A Study of Packet Delivery Performance during Routing Convergence
bec中级第三辑真题详解test4
Test4Part one四个专家分别对一个度假公司的发展给出了自己的意见。
怎么锁定目标客户,怎么定价,怎么打折,都是一门学问。
题目信息稍微有些隐晦。
话说这个BEC阅读的第一部分,普遍难度不是很大,可个别题目一旦含蓄起来,也是很难在文章中找到答案的影子的。
第一题,通过将同样的假日出售给不同收入层次的客户是有风险的。
这题的答案够隐晦的,而且不是特别的对应。
答案是B段开头的一段话。
说该不该将多余的假期打折,是一个有争议的点。
这样会导致一些注重预算的人被放在了SunTours’的一些更富裕的客户旁边,从而将品牌给毁了。
注重预算的(budget-conscious)和更富裕的(more affluent customers)是两种不同的收入人群,也就是different income brackets,damaging the brand,毁坏了品牌,言下之意,这么做是有风险的,即runs a risk。
第二题,说值得提供打折假期来增加预定的数量。
答案是A段的这么一句:Towards the end of the season, reducing the cost of holidays would attract last-minute customers, thus avoiding any possible loss on unfilled accommodation and flights。
减少假日的开销可以吸引最后的客户,从而避免空余的住宿和飞行带来的损失。
Unfilled accommodation,没有被预定的住宿,对应于题目中的booking。
第三题,如果想要增加回头客,SunTours需要反思它的市场策略。
答案在D段,需要提炼:the company should consider that brochure mailings。
They encourage summer tourists to take another break and can even be used to send a thank-you letter to returning customers.先说公司应该考虑邮寄宣传册,接着说他们可以鼓励暑假的游客去休另一个假期甚至可以用来给回头客发送感谢信。
E-车载自组网(VANET)讲解学习
10
③ C2C-CC,“ Car2Car Communication Consortium ”是由6家欧洲汽车制造商(BMW、 DaimlerChrysler、Volkswagen等)组成,目标是为 car2car 通信系统建立一个公开的欧洲标准,不同制 造商的汽车能够相互通信。Car2Car通信系统是采用 基于无线局域网 WLAN技术,确保在欧洲范围内车间 通信的正常运行。
Vehicles can find their neighbors through periodic beacon messages, which also enclose the physical location of the sender.
Vehicles are assumed to be equipped with pre-load digital maps, which provide street-level map and traffic statistics (such as traffic density and vehicle speed on roads at different times of the day)
5
6
专用短距离通信技术—DSRC,是专门为车载 通信开发的技术
7
无线链路质量评估及预测方法综述PPT学习教案
其准确性在很大程度上取决于模型参 数设置 ,并且 很难根 据动态 变化的 网络环 境进行 自适应 调整; 异构网络联合资源调度逐渐从用户级 别向数 据包级 别深化 。
基于模式匹配的链路质量预测机制XCoPred (usin g Cross-Correlation to Predict)
➢
提出:Ka.Farkas——“Link quality prediction in mesh networks”一文中提出
中间链路突发性特征的提出:
➢
连续可用
离散可用
➢
对无线链路的迅速变化做出反应
显著提高网络性能
。
第5页/共18页
6
南
3、 无线链路质量评估及预测方法
三、无线链路质量评估及预测方法
3.1 链路质量评估和预测方法分类
第6页/共18页
7
南
3、 无线链路质量评估及预测方法
3.2 经典硬度量和软度量
硬度量,指当节点收到分组时,物理层测量获得的无线参数,包括: ➢ 接 收 信 号 强 度 ( RSSI,Radio Signal Strength Indicator) ➢ 信噪比( SNR,Signal to Noise Ratio) ➢ 链路质量指示( LQI,Link Quality Indicator)
硬度量) 与距离、PRR等链路性能参数之间 的直接 映射关 系。 Y. Xu等人在“Exploring spatial correlation for link quality estimation in wireless sensor networks”文中提出基于自由空 间和对 数正态 阴影相 结合的 路径衰 落模型 ,结合 误比特 率获得 PRR与通信距离之间的关系。 G.Carles等人在“Impact of LQI based routing metrics on the performance of a one-to-one routing protocol for IEEE 802.15.4 multihop networks”文中提出提出 LETX( LQI-based ETX) 方法,利用分段线性模型建立 M. Senel等人在“A kalman filter based link quality estimation scheme for wireless sensor networks”文中提出利用预先拟合 的 SNR-PRR映射曲线,以 SNR为索引获得此时的 PRR。
《跨境电商实务英语》项目5参考答案
教材册Convincing an OrderPart One Warming UpI . C略)II . If I am a seller, I would like to choose the online chat software Skype. Because it has the following advantages.Firstly, I can make free calls to any Skype user, no matter where they are.Secondly, I can call cell phones and landlines around the world at low rates.Thirdly, I can make one-to-one video calls and even group video calls so that I can communicate with the customer more convenient and efficient.Part Two Case StudyCase 1I The seller expresses his thanks to the buyer firstly and replies to the buyer's inquirypatiently. In order to lead the buyer see more information in detail pages, the seller attaches some pictures.II. I. 我们的假发质量非常好,得到了顾客的一致好评。
2. 我们只使用环境友好型材料,保证符合质量标准。
III.Dear Mrs. Smith,Thank you for your interest in our item. Our throw pillows are of very good quality and have received favorable comments from customers. We only use enviromnentally friendly materials and we can guarantee that the throw pillows are well up to standard. We are looking forward to receiving your order early.Yours sincerely,David1. The seller says "More information about it can be found from the pictures weattached below." to lead the buyer to see more information on detail pages.2. The seller promises that he will arrange the delivery within 24 hours once the buyerplaces an order.II.Dear Miss Jones,Thanks for your interests in our bags. This shoulder bag is the bestseller in our store. The main material is PU and the lining material is polyester. We offer two different colors, white and black. More information about it can be found from the pictures we attached below. We have this item in stock and we will ship it within 24 hours once you place an order.Please contact us if you have any questions.Best regards,DavidCase 3亲爱的贝克先生:非常感谢您的询问。
移动WSNs的能耗区路由
第19卷 第3期太赫兹科学与电子信息学报Vo1.19,No.3 2021年6月 Journal of Terahertz Science and Electronic Information Technology Jun.,2021文章编号:2095-4980(2021)03-0511-06移动WSNs的能耗区路由刘丽伟(郑州工业应用技术学院,河南 郑州 450044)摘 要:节点的移动对移动无线传感网络(MWSNs)路由设计提出了挑战。
为此,提出基于接触时间的能耗区路由(CECA)。
CECA路由采用休眠-唤醒机制,降低了节点能耗。
CECA路由利用源节点与信宿的位置信息构成圆角矩形区域,且只允许区域内的节点才能参与路由。
通过节点移动信息,计算接触时间,并利用接触时间设置定时器,进而通过定时器竞争产生下一跳转发节点。
仿真数据表明,CECA路由的通信连通时间及数据包传递率得到有效的增加和提高。
关键词:移动无线传感网络;能耗路由;圆角矩形区;接触时间;移动矢量中图分类号:TN925文献标志码:A doi:10.11805/TKYDA2019196Energy consumption based area routing in mobile wireless sensor networksLIU Liwei(Zhengzhou University of Industry Technology,Zhengzhou Henan 450044,China)Abstract:The movement of nodes challenges the design of routing in Mobile Wireless Sensor Networks (MWSNs). Therefore, Contact time-Energy Consumption Area(CECA) based Routing is proposed in thispaper. In CECA routing, all the nodes follow a sleep-wakeup pattern to improve energy efficiency.Communication between the source and the sink is established by creating a rounded rectangle region.Only the nodes in rounded rectangle region participate in the routing. The Contact-Time(CT) betweensource and neighbor node is computed by mobility information, and the timer is set by CT. The next-hopforwarding node is selected by timer. Simulation results indicate that CECA protocol has betterperformance in term of packet delivery ratio and connection-time of routing.Keywords:Mobile Wireless Sensor Networks;Energy-Consumption Routing;rounded rectangle region;Contact-Time;mobility vector无线传感网络(WSNs)已广泛应用于各类检测领域,如康复医疗、目标检测[1–2]。
海运术语
abbreviations0-93G3rd Generation Networks3PL3rd Party Logistics4PL4th Party Logistics4SC4-High Straddle Carrier5-S Seiri, Seiton, Seiso, Seiketsu, ShitsukeAABC ABC ClassificationAGVs Automated Guided VehiclesAI Artificial IntelligenceAMPS Administrative Monetary Penalty SystemAMS Automated Manifest SystemANERA Asia North America Eastbound Rate Agreement A.P.All purposesAPEC Asia-Pacific Economic CooperationAPI Application Programming InterfaceASME American Society of Mechanical Engineers ASN Advanced Shipping NoticeASP Active Sever PageAS/RS Automated Storage and Retrieval Systema.t.s.All time savedAWB Air WaybillBB2B Business to BusinessB2C Business to CustomerBAF Bunker Adjustment FactorB/B Break BulkBCC Blind Carbon CopyBCO Beneficial Cargo OwnerBIMCO The Baltic and International Maritime Council B/L Bill of LadingBPO Business Process OutsourcingBSC Balanced ScorecardBSP British Standard Pipe TreadCCAF Currency Adjustment FactorCBM Cubic MetreCBO Community Based OrganizationCC Carbon CopyCCR Commodity Classification RatesCDMA Code Division Multiple AddressCEP Courier, Express, ParcelCEPA Closer Economic Partnership Arrangement C&F Cost and FreightCF Collapsible Flat RackCFM Cubic Feet per MinuteCFR Cost and FreightCFS Container Freight StationCGI Common Gateway InterfaceCIF Cost, Insurance and FreightCILT The Chartered Institute of Logistics andTransportCIM The Chartered Institute of MarketingCIP Carriage and Insurance Paid ToCIS Commonwealth of Independent States CKD Completely Knocked DownCLM The Council of Logistics ManagementCLP Container Load PlanCNOOC China National Offshore Oil Corp.C/O Certificate of OriginCOA Contract of AffreightmentC.O.C.Carrier's Own ContainerC.O.D.Cash On DeliveryCOFC Container-on-flatcarCOGS Cost of Goods SoldCon-Ro Container-Roll ShipCOP Custom of the PortCOSCO China Ocean Shipping CompanyCOSL China Oilfield Services LimitedC/P Charter PartyCPFR Collaborative Planning Forecasting andReplenishmentCPT Carriage Paid ToCQD Customary Quick DispatchCRM Customer Relationship ManagementCRP Continuous Replenishment ProgramCSC International Convention for Safe ContainerCSF Critical Success FactorCSI Container Securtiy IntiativeCSP Commerce Service ProvidersCY Container YardDD/A Document Against Acceptance DAF Delivered at FrontierDC Distribution CentreD1/2D Demurrage Half DispatchDDC Destination Delivery ChargeDDF Documentation Fee – Destination DDP Delivered Duty PaidDDU Delivered Duty UnpaidDEQ Delivered Ex-QuayDES Delivered Ex-Shipd.f.Dead FreightDFZ Duty Free ZoneD.G.Dangerous GoodsDHC Handling Charge – Destination DNS Domain Name SystemD/O Delivery OrderD.O.P Dropping Outward PilotDOS Disk Operating SystemD/P Document Against PaymentDPA Transport Arbitrary – Destination DPP Damage Protection PlanD/R Dock ReceiptDRP Distribution Resources Planning DWCT Deadweight Cargo TonnageDWT Deadweight Tonnage (All Told)EECR Efficient Customer Response ECSI Export Cargo Shipping Instruction EDI Electronic Data InterchangeEH&S Environment Health & SafetyEIR Equipment Interchange Receipt E.I.U.Even If UsedE.&O.E.Errors and Omissions Excepted EOQ Economic Order QuantityEPQ Economic Production Quantity ERM Enterprise Resources Management ERP Enterprise Resources Planning ETA Estimated Time of ArrivalETD Estimated Time of DepartureETR Estimated Time of ReadinessETS Estimated Time of SailingEXW Ex-WorksFFAF Fuel Adjustment FactorFAK Freight All KindsFAQ Frequently Asked QuestionFAS Free Alongside ShipFB/L FIATA Combined Transport Bill of Lading FBO Faith Based OrganisationFCA Free CarrierFCL Full Container LoadFCR Forwarder's Cargo ReceiptFEFC Far East Freight ConferenceFEU Forty Feet Equivalent UnitF.H.E.X.Fridays and holidays excludedF.I.Free InFIATA International Federation of Forwarding Agent AssociationsFIBC Flexible Intermediate Bulk ContainerFIFO First-in, First-outF.I.O.Free In and OutFIOST Free In, Out, Stowed & TrimmedFIS Fixed-Interval SystemFMC Federal Maritime CommissionFMCG Fast Moving Consumer GoodsF.O.Free OutFOA Fire Defence Agency (Japanese)FOB Free On BoardF.O.R.Free On RailF.O.T.Free On TruckF.P.A.Free of Paticular AverageFQS Fixed-Quantity SystemFR Flat Rack ContainerFRC Fuel Recovery ChargeFSDC Full-Service Distribution CompanyFT Freight TonFTP File Transfer ProtocolFTZ Free Trade ZonesGGATT General Agreement on Tariffs and Trade GCC Gas Carrier CodeGCR General Cargo RatesGDP Gross Domestic ProductGIF Graphics Interchange FormatGMDSS Global Maritime Distree and Safety System GP General Purpose ContainerGPRS General Packet Radio ServiceGPS Global Positioning SystemGRI General Rate IncreaseGRT Gross Registered TonnageGSA General Sales AgentGSC Global Supply ChainGSM Global System for Mobile CommunicationsGVW Gross Vehicle WeightsGWT Gross WeightHHAFFA Hong Kong Association of Freight Forwarding and Logistics Ltd.HAWB House Air WaybillH.F.O.Heavy Fuel OilH/H Half Height ContainerHKIM Hong Kong Institute of MarketingHSCodesHarmonized System of CodesHTML Hypertext Mark-up LanguageHTTP Hypertext Transfer ProtocolII.A.Im AuftragIADA Intra Asia Discussion AgreementIAF Inflation Adjustment FactorI.A.RatesIndependent Action RatesIATA International Air Transport AssociationIBC Intermediate Bulk ContainerICAO International Civil Aviation OrganizationICC International Chamber of CommerceICD Inland Container DepotICP Internet Content ProviderICT Information and Communications TechnologyIEEE the Institute of Electronic and Electrical EngineeringIICL Institute of International Container Lessors IMDG International Maritime Dangerous Goods Code IMF International Monetary FundIMO International Maritime OrganizationIncotermsInternational Commercial TermsIP Internet ProtocolIPI Interior Point IntermodalIPO Initial Public OfferingIRA Informal Rate AgreementISAPI Internet Server Application ProgrammingInterfaceISDN Integrated Server Digital NetworkISO International Standard OrganizationISP Internet Service ProviderISPS International Ship and Port Facility Security ITF International Transport Workers' Federation IWL Institute Warranty LimitsJJIT Just In TimeKKbps Kilobits per secondKPI Key Performance IndicatorKSF Key Success FactorK/T Kilo TonsLLAN Local Area NetworkingLASH Ligther Aboard ShipLAYCAN Laydays/Cancelling (Dates)L/C Letter of CreditLCL Less than a Container LoadL/G Letter of GuaranteeL.I.Liner InwardLIFO Liner In Free OutLILO Last-In, Last-OutL.I.O.Liner In and OutL/L Loading ListL.L.M.C Limitation of Liability for Maritime Claims LMX Leader-Member ExchangeLNG Liquefied Natural GasL.O.A.Lenght OverallLo-Lo Lift-on Lift-off ShipLPG Liquefied Petroleum GasLSD Landing, Storage and DeliveryLT Lead TimeLTL Less-Than-TruckloadMMAWB Master Air WaybillMB MegabyteMBO Management By ObjectiveMbps Millions of Bits Per SecondMIS Management Information SystemMLB Mainland BridgeMLO Main Line OperatorsMMS Multimedia Messaging ServicesM/N Marks and NumbersMNC Multinational Corporationmol.More or LessMOLCHMore or Less in Character's OptionOPMOLOO More or Less in Owner's OptionMPEG Motion Picture Experts GroupMPS Master Production ScheduleMQC Minimum Quantity CommitmentM/R Mate RateMRP Material Requirements PlanningMRP II Manufacturing Resource PlanningM/S Motor ShipMSDS Material Safety Data SheetMT Metric TonMTO Multimode Transport OperatorNN/A Not Applicable/Not AvailableNAFTA North America Free Trade AgreementNAP Network Access PointNCV No Customs ValuationNEC Not Elsewhere ClassifiedNGO Non-Governmental OrganizationN.O.E.Not Otherwise EnumeratedNOI Not Otherwise IndexedNOIBN Not Otherwise Indexed by NameNOR Notice of ReadinessN.O.S.Not Otherwise SpecifiedNPO Non Profit OrganizationNRT Net Registered TonnageNVD No Value DeclaredNVOCC Non Vessel Operating Common Carrier NWT Net WeightOOCP Overland Common PointOD Organization DevelopmentODC Odd Dimension CargoesODF Documentaion Free - OriginOECD Organization for Economic Cooperation and DevelopmentOEM Original Equipment ManufacturerO/H Over HeightOHC Handling Charge - OriginOJT On-the-Job TrainingOMC Occupational Market ConditionOPM Other People's MoneyORC Origin Receiving ChargeO/S Open Side ContainerOS&D Over, Short and DamagedOSHA Occupational Safety & Health ActOT Open Top ContainerO/T Over TimeOTROff-the-Road TyresTyresO/W Over WidthOWS Overweight SurchargePP2P Path to ProfitP2P Peer-to-PeerPAI Peformance Appraisal InterviewPAQ Position Analysis QuestionairePCD Pitch Circle DiameterPCS Port Congestion SurchargePDA Personal Digital AssistantPDF Portable Document FormatPDPR Per Day Pro RataPENAVIChina Ocean Shipping CompanyCOP.F.T.Per Freight TonP. & I.Protection and Indemnity Club (Association) ClubPKI Public Key InfrastructurePOD Port of DischargePOL Port of LoadingPOP Point of PresencePOS Point of SaleP.P.Per ProeurationemPPP Point-to-Point ProtocolPRD Pearl River DeltaPS Port SurchargePSS Peak Season SurchargePSTN Public Switched Telephone NetworkPTO Please Turn OverleafPWS Personal Web ServerQQDII Qualified Domestic Institutional Investors QFII Qualified Foreign Institutional InvestorsQR Quick ResponseRRAM Random Access MemoryREIT Real Estate Investment TrustRF Reefer ContainerRFID Radio Frequency IdentificationRFP Request for ProposalRFQ Request for QuotationRFRC Rail Fuel Recovery ChargeRMB RenminbiRMG Rail Mounted GantryROA Return on AssetsR.O.B.Remaining on BoardROI Return on InvestmentRo-Ro Roll-on Roll-off ShipRRS Rate Restoration SurchargeR/T Revenue TonsR.T.W.Round the World ServiceRVNX Released Value Not ExceedingSS.A.Safe GroundSAN Storage Area NetworkS.B.Safe BerthSBT Segregated Ballast TankS/C Service ContractSCM Supply Chain ManagementSCQ Special Commodity QuotationSCR Specific Commodity RatesS.D.Single Deck ShipSED Shipper's Export DeclarationSER Carrier Security ChargeSET Secure Electronic TransactionS.G.Specific GravitySHEX Saturday and Holidays Excluded SHINC Saturday and Holidays Included SIM.SUSimilar SubstituteB.SKU Stock Keeping UnitSLA Services Level AgreementSME Small and Medium-size Enterprises SMS Short Message ServicesSMTP Simple Mail Transport Protocol SNMP Simple Network Management Protocol S/O Shipping OrderS.O.C.Shipper's Own ContainerS.P.Safe PortSPC Statistical Process ControlSPIM Single Period Inventory ModelsSQL Structure Query LanguageSS Safety StockS/S SteamshipS.S.H.E. X.Saturdays, Sundays and Holidays ExcludedS.S.H.I.N.C.Saturdays, Sundays and Holidays Included SSL Secure Socket LayerS.T.C.Said To ContainSTCC Standard Transportation Commodity CodeTTACA Transatlantic Conference AgreementTBN To Be NominatedTCP Transmission Control ProtocolTDW Total DeadweightTEU Twenty-foot Equivalent UnitT.H.C.Terminal Handling ChargeTMS Transportation Management SystemTOFC Trailer-On-FlatcarTPC Tones Per CentimeterTPD Tones Per DayTPI Tones Per InchTQC Total Quality ControlTQM Total Quality ManagementT.R.S.Terminal Receiving StationTSA Transpacific Stabilization AgreementTSR Trans Siberian RailwayTT Telegraphic TransferTVC Time Volume ContractTWRA Transpacific Westbound Rate AgreementUUBC Universal Bulk CarrierUCP Uniform Customs and Practice for Documentary CreditsUHF Ultra High frequencyULCC Ultra Large Crude CarrierULD Unit Load DeviceUNCTAD United Nations Conference of Trade andDevelopmentURL Uniform Resource LocatorUU Unless UsedVVAN Value-Added NetworksV.A.T.Value Added TaxVHF Very High Frequencyly (Used in Tariffs to Specify Commodities VLCC Very Large Crude CarrierVMI Vendor Managed InventoryVOC Vessel Operating CarrierV.O.W.Vehicle On WheelVPN Virtual Private NetworkV.S.A.Vessel Sharing AgreementVSL VesselWWAP Wireless Appreciation ProtocolWCS Wireless Communications ServiceWDEX Warehouse Withdrawal for Transportation Immediate ExportationWDT Warehouse Withdrawal for TransportationWDT&E Warehouse WithdrawalforTransportationExportationW.E.F.With Effect FromW.I.B.O. N.Whether In Berth Or NotW.I.F.P.O.N.Whether In Free Pratique Or NotWI-FI Wireless FidelityWIP Work in ProcessW.I.P.O.N.Whether In Port Or NotW/M Weight or MeasurementWMS Warehouse Management SystemWPA With Paticular AverageW.P.Weather PermittingW.R.War RisksWTO World Trade OrganizationW.T.S.Working Time SavedW.W.Warehouse WarrantWWD Weather Working DaysW.W.R.C.D.Whe n Wh ere Ready on Completion of Discharge WWW World Wide WebXXML Extensible Mark-up LanguageYYAS Yen Appreciate Surcharge第三代網路第三方物流第四方物流集裝箱高跨車吊具常組織、常整頓、常清潔、常規範、常自律ABC分類化自動導引車人工智能行政罰款制度海關自動艙單系統亞洲北美東向運協會全部裝卸時間亞太經濟合作組織程式設定介面機械工程師美洲協會事前出貨通知單動態伺服端網員自動化存儲和修復系統操作節省的全部時間空運提單企業與企業之間的交易企業與客戶之間的交易燃油附加費散件雜貨密件抄送貨物擁有者權益波羅的海國際海運公會海運提單企業外判程序平衡記分卡英國標準的管子踩踏幣值附加費立方米社區性組織抄送等價貨物運價分發(部門)若干位址編碼-更緊密經貿關系的安排成本和運費折疊式板架集裝箱每分鐘的立方尺成本和運費集裝箱貨物集散站共同閘道介面成本和運費兼付保險費英國特許物流運輸學會英國特許市務學會兼付指定運費及保險費獨立國家聯合體全拆裝物流管理學會集裝箱/裝載計劃表中國海洋石油總公司產地來源證包運合同船東提供集裝箱交貨付現集裝箱輸送銷貨成本集裝箱/滾裝兩用船港口慣例中國遠洋運輸公司中海油田服務股份有限公司租船合同(租約)預報和補充合作計劃兼付指定運費習慣快速裝運客戶關係管理連續補充庫存計劃對安全容器的國際規定-商業服務提供商集裝箱堆場承兌交單貨交邊境配送中心速遣費為滯期費的一半目的地提貨費目的地文件費貨交入口國家連稅貨交入口國家倉庫貨交指定港口倉庫貨交指定港口船上虧艙費貨交指定港口倉庫危險品貨物目的地操作費網絡領域名字系統出貨單引航員下船時磁盤作業系統付款交單目的地運輸附加費集裝箱損壤保險場站收據分發資源計劃淨載重吨位總載重吨位(量)有效回應顧客的準則-電子資訊傳遞職業環境健康安全集裝箱設備交接單即使使用錯誤和遺漏不在此限經濟訂購量經濟生產批量企業資源管理企業資源計劃預定扺港時間預定離港時間預計準備就緒時間到戶取貨燃料附加費同一費率常見問題船邊交貨國際運輸商協會聯運提單宗教組織貨交貨運商人整箱集裝貨運承運人領貨單遠東歐州運費公會40英呎標準雜裝箱計算單位星期五和節假日除外船方負責裝船費用國際運輸商協-貨物先進倉和先出倉的安排船方不負擔裝卸費船方不負責裝船卸船理艙及平艙費用定期訂貨方式美國聯邦海事委員會快速銷售消費品船方不負責卸船費用防禦代辦處離岸價格火車上交貨貨車上交貨-定量訂貨方式平板集裝箱恢復燃料費全方位物流服務公司運費吨檔案傳輸協定自由貿易區關與貿易總協定-普通貨物運價國民生產總值圖形學交換版式-多用途集裝箱全球衛星定位系統全部費率調高注冊(容積)總吨總推廣代理全球供應鏈全球系統之機動通信-毛重香港貨運物流業協會有限公司代理空運提單重油半高集裝箱香港市務學會-超文本記號超文本傳送-亞洲集裝箱運輸研討協定通貨膨脹調整系數獨立等級價格國際航空運輸協會中型液體集裝箱國際民用航空組織國際商會?