Design of Routing Tables for a Survivable Military Communications Network using Genetic Alg
SAP各模块事务码+PP
事务码描述(中英文)C201Create Master Recipe 创建主配方C202Change Master Recipe 更改主配方C203Display Master Recipe 显示主配方C210Delete costing ind. for operations 删除工序的成本核算指示符C211Delete "flexible duration" in oper.s 在工序中删除 "可变持续期"C251Print Master Recipes 打印主配方C260Recipe Development on Time Basis 以时间为基础的配方发展C261Change Document Display Master Rec. 更改文档显示主记录C298Delete Master Recipes 删除主配方C299Archive Master Recipes 归档主配方C2N2Number ranges master recipe 主配方编号范围CA00Routing Menu 工艺路线菜单CA01Create Routing 创建工艺路线CA02Change Routing 更改工艺路线CA03Change Routing 更改工艺路线CA10Std. Text for Task List/Order 任务清单/订单的标准文本CA11Create Reference Operation Set 生成参照工序集CA12Change Reference Operation Set 修改参考工序集CA13Change Reference Operation Set 修改参考工序集CA21Create rate routing 生成定额工艺路线CA22Change rate routing 更改基于节拍的工艺路线CA23Display rate routing 显示定额工艺路线CA31Create reference rate routing 生成参照定额工艺路线CA32Create reference rate routing 生成参照定额工艺路线CA33Display reference rate routing 显示参照定额工艺路线CA51Print Rtg/Ref.Op.Set, Fields Fixed 打印工艺路线/参照工序集,固定字段CA60Changes in Routings/Ref. Op. Sets 工艺路线/参照工序集的更改CA61Change Documents for Routing 工艺路线的更改文档CA62Documents for Ref. Op. Sets 参照工序集文档CA63Change documents for rate routings 更改定额工艺路线文档CA64Change documents for ref. rate rtgs 更改参考定额工艺路线文档CA70PRT Where-Used Lists PRT 使用处清单CA72PRT Where-used Lists: EquipTL Types PRT 使用处清单: 设备任务清单类型CA73PRT where-used list in works 库网络中的 PRT 使用处清单CA75Mass Replace PRT 大量替换 PRTCA77Bulk Replacemt PRT: Equip.TL Type 大量替换 PRT:设备任务表类型CA78PRT Mass replacemt. in works 库网络中的大量 PRT 替代CA80Use of Work Center in Task Lists 使用任务清单中的工作中心CA81Master recipe usage and resources 主配方用途和资源CA82Where-used Lists EQUI Work Center 使用处清单EQUI工作中心CA83Work center where-used - work 工作中心何处使用- 库网络CA85Replace Work Center in Task Lists 在任务清单中替代工作中心CA86Master recipe: replace resources 主配方: 替换资源CA87Mass Replace EQUI Work Center 大量替换 EQUI 工作中心CA88Mass replace wrk. cntr. in wk 在库网络中大量替换工作中心CA90Use of Ref. Op. Set in Task Lists 使用任务清单中的参照工序集CA95Replace Ref. Op. Set in Task Lists 在任务清单中替代参照工序集CA96Update material master 更新物料主文件CA97Mass scheduling using mat. master 使用物料主档的大量计划CA98Deletion of task lists 任务清单的删除CA99Archiving of task lists 任务清单的归档CAA0Process instr. usage in recipes 工艺指令在配方内的应用CAA5Mass replace proc.instr. in mst.rcp. 大量替换在主配方中的工艺指令CAC0Master recipe menu 主配方菜单CACC Master recipe: Update settings 主配方: 更新设置CACP Transfer C tables to routing 传输 C 表到工艺路线CANM Number range maintenance: ROUTING_M 编号范围维护: ROUTING_M CANR Number range maintenance: ROUTING_R 编号范围维护: ROUTING_R CM00能力计划菜单能力计划菜单CM01Cap. planning, work center load 能力计划,工作中心负荷CM02Capac. planning, work center orders 能力计划,工作中心订单CM03Capac. planning, work center pool 能力计划,工作中心存储CM04Capac. planning, work center backlog 能力计划, 工作中心未交付订单CM05Capacity planning: Overload at WkCnt 能力计划:工作中心超负荷CM07Cap. planning: Variable access 能力计划:变量访问CM0X Capacity planning 能力计划CMCE Copy Table Contents ResourcePlanning 复制表内容资源计划CMCY Copy table entries, capacity planng. 复制表条目, 能力计划CMRP MRP MRPCMS1Create set (PPC) 创建集(PPS)CMS2Change Set 更改集CMS3Display Set 显示集CMS4Delete Set 删除集CMV1Create variable 生成变量CMV2Change variable 更改变量CMV3Display variable 显示变量CMV4Delete value variable 删除值变量CN61Chg. doc. for library networks 更改库网络文档CNR1Create Work Center 生成工作中心CNR2Change Work Center 更改工作中心CNR3Display Work Center 显示工作中心COR9Material types for master recipe 主配方的物料类型CR00Resource Planning Menu 资源计划菜单CR01Create Work Center 生成工作中心CR02Change Work Center 更改工作中心CR03Display Work Center 显示工作中心CR04Test Work Center Formulas 测试工作中心公式CR05Work Center List 工作中心清单CR06Work Center Assignment to Cost Ctr 工作中心分配到成本中心CR07Work Center Capacities 工作中心能力CR08Work Center Hierarchy 工作中心层次CR09Task list reference text 任务清单参照文本CR0C Work centers current settings 当前工作中心的设置CR10Work center change documents 工作中心更改文档CR11Add Capacity 增加能力CR12Change capacity 更改能力CR13Display Capacity 显示能力CR15Capacity where-used 能力反查CR21Create Hierarchy 创建层次CR22Change Hierarchy 更改层次CR23Display Hierarchy 显示层次CR24Create Resource Network 创建资源网络CR25Change Resource Network 更改资源网络CR26Display Resource Network 显示资源网络CR31Create Hierarchy 创建层次CR32Change Hierarchy 更改层次CR33Display Hierarchy 显示层次CR40Work center usage in deleted object 被删除对象中工作中心用途CR41Archiving work centers 归档工作中心CRA1PP: Archiving work centers PP:归档工作中心CRA2PP: Archiving delete work centers PP:归档删除工作中心CRA3PP: Archiving work cntr maintenance PP:归档工作中心维护CRAA Display Work Center 显示工作中心CRAH Create Work Center 生成工作中心CRAV Change Work Center 更改工作中心CRC1Create resource 创建资源CRC2Change resource 更改资源CRC3Display resource 显示资源CRC4Change default resource 更改默认资源CRCC Current settings - resources 当前的设置 - 资源CRNA Number Range Maintenance: CR_ARBPL 编号范围维护: CR_ARBPL CRNH Number range maintenance: CR_HIERAR 编号范围维护: CR_HIERAR CRNK Number Range Maintenance: CR_KAPA 编号范围维护: CR_KAPA CRT0Copy C Tables Work Center 复制 C 表格工作中心CRT1Work Center Options in Rel. 2.1A 版本 2.1A 中的工作中心选项CRT2Settings Work Center Rel. 2.2a 设置工作中心版本 2.2aCRT3Upload C Tables Resource 3.0a 装载 C 表资源 3.0aCRT4Field selection transfer settings 字段选择传送设置CTOB Object overview: Table entries 对象总览:表项CWBPP PP: Engineering Workbench PP: 工程工作台IR00PM Resource Planning Menu PM 资源计划菜单IR01Create Work Center 生成工作中心IR02Change Work Center 更改工作中心IR03Display Work Center 显示工作中心LPRO Material Forecast Menu 物料预测菜单MD00MRP : external procurement MRP:外部采购MD01MRP Run MRP运行MD02MRP - Single-item, Multi-level - MRP - 单项, 多级 -MD03MRP-Individual Planning-Single Level MRP-单个计划-单个级MD04Display Stock/Requirements Situation 显示库存/需求状况MD05Single Display MRP List 单一显示MRP清单MD06MRP List Collective Display MRP清单集中显示MD07Current material overview 当前物料一览MD08Reorg. MRP Lists 重新组织MRP清单MD09Pegging 标记MD11Create Planned Order 建立计划订单MD12Change Planned Order 改变计划订单MD13Display Planned Order 显示计划订单MD14Individual Conversion of Plnned Ord. 计划订单的个别转换MD15Collective Conversion Of Plnd Ordrs. 计划订单的集中转换MD16Collective Display of Planned Orders 计划订单的集中显示MD17Collective requirements display 汇总需求显示MD19Firm Planned Orders 确定的计划订单MD20Create Planning File Entry 创建计划文件条目MD21Display Planning File Entry 显示计划的文件条目MD25Create Planning Calendar 创建计划日历MD26Change Planning Calendar 更改计划日历MD27Display Planning Calendar 显示计划日历MD40MPS MPSMD41MPS - Single-item, Multi-level - MPS - 单项, 多层 -MD42MPS - Single-item, Single-level - MPS - 单项, 单层 -MD43MPS - Single-item, Interactive - MPS - 单项, 交互 -MD44MPS Evaluation MPS评估MD45MRP List Evaluation MRP清单评估MD46Evaluation MRP Lists of MRP Contller MRP控制者的评估MRP清单MD47Product Group Planning Evaluation 产品组计划汇编MD48Cross-Plant Evaluation 工厂间汇编MD4C Multi-Level Order Report 多级别订单报表MD50Sales order planning 销售订单计划MD51Individual project planning 单个项目计划MD61Create Planned Indep. Requirements 建立计划独立需求MD62Change Planned Indep. Requirements 改变计划独立需求MD63Display Planned Indep. Requirements 显示计划独立需求MD64Create Planned Indep.Requirements 建立计划独立需求MD65Change Standard Indep.Requirements 改变标准独立需求MD66Display Standard Indep.Requirements 显示标准独立需求MD67Staggered Split 分段分割MD70Copy Total Forecast 复制全部预测MD71"Copy Reference Changes" "复制参考的变化"MD72Evaluation; Charac.Plnng Techniques 评估;特征计划技术MD73Display Total Indep. Requirements 显示全部的独立需求MD74Reorganization: Adapt Indep.Reqmts 重组: 采用独立请求MD75Reorganization: Delete Indep.Reqmts 重组: 删除独立需求MD76Reorg: Delete Indep.Reqmts History 重组: 删除独立需求历史MD79"PP Demand Mngmt - XXL List Viewer" "PP需求管理-XXL清单视图查看者" MD81Create Customer Indep. Requirements 创建客户独立需求MD82Change customer indep. requirement 改变客户独立需求MD83Display Customer Indep. Requirements 显示客户独立需求MD85List Customer Indep. Requirements 列客户独立需求清单MD90Maintain Number Range for MRP 维护MRP数字范围MD91Maintain No. Range for Planned Order 维护计划单的编号范围MD92Maint.No.Range for Reserv/Dep.Reqmt 维护预定/相关需求的编号范围MD94Number range maint.: Total reqs 编号范围维护:总需求MDAB Planning File - Set Up BATCH 计划文件 - 安装批量MDAC Execute Action for Planned Order 执行计划订单的活动MDBS MPS - total planning run MPS - 总计划运行MDBT MRP Run In Batch MRP批量运行MDLD Print MRP List 打印MRP清单MDLP MPS MPSMDPH Planning Profile 计划编制参数文件MDPP Demand Management 要求管理MDRE Checking Plnng File In BCKGRND Mode 检查后台模式的计划文件MDSA Display Serial Numbers 显示序列号MDSP Change BOM Explosion Numbers 维护BOM 扩展号MDUM Convert Planned Orders into Pur.Reqs 转换计划定单到采购需求MDUP Maintain Project New Key Assignment 维护项目新码设置MDUS Assign New Key to WBS Elements 分配新码到WBS元素MDW1Access MRP control program 访问MRP控制程序MF00Run Schedules 运行计划MF01Create Run Schedule Header 创建运行计划标题MF02Change Run Schedule Header 改变运行计划题头MF03Display Run Schedule Header 显示运行计划标题MF04Collective Creation of RS Headers RS标题的集中创建MF10Pull List 下拉清单MF11Pull List 下拉清单MF12Display Document Log Information 显示凭证日志信息MF13Display Master Plan 显示主计划MF14Completions for Run Schedule Header 运行计划抬头的完成pl.Confmtns for Reptve Ord. 显示重复订单的完整确认MF16Goods Issue for Run Schedule Header 按运行计划抬头的发货MF17Display GI for Run Schedule Header 为运行计划标题显示GIMF18GR for Run Schedule Header 按运行计划抬头的收货MF19Displ. Goods Receipts for RS Header 显示运行计划抬头的收货MF20Run Schedule Header Cost Controlling 运行计划抬头成本控制MF21Run Schedule Headers: Overview 运行计划抬头: 总览MF22Versions: overview 版本: 总览MF23Linking Versions Graphically 图形的连接文本MF26Display Reporting Point Quantity 显示报告点数量MF27Update Stats for Planned Quantities 更新计划数量统计MF30Periodic Creation - VersionCostEst. 定期创建 - 版本成本估计MF36 C RM-MAT MD Create Planning IDs 设置 C RM-MAT MD 创建计划标识MF37 C RM-MAT MD Linking Versions 设置 RM-MAT MD 连接版本MF3A Document archiving 凭证存档MF3D Delete archived document 删除存档的凭证MF3E Evaluate archived document 评估存档的凭证MF3M Manage archived documents 管理存档的凭证MF3R Reload archived document 重装存档的凭证MF40Repetitive Mfg: Backflushing 重复制造中反冲MF41Cancel Backflush 取消反冲MF42Collective Backflush 汇总的反冲MF43Rep.point backflush - repetitive mfg 报告点反冲-重复制造MF44Backflush for PldOrd - AssemblyOrder 计划订单的反冲-装配顺序MF45Reprocessing Components: Rep.Manuf. 再处理元素: 重复生产MF46Collective Reprocessing, Backflush 集中重处理,反冲MF47Open Reprocessing Records / Pr.Line 未清的再处理记录/每行MF48Backflushing labor 反冲劳力MF49Goods Receipt w/o Backflush 没有反冲的收货MF4A Component Withdrawal: Scrap 部件领料:废品MF4R Resetting Reporting Points 重置报告点MF4U Comp. Withdrawal: Unplnd Consumption 比较反冲:未计划的消耗MF50Change Run Schedule Quantities 改变运行计划数量MF51Print Run Schedule Quantities 打印运行计划数量MF52Display Run Schedule Quantities 显示运行计划数量MF54Display Non-assigned Planned Orders 显示未分配的计划订单MF55Collective Assignment 集中分配MF57Coll. Display of Planning Screens 计划屏幕的集中显示MF60Pull list 4.0 领料单 4.0MF70Aggregate collective backflush 聚集汇总反冲MFKC RS Header Line Item Configuration RS标题行项目配置MP00Material Forecast Menu 物料预测菜单MP11Create message for direct production 为直接产品创建消息MP12Change Message for direct production 为直接产品修改消息MP13Display message - direct production 显示信息 - 直接生产MP30Execute Material Forecast 执行物料预测MP31Change Material Forecast 修改物料预测MP32Display Material Forecast 显示物料预测MP33Reprocess material forecast 再处理物料预测MP38Total Forecast Run 全部预测运行MP39Print 打印MPBT Total Forecast In BATCH Mode 批量模式的总预测MPDR Print in BATCH Mode 批处理方式打印MS00Long-term planning 长期计划MS01Long-term planning: total planning 长期计划:汇总计划MS02Long-term plng: single-itm, mult-lvl 长期计划:单项目,多级别MS03Long-term plng: singl-itm, singl-lvl 长期计划:单项目,单级别MS04Planning Scenario: Stock/Reqmts List 计划方案:库存/需求清单MS05Long-term planning: display MRP list 长期计划:显示MRP清单MS06Long-term plnng: collective MRP list 长期计划:汇总MRP清单MS07Long-Term Plng: Material Overview 长期计划:物料一览MS08Reorg.MRP Lists for Long-Term Plnng 重新组织长期计划的MRP清单MS11LTP: Create planned order LTP: 创建计划的订单MS12LTP: Change planned order LTP: 修改计划的订单MS13LTP: Display planned order LTP: 显示计划的订单MS20Planning File Entry: Long-Term Plnng 计划文件输入:长期计划MS21Planning File Entry: Long-Term Plnng 计划文件输入:长期计划MS22Set Up Plg File Entries for Scenario 为方案设置计划文件输入MS23Delete Plng File Entries of Scenario 删除方案的计划文件输入MS29Calculate Sim. Initial Stock 计算模拟的初始库存MS31Create planning scenario 创建计划方案MS32Change planning scenario 修改计划方案MS33Display planning scenario 显示计划方案MS44Flexible Evaluation Long-Term Plnng 灵活估价的长期计划MS47Evaluation LTP for Product Group 对产品组评估LTP MS50Make-to-order planning (LTP) 定货生产计划 (LTP)MS51Project planning (LTP) 项目计划 (LTP)MS64Create Simulation Version 创建模拟版本MS65Requirements Situation 需求情形MS66Copy Simulative Dependent Reqmts 拷贝模拟相关需求MSAB LTP: set up planning file entries LTP :设置计划文件输入MSAC LTP: delete planning file entries LTP :删除计划文件输人MSBT Long-term plng:plng background job 长期计划:计划后台作业MSE7EKS Simulation: Material Selection EKS 模拟:物料选择MSLD Print MRP List; Long-Term Planning 打印MRP 清单;长期计划OLMD C RM-MAT MRP Menu C RM-MAT MRP 菜单OLPS Customizing basic data 系统定制基本数据OM16Maintain Kanban Status Sequences 维护看板状态顺序OM17Define Actions for Status Switching 定义状态切换的活动OMD0 C RM-MAT MRP Controllers C RM-MAT MRP 控制员OMD1C RM-MAT MD Mat.type/MRP procedure C RM-MAT MD MAT 类型/MRP 程序OMD2 C RM-MAT MD Weighting Groups C RM-MAT MD 加权组OMD3 C RM-MAT MD Exception Message T458A C RM-MAT MD 异常信息T458A OMD4C RM-MAT MD Exceptn.Msge Texts T458B C RM-MAT MD 异常信息文本T458B OMD5 C MD MRP Element Description T457T C MD MRP 元素描述 T457T OMD6C RM-MAT MD Rqmts Plng Active T001W C RM-MAT MD RQMTS PLNG 活动 T001W OMD7 C RM-MAT MD Schedul.Parameters T399D C RM-MAT MD 排产参数 T399D OMD8 C RM-MAT MD Control Parameters T438M C RM-MAT MD 控制参数 T438M OMD9C RM-MAT MD Spec.Procurmt.Key T460A 设置RM-MAT MD 特定采购码T460A OMDA C RM-MAT MD Period Split T449A C RM-MAT MD 周期分解 T449A OMDB Marking Material for MRP Termination MRP 终止的标记物料OMDC C RM-MAT MD Planned Orders T436A C RM-MAT MD 计划订单 T436A OMDD C RM-MAT MD Planned Ord.Types T460C C RM-MAT MD 计划订单类型T460C OMDE C RM-MAT MD Lot Sizes T439A C RM-MAT MD 批量大小 T439A OMDF C RM-MAT MD StgeCosts Lot Size T439L 设置RM-MAT MD 库存成本批量T439L OMDG C RM-MAT MD Ord.ForecastRequmt T439P 设置RM-MAT MD 订单预测需求T439P OMDH C RM-MAT MD Plnned Order Types T460D C RM-MAT MD 计划订单类型T460D OMDI C RM-MAT MD Lot Size Texts C RM-MAT MD 批量大小文本OMDJC RM.MAT MD Corr.Factors for Forcast C RM-WMS MD Corr.预测因素OMDK C RM-MAT MD Error Allocation C RM-MAT MD 错误分配OMDN C MM-MRP No.RangeInterval - PurReq. C MM-MRP 范围区间号 - 请购单OMDO Create Planning File 创建计划文件OMDP Check Consistency for Planning File 检查计划文件一致性OMDQ C RM-MAT MRP Types T438A C RM-MAT MRP 类型 T438AOMDR C MD Run Time Statistics C MD 运行时间统计OMDS C MD Number of Planned Orders C MD 计划订单的编号OMDT C MM-MRP External Procurement C MM-MRP外部采购OMDU C MD Activate MRP 设置 MD激活MRPOMDV C MD Convert Planning Run C MD 转换计划运行OMDW C MD Rescheduling C MD 重新调度OMDX C MD Planning Horizon C MD 计划期OMDY C MD Planning Run Abend C MD计划运行的异常终止OMDZ C MD MRP Creation Indicator C MD MRP产生指示符OMI1 C MD Safety Stock C MD 安全库存OMI2 C MM-MRP Number Ranges: Mat. plg. C MD MRP 编号范围:Mat.plg. OMI3 C MM-MRP No. ranges for pld ords C MM-MRP 计划订单的号码范围OMI4 C MD Lot Sizes C MD 批量规模OMI5 C MD Item Numbers C MD 项目号OMI7 C MM-MRP No. ranges for pld ords C MM-MRP 计划订单的号码范围OMI8Plant parameters 工厂参数OMI9PP MRP C Direct procurement PP MRP C 直接采购OMIA C MRP Range of Coverage Profile C MRP 覆盖范围的参数文件OMIB C MRP Start times - background jobs C MRP开始时间 - 后台作业OMIC MatMasterCust.:batch job start times 物料主记录顾客:批作业开始时间OMID Maintain Number Range: Indep.Reqmts 维护数字范围: 独立需求OMIE Maintain Number Range: Reqmts Plan 维护编号范围:需求计划OMIG MRP group per material type 每种物料类型的MRP组OMIH Check. rule for updating backorders 更新退回订单检查规则OMII Missing Parts Controller 短缺控制者OMIJ C MRP Rounding Profiles C MRP 取整模式OMIK Control of CO Integration CO集成的控制OMIL Sel. Receipt Elements for Coverage 为覆盖选择收货元素OMIM Maximum MRP Period 最大MRP期间OMIN Firming Scheduling Agreements 确认计划协议OMIO Screen Seq. MRP List ; Ext.Header 屏幕顺序MRP清单;扩展标题OMIP Reference Plant for MRP Master Data MRP主数据的参考工厂OMIQ Destinations Parallel MRP 目的地平行MRPOMIR Storage Location MRP 仓储地点 MRPOMIS Convert planned order -> prod. order 转换计划订单->生产订单OMIT Start date in past 过去的开始日期OMIU Action Code Planned Order Control 活动代码计划订单控制OMIV Action Control Planned Order 活动控制计划订单OMIW BOM explosion BOM展开OMIX Text: user exit planning run 文本: 用户出口计划运行OMIY Plng File Entries for Goods Mvmts 货物移动的计划文件输入OMP0Customizing: Demand Mngmt (Menu) 客户化: 需求管理(菜单)OMP1Customizing: Requirements Types 客户化:需求类型OMP2Customizing: Versions 客户化:版本OMP3Customizing: Vers. per Reqmts Class 客户化: 每个需求分类的版本OMP4Customizing: Indep. Reqmts History 客户化: 独立需求历史OMP5Customizing: Refer.Type (Dep.Reqmts) 客户化:参考类型 (相关需求) OMP6Customizing: Consuming Indep. Reqmts 客户化:消耗独立需求OMP8Customizing: Reorganizing Indep.Req. 客户化:重组独立需求.OMP9Customizing: Fixing Indep. Reqmts 客户化:固定单独需求OMPA Customizing: Version per Ref. Type 客户化:每一参考类型的版本OMPC Customizing:PlgInd/Cons.Indep.Reqmts 定制:计划独立/客户独立需求OMPD Customizing:Indep.Reqmts Init.Screen 定制:独立需求初始化屏幕OMPE Takeover Structure 占据结构OMPG Maintain Consumption Mode 维护消耗模式OMPH Period Split 周期分割OMPI Configuration 配置OMPJ Reqmts Type Message Control 需求类型消息控制OMPL Direct Input 直接输入OMPM Create Example File 创建例子文件OMPO Maintain Requirements Classes 维护需求等级OMPP Internal Number Assignment 内部值分配OMPS Maintain Period Split 维护期间分解OP00Maintain Operation Control Key 维护工序控制码OP01Customizing Routing/Work Center 定制工艺路线/工作中心OP03Factory Calendar C 工厂日历 COP04Word Processing 文字处理OP07Standard Text 标准文本OP08Standard Text 标准文本OP10Maintain Person Responsible 维护负责人OP11Maintain Period Pattern Key 维护周期模式码OP12Maintain Location 维护位置OP13Maintain Screen Sequence 维护屏幕顺序OP14Maintain Type of Std. Value Determin 维护标准值类型确定OP15Production User Profile 生产用户参数文件OP16Maintain Period Pattern 维护周期模式OP17Formula Parameters 公式参数OP18Maintain Setup Group/Setup Group Cat 维护准备组/准备组类别OP19Standard Value Key 标准值码OP20Maintain Setup Type Key 维护准备类型码OP21Define Formula 定义公式OP22Maintain Wage Groups 维护工资组OP23Maintain Location 维护位置OP26Maintain suitability 维护相称性OP28Maintain Perf. Efficiency Rate Key 维护效率码OP29Production User Maintenance 生产用户维护OP30Maintain Move Time Matrix 维护移动时间矩阵OP31Maintain Time Segment (Per. Pattern) 维护时间段(每种模式)OP32Maintain Capacity Category 维护能力类型OP34Maintain Work Center Planner Group 维护工作中心计划组OP35Maintain Perf. Efficiency Rate Key 维护效率码OP36Maintain Capacity Default Values 维护能力缺省值OP37Maintain Available Capacity Version 维护可用能力版本OP38Maintain Setup Type Key 维护准备类型码OP39Maintain Graphics Profile 维护图形参数文件OP40Maintain Work Center Category 维护工作中心类别OP41Matchcode for work center 工作中心匹配码OP42Default work center 缺省工作中心OP43Maintain Setup Group Categories 维护设置组类别OP44Maintain Task List Usage 维护任务清单使用OP45Maintain Usage 维护用途OP46Maintain Task List Status 维护任务清单状态OP47Maintain PRT Usage 维护 PRT 用途OP48Maintain Planner Group 维护计划员组OP49Matchcode for Routings/Ref. Op. Sets 工艺路线/参考工序集匹配码OP4A Maintain Shift Sequences 维护班次顺序OP4B Overview variant: Routing 总览变式: 工艺路线OP4C Overview variant: Ref. oper. set 总览变式: 参照工序集OP4D Overview variant: Rate routing 总览变式: 定额工艺路线OP4E Overview variant: Ref. rate routing 总览变式: 参照定额工艺路线OP4F Overview var.:Scheduling of routings 总览变式: 工艺路线的计划OP4G Overview var.:Scheduling ref.op.set 总览变式: 计划参照工序集合OP4H Overview var.:Scheduling of rate rtg 总览变式: 定额工艺路线的计划OP4I Overview var.:Scheduling RefRateRtgs 总览变式: 计划定额工艺路线OP50Assign Material Types 分配物料类型OP51Formula Parameters 公式参数OP52Formula Parameters 公式参数OP53Formula Parameters 公式参数OP54Define Formula 定义公式OP55Define Formula 定义公式OP56Define Formula 定义公式OP57Define Formula 定义公式OP58Maintain Default Value Profiles 维护缺省值参数文件OP59Formula Parameters 公式参数OP5A Field Selection: Task List Overview 字段选择: 任务清单总览OP5B Field Selection: Task List Header 字段选择: 任务清单表头OP5C Field Selection: Task List Sequence 字段选择: 任务清单顺序OP5D Field Selection: Task List Details 字段选择: 任务清单细节OP5E Field selection task list overview 字段选择任务清单总览OP5F Field selection std network -> PRT 字段选择标准网络 -> PRTOP5H Field selection insp.characteristics 字段选择检查特性OP61Number range maintenance: ROUTING_3 编号区间维护:工艺路线_3 OP62Number ranges for routings 工艺路径的编号范围OP63Number Ranges for Ref.Operation Sets 参考工序集的编号范围OP64Maintain Setup Group Key 维护准备组码OP66Maintain Location Group 维护定位组OP67Maintain Operation Control Key 维护工序控制码OP68Maintain Move Time Matrix 维护移动时间矩阵OP69Maintain wage type 维护工资类型OP71Maintain Wage Group 维护工资组OP72PRT Control Key PRT 控制码OP76Define suitability 定义适宜性OP78Maintain Type of Std. Value Determin 维护标准值类型确定OP7A Customizing matchcode for PRTs 系统定制 PRT 的匹配码OP7B Define parameter 定义参数OP82Define Formula 定义公式OP84Profiles: Default Values for Rtgs. 