The Node Monitoring Component of a Scalable Systems Software Environment Abstract
QG2000 放射性源容器说明书
TI427F/00/en/05.0971063732Technical InformationSource Container QG2000US versionRadiometric MeasurementContainer with sliding source holder rod for manual ON/OFF switchingApplicationThe source container QG2000 encloses the radioactive source used for radiometric limit, level and density measurement. It allows the beam to emerge unattenuated only in one direction and gives an extremely high attenuation in all other directions.When operating with very high sensitivity rodscintillation detectors, the QG2000 provides the lowest possible radiation loads in the surrounding.It is therefore always used if the shielding effects of smaller source containers (QG020/100) are too low due to the high activity of the source or if no control area is permitted.The QG2000 complies to all international standards and fulfils the strict requirements of the chemical industry.Features and Benefits•Extremely high shielding ensure that no control areas are generally required and that installation in accessed areas is possible.•Simple and safe source replacement.•Highest safety classification for the source supplied (DIN 25426/ISO 2919, Classification C 66646).•Additional metallic protective hood with O-ring seal to protect the source against mechanical and chemical influences.•Low space requirement and simple mounting•Various angles of emission for optimum adaption to the application.•Padlock for fixing the OFF switch position and to pro-tect against theft.•Easy identification of switch status through sight glasses on the cover or by remote display withproximity switches.Source Container QG2000 US2Endress+HauserTable of ContentsFunction and System Design . . . . . . . . . . . . . . . . . . . . .3Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Attenuation factor and half-value layers . . . . . . . . . . . . . . . 3Radioactive Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Operating Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . .4Level Measurement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Density measurement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Level limit detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Mounting position. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Ambient conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Mechanical Construction . . . . . . . . . . . . . . . . . . . . . . . .6Design, size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Fitting position/emission angle (when switched on). . . . . . 6Width of the beam emission channel (when switched on) . 7Weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Housing materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Shielding material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Mounting plate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Bracket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Ambient conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . .8Protection against external influences . . . . . . . . . . . . . . . . 8Ambient temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Fire resistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Operating elements . . . . . . . . . . . . . . . . . . . . . . . . . . . .8Standard design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8Design with proximity switches for remote displayof switch status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8Certificates and Approvals . . . . . . . . . . . . . . . . . . . . . . .9Specific license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9PTB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9German Lloyd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9Proximity switches supplied by Pepperl+Fuchs . . . . . . . . . .9Ordering information . . . . . . . . . . . . . . . . . . . . . . . . . . .9Product structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9Supplementary Documentation . . . . . . . . . . . . . . . . . .10System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10Operating Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . 10Technical Information . . . . . . . . . . . . . . . . . . . . . . . . . . .10Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10Special documentation . . . . . . . . . . . . . . . . . . . . . . . . . . .10Safety manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10Source Container QG2000 USEndress+Hauser 3Function and System DesignFunctionThe radioactive source is surrounded by a lead shielding in the QG2000 source container to screen the gamma radiation. The radiation can only be emitted along one channel almost unattenuated. The limit values set for local dosages are not exceeded even with maximum activity.System DesignThe stainless steel housing ensures that the radiation source and lead shielding cannot be lost when the housing is heated above the melting point of lead (tested to DIN VDE 0412-1, Section 6.4, i.e. 30 min at 800 °C (1472 °F)).The double sealed source itself is protected from mechanical and chemical influences by a stainless steel pro-tective hood with an O-ring seal and can be placed in the emission channel (switching ON the radiation) and removed from it (switching OFF) by sliding the source holder rod. The mechanical resistance of the switching device has been tested according to DIN VDE 0412-1, Section 9.4.The switch position OFF is secured by a padlock. It can easily be observed through the sight glasses from outside the container or can be transmitted to a remote electronic display in the control room.Attenuation factor and half-value layers* approximate valuesRadioactive SourceThe following table identifies the source model, isotope and activity level that can be used in the QG2000 series gauges:!Note!Cesium-137 is not authorized for use in the QG 2000 series.#Warning!This source container contains radioactive material.For safety instructions see Radiation Safety Manual SD276F/00/en.60CoAttenuation factor F S *4.096Number of half-value layers *12QG Series Source ModelIsotope Maximum Activity QG2000CKC.P4Co-601 Ci (37 GBq)Source Container QG2000 US4Endress+HauserOperating ConditionsLevel MeasurementIn order to ensure stable measurement and lasting radiation protection, the QG2000 must be tightly screwed onto a rugged, low-vibration bracket that can withstand a weight of 315 kg (695 lb) under all operating con-ditions. Additional supports are generally required when mounting directly onto the vessel. A fastening for a crane on the QG2000 is provided for transporting it.The source container must be mounted slightly above or at the same height as the maximum level. The radi-ation must be exactly directed towards the compact transmitter mounted opposite. To avoid control areas, the source container and compact transmitter should be mounted as near to the vessel as possible.Density measurementFor density measurements, a clamp connection is available for pipe mounting.The clamp connection must be separately supported to ensure that the weight of the source container (315kg!/ 695lb!) does not cause the pipe to bend.When using the QG2000 on ships or dredgers, the fastenings on the piping must be suited to the loads occuring and appropriate supports should be provided.Mount the sensor to vertical pipelines with the direction of conveyance from bottom to top to obtain the most constant conditions for density measurements in pipes. If only horizontal piping is accessible, then the radiation path should be horizontal to reduce the effects of air bubbles and build-up of material. A clamping device is available for mounting on piping. Support the clamping device separately to avoid the weight of the QG2000 (315kg / 695lb) from acting on the pipe.Source Container QG2000 USLevel limit detectionthat the radiation runs horizontally.Mounting position Note!The radiation source container QG2000 may not be mounted at a height greater than 27 feet.Ambient conditions Entry of particles or waterThe source holder rod of the QG2000 has an additional metallic hood with an O-ring seal to prevent particlesand streams of water from entering (ingress protection IP 65 acc. to IEC EN 60529).Ambient temperature (without proximity switches for remote display):T = -20 °C...200 °C (-4 °F...392 °F)Ambient temperature (with proximity switches for remote display):T = -20 °C...100 °C (-4 °F...392 °F)Fire resistanceTested to DIN VDE 0412-01, Section 6.4, i.e. 30 min at 800 °C (1472 °F).Endress+Hauser5Source Container QG2000 US6Endress+HauserMechanical ConstructionDesign, sizeFitting position/emission angle (when switched on):•standing/horizontal •standing/verticalwith horizontal beam emission with one angle (standard):α = 20° or α = 40° (measured from the horizontal downwards)with horizontal beam emission with two angles (individually selectable):α = 0°...45° (measured from the horizontal downwards)β = 0°...75° (measured from the horizontal upwards)Both angles can be selected in steps of 5°.with vertical beam emission with one angle (standard):α = 20° or α= 40°Source Container QG2000 USEndress+Hauser 7Width of the beam emission channel (when switched on)The width of the emission channel is 6° for all designs.The emission channel is marked on the external container wall.Weightapprox. 315 kg (695 lb) for all designsHousing materialsStainless steel SS 316Ti (1.4571), for surface treated versions:•glass bead blasted •epoxy enamel coating •seawater-resistant coating Shielding material LeadMounting plateBracketNote!In order to ensure stable measurement and lasting radiation safety officer, the QG2000 must be tightly screwed onto a rugged, low-vibration bracket that can withstand a weight of 315 kg (695 lb) under all operating con-ditions. Additional supports are generally required when mounting directly on the vessel.Especially when using the QG2000 on ships or dredgers, the fastenings on the piping must be able to take the weight of any loads placed on them and appropriate supports provided.The screw joint dimensions are contained in the table (see figure).Source Container QG2000 US8Endress+HauserAmbient conditionsProtection against external influencesThe source holder rod of the QG2000 is protected from external influences by an additional metallic hood sealed by O-ring (ingress protection IP 65 to acc. IEC EN 60529).Ambient temperaturewithout initiators for remote displayT = -20 o C...200 o C (-4 °F...392 °F) (Class 3 to DIN VDE 0412-01)with initiators for remote displayT = -20o C...100 o C (-4 °F...212 °F) (Class 2 to DIN VDE 0412-01)Fire resistanceTested to DIN VDE 0412-1, Section 6.4, i.e. 30 min at 800 °C (1472 °F).Operating elementsStandard design•ON/OFF switching by manually sliding the source holder rod •Fixing and securing the switching status in OFF with a padlock •Reading off the switching status through the sight glassesDesign with proximityswitches for remote display of switch statusIn addition to the sight glasses supplied, with this design the switching status is also detected by two proximity switches NJ4-12GK-SN supplied by Pepperl+Fuchs.For signal evaluation, the following isolating switch amplifiers from, e.g. Pepperl+Fuchs can be used:KFD2-SH-Ex1 (24V DC)The Pg 12 cable glands on the connecting box are assigned to the proximity switches on delivery. The Pg 16 cable gland connects the isolating switch amplifier.The Pg 12 cable glands on the connecting box are assigned to the initiators on delivery. The Pg 16 cable gland connects the isolating switch amplifierThe table below shows the pin assignment:The connecting diagram is also provided inside the connecting box cover.Terminals 1, 2Initiator for position "radiation ON"Terminals 3, 4Initiator for position "radiation OFF"11234234Pg 12ONOFFSource Container QG2000 USEndress+Hauser 9Certificates and ApprovalsSpecific license The QG2000 series is only authorized to be distributed as a specifically licensed device.PTBIsodose curve with 60Co (37GBq/1000 mCi).German LloydFor applications on dredgers.Proximity switches supplied by Pepperl+FuchsIngress protection IP 67 to IEC 60529.Ordering informationProduct structure1)α: 0...45° / β: 0...75°DeliveryGermanyRadioactive sources may only be delivered when we have received a copy of the authorisation for handling radioactive materials. Endress+Hauser will gladly help you acquire the necessary documents. Please contact your nearest Sales Organization.For reasons of safety and cost, the radioactive source is usually shipped already loaded in the source container. Arrangements can also be made to ship the source seperately in a special transport drum.They will only be transported by approved shipping agents according to current GGVS/ADR guidelines, with all safety regulations being observed.Other countriesRadioactive sources may only be delivered when we have received a copy of the import license. Endress+Hauser will gladly help you acquire the necessary documents. Please contact your nearest Sales Organization.We can only deliver radioactive sources in their source containers.They will only be transported by approved shipping agents according to current GGVS/ADR and DGR/IATA guidelines, with all safety regulations being observed.DesignV US, manual ON/OFFW US, manual ON/OFF, remote indicationRadiation shielding 1Standard shieldingFitting position/Emission angle A Standing/horizontal B Standing/verticalEmission angle 120°240°3Specified in 5°-steps (α and β) 1)MaterialA SS 316Ti (1.4571) glass bead blastedB SS 316Ti (1.4571) epoxy enamel coatingC SS 316Ti (1.4571) seawater-resistant coatingAdditional options 1Option not selectedS GL (Germanischer Lloyd) marine certificateDocumentation A No documentationC PTB isodose curve with 60Co (37 GBq/1000 mCi)D Isodose curve for 60CoQG2000Product designationSource Container QG2000 USUSAThe source container must be shipped with the radioactive source already installed. The shutter will be securedin the OFF position with a padlock and security seal. The shipment will be a "Type A" package and all marking,labeling and documentation will comply with U.S. Department of Transportation (DOT) regulations. Transportwill be by common carrier, or other entity authorized to carry radioactive material.Shipments to Specific Licensees cannot be made until we have a copy of the Specific License authorizingreceipt, possession and use of the radioactive material. Endress+Hauser will be happy to assist with procuringthis license if desired.Shipments to General Licensees (a regulatory license issued for certain inherently safe devices containing sealedsources) cannot be made until we have written authorization from the user which contains the name andtelephone number of the person on site who will be responsible for the device.Contact our local sales center for questions or assistance.Supplementary DocumentationSystem Information CP017F/00/enRadiometric measurement technologyOperating Instructions BA370/00/enOperating instructions for the source container QG2000Technical Information TI213F/00/enTechnical Information on gamma radiation sourcesTI428/00/enTechnical Information for the source container QG020/100TI363/00/enTechnical Information for Gammapilot FMG60Certificates ZE251F/00/deTest certificate Germanischer Lloyd (for applications on dredgers)Special documentation SD142F/00/enSupplementary Safety Instructions for Radioactive Sources and Source Containers approved for Use in Canada Safety manual SD276F/00/enRadiation Safety Manual10Endress+HauserSource Container QG2000 USEndress+Hauser11TI427F/00/en/05.0971063732FM+SGML 6.0 ProMoDo 71063732Instruments International Endress+HauserInstruments International AG Kaegenstrasse 24153 ReinachSwitzerlandTel.+41 61 715 81 00Fax +41 61 715 25 ***************.com。
控制文件清单
受控文件清单Controled Document List
部门:Dept. 质检工程部QS组 序号Item 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 文件名称Document Description 质量/环境管理手册 < Quality/Environmental document> 质量管理手册< Quality Manual> 有害物质过程管理手册 <Hazardous material process management manual> 食品安全管理手册<Food safety management manual> 质量管理手册< Quality Manual> 产品质量先期策划控制程序 <Product quality early planning control procedures> 质量策划控制程序<Quality planning and control procedures> 生产件批准控制程序<Production approval control procedures> 检验控制程序<Inspection control procedure> 不合格品输出控制程序<Non-conforming product output control procedure> 产品标识及可追溯性程序<Product identification and traceability procedures> 不合格品和纠正措施控制程序<Nonconforming product and corrective action control procedures.> 客户服务/投诉处理程序 <Customer service/complaint handling procedures> 质量信息收集、分析程序<Quality information collection and analysis procedures> 持续改进控制程序<Continuous improvement control procedures> 监视和测量装置控制程序<Monitoring and measuring device control procedures> 检测中心质量控制程序<Test center quality control procedures> 模具/工装的管理程序<Mold/tooling management procedures> 环境监测管理程序<Environmental monitoring and management procedures> 统计技术管理程序<Statistical technology management procedures> 变更控制程序<Change control procedure> 防止污染和混入有害物质管理程序 <Prevention of contamination and contamination of hazardous substances management procedures.> 风险管理控制程序<Risk management control procedures> 忠告性通知发布和实施控制程序<Advisory notice to publish and implement control procedures> 不良事件报告控制程序 <Adverse event reporting control procedures> 文件编号Doc NO. PQM/EMS-100 P-YYQM-100 IECO-HSPM-100 PM-FSSC22000-001 PM-AS9100-001 PQEA00100 PQEA00200 PQEA00300 PQEA00400 PQEA00500 PQEA00600 PQEA00700 PQEA00800 PQEA00900 PQEA01000 PQEA01100 PQEA01200 PQEA01300 PQEA01400 PQEA01500 PQEA01600 PQEA01700 PQEA01800 PQEA01900 PQEA02000
Adobe Acrobat SDK 开发者指南说明书
This guide is governed by the Adobe Acrobat SDK License Agreement and may be used or copied only in accordance with the terms of this agreement. Except as permitted by any such agreement, no part of this guide may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of Adobe. Please note that the content in this guide is protected under copyright law.