陸集裝箱聯網內容供應商資訊和通訊技術電子和電的工程學院國際集裝箱出租商學會國際危險的商品代碼-國際海事組織國際貿易術語國際網路議定書經美國西岸入內陸運輸首次上市集資項目非正式運價協定國際網路伺服器應用式設計介面數位式多功能公眾通信網路國際標準化組織網絡供應商國際船舶與港口保安設施規則國際運輸工人聯合會(倫敦保險人)協會保証航行範圍運送及時千分之一秒關鍵績效指標成功因素公噸本區域網絡集裝箱子母船-信用證併箱散貨保函入口航線運費不包括卸貨費貨物後進倉和後出倉的安排船方負責裝卸費,但不包碼頭費裝貨清單海事索賠任限制領導-成員交換理論液化天然氣全長吊裝船液化石油汽卸貨、倉儲和送貨費訂貨到交貨的時間散貨拼車空運提單百萬位元目標管理數百萬位分之一秒管理資訊系統大陸橋運輸模式遠洋船公司多型通訊聯繫服務嘜頭-增减承租人有增選擇權船東有增選擇權活動圖片小組專家總生產日程表最小數量承諾-材料需要計劃-輪船材料安全資料表公吨聯運商不適用/無資料北美自由貿易協定網路途徑點無聲明價值-非政府組織除非另有列名--船舶準備就緒通知書除非另有指定非營利組織注冊(容積)淨吨不要求聲明價值無船舶公共承運商-內陸公共交貨點組織發展特殊尺寸貨物來源地文件費-原產商超出正常高度來源地操作費在職培訓-籌集資金始發港付加費開邊集裝箱超, 欠及破損 (指收貨與提單不一致的三種情況) -開頂集裝箱加班時間-超出正常闊度超重附加費對得益的路徑同儕網路運算---港口擠塞附加費電子手賬便攜式文件版式-中國外輸代理公司(外代)每運費吨船東保賠協會公開鑰匙基礎卸貨港裝貨港存在的點--點對點的草案泛珠三角州港口附加費季節附加費公開轉換電話網路請閱後頁私人伺服器國內機構投資者赴海外投資資格認定制度國外機構投資者到內地投資資格認定制度快速反應隨機途徑記憶(存儲器)領匯房地產投資信託基金冷藏集裝箱無線射頻識別技術書面建議要求書面報價要求軌道燃料恢復費用人民幣台軌道式龍門吊資產回報船上所有投資回報滾裝船比率修復附加費計費噸全球性服務-安全擱淺網路存儲安全泊位分隔壓載水艙貨量簽訂合同鏈鎖供給管理特種商品報價特種貨物運價單層甲板船-船東保安費用安全電子交易比重--相似替換船儲備保持的單位服務等級協議中、小型企業短訊服務簡單郵件運輸草案簡單網路管理草案裝船單付貨人所屬集箱安全港口統計製程管制單一週期的存貨模式架構疑問語安全庫存-星期六、日和節假日除外星期六、日和節假日包括在內付款加密法據報內裝-跨大西洋公會協定指定船舶傳輸控制草案總載重量20英呎標準集裝箱計算單位碼頭操作費運輸管理系統集裝箱車架輸送每厘米吃水吨數每天裝卸吨數每英寸吃水吨數全面品質控制全面品質管理碼頭收貨站跨太平洋穩定協議西伯利亞大鐵路電匯時間貨量合同泛太平洋西向運費協會通用散裝貨船跟單信用證統一慣例和實務特高頻50萬噸油輸成組器聯合國貿發會議網址-增值網增值稅甚高頻-20萬噸油輪供應商的存貨管理系統船舶承運商可駕駛的車輛虛疑網路船舶共用協議輪船無線應(運)用草案無線通信服務---自生效無論靠泊與否無論是否通過檢驗無線相容認證未完工的產品不論是否在港內重量/體積倉庫管理系統-天氣允許兵險-節省的裝卸時間--何時何處還船全球資訊網(發源地-歐洲量子物理實驗室)可延長的記號語言日圓調整費。
Abstract
A Study of Packet Delivery Performance during Routing ConvergenceDan Pei,Lan WangUCLA CSD peidan,lanw@Daniel MasseyUSC/ISImasseyd@S.Felix WuUC Davis CSDwu@Lixia ZhangUCLA CSDlixia@ Technical Report TR-030051UCLA Computer Science DepartmentNovember13th,2003AbstractInternet measurements have shown that network failures happen frequently,and that existing routing protocols can take multiple seconds,or even minutes,to converge after a failure.During these routing convergence periods,some packets may already be en-route to their destinations and new packets may be sent.These in-flight packets can en-counter routing loops,delays,and losses.However,little is known about how many packets are delivered(or not de-livered)during routing convergence periods.In this paper,we study the impact of topological connec-tivity and routing protocol designs on the packet delivery during routing convergence.We examine three distributed routing protocols:RIP,Distributed Bellman Ford and BGP through protocol analysis and simulation experiments.Our study shows that the packet delivery ratio improves as the network connectivity becomes richer.However differences in routing protocol designs impact their ability to fully uti-lize the topological redundancy in face of component fail-ures.Two factors in routing protocol design,keeping al-ternate path information at each router and quickly prop-agating new reachability information,appear to have the most impact on the packet delivery behavior during con-vergence.1IntroductionInternet technology advances have benefited our society and increased our productivity,but at the same time these advances have also made us critically depend on the relia-bility of Internet services.At a very fundamental level,allThis paper presents a systematic study of packet deliv-ery performance during routing convergence periods.We define a routing convergence period as the time period be-tween a fault detection and restoration of new path infor-mation at all the routers.We use simulations to examine the performance of three routing protocols:RIP[15],a Distributed Bellman-Ford algorithm(DBF)[3],and BGP [23].Our primary concern is packet delivery rate during the convergence;all the other factors,such as delay or jit-ter,are only meaningful when packets are delivered.Our study shows that the network must have adequate physical redundancy in order to assure reliable packet de-livery in face of component failures,and that the packet de-livery ratio for all three protocols improves as the network connectivity becomes richer.However different protocol designs can lead to significant differences in exploiting rich topological connectivity even within our chosen set of sim-ilar routing protocols.For example,with the same topology and same packet generation rate,RIP dropped250pack-ets while BGP’(a specially parameterized version of BGP) dropped fewer than5packets.We identified two factors in routing protocol design that appear to have the most im-pact on packet delivery performance during routing con-vergence.First,in addition to the best path,a router should keep information of some alternate path to each destina-tion,so that when the best path fails it can switch to an alternate path instantly for packet forwarding;the packet delivery rate can be substantially improved even if the al-ternate path may not be the new best path.Second,once a change of connectivity is detected,the routing protocol should propagate the new information as fast as possible. These results provide insights towards improving packet delivery during routing convergence.The remainder of the paper is organized as follows.Sec-tion2reviews related work.Section3gives a brief intro-duction to the three routing protocols studied in the paper. In Section4wefirst identify three factors that we believe have an important impact on packet delivery during routing convergence,and then analyze how well the existing rout-ing protocols match these three factors.Section5presents the simulation results.Section6concludes the paper and discusses our future work.2Related WorkIt is generally believed that a shorter routing conver-gence time reduces packet losses.Previous efforts on rout-ing protocol design have largely focused on speeding up routing convergence and preventing routing loops.These approaches tend to achieve loop-free routing through de-laying routing update propagation.The ExDBF algorithm described in[5]avoids long-lived routing loops by comput-ing the complete path to a destination using the predecessor information.If a neighbor appears in a node’s computed path to a destination,this node will not send update mes-sage regarding to this neighbor since this will lead to loops.[6]describes DUAL algorithm which avoids rout-ing loops by running a“diffusion”process before switch-ing to a longer path.The routing table is“frozen”and the affected destinations are unreachable until the diffusionprocess completes.Our study differs from previous workby its focus on packet delivery performance rout-ing convergence.Our results show that a shortest conver-gence time does not necessarily lead to a maximal packet delivery rate.We believe that an ideal routing protocol should achieve a good balance between the routing con-vergence overhead and convergence time,and most impor-tantly should maximize the packet delivery rate during con-vergence.[30]simulated the convergence behaviors of severalrouting protocols.The authors measured the convergence time,number of routing messages,and the routing loops after node or link failures,but did not measure packet de-livery during routing convergence.[20]studied the end-to-end traceroute measurements collected in1994and1995. The author detected a few transient loops and conjectured that these transient loops were caused by link failures.[8] used off-line analysis of traces containing the header of ev-ery packet traversing a link on a backbone ISP to detect loops.They observed that forwarding loops are rare,and that the delay of packets which do escape a routing loop is increased by25to1300msec.They also observed that 30%of loops on a subset of the links lasted longer than10 seconds.The paper stated that the causes of observed for-warding loops are yet to be identified in future study.Our study examines how link failures affect routing and packet forwarding by studying the forwarding and routing trace files,thus we can identify the causes of routing loops in each circumstance.[26]simulated the loop-free MS distance vector algo-rithm from[17],the ExDBF algorithm from[5],and a linkstate protocol(SPF)using the NSFNET backbone topol-ogy.The workload used is an FTP application which does not use TCP but has a simpleflow control with a maxi-mal window size and retransmission after timeout.They measure the packet throughput,packet delay and routing load(bandwidth consumption).The authors observed that, although the SPF and ExDBF algorithms are known to have transient loops,their packet delivery performance is better than that of the loop-free MS algorithm.While this work measured the end-to-end data delivery performance under different routing protocols,our study examines the packet delivery performance with topologies of different connec-tivity levels.In addition,we examine in detail packet-level dynamics such as number of packet drops,number of TTL expirations,number of transient forwarding paths, forwarding path convergence delay,to understand exactly how transient routing protocol behavior affects packet de-livery and hence the performance of dataflows.Other related work that aims at maximizing packet de-livery during routing convergence include having alternatepath always ready either at the routing table[29]or at line-card[1],and“non-stop forwarding”in which a router keeps forwarding packets while rebooting its routing pro-tocol daemon[19,25,24].A router cannot forward packets when a destinationbecomes unreachable until the reachability is restored. In an attempt to improve packet delivery after a failure,Alaettinoglu et al proposed that the router pre-computes a backup next hop in the line-card of the router and usesthe backup next hop when the primary next hop is removed[1].This meets the“having a backup readily available”goal that we identify later in Section4,but in this case thebackup is present in the line card as well as being presentin the routing process.For most of the routers,restarting the routing protocoldaemon does not affect the forwarding functionality of therouter if the router itself does not perform a hardware re-boot.In this case,it is unnecessary for the neighbors ofthe restarting node to remove and subsequently add itback again,a process which may involve a large number of update message exchanges and route recomputation,since’s routing state before and after the restart is the same and packet forwarding is not impacted by the restart.There-fore,there are proposals of“non-stop forwarding”of theserestarting routers for OSPF[19]and BGP[24].However because a restarting router cannot participate the routingmessages exchanges since its process is inactive, it is possible that routing loops may occur if there are topo-logical changes during the restarting period.Neighbors ofthe restarting router will decide whether the new topologi-cal changes they observe cause loops.If so,they will take the rebooting router as a normal failed node,and send cor-responding routing messages,i.e,terminate the“non-stop forwarding”[19,25].3A Brief Introduction to RIP,DBF and BGPIn this paper we consider three distributed routing pro-tocols:RIP[15],DBF(Distributed Bellman Ford)[3],and BGP[23]1.In addition to being widely used in network literature and practical networks,all of the three are vari-ants of classic distance vector routing protocols.We se-lected three routing protocols in the same algorithm family so that we can better correlate the difference in the routing protocol design with the difference in the observed packet delivery dynamics.RIP[15]is one of the best known routing protocols.In RIP,each router periodically advertises its shortest distance to each destination.Based on the distances learned from all its neighbors,a router selects the neighbor that leads to the shortest distance path to a given destination as the next hop, and discards the reachability information for the same des-tination from all other neighbor routers.Routing updates are sent every30seconds,and a routing entry is removed if it does not have an update within180seconds.Whenever a4Routing Protocols During Convergence In any large scale network,there will be periods when the route to a particular destination has not converged,yet hop-by-hop routing protocols(such as those used in the In-ternet)continue to forward packets regardless of whether the route has converged.IP packets carry a Time To Live (TTL)field which specifies the maximum number of hopsthe packets may travel.As long as a packet’s TTL value is greater than zero and the router knows some next hop toreach the destination,the packet is forwarded to the next hop and the TTL value is decremented by1.Although the sequence of next hops traversed by a packet during arouting convergence period(called“transient forwarding path”)may be sub-optimal or even contain transient loops, the packet may still have a good chance to reach its desti-nation.Figure1shows an example of how packets can be deliv-ered during routing convergence.In thisfigure,each link has a unit cost and the packet forwarding path between and is shown in dashed lines.Initially,as shown inFigure1(a),is sending packets to along the short-est path.In Figure1(b),the link goes down. continues to forward packets to and transmits the packets over the failed link.In Figure1(c),detects the link failure and switches to forwarding packets to.Un-aware of the connectivity changes continues to forward packets to.During this time the packets are forwarded through a non-shortest path.Finally,in Figure1(d), converges to the new shortest path,and forwards packets to .Note that in this example packets are only dropped be-tween the instance the link fails and the time switches to forwarding packets to R6(Figure1(b)),and that dur-ing the subsequent convergence period(Figure1(c))pack-ets successfully reach the destination by going through a non-shortest path route.Also note that the time it takes to move from Figure1(c)to Figure1(d)counts as part of the routing convergence delay,even though packetflow has been restored.This example shows that,after a failure,a longer routing convergence period does not necessarily im-ply higher packet losses.Understanding the relation between routing conver-gence and packet delivery raises new and interesting chal-lenges for routing protocol design.In the remainder of this section,we identify factors that have an important impact on packet delivery during routing convergence.4.1Path Switch-over PeriodWe say a path switch-over period starts when a routerdiscovers its current next hop can no longer reach a given destination and ends when the routerfinds a new next hop for the same destination.Because the router can-not forward any packets for that destination during the path switch-over period,an ideal network routing protocol should have a minimal path switch-over period.Forward-ing packets to an alternate next hop offers a chance that the packets may eventually reach their destinations,even when the next hop is not necessarily on the new shortest path af-ter a failure.In RIP,a router only keeps the information for the next hop along the shortest path.loses the reachability to a destination whenever the router detects the failure of the link to the next hop or the next hop reports the destination is unreachable.Although’s other neighbors may not be affected by the failure,these neighbors will not inform their reachability to the destination until the next periodic update is due.Therefore,after a failure,a RIP router may take up to30seconds before it learns an alternate path.As a result,RIP suffers from a potentially long path switch-over period.In contrast to RIP,a router running DBF or BGP keeps a cache of the reachability information learned from all its neighbors.When it can no longer reach a destination through the current next hop,the router can immediately select an alternate next hop for the destination,achieving a zero time path switch-over.However note that there is no guarantee that the selected alternate next hop leads to the shortest route to the destination,nor that the next hop can even reach the destination.This leads us to consider the next important factor,probability of choosing valid paths.4.2Probability of Choosing Valid PathsIdeally,when the existing path fails,the router should switch to a new path which does not use the failed link. We call any alternate path that avoids the failed link a valid path.The second factor of an ideal routing protocol is the high probability of choosing a new next hop with a valid path if there exist multiple alternate paths.A valid path can be sub-optimal,as long as packets can reach the destination while the routing protocol is converging.