ITU-T Stuy Group 5Protection against ic en

合集下载

中华人民共和国知识产权海关保护条例(英文版)

中华人民共和国知识产权海关保护条例(英文版)

Regulation of the P. R. China on the customs protection of IP rightsPART ONE GENERAL PROVISIONSArticle 1 These Regulations are formulated in accordance with the PRC, Customs Law in order to implement customs protection of intellectual property rights, promote foreign economic trade and technological and cultural exchange, and safeguard social interests.Article 2 For the purposes of these Regulations, “customs protection of intellectual property rights” refers to the implementation of protection by customs of the exclusive rights to use a trademark, copyrights and the rights related thereto, and patent rights that are related to import and export goods and that are protected by PRC laws and administrative regulations (Intellectual Property Rights).Article 3 The State prohibits the import and export of goods that infringe upon Intellectual Property Rights.Customs shall implement protection of Intellectual Property Rights and exercise the relevant powers stipulated in the PRC, Customs Law in accordance with the provisions of relevant laws and these Regulations.Article 4 Owners of Intellectual Property Rights that request customs to implement protection of Intellectual Property Rights shall submit an application to customs for adoption of protective measures.Article 5 Consignees of import goods or their agents, and consignors of export goods or their agents shall truthfully declare to customs the details of Intellectual Property Rights related to the import or export goods, and shall submit the relevant supporting documents.Article 6 When implementing protection of Intellectual Property Rights, customs shall maintain the confidentiality of the trade secrets of the related parties.PART TWO RECORD FILING OF INTELLECTUAL PROPERTY RIGHTSArticle 7 An owner of Intellectual Property Rights may apply to the General Administration of Customs for record filing of his Intellectual Property Rights according to the provisions hereof. To apply for record filing, an application form shall be submitted. An application form shall include the following particulars:1. the name or personal name, place of registration or nationality, etc. of the owner of the Intellectual Property Rights;2. the name, details and the relevant information of the Intellectual Property Rights;3. the details of the exercise of the Intellectual Property Rights license;4. the name, place of origin, customs at the point of entry/exit, importers and exporters, major characteristics, and prices, etc. of the goods of which the Intellectual Property Rights are lawfully exercised by the owner of Intellectual Property Rights; and5. the manufacturers, importers and exporters, customs at the point of entry/exit, major characteristics, and prices, etc. of goods that are known to have infringed upon Intellectual Property Rights.Where there are supporting documents for the contents of the application form specified in the preceding paragraph, the owner of Intellectual Property Rights shall attach the supporting documents.Article 8 The General Administration of Customs shall, within 30 working days of the date of receipt of all application documents, render a decision on whether to grant approval for record filing, and shall notify the applicant in writing. Where approval for record filing is not granted, the reasons therefore shall be stated.The General Administration of Customs shall not grant approval for record filing in any of the following circumstances:1. the application documents are incomplete or invalid;2. the applicant is not the owner of the Intellectual Property Rights; or3. the Intellectual Property Rights are no longer protected by laws or administrative regulations.Article 9 If customs discovers that an owner of Intellectual Property Rights that applies for record filing of Intellectual Property Rights has not provided the relevant details or documents truthfully, the General Administration of Customs may revoke its filed record.Article 10 A filed record for customs protection of Intellectual Property Rights shall be effective as of the date on which the General Administration of Customs grants approval for record filing, and shall be valid for 10 years.Where the Intellectual Property Rights are valid, the owner of the Intellectual Property Rights may, within six months prior to the expiration of the term of validity of the filed record for customs protection of Intellectual Property Rights, apply to the General Administration of Customs for an extension of the filed record. The term of validity of each extension of a filed record shall be 10 years.Where no application for extension has been made upon the expiration of the term of validity of a filed record for customs protection of Intellectual Property Rights, or the Intellectual Property Rights are no longer protected by laws or administrative regulations, the filed record for customs protection of Intellectual Property Rights shall immediately become void.Article 11 Where there is a change in the details of a filed record of Intellectual Property Rights, the owner of the Intellectual Property Rights shall, within 30 working days of the date on which the change occurs, carry out the amendment or cancellation procedures with the General Administration of Customs.Where the owner of the Intellectual Property Rights does not apply to the amendment or cancellation procedures in accordance with the preceding paragraph so as to seriously affect other’s lawful import or export and the Customs supervision according to law, the General Administration of Customs can remove the record upon the application of the stakeholders