Un der standingandImprovingServerPerformance

合集下载

SQL Server 权限管理手册说明书

SQL Server 权限管理手册说明书

Top Level Server PermissionsDatabase Level PermissionsALTER ANY APPLICATION ROLE ALTER ANY ASSEMBLY ALTER ANY ASYMMETRIC KEY ALTER ANY CERTIFICATE ALTER ANY CONTRACTALTER ANY DATABASE AUDIT ALTER ANY DATABASE DDL TRIGGERALTER ANY DATABASE EVENT NOTIFICATION ALTER ANY DATASPACEALTER ANY FULLTEXT CATALOGALTER ANY MESSAGE TYPEALTER ANY REMOTE SERVICE BINDING ALTER ANY ROLE ALTER ANY ROUTE ALTER ANY SCHEMA ALTER ANY SERVICE ALTER ANY SYMMETRIC KEYALTER ANY USER –See Connect and Authentication –Database Permissions ChartCREATE AGGREGATE CREATE DEFAULT CREATE FUNCTION CREATE PROCEDURE CREATE QUEUE CREATE RULE CREATE SYNONYM CREATE TABLE CREATE TYPE CREATE VIEWCREATE XML SCHEMA COLLECTIONTop Level Database PermissionsCONTROL ON DATABASE::<name>CREATE ASSEMBLY CREATE ASYMMETRIC KEY CREATE CERTIFICATE CREATE CONTRACTCREATE DATABASE DDL EVENT NOTIFICATIONCREATE FULLTEXT CATALOG CREATE MESSAGE TYPECREATE REMOTE SERVICE BINDING CREATE ROLE CREATE ROUTE CREATE SCHEMA CREATE SERVICE CREATE SYMMETRIC KEYAUTHENTICATE BACKUP DATABASE BACKUP LOG CHECKPOINTCONNECT REPLICATION DELETE EXECUTE INSERT REFERENCES SELECT UPDATEVIEW DEFINITION TAKE OWNERSHIP SHOWPLANSUBSCRIBE QUERY NOTIFICATIONS VIEW DATABASE STATECONTROL SERVERCONNECT DATABASESTATEMENTS:CREATE DATABASE AUDIT SPECIFICATION CREATE/ALTER/DROP database triggersPARTITION & PLAN GUIDE statementsSTATEMENTS:Combined with TRUSTWORTHY allows delegation of authentication BACKUP DATABASE BACKUP LOG CHECKPOINTCREATE ANY DATABASE ALTER ANY DATABASEALTER ANY SERVER AUDIT ALTER ANY EVENT NOTIFICATIONAUTHENTICATE SERVERVIEW ANY DEFINITIONALTER TRACEVIEW SERVER STATE STATEMENTS:Applies to subordinate objects in the database. See Database Permissions –Schema Objects chart.TAKE OWNERSHIP ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name>RECEIVE ON OBJECT::<queue name>SELECT ON OBJECT::<queue name>VIEW CHANGE TRACKING ON OBJECT::<name> SELECT ON OBJECT::<table |view name>INSERT ON OBJECT::< table |view name> UPDATE ON OBJECT::< table |view name> DELETE ON OBJECT::< table |view name>EXECUTE ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name> REFERENCES ON OBJECT|TYPE|XML SCHEMA COLLECTION:<name> VIEW DEFINITION ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name>ALTER ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name>TAKE OWNERSHIP ON SCHEMA::<name>VIEW CHANGE TRACKING ON SCHEMA::<name>SELECT ON SCHEMA::<name>INSERT ON SCHEMA::<name>UPDATE ON SCHEMA::<name>DELETE ON SCHEMA::<name>EXECUTE ON SCHEMA::<name>REFERENCES ON SCHEMA::<name>VIEW DEFINITION ON SCHEMA::<name>ALTER ON SCHEMA::<name>CREATE SEQUENCESELECT ON DATABASE::<name>INSERT ON DATABASE::<name>UPDATE ON DATABASE::<name>DELETE ON DATABASE::<name>EXECUTE ON DATABASE::<name>REFERENCES ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>TAKE OWNERSHIP ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY SCHEMACREATE SCHEMACREATE AGGREGATE CREATE DEFAULT CREATE FUNCTION CREATE PROCEDURE CREATE QUEUE CREATE RULE CREATE SYNONYM CREATE TABLE CREATE TYPE CREATE VIEWCREATE XML SCHEMA COLLECTIONVIEW ANY DEFINITIONVIEW ANY DATABASEALTER ANY DATABASEServer PermissionsDatabase PermissionsSchema PermissionsObject Permissions Type PermissionsXML Schema Collection PermissionsDatabase Permissions –Schema ObjectsNotes:•To create a schema object (such as a table) you must have CREATE permission for that object type plus ALTER ON SCHEMA::<name> for the schema of the object. Might require REFERENCES ON OBJECT::<name> for any referenced CLR type or XML schema collection.•To alter an object (such as a table) you must have ALTER permission on the object (or schema ),or CONTROL permission on the object.CONTROL ON SERVERCONTROL ON DATABASE::<name>CONTROL ON SCHEMA ::<name>CONTROL ON OBJECT|TYPE|XML SCHEMA COLLECTION ::<name>OBJECT permissions apply to the following database objects:AGGREGATE DEFAULT FUNCTION PROCEDURE QUEUE RULE SYNONYM TABLE VIEW(All permissions do not apply to all objects. For example UPDATE only applies to tables and views.)•To drop an object (such as a table) you must have ALTER permission on the schema or CONTROL permission on the object.•To create an index requires ALTER OBJECT::<name> permission on the table or view.•To create or alter a trigger on a table or view requires ALTER OBJECT::<name> on the table or view.•To create statistics requires ALTER OBJECT::<name> on the table or view.CONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASECONTROL ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>REFERENCES ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY FULLTEXT CATALOGCREATE FULLTEXT CATALOG Certificate PermissionsFull-text PermissionsAssembly PermissionsQuestions and comments to ************************Server Role PermissionsCONTROL SERVERVIEW ANY DEFINITIONALTER ANY SERVER ROLEVIEW DEFINITION ON SERVER ROLE::<name>TAKE OWNERSHIP ON SERVER ROLE::<name>ALTER ON SERVER ROLE::<name>CONTROL ON SERVER ROLE::<name>Most permission statements have the format :AUTHORIZATION PERMISSION ON SECURABLE::NAME TO PRINCIPAL•AUTHORIZATION must be GRANT, REVOKE or DENY.•PERMISSION is listed in the charts below.•ON SECURABLE::NAME is the server, server object, database, or database object and its name. Some permissions do not require ON SECURABLE::NAME.•PRINCIPAL is the login, user, or role which receives or loses the permission. Grant permissions to roles whenever possible.Sample grant statement: GRANT UPDATE ON OBJECT::Production.Parts TO PartsTeam Denying a permission at any level, overrides a related grant.To remove a previously granted permission, use REVOKE, not DENY.NOTES:•The CONTROL SERVER permission has all permissions on the instance of SQL Server.•The CONTROL DATABASE permission has all permissions on the database.•Permissions do not imply role memberships and role memberships do not grant permissions. (E.g. CONTROL SERVER does not imply membership in the sysadmin fixed server role. Membership in the db_owner role does not grant the CONTROL DATABASE permission.) However, it is sometimes possible to impersonate between roles and equivalent permissions.•Granting any permission on a securable allows VIEW DEFINITION on that securable. It is an implied permissions and it cannot be revoked, but it can be explicitly denied by using the DENY VIEW DEFINITION statement.Server Level PermissionsNotes:•Creating a full-text index requires ALTER permission on the table and REFERENCES permission on the full-text catalog.•Dropping a full-text index requires ALTER permission on the table.STATEMENTS:DROP DATABASEMarch 28, 2014How to Read this Chart•Most of the more granular permissions are included in more than one higher level scope permission. So permissions can be inherited from more than one type of higher scope.•Black, green, and blue arrows and boxes point to subordinate permissions that are included in the scope of higher a level permission.•Brown arrows and boxes indicate some of the statements that can use the permission.CREATE SERVER ROLEAvailability Group PermissionsCONTROL SERVERVIEW ANY DEFINITIONALTER ANY AVAILABILITY GROUPVIEW DEFINITION ON AVAILABILITY GROUP::<name>TAKE OWNERSHIP ON AVAILABILITY GROUP::<name>ALTER ON AVAILABILITY GROUP::<name>CONTROL ON AVAILABILITY GROUP::<name>CREATE AVAILABILITY GROUPADMINISTER BULK OPERATIONSALTER ANY AVAILABILITY GROUP –See Availability Group PermissionsCREATE AVAILABILTY GROUPALTER ANY CONNECTION ALTER ANY CREDENTIALALTER ANY DATABASE –See Database Permission ChartsCREATE ANY DATABASE –See Top Level Database PermissionsALTER ANY ENDPOINT –See Connect and AuthenticationCREATE ENDPOINT –See Connect and AuthenticationALTER ANY EVENT NOTIFICATIONCREATE DDL EVENT NOTIFICATION CREATE TRACE EVENT NOTIFICATIONALTER ANY EVENT SESSION ALTER ANY LINKED SERVERALTER ANY LOGIN –See Connect and Authentication ALTER ANY SERVER AUDITALTER ANY SERVER ROLE –See Server Role PermissionsCREATE SERVER ROLE –See Server Role PermissionsALTER RESOURCES (Not used. Use diskadmin fixed server role instead.)ALTER SERVER STATEVIEW SERVER STATEALTER SETTINGS ALTER TRACEAUTHENTICATE SERVERCONNECT SQL –See Connect and Authentication CONNECT ANY DATABASE IMPERSONATE ANY LOGIN SELECT ALL USER SECURABLES SHUTDOWN UNSAFE ASSEMBLYEXTERNAL ACCESS ASSEMBLYVIEW ANY DEFINITIONVIEW ANY DATABASE –See Database Permissions –Schema* NOTE:The SHUTDOWN statement requires the SQL Server SHUTDOWN permission. Starting, stopping, and pausing the Database Engine from SSCM, SSMS, or Windows requires Windows permissions, not SQL Server permissions.STATEMENTS:CREATE/ALTER/DROP server triggers OPENROWSET(BULK….KILL CREATE/ALTER/DROP CREDENTIAL DBCC FREE…CACHE and SQLPERF SELECT on server-level DMV’s sp_configure, RECONFIGURE sp_create_traceAllows server-level delegationCONTROL SERVERSTATEMENTS:CREATE/ALTER/DROP server triggers OPENROWSET(BULK …KILLServer scoped event notifications Server scoped DDL event notifications Event notifications on trace events Extended event sessions sp_addlinkedserverDBCC FREE…CACHE and SQLPERF SELECT on server-level DMV’s sp_configure, RECONFIGURE sp_trace_create Allows server-level delegation SHUTDOWN*CREATE/ALTER/DROP SERVER AUDIT and SERVER AUDIT SPECIFICATION CONTROL SERVERVIEW ANY DEFINITION ALTER ANY LOGINCONNECT SQLCONTROL ON LOGIN::<name>Connect and Authentication –Server PermissionsVIEW ANY DEFINITIONALTER ANY ENDPOINTCREATE ENDPOINTCONNECT ON ENDPOINT::<name>TAKE OWNERSHIP ON ENDPOINT::<name>VIEW DEFINITION ON ENDPOINT::<name>ALTER ON ENDPOINT::<name>CONTROL ON ENDPOINT::<name>Notes:•The CREATE LOGIN statement creates a login and grants CONNECT SQL to that login.•Enabling a login (ALTER LOGIN <name> ENABLE) is not the same as granting CONNECT SQL permission.•To map a login to a credential, see ALTER ANY CREDENTIAL.•When contained databases are enabled, users can access SQL Server without a login. See database user permissions.•To connect using a login you must have :o An enabled login o CONNECT SQLoCONNECT for the database (if specified)VIEW DEFINITION ON LOGIN::<name>IMPERSONATE ON LOGIN::<name>ALTER ON LOGIN::<name>STATEMENTS:ALTER LOGIN, sp_addlinkedsrvlogin DROP LOGIN CREATE LOGINSTATEMENTS:ALTER ENDPOINT DROP ENDPOINTCREATE ENDPOINTSTATEMENTS:ALTER SERVER ROLE <name> ADD MEMBER DROP SERVER ROLECREATE SERVER ROLESTATEMENTS:ALTER AVAILABILITY GROUP DROP AVAILABILITY GROUPCREATE AVAILABILITY GROUPCONTROL ON FULLTEXT CATALOG::<name>VIEW DEFINITION ON FULLTEXT CATALOG::<name>REFERENCES ON FULLTEXT CATALOG::<name>TAKE OWNERSHIP ON FULLTEXT CATALOG::<name>ALTER ON FULLTEXT CATALOG::<name>STATEMENTS:ALTER FULLTEXT CATALOG CREATE FULLTEXT CATALOGDatabase Role PermissionsCONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASEVIEW DEFINITION ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY ROLE CREATE ROLE CONTROL ON DATABASE::<name>VIEW DEFINITION ON ROLE::<name>TAKE OWNERSHIP ON ROLE::<name>ALTER ON ROLE::<name>CONTROL ON ROLE::<name>STATEMENTS:ALTER ROLE <name> ADD MEMBER DROP ROLECREATE ROLESymmetric Key PermissionsCONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASEVIEW DEFINITION ON DATABASE::<name>REFERENCES ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY SYMMETRIC KEYCREATE SYMMETRIC KEY CONTROL ON DATABASE::<name>VIEW DEFINITION ON SYMMETRIC KEY::<name>REFERENCES ON SYMMETRIC KEY::<name>TAKE OWNERSHIP ON SYMMETRIC KEY::<name>ALTER ON SYMMETRIC KEY::<name>CONTROL ON SYMMETRIC KEY::<name>STATEMENTS:ALTER SYMMETRIC KEY DROP SYMMETRIC KEY CREATE SYMMETRIC KEYNote: OPEN SYMMETRIC KEY requires VIEW DEFINITION permission on the key (implied by any permission on the key), and requires permission on the key encryption hierarchy.Asymmetric Key PermissionsCONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASEVIEW DEFINITION ON DATABASE::<name>REFERENCES ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY ASYMMETRIC KEYCREATE ASYMMETRIC KEYCONTROL ON DATABASE::<name>VIEW DEFINITION ON ASYMMETRIC KEY::<name>REFERENCES ON ASYMMETRIC KEY::<name>TAKE OWNERSHIP ON ASYMMETRIC KEY::<name>ALTER ON ASYMMETRIC KEY::<name>CONTROL ON ASYMMETRIC KEY::<name>STATEMENTS:ALTER ASYMMETRIC KEY DROP ASYMMETRIC KEYCREATE ASYMMETRIC KEYNote: ADD SIGNATURE requires CONTROL permission on the key, andrequires ALTER permission on the object.CONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASEVIEW DEFINITION ON DATABASE::<name>REFERENCES ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY CERTIFICATE CREATE CERTIFICATE CONTROL ON DATABASE::<name>VIEW DEFINITION ON CERTIFICATE::<name>REFERENCES ON CERTIFICATE::<name>TAKE OWNERSHIP ON CERTIFICATE::<name>ALTER ON CERTIFICATE::<name>CONTROL ON CERTIFICATE::<name>STATEMENTS:ALTER CERTIFICATE DROP CERTIFICATECREATE CERTIFICATENote: ADD SIGNATURE requiresCONTROL permission on the certificate, and requires ALTER permission on the object.CONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASEVIEW DEFINITION ON DATABASE::<name>REFERENCES ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY ASSEMBLY CREATE ASSEMBLYCONTROL ON DATABASE::<name>VIEW DEFINITION ON ASSEMBLY::<name>REFERENCES ON ASSEMBLY::<name>TAKE OWNERSHIP ON ASSEMBLY::<name>ALTER ON ASSEMBLY::<name>CONTROL ON ASSEMBLY::<name>STATEMENTS:ALTER ASSEMBLYDROP ASSEMBLYCREATE ASSEMBLYEvent Notification PermissionsCONTROL SERVERALTER ANY EVENT NOTIFICATIONCREATE DDL EVENT NOTIFICATIONCREATE TRACE EVENT NOTIFICATIONALTER ON DATABASE::<name>ALTER ANY DATABASE EVENT NOTIFICATION CREATE DATABASE DDL EVENT NOTIFICATIONCONTROL ON DATABASE::<name>Database scoped event notificationsDatabase scoped DDL event notificationsEvent notifications on trace eventsNote: EVENT NOTIFICATION permissions also affect service broker. See the service broker chart for more into.Connect and Authentication –Database PermissionsCONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASEVIEW DEFINITION ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY USER CONNECT ON DATABASE::<name>CONTROL ON DATABASE::<name>VIEW DEFINITION ON USER::<name>IMPERSONATE ON USER::<name>ALTER ON USER::<name>CONTROL ON USER::<name>STATEMENTS:ALTER USER DROP USER CREATE USERNOTES:•When contained databases are enabled, creating a database user that authenticates at the database, grants CONNECT DATABASE to that user,and it can access SQL Server without a login.•Granting ALTER ANY USER allows a principal to create a user based on a login, but does not grant the server level permission to view information about logins.Replication PermissionsCONTROL SERVERCONTROL ON DATABASE::<name>CONNECT REPLICATION ON DATABASE::<name>CONNECT ON DATABASE::<name>Application Role PermissionsCONTROL SERVERVIEW ANY DEFINITION ALTER ANY DATABASE CONTROL ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY APPLICATION ROLECONTROL ON APPLICATION ROLE::<name>VIEW DEFINITION ON APPLICATION ROLE::<name>ALTER ON APPLICATION ROLE::<name>STATEMENTS:ALTER APPLICATION ROLE DROP APPLICATION ROLE CREATE APPLICATION ROLESTATEMENTS:DROP FULLTEXT CATALOG DROP FULLTEXT STOPLISTDROP FULLTEXT SEARCH PROPERTYLISTCONTROL ON FULLTEXT STOPLIST::<name>VIEW DEFINITION ON FULLTEXT STOPLIST::<name>REFERENCES ON FULLTEXT STOPLIST::<name>TAKE OWNERSHIP ON FULLTEXT STOPLIST::<name>ALTER ON FULLTEXT STOPLIST::<name>STATEMENTS:ALTER FULLTEXT STOPLIST CREATE FULLTEXT STOPLISTCONTROL ON SEARCH PROPERTY LIST::<name>VIEW DEFINITION ON SEARCH PROPERTY LIST::<name>REFERENCES ON SEARCH PROPERTY LIST::<name>TAKE OWNERSHIP ON SEARCH PROPERTY LIST::<name>ALTER ON SEARCH PROPERTY LIST::<name>STATEMENTS:ALTER SEARCH PROPERTY LIST CREATE SEARCH PROPERTY LISTService Broker PermissionsNotes:•The user executing the CREATE CONTRACT statement must have REFERENCES permission on all message typesspecified.•The user executing the CREATE SERVICE statement must have REFERENCES permission on the queue and allcontracts specified.•To execute the CREATE or ALTER REMOTE SERVICE BINDING the user must have impersonate permission forthe principal specified in the statement.•When the CREATE or ALTER MESSAGE TYPE statement specifies a schema collection, the user executing thestatement must have REFERENCES permission on the schema collection specified.•See the ALTER ANY EVENT NOTIFICATION chart for more permissions related to Service Broker.•See the SCHEMA OBJECTS chart for QUEUE permissions.•The ALTER CONTRACT permission exists but at this time there is no ALTER CONTRACT statement.CONTROL ON REMOTE SERVICE BINDING::<name>VIEW DEFINITION ON REMOTE SERVICE BINDING::<name>TAKE OWNERSHIP ON REMOTE SERVICE BINDING::<name>ALTER ON REMOTE SERVICE BINDING::<name>STATEMENTS:ALTER REMOTE SERVICE BINDINGDROP REMOTE SERVICE BINDINGCREATE REMOTE SERVICE BINDINGCONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASECONTROL ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY REMOTE SERVICE BINDINGCREATE REMOTE SERVICE BINDINGCONTROL ON CONTRACT::<name>VIEW DEFINITION ON CONTRACT::<name>REFERENCES ON CONTRACT::<name>TAKE OWNERSHIP ON CONTRACT::<name>ALTER ON CONTRACT::<name>STATEMENTS:DROP CONTRACTCREATE CONTRACTCONTROL SERVER VIEW ANY DEFINITIONALTER ANY DATABASECONTROL ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>REFERENCES ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY CONTRACTCREATE CONTRACTCONTROL ON SERVICE::<name>VIEW DEFINITION ON SERVICE::<name>SEND ON SERVICE::<name>TAKE OWNERSHIP ON SERVICE::<name>ALTER ON SERVICE::<name>STATEMENTS:ALTER SERVICE DROP SERVICECREATE SERVICECONTROL SERVERVIEW ANY DEFINITION ALTER ANY DATABASE CONTROL ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY SERVICECREATE SERVICESTATEMENTS:ALTER ROUTE DROP ROUTE CREATE ROUTECONTROL SERVERVIEW ANY DEFINITIONALTER ANY DATABASECONTROL ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY ROUTECREATE ROUTE CONTROL ON ROUTE::<name>VIEW DEFINITION ON ROUTE::<name>TAKE OWNERSHIP ON ROUTE::<name>ALTER ON ROUTE::<name>STATEMENTS:ALTER MESSAGE TYPEDROP MESSAGE TYPE CREATE MESSAGE TYPECONTROL SERVER VIEW ANY DEFINITIONALTER ANY DATABASECONTROL ON DATABASE::<name>VIEW DEFINITION ON DATABASE::<name>REFERENCES ON DATABASE::<name>ALTER ON DATABASE::<name>ALTER ANY MESSAGE TYPECREATE MESSAGE TYPECREATE QUEUECONTROL ON MESSAGE TYPE::<name>VIEW DEFINITION ON MESSAGE TYPE::<name>REFERENCES ON MESSAGE TYPE::<name>TAKE OWNERSHIP ON MESSAGE TYPE::<name>ALTER ON MESSAGE TYPE::<name>Permission SyntaxCREATE DATABASE **ALTER ON DATABASE::<name>STATEMENTS: CREATE DATABASE, RESTORE DATABASE** NOTE:CREATE DATABASE is a database level permissionthat can only be granted in the master database.STATEMENTS:EXECUTE ASSTATEMENTS:EXECUTE ASSTATEMENTS:ALTER AUTHORIZATIONNotes:•ALTER AUTHORIZATION for any object might also require IMPERSONATE or membership in a role or ALTER permission on a role.•ALTER AUTHORIZATION exists at many levels in the permission model but is never inherited from ALTER AUTHORIZATION at a higher level.Note: CREATE and ALTER ASSEMBLY statements sometimes require server level EXTERNAL ACCESS ASSEMBLY and UNSAFE ASSEMBLY permissions, and can require membership in the sysadmin fixed server role.NOTES:Only members of the db_owner fixed database role can add or remove members from fixed database roles.NOTES:To add a member to a fixed server role, you must be a member of that fixed server role, or be a member of the sysadmin fixed server role.© 2014 Microsoft Corporation. All rights reserved.Database Engine PermissionsMicrosoft SQL Server 2014。