BU_61580寄存器说明中文版
目录
1 SOFTWARE INTERFACE 软件接口 ....................................................................................................................... 1 1.1. POWER TURN-ON/INITIALIZATION STATE 上电/初始化状态 .................................................................... 1 1.2. OVERALL ADDRESS MAPPING: WORDS VS. BYTES 整体地址映射:字 和 位 ........................................ 2 1.3. SOFTWARE INTERFACE: INTERNAL RAM 软件接口:内部 RAM .............................................................. 3 1.4. INTERNAL REGISTERS ADDRESS AND BIT MAPPING 内部寄存器地址和位映射 ..................................... 3 1.5. INTERRUPT MASK REGISTER 中断屏蔽寄存器 ........................................................................................ 6 1.5.1. RAM PARITY ERROR RAM 校验错误..................................
心脏同步治疗装置(CRT)的使用指南说明书
Living with Yourif you or someone you love has beendiagnosed with heart failure, this booklet willhelp to understand the heart conditions andtreatment. it is designed to provide you withbasic information about heart failure and cardiacresynchronization therapy (CRT) devices,including what you can expect before and afteryou have a CRT device implanted.ask your doctor about your unique medicalcondition and therapy management.This information is not medical advice and shouldnot be used as an alternative to speaking with fuller lifeyour doctor.Walls may thicken to handle the increased strainChart of typiCal ef rangeS 2:People with a low EF − 35% or below − are at an increased risk for SCA.3 A healthy heart has an EF between 50% and 75%. This indicates the heart is pumping well and able to deliver enough blood to the body and brain. Even a healthy heart does not pump 100% of blood out of the heart during each beat, some blood always remains in the heart.how iS ef meaSureD?The most common way to measure eF is with an echocardiogram. This test is usually performed in a doctor’s office or hospital’s diagnostic area.treating heart failureHeart failure is a progressive condition. your doctor may prescribe a variety of treatment options that may slow the progression of the disease, strengthen your heart, and improve your quality of life. Some of these treatments may include medications, lifestyle changes, exercise, and device therapy, or a combination of these. only your doctor can determine which option is right for you.a weakened heart muscle must work harder to pump blood to the body. This may cause the heart to beat faster , which can lead to dangerously fast or irregular heart rhythms. These abnormal heart rhythms can lead to a condition called Sudden Cardiac arrest (SCa).risks of apoorL Y pumping heartwhat iS SCa?SCa typically occurs when an electrical problem with the heart triggers a dangerously fast heart rhythm that causes the heart to quiver rather than contract or pump. When the heart stops pumping blood, oxygen cannot reach the body and brain. if not treated immediately, SCa can be fatal. The most effective way to treat SCA is through defibrillation.1 Defibrillation involves delivering an electrical shock to your heart to restore a normal heartbeat. T o survive an SCa event, you must receive defibrillation within ten minutes.2 Only about 5% of people survive SCA, because defibrillation was not delivered within this critical time frame.2who iS at riSk of SuDDen CarDiaC arreSt?generally, sudden cardiac arrest strikes without warning. people who are at a higher risk for SCa include 2:T hose who have had a heart attack H eart failure patientsS urvivors of a previous SCa or those who have a family member who has had an SCa event p eople with a low ejection fractionef number:a number you ShoulD know eF stands for “ejection fraction.” it is the percentage of blood that is pumped out of the heart with each heartbeat. your doctor determines how well your heart is pumping based on your eF number.your eF number can change over time. it is important for you and your doctor to check your eF regularly.50-75%heart’S pumping ability iS normal36–49%heart’S pumping ability iS b elow normal35%& below heart’S pumpingability iS lowwhen peopLe refer to an impLantabLe cardiac resynchronization therapy (crt) DeviCe, they are aCtuall y DiSCuSSingthe system – the CRt deviCe and the leadsa Crt device is a device implanted under the skin, typically just below the collarbone. The device delivers therapies to coordinate the heart’s pumping action and treats fast, irregular, or slow heart rhythms depending on the type of CRT device. This device may also be referred to as a heart failure device, biventricular device, three-lead CRT device, CRT-P (pacemaker), or a CRT-D (defibrillator).l eads are thin, soft insulated wires about the size of a spaghetti noodle. The leads carry the electrical impulse from the CRT device to your heart and relay information about the heart’s activity back to the CRT device.how DoeS a CarDiaCresynchronizationtherapy DeviCe work?a cardiac resynchronization therapy device isdesigned to monitor your heart rhythm24 hours a day. it sends electrical pulses topace the lower chambers of your heart to helpthem beat in a more coordinated rhythm. Thiscoordinating or “resynchronization” therapyimproves the heart’s ability to pump bloodand oxygen more efficiently to the body. Yourdoctor will program the CRT device to deliverthe most effective therapies for your specificheart condition.in reSponSe to abnormalheart rhythmS, a Crt heartDeviCe may alSo proviDe thefollowing therapieS:p acing therapy for slow heart rhythms –electrical impulses are delivered to the heartwhen the heart’s own rhythm is too slow orirregularD efibrillation therapies for fast or irregularheart rhythms – a shock therapy is deliveredto the heart to interrupt fast heart rhythmsand restore a normal heart rateThere are two types of CRT devices:a CRT pacemaker (CRT-P) and a CRTdefibrillator (CRT-D). CRT-D devices,like alldefibrillators, have a pacemaker function inthem. Both devices help to coordinate theheart’s pumping action and deliver pacingtherapy for a slow heart rate. However, theCRT-D can also treat fast heart rhythms.all cardiac resynchronization devices aredesigned to use three leads. one lead isplaced inside the right atrium, another lead isplaced inside the right ventricle, and the thirdlead is placed inside a vein on the outside ofthe left ventricle.what is aCardiaC resYnChronization therapY deviCe?therapYCRT Pacing (CRT-P) and Leadsthe general StepS of animplant proCeDure inCluDe:a small incision, approximately two to four inches long, will be made in the upper chest area, just below your collarboneT hree leads will be guided through avein into your heart, and the leads will be connected to the CRT deviceThe CRT device settings will be programmed, and the device will be tested to ensure it is working properly to meet your medical needsThe CRT device will be inserted beneath your skin, and the incision in your chest will be closed Follow-up care and monitoringFollow-up appointments allow the implantedCRT device to be thoroughly checked.During these check-ups, your doctor may:Monitor the battery status of the CRTdeviceCheck the leads to determine how they areworking with the CRT device and your heartReview your CRT device settings to ensurethey are programmed appropriately to yourmedical needsMake programming adjustments to yourCRT deviceIn addition to these check-ups with yourdoctor, your clinic or practice may chooseto have your CRT device checked throughremote monitoring.This remote monitoring can replace somevisits, but not all. your doctor may stillneed to perform a physical examinationor to adjust your CRT device settings ormedications.mri-conditional technologyCurrently, most CRT are not consideredsafe in an MRi environment because theMRi could change the settings, temporarilyaffect the normal operation of, or potentiallydamage the heart device.Medtronic has a CRT Systems which is CeMarked for use in the MRi environment. ThisCRT system has a unique design, developedso that under specific conditions, patientsmay safely undergo MRI scans (3T and 1.5T)This information is designed to help youlearn more about CRT options. it is intendedto provide you with helpful information,but is for information purposes only, is notmedical advice and should not be used asan alternative to speaking with your doctor.Speak to your doctor for more informationand any questions specific to your health andtreatment options appropriate for you.remote monitoring via themeDtroniC Carelink® networkThe Carelink® network allows you to sendinformation stored in your implanted CRTdevice to your clinic, as instructed by yourdoctor, using a portable monitor. your CRTdevice information is then transmitted to asecure internet website where your clinic canaccess and review information about howyour heart and CRT device are working. TheCarelink network provides the same CRTdevice information to your doctor that anin-clinic office visit provides.information in your CRT device may be sentautomatically, using wireless communication.This process will be silent and usuallyhappens during the night while you’reasleep. CRT devices with automatic, wirelessmonitoring can also notify your clinic ofirregular heart activity or conditions with yourCRT device, such as a low battery. your clinicmay program your CRT device to send suchnotifications to help manage your care.the proCedureto impLant aCrt deviCedoes notrequireopen heartsurgeryand mostpeopLe go homewiThin 24 hoursbefore thesurgerYmeDiCation maybe given to makeyou Sleepy anDComfortablegenerall y, thepRoCeduRe ispeRfoRmed undeRloCal anesthesiagetting aCrt deviCe impLantedthe CardiaCresynchro-nizationTherapy (crT)eduCationaL serviCes for patientsThe Medtronic website includes in-depth information on heart conditions and treatment options for patients and their caregivers. our interactive website allows you to take assessments, view video, read patient stories, and link to other resources. Visit us online at www.medtronic.eumeDtroniCpatient ServiCeSif you have a Medtronic cardiac device and want to learn more or have questions about living with an implanted CRT device, please contact your clinics andphysicians.a Smartphone ConneCteD CarDiaCresynchronization therapy device (crt) option The most advanced CRT device can communicate directly and securely with an app on your smartphone or tablet. This app allows you to stay connected to your clinic, providing peace of mind and freedom, so you can continue living your life – uninterrupted. freeDomContinue with your daily life – wherever you go – knowing your CRT device can connect to your clinic through your smartphone or tablet via the app.peaCe of minDFeel confident that your clinic receives your CRT device data because you can see the status of your transmission in the app.access information about your CRT device – including battery life, implant date, device name, model number, serial number, and clinic information – so you are comfortable answering questions when asked. Motivate yourself to engage in health behaviorsT rack your physical activity level with data the app gets from your CRT device.Record your weight, blood pressure, and heart rate – and track these measurements over time to help you better understand your health status.Keep a record of your symptoms to share with your doctor at in office visit.easily access answers to frequently asked questions about living with a CRT device.Learn more about the benefits of remote monitoring via an app on your smartphone or tablet on: living with a Crt DeviCedevelop a plan that works best for you.Can i uSe a mobile phone?yes. When talking on a cell phone keep the phone’s antenna six inches away from your CRT device, and use the phone on the ear opposite your CRT device. We also recommend you avoid placing the cell phone in a pocket near your CRT device.are houSeholD applianCeS Safe to uSe?yes. Most household appliances are safe to use as long as they are properly maintained and in good working order . This includes microwave ovens, major appliances, electric blankets, and heating pads.will magnetS affeCt my DeviCe?items that contain magnets, such as magnetic therapy products, stereo speakers, and hand-held massagers can temporarily affect the operation of your CRT device. Therefore, it is recommended you keep items containing magnets at least six inches away from your implanted CRT device. We do not recommend the use of magnetic mattress pads and pillows because it is difficult to maintain a six-inch distance when using these items. will i be able to travel?given the short duration of security screening, it is unlikely that your Medtronic CRT devicewill be affected by metal detectors (walk-through archways and hand-held wands) or full body imaging scanners (also called millimeter wave scanners and 3D imaging scanners) such as those found in airports, courthouses, and jails.T o minimize the risk of temporary interference with your CRT device while going through the security screening process, avoid touching metal surfaces around any screening equipment. Do not stop or linger in a walk-through archway; simply walk through the archway at a normal pace. If a hand-held wand is used, ask the security operator not to hold it over your CRT device and not to wave it back and forth over your CRT device. you may also request a hand search as an alternative. if you have concerns about these security screening methods, show your device id card, request alternative screening, and then follow the instructions of the security personnel. are crt -ds and crt-ps mri-compatible?Currently, the latest CRT devices are 1.5T and 3T MRI Conditional. Present yourdevice identification card to your physician to determine if your heart device is MRI-conditional, which may allow you access to MRi scan.frequentL Yasked questions。
IBM Cognos Transformer V11.0 用户指南说明书
SIMATIC Energy Manager PRO V7.2 - Operation Operat
2 Energy Manager PRO Client................................................................................................................. 19