or take the initiative to do so.PART THREE APPLICATION FOR IMPOUNDMENT OF GOODS SUSPECTED OF INFRINGING UPON RIGHTS, AND THE HANDLING THEREOFArticle 12 Where an owner of Intellectual Property Rights discovers that goods suspected of infringing upon rights are about to be imported or exported, he may submit an application for impoundment of goods suspected of infringing upon rights to the customs of the place where the goods are to enter into, or exit from, China.Article 13 Where an owner of Intellectual Property Rights requests customs to impound goods suspected of infringing upon rights, he shall submit an application form and the relevant supporting documents, and shall provide evidence that is sufficient to prove that the infringement clearly exists.An application form shall include the following main particulars:1. the name or personal name, place of registration or nationality, etc. of the owner of the Intellectual Property Rights;2. the name, details and the relevant information of the Intellectual Property Rights;3. the names of the consignees and consignors of the goods suspected of infringing upon rights;4. the name and specifications, etc. of the goods suspected of infringing upon rights; and5. the port by which, the time at which and the means of transportation by which, the goods suspected of infringing upon rights may enter into, or exit from, China.Where the goods suspected of infringing upon rights are suspected of infringing upon Intellectual Property Rights that are filed for record, the application form shall also include the customs record number.Article 14 Where an owner of Intellectual Property Rights requests customs to impound goods suspected of infringing upon rights, he shall provide to customsa guarantee equal to the value of the goods for compensation of any loss that may be incurred by the consignee or the consignor due to improper application, and for payment of fees for the storage, custody and disposal, etc. of the goods after they are impounded by customs. Where an owner of Intellectual Property Rights pays the fees for storage and custody directly to the storage provider, such fees shall be deducted from the guarantee. The specific procedures shall be formulated by the General Administration of Customs.Article 15 Where an owner of Intellectual Property Rights that applies for impoundment of goods suspected of infringing upon rights satisfies the provisions of Article 13 hereof and provides a guarantee in accordance with Article 14 hereof, customs shall impound the goods suspected of infringing upon rights, notify the owner of Intellectual Property Rights in writing, and deliver a certificate of impoundment by customs to the consignee or consignor.Where an owner of Intellectual Property Rights that applies for impoundment of goods suspected of infringing upon rights does not satisfy the provisions of Article 13 hereof or has not provided a guarantee in accordance with Article 14 hereof, customs shall reject the application and notify the owner of Intellectual Property Rights in writing.Article 16 Where customs discovers import or export goods that are suspected of infringing upon Intellectual Property Rights that are filed for record, it shall notify the owner of the Intellectual Property Rights immediately in writing. Where, within three working days of the date of delivery of the notification, the owner of the Intellectual Property Rights submits an application according to Article 13 hereof and provides a guarantee according to Article 14 hereof, customs shall impound the goods suspected of infringing upon rights, notify the owner of the Intellectual Property Rights in writing, and deliver a certificate of impoundment by customs to the consignee or consignor. Where the owner of the Intellectual Property Rights fails to submit an application or provide a guarantee within the time limit, customs may not impound the goods.Article 17 An owner of Intellectual Property Rights and the consignee or consignor may inspect the relevant goods upon the approval of customs.Article 18 Where the consignee or consignor considers that his goods have not infringed upon the Intellectual Property Rights of the owner of Intellectual Property Rights, he shall submit a written explanation to customs and attach the relevant evidence.Article 19 Where a consignee or consignor of goods suspected of infringing upon patent rights considers that his import or export goods have not infringed upon patent rights, he may, after providing a guarantee equal to the value of the goods, request customs to release his goods. If the owner of Intellectual Property Rights fails to institute an action at a people’s court within a reasonable time period, customs shall return the guarantee.Article 20 If, after customs has discovered import or export goods suspected of infringing upon Intellectual Property Rights that are filed for record and has notified the owner of the Intellectual Property Rights, the owner of the Intellectual Property Rights requests customs to impound the goods suspected of infringing upon rights, customs shall, within 30 working days of the date of impoundment, investigate and confirm whether the impounded goods suspected of infringing upon rights have infringed upon Intellectual Property Rights. If it cannot confirm an infringement, it shall notify the owner of the Intellectual Property Rights immediately in writing.Article 21 Where customs conducts an investigation into the impounded goods suspected of infringing upon rights and requests the assistance of the department in charge of Intellectual Property Rights, the relevant department in charge of Intellectual Property Rights shall provide