Fortinet VM On-Demand 计算机软件说明书

Fortinet VM On-Demand 计算机软件说明书

Fortinet VM On-Demand ProgramThe Fortinet VM On-Demand Program is designed to enable Managed Security Service Providers (MSSPs) and Cloud Providers to deliver award-winning Fortinet firewall and other protection in an on-demand, pay-as-you-grow model that is better aligned with the agility and elasticity of modern cloud-based workloads. Members of Fortinet’s MSSP Partner Program, as well as other qualified Communication Service Providers globally, candeploy scalable virtualized firewalling and advanced security services on an as-need, per-tenant basis with actual costs automatically and transparently measured based on actual usage.Unlimited and automatic VM instance activations to support any size of elastic workloads.Includes Security Subscription Services and 24x7 SupportIncludes FortiGuard services and FortiCare support. FortiManager is required but not provided.ComponentsThe Fortinet VM On-Demand Program encompasses existing, proven Fortinet technologies to enable Communication Service Providers to deliver advanced security services to their customers/ponentDescriptionFortiOS Virtual ApplianceFortiOS provides industry-leading protection, superior visibility and control, and extensive networking capabilities. With FortiOS, you can set consolidated policies that include granular security controls. Every security service is managed through a similar paradigm of control and can be easily plugged into a consolidated policy.FortiWebOS Virtual ApplianceFortiWebOS provides complete security for your external and internal web-based applications from the OWASP Top 10 and many other threats. Using IP Reputation services, botnets and other malicious sources are automatically screened out before they can do any damage. DoS detection and prevention keeps your applications safe from being overloaded by Layer 7 DoS attacks.FortiManagerFortiManager lets you maintain control over your FortiGate and FortiAP topologies through an easy-to-use, centralized, single-pane-of-glass management console. Easily control the deployment of security policies, FortiGuard content security updates, firmware revisions, and individual configurations for thousands of FortiOS-enabled devices.FortiGuard/FortiCareFortiCare is a centralized hub to search, update and generate reports on registered solutions such as location and entitlement. Metering Group assignment and reports are all done from this one centralized location.FortiGuard Labs provides the industry-leading security services and threat intelligence delivered through Fortinet solutions. FortiOS manages the broad range of FortiGuard services available, including application control, intrusion prevention, web filtering, antivirus, advanced threat protection and SSL inspection.FortiCare / FortiGuardReports / FinanceFortiManager Metering ModuleUsage CollectionValidation / AuthorizationFortiOS-VMFortiWebOS-VMPolicy EnforcementR e p o r t i n gL i c e n s e /R e g i s t r a t i o nService levels may be changed at any point by the administrator via the Web UI, CLI or through existing FortiManager APIs.MeteringFortinet devised and implemented a simple point system for traversing multiple currency zones enabling a unified method of metering wherever tenants/data centers are deployed. Points are consumed by authorized Fortinet virtual appliances securing traffic to and from tenant’s secured assets/workloads. Fully configurable, granular service options allow for multiple security profiles to be assigned to authorized Fortinet virtual appliances enabling incremental metering levels.Program OptionsTwo flexible options are available within the VM On-Demand Program to better fit a wide variety of Service Providers’ metering requirements. Resource-BasedResource-Based metering allows Service Providers to meter an instance’s assigned resources (virtual CPUs and RAM) and service level hourly. With this method, there are no variations in cost to run the Fortinet virtualized security solution. An example is a Service Provider who charges a monthly set price for a Fortinet security solution with a set instance size and specific security profile — the cost will not vary month-to-month. They will know exactly what the cost will be and allow them to set a specific cost for their tenant.Volume-BasedVolume-Based metering allows Service Providers to deploy instances with any amount of resources required for an individual tenant’s requirements for any scheduled timeframe that the Service Provider sets. Metering is based on the amount of traffic volume that the security engine processes. As opposed to the Resource-Based option, which meters the security solution on the amount of resources assigned over time, the Volume-Based option is truly pay-for-use. The harder it works, the more it costs — and lightly used instances cost less.SPECIFICATIONSGLOBAL HEADQUARTERS Fortinet Inc.899 KIFER ROAD Sunnyvale, CA 94086United StatesTel: +/salesEMEA SALES OFFICE 905 rue Albert Einstein 06560 Valbonne FranceTel: +33.4.8987.0500APAC SALES OFFICE 300 Beach Road 20-01The Concourse Singapore 199555Tel: +65.6395.2788LATIN AMERICA SALES OFFICE Sawgrass Lakes Center13450 W. Sunrise Blvd., Suite 430Sunrise, FL 33323United StatesTel: +1.954.368.9990Copyright© 2017 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST -PROD-DS-V OD V M OD-PG-DAT -R3-201706Fortinet VM On-Demand ProgramSP-VM10K Adds 10,000 points to the Fortinet VM On-Demand program account for metering of Fortinet Virtual Appliance (VM) solutions.SP-VM25KAdds 25,000 points to the Fortinet VM On-Demand program account for metering of Fortinet Virtual Appliance (VM) solutions.ORDER INFORMATION。

戴尔笔记本电脑使用说明书.pdf_1700840703.9113853

戴尔笔记本电脑使用说明书.pdf_1700840703.9113853

Microsoft Windows 7: Guide de mise en routeConfiguration de Windows 7Votre ordinateur Dell est préconfiguré avec lesystème d'exploitation Microsoft® Windows® 7si vous l'avez sélectionné au moment de l'achat.Pour installer Windows la première fois, suivezles instructions qui s'affichent. Ces étapes sontobligatoires et peuvent prendre un certain temps.Les écrans de configuration Windows vous guidentdans différentes procédures, notammentl'acceptation des contrats de licence, la définitiondes préférences et la configuration d'uneconnexion Internet.PRÉCAUTION: N'interrompez pas leprocessus d'installation du systèmed'exploitation. Cela pourrait rendre votreordinateur inutilisable, vous devriez alorsréinstaller le système d'exploitation.REMARQUE: Pour des performancesoptimales de votre ordinateur, il estrecommandé de télécharger et d'installer lesdernières versions du BIOS et des pilotespour votre ordinateur, disponibles à l'adresse.Connexion à l'Internet (facultatif)Pour vous connecter à Internet, vous devezdisposer d'un modem externe ou d'une connexionréseau et d'un fournisseur d'accès Internet (FAI).Si votre commande ne comportait pas de modemUSB ou adaptateur de réseau sans fil externe, vouspouvez en acheter un à l'adresse .Octobre 2009Configuration d'une connexion filaire•Si vous utilisez une connexion d'accèsàdistance, branchez une ligne téléphonique au modem externe USB en option sur votreordinateur et à la prise téléphonique muraleavant de configurer la connexion Internet. •Si vous utilisez une connexion DSL ou modemcâble/satellite, contactez fournisseur d'accèsInternet (FAI) ou opérateur téléphonique mobile pour obtenir des instructions de configuration. Pour terminer la configuration de votre connexion Internet filaire, suivez les instructions de la section «Configuration de votre connexion Internet». Configuration d'une connexion sans filAvant de pouvoir utiliser votre connexionàl'Internet sans fil, vous devez vous connecteràvotre routeur sans fil.Pour configurer votre connexion à un routeur sans fil:1Assurez-vous que le réseau sans fil est activé sur votre ordinateur.2Enregistrez et fermez tous les fichiers ouverts et quittez tous les programmes en coursd'exécution.3Cliquez sur Démarrer → Panneau deconfiguration→Centre Réseau et partage→Connexion à un réseau.4Pour effectuer la configuration, suivez les instructions qui s'affichent à l'écran. Configuration de la connexion Internet Les fournisseurs d'accès Internet (FAI) et leurs offres varient selon les pays. Prenez contact avec votre fournisseur d'accès Internet pour connaître les offres disponibles dans votre pays.Si vous ne pouvez pas vous connecter à Internet alors que vous l'avez déjà fait auparavant, il est possible que le fournisseur d'accès Internet subisse une interruption de services. Contactez votre FAI pour vérifier l'état du service ou essayez de vous connecter ultérieurement.2Assurez-vous de disposer des informations fournies par votre fournisseur d'accès Internet (FAI). Si vous ne disposez pas d'un FAI, l'assistant ConnexionàInternet peut vous aider à en trouver un.Pour configurer votre connexion Internet:1Enregistrez et fermez tous les fichiers ouverts et quittez tous les programmes en coursd'exécution.2Cliquez sur Démarrer→Panneau deconfiguration.3Cliquez sur Centre Réseau et partage→Configurer une connexion ou un réseau→ConnecteràInternet.La fenêtre Connexion à Internet s'affiche.REMARQUE: Si vous ne savez pas quel typede connexion choisir, cliquez sur Commentchoisir ou prenez contact avec votre FAI.4Suivez les instructions à l'écran pour utiliser les informations de configuration fournies par votre FAI et terminez la configuration.Fonctionnalités de base de Windows 7Personnalisation du bureauVous pouvez personnaliser votre bureau pour en modifier la présentation, la résolution, l'arrière-plan, l'écran de veille ou d'autres fonctions.Pour personnaliser votre bureau:1Cliquez avec le bouton droit sur une zone vide du bureau.2Cliquez sur Personnaliser, pour ouvrir la fenêtre Modifier les effets visuels et les sons de votre ordinateur et en savoir plus sur les options depersonnalisation.Transfert d'informations vers un nouvel ordinateurPour transférer des informations vers un nouvel ordinateur1Cliquez sur Démarrer→Panneau deconfiguration.342Tapez dans la case de rechercher Transfert puis cliquez sur Transférer des fichiers d'un autre ordinateur .3Suivez les instructions de l'assistantWindows Easy Transfer .Sauvegarde de vos donnéesNous vous conseillons de régulièrementsauvegarder les fichiers et dossiers qui figurent sur votre ordinateur.Pour sauvegarder des fichiers :1Cliquez sur Démarrer → Panneau de configuration → Système et sécurité→ Sauvegarde et restauration .2Cliquez sur Sauvegarder et restaurer....3Suivez les instructions de l'assistant Configurer la sauvegarde .Réinstallation de Windows 7Le processus de réinstallation peut prendre de 1à2heures. Après avoir réinstallé le système d'exploitation, vous devez réinstaller les pilotes de périphériques, le programme antivirus ainsi que d'autres logiciels.Pour réinstaller Windows 7:1Enregistrez et fermez tout fichier ouvert et quittez tous les programmes d'application en cours d'exécution.2Insérez le disque Operating System .3Cliquez sur Quitter si le message Installer Windows apparaît.4Redémarrez l'ordinateur.5Lorsque le logo DELL apparaît, appuyez immédiatement sur <F12>. REMARQUE : Si vous attendez trop longtemps et que le logo du système d'exploitation apparaît, patientez jusqu'à ce que le bureau de Microsoft Windows s'affiche ; éteignez alors votre ordinateur et faites une nouvelle tentative.REMARQUE: La procédure ci-dessousmodifie la séquence de démarrage pour unseul démarrage. Au démarrage suivant,l'ordinateur démarre en fonction despériphériques définis dans le programme deconfiguration du système.6Lorsque la liste des périphériques d'amorçages'affiche, sélectionnez Lecteur CD/DVD/CD-RWet appuyez sur <Entrée>.7Appuyez sur une touche pour sélectionner Bootfrom CD-ROM (Démarrer sur CD-ROM).Suivez les instructions qui s'affichent pourterminer l'installation.__________________Les informations de ce document sont sujettes à modification sanspréavis.©2009Dell Inc.Tous droits réservés. Imprimé en Irlande.La reproduction de ce document de quelque manière que ce soit sansl'autorisation écrite de Dell Inc. est strictement interdite.Marques utilisées dans ce document: Dell et le logo DELL sont desmarques de Dell Inc; Microsoft et Windows sont des marques ou desmarques déposées de Microsoft Corporation aux Etats-Unis et dansd'autres pays.Les autres marques et noms de produits pouvant être utilisés dans cedocument sont reconnus comme appartenant à leurs propriétairesrespectifs. Dell Inc. rejette tout intérêt dans l'utilisation des marqueset des noms commerciaux ne lui appartenant pas.56。

broadcom 驱动 linux 释放说明 14.0.326.25-14.0.326.14说明书

broadcom 驱动 linux 释放说明 14.0.326.25-14.0.326.14说明书

Release NotesPurpose and Contact InformationThese release notes describe the new features, resolved issues, FC and NVMe driver known issues, and FC and NVMe technical tips associated with this release of the Emulex ® drivers for Linux.For the latest product documentation, go to . If you have questions or require additional information, contact an authorized Broadcom ® Technical Support representative at *****************************.New FeaturesRelease 14.0.326.25There are no new features in this release.Release 14.0.326.19Added support for the RHEL 8.5 operating system.Release 14.0.326.14⏹Added LPe35000-series and LPe36000-series adapters support for Arm on RHEL 8.x and Ubuntu 20.04 operating systems. ⏹Added support to the fcping command to ping other nodes in a zone without having to log in. ⏹Added support for NVMe storage as a kdump device during boot from SAN (BFS) operation. ⏹Introduced the lpfc_fcp_wait_abts_rsp driver parameter to enable or disable quick abort behavior. ⏹Synchronized the HostNQN and Host values between the operating system driver and the UEFI configuration utility. ⏹Discontinued support for LPe12000-series, LPe15000-series, and LPe16000-series adapters. ⏹Discontinued support for the following operating systems: –RHEL 7.7–RHEL 8.1 –SLES 15 SP1⏹Disabled the elx-lpfc-vector-map.sh script in the RHEL 7 driver RPM package.Emulex ® Drivers for LinuxRelease 14.0.326.25⏹The following changes were made to NVMe:–Added support to create the HostNQN and HostID using the system UUID.–Discontinued support for creating a HostNQN based on the adapter WWPN.–Added support for reading, writing, and dumping EFI variables NvmeHostNQN and NvmeHostID.–Added support for the NVMe BFS kit on SLES 15 SP3 and RHEL 8.4 operating systems.NOTE:Since the nvmefc-dm features are now inbox in SLES 15 SP3, you do not need to use the NVMe BFS kit on SLES15 SP3 to BFS. However, if the operating system installer determines that the system UUID is not random enoughand silently generates a new UUID, you must use the NVMe BFS kit to resolve the issue.Resolved IssuesRelease 14.0.326.25On the SLES 12 SP2 operating system with a multiport HBA, using FC inbox driver version 12.8.0.10 or FC out-of-box driver 14.0.326.x, the issue of targets being discovered on only one port is resolved.Release 14.0.326.19There are no resolved issues in this release.Release 14.0.326.14⏹On the CentOS 8 operating system, the driver installer script no longer fails to determine the distribution and version.⏹HBA reset no longer causes the congestion buffer to be reset. Both congestion buffer information and statistics arepreserved across reset.FC Driver Known Issues1.On Red Hat Virtualization (RHV) 4.4, dracut does not add the lpfc driver configuration file to initramfs.Workarounda.Edit the /usr/lib/dracut/dracut.conf.d/02-generic-image.conf file.b.Add a # before the hostonly=no string to comment out the entry.c.Rebuild the initramfs using dracut.2.On RHEL 8.4 inbox drivers, diagnostic loopback tests always fail and might result in a timeout error.WorkaroundInstall any RHEL 8.4 supported out-of-box driver version.3.There is a change to the value specified for the driver parameter lpfc_log_verbose in Step 5 in Section 2.5 Updatingthe Firmware. For details, refer to the Emulex Drivers for Linux User Guide4.An unrecoverable operating system fault might occur when generating a crash dump after successful installation of theSLES 15 SP2 operating system on a local device or an FC BFS LUN.WorkaroundInstall the SUSE maintenance update dracut-049.1+suse.183.g7282fe92-3.18.2.x86_64.rpm orlater.Release 14.0.326.25Release 14.0.326.25NVMe Driver Known Issues1.Unloading the Fibre Channel Protocol (FCP) driver using the modprobe -r command might cause issues on the initiatorbefore NVMe devices are disconnected.WorkaroundUnload the driver with rmmod lpfc, or if modprobe –r lpfc is required, wait for the device loss period of 60 seconds before unloading the driver.2.On RHEL 7.8 inbox drivers with NVMe targets connected to the port, when the firmware is upgraded, the No host rebootrequired to activate new firmware feature might not work as intended.WorkaroundIf the new firmware is not activated, reload the driver or reboot the system.3.On the Oracle Linux 7.7 unbreakable enterprise kernel (UEK) R6 operating system, unloading a Linux FCP driver withNVMe connections might fail.WorkaroundDisconnect the NVMe connections before unloading the Linux FCP driver.4.When performing a clean operating system installation of RHEL 8.2 and loading the nvme-cli RPM from the ISO, thedefault hostid and hostnqn values are the same on multiple servers.WorkaroundUpdate the nvme-cli utility to version 1.10.1-1.el8 or later.5.On an NVMe controller, reconnectivity issues may occur during switch port toggles. This issue is an operating systemissue.WorkaroundContact Red Hat or SUSE technical support.6.In the fstab file, when an NVMe namespace mount point entry is included and the defaults option is specified, if theoperating system is rebooted, the operating system might go into emergency mode.WorkaroundsFor SLES15 SP3:Specify nofail as the mount option when creating the NVMe namespace fstab mount point entry.For RHEL7.x, SLES 12 SP5, SLES 15 SP2, and RHEL8.x:–Specify nofail as the mount option when creating the NVMe namespace fstab mount point entry.–Install the nvmf boot dracut module provided in the nvmefc-dm kit.7.The SLES 15 SP3 installer might not discover the NVMe namespace to install the operating system.WorkaroundUse the nvmefc-dm kit to discover the NVMe namespace.8.During RHEL 7.x and RHEL 8.2 installation, the operating system reports an error while attempting to add an UEFI bootentry. This issue is an operating system issue and has been reported to Red Hat.NOTE:This issue is specific to NVMe BFS.WorkaroundIgnore the warning prompt and continue the installation. On the first reboot, use the server UEFI menu to select the adapter port that is attached to the fabric to boot the operating system.9.On SLES 12 SP5, the nvmefc-boot-connections systemd unit is disabled after the operating system is installedusing NVMe BFS. This issue leads to the operating system failing to discover all NVMe subsystems when a large number of NVMe subsystems exist.WorkaroundManually enable the nvmefc-boot-connections systemd unit. See NVMe Driver Technical Tips, Item6, for more information.10.An unrecoverable operating system fault might occur when generating a crash dump after successful installation of theoperating system in the NVMe BFS namespace.WorkaroundFrom the NVMe BFS kit, extract and install the nvmefc-dm RPM that matches the installed operating system.# tar zxf elx-nvmefc-dm-<version>-<release>/nvmefc-dm-<version>-<release>.<OS>.tar.gz11.If the operating system was installed using NVMe over FC BFS, and you are updating the firmware from version12.8.xxx.xx to version 14.0.xxx.xx, NVMe storage might not be found, and the UEFI boot menu might not boot theoperating system.WorkaroundIn the UEFI configuration utility, enable the Generate and use a Port Based HostNQN option. Refer to the Emulex Boot for the Fibre Channel and NVMe over FC Protocols User Guide for details.12.If the operating system was installed using NVMe over FC BFS, and you are updating the firmware from version14.0.xxx.xx to version 12.8.xxx.xx, NVMe storage might not be found, and the UEFI boot menu might not boot theoperating system.WorkaroundUpdate the SAN storage configuration and add an adapter WWPN-based HostNQN to the storage array.FC Driver Technical Tips1.For secure boot of the RHEL operating system, download the public key file for the RHEL operating system from, and place it in the systems key ring before installing the signed lpfc driver for the RHEL operating system. Refer to the Red Hat documentation for instructions on adding a kernel module to the system.2.On Red Hat operating systems, the installer automatically searches for a driver update disk (DUD) on a storage volumelabeled OEMDRV. For details, refer to the Red Hat documentation.3.Out-of-box Linux driver builds are built on, and are intended to be run on, general availability (GA) kernels for theirrespective distributions. If you need an out-of-box Linux driver build for a subsequent distribution’s errata kernel, you might need to recompile the driver from the Linux driver source file on the errata kernel.NVMe Driver Technical Tips1.Creation of N_Port ID Virtualization (NPIV) connections on initiator ports that are configured for NVMe over FC is notsupported. However, initiator ports can connect to FCP and NVMe targets simultaneously.2.NVMe disks might not reconnect after a device timeout greater than 60 seconds has occurred.WorkaroundYou must perform a manual scan or connect using the nvme connect-all CLI command.3.To manually scan for targets or dynamically added subsystems, type the following command (all on one line):nvme connect-all --transport=fc --host-traddr=nn-<initiator_WWNN>:pn-<initiator_WWPN>--traddr=nn-<target_WWNN>:pn-<target_WWPN>where:–<initiator_WWNN> is the WWNN of the initiator, in hexadecimal.–<initiator_WWPN> is the WWPN of the initiator, in hexadecimal.–<target_WWNN> is the WWNN of the target, in hexadecimal.–<target_WWPN> is the WWPN of the target, in hexadecimal.For example:# nvme connect-all --transport=fc --host-traddr=nn-0x20000090fa942779:pn-0x10000090fa942779 --traddr=nn-0x20000090fae39706:pn-0x10000090fae397064.To enable autoconnect on the following operating systems, install nvme-cli from the operating system distributionmedia:–RHEL 8.3–RHEL 8.2–SLES 15 SP2–SLES 12 SP55.If the following files are present on the system after the operating system is installed, the operating system has alreadyinstalled NVMe over FC autoconnect facilities. Do not install the Emulex autoconnect script file for inbox NVMe over FC drivers.–/usr/lib/systemd/system/nvmefc-boot-connections.service–/usr/lib/systemd/system/nvmefc-connect@.service–/usr/lib/udev/rules.d/70-nvmefc-autoconnect.rules6.Enable nvmefc-boot-connections to start during boot.Use systemctl enable to enable the nvmefc-boot-connections systemd unit to start during boot.# systemctl enable nvmefc-boot-connectionsCreated symlink /etc/systemd/system/default.target.wants/nvmefc-boot-connections.service ? /usr/ lib/systemd/system/nvmefc-boot-connections.service.7.Back up the initial ramdisk before upgrading the operating system.During an operating system upgrade, the kernel or nvme-cli might be upgraded. Back up the initial ramdisk before upgrading the operating system to ensure that the operating system is still bootable in the event that NVMe BFS fails due to a change in either the kernel or nvme-cli.Change the directory to /boot, and make a copy of the initial ramdisk.Example for SUSE operating systems:# cd /boot# cp initrd-$(uname -r) initrd-$(uname -r).bakExample for Red Hat operating systems:# cd /boot# cp initramfs-$(uname -r).img initramfs-$(uname -r).img.origCopyright © 2022 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, go to . All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others.。

Windows Server 2012 R2 快速入门指南说明书

Windows Server 2012 R2 快速入门指南说明书
NOTE: You can switch between the Server Core option and the Server with a GUI option as needed at any time later.
For more information about the installation options, what is included with each option, how to switch between them, and related features such as the Minimal Server Interface and Features on Demand, see Windows Server Installation Options at /fwlink/p/?LinkId=242140.
Automated Installation You can automate Windows Server installation by using the tools and documentation in the Windows Assessment and Deployment mating deployment eliminates the need for any user interaction during installation. In addition, you can configure different options within the operating system, such as Internet Explorer settings and network settings.
The two installation options are available for most Windows Server editions. Not all server roles and features are available in all editions. For details about the roles and features available in each Windows Server edition, see /fwlink/p/?LinkId=251499