2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.5.1 2.1.5.2 2.1.6
Basics ................................................................................................................................ 19 Start Energy Manager ........................................................................................................ 19 Client as navigation tool..................................................................................................... 23 Basic configuration ............................................................................................................ 25 Search for object................................................................................................................ 31 Quicklinks.......................................................................................................................... 33 Create Quicklinks ............................................................................................................... 33 Editing Quicklinks .............................................................................................................. 35 Help .................................................................................................................................. 38
黑 ду克软件组合分析产品说明书
Black Duck provides complete control over open source risk, regardless of your organization’s size or budget OverviewBlack Duck® software composition analysis (SCA) can be implemented in two out-of-the-box configurations—Security Edition and Professional Edition. Black Duck Binary Analysis and the cryptography module can be added to either edition to provide greater insight into your application risk posture and enhanced control over your open source and third-party software consumption.Black Duck Security EditionAutomatically identify and remediate open source risks throughout your entire SDLCBlack Duck Security Edition can run either a full dependency scan during a build or a fast scan using the Code Sight™ IDE plugin to provide visibility into the open source security risks in your applications. Black Duck automatically discovers open source components in your applications, and also provides a complete open source Bill of Materials (BOM) for your software projects, giving you critical insight into any known vulnerabilities, as well as the license and code quality risks affecting your applications.• Vulnerability mapping identifies any security risks associated with the open source components in your applications at any point in your software development life cycle (SDLC).• Vulnerability monitoring and alerting automatically monitors for new vulnerabilities against inventoried open source components. It also helps accelerate remediation by instantly alerting security and development teams with detailed and actionable information.• Black Duck Security Advisories (BDSAs) provide notifications of vulnerable open source component versions, including detailed descriptions, exploit profiles, severity scoring, impact analysis, and detailed remediation guidance that security experts and developers alike can understand.• License risk identification safeguards sensitive intellectual property and helps avoid litigation by identifying the open source licenses that apply to the components in your applications. You can view license terms and obligations, automatically generate notice files, and define your own custom policy and let Black Duck handle the enforcement.• Operational risk metrics mitigates the risk of higher support and remediation costs for your development teams by identifying out-of-date component versions or those with limited project activity and community engagement.• Rapid Scan instantly analyzes open source dependencies for vulnerabilities and policy violations before code is built or merged into release branches.• Policy configuration lets you manage and mitigate risk throughout the SDLC. Structure policies for secure and compliant open source consumption and usage, and automate policy violation notifications for faster enforcement and remediation.• DevOps integrations automate open source discovery and provide critical risk insight to the teams who need it, when they needit. Integrations are available for CI/CD tools, package managers, IDEs, container platforms, code repositories, issue trackers, and application security suites.• Black Duck KnowledgeBase is the industry’s largest database of open source project, vulnerability, and license data. Map your BOMto more than 15 years of data, 30% more vulnerabilities than are tracked in the National Vulnerability Database (NVD), and over 2,750 unique licenses.Black Duck Professional EditionCompletely manage open source risk and consumption in your SDLCBlack Duck Professional Edition gives teams the tools they need to fully manage open source risks across their applications and containers. Professional Edition includes all the capabilities of Black Duck Security Edition, plus Black Duck’s advanced security and license compliance capabilities. Regardless of how large your organization or development team is, or what languages and technology you’re employing in your applications, Black Duck scales to meet your unique business needs and provides the most complete risk picture on the market.Multifactor open source discoveryNot all open source is explicitly declared or included in its original form, but it still carries risk. Black Duck identifies all open source components in your applications, modified or unmodified, partial or whole, via a combination of discovery techniques.• Dependency analysis tracks declared components and dependencies• Code print analysis finds undeclared, modified, and partial components, even in languages that don’t use package managers, like C/C++• Snippet matching identifies snippets of open source embedded in your code• Binary analysis detects open source in virtually any compiled software, firmware, or installer format without access to source code or build systems• Custom component detection uses string searching and code printing to find non-open-source, internal, or third-party commercial componentsAdvanced license complianceProtect intellectual property and mitigate the risk of open source license noncompliance with greater insight into license obligations and attribution requirements. Black Duck provides:• Identification and analysis of all applicable licenses beyond those declared• Automated generation of customizable open source software reports at the project/release level• Full texts for the most popular open source licenses• The ability to view license responsibilities and confirm that license commitments have been metSnippet analysis identifies small sections of code originating from open source components that carry the same license obligation as those components. Black Duck enables you to:• View code snippet matches highlighted in the component source, augmenting the accuracy of your open source BOM• Perform a full codebase scan or accelerate your analysis with a delta scan, examining only the files that have changed• Evaluate and triage matches by license risk, matched component version release data, and prevalence• Review key snippet data, including matched component name and version, component license, path, percentage of scanned code matched to component file, and release date• Confirm, flag, or ignore potential matches en masse with bulk edit capabilitiesAdditional Black Duck solutionsBlack Duck is available with additional security enhancements to further your open source risk management capabilities. Both Black Duck Binary Analysis (BDBA) and the cryptography module can be added to Black Duck Security Edition or Professional Edition.Black Duck Binary AnalysisModern software is a patchwork of open source software, commercial code, and internally developed components, and the tendencyto defer accountability throughout today’s complex software supply chain exposes you to significant risk. Vulnerable open source components in your applications are weak links in the supply chain, providing a viable point of entry for attackers. Take steps to identify the risks in the software libraries, executables, and vendor-supplied binaries in your codebase. Black Duck Binary Analysis helps you:• Analyze virtually any compiled software, firmware, mobile application, or installer format without access to source code• Create a detailed BOM of vulnerable open source components, including version, location, license, and known vulnerabilities• Use data from the NVD, including CVSS 2.0 and 3.x metrics, to rank vulnerabilities for remediation• Access detailed vulnerability descriptions, links to vendor advisories, patches, and more• Receive automatic alerts about new vulnerabilities in previously scanned software• Identify declared open source licenses and any potential risk of noncompliance• Use the REST API to accelerate and automate essential risk mitigation and remediation tasks• Identify potential sources of sensitive data leakage that might be in a software package• Gain insight into requested permissions for binary code types where relevant, such as in Android and iOS apps• Identify components that have been compiled without exploit mitigation mechanisms or that contain dangerous execution configurationsCryptography moduleThis module supports data security initiatives and regulations around the legal export of cryptography by tracking the cryptographic algorithms in the open source components in your applications and identifying weak cryptography or obsolete hashing mechanisms. The Black Duck cryptography module provides:• Identification of encryption algorithms found in each open source component version• Detailed cryptography data including key length, originator, licensing, and patent information• Indication of weak encryptionSecurity Edition Professional EditionScanning Dependency, rapid Multifactor scanningVulnerability info BDSA BDSALicense info Basic AdvancedPolicy●●Monitoring●●Reporting●●Integrations All AllAuto-remediation●●Reachability●●Containers●●On-prem options●●ScanningLanguages• C • C++ • C# • Clojure • Erlang • Golang • Groovy • Java• JavaScript • Kotlin • Node.js • Objective-C • Perl • Python • PHP • R • Ruby • Scala •Swift• .NET Cloud technologiesPackage managers• NuGet • Hex • Vndr • Godep • Dep • Maven • Gradle • Npm• CocoaPods • Cpanm • Conda • Pear• Composer • Pip• Packrat • RubyGems • SBT • Bazel • Cargo• C/C++ (Clang)• GoLang • Erlang/Hex • Rebar • Python • Yarn •YoctoBlack Duck | Source and Package Manager ScanningBDBA package manager support• Distro-package-manager: Leverages information from a Linux distribution package manager database to extract component information• The remaining four methods are only applicable to Java bytecode:–pom: Extracts the Java package, group name, and version from the pom.xml or pom.properties files in a JAR file –manifest: extracts the Java package name and version from the entries in the MANIFEST.MF file in a JAR file –jar-filename: Extracts the Javapackage name and version from the jar-filename–hashsum: Uses the sha1 checksum of the JAR file to look it up from known Maven Central registered Java projectsBinary formats• Native binaries • Java binaries • .NET binaries • Go binaries Compression formats• Gzip (.gz) • bzip2 (.bz2) • LZMA (.lz) • LZ4 (.lz4) • Compress (.Z) • XZ (.xz)• Pack200 (.jar) • UPX (.exe) • Snappy • DEFLATE•zStandard (.zst)Archive formats• ZIP (.zip, .jar, .apk, and other derivatives) • XAR (.xar) • 7-Zip (.7z) • ARJ (.arj) • TAR (.tar)• VM TAR (.tar) • cpio (.cpio) • RAR (.rar) • LZH (.lzh)• Electron archive (.asar) •DUMPInstallation formats• Red Hat RPM (.rpm) • Debian package (.deb) • Mac installers (.dmg, .pkg)• Unix shell file installers (.sh, .bin) • Windows installers (.exe, .msi, .cab)• vSphere Installation Bundle (.vib) • Bitrock Installer•Installer generator formats that are supported:–7z, zip, rar self-extracting .exe –MSI Installer –CAB Installer –InstallAnywhere –Install4J –InstallShield –InnoSetup –Wise Installer–Nullsoft Scriptable Install System (NSIS)–WiX InstallerFirmware formats• Intel HEX • SREC • U-Boot• Arris firmware • Juniper firmware • Kosmos firmware•Android sparse file system• Cisco firmwareFile systems / disk images• ISO 9660 / UDF (.iso) • Windows Imaging • ext2/3/4 • JFFS2 • UBIFS • RomFS• Microsoft Disk Image • Macintosh HFS• VMware VMDK (.vmdk, .ova) • QEMU Copy-On-Write (.qcow2) • VirtualBox VDI (.vdi) • QNX—EFS, IFS• NetBoot image (.nbi) •FreeBSD UFSContainer formats• DockerBlack Duck only BDBA onlyCloud technologiesCloud platforms• Amazon Web Services • Google Cloud Platform • Microsoft Azure• Pivotal Cloud FoundryContainer platforms• Docker • OpenShift• Pivotal Cloud Foundry•Kubernetes Package managersDatabases• PostgreSQLBlack Duck | IntegrationsDevOps toolsIDEs• Eclipse• Visual Studio IDE • IntelliJ IDEA • WebStorm • PyCharm • RubyMine • PhpStorm • VS Code• Android StudioContinuous integration• Jenkins • TeamCity • Bamboo• Team Foundation Server • Travis CI • CircleCI • GitLab CI• Visual Studio Team Services • Concourse CI • AWS CodeBuild • Codeship • Azure DevOps • GitHub Actions •OpenShiftWorkflow and notifications• Jira • Slack • Email • SPDX•Azure Boards• Microsoft TeamsBinary and source repositories• Artifactory • NexusApplication security suites• IBM AppScan• Micro Focus Fortify • SonarQube • ThreadFix • Cybric • Code Dx • Fortify •ZeroNorth。
correctable errors collector initialized