概况:工艺路线默认值OP85Profiles: Default Values for QM 概况:QM 默认值OP87Maintain Routing/Ref.Op.Set Usage 维护工艺路线/参考工序集使用OP88Maintain Assignmt. of Task List Type 维护任务清单类型的分配OP8A Maintain operation value description 维护工序值描述OP8B Maintain standard value texts 维护标准值文本OP8C Record layout for background (APL) 后台的记录布局 (APL)OP8D Data transfer APL 数据传送APLOP8E Command file task lists Rel. 2.2A 命令文件任务清单版本 2.2AOP8F Maintain production scheduler 维护生产调度员OP8H Profiles: Default Values for Rtgs. 概况:工艺路线默认值OP91Maintain Object Overview Version 维护对象总览版本OP95Assign Work Center Cat. to Applicatn 将工作中心类别分配到应用OP96Maintain Work Center Category 维护工作中心类别OP97Maintain Performance Efficiency Rate 维护效率OP98Maintain Validity of Perf.Effic.Rate 维护绩效效率的有效性OPCU Strategy levels 策略层次OPDN Change variable 更改变量OPDO Display variable 显示变量OPEA User selection 用户选择OPEB Automatic selection 自动选择OPEC PP user fields PP 用户字段OPGD Ref. Oper. Set-All Task Lists (PP) 参照工序集 - 所有任务清单(PP) OPGE Ref. Oper. Set - Rate Routings (PP) 参照工序集 - 定额工艺路线(PP) OPGF Work Center - All Task Lists (PP) 工作中心 - 所有任务清单 (PP) OPGG Work Center - Rate Routings (PP) 工作中心 - 定额工艺路线 (PP) OPGH Document PRT - All Task Lists 文档 PRT - 全部任务清单OPGI Equipment PRT - All Task Lists 设备 PRT - 所有的任务清单OPGJ Material PRT - All Task Lists 物料 PRT - 所有任务清单OPGK Misc. PRT - All Task Lists 其它 PRT - 所有任务清单OPGL Resource - Master Recipes (PI) 资源 - 主配方(PI)OPGM Process Instr. Cat. - Master Recipe 工艺指令类别- 主配方OPGN Document PRT - Maintenance Task List 文档 PRT - 维护任务清单OPGO Equipment PRT-Maintenance Task Lists 设备 PRT-维护任务清单OPGP Material PRT - Maintenance Task List 物料 PRT - 维护任务清单OPGQ Misc. PRT - Maintenance Task Lists 其它 PRT - 维护任务清单OPGR Work Center - Standard Network (PS) 工作中心 - 标准网络 (PS) OPGS Document PRT - Standard Network (PS) 文档 PRT - 标准网络 (PS)OPGT Equipment PRT - Standard Network(PS) 设备 PRT - 标准网络(PS) OPGU Material PRT - Standard Network (PS) 物料 PRT - 标准网络 (PS)OPGV Misc. PRT - Standard Network (PS) 其它 PRT - 标准网络 (PS)OPN0Master Recipe Profile 主配方概要OPP1Customizing MRP 定制MRPOPP2MPS MPSOPP3Customizing Repetitive Manufacturing 客户设置重复生产OPP5List Profile Component List 清单模式组件清单OPPA PP/MRP Customizing Explosion PP/MRP 用户设置扩充OPPB Direct Procurement 直接采购OPPC Period Grouping 期间分组OPPD Customizing Planning Time Fence 客户设置计划时界OPPE Conversion Plnnd Order -> Prod.Order 转换计划订单 -> 生产订单OPPH Customizing Purchase Req. Conversion 客户设置采购申请转换OPPI Available Stock 可用库存OPPJ MRP Checking Rule MRP检查规则OPPK Hierarchy Element 层次要素OPPL MRP MRPOPPM Evaluation Profiles 评估参数文件OPPN Layout 格式OPPO Hierarchy Element 层次要素OPPP Customizing Direct Procurement 客户设置直接采购OPPQ C M MRP Plant Parameters for MRP C M MRP 物料需求计划的工厂参数OPPR C M MRP MRP Group C M MRP MRP 组OPPS Strategy 策略OPPT Strategy Group 策略组OPPU Strategy Group for MRP Group MRP组的策略组OPPV MPS Evaluation Release-Info MPS评估版本-信息OPPW Availability check release-info 批准信息的可用性检查OPPX MRP group release-info MRP组批准信息OPPZ MRP Group MRP组OPSH Maintain ctrl. key for activity (PS) 为作业 (PS)维护控制码OPUW Standard Network Status 标准网络状态OPVP Collective availibility checkProfile 集中有效性检查参数文件OSPE Maintaing No. Ranges for RS Header 维护运行计划表头的编号范围OSPG Copy Repet. Manufacturing Line Text 复制重复制造行文本OSPN Background job: adjmt. of dep. reqs 后台作业:adjmt. of dep.reqsOSPO Backgr. job - agg. coll. backflush 后台作业 - 聚集汇总反冲PI30PP-PI Options for Release 3.0 PP-PI 3.0版本的选项。
计算机网络英文复习题
计算机络英文复习题-CAL-FENGHAL-(YICAI)-Company One 1.英译汉(10分)TCP(Transmission Control Protocol) IP (Internet Protocol)RFC(Requests for comments)SMTP(Simple Mail Transfer Protocol) Congestion-control Flow controlUDP (User Datagram Protocol)川八数据报协议FTP(File Transfer Protocol) 文件传输协议HTTP( Hyper-Text Transfer Protocol) 超文本传输协议TDM 时分复用 FDM频分复用ISP(Internet Service Provider) DSL(Digital Subscriber Line) DNS(Domain Name System) ARQ(Automatic Repeat Request)ICMP(Internet Control MessageProtocol) 网间控制报文协议AS(Autonomous Systems) RIP(Routing Information Protocol)\ OSPF(Open Shortest Path First) BGP (Border Gateway Protocol) 边界网关协议HFC光纤同轴电缆混合网22. CRC(Cyclic Redundancy Check) 循环冗余检验23. CSMA/CD 带冲突检测的载波侦听多路存取24. ARP 地址解析协议 25. RARP 反向地址解析协议 26.DHCP动态主机配置协议循环时间互联网工程任务组 统一资源定位 应用程序编程接口 多用途互联网邮件扩展32. MTU(P328)最大传输单元二、单项选择题(每小题1分,共30分)1. DSL divides the communication link between the home and the ISP into three nonoverlapping frequency bands, a upstream channel is in _A ______ ・A)50 kHz to 1 MHz band B) 1 MHz to 2MHz band C)4 kHz to 50kHz bandD)Oto 4kHz band2. As a data packet moves from the upper to the lower layers, headers are A .A) Added; B) subtracted; C) rearranged; D) modified1. 2. 3. 4. 5. 6.7. 8. 9. 10. 11. 12.13. 14. 15. 16. 17.18.传输控制协议 互联网协议 请求评议简单邮件传输协议 拥塞控制 流控制互联网服务提供商 数字用户线路 域名系统自动重发请求 自制系统路由信息协议 开放最短路径优先27. RTT 28. IETF(P5) 29. URL(P88) 30. API 31. MIME3.What is the main function of the network layer DA) node-to-node delivery; B) process-to-process message deliveryC) synchronization; D) updating and maintenance of routing tables4.Which of the following is the default mask for the address 168.0.46.201A) 255.0.0.0; B) 255.255.0.0; C) 255.255.255.0; D) 255.255.255.2555. A router reads the __ address on a packet to determine the next hop. AA) IP ; B) MAC; C) source; D)ARP6 . Which device can't isolates the departmental collision domains. AA) Hub; B) switch; C) router; D) A and B7.Input port of a router don't pei-fonn ______ D ______ f imctions.A) the physical layer functions B) the data link layer functionsC) lookup and forwarding function D) network management8.HTTP has a mechanism that allows a cache to verify that its objects are up to date・ The mechanism is DA) persistent connections B) cookies C) Web Caching D) conditional GET9. A protocol layer can be implemented in ______ D ______ ・A) software B) hardware C) a combination of the software and hardware D) All of the above10.A protocol has three important factors, they are_A ___________ ・A) syntax, semantics, order B) syntax, semantics, layerC) syntax, semantics, packet D) syntax , layer, packet11.There are two broad classes of packet-switched networks: datagram networks andvirtual-circuit networks. The virtual-circuit networks forward packets in their switches use D .A) MAC addresses B) IP addressesC) e-mail addresses D) virtual-circuit numbers12.TCP service model doesn't provide _______ D _________ service・A) reliable transport service B) flow control serviceC) congestion-control service D) guarantee a minimum transmission rate service ・ually elastic applications don^t include ________ B ________ ・A) Electronic mail B) Internet telephonyC) file transfer D) Web transfer14.A user who uses a user agent on his local PC receives his mail sited in a mailserver by using _B ______ protocol.A)SMTP B) POP3C)SNMP D) FTP15.Considering sliding-window protocol, if the size of the transmitted window is N and the size of the receiving window is l,the protocol isA) stop-and-wait protocol B) Go-Back-N protocolC) selective Repeat protocol D) alternating-bit protocol16.which IP address is effective ______ B ________ ・A) 202,131,45,61 B) 126.0.0.1C) 192.268.0.2 D) 290.25」35」217.if IP address is 202.130.191.33, subnet mask is 255.255.255.0,then subnet prefixis_D _______A) 202.130.0.0 B) 202.0.0.0C) 202.130.191.33 D)202.130.191.018.The command Ping s implemented with _B ___________ messagesA) DNS B) ICMPC) IGMP D) RIP19.Which layer-function is mostly implemented in an adapter _A __________________A) physical layer and link layer B) network layer and transport layerC)physical layer and network layer D) transport layer and application layer20.If a user brings his computer from Chengdu to Peking, and accesses Internet again.Now, _B __________ of his computer needs to be changed・A) MAC address B) IP addressC) e-mail address D) user address1._____________________________________ ・traceroute is implemented with _B_______________________________________________________ messages.A) DNS B) ICMPC) ARP D) RIP2. A router reads the A address on a packet to determine the next hop・A. IP ;B. MAC;C. source;D.ARP3.There are two broad classes of packet-switched networks: datagram networksand virtual-circuit networks. The virtual-circuit networks forward packets in their switchesuse _____________________ D ____ ・A) MAC addresses B) IP addressesC) e-mail addresses D) virtual-circuit numbers4.About subnet, which underlying description isif t right ____________A)device interfaces with same subnet part of IP addressB)can" physically reach each other without intervening a router.C)all of the devices on a given subnet having the same subnet address・D) A portion of an interface's IP addi'ess must be detennined by the subnet to which it is connected・5.if IP address is 102.100.100.32, subnet mask is 255.255.240.0,then subnetprefix is ___ A ____A) 102」00.96.0 B) 102.100.0.0C) 102.100.48.0 D) 102.100.112.06 If a user brings his computer from chengdu to beijing, and accesses Internetagain・ Now, ____ B_ of his computer needs to be changed・A) MAC address B) IP addressC) e-mail address D) user address7.Input port of a router don^ pei'fonii ________ D ____ functions.A) the physical layer functions B) the data link layer functionsC) lookup and forwarding function D) network management8.switching fabric is at the heart of a router, switching can be accomplished in a number of ways,donit include^ D _A)Switching via memory B)Switching via crossbarC)Switching via a bus D) Switching via buffer9.if a host wants to emit a datagram to all hosts on the same subnet, then the datagram'sdestination IP address is __________________ B_A)255.255.255.0 B) 255.255.255.255C)255.255.255.254 D) 127.0.0.1lO.The advantage of Circuit switching does not include ________________ ・A) small transmission delay B)small Processing costC) high link utilization D)no limited to format of message1 ・a n ARP query sent to _A_A) local network B) all over the Internet.2..packet-switching technologies that use virtual circuits include_B___________ :A) X.25, ATM, IP B) X.25, ATM, frame relay.C) IPX, IP, ATM D) IPX, IP, TCP3・ In Internet, _ D _ protocol is used to report error and provide the information for un-normal cases・A) IP B) TCP C)UDP D) ICMP1 ・A is a Circuit-switched network・A. TDMB. Datagram networkC. InternetD. virtualcircuit network2.The store-and-forward delay is __ D_______A. processing delayB. queuing delay C・ propagation delay D.transmission delay3・ Which is not the function of connection-oriented service DA. flow controlB. congestion control C・ error correction D.reliable data transfer4. The IP protocol lies in CA. application layerB. transport layerC. network layerD. link layer5. Which of the following is the PDU for application layer _B ________A. datagram;B. message; C・ frame; D・ segment6.bandwidth is described in _B_A) Bytes per second B) Bits per secondC) megabits per millisecond D) centimeters7. A user who uses a user agent on his local PC receives his mail sited in a mail server by using _A_ protocol.A)SMTP B) POP3C)SNMP D) FTP8・ As a data packet moves from the lower to the upper layers, headers arc B ,A)Addcd; B. subtracted: C. rearranged; D. modified三. 填空题(每空1分,共22分(注意:所有填空题不能写中文,否则中文答 案对的情况下扣0.5分)1 ・ link-layer address is variously called a LAN address, a MAC address, or a physical address,2 In 什le layered architecture of computer networking, n layer is the user of n-1 layer and the service provider of n+1 layer ・ A) n B) n+3 C) n+1 D) n-1MechanismUseChecksum Used to detect bit errors in a transmitted packet. Sequence number Used for sequential numbering of packets of dataflowing from sender to receiver ・ Acknowledgmen t (或 ACK) Used by the receiver to tell the sender that a packet orset of packets has been received correctly ・ Countdown timer Used to timeout/retransmit a packet, possibly because the packet (or its ACK)was lost ・ Window,pipelinl ing The sender may be restricted to sending only packetswith sequence numbers that fall within a given range ・1. please fill in the types of delay in a router.四. 判断题(每小题1分,共10分)1 ・ J The sernces of TCP's reliable data transfer founded on the seivices of the unreliable datatransfer.2. J Any protocol that performs handshaking between the communication entitiesbefore transferring data is a conncction-oricntcd sen-ice ・3. x HOL blocking occur in output ports of router ・4. J Socket is globally unique ・5. J SMTP require multimedia data to be ASCII encoded before transfer.6. xThe transmission delay is a function of the distance between the two routers ・7. xIP address is associated with the host or router. SO one device only have one IPaddress ・8. J In packet-switched nehvorks, a session's messages use the resources on demand, and Internet makes its best effort to deliver packets in a timely manner.② nodelProcessionPropagation©queueingrouterTransmission9.x UDP is a kind of unreliable transmission layer protocol, so there is not any checksum field in UDP datagram header・10.J Forwarding tabic is configured by both Intra and Inter-AS routing algorithmIP is a kind of reliable transmission protocol. F8.Forwarding table is configured by both Intra and Inter-AS routing algorithm・T9.Distance vector routing protocol use Isa to advertise the network which router knows.F10.RIP and OS PF are Intra-AS routing protocols T11 ・ Packet switching is suitable for real-time services, and offers better sharing of bandwidththan circuit switching F五、计算题(28 poin⑸1 ・Consider the following net\vork. With the indicated link costs, use Dijkstnf s shortest-path algorithm to compute the shortest path from X to all network nodes・2 Given: an organization has been assigned the network number 198」.1.0/24 and it needs todefine six subnets・ The largest subnet is required to support 25 hosts. Please:• Defining the subnet mask; (2 分)27bits or 255.255.255.224•Defining each of the subnet numbers; which are starting from 0# (4 分)198.1.1.0/27198.1.1.32/27 198.1.1.64/27 198.1.1.96/27 198.1.1.128/27 198.1.1.160/27 198.1.1.192/27 19& 1.1.224/27•Defining the subnet 2¥s broadcast address.(2 分)198.1 ・ 1.95/27•Defining host addresses scope for subnet 2#. (2 分)198.1 ・ 1.65/27— 198.1.1.94/273.Consider sending a 3,000-byte datagram into a link that has an MTU of1500bytes.Suppose the original datagram is stamped with the identification number 422 ・Assuming a 20-byte IP header^How many fragments are generated What are their characteristics (10 分)。
数据结构英语作文加翻译
数据结构英语作文加翻译Title: The Importance of Data Structures in Computer Science。
Data structures play a crucial role in the field of computer science. They are fundamental concepts that enable efficient storage, retrieval, and manipulation of data in computer programs. In this essay, we will explore the significance of data structures, their types, and their applications in various domains.Firstly, let us delve into the importance of data structures. In computer science, data is the foundation of every software application. However, raw data alone is not sufficient; it needs to be organized in a structured manner to be processed efficiently. Here comes the role of data structures. They provide a way to organize and store datain such a way that it can be easily accessed and manipulated. By choosing appropriate data structures, programmers can optimize the performance of theiralgorithms, leading to faster execution times and more efficient resource utilization.There are several types of data structures, each with its unique characteristics and use cases. One of the most basic data structures is the array, which stores elements of the same type in contiguous memory locations. Arrays are widely used due to their simplicity and constant-time access to elements. Another commonly used data structure is the linked list, which consists of nodes where each node contains a data field and a reference (or pointer) to the next node in the sequence. Linked lists are efficient for insertion and deletion operations but may have slower access times compared to arrays.Apart from arrays and linked lists, there are more complex data structures such as stacks, queues, trees, and graphs. Stacks follow the Last-In-First-Out (LIFO)principle and are often used in algorithms involving function calls, expression evaluation, and backtracking. Queues, on the other hand, adhere to the First-In-First-Out (FIFO) principle and are commonly used in scenarios liketask scheduling, job processing, and breadth-first search algorithms. Trees are hierarchical data structures consisting of nodes connected by edges, with a root node at the top and leaf nodes at the bottom. They are utilized in applications like hierarchical data storage, binary search trees, and decision trees. Graphs are collections of nodes (vertices) and edges connecting these nodes, and they find applications in various fields such as social networks, routing algorithms, and network flow optimization.Now, let's discuss the applications of data structures across different domains. In software development, data structures are extensively used in designing databases, implementing algorithms, and building user interfaces. For example, databases rely on data structures like B-trees and hash tables for efficient storage and retrieval of information. In algorithm design, efficient data structures are crucial for optimizing time and space complexity. Many popular algorithms such as sorting, searching, and graph traversal algorithms heavily rely on data structures for their implementation. Moreover, in user interface development, data structures like trees and graphs are usedto represent the hierarchical structure of UI components and their relationships.In addition to software development, data structures find applications in fields like artificial intelligence, bioinformatics, and computational biology. In artificial intelligence, data structures are used to represent knowledge, make decisions, and solve complex problems. For instance, knowledge graphs are used to represent relationships between entities in a knowledge base, while decision trees are employed in decision-making processes. In bioinformatics and computational biology, data structures are used to store and analyze biological data such as DNA sequences, protein structures, and metabolic pathways. Efficient data structures and algorithms are essential for tasks like sequence alignment, genome assembly, and protein folding prediction.In conclusion, data structures are the building blocks of computer science. They enable efficient storage, retrieval, and manipulation of data in computer programs, leading to faster execution times and more efficientresource utilization. With various types of data structures available and their applications spanning across different domains, it is evident that a solid understanding of data structures is essential for every computer scientist and software developer. By mastering data structures and their applications, programmers can write more efficient and scalable software solutions, thereby advancing the field of computer science as a whole.(翻译)。
交换路由 常用英语词汇