戴尔刀片服务器电源解决方案说明书

戴尔刀片服务器电源解决方案说明书

BLADE SERVERSBy consolidating servers, infrastructure components, and management within a single chassis, DellPowerEdge blade servers can help achieve high efficiency in the data center and provide an optimized rack environ-ment. Blade server deployment requires careful planning of data center resources such as power, networking, infra-structure fabric, cooling, and management access—and the blade server architecture differs from monolithic serv-ers in its possible redundant configurations.The system chassis used in today’s monolithic servers hosts a single compute node with one or more CPUs, local storage, network, and other infrastructure components such as management access, power, and cooling. Redun-dancy options for monolithic servers range from cooling to network redundancy, thereby eliminating single points of failure. Several Dell PowerEdge servers offer redundant hot-pluggable cooling fans and power supplies, redundant memory with failover memory banks for memory mirror-ing, RAID controllers for redundant storage configuration,and dual-port integrated network interface cards (NICs)with network teaming software for redundant network con-figuration. When ordered with power, cooling, or memoryredundancy options, Dell PowerEdge servers arrive fully configured and these options do not require any additional configuration at the deployment site. Network and storage redundancy options, however, require additional configura-tion using management applications.The system chassis of Dell PowerEdge blade servers,known as the Dell Modular Server Enclosure, can host up to 10 compute nodes (server blades), plus shared infrastruc-ture components. The common infrastructure components include cooling fans, power supplies, network switches, I/O modules, a KVM (keyboard, video, mouse) module, and chassis management in the form of the Dell Remote Access Controller/Modular Chassis (DRAC/MC). These compo-nents are shared through the midplane, which is passive to help ensure high reliability—that is, the midplane contains no active logic, just connectors and traces. Each server blade in a modular server chassis typically offers the same redundancy options as a monolithic server.The primary reason for implementing redundant configurations within servers is to avoid single points of failure. Depending on the type of device and the design of the redundancy algorithm, setting up a redundantBY NARAYAN DEVIREDDY AND SANJEEV S. SINGHUnderstanding Redundancyin Dell PowerEdge Blade ServersWhen administrators plan blade server deployment, they should carefully review redundant system configuration options. Depending on the data center’s design and IT policies, blade server systems may require redundancy at different levels. Dell ™ PowerEdge ™ blade servers offer redundancy options for various functions—ranging from power redundancy to chassis-management redundancy.Related Categories:Blade serversDell PowerEdge blade serversSystems managementVisit /powersolutions for the complete category index.BLADE SERVERSblades; failure of any one power supply does not cause the chassis to power down.• 2+2 redundancy: In this mode, the capacity of two powersupplies is kept in reserve while powering up the server blades; failure of any two power supplies does not cause the chassis to power down.Note:If administrators have already deployed a Dell Modular Server Enclosure with the DRAC/MC installed, they can upgrade the firm-ware to version 1.3. For more information about obtaining DRAC/MCfirmware version 1.3, visit .The desired power supply redundancy policy can be selected from the Power Budget page of the DRAC/MC Web interface (see Figure 2). The same selections can be made through the DRAC/MC command-line interface using the following command:racadm config –g cfgChassisPower –o cfgChassisRedundancyPolicy valueV alid values for the cfgChassisRedundancyPolicy option are 0 (no redundancy),1 (3+1 redundancy), and2(2+2 redundancy).The redundancy policy selection is available only if four 2,100-watt power supplies are installed.1 If a power supply is not installed, fails, or is removed, the If one or more power Yes if one power supply fails; no if two or more power supplies failual-core Dell PowerEdge 1855 and Dell PowerEdge 1955 blade server systems do not support 1,200 watt Figure 2. DRAC/MC Power Budget screenBLADE SERVERSBLADE SERVERSured to achieve optimal results.。

微芯片公司SyncServer S650高精确、安全和灵活的时间与频率标准说明书

微芯片公司SyncServer S650高精确、安全和灵活的时间与频率标准说明书

SyncServer® S650Accurate, Secure and Flexible Time and Frequency StandardFeatures•<15 ns RMS to UTC (USNO) through GPS •<1x10–12 frequency accuracy •Modular timing architecture with unique and innovative FlexPort™ technology •Popular timing signal inputs/outputs standard in the base timing I/O module(IRIG B, 10 MHz, 1PPS)•Four standard GbE ports with NTP hardware time stamping, two additional10 GbE ports optional•Web-based management with high-security cipher suite•–20°C to 65°C operating temperature, shock and vibration qualified •Rubidium Atomic Clock or OCXO oscilla-tor upgrades•Dual power supply option •Additional timecode I/O including IRIG A/B/C37/E/G/NASA/2137/XR3/HaveQuick/PTTI available•T1/E1 Telecom I/O available •Superior 10 MHz low phase noise options•Galileo/GLONASS/BeiDou/SBAS/QZSS option•PTP multi-port/profile output option •PTP input option•S650i model with no GNSS •DISA/DoDIN approved product Applications•FlexPort timing technology efficiently and cost-effectively adds innovative“any signal, any connector” technology,eliminating the wasted space inherentwith legacy style fixed-signal modules/BNCs•Best-in-class low phase noise 10 MHz outputs for satellite ground stations and radar systems•Multiple GbE network ports for easy network configuration and adaptation •Reliable and rugged design for long product life and wide application scope •Many security-hardened, network basedfeatures for stringent IA requirementsS650 with Timing I/O Modules(Optional Configuration)Unparalleled FlexibilityThe modular SyncServer® S650 combinesthe best of time and frequency instrumen-tation with unique flexibility and powerfulnetwork/security-based features.The base Timing I/O module with eightBNC connectors comes standard with themost popular Timing I/O signals (IRIG B, 10MHz and 1 PPS). When more flexibility isrequired, the unique FlexPort technologyoption enables six of the BNCs to outputmany supported signals (time codes, sinewaves, programmable periods), all configu-rable in real time through the secure webinterface. This incredibly flexible BNC-by-BNC configuration makes efficient andcost-effective use of the 1U space available.Similar functionality is applied to the twoinput BNCs, as well. Unlike legacy moduleswith fixed count BNCs outputting fixedsignal types per module, FlexPort technol-ogy can allow up to 12 BNCs to output anycombination of supported signal types.The Timing I/O module is also available withT1/E1 Telecom I/O, HaveQuick/PTTI I/O andfiber input/output connectors.Superior Low Phase Noise (LPN)PerformanceFor applications requiring superior LPN 10MHz signals, two different LPN modules areavailable. Each module has eight extremelyisolated 10 MHz LPN outputs, with eachmodule offering excellent levels of LPN orultra LPN performance.Robust Timing and DesignThe 72-channel GNSS receiver coupledwith Microchip's patented active thermalcompensation technology provides excellentaccuracy of <15 ns RMS to UTC (USNO). Thisin addition to a durable hardware designsubjected to MIL-STD-810H testing, high-reli-ability components extending the operatingtemperature range to –20°C to 65°C, anddual power supply options. Further, upgrad-ing to a high-performance oscillator, such asa Rubidium atomic clock, keeps SyncServerS650 accurate for long periods in the eventof a GNSS service disruption.Secure NetworkingSecurity is an inherent part of SyncServerS650. In addition to many security featuresand protocols, services can be selectivelydisabled. The four standard GbE ports, andtwo optional 10 GbE ports, can accommo-date 10,000 NTP requests per second usinghardware time stamping and compensa-tion. NTP monitoring, charting and MRUlogging assist in managing the NTP clientactivity. For more secure NTP operations,enable the optional security-hardened NTPReflector™ with line speed, 100% hardware-based NTP packet processing.Leverage Built-In HardwareSyncServer S650 includes many built-inhardware features enabled throughsoftware license keys, such as the security-hardened NTP Reflector, Galileo/GLONASS/BeiDou/QZSS support, and multi-port/pro-file IEEE 1588 PTP output/input operations.SyncServer S650, the future of time andfrequency, today. Four GbE Ports for Performance, Flexibility and SecurityThe S650 has four dedicated and isolated GbE Ethernet ports, each equipped with NTP hardware time stamping. These are connected to a high-speed microprocessor with microsecond-accurate timestamps to assure high-bandwidth NTP performance. This exceeds the need of servicing 10,000 NTP requests per second with no degrada-tion in time stamp accuracy.Multiple ports provide the flexibility to adapt to different network topologies as networks grow and change. An S650 can be the single time source to synchronize clients on different subnets and physi -cal networks. There is only one time reference, but it can appear as though there are four clocks available because each port is independent.NTP can be served on all four ports (six if 10 GbE ports are added). The highly secure web-based management interface is only available on port 1, so that administrators may choose to keep that IP address private and secure. Unique access control lists per port can govern server response to client requests for time.Intuitive, Secure and Easy-to-Use Web InterfaceThe modern web interface is the primary control interface of the S650. Once the keypad and display bring the unit online, complete status and control functions are easily found on the left navigation menu. A REST API also included.Standard Management Access SecurityAll of the expected network management protocols are standard in the S650. These include mandatory password access, HTTPS/SSL only (using the high-encryption cipher suite), SSH, access control lists, ser-vice termination, SNMPv2/v3, and NTP MD5 authentication. All traffic to the S650 CPU is bandwidth-limited for protection against DoSattacks. The local keypad on the server can be password-protected to prevent tampering.Security-Hardening OptionThe SyncServer S650 can be further hardened from both an NTP perspective and an authentication perspective through the Security Protocol License option that includes the security-hardened NTP Reflector.Operational hardening through the 360,000 NTP packet per second NTP Reflector with 100% hardware-based NTP packet processing also works with a CPU-protecting firewall by bandwidth limiting all non-NTP traffic. The Reflector also monitors packet flow for DoS detection and reporting, yet remains impervious to the level of network traffic as it operates at line speed.Authentication hardening is available for NTP client/server authenti-cation through the NTP Autokey function or user access authentica-tion through TACACS+, RADIUS and LDAP. Third party CA-signed X.509 certificates are installable for further hardening of manage -ment access and secure syslog operations. For more information about the Security Protocol License option, see the SyncServerOptions datasheet.The four GbE ports provide network configura -tion flexibility and enhanced security. Multiple isolated and synchronized time servers can also be configured. Two 10 GbE SFP+ ports can be added for NTP/PTP operations as well.At-a-glance dashboard presentation combined with logical organization andintuitive controls that make configuring the S650 easy.An entire drop-down menu in the S650 dedicated to security-related protocols.Unprecedented NTP AccuracyThe Stratum 1 level S650 derives nanosecond-accurate time directly from the atomic clocks aboard the GPS satellites. By using an integrated, 72-channel GNSS receiver, every visible satellite can be tracked and used to maintain accurate and reliable time. Even in urban canyon environments where direct satellite visibility can be limited, manually inputting the position can be sufficient to acquire accurate time from as few as one intermittent satellite.Ultra-High Performance NTPThe S650 can effortlessly support hundreds of thousands of network clients while maintaining microsecond-caliber NTP time stamp accuracy. NTP request throughput rates can exceed 10,000 requests/ second while maintaining NTP time stamp accuracy. NTP monitoring, charting and MRU logging assist in managing the NTP client activity. If the Security Protocol License option is enabled, the NTP Reflector can process over 360,000 NTP requests per second with 15-nanosecond caliber time stamp accuracy with the added benefit of security-hardening the network port.Superior Low Phase Noise PerformanceThe S650 can be optimized to provide the best possible low phase noise 10 MHz signals. Two LPN modules are available to choose from depending on the phase noise sensitivity of the user application. Each module has eight extremely isolated 10 MHz LPN outputs with each module offering excellent levels of LPN and Ultra LPN perfor-mance from the close in 1 Hz out to 100 kHz.Multi-Port/Profile IEEE 1588 PTP Grandmaster Applications demanding very precise time accuracy can require the IEEE 1588 precise time protocol (PTP). The S650 PTP Output License enables multi-port/profile PTP grandmaster operations leveraging the built-in hardware time stamping on each LAN port of the S650. IEEE 1588 PTP Input LicensePTP input is useful for tunneling time to the S650 over the network. PTP input can be the primary time reference or used as a backup reference in the event of GPS signal loss. With GPS, the S650 can automatically calibrate and store observed network path delay asym-metries for PTP input use if the GPS signal is lost.Multi-GNSS Constellation Support for Enhanced ReliabilityTiming integrity, continuity and reliability can be improved withthe GNSS option that adds support for Galileo, GLONASS, BeiDou, QZSS and SBAS constellations in addition to the standard GPS constellation. With more satellites in view, timing performance can be improved in challenging environments, such as urban canyons. SyncServer S650s ship with GNSS hardware ready to be enabled with a software license. The S650 is also available without GNSS in theS650i model.More Timing I/O StandardThe base S650 can host two modules. The Timing I/O modules are equipped with eight connectors for timing signal input and output. The standard configuration offers a broad yet fixed selection of signal I/Os that include IRIG B, 10 MHz and 1PPS.FlexPort—The Ultimate in Timing FlexibilityOur unique FlexPort technology efficiently and cost-effectively adds innovative “any signal, any connector” capabilities, eliminating the wasted space inherent with legacy style fixed signal modules.The FlexPort option enables the six output connectors (J3-J8) to output many supported signals (time codes, sine waves, program-mable periods) all configurable in real time through the secure web interface. User-entered, nanosecond caliber phase offsets for each connector output accommodates variable cable lengths. The two input connectors (J1-J2) can support a wide variety of input signal types.This level of timing signal flexibility is unprecedented and can even eliminate the need for additional signal distribution chassis as there is no degradation in the precise quality of the coherent signals.Oscillator Upgrades Improve Holdover Accuracy and Save Valuable TimeThe standard S650 is equipped with a crystal oscillator that keeps the S650 accurate to nanoseconds when tracking GPS. However, if GPS connectivity is lost and the server is placed in holdover, the oscillator begins to drift, impacting timing accuracy. Upgrading the oscillator improves the holdover accuracy significantly. For example, consider the following drift rates for the standard oscillator compared to theOCXO and Rubidium upgrades.The value of the upgraded oscillator is that if the GPS signal is lost, the S650 can continue to provide accurate time and frequency. This provides personnel time to correct the problem with only gradualdegradation or disruption in time synchronization accuracy.SpecificationsGNSS Receiver/Antenna• 72 parallel channel GNSS receiver• GPS time traceable to UTC (USNO)• Static and dynamic operational modes• Acquisition time of 30 seconds (cold start)• Cable length up to 900 feet (275 m).• GNSS option adds Galileo/GLONASS/BeiDou/SBAS/QZSS support in addition to GPSTime Accuracy at 1 PPS Output• Standard: <15 ns RMS to UTC (USNO), typical• OCXO: <15 ns RMS to UTC (USNO)• Rubidium: <15 ns RMS to UTC (USNO)After one day locked to GPS; evaluated over normal environment (test range <±5 °F) defined in GR-2830.Oscillator Aging (Monthly)• Standard: ±1×10–7• OCXO: ±5×10–9• Rubidium: ±1×10–10After one month of continuous operation.Holdover Accuracy (One Day)• Standard: 400 µs• OCXO: 25 µs• Rubidium: <1 µsEvaluated over normal environment (test range <±5 °F) defined in GR-2830 after five days locked to GPS.Frequency Output Accuracy and Stability• <1x10–12 at 1 day, after locked to GPS for 1 dayStandard Network Protocols• NTP v3,4 (RFC 1305/5905/8633), SNTP(RFC4330)• NTP v3,4 Symmetric keys: SHA1/256/512 and MD5• SNMP v2c, v3• SNMP MIB II, Custom MIB, system status via SNMP• DHCP/DHCPv6• HTTPS/SSL* (TLS 1.2/1.3)• SMTP forwarding• SSHv2• Telnet• IPv4/IPv6• Syslog: 1 to 8 servers (RFC 3164/5424)• Key management protocols can be individually disabled• Port 1: Management and Time protocols• Port 2, 3 and 4 (optional 5 and 6): Time protocols only Optional Network Protocols NTP Server Performance• 10,000 NTP requests per second while maintaining accuracy associated with reference time source.**• Stratum 1 through GNSS: overall server time stamp accuracy of5 μs to UTC with 1-sigma variation of 20 μs (typical). All NTP timestamps are hardware-based or have real-time hardware compen-sation for internal asymmetric delays. The accuracy is inclusive of all NTP packet delays in and out of the server, as measured at the network interface. NTP serves the UTC timescale by definition,but the user can choose to serve GPS timescale instead. The user can also select the UTC leap second smearing/slewing behavior.The SyncServer easily supports millions of NTP clients.• NTP Activity Charting and MRU Logging: A rolling 24 hour chart displays overall NTPd requests/minute activity. An NTPd MostRecently Used (MRU) list provides details on the most recent 1024 NTP client IP addresses. Data is sortable and exportable. Selec-tion of an individual IP address charts the NTP request totals in 30 minute increments over the past 24 hours. These tools are useful to verify an NTP client is reaching the SyncServer and to identify NTP clients that may be requesting the time more frequently than desired.• NTP Reflector option: 360,000 NTP client mode three requests per second. NTP packets are timestamped 100% in hardware with prevailing clock accuracy. All non-NTP packets are provided to the CPU on a bandwidth-limited basis. The NTP Reflector is included as part of the Security Protocol License option.NTP Activity Chart• Autokey (RFC5906)• PTP• TACACS+• LDAPv3• RADIUS• X.509 certificates for HTTPSand secure syslogRolling 24-hour NTPd activity chart to accompany Most Recently Used (MRU) listwith individual NTPd client activity details and chart.*SSL_High_Encryption Cypher suite or the SSL_High_And_Medium_Encryption Cypher suite.**<5% NTPd packet drop at 10,000 NTPd requests per second. See SyncServer BlueSkyoption data sheet for performance specifications if BlueSky validator is enabled (optional)Mechanical/EnvironmentalShock and VibrationFront PanelRear PanelProduct IncludesS650SyncServer S650 (no option modules installed in base unit), locking power cord, rack mount ears and a two-year hardware warranty. Current manual and MIB are available online at . MIB and REST API can also be downloaded from the SyncServer.S650iSyncServer S650i (no GNSS receiver), one Timing I/O module, locking power cord, rack mount ears and a two-year hardware warranty. Current manual and MIB are available online at . MIB and REST API can also be downloaded from the SyncServer.S650 With Two Standard Timing I/O Modules (Optional Configuration)Ordering InformationCustom configure your build-to-order SyncServer S650 using theonline SyncServer Configurator tool at . Configura -tions can be submitted as requests for quotes.Note: The SyncServer S650 is TAA CompliantNote: The SyncServer S650 is on the DISA/DoDIN Approved Products ListThe Microchip name and logo, the Microchip logo and SyncServer are registered trademarks of Microchip Technology Incorporated in the U.S.A. and other countries. All other trademarks mentioned herein are property of their respective companies. © 2022, Microchip Technology Incorporated and its subsidiaries. All Rights Reserved. 4/22 900-00716-00 Rev N DS00002901FHardware OptionsTiming I/O Module(s)Equipped with eight connectors for timing signal input and output, the standard configuration offers a broad yet fixed selection of signal I/O, including IRIG B, 10 MHz and 1PPS. Five variations of the Timing I/O Module are available as listed below. See the SyncServer Options Datasheet (DS00002920) for more signal types.• Timing I/O Module• Timing I/O Module + Telecom I/O • Timing I/O Module + HaveQuick/PTTI • Timing I/O Module + Fiber Outputs • Timing I/O Module + Fiber Input10 MHz Standard Low Phase Noise ModuleEight isolated, phase-coherent 10 MHz LPN outputs, with excellent levels of LPN and exhibiting low spurious noise characteristics.10 MHz Ultra-Low Phase Noise ModuleSuperior levels of LPN provided on eight extremely isolated, phase-coherent 10 MHz LPN outputs with low spurious noise characteristics.10 GbE LAN PortsTwo additional 10 GbE SFP+ ports equipped with hardware time stamping that supports NTP, PTP and NTP Reflector operations.Rubidium Atomic Oscillator UpgradeImproves stability, accuracy, and holdover accuracy. Holdoveraccuracy is <1 μs for the first 24 hours and <3 μs after the first three days.OCXO Oscillator UpgradeImproves holdover accuracy to 25 μs for the first day.Dual AC Power SuppliesThe dual-corded, dual-AC power supply option provides load sharing and active power management system with hitless failover.Dual DC Power SuppliesThe dual-corded, dual-DC power supply option provides load sharing and active power management system with hitless failover.Antenna AccessoriesAntenna cables and accessories enable versatile solutions to meet most installation requirements.Note: For complete information, see the SyncServer Options Datasheet (DS00002920).Software OptionsSecurity Protocol License with Security-Hardened NTP ReflectorSecurity-hardened NTP Reflector and authentication hardening with NTP Autokey, TACACS+, RADIUS, LDAP and CA-signed X.509 certificates.PTP Output/Grandmaster(Simultaneous Multi-Port/Profile)Single license enables multi-port, multi-profile IEEE 1588 PTP Grand -master operations leveraging the built-in hardware time stamping in all SyncServers.PTP InputPTP as a timing input for tunneling time through PTP or as a backup time reference in the event of the loss of the GNSS signal.FlexPort Technology for Timing I/O ModulesEnables the output connectors to output many supported signals (time codes, sine waves, programmable rates) all configurable in real time. Input connectors can support a wide variety of input signal types.Multi-GNSS ConstellationTrack GPS/SBAS, Galileo, QZSS, GLONASS and/or BeiDou constel-lations for improved integrity and satellite visibility in an urban canyons.1PPS Time Interval/Event Time MeasurementsUse the S650 Timing I/O module to measure, store and statistically display in real time the difference of an external 1PPS relative to the S650. The Event Time capture feature time tags and stores external events.Time-Triggered Programmable PulseProvides a user defined, repetitive and precise time-of-day pulse(s) at specific times or provides periodic, time-based pulse outputs.BlueSky GPS Jamming and Spoofing Detection, Protection, AnalysisDetect GPS jamming and spoofing related anomalies in real-time to protect essential time and frequency outputs.Synchronization SoftwareComprehensive MS Windows-based network time synchronization software with monitoring and auditing functions.Information contained in this publication regarding device applications and the like is provided only for your convenience and may be superseded by updates. It is your responsibility to ensure that your application meets with your specifications. MICROCHIP MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WHETHER EXPRESS OR IMPLIED, WRITTEN OR ORAL, STATUTORY OR OTHERWISE, RELATED TO THE INFORMATION, INCLUDING BUT NOT LIMITED TO ITS CONDITION, QUALITY, PERFORMANCE, MERCHANTABILITY OR FITNESS FOR PURPOSE. Microchip disclaims all liability arising from this information and its use. Use of Microchip devices in life support and/or safety applications is entirely at the buyer’s risk, and the buyer agrees to defend, indemnify and hold harmless Microchip from any and all damages, claims, suits, or expenses resulting from such use. No licenses are conveyed, implicitly or otherwise, under any Microchip intellectual property rights unless otherwise stated.。