Correctable Errors Collector InitializedIntroductionIn the world of technology, errors are inevitable. Whether it’s a bugin the code or a hardware malfunction, errors can disrupt the normal functioning of systems and cause inconvenience to users. However, notall errors are created equal. Some errors are minor and can be easily corrected, while others are more serious and require extensive troubleshooting. This is where the concept of a “correctable errors collector” comes into play.What is a Correctable Errors Collector?A correctable errors collector is a component or software module that is designed to identify, collect, and manage correctable errors in a system. It acts as a central repository for error data, allowing system administrators or developers to analyze and address these errors efficiently.Initialization ProcessThe initialization process of a correctable errors collector involves several steps to ensure its proper functioning. Let’s take a closerlook at each step:1.Identification: The correctable errors collector first identifiesthe types of errors that can occur in the system. This includesboth hardware and software-related errors. By understanding thedifferent error categories, the collector can effectively captureand categorize specific error instances.2.Configuration: Once the error types have been identified, thecollector needs to be configured accordingly. This involvessetting up parameters such as error thresholds, logging levels,and notification preferences. These configurations help determinehow the collector handles different types of errors.3.Integration: The correctable errors collector needs to beintegrated into the system architecture seamlessly. This mayinvolve installing specific drivers or software libraries thatenable communication between the collector and other systemcomponents. Integration ensures that error data can be collectedfrom various sources within the system.4.Data Collection: With all necessary configurations in place, thecorrectable errors collector starts collecting error data fromdifferent sources within the system. This includes monitoringhardware components such as processors, memory modules, storagedevices, and network interfaces, as well as software componentssuch as operating systems, applications, and services.5.Error Analysis: Once error data is collected, the correctableerrors collector performs an analysis to identify patterns ortrends. It looks for commonalities among errors, such as specific hardware models affected or software versions causing the errors.This analysis helps in understanding the root causes of errors and enables proactive measures to prevent them in the future.6.Error Correction: After analyzing the error data, the correctableerrors collector provides recommendations or suggestions for error correction. These recommendations can include firmware or software updates, hardware replacements, or changes in systemconfigurations. The collector may also automatically apply certain corrective measures based on predefined rules.7.Reporting: The correctable errors collector generates reportssummarizing the collected error data and its analysis. Thesereports provide insights into the overall health of the system,highlighting areas that require attention or improvement. Systemadministrators can use these reports to prioritize their effortsin resolving issues and optimizing system performance.Benefits of a Correctable Errors CollectorHaving a robust correctable errors collector in place offers numerous benefits:1.Efficient Troubleshooting: The collector streamlines the processof identifying and addressing correctable errors by providing acentralized view of error data. This saves time and effort forsystem administrators who no longer need to manually search forerror logs across different components.2.Proactive Maintenance: By analyzing error patterns and trends,the correctable errors collector helps identify potential issuesbefore they escalate into critical failures. This allows systemadministrators to take proactive measures to prevent downtime or performance degradation.3.Optimized Performance: Continuous monitoring and analysis ofcorrectable errors enable fine-tuning of system configurations,leading to improved overall performance and stability.4.Enhanced Reliability: With a comprehensive understanding ofcommon error types and their causes, system administrators canimplement preventive measures to minimize the occurrence ofcorrectable errors. This increases the reliability andavailability of the system.5.Data-Driven Decision Making: The reports generated by thecorrectable errors collector provide valuable insights that canguide decision making for system upgrades, hardware replacements, or software updates. These decisions are based on concrete datarather than assumptions.ConclusionThe correctable errors collector plays a vital role in maintaining the health and performance of systems by identifying, collecting, and managing correctable errors. Its initialization process ensures that it is well-configured, integrated seamlessly into the system architecture, and capable of efficiently handling error data. By leveraging the benefits of a correctable errors collector, organizations can proactively address issues, optimize system performance, and enhance overall reliability.。
机上乘务员对心脏骤停的处置流程
机上乘务员对心脏骤停的处置流程英文回答:As a flight attendant, I am trained to handle various emergency situations on board, including cardiac arrest or sudden cardiac arrest (SCA). The prompt and efficient response to a passenger experiencing a heart attack can significantly increase their chances of survival. Here is the procedure we follow when faced with a passenger suffering from a sudden cardiac arrest:1. Assess the situation: The first step is to quickly assess the passenger's condition. If they are unresponsive, not breathing normally, or showing signs of cardiac arrest, immediate action is required.2. Activate the emergency medical system: I would immediately notify the flight deck and request the assistance of any medical professionals on board. Theflight deck will then contact the ground-based medicalsupport for further guidance.3. Begin cardiopulmonary resuscitation (CPR): If there are no medical professionals available, I would initiate CPR by performing chest compressions. The American Heart Association recommends a compression depth of at least 2 inches and a rate of 100-120 compressions per minute.4. Retrieve the automated external defibrillator (AED): The next step is to retrieve the AED, which is a portable device that can analyze the heart's rhythm and deliver an electric shock if necessary. AEDs are usually located in a designated area on the aircraft.5. Follow AED instructions: Once the AED is ready, I would follow the voice prompts and visual instructions provided by the device. This includes attaching the electrode pads to the passenger's chest and allowing the AED to analyze the heart rhythm. If a shock is advised, I would ensure everyone is clear of the passenger and deliver the shock as instructed.6. Continue CPR and AED cycles: After delivering the shock, I would resume CPR immediately, starting with chest compressions. I would continue the cycles of CPR and AED analysis as long as necessary or until medical professionals take over.7. Coordinate with medical professionals: Throughout the process, I would maintain communication with any medical professionals on board or on the ground. They can provide additional guidance and support during the emergency.8. Provide post-event care: Once the situation is stabilized, I would ensure the passenger is comfortable and receive any necessary medical attention. This may include administering oxygen, providing reassurance, and monitoring their vital signs until medical professionals take over.中文回答:作为一名机上乘务员,我接受了各种紧急情况的应对培训,包括心脏骤停。
基于SCADA-DCS通讯技术的油气开采数据自动化采集与控制系统
井、站
井、站
无线
无线
IFIX 实时数据库
MODBUS
原 油 处 理 站 DCS 光缆
DCS服 务 器 数据采集层
油气开采信息数据库(SCADA 服务器)
关系数据库
Web服务器 数据管理层
MODBUS
中图分类号:TP273 文献标识码:A
文 章 编 号 :1001鄄9944(2024)04鄄0052鄄04
Automated Data Acquisition and Control System for Oil and Gas Production Based on SCADA鄄DCS Communication Technology
Automation & Instrumentation 2024,39穴4雪
程监控中,通信网络性能与远程监控效果存在密不 可分的关系。 文献[6]研究了基于 LoRa 技术的油田 数据采集系统,此系统针对油田环境复杂性和特殊 性,由 LoRa 技术提供了一种低功耗、远距离的无线 通信解决方案,可以有效地解决油田数据采集中组 网复杂性和高功耗问题。 但 LoRa 技术也存在一些 局限性,如穿透力较弱、信号质量受环境影响较大 等,会导致其在某些应用场景中可靠性降低;文献 [7]研 究 了 基 于 深 层 油 气 勘 探 需 求 开 发 的 时 频 电 磁 (TFEM)勘 探 仪 器 系 统 ,此 系 统 能 够 利 用 时 频 电 磁 (TFEM)勘 探 仪 器 采 集 油 气 勘 探 数 据 ,但 是 此 系 统 不具备远程控制功能。
DCS控 制 站 原油综合处理站
DCS操 作 站 MODBUS通 用 标 准 协 议
鱼缸英语介绍作文
鱼缸英语介绍作文Title: Introduction to a Fish Tank。
A fish tank, also known as an aquarium, is afascinating piece of equipment that allows individuals to create a miniature aquatic ecosystem within their homes. It serves as a habitat for various species of fish and other aquatic organisms, providing them with a safe andcontrolled environment to thrive in. Let's delve into the intricacies of a fish tank and explore its components and functions.To begin with, the primary component of a fish tank is, of course, the tank itself. These tanks come in various shapes and sizes, ranging from small desktop tanks to large custom-built installations. They are typically made of glass or acrylic and are designed to hold water securely without leaking. The size of the tank depends on the number and size of fish you plan to keep, as well as the space available in your home.Water quality is paramount in maintaining a healthy aquatic environment. Thus, filtration systems play acrucial role in a fish tank. Filtration helps remove debris, excess food, and fish waste from the water, ensuring it remains clean and clear. There are several types offiltration systems available, including mechanical, biological, and chemical filtration. Each type works in tandem to eliminate impurities and maintain water quality.In addition to filtration, aeration is essential for ensuring the well-being of aquatic life in a fish tank. Aeration involves the movement of water to facilitate gas exchange, ensuring an adequate supply of oxygen for fishand other organisms. This is typically achieved through the use of air pumps, which create bubbles that rise to the surface, promoting oxygen transfer and water circulation.Lighting is another crucial aspect of a fish tank, asit not only illuminates the tank but also influences the growth of aquatic plants and the behavior of fish.Different species of fish and plants have varying lightingrequirements, so it's essential to choose the right typeand intensity of lighting for your aquarium. LED lights are commonly used in modern fish tanks due to their energy efficiency and customizable settings.Aquascaping, the art of arranging aquatic plants, rocks, and other decor in the tank, adds aesthetic appeal and mimics natural aquatic habitats. Aquascaping allows hobbyists to create visually stunning underwater landscapes while providing shelter and hiding spots for fish. It's essential to consider the preferences and behaviors of the fish species you intend to keep when designing the aquascape.Maintaining a fish tank requires regular care and attention. This includes monitoring water parameters suchas temperature, pH, ammonia, and nitrite levels to ensure they remain within acceptable ranges for the inhabitants. Water changes, partial or complete, are necessary to remove accumulated waste and replenish essential minerals and nutrients.In conclusion, a fish tank is not just a container for holding water and fish; it's a complex ecosystem that requires careful planning and maintenance. By understanding its components and functions, hobbyists can create thriving aquatic environments that bring joy and beauty into their homes. Whether you're a beginner or an experienced aquarist, the world of fishkeeping offers endless opportunities for exploration and enjoyment.。
核电站数字化仪控系统设定值整定方法的研究
核电站数字化仪控系统设定值整定方法的研究方涛;陆道纲;马吉强;潘海波【摘要】At present, during the nuclear plant instrument and control system design, there is lack of a complete and practical method. In this article, based on relevant special standards and object to an actual plant, a applied set point adjusting method is introduced. The contents include a general all channel uncertainty calculation arithmetic, and several key terms solution. In particularly, at the end of the article, a case of Diversity Actual System is provided, and did the comparison with Protect Safety Monitor System.%针对目前核电站数字化仪控系统,缺少一套完整实用的整定值设定方法的现状.以相关专业标准为依据,以实际电站为对象,介绍了一套实用的设定值整定方法.内容包括一个通用的全通道不确定性计算方法,和几个关键项的解决方案.最后,给出了多样性系统的设定值整体方法案例,并对结果同保护安检系统做了比较.【期刊名称】《河北工业大学学报》【年(卷),期】2011(040)005【总页数】5页(P22-26)【关键词】核电站;数字化仪控系统;设定值;整定;方法【作者】方涛;陆道纲;马吉强;潘海波【作者单位】华北电力大学核科学与工程学院,北京102206;华北电力大学核科学与工程学院,北京102206;北京广利核系统工程有限公司,北京100084;北京广利核系统工程有限公司,北京100084【正文语种】中文【中图分类】TP2730 前言所谓核电站数字化仪控系统的安全设定值整定,是指当现场控制站因为意外情况无法正常工作(失效)或偏离正常运行状态(功能降级)时,控制系统在经过自我修复后,对于其重要的控制对象,需要输出一个安全输出整定值(多为模拟量输出).该设定值首先要保证系统在恢复功能后可以安全运行,其次不要有较大的扰动.针对这一要求,专业机构给出了相应的标准[1-4],但这些方法只是给出了一个基本框架,具体实行比较困难.鉴于这一状况,笔者以实际电站为依托,给出了一个通用方法,并针对几个特殊项给出了实际解决步骤与方案.1 计算全通道不确定性的通用方法求取全通道的不确定性,是把各个通道的不确定性分别计算,然后加以统计,最后合成在一起来实现的.其中,各测量通道中,随机不确定性占主导,也就是说可通过计算随机不确定性来反映全通道的不确定性.计算过程中,采用的是不规则分布和偏差不确定性的代数组合.在确定安全相关设定值时,使用了概率论及统计学的方法.其中,最典型的方法就是平方和的平方根(SRSS)法,即求取所有误差项的最大期望偏差.目前,大部分反应堆保护系统的测量通道不确定性都是用方程式(1)来实现的.式 (1)中,为指定通道的不确定性.所有这些不确定项可分为两大类,分别为测量产生的不确定性和非测量产生的不确定性,各项具体内容的含义见表1(注:表中的所说的机笼,包括机笼和机笼中的所有采集、控制以及辅助模块).表1 不确定项内容含义Tab.1 Meaning of uncertainty term测量产生不确定项非测量产生不确定性序号不确定项含义序号不确定项含义序号不确定项含义1 SCA 传感器标定精度 1 PMA 过程测量精度 7 SSE 传感器的震动影响2 SD 传感器的漂移 2 PEA 基本元件精度 8 SREA 传感器的事故辐射影响3 SMTE 传感器测量与测试设备精度 3 SRA 传感器参考精度 9 STEA 传感器的事故温度影响4 RCA 机笼标定精度 4 SPE 传感器的压力影响 10 RTE 机笼的温度效应5 RD 机笼的漂移5 STE 传感器的温度影响 11 IRE 绝缘电阻效应6 RMTE 机笼测量与测试设备精度6 SPS 传感器的供电影响 12 BA 偏差裕量上述方程是一个通用方法,并非适用所有情况.对于保护回路中的单一参数情况通常是有效的;但对于需要通过计算多个输入才能确定的情况,则需要特定方法加以解决.所有对全通道不确定性有影响的参数都是用量程的百分数来表示的.因此,其它表示形式的数据,要先进行归一化,再计算.方程中考虑了由于恶劣环境导致的最坏情况,如SREA和STE,以及PMA等.需要注意的是,由于SREA产生误差对STE产生误差有抑制作用,所以在计算时只需考虑前者即可.PMA和PEA与传感器及机笼无关.其中,PMA给出的是与仪表无关项所产生的影响:如中子通量、流体密度变化、温度变化等.而对于多个独立、随机的PMA,可通过求SRSS来解决.需要注意的是,PMA是不含PEA的,所有PEA通常是指设备的计算或测量精度值,它考虑了设备在安装过程中的精度,常用的有:弯管、喷嘴、文丘里管和喷嘴等.与仪表相关项所产生误差通常被定义为传感器的参考精度.它是一种能力,要求在多次测试中对于相同的输入,必须有相同的输出.该项内容随测试样本数量成随机正态分布.2 数字化仪控系统的不确定性RCA、RTE、RD和RMTE合起来被看作是机笼的数字化安全保护裕量.所有这些参数值都是由供应商来提供的,而且都要满足技术规格书中的要求.一个典型的具有安全功能的信号处理路径包含:信号分配模块、输入模块以及数字信号处理模块(见图1).其中,信号分配模块为无源器件,因此无需计算它的不确定性.输入模块处理一个来自传感器的信号时,先要对信号进行调理(如消噪、放大等),然后是数模转换,最后进入数字信号处理模块.由于数字信号处理模块的不确定性一般为满量程的0.001%(以16位的采样精度为例,以供应商提供数据为准),因此,可忽略不计.