交换路由常用英语词汇English:When it comes to exchanging routes in networking, some common English vocabulary includes "route exchange," "route redistribution," "routing table exchange," "route advertisement," "route propagation," "direct route exchange," "indirect route exchange," "route convergence," "route flapping," and "route dampening." In the context of networking, "route exchange" refers to the process of exchanging routing information between different network devices, allowing them to build and maintain an accurate map of the network. "Route redistribution" involves the sharing of routing information between different routing domains or protocols, while "routing table exchange" refers to the exchange of routing tables between routers. "Route advertisement" is the act of broadcasting information about available routes to other devices in the network, and "route propagation" refers to the transmission and dissemination of routing information throughout the network. "Direct route exchange" occurs when routing information is exchanged directly between neighboring devices, while "indirect route exchange" involves routing information being exchanged through intermediary devices."Route convergence" is the process by which all routers in a network reach a consistent and synchronized view of the network's topology, while "route flapping" refers to the rapid and repeated changes inthe status of a route. Finally, "route dampening" is a technique usedto mitigate the impact of route flapping by suppressing the advertisement of unstable routes for a period of time.中文翻译:在网络交换路由时,一些常用的英语词汇包括“路由交换”,“路由重新分发”,“路由表交换”,“路由广告”,“路由传播”,“直接路由交换”,“间接路由交换”,“路由收敛”,“路由拍摮”和“路由抑制”。
M20网络背景路由器说明书
D ATA S HE E TM 20 I n t e r n e t B a c k b o n e R o u t e rThe M20 router’s compact design offers tremendous performance and portdensity. The M20 router has a rich feature set that includes numerous advantages.sRoute lookup rates in excess of 40 Mpps for wire-rate forwarding performancesAggregate throughputcapacity exceeding 20 Gbps sPerformance-based packet filtering, rate limiting, and sampling with the Internet Processor II™ ASIC sRedundant System and Switch Board andredundant Routing Engine sMarket-leading port density and flexibility sProduction-proven routing software with Internet-scale implementations of BGP4, IS-IS, OSPF , MPLS traffic engineering, class of service, and multicasting applicationsThe M20™ Internet backbone router is a high-performance routing platform that is built for a variety of Internet applications, including high-speed access, public and private peering,hosting sites, and backbone core networks.The M20 router leverages proven M-series ASIC technology to deliver wire-rateperformance and rich packet processing,such as filtering, sampling, and rate limiting.It runs the same JUNOS™ Internet software and shares the same interfaces that are supported by the M40™ Internet backbone router, providing a seamless upgrade path that protects your investment. Moreover, its compact design (14 in / 35.56 cm high)delivers market-leading performance and port density, while consuming minimal rack space.The M20 router offers wire-rate performance,advanced features,internal redundancy,and scaleability in a space-efficient package.A d v a n t a g e sFeatur esBenefitsIt [JUNOS software]dramatically increases our confidence that we will have access to technology to keep scaling along with what the demands on the network are.We can keep running.—Michael O’Dell,Chief Scientist,UUNETTechnologies, Inc.“”A r c h i t e c t u r eThe two key components of the M20 architecture are the Packet Forwarding Engine (PFE) and the Routing Engine,which are connected via a 100-Mbps link. Control traffic passing through the 100-Mbps link is prioritized and rate limited to help protect against denial-of-service attacks.sThe PFE is responsible for packet forwarding performance.It consists of the Flexible PIC Concentrators (FPCs),physical interface cards (PICs), System and Switch Board (SSB), and state-of-the-art ASICs.sThe Routing Engine maintains the routing tables andcontrols the routing protocols. It consists of an Intel-based PCI platform running JUNOS software.The architecture ensures industry-leading service delivery by cleanly separating the forwarding performance from the routing performance. This separation ensures that stressexperienced by one component does not adversely affect the performance of the other since there is no overlap of required resources.Leading-edge ASICsThe feature-rich M20 ASICs deliver a comprehensive hardware-based system for packet processing, including route lookups, filtering, sampling, rate limiting, loadbalancing, buffer management, switching, encapsulation,and de-encapsulation functions. To ensure a non-blocking forwarding path, all channels between the ASICs are oversized, dedicated paths.Internet Processor and Internet Processor II ASICsThe Internet Processor™ ASIC, which was originally deployed with M20 routers, supports an aggregated lookup rate of over 40 Mpps.An enhanced version, the Internet Processor II ASIC,supports the same 40 Mpps lookup rate. With over one million gates, this ASIC delivers predictable, high-speed forwarding performance with service flexibility, including filtering and sampling. The Internet Processor II ASIC is the largest, fastest, and most advanced ASIC ever implemented on a router platform and deployed in the Internet.Distributed Buffer Manager ASICsThe Distributed Buffer Manager ASICs allocate incoming data packets throughout shared memory on the FPCs. This single-stage buffering improves performance by requiring only one write to and one read from shared memory. There are no extraneous steps of copying packets from input buffers to output buffers. The shared memory is completelynonblocking, which in turn, prevents head-of-line blocking.I/O Manager ASICsEach FPC is equipped with an I/O Manager ASIC that supports wire-rate packet parsing, packet prioritizing, and queuing.Each I/O Manager ASIC divides the packets, stores them in shared memory (managed by the Distributed Buffer Manager ASICs), and re-assembles the packets for transmission.Media-specific ASICsThe media-specific ASICs perform physical layer functions,such as framing. Each PIC is equipped with an ASIC or FPGA that performs control functions tailored to the PIC’s media type.Packet Forwarding EngineThe PFE provides Layer 2 and Layer 3 packet switching, route lookups, and packet forwarding. The Internet Processor II ASIC forwards an aggregate of up to 40 Mpps for all packet sizes. The aggregate throughput is 20.6 Gbps half-duplex.The PFE supports the same ASIC-based features supported by all other M-series routers. For example, class-of-service features include rate limiting, classification, priority queuing,Random Early Detection and Weighted Round Robin to increase bandwidth efficiency. Filtering and sampling areLogical View of M20 ArchitecturePacket Forwarding Enginealso available for restricting access, increasing security, and analyzing network traffic.Finally, the PFE delivers maximum stability duringexceptional conditions, while also providing a significantly lower part count. This stability reduces power consumption and increases mean time between failure.Flexible PIC ConcentratorsThe FPCs house PICs and connect them to the rest of the PFE. There is a dedicated, full-duplex, 3.2-Gbps channel between each FPC and the core of the PFE.You can insert up to four FPCs in an M20 chassis. Each FPC slot supports one FPC or one OC-48c/STM-16 PIC. Each FPC supports up to four of the other PICs in any combination,providing unparalleled interface density and configuration flexibility.Each FPC contains shared memory for storing data packets received; the Distributed Buffer Manager ASICs on the SSB manage this memory. In addition, the FPC houses the I/O Manager ASIC, which performs a variety of queue management and class-of-service functions.Physical Interface CardsPICs provide a complete range of fiber optic and electrical transmission interfaces to the network. The M20 router offers flexibility and conserves rack space by supporting a wide variety of PICs and port densities. All PICs occupy one of four PIC spaces per FPC except for the OC-48c/STM-16 PIC, which occupies an entire FPC slot.An additional Tunnel Services PIC enables the M20 router to function as the ingress or egress point of an IP-IP unicasttunnel, a Cisco generic routing encapsulation (GRE) tunnel, or a Protocol Independent Multicast - Sparse Mode (PIM-SM) tunnel.For a list of available PICs, see the M-series Internet Backbone Routers Physical Interface Cards datasheet.System and Switch BoardThe SSB performs route lookup, filtering, and sampling, as well as provides switching to the destination FPC. Hosting both the Internet Processor II ASIC and the Distributed Buffer Manager ASICs, the SSB makes forwarding decisions,distributes data cells throughout memory , processes exception and control packets, monitors system components, and controls FPC resets. You can have one or two SSBs, ensuring automatic failover to a redundant SSB in case of failure.Routing EngineThe Routing Engine maintains the routing tables and controls the routing protocols, as well as the JUNOS software processes that control the router’s interfaces, the chassis components, system management, and user access to the router. These routing and software processes run on top of a kernel that interacts with the PFE.sThe Routing Engine processes all routing protocol updates from the network, so PFE performance is not affected.sThe Routing Engine implements each routing protocol with a complete set of Internet features and provides full flexibility for advertising, filtering, and modifying routes.Routing policies are set according to route parameters,such as prefixes, prefix lengths, and BGP attributes.You can install a redundant Routing Engine to ensuremaximum system availability and to minimize MTTR in case of failure.JUNOS Internet SoftwareJUNOS software is optimized to scale to large numbers of network interfaces and routes. The software consists of a series of system processes running in protected memory on top of an independent operating system. The modular design improves reliability by protecting against system-wide failure since the failure of one software process does not affect other processes.SuppliesBack ViewM20 Router Front and Back ViewsFront View14 inS p e c i f i c a t i o n sSpecification DescriptionCopyright © 2000, Juniper Networks, Inc. All rights reserved. Juniper Networks is a registered trademark of Juniper Networks, Inc. Internet Processor,Internet Processor II, JUNOS, M5, M10, M20, M40, and M160 are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks may be the property of their respective owners. All specifications are subject to change without notice.Printed in USA.O r d e r i n g I n f o r m a t i o nModel NumberDescriptionPart Number 100009-003 09/00w w w.j u n i p e r.n e tC O R P O R AT EH E A D Q U A R T E RSJuniper Networks, Inc.1194 North Mathilda Avenue Sunnyvale, CA 94089 USAPhone 408 745 2000 or 888 JUNIPER Fax 408 745 2100Juniper Networks, Inc. has sales offices worldwide.For contact information, refer to /contactus.html .。
radix树路由表的设计原理
radix树路由表的设计原理Radix树是一种用于路由表的数据结构,它通过将共同的前缀合并到一起来实现高效的存储和搜索。
The radix tree is a data structure used for routing tables, which achieves efficient storage and searching by merging common prefixes together.Radix树通常用于IPv4和IPv6路由表的实现,因为它可以有效地存储大量的IP地址。
The radix tree is commonly used for implementing IPv4 and IPv6 routing tables, as it can efficiently store a large number of IP addresses.它通过将路由表条目按照二进制位进行分割,并将相同前缀的条目合并到一起来节省空间。
It divides the routing table entries by binary bits and merges entries with the same prefix to save space.由于Radix树的设计原理,它可以快速定位到与特定IP地址最匹配的路由表条目,从而实现快速的数据包转发。
Due to the design principles of radix tree, it canquickly locate the routing table entry that best matches a specific IP address, achieving fast packet forwarding.Radix树的搜索时间复杂度为O(m),其中m是IP地址长度的平均值,相比于其他数据结构来说具有较优的性能。
The search time complexity of radix tree is O(m), where m is the average length of IP addresses, which makes it perform better compared to other data structures.它还可以被用于其他领域,如字符串搜索和路由选择算法的实现。
路由与交换技术的基础知识
路由与交换技术的基础知识Routing and switching are fundamental technologies in networking that play a crucial role in ensuring data packets are delivered efficiently and securely. 路由和交换是网络中至关重要的基础技术,它们在确保数据包高效安全地传输方面发挥着关键作用。
Routing refers to the process of forwarding data packets between different networks, while switching involves the direct connection of devices within a single network. 路由是指在不同网络之间转发数据包的过程,而交换则涉及在单个网络内直接连接设备的过程。
In the world of networking, routers are the devices responsible for routing data packets between networks. 在网络世界中,路由器是负责在网络之间路由数据包的设备。
Routers use routing tables to determine the best path for data packets to reach their destination, taking into account factors such as network congestion, link quality, and routing protocols. 路由器使用路由表来确定数据包到达目的地的最佳路径,考虑到网络拥塞、链路质量和路由协议等因素。
Switches, on the other hand, are devices used within a single network to connect devices and enable communication between them. 另一方面,交换机是在单个网络中用于连接设备并实现它们之间通信的设备。
信息与通信工程专业英语
Engineering Professi
目录
• Overview of Information and Communication Engineering
• Vocabulary for Information and Communication Engineering
A measure of the uncertainty or randomness of a message source It quantifies the average amount of information in a message
A measure of the amount of information shared between two random variables It quantifies the dependency between two variables
Application fields of information and communication engineering
Transportation
ICE has applications in transportation systems, such as intelligent transportation systems (ITS) that utilize communication technology for traffic management, vehicle navigation, and consolidation avoidance
Engineering
Vocabulary for Information Theory
Assignment2题库(1)chap2
Assignment 2题库True/FalseIndicate whether the statement is true or false.__T__ works of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.__F__ 2. The USENET was the earliest of the networks that eventually combined to become what we now call the Internet.__T__ 3. E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network.__T__ 4. In 1989, the NSF permitted two commercial e-mail services, MCI Mail and CompuServe, to establish limited connections to the Internet for the sole purpose of exchanging e-mail transmissions with users of the Internet.__T__ 5. A network of computers that are located close together—for example, in the same building—is called a local area network.__F__ 6. The Internet provides a high degree of security in its basic structure.__T__ 7. Although fax, telephone, e-mail, and overnight express carriers have been the main communications tools for business for many years, extranets can replace many of them at a lower cost.__F__ 8. An intranet extends beyond the organization that created it.__F__ 9. The “virtual” part of VPN means that the connectio n seems to be a temporary, internal network connection, but the connection is actually permanent.__T__ 10. VPN software must be installed on the computers at both ends of the transmission.__F__ 11. The technologies used (public networks, private networks, or VPNs) are independent of organizational boundaries.__T__ 12. IP addresses appear as five numbers separated by periods.__F__ 13. SMTP is a common protocol used for sending and retrieving e-mail.__T__ 14. IMAP is a newer e-mail protocol that performs the same basic functions as POP, but includes additional features.__T__ 15. The POP protocol provides support for MIME.__T__ 16. At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.__T__ 17. The set of rules for delivering Web page files over the Internet is in a protocol called the Hypertext Transfer Protocol (HTTP).__F__ 18. An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.__T__ 19. Domain names are sets of words that are assigned to specific IP addresses.__F__ 20. The Internet Corporation for Actualized Names and Nuances has the responsibility of managing domain names and coordinating them with the IP address registrars.__F__ 21. HTML is a meta language because users can create their own markup elements that extend the usefulness of XML.__T__ 22. SGML offers a system of marking up documents that is independent of any software application.__T__ 23. The term cascading is used because designers can apply many style sheets to the same Web page, one on top of the other.__T__ 24. The higher the bandwidth, the faster data files travel and the faster Web pages appear on your screen.__T__ 25. Asymmetric connections provide the same bandwidth for each direction.Multiple ChoiceIdentify the choice that best completes the statement or answers the question.