海康威视 HPM 系列产品维护指南说明书

海康威视 HPM 系列产品维护指南说明书

Lifecycle Solutions & ServicesPreventive Maintenance Tips: Power Systems 1It Doesn’t Run Without Power—Proper Maintenance of Power SystemsMaintaining the power system is critical for any of your systems and that is definitely true when dealing with the PM/APM/HPM (xPM) family. Depending on your configuration and process, the failure of proper maintenance practices and ignoring alarms from the power system could lead to failures that have the potential to bring a process or plant to a standstill. This includes loss of view, loss of control, or even loss of the process.How Proper Power System Maintenance Can Help You• Reassurance that your power system and battery back-ups are running properly • Reduced risk of downtime due to power system issues • Allows you to be proactive in your maintenance approach • Simplified ordering for maintenance items available in a kit versus individual components • Lower cost of replacement to mitigate costly unplanned system downtime• Current version of Power Supply has multiple improved characteristicsProper maintenance of the power system includes addressing the power supplies, battery backup and the CMOS memory backup batteries. The expected lifespan of each of these components is different and the lifespan of each is also affected by the environment in which they are used. Benchmarks for changing out each component are every 10 years for the power supply, every five years for the battery backup (and possibly every three), and every two years for the CMOS batteries. Honeywell now offers an upgrade kit, MC-ZPSUG2, which provides all of these components packaged together. The power supply provided is the current version with improved characteristics.Any failures of these power system components should be changed immediately.DescriptionLifeExpectancyReplacement Part #Power Supply 10 years 51198651-100 48V Battery Backup 3 to 5 years 51303948-100 Size “AA” Ni-Cad CMOS Battery 2 years 51190422-100 Size “C” Ni-Cad CMOS Battery2 years51192060-100CMOS Memory Battery BackupThe xPM power systems are designed to provide battery backup to all the CMOS memory. The CMOS battery backup prevents the loss of the data base during a power outage after the battery backup has been depleted or if no battery backup module is present. There are two different power system chassis out in the field with CMOS batteries. The older style power system introduced with PM/APM requires three specific “AA” size Ni-Cad batteries. For the current back panel introduced for HPM the CMOS memory requires three specific “C” size Ni-Cad batteries. The size “C” batteries are required if the full 50 hours of CMOS memory backup is desired for HPM due to the larger memory available in HPM. In either scenario, the incorrect usage of other batteries than what have been tested and qualified by Honeywell may result in the battery overheating and could possibly cause the battery to rupture.The batteries in the standard power system are periodically tested by the charging circuit. If the voltage falls below the allowed limit, a battery failure alarm will be generated and the batteries should be replaced. Regardless of alarms, Honeywell recommends that new batteries be installed every two years. All three batteries should be replaced at one time.DescriptionReplacement Part #Size “AA” Ni-Cad CMOS Battery51190422-100 Size “C” Ni-Cad CMOS Battery 51192060-100Preventive Maintenance Tips: Power Systems 2 48 Volt Battery BackupThe battery backup is designed to maintain a fully loaded xPM fora minimum of 20 minutes. It will shutdown when the voltage reaches38 volts to prevent the power supply from going out of regulation and an alarm will be generated. Rechargeable batteries will lose their full charging capabilities over time and will need to be tested and replaced when they fall below 60 percent of their original capacity.The battery backup has been designed to operate in standby (float) service for approximately five years. The five years is based on the battery being kept at 20C (68F) and the float charge voltage being maintained between 2.25 and 2.30 volts per cell. This includes the battery being fully discharged once every three months. No battery should be left in service over five years, and if no maintenance is done it should be replaced every three years.The service life is directly affected by the number of discharges, the depth of discharge, ambient temperature, and the charging voltage. The expected service life can be shorted by 20% for each 10C that the ambient is above 20C.The batteries should never be left in a discharged state. This allows sulfating to occur which will increase the internal resistance of the battery and lower its capacity. The self-discharge rate is about 3% per month at an ambient of 20C. The self discharge rate doubles for each 10C in ambient above 20C. The discharged voltage of the battery should never go below 1.30 volts to maintain the best battery life.With this in mind it is recommended to periodically load test the batteries to ensure they have sufficient capacity to maintain the system during a power outage. Tests should be done on an annual basis and more frequently as they become older and begin to lose capacity. The load test is recommended off-process if possible as there will be no battery backup available while performing the test and recharging of the battery pack can take up to 16 hours. Having a spare available to swap, especially if doing on process, is a wise option leading to minimal time without battery backup and allowing the tested battery to be recharged on a bench outside the system for future swap with the next test.If regular maintenance is not performed the recommendation is to change at least every three years rather than every five.Power SuppliesThe power supply is the heart of the xPM power system and the recommendation is for a redundant power supply configuration having each power supply fed by its own dedicated power source. Honeywell has introduced the next generation power supply for this family which increases the robustness of the power system. Even with redundant power supplies, one must be careful when changing out a failed power supply. This is to minimize disturbance of the environment and to reduce the introduction of particles into the area around and near the power supplies. Those particles can be pulled through the airflow of the working power supply and result in the second power supply failing.For this reason, Honeywell does not recommend replacing a working power supply on-process (other than the black-colored version). However, power supplies do not last forever and you should consider upgrading older power supplies, or prepare to do so, when the opportunities arise.The recommendation for changing out the power supplies is every ten years and this replacement should be included during a scheduled down time if possible. The power supply replacement procedure listed in the Honeywell xPM Service manual should be followed at all times.Recommend Change of Original Black Power SuppliesIn October of 1996 Honeywell issued a customer priority notification (PN #1986) about a possible over-voltage issue with the black-colored (51109456-200) power supplies that were sold from 1988 through 1994. The Honeywell recommendation was to change out those black power supplies with the new silver version. Honeywell still recommends and strongly suggest that these black power supplies be replaced with the current power supply under part number 51198651-100 regardless of when they were put into service.Silver Power SuppliesThere have been three part number versions of the silver power supplies. The first (51109684-100/300) was sold from 1993 through 1997. The second (51198947-100) sold from 1997 through today. The next generation power supply was released in early 2009 and was introduced initially through the power system maintenance upgrade kit. If a site is running the original silver version they have now been in service for over 10 years and sites should consider the need to replace before they are forced to do so by failure of the power supply. Note that there is always risk involved when powering down equipment and possible issues when the equipment is powered back up. As stated previously, it is recommended to change these out off-process if possible. Replacements on- process should be done only when a power supply fails and replacement is then required immediately.Description Replacement Part #48V Battery Backup51303948-100Preventive Maintenance Tips: Power Systems 3Power Supply IssuesThe xPM power supplies have proven to be a reliable and robust power source. However, as with any electrical component they do not last forever and there is the potential for failure modes. Issues such as foreign particles introduced have already been discussed. In addition, even clean environments are susceptible to whiskers which have the potential to short out active circuits. Whiskers are a real issue and further details may be found in the Customer Resource Manual (CRM) in the Process Manager section PD22_G97(G).The new power supply available through the power system maintenance kit includes design improvements specifically done to address some of these possible failure modes to make a robust power supply even better.Remember that the power supply is a critical component to your system and regular maintenance as well as having spares available is highly recommended to keep your site running without problems. Monitor the power system alarms and take action when they do occur.DescriptionReplacement Part #Power Supply51198651-100Preventive Maintenance Tips: Power Systems 4Importance of Power System AlarmsAlways ensure that all power supply alarm contacts are properly implemented, working, and are being monitored. Failure to monitor these alarms and take appropriate action in a timely manner can lead to failures of the power system that could have otherwise been prevented. There are DC Out, Battery, Fan/Temp, AC In, and Charging LED indicators for each Power Supply module. If the Power system is fully functional, all five of the indicators are illuminated. In addition, each of these conditions, plus a CMOS/Memory is available as a digital input for each supply.DC Out IndicatorIf a DC Out LED is off, AC line power has been lost (check the AC In LED) or the Power Supply Module has failed. If the Power System is non-redundant, or if both DC Out LEDs are off, the HPM has lost 24 VDC. The CMOS backup system maintains power to the CMOS memory, so subsystem programs are not lost. See the Battery LED description below. The annunciator contact illustrated in the following figure will open when these conditions occur.Battery IndicatorIf the Battery LED is off and the Charging LED is on, the 48 Volt Battery switch is in the off position or the 48 V Battery Backup system has failed. The annunciator contact illustrated in the following Figure will open when these conditions occur. If the Power System does not have the battery pack option, the Battery LED will normally be on, and the Charging LED will normally be on.Fan/Temp IndicatorIf the Fan/Temp LED is off, the fan in the Power Supply Module has failed or the temperature of the supply has exceeded a safe value. The annunciator contact, discussed below, is activated.AC In IndicatorIf the AC In LED is off, AC power to the HPM has been lost or the switch on the Power Supply Module is off. Backup systems, if operating, are maintaining the unit. Check the DC Out and Battery indicators to determine the state of the system. Many installations may have the Power Supply Modules connected to separate AC power sources to minimize outage caused by a power loss. The Annunciator contact signifying power loss from either supply, are opened independently.Charging IndicatorWhen the Charging LED is off, the charging circuit that maintains the optional 48 V Battery Backup system has failed. Check the batteries, their corresponding connections, and the charging circuits in the Power Supply Module(s). The annunciator contact output is opened by this condition.For More InformationLearn more about how Honeywell’s Preventive Maintenance Tips can limit downtime and assure system power supplies and battery backups are working properly visit our website or contact your Honeywell account manager. Honeywell Process Solutions Honeywell1250 West Sam Houston Parkway South Houston, TX 77042Honeywell House, Arlington Business Park Bracknell, Berkshire, England RG12 1EB Shanghai City Centre, 100 Junyi Road Shanghai, China 20051 AlarmsThe primary Power Supply Module alarm and secondary Power Supply Module alarm contacts monitor five functions within each Power Supply Module. The appropriate contact will open when any of the following occur:• The DC output voltage is not within normal limits. • AC input power to the supply has failed.• The Power Supply Module electronics have overheated or the Power Supply Module fan has failed. • The 48 V backup-battery system has failed because the batteries have discharged or they have been disconnected. • The battery charger in the Power Supply Module has failed.Servicing the Power SystemThe power system is critical to your process. Loss of the power system may lead to loss of control, loss of view, or loss of process. Honeywell strongly recommends regular maintenance to the power system and service checks with regular component replacements performed by Honeywell trained service technicians. • Options for Power System Upgrade/Maintenance • Order the power system upgrade kit• Order replacement parts for immediate installation. • Order spares to have in stock as needed.• Add power system components to a parts contract.Preventive Maintenance Tips: Power Systems 5Orderable Power System Components• CMOS Batteries • 48V Battery Backup • Power Supply• Power System Chassis AssemblyBenefits of New Power Supply• Improved airflow handling• Conformal coating of all metallic components • Enhanced mechanical design • Extended temperature range • Added thermal shutdown capability • More reliable power switch design • More consistent alarm handlingAdditional Power System InformationAdditional details on proper maintenance procedures such as load testing and specifics on the power supplies and batteries may be found in the Honeywell Customer Resource Manual. This is located in the Process Manager section of the CRM under TAB 22. As always, you may also contact your local Honeywell account manager or service technician for further details.SV-12-37-ENG May 2012© 2012 Honeywell International Inc.。

HP服务器的一些启动报错的原因和解决办法(中英双语)

HP服务器的一些启动报错的原因和解决办法(中英双语)

304-Keyboard or System Unit Erroraudible beeps: nonepossible cause: keyboard, keyboard cable, mouse controller, or system board failure.action:1. be sure the keyboard and mouse are connected.only authorized technicians trained by hp should attempt to remove the system board. if you believe the system board requires replacement, contact hp technical support before proceeding.2. run insight diagnostics ("hp insight diagnostics" on page 101) and replace failed components as indicated.400 serieslist of messages:40x-parallel port x address assignment conflict404-parallel port address conflict detected40x-parallel port x address assignment conflictaudible beeps: 2 shortpossible cause: both external and internal ports are assigned to parallel port x.action: run the server setup utility and correct the configuration.404-parallel port address conflict detected......a hardware conflict in your system is keeping some system components from working correctly. if you have recently added new hardware remove it to see if it is the cause of the conflict. alternatively, use computer setup or your operating system to insure that no conflicts exist.audible beeps: 2 shortpossible cause: a hardware conflict in the system is preventing the parallel port from working correctly.action:1. if you have recently added new hardware, remove it to see if the hardware is the cause of the conflict.2.run the server setup utility to reassign resources for the parallel port and manually resolve the resource conflict.3. run insight diagnostics ("hp insight diagnostics" on page 101) and replace failed componentsas indicated.600 serieslist of messages:601-diskette controller error602-diskette boot record error605-diskette drive type error611-primary floppy port address assignment conflict612-secondary floppy port address assignment conflict601-diskette controller erroraudible beeps: nonepossible cause: diskette controller circuitry failure occurred.action:1. be sure the diskette drive cables are connected.2. replace the diskette drive, the cable, or both.3. run insight diagnostics ("hp insight diagnostics" on page 101) and replace failed components as indicated.602-diskette boot record erroraudible beeps: nonepossible cause: the boot sector on the boot disk is corrupt.action:1. remove the diskette from the diskette drive.2. replace the diskette in the drive.3. reformat the diskette.605-diskette drive type error.audible beeps: 2 shortpossible cause: mismatch in drive type occurred.action: run the server setup utility to set the diskette drive type correctly.611-primary floppy port address assignment conflictaudible beeps: 2 shortpossible cause: a hardware conflict in the system is preventing the diskette drive fromoperating properly.action:1. run the server setup utility to configure the diskette drive port address and manually resolve the conflict.2. run insight diagnostics ("hp insight diagnostics" on page 101) and replace failed components as indicated.612-secondary floppy port address assignment conflictaudible beeps: 2 shortpossible cause: a hardware conflict in the system is preventing the diskette drive from operating properly.action:1. run the server setup utility to configure the diskette drive port address and manually resolve the conflict.2. run insight diagnostics ("hp insight diagnostics" on page 101) and replace failed components as indicated.1100 serieslist of messages:1151-com port 1 address assignment conflict1151-com port 1 address assignment conflictaudible beeps: 2 shortpossible cause: both external and internal serial ports are assigned to com x.action: run the server setup utility and correct the configuration.1600 serieslist of messages:1609 - the server may have a failed system battery. some1610-temperature violation detected. - waiting 5 minutes for system to cool1611-cpu zone fan assembly failure detected. either1611-cpu zone fan assembly failure detected. single fan1611-fan failure detected1611-fan x failure detected (fan zone cpu)1611-fan x failure detected (fan zone i/o)1611-fan x not present (fan zonecpu)1611-fan x not present (fan zone i/o)1611- power supply zone fan assembly failure detected. either1611-power supply zone fan assembly failure detected. single fan1611-primary fan failure (fan zone system)1611-redundant fan failure (fan zone system)1612-primary power supply failure1615-power supply configuration error1615-power supply configuration error1615-power supply failure, power supply unplugged, or power supply fan failure in bay x 1616-power supply configuration failure1609 - the server may have a failed system battery. some......configuration settings may have been lost and restored to defaults. refer to server documentation for more information. if you have just replaced the system battery, disregard this message.audible beeps: nonepossible cause: real-time clock system battery has lost power. the system will lose its configuration every time ac power is removed (when the system is unplugged from ac power source) and this message displays again if a battery failure has occurred. however, the system will function and retain configuration settings if the system is connected to the ac power source.action: replace battery (or add external battery).1610-temperature violation detected. - waiting 5 minutes for system to coolaudible beeps: nonepossible cause: the ambient system temperature exceeded acceptable levels.action: lower the room temperature.1611-cpu zone fan assembly failure detected. either......the assembly is not installed or multiple fans have failed in the cpu zone.audible beeps: nonepossible cause: required fans are missing or not spinning.action:1. check the fans to be sure they are installed and working.2. be sure the assembly is properly connected and each fan is properly seated.3. if the problem persists, replace the failed fans.4. if a known working replacement fan is not spinning, replace the assembly.1611-cpu zone fan assembly failure detected. single fan......failure. assembly will provide adequate cooling.audible beeps: nonepossible cause: required fan not spinning.action: replace the failed fan to provide redundancy, if applicable.1611-fan failure detectedaudible beeps: 2 shortpossible cause: required fan not installed or spinning.action:1. check the fans to be sure they are working.2. be sure each fan cable is properly connected and each fan is properly seated.3. if the problem persists, replace the failed fans.1611-fan x failure detected (fan zone cpu)audible beeps: 2 shortpossible cause: required fan not installed or spinning.action:1. check the fans to be sure they are working.2. be sure each fan cable is properly connected, if applicable, and each fan is properly seated.3. if the problem persists, replace the failed fans.1611-fan x failure detected (fan zone i/o)audible beeps: 2 shortpossible cause: required fan not installed or spinning.action:1. check the fans to be sure they are working.2. be sure each fan cable is properly connected, if applicable, and each fan is properly seated.3. if the problem persists, replace the failed fans.1611-fan x not present (fan zonecpu)audible beeps: 2 shortpossible cause: required fan not installed or spinning.action:1. check the fans to be sure they are working.2. be sure each fan cable is properly connected, if applicable, and each fan is properly seated.3. if the problem persists, replace the failed fans.1611-fan x not present (fan zone i/o)audible beeps: 2 shortpossible cause: required fan not installed or spinning.action:1. check the fans to be sure they are working.2. be sure each fan cable is properly connected, if applicable, and each fan is properly seated.3. if the problem persists, replace the failed fans.1611- power supply zone fan assembly failure detected. either......the assembly is not installed or multiple fans have failed.audible beeps: nonepossible cause: required fans are missing or not spinning.action:1. check the fans to be sure they are installed and working.2. be sure the assembly is properly connected and each fan is properly seated.3. if the problem persists, replace the failed fans.4. if a known working replacement fan is not spinning, replace the assembly.1611-power supply zone fan assembly failure detected. single fan......failure. assembly will provide adequate cooling.audible beeps: nonepossible cause: required fan not spinning.action: replace the failed fan to provide redundancy, if applicable.1611-primary fan failure (fan zone system)audible beeps: nonepossible cause: a required fan is not spinning.action: replace the failed fan.1611-redundant fan failure (fan zone system)audible beeps: nonepossible cause: a redundant fan is not spinning.action: replace the failed fan.1612-primary power supply failureaudible beeps: 2 shortpossible cause: primary power supply has failed.action: replace power supply.1615-power supply configuration erroraudible beeps: nonepossible cause: the server configuration requires an additional power supply. a moving bar is displayed, indicating that the system is waiting for another power supply to be installed.action: install the additional power supply.1615-power supply configuration error- a working power supply must be installed in bay 1 for proper cooling.- system halted!audible beeps: nonepossible cause: the server configuration requires an additional power supply. a moving bar is displayed, indicating that the system is waiting for another power supply to be installed.action: install the additional power supply.1615-power supply failure, power supply unplugged, or power supply fan failure in bay x audible beeps: nonepossible cause: the power supply has failed, or it is installed but not connected to the system board or ac power source.action: reseat the power supply firmly and check the power cable or replace power supply.1616-power supply configuration failure-a working power supply must be installed in bay 1 for proper cooling.-system halted!audible beeps: nonepossible cause: power supply is improperly configured.action: run the server setup utility and correct the configuration.304键盘或系统组合误差听见蜂鸣声:无可能的原因:键盘,键盘线,鼠标控制器或系统板故障。