图1 安全功能信号处理路径Fig.1 Thepath of safety function signal processing3 额定行程设定值(NTSP)与允许值(AV)的确定方法对于预计运行事件和假想事故,当设定值在达到分析限值(AL)之前,反应堆停堆系统(RT)和安全专设系统(ESFAS)会提前动作.这样就保证了电厂在达到安全限值之前,会先对目前的运行状态进行修正,以缓解所产生的影响.NTSP主要是用于保护实测过程参数在达到安全限值之前,能先行产生停堆或安全动作,它包含了仪表的不确定性,其大小是由技术规格书中的系统安全设定值来指定的.NTSP留了一定安全裕量,它容许运行在允许值范围内的功能降级仪表修正后继续工作.所以,对安全裕量的选取要适度,要求在确保电厂稳定运行的前提下,在预期运行瞬态过程中不能发生停堆或安全保护的误动.电厂正常运行限值与NTSP之间的裕量就是电厂的安全运行裕量.在确定NTSP的不确定性时,标定的量程间隔内有漂移.漂移再加上标定所产生误差自身的不确定性,可作为性能实验验收标准(PTAC).校准公差(CT)限值内的周期校准,可确保漂移的期望值处于NTSP的假设范围内(见图2).图2 分析限值与额定行程设定值及容许值间的关系Fig.2 Therelationshipbetween analysis limit and nominal trip set point容许限值(AL)是一个双边限值,它选取的是保护功能通道中,NTSP与容许限值之间的最大偏差.要想得到通道的容许限值,可用校准值加上或减去△1或△2中较小的值.在通道标定时,用容许限值判断通道是否可用,用性能实验验收标准判断仪表是否功能降级,因此要尽量避免使用较大的公差(见图 3).1)如果NTSP在性能实验验收准则范围内,则该通道可完全运行.2)如果NTSP处于双边设定限值之外,但又在容许值范围之内,则可以功能降级运行.同时,需要进行矫正,使其返回指定范围内.3)如果NTSP完全处于容许值范围之外,则通道无法工作.校正动作开启,同时,自动保护装置将无法正常工作.图3 数字化保护通道的周期检查Fig.3 Digital protect channel period surveillance式中:,……代表过程变量的测量值;,……为常数,是归一化后的功能设定值参数;为总的安全裕量;为安全裕量.式中:代表非测量项的平方和的平方根.其中,CU可由方程式 (1)求取,它表示了在正常和事故情况下的仪表性能.安全裕量要确保NTSP+PTAC不能大于AV,即使最小的安全裕量也要能防止通道的漂移超过AV.而附加的安全裕量则可以避免虚假停堆动作.多重安全裕量的叠加可确保通道的多重保护功能.总的允许限值=分析限值-额定行程设定值=通道不确定性+安全裕量保护功能由周期监测和通道校准两项组成.通道校准要能满足在全量程范围内的精度要求.AV、PTAC、CT都要考虑其中(通道5点检验通常为0%,25%,50%,75%,100%).4 性能测试验收标准(PTAC)性能测试可用于验证设备性能是否符合设计预期.设备的不确定性测试是所有不确定性项的加和,所以验收准则,也要根据每项内容逐一确定,如下1)传感器2)机笼因为机笼是没有RD误差的,而且SMTE误差已经含在RCA中了.3)回路5 基于压差的流速采集通道的不确定性介绍一个基于压差的流速测量通道的不确定性转换方法.压差的不确定性对于压差的满量程来说可以看成是一个常数;而通过压差转换成的流速对于流速的满量程来说,却并非是一个常数.流速与测量得到的压差关系如下式中:为测量通道中测得的流速;△为流速通道中的压差;为常数.流速的不确定性可由下式求得式中:为流速不确定性(额定流速下);为压差的不确定性(满量程下);为最大流速;为流速.6 多样性系统(DAS)DAS采用了最佳估计分析方法,消除了所有的共因故障.因此,假设其没有误差和功能降级.这样,DAS的NTSP=AL,不存在CU和SM.由于DAS与保护安全系统(PSMS)的输入信号同源.所以,回路部分的测试可通过PSMS的通道来实现.DAS只是多了个信道可用性测试(COT).如果需要做信道可用性测试的话,可先把DAS和PSMS的信号进行分离后再注入模拟测试信号.该注入信号可用于检查DAS的精度(见图4).1)DAS误差2)PSMS误差经过整理得到由上式可知,DAS与PSMS设定值之差必须要大于由DASBistable,DASIsolator,以及PSMSrack引入的误差之和.在最差条件下,[NTSP(DAS) NTSP (PSMS)]也必须要大于全量程的3.4%,表2(注:裕量=NTSP(DAS)-NTSP(PSMS),上升过程,全量程的3.4%)是实际两系统的实际计算结果.图4是DAS与PSMS误差比较情况.表2 DAS与PSMS设定值结果的比较Tab.2 The set point result comparison between DASand PSMS?7 结论核电站数字化仪控系统安全设定值的整定问题,一直以来都是设计的难点和关注焦点.安全设定值选取的好坏,将直接影响到整个系统能否安全稳定的运行.本文提出的一个通用方法和几个关键项的解决方案,已成功应用于实际电站的设计中,这将为其它电站的设计工作提供良好的借鉴.图4 多样性系统与保护安检系统的比较Fig.4 Comparison of DASand PSMS参考文献:[1]ANS.Set pointsfor Nuclear Safety-RelatedInstrumentation[S].American:ANS,16 May 2006.[2]ISA.Performance Monitoring for Nuclear Safety-Related Instrument Channelsin Nuclear Power Plants[S].American:ISA,24 May 2002.[3]ISA.Qualificationsand Certification of Instrumentation and Control Techniciansin Nuclear Facilities[S].American:ISA,15 February 2000.[4]ISA.Methodologiesfor the Determination of Set pointsfor Nuclear Safety-Related Instrumentation[S].American:ISA,1 January 2000.。
第三方无线-无线优化-通用-L3-202007-B场考试题库A1 - 第150页
第150页1140【题目】The eNodeB health check tool can operate()eNodeBs at the same time.【正确答案】ABCD【A】1、1【B】2、2【C】3、3【D】4、41141【题目】In the Alarm Management module of LTE OMC system, you can customize().【正确答案】ABCD【A】1、sound【B】2、color【C】3、alarm severity【D】4、rule1142【题目】The Configuration Management function under the NE Management of LTE OMC system supports().【正确答案】ABC【A】1、database probe query【B】2、eNodeB health check【C】3、online counter-construct and offline import of configuration data1143【题目】The collection granularity for performance data can be set to().【正确答案】BC【A】1、1 second【B】2、5 minutes【C】3、15 minutes【D】4、1 year1144【题目】With the server performance monitoring function, you can query and monitor the status of().【正确答案】ABD【A】1、CPU【B】2、memory【C】3、graphic adapter【D】4、hard disk1145【题目】The security management of the OMC system involves().【正确答案】ABC【A】1、user management【B】2、role management【C】3、log management1146【题目】In the Log Management, you can output().【正确答案】ABC【A】1、operation log【B】2、security log【C】3、system log1147【题目】What must be prepared before the model correction?【正确答案】A B C D【A】1、transmitter【B】2、receiver【C】3、GPS receiver【D】4、digital map1148【题目】The basic propagation models in a certain region include those for().【正确答案】A B C D【A】1、dense urban area【B】2、common urban area【C】3、suburb area【D】4、rural area1149【题目】What must be considered for site erection and data collection?【正确答案】A B C D【A】1、For the site erection, you must fully consider the height and position of the antenna. The height of the antenna is required to be more than 5 meters higher than the ground.【B】2、The antenna of the receiver must be put at the top of the vehicle.【C】3、The power of the transmitter is normally set to a value between 10 w and 40 w.【D】4、The density of the data collection points must comply with the Li's Theorem.1150【题目】Which models are applicable to the frequency band of 1.5 GHz?【正确答案】B C D【A】1、Okumura-Hata【B】2、SPM【C】3、COST231-Hata【D】4、General model1151【题目】Which models are not applicable to the frequency band of 2.6 GHz?【正确答案】A C D【A】1、Okumura-Hata【B】2、SPM【C】3、COST231-Hata【D】4、General model1152【题目】Which descriptions are correct about the parameters of the SPM model?【正确答案】A B C D【A】1、K1 is the loss constant.【B】2、K1 and K2 and other parameters influence with each other during the model correction.【C】3、K2 is the ground object pitch correction factor and reflects sharp attenuation of signals.【D】4、K3, K4, K5, and K6 basically does not change along with the different topographies.1153【题目】Which descriptions are correct about the COST231-Hata model?【正确答案】A B C D【A】1、The applicable frequency range is 1500 MHz- 2000 MHz.【B】2、The receiving and transmitting distance is 1 Km-20 Km.【C】3、The height of the antenna of eNodeB is 30 m-200 m.【D】4、The height of the UE is 1 m-10 m.1154【题目】In propagation model correction, the available Heff algorithms for the effective antenna height include().【正确答案】ABCD【A】1、Absolute【B】2、Average【C】3、Relative【D】4、Slope1155【题目】Which of the following statements are true?【正确答案】ABC【A】1、Three target values are included in propagation model correction: Average, Standard Deviation, and Root Mean Square.【B】2、The target of propagation model correction is to make the Average value become 0.【C】3、The target of propagation model correction is to make the Standard Deviation and Root Mean Square values become 6-9 dB.【D】4、The target of propagation model correction is to make the Standard Deviation and Root Mean Square values become 10-11 dB.1156【题目】The measures for handling the weak coverage problem include().【正确答案】ABCD【A】1、increasing reference signal power【B】2、adjusting the antenna's azimuth and downtilt【C】3、increasing the antenna's hanging height, and replacing the antenna with a high-gain antenna【D】4、adding eNodeBs1157【题目】For the indoor coverage holes, such as elevator shafts, tunnels, underground garages, basements, and insides of high buildings,()can be installed to improve the coverage.【正确答案】ABCD【A】1、indoor distribution system【B】2、leaky cable【C】3、directional antenna【D】4、remote RRU1158【题目】PA can be set to().【正确答案】ABCD【A】1、0【B】2、-1.77【C】3、-3【D】4、-4.771159【题目】In the equation ρB = PDSCH-to-RS EPRE ratio, the value of ρB is determined by parameters such as().【正确答案】ABD【A】1、ρB /ρA【B】2、ρB【C】3、δpower-offset【D】4、the number of antenna ports1160【题目】In the case of two antenna ports and normal CP length, OFDM symbols()within a slot do not contain RSs.【正确答案】ABC【A】1、1【B】2、2【C】3、3【D】4、41161【题目】If the uplink coverage is weak, it can be solved by().【正确答案】BCD【A】1、increasing RS power【B】2、eliminating uplink interference【C】3、adjusting the antenna's downtilt and azimuth【D】4、adding TMAs1162【题目】During data collection, it is required to collect the()data.【正确答案】ABCD【A】1、drive test【B】2、indoor test【C】3、signaling tracing【D】4、configuratio1163【题目】During eNodeB information collection, it is required to collect data such as().【正确答案】ABCD【A】1、site name and site ID【B】2、cell ID and PCI【C】3、longitude, latitude, and antenna's hanging height, azimuth and downtilt【D】4、antenna type and whether the antenna is adjustable1164【题目】The intra-system interferences of LTE systems include().【正确答案】BD【A】1、Interference from a microwave system【B】2、Inter-UE interference【C】3、Interference from satellite TVs【D】4、Inter-cell interference1165【题目】The common methods for discovering the interference include().【正确答案】AC【A】1、frequency sweeping in drive tests【B】2、board replacement【C】3、performance monitoring【D】4、eNodeB restart1166【题目】Currently, ZTE's LTE systems can collect interference data by one of the following methods:().【正确答案】CD【A】1、collect the RSSI values of a certain period with the performance statistic tool of the OMC system and calculate the average value【B】2、Enable the spectrum sweeping function in the OMC system for specific cells【C】3、Check the RSSI values in the diagnostic test module of the OMC system.【D】4、Check the uplink interference of each RB in MTS.1167【题目】( )are intra-system interference tests.【正确答案】BCD【A】1、GPS test【B】2、PA's spurious emission test【C】3、duplexer isolation test【D】4、antenna feeder system test1168【题目】The intuitive interference location methods include().【正确答案】CD【A】1、performance monitoring【B】2、drive test【C】3、Test with the MapInfo software【D】4、test by changing the direction of the eNodeB antenna1169【题目】The common measures for external interference include().【正确答案】ABCD【A】1、Adjust the location, azimuth, downtilt or height of the antenna of the LTE system to make the main lobe of the antenna not in the direction of the interference source and increase spatial isolation between the LTE system and the interference source.【B】2、Add a filter: If the interference source is a PHS or CDMA1.9GHz base station, its interference on LTE eNodeB is mainly spurious interference. In this case, it is required to negotiate with the operator to install a filter for the interference source so as to reduce its interference on the LTE system.【C】3、Modify the parameters of the interference device: If the interference source is an amplifier, such as repeater or TMA, modify the amplifier's uplink or downlink gain to improve its self-oscillation and reduce its interference on the donor eNodeB and neighboring eNodeBs【D】4、shut down the interference source1170【题目】The UE de-attach process will occur during().【正确答案】ABCD【A】1、power off period【B】2、recovery because of network error (for example, the S-TMSI is not available), after the IMSI paging message from the eNodeB is received【C】3、non-power off period【D】4、the E_UTRAN radio capability information of the UE changes1171【题目】When the MME originates the initial context setup request to the eNodeB to ask the eNodeB to set up the bearer resource with the security context, this request may carry the parameters of().【正确答案】AB【A】1、user radio capability【B】2、handover restriction list【C】3、encryption algorithm【D】4、integrity protection algorithm1172【题目】The Service Request can contain the processes of().【正确答案】ACD【A】1、authenticatio【B】2、paging【C】3、NAS safety【D】4、random access1173【题目】Which processes will go with the random access process?【正确答案】ABCD【A】1、handover【B】2、Service Request【C】3、Attach【D】4、Detach under the Idle status of RRC1174【题目】What paging processes are originated by the network?【正确答案】AB【A】1、S-TMSI paging【B】2、IMSI paging【C】3、C-RNTI paging【D】4、USIM paging1175【题目】The TAU process can be originated in the()state or process.【正确答案】ABD【A】1、RRC Idle【B】2、RRC Connected【C】3、detach【D】4、handover1176【题目】In the UE-initiated bearer modification procedure, the EPC may react with a bearer()procedure.【正确答案】ACD【A】1、establishment【B】2、refusal【C】3、modificatio【D】4、release1177【题目】In the establishment of a dedicated bearer, if the eNB does not receive an RRC Connection Reconfiguration Complete message, it().【正确答案】ABCD【A】1、sends an e-RAB Setup Response message with a list of failed e-RABs to the EPC【B】2、sends a UE Context Release Request message to the EPS【C】3、sends an RRC Connection Release message to the UE【D】4、sends a UE Context Release Complete message to the EPC.1178【题目】What are needed for coverage planning?【正确答案】A B C D【A】1、target coverage area【B】2、data of the existing network【C】3、frequency band in use【D】4、service type1179【题目】What are the output results of the link budget?【正确答案】C D【A】1、indoor coverage level【B】2、outdoor coverage level【C】3、cell radius【D】4、number of eNodeBs1180【题目】What are the main design ideas involved in the LTE link budget to meet various requirements?【正确答案】A B C D【A】1、calculate the uplink cell radius according to the uplink throughput【B】2、calculate the downlink cell radius according to the downlink throughput【C】3、calculate the uplink throughput according to the uplink cell radius【D】4、calculate the downlink throughput according to the downlink cell radius1181【题目】What factors are related to the SINR?【正确答案】A B C D【A】1、eNodeB equipment performance【B】2、radio environment【C】3、service quality【D】4、number of HARQ processes1182【题目】What factors are related to the receiver sensitivity of the eNodeB?【正确答案】A C D【A】1、thermal noise power【B】2、shadow fade【C】3、noise figure【D】4、SINR1183【题目】What must be considered in the calculation of the uplink MAPL in the link budget?【正确答案】B C【A】1、height of the antenna of the UE【B】2、transmit power of the UE【C】3、receiver sensitivity of the eNodeB【D】4、transmit power of the eNodeB1184【题目】What MIMO modes are supported on the current LTE uplink?【正确答案】A B【A】1、1x2【B】2、1x4【C】3、2x2【D】4、2x41185【题目】What factors are related to the handover gain?【正确答案】A B C D【A】1、handover hysteresis thresholds【B】2、connection delays【C】3、coverage probability targets【D】4、shadowing standard deviations1186【题目】What factors are related to the thermal noise power spectrum density?【正确答案】A C【A】1、Boltzmann constant【B】2、π【C】3、absolute temperature【D】4、valid bandwidth1187【题目】In calculating the MAPL, you should().【正确答案】B D【A】1、increase the Loss【B】2、decrease the Loss【C】3、increase the Margi【D】4、decrease the Margi1188【题目】What descriptions are correct about the interference margin in the uplink budget?【正确答案】B C【A】1、The uplink interference margin is the level of increment of the thermal noise caused by the interference of other users on this cell.【B】2、The uplink interference margin is the level of increment of the thermal noise caused by the interference of the neighbor cell.【C】3、The uplink interference margin of LTE is normally 3 dB currently.