__c__ 1. The combination of telephone lines and the closed switches that connect them to each other is called a ____.N c. circuitb. WAN d. pathway__d__ 2. On a packet-switched network, files and e-mail messages are broken down into small pieces, called ____.a.Messages c. circuitsb. pieces d. packets__c__ 3. When packets leave a network to travel on the Internet, they must be translated intoa standard format. ____ usually perform this translation function.a.Switches c. Routersb. Bridges d. Routing algorithms__d__ 4. Routers and the telecommunications lines connecting them are collectively referred to as ____.a.backbone routers c. an asynchronous backboneb. Internet routers d. the Internet backbone__c__ 5. A(n) ____ does not extend beyond the boundaries of a particular organization.a.Internet c. intranetb. extranet d. ARPANET__a__ 6. A(n) ____ is like a separate, covered commuter lane on a highway (the Internet) in which passengers are protected from being seen by the vehicles traveling in the other lanes.a.VPN c. extranetb. IP wrapper d. IAP__c__ 7. A(n) ____ is a connection that uses public networks and their protocols to send data in a way that protects the data as well as a private network would, but at a lower cost.a.public network c. virtual private networkb. virtual public network d. private network__c__ 8. A ____ is a collection of rules for formatting, ordering, and error checking data sent across a network.a.routing algorithm c. protocolb. backbone router d. packet__c__ 9. ____ determine how the sending device indicates that it has finished sending a message, and how the receiving device indicates that it has received the message.a.Routers c. Protocolsb. Bridges d. Adapters__a__ 10. In networking applications, an 8-bit number is often called a(n) ____.a.octet c. piconetb. netbit d. bit__a__ 11. Network engineers have devised a number of stopgap techniques to stretch the supply of IP addresses. One of the most popular techniques is ____.a.subnetting c. sub-blockingb. subletting d. piconetting__b__ 12. A computer called a ____ converts private IP addresses into normal IP address when it forwards packets from those computers to the Internet.a.routing algorithm device c. subnet translation deviceb. network address translation device d. private network device__a__ 13. The ____ numbering system uses 16 characters.a.hexadecimal c. Binaryb. decimal d. ASCII__c__ 14. IPv6 uses a ___ number for addresses.a. 32-bit c. 128-bitb. 56-bit d. 256-bit__c__ 15. The purpose of a(n) ____ is to respond to requests for Web pages from Web clients.a. URL c. Web serverb. e-mail d. top-level domain__a__ 16. ____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.a.SMTP c. MIMEb. TCP/IP d. POP__a__ 17. A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as ____.a.IMAP c. POPIb. SMTP d. IPOP__c__ 18. ____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server.a.POP c. IMAPb. SMTP d. MIME__b__ 19. ____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips, that are attached to e-mail messages.a.IMAP c. SMTPb. MIME d. POP__c__ 20. The combination of the protocol name and the domain name is called the ____.a.URT c. URLb. URO d. HTTP__d__ 21. HTML was developed by ____.a.ARPANET c. Ted Nelsonb. NSF d. Tim Berners-Lee__a__ 22. ____ was the first Web browser that became widely available for personalcomputers.a. Mosaic c. Internet Explorerb. Netscape d. CompuServe__a__ 23. ____ are sets of words that are assigned to specific IP addresses.a.Domain names c. Octetsb. URLs d. Piconets__b__ 24. The early versions of ____ let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.a.HTTP c. SGMLb. HTML d. XML__b__ 25. In HTML, hyperlinks are created using the HTML ____ tag.a.head c. titleb. anchor d. olEssay1. As an individual packet travels from one network to another, the computers through which the packet travels determine the best route for getting the packet to its destination. Describe this process.Ans: The computers that decide how to best forward each packet are called routing computers, router computers, routers, gateway computers (because they act as the gateway from a LAN or WAN to the Internet) or border routers (because they are located at the border between the organization and the Internet.) The programs on the routers that determine the best path contain rules called routing algorithms. The programs apply these algorithms to information they have stored in routing tables or configuration tables. This information includes lists of connections that lead to particular groups of other routers, rules that specify which connection to use first, and rules for handling instances of heavy packet traffic and network congestion.2. What is the difference between a public network and a private network?Ans: The open architecture philosophy developed for the evolving ARPANET, which later became the core of the Internet, included the use of a common protocol for all computers connected to the Internet and four key rules for message handling:①Independent networks should not require any internal changes to be connected to the network,②Packets that do not arrive at their destinations must be retransmitted from their source network,③Router computers act as receive-and-forward devices; they do not retain information about the packets that they handle, and④No global control exists over the network.3. Identify the four key rules for message handling.Ans: The TCP controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations. The IP specifies the addressing details for each packet, labeling each with the packet’s origination and destination addresses.4.What is the difference between TCP and IP?Ans: The TCP controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations. The IP specifies the addressing details for each packet, labeling each with the packet’s origination and destination addresses.5. What are the advantages of Bluetooth technology?Ans: One major advantage of Bluetooth technology is that it consumes very little power, which is an important consideration for many devices. Another advantage is that Bluetooth devices can discover each other and exchange information automatically. For example, a person using a laptop computer in a temporary office can print to a local Bluetooth-enabled printer without logging in to the network or installing software in either device. The printer and laptop computer electronically recognize each other as Bluetooth devices and immediately can begin exchanging information.。
TOPOLOGY AGGREGATION FOR HIERARCHICAL ROUTING
专利名称:TOPOLOGY AGGREGATION FORHIERARCHICAL ROUTING发明人:BAUGHAN, Kevin,CONSTANTINOU, Constantinos, Christofi,STEPANENKO,Alexander, Sergeevich,ARVANITIS,Theodoros申请号:EP2004050195申请日:20040224公开号:WO04/086692P1公开日:20041007专利内容由知识产权出版社提供摘要:A method of generating routing tables for a data communication network. With the method the network is defined in terms of a plurality of nodes (NO.1-NO.10) interconnected by links across which data travels. The method then simplifies the network into a deterministic structure through a series of recursive abstractions identifying one or more logical levels, with each logical level defining groupings of nodes based on closed rings (R1.1, R1.2, R1.3, R1.4, R1.5). The routing table is then populated with routes based on the logical levels that provide a deterministic path to each destination and the diversity of paths that can be used to follow that route based on the underlying closed rings in each lower logical level. The method thereby enables deterministic routing to be achieved whilst providing a rich set of diverse paths across the network for each route. The method is also particularly suited to both responding quickly to congestion or failure at a local part of the network as well as responding progressively to congestion or failure in distant parts of the network.申请人:BAUGHAN, Kevin,CONSTANTINOU, Constantinos, Christofi,STEPANENKO, Alexander, Sergeevich,ARVANITIS, Theodoros地址:42 Horseguards Drive Maidenhead Berkshire SL6 1XL GB,42 Horseguards Drive Maidenhead Berkshire SL6 1XL GB,9 Barrack Close Sutton Coldfield West Midlands B75 7HB GB,156 Green Meadow Road Selly Oak Birmingham West Midlands B29 4DR GB,8 Naunton Close Selly Oak Birmingham West Midlands B29 4DX GB国籍:GB,GB,GB,GB,GB代理机构:PERKINS, Sarah更多信息请下载全文后查看。
路由表详解(Routingtable)
路由表详解(Routing table)Routing table detailed.Txt "I envy some of the elderly, envy them hand in hand until the end.". - pay the bill when they found themselves so valuable. Routing table detailed 2009-05-29, 14:55 routing table instructions (detailed explanation route print)Read the Nello routing table, find this article, a more detailed explanation of the routing table, this is still more common, and share with youRouting table specification------------------------------------------------------------------------------ source:--------------------------------------------------------------------------------Active Routes:Network, Destination, Netmask, Gateway, Interface, Metric0.0.0.0 0.0.0.0 192.168.123.254 192.168.123.88 10.0.0.0 0.0.0.0 192.168.123.254 192.168.123.68 1127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1192.168.123.0 255.255.255.0 192.168.123.68 192.168.123.68 1192.168.123.0 255.255.255.0 192.168.123.88 192.168.123.88 1192.168.123.68 255.255.255.255 127.0.0.1 127.0.0.1 1192.168.123.88 255.255.255.255 127.0.0.1 127.0.0.1 1192.168.123.255 255.255.255.255 192.168.123.68192.168.123.68 1192.168.123.255 255.255.255.255 192.168.123.88192.168.123.88 1224.0.0.0 224.0.0.0 192.168.123.68 192.168.123.68 1224.0.0.0 224.0.0.0 192.168.123.88 192.168.123.88 1255.255.255.255 255.255.255.255 192.168.123.68192.168.123.68 1Default Gateway: 192.168.123.254-----------------------------------------------------------------------------------------------------------------------------------------------------------------------Current routing:Destination destination segmentMask subnet maskInterface exports of the router to this destination IPGateway the next hop router IP, the router through interface and gateway define a transfer to the next router link, usually interface and gateway is the same network segmentMetric hop number, the quality of routing records. In general, if there are multiple routing records that arrive at the same destination, the router will take the route with a smaller metric valueArticle 1Default routing: that is, when a packet's destination segment is not in your routing record, then where does your router send the packet?! The gateway for the default route is determined by the default gateway on your connectionThe route record when I received a packet to the routing segment without my record, I will send the packet through the192.168.123.88 interface to send 192.168.123.254 to this address, this address is an interface of a router, so the packet will be delivered to the next a router, has nothing to do with me. The route quality of the routing record is 1Second articleThe default route: the route record when I received a packet to the routing segment without my record, I will send the packet through the 192.168.123.68 interface to send 192.168.123.254 to this address,This address is an interface to the next router, so that this packet can be delivered to the next router for processing, and has nothing to do with me. The route quality of the routing record is 1Third articleLocal loop: 127.0.0.0, all the addresses within the network point to your machine. If you receive such data, where should you send it? The route quality of the route is 1Fourth articleDirect connection segment routing record: when routers receive packets to direct network segments, what should be done? In this case, the interface and gateway of the routing records are the same.When I received a packet to the network segment is 192.168.123.0, I will 192.168.123.68 the packet out through this interface directly, because it is directly connected to the 192.168.123.0 port of the network, the routing records of the line quality 1Fifth articleDirect link segment routing recordWhen I received a packet to the network segment is 192.168.123.0, I will 192.168.123.88 the packet out through this interface directly, because it is directly connected to the 192.168.123.0port of the network, the routing records of the line quality 1Sixth articleLocal host Routing: what happens when a router receives a packet sent to itself?When I receive a packet whose destination segment is192.168.123.68, I will accept the packet because the packet is sent to me by myself, and the route quality of the routing record is 1Seventh articleLocal host Routing: what happens when a router receives a packet sent to itself?When I receive a packet whose destination segment is192.168.123.88, I will accept the packet because the packet is sent to me by myself, and the route quality of the routing record is 1Eighth articleLocal broadcast routing: what happens when a router receives a local broadcast sent to a direct network segment?When I receive the broadcast packet's destination network segment is 192.168.123.255, I will send this data from the 192.168.123.68 interface to the broadcast situation. The routequality of the routing record is 1Ninth articleLocal broadcast routing: what happens when a router receives a local broadcast sent to a direct network segment?When I receive the broadcast packet's destination network segment is 192.168.123.255, I will send this data from the 192.168.123.88 interface to the broadcast situation. The route quality of the routing record is 1Tenth articleMulticast Routing: what happens when a router receives a multicast packet?When I receive multicast packets, I send the data from the 192.168.123.68 interface to the multicast situation, which has a routing quality of 1Eleventh articleMulticast Routing: what happens when a router receives a multicast packet?When I receive multicast packets, I send the data from the 192.168.123.88 interface to the multicast situation, which has a routing quality of 1Twelfth articleBroadcast routing: what happens when a router receives an absolute broadcast?When I receive an absolute broadcast packet, the packet is discardedThis example demonstrates access to different addresses from different gatewaysRoute delete 0.0.0.0Route, add, 172.0.0.0, mask, 255.0.0.0, 172.31.50.254Route, add, 0.0.0.0, mask, 0.0.0.0, 172.31.50.1Route, add, 192.168.10.0, mask, 255.255.255.0, 172.31.50.254That's probably how it works. If you have two network cards or two lines, you can use this commandRouteDisplays and modifies entries in the local IP routing table.grammarRoute, [-f], [-p], [Command, [Destination], [mask, Netmask], [Gateway], [metric,, Metric]], [if, Interface]]parameter-fClear all is not the main routing (mask 255.255.255.255 routing), loop network routing (target 127.0.0.0, subnet mask for 255.255.255.0 routing) or multicast routing (target 224.0.0.0, mask 240.0.0.0 routing) routing table entries. If it is used in conjunction with one of the commands (such as add, change, or delete), the table will be cleared before the command is run.-pWhen used with the add command, the specified route is added to the registry and the IP routing table is initialized when the TCP/IP protocol is started. By default, the additional routing is not saved when the TCP/IP protocol is started. When used with the print command, the permanent routing list is displayed. This parameter is ignored by all other commands. The location of the permanent route stored in the registry is HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ Parameters\PersistentRoutes.CommandSpecify the command to run. The following table lists the valid commands. Command purposeAdd add routingChange changes existing routingDelete delete routingPrint print routing DestinationSpecifies the network destination address of the route. The destination address can be a IP network address (where the host address of the network address is set to 0). For the host, routing is the IP address, and the default route is 0.0.0.0.Mask SubnetMaskSpecifies the network mask associated with the network destination address (also called subnet mask). The subnet mask can be a proper subnet mask for the IP network address, and for the host the route is 255.255.255.255, and the default route is 0.0.0.0. If ignored, use the subnet mask 255.255.255.255. When defining a route, the destination address cannot be more detailed than its corresponding subnet mask due to the relationship between the destination address and the subnet mask. In other words, if one of the subnet masks is 0, the corresponding bits in the target address cannot be set to 1.GatewaySpecifies the first or next hop IP address that exceeds the reachable address set defined by the network target and subnet mask. For local connection subnet routing, the gateway address is assigned to the IP address that connects the subnet interface. For remote routing that is available through one or more routers, the gateway address is a IP address that can be reached directlyto adjacent routers.Metric MetricThe integer value that specifies the required hop count for a route (range 1 to 9999) is used to select the most suitable route for the destination address in the forwarding packet in multiple routes within the routing table. The selected route has the fewest hops. Hops can reflect the number of hops, the speed of the path, the path reliability, the path throughput and the management attributes.If InterfaceSpecifies the interface index of the interface to which the target can arrive. Using the route print command, you can display a list of interfaces and their corresponding interface indexes. For interface indexes, you can use decimal or sixteen decimal values. For the sixteen decimal value, add the 0x in front of the sixteen hexadecimal number. When the if parameter is ignored, the interface is determined by the gateway address./?Display help at command prompt.NotesThe value of a jump column in the routing table is larger because it allows TCP/IP to automatically determine the number of hops in the routing table based on the IP address, subnet mask, andthe configuration of the default gateway for each LAN interface. The default start automatically determines the interface hops, determines the speed of each interface, and adjusts the number of routing hops per interface, so the route created by the fastest interface has the lowest hop count. To remove the maximum number of hops,Disable automatic determination of interface hops in advanced attributes of the TCP/IP protocol for each LAN connection.If you have the appropriate entry in the local network file in the systemroot\System32\Drivers\Etc folder, the name can be used for Destination. As long as the name through the "domain name system" (DNS) query standard host name resolution techniques such as decomposition of the IP address, it can be used for Gateway, DNS and NetBIOS for local host file name stored in the systemroot\System32\Drivers\Etc folder under the use of.If it is a print or delete command, you can ignore the Gateway parameter and use wildcards to represent the target and gateway. The value of Destination can be a wildcard specified by an asterisk (*). If the specified target contains an asterisk (*) or a question mark, it is treated as a wildcard and prints or deletes the matched target route only. An asterisk stands for any character sequence, and a question mark stands for any character. For example, 10.*.1, 192.168.*, 127.*, and *224* are all valid use of asterisk wildcards.Using a combination of invalid target and subnet mask (mesh mask) values, the Route:bad gateway address netmask error message isdisplayed. This error occurs when one or more of the targets are set to 0, and when the corresponding bit in the subnet mask is set to 1. This can be checked by binary representation of the target and subnet mask. A subnet mask represented in binary, including a series of 0 and two parts representing the target network address section, a series of 1, and a part of the address of the target host. Check the target host address portion to determine target (defined subnet mask) whether some bits are set to 1.Only the route commands for Windows NT 4, Windows 2000, Windows, Millennium, Edition, and Windows XP support the -p parameter. This parameter is not supported by the route command of Windows 95 or Windows 98.This command is available only when the Internet Protocol (TCP/IP) protocol is installed as a component of the network adapter property in the network connection.ExampleTo display the full contents of the IP routing table, type:Route printTo display a route starting at 10. in the IP routing table, type:Route print 10.*To add the default gateway address to the default path for 192.168.12.1, type:Route, add, 0.0.0.0, mask, 0.0.0.0, 192.168.12.1To add the target to 10.41.0.0, the subnet mask to 255.255.0.0, and the next hop address to 10.27.0.1 routing, type in:Route, add, 10.41.0.0, mask, 255.255.0.0, 10.27.0.1To add the target to 10.41.0.0, the subnet mask is 255.255.0.0, and the next hop address to 10.27.0.1 is the permanent route. Type in, please:Route, -p, add, 10.41.0.0, mask, 255.255.0.0, 10.27.0.1To add the target to 10.41.0.0, the subnet mask to 255.255.0.0, the next hop address to 10.27.0.1, and the hop count to 7, please type:Route, add, 10.41.0.0, mask, 255.255.0.0, 10.27.0.1, metric, 7To add the target to 10.41.0.0, the subnet mask is 255.255.0.0, the next hop address is 10.27.0.1, and the interface index to 0x3 is routed. Type in, please:Route, add, 10.41.0.0, mask, 255.255.0.0, 10.27.0.1, if, 0x3To delete the route whose destination is 10.41.0.0 and the subnet mask is 255.255.0.0, type:Route, delete, 10.41.0.0, mask, 255.255.0.0To delete all routes starting from 10. in the IP routing table, type:Route delete 10.