“Split horizon with poison reverse”avoids two-hop loops,thus helps increase the probability of valid alternate paths after a failure.In all the three protocols we studied, BGP is the only one that allows a node to check whether a chosen alternate path contains a failed link in some re-stricted cases.For example,[22]utilized this feature of BGP to substantially reduce the routing convergence time. However due to the existence of routing policies and other constraints,after a route failure BGP may still alternate among a number of new routes before converging to a sta-ble route.Such transient route instability can happen in all the three studied protocols,and is caused by inconsis-tent connectivity information perceived by different routers while the latest update is being propagated through the en-tire network.This leads us to consider the third important factor,propagation time of Failure information.4.3Propagation Time of Failure InformationUpon detection of a physical failure,an ideal routing protocol should propagate the failure information through the network as quickly as possible,so that all the routers(a)’s next hop tois(b)Linkfails(c)’s next hop becomes(d)’s next hop becomesFigure 1.Packet Could still Be Delivered during Convergencecan recompute the shortest paths to the affected destina-tions.However this propagation takes time,and due to the distributed nature of distance-vector and path-vector algo-rithms.a router which has received the failure notification may not find the new best path,or even a valid path,at this time because the reachability information it received from its neighbors earlier may have been invalidated by the failure.Nevertheless when a router changes its paths,it will inform its neighbors about the new paths.If the new path is also invalid,packets following that path are likely to be lost.However if the new path is valid but sub-optimal,packets sent along that path have a good chance to reach their destinations.In RIP or DBF,upon detecting a failure a router sends a triggered update instead of waiting for the next 30-second update interval.BGP sends only triggered routing updates upon route changes.In this sense,all the three studied pro-tocols attempt to achieve the goal of quick propagation of failed paths.However,because damping timers for trig-gered update (3-second average for RIP,DBF and BGP’,and 30-second average for BGP)are used to space out con-secutive updates,a node delays the sending of all update messages except the first one.One exception is made in BGP which does not apply the timer to withdrawal mes-sages in order to propagate the unreachability information quickly.But A link failure may cause route changes to multiple destinations,and updates regarding these destina-tions may not be received by a BGP router at the same time.After a BGP router has processed all the changed path and sent out corresponding updates,it turns on the MRAI timer.After the timer is on,any newly changed paths to destina-tions not in the previous update messages are delayed by the per neighbor MRAI timer,but not by per(neighbor,des-tination)MRAI timer.4.4The Impact of Network TopologyIn addition to the routing protocol design choices,our claim is that the ideal factors of a minimal path switch-over period,a high probability of picking a valid path,and fast propagation of updated connectivity information,all benefit from a richly connected network topology where routers have a high connectivity degree.Intuitively,as a network becomes more interconnected,the number of al-ternate paths increases,and the probability that an alternate path goes through the same failed link decreases.Further-more,the rich connectivity also reduces the average path length between any two points in the network.This re-duced path length helps reduce the propagation time of the failure information,which is related to not only the link propagation delay but also the triggered update (or MRAI)timer.For example,[13]has shown that the BGP conver-gence time is proportional to the product of MRAI timer value and the length of the longest backup paths.5Simulation Results and AnalysisWe simulated RIP,DBF,BGP and BGP’using IRLSim simulator [27].In the simulated networks,each link has a unit cost,a propagation delay of 1ms,and a transmis-sion rate of 10Mbps.A link failure is detected by the two nodes attached to it within 5ms after the failure happens.Each node has a packet queue sizes of 200packets and zero CPU processing delay.Note that because this paper is a comparative study of different routing protocols,the exact values of these parameters should have little impact on the results.In order to study the protocol behavior at different topo-logical connectivity levels,we choose to use a family of regular network topologies.A random topology presents(a)d=3(b)d=4(c)d=5(d)d=6(e)d=7(f)d=8(g)d=9(h)d=10(i)d=11(j)d=12(k)d=13(l)d=14(m)d=15(n)d=16Figure 2.Constructing links for a node with degree(d)from 3to 16a random factor in each simulation ing regular topologies removes this undesirable random factor and al-lows us to clearly identify the impact of connectivity level on the protocol performance.The simulated network topol-ogy is a mesh of rows by columns and each node in the network (except those on the border)has the same node degree .There are various ways to construct such topolo-gies,we use a deterministic method similar to the one used by Baran in [2].Figure 2shows for a node with from 3to 16,how to connect it to the rest of the network.As an ex-ample Figure 3shows three example topologies for and .We run each simulation experiment for 800seconds.There is a warm-up period after each simulation starts,dur-ing which time period the network nodes exchange routing update messages and the routing table at each node stabi-lizes.At time seconds,a single sender starts send-ing IP packets with TTL=127to a single receiver at a con-stant transmission rate of 20packets/second.The sender and the receiver are connected to a randomly chosen router on the first row and last row of the regular topology,respec-tively.At time seconds,one of the links along the shortest path between the sender and receiver is randomlychosen to fail.We simulated topologies withand ranging from 3to 16.For each topology with a differentnode degree,we conducted 100simulation runs to collectstatistically valid performance measurement.Due to the space limitation,in the paper we use the topologies withshown Figure 3to help explain our observations.5.1Packets Drops due to No ReachabilityWhen a packet arrives at a router which is in the switch-over period after a failure,the packet is dropped because the the router does not know the next top to reach the desti-nation.Figure 4shows the average number of packet drops due to lack of reachability over 100simulation runs.Observation 1For all the three examined routing proto-cols,the number of packet drops decreases as the node de-gree increases until it reaches 6.When the node degree is 6or more,there are virtually no packet drops with DBF ,BGP ,and BGP’.But in RIP ,packet drops improve only slightly with the increase in node de-gree.Our explanation is the following.Consider the behavior of a node that lies on the shortest path from the sender to the receiver.In a sparse network,it is often the casethatis chosen by its neighbors as the next hop to the destination.Thus when learns that its current next hopReceiver123456789101112131415161718192021222324Sender(a)degree 4Sender123456789101112131415161718192021222324Recevier(b)degree 5Sender123456789101112131415161718192021222324Receiver(c)degree 6Figure 3.Link Failures in Networks with node degree 4,5and 6050100150200250300234567891011121314151617N u m b e r o f P a c k e t D r o p sNode DegreeNumber of Packet DropsRIP DBF BGP’BGPFigure 4.Number of Packet Drops due to no route Vs.node-degreeto the destination is no longer valid,its neighbors cannot immediately offer an alternate path to the destination.For example,consider the behavior of node in Figure 3(a)(a sparse topology with degree 4).Node is chosen by neighbors as the next hop to the destination and nodes use Poison-Reverse loop prevention to in-form node that their distance to the receiver is infinity.When link fails,node finds no alternate path until next periodic update cycle when the new reachability through nodes [16,21,22]or [18,23,22]is discovered.Similar situations can happen to the other nodes along the shortest path before the failure,i.e.nodes 2,7,and 12.On the other hand,a densely connected network makes it likely that a node has one or more neighbors whose shortest path to the destination does not go through A.Forexample,consider nodein Figure 3(c)(a topology with degree 6).Before the failure node 12’s next hop to the des-tination is node 22and under DBF,BGP and BGP’node 12also keeps the information from its neighbor node 17about its reachability to the destination.When link fails,node 12immediately finds the alternate path [12,17,22]and starts forwarding packets along this new par-ison of Figure 3(a)and 3(c)shows that increasing the node degree to 6essentially guarantees that all the nodes on the initial shortest path can find a valid alternate path after any link along the shortest path fails.But a network running RIP largely depends on the periodic updates to propagate information about alternative paths after a failure and node does not learn of the alternate path via node until the next update.A higher node degree only slightly reduces the propagation delay of the periodic update messages and the number of packet drops in RIP decreases only slightly.5.2Number of TTL ExpirationsFigure 5shows the number of packets dropped due to TTL expirations.Given the large TTL value (127)and the small size of the simulated topology,all the TTL expira-tions are caused by routing loops during convergence.Observation 2For topologies with a node degree below020406080100120234567891011121314151617N u m b e r o f T T L E x p i r a t i o n sNode DegreeNumber of TTL ExpirationsRIP DBF BGP’BGPFigure 5.Number of TTL Expirations During Convergence6,BGP has the largest number of TTL expirations while RIP has no TTL expirations.When the node degree is 6or higher,there are no TTL expirations.The reason no TTL expirations occur under RIP is the fol-lowing.Whenever a link failure happens,a triggered up-date is sent quickly.and with our 1ms link delay,the failure information can propagate along the path in a few millisec-onds.Furthermore,packets enter the network at a relatively slower rate of 20packets/second and because a RIP node keeps no alternative path information,the node next to the sender will drop all the incoming packets when the current shortest path fails.As Figure 4shows,RIP avoids loop-ing by simply dropping all the incoming packets till new reachability is established.Analysis of the routing and forwarding traces shows that BGP’s slow convergence problem [11]combined with the MRAI timer are mainly responsible for the forwarding loops with the topology of node degree 5.For example,nodes 2,7,and 12in Figure 3(b),can easily form a routing loop.At one moment after failure of link (1722)during the simulation,node 2’s path is [21271722]while node 12’s path is [12271722].However,MRAI timers of both node 2and node 12have been turned on by some previ-ously exchanged updates and no new updates can be sent before one of the timers expires,thus a forwarding loop is formed.This example shows that different nodes based on inconsistent information might form a transient loop,and the looping period is lengthened by the MRAI timer.The number of TTL expirations in BGP is about 10times of that in BGP’,and this is consistent with the fact that av-erage MRAI timer value in BGP(30seconds)is about 10times of that in BGP’(3seconds).Although the MRAI timer value for BGP’is about the same as the damping timer for DBF,the two routing pro-tocols show noticeable difference in the number of TTL expirations.This difference is due to some specific de-tails in how the damping timer is applied.A single DBF update message can contain as many destination entries as the message size allows (25destinations).Thus given the size of simulated topology (49nodes total),a singleupdate is likely to contain all the affected destinations by the link failure.On the other hand,BGP is a path-vector protocol and a single BGP update can only contain those destinations that share the same path.Because our simu-lation implemented the MRAI timer on a per neighbor ba-sis (as in most vendor BGP implementations),after a link failure only the first BGP update message can propagate quickly.Any further update messages will be regulated by the MRAI timer,resulting in a longer time when different nodes have inconsistent routing information.Thus BGP’suffered more from transient loops which lead to a higher number of TTL expirations.Note that the results could have been different had the MRAI timer been implemented on a per (neighbor,destination)basis.We see that in our simulations,RIP has no loops and DBF has fewer loops than BGP (and BGP’).Conversely,BGP(and BGP’)has more routing information than DBF which has more than RIP.Although BGP assures that a node picks a path that does not contain itself,this does not always prevent transient looping.Furthermore a common implementation simplification in the BGP’s MRAI sets the time on a per neighbor rather than per (neighbor,destina-tion)basis and lengthens BGP’s convergence time.5.3Instantaneous ThroughputFigure 6shows the instantaneous throughput (at each second)measured in packet/second at the receiver with node degrees 3,4,5,and 6,respectively.The results for node degree 7and higher are similar to that of node de-gree 6.Note that due to TTL expirations in BGP and BGP’at degree 5,their throughput performance are worse than those at degree 3,4and 6.For clarity,we normalize time by subtracting the 390second warm-up period,thus thefailure is injected atseconds in Figure 6.Note that the results shown in the figure are the average throughput of 100simulation runs.Observation 3In a sparse network,a link failure on the existing path between the sender and receiver tends to cause an instant throughput drop with all the protocols under study.For BGP ,BGP’,and DBF ,the throughput then increases gradually and resumes full throughput around the triggered update timer values.RIP does not resume full throughput until the 30second periodic update value.In a dense network,increased node degree reduces the throughput drop for DBF ,BGP ,and BGP’to negligible amount.RIP does only slightly better as the network becomes more dense.Because RIP routers do not keep alternate path infor-mation,after the failure they must wait for other routers’periodic announcements (or triggered update if they no-tice path changes)to learn an alternate path.Consequently RIP’s throughput right after the failure is almost zero.For。
一种路径干扰优化的多径距离矢量路由协议
一种路径干扰优化的多径距离矢量路由协议符可可;刘航;郭达伟;曹爱文【期刊名称】《计算机技术与发展》【年(卷),期】2013(000)009【摘要】多径路由协议可以同时使用多条路径传输数据,减少端到端延迟并提高吞吐量。
然而,多条路径之间的干扰作用可能会对网络的整体性能造成影响,使网络无法实现预期的性能提升。
提出了一种新的解决路径间干扰问题的算法IO-AOMDV(Interference-OptimizedAOMDV)。
该方法引入路径相关度的计算来评估路径间干扰的大小,在路由发现过程中发现并建立路径相关度最小的路径对,然后使用该路径对传输数据。
仿真结果表明,IO-AOMDV在包投递率、吞吐量、端到端平均延迟三个指标上可以得到较好的网络性能。
%Using multiple paths to transmit data simultaneously in Ad-Hoc network is regarded to reduce end-to-end delay and achieve higher throughput. However,the interference between these paths may make a difference to the overall performance of the network,not completing the expected performance raising. A new protocol ( IO-AOMDV) was proposed to establish interference-minimized paths. The protocol uses a new algorithm which can evaluate the extent of paths-interference to establish the interference-minimized paths,then uses these paths to transmit data. Simulations show that IO-AOMDV achieves good performance in terms of packet delivery ratio, throughput and average end-to-end delay.【总页数】5页(P18-22)【作者】符可可;刘航;郭达伟;曹爱文【作者单位】西北工业大学自动化学院,陕西西安 710129;西北工业大学自动化学院,陕西西安 710129;西北工业大学自动化学院,陕西西安 710129;西北工业大学自动化学院,陕西西安 710129【正文语种】中文【中图分类】TP31【相关文献】1.一种基于距离矢量的Ad Hoc网络拥塞适应路由协议 [J], 刘宁;何海浪2.Ad hoc网络节点不相交多路径距离矢量路由协议 [J], 郭显;冯涛;袁占亭3.一种加入稳定性的备份按需距离矢量路由协议 [J], 杨华;李志远4.一种加入稳定性的备份按需距离矢量路由协议 [J], 杨华;李志远5.一种基于距离矢量的Ad Hoc网络拥塞适应路由协议 [J], 刘宁;何海浪因版权原因,仅展示原文概要,查看原文内容请购买。
Ad_Hoc_Network英文简介PPT教学课件
There is no central control node in this network, the hosts complete interconnection through a distributed protocol. Once one or more nodes of the network fails, the remaining nodes are still able to work properly .