【D】4、The uplink interference margin of LTE is normally -3 dB currently.1189【题目】The antenna gain is expressed in ____ or ____.【正确答案】BC【A】1、dB【B】2、dBi【C】3、dBd【D】4、dBm1190【题目】In selecting the Okumura Kazakhstan or COST231 propagation models, you should consider().【正确答案】A【A】1、frequency band【B】2、height of the antenna of the eNodeB【C】3、height of the antenna of the UE【D】4、propagation environment1191【题目】The handover can be divided into()according to the triggering reasons?【正确答案】A B C D【A】1、coverage based handover【B】2、load based handover【C】3、service based handover【D】4、UE moving speed based handover1192【题目】The ___ and ___ parameters of the OMC system are used to determine whether the EUTRANintra-frequency/inter-frequency coverage-based handover is event-based or period-based.【正确答案】A B【A】1、IntraF handover Method【B】2、InterF handover Method【C】3、Intra-frequency handover Strategy【D】4、Inter-frequency handover Strategy1193【题目】What are the conditions for establishing the intra-frequency handover?【正确答案】A C D【A】1、After the RRC connection is established, the connection message is delivered with the first RRC reallocation message bearing the UE context setup message.【B】2、The UE enters the RRC_IDLE state.【C】3、After the UE is switched from one system to the EUTRAN【D】4、After the intra-frequency handover or inter-frequency handover1194【题目】When does the inter-frequency handover end?【正确答案】A C【A】1、after the A1 event is reported【B】2、after the A2 event is reported【C】3、when the status changes to RRC_IDLE【D】4、after the intra-frequency handover/inter-frequency handover1195【题目】If the ping-pong handover occurs too frequently, you can increase the()parameters to reduce the occurrence.【正确答案】ABC【A】1、Threshold【B】2、Hysteresis【C】3、Time to Trigger【D】4、Report On Leave1196【题目】What scenarios are the random access applicable to?【正确答案】A B C D【A】1、initial access in the Idle state of RRC【B】2、accessing a new cell after the handover【C】3、uplink data arrives when the uplink data are not synchronized【D】4、wireless link failure1197【题目】What signals are involved in the cell searching?【正确答案】A B C D【A】1、PSCH【B】2、SSCH【C】3、downlink Cell specific RS【D】4、BCH1198【题目】What NAS UE IDs may be carried in the Msg3 during the process of random access?【正确答案】A B【A】1、S-TMSI from the EPC【B】2、a random value between 0 and 2exp(40)-1【C】3、1 to 10【D】4、Temporary C-RNTI1199【题目】What Preamble Formats can be adopted by the LTE FDD system?【正确答案】A B C【A】1、Preamble Format 0【B】2、Preamble Format 1【C】3、Preamble Format 3【D】4、Preamble Format 41200【题目】Which three kinds of preamble codes are adopted for random access?【正确答案】A B D【A】1、Preamble GroupA【B】2、Preamble GroupB【C】3、Preamble GroupC【D】4、dedicated Preamble1201【题目】Which RNTIs are involved in the random access process?【正确答案】A B【A】1、RA-RNTI【B】2、Temporary C-RNTI【C】3、P-RNTI【D】4、SI-RNTI1202【题目】Which three parts are included in the random access response message (Msg2)in the initial attach process?【正确答案】A B C【A】1、TA【B】2、UL-Grant【C】3、Temporary C-RNTI【D】4、C-RNTI1203【题目】The commonly used units of antenna gain are()【正确答案】BC【A】dbm【B】dbd【C】dbi【D】db1204【题目】For an interference-limited LTE system, the recommended antenna techniques include().【正确答案】ABC【A】RANK=2 dual stream MIMO【B】RANK=1 single stream MIMO【C】RANK adaptation【D】transmit diversity1205【题目】In the dense urban area, the recommended antennas include().【正确答案】ACD【A】dual-polarized antenna【B】wide-band antenna【C】antenna with a horizontal half-power beamwidth of 60°-65°【D】antenna with a gain of 15 dBi-18 dBi1206【题目】The patterns of antennas can be divided into two types: omnidirectional and directional. Accordingly, the antennas with the two patterns are called()and().【正确答案】AB【A】omnidirectional antenna【B】directional antenna【C】plate antenna【D】intelligent antenna1207【题目】The antenna of an eNodeB may be().【正确答案】ABCD【A】horizontally polarized【B】vertically polarized【C】45°polarized【D】- 45°polarized1208【题目】The downtilt of an antenna may be one of the following:()【正确答案】ABCD【A】mechanical downtilt【B】fixed electrical downtilt【C】tunable electrical downtilt【D】remote adjustable electrical downtilt1209【题目】In the dense urban area, the directional antenna with a 3 dB beamwidth of()on the horizontal plane is often used.【正确答案】BC【A】30°【B】65°【C】90°【D】180°1210【题目】To ensure good coverage of a serving area, the deployed antenna should have functions such as()and().【正确答案】AB【A】side lobe suppression【B】null fill【C】fixed electrical downtilt【D】adjustable electrical downtilt1211【题目】The downtilt of an antenna depends on().【正确答案】ABCD【A】antenna height【B】coverage radius【C】antenna vertical beamwidth【D】electrical downtilt performance1212【题目】To maximize the coverage in areas such as suburban areas, rural areas, highways or sea surfaces, you can reduce the initial downtilt, allowing the()'s()to aim at the edge of the coverage area.【正确答案】AD【A】main lobe【B】side lobe【C】half power point【D】maximum gain point1213【题目】A wireless communication system is a().【正确答案】ABC【A】power limited system【B】interference limited system【C】bandwidth limited system【D】coverage limited system1214【题目】In a power-limited system, the technologies such as()are used to expand the coverage and overcome fading.【正确答案】AB【A】transmit diversity【B】receive diversity【C】MIMO【D】adaptation1215【题目】In collecting the requirements on network planning, the following information is very important or indispensable:().【正确答案】ABCD【A】site information provided by the operator【B】user capacity requirement and network construction strategy【C】target coverage area and key coverage area【D】spectrum allocation information of the operator1216【题目】The factors that affect the capacity of a site include().【A】equipment performance (system bandwidth, transmit power, UE type)【B】scheduling algorithm【C】environment and subscriber distribution【D】interference cancellation and MIMO1217【题目】Among the following descriptions, the incorrect ones are().【正确答案】BCD【A】Normally, link budget involves downlink budget and uplink budget. The budget of a small coverage radius is often selected for the single sector.【B】In link budget, any number of RBs or MCS level can be selected for a specific edge rate requirement only if the requirement on the rate is satisfied.【C】The more efficient is the spectrum utilization, the smaller is the capacity that the site can provide.【D】In capacity planning, it is normally required to use the theoretical peak rate of a single subscriber as the input to calculate the total capacity.1218【题目】In collecting the requirements on network planning, the()are not necessary.【正确答案】CD【A】requirements on coverage, capacity, and quality of the operator【B】usable frequency and bandwidth【C】name list of board members of the operator【D】local holidays1219【题目】For the LTE network of 2x20 MHz and in the dense urban area, which cell edge rate requirements are higher than the value specified by the protocol?【正确答案】ABC【A】150Mbps【B】50Mbps【C】20Mbps【D】1Mbps1220【题目】One entire network plan should include all parts of the telecom network, including().【正确答案】ABCD【A】core network【B】radio access network【C】transport network【D】ancillary product1221【题目】In network planning, the following factors shall be taken into account:().【正确答案】ABC【A】radio coverage requirement【B】subscriber's traffic type and profile【C】interference from other radio access networks【D】operator's charging policy1222【题目】In network planning, the following simulation results shall be exported normally:().【A】RSRP Coverage【B】RSCP Coverage【C】SINR(or C/I)Coverage【D】downlink throughput1223【题目】The()teams should take part in making the pre-sales network planning strategy.【正确答案】ABCD【A】R&D: equipment performance, new technology,etc【B】marketing: equipment type, application scenario【C】commerce: quote strategy【D】project: apply and maintenance difficulty1224【题目】In order to define clutter (eg, DU/U/SU/R)boundary as precise as possible, which methods are used?【正确答案】BCD【A】adjust clutter boundary based on plan and simulation result, just make coverage be compliant with the contract requirement.【B】refer to Google Earth photograph【C】refer to clutter distribution in electric map【D】refer to 2/3G site distribution and density in current network1225【题目】The information such as()will have an imapct on the link budget result.【正确答案】ABCD【A】UE type【B】equipment type and RRU position【C】antenna type【D】antenna height1226【题目】Which of the following statement are correct?【正确答案】ABD【A】Signing contact as the dividing line, network plan can be diveded to pre-sales plan and after-sales plan【B】network plan level determines the level that optimization can reach【C】network plan defeciency can be made up in optimization phase, so network optimization if more important 【D】mobile communication network starts from plan, developed from optimization and emphasis on process1227【题目】According to project types, the sites to be surveyed can be divided into:【正确答案】AB【A】site that can be provided【B】planned site【C】upgraded site【D】site for capacity expansion1228【题目】The roles involved in a site survey include().【正确答案】ABCD【A】survey engineer【B】network planning engineer【D】simulation manager1229【题目】The necessary conditions for site construction in suburban area or rural area include:【正确答案】ABC【A】The main power supply is reliable.【B】The environment is safe.【C】The transportation is convenient.【D】The site is near the operator's service office.1230【题目】Before a site survey, you should prepare().【正确答案】BC【A】a frequency sweeper【B】a GPS【C】a compass【D】a telescope1231【题目】In site selection, you must consider factors such as().【正确答案】ABCD【A】economical cost【B】site construction condition【C】traffic density distribution【D】field strength coverage1232【题目】About the height of the antenna, the correct descriptions are().【正确答案】ABCD【A】The height of the antenna in the dense area must be 10 meters higher than that of the surrounding building.【B】The height of the antenna in the non-dense area must be 15 meters to 20 meters higher than that of the surrounding building.【C】If the height of the antenna is too low, coverage holes are likely to produce.【D】If the height of the antenna is too high, the antenna brings strong interference to the surrounding space.1233【题目】Which descriptions are correct about the requirements of GPS installation?【正确答案】BCD【A】The distance of GPS wiring cannot be longer than 30 meters.【B】The stereo angle of the GPS cannot be less than 90 °.【C】There must be no obvious obstacle or shelter around the GPS.【D】There is a place to set up the GPS antenna.1234【题目】What must be provided in the descriptions of the surrounding environment of the site in site survey?【正确答案】ABD【A】geomorphic characteristics【B】interference situation【C】climate【D】key coverage area【正确答案】ABCD【A】site name【B】longitude and latitude【C】Whether the eNodeB shares a site with a base station of another systems or not【D】the existing site type1236【题目】In the four steps of site planning, the fourth step exports the following:【正确答案】BC【A】planned site survey SOW (Statement Of Works)【B】eNodeB information table【C】site survey report template【D】planned site survey plan1237【题目】The compass is mainly used to()in a site survey?【正确答案】CD【A】measure the position【B】measure the grade of the inclined plane【C】measure the height of the antenna【D】measure the longitude and latitude of the site1238【题目】The main functions of GPS are:【正确答案】ABCD【A】measuring the longitude, latitude, and altitude height of the site【B】measuring the current time【C】measuring the current speed in movement status【D】calculating the azimuth, distance, and miles passed from the current position to the navigation point1239【题目】About antenna selection, the correct descriptions are().【正确答案】AB【A】Normally, there are more high buildings or high objects with reflection in the urban area or places with special topology or terrain. Thus, there are much reflection and multi-path phenomena and the antenna with horizontal half-power angle of 65°is always used to reduce the interference to other eNodeBs to the minimum degree.【B】In the suburb areas and towns where are sparsely populated, directional antennas with larger gains can be used to ensure coverage when the terrain is relatively flat.【C】Normally, there are more high buildings or high objects with reflection in the urban area or places with special topology or terrain. Thus, there are much reflection and multi-path phenomena and the antenna with horizontal half-power angle of 90°is always used to reduce the interference to other eNodeBs to the minimum degree.【D】In the suburb areas and towns where are sparsely populated, omnidirectional antennas must be used to ensure coverage when the terrain is relatively flat.1240【题目】In site survey and selection, follow the principles below:().【正确答案】ABCD【A】Do not select a site near a high-power radio transmitting station, radar, or other objects with strong interference. If you have to do that, you must perform the interference field strength test.【B】When selecting a site among buildings in urban area, avoid the area with high buildings nearby or to be constructed that【C】Do not select a site on high mountains. A high site in urban area has large interference range effecting the frequency multiplexing. A high site in suburb area or rural area does not cover towns located in small basins well.【D】Do not select a site in the forest. If you have to do that, let the antenna of the site be higher than tops of trees.1241【题目】The map format supported by CNT-FL include()【正确答案】ABC【A】TAB【B】GTS【C】indoor map【D】Google1242【题目】The CNT-FL supports data tests such as().【正确答案】ABCD【A】FTP【B】HTTP【C】Ping【D】TCPUDP1243【题目】In overshooting analysis with the CNA-FL, the parameters()are required.【正确答案】ABCD【A】RSRP Threshold【B】Distance【C】Shoot Points N【D】Shoot Points Ratio1244【题目】The single site test can be used to detect several types of problems, including().【正确答案】ABCD【A】call dorps caused by network coverage defects【B】access failures caused by network coverage defects【C】call drops caused by equipment function defects【D】access failures caused by equipment function defects1245【题目】Before a single site test, the following preparations must be done:().【正确答案】ABCD【A】Check the site status【B】Check equipment hardware alarms【C】Check site parameter configuration【D】Prepare the radio parameter planning table1246【题目】( )must participate in the single site test.【正确答案】ABC【A】engineering personnel【B】network optimization engineer【C】OMC engineer【D】core network engineer。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