*To target 10.41.0.0, the next hop of the routing for subnet mask 255.255.0.0 is changed from 10.27.0.1 to 10.27.0.25, and type in:Route, change, 10.41.0.0, mask, 255.255.0.0, 10.27.0.25<? Xml:namespace prefix = o ns ="urn:schemas-microsoft-com:office:office" / >Route commandRouting, IP, add/delete/set/show, interface add, delete, configure, or display the regular IP routing settings on the specified interface.Routing, IP, add/delete/set/show, filter add, delete, configure, or display IP packet filters on the specified interface.Routing IP add/delete/show boundary adds, deletes, or displays multicast boundary settings on the specified interface.Routing IP add/set ipiptunnel adds or configure the IP interface in IP.Routing, IP, add/delete/set/show, rtmroute add, configure, or display non persistent routing table manager routing.Routing, IP, add/delete/set/show, persistentroute, add, delete, configure, or display persistent routing.Routing, IP, add/delete/set/show, preferenceforprotocol add, delete, configure, or display the priority of the routing protocol.Routing, IP, add/delete/set/show, scope, add, delete, or display multicast scopes.Routing IP set/show loglevel configure or display the global IP record level.The routing IP show helper displays all the Netsh utility sub - environments for IP.The routing IP show protocol displays all the running IP routing protocols.Routing IP show MFE displays multicast forwarding items.Routing IP show mfestats displays multicast forwarding item statistics.The routing IP show boundarystats displays the IP multicast boundary.The routing IP show rtmdestinations displays the target in therouting table manager routing table.The routing IP show rtmroutes displays routing in the routing table manager routing table.Routing IP NAT set/show global configuration or display global network address translation (NAT) settings.Routing, IP, NAT, add/delete/set/show, interface, add, delete, configure, or display the NAT settings for the specified interface.Routing IP NAT add/delete addressrange adds or removes an address range in the NAT interface common address pool.Routing IP NAT add/delete addressmapping adds or removes NAT address mappings.Routing IP NAT add/delete portmapping to add or remove NAT port mappings.Routing IP autodhcp set/show global configuration or display global DHCP allocator parameters.Routing IP autodhcp set/show interface configure or display the DHCP allocator settings for the specified interface.Routing IP autodhcp add/delete exclusion adds or removes a exclude range in the address range of the DHCP allocator.Routing IP dnsproxy set/show global configuration or displayglobal DNS proxy parameters.Routing IP dnsproxy set/show interface configure or display the DNS proxy parameters for the specified interface.Routing, IP, IGMP, set/show, global, configure, or display the IGMP global settings.IGMP添加/删除/设置/显示接口在指定接口上添加、删除、配置或显示IGMP。
CommScope SYSTIMAX InstaPATCH 360 Pre-Terminated F
2 InstaPATCH ® 360 Pre-Terminated Fiber SolutionData Center SolutionsThe information in this solution guide will be instrumental in helping you determine the right products to use in your network in order to meet your technical and business objectives. Easy-to-follow flowcharts will help you align your needs with ultra high, high and standard density solutions. Covering the entire InstaPATCH ® 360 Solution, including modules, panels, shelves, cables and cords, this solution guide simplifies the design process to help you build an effective network around the InstaPATCH 360 Solution.Based on CommScope’s years of experience in fiber and pre-terminated solutions, the SYSTIMAX ® InstaPATCH 360 Solution is the next generation of pre-terminated fiber solutions. Developed by CommScope Labs, the InstaPATCH 360 Solution is designed to support environments such as data centers that require rapid deployment and high performance. Built around pre-terminated panels, InstaPATCH 360 is a comprehensive, modular fiber connectivity solution that includes patch panels and shelves, individual modules, trunk cables, ruggedized fanouts, array cords and fiber patch cords.Supporting today’s demanding applications and the emerging applications of tomorrow, the InstaPATCH 360 Solution incorporates SYSTIMAX OptiSPEED ®62.5 μm multimode, LazrSPEED ®50 μmmultimode and TeraSPEED ® singlemode fiber technologies. The pre-terminated hardware of the SYSTIMAX LazrSPEED Solution is builtwith LazrSPEED 550 OM4 multimode fiber and supports 10 Gbps Ethernet applications, as well as 40 Gbps and 100Gbps Ethernet and emerging 16 Gbps Fibre Channel standards. The pre-terminated hardware provides “low-loss” performance, coupled with high bandwidth to give best-in-class application support. Trunk cables are available in LazrSPEED 550 and 300 performance grades to address the wide range of requirements of system operators.InstaPATCH 360 modules are directly compatible with the SYSTIMAX G2 Modular Cassette System, supporting the installation of 24 MPO/LC modules to achieve 576 fibers in a four-rack unit shelf.InstaPATCH 360 is another breakthrough in a long line of connectivity solutions from CommScope. A longtime leader in physical network infrastructure solutions, CommScope has high-performance products deployed in the world’s most demanding environments.Key features & benefits·Pre-terminated solution slashes labor for a lower totalinstalled system cost·Factory terminated and tested cable and apparatus forinstant field connections with guaranteed quality andperformance·Increased density reduces space by 50%·Supports easy reconfiguration for moves, adds andchanges·Improved fiber patch cord management and improvedlabeling capabilities·Designed for administrative convenience –guaranteed transmit-to-receive connectivity·Excellent cable management and rear access whileminimizing bulk, complexity and potential restrictionsto air flow·iPatch-ready – upgradeable to intelligentinfrastructure management after the initial installation·Backed by best-in-industry SYSTIMAX warrantyInstaPATCH® 360 Pre-Terminated Fiber Solution Data Center Solutions 34 InstaPATCH ® 360 Pre-Terminated Fiber Solution Data Center SolutionsInstaPATCH ® 360 Pre-Terminated Fiber Solution Data Center Solutions 5Standard Density ApplicationHigh Density ApplicationUltra High Density Application6 InstaPATCH® 360 Pre-Terminated Fiber Solution Data Center SolutionsInstaPATCH® 360 Pre-Terminated Fiber Solution Data Center Solutions 78 InstaPATCH® 360 Pre-Terminated Fiber Solution Data Center SolutionsInstaPATCH ® 360 Pre-Terminated Fiber Solution Data Center Solutions 9Modules, Panel and/or ShelvesThe tables below show the capacity for each InstaPATCH ® shelf based onconnector selection and height option. Select a shelf based on capacity and select appropriate number of modules.InstaPATCH 360 ModuleSYSTIMAX 360 G2 Adapter PanelSYSTIMAX 360G2-1UModular ShelfInstaPATCH 360MP-1U PanelInstaPATCH 360MP-4U PanelInstaPATCH 360G2-4U UHD ShelfSYSTIMAX 360 G2 Panels and Shelves* iPatch ReadyInstaPATCH ®360 G2 ModulesInstaPATCH ®360 G2 Adapter Panels10 InstaPATCH ® 360 Pre-Terminated Fiber SolutionData Center SolutionsInstaPATCH In-line MPOAdapter HousingUMB-360 InstaPATCH Panel SYSTIMAX 360-1U UHD ShelfSYSTIMAX 360 Ultra High Density ProductsAdditional Housing OptionsModules, Panel and/or Shelves (cont.)The tables below show the capacity for each InstaPATCH ® shelf based on connector selection and height option. Select a shelf based on capacity and select appropriate number of modules.Cable AssembliesSelect appropriate cable code from ordering information tables based on cable preference and specify customized cables code including length per cable configurator.InstaPATCH® 360 Trunk Cables and ExtensionsThe InstaPATCH® 360 trunk cables feature a round cable constructionwhich eliminates bend sensitivity allowing for easy routing and are offered in 12, 24, 36, 48, 72,96 and 144 fibers. The cables are constructed with multiple subunits, each with 12 fibers andterminated on both ends with MPO connectors.All trunk cables can be ordered with or without a pulling grip and with or without a cable mounting gland.Trunk extensions use a pinned MPO on one end and a non-pinned MPO on the opposite end.These are used to extend a system to a new area.InstaPATCH® 360 Pre-Terminated Fiber Solution Data Center Solutions 1112 InstaPATCH ® 360 Pre-Terminated Fiber Solution Data Center SolutionsCable Assemblies (cont.)Select fanout cables and/or cords to connect to equipment or for cross-connect.InstaPATCH ® 360 Ruggedized and Array Fanout CablesThe InstaPATCH ® 360 ruggedized fanout cables support the direct connection to the equipment from the patch panel. Terminated with MPO connectors on one end and clipped duplex connectors (LC, SC or ST) on the other end, the ruggedized fanout cables are available in 12-, 24-, 36-, 48- and 72- fiber counts. Female MPO (MP - no pins) fanouts are utilized for connections to equipment from a InstaPATCH 360 module. Male MPO (MX - pinned) fanouts are utilized for connections to equipment directly from a trunk cable.Array fanouts can be terminated with MPO connectors on one end and clipped duplex connectors (LC, SC, ST) on the other end. Different from ruggedized fanouts which include an outer sheath to protect the fiber on longer runs between racks, array cords utilize 3.0 mm 12 fiber cordage that is protected with aramid yarn for durability and allowing maximum flexibility within a rack/cabinet. Array fanouts with MPO to duplex connectors(LC, SC, ST) are used for directly connecting equipment to a trunk or InstaPATCH 360 Module.Ordering informationInstaPATCH® 360 Pre-Terminated Fiber Solution Data Center Solutions 13InstaPATCH® 360 Array Fanout Cables14 InstaPATCH® 360 Pre-Terminated Fiber Solution Data Center SolutionsCable Assemblies (cont.)Select fanout cables and/or cords to connect to equipment or for cross-connect.InstaPATCH® 360 Array CordsArray cords are terminated with MPO connectors on both ends. MPO to MPO array cords are used for trunk extension, cross-connect applications or patching into parallel transceivers or array equipment.InstaPATCH® 360 Pre-Terminated Fiber Solution Data Center Solutions 15Patch CordsSelect patch cords to connect to equipment or for cross-connect. Fiber Optic Patch CordsThe final fiber optic component of your connectivity solution, Fiber Optic Patch Cords support the connection of the backbone fiber cabling plant to the transceiver/optical electronics. Patch cords (a.k.a. jumpers) are also used to cross-connect segments of cabling infrastructure to another.Made of rugged round construction in customer-specified lengths of 1- or 2- fiber cable, our patch cords are available in LazrSPEED, TeraSPEED and OptiSPEED in any combination of SC, LCand ST connectors.16 InstaPATCH® 360 Pre-Terminated Fiber Solution Data Center SolutionsInstaPATCH ® 360 Pre-Terminated Fiber SolutionData Center Solutions 17Pulling GripsStand-alone pulling grip kits are also offered in four different sizes: one for 12 fibers, one for 24 fibers, one for 36, 48 and 72 fibers, one for 96 and 144 fibers. The grips are reusable, so the installer can order one pulling grip kit for every 5 or 10 cables instead ofordering all trunk cables with pulling grips installed.CommScope pushes the boundaries of communications technology with game-changing ideas and ground-breaking discoveries that spark profound human achievement. We collaborate with our customers and partners to design, create and build the world’s most advanced networks. It is our passion and commitment to identify the next opportunity and realize a better tomorrow. Discover more at CO-107671.4-EN (08/18)Visit our website or contact your local CommScope representative for more information.© 2018 CommScope, Inc. All rights reserved.Unless otherwise noted, all trademarks identified by ® or ™ are registered trademarks, respectively, of CommScope, Inc. This document is for planning purposes only and is not intended to modify or supplement any specifications or warranties relating to CommScope products or services. CommScope is committed to the highest standards of business integrity and environmental sustainability with a number of CommScope’s facilities across the globe certified in accordance with international standards, including ISO 9001, TL 9000, and ISO 14001. Further information regarding CommScope’s commitment can be found at /About-Us/Corporate-Responsibility-and-Sustainability .。
华为AR3600系列企业路由器数据表说明书
Huawei AR3600 SeriesEnterprise Routers DatasheetRealize Your PotentialAR3600 Series Enterprise RoutersAR3600 Series Enterprise RoutersEnterprises require better services in addition to simple connections. As there are increasingrequirements of customization services, enterprises require a more agile service router to provide highperformance and multiple functions as well as develop new services. This poses higher requirementsfor traditional router products.As the core product in Huawei Enterprise Branch Solution, the AR3600 uses virtualization technologyfor the first time to implement deep IT and CT integration and achieve convergence and sharing ofnetwork and IT resources. The AR3600 helps enterprises quickly launch new applications and solutionsand provides enterprises with better services.Product OverviewThe AR3600 series enterprise router uses the multi-core processor, fully meets customer requirements onthe performance, delay, reliability, and security, and guarantees continuous performance improvement andsoftware application extension. With the built-in X86 platform, the AR3600 has great flexibility and is able tosupport virtualization. By integrating third-party network applications, the AR3600 provides more diversifiedservices.• Integrates routing, switching, security, WLAN, and VPN, meeting diversified requirements of enterprisesand maximizing the return on investment (ROI).• Supports various access modes and uplink interfaces, adapts to various terminals, offers different rates,allows flexible access, and is interchangeable with AR G3 series boards, protecting investments.• Provides a high-performance computing and large-capacity storage system, and allows variousapplications to be dynamically loaded, without the need to deploy servers independently. This savesinvestments and facilitates management.• Uses the SDN&NFV architecture for the first time in industry, and implements lifecycle management ofICT resources such as the application deployment, monitoring, and deletion through the Agile Controller.• Supports virtualization technology, provides a flexible and scalable application integration capability,shortens service deployment, and implements value-added services.• Supports the OpenStack interfaces to integrate with third-party management software.• USB-based deployment and plug-and-play.• Detects faults with no delay, locates faults with no errors, and rectifies faults immediately.• Manages massive devices in a centralized manner, greatly simplifying branch service deployment andlowering network maintenance costs.ICT Deep Integration, Reducing the TCOInnovative Architecture, Implementing Value-added ServicesSimplified Deployment and Easy O&M123Product HighlightsICT Integrated GatewayTypical ApplicationThe AR3600 series enterprise router integrates routing, switching, VPN, WLAN, and security functions, which meets Campus networkCampusAR160-MAR160-M StudentsTeacherClassroom 1StudentsTeacherClassroom NProduct SpecificationsSpecification AR3670Hardware specificationsService forwarding4.5 Gbit/sperformance***Number of2000recommended usersSIC slot2WSIC slot7/8(default/maximum**)XSIC slot0/6(default/maximum**)Management port One Ethernet portUSB 2.0 port2Mini USB port1Auxiliary or console port1Hard disk1TBMemory(default/8GB/24GBmaximum)Flash8GBVirtual Machines8 (Based on VM, the customers can install Windows OS or Linux OS.) Maximum power700 W per power supply (dual power supplies supported)AC power supply100 V to 240 VPower frequency50/60 HzDimensions (W x D x H)442 mm x 470 mm x 130.5 mmWeight11kg (without power modules and cards)Ambient temperature0o C to 45o CEnvironment relative5% to 95% (non-condensing)humidityOrdering InformationBegin by ordering the chassis, control board, power supply, and fan module. Then select a DSP card (if required), interface modules, any special licenses as well as any desired accessories (SD card or USB disk). Tables 5 - 13 list the part numbers to use when ordering components.Table 5: Chassis Options and Fan Module Table 6: Main Control Board Options Table 7: Power Supply Module OptionsTable 9: SIC Interface Module OptionsTable 10: WSIC and XSIC Interface Module Options Table 12: License OptionsTable 11: XSIC Interface Module Options Table 13: SD Card and USB Disk OptionsWSIC Interface Module DescriptionAR01WAE14A4-port E1 Inverse Multiplexing for ATM Interface CardAR01WDFE4A4-Port Fractional E1 WAN Interface CardAR01WDFE8A8-Port Fractional E1 WAN Interface CardAR01WDCE8A8-Port Channelized E1/PRI Multiflex Trunk Interface Card AR01WEG4SA4-Port 1000BASE-SFP-L3 Ethernet WAN Interface CardAR01WEG4TA4-Port 1000BASE-RJ45-L3 Ethernet WAN Interface Card AR0MWDAS8A018-Port Async Serial Port Interface CardAR-1STM1-W1-Port 155M Packet over SDH/Sonet Optical Interface Card AR-4STM1-W4-Port 155M Packet over SDH/Sonet Optical Interface CardAR0MWMF9TT008-Port 10/100BASE(RJ45) and 1-Port 10/100/1000BASE(RJ45)-L3 Ethernet Switch Interface CardAR-1STM4-W1-Port 622M Packet over SDH/Sonet Optical Interface CardAR-1CSTM1-W1-Port 155M Channelized Packet over SDH/Sonet Interface Card(WSIC) AR-1E3T3M-W1-Port Channelized/Unchannelized E3/T3 WAN Interface CardAR-8SA-W8-Port Sync/Async Serial WAN Interface CardAR-4GECS-W4-Port GE COMBO WAN Interface Card(support syncE)License DescriptionLAR0DATAE06AR3600 Value-Added Data PackageLAR0AC06AR3600 AC Express LicenseLAR0SECE06AR3600 Value-Added Security PackageLAR0DSVPN06AR3600 DSVPN(Dynamic Smart VPN) FunctionXSIC Interface Module DescriptionAR0MXEGFTA0024-Port 10/100/1000 BASE (RJ45)-L2/L3 Ethernet Interface CardSD Cards & USB Disks DescriptionNUSBDSK01Storage USB DISK,4GB,USB 2.0,No documentFor more information, visit or contact your local Huawei sales office.Copyright © Huawei Technologies Co., Ltd. 2017. All rights reserved.Trademark NoticeGeneral Disclaimer, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd.Other trademarks, product, service and company names mentioned are the property of their respective owners.The information in this document may contain predictive statementsincluding, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictivestatements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.HUAWEI TECHNOLOGIES CO.,LTD.Huawei Industrial BaseBantian LonggangShenzhen 518129,P.R.ChinaTel: +86 755 28780808。
透明网桥的优缺点
Root path cost: cost of the path to the root bridge with minimum cost.
Chapter 15 Networking and Internetworking Devices
Repeaters Bridges Routers Gateways Routing Algorithms
基本概念
互联网或网际网(internetwork) 子网(subnetwork) 中间系统(intermediate system)
Designated bridge,designated port: on each LAN, one bridge is chosen to be the designated bridge. Bridge on that LAN provides the min-cost cost path to the root bridge.