hosts all through wireless transmission to
complete. Because of the physical characteristics
of the wireless channel, the network bandwidth is
much lower than the cable channel. In addition,
2020/12/12
3
❖ Ad Hoc network is a Multi-hop, no center, selforganizing wireless network,also known as Multi-hop Network(多跳网 ) Infrastructureless Network(无基础设施网 ) Self-organizing Network(自组织网)
??adhocnetworkisamultihopnocenterselforganizingwirelessnetworkalsoknownasmultihopnetwork多跳网infrastructurelessnetwork无基础设施网selforganizingnetwork自组织网selforganizingnetwork自组织网?adhocmodeisap2pconnectionitwillnotbeabletocommunicatewithothernetworksthewirelessterminal无线终端devicesuseadhocmodesuchasthepmppersonalmultimediaplayer个人多媒体播放器psppl体播放器pspplaystationportable掌上游戏机dmadirectmemoryaccess存储器直接访问控制器
采购部常用英语单词
采购部常用英语单词 The latest revision on November 22, 2020采购 purchasing department / purchasing division / porcurement department 采购部buyer / purchaser 采购员quotation / quoted price 报价quotation / quotation invoice 报价单discount / rebate 回扣,折扣cost down 成本压缩cost reduction 降低成本deduct 扣除order / order sheet / order form / order blank 订单sample order 样品单purchase order (= PO) 采购单(订购单)place an order 下订单(place an order for sth. with .... 向....订购某物)open order 未结订单 open purchase order 未结采购单rush order 紧急订单back order 欠交订单、延期交货订单additional order 追加订货sales order 销售订单firm planned order = FPO 确认的计划订单split order 分批订单Minimum order quantity = MOQ 最小订单量Fixed order quantity = FOQ 固定订货批量delivery schedule 交货排程date of delivery / delivery date 交货期place of delivery 交货点part delivery 分期交货short delivery交货短少short shipment 短装replacement 换货 -----------------------------------------------------------------------------------------------一、会议基础词汇meeting professional 会议专业人员convention center 会展中心conference center 会议中心tour operator 旅游批发商sponsor 发起人,主办单位,赞助商service contractor 服务承包商newsletter 时事通讯,业务通讯not-for-profit organization 非赢利性机构charitable 为慈善事业的public service 公益服务fraternal 兄弟的buyer 买方association meeting planner 社团/协会会议策划人corporate meeting planner 公司会议策划人meeting planner 会议策划人conference venue 会议地点related services 相关服务host 主办,招待Board of Directors’ meetings 董事会budget 预算on-site management 现场管理a for-profit business 赢利性机构title 头衔administrative assistant 行政助理 executive secretary 执行秘书,行政秘书promote 促销required meeting 必须出席的会议conducive 有益于 a full-time meeting planner 全职会议策划人site selection 挑选会址industry suppliers 会展行业的供应商site 会议地点,会议场所d e s t i n a t i o n s目的地f o o d a n d b e v e r a g e餐饮h o t e l accommodation 酒店膳宿entertainment 娱乐town halls 市政厅,礼堂civic center 市府礼堂,市中心first tier city 一类城市second tier city 二类城市local chamber of commerce 地方商会telecommunication 电信audio visual 视听entertainer 演艺公司,演艺人员florist 花商event planner 事件策划人conference and convention contractor 会议服务承包商freight forwarder 货运承运商,转运商decorators 装饰服务商area supplier 当地供应商meeting room 会议室convention facility 会议设施,会议举办场所exposition hall 展厅sleeping room 客房meeting space rental 会议场所的租赁convention property 会议设施liaison 联络员,中间人marketability 可销售性二、会议进阶词汇attendance 与会人数function attendance 活动的参加人数 break 会间休息session 分会lead time 筹会时间,提前量planning time 会议筹备时间duration 会议期限pre-convention 会前会profile of attendees 与会者概况SMERFA(social, military, educational, religious, fraternal, athletic首字母的缩写)指社会团体/军事机构/教育部门/宗教团体/兄弟会/运动员市场 admission system 入场方式controlled admission 限制入场uncontrolled admission 无限制入场convention headquarters room 会议总部办公室hospitality suite 接待室admission policy 入场规章registration fee 注册费sponsoring organization 主办单位last-minute change 临时变更message board 留言版badge 徽章代表证directional sign 指向路标travel bottleneck 交通瓶颈packet pickup area 文件包领取处list of schedule events 会议活动安排表coupon tickets for functions 各类活动代金券self-adhering badge 自粘代表证bar coded badge 条码代表证directory of hotel’s service 饭店服务项目指南color-coding badge 彩色代表证admission system 会议入场方式controlled admission 限制入场uncontrolled admission 无限制入场ticket arrangement 票券管理goodwill v i s i t友好访问。
跨境电子商务英语--03--答案3.1
Part 3.1 Build Y our Online StoreWarming-up ActivitiesListening参考答案及译文:1.campaign译文:一次有效的营销活动能够提高页面访问量,并为店铺带来更多的顾客。
2.relations译文:我方乐意在互利的基础上与你方建立直接的业务关系。
3.quoted译文:你方所报价格偏髙,我方感到很遗憾。
4.counter译文:很抱歉,我方无法接受你方的还盘。
5.delivery译文:由于供货推迟,我方不得不取消订单,对此我们感到很遗憾。
New Core VocabulariesTask1 Translate the following sentences into English, using the expressions in Brackets.参考答案1. He was a man with considerable insight.2.Welcome to our online storefront.Task2 Match the English words in the left column with the English explanation in the right column.参考答案1.2.Task3 Translate the following sentences into English, using the expressions in Brackets.参考答案1. Complete the following sentences by translating the Chinese given in the brackets into English.参考答案1.the date of the negotiation译文:请再次确认谈判日期。
2.the time schedule of the next five days译文:我来这儿想征求一下您对以后五天日程安排的意见。
《跨境电商实用英语》第2版,人大版习题答案Unit,3-Chapter,4
《跨境电商实用英语》第2版,人大版习题答案Unit,3-Chapter,4Part Two :Passage Reading Task 11. Store marketing and promotion can help us attract customers, increase visits and exposure of our store and products, bringing more orders and transactions.2. Platform-inside marketing means to advertise and promote the store and products by using the marketing tools provided by third-party cross-border e-merce platforms. Platform-outside marketing refers to marketing tools that bring potential customers from other sites to our cross-border e-merce store.3. When creating these promotion activities, we must pay attention that the start and end time are U.S. Pacific time. In general, the start and end time should be set during the evening prime time for foreign customers, which is more likely to bring better marketing results. In addition, activities need to be created at least 48 hours in advance. For some popular promotional time periods, such as Thanksgiving and Christmas, we must be prepared early.Task 21. properly2. affiliate3. mission4. corresponding5. achieve6. preparatory7. transaction8. relevanceTask 31. It’s not good for product exposure if the bidding price for Keyword Pro is too high or too low.2. We must raise the price by at least 20%, or we will lose money.3. We hope this promotion activity can stimulate our customers to buy.4. We decide to give you a special discount since you are our regular customer.5. Every team should prepare the material for speaking before class each week.6. According to the regulations, no advertising could be played in the middle of TV dramas during prime time.Part Three :Mini-Project Task 1Dear customer, We are __ store on AliExpress. Thanks for your long-term support for our store! We are writing to inform you that we are having a new collection ing up this week. Please visit our store to see if any of the new arrivals interests you. For a better purchase experience, we have enclosed a $2 coupon for you to use for your next purchase. Hope to see you again soon! Best Regards, __ (答案仅供参考)Task 2Dear customers, We are __ store on AliExpress. Thanks for your long-term support for our store! We are writing to inform you that we are having a huge Thanksgiving promotion next week. Please visit our store to see if any of the sale items interests you. For a better purchase experience, we have enclosed a $2 coupon for you to use for your next purchase. Hope to see you again soon!Best Regards, __ (答案仅供参考)Passage Translation 站内营销当我们完成了店铺注册、选品、产品信息化处理和上传、店铺装修等前期准备工作,但却发现店铺访问量、产品曝光量等数据迟迟不见上涨,这时应该怎么办呢?店铺营销和推广能帮助我们吸引客户,提高店铺和产品的访问量和曝光量,从而带来订单和交易额。
跨境电商英语综合测试卷及答案
《跨境电商英语》期末试卷(D)Part 1. Useful Expressions (共15小题,每小题1 分, 合计15 分) Directions: The following is a list of terms related to Cross-border E-commerce. After reading it, you are required to find the items equivalent to those given in Chinese in the table below.A--transaction volume I-- keywordB--store description J-- brand styleC--market campaign K-- logisticsD--data analysis L--attribute wordE-- expected profit M--flow wordsF-- corporate culture N-- social mediaG--page view O-- target customerPart 2. Translation(共6小题,16-20题每小题3分,21题10分, 合计25分)Directions: This part, numbered 11 to 16, is to test your ability to translate Chinese into English of the five sentences. No.16 is to test your translation ability of paragraph from English into Chinese.16.收到您订单后48小时内发货。
____________________________________________________________ 17.只要是我方责任,我们一定承担您的损失。
公司常用英语日语
公司常用英语缩写CORPORATE COMMON ABBREVIATION常用语缩写1 Organization组织1-1 HQ Head Quarter 总公司1-2Chairmen主席1-3Lite-On Group光宝集团1-4 President 总裁1-5Executive Vice President 常务副总裁1-6Vice President副总裁1-7HR Human Resource人力资源部1-8FIN Finance 财务1-9Sales 销售1-10R&D Research & Developing 研发部1-11QA 质量保证QA DQA CS1-12MIS Management Information System资迅管理系统1-13Pur 采购Purchasing1-14IMD Image management division 影像管理事业部1-15ITS information technology system 计算机部1-16QRA quality reliability assurance 品保部1-17MFG manufacturing 制造部1-18PMC production &material control 生(产)物(料)管(理) 1-19 PRO Procuremnet 采购开发部1-20 PMO Plant Manager Office 厂长室1-21 CEO Chief Execute Officer 执行总裁2 Materials 材料2-1PC Production Control 生产控制2-1-1MPS Mass Production Schedule 量产计划2-1-2FGI Finished goods Inventory 成品存货2-1-3UTS Units To Stock存货单元2-1-4WIP Working In Process Inventory在制品2-1-5C/T Cycle Time 循环时间,瓶颈2-1-6WD Working Days 工作天2-1-7MTD Month To Days 月初到今日(例如总表整理) 2-1-8YTD Year To Days 年初到今日2-1-9 SO Sales Order 销售单2-1-10MO Manufacture Order 制造单2-1-11 BTO Build To Order 订单生产2-1-12 P/N part number 料号2-1-13 FCST Forecast 预测计划2-1-14 W/O Working Order 工单2-1-15 P/O Purchasing Order 采购单2-1-16 VDS Vendor Delivery Schedule 厂商送货进度表2-1-17 D/C Delivery Order 交货单2-2 MC Material Control材料控制2-2-1 MRP Material Requisition plan 材料申请计划2-2-2 INV Inventory 存货清单; Invoice 发票2-2-3 Inv Turn Over Days=INV$/NSB X WD 库存周转天数2-2-4 PSI Production Shipping Inventory 预备待出货2-2-5 JIT Just In Time 实时2-2-6 Safety Inventory 安全存量2-2-7 CKD Completed Kits Delivery全件组装出货2-2-8 SKD Semi Kits Delivery半件(小件)组装出货2-3 W/H Warehouse 仓库2-3-1 Rec Receiving Center 接收中心2-3-2 Raw MTL 原物料2-3-3 F/G finish goods 成品2-3-4 GRN Goods Receive Note 货物接收单2-4 Import/Export进出口2-4-1 SI Shipping Instruction发货指令2-4-2 PL Packing List包装清单2-4-3 Inv Shipping Invoice出货发票2-4-4 ETD Estimate Departure 预估离开时间2-4-5 ETA Estimate Arrive 预估到达时间2-4-6 BL Bill of Landing 提货单(海运)2-4-7 AWB Air Way Bill 提货单(空运)2-4-8 MAW A Master Air Way Bill主提货单2-4-9 HAWB House Air Way Bill副提货单2-4-10 TEU Twenty foot Equipment Unit(Contain)二十英尺货柜2-4-11 FEU Forty foot Equipment Unit(Contain)四十英尺货柜2-4-12 CY Container Yard货柜场2-4-13 THC Terminal Handing Charge 码头费2-4-14 ORC Original Receiving Charge码头费2-5 PUR Purchasing采购2-5-1 FOB Free on Board货运至甲板2-5-2 CIF Cost Insurance Freight2-5-3 OA Open Account 开户2-5-4 TT Telegram Transfer电汇2-5-5 COD Cash On Delivery 现金支付2-5-6 CRP Cost Reduction Program降低成本方案2-5-7 PR Purchasing Requisition采购申请2-5-8 PO Purchasing Order采购单2-5-9 LT Lead Time 交期2-5-10 LLT Long Lead Time 长时间交期2-5-11 Payment term 付款条件2-5-12 Debit note 扣款2-5-13 CRP Cost Reduction Program 降价计划2-5-14 Quotation 报价3 MFG Manufacturing Production制造控制3-1 DL Director Labor直接人工3-2 IDL Indirect Labor间接人工3-3 DLH Direct Labor Hours直接工时3-4 Productivity=UTS/DLH3-5 PPH Pieces Per Hour每小时件数3-6 Efficiency=Actual/Target(%)3-7 DT Machine Down Time停机时间3-8 AI Auto Insertion自动插入3-9 MI Manual Insertion人工插入3-10 SMD Surface Mount Device表面粘着零件SMT Surface mount technology 表面粘着技术3-11 B/I Burn In (for how many hours at how many degree)烧机3-12 Equipment Utilization3-13 WI work instruction 工作说明3-14 SOP standard operation procedure作业指导书3-15 R/I run in 运转机器3-16 ESD electrical static discharge 静电释放3-17 MP mass production 量产3-18 EMC Electro Magnetic Compatibility, 电磁兼容性3-19 EMI Electro Magnetic Interference, 电磁干扰3-19 SIR Surface Impedance Resistance 表面阻抗测试4 Engineer工程4-1 PE Products Engineer; 产品工程Process engineer制程工程4-2 TE Test Engineer测试工程4-3 ME Manufacturing Engineer;制造工程Mechanical Engineer机械工程4-4 IE Industrial Engineer工业工程4-5 DCC Document Control Center文管中心4-6 BOM Bill Of Material材料清单4-7 ECN Engineering Change Notice工程变动公告4-8 TECN Temporary Engineering Change Notice工程临时变动公告4-9 ATY Assembly Test Yield Total Yield直通率4-10 TPM Total Productivity Maintenance全面生产维护4-11 PM product manager ;project manager 产品经理;项目经理4-12 ECR engineering change request 工程变更申请4-13 ECO engineering change order 工程变更指令4-14 EN engineering notice 工程通告4-15 WPS work procedure sheet 作业说明书4-16 ICT in circuit test 电路测试4-17 P/R pilot run ;C/R control run; T/R trial run试做4-18 EVT engineer verification test工程验证测试4-19 DVT design verification test 设计验证测试4-20 MVT multi-verification test 多项验证测试4-21 ORT on going reliability test 出货信赖性测试4-22 S/W software 软件4-23 H/W hardware 硬件4-24 EAR Engineering Aanlysis Request 工程分析需求4-25 ECE Engineering Change Estimation 工程变更评估4-26 ECC Engineering Change Cancellation 工程变更取消4-27 IEM Internal Engineering Meno 内部工程备忘录4-28 PAS Part Approval Sheet 零件承认书4-29 DAB Daily Action Boaed 日常工作广告牌4-30 TMR Tooling Modify Report 修模协议书4-31 CRT Control Run Testing 试产测试4-32 DCD Design Change Description 设计变更通知4-33 ESR Engineering Study Report 工程研究报告4-34 EI Engineering Information 工程讯息4-35 PMP Process Management Plan 制程管制计划4-36 MBO Management By Object 目标管理4-37 KPI Key Performance Indicator 重点绩效指标4-38 PIP Part Inspection Plan 零件检验标准4-39 CTF Criticle To Function 功能重点尺寸4-40 CTA Criticle To Assembly 组装重点尺寸4-41 R&D Research and Development 研究与开发4-42 GR&R Gauge Repeatability and Reproducibility 治具重复性及重现性验证4-43 Cpk 制程能力指标4-44 FAI First Article Inspection 首件检查表5 QA Quality Assurance质量保证QRA Quality & Reliability Assurance质量与可靠性保证5-1 MQA Manufacturing Quality Assurance制造质量保证5-2 DQA Design Quality Assurance设计质量保证5-3 QC Quality Control质量控制5-4 IQC Incoming Quality Control进货质量控制5-5 VQC Vendor Quality Control售货质量控制5-6 IPQC In Process Quality Control制程质量控制5-7 OQA Out going Quality Control 出货质量控制5-8 QE Quality Engineer质量工程5-9 AQL Acceptable Quality Level可接受的质量水平5-10 DPPM Defective Pieces Per Million units百万件中有损件数5-11 PPM Pieces Per million百万分之一5-12 CS Custom Service顾客服务5-13 MRB Material Review Board 材料审核委员会5-14 DMR Defective Material Report材料缺陷报告5-15 RMA Return Material Administration材料回收处理5-16 Life Test 寿命测试5-17 T/C Temperature Cycle温度循环5-18 H/T High Temperature Test高温测试5-19 L/T Low Temperature Test低温测试5-20 ISO International Standard Organization国际标准化组识5-21 SPC Statistic process control统计过程控制5-22 "5S" 整理.整顿.清理.清扫.素养5-23 VMI visual mechanical inspection 外观机构检验5-24 MIL-STD military standard 美军标准5-25 SPEC specification 规格5-26 A VL approval vendor list 合格厂商名单5-27 QVL qualified vendor list 合格厂商名单5-28 FQC final quality control 最终质量控制5-29 OBA open box audit 成品检验5-30 EAR engineering analysis request 工程分析需求5-31 FAI first aide inspection 首件检验5-32 VQM vendor quality management 厂商质量管理5-33 CAR corrective action request 改进对策要求5-34 4M man; machine; material; method 人、机、材、方法5-35 M man;machine;material;method;measurement 人、机、材、方法测量5-36 MTBF mean time between failure平均寿命5-37 TTL total 总量5-38 MRT Markeing Relability Testing 信赖性测试5-39 8 D 8 Disciplines5-40 Q7 Method (Stratification: Histogram; Pareto; Scatter; (Cause & effect diagram) Fish Bone; (Check sheets); (Graphs & Control Chart)5-41 6 Sigma5-42 3 W What, Who, When5-43 2 Q Quality and Quantity5-44 1 G 1 Goal 一个目标6 FIN Finance &Accounting财务与帐目6-1 P&L Profit &Lose6-2 PV Performance V ariance现象差异6-3 3 Element of Cost=M,L,O6-4 M Material材料6-5 L Labor人力6-6 O Overhead管理费用6-7 Fix OH Fix Overhead固定管理费用6-8 Var OH Variable Overhead不定管理费用6-9 COGS Cost Of Goods Sold工厂制造成本6-10 AR Account Receivable应收6-11 AP Account Payable应支7 MIS Management Information System资迅管理系统7-1 IS Information System资迅系统7-2 IT Information Technology 系统技术7-3 MRP Material Requisition Plan材料需求计划7-4 I2 Information Integration System资迅整合系统7-5 SAP System Application Programming系统申请项目7-6 ERP Enterprise Resource Programming企业资源项目8 HR Human Resource人力资源8-1 PR Public relation公共关系8-2 T/O Turn Over Rate =Monthly T/O Total People*128-3 GR General Affair总务SP,Service Provider的缩写,可以直译成服务提供商CP,Content Provider的缩写,即内容提供商3G,3rd Generation的缩写,指第三代移动通信技术NGN:Next/New Generation Network的缩写,下一代网络或新一代网络SMS,Short Messaging Service的缩写,也就是短信MMS,Multimedia Messaging Service的缩写,中文意为多媒体短信服务IVR, Interactive Voice Response的缩写,表示互交式语音自动应答系统WAP,WirelessApplicationProtocol的缩写,意为无线应用协议WML,Wireless Makeup language的缩写,无线注标语言BREW,Binary Runtime Environment for Wireless 的缩写,是QUALCOMM公司为无线数据应用程序开发和执行提供的通用内容J2ME,Java 2 Platform micro Edition的缩写,JA V A2的微型版本只支持JA V A标准规范中所定义的核心类函数库的子集GPS,GlobalPositioningSystem的缩写,即全球卫星定位系统GSM,Global system for Mobile communications的缩写,全球移动通讯系统UMTS,Universal Mobile Telecommunication System的缩写,通用移动通信系统GPRS,General Packet Radio Service的缩写,通用分组无线业务EDGE,Enhanced Data Rate for GSM Evolution的缩写,即增强型数据速率GSM演进技术CDMA,Code Division Multiple Access的缩写,表示码分多址、扩频多址品質人員名稱類{0V fS$ksQC quality control 品質管理人員W u9FQC final quality control 終點品質管制人員$A NxW^8IPQC in process quality control 制程中的品質管制人員\k 5i0dt `OQC output quality control 最終出貨品質管制人員R @- &5-IQC incoming quality control 進料品質管制人員>7 Z -7aTQC total quality control 全面質量管理x }@c-Jh:8POC passage quality control 段檢人員f<U esZD|4QA quality assurance 質量保證人員 Dz{s>WOQA output quality assurance 出貨質量保證人員;!Cm.bTx2%QE quality engineering 品質工程人員 -#gU!(~}3v I0^品質保證類 d m Z[.xxFAI first article inspection 新品首件檢查7Fb +A-V|FAA first article assurance 首件確認}YUvX-/$tSCP capability index 能力指數CPK capability process index 模具製程能力參數 [[SSQA standardized supplier quality audit 合格供應商品質評估 6SwthO:{ FMEA failure model effectiveness analysis 失效模式分析M n_6 ]d ^c f >FQC運作類M 4zW*Fl<-AQL Acceptable Quality Level 運作類允收品質水準 :K7K1 h_^S/S Sample size 抽樣檢驗樣本大小 '^:n3LACC Accept 允收Ks(4p[/8E|REE Reject 拒收` I ^KV\@WCR Critical 極嚴重的i )l3_h.QMAJ Major 主要的QaP 8h),mMIN Minor 輕微的=Y 9 tQ/R/S Quality/Reliability/Service 品質/可靠度/服務'4 $ W+zP/N Part Number 料號YI @<@[+Y7L/N Lot Number 批號e |%G Sp%AOD Accept On Deviation 特采l QSc|Y 8UAI Use As It 特采 r~ ! -FPIR First Piece Inspection Report 首件檢查報告=m$ T F>PPM Percent Per Million 百萬分之一0 qVC %Hmihbw8U I4^制程統計品管專類O`\c \x(ISPC Statistical Process Control 統計製程管制 r+oI 3 fPSQC Statistical Quality Control 統計品質管制 ,` wl aBGRR Gauge Reproductiveness & Repeatability 量具之再制性及重測性判斷量可靠與否lNw m BDIM Dimension 尺寸iLjB E AnDIA Diameter 直徑,u>f7 U y-N Number 樣品數- 6i4 |4n P j LI?其它品質術語類x,!xWs-FAQIT Quality Improvement Team 品質改善小組;= R6v"uFZD Zero Defect 零缺點O GD'@0QI Quality Improvement 品質改善UKCcq AXQP Quality Policy 目標方針B7|-eeu,RTQM Total Quality Management 全面品質管理hzY7*Y7M(<RMA Return Material Audit 退料認可O N QB%YC7QCTools 7 Quality Control Tools 品管七爱猫扑.爱生活I$ 5J7b4wry [t,3`OQ通用之件類=> M-y W]IECN Engineering Change Notice 工程變更通知(供應商) Y"CI {6 RrECO Engineering Change Order 工程改動要求(客戶) &_ $_jU 0sPCN Process Change Notice 工序改動通知-W oms|T63PMP Product Management Plan 生產管制計劃 d84^08 {SIP Standard Inspection Procedure 製程檢驗標準程序)ex,`R {?cSOP Standard Operation Procedure 製造作業規範 NIT"~6iIS Inspection Specification 成品檢驗規範}r%k, KIJBOM Bill Of Material 物料清單 .A 5M#^ <oPS Package Specification 包裝規範p6!.. W HSPEC Specification 規格f dZ ! I +DWG Drawing 圖面FwHaU\< 0?Cy fh 4B.T系統文件類 = kR /_ES Engineering Standard 工程標準"e9g|"z3 pCGOO China General PCE龍華廠文件 G; ]R \IWS International Workman Standard 工藝標準\a#8 Q{MISO International Standard Organization 國際標準化組織mC-C '3@GS General Specification 一般規格 ;$) S{Sd;aKGuN4M部類^eTzq "YPMC Production & Material Control 生產和物料控制o de \pb8PCC Product control center 生產管制中心E tJ/ 5xJPPC Production Plan Control 生產計劃控制 SOe"KzPDMC Material Control 物料控制p9+X)<EUJDC Document Center 資料中心 r; 7 ^QE Quality Engineering 品質工程(部) LwV*79 L7QA Quality Assurance 品質保證(處) v/pCrJ|+JcQC Quality Control 品質管制(課) ]1~c=--OPD Product Department 生產部 CGx% $ LJLAB Laboratory 實驗室nkHo B 5IE Industrial Engineering 工業工程 + </B =.R&D Research & Design 設計開發部@O*% a "生產類 [m -% I`PCs Pieces 個(根,塊等) ]{ KqoY#PRS Pairs 雙(對等) 0|&,9 e!:CTN Carton 卡通箱\ & `;-;=,PAL Pallet/skid 棧板97f r>M7LPO Purchasing Order 采購訂單m @2 /]hMO Manufacture Order 生產單0s , 6ag @D/C Date Code 生產日期碼 SZ \xz 4ID/C Identification Code (供應商)識別碼 mm 3 T5=ESWR Special Work Request 特殊工作需求7AL/N Lot Number 批號qm: #&CH'iP/N Part Number 料號y 3/ghJ_0aOEM Original Equipment Manufacture 原設備製造!R4a- ['PC Personal Computer 個人電腦e{= #K:!#MCPU Central Processing Unit 中央處理器k D9* {wA.S.A.P As Soon As Possible 盡可能快的 I[ Pr!f:E-MAIL Electrical-Mail 電子郵件 />Fj tI 6N/A Not Applicable 不適用z %' = [QTY Quantity 數量r`0lO4s9yI/O input/output 輸入/輸出 -c (R gNG Not Good 不行,不合格 m~)iKUYB/C=0 Critical=0 極嚴重不允許4ze X.38y.APP Approve 核準,認可,承認e6_,<sw7 4CHK Check 確認@5D @t |gSASS'Y Assembly 裝配,組裝Z Zhz 4fbMT/P True Position 真位度%2Q 6Ow!5WIH When, Where, Who, What, Why, How to &6H O6 x-6M Man, Machine, Material, Method, Measurement, Message WRK< W # L4MTH Man, Material, Money, Method, Time, How 人力,物力,財務,技術,時間(資源) -1:9z^: ESQA Strategy Quality Assurance 策略品質保證I=a Ew gvDQA Design Quality Assurance 設計品質保證"A! OPs[MQA Manufacture Quality Assurance 製造品質保證b(w/WY] ZSSQA Sales and service Quality Assurance 銷售及服務品質保證R;?eH1G,qLRR Lot Reject Rate 批退率 GJ@I#1 -SPS Switching power supply 電源箱G * m t dDT Desk Top 臥式(機箱) wVIk*~, nMT Mini-Tower 立式(機箱) ET*/!d>Y#jDVD Digital Video Disk e 2gs VJVCD Video Compact Disk -%dh=;<d =LCD Liquid Crystal Display i1 EB9}VeCAD Computer Aided Design $k &Q^ |c-CAM Computer Aided Manufacturing n "_>sH)\CAE Computer Aided Engineering ~T/wxFR`bPCB Printed Circuit Board 印刷電路板qChR $lc GCAR Correction Action Report 改善報告J !<v eNNG Not Good 不良2 - Kn:qzWDR Weekly Delivery Requirement 周出貨要求c8z U I o<PPM Percent Per Million 百萬分之一XG a YN~ zTPM Total Production Maintenance 全面生產保養Gi-x F?gbMRP Material Requirement Planning 物料需計劃< ud`v V.EOS Operation System 作業系統W DNPe !EOTBA To Be Assured 待定,定缺CoH=X1"Q\GD/C Drawing Change Vf] 3 RV+P/P Plans & Procedure 4=q~O|" >EMI Electrical-Music Industry 電子音樂工業 s)O& 33Electrical Magnetic Interference 電子干扰8d l pARFI Read Frequency Input 讀頻輸入$f} h AMMC Maximum Material Condition F |G)ZQ fMMS Maximum Material Size D CP SESsLMC Least Material Condition iy !#TSN 1LMS Least Material Size \\ (V4* EFLED lighting-emitting diode 發光二极管-v Y.b gHQBR Quarter Business Record d g W@ .6gCIP Continuous improvement process }@&lToR, fFGI Forecasted Goal Inventory 1 # -7% Q)CNC Computerized numeral controller D@B8 VUUjB2C Business to customer H <&XueB2B Business to business Y-ATO0]; AA VL Approved vendor list Kp= TL=POP Procedure of packaging rnv vIaG?:EOL End of life ? ~n:^CVDCS Vender defect correcting sheet ^ NXN]37PDCS Process defect correcting sheet 6 5#i @&JGRN Goods receiving note {` ]|#-u &A/R Accounting receivable _+cU4ZTYXxA/P Accounting payable外贸知识缩写大全`©烟台俺家网苑论坛-- 烟台俺家网苑论坛,烟台本地最温馨的网络家园!]wjm; Bal.----------------------Balance 差额c/- (or c/s)---------------cases 箱PP0bar. or brl.--------------barrel 桶; 琵琶桶ca.; c/s; cs.--------------case or cases 箱vm3B.B. clause---------------Both to blame collision clause 船舶互撞条款C.A.D.; C/D----------------cash against documents 付款交单W_1|+B/C-----------------------Bills for collection 托收单据canc.----------------------cancelled 取消; 注销ehT"#6B.C.----------------------before Christ 公元前 C.A.F.---------------------Cost,Assurance, Freight "!?Q,b.d.----------------------brought down 转下---------------------------(=C.I.F.) 成本加保费. 运费价L^>OB.D.----------------------Bank draft 银行汇票canc.----------------------cancel, cancelled,cancellation取消; 注销;Wz"Bill----------------------Discounted 贴现票据canclg.--------------------cancelling 取消; 注销5 b.d.i.--------------------both dates inclusive 包括首尾两日cat.-----------------------catalogue 商品目录v]+aFbdle. ; bdl.