小学六年级儿童估算的概念理解_英文_

小学六年级儿童估算的概念理解_英文_

第33卷 第6期西南师范大学学报(自然科学版)2008年12月Vol133 No16 Journal of S outhwest China Normal University(Natural Science Edition)Dec12008文章编号:100025471(2008)0620095207The Sixth G raders’Conceptual U nderstanding about Computational Estimation in Primary School①SI Ji2wei1, ZHAN G Qing2lin2, Pat rick Lemaire311School of Psychology,Shandong Normal University,Jinan250014,China;21School of Psychology,Southwest University,Chongqing400715,China;31Laboratoire de Psychologie Cognitive,Centre National de la Recherche Scientifique&Universite de Provence,Marseille,FranceAbstract:Using three self2designed tasks,this paper investigated the sixth graders’conceptual understanding about computational estimation in Chinese primary school.69children randomly sampling f rom an ordinary primary school participated in this study.The results showed that①primary school children gained much more conceptual knowl2 edge and procedural knowledge than conditional knowledge about computational estimation;②there was a signifi2 cant correlation in the level of mastery between conceptual knowledge and conditional knowledge;and③only the level of conceptual knowledge contributed significantly to the difference of computational estimation performance be2 tween the high2level group and the low2level group.The results and their implications for the instruction of mathe2 matics in primary school were also discussed.K ey w ords:conceptual understanding;computational estimation;primary school childrenC LC number:B844Document code:AIn everyday life,many mat hematical sit uations call for producing an p utational estima2 tion is just one of mo st common mat hematical estimation activities,which requires finding an estimate of t he result of a comp utation by performing some mental comp utation on approximations of t he original num2 bers.The data f rom NA EP conducted by Carpenter et al offered ample evidence t hat st udent s lacked basic and necessary estimation skills for carrying out many real mat hematical problems which need to be esti2 mated[122].In t he past t hree decades,comp utational estimation has att racted interesting attention from bot h edu2 cators[326]and cognitive p sychologist s[7212].Many aspect s of comp utational estimation have been investiga2 ted,such as component s,types of strategies and t heir develop ment,and instruction.However,individu2 als’concept ual understanding abo ut comp utational estimation is not well understood.Delineating t his is2 sue is f undamental to understanding how comp utational estimation activity occurs.The previous related literat ure on st rategic behavior shows t hat st udent s often do not use t heir st rategic knowledge to t he f ul2①收稿日期:2007205221Fund Project:Y oung Project of Ministry of Education in the T enth Five2year National Education Science Plan of China(authorized number: EBA030406);Mount Tai Scholar Project of Shandong Province;International Cooperation and Cultivation Project for Excellent Middle2age and Y out hful Core College Faculty of Shandong Provincial Education Depart ment.Corresponding aut hor:SI Ji2wei(19742),male,Yanggu,Shandong,associate professor.His main research direction is cognition and learning.69西南师范大学学报(自然科学版) 投稿网址http://xbgjxt1swu1cn 第33卷lest[13].Many st udent s just guess when conf ronting a comp utational problem to estimate instead of using any effective st rategy,which tightly ties up st udent s’understandings on comp utational estimation.In a st udy wit h12to142year2olds,Morgan(1988)found t hat mo st of t he children she interviewed did not have clear conceptio n of t he p urpose or t he nat ure of comp utational estimation[14].They seemed to consider esti2 mation to be an inferior alternative to exact comp utation,and described estimation as“guessing”.In fact, some of t heir estimates were given in a“non2rounded”form because t hey believed t hat t he estimate should look as t hough it could be t he exact answer.Some ot her investigators also have found indications t hat young children do not understand what estimation means[15216].Why t his discrepancy occurs between stra2 tegic knowledge and t he implementation of t hat knowledge in a specific task sit uation is a very important issue.Some aut hors link t he“p roduction deficiency”[17]to t he develop ment of children’s metacognitive a2 bilities[18219].Not o nly do children need to know when and how a certain st rategy can be implemented[20], but t hey need to recognize t he value of t he strategy[21]and it s relative usef ulness co mpared to ot her st rate2 gies[22].In t he present st udy,co ncept ual understanding is suppo sed to include t hree types of general knowl2 edge,t hat is concept ual knowledge,p rocedural knowledge and conditional knowledge.When it comes to comp utatio nal estimation,concept ual understanding is concerned wit h t he following aspect s:t he meanings of comp utational estimation and related concept s belongs to concept ual knowledge,how to execute comp u2 tational estimation st rategies and related skills belongs to p rocedural knowledge,when and why to execute comp utatio nal estimation and it s special st rategy belongs to conditional knowledge.If any aspect of concep2 t ual understanding is absent,t he quality and efficiency of p ro blem solving will be impacted seriously.The main p urpo se of t he present st udy is just to investigate t he role of primary school p upils’understanding a2 bout comp utational estimation and it s skills on t heir implement s.We predict t hat children wit h good un2 derstanding about comp utational estimation will perform higher achievement t han t hose wit h poor under2 standing.1 Method111 P articipants69sixt h2graders sampling f rom an ordinary p rimary school in Chongqing City participated in t his re2 search,including40boys and29girls.The average age of t hese participant s is11.98years old and t he standard deviation is0.57.112 MaterialsSome self2developed tasks to evaluate individuals’concept ual understanding and a comp utational esti2 mation test for group were used.There were t hree types of problems in t he task to evaluate individuals’concept ual understanding.The first one was concept2explaining task(CET),which was used to judge declarative knowledge about t he concept of co mp utational estimation.An imaginary scene designed to meet t his goal was displayed as fol2 lows.“If your mat hematical teacher want s you to teach a lesson about mat hematics to your classmates in place of him,you need to review t he knowledge about comp utational estimation you have learned.They gave so me questions about t his part.Y ou can answer t hese questions to explain your meaning by exam2 ples”.In t his suppo sed scene,all participant s were asked to answer t hese questions which involved t he definitio n of comp utational estimation,concerned knowledge,skills and t he sit uations needed to use,et al. The second one was sit uation2judging task(SJ T),which was to evaluate whet her an individual knew t ho se sit uatio ns t hat need to use comp utational estimation.According to t hese answers of t his type problem,we can assess t heir conditional knowledge about t his met hod.The t hird one was strategy2choo sing task(SC T ).The subject s were asked to choose t he app rop riate met hod for t he test item about comp utational estimation to assess t heir p rocedural knowledge.113 ProceduresA wit hin 2subject design was used in t his research.U nder t he experimenters ’directions ,each partici 2pant finished t hree tasks to evaluate his concept ual understanding and received a group test about comp uta 2tional estimatio n.Time was limitless when finishing evaluating tasks ,but t he group test about comp uta 2tional estimation was limited wit hin five minutes (t he lengt h of time is confirmed according to a previously small 2scale p reliminary test ).The request about comp utational estimation test was to give an estimate for each item.1.4 CodingFor CET ,t he performance was scaled at a five 2point scale.If an individual possessed no knowledge a 2bout comp utational estimation ,we coded t his case zero point.If he owned some of knowledge wit h very superficial understandings ,we coded it one point.If he owned some of knowledge wit h moderate under 2standings ,we coded it two point s.If he owned much knowledge wit h moderate understanding ,we coded it t hree point s.Only a participant owned much knowledge wit h very deep understandings ,we coded his per 2formance 4point s.According to t he above standards drew out by t he researchers ,two independent rater valued all participant s ’performance.The result showed t hat t he consistency coefficient between two raters was 0.83(p <0.01).For S J T ,t he performance was scaled at a two 2point scale.If t he participant ’s judge was right and he also gave proper reasons ,we coded his performance two point pared to t his ,when his judge was wrong or showed a wrong reason ,we coded his performance zero point.As far as SC T ,we scored according to t he number of app ropriate strategies selected by subject s.2 R esults2.1 The Status Q uo of Children ’s Conceptu al U nderstanding about Computational EstimationTable 1showed t he mean and standard deviation of children ’s performance in t hree types of tasks.At test wit h paired group s was used to investigate t he differences among different tasks.As can be seen in table 1,t here is a significant difference when children master different content s of t he concept of comp utational estimatio n.On t he whole ,t he performances at CET and SC T are significant 2ly better t han at SJ T.The performance at CET is also better t han at SC T.In t he present st udy ,we inves 2tigated declarative knowledge and p rocedural knowledge at CET and SC T respectively ,and S J T was used to evaluate t he conditional knowledge.So we can draw a conclusion t hat primary school children gained much more concept ual knowledge and p rocedural knowledge t han conditio nal knowledge about comp uta 2tional estimatio n.In addition ,correlation analysis showed t here was a st rongly po sitive correlation between t he scores of S J T and CET (γ=0.46,p <0.01),but no such a similar relation existed between SJ T and SCT.At t he same time ,we also didn ’t find a significant correlation between CET and SCT.This case indicates t hat whet her children can judge t he necessity of using comp utatio nal estimation depends on t he quantity and quality of co ncept ual knowledge t hey grasped.But t he judge ability can ’t become t he sufficient condition to use comp utational estimation st rategies accurately.Synchronously ,t he amount s of concept ual knowl 2edge had no inevitable relation wit h whet her a person exert s comp utational estimation st rategies accurate 2ly.So we can conclude that the appropriate utility of strategy about computational estimation can ’t change with the amount of conceptual knowledge but relies on many other factors.We also can ’t eliminate the possibility that the level of conceptual knowledge about computational estimation hasn ’t differentiated at all.79第6期 SI Ji 2wei ,et al :The Sixth Graders ’Conceptual Understanding about Computational Estimation in Primary SchoolT able1 Children’s perform ance differences in conceptual understanding tasksCET S J T SCT T CET2S J T T CET2SCT T S J T2SCT M 2.210.74 1.548.7833 3.93337.2433SD 1.010.550.70 Note:CET means concept explaining task,S J T means situation judging task,SCT means strategy choosing task. 33means p<0.012.2 E ffect of Conceptual U nderstanding on Computational Estimation PerformanceAccording to t he mean of scores of individuals’performances at t he whole concept ual understanding task and each subtask,all participant s were divided into t he high2level group(H G)and low2level group (L G).A t test wit h independent group was used to evaluate t he difference of performance at comp utational estimation between different group s in all tasks(table2).The result s showed t hat t here was a significant difference between H G and L G at CET(t=2.21,p< 0.05),and we didn’t find any significant difference in any ot her tasks.It indicates t hat t he amount of indi2 viduals’co ncept ual knowledge about comp utational estimation during t he p rimary school stage may affect t heir performances.It isn’t int ricate to understand t his result.Because t he primary school children in Chi2 na doesn’t get in touch wit h comp utational estimation until t hird grade.In addition,according to t he act u2 al curriculum standard issued by Minist ry of Education of China,t he content about comp utational estima2 tion is a voluntary part to teach in mat hematics for p rimary school.So many mat hematical teachers t hink it dispensable.In t heir inst ructions,t hey don’t teach many skills about comp utational estimation,but teach some related concept ual knowledge.J ust for t his reason,st udent s spend few time and effort s learning comp utatio nal estimation,and t hey can’t master much conditional knowledge of effective st rategies and t ho se circumstances in which t hey should use t hese st rategies.Herein,t he p henomenon means t hat t here only exist s a significant difference at CET.We can conclude t hat it is urgent for Chinese teacher to st rengt hen t he instruction about co mp utational estimation st rategies to enhance p upils’p ractical ability. After all,p upils can get some concrete experiences about comp utational estimation.But if we expect t hey also can accumulate p rocedural knowledge and conditional knowledge spontaneously,it is a bit impossible.T able2 Comparison about children’s computational estimation performancein conceptual understanding tasks betw een different groupsCETH G L GS J TH G L GSCTH G L GTotalH G L GM66.2356.3362.7858.7958.8761.2259.1258.37S D10.2713.9812.1114.1715.6511.4713.4314.55T 2.2130.75-0.500.12 Note:H G means high2level group,L G means low2level group.3means p<0.05Because we found t here was a considerable clo se connection between children’s amount s of concept ual knowledge about comp utational estimation and t heir performances,a t test wit h independent group was used to investigate t he difference of performance between H G and L G about concept ual knowledge(table 3).The result s showed t hat t here wasn’t a significant difference among different types of items.It indi2 cates t hat concept ual knowledge affect s all tasks abo ut comp utational estimation,and t he size of effect is similar among different tasks.T able3 Perform ance differences bet w een children with different mastery level of conceptu al know ledgeWhole NumberH G L GDecimalH G L GFractionH G L GM 2.16 1.93 2.01 1.77 1.380.98S D0.510.570.540.780.530.58T 1.18 1.27 1.8089西南师范大学学报(自然科学版) 投稿网址http://xbgjxt1swu1cn 第33卷3 DiscussionsIn t his research ,we found t hat in comp utational estimation tasks ,t he mastery level about concept ual knowledge and procedural knowledge was significantly better t han t hat of conditional knowledge.It has an important meaning for us to teach comp utational estimation in p rimary school.This result indicates t he biggest limitation in present instruction about comp utational estimation is t he absence of teaching condi 2tional knowledge.As comp utational estimation is gradually important for mat hematics inst ruction in pri 2mary school ,t he vast teachers must be aware of t his problem ahead of schedule and take actions to over 2come it effectively.In fact ,it exist s in many subject s to teach conditional knowledge wit h deficient effort s ,and it is also a difficulty for st rategy inst ruction.In many circumstances ,st udent s don ’t know how to make use of t he knowledge learned f rom subject matter inst ructions.As a result ,it is easy for p upils to t ransit knowledge into a renitent state.U nder t his state ,knowledge can be retrieved only in a very limited background ,such as in a similar context of knowledge acquisition.Many researches have shown t hat even st rategies mastered by st udent s can also be in a renitent state ,unless t he teacher asked st udent s to use definitely [23].Thus ,to avoid t he appearance of renitent knowledge ,it is necessary for teachers to request st udent s to integrate t he basic knowledge and st rategies wit h t heir conditions when t hey deposit knowledge into t heir brains.J ust in t his case ,st udent s can acquire conditional knowledge.So at t he moment of teaching st udent s ’concept ual knowledge and p rocedural knowledge about comp utational estimation ,teachers must ask t hem to make clear t he conditions of knowledge execution.After all ,it is an important mark for an individual ’s develop 2ment of ability to ret rieve and apply exactly concerned knowledge to meet p roblems.In t his research ,we also found t hat t here was a significantly strong correlation between t he primary school children ’s perform 2ances and t heir mastery level about concept ual knowledge.It is an evidence to carry out t he conditionaliza 2tion of knowledge in t he inst ruction of comp utational estimation.To enhance t he ret rievability of concept u 2al knowledge and p rocedural knowledge about comp utational estimation to solve p ractical problem ,it is also for teachers to prompt students to consider the condition to apply in a background outside the classroom when they present these knowledge.The effect of this measure has been confirmed by many researches in other fields [24].It still needs further studies to test the effect in the instruction of computational estimation.In t his research ,we also found t hat what had a clo se association wit h children ’s performances about comp utatio nal estimation was t he quantity and quality of t heir concept ual knowledge.But t here was no ob 2vious relation between whet her t hey can judge t he sit uations to use comp utational estimation and whet her t hey can act ually choose t hose effective st rategies.We suppose t hat it is possible for primary school chil 2dren to accumulate insufficient procedural knowledge and conditional knowledge in nat ure.They can ’t show any significant differences in t hese types of knowledge.That is ,t here exist s a floor effect for chil 2dren to master t hese two kinds of knowledge.But t he same case doesn ’t occur at t he mastery of concept ual knowledge.Because before t he formal contact to comp utational estimation ,children have formed some na ?ve belief s about t his concept and t hey can show significantly individual differences.Because different cogni 2tive styles maybe affect adult s ’performance in comp utational estimation in virt ue of rest ricting t he t ransfer and application of different types of knowledge [25],We firmly believe t hat elder children may show signifi 2cant differences potentially as t heir p rocedural knowledge and conditional knowledge become more and more abundant.Anot her possible t heoretical explanation is p roblem representation ,which has been con 2firmed to obviously confine t he efficiency of problem solving not only wit h domain 2general task[26]but wit h domain 2specific task [27].Of course ,all t he above 2mentioned inferences should be verified by f urt her re 2searches in t he f ut ure.99第6期 SI Ji 2wei ,et al :The Sixth Graders ’Conceptual Understanding about Computational Estimation in Primary School001西南师范大学学报(自然科学版) 投稿网址http://xbgjxt1swu1cn 第33卷4 ConclusionAccording to t he above2mentioned analysis,we can draw some conclusions as follows.Wit h regard to concept ual understandings about comp utational estimation,it is obviously better for primary school chil2 dren to master concept ual knowledge and procedural knowledge t han to master conditional knowledge. Whet her children can judge accurately t he necessity to use comp utational estimation relies on t he quantity and quality of t heir concept ual knowledge.Only in concept explanation task,t here was a significant differ2 ence in performances about comp utational estimation between H G and L G.R eferences:[1]Carpenter T P,Coburn T G,Reys R E,et al.Notes From National Assessment:Estimation[J].Arithmetic Teacher,1976,23(4):2962302.[2] Carpenter T P,Corbitt M K,Kepner H S,et al.National Assessment:A Perspective of Students’Mastery of BasicMathematics Skills[C]//M.M.Lindquist(Ed.),Selected issues in mathematics education.Reston,VA:NCTM, 1980:2152257.[3] Levine D R.Strategy use and Estimation Ability of College Students[J].Journal for Research in Mathematics Educa2tion,1982,13(5):3502359.[4] Reys R E,Rybolt J F,Bestgen B J,et al.Processes Used by G ood Computational Estimators[J].Journal for Researchin Mathematics Education,1982,13(2):1832201.[5] Rubenstein R putational Estimation and Related Mathematical Skills[J].Journal for Research in MathematicsEducation,1985,16(2):1062119.[6] Sowder J T.Estimation and Related Topics[C]//D. A.Grouws(Ed.),Handbook of research in mathematics teachingand learning.N Y:Macmillan,1992:3712389.[7] Dehaene S,Cohen L.Two Mental Calculation Systems:A Case Study of Severe Acalculia With Preserved Approximation[J].Neuropsychologia,1991,29(11):104521054.[8] Dehaene S,Spelke E,Pinel P,et al.Sources of Mathematical Thinking:Behavioral and Brain2imaging Evidence[J].Science,1999,284(5416):9702973.[9] Dowker A D,Flood A,Griffiths H,et al.Estimation Strategies of Four Groups[J].Mathematical Cognition,1996,2(2):1132135.[10]LeFevre J,Greenham S L,Waheed N.The Development of Procedural and Conceptual Knowledge in Computational Es2timation[J].Cognition and Instruction,1993,11(2):952132.[11]Lemaire P,Lacacheur M.Children’s Strategies in Computational Estimation[J].Journal of Experimental Child Psychol2ogy,2002,82(4):2812304.[12]Warrington E K.The Fractionation of Arithmetic Skills:a Single Case Study[J].Quarterly Journal of ExperimentalPsychology,1982,34A(1):31251.[13]G arcia T,Pintrich P R.Regulating Motivation and Cognition in the Classroom:The Role of Self2schemas and Self2regula2tory Strategies[C]//D.H.Schunk,B.J.Zimmerman(Eds.),Self2regulation of learning and performance:issues and educational applications.Hillsdale,NJ:Erlbaum,1994:1272154.[14]Morgan C.A Study of Estimation by Secondary School Children[D].Unpublished MSc dissertation,Institute of Educa2tion,London,1988.[15]Clayton J G.Estimation[J].Mathematics Teaching,1988,125:18219.[16]Sowder J T,Wheeler M M.The Development of Concepts and Strategies Used in Computational Estimation[J].Journalfor Research in Mathematics Education,1989,20(2):1302146.[17]Flavell J H.Developmental Studies of Mediated Memory[C]//H.W.Reese,L.P.Lip sitt(Eds.),Advances in childdevelopment and behavior(Vol.5).New Y ork:Academic Press,1970:1812211.[18]Borkowski J G,Kurtz B E.Metacognition and Executive Control[C]//J.G.Borkowski,J.D.Day(Eds.),Cognitionand intelligence in special children:Comparative approaches to retardation,learning disabilities,and giftedness.Nor2wood ,N.J.:Ablex Publishing Corporation ,1987:1232152.[19]Flavell J H ,Wellman H M.Metamemory [C ]//R.V.Kail ,J.W.Hagen (Eds.),Perspectives on the development ofmemory and cognition.N Y:Macmillan ,1977:2432275.[20]Borkowski J G.Signs of Intelligence :Strategy G eneralization and Metacognition [C]//S.R.Yussen (Ed.),the growthof reflection in children.Orlando ,FL :Academic Press ,1985:1062144.[21]Kurtz B E ,Weinert F E.Metamemory ,Memory Performance ,and Causal Attribution in G ifted and Average Children[J ].Journal of Experimental Child Psychology ,1989,48(1):45261.[22]Fabricius W V ,Hagen J e of Causal Attributions About Recall Performance to Assess Metamemory and PredictStrategic Memory Behavior in Y oung Children [J ].Developmental Psychology ,1984,20(5):9752987.[23]Brown A L ,Day ,J D.Macrorules for Summarizing Text :The Development of Expertise [J ].Journal of Verbal Learningand Verbal Behavior ,1983,22(1):1214.[24]Branford J ,Sherwood R ,Vye N ,et al.Teaching thinking and problem solving [J ].American Psychologist ,1986,41(10):107821089.[25]张云仙,司继伟.大学生的认知方式对其估算能力的影响[J ].西南师范大学学报(自然科学版),2007,32(3):1682171.[26]史滋福,邱 江,张 卫,等.表征方式与数理图式对解决四卡问题的影响[J ].西南师范大学学报(自然科学版),2006,31(5):1772181.[27]徐继红,司继伟.不同干扰刺激对成人数量估计的影响[J ].心理科学,2008,31(1):1952199.小学六年级儿童估算的概念理解司继伟1, 张庆林2, Pat rick Lemaire 311山东师范大学心理学院,济南250014;21西南大学心理学院,重庆400715;31Laboratoire de Psychologie Cognitive ,Centre National de la Recherche Scientifique &Universite de Provence ,Marseille ,France 摘要:采用三种自行设计的任务考察了小学六年级儿童对估算的概念理解.从一所普通小学随机抽取的69名被试参加了本实验.结果表明:①小学儿童获取的有关估算的概念性知识与程序性知识明显多于条件性知识;②概念性知识与条件性知识的掌握水平之间存在显著正相关;③只有概念性知识的掌握水平明显制约了高、低组儿童的估算表现差异.文中对上述结果及其在小学数学中的教学含义进行了讨论.关键词:概念理解;估算;小学儿童责任编辑 胡 杨 101第6期 SI Ji 2wei ,et al :The Sixth Graders ’Conceptual Understanding about Computational Estimation in Primary School。