The Node Monitoring Component of a Scalable Systems SoftwareEnvironmentSam Miller and Brett BodeDepartment of Electrical andComputer EngineeringIowa State UniversityScalable Computing LaboratoryAmes Laboratory,U.S.DOEAmes,Iowa50011Email:{samm,brett}@AbstractWe describe Fountain,an implementation of the Scalable Systems Software node monitor specification targeted at aggregate node monitoring for clusters. Fountain is designed from the ground up as a hier-archical system with scalability in mind.It leverages widely used technologies such as XML and HTTP to present an interface to other components in the SSS en-vironment.In this paper we describe the design choices of Fountain and discuss some preliminary performance measurements on medium sized clusters.1IntroductionThe Scalable Systems Software(SSS)center[7]is a multi-institutional initiative to design and build com-ponent based cluster management software to more ef-fectively utilize terascale computational resources.The goal of the center is to develop open source compo-nents that work effectively on small and large scale systems.As computational resources grow beyond to-day’s teraop class systems into future petaop and be-yond systems,scalability problems must be solved to utilize these resources to their full potential.Fault-tolerance,reliability,manageability,and ease of use for both system administrators and users is a key goal of the SSS project.Presently,the SSS project has defined interfaces and created reference implementations for a variety of components.The interface for each compo-nent is publicly documented since it is unlikely that every component willfit the needs for every installa-tion site.In this paper we present the design of a node mon-itoring component called Fountain.Section2presents some background and motivation for designing this component.Section3gives an overview of existing node monitoring tools.Section4describes the inter-face to a node monitor and what services Fountain pro-vides.Section5discusses the design choices and im-plementation of Fountain.Section6gives results for the test environments.Section7proposes some future work to add new features to stly,section 8concludes this paper.2Background and MotivationSystem level monitoring is an important part of clus-ter management.As computational resources scale into the thousands of nodes per system domain,the failure rate for individual components will increase.Detecting these component failures before they happen requires an accurate snapshot of the cluster’s status so the sys-tem administrator and other system components can act appropriately.Presently,node monitoring for a wide number of clusters is extremely primitive.The most often used method is the ping command,which does little more than tell the administrator if a node is physically connected and powered on.It still may be unusable,or unreachable due to a number of problems. In the event the ping command fails,the typical solu-tion is to reboot the node,potentially destroying any temporary logs or event traces that preceded the fail-ure.This methodology is inefficient for even medium sized clusters.As clusters continue to increase in size, effective monitoring of system and node information will be required.Fountain has three distinct design goals in order to be a reliable,accurate,and effective node monitor. First,it should be fault tolerant in the sense that it should handle both individual and multiple node fail-ures.In this context a node failure is defined as a loss of power,kernel panic,or a similar loss event.The sec-ond design goal of Fountain is that it should have a low memory footprint and processing requirements for each node.Monitoring perturbation is an unavoidable side affect of any performance monitoring system,howeverFountain strives to reduce this as much as possible. The third andfinal design goal is Fountain should be able to effectively scale to next generation computa-tional resources containing thousands of nodes.The motivation to design Fountain came from the need to provide the cluster scheduler of the SSS envi-ronment with an accurate snapshot of each node’s sta-tus.The cluster scheduler requires this information so user jobs can be scheduled and run accordingly.This is why fault tolerance is the primary and most important design goal of Fountain.In order to reliably provide the scheduler with accurate information,Fountain needs to be able to both recognize and recover from individual and multiple node failures in an efficient,reliable,and effective manor without adversely affecting the system. 3Prior WorkMany monolithic resource management systems in-clude basic monitoring capabilities.Products such as the Portable Batch Scheduler,LoadLeveler,Platform LSF,and the Sun Grid Engine all provide monitoring interfaces for cluster administration.While these sys-tems all provide adequate monitoring features,many are not capable of interfacing with the existing SSS components shown in Figure1without modifications.Supermon is a tool for scalable and high speed clus-ter monitoring.It is split into three separate com-ponents,a kernel module for providing the monitored data on each node,a server daemon on each node,and a data aggregator to present a single cluster image to clients.It relies on symbolic expressions for commu-nication between components in order to reduce node perturbation when parsing messages[6].One drawback to Supermon is that it does not provide memory usage information or node state information.It also does not interface with a cluster scheduler.Ganglia is a scalable distributed monitoring sys-tem targeted towards clusters,grids,and planetary-scale systems[3].It relies on a multicast-based lis-ten/announce protocol to monitor cluster-wide state information While this approach allows easy setup,it imposes the requirement of having a functionallocal-ServiceDirectoryEventManagerNodeMonitorProcessManager AccountingInterface to allother componentsponents of the Scalable Sys-tems Software Projectarea IP multicast network in place.Unlike Fountain, Ganglia is not explicitly designed to interface with a cluster scheduler.However,commercial resource man-agement packages such as Moab[4],or the open source variant Torque[9],can provide interfaces to the data monitored by Ganglia.Ganglia also provides detailed historic usage information by utilizing the RRDtool.4Node Monitor InterfaceThe primary user of the Fountain node monitoring component is the cluster scheduler.There are other users,mostly for administrative purposes,which will not be discussed further in this paper.The interface Fountain presents to its outside users is fairly straight-forward.The system wide Service Directory compo-nent handles registration and de-registration requests for all components of the Scalable Systems Software en-vironment.After a component registers itself with the Service Directory,other components can query the Ser-vice Directory and ask which port and what protocol a particular component has registered.Upon initializ-ing itself,Fountain registers a port(ex:9100)and a protocol(ex:SSSRMAP)with the Service Directory.The Scalable Systems Software Resource Manage-ment and Accounting(SSSRMAP)message format de-fines a request-response syntax based on top of the HTTP protocol[1].It is suitable for a connection ori-ented,XML based,application layer client-server pro-tocol for interaction with other SSS components.Foun-tain uses the SSSRMAP message format and wire pro-tocol,together with the SSS Node Object specification to create its interface to other components.Figure1 shows some of the other components and their common<Envelope><Body actor="samm"><Request action="Query"><Data></Data><Object>Node</Object><Get name="NodeId"></Get><Get name="NodeState"></Get><Where name="NodeState"op="eq">down</Where></Request></Body></Envelope><Envelope><Body actor="root"><Response action="Query"><Count>2</Count><Total>34</Total><Data name="NodeList"type="xml"><Node><NodeId>m20</NodeId><NodeState>down</NodeState></Node><Node><NodeId>m34</NodeId><NodeState>down</NodeState></Node></Data><Status><Value>Success</Value><Code>000</Code><Message>2node(s)found</Message></Status></Response></Body></Envelope>Figure2.Example SSSRMAP node monitorquery and responseinteractions with one another in the SSS environment.Fountain is very extensible with respect to the data it can return in response to a query.When any client queries the Fountain server,they can supply an op-tional Where element and indicate an operator such as gt,lt,eq,ne,le,ge,or like for regular expres-sion matching.In this fashion the cluster scheduler can query the Fountain server for all nodes matching the particular parameters requested by a user for their par-allel job.It is also useful for a system administrator to query the Fountain server for all nodes with a state of down.A sample SSSRMAP node query request and re-sponse message is shown in Figure2.The query asks Fountain to return a response with the nodes that have a state of down.The response message indicates there are2out of34nodes with a state of down.5Design of FountainFountain consists of three separate components,the Fountain server,the master Fountain daemon,and the slave Fountain daemons.Each component is a separate process that communicates with the other Fountain components using XML messages over sockets.The Fountain server is responsible for aggregating together all of the current node statistical information and mak-ing it available to other SSS components using the in-terface described in the previous section.The master Fountain daemon is responsible for maintaining an ac-curate topology of slave Fountain daemons.The slave Fountain daemons do the actual monitoring work,they are responsible for monitoring their specific node in the cluster and promptly reporting neighboring Fountain daemon failures.The master and slave Fountain pro-cesses are daemons in the sense that they are expected to run forever with little or no user interaction.A Fountain system starts life by executing the mas-ter Fountain daemon and the Fountain server on the head node of a cluster.The second step is to execute a slave Fountain daemon on all the other nodes in the cluster.This step does not need to be fast since it only happens once.Typically the best method to accom-plish this is to launch a slave Fountain daemon with an initialization script during the node boot process.For smaller clusters the slave daemons can be launched by hand using ssh,telnet,or a similar method.5.1Slave Fountain DaemonA slave Fountain daemon is very simple.It consists of a process running on each node of a cluster with two purposes.Thefirst is to collect the static and dynamic usage information for the node it is running on,and the second is to report neighboring Fountain daemon failures in a timely fashion.In the current implemen-tation,Linux is the only supported architecture for the slave Fountain daemons because the required monitor-ing information can be found in the/procfile system. The interface to gather the monitoring information is abstract enough that it will be trivial for Fountain to support other operating systems in the future.The in-formation collected by each daemon is the amount of configured memory and swap space,amount of avail-able memory and swap space,CPU usage,CPU archi-tecture,and node operating system.When a slave Fountain daemon starts,it performs some initialization work that opens a listening socket for incoming connections.Then it attempts to connect to the master Fountain daemon,after which it enters what is essentially an infinite loop.Inside this infi-nite loop,a system call to select waits for an incom-ing connection on the listener socket or for incoming data on an existing socket.If there are no incoming connection requests,or data waiting to be read on ex-isting sockets,the slave Fountain daemons essentially do nothing.They only collect node information when requested to.That is,the Fountain server pulls data from the Fountain daemons rather than the daemons pushing the data.slave Fountain daemon pulse responsepulse requestFigure3.The three purposes of the pulse re-quest and response messages.A slave Fountain daemon has a persistent connec-tion to its parent node and persistent connections toany number of child nodes.The number of child con-nections for each Fountain daemon depends on its lo-cation in the Fountain tree topology,which will be ex-plained in the next section.Slave Fountain daemonsrespond to request messages received from their parentnode.An example request is a query message,whichinstructs the daemon to gather its node statistical in-formation.Slave Fountain daemons also expect to re-ceive two types of messages from their child nodes,apulse request or a zero length message.If a zero lengthmessage is received from either the parent connectionor any of the child connections,the slave Fountain dae-mon assumes that neighboring node has failed and itreports the failure to the master Fountain daemon.Pulse messages serve three purposes,they are shownin Figure3.Thefirst purpose,in Figure3a,happenswhen a parent daemon periodically sends its childrena pulse request.When a child receives this message,itknows the parent is alive and well.The second pulsemessage purpose is shown in Figure3b,when a par-ent daemon dies unexpectedly and the remote socketis not closed.This could happen due to a kernel panic,an unplugged network cable,or any number of otherreasons.In this case,the child will send a pulse re-quest to its parent.If it does not receive a response,the parent is assumed to be lost and handled as previ-ously mentioned.The third purpose is shown in Figure3c,when the parent daemon has not sent its children amessage during a predefined time interval