--------------bundle 把; 捆C/B------------------------clean bill 光票\cQb.e. ; B/E ; B. EX.-------Bill of Exchange 汇票C.B.D.---------------------cash before delivery 先付款后交单/dwJlXB.f.----------------------Brought forward 接下页 c.c.-----------------------cubic centimetre 立方厘米;立方公分7/B/G-----------------------Bonded goods 保税货物c.c.-----------------------carbon copy 复写纸;副本(指复写纸复印的)x,|Hkbg. ; b/s-----------------bag(s) 袋C.C.-----------------------Chamber of Commerce 商会D;m3SC bkg.----------------------backing 银行业务 C.C.I.B.-------------------China Commodity Inspection Bureau 中国商品检验局DNcKKbkt.----------------------basket 篮; 筐C/d------------------------carried down 转下:Y}Z<Hbl.; bls.-----------------bale(s) 包cent-----------------------centum(L.) 一百kCBlading-------------------Bill of Lading 提单Cert. ; Certif.------------certificate ; certified 证明书; 证明N/=j"Rbldg.---------------------building 大厦c.f.-----------------------Cubic feet 立方英尺`B/ldg.--------------------B/L Bill of Lading 提单C/f------------------------Carried forward 接后; 结转(下页) -dKHbls.----------------------Bales 包, barrels 桶cf.------------------------confer 商议; Compare 比较qy%1bot. ; bott. ; btl--------bottle 瓶C.& F.---------------------Cost and Freight 成本加运费价格:o br.-----------------------brand 商标; 牌CFS; C.F.S.----------------Container Freight Station 集装箱中转站; 货运站H9C4RBrkge.--------------------breakage 破碎Cg.------------------------Centigramme 公毫U[fG0 brls.---------------------barrels 桶; 琵琶桶C.G.A.---------------------Cargo's proportion of General Average 共同海损分摊额/w{Gb/s-----------------------bags; bales 袋; 包cgo.-----------------------cargo 货物A"7Bs/L----------------------Bills of Lading 提单(复数) chges.---------------------charges 费用%a btl.----------------------bottle 瓶Chq.-----------------------Cheque支票-!6iybu.-----------------------bushel 蒲式耳C.I.-----------------------Certificate of Insurance 保险凭证; **1bx.-----------------------box 箱---------------------------Consular Invoice 领事发票; 领事签证kwgzobxs.----------------------boxes 箱(复数), 盒(复数) C.I.F----------------------Cost lnsurance Freight 成本.保险费加运费价格)oO3C.I.F. & C.----------------Cost lnsurance Freight & Commission 成本. 保险费加运费. 佣金价格X?aSd.----------------------denarii (L) , panny or pence 便士C.I.F. & E.----------------Cost Insurance Freight & Exchange 成本. 保险费. 运费加汇费的价格,:U-a-D/A---------------------Document against Acceptance 承兑交单 C.I.F. & I-----------------Cost Insurance Freight & Interest 成本. 保险费. 运费加利息的价格Ld/a---------------------days. after acceptance 承兑后若干天(交款) C.I.O.---------------------Cash in Order; Cash with order 订货时付款|l U4D.D. ,D/D--------------Demand draft 即期汇票;Delivered at docks 码头交货cks.-----------------------casks 桶t<tlD/d---------------------documentary draft 跟单汇单cl.------------------------class; clause 级; 条款; 项,Yv(zaDec.--------------------December 十二月CLP------------------------Container Load Plan 集装箱装箱单R='deld--------------------delivered 交付cm-------------------------centimetre 厘米; 公分K$y^ dely.-------------------delivery 交付; 交货cm2------------------------square centimetre 平方厘米; 平方公分xXm]dept.-------------------department 部; 股; 处cm3------------------------cubic centimetre 立方厘米; 立方公分^M;7/destn.------------------destination 目的港;目的地CMB------------------------国际公路货物运输条约t1F%vD/f---------------------dead freight 空舱费CMI------------------------Comit'e Maritime International 国际海事委员会:\|drt.--------------------draft 汇票c/n------------------------cover note 暂保单; 预保单"1diam.-------------------diameter 直径CNC------------------------新集装箱运输p{Fp7diff.-------------------difference 差额; 差异Co.------------------------Company 公司5dis. , disc't-----------discount 贴现; 折扣; 贴现息c/o------------------------care of 转交bN/q] dls. ; Dolls.-----------dollars 元C/O ; c.o.-----------------Certificate of origin 产地证明书*,!`uU Dmge--------------------Damage 损坏 c.o.d. ,C.O.D.-------------Cash on delivery or Collection delivery 货到付款vdestn.------------------destination 目的港; 目的地COFC-----------------------Container on Flat Car 平板车装运集装箱5+pD/N---------------------debit note 欠款账单Com.-----------------------Commission 佣金6V@Yy doc.--------------------document 单据Con.inv.-------------------Consular invoice 领事签证发票CEzLkdoc. att.---------------document attached 附单据; 附证件Cont. ; Contr.-------------Contract 合同; 合约H$tdols. ; dolls.----------dollars 元Contd.---------------------Cotinued 继续; 续(上页) :)D/P---------------------document agsinst payment 付款交单Contg.---------------------containing 内容DdO)"doz.--------------------dozen 打Corp. ; Corpn. ; cor.------corporation 公司; 法人n >twd.p.--------------------direct port 直达港口C/P ; c. py.---------------charter party 租船契约tQd/s ;d.s. ; days. st.---days after sight 见票后若干天付款 C.Q.D.---------------------Customary Quick Despatch 按习惯速度装卸uds. ; d's.--------------days 日Cr.------------------------Credit 贷方; 信用证; Creditor 债权人nA dto. ;do--------------ditto 同上;同前Crt.-----------------------crate 板条箱\d. t.-------------------delivery time 交货时间Ct.------------------------Cent 人; Current 当前; 目前f1|dup. ; dupl. ; duplte.--duplicate 誊本;第二份;两份Credit---------------------贷方; 信用证lTz D.W.T.------------------dead weight tonnage 载重吨C.T.D.---------------------Combined transport document 联合运输单据iD/Y---------------------delivery 交付;交货CT B/L---------------------Combined transport bill of Iading 联合运输提单_*MCdz.;doz.--------------dozen 打C.T.O.---------------------Combined transport operator 联合运输经营人[cu. cm. ; cb. cm-----------cubic centimetre 立方厘米; 立方公分g5}cu. in. ; cb. in.----------cubic inch 立方寸QCS+|kea.-----------------each 每cu.m. ; cb. m.-------------cubic metre 立方米; 立方公尺6E.C.----------------Exempli causa(for example)例如cu.ft. ; cb.ft.------------cubic foot 立方英尺,BZE/D-----------------Export Declaration 出口申报单cur. ;---------------------Curt current (this month) 本月|E.E.----------------errors excepted 错误当查;错误当改cur.-----------------------currency 币制qR#oE.E.C.--------------European Economic Community 欧洲共同体cu.yd. ; cb. yd.-----------cubic yard 立方码5!e. g. ; ex. g.------Exempli gratia (L.) =for example 例如C.W.O.---------------------cash with order 订货时付款Mend-----------------endorsed ; endorsment 背书c.w.t. ; cwt.--------------hundredweight 英担(122磅) %encl. ; enc.------- enclosure 附件CY-------------------------Container Yard 集装箱堆场13~<9: E.& O.E.------------errors and omlssions excepted 错漏当查;错漏当改dWE.O.M.--------------end of month 月末U,#E.O.S.--------------end of season 季末GwXVDeq.-----------------equivalent 等值的;等量的F-----------------degree Fahrenheit 华氏度数p%:w'me.q.----------------equal quantity monthly 每月相等的数量F. A.-------------free alongside (ship) (船)边交货6IEt. seq.------------Et sequentia(and other things)及以下所述的f/a/a ; F.A.A.----free from all average 分损不赔(保险用语)CE8bEt. al.-------------Et alibi(and elsewhere)等等f.a.c.------------fast as can尽快a$je.t.a. ; eta ; ETA--estimated ( expected ) time of arrival 预计到这时间f.a.q. ; F.A.Q.---fair average quailty 大路货;中等品质n"S8etc.----------------et cetera (L.)= and others 等等f.a.s. ; F.A.S.---free alongside ship 船边交货价'$ETCL ; etcl---------expected time of commencement of loading 预计开装时间F.B.--------------freight bill 运费单9h`6aetd ; ETD-----------estimated(expected)t ime of departure 预计离港时间fc.---------------franc 法郎^SETDEL---------------expected time of delivery 预计交货时间Fch.--------------frachise 免赔率(一般指相对的)rETFD----------------expected time of finishing discharging 预计卸完时间FCL---------------Full Container Load 整箱货}ETFL----------------expected time of finishing loading 预计装完时间F.C. & S.---------free of capture and seizure clause 战争险不保条款?(Dex------------------per or out of 搭乘f.e.--------------forexample 例如vex.-----------------excluding 除外;example 例子;样本Feb---------------February 二月mblcE Exch----------------exchange 兑换;汇兑f.f.a.------------free from alongside 船边交货价@z Excl.---------------exclusive or excluding 除外f.g.a.;F.G.A.--free from general average 共同海损不赔z`Zex.int.------------ex interest 无利息f.i.--------------for instance 例如;free in 船方不负担装船费Ww9:-exp.----------------export 出口f.ig.-------------figure 数字PTSExs.----------------expenses 费用f.i.o.------------free in and out 船方不负担装卸费A`=nExt.----------------extra 特别的;额外的f.i.o.s.----------free in, out and stowed 船方不负担装卸费及理舱费D<Q]Ef.i.o.s.t.--------free in, out, stowed and trimmed 船方不负担装卸费.理舱费及平舱费ef*zXg.----------------------gram 克;公分 f.i.w.------------free in wagon 承运人不负担装入货车费~png=G.A.;G/A-------------General Average 共同海损(保险用语)FI.oz.------------fluid ounce 液唡$agal.--------------------gallon 加仑F/O---------------in favor of 交付给…;以…为受益人v5oxT gds.--------------------goods 货物f.o.--------------free out 船方不负担卸货费Pu!4gm.---------------------gram 克;公分F.0.A.------------free on aircraft 飞机上交货价。
无线数据传输模块(DTU)外文翻译
外文文献:A Detailed Implementation and Analysis of Data Center of GPRS DTUZhen Yu Dept. of Automation Xiamen UniversityXiamen, China****************.cnZhong Zheng Dept.of AutomationXiamen UniversityXiamen, China*********************Abstract—This paper gives an overview of the architecture of the telecontrol system based on GPRS. The objectives of this paper are two fold. One is to present the design and implement of the data center of GPRS DTU. The other is to investigate its performance. According to the features of GPRS DTU, data center provides reliable communication between members of a group by implementing the telecontrol system in the client/server model. With the use of the data center, it is of practical significance to implement multiple master stations to receive data from all slave stations simultaneously and to control all slave stations in parallel. The data center design parameters include real- time control, deployment simplification and the ability to provide high availability, scalability and reliability.Keywords-GPRS DTU; data center; telecontrol system; master station; slave stationI.I NTRODUCTIONIn recent years, it is a major trend to use wireless networks in the large-scale industrial production systems to control and manage the components which scattered in the different remote areas. In order to ensure the appropriate operation of the system, these components must be operated under the unified command to coordinate the work among them through the scheduling agencies.The scheduling agencies should keep abreast of the actual production situations of the various parts. On this basis it can make regulation and control strategies on time. With the rapid development of network technology, the telecontrol technology which is the combination of scheduling management and modern control technology can not only meet the real-time dispatch, but also ensure high reliability. For implementing efficient measuring and monitoring processes, it’s facility for the telecontrol system to transmit the information through the use of wireless networks. One prominent communication technology for this service is the GPRS. Thus, under the premise of lowering the cost and enhancing the competitiveness, more and more enterprises are applying the GPRS technology to replace the traditional long distance leased line. In this paper, we give a detailed implementation of public network access solution and analyze its performance.II.C HARACTERISTIC OF GPRS NETWORK The most widely deployed public mobile data network, which enables the integration of IP with mobile networks and constitutes a migration step toward third-generation communication systems, is the General Packet Radio Service (GPRS) [1]. GPRS attempts to reuse the existing Global System for Mobile Communication (GSM)network elements as much as possible, but in order to effectively build a packet-based mobile cellular network,some new network elements, interfaces, and protocols are required [1]. The new network nodes are called GPRS support nodes (GSNs). The SGSN is responsible for the delivery of data packets from and to the mobile station(MS) within its service area [2]. The GGSN acts as an interface between the GPRS backbone network and the external packet data network [2]. GPRS supports applications based on standard protocols for packet-switch data communication. The standards include interworking procedures with IP and X.25 networks [3]. This makes the realization of the GPRS services feasible, when GPRS exchanges information with the external networks which based on the IP protocol suite, such as Internet.The traffic characteristic of the packet-mode data effectively supported by GPRS ranges from intermittent, bursty data transfer, to frequent transmission of “sma ll”amount of data, to occasional transmission of “large”amount of data [3]. An important benefit of GPRS is that the radio channels in GPRS are shared between multiple Mobile Stations (MS). Second, multiplexing on the air interface permits efficient support of bursty traffic [3]. GPRS transmission rate can be raised to 56 or even 114 Kbps. Moreover, connections and transmission will be more convenient and easier, for they no longer need the intermediary converters among the existing wireless applications [3]. More importantly, once activate the GPRS applications, it will always remain online. However,mobile subscribers only pay according to the amount of information transferred, not in terms of the occupied time.III.D EMAND ANALYSIS FOR THE TELECONTROLSYSTEMThe telecontrol system is a broad term which refers to the system of monitoring and controlling the production process. The equipments which constitute the telecontrol system include the factory station, the scheduling station and the telecontrol channel. Traditionally and customarily, we call the factory station and the scheduling station as the slave station and the master station respectively.In the sequel, the proposed telecontrol system based on GPRS deployment scenario is presented and analyzed. The system requires to provide with the conveniences for easy installation, easy usage, remote manageable, easilyexpand, and only takes up little bandwidth for transmitting monitorFigure 1. The architecture of the telecontrol systemand management information, etc. As shown in Fig. 1, some of the key components of the architecture are as following:GPRS DTU is the abbreviation for GPRS Data Terminal Unit. In simple terms, DTU is the GPRS wireless device which specially applied to transmit the serial data through the GPRS networks. DTU provides serial communication interface, such as RS-232 or RS-485. Every station connects with the GPRS DTU through RS- 232. In practice, each GPRS DTU needs a build-in SIM card which was used to apply for GPRS services.The master station is the monitor and management center, which provides a convenient and integrated user interface; with easy installation and usage, as well as allowing for telecontrol and teleadjusting. Relatively, the slave station is the remote terminal unit, which is responsible for data acquisition and transmission.The data center implements the communication among numbers of DTUs though the use of Client/Server model. The data center acts as a server, maintaining and managing bidirectional communication between the master stations and slave stations though DTUs. In such a communication model, where all stations are connecting to the data center, and data transfer is carried out using mobile devices (such as GPRS DTU), stability and real-time are considered paramount.IV.F UNDAMENTALS OF GPRS DTUA.Working ProcessOnce the GPRS DTU powers on, it firstly reads out the internal flash saved operating parameters which include GPRS dial-up parameters, serial port baud rate, the data center IP address and port number, and so on. After the success of a dial-up, a internal IP address will be randomly allocated to GPRS DTU. In other words, GPRS works in a mobile network, but its network IP addresses are not usually fixed but changed along with each dial-up.It means that GPRS DTU is a mobile device within the internal LAN (Local Area Network) and communicates with the external public Internet network through the mobile gateway (GGSN). So it is impossible to communicate between the master station and the slave station directly. But DTU can connect to the data center with a fixed public network IP address or domain name automatically and keep this communication link on line. Therefore, GPRS DTU needs to take the initiative to connect to the data center.Specifically, GPRS DTU initiates a TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) communication request to the data center though the data center IP address and port number which were configured in advance. After receiving the response from the data center, GPRS DTU makes a successful handshake with the data center and maintains the communication link. If the communication link was interrupted, GPRS DTU would immediately re-handshake with the data center.Then the TCP/UDP bidirectional communication links between GPRS DTU and the data center have been set up.GPRS DTU have integrated TCP/IP protocol stack, so it’s relatively simple to complete the conversion between user serial data and GPRS network packet. While receiving the user’s serial data, GPRS DTU immediately encapsulates the serial data into a TCP/UDP packet and sends it to the data center. Conversely, when GPRS DTU receives the TCP/UDP packet from the data center, it will extract useful data from the packet, and send the data to the user equipment through the serial port at once.More importantly, one of the advantages of GPRS networks is that it supports GPRS terminal equipments to keep online permanently, so typically GPRS DTU is designed to support this function. It requires that the features of GPRS DTU include automatically dial-up, maintaining a permanent online, supporting re-connection automatically, and so on.B.Heartbeat PacketWhen there is no data transmission for a certain time, the mobile gateway will disconnect the communication link between the data center and GPRS DTU automatically. For maintaining the connection online,DTU heartbeat packet would be send before this link is disconnected. The problem is how long did DTU heart packet be send. If the send-time interval was set too long,there is no data transmission. Then the mobile gateway interrupts the link. On the contrary, the data center ca n’t receive the heartbeat packet on time because of the wireless network delay. On the earth, GPRS DTU will determine that the communication link has disconnected and re-connect automatically. No matter what kind of situations, it will increase instability to the telecontrol system.Fig. 2 shows the experimental results for setting the send-time interval of the heartbeat packet analysis. One observation is that GPRS DTU always re-connects to the data center per 160 seconds more or less, when the send-time interval of the heartbeat packet was set as 60 seconds in Xiamen, China. So we reset the time parameter as 160seconds, it greatly improve the reliability and stability of the system.Figure 2. The reconnected time intervalFigure 3. The frame format of DTU register packetC.Register PacketOnce the TCP communication link between GPRS DTU and the data center was set up successfully, the DTU sends the register packet to the data center at first. As shown in Fig. 3, the content of the register packet includes identification (ID) number to identify GPRS DTU, SIM card number for opening GPRS services, and dynamic IP address being allocated. After the data center receives the register packet, it will get hold of the basic information of GPRS DTU. Since the ID number is unique and fixed, it can be used as the station address to identify DTUs or stations naturally. By extracting the ID number from the register packet, it’s easy to establish and maintain a DTU list to record the connection status of the all stations.The aforementioned discussions are both necessary and sufficient for designing and implementing the telecontrol system. It is the data center that the normal communication between the master station and slave station depends entirely on through the use of GPRS DTU.V.DESIGN AND IMPLEMENT OF DATA CENTERA.Design ScenarioThe work in this paper primarily implements the functions of communication for the data center of GPRS DTU on the platform of VC++6.0 SP4 and Windows XP, which was built to evaluate the performance of remote access GPRS-Internet networks. For reaching a desired quality of service and maintaining the system in a reliable and stable operation, design and implement of the data center is very important. Furthermore, the aforementioned telecontrol system network topology is a star network. In a star network, the failure of a single link can not affect the performance of the whole system. However, if the data center fails, each station in the system will become disconnected. As shown in the Fig. 4, combining with the knowledge of network programming, the data center refers to as a socket interface which is a virtual interface that can be established between the transport layer and application layer of the TCP/IP Suite of protocol. From the perspective of reliability, the socket program should choose the SOCK_STREAM which based on reliable connection TCP (Transmission Control Protocol).The data center is fairly meaningless if it cannot service multiple clients at the same time, usually asynchronous I/O calls and multithreading is used for this purpose. By definition, an asynchronous I/O call returns immediately, leaving the I/O call pending. Nowadays, It is commonly known that asynchronous Input/Output Completion Ports (IOCP) is one of the most efficient ways. By using IOCP, we can overcome the “one-thread-per-client”problem. Threads are system resources that are neither unlimited nor cheap. IOCP provides a way to have a few I/O workers thread handle multiple client s’input/output “f airly”. The threads are suspended, and do n’t use the CPU cycles until there is something to do.When using asynchronous I/O calls, we have to provide a private buffer to be used with the I/O operation.There are some considerations that are to be taken into account when we allocate buffers to use. From the storage structure point of view, to allocate and free memory is expensive, therefore we should reuse buffers which have been allocated. We save buffers in the linked list structures. A list container represents noncontiguous memory. It is efficient to insert or erase an element at any point.Inserting or removing an element in a list container does not move any other elements. It significantly improved the efficiency of the data center.Figure 4. Flows of the data center softwareFigure 5. The frame format of the telecontrol informationmunication ProtocolIn the telecontrol system, in order to send and receive information correctly, there must a set of rules on the information transmission sequence, information format, information content and so on. Usually we call this set of rules as communication protocol. As shown in the Fig. 5, the telecontrol information of each frame begins with the synchronization word, as well as the control and information words. The most important thing is that the control word contains the ID numbers of the source station and destination station. The data center can properly forward the frame though the ID numbers of the destination station.C.Measurement ProceduresThe telecontrol system deploys two master stations