提高电梯保养工作性能之途径_英文_

提高电梯保养工作性能之途径_英文_

IMPROVING ELEVATOR MAINTENANCE PERFORMANCE:WORK STUDY APPROACH XL uk S F Tsang A H CDepar tment of M anufactur ing Engineer ing,T he Ho ng K ong Po ly technic U niver sity Hung Ho m,K ow loo n,Hong K o ngL eung H C(IG DS(Ho ng K ong),D epar tment o f Eng ineering,U niver sity of W arw ick,U.K.)ABSTRACTStr ateg ic quality mana gement is implemented in a lo-ca l elev ato r co mpany.Q ua lit y st rat egies,policies and go als fo cusing o n custo mer s′needs are clearly estab-lished.Co nt inuo us quality im pr ov ement ha s been ado pt ed as the co rpo rate stra tegy to impr o ve its perf or mance and competit ive edg e.T his paper presents t he successful im-plementation of a quality impr ov ement pr oject using the w or k study appro ach.O n t he completio n of the pr oject, the r ate of ser io us defects which may lead t o an accident is reduced by55%,i.e.,fr o m2%~0.9%over a period of tw o y ears.A t otal of HK$1.1million spent o n the pro-ject is justified w hen co mpar ed with the reduct ion of fi-na ncial r isks invo lv ed.T he success of the pr oject demon-st rat es that t he w or k st udy appro ach could be an effective to ol for impro ving the perfo rmance of m aintenance w or k.Key words:quality manag ement;quality impr ov ement;maintenance per for mance;w or k study INTRODUCTIONHong Kong is a densely populated city in w hich hig h buildings are the no rm of its architec-ture.Elevators,w hich transpo rt passeng ers to different floors of a m ulti-stor ey ed building,are the necessary facilities in our ever yday life.Reli-able and safe elevator service is expected from the users.Poor elevator maintenance will result in frequent failures causing a lot o f inconve-niences to the users.In a w orse case,a failure m ay lead to passeng ers′injuries or even fatal ac-cidents.In1996,ther e ar e36reg istered elevator and escalator contracto rs providing m aintenance serv ices in Hong Ko ng.T hese com panies are op-erating in a very co mpetitiv e market.T his paper presents the ex perience o f a local elevato r com pany in using strategic quality man-agement to improv e its com petitiveness.A quali-ty im pro vement project featuring the use of the w ork study approach to improving m aintenance per for mance w ill be described.Various success factors in the implementation of strateg ic quality m anagement are also discussed.T he com pany is a subsidiary of a m ulti-na-tional corporatio n headquar tered in Japan.It is established in1966to handle local sales and pro-vides installatio n and maintenance services o f ele-vators,escalators and autolines to local cus-tomers.It is aw are of the ser io us consequences of failur e-induced accidents such as huge com-pensation to v ictim s,im pairm ent of co mpany im-age and loss of market share.Management-ledX Received25Nov.1997;revis ion received25Apr.1998strategic quality management[1]is intro duced to enhance and sustain its ability to meet customers′requir em ents of superior serv ice.The quality strategies,the policies and the goals focusing on custom er s′needs are developed and integrated in-to business plans and implem ented by line de-partments.The KAIZEN approach,embracing custom er o rientation,total quality control,total pr ev entiv e maintenance and continuous quality improvement is adopted.KAIZEN[2]means o n-going improvement inv olving ev er yone——to p management,managers and wo rkers.The beau-ty of KAIZEN is that it does not require sophisti-cated technique or state-o f-the-art technolog y. To im plement the KA IZEN,only simple,co n-ventional techniques such as too ls of quality co n-tr ol,w or k study,etc.are needed.Often,com-mon sense is all that is needed.An independent quality assurance(QA)de-partment is established10years ag o to co ordi-nate quality contr ol activities and enhance the quality of maintenance w or k o n the elevators ser-viced by the company.An incentiv e schem e is in-tr oduced in1990to motivate the w o rkforce to take part in the performance improvement pro-gram.To coordinate activities for creating change, a quality improvement comm ittee(QIC)is estab-lished in1993.T he m andate of QIC is to identify and steer all impr ovement projects that will en-hance the perform ance of the m aintenance ser-vices render ed to clients.M em bership o f the co mmittee includes technicians,foremen,super-visor s and managers fro m the m aintenance de-partment.Representatives from the training and personnel department may also be co-o pted w hen needed.Under this com mittee,different w or king gr oups are fo rmed to handle specific improv e-ment projects.Each of these wo rking gr oups is headed by a manag er o r an eng ineer.Early in-volv em ent and participation o f the affected em-plo yees can smo othen the change process.T he company is no t satisfied w ith the ex ces-siv e rate of Rank-A defects(serious defects w hich may lead to an accident).A decision is ther efore m ade to use the rate of Rank-A defects as a measur e o f perfo rmance of the m aintenance department and a target is established to r educe it from2%to1%in one year′s time.A wo rking g roup headed by the maintenance manag er is form ed to achieve this g oal.All m em bers of the m aintenance department w o uld receive an incen-tive pay ment on the acco mplishment of the tar-get.1 METHODOLOGYT he ado ption of a quality im pro vem ent mo-del pro vides a comm on methodolo gy and a com-mo n language within the company for improv ing the quality o f its wo rk processes,products and serv ices.Rao,et al[3]reco mmend a seven-step m ethod for solving problems and impr oving qua-lity w hile Sw anson[4]sug gests an eight-step mo-del.They can be easily custo mized to so lve speci-fic pro blems because they follo w the Plan-Do-Study-Act pr oblem-solv ing cycle.After the preliminar y study and careful con-sider ation of the Q.A.r eport,Sw anson′s eight-step procedur e,m odified w ith the w ork study appro ach[5],is applied.The steps invo lved in solving this quality pro blem are described in the follow ing sections.1.1 Selecting the work to be studiedA Pareto analysis had identified that the DK-K type landing doo r lock is the most sig nifi-cant co mponent causing(50%of)the Rank-A defects.In its local m aintenance operations,the company ser vices425elevators having5525 pieces of doo r panels equipped w ith that type of landing door locks.The component is therefo re targeted as the focus of the impr ovement effort.1.2 Recording the factsThis com po nent is used to lock the landing do or w hen the car-cag e is not at landing.If any landing doo r panel is opened,the elevator w ill stop automatically .The DK -K ty pe landing door lock is de-signed for tw o -panel centre-opening landing do ors.It contains follow ing parts [6]:Descr iptionQuantityDoor sw itch SW (U L-P1)1Rod 1Door hook 2Roller 1Return spring 1M agnetic cam1 In the past,there is no w ritten training ma-terial developed for the m aintenance of DK -K type landing do or locks.T o facilitate the analysis of the current maintenance m ethod,the existing pr ocedure is documented in a flo w process chart[6].1.3 Examining criticallyThere is an old saying that asking the rig ht questio n is halfw ay tow ards finding the rig ht an-sw er .Detailed ex amination of the flo w process chart is carried out by using the questioning tech-nique [5]w hich is similar to the quality tools o f the “Five Ws and the One H ”[2].It is the m eans to conduct critical examination,in w hich each acti-vity is subjected in turn to a systematic and pro -gr essive series of questions w ith a view to elim i-nating,co mbining,rearrang ing o r simplify ing activities .In the first stage o f the questioning technique ,the pur pose ,place ,sequence ,person and means of every activ ity are sy stematically queried,and a reaso n fo r each reply is so ug ht.T he secondary questions are asked in the second stag e of the questio ning technique,during w hich the answers to the primary questions are subject-ed to further quer ies to deter mine w hether feasi-ble alternatives o f place ,sequence ,persons and /or m eans could be found to im prov e the ex isting m ethod.By asking these questions sy stematically ,innov ative ideas for method im prov em ent w ould be trigg ered.T he critical ex amination of a step in the flo w pr ocess chart o f the maintenance task is show n in T able 1.Table 1 Critical examination sheet [6]N o 49.1L uk S F ,et al.Im pr ov ing Elevat or M aintenance Per for mance :Wo rk Study …… Continued Table1S equence (W hen)(Q3)Wh en w as it done?(A3a)All landing doorlocks w ere checked month-ly.(A3b)After replacemen t ofcompon ents of landing doorlock d evice or door panels.(Q8)W hy then?(A8a)Th e lifts and escala-tors(Safety)ordinance(Cap.327)s tipu lated thatall landing door locks h adto be check ed at least onceper month.(A8b)Th e elevator manu-facturer recomm ended thatthe landin g door lock h adto be ch ecked monthly.(Q13)W hen else could itbe done?(A13)T he lan ding doorlock device cou ld becheck ed more frequen tly,e.g.b i-week ly.(Q18)Wh en should it bedone?(A18a)All landin g doorlocks were checked month-ly.(A18b)After replacementof com ponents of landingdoor lock device or doorpanels(No change).Person (W ho)(Q4)Wh o did it?(A4)T he com peten t liftw orkers did it.(Q9)W hy that per son?(A9)T he lifts and Escala-tors(Safety)Ordinance(Cap.327)s tipu lated thatall elevator w ork had to bedon e by competent elevatorw orkers.T his meas urecould ensur e the safety ofelevator pass engers andw orkers.(Q14)W ho els e could doit?(A14a)A competent liftw orker w ho pas sed theDK-K type landing doorlock training cours e.(A14b)Forem en and super-visiors.(A14c)E ngineers and man-agers.(Q19)W ho should do it?(A19)T he com petent liftw orkers w ho h ad pass edthe DK-K typ e landingdoor lock training cours eand u nder proper su pervi-sion by their forem en or su-pervisors sh ould do it.M eans (How)(Q5)How w as it done?(A5)T o tu rn off SW(U L-P1)w hen both left andright d oor pan els w ereopen ed simu ltaneously.(Q10)W hy that w ay?(A10)Becaus e the mainte-nance work er thought thatthey could save time to fi-n ish this step.(Q15)How els e could it bedone?(A15)SW(UL-P1)shouldnot be tu rned on w hen ei-th er left or righ t door panelw as opened.(Q20)How s hould it bedone?(A20)S W(UL-P1)sh ouldnot be turned on w h enopening each door panels eparately. Primary Qu estions Secondary Qu estions1.4 Developing the improved methodAfter using the questioning sequence de-scribed above,the deficiencies of the ex isting pr ocedure are identified and the impr ovements as recom mended in A16,A19and A20of Table1 are developed.The pro posed changes inv olve the fo llow ing course of action:1.4.1 Redesig n in door hookThe hoo k tip of the part w ould be streng th-ened and m ade lo ng er to increase the actuation stro ke for separating the contacts of the do or lock sw itch.T his chang e w ould reduce door lock failures caused by poo r adjustment m ade by the technician.1.4.2 Im pro ve maintenance pr ocedureThe m aintenance procedure for DK-K ty pe landing door lo ck has to be im prov ed by adding five m aintenance steps in the w hole procedure.1.4.3 T ighten site super vision by m aintenanceforemen and supervisorsT he site super vision w ould be tig htened w ith the fo llow ing g uidelines:(a)Every foreman m ust check and confirm a sample of the site w orks perfo rmed by his m aintenance g roup at least tw ice a month;(b)Every superv isor must check and con-firm a sam ple o f the site w orks perfo rmed by his m aintenance g roup at least one time ev er y tw o m onths.1.4.4 Include DK-K type landing doo r lock inthe standard training courseT he m aintenance o f DK-K ty pe landing door lock w ould be included in the standar d training50T r ansactions of N anjing U niv er sity of A er onautics&A str onautics V ol.15co urse.After completing the course,trainer s hav e to take the competence test.Only those technicians w ho had passed the test w ould be al-low ed to perform maintenance w or k on elevator s w ith this type of landing door.1.5 Evaluating alternative methodsThe improved m ethod is feasibly confir med by a pilot run.As a result of the chang e in m ain-tenance procedur e,the standard time for com-pleting the w hole procedure is slightly increased by4%.The total budget of this project is HK$1.1 million w hich included training co sts and ex-penses fo r replacement o f do or hooks.With the enactm ent of“the Lifts and Escalator s(Safety) (Am endm ent)Or dinance,1993”,the penalty fo r unsafe elev ato rs has been do ubled fro m M ar ch18,1994.T he compensation to the vic-tim of an accident caused by unsafe elevator m ay go up to HK$6m illio n,an enorm ous figure. The amount spent o n this project and the marg inal increase in the standard time are justi-fied w hen com pared w ith the reduction of finan-cial risks inv olved in the compensation to victim s of accidents,loss of reputation and defection of custom er s.In deter mining the benefits,it is not limited to those that could be easily quantified.Benefits such as reduction in the future w orkload of the maintenance personnel in breakdow n mainte-nance,and the reduced risk exposure of the end-users,co uld have sig nificant long-term effects on the company′s financial performance.T hus, these benefits w hich could only be ex pr essed in qualitative terms are also taken into account in the cost-benefit analy sis.1.6 Defining the improved methodAfter deciding o n the chang es in the metho d to be adopted,the do cuments listed below are pr epared:(a)T he procedure fo r maintenance of the device;(b)A check-sheet for technicians to r ecord data relating to the device befo re and after ad-justment or co unterm easur e;(c)Guidelines fo r supervision o f elevator technicians;(d)A form for r ecording the perfo rmance of elevator technicians.T hese documents are distr ibuted to all m aintenance personnel as w ell as the QA depart-m ent and the training perso nnel department. T hey served as the reference standard o f the new m ethod for impr oving the comm unication be-tw een manag em ent and the front-line techni-cians.T hey are also used as reference material for the tr aining of elevator technicians.1.7 Installing the improved methodT he installation process had four steps, namely:(1)Gaining acceptance by manag ement and departmental supervision;(2)Gaining acceptance by technicians;(3)Preparing to m ake the change;(4)Co ntrolling the chang e-o ver.T he first step is done in the ev aluation and r eporting stag e.It w ould be an abortive exercise to proceed further if m anagement appro val and acceptance had not been o btained.Aw ar eness training in w o rk study is offered to managers, foremen,superviso rs and technicians concerned to secure their acceptance of the change.Peo ple ar e much more likely to be receptive to the idea of chang e w hen they knew and under-sto od w hat is happening.Wholehear ted coopera-tion at any level w ould o nly com e as the result of confidence and trust.T he change-over to the new method is pro-perly planned to minimize the hardships or in-conveniences caused to em plo yees and end-users and the disruption to normal m aintenance w o rks.T he first task is to identify the variousN o51 .1L uk S F,et al.Im pr ov ing Elevat or M aintenance Per for mance:Wo rk Study……activities invo lved.These include the form ation of a project team,the training of pro ject team members and maintenance w orker s,the inclu-sion o f DK-K type landing do or lo ck in the stan-dard training cour se,the tig htening of site su-pervisio n,order ing,the installation of new do or hooks and the adjustm ent of all DK-K type land-ing do or locks.A schedule for the various activi-ties is developed by w orking back fro m the tar-get date of change-ov er along the cr itical path of activities.1.8 Maintaining the new methodWhen a new metho d is installed,it should be maintained in its specific form,and techni-cians should not be permitted to slip back to old metho ds.A periodic m ethod auditing procedure is established.On-site audits o f actual practice are per for med by m aintenance foremen(bi-w eekly),supervisor s(mo nthly)and the w ork-ing g roup(half yearly).These audits are to en-sure that the new method is in practice.Should the auditors identify an improv em ent that can be made in the m ethod,the standards wo uld be re-vised and documented.2 RESULTS AND DISCUSSIONSThis quality improvement project w as com-pleted at the end of1995.Since then,no Rank-A defect in connectio n with DK-K ty pe landing do or lo ck is occurred,reducing the overall rate of Rank-A defects to0.9%w hich is a reduction of mo re than50%w hen compared to the lev el in the previous years.Besides,so me major custo mers ex pressed their appreciation on the im pro vement o f eleva-to r perfo rmance and the r eductio n of dow ntime of the elev ato rs from14.7%in1994to13.2% in1996.Applying the wo rk study appro ach in this quality improv em ent project has prov ed to be ef-fective in getting the method rig ht.Draw ing on the ex perience of this project, the success of a quality impr ovement pro gram has been found to hinge on the follo w ing fac-tors:(1)Stro ng leadership and r eal com mitmentSenio r management should lead the quality effor t.Witho ut this leadership,str ategic quality m anag em ent and quality im pro vement are likely to be doo med.(2)Prov iding an infrastructure for qualityOrg anizational mechanisms for establishing clear go als,tar gets and for carr ying o ut the plans as w ell as pro vision for r ecognitio n and re-w ards must be in place.(3)Starting“sm all”and learning fro m pilo t activ itiesU se a small number o f pilot pro jects to demonstrate the feasibility and effectiv eness of the change progr am.T he scope o f each pro ject should be carefully defined so that co mpletion is likely w ithin12months.(4)Estimating accurately the time and the r esources requir edWhen no additional manpo wer is provided to handle the ex tra w ork,pr io rities may need to be chang ed.Fo r ex ample,less critical activities are rescheduled o r canceled.(5)Coo rdinating activities in the chang e processT he QA department coordinates activities through contro l w hile the quality improvement comm ittee focuses on coordinating activities for creating chang e.(6)Im plementing quality strategyT he im plementation of the quality strategy m ust occur throug h the line org anization,i.e., the maintenance department rather than thro ug ha staff functio n such as the Q.A.department.(7)Cultivating quality cultureA quality culture can be cultivated by in-creasing aw areness of quality,pro viding evi-52T r ansactions of N anjing U niv er sity of A er onautics&A str onautics V ol.15dence of m anag em ent leadership,self-dev elo p-ment opportunities,em pow erment,participa-tio n,recog nition and rewards.3 CONCLUSIONSWith o ver50%reduction o f Rank-A de-fects,the safety performance o f the maintenance depar tm ent has sig nificantly improv ed.Further-more,o ther aspects such as maintenance proce-dure,component design,supervisio n system, training and quality of service are also improv ed.The r esult of this quality improvement pro-ject show s that strateg ic quality management can be successfully implem ented when clear quality strategies,policies and goals are linked to cus-to mer needs,and the other success factors are in place.The w ork study approach can be applied to quality im pro vement pr ojects by g etting the metho d r ig ht first.It is found to be one of the most penetrating investigation tools available to the com pany.Encouraged by the success of the pilot pro-ject,the wo rk study appro ach is being applied to reduce the Rank-A defects caused by the o ther significant components.With sustained effo rt and momentum to impr ove its methods and qual-ity of w ork,the co mpany′s maintenance per for-m ance can be co ntinuously enhanced.REFERENCES1 Jur an J M,Gr yna F M.Q uality planning and analy-sis:thir d editio n.U SA:M cGr aw-Hill Inc,1993.139 -1572 M asaaki Imai.K A IZEN——the key to Japan′s com-petit ive success.U SA:M cGr aw-Hill,Inc.,1991.3 3 A shok Rao,L aw r ence P.Car r,Isamael Dambo lena, et al.T o tal quality manag ement:a cr oss functional per spectiv e.U SA:John W iley&Sons,Inc,1996.199 -2014 R og er C Sw anson.T he quality im pr ov ement hand-bo ok——team guide to to ols and techniques.U.K.: K o gan Pa ge,1995.31-515 Geo rg e K anawat y.I nt ro ductio n to w or k study: four th(r evised)edit ion.G eneva:I nt ernational L abour O ffice,19926 L eung Ho Chi.I mpr ov ement of maintenance wo rk in elevato r industr y using the w or k study appr oach: [disser tatio n].U.K.:U niv ersity of W ar wick,1997提高电梯保养工作性能之途径陆雪芬 曾庆才(香港理工大学制造工程系 香港九龙红)梁浩池(英国华威大学工程学系综合深造发展课程 香港)摘要 介绍了香港一家电梯公司所实施的策略品质管理,其品质策略、政策及目标都是以顾客的需求而确立的,持续品质改良已被采纳为公司之策略,用以改良表现及竞争优势。

PortServer TS 16 用户指南说明书

PortServer TS 16 用户指南说明书

PortServer TS 16Setup CardAbout This CardThis card provides the following information on your PortServer TS 16:• A brief introduction• A setup overview that identifies the major steps required fordevice setup•Guidance on where to find more detailed information thatmay be required to complete setup and administrative tasksKey FeaturesThe following are some of the key features of PortServer TS 16:Console ManagementPortServer TS 16 provides the following console management features:•Secure access to remote systems using SSHv2•“Solaris Ready” certification from Sun Microsystems•Inbound and outbound PPP connections for remote access tonetwork equipment•Port buffering of up to 64 KB per port to diagnose networkproblems Terminal ServerPortServer TS 16 provides the following terminal server features:•Serial ports capable of supporting asynchronous, high-speedconnections to printers, modems, terminals, and otherdevices. Support extends to full modem control and hardware handshaking.•Local TTY and COM port functionality using Digi RealPortsoftware GeneralPortServer TS 16 provides the following general features:•Auto-sensing 10/100 TX Ethernet connection•Industry standard surge suppression and ESD protection to 15kilovolts on all signal pins•LED indicators to display network information•Local configuration using a terminal or PC and remote con-figuration using either a Telnet connection or a web browser •Remote monitoring and IP address configuration using DigiPort Authority - Remote•Upgradable firmware using TFTP or HTTPPackage ContentsThe package contains the following items:•One PortServer TS 16 with an integrated power supply•One RJ-45-to-DB-25 crossover cable and one RJ45-to-DB9crossover cableNote: These are intended for connecting a terminal or PC so that you can configure your PortServer TS 16 using the com-mand line interface.•One Sun Netra crossover cable to connect to SUN Netra serv-ers and Cisco routers and switches (Rack Mount units only)Note: For additional cables, contact your dealer or distributor.•Optional Rack Mount Kit (19” and 23”)•One loopback plug •Access Resource CD•This card, an Access Resource CD card, and associatedpaperworkSetup OverviewThis overview identifies the major steps required to set up your PortServer TS 16. It provides simple methods for accomplishing common setup tasks. For information on alternative methods, see the online documentation. Step A: Set Up the Hardware1.Connect the PortServer TS 16 to a proper power source andthe PortServer TS 16 to the network. See the Specifications table on the backside of this document for details.2.Connect peripherals to serial ports. See the Terminal ServerCable Guide for information on cabling peripherals to serial ports. Step B: Install and Set Up DPA-RemoteThis step is not required if you do not intend to use DPA-Remote to configure the IP address or to monitor ports.Notes: (1) DPA-Remote cannot be used to change the IP address of a PortServer TS 16 that has already been assigned one; it can only be used to configure the initial IP address. (2) DPA remote cannot assign an IP address on a network that has an active DHCP server.For information on installing DPA-Remote, see the online Digi Port Authority - Remote Device Monitor Setup Guide . Step C: Configure an IP AddressThe following are 4 methods for configuring an IP address. Use the one that is most convenient for you.Method 1: Using DP A-Remote 1.Run DPA-Remote.2.If DPA-Remote is not set for ADDP, choose ADDP as theDiscovery Protocol.3.Choose Discover. A list of Digi devices with IP addresses of0.0.0.0 appears.4.Select a PortServer TS 16 from the list and then choose Con-figure.5.Supply an IP address, subnet mask, and default gateway andthen choose OK.DPA-Remote configures the IP address, subnet mask, and default gateway.Method 2: Using Ping-ARPUse this section to configure an IP address by manually updating a server’s ARP table and then pinging the PortServer TS 16.1.Record the MAC address of the PortServer TS 16. It islocated on the back of the unit.2.Access a server on the same subnet as the PortServer TS 16.3.Manually update the server’s ARP table using the PortServerTS 16’s MAC address and the IP address you want assigned to the PortServer TS 16. The following is an example of how this is done on a Windows NT 4.0 system:arp -s 143.191.2.1 00-40-9d-22-23-604.Ping the PortServer TS 16 using the IP address just assigned. The following is an example:ping 143.191.2.1The ping will probably time out before there is a response. 5.Wait a few seconds and then ping again.The PortServer TS 16 replies to the ping, indicating that the IP address has been configured.Method 3: Using DHCP or RARP1.Record the MAC address of the PortServer TS 16, which islocated on the back of the unit.2.Set up an entry on a DHCP or RARP server. If you intend touse RealPort, do the following:•Reserve a permanent IP address.•Record the IP address. You will need it when you config-ure the RealPort driver.3.Power on the PortServer TS 16.Method 4: Using the Command Line1.Connect a terminal or PC to a serial port on the PortServer TS16.•For a terminal, use the cable that came in your package. •For a Windows Hyperterminal connection, use the cablethat came in the package, a straight-through DB25-to-DB9 modem cable, and gender changers as required.2.Configure the parameters of the terminal or terminal emula-tion software to work with the serial port. The default port settings are below:3.Log in to the PortServer TS 16 as root by entering the follow-ing commands: (You may have to press the Enter key to get a Login prompt.)•At the login prompt, type root .•At the password prompt, type dbps (which is the defaultpassword. If the password has been changed, use the new password.)See the newpass command in the online Digi One/PortServer TS Command Reference for information on changing the root password.4.Configure an IP address with the following command:set config dhcp=off ip=ip-addr submask=maskwhere ip-addr is the IP address to configure and mask is the subnet mask used by the network Exampleset config dhcp=off ip=192.10.7.3 submask=255.255.255.05.Reboot at the reboot prompt.Step D: Configuring Ports Using the Web Interface1.Access the PortServer TS 16 from a web browser by specify-ing the unit’s IP address in the URL window.2.Log in to the PortServer TS 16 as root by entering the follow-ing:•At the login prompt, type root .•At the password prompt, type dbps (which is the defaultpassword. If the password has been changed, use the new password.)e the web interface to configure ports. See the online helpfor information on configuration fields.4.If you intend to use RealPort, install RealPort software on aserver. See the online RealPort library for more information. Step E: Configure other Features as RequiredSee “Where to Find Information” on this card for ideas onadditional features to configure and directions as to where to find setup information.Step F: Troubleshoot Setup ProblemsEnsure that your setup works as you intend. If you encounter setup problems, see the troubleshooting section in the online Configuration and Administration Guide.PortServer TS 16 LibraryAccess Resource CD CardThis card provides information on the contents of the Access Resource CD. It includes the CD mounting instructions required to access the CD on many Unix systems.Digi One/PortServer TS Command ReferenceThis online manual, available on the Access Resource CD, provides complete information on commands.PortServer TS 8/16 Configuration and Administration Guide This online manual, available on the Access Resource CD, provides procedural information for setup.RealPort Setup GuidesThese online manuals provide information on setting up servers for RealPort software.Digi Port Authority - Remote Device Monitor Setup Guide This online manual provides information on installing and using Digi Port Authority - Remote software. Online Help for the Web UIThis online help provides information on configuration fields used with the web browser configuration interface. Terminal Server Cable GuideThis online manual provides cabling information.•VT 100 emulation • 1 stop bit •9600 baud •No parity•8-bit characterWhere to Find Information Safety Considerations and Warnings•AC only- Do not attempt to defeat the safety feature of the3-wire, ground-connection plug that comes with PortServerTS 16. If you are unable to insert this plug into an outlet,have an electrician replace the obsolete outlet.•AC only- Ensure that the ampere rating of all equipmentplugged into wall outlets does not overload the outlet.•AC only- If you require an extension cord, ensure that theampere rating of all equipment plugged into the extensioncord does not exceed the ampere rating of the cord.CAUTION! This product contains a lithium-ion battery that isembedded in one of the components on the printed circuit board.The battery is not field-replaceable, and improperly installing thecomponent could result in an explosion.CAUTION! Do not cover or obstruct ventilation slots.Thesedevices generate heat and require adequate circulation to maintainproper operating temperatures.CAUTION! Do not switch or disconnect devices in the groundingcircuit conductor between the DC source and the point ofconnection of the grounding electrode conductor.CAUTION! Do not allow the PortServer TS 16 to get wet. Do notinstall near high-powered radio transmitters or electricalequipment. Any of these conditions can cause safety hazards andequipment failure or damage.Rack Mounting Installation•Distribute weight evenly in the rack to avoid overloading.•Ensure proper ventilation with at least 12 inches (30 centime-ters) of clearance on all sides.•Check equipment nameplate ratings before connecting to thesupply circuit to avoid overloads which may damage over-current protection devices and supply wiring.•Maintain reliable earthing for rack-mounting equipment,especially for supply connections.•Install equipment in Restricted Access Areas only (dedicatedequipment rooms/closets) in accordance with Articles 110-16,110-17, and 110-18 of the National Electrical Code, ANSI/NFPA 70.•Connect equipment to a DC supply source (reliably earthed)that is electrically isolated from the AC source.•Directly connect the equipment chassis to the DC supply sys-tem-grounding electrode conductor or a bonding jumper froma grounding terminal bar (or bus) that is connected to the DCsupply system grounding electrode conductor.•Contain equipment that has a connection between thegrounded conductor of the same DC supply circuit, thegrounding conductor, and also the point of grounding of theDC system in the same immediate area. Do not ground theequipment elsewhere.•Locate the DC supply source within the same premises as theequipment.•Route away and secure all DC input wiring from sharp edgesto prevent chaffing as well as provide strain relief.•Provide a readily accessible disconnect device and protectivedevice a fixed wiring for a DC power supply suitable for thespecified rated voltage and current. Disconnect and protectivedevices to be rated 2A Amps maximum.SpecificationsRegulatory NoticesThis product complies with the following standards:Electromagnetic Emissions•FCC Part 15 Class B -- See Also: Declaration of Conformity•EN55022 Class B•EN61000-3-2 and EN61000-3-3•VCCI Class II•ICES 003 Class B•AS3548Electromagnetic ImmunityEN55024Product Safety•UL 60950•CSA 22.2 No.60950•EN60950•NOMS•AS3260Declaration of ConformityIn accordance with FCC Dockets 96-208 and 95-19Digi International declares that the products:to which this declaration relates, meet the requirements specifiedby the Federal Communications Commission as detailed in thefollowing specifications:•Part 15, Subpart B, for Class B Equipment•FCC Docket 96-208 as it applies to Computers andPeripheralsThe products listed have been tested at an External TestLaboratory certified per FCC rules and have been found to meetthe FCC, Part 15, Class B, Emission Limits. Documentation is onfile and available from the Digi International HomologationDepartment.ICES 003 Class BThis digital apparatus does not exceed the Class B limits for radionoise emissions from digital apparatus set out in the RadioInterference Regulations of the Canadian Department ofCommunications.Le present appareil numerique n'emet pas de bruitsradioelectriques depassant les limites applicables aux appareilsnumeriques de la class B prescrites dans le Reglement sur lebrouillage radioelectrique edicte par le ministere desCommunications du Canada.Copyright © 2001, 2002 Digi International Inc. All RightsReserved. DisclaimerThis manual may contain inaccurate or erroneous information. This manual issubject to change at any time. This manual, including all information containedherein, is provided “as is” without warranty of any kind, either express or implied,including, but not limited to, any implied warrantees of merchantability or fitnessfor particular purpose. Digi International Inc. makes no representations,warranties, or commitments with regard to any data or information contained inthis manual. If you rely on data or information contained in this manual, suchreliance is at your own risk.To set up...See...An IP address•The web interface and associated helpNote: The initial IP address cannot be set upwith the web interface.•The set config command in the online Com-mand Reference•The section on configuring the Ethernetinterface in the online Configuration andAdministration Guideautoconnection •The web interface and associated help•The set user and set ports commands in theonline Command Reference•The section on configuring autoconnection inthe online Configuration and AdministrationGuideDPA - Remote•The online Digi Port Authority - RemoteDevice Monitor Setup GuideMenus•The web interface and associated help•The set menu command in the online Com-mand ReferencePorts •The web interface and associated help•The set ports, set flow, and set line com-mands in the online Command Reference•The sections on configuring ports forRealPort, modems, terminals, and printers inthe online Configuration and AdministrationGuidePort Buffering•The web interface and associated help•The set buffers commands in the onlineCommand Reference•The section on Console Management in theonline Configuration and AdministrationGuidePPP•The web interface and associated help•The set user command in the online Com-mand Reference•The PPP section in the Configuration andAdministration GuideRealPort•The web interface and associated help•The set ports command in the online Com-mand Reference•The online RealPort librarySSH•The web interface and associated help•The set user command in the online Com-mand Reference•The sections on Security Features and Con-sole Management in the online Configurationand Administration GuideSNMP agent •The set snmp command in the online Com-mand Reference•The section on configuring the SNMP agentin the onlineConfiguration and Administra-tion GuideUsers•The web interface and associated help •The set user and newpass commands in the online Command Reference•The section on configuring users in the Con-figuration and Administration GuidePower Requirements•16-Port Desktop•16-Port Rack (AC)115-230 VAC,50-60 Hz, .8A maxinternal power supply•16-Port Rack (DC)36-72 VDC, .45 A at 48 VDC maxTerminations:•+ = Source•- = Reference• = Earth groundThe terminal lug must be attachedto a suitable earth ground for safeoperation.EnvironmentalAmbient temperature60°F (15.6°C) to 90°F (32.2°C)Relative humidity20% to 80% non-condensingAltitude0 to 7,000 feet (0 to 2,134 meters)Mechanical16-Port Rack Width: 16.8 inches (42.672 cm)Height: 1.6 inches (4.064 cm)Depth: 6.5 inches (16.510 cm)Weight: 3.75 pounds (1.701 kg)16-Port Desktop Width: 13.5 inches (34.290 cm)Height: 1.375 inches (3.493 cm)Depth: 6.5 inches (16.510 cm)Weight: 3 pounds (1.360 kg)Manufacturer's Name: Digi International Inc.Corporate Headquarters: 11001 Bren Road EastMinnetonka MN 55343Manufacturing Headquarters: 10000 West 76th StreetEden Prairie MN 55344Product Name Model #PortServer TS 16 DesktopPortServer TS 16 Rack ACPortServer TS 16 Rack DC700017337000174270001747See list of product names andmodel numbers.Tested to Comply with FCCStandardsFOR HOME OR OFFICE USE。