but it’s stillalive.In this case,the children will send a pulse re-quest to their parent and it will respond with a pulseresponse indicating it’s still alive.5.2Master Fountain DaemonA Fountain system consists of a single master Foun-tain daemon,typically running on the head node of acluster.The master daemon is similar to the slavedae-Figure4.Example Fountain tree topology us-ing3children per nodemons,except it has the added requirement of maintain-ing an accurate topology of slave Fountain daemons inorder to facilitate fast node queries.To achieve maxi-mum scalability,we chose to use an n-ary tree topologyto manage the slave Fountain daemons instead of othertopologies such as a ring or a star[2].Figure4showsan example ternary Fountain tree topology.Section6will present some initial conclusions about the optimalnumber of children for each node based on node queryperformance results.When the master Fountain daemon starts,it opensa listening socket and waits for incoming connections.When a slave Fountain daemon connects to the masterdaemon,they initiate the tree establishment algorithm.This algorithm uses a three way handshake to intro-duce new slave Fountain nodes daemons the tree topol-ogy.After receiving the initial connection request,themaster daemon looks up the next available parent dae-mon in its tree topology data structure.An availableparent node is defined as thefirst node in the topologywith less than the maximum number of children.Themaster daemon then sends a join response containingthe hostname and listening port of the parent daemonthis slave daemon should connect to.After receiving the join response,the slave Foun-tain daemon attempts to join the parent daemon spec-ified by the master daemon.When this connection issuccessful,the slave daemon responds to both its newparent daemon and the master daemon with a join-ackresponse and closes its connection to the master Foun-tain daemon since its no longer necessary.The masterFountain daemon then appends the newly joined slavedaemon to its tree topology data structure and incre-ments the number of children for its parent daemonTimeFigure5.Fountain tree establishment mes-sage sequenceby one.The sequence of messages exchanged betweenthe master Fountain daemon,a slave Fountain daemonalready in the tree topology,and a slave Fountain dae-mon that is attempting to join the tree topology isshown in Figure5.The Fountain tree topology is designed as a completen-ary topology.This means each entry has at most nchildren,and all the levels of the tree are full exceptfor the bottom level,which isfilled from left to right.Equations1and2can be used to locate the parent ofnode b,or child a of node b.The result of each equationis an index into the tree topology data structure.Notethat a can have values between0and n-1inclusive.parent= (b−1)/n (1)child=n∗b+a(2)In addition to the tree establishment algorithm,the master Fountain daemon uses two additional algo-rithms to maintain the the topology of slave Fountaindaemons.The tree recovery and rebuilding algorithmsare used to recover the tree topology in the event ofnode failures.In this context,a node failure is definedas an event that causes the slave Fountain daemon tonot respond to request messages.How the node fail-ure happens is not necessarily important,just that thesystem of Fountain daemons can handle such an event.The tree recovery algorithm used by Fountain isbased on the work in[2].When a slave Fountain dae-mon in the tree topology fails,both its parent dae-mon and child daemons notice the failure when theirsocket connection to that daemon is closed unexpect-edly.They will then attempt to report this daemonfailure to the master Fountain daemon.Upon receivinga lost daemon request,the master daemon will tran-sition the tree state from idle to recovery.Once inthe recovery state,the master daemon rejects all otherrequests except for additional lost daemon requests.That is,when the Fountain server sends a node queryto the master daemon while the tree topology is in re-covery state,it will receive an error response indicatingthe tree topology is recovering from a failure.Requeststo join the tree topology are also rejected by the masterFountain daemon when the tree topology is recovering.After initially entering the tree topology recovery state,the master daemon marks the failed daemon as lost andwaits for all of the lost daemon’s neighbors to reportthe failure.After all of the failed daemon’s neighborshave contacted the master Fountain daemon to reportthe failure,the master daemon selects a replacementdaemon from the tree topology.To minimize the num-ber of slave Fountain daemons affected by this recoveryalgorithm,the replacement daemon is always the lastFountain daemon to join the tree topology.After thereplacement daemon successfully joins the failed dae-mon’s parent,the master Fountain daemon informs thefailed daemon’s children to join the replacement dae-mon.The master daemon then sets the tree state backto idle so query requests can be processed.If multiple nodes fail at or near the same time,themaster Fountain daemon will accept thefirst lost noderequest and reject all subsequent requests by inform-ing the daemon that reported the failure to try againlater.Clearly this could cause a race condition if a sin-gle slave daemon has both its parent and one or moreof its children fail concurrently.This race condition ismitigated by using a timer when the master Fountaindaemon initially transitions to the tree topology recov-ery state.If the timer expires before all of the neigh-boring Fountain daemons have reported the failure,themaster daemon transitions from the tree topology re-covery state to the tree topology rebuild state.Oncein the rebuild state,the master daemon closes all of itschild connection sockets and responds to all lost noderequests by telling the slave Fountain daemons report-ing node failures to rejoin the master Fountain daemon.After receiving a rejoin response when reporting a lostnode request,a slave Fountain daemon will close all ofits child connections and attempt to rejoin the masterFountain daemon.This process happens recursivelyuntil the entire tree topology is rebuilt.The tree recovery algorithm is shown in Figure6in the event of a single node failure where each nodein the tree has a maximum of three child nodes.Theresulting tree topology after the recovery would havenode4replaced by node16.Nodes13,14,and15would be children of node16.Up until this point,we have only discussed failuresof the slave Fountain daemons.It is possible for themaster Fountain daemon to fail as well.This will bedetected by the master daemon’s direct children.Sinceeach slave daemon has no knowledge if its parent is the1234567891011master Fountain daemon slave Fountain daemon permanent connectionlost parent request lost child request new parent requestFigure 6.Fountain tree topology recovering from a single node failuremaster daemon or another slave daemon,they attempt to connect to the master daemon and report its own failure.Obviously this will not succeed since the mas-ter daemon has failed and cannot accept connections.When the master daemon eventually returns,its for-mer children will connect successfully and attempt to report the failure.The master daemon responds to this request by informing the slave daemon to rejoin the tree topology.This process is essentially the same as the tree rebuilding algorithm.After being told to rejoin the tree,the slave daemons that reported the master daemon failure will rejoin the master daemon and close their child connections.Their children,in turn will attempt to report their failure,which will cause the master daemon to inform them to rejoin the tree.5.3Fountain ServerThe Fountain server is the most important compo-nent of the Fountain node monitoring system since it presents a single system view of the cluster to clients.After starting the Fountain server,it opens a listen-ing socket for client requests and enters its main loop.Inside the main loop it attempts to connect to the mas-ter Fountain daemon.This connection is persistent,so it onlyhappensonce.Aftersuccessfullyconnecting,itsends the master Fountain daemon a query request message at a user configurable interval.After sending the query request message,the Fountain server waits for the query response from the master Fountain dae-mon.This query response will contain the node sta-tus information from each node in the Fountain tree topology.The Fountain server maintains a node mon-Figure 7.Query request &responseitor data structure to keep track of all the information for each node in the cluster.This data structure is updated after receiving and parsing a node query re-sponse.The node query request and response message sequence between the Fountain server,and all of the Fountain daemons is shown in Figure 7.Also inside its main loop,the Fountain server accepts incoming client connections and responds to their requests.These con-nections are transient,so they are closed after sending the response message.Since the primary client of the Fountain server is the cluster scheduler,accurate node state information is imperative for the scheduler to operate effectively.To fulfill this requirement,Fountain will change a node’s state to down if it does not respond to a query request.Only after the node comes back online and the Foun-tain daemon for that node responds to a query request,will the node’s state be changed back to Up .When the master Fountain daemon receives the query request from the Fountain server it immediately forwards the request to each of its children and then waits to receive a response from them.This process happens recursively for each slave Fountain daemon as well.The slave Fountain daemons that are the leaf nodes of the tree topology have no children,and will immediately respond to the query request with their node status information.When their parent daemons receive a query response from each of their child dae-mons,they append their node status information to-gether with each child response and send the response to their parent daemon.When the master Fountain daemon receives query response messages from each of its children,it appends its node status information and sends the response to the Fountain server.A race condition exists if a node in the cluster failsbefore the query request message has reached the slaveFountain daemon running on that node.This hap-pens due to the use of a blocking read after the master Fountain daemon sends the query request message to its children.When a slave Fountain daemon in the tree topology fails,its neighboring daemons will at-tempt to report this failure to the master Fountain daemon.Since the master daemon is a single threaded application,it cannot respond to the node failure re-quest and wait for the node query response at the same time.This race condition is handled by the addition of a timeout when the master daemon is waiting for query response messages from each of its children.If the timeout period has elapsed before receiving a query response from one of its children,the master Fountain daemon will abort the node query request and send a response with a failure error code to the Fountain server.Then it will handle the node failure request and recovery the tree topology using the tree recovery algorithm.6ResultsIn this section we present test results from two medium sized Linux clusters.Thefirst test environ-ment is4pack,a cluster of34PowerPC G4Macintosh computers running Debian Linux and connected by a high speed Myrinet network for intra-node communi-cation and fast ethernet for management.The second test environment is Scink,a64node dual-processor AMD Athlon MP2200cluster running Debian Linux and connected with a2D SCI network and fast ether-net.6.1Query PerformanceThe primary design goal of Fountain is to maintain an accurate tree topology in the presence of node fail-ures.Performing fast and efficient node queries is a secondary goal.To do this the Fountain daemons are arranged in a n-ary tree topology as described previ-ously.The results from performing node queries on a variety of Fountain configurations are shown in Ta-bles1and2.Figures8and9show a graph of these two tables.To achieve larger configurations than34 Fountain daemons on4pack or64Fountain daemons on Scink,multiple slave Fountain daemons were run on a each node in the cluster.The time represented for each query is measured as the time it takes the Fountain server to send the master Fountain node a query message,receive the query response,and process the response message.They are measured in millisec-onds and represent an average of three separate nodeTable1.Elapsed node query time on4pack(milliseconds)System Size Binary Ternary4-ary5-ary 34140.0797.3295.886.0167189.88180.04154.85157.09100289.28213.05225.32212.24133370.07308.05304.31225.34199559.38478.68407.06417.11265675.85564.34488.31552.37 Table2.Elapsed node query time on Scink(milliseconds)System Size Binary Ternary4-ary5-ary 65106.92125.3193.8698.10129195.65207.85151.32147.13257443.78462.12331.67267.52512721.96682.11543.56550.49769985.291067.4901.45607.8310251112.151034.68972.51898.02queries.On both4pack and Scink the results show nearly linear scaling.More-so on4pack than Scink,which is probably because Scink is used as a production clus-ter for computational chemists so CPU usage was not as low as4pack when these test results were collected. The query time results are favorable in the sense they show Fountain is capable of scaling to larger system configurations without adversely affecting the time it takes to query every node in the cluster.These results show that Fountain is capable of querying and process-ing the results for a cluster with up to1,025nodes in less than one second.If faster monitoring speed is de-sirable for a particular installation site,Fountain can be extended to act as a wrapper around a more spe-cialized monitoring component like Supermon[6]and present its data using the SSS interface.。