server can serve an arbitrary number of clients,and Figure3(b)is when each server’s capacity is bounded by 10clients.1From Figure 3(a)we find that the performance of our pro-posed algorithm is comparable to that of the greedy algo-rithm.We also note that if the delay bound is sufficiently large,the optimal number of servers for the unbounded case is 1,and the optimal number of servers for the bounded case is 5.We observe that both ZIZO (zoom-in-zoom-out)-Sr-C and ZIZO-Sr-S find this solution as the delay bound increases.On the contrary,ZIZO-Tr-C and ZIZO-Tr-S are slow in convergence in the unbounded case,and fail to reach the optimal point in the bounded case.From this result,we find that the performance of the proposed algorithm is sen-sitive to the server search mechanism.More specifically,we conclude that the full search algorithm provides much better performance than the tree-based search does.On the other hand,we observe that the coordination in client migra-tion offers little benefit.This observation implies that each client can independently make a greedy decision regarding its server selection,and they can still achieve as good allo-cation of the server resources as the case with explicit client coordination.246810121416253035404550556065# m i g r a t i o n p e r c l i e n tsync-delay boundZIZO-Tr-C ZIZO-Tr-S ZIZO-Sr-C ZIZO-Sr-SFigure 4:The number of server migrations per client Figure 4plots the average number of migrations for a client until it converges.Recall that these migrations do not happen in the data session domain but in the control domain.Therefore this graph indicates the computation overhead and message exchange overhead of each algorithm rather than the actual session migration overhead.With no surprise,the tree-based search scheme results in less migra-tions than the full search case.However,the non-tree search case does not require an excessive number of migrations,ei-ther,increasing the number of migrations by only a small constant factor.In particular,the uncoordinated client mi-gration (ZIZO-Sr-C)seems to strike a good balance between performance and complexity.Finally we evaluate the adaptivity of the proposed algo-rithm by considering the case when the clients incrementally join the gaming network.Whenever a client joins the net-work,we perform the server selection algorithm on top of the current allocation obtained when the last client joined.Figure 5presents the result when finally all 50clients have pared to Figure 3(a)when all the clients are given initially,we observe that the “on-line”performance of our algorithm is similar to the “off-line”case.This is par-ticularly true for the non-tree search case (ZIZO-Sr-C and 1We do not compare the results of the case of bounded server capacity to the greedy method since the greedy algorithm cannot be properly applied to such cases.0510********303540455055# s e r v e r s s e l e c t e ddelay bound (msec)ZIZO-Tr-C ZIZO-Tr-S ZIZO-Sr-C ZIZO-Sr-SFigure 5:The number of servers allocated after the clients incrementally joinZIZO-Sr-S).Thus we conclude that the proposed algorithm is adaptive to the session dynamics.5.RELATED WORKIn the context of real-time group communication,our prob-lem shares some similarity with the delay-constrained mul-ticast tree construction problem [11,15].The goal of the delay-constrained multicast tree construction problem is to construct a lowest-cost multicast tree with an additional constraint of an upper bound on the end-to-end delay.Our work differs in that the delay present in server-client gam-ing networks is not the end-to-end delay but the nonlinear combination of client-to-server and server-to-server delay as given in our delay model.Our work expands the dual of the minimum K-center problem [1],in which the number of servers is to be min-imized when the maximum distance between clients and the nearest server is given,into a case where the inter-server delay must be taken into account as well.The (log (N )+1)-approximation bound is known for this problem,and we are currently investigating the possibility of finding a formal ap-proximation bound for our problem.Saha et al.[14]have proposed an on-line games hosting platform by developing middleware based on existing grid components.The proposed gaming architecture supports various aspects of game service provisioning and manage-ment including account management,game software update and distribution,and server resource provisioning.In the commercial world,Butterfl [5]is implementing the idea of building a scalable gaming infrastructure based on grid computing technology.However,both these works focus on architectural issues,leaving such issues as server allocation unaddressed.6.CONCLUSIONIn this paper,we presented a novel distributed algorithm that dynamically selects game servers for a group of game clients participating in large scale interactive online games.The goal of server selection is to minimize server resource us-age while satisfying the real-time delay constraint.The pro-posed algorithm,called zoom-in-zoom-out ,is adaptive to ses-sion dynamics and lets the clients select appropriate servers in a distributed manner such that the number of servers used by the game session is significantly reduced compared to when clients select the closest servers.We have consid-ered various zoom-in techniques that the clients can imple-ing simulation,we have shown that the full search mechanism during the zoom-in procedure results in better performance than the tree-based alternative.We have also shown that clients can perform this zoom-in procedure with-out explicit coordination and still can achieve good results.Overall our algorithm has been shown to perform compa-rable to a greedy selection algorithm,which requires global state information and excessive amount of computation.7.REFERENCES[1]J.Bar-Ilan and D.Peleg.Approximation algorithmsfor selecting network centers.In Proc.2nd Workshop on Algorithms and Data Structures,Lecture Notes in Comput.Sci.519,pages 343–354,1991.[2]D.Bauer,S.Rooney,and workinfrastructure for massively distributed games.In NetGames’02,April 2002.[3]P.Bettner and M.Terrano.1500archers on a 28.8:Network programming in age of empires and beyond.In Game Developers Conference 2001.[4]BRITE./brite/.[5]Butterfl./.[6]T.H.Cormen,C.E.Leiserson,R.L.Rivest,andC.Stein.Introduction to Algorithms .MIT Press,second edition,2001.[7]E.Cronin,B.Filstrup,and A.Kurc.A distributedmultiplayer game server system,technical report,Univ.of michigan.Technical report,May 2001.[8]C.Diot and L.Gautier.A distributed architecture formultiplayer interactive applications on the internet,IEEE networks magazine,vol.13,no.4,July/August 1999.[9]Y.-J.Lin and S.P.Katherine Guo.Sync-MS:Synchronized messaging service for real-timemulti-player distributed games.In Proceedings of 10th IEEE International Conference on Network Protocols (ICNP 2002),November 2002.[10]M.Mauve,S.Fischer,and J.Widmer.A genericproxy system for networked computer games.In NetGames’02,April 2002.[11]M.Parsa,Q.Zhu,and J.J.Garcia-Luna-Aceves.Aniterative algorithm for delay-constrainedminimum-cost multicasting.IEEE/ACM Transactions on Networking ,6(4),August 1998.[12]PlanetSide./.[13]L.Qiu,V.Padmanabham,and G.Voelker.On theplacement of web server replicas.In Proc.20th IEEE INFOCOM 2001,August 2001.[14]D.Saha,S.Sahu,and A.Shaikh.A service platformfor online games.In NetGames’03,May 2003.[15]H.F.Salama,D.S.Reeves,and Y.Viniotis.AnEfficient Delay-Constrained Minimum Spanning Tree Heuristic,Technical Report TR-96/46,North Carolina State University.Technical report,1996.[16]Terazona./.[17]D.G.Thaler and C.V.Ravishankar.Distributedcenter-location algorithms.IEEE Transactions on Selected Areas in Communications,vol.15,issue 3,April 1997.。

相关文档
最新文档