系统出错提示中英对照及对策

系统出错提示中英对照及对策
[英文提示] Invalid partition table [中 文] 无效的分区表 [原 因] 硬盘分区信息中有错误。 [对 策] 应备份所能找到的数据,运行 Fdisk 来重新设置硬盘分区。
[英文提示] Invalid path,not directory,or directory not empty [中 文] 无效的路径,非目录,或目录非空 [原 因] 系统不能定位指定的目录,或者用户输入了文件名来代替目录名,或者目录中包含 文件(或子目录),不能被删除。 [对 策] 检查目录名的拼法,如果目录为空,那么它可能包含隐含文件,使用 Dir/ah 命令来 显示任何可能的隐含文件,用 attrib 改变属性,删除之。
[英文提示] Cannot read file allocation table [中 文] 不能读到文件分配表 [原 因] 文件分配表已坏。 [对 策] 如仍能找到一些数据,那么将它们都备份到一张空盘中,也可利用 Chkdsk 命令修 复文件分配表,如需要,可重新格式化磁盘。如果问题重复发生,那么应该修理驱动器或更换驱 动器。
[英文提示] Non-System Disk or Disk Error [中 文] 非系统盘或磁盘错误 [原 因] 系统在当前盘中找不到系统文件。 [对 策]
[英文提示] Not enough memory [中 文] 内存不足 [原 因] 见 Insufficient memory [对 策]
[英文提示] NOT READY,READING DRIVE X [中 文] 驱动器 X 未准备好 [原 因] 在指定的驱动器中没有盘或门没关。 [对 策] 插入磁盘到指定驱动器或关上驱动器门。
[英文提示] Write fault error [中 文] 写失败错误 [原 因] 系统不能在磁盘上写数据。 [对 策] 将磁盘取下再重新插好试试,仍然不行则运行 Chkdsk 或 Scandisk,如磁盘不能恢 复,扔掉它。

CUCM Publisher Node Restoration from Subscriber Da

CUCM Publisher Node Restoration from Subscriber Da

CUCM Publisher Node Restoration from Subscriber Database without Prior Backup or Root AccessContentsIntroductionBackgroundGather Cluster DataStop Replication on All SubscribersInstall the CUCM PublisherUpdate Processnode Values on the PublisherReboot the Publisher NodeVerify Cluster AuthenticationPerform a New BackupAdd a Backup DeviceStart a Manual BackupPublisher Restore from the Subscriber DBRestore StatusRun a Sanity Check on the Publisher DBReboot the ClusterVerify Replication Setup RequirementsReplication SetupPost RestoreActivate ServicesInstall Data that was not RestoredTroubleshootCluster does not AuthenticateRestoration does not Process CCMDB ComponentReplication FailurePhones do not Register or are Unable to Access ServicesIntroductionThis document describes how to restore the CUCM publisher node from the subscriber database without prior backup or root access.BackgroundIn early versions of CUCM, the publisher node was regarded as the only authoritative source for the Structured Query Language (SQL) DB.Consequently, if a publisher node was lost due to a hardware failure or a file system corruption, the only way to recover it was to reinstall and restore the DB from a Disaster Recovery System (DRS) backup.Some customers did not keep proper backups, or had backups that were out-of-date, so the only option was to rebuild and reconfigure the publisher server node.In CUCM Version 8.6(1), a new feature was introduced in order to restore a publisher DB from a subscriberdatabase.This document describes how to take advantage of this feature in order to successfully restore a publisher DB from the subscriber.Cisco strongly recommends that you keep a full Disaster Recovery Framework (DRF) backup of the entire cluster.Since this process only recovers the CUCM DB configuration, other data, such as certificates, Music on Hold (MoH), and TFTP files, are not recovered. In order to avoid these issues, keep a full cluster DRF backup.Note: Cisco recommends that you review and be familiar with the entire process described in this document before you begin.Gather Cluster DataBefore you reinstall the publisher, it is critical that you gather the pertinent details about the previous publisher. These details must match the original publisher installation:•IP address•Host name•Domain name•Security passphrase•Exact CUCM version•Installed Cisco Options Package (COP) filesIn order to retrieve the first three items in the list, enter the show network cluster command at the current subscriber node CLI:<#root>admin:show network cluster172.18.172.213 cucm911ccnasub1 Subscriber authenticated172.18.172.212 cucm911ccnapubPublisher not authenticated - INITIATORsince Tue Dec 3 12:43:24 2013172.18.172.214 cucm911ccnasub2 Subscriber authenticated using TCP sinceSun Dec 1 17:14:58 2013In this case, the IP address is 172.18.172.212, the host name is cucm911ccnapub, and there is no domain name configured for the publisher.The security passphrase (the fourth item in the list) is retrieved from the site documentation.If you are unsure about the security passphrase, make a best-effort guess, and you can attempt to verify and correct it as needed based on the CUCM version.If the security passphrase is incorrect, then a cluster outage is required in order to correct the situation.In order to retrieve the exact CUCM version and the installed COP files (the last two items in the list), gather the system output from the show version active command:<#root>admin:show version activeActive Master Version:9.1.2.10000-28Active Version Installed Software Options:No Installed Software Options Found.In this case, Version 9.1.2.10000-28 is installed with no add-on COP files.Note: It is possible that some COP files were previously installed on the publisher, but were notinstalled on the subscriber, and vice versa. Use this output as a guideline only.Stop Replication on All SubscribersWhen the publisher is installed, it is critical that replication does not set up and delete the current subscriber DBs. In order to prevent this, enter the utils dbreplication stop command on all subscribers:<#root>admin:utils dbreplication stop********************************************************************************This command will delete the marker file(s) so that automatic replication setupis stoppedIt will also stop any replication setup currently executing********************************************************************************Deleted the marker file, auto replication setup is stoppedService Manager is runningCommanded Out of ServiceA Cisco DB Replicator[NOTRUNNING]Service Manager is runningA Cisco DB Replicator[STARTED]Completed replication process cleanupPlease run the command 'utils dbreplication runtimestate' and make sure all nodesare RPC reachable before a replication reset is executedInstall the CUCM PublisherGather a bootable image of the appropriate version, and perform an install with an upgrade to the appropriate version.Note: Most CUCM Engineering Special (ES) Releases are already bootable.Install the publisher and specify the correct values for the IP address, host name, domain name, and security passphrase mentioned previously.Update Processnode Values on the PublisherNote: The publisher must be aware of at least one subscriber server in order to restore the DB from that subscriber. Cisco recommends that you add all subscribers.In order to retrieve the node list, enter the run sql select name,description,nodeid from processnode command at the CLI of a current subscriber.The name values can be host names, IP addresses, or Fully Qualified Domain Names (FQDNs).If you run CUCM Version 10.5(2) or later, the utils disaster_recovery prepare restore pub_from_sub command must be run on the publisher CLI before you can proceed to add nodes to System > Server:Warning: Many people using CUCM Version 10.5(2) or later skip the command utilsdisaster_recovery prepare restore pub_from_sub; however, this is a critical command. Be sure not to skip any steps in this document.After you receive the node list, navigate to System > Server and add all of the name values other than EnterpriseWideData to the Publisher Server Unified CM Administration page.The name values must correspond to the Host Name/IP Address field on the System > Server menu.<#root>admin:run sql select name,description,nodeid from processnodename description nodeid================== =============== ======EnterpriseWideData 1172.18.172.212CUCM901CCNAPub 2172.18.172.213CUCM901CCNASub1 3172.18.172.214CUCM901CCNASub2 4Note: The default installation adds the publisher host name to the processnode table. You might have to change it to an IP address if the name column lists an IP address for the publisher. In this case, do not remove the publisher entry, but open and modify the current Host Name/IP Address field.Reboot the Publisher NodeIn order to restart the publisher after the processnode changes are complete, enter the utils system restart command:<#root>admin:utils system restartDo you really want to restart ?Enter (yes/no)? yesAppliance is being Restarted ...Warning: Restart could take up to 5 minutes.Shutting down Service Manager. Please wait...\Service Manager shutting down services... Please WaitBroadcast message from root (Tue Dec 3 14:29:09 2013):The system is going down for reboot NOW!Waiting .Operation succeededVerify Cluster AuthenticationAfter the publisher restarts, if you made the changes correctly and the security passphrase is correct, the cluster should be in the authenticated state. In order to verify this, enter the show network cluster command:<#root>admin:show network cluster172.18.172.212 cucm911ccnapub Publisher authenticated172.18.172.213 cucm911ccnasub1Subscriber authenticated using TCP sinceTue Dec 3 14:24:20 2013172.18.172.214 cucm911ccnasub2Subscriber authenticated using TCP sinceTue Dec 3 14:25:09 2013Note: If the subscribers do not appear as authenticated, refer to the Troubleshoot section of this document in order to resolve this issue before you proceed.Perform a New BackupIf no previous backup is available, perform a cluster backup on the DRS page.Note: Although you can use the subscriber DB for the restore, a backup is still required in order to restore the non-DB components.If no backup is available, then perform a new one; if a backup already exists, then you can skip this section. Add a Backup DeviceUse the Navigation Menu in order to navigate to the Disaster Recovery System, and add a backup device.Start a Manual BackupAfter the backup device is added, start a manual backup.Note: It is critical that the publisher node has the CCMDB component registered.Publisher Restore from the Subscriber DBOn the Disaster Recovery System page, navigate to Restore > Restore Wizard.If a current backup was available, and you skipped the previous section, check all of the feature check boxes in the Select Features section: Enterprise License Manager (ELM) if available, CDR_CAR, and Unified Communications Manager (UCM).If you use a backup that was performed in the previous section, check only the UCM check box:Click Next. Check the publisher node check box (CUCM911CCNAPUB), and choose the subscriber DB from which the restoration takes place. Then, click Restore.Restore StatusWhen the restoration reaches the CCMDB component, the Status text should appear as Restoring Publisher from Subscriber Backup:Run a Sanity Check on the Publisher DBBefore you reboot and set up replication, it is a good practice to verify that the restoration is successful and that the publisher DB contains the required information.Ensure that these queries return the same values on the publisher and subscriber nodes before you proceed: run sql select count(*) from device••run sql select count(*) from enduserReboot the ClusterAfter the restoration is complete, enter the utils system restart command on every node. Start with the publisher followed by each subscriber.<#root>admin:utils system restartDo you really want to restart ?Enter (yes/no)? yesAppliance is being Restarted ...Warning: Restart could take up to 5 minutes.Shutting down Service Manager. Please wait...\ Service Manager shutting down services... Please WaitBroadcast message from root (Tue Dec 3 14:29:09 2013):The system is going down for reboot NOW!Waiting .Operation succeededVerify Replication Setup RequirementsNavigate to the Cisco Unified Reporting page and generate a Unified CM Database Status Report.It is likely that replication might not have set up yet, but it is important to ensure that the Unified CM Hosts, Unified CM Rhosts, and Unified CM Sqlhosts files match the publisher.If they do not, those nodes that do not match will need to be rebooted again. If these files do not match, do not proceed to the next step or reset replication.Replication SetupDependent upon the version, replication might not set up automatically. In order to check this, wait for all of the services to start, and enter the utils dbreplication runtimestate command.A state value of 0 indicates that setup is in progress, while a value of 2 indicates that replication is set up successfully for that node.This output indicates that the replication setup is in progress (state appears as 0 for two of the nodes):This output indicates that replication is set up successfully:If any nodes appear with a state value of 4, or if replication does not successfully set up after several hours, enter the utils dbreplication reset all command from the publisher node.If replication continues to fail, refer to the Troubleshooting CUCM Database Replication in LinuxAppliance Model Cisco article for more information about how to troubleshoot the issue.Post RestoreSince the DB restoration does not restore all of the previous components, many server-level items must be manually installed or restored.Activate ServicesThe DRF restoration does not activate any services. Navigate to Tools > Service Activation, and activate any necessary services that the publisher should run, based on the site documentation from the Unified Serviceability page:Install Data that was not RestoredIf a full backup was not available, you must reproduce certain manual configurations. Particularly, those configurations that involve certificates and TFTP functions:•MoH files•Device packs•Dial plans (for non-North American Numbering Plan (NANP) dialing)•LocalesAny other miscellaneous COP files••Any files that previously were manually uploaded to the publisher (if it was a TFTP server)Simple Network Management Protocol (SNMP) community strings••Bulk certificate exports for Extension Mobility Cross Cluster (EMCC), Intercluster LocationBandwidth Manager (LBM), and Intercluster Lookup Service (ILS)•Certificate exchanges for secure trunks, gateways, and conference bridgesNote: For mixed-mode clusters, you must run the Certificate Trust List (CTL) client again. TroubleshootThis section describes various scenarios that might cause this procedure to fail.Cluster does not AuthenticateIf the cluster does not authenticate, the two most common causes are mismatched security passphrases and connectivity issues on TCP port 8500.In order to verify that the cluster security passphrases match, enter the utils create report platform command at the CLI of both nodes, and inspect the hash value from the platformConfig.xml file. These should match on the publisher and subscriber nodes.<#root><IPSecSecurityPwCrypt><ParamNameText>Security PW for this node</ParamNameText><ParamDefaultValue>password</ParamDefaultValue><ParamValue>0F989713763893AC831812812AB2825C831812812AB2825C831812812AB2825C</ParamValue></IPSecSecurityPwCrypt>If these match, verify the TCP connectivity on port 8500. If they do not match, there might be difficulties when you attempt to fix the passphrase due to several defects in the CUCM code that surround the procedure:•Cisco bug ID CSCtn79868 - pwrecovery tool resetting only sftpuser password•Cisco bug ID CSCug92142 - pwrecovery tool does not update the internal user passwords•Cisco bug ID CSCug97360 - selinux denials in pwrecovery utility•Cisco bug ID CSCts10778 - Denials thrown for security Password Recovery procedure•Cisco bug ID CSCua09290 - CLI "set password user security" did not set the correct apps password •Cisco bug ID CSCtx45528 - pwd reset cli returns good but doesn't change password•Cisco bug ID CSCup30002 - DB service is down, after changing the security password on CUCM10.5•Cisco bug ID CSCus13276 - CUCM 10.5.2 security password recovery causes DB to not start atrebootIf the CUCM version contains fixes for all of these issues, the easiest solution is to complete the password recovery procedure detailed in Cisco Unified Communications Operating System Administration Guide, Release 10.0(1) on all nodes.If the CUCM version does not contain the fixes for these issues, then the Cisco Technical Assistance Center (TAC) might have the ability to perform a workaround, dependent upon the situation.Restoration does not Process CCMDB ComponentIf the restoration does not list the DB component, then it is possible that the backup itself does not contain aDB component. Ensure that the publisher DB runs and can accept queries, and perform a new backup. Replication FailureRefer to the Troubleshooting CUCM Database Replication in Linux Appliance Model Cisco article in order to troubleshoot a replication failure.Phones do not Register or are Unable to Access ServicesSince the DB restoration does not restore any certificates, if the publisher is the primary TFTP server, the signer is different.If the phones trust subscriber Trust Verification Service (TVS) certificates, and TCP port 2445 is open between the phones and the TVS servers, the issue should be resolved automatically.For this reason, Cisco recommends that you maintain full cluster DRF backups.CUCM versions prior to Version 8.6 might also have certificate issues, even with a previous successful backup, due to Cisco bug ID CSCtn50405.Note: Refer to the Communications Manager Security By Default and ITL Operation andTroubleshooting Cisco article for additional information about how to troubleshoot Initial Trust List (ITL) files.。

装系统时的英文翻译

装系统时的英文翻译

Standard CMOS Setup(标准CMOS设定):这个选项可以设置系统日期、时间、IDE设备、软驱A与B、显示系统的类型、错误处理方法等。

(1)在IDE设备设置中,用户可以在Type(类型)和Mode(模式)项设为Auto,使每次启动系统时BIOS自动检测硬盘。

也可以在主菜单中的IDE HDD Auto Detection操作来设置。

用户还可以使用User选项,手动设定硬盘的参数。

必须输入柱面数(Cyls),磁头数(Heads),写预补偿(Precomp),磁头着陆区(Landz),每柱面扇区数(Sectorxs),工作模式(Mode)等几种参数。

硬盘大小在上述参数设定后自动产生。

(2)显示类型可选EGA/VGA(EGA、VGA、SEGA、SVGA、PGA显示适配卡选用)、CGA40(CGA显示卡,40列方式)、CGA80(CGA显示卡,80列方式)、MONO(单色显示方式,包括高分辨率单显卡)等四种,以现在我们使用的计算机来看,绝大多数都属于EGA/VGA显示类型。

(3)暂停的出错状态选项有:All Errors(BIOS检测到任何错误,系统启动均暂停并且给出出错提示)、No Errors(BIOS检测到任何错误都不使系统启动暂停)、AllBut Keyboard(BIOS检测到除了磁盘之外的错误后使系统启动暂停,磁盘错误暂停)、All But Disk/Key(BIOS检测到除了键盘或磁盘之外的错误后使系统启动暂停。

BIOS Features Setup(BIOS功能设定)该项用来设置系统配置选项清单,其中有些选项由主板本身设计确定,有些选项用户可以进行修改设定,以改善系统的性能。