and eight slave stations. We measure some metric performance in TCP mode. These metrics are used in our experiments as they have a direct impact on the ultimate performance. During our experiments, the following parameters were used to quantify the services provided.Overall transfer time: is the amount of time it takes one packet to travel from one station to another; the parameter is measured in seconds.Overall response time: consists of subtracting the time at which the telecontrol segment is sent from the time at which the acknowledgement arrives; the parameter is measured in seconds.D.Design issuesIn the telecontrol system, given a real-time control has been a key challenge to many designers. Real-time is an important design parameter in the whole system. There are two main factors that have a great impact on the real-time control.One is bandwidth of the communication channel. In GPRS, DTU can access the public data networks directly and easily using their standard protocol address. A GPRS MS (mobile station) can use between one and eight channels over the air interface. GPRS system has a very short access time to the network. The theoretical maximum throughput of the GPRS system is 160 kbps per MS when using all eight time slots without any error correction [4]. To fully exploit the high capacity of GPRS, the slave stations can periodically take the initiative to send the telecontrol messages to the master stations in accordance with a given order. And the master station transmit “larg e”amount of telecontrol information to all slave stations occasionally.Another key element is the forwarding rate of the data center. Deciding on the process structure of the data center is a major problem in the design of any service. The data center is required to operate efficiently in peek periods, when dozens of active stations need to be simultaneously. One of the best solutions for the data center architecture is the use of IOCP which has been discussed above. The real-time of the telecontrol system can be illustrated by overall transfer time and overall response time. As shown in the Fig. 6, overall transfer time is less than 5 seconds. And overall response time is approximately no more than 10 seconds. It basically reaches the ministerial standard real-time control.Another design issue involves fault tolerance. Communication faults, malicious attack, access violation should all be tolerated to some extent. A fault-tolerant system should continue to function, perhaps in a degraded form, when faced with these failures. In a typical connection, The GPRS DTU sends a message asking the data center to accept it, once it connected to the datacenter. The data center returns the accept approval to the GPRS DTU. The GPRS DTU acknowledges this approval and then is allowed onto the data center. A “denial-of-servi ce” attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service or accessing information. Usually one GPRS DTU connects to the data center for a long time, but it does n’t send a message asking the data center to accept it. Consequently prevent other GPRS DTUs from connecting to the data center on time, even disable the data center. One of the more common methods of blocking this attack is to set up a timer. The time of GPRS DTU connecting to the data center ca n’t exceed a given time(such as 60 seconds), or else the data center will close this vicious connection compulsorily.Still another issue is scalability –the capability of a system to adapt to increased service load. Systems have bounded resources and can become completely saturated under increased load. Even worse, expanding the system can call for expensive design modifications. A scalable system should have the potential to grow without these problems. In the telecontrol system, the ability to scale up gracefully is of special importance, since expanding the system by adding one or more new stations is commonplace. At first, No matter how many the number of slave station or master station increases, we can solve scalability and availability though the use of the forwarding function of the data center. The data center can forward the telecontrol information which received from the master station to all the slave stations, and vice versa. Secondly, with introducing the thread pooling and IOCP into Windows XP, Server applications make extensive use of thread pooling techniques to delegate client requests to worker threads, which is implemented as a thread pool so that they can achieve better throughput. After serving a client request, the thread goes back into the thread pool and gets ready to serve the next pending client’s request. Thread pooling will give better throughput, as less time is wasted in creating and destroying threads, because the application already has an idle pool of threads. The Fig. 7 (a) and (b) indicate clearly the purpose of this article is to cover a design that can be used to develop scalable data center without impacting performance.The last issue is parallel control. It is of practical significance to implement multiple master stations to receive data from all slave stations simultaneously and to control all slave stations in parallel. Each station can beuniquely identified with a physical address (ID number).Figure 6. The overall transfer time and overall response time But during the packet transmission, we can define that the all master stations deployed a unified virtual address to send and receive data. Once receiving a telemetering or teleindication packet whose destination address is the virtual address, the data center should forward the packet to all master stations. The virtual address plays as a multicast address. Similarly, for controlling all slave stations in parallel, we can define another virtual address.When the data center receives a telecontrol or teleadjusting packet with the defined address, it must multicast this packet to all slave stations. It is convenient and easy to carry out the parallel control though the data center.VI.CONCLUSION In this paper, a telecontrol system deployment scenario over the GPRS-Internet networks has been proposed and discussed in regard to real-time control, scalability, fault tolerance and parallel control. The primary objective of this paper is to present the design and implementation of the data center. In practice, it has been normally run for more than 7*24 hours. This work should be expanded to analyze from a security point of view. A key element of secure networking is the proper design and configuration of virtual private networks (VPNs) [5].R EFERENCES[1] GSM 03.60, “GPRS Service Description”, Stage 2, 1998.[2] Amitabh Mishra, “Performance and Architecture of SGSN andGGSN of General Packet Radio Service (GPRS)”, IEEE Press, pp.3494–3498 January 2001.[3] Christos Xenakis, Lazaros Merakos, “On Demand Network-wide VPNDeployment in GPRS”, IEEE Press, vol. 16, pp. 28–37, Nov.- Dev.2002.[4] Xiangguang Che, Hamalainen .S, Ryynanen.J, Moisio.M, “GPRSradio network performance simulation and optimization with dynamic simulator”, Proc. IEEE Symp. Communication Technology Proceedings (ICCT 2003), IEEE Press, pp. 935-939, doi: 10.1109/ICCT.2003.1209684.[5] B. Gleeson et al.,”A Framework for IP Based Virtual PrivateNetworks”, RFC 2764, Feb. 2000.Figure 7. The experiment results: (a) increase one master station (b) increase two slave stations中文译文:GPRS DTU 数据中心的详细实施及分析摘要:本文给出了一种基于GPRS远程控制系统体系结构的概述。
PACKET DELIVERY APPARATUS
专利名称:PACKET DELIVERY APPARATUS发明人:KAI WAI INGU,MAAKU JIEI KIYARORU 申请号:JP21926791申请日:19910806公开号:JPH04234248A公开日:19920821专利内容由知识产权出版社提供摘要:PURPOSE: To obtain packet switches to be increased for each modular without requiring any scheduling algorithm for a mutual connection network device. CONSTITUTION: The mutual connection network device is executed by two switching stages, one of the switching stages is a sort network 101 and the other consists of plural cell delivering devices 102, 103, 10. The sort network 101 has plural inputs for receiving simultaneously arriving data packets and plural outputs connected to one of the plural cell delivering devices 102, 103, 10. Plural packet switches 143 to 145 are connected to the outputs of the devices 102, 103, 10, but these switches 143 to 145 are not a part of the mutual connection network device. Preferably each packet switch is connected at least to one output of the devices 102, 103, 10 and each cell delivering device delivers a cell to any one of the data packet switches 143 to 145.申请人:AMERICAN TELEPH & TELEGR CO更多信息请下载全文后查看。
Oracle Communications Acme Packet 6300 Series 数据表说
Acme Packet 6300 Series combines groundbreaking performance,capacity, and system throughput with the most proven and comprehensive session delivery functions and features in the industry. Featuring the 3RU Acme Packet 6300 (see Figure 1) and Acme Packet 6350 Dual NIU and Acme Packet 6350 Quad NIU (see Figure 2), the 6300 Series is building the foundation for future generation Internet Protocol (IP) real-time communications (RTC) services.OVERVIEWAcme Packet 6300 Series is based on a next-generation hardware design that leverages state-of-the-art components and 64-bit symmetrical multiprocessing (SMP) in a modular system designed for growth and flexibility. It operates the same version of Acme Packet OS as all other Acme Packet platforms for ease of management and uncompromised field-proven functionality in many product configurations and options. The 6300 Series provides for flexible deployment at high-volume network access or interconnect borders or within the service provider signaling core.Figure 1: Acme Packet 6300Figure 2: Acme Packet 6350Breakthrough performance in a field- proven designAPPLICATIONS• Service provider SBC for access and interconnect applications• High -performance SIP session routing• Combination access SBC with IMS core and session management functionsKEY FEATURES• High -performance, purpose-built multiprocessor design• Acme Packet 6300, 6350 Dual NIU and 6350 Quad NIU feature three slots for modular flexibility • Market -leading Acme Packet OS functions, features and configurations• 40 Gb/sec (6300, 6350 Dual NIU and 6350 Quad NIU) system throughput• Leverages proven SBC design with state-of-the-art componentsKEY BENEFITS• Capable of supporting up to 3,000,000 simultaneous subscribers• Protects investment in existing SBC infrastructure• Meets all emerging service requirements in efficient 3RU (6300, 6350 Dual NIU and 6350 Quad NIU) form factor• Reduced total cost of ownershipBased on a common architecture that tightly integrates Acme Packet OS with Oracle’s distributed multiprocessor hardware, each platform in the 6300 Series can handle the signaling and media traffic generated by next-generation services such as voice over Long Term Evolution (VoLTE); rich communication services (RCS) and enhanced RCS (RCS-e), and high-definition video calling. It features Oracle’s car rier-class high availability (HA) and Network Equipment Building Systems (NEBS) certification to ensure nonstop operation and survivability in the most business-critical services and applications.ACME PACKET 6300 SERIES FLEXIBILITY, SCALE AND EFFICIENCYAcme Packet 6300 Series systems leverage common state-of-the-art components, design and system architecture. The 6300, 6350 Dual NIU and 6350 Quad NIU deliver up to 40 Gb/sec of system throughput.ACME PACKET 6300 SERIES PLATFORM FEATURES, CAPACITY, AND PERFORMANCEa. Actual number will vary based on features enabled and call mode.b. Configuration dependent, based on 180 sec ACHT.c. Based on 20ms delay and G.711 and G.729 codecs.Note: Performance and capacity based on Oracle Communications Session Border Controller v8.0 softwareACME PACKET 6300 SERIES SUPPORTED CONFIGURATIONSThe Acme Packet 6300 Series operates Acme Packet OS in a variety of high-end product configurations designed for a wide array of services and applications.NETWORK SESSION DELIVERY AND CONTROL INFRASTRUCTURE PRODUCTS AND CONFIGURATIONS SUPPORTED BY ACME PACKET 6300 SERIESNote: Some product / configurations are not supported on all 6300 series members NETWORK SESSION DELIVERY AND CONTROL INFRASTRUCTUREOracle’s network session delivery and control infrastructure enables enterprises and service providers to manage the many challenges in the delivery of IP voice, video, and data services and applications. Service provider solutions are deployed at network borders and in the IP service core to help fixed-line, mobile, wholesale, and over-the-top service providers optimize revenues and realize long-term cost savings. In the enterprise, session delivery infrastructure solutions seamlessly connect fixed and mobile users, enabling rich multimedia interactions and automating business processes for significant increases in productivity and efficiency.The following Oracle products are part of the network session delivery and control infrastructure:∙Oracle CommunicationsSession Border Controller∙Oracle CommunicationsSession Router∙Oracle CommunicationsSubscriber-Aware LoadBalancer∙Oracle Communications Unified Session Manager∙Oracle Communications Mobile Security Gateway∙Oracle CommunicationsInteractive Session Recorder∙Oracle Communications Core Session Manager∙Oracle Enterprise SessionBorder Controller∙Oracle CommunicationsSession Delivery ManagementSuite∙Acme Packet 1100∙Acme Packet 3900∙Acme Packet 4600∙Acme Packet 6300∙Acme Packet 6350 Dual NIU∙Acme Packet 6350 Quad NIUHARDWAREThe Acme Packet 6300 Series feature Oracle’s integrated multiprocessor design to achieve the industry’s highest system-level performance and capacity for signaling, media, and encryption. Acme Packet 6300, 6350 Dual NIU and 6350 Quad NIU also feature industry-leading transcoding capacity and features. Powerful network processor drive system throughput up to 40 Gb/sec (6300, 6350 Dual NIU and 3650 Quad NIU) in fully-populated systems. The versatility, carrier-grade hardware design, and high-availability makes the 6300 Series suitable for deployment at large service provider access and interconnect network borders or within the IP Multimedia Subsystem (IMS) signaling core.The front of Acme Packet 6300 Series platforms features a bright vacuum fluorescent display (VFD) with a front panel keypad and individual fan assemblies to deliver precise and consistent airflow for optimal cooling of all processors and internal components. Each fan assembly can be replaced individually while the system is in service. A black front bezel hides the fan assemblies without restricting airflow through the system. Acme Packet 6300, 6350 Dual NIU and 6350 Quad NIU feature fifteen individual fan assemblies, five for each of its three slots.The rear of Acme Packet 6300, 6350 Dual NIU and 6350 Quad NIU include three slots for NIUs or TCUs with at least one slot reserved for an NIU. One or two slots can be populated with TCUs. The rear of the chassis also accommodates fully redundant power supplies, console and alarm ports, and management ports. A separate rear slot accommodates a 480 GB solid state drive. The power supplies and drives are hot replaceable. Light-emitting diode (LED) indicators for all field-replaceable modules (FRUs) provide at-a-glance power and redundancy status.Acme Packet 6300 Series platforms support two-stage hardware-accelerated encryption to assure confidentiality, privacy and integrity for IP real-time communications at wire rate. 6300 Series Secure Services Module 3 (SSM3) performs compute-intensive random number generation, TLS encryption and IKE key generation to accelerate call setup for encrypted SIP sessions. Encryption co-processors on 6300 Series NIUs support standard IPsec and SRTP for encrypting RTP media.Acme Packet 6300 Rear Slot ModulesOne of the three Acme Packet 6300, 6350 Dual NIU and 6350 Quad NIU rear slots (slot 0) is populated with a NIU; the other two slots can accommodate either NIUs or TCUs. NIU options deliver hardware-accelerated advanced media controls, such as quality of service (QoS) monitoring and encryption and denial of service (DoS) attack protection far beyond the capabilities of general purpose server-based platforms.Dual Port 10 Gigabits per Second Network Interface UnitThe 2x10 Gb/sec NIU is an ultrahigh-performance NIU that integrates dual 32-core processors with options for high-performance, high-capacity encryption for line-rate security even at maximum system throughput. This ensures uncompromised end user or subscriber quality of experience. NIU processors also integrate QoS monitoring and measurement in addition to intelligence designed to protect the rest of the system in the event of signaling overloads or fuzzing attacks. The 10 Gb/sec NIU also supports hardware acceleration of SIP sessions encrypted with TLS, Datagram Transport Layer Security (DTLS), or Internet Key Exchange (IKE) for privacy and confidentiality.High Capacity Transcoding Carrier Unit (Acme Packet 6300, 6350 Dual NIU and Quad NIU)The Acme Packet 6300, 6350 Dual NIU and Quad NIU Transcoding Carrier Unit (TCU) delivers high- performance, high capacity hardware-accelerated transcoding and transrating for services and applications requiring the highest levels of scale and codec management. Each TCU leverages up to 24 transcoding modules, to support up to 30,000 transcoded sessions for a total of up to 60,000 transcoded sessions when Acme Packet 6300 and 6350 are populated with dual TCUs. The AcmePacket 6300, 6350 Dual NIU and Quad NIU transcoding hardware complements the extensive codec management functionality supported by the Oracle Communications Session Border Controller (SBC).ACME PACKET 6300 SERIES DETAILSDetails of Acme Packet 6300 Series specifications, power, physical properties, and regulatory compliance are listed in the table below.DETAILS OF ACME PACKET 6300 SERIESCONNECT WITH USCall +1.800.ORACLE1 or visit .Outside North America, find your local office at /contact./oracle /oracle /oracleCopyright © 2019, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only, and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission.Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. 1119。
PACKETEER
PACKETEERIntroductionPacketeer is a network traffic management solution that helps organizations optimize their network performance, reduce bandwidth congestion, and prioritize critical applications. This document provides an overview of Packeteer and explores its key features, benefits, and implementation considerations.What is Packeteer?Packeteer is a software-based network traffic management tool developed by a leading technology company. It allows organizations to monitor, control, and shape network traffic in real-time, ensuring that critical applications receive priority while preventing congestion and network slowdowns.Key FeaturesTraffic MonitoringPacketeer provides detailed traffic analysis, allowing organizations to gain insights into their network usage. It provides real-time visibility into the applications and protocols consuming network bandwidth, enabling administrators to identify and troubleshoot any performance issues.Traffic ShapingOne of the core features of Packeteer is its ability to shape network traffic. It allows organizations to allocate bandwidth based on their specific requirements. Through dynamic policy-based controls, administrators can ensure that critical applications receive the necessary bandwidth while non-essential traffic is limited or restricted.Quality of Service (QoS)Packeteer enables organizations to prioritize critical applications by implementing Quality of Service rules. This ensures that network traffic is managed according to pre-defined policies, guaranteeing optimal performance for important applications. QoS settings can be customized to meet specific business needs, ensuring that mission-critical applications always receive the highest priority.Application Performance OptimizationPacketeer helps improve application performance through various optimization techniques. It can compress data, accelerate file transfers, and optimize the delivery of web-based applications. By reducing latency and improving response times, Packeteer enhances user experience and productivity.Security and Threat ManagementPacketeer incorporates security features to protect network resources. It can detect malicious traffic, prevent unauthorized access, and mitigate the impact of potential network threats.With built-in security controls, organizations can safeguard their network and ensure data integrity.Benefits of PacketeerImproved Network PerformanceBy actively managing and shaping network traffic, Packeteer reduces congestion and improves overall network performance. This leads to faster application response times, increased productivity, and enhanced user experience.Bandwidth OptimizationPacketeer allows organizations to optimize their use of bandwidth by prioritizing critical applications and limiting non-essential traffic. By efficiently allocating bandwidth, organizations can avoid unnecessary costs and ensure that network resources are used effectively.Enhanced Application PerformanceThrough application optimization techniques, Packeteer improves the performance of various applications, including file transfers and web-based applications. It reduces latency and accelerates data delivery, increasing productivity and user satisfaction.Proactive Network MonitoringPacketeer provides real-time traffic analysis, enabling administrators to proactively monitor the network for anyperformance issues or potential threats. By staying informed about the network’s health, organizations can quickly identify and address any problems, minimizing downtime and ensuring business continuity.Implementation ConsiderationsHardware and Software RequirementsTo deploy Packeteer, organizations need to ensure that their network infrastructure meets the necessary hardware and software requirements. This may include dedicated servers, compatible operating systems, and sufficient storage and memory resources.Network ConfigurationPacketeer requires proper network configuration to effectively monitor and manage traffic. This involves mapping network segments, defining policies, and configuring Quality of Service settings. Organizations should carefully plan and configure their network to maximize the benefits of Packeteer.Training and SupportBefore implementing Packeteer, organizations should provide training to their IT teams to ensure they understand its capabilities and usage. Additionally, it is essential to consider ongoing technical support from the vendor or third-party providers to address any issues or provide assistance when required.ConclusionPacketeer is a powerful network traffic management solution that offers organizations the ability to monitor, control, and shape their network traffic. With features like traffic monitoring, shaping, Quality of Service, application performance optimization, and security, Packeteer provides numerous benefits, including improved network performance, bandwidth optimization, enhanced application performance, and proactive network monitoring. By considering implementation considerations such as hardware and software requirements, network configuration, training, and support, organizations can effectively deploy Packeteer and achieve optimized network performance.。