Connection of Two LANs
体系结构
工作原理
Fixed Routing—固定路由
Complex large LANs need alternative routes Load balancing Fault tolerance Bridge must decide whether to forward frame Bridge must decide which LAN to forward frame on Routing selected for each source-destination pair of LANs Done in configuration Usually least hop route Only changed when topology changes
SureComfort 20 橱柜型空调用户指南说明书
•Composite base pan – dampens sound, secures wire grille, e liminatescorrosion and reduces number of fasteners needed•Powder coat paint finish – for a long lasting professional finish•Scroll compressor – uses 70% fewer moving parts for higher efficiencyand increased reliability•Modern cabinet aesthetics – increased curb appeal with visuallyappealing design•Wire grille – provides ultimate coil protection, enhanced cabinetstrength, and increased cabinet rigidity•Optimized fan orifice – optimizes airflow and reduces unit sound•Rust resistant screws – confirmed through 1500-hour salt spray testing•Service valve has between3"-4"-5" service space – provides a mini-mum working area of 27-square inches for easier access•15" wide, industry leading corner service access – makes repairs easierand faster.•External gauge port access – allows easy connection of “low-loss”gauge ports•Single-row condenser coil – makes unit lighter and allows thoroughcoil cleaning to maintain “out of the box” performance•Fewer cabinet fasteners – allow for faster access to internal compo-nents and hassle-free panel removal•Service trays – hold fasteners or caps during service calls•QR code – provides technical information on demand for fasters ervice calls•Fan motor harness with extra long wires allows unit top to be removedwithout disconnecting fan wire.“Proper sizing and installation of equipment is critical to achieve optimalperformance. Split system air conditioners and heat pumps must bematched with appropriate coil components to meet Energy Star.Ask your Contractor for details or visit .”•Efficiencies 13-15SEER/11.5-13 EER•Nominal Sizes 11/2 to 5 Ton [5.28 to 17.6 kW]•Cooling Capacities 17.3 to 60.5 kBTU[5.7 to 17.7 kW]Sure Comfort®SA13Air ConditionersFORM NO. ASC-221 REV. 3Table of ContentsStandard Feature (3)Available SKUs (3)Features & Benefits..............................................................................................4-5Model Number Identification................................................................................6-7General Data/Electrical Data (8)Accessories (9)Weighted Sound Power (9)Unit Dimensions (10)Clearances (11)Wiring Diagrams (12)Application Guidelines (12)Refrigerant Line Size Information......................................................................13-16Performance Data............................................................................................17-36Guide Specifications (37)Limited Warranty (38)3Standard Feature TableThe SA13 is our 13 SEER air conditioner and is part of the Sure Comfort air conditioner product line that extends from 13 to 17SEER. This highly featured and reliable air conditioner isdesigned for years of reliable, efficient operation when matched with Sure Comfort indoor aluminum evaporator coils and fur-naces or air handler units with aluminum evaporators.Our unique composite base () reduces sound emission, elimi-nates rattles, reduces fasteners, eliminates corrosion and has integrated brass compressor attachment inserts (). Further-more it has incorporated into the design, water m anagement features, means for hand placement () for unit maneuvering,screw trays ()and inserts for lifting off unit pad.()Service Valves () are rigidly mounted in the composite base below service valves and a minimum of 5" above the service valves, creating industry leading installation ease.The minimum 27 square-inches around the service valves allows refrigerant gauges (),Controls are accessed from the corner of the unit by removing only three fasteners from the control access cover, revealing the industry’s largest 15" wide and 14" tall control area (). With all this room in the control area the high voltage electrical whip ()can easily be inserted through the right size opening in the bot-tom of the control area. Routing it leads directly to contractor lugs for connection. The low voltage control wires ()are easily connected to units low voltage wiring. If contactor or capacitor () needs to be replaced there is more than adequate space to make the repair.If in the rare event, greater access is needed to internal compo-nents, such as the compressor, the top cover can be removed easily. Furthermore with the top cover removed the control panel can be removed (). Extra wire length is incorporated into each outdoor fan and compressor so top cover and control panel can be positioned next to the unit. With minimal effort the plug can be removed from the compressor and the outdoor fan wires can be removed from the capacitor to allow even more uncluttered access to the interior of the unit ().Outdoor coil heights range from as short as 22" to 32", aiding access to the compressor.Disassembly to this degree and complete reassembly only takes a first time service technician less than 10 minutes.()1234567891011121313Introduction to SA13 Air Conditioner144352811910141413157614Sure Comfort ®SA13 Air Conditioners5 All cabinet painted parts have powder post paint () achieving 1000 hour salt spray rating, allowing the cabinet to retain its aesthetics throughout its life.Scroll compressors with standard internal pressure relief and internal thermal overload are used on all capacities assuring longevity of high efficient and quiet operation for the life of the product.Each unit is shipped with filter drier for field installation and will trap any moisture or dirt that could contaminate the refrigerant system.Cabinets are durable and strong due to the composite base pan (), wire grille (), and drawn top cover ().Each SA13 capacity has undergone rigorous psycho-metric testing to assure performance ratings ofcapacity, SEER and EER per AHRI Standard 210/240rating conditions. Also each unit bears the UL mark and each unit is certified to UL 1995 safety standards.Each unit has undergone specific strain and modal testing to assure tubing () is outside the units natural frequency and that the suction and discharge lines connected to the compressor withstand any starting, steady state operation or shut down forces imposed by the compressor.All units have been sound tested in sound chamber to AHRI 270rating conditions, and A-weighted Sound Power Level tables produced, assuring units have acceptable noise qualities (see page 9). Each unit has been ran in cooling operation at 95°F and 82°F and sound ratings for the SA13 range from as low as 74dBA to 77 dBA.All units have been ship tested to assure units meet stringent “over the road” shipping conditions.As manufactured all units in the SA13 family have cooling capa-bility to 55 °F . Addition of low ambient control will allow the unit to operate down to 0°F . Factory testing is performed on each unit. All component parts meet well defined specification and continually go through receiving inspections. Each component installed on a unit is scanned, assuring correct component uti-lization for a given unit capacity and voltage. All condenser coils are leak tested with pressurization test to 550#’s and once installed and assembled, each units’ complete refrigerants ystem is helium leak tested. All units are fully charged from the factory for up to 15 feet of piping. All units are factory run tested.The SA13 has a 10-year conditional compressor and parts war-ranty (registration required).Optional Accessories(Refer to accessory chart for model #)Compressor Crankcase HeaterProtects against refrigerant migration that can occur during low ambient operationCompressor Sound Cover• Reinforced vinyl compressor cover containing a 1½ inch thick batt of fiberglass insulation• Open edges are sealed with a one-inch wide hook and loop fastening tapeCompressor Hard Start Kit• Single-phase units are equipped with a PSC compressor motor, this type of motor normally does not need a potential relay and start capacitor• Kit may be required to increase the compressor starting torque, in conditions such as low voltageLow Ambient Kit• Air conditioners operate satisfactorily in the cooling mode down to 55°F outdoor air temperature without any additional controls• This Kit can be added in the field enabling unit to operate properly down to 0° in the cooling mode• Crankcase heater and freezestat should be installed on com-pressors equipped with a low ambient kitLow Pressure• Can be added in field enabling the unit to shut off compressor on loss of chargeNOTE: Unit can be purchased with high and low pressureinstalled at factory. (Refer to SKU list)High Pressure• Can be added in field enabling unit to shut off compressor if unit loses outdoor fan operation.NOTE: Unit can be purchased with high and low pressureinstalled at factory. (Refer to SKU list)201817191616181720197²HACR type circuit breaker of fuse.³Refer to National Electrical Code manual to determine wire, fuse and disconnect size requirements.Accessories9Unit Dimensions[] Designates Metric ConversionsACCESSЉ [610 mm] MIN.CLEARANCEALLOW OVER HANGCLEARNACE OFST-A1226-24-0011Control WiringApplication Guidelines1. Intended for outdoor installation with free air inlet and outlet. Outdoor fan external static pressure available is less than 0.01 -in. wc.2. Minimum outdoor operation air temperature for cooling mode without low-ambient operation accessory is 55°F (12.8°C).3. Maximum outdoor operating air temperature is 125°F (51.7°C).4. For reliable operation, unit should be level in all horizontal planes.5. Use only copper wire for electric connections at unit. Aluminum and clad aluminum are not acceptable for the type of connectorprovided.6. Do not apply capillary tube indoor coils to these units.7. Factory –supplied filter drier must be installed.1315Performance Data @ AHRI Standard Conditions –CoolingNote: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric Conversions17Performance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric ConversionsPerformance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric Conversions19Performance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric Conversions[ ] Designates Metric ConversionsPerformance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric Conversions31Performance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit thePerformance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric Conversions33Performance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric ConversionsPerformance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric Conversions35Performance Data @ AHRI Standard Conditions –Cooling (con’t.)Note: Ratings contained in this document are subject to change. For up-to-date and expanded ratings, please visit the[ ] Designates Metric ConversionsGUIDE SPECIFICATIONSGeneralSystem DescriptionOutdoor-mounted, air-cooled, split-system air conditioner com-posite base pan unit suitable for ground or rooftop installation. Unit consists of a hermetic compressor, an air-cooled coil, pro-peller-type condenser fan, suction and legend line service valve, and a control box. Unit will discharge supply air upward as shown on contract drawings. Unit will be used in a refrigeration circuit to match up to a coil unit.Quality Assurance— Unit will be rated in accordance with the latest edition of AHRI Standard 210.— Unit will be certified for capacity and efficiency, and listed in the latest AHRI directory.— Unit construction will comply with latest edition of ANSI/ ASHRAE and with NEC.— Unit will be constructed in accordance with UL standards and will carry the UL label of approval. Unit will have c-UL-us approval.— Unit cabinet will be capable of withstanding ASTM B117 1000-hr salt spray test.— Air-cooled condenser coils will be leak tested at 150 psig and pressure tested at 550 psig.— Unit constructed in ISO9001 approved facility.Delivery, Storage, and Handling— Unit will be shipped as single package only and is stored and handled per unit manufacturer’s recommendations.Warranty (for inclusion by specifying engineer) — U.S. and Canada only.ProductsEquipmentFactory assembled, single piece, air-cooled air conditioner unit. Contained within the unit enclosure is all factory wiring, piping, controls, compressor, refrigerant charge R-410A, and special fea-tures required prior to field start-up.Unit Cabinet— Unit cabinet will be constructed of galvanized steel, bonder-ized, and coated with a powder coat paint.— All units constructed with louver coil protection and corner post.Louver can be removed by removing one fastener per louver panel.AIR-COOLED, SPLIT-SYSTEM AIR CONDITIONERSA131-1/2 TO 5 NOMINAL TONSFans— Condenser fan will be direct-drive propeller type, discharging air upward.— Condenser fan motors will be totally enclosed, 1-phase type with class B insulation and permanently lubricated bearings.Shafts will be corrosion resistant.— Fan blades will be statically and dynamically balanced.— Condenser fan openings will be equipped with coated steel wire safety guards.Compressor— Compressor will be hermetically sealed.— Compressor will be mounted on rubber vibration isolators. Condenser Coil— Condenser coil will be air cooled.— Coil will be constructed of aluminum fins mechanically bonded to copper tubes.Refrigeration Components— Refrigeration circuit components will include liquid-line shutoff valve with sweat connections, vapor-line shutoff valve with sweat connections, system charge of R-410A refrigerant, and compressor oil.— Unit will be equipped with filter drier for R-410A refrigerant for field installation.Operating Characteristics— The capacity of the unit will meet or exceed _____ Btuh at a suction temperature of _____ °F/°C. The power consumption at full load will not exceed _____ kW.— Combination of the unit and the evaporator or fan coil unit will have a total net cooling capacity of _____ Btuh or greater at conditions of _____ CFM entering air temperature at the evap-orator at _____ °F/°C wet bulb and _____ °F/°C dry bulb, and air entering the unit at _____ °F/°C.— The system will have a SEER of _____ Btuh/watt or greater at DOE conditions.Electrical Requirements— Nominal unit electrical characteristics will be _____ v, single phase, 60 hz. The unit will be capable of satisfactory operation within voltage limits of _____ v to _____ v.— Nominal unit electrical characteristics will be _____ v, three phase, 60 hz. The unit will be capable of satisfactory operation within voltage limits of _____ v to _____ v.— Unit electrical power will be single point connection.— Control circuit will be 24v.Special Features— Refer to section of this literature identifying accessories and descriptions for specific features and available enhancements.373910/18 QG FORM NO. ASC-221 REV. 3Before proceeding with installation, refer to installation instructions packaged with each model, as well as complying with all Federal, State, Provincial, and Local codes, regulations, and practices.Sure Comfort®P .O. Box 17010, Fort Smith, AR 72917。
昆虫的启示发明10个简单英语作文
昆虫的启示发明10个简单英语作文Inspirations from Insects.Insects, small creatures often overlooked by many, have a remarkable ability to adapt, survive, and thrive in various environments. Their survival strategies, unique anatomies, and remarkable behaviors have served as a source of inspiration for numerous inventions and technologies. Here are ten examples of how insects have inspired human inventions:1. Antennae-inspired Sensors: Antennae, the thin,feeler-like appendages on insects' heads, are highly sensitive to changes in their environment. This has led to the development of antennae-inspired sensors that are used in robots, aircraft, and even medical devices to detect and respond to changes in their surroundings.2. Adhesive Technology: Gecko lizards, known for their ability to climb vertical surfaces, owe their adhesion tothe microscopic hairs on their feet. These hairs, known as setae, have inspired the development of synthetic adhesives that can be used in a wide range of applications, from surgical tape to sticky notes.3. Compound Eyes for Imaging: Insects possess compound eyes, made up of thousands of individual lens units, that provide them with a wide field of view and excellent depth perception. This has led to the development of compound eye cameras, which are used in surveillance, robotics, and other fields to capture a wide range of visual information.4. Biomechanical Designs: Insect skeletons, made of lightweight but strong materials like chitin, have inspired the design of lightweight, strong, and durable materialsfor use in aircraft, automobiles, and other applications.5. Honeycomb Structures: The hexagonal honeycomb structures found in bee nests provide maximum strength with minimal material usage. This efficient structure has been adapted in human design, from aircraft wings to sandwich panels, for optimal strength and weight.6. Insect-inspired Robotics: The agile movement and precise maneuvering of insects have inspired the design of small, insect-like robots that can navigate complex environments, such as narrow spaces or dense foliage. These robots are used in search and rescue operations, environmental monitoring, and other tasks.7. Biological Control: The use of natural enemies, such as predatory insects or parasites, to control pests is an example of biological control. This eco-friendly approach has been widely adopted in agriculture to reduce the need for chemical pesticides.8. Insect-mimicking Camouflage: The ability of insects to blend into their surroundings through coloration and patterning has led to the development of insect-mimicking camouflage materials. These materials are used in military applications, hunting gear, and even fashion to conceal or disguise objects and individuals.9. Vibration Communication: Some insects use vibrationsto communicate with each other, a phenomenon that has been adapted in human technology. For example, vibration sensors and transducers are used in cell phones and other devices to provide silent alerts or feedback.10. Biological Inspiration for Algorithms: The complex behaviors exhibited by insects, such as swarm intelligence or pathfinding, have provided inspiration for the development of algorithms used in computer science and artificial intelligence. These algorithms are used in areas like routing, optimization, and machine learning.Insects, with their remarkable adaptability andsurvival strategies, continue to serve as a source of inspiration for human inventions and technologies. As we continue to study and learn from these tiny creatures, we may unlock even more innovative applications and solutions to challenges we face in the future.。
MRPtablesdetails
MRP tables detailsPlanning process:The planning process accepts and creates independent demand. Forecasts represent demands you think you will have. Sales orders represent demands you actually have. External sales orders originate from customers outside of your company. Internal sales orders originate from other business units in your company. Interorganization planned orders represent the demands other business units.Use the distribution requirements planning, master production schedule, and material requirements plan planning processes to calculate supply. These processes begin with the independent demand and use on-hand inventory, existing purchase requisitions, purchase orders and discrete jobs, and suggested new purchase requisitions and discrete jobs to balance supply with demand for each item.· The distribution requirements plan calculates supply for distribution center items.· The master production schedule calculates supply for independent demand items. Y ou can use the supply in promising sales order ship dates to customers (available to promise).· The material requirements plan calculates supply for dependent demand items.To make or buy the supply the planning process suggests, you must transfer the information in Oracle Material Requirements Planning to Oracle Purchasing and Oracle Work in Process.To validate that you have enough people and machines to execute the material plan, use the capacity planning processForecast tablesMRP_FORECAST_DESIGNA TORSThis table stores forecast names and forecast sets. A forecast name uniquely identifies an item forecast. A forecast set groups a number of forecasts. The column FORECAST_SET is a foreign key back to MRP_FORECAST_DESIGNA TORS. It represents the forecast set to which a forecast name belongs. A forecast name must belong to one and only one forecast set.This table is populated by the Define Forecast Sets window. The primary key isFORECAST_DESIGNA TOR and ORGANIZA TION_ID.MRP_FORECAST_UPDA TESThis table tracks forecast consumptions. Each entry represents a consumption that took place for a particular forecast entry, as a result of the entry of a sales order. This table is populated during forecast consumption, which is performed by the Planning Manager.MRP_FORECAST_DA TESThis table stores the forecast entries for items in a forecast. Each row represents a forecasted quantity orforecasted rate for an item on a given date. This table is populated by the Enter Forecast Entries window, by a forecast autoload, from a forecast import, or from the Inventory forecasting methods. The primary key is TRANSACTION_ID.MRP_FORECAST_ITEMSThis table stores the items that are entered on an item forecast. Each item that has entries in MRP_FORECAST_DA TES for a given forecast designator will have exactly one row in MRP_FORECAST_ITEMS. This table is populated by the Enter Forecast Entries window. The primary key is INVENTORY_ITEM_ID, ORGANIZA TION_ID, and FORECAST_DESIGNA TOR.MTL_FORECAST_RULEThis table stores rules or options, which are used in the Statistical and Focus forecasting processes. The options can be classified into Forecast Computation options, Forecast Source options, and Statistical Forecasting Parameters. Computation option governs which forecast method and bucket type to use. There are two forecast methods and three-bucket types. The forecast methods are statistical and focus forecasting. Three possible bucket types are days, weeks, and periods. The primary key is FORECAST_RULE_ID.OE_ORDER_HEADERS_ALLThis table stores header information for orders in Order Management. The primary key is HEADER_ID.OE_ORDER_LINES_ALLThis table stores information for all order lines in Oracle Order Management. The primary key is LINE_ID.Master Demand Schedules tablesMRP_SCHEDULE_DESIGNA TORSThis table stores MPS and MDS schedule names. A schedule name uniquely identifies a master schedule. The Define Master Schedule Names window populates this table. The primary key is SCHEDULE_DESIGNA TOR and ORGANIZA TION_ID.MRP_SCHEDULE_ITEMSThis table stores the items that are members of a master schedule. Each item that has entries in MRP_SCHEDULE_DA TES for a given schedule name will have exactly one row in MRP_SCHEDULE_ITEMS. The Enter Master Schedule Entries window populates this table. The primary key is INVENTORY_ITEM_ID, ORGANIZA TION_ID, and SCHEDULE_DESIGNA TOR.MRP_SCHEDULE_DA TESThis table stores the master demand and master production schedules. Each row represents a schedule entry for a given item for a given quantity on a given date. The primary key is MPS_TRANSACTION_ID, SCHEDULE_LEVEL, and SUPPLY_DEMAND_TYPE.MRP_GROSS_REQUIREMENTSThis table stores the projected gross requirements for a given item in an MPS, MRP or DRP plan. The Planner populates this table. The primary key is DEMAND_ID.MRP_PLAN_SCHEDULESThis table stores the names of the Demand Schedules and Supply Schedules that are used in MPS, MRP, and DRP plans. This table is a child of MRP_PLAN_ORGANIZA TIONS and is used by the Oracle Supply Chain Planning module. The Define Plan populates this table Options window. The primary key is ORGANIZA TION_ID, COMPILE_DESIGNA TOR, INPUT_ORGANIZA TION_ID, INPUT_NAME, and PLAN_LEVEL.MRP_SCHEDULE_CONSUMPTIONSThis table tracks master schedule relief. Each entry represents a relief that took place for a particular schedule entry, as a result of the shipment of a sales order for a master demand schedule, or the creation of a discrete job, purchase order, purchase order in receiving, intransit shipment, intransit receipt, or purchase requisitions for a master production schedule. This table is populated during schedule relief, which is performed by the Planning Manager.Material Plans T ablesMRP_PLANSThis table stores settings for a specific plan name. MRP_PLANS stores the settings that determine the behavior of the planning process for a given plan name. Each row stores information for a particular plan name. The Launch Planning Process window populates this table. The primary key is ORGANIZA TION_ID and COMPILE_DESIGNA TOR.MRP_PLAN_SCHEDULESThis table stores the names of the Demand Schedules and Supply Schedules that are used in MPS, MRP, and DRP plans. This table is a child of MRP_PLAN_ORGANIZA TIONS and is used by the Oracle Supply Chain Planning module. The Define Plan Options window populates this table. The primary key is ORGANIZA TION_ID, COMPILE_DESIGNA TOR, INPUT_ORGANIZA TION_ID, INPUT_NAME, and PLAN_LEVEL.MRP_PLAN_ORGANIZA TIONSThis table stores the organizations that are planned by a MPS, MRP, or DRP plan. This table is a child of MRP_PLANS and is used by the Oracle Supply Chain Planning module. The Define Plan Options window populates this table. The primary key is ORGANIZA TION_ID, COMPILE_DESIGNA TOR, PLANNED_ORGANIZA TION, and PLAN_LEVEL.MRP_ITEM_SOURCINGThis table stores the effective sourcing information for planned items within a MPS, MRP, or DRP plan. Each row identifies a valid effective source, which can be a supplier, another organization, or the current planned organization. This table is populated by the Memory-based Snapshot and is displayed in Sources and Destination windows of the Supply Chain Planner Workbench and in the Supply Chain Planning DetailReport. The primary key is COMPILE_DESIGNA TOR, ORGANIZA TION_ID, INVENTORY_ITEM_ID, SOURCE_ORGANIZA TION_ID, VENDOR_ID, VENDOR_SITE_ID, and EFFECTIVE_DA TE.MRP_SYSTEM_ITEMSThis table stores a copy of items planned by the planning process. Most of the columns in MRP_SYSTEM_ITEMS correspond to columns from the Oracle Inventory item master table, MTL_SYSTEM_ITEMS. This table is populated by the Snapshot, and is used by the Planner.This table is derived mainly from MTL_SYSTEM_ITEMS.The primary key is INVENTORY_ITEM_ID, ORGANIZA TION_ID, and COMPILE_DESIGNA TOR.CRP_PLANNED_RESOURCESThis table stores the list of resources planned by the planning process.CRP_PLANNED_RESOURCES stores resource information for both routing basedDepartments/resources and rate based lines. This table is populated by the Snapshot, and is used by the Planner. Data in the table can be viewed in the Planner's Workbench.MRP_ITEM_EXCEPTIONSThis table stores a row for each exception message against an item.MRP_ITEM_EXCEPTIONS is populated by the Planner, and is used by various reports and inquiries. The primary key is COMPILE_DESIGNA TOR, EXCEPTION_TYPE,INVENTORY_ITEM_ID, ORGANIZA TION_ID, PROJECT_ID, TASK_ID, LINE_ID, and VERSION.CRP_A V AILABLE_RESOURCESThis table stores resource availability information for all departments/resources and lines used in a plan. Resource availability is stored in this table for different date ranges in the planning horizon. CRP_A V AILABLE_RESOURCES is populated by the snapshot and is used by the planner. Data in this table can be viewed in the Planner's Workbench.MRP_RECOMMENDA TIONSThis table stores Oracle Master Scheduling/MRP's suggestions for a given plan. Each purchase order, purchase requisition, purchase order in receiving, discrete job, nonstandard job, intransit shipment, intransit receipt, planned order, and suggested repetitive schedule will have a corresponding row in MRP_RECOMMENDA TIONS. The primary key is TRANSACTION_ID.CRP_RESOURCE_PLANThis table stores the resource requirements for WIP discrete jobs, WIP nonstandard jobs, Suggested planned orders, and suggested repetitive schedules for a MRP plan. This table is populated by the memory based planner or the CRP planner. It is used to display capacity requirements in the Planner's Workbench window and by CRP inquiry and CRP reports to compile the capacity plan. The primary key is TRANSACTION_ID.。