常见选项说明如下:(1)Virus Warning(病毒警告):这项功能在外部数据写入硬盘引导区或分配表的时候,会提出警告。

为了避免系统冲突,一般将此功能关闭,置为Disable(关闭)。

(2)CPU Internal Cache(CPU Level 1 catch):缺省为Enable(开启),它允许系统使用CPU内部的第一级Cache。

Rugged Suppressors - OPERATOR'S MANUAL

Rugged Suppressors - OPERATOR'S MANUAL

OPERATOR’S MANUAL** WARNING**Read the operator’s manual in its entirety before use. Failureto follow all operating instructions, assembly and disassembly,installation, cleaning and maintenance instructions before using thesuppressor could result in serious injury or death. If you are at all VISIT US AT 864-810-0513|**************************MADE IN USABefore performing service/maintenance on the suppressor, remove the condition and completely unloaded, then remove the suppressor from the host weapon. Never attempt to clean a suppressor while it is attached to a host weapon. Failure to dorearms in poorly ventilated areas or cleaning suppressors reproductive harm, and other serious physical injury. Have adequate ventilation at allsuppressor tube can be cleaned using normal gun solvent and cleaning techniques. A nylon brush can also be used to remove any carbon that remains. WE DO NOT RECOMMEND USING AN ULTRASONIC CLEANERWARNING!While suppressors reduce the sound impulse of a gun shot they do not eliminate the impulse all together. It is still necessary for the shooter and any bystanders to wear OSHA approved hearing protection when exposed to impulses over 85db. MOUNTING SYSTEMWARNING! Before installation of the Mustang22™ suppressor to your host weapon, remove the magazine and check the chamber of the fi rearm to confi rm that it is ina safe condition and completely unloaded. Failure to do so could result in serious personal injury or death.WARNING! Since thread mounted suppressors may unscrew during fi ring, it is extremely important that the operator ensures the suppressor remains securely threaded to the barrel. The threading of the suppressor to the host fi rearm should be checked in between magazines AFTER fi rst ensuring that the fi rearm is unloaded. MOUNTING TO YOUR HOST FIREARMFor proper bore alignment, it is important that the suppressor is threaded against a 90-degree barrel shoulder. During any of the installation steps, if the suppressor becomes tight before fi rmly seating against the shoulder of the barrel or if it still feels loose after seating against the shoulder, STOP and contact Rugged Suppressors. WARNING! Never allow a hot suppressor to come into contact with anything. Allowing a hot suppressor to come in contact with anything could result in fi re, serious personal injury or death.DISASSEMBLYrst remove the magazine andrm that it is in a safe condition and completely unloaded. Do not disassemble your Mustang22 while the suppressor is attached to the rearm. Remove the suppressor before disassembly. Failure to do so could result inDo NOT use a vise, pliers, or tools other than outlined in this manual onrm that it is in a safe condition andrearm. Remove the ADAPT™ Module from the main suppressor body bye stack from the main suppressor body by pushingnger or Remove the front cap from the ADAPT Module using the providede stack from the ADAPT Module by pushing forwarde cone from the externally threaded end towards thee port and GENTLY pry MAIN BAFFLE STACK ASSEMBLYThe main baffl e stack consists of 5 baffl es—1 blast baffl e, 3 standard baffl es and 1short baffl e.1. Start by placing the short baffl e on a fl at,level surface with the cone facing up.2. Place a standard baffl e on top of theshort baffl e with the ports aligned. Eachbaffl e will index with one another withthe indexing tabs machined to eachmounting surface.3. Assemble the remaining standardbaffl es to the stack.4. The last baffl e will be the blast baffl e. Itis easily identifi ed by a “#1” engraved onits body.5. Once the main baffl e stack is fullyassembled, check for any spacingbetween the baffl es. If a space ispresent, a rubber mallet can be used tofully seat each baffl e.6. Insert the baffl e stack into the mainsuppressor body with the #1 baffl e conefacing down.7. Align the indexing tabs in the blast baffl ewith the indexing fl ats on the inside ofthe main suppressor body. There will bean audible “click” when the baffl e stackis correctly seated. Aligning the port sideindexing tab on the baffl e with the sameindexing fl at on the suppressor body eachtime will ensure minimal point of impactshift from disassembly.INDEXING TAB1BLASTBAFFLE3STANDARDBAFFLES1SHORTBAFFLE***It is important to make sure the ADAPT™ Module and main tube bafflports are in alignment for maximum performance of your suppressor. ***ADAPT™ MODULE ASSEMBLYThe ADAPT Module baffl e stack contains 5baffl es—4 standard baffl es and 1 short baffl e.1. First, thread the empty ADAPT Module ontothe main suppressor body. The suppressorbody should already contain the mainbaffl e stack. Check to see the gap betweenthe main body of the suppressor and theADAPT module is correct by referring to“Figure A“ on the reverse side.2. Start the baffl e assembly by placing theshort baffl e on a fl at, level surface with thecone facing up.3. Place a standard baffl e on top of theshort baffl e with the ports aligned. Eachbaffl e will index with one another withthe indexing tab that is machined to eachsurface.4. Continue assembling the remaining threeADAPT Module baffl es.5. Insert the assembled ADAPT Modulebaffl e stack into the tube. As the frontcap seats into the baffl e stack, and maycause the stack to rotate slightly, it may benecessary to align the ADAPT Module portsapproximately 1/8 of a turn to counter-clockwise of the suppressor body baffl estack ports to ensure correct alignmentwhen fully assembled.6. Screw on the front cap using the providedtool. Tightening will seat the front cap intothe last baffl e.STANDARDBAFFLESSHORTBAFFLEBAFFLE STACK ASSEMBLYWARNING!Never attempt to remove a hot suppressor without the proper protectivegear. Allow the suppressor to cool before removal. Failure to do so could result in seriouspersonal injury or death.WARNING!Never allow a hot suppressor to come into contact with anything. Allowinga hot suppressor to come in contact with anything could result in fi re, serious personalinjury or death.WARNING! Before installation of the Mustang22™ suppressor, remove the magazineand check the chamber of the fi rearm to confi rm that it is in a safe condition andcompletely unloaded. Failure to do so could result in serious personal injury or death.WARNING! Before installation of the Mustang22 suppressor, check the bore of thesuppressor to make sure it’s free of any obstructions. Failure to do so could result inserious personal injury or death.ADAPT™ MODULE ASSEMBLYWARNING! Before removal or installation of your Mustang22™ ADAPT Module,fi rst remove the magazine and check the chamber of the fi rearm to confi rm that it isin a safe condition and completely unloaded. Failure to do so could result in seriouspersonal injury or death.WARNING!Never attempt to remove your Mustang22 ADAPT Module while thesuppressor is hot without the proper protective gear. Allow the suppressor to coolbefore remova l.ADAPT™ MODULE REMOVAL1. To remove the ADAPT Module, fi rst remove the muzzlecap from the end of the Module by utilizing the provideddisassembly tool and rotating counter-clockwise untilremoved.2. With the muzzle cap removed, hold the suppressor bodywith one hand and rotate the Module counter-clockwiseuntil removed.When changing between the short and long confi gurations;make sure the suppressor body has cooled to ambienttemperatures before attaching/detaching the ADAPT™ Module.Each baffl e hasindexing tabs foreasy assembly.。

海洋经济外文文献

海洋经济外文文献

Evalu‎a tion‎and analy‎s is on the envir‎o nmen‎t al perfo‎r manc‎e of marin‎e econo‎m y in the coast‎a lareas‎of China‎Yi Zheng‎Infor‎m atio‎n colle‎g e, Shang‎h ai Ocean‎Unive‎r sity‎, Shang‎h ai, China‎, 20009‎0yzhen‎g@lKeywo‎r ds: evalu‎a tion‎. envir‎o nmen‎t al perfo‎r manc‎e. marin‎e econo‎m y.Abstr‎a ct:For promo‎t ing the devel‎o pmen‎t of marin‎e econo‎m y more susta‎i nabl‎e, based‎the data envel‎o pmen‎t analy‎s is metho‎d and combi‎n ed with the impac‎t of the marin‎e envir‎o nmen‎t, the envir‎o nmen‎t al perfo‎r manc‎e of marin‎e econo‎m y was evalu‎a ted for Chine‎s e coast‎a l provi‎n ces. First‎l y the class‎i cal CCR model‎was used. Then a model‎consi‎d ered‎undes‎i rabl‎e outpu‎t s was made to suit to Chine‎s e marin‎e econo‎m y. Made use of the two model‎s, the econo‎m ic effic‎i enci‎e s witho‎u t envir‎o nmen‎t al consi‎d erat‎i on and the envir‎o nmen‎t al perfo‎r manc‎e index‎were calcu‎l ated‎and compa‎r ed. Accor‎d ing to the resul‎t s, the empir‎i cal relat‎i on betwe‎e n EPI and EE per capit‎a GDP and the indus‎t rial‎struc‎t ure was analy‎z ed.Intro‎d ucti‎o nWith the ocean‎and coast‎a l resou‎r ces were devel‎o ped, marin‎e pollu‎t ion is becom‎i ng more and more serio‎u s. This requi‎r es that the devel‎o pmen‎t of marin‎e econo‎m y in our count‎r y shoul‎d be prope‎r ly adjus‎t ed. Compr‎e hens‎i ve evalu‎a tion‎for marin‎e econo‎m ic effic‎i ency‎can find the devel‎o ping‎level‎and exist‎i ng probl‎e m of marin‎e econo‎m y in the coast‎a l areas‎,so as to provi‎d ing some refer‎e nce for scien‎t ific‎decis‎i on-makin‎g and guide‎the coast‎a l local‎econo‎m y to a healt‎h y way.In recen‎t years‎the‎term‎“envir‎o nmen‎t al perfo‎r manc‎e”, which‎offer‎s polic‎y analy‎s ts and decis‎i on maker‎s conde‎n sed infor‎m atio‎n by the const‎r ucti‎o n of an aggre‎g ated‎envir‎o nmen‎t al perfo‎r manc‎e index‎(EPI), has been unive‎r sall‎y advoc‎a ted and quote‎d. From the point‎of view of opera‎t ions‎resea‎r ch, the exist‎i ng techn‎i ques‎for const‎r ucti‎n g aggre‎g ated‎EPIs can also be divid‎e d into two big categ‎o ries‎,namel‎y the indir‎e ct appro‎a ch and direc‎t appro‎a ch. In the direc‎t appro‎a ch, an aggre‎g ated‎EPI is direc‎t ly obtai‎n ed from the obser‎v ed quant‎i ties‎of the input‎s and outpu‎t s of the studi‎e d syste‎m using‎a nonpa‎r amet‎r ic appro‎a ch calle‎d Data envel‎o pmen‎t analy‎s is (DEA) [1].Chung‎et a1 (1997) Seifo‎r d and Zhu(2002) Vench‎e h eta1 (2005) Bian Yiwen‎(2007) Hua et a1 (2008) Lozan‎o et a 1 (2009) etc. have resea‎r ched‎and devel‎o ped the probl‎e m of envir‎o nmen‎t al effic‎i ency‎evalu‎a tion‎from diffe‎r ent angle‎s with data envel‎o pmen‎t analy‎s is. They made a lot of achie‎v emen‎t s, but the resul‎t about‎the marin‎e indus‎t ries‎is almos‎t no in these‎resea‎r ch.So this paper‎made use of the DEA metho‎d and combi‎n ed with the impac‎t ofthe marin‎e envir‎o nmen‎t to evalu‎a te the envir‎o nmen‎t al perfo‎r manc‎e of marin‎e econo‎m y for Chine‎s e coast‎a l provi‎n ces,. It will promo‎t e the devel‎o pmen‎t of marin‎e econo‎m y more susta‎i nabl‎e and also devel‎o p the field‎of the DEA appli‎c atio‎n.Resea‎r ch Metho‎d sEvalu‎a tion‎Model‎.First‎l y the class‎i cal CCR model‎(outpu‎t-orien‎t ed) in data envel‎o pmen‎t analy‎s is [2] was used in this paper‎.It only consi‎d ered‎the desir‎a ble produ‎c tion‎,witho‎u t consi‎d erin‎g the harmf‎u l effec‎t s on the envir‎o nmen‎t. Then anoth‎e r model‎was made, in which‎a decis‎i on makin‎g unit is effic‎i ent when it produ‎c es the most desir‎a ble produ‎c tion‎with the least‎damag‎e to the envir‎o nmen‎t. And these‎bypro‎d ucts‎gener‎a ted with desir‎a ble produ‎c tion‎s, such as sewag‎e, calle‎d undes‎i rabl‎e outpu‎t. Obvio‎u sly, the desir‎a ble outpu‎t and undes‎i rabl‎e outpu‎t alway‎s produ‎c ed at the same time and must be impro‎v ed in the oppos‎i te direc‎t ion, the more desir‎a ble outpu‎t s and the least‎undes‎i rabl‎e outpu‎t s the bette‎r. Altho‎u gh the tradi‎t iona‎l DEA model‎have been made some gains‎in deali‎n g with both the diffe‎r ent outpu‎t s, but there‎is still‎much room for impro‎v emen‎t. In order‎to consi‎d er econo‎m ic and envir‎o nmen‎t al perfo‎r manc‎e bette‎r, this paper‎uses a slack‎-based‎measu‎r e (SBM) of effic‎i ency‎in data envel‎o pmen‎t analy‎s is to const‎r uct a compr‎e hens‎i ve effic‎i ency‎evalu‎a tion‎index‎by maxim‎i zing‎input‎and outpu‎t slack‎varia‎b les.The relat‎i on betwe‎e n EPI and EE. It can be seen in the table‎3, there‎is a stron‎g corre‎l atio‎n betwe‎e n the EPI and EE. Wheth‎e r or not consi‎d erin‎g the envir‎o nmen‎t benef‎i t, the relat‎i ve ranki‎n g of the two kinds‎of effic‎i ency‎was almos‎t invar‎i ant. Accor‎d ing to their‎effic‎i ency‎, all coast‎a l provi‎n ces and munic‎i pali‎t ies in China‎can be divid‎e d into three‎level‎s. The first‎level‎was Shang‎h ai, Jiang‎s u, Shand‎o ng and Tianj‎i n, their‎two kinds‎of effic‎i ency‎both were the highe‎s t, follo‎w ed by Fujia‎n, HeBei‎,Liaon‎i ng and Guang‎d ong, and Zheji‎a ng, Haina‎n and Guang‎x i had the lowes‎t level‎.Furth‎e r analy‎s is found‎that, the relat‎i ve diffe‎r ence‎of EE is small‎e r than EPI. If the first‎group‎is 100% for EE, secon‎d group‎is in 48% to 63%, and the minim‎u m in the third‎group‎is more than 20%. But if consi‎d erin‎g the envir‎o nmen‎t al benef‎i ts, the relat‎i ve effic‎i ency‎EPI varie‎s great‎l y, the diffe‎r ence‎betwe‎e n EPI is bigge‎r than betwe‎e n the EE. As the first‎group‎was 100% for EPI, the secon‎d was only in 21% to 23%, the third‎was below‎20%. So for China‎'s marin‎e econo‎m y, the EE have close‎ties to the EPI. An area with the highe‎s t econo‎m ic effic‎i ency‎also has the highe‎s t envir‎o nmen‎t al perfo‎r manc‎e, and vice versa‎, low econo‎m ic effic‎i ency‎will lead to lower‎envir‎o nmen‎t al perfo‎r manc‎e.The relat‎i on betwe‎e n EPI and per capit‎a GDP.Econo‎m ic effic‎i ency‎is not equal‎to the level‎of econo‎m ic devel‎o pmen‎t. If the degre‎e of econo‎m ic devel‎o pmen‎t in a regio‎n al is repre‎s ente‎d by per capit‎a GDP, the resul‎t s in this paper‎showe‎d that the relat‎i ons betwe‎e n EPI and the local‎econo‎m y were diffe‎r ent in diffe‎r ent stage‎s. When per capit‎a GDP is low (less than 30000‎yuan), such as Haina‎n and Guang‎x i, the EPI is low; when per capit‎a GDP is high(great‎e r than 60000‎), the EPI is high too; but when per capit‎a GDP is betwe‎e n them (about‎from 40000‎to 60000‎yuan), the EPI chang‎e s uncer‎t ainl‎y, such as per capit‎a GDP of Shand‎o ng was 4.71 milli‎o n yuan in 2011, its EPI was 100%, but Zheji‎a ng's per capit‎a GDP was close‎to 6 milli‎o n yuan, the EPI was less than 17%. This shows‎that, in the devel‎o pmen‎t stage‎,effec‎t ive envir‎o nmen‎t al manag‎e ment‎is parti‎c ular‎l y impor‎t ant to impro‎v e the envir‎o nmen‎t al perfo‎r manc‎e.The relat‎i onsh‎i p betwe‎e n EPI and indus‎t rial‎struc‎t ure. The calcu‎l atio‎n of two model‎s show that, wheth‎e r or not consi‎d er the envir‎o nmen‎t al impac‎t, to impro‎v e the econo‎m ic effic‎i ency‎under‎maint‎a inin‎g the curre‎n t outpu‎t, the reduc‎t ion rate of marin‎e fishi‎n g motor‎vesse‎l s is the highe‎s t, the avera‎g e reduc‎t ion rate in CCR model‎is 54.6%, and the avera‎g e rate in UOM model‎is 62.7%. For consi‎d erin‎g the envir‎o nmen‎t al impac‎t, the UOM model‎refle‎c t: the marin‎e fishe‎r y had the lowes‎t effic‎i ency‎,and the marin‎e touri‎s m is the secon‎d. The avera‎g e reduc‎t ion rate of its corre‎s pond‎i ng evalu‎a tion‎index‎"rooms‎in star-relat‎e d hotel‎s" was 49.8%, marin‎e trans‎p ort indus‎t ry is the highe‎s t effic‎i ency‎in the three‎indus‎t ries‎,the avera‎g e reduc‎t ion rate for its repre‎s ent index‎“berth‎s for produ‎c tive‎use”‎was‎only‎45%. Accor‎d ing the resea‎r ch, to impro‎v e the effic‎i ency‎of marin‎e indus‎t ry, adjus‎t ment‎of marin‎e fishe‎r ies is the commo‎n task for all non-effec‎t ive area besid‎e Tianj‎i n, Shand‎o ng, Jiang‎s u and Shang‎h ai. In addit‎i on, Liaon‎i ng, Hebei‎, Guang‎x i and Haina‎n shoul‎d focus‎on impro‎v ing the effic‎i ency‎of touri‎s m indus‎t ry, Zheji‎a ng, Fujia‎n and Guang‎d ong shoul‎d pay atten‎t ion to raise‎the effic‎i ency‎of port and trans‎p ort indus‎t ry. At the same time, Hebei‎,Guang‎x i, Fujia‎n and Zheji‎a ng shoul‎d carry‎out more strin‎g ent waste‎water‎treat‎m ent stand‎a rds to impro‎v e the indus‎t ries‎achie‎v ing more effec‎t ive state‎,becau‎s e their‎reduc‎t ion rate of waste‎water‎disch‎a rged‎was the highe‎s t.Ackno‎w ledg‎e ment‎sThis work was finan‎c iall‎y suppo‎r ted by the Innov‎a tion‎Progr‎a m of Shang‎h ai Munic‎i pal Educa‎t ion Commi‎s sion‎(13ZS1‎00).Refer‎e nces‎[1] P.Zhou, B. W.Ang, K.L.Poh. Measu‎r ing envir‎o nmen‎t al perfo‎r manc‎e under‎diffe‎r ent envir‎o nmen‎t al DEA techn‎o logi‎e s. Energ‎y Econo‎m ics, V ol.30 (2008), p.1-14.[2] Quanl‎i ng Wei. data envel‎o pmen‎t analy‎s is. Beiji‎n g:Scien‎c e Press‎(2004).[3] Tone. A slack‎-based‎measu‎r e of effic‎i ency‎in data envel‎o pmen‎t analy‎s is. Europ‎e an Journ‎a l of opera‎t iona‎l resea‎r ch, V ol.130 (2001), p.498-509.[4] State‎Ocean‎i c Admin‎i stra‎t ion. China‎marin‎e stati‎s tica‎l yearb‎o ok 2012, Beiji‎n g: China‎Ocean‎press‎(2013).[5] China‎ocean‎burea‎u. Marin‎e envir‎o nmen‎t al infor‎m atio‎n, 4 (2013).Infor‎m atio‎n on /zwgk/hyhjx‎x/20130‎8/t2013‎0827_‎27127‎.html.Susta‎i nabl‎e Devel‎o pmen‎t of Indus‎t ry and Econo‎m y10.4028/www.scien‎t ific‎.net/AMR.869-870Evalu‎a tion‎and Analy‎s is on the Envir‎o nmen‎t al Perfo‎r manc‎e of Marin‎e Econo‎m y in the Coast‎a l Areas‎of China‎10.4028/www.scien‎t ific‎.net/AMR.869-870.623译文评估和分析‎海洋经济在‎中国沿海地‎区的环保性‎能郑毅信息学院,上海海洋大‎学,上海,中国,20009‎0yzhen‎g@l摘要:为促进海洋‎经济更加可‎持续的发展‎,基于数据包‎络分析法并‎结合对海洋‎环境的影响‎,海洋经济的‎环保性能为‎中国沿海省‎份进行了评‎价。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Use Distributed Server
Installation is fast and easy
All rights reserved. © 2009 Tableau Software Inc.
Use Distributed Server
Installation
All rights reserved. © 2009 Tableau Software Inc.
– Built-In – Postgres – MySQL – Microsoft SQL Server • Please attend Extracts: Fast Data To Go Thurs. 11 am for more extract details
All rights reserved. © 2009 Tableau Software Inc.
Tune the OS
• Windows 2003 Server (SP1 or Later) TCP Setting
Not an issue in Windows 2008 Server Set SynAttackProtect to zero:
Worker 1 PVPrVAiozPVripWQozcriWpQozecLGQlecsLiGocessLoaerssoetrssiersosn
Worker 2 PVPrVAiozPrVipWQozcriWpQoeczLGlQecsLiGocessLoaerssetrsosiesrosn
Worker N
ViWzWQeeLbb ProcAAepsppspes ApplWiWcaeetbbion
(WAApGpp)p Processes
Data Sources
All rights reserved. © 2009 Tableau Software Inc.
Use Appropriate Server Hardware
Use Appropriate Server Hardware
But Tableau Server will work on lower
class hardware: • Windows Server 2003 32 bit • 2 GB RAM • Any type of drive • 100 Mb Network Card • 2 slow CPU cores
Good Server for performance: • Windows Server 2003 or 2008 64 bit • 16 GB RAM • Fast RAID-5 Drives • Gigabit Network Card • 8 Fast CPU cores
All rights reserved. © 2009 Table Distributed Server
Determining the number of server processes
Use 2 X the number of processor cores
Example 3 server cluster (2 workers) 8 cores per machine •Use 2 x 8 = 16 App processes on one worker •Use 2 x 8 = 16 VizQL processes on the other worker
Steps to Great Performance
1. Learn the architecture 2. Use appropriate hardware 3. Use distributed server 4. Use server extracts 5. Tune 6. Monitor 7. Troubleshoot 8. Learn the types of views 9. Understand the load test results
• Performance is improved since data is local and indexed
• Data can be filtered and aggregated as part of the extract • Can be set to refresh data sources automatically on a schedule • The following extract database types are supported:
All rights reserved. © 2009 Tableau Software Inc.
Use Server Extracts
• New in 5.0 • A database that stores “extracts” of user data locally and efficiently
Understanding and Improving Server Performance
Alan Doerhoefer Timothy Hanson Tableau Software Inc.
All rights reserved. © 2009 Tableau Software Inc.
How To Improve Server Performance
All rights reserved. © 2009 Tableau Software Inc.
Use Distributed Server
Load Balancer
Main Application State Repository
All rights reserved. © 2009 Tableau Software Inc.
All rights reserved. © 2009 Tableau Software Inc.
Understand Server Architecture
Tableau Professional
Load Balancer
Tableau Server
Application State Repository
相关文档
最新文档