大学英语应用能力考试精彩试题及问题详解5
⼤学英语应⽤能⼒考试精彩试题及问题详解5Part I Cloze TestDirections: This part, numbered 1 to 15, is to test your grammar and vocabulary ability. Each of the blanks (N0.1 to No.15) is followed by four choices of suggested choices marked A), B), C) and D). Make the best choice and write the corresponding letter on the Answer Sheet.How do you draw the interest of a 4,500 kilogram elephant?You hit the elephant with a big I , according to a zoo director in California.But is that a 2 way to treat the big, friendly animals?How zoos treat their elephants has led to a scientific 3 . Some scientists complain that zoos use 4 force to train the huge animals and get them 5 control.There are about 400 elephants in North American zoos, and wild animal parks. The 6 animals with their big trunks and ears and tusks delight children and 7 smiles from adults. 8 hasn't 9 when an elephant has picked up a peanut quickly with its trunk from a trainer?But elephants aren't in zoos just for entertainment. Elephants are 10 in Asia and Africa, and being raised in American zoos may be 11 to keep them 12.Elephants are different from most other zoo animals because they must be in touch with humans who take care of their feet, and 13 an elephant wants to be dominant(⽀配的). An elephant wants to control the 14 , not on the contrary.Elephant keepers must make the animals obey them 15 they may be attacked by the elephants.But some scientists are worried that keepers are using too much force and are injuring elephants. Several zoos have recently been looked into because people said elephants were beaten with heavy sticks.Scientists are showing zoos how to make elephants behave without injuring them. If theysucceed, children will be entertained by elephants for many more generations.1. A. sword B. knife C. whip D. stick2. A. cruel B. kind C. surprising D. funny3. A. research B. discussion C. argument D. quarrel4. A. very much B. too much C. much too D. enough5. A. under B. in C. out of D. to6. A. stupid B. heavy C. cruel D. fast7. A. draw B. give C. show D. turn8. A. Anyone B. Whoever C. Anyone who D. Who9. A. attracted B. smiled C. be happy D. caught10. A. dying B. scarce C. short D. small11. A. important B. necessary C. impossible D. improper12. A. lively B. living C. lovely D. alive13. A. that B. because C. / D. then14. A. keeper B. others C. animals D. zoo director15. A. so that B. or C. and D. thereforePart II Vocabulary & StructureDirections: This part is to test your ability to use words and phrases correctly to construct meaningful and grammatically correct sentences. It consists of 2 sections.Section ADirections: There are 10 incomplete statements here. You are required to complete each statement by choosing the appropriate answer from the 4 choices marked A), B), C) and D). You should mark the corresponding letter on the Answer Sheet with a single line through the center.16.Do not___me to help you unless you work harder.A) expect C) dependB) hope D) think17.The question___now is where to build the new factory.A)discusses C)be discussedB)discussing D)being discussed17.John decided to__the present job in order to travel around the word.A)give up C)wake upB)put up D)break up19.Michael’s new house looks like a palace, compared___his old one.A)of C)forB)with D)in/doc/b51839517c21af45b307e87101f69e314332fac9.html puter technology makes it___for people to work from home.A)harmful C)possibleB)serious D)difficult21.We are delighted at the news___they have started the business cooperation with your company.A)that C)withB)when D)what22.The computer program is designed for the___of easy online reading.A)experience C)invitationB)purpose D)decision23.The business talk___next week when the CEO of your company comes.A)was held C)will be heldB)is being hold D)has been held24.It was so noisy that we found it hard to___the conversation.A)carry on C)turn onB)set for D)go about25.You cannot cancel your order___your change your mind within three days.A)as if C)so thatB)while D)unlessSection BDirections: There are also 10 incomplete statements here. You should fill in each blank with the proper from of the word given in brackets. Write the word or words in the corresponding space on the Answer Sheet.26.Jack (quick) ___established himself as a powerful member of the new company.27.When she got back from the South, Susan had her car(wash) ___thoroughly.28.We all like your idea of using the money(build) ___a primary school.29.She wants to apply for a new job as her preset job is not(interest) ___.30.The UK economy last year performed(well) ___than expected according to the report.31.With the(introduce) ___of the Internet, more and more people preferred to do business online.32.No one(allow) ___to take any reading materials out of the reading room.33.The machines suddenly stopped(work) ___because of the power cut.34.We can not make(nature) ___resources, but gather them from each.35.The company(employ) ___more than 50 IT engineers since last year.36.PartⅢReading Comprehension (40minutes)Directions: This part is to test your reading ability. There are 5 tasks for you to fulfill. You should read the reading materials carefully and do the tasks as you are instructed.Task 1Directions: After reading the following passage, you will find 5 questions or unfinished statements, numbered 36 to 40. For each question or statement there are 4 choices marked A),B),C)and D). You should make the correct choice and mark the corresponding letter on the Answer Sheet with a single line through the center.The contract of employment is the agreement made between the employer and the employee. This could be a written agreement or in an oral form.In addition, the contract will also include “custom and practice ”agreements. These are how things are usually done in the workplace, for example, if the employer always gives the employees a day’s holiday in August. Even though this is not mentioned in the written contract, this will from part of the contract as it is the usual practice.A trade union may have negotiated(谈判达成)an agreement with an employer about conditions at work. The negotiated agreement will often from part of a contract.Some contracts will be illegal if:*the employee gets all or part of their wages in cash;*tax and national insurance contributions(国民保险税)are not paid; and*the employee knows they are getting paid in this way to avoid paying national insurance and tax.36.According to the first paragraph, a contract of employment ___ .A)must be written oneB)could be in an oral formC)should be signed by a trade unionD)ought to be a workplace agreement37.“Custom and practice”agreement are usually ___ .A)included in the contractB)known to employees onlyC)always written clearly in the contractD)signed by both the employer and a trade union38.According to the passage, the trade union and employer may negotiate an agreement on ___.A)paid holidaysB)insurance termsC)training programsD)conditions at work39.If the employee receives his pay in cash, this practice will be regarded as ___.A)reasonableB)practicalC)illegalD)unfair40.The passage is mainly about ___ .A)the negotiation with an employerB)the employment contractC)the working conditionsD)the job responsibilitiesTask 2Directions: This task is the same as task 1. The 5 questions or unfinished statement are numbered 41to 45.A shared house is money-saving. When you share a house, your bills, rent and possibly food costs will be much lower. If the house is already established, you don’t have to worry about buying things like a fridge and TV.Choosing good housemates(合租⼈)Moving in with friends can be fun but it can result in conflict(冲突)and a loss of friendship. Think carefully about the type of person suited to your character.Ask advice from friends who have lived in share house, or consult a youth worker or relative. Setting some guidelines Every share house is different, but there are some guidelines(准则)that can help you avoid conflict:* Issue or ask for a receipt(收据)when you pay or collect the rent.* Spread responsibility for bill payment.*Where possible, deal with problems through face-to-face communication.Our Living in a share house web-page has some advice and ideas to help make sharing with your housemates a great experience.41.According to the first paragraph, the main advantage of a share house is that___ .A)it avoids wasting timeB)it saves your moneyC)it develops friendshipD)it prevents conflict42.According to the passage, an ideal housemate is person who is___.A)suitable for your characterB )good at doing houseworkC)willing to help youD)easy to talk with43. When you collect the rent from your housemate, you are advised to ___.A)write down the amountB)choose a right dateC)demand cash onlyD)give a receipt44.To solve a problem with your housemate, it is better for you to___A)discuss it with the person on the telephoneB )seek advice from your friends or relativesC)talk with him or her about it face to faceD)speak to your parents about it first45.The passage is mainly about how to___A)choose a good neighborB)look for a new houseC)live in a share houseD)share houseworkTask 3Directions: The following is a memo. After reading it, you should complete the information by filling in the blanks marked 46 to 50(in no more than 3 words) in the table below.To: All office staffRe: Award partyPosted: July 1, 2013The Awards Party will take place on August 1, 2013. The hotel chosen for the party is close to the office. Every who plans to attend the party should send an email to Mr. Black before the end of this week. If you want to bring a guest, the ticket price is $50. Only twenty guest tickets are available. All fifty tickets are reserved for staff at no charge. We hope that all staff will attend .Please choose the staff member who you think is the most valuable worker this year. Make sure you enclose the name in an envelope and bring it to Mr. Black in person. The voting(投票)ends on the last day of this month. One winner from our staff will be chosen.Task 4Directions: The following is a list of terms about income and benefit. After reading it, you are required to find the items equivalent to (与...相等)those given in Chinese in the table below. Then you should put the corresponding letters in brackets on the Answer Sheet, numbered 51 through 55.A---------- Perfect attendance bonusB---------- Performance bonusC---------- Income taxD---------- Overtime payE---------- Back payF---------- Pay riseG---------- Pay cutH---------- Pay slipI---------- Weekly wageJ---------- Minimum wageK---------- Basic wageL---------- Traveling allowanceM---------- Annual incomeN---------- Before-tax salaryO---------- Medical insuranceP---------- Unemployment insuranceQ---------- Employment injury insuranceExamples:(A)全勤奖(B)绩效奖⾦Task 5Directions: The following is a letter of application for a job. After reading them, you are requiredto complete the answer that follow the questions(No.56to No.60). You should write your answers (in no more than 3 words)on the Answer Sheet correspondingly.Dear Mr. Jenkinson,I am interested to see your advertisement in today’s City Daily and would like to be considered for this position as Chief Office Secretary in your company.I am now working as Private Secretary to the General Manager at a manufacturing company and have a wide range of responsibilities. These include attending and talking minutes(记录)of meetings and interviews, dealing with callers and business emails and letters when my employer is absent, helping the new employees, as well as performing the daily office duties.The kind of work in your company particularly interest me, and i would welcome the opportunity it affords to use my foreign language abilities.A copy of my resume is enclosed with references you require. I hope to hear from you soon and to be given the opportunity to prove myself at an interview.Best Regards.Yours sincerely,Jean Carson56.How does the writer learn about the job wanted?From__________________in City Daily.57.What job position is the writer applying for?The position as__________________58.Where is the write working now?At a__________________59.Why is the writer particularly interested in the job?Because she thinks she can use her _________abilities.60.What is enclosed wit the letter?A copy of the writer’s ________with references required.Part ⅣTranslation--English into Chinese (25 minutes)Directions: This part, numbered 61 to 65, is to test your ability to translate English into Chinese. Each of the four sentences(No.61 to No.64)is followed by four choices of suggested translation marked A),B),C)and D).Make the best choice and write the corresponding letter on the Answer Sheet. Write your translation of the paragraph (No.65) in the corresponding space on the Translation/Composition Sheet.61.These programs are important to business success and will also contribute to the community at large.A)这些重要项⽬都是为了兴办企业的,这也会对社区有很⼤的促进。
移动Ad hoc网络基于链路质量的地理位置路由协议
移动Ad hoc网络基于链路质量的地理位置路由协议董萍;兰少华;钱焕延【期刊名称】《计算机科学》【年(卷),期】2012(039)007【摘要】基于地理位置的路由算法要周期性发送信标报文,以维护邻居节点的位置信息.但是频繁广播信标控制包会占用大量的网络带宽,于是近几年提出了基于竞争机制的无信标路由算法来减少控制开销.然而,大部分路由协议没有考虑到实际无线信道的不可靠性,使其在实际应用中表现不理想.提出了一种基于链路质量的地理位置跨层路由协议(LQBGR).它利用跨层技术,在竞争机制中充分考虑链路质量因素,通过选择通信质量较好的链路来减少重传,提高整体网络性能.最终仿真结果表明,该协议能够达到较高的数据包投递率、较短的端到端延迟及较低的通信总量.%Geographic routing algorithms require nodes to periodically transmit HELLO messages to allow neighbors get their positions (beaconing mechanism). But periodically transmitting the messages will result in high bandwidth o-verhead. For this reason, beacon-less routing algorithms have been recently proposed to reduce the control overhead. However,existing beacon-less algorithms don't consider unreliability of realistic physical channels. In this paper,a novel beacon-less routing protocol called LQBGR was presented. Based on cross-layer routing technology, its design takes link quality into account to reduce the retransmission and enhance the performance. Simulation results show thatLQBGR a-chieves higher packet delivery ratio,shorter end-to-end delay and lower traffic.【总页数】4页(P48-51)【作者】董萍;兰少华;钱焕延【作者单位】南京理工大学计算机科学与技术学院南京210094;南京理工大学计算机科学与技术学院南京210094;南京理工大学计算机科学与技术学院南京210094【正文语种】中文【中图分类】TP393【相关文献】1.一种基于链路质量的移动Ad-hoc网络地理路由算法 [J], 洪蕾;黄波;赵春霞2.移动Ad hoc网络路由协议的研究——一种基于AODV路由协议的改进算法 [J], 陈玲;王华3.移动Ad Hoc网络中基于链路质量预测的多路径源路由算法的研究 [J], 孔玲颖;张尧弼4.移动Ad hoc网基于链路质量和局部拓扑的机会路由协议 [J], 汪红霞5.一种基于链路质量的移动Ad-hoc网络地理路由算法 [J], 洪蕾; 黄波; 赵春霞因版权原因,仅展示原文概要,查看原文内容请购买。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A Study of Packet Delivery Performance during Routing ConvergenceDan Pei,Lan WangUCLA CSD peidan,lanw@Daniel MasseyUSC/ISImasseyd@S.Felix WuUC Davis CSDwu@Lixia ZhangUCLA CSDlixia@AbstractInternet measurements have shown that network failures happen frequently,and that existing routing protocols can take multiple seconds,or even minutes,to converge after a failure.During these routing convergence periods,some packets may already be en-route to their destinations and new packets may be sent.These in-flight packets can en-counter routing loops,delays,and losses.However,little is known about how many packets are delivered(or not de-livered)during routing convergence periods.In this paper,we study the impact of topological connec-tivity and routing protocol designs on the packet delivery during routing convergence.We examine three distributed routing protocols:RIP,Distributed Bellman Ford and BGP through protocol analysis and simulation experiments.Our study shows that the packet delivery ratio improves as the network connectivity becomes richer.However differences in routing protocol designs impact their ability to fully uti-lize the topological redundancy in face of component fail-ures.Two factors in routing protocol design,keeping al-ternate path information at each router and quickly prop-agating new reachability information,appear to have the most impact on the packet delivery behavior during con-vergence.1IntroductionInternet technology advances have benefited our society and increased our productivity,but at the same time these advances have also made us critically depend on the relia-bility of Internet services.At a very fundamental level,all applications depend on the Internet routing infrastructure for packet delivery service.In today’s Internet,routers for-ward data packets hop-by-hop towards their destinations according to forwarding tables built by dynamic routing protocols such as BGP[22],OSPF[17],and RIP[14].In [2]Paul Baran suggested that adequate redundancy in net-livery in face of component failures,and that the packet de-livery ratio for all three protocols improves as the network connectivity becomes richer.However different protocol designs can lead to significant differences in exploiting rich topological connectivity even within our chosen set of sim-ilar routing protocols.For example,with the same topology and same packet generation rate,RIP dropped250pack-ets while BGP’(a specially parameterized version of BGP) dropped fewer than5packets.We identified two factors in routing protocol design that appear to have the most im-pact on packet delivery performance during routing con-vergence.First,in addition to the best path,a router should keep information of some alternate path to each destina-tion,so that when the best path fails it can switch to an alternate path instantly for packet forwarding;the packet delivery rate can be substantially improved even if the al-ternate path may not be the new best path.Second,once a change of connectivity is detected,the routing protocol should propagate the new information as fast as possible. These results provide insights towards improving packet delivery during routing convergence.The remainder of the paper is organized as follows.Sec-tion2reviews related work.Section3gives a brief intro-duction to the three routing protocols studied in the paper. In Section4wefirst identify three factors that we believe have an important impact on packet delivery during routing convergence,and then analyze how well the existing rout-ing protocols match these three factors.Section5presents the simulation results.Section6concludes the paper and discusses our future work.2Related WorkIt is generally believed that a shorter routing conver-gence time reduces packet losses.Previous efforts on rout-ing protocol design have largely focused on speeding up routing convergence and preventing routing loops.These approaches tend to achieve loop-free routing through de-laying routing update propagation.The ExDBF algorithm described in[5]avoids long-lived routing loops by comput-ing the complete path to a destination using the predecessor information.If a neighbor appears in a node’s computed path to a destination,this node will not send update mes-sage regarding to this neighbor since this will lead to loops.[6]describes DUAL algorithm which avoids rout-ing loops by running a“diffusion”process before switch-ing to a longer path.The routing table is“frozen”and the affected destinations are unreachable until the diffusion process completes.Our study differs from previous work by its focus on packet delivery performance rout-ing convergence.Our results show that a shortest conver-gence time does not necessarily lead to a maximal packet delivery rate.We believe that an ideal routing protocol should achieve a good balance between the routing con-vergence overhead and convergence time,and most impor-tantly should maximize the packet delivery rate during con-vergence.[28]simulated the convergence behaviors of several routing protocols.The authors measured the convergence time,number of routing messages,and the routing loops after node or link failures,but did not measure packet de-livery during routing convergence.[19]studied the end-to-end traceroute measurements collected in1994and1995. The author detected a few transient loops and conjectured that these transient loops were caused by link failures.[8] used off-line analysis of traces containing the header of ev-ery packet traversing a link on a backbone ISP to detect loops.They observed that forwarding loops are rare,and that the delay of packets which do escape a routing loop is increased by25to1300msec.They also observed that 30%of loops on a subset of the links lasted longer than10 seconds.The paper stated that the causes of observed for-warding loops are yet to be identified in future study.Our study examines how link failures affect routing and packet forwarding by studying the forwarding and routing trace files,thus we can identify the causes of routing loops in each circumstance.