数字电路英文版 第八单元
A logical gate circuit is a fundamental building block of digital circuits that perform a specific logical operation on one or more input signals
It insists of transitions connected together to implement logical functions such as AND, OR, NOT, and
Field effect transformer
A field effect transformer (FET) is a transformer that uses an electric field to control the flow of current through it
FETs are commonly used in analog and digital circuits, such as amplifiers, oscillators, and switching circuits
NAND operation
It is the logical NOT operation of the AND operation If any of the inputs are low, the output is high If all inputs are high, the output is low
Diode
01
Diode is a two terminal electronic component that allows the flow of current in only one direction
Agilent L7222C Coaxial Transfer Switches技术概述说明书
L7222CAgilent L SeriesL7222C Coaxial Transfer Switches DC to 26.5 GHzTechnical Overview• Guaranteed 0.03 dB insertion loss repeatability for 2 million cycles ensures accuracy and reduces calibration cycles• Operating life of 5 million cycles typical• Unmatched isolation maximizes measurement accuracy and improves system dynamic range• Economical price minimizes budgetary constraintsHigh performance transfer switches for microwave and RF instrumentation and systemsFlexibility is essential in signal routing applications, and the Agilent Technologies L7222C 4-port coaxial transfer switches offer just that. They provide exceptionalrepeatability, low insertion loss, and high isolation. These switches provide simplifi cation of design in signal routing and conditioning applications.The L7222C can be used in a variety of applications, such as switching two inputs and two outputs, signal reversal switch-ing or as a drop-out switch. Innovative design and careful process control mean the L7222C meet the requirements for highly repeatable switching elements in test instruments and switching interfaces. They offer exceptional insertion loss repeatability, reducing sources of random errors in themeasurement path and improving measurement uncertainty. Switch life is a critical consideration in production test systems, satellite and antenna monitoring systems, and test instrumentation. The longevity of these switchesincreases system uptime and lowers the cost of ownership by reducing calibration cycles and switch maintenance.Agilent L7222C transfer switches provide simplifi cation of design in signal routing and conditioning applications with• Guaranteed 0.03 dB insertion loss repeatability for2 million cycles• Excellent isolation, typically > 80 dB at 26.5 GHz • Opto-electronic indicators and interrupts • Magnetic latching• TTL/5V CMOS compatible DescriptionOperating from DC to 26.5 GHz, these switches exhibit exceptional isolation performance required to maintain measurement integrity. Isolation between ports is typically > 90 dB to 12 GHz, > 80 dB to 26.5 GHz, reducing the infl uence of signals from other channels and system measurement uncertainties. Hence, the L7222C are ideal elements in large, multitiered switching systems. The Agilent L7222C is designed to fall within most popular industry footprints. The 1¼ inch square fl ange provides tapped mounting holes, while the rest of the 2¾ inch long by 1¼ inch square body will easily fi t into most systems. The standard 10-pin ribbon drive cable or optional solder terminal connections accommodate the need for secure and effi cient control cable attachment.Opto-electronic interrupts and indicators improve reliability and extend the life of the switch by eliminating DC circuit contact failures characteristic of conventional electrome-chanical switches. The L7222C have circuits that interrupt the current to all the solenoids once switching is complete and offer independent indicators that are controlled by optical interrupts. These indicators provide a closed path between the indicator common pin and the corresponding sense pin of the selected path.+24 VDC (1)Gnd. (9)Drive A (3)Drive B (5)TTL Drive A (7)TTL Drive B (8)ControlinputPosition B 1 – 23 – 4 2 – 31 – 41423(4)(2)(6)A Com BIndicatorsControl circuitPosition A Figure 1. Agilent L7222C schematicApplicationsThe Agilent L7222C transfer switches can be used in many different applications to increase system fl exibility and simplify system design. The following are fi ve examples: switch between two inputs and two outputs, use as a drop-out switch, use for signal reversal, confi gure as a SPDT switch, and bypass an active device.The L7222C transfer switches have the ability to exchange two signals between two inputs and two outputs. The transfer switch can connect two different instruments with two devices under test (DUT). Once switched, the signals are exchanged between the two instruments and the two DUTs. The exchanged signals allow complete network and spectrum analysis on two devices with a single switch and one test setup. See Figure 2 for an example of this application.Figure 2. Switching between two instruments and two DUTsThe L7222C can be used as a simple drop-out switch where a signal is either run through the device under test or straight through the switch, bypassing the device. See Figure 3.Figure 3. Drop-out switch In the signal reverse confi guration, a device can be connected across two diagonal ports of the L7222C transfer switch. This will allow the signal direction through the device to be reversed. See Figure 4.Figure 4. Signal reversalBy attaching an external termination, the designer can use the L7222C in a SPDT terminated switch confi guration. See Figure 5.Figure 5. SPDT terminatedIn Figure 6, an active device, such as an amplifi er, is inserted into a signal path presenting a unique problem. A single transfer switch has the undesirable characteristic of shunting the output of the amplifi er to its input when the signal is bypassing the amplifi er. The advantage of using two transfer switches is that an additional signal path is available; however two SPDT switches can also be used. This additional path can utilize the same amplifi er when the original path is bypassed.Figure 6. Bypassing an active deviceDriving the switchThere are two positions for the L7222C transfer switches. See Table A. Position A has RF Port 1 connected to RF Port 2 and RF Port 3 connected to RF Port 4. Position B has RF Port 2 connected to RF Port 3 and RF Port 1 connectedto RF Port 4. Either switch can be driven with a standard grounding drive control with or without a separate ground. Single line or dual line TTL control is also available. The switch operates in a break-before-make mode. See Figure 7.(I) Standard drive:See Figure 8 for drive connection diagrams.• Connect pin 1 to supply (+20 VDC to +32 VDC).• Connect pin 9 to ground (see Note 1).• Select position A by applying ground to pin 3 (see Note 3). • Select position B by applying ground to pin 5 (see Note 3). (II) Single line TTL drive:See Figure 8 for drive connection diagrams.See Figure 9 for TTL voltage states.• Connect pin 1 to supply (+20 VDC to +32 VDC).• Connect pin 9 to ground (see Notes 2, 4).• Connect pin 8 to TTL “High.”• Select position A by applying TTL “High” to pin 7(see Note 3).• Select position B by applying TTL “Low” to pin 7(see Note 3).(III) Dual line TTL drive:See Figure 8 for drive connection diagrams.See Figure 9 for TTL voltage states.• Connect pin 1 to supply (+20 VDC to +32 VDC).• Connect pin 9 to ground (see Notes 2, 4).• Select position A by applying TTL “High” to pin 7 and TTL “Low” to pin 8 (see Note 3).• Select position B by applying TTL “Low” to pin 7 and TTL “High” to pin 8 (see Note 3).Notes:1. Pin 9 does not need to be grounded for the switch to operate instandard drive mode. If pin 9 is not grounded, the position indicators will only function while the appropriate drive has ground applied.Therefore, if a pulse drive is used and continuous indicator operation is required, pin 9 must be grounded.2. For TTL drive, pin 9 must be grounded.3. After the RF path is switched and latched, the drive current is inter-rupted by the electronic position-sensing circuitry. Pulsed control is not necessary, but if implemented, the pulse width must be 15 msminimum to ensure that the switch is fully latched.4. In addition to the quiescent current supplying the electronic position-sensing circuitry, the drive current fl ows out of pin 9 (during switch-ing) when using TTL drive.Switch #1Switch #2Caution for users of the Agilent 11713B/C switch driver:Do not drive the L7222C using the S9 or SO outputs from either the banana plugs or from pins 3 or 4 within the Atten X and Atten Y Viking sockets located on the rear panel of the 11713B/C.Figure 8. Drive connections Figure 7. RF port connectionsElectronic position indicatorsThe independent electronic position indicators consist of optically isolated, solid-state relays, which are driven by photo-electric sensors coupled to the mechanical position of the RF path’s moving elements. See Figure 10. The circuitry consists of a common which can be connected to an output corresponding to either position A or position B. The solid state relays are confi gured for AC and/or DC operation. (See indicator specifi cations.) The electronic position indicators require that the supply (+20 VDC to+32 VDC) be connected to pin 1 but requires that pin 9 be grounded if pulse drive is used and continuous indicators operation is desired. If pin 9 is not grounded, the position indicators will function while the appropriate drive has ground applied.Specifi cationsSpecifi cations describe the instrument’s warranted performance. Supplemental and typical character isticsare intended to provide information useful in applying the instrument by giving typical, but not warranted performanceparameters.General operating dataNominal/Impedance 50 ΩMaximum power ratingSwitching 1W C W Non-switching 50W Pk (not to exceed1 watt average)Life 2,000,000 cycles minimum Switching speed 15 ms maximumIndicator specificationsMaximum withstand voltage60 V Maximum current capacity 100 mA Maximum “ON” resistance 50 ΩMinimum “OFF” resistance1 G ΩEnvironmental specificationsOperating temperature –25 to 75° C Storage temperature –55 to 85° C Temperature cycling 55 to 85° C, 10 cycles perMIL-STD-202F, Method 107D, Condition A (modified)Vibration Operating 7 g, 5 to 2000 Hz at 0.25 inches pk-pk Survival 20 g, 20 to 2000 Hz at 0.06 inches pk-pk, 4 min/cycle, 4 cycles/axis Random 2.41 g (rms) 10 min/axis Shock Half-sine 500 g at 0.5 ms, 3 drops/direction, 18 total Operating 50 g at 6 ms, 6 directions Moisture resistance 65° C, 95% RH, 10 days perMIL-STD-202F, Method 106E Altitude storage 50,000 feet (15,240 meters per MIL-STD-202F)RFI Radiated Emission per CISPRAgilent L7222CFrequency range DC to 26.5 GHzInsertion loss 0.2 dB + 0.025 x frequency (GHz)Isolation 110 dB–2.0 x frequency (GHz)SWR 1.1 maximum dc to 2 GHz 1.15 maximum 2 to 4 GHz 1.25 maximum 4 to 12.4 GHz 1.4 maximum 12.4 to 20 GHz 1.65 maximum 20 to 26.5 GHz Insertion loss repeatability < 0.03 dB typicalConnectors SMA (f)Agilent L7222C physical specificationsDimensions Per Figure 13Weight100 gm (0.23 lb)Supplemental characteristicsReference conditions:• Cold switching only (NO hot switching) • Ambient temperature of 75° C or less • Sea level (0.88 derating @ 15,000 ft.)• Load VSWR < 1.2 (see graph for derating above 1.2 VSWR)0.11.010.00.20.30.40.50.60.72345678Frequency (GHz)101002030405060708090C W p o w e r (W a t t s)18200Power derating factor versus VSWRP o w e r d e r a t i n g f a c t o rVSWR (:1)1 1.52 2.5 310.90.80.70.60.5MAX incident CW power (cold switching) vs. frequencyFigure 11. Maximum CW power for cold switchingFigure 12. Power derating factor versus VSWR-1-0.9-0.8-0.7-0.6-0.5-0.4-0.3-0.2-0.10051015202530FrequencyS 21Figure 14. Agilent L7222C isolation versus frequencyFigure 13. Agilent L7222C insertion loss versus frequencyFigure 15. Product outlinesNote: Dimensions are in millimeters and (inches) nominal unless otherwise specifi ed.Agilent model number ABCDEL7222C millimeter SMA (f) 8.32 68.37 69.46 6.72 (inches)(.328)(2.692)(2.735)(.265)REFREFREFTYPOrdering InformationAgilent Coaxial transfer switch• L7222C DC to 26.5 GHz• Option 100 Solder terminals in addition to ribbon cable• Option 201 Mounting bracket-assembly required • Option UK6Commercial calibration test data with certifi cateAccessories available• 87222-00003 Mounting bracketAgilent Drivers• 11713B/C attenuator switch driverDrives up to 20 switches.Accessory cables• 5061-0969 Viking connector to bare tinned wires(60 inches long). Use to connect 11713B/C to L7222Cwith Option 100. Will operate four L7222C switches. • 11713-60047 Viking connector to (4) 4-pin DIP connectors. Will operate four L7222C switches usingthe 11713B/C driver.Confi guration guideSee publication 5989-7277EN./fi nd/emailupdatesGet the latest information on the products and applications you select.Agilent Email UpdatesFor more information on test accessories go to /fi nd/mtaFor more information on Agilent Technologies’products, applications or services, please contact your local Agilent office. The complete list is available at:/fi nd/contactus Americas C anada (877) 894-4414 Latin America 305 269 7500United States (800) 829-4444Asia Pacifi c Australia 1 800 629 485C hina 800 810 0189Hong Kong 800 938 693India 1 800 112 929Japan 0120 (421) 345Korea 080 769 0800Malaysia 1 800 888 848Singapore 180****8100Taiwan 0800 047 866Thailand 1 800 226 008Europe & Middle EastAustria 0820 87 44 11Belgium 32 (0) 2 404 93 40Denmark 45 70 13 15 15Finland 358 (0) 10 855 2100France 0825 010 700* *0.125 €/minute Germany 01805 24 6333****0.14 €/minuteIreland 1890 924 204Israel 972-3-9288-504/544Italy 39 02 92 60 8484Netherlands 31 (0) 20 547 2111Spain 34 (91) 631 3300Sweden 0200-88 22 55Switzerland 0800 80 53 53United Kingdom 44 (0) 118 9276201Other European Countries: /fi nd/contactusRevised: March 27, 2008Product specifi cations and descriptions in this document subject to change without notice.© Agilent Technologies, Inc. 2007, 2008Printed in USA, May 5, 20085989-6084ENRemove all doubtOur repair and calibration services will get your equipment back to you, performing like new, when prom-ised. You will get full value out of your Agilent equipment through-out its lifetime. Your equipment will be serviced by Agilent-trained technicians using the latest factory calibration procedures, automated repair diagnostics and genuine parts. You will always have the utmost confi dence in your measurements. Agilent offers a wide range of ad-ditional expert test and measure-ment services for your equipment, including initial start-up assistance, onsite education and training, as well as design, system integration, and project management. For more information on repair and calibration services, go to:/fi nd/removealldoubtL7222C。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Design of Routing Tables for a Survivable Military Communications Networkusing Genetic AlgorithmsSquadron Leader S.J.Moore Defence Communications Services AgencyBasil Hill Barracks,Park Lane,Corsham,Wilts SN139NR,UKMark C.SinclairDept.of Electronic Systems Engineering,University of Essex,Wivenhoe Park,Colchester,Essex CO43SQ,UKmcs@Abstract-One of the vital areas in the design and opera-tion of a survivable military telecommunications network is the selection of its routing tables.In this paper,both a bit-string genetic algorithm(GA)and an iterative stochas-tic hill climber(ISHC)are applied to two problem sce-narios:with and without existing routing tables.Exper-imental results are reported for one destination node in an18-node model parisons are made both between the GA and ISHC approaches,and with the pre-existing routing table.Overall,both the GA and the ISHC provide substantial improvements over the existing rout-ing table,for both problem scenarios.However,the ISHC consistently obtains better results than the GA,often at re-duced computational cost.1IntroductionThis paper reports an investigation into the use of both a bit-string genetic algorithm(GA)and an iterative stochastic hill climber(ISHC)to optimise circuit-switched routing,in a mil-itary telecommunications network,for survivability.While GAs,and evolutionary algorithms in general,have been used in many areas of telecommunication routing before,the par-ticular focus here is on providing survivability for a military network.2EC for telecommunications routingOver the years,more than30papers have been published on the application of evolutionary computation(EC)to telecom-munications routing.Four of the earliest papers are by Cox et al.[1,2],Pan&Wang[3]and Sinclair[4].In1991,Cox et al.[1]used a permutation-based GA for the bandwidth-packing component of an heuristic for dynamic-anticipatory routing in circuit-switched networks.Two years later,al-most the same group of authors[2]tackled both minimum-cost link capacity assignment and routing in a network sub-ject to a reliability constraint.They employed a hybrid GA, with three-part chromosomes representing both link capac-ities and routing permutations,a chromosome-repair mech-anism,a stochastic Lamarckian replacement technique and problem-specific operators.Pan&Wang[3],also in1991, used a GA for minimum-delay bandwidth allocation,i.e.link capacity assignment and routing,in an ATM network.Their GA encodes individuals as a string of indices into a combined look-up table of both link capacities and routes.Then Sin-clair[4],in1993,applied a bit-string based encoding of static-routing tables in an unreliable circuit-switched network,em-ploying a penalty function to eliminate infinite-routing loops, and aiming for minimum network grade-of-service.More recent work of interest includes that of Bentall et al.[5],who used a GA with a two-dimensional order-based representation to obtain restoration paths for a heavily-loaded network.Their aim was not so much to apply the GA to real-time restoration,but rather for the results obtained to serve as a benchmark in assessing rapid heuristic algorithms with only local knowledge.Shami et al.[6],applied genetic pro-gramming to obtain both primary and restoration paths in a network subject to single-link failures.Munetomo et al.[7], described a real-time dynamic-routing algorithm that employs path-based genetic operators to create alternative routes in a packet-switched network,thereby balancing link loads and re-ducing delay.Sinclair[8]developed a hybrid GA for routing,fibre choice and wavelength allocation in multi-wavelength all-optical transport networks,using both an object-oriented representation and problem-specific operators.Finally,Zhu et al.[9]employed a permutation-based GA on the point-to-multipoint routing problem,i.e.routing a set of circuit-switched connection requests,each of which has a single source and one or more destinations.3Military&commercial networksThe continued operation of a communications network is an important design itary networks are concerned with survivability,i.e.the ability of a network to perform to a spec-ification after it is has been damaged,whereas in commercial networks the emphasis is on reliability to protect revenues. Military networks must be survivable to avoid possible loss of life,or damage to national security,as a result of lost com-mand and control facilities.However,the solutions to the need for reliability and survivability are often similar in both types of network.The differences arise in the types of network failure,and the probabilities of their occurring.A commercial network is more likely to suffer from link failures,as opposed to node failures,because nodes are reli-able,have high levels of redundancy,and are designed to be maintained whilst on-line and carrying traffic.A military net-work is likely to suffer network damage,due to an attack by an aggressor.The symptoms of such an attack would be sim-ilar to those for simple network failures.The difference is in the scale.Failures can generally be assumed to be indepen-dent,and due in the main to simple component malfunction. Network damage is more likely to manifest itself as replace-ment of many nodes with smoking piles of debris,as an ag-gressor would attack in a manner planned to cause the most disruption,with the aim of completely preventing network op-eration.Therefore,the effects of the attack would be highly correlated and widespread.The measures that should be taken to provide the required level of survivability for a military network are in addition to those measures taken to provide reliability in a commercial network,and may well require considerable additional cost. The level of redundancy introduced in a commercial network could be the minimum necessary to deal with the most prob-able traffic loads;whereas the redundancy provided in a mil-itary network should be the minimum necessary to deal with the worst-case attack,which is a highly unlikely eventuality except during conflicts.The survivability requirement for military networks adopted in this paper was based on a statement made by the MOD[10],but further refined to:the proportion of work-ing node pairs that can be successfully connected must be greater than95%,even with up to half of the network nodes inoperable.Consequently the network must be designed to spread the load and so reduce the impact of any outages caused through attack or simple failures.This differs from commercial networks,which operate to generate a profit for their shareholders,and must,therefore,optimise their networks in terms of minimising cost.Clearly,in a military network,even in peacetime,techni-cal failures of links cannot be ignored.Moreover,in peace-time,when the likelihood of node destruction is extremely small,the routing tables devised to be survivable would also effectively re-route calls through the network following sim-ple failures or accidentally dug-up cable.However,the resul-tant routing would not necessarily be optimum in terms of effi-cient use of the network,as it could use more links than strictly necessary.Given that the capacity provided in a military net-work could be less than50%utilised,owing to the require-ment to provide increased levels of redundancy,inefficient use of capacity in a fully operating peacetime network is not an overriding concern.4Network designThere are many stages in the design of a telecommunications network,including:topology design,traffic routing,and link dimensioning.Once the topology has been determined,the routing of the network could then be addressed,reflecting in more detail the expected call patterns,and relying on the links provided.Thefinal stage could then be to identify the capac-ity required for each of the links.The whole design process may then go through several iterations to obtain further opti-misation benefits or to improve areas that have been demon-strated to be vulnerable.However,here the network topologyis given,and the focus is on routing for survivability.4.1Circuit-switched routingFor a static routing scheme the routing tables remainfixed,re-gardless of the current state of the users or the network.The tables are based on expected,rather than actual,user and net-work behaviour.In most static routing systems,routing isan integral part of the network design and hence is changed infrequently.Static routing involves virtually no real-timeactivities other than table interrogation and traffic forward-ing.Hence static routing requires minimal computational re-sources within the network nodes.Any changes to the rout-ing tables can even be carried out manually.Thus by keeping the computational aspects central,and minimising the com-putation required within the network itself,network capitalcosts are reduced.The static tables can be calculated on sys-tems that are separate from the network,in an off-line manner.The advantages of computing routes off-line include complete control over the routes selected(ensuring compliance withnetwork design assumptions and thus predictable routing per-formance)and minimal processing requirements for switches. This is beneficial for military networks as it allows the perfor-mance of routing tables to be determined in advance of theirdeployment,which gives confidence in the system.Moreover, military networks have a lower user-to-node ratio than com-mercial networks,and hence more nodes for a given traffic loading,and it is therefore advantageous to reduce the costand complexity of each of the nodes.The disadvantages,how-ever,include slow adaptation to unpredicted events(perhaps even requiring human intervention),and inability to optimiseroutes within the network[11]for efficiency.By way of contrast,dynamic routing in a circuit-switched network is a way of providingflexibility at the switching level.It allows the path that each call takes between any source-destination pair to vary with time or the state of the network. This enables the network to be used more efficiently and pro-vides robustness[11].However,although a dynamic routing scheme increases an individual call’s chance of success,thisvery success could prevent the success of other calls,owingto local uncoordinated routing changes.4.2Routing tablesA static routing strategy is completely determined by a rout-ing table and a call control rule,where the latter determineshow the routing table is to be used.For a network of nodes,the routing table can be expressed in the form of a matrix of entries,with the(falling)diagonal entries unused.Each entry,as shown in Table1,contains an ordered set of nodes.For the successive office control rule[12],each such entry in-dicates the sequence in which the nodes should be addressed when attempting to set up calls across the corresponding net-From/To1351—3,25,2—4,331,2—1,22,3—51,21,2—Table1:Example routing table(after[12])Figure1:Example network(after[12])work(Fig.1).The entry in row1,column4(from node1to node4)has three entries,in the order4,3,2.This means that a call reaching node1(regardless of the origin of the call)and destined for node4,is to be routed through the links,in order of preference,1–4,1–3,and1–2.If a particular link is un-available owing to congestion,link failure,or more relevant to this work,node failure or loss,then the next link is attempted from the list given.If all of the links in the set are unavailable, then the call is blocked and cannot be set up.This system can be regarded as‘fire and forget’since,if a node can pass on the call-set-up request signalling,then it will do so;if not,it will terminate the call.If the routing table is not properly designed,then call-set-up signalling could continually be passed around the network. Under such conditions the network could enter an infinite-routing loop,where the network makes a(potentially)never-ending attempt to establish a path between the source and the destination.This would happen,for example,if a call from5, went to2,which passed it to1which in turn passed it back to5 and so on.However,in practice,the number of links(hops) used to route a call is counted as routing proceeds,and when this hop count exceeds a given number then the call-set-up process is abandoned;this prevents routing loops tying up net-work resources indefinitely.4.3Survivable network designA simple method that can be employed to reduce the impact of losing a node is to put less traffic through each one.Therefore, a lower user-to-node ratio is required in a military network than with a commercial network.Consequently the practise of concentrating traffic in higher-level centralised switches,to reduce the costs associated with long interconnecting links, is not followed in military networks,as the impact of losing such an exchange would be highly significant.Schroeder&Newport[13]have stated that survivability can be equated to the inability of an enemy to identify critical node resources. Whilst this is true,there are also physical methods that can be employed to enhance survivability such as hardening(phys-ical protection against explosives)of nodes or introducing transportable nodes.However,in line with Schroeder&New-port’s observation,military networks are designed to be func-tionally dispersed and physically distributed,with all nodes having as near equal importance to the network’s functional-ity as possible.However,while survivability depends heav-ily on network configuration,for an existing network it would be preferable,in thefirst instance,to change the routing,held in software,rather than physically modifying the network. Schroeder&Newport’s study of survivability is extensive,but it concentrates on topology design without mention of routing methods,which are also important.Routing can be used to re-duce the vulnerability of network components by equalising the traffic loading.5Problem descriptionThe topology of the actual military network,on which the model network used in this paper is based,was determined from predicted traffic levels.Nodes were placed so that the vulnerability of each node was nearly equal[13].Conse-quently,areas of high traffic concentration,or of high tacti-cal importance,would have proportionally more nodes per unit area and less users per node than a commercial net-work.The whole network topology consists of many local access switches which feed into nodes,which are highly mesh-connected.To fully interconnect all of the nodes across a nation-wide network would be prohibitively expen-sive;therefore,only as many links as can be justified,to give the required level of survivability,are provided.It is this core network of18nodes which is investigated here.As in the actual network,the model network uses a static routing scheme and successive office control[12].Each node uses a small measure of distributed processing to route calls according to the static routing tables.The tables are calculated centrally and off-line.The advantage of this is that the net-work should perform predictably,as a whole,for any failure state.The general acceptance that dynamic routing schemes are preferable in terms of survivability and reliability is ques-tionable,because dynamic schemes are constrained by time and processing power infinding an optimal or near-optimal solution.Moreover,whilst they may solve a local problem, when the network is up to50%damaged,confidence cannot be high that the whole network will continue to function.With static routing tables that can be tested exhaustively against all failure combinations,confidence is higher that the network will continue to function even with up to50%of the nodes destroyed.An added benefit,although not a deciding fac-tor,is that centralised processing of the static routing tables is cheaper in terms of both hardware and software than dis-tributed processing,as each node is less complex.Node2,3,6,43,4,14,7,1Table2:Single-destination routing table5.1Single-destination routing tablesThe routing tables for the actual network are stored in the memory of each physical network node,and indicate the or-der that links should be used for routing a call onwards,for all destinations.However,the routing tables used in this paper are network(rather than node)routing tables,and they do not reflect how the information is actually stored in the memory of the nodes.Each of these network routing tables is constructed as indicated in Table2and refers to just one destination.It corresponds to an entry taken from every node routing table, all referring to the same destination.Optimising such a table is equivalent to optimising the routing through the whole net-work for one given destination node at a time,as routing for any one destination is independent of that for any other.To derive an overall network table for nodes,each of the sep-arate single-destination routing tables would have to be sepa-rately determined.Nevertheless,by using single-destination tables in this manner,the search space for individual runs is divided by a factor of.5.2Routing-table assessmentIntroducing a limit on the number of hops taken through the routing table helps to prevent infinite-routing loops occurring, as well as reducing the computational effort involved in deter-mining near-optimal tables.This also improves the network’s use of resources[14].However,some additional work has to be done to determine an appropriate hop limit.In addition, the objective(fitness function)used to assess a table must dis-courage the generation of routing tables with infinite-routing loops.Consequently,routing tables are evaluated against several different objectives simultaneously:shortest-path routing,the absence of infinite-routing loops,and ability to reach the desti-nation.Connections between each working source node and thefixed destination node()are tested for each net-work failure state(from the set of all valid failure states, for this routing table i.e.those failure states for which the des-tination node is working).Assessing the routing tables sim-ply in terms of connections,in this way,makes no allowance for possible weighting by offered traffic load.However,in a survivable military network,with considerable over capac-ity,it is the ability to communicate between node pairs that is of prime importance.For each such connection tested,the assessment penalises unwanted traits in the routing table by adding a weight,,to its overallfitness value.Thefitness of an idealised table attracting no penalties at all would simply be zero.The penalties incurred are as follows.Direct routes:It is desirable that the routing tables choose the shortest route whenever possible to minimise the number of nodes and links utilised for any single connection.If the table does not provide direct routes whenever possible,then the network will be inefficient and oversized in terms of link capacity.If a path is found,then the value added to thefinal fitness,to reflect the directness of a route,is directly propor-tional to the number of hops used:(1) where is a constant(taken to be1)and is the number of hops in the path from node to node in failure state.For example,a routing table which uses only one hop to connect two nodes would have the value1added to itsfitness assess-ment.A table which uses four hops to connect the same node pair would have the value4added.Absence of infinite-routing loops:It is beneficial to pro-duce routing tables that do not have loops within them.How-ever,given the highly interconnected nature of the network, and the high number of nodes that could be destroyed,it may well be impossible to produce a network with no routing loops without discarding acceptable solutions which achieve the re-quirement to pass95%of traffic.The penalty function at-tached to infinite-routing loops is inversely proportional to the hop count:(2) where is a constant(taken to be100)and is the num-ber of links in the path(from node to node in failure state) at the point the loop is detected.Thus,a loop detected after four hops will have a higher penalty associated with it than a loop that was detected after six hops.This reflects the obser-vation that large hop counts can realistically be expected in states with a large number of failures,as the network is ex-pected to choose direct and short routes,i.e.routes with mini-mal hops.As the network starts to suffer failures,then the di-rect routes will no longer be available and longer routes,with more hops,will be taken instead.Reaching the destination:If the routing table does not manage to connect a particular source node to the destination, then this is a highly undesirable outcome.Consequently,the resulting penalty is a high one.The reasons why a routing ta-ble would be unable to connect a call are either running out of alternative routes at a node or exceeding the hop limit.Thus:(3) where(a constant,taken to be200)is applied on running out of alternative routes and(a constant,taken to be150) when the hop limit is exceeded.The overallfitness,,of the routing table for destinationnode is taken to be:(4) where is the set of all working nodes in network failurestate.5.3Failure-state generationThe method chosen to generate the failure states uses an array of integers(),representing node identificationnumbers(ids),whose length depends on the number of nodefailures required,.Each integer in the array is limited to the range1–,and indicates the id of a node which has failed.Tostep through each of the failure states the least significant ar-ray position is incremented;then,when it is about to exceedits limit,it is reset to1and the next number in the array is in-cremented(modulo).Clearly,each failure state must only appear once.However,using the above method,it would bepossible for each node combination to be repeated,giving per-mutations rather than combinations,since it is possible that, say,and could appear as well as and.To prevent this happening the following rule was adopted:for all values of.Considering the routing table for destination,and a par-ticular number of node failures,,the number of valid net-work failure states(i.e.those failure states for which the destination node is working)is:(6)For the model network,with,the maximum num-ber of failures used in assessing a single-destination routing table wasfixed at,equivalent to(almost)50%of the remaining17nodes ing these values in Eq.6gives the number of connections to test as666,451:a large num-ber for a singlefitness assessment.This is an importantfigure as it allows the percentage of successful connections made by a particular routing table to be calculated.For example,1% failure would correspond to66,645unsuccessful connections during assessment.Elitist10040,0000.60.0011.05Table3:GA parameters6Solution approachesTwo solution approaches were adopted to tackle the problem described in5:a bit-string GA and an ISHC.6.1The genetic algorithmFor the GA,binary encoding of the routing table was used,but rather than directly encoding the node ids in each table entry, instead indices into a look-up table were employed[4].For a particular node,the look-up table lists only those nodes to which it is directly connected,reflecting the actual topology of the model network.The index values thus allow routing se-lection,for a particular node,from just those nodes to which it is actually connected.In addition,once a next node has been identified and used as a choice in the routing table,clearly it cannot be used again.Therefore,subsequent indices refer to fewer choices and,therefore,less bits are needed to code them.For example,with8choices of outgoing route avail-able from a switch,thefirst‘cell’(i.e.group of bits encoding a single index value)will contain3bits,to identify which of the8links is thefirst choice.The second cell must also be 3bits long as it must refer to one of7nodes.Likewise the third and fourth cells.However,thefifth and sixth cells have only4and3options respectively,so they can be coded in just 2bits.The seventh cell has only2options and therefore can be coded in just1bit.The eighth cell has an option of only one node,and therefore does not need to be coded at all.For the model network,the encoding for the routing table to node9 required a total of220bits.(In decoding a cell from binary,if an invalid,i.e.over-large,cell value was encountered,it was simply reduced to the largest allowable index.)The GA was implemented using GENESIS v5.0[15],with fitness-proportional selection(using window scaling),and pa-rameters as given in Table3.These were selected from a few trial runs to obtain good results using40,000trials,the longest run length that could be readily accommodated with available computational resources.Both higher mutation lev-els(up to0.01)and larger population sizes(up to250)pro-vided inferior results,even with runs up to100,000trials in some cases.In addition,using restrictedfitness assessments (e.g.only0–3node failures)for early trials,and so hastening execution,appeared to produce a slight reduction infinal so-lution quality.Node9,14,17,189,4,15,3,112,4,7,10,5,139,14,7,2,11,18,17,8,3,5,13,15,1614,4,7,6,3,129,14,12,5,139,4,16,14,3,5,1716,4,14,12,17,1114,16,11,18,17,32,4,14,16,12,8,10,136,14,8,11,54,15,11,6,39,4,7,16,6,1,5,8,10,11,12,182,4,16,139,7,14,15,11,10,84,7,1,16,10,814,4,10,17,1Table4:Existing routing table to node96.2Iterative stochastic hill climberThe ISHC does not encode the routing table,but works di-rectly on it using a swap operator.This selects a source nodeat random and then,for that node,chooses two routing choices(next nodes)at random.These are exchanged,and the ta-ble re-assessed.If the swap results in an improvement,it isretained,otherwise the original choices are restored.How-ever,in the latter case,the identity of the node and pair of choices tried are remembered.This allows the ISHC to avoidre-trying a previously failed swap.As soon as an improve-ment is found,though,the memory of all unsuccessful swapsis cleared.The ISHC is initialised either with a user-suppliedrouting table,or a randomly-generated one.On detecting a local optimum(all of the possible swaps tried unsuccessfullysince the last improvement),the ISHC restarts using either thesupplied routing table,or a new randomly-generated one,as appropriate.7Experimental resultsThe existing routing table for destination node9is shown inTable4.This was assessed for all node failures0–8,with hop limit of4,6and8.Table5shows thefitness,;the countof the number of infinite-routing loops,;the count of the number of failures to reach the destination,;the total num-ber of connection failures,;and the successlevel,.Clearly,a hop limit of6is an appropriate choice,as it represents the lowest value beyondwhich further improvement is unlikely.Consequently,thisvalue was adopted for all the additional experimental work re-ported here.Before considering the results obtained by the GA and ISHC,it should be noted that the good performance of the ex-isting routing table(98.68%)against the target of95%has dispelled the suspicion that the existing routing tables were not meeting the network requirement,at least for destination node9.However,the algorithm used to generate the existingMetrics48() 1.7676,9971,7768,77398.68%Median()1.5071,5193,295ISHC1 1.4991,77599.52% GA2 1.4991,77599.52%1.4991,4513,2261.4e+061.45e+061.5e+061.55e+061.6e+061.65e+061.7e+061.75e+061.8e+061.85e+061.9e+060500010000150002000025000300003500040000F i t n e s s Trials"GA1 Best""GA1 Average""ISHC1"Figure 2:Example run for GA1/ISHC1cant difference).In considering the absolute quality of the results obtained,it should be noted that,due to limitations in the network topol-ogy,1,771connections cannot reach the destination because the source node is disconnected (i.e.isolated)by node failures.This therefore represents a lower limit on .Similarly,351connections must inevitably result in infinite-routing loops (or exceed the hop limit)because:the source is part of a two-node component that does not include the destination (244);the destination is isolated (99);or the destination is part of a two-node component that does not include the source (8).Additional,more complex,network disconnections must also be responsible for further infinite-routing loops,regardless of routing-table design.Consequently,the results obtained by GA1/ISHC1,particularly for ,closely approach the limit of what can be achieved with the existing network topology.The progress of typical runs for GA1/ISHC1are illustrated in Fig.2,which shows the average and best fitness for GA1,and the current fitness for ISHC1,against the number of trials.Through the run,GA1shows steady improvement in the best individual,passing the fitness of the existing table in less than 3,500trials.However,ISHC1is able to find good quality re-sults at the ‘top’of every ‘hill’;its full run,including restarts,simply ensuring the excellence of the final result.Similarly,for the second scenario (existing table known),ten runs each were carried out using GA2and ISHC2.The number of trials allocated was identical to those allowed for GA1/ISHC1,i.e.40,000trials.The results are summarised in Table 6.Once again,the outcome of all ten ISHC2runs was identical (in minimum 1,848,median 6,047trials).As before,substantial gains over the existing table are seen using both algorithms for this problem scenario.In addition,while best individual GA2run was able to match the consis-tent outcome of ISHC2,clearly the latter provided the better median.The same non-parametric test as for GA1/ISHC1es-tablished a 0.8%significance level (i.e.a highly significant difference between the two medians).The best routing table overall (in fitness terms),found byNode9,14,17,189,4,15,3,112,4,7,10,5,139,14,7,2,11,18,17,8,3,5,13,15,1614,4,7,6,3,129,14,12,5,139,4,16,14,3,5,1716,4,14,17,12,1114,16,11,3,18,172,4,14,16,13,8,12,106,14,11,8,56,4,3,11,159,4,7,16,6,1,5,8,10,11,12,182,4,16,139,7,14,15,11,10,84,7,1,10,8,1814,1,4,17,10Table 7:Best routing table to node 9ISHC1,is given in Table 7(although tables of the same fitness were also found by GA2and ISHC2).7.1Limitations of network topologyAll of the research reported here was carried out with the topology of the model network fixed.However,it was sug-gested in 4that the design of networks may be tackled as an iterative process,with each of the various design stages (topology,routing and sizing)being revisited several times.Given the limitations on survivability imposed by the existing topology,some of which were enumerated above,alteration of the real-network topology would allow further improvement in survivability over what can be achieved with routing tables alone.Clearly,when a network must cater for the possibility that up to eight nodes might be destroyed,it is reasonable to assume that at least eight links be provided to each node.If nine links to nine different nodes were provided then,even in the worst failure states,with eight nodes failed,there would be one link left that could pass traffic from any node.When looking at node 9as the destination,the current network has fourteen nodes with less than eight links.Moreover,contrary to Schroeder &Newport’s recommendations [13]the remain-ing three nodes with more than eight links represent areas of increased vulnerability.8Conclusions &further workThe aim of this work was to demonstrate the use of both a GA and an ISHC in optimising a military circuit-switched network for survivability.The authors,to the best of their knowledge,are the first to apply GA techniques specifically to the optimi-sation of routing for military network survivability.In the experimental work,both the genetic algorithm (GA)and iterative stochastic hill climber (ISHC)approaches pro-vided substantial improvement over the existing routing table for a single destination,whether the knowledge of the existing table was utilised or not.Indeed,if the best routing table were。