[25]simulated the loop-free MS distance vector algo-rithm from[16],the ExDBF algorithm from[5],and a link state protocol(SPF)using the NSFNET backbone topol-ogy.The workload used is an FTP application which does not use TCP but has a simpleflow control with a maxi-mal window size and retransmission after timeout.They measure the packet throughput,packet delay and routing load(bandwidth consumption).The authors observed that, although the SPF and ExDBF algorithms are known to have transient loops,their packet delivery performance is better than that of the loop-free MS algorithm.While this work measured the end-to-end data delivery performance under different routing protocols,our study examines the packet delivery performance with topologies of different connec-tivity levels.In addition,we examine in detail packet-level dynamics such as number of packet drops,number of TTL expirations,number of transient forwarding paths, forwarding path convergence delay,to understand exactly how transient routing protocol behavior affects packet de-livery and hence the performance of dataflows.Other related work that aims at maximizing packet de-livery during routing convergence include having alternate path always ready either at the routing table[27]or at line-card[1],and“non-stop forwarding”in which a router keeps forwarding packets while rebooting its routing pro-tocol daemon[18,24,23].3A Brief Introduction to RIP,DBF and BGP In this paper we consider three distributed routing pro-tocols:RIP[14],DBF(Distributed Bellman Ford)[3],and BGP[22]1.All of the three are variants of classic distancevector routing protocols.We selected three routing pro-tocols in the same algorithm family so that we can better correlate the difference in the routing protocol design with the difference in the observed packet delivery dynamics.RIP[14]is one of the best known routing protocols.In RIP,each router periodically advertises its shortest distance to each destination.Based on the distances learned from all its neighbors,a router selects the neighbor that leads to the shortest distance path to a given destination as the next hop, and discards the reachability information for the same des-tination from all other neighbor routers.Routing updates are sent every30seconds,and a routing entry is removed if it does not have an update within180seconds.Whenever a route change is detected,the router sends a“triggered up-dates”immediately instead of waiting for the next update interval.A damping timer is applied to space out consecu-tive update messages;the timer’s value is randomly chosen between1and5seconds.In our simulation RIP is also enhanced with“split horizon with poison reverse”two-hop loop prevention scheme:If a node uses as the next hop to reach destination,will send an“infinity”distance(16)to.The DBF algorithm is defined in[3].In our simula-tion implementation the only difference between RIP and DBF protocol is that a DBF router keeps a cache of the latest routing update learned from each of its neighbors. Whenever a router notices that it cannot reach a destination through the current next hop,the router can immediately select an alternate next hop.As with RIP,the DBF pro-tocol adopts the“split horizon with poison reverse”loop prevention mechanism and sends triggered updates upon routing changes.Note that each RIP(or DBF)update mes-sage may contain up to25destination entries according to RIP standard[14].BGP[22]is a path vector protocol and each node an-nounces to its neighbors the best path(a sequence of nodes) to each destination.A router keeps a copy of the latest best path received from each of its neighbors.Because BGP uses TCP for reliable delivery between neighbor nodes, routes to all destinations are advertised once only.A router sends an update only upon route changes.It sends an ex-plicit withdrawal message to its neighbors when it cannot reach a previously reachable destination.Similar to RIP and DBF,BGP uses a timer to space out consecutive up-dates for the same destination by Minimum Route Adver-tisement Internal(MRAI)(This timer is called MRAI timer in the rest of the paper).BGP specification recommends an average MRAI value of30seconds with a jitter interval of seconds.In our simulation,we implemented both this recommended MRAI value and a modified average MRAI value of3seconds with a jitter interval of seconds.This smaller MRAI value makes BGP’s damping delay for trig-gered updates comparable with that of RIP and DBF.We name this specially parameterized version of BGP BGP’. In most BGP implementations and in our simulation,the MRAI timer is set on a per neighbor node basis rather than the per(neighbor,destination)basis.The BGP path information is used to prevent routingloops.When a node receives a path from neighbor which contains as one of the nodes in the path,an indica-tion of routing loop,the node should discard this new path.Our implementation treats such a path as a withdrawal mes-sage and thus is similar to the“split horizon with poison re-verse”loop prevention scheme in RIP and DBF.Note that although the“counting-to-infinity”behavior cannot occurin BGP,other routing convergence problems may still oc-cur[11].4Routing Protocols During Convergence In any large scale network,there will be periods whenthe route to a particular destination has not converged,yet hop-by-hop routing protocols(such as those used in the In-ternet)continue to forward packets regardless of whether the route has converged.IP packets carry a Time To Live(TTL)field which specifies the maximum number of hopsthe packets may travel.As long as a packet’s TTL value is greater than zero and the router knows some next hop toreach the destination,the packet is forwarded to the nexthop and the TTL value is decremented by1.Although the sequence of next hops traversed by a packet during arouting convergence period(called“transient forwarding path”)may be sub-optimal or even contain transient loops,the packet may still have a good chance to reach its desti-nation.Figure1shows an example of how packets can be deliv-ered during routing convergence.In thisfigure,each linkhas a unit cost and the packet forwarding path between and is shown in dashed lines.Initially,as shown inFigure1(a),is sending packets to along the short-est path.In Figure1(b),the link goes down. continues to forward packets to and transmits thepackets over the failed link.In Figure1(c),detects the link failure and switches to forwarding packets to.Un-aware of the connectivity changes continues to forwardpackets to.During this time the packets are forwarded through a non-shortest path.Finally,in Figure1(d),converges to the new shortest path,and forwards packets to .Note that in this example packets are only dropped be-tween the instance the link fails and the time switchesto forwarding packets to R6(Figure1(b)),and that dur-ing the subsequent convergence period(Figure1(c))pack-ets successfully reach the destination by going through anon-shortest path route.Also note that the time it takes to move from Figure1(c)to Figure1(d)counts as part of the routing convergence delay,even though packetflow has been restored.This example shows that,after a failure,a longer routing convergence period does not necessarily im-ply higher packet losses.Understanding the relation between routing conver-gence and packet delivery raises new and interesting chal-lenges for routing protocol design.In the remainder of this section,we identify factors that have an important impact on packet delivery during routing convergence.(a)’s next hop tois(b)Linkfails(c)’s next hop becomes(d)’s next hop becomesFigure 1.Packet Could still Be Delivered during Convergence4.1Path Switch-over Period We say a path switch-over period starts when a router discovers its current next hop can no longer reach a given destination and ends when the router finds a new next hop for the same destination.Because the router can-not forward any packets for that destination during the path switch-over period,an ideal network routing protocol should have a minimal path switch-over period.Forward-ing packets to an alternate next hop offers a chance that the packets may eventually reach their destinations,even when the next hop is not necessarily on the new shortest path af-ter a failure.In RIP,a router only keeps the information for the next hop along the shortest path.loses the reachability to a destination whenever the router detects the failure of the link to the next hop or the next hop reports the destination is unreachable.Although ’s other neighbors may not be affected by the failure,these neighbors will not inform their reachability to the destination until the next periodic update is due.Therefore,after a failure,a RIP router may take up to 30seconds before it learns an alternate path.As a result,RIP suffers from a potentially long path switch-over period.In contrast to RIP,a router running DBF or BGP keeps a cache of the reachability information learned from all its neighbors.When it can no longer reach a destination through the current next hop,the router can immediately select an alternate next hop for the destination,achieving a zero time path switch-over.However note that there is no guarantee that the selected alternate next hop leads to the shortest route to the destination,nor that the next hop can even reach the destination.This leads us to consider the next important factor,probability of choosing valid paths.4.2Probability of Choosing Valid PathsIdeally,when the existing path fails,the router should switch to a new path which does not use the failed link.We call any alternate path that avoids the failed link a valid path .The second factor of an ideal routing protocol is the high probability of choosing a new next hop with a valid path if there exist multiple alternate paths.A valid path can be sub-optimal,as long as packets can reach the destination while the routing protocol is converging.“Split horizon with poison reverse”avoids two-hop loops,thus helps increase the probability of valid alternate paths after a failure.In all the three protocols we studied,BGP is the only one that allows a node to check whether a chosen alternate path contains a failed link in some re-stricted cases.For example,[21]utilized this feature of BGP to substantially reduce the routing convergence time.However due to the existence of routing policies and other constraints,after a route failure BGP may still alternate among a number of new routes before converging to a sta-ble route.Such transient route instability can happen in all the three studied protocols,and is caused by inconsis-tent connectivity information perceived by different routers while the latest update is being propagated through the en-tire network.This leads us to consider the third important factor,propagation time of Failure information.4.3Propagation Time of Failure InformationUpon detection of a physical failure,an ideal routing protocol should propagate the failure information through the network as quickly as possible,so that all the routers can recompute the shortest paths to the affected destina-tions.However this propagation takes time,and due to the distributed nature of distance-vector and path-vector algo-rithms.If the new path is also invalid,packets following that path are likely to be lost.However if the new path is valid but sub-optimal,packets sent along that path have a good chance to reach their destinations.In RIP or DBF,upon detecting a failure a router sends a triggered update instead of waiting for the next30-second update interval.BGP sends only triggered routing updates upon route changes.In this sense,all the three studied pro-tocols attempt to achieve the goal of quick propagation of failed paths.However,because damping timers for trig-gered update(3-second average for RIP,DBF and BGP’, and30-second average for BGP)are used to space out con-secutive updates,a node delays the sending of all update messages except thefirst one.One exception is made in BGP which does not apply the timer to withdrawal mes-sages in order to propagate the unreachability information quickly.But A link failure may cause route changes to multiple destinations,and updates regarding these destina-tions may not be received by a BGP router at the same time. After a BGP router has processed all the changed path and sent out corresponding updates,it turns on the MRAI timer. After the timer is on,any newly changed paths to destina-tions not in the previous update messages are delayed by the per neighbor MRAI timer,but not by per(neighbor,des-tination)MRAI timer.4.4The Impact of Network TopologyIn addition to the routing protocol design choices,our claim is that the ideal factors of a minimal path switch-over period,a high probability of picking a valid path,and fast propagation of updated connectivity information,all benefit from a richly connected network topology where routers have a high connectivity degree.Intuitively,as a network becomes more interconnected,the number of al-ternate paths increases,and the probability that an alternate path goes through the same failed link decreases.Further-more,the rich connectivity also reduces the average path length between any two points in the network.This re-duced path length helps reduce the propagation time of the failure information,which is related to not only the link propagation delay but also the triggered update(or MRAI) timer.For example,[13]has shown that the BGP conver-gence time is proportional to the product of MRAI timer value and the length of the longest backup paths.5Simulation Results and AnalysisWe simulated RIP,DBF,BGP and BGP’using IRLSim simulator[26].In the simulated networks,each link has a unit cost,a propagation delay of1ms,and a transmis-sion rate of10Mbps.A link failure is detected by the two nodes attached to it within5ms after the failure happens. Each node has a packet queue sizes of200packets and zero CPU processing delay.Note that because this paper is a comparative study of different routing protocols,the exact values of these parameters should have little impacton the results.In order to study the protocol behavior at different topo-logical connectivity levels,we choose to use a family of regular network topologies.A random topology presentsa random factor in each simulation ing regular topologies removes this undesirable random factor and al-lows us to clearly identify the impact of connectivity levelon the protocol performance.The simulated network topol-ogy is a mesh of rows by columns and each node inthe network(except those on the border)has the same nodedegree.There are various ways to construct such topolo-gies,we use a deterministic method similar to the one usedby Baran in[2];[20]provides more details on the construc-tion of these network topologies.As an example Figure2shows three example topologies for and.We run each simulation experiment for800seconds.There is a warm-up period after each simulation starts,dur-ing which time period the network nodes exchange routing update messages and the routing table at each node stabi-lizes.At time seconds,a single sender starts send-ing IP packets with TTL=127to a single receiver at a con-stant transmission rate of20packets/second.The senderand the receiver are connected to a randomly chosen router on thefirst row and last row of the regular topology,respec-tively.At time seconds,one of the links along theshortest path between the sender and receiver is randomly chosen to fail.We simulated topologies with and ranging from3to16.For each topology with a different node degree,we conducted100simulation runs to collect statistically valid performance measurement.Due to thespace limitation,in the paper we use the topologies with shown Figure2to help explain our observations.5.1Packets Drops due to No ReachabilityWhen a packet arrives at a router which is in the switch-over period after a failure,the packet is dropped because the the router does not know the next top to reach the desti-nation.Figure3shows the average number of packet drops due to lack of reachability over100simulation runs. Observation1For all the three examined routing proto-cols,the number of packet drops decreases as the node de-gree increases until it reaches6.When the node degree is6or more,there are virtually no packet drops with DBF,BGP,and BGP’.But in RIP,packet drops improve only slightly with the increase in node de-gree.Our explanation is the following.Consider the behavior of a node that lies on the shortest path from the sender to the receiver.In a sparse network,it is often the case that is chosen by its neighbors as the next hop to the destination.Thus when learns that its current next hop to the destination is no longer valid,its neighbors cannot immediately offer an alternate path to the destination.ForReceiver 0123456789101112131415161718192021222324Sender(a)degree 4Sender123456789101112131415161718192021222324Recevier (b)degree 5Sender123456789101112131415161718192021222324Receiver(c)degree 6Figure 2.Link Failures in Networks with node degree 4,5and 6example,consider the behavior of node in Figure 2(a)(a sparse topology with degree 4).Node is chosen by neighbors as the next hop to the destination andnodes use Poison-Reverse loop prevention to in-form node that their distance to the receiver is infinity.When linkfails,node finds no alternate path until next periodic update cycle when the new reachability through nodes [16,21,22]or [18,23,22]is discovered.Similar situations can happen to the other nodes along the shortest path before the failure,i.e.nodes 2,7,and 12.On the other hand,a densely connected network makes it likely that a node has one or more neighbors whose shortest path to the destination does not go through A.For example,consider node in Figure 2(c)(a topology with degree 6).Before the failure node 12’s next hop to the des-tination is node 22and under DBF,BGP and BGP’node 12also keeps the information from its neighbor node 17aboutits reachability to the destination.When linkfails,node 12immediately finds the alternate path [12,17,22]and starts forwarding packets along this new par-ison of Figure 2(a)and 2(c)shows that increasing the node degree to 6essentially guarantees that all the nodes on the initial shortest path can find a valid alternate path after any link along the shortest path fails.But a network running RIP largely depends on the periodic updates to propagate information about alternative paths after a failure and node does not learn of the alternate path via node until the next update.A higher node degree only slightly reduces the propagation delay of the periodic update messages and the number of packet drops in RIP decreases only slightly.5.2Number of TTL ExpirationsFigure 4shows the number of packets dropped due to TTL expirations.Given the large TTL value (127)and the small size of the simulated topology,all the TTL expira-tions are caused by routing loops during convergence.Observation 2For topologies with a node degree below 6,BGP has the largest number of TTL expirations while RIP has no TTL expirations.When the node degree is 6or higher,there are no TTL expirations.The reason no TTL expirations occur under RIP is the fol-lowing.Whenever a link failure happens,a triggered up-date is sent quickly.and with our 1ms link delay,the failure information can propagate along the path in a few millisec-onds.Furthermore,packets enter the network at a relatively slower rate of 20packets/second and because a RIP node keeps no alternative path information,the node next to the sender will drop all the incoming packets when the current shortest path fails.As Figure 3shows,RIP avoids loop-ing by simply dropping all the incoming packets till new reachability is established.Analysis of the routing and forwarding traces shows that BGP’s slow convergence problem [11]combined with the MRAI timer are mainly responsible for the forwarding loops with the topology of node degree 5.For example,nodes 2,7,and 12in Figure 2(b),can easily form a routing loop.At one moment after failure of link (1722)during the simulation,node 2’s path is [21271722]while node 12’s path is [12271722].However,MRAI timers of both node 2and node 12have been turned on by some previ-ously exchanged updates and no new updates can be sent before one of the timers expires,thus a forwarding loop is formed.This example shows that different nodes based on inconsistent information might form a transient loop,and the looping period is lengthened by the MRAI timer.The number of TTL expirations in BGP is about 10times of that in BGP’,and this is consistent with the fact that av-erage MRAI timer value in BGP(30seconds)is about 10times of that in BGP’(3seconds).Although the MRAI timer value for BGP’is about the same as the damping timer for DBF,the two routing pro-tocols show noticeable difference in the number of TTL expirations.This difference is due to some specific de-050100150200250300234567891011121314151617N u m b e r o f P a c k e t D r o p sNode DegreeNumber of Packet DropsRIP DBF BGP’BGPFigure 3.Number of Packet Drops due to no route Vs.node-degree tails in how the damping timer is applied.A single DBF update message can contain as many destination entries as the message size allows (25destinations).Thus given the size of simulated topology (49nodes total),a single update is likely to contain all the affected destinations by the link failure.On the other hand,BGP is a path-vector protocol and a single BGP update can only contain those destinations that share the same path.Because our simu-lation implemented the MRAI timer on a per neighbor ba-sis (as in most vendor BGP implementations),after a link failure only the first BGP update message can propagate quickly.Any further update messages will be regulated by the MRAI timer,resulting in a longer time when different nodes have inconsistent routing information.Thus BGP’suffered more from transient loops which lead to a higher number of TTL expirations.Note that the results could have been different had the MRAI timer been implemented on a per (neighbor,destination)basis.We see that in our simulations,RIP has no loops and DBF has fewer loops than BGP (and BGP’).Conversely,BGP(and BGP’)has more routing information than DBF which has more than RIP.Although BGP assures that a node picks a path that does not contain itself,this does not always prevent transient looping.Furthermore a common implementation simplification in the BGP’s MRAI sets the time on a per neighbor rather than per (neighbor,destina-tion)basis and lengthens BGP’s convergence time.5.3Instantaneous ThroughputFigure 5shows the instantaneous throughput (at each second)measured in packet/second at the receiver with node degrees 3,4,and 6,respectively.The results for node degree 7and higher are similar to that of node degree 6.Note that due to TTL expirations in BGP and BGP’at de-gree 5(not shown),their throughput performance are worse than those at degree 3,4and 6[20].For clarity,we normal-ize time by subtracting the 390second warm-up period,thus the failure is injected atseconds in Figure 5.Note that the results shown in the figure are the average20406080100120234567891011121314151617N u m b e r o f T T L E x p i r a t i o n sNode DegreeNumber of TTL ExpirationsRIP DBF BGP’BGPFigure 4.Number of TTL Expirations During Convergencethroughput of 100simulation runs.Observation 3In a sparse network,a link failure on the existing path between the sender and receiver tends to cause an instant throughput drop with all the protocols under study.For BGP ,BGP’,and DBF ,the throughput then increases gradually and resumes full throughput around the triggered update timer values.RIP does not resume full throughput until the 30second periodic update value.In a dense network,increased node degree reduces the throughput drop for DBF ,BGP ,and BGP’to negligible amount.RIP does only slightly better as the network becomes more dense.Because RIP routers do not keep alternate path infor-mation,after the failure they must wait for other routers’periodic announcements (or triggered update if they no-tice path changes)to learn an alternate path.Consequently RIP’s throughput right after the failure is almost zero.For node degree 3,RIP’s throughput climbs back to the origi-nal throughput at about 30seconds later after failure,which matches the periodical update interval.The time it takes RIP to climb back to the original throughput decreases slightly as the node degree increases:more neighbors mean it’s more likely to receive a periodic announcement earlier.With BGP,BGP’,and DBF,the throughput does not drop to zero since it is possible for the routers to have al-ternate paths available.For node degree 3,BGP’s grad-ual throughput increase begins at about 25seconds after the failure and ends at about 35seconds after the failure,which match the value of the MRAI timer.Similarly,the sharp throughput increase of BGP’begins at about 1sec-ond after the failure and ends at about 5seconds after the failure.The results show that increased node degree can reduce the throughput a lot with BGP,BGP’and DBF.The time it takes DBF to climb back to the original throughput decreases quickly as the node degree increases:it’s about 30seconds at degree 3,and 20seconds at degree 4,and almost zero seconds at degree 6.。