assistance.Where the department in charge of Intellectual Property Rights requests customs to provide assistance in the handling of rights infringement cases involving import and export goods, customs shall provide assistance.Article 22 Where customs conducts an investigation into the impounded goods suspected of infringing upon rights and the relevant details, the owner of Intellectual Property Rights and the consignee or consignor shall coordinate with the investigation.Article 23 An owner of Intellectual Property Rights may, after applying to customs for adoption of protective measures, apply to the people’s court for an order of cessation of the infringing act or preservation of property for the impounded goods suspected of infringing upon rights prior to the institution of action in accordance with the provisions of the PRC, Trademark Law, the PRC, Copyright Law or the PRC, Patent Law.Customs that receives the notice to assist in execution of an order of cessation of an infringing act or preservation of property from the p eople’s court shall provide assistance.Article 24 Customs shall release the impounded goods suspected of infringing upon rights in any of the following circumstances:1. customs impounds goods suspected of infringing upon rights according to Article 15 hereof, and has not received the notice to assist in execution from the people’s court within 20 working days from the date of impoundment;2. customs impounds goods suspected of infringing upon rights according to Article 16 hereof, and has not received the notice to assist in execution from the people’s court within 50 working days from the date of impoundment, and cannot confirm that the impounded goods suspected of infringing upon rights has infringed upon Intellectual Property Rights after investigation;3. the consignee or consignor of the goods suspected of infringing upon patent rights requests customs to release his goods after providing a guarantee equal to the value of the goods; or4. customs considers that the consignee or consignor has sufficient evidence to prove that his goods have not infringed upon the Intellectual Property Rights of the owner of Intellectual Property rights.Article 25 Where customs impounds goods suspected of infringing upon rights according to the provisions hereof, the owner of the Intellectual Property Rights shall pay the relevant fees for storage, custody and disposal, etc. Where the owner of the Intellectual Property Rights has not paid the relevant fees,customs may deduct such fees from the guarantee he provides to customs, or request the guarantor to perform the relevant guarantee liability.Where goods suspected of infringing upon rights are confirmed as having infringed upon Intellectual Property Rights, the owner of the Intellectual Property Rights may include the relevant fees for storage, custody and disposal, etc. he has paid in the reasonable expenditure paid for cessation of the infringing acts.Article 26 Where customs discovers a case suspected of a criminal offence during implementation of protection of Intellectual Property Rights, it shall hand over the case to the public security authority according to law for handling.PART FOUR LEGAL LIABILITYArticle 27 Where impounded goods suspected of infringing upon rights are confirmed as having infringed upon Intellectual Property Rights after investigation by customs, customs shall confiscate the goods.After customs has confiscated the goods that have infringed upon Intellectual Property Rights, it shall notify the owner of the Intellectual Property Rights in writing of the relevant details of such goods.Where confiscated goods that have infringed upon Intellectual Property Rights can be used for public welfare, customs shall transfer the goods to the relevant public welfare organizations to be used for public welfare. Where the owner of the Intellectual Property Rights wishes to acquire the goods, customs may transfer the goods to the owner of the Intellectual Property Rights for compensation. Where confiscated goods that has infringed upon Intellectual Property Rights cannot be used for public welfare and the owner of the Intellectual Property Rights does not wish to acquire the goods, customs may auction off the goods according to law after removing the infringing characteristics. Where the infringing characteristics cannot be removed, customs shall destroy the goods.Article 28 Where articles carried or sent by mail by individuals into or out of China exceed the amount for personal use or the reasonable amount and infringeupon the Intellectual Property Rights stipulated in Article 2 hereof, customs shall confiscate such articles.Article 29 Where, after customs has accepted an application for record filing of protection of Intellectual Property Rights and for adoption of protective measures for Intellectual Property Rights, an owner of Intellectual Property Rights cannot provide precise details and as a result, the goods infringing upon rights are not discovered, or the protective measures are not adopted in a timely manner or effectively, the owner of the Intellectual Property Rights shall bear the liability himself.Where, after an owner of Intellectual Property Rights has requested customs to impound goods suspected of infringing upon rights, customs cannot confirm whether the impounded goods suspected of infringing upon rights has infringed upon the Intellectual Property Rights of the owner of Intellectual Property Rights, or the people’s court rules that the goods have not infringed upon the Intellectual Property Rights of the owner of Intellectual Property Rights, the owner of Intellectual Property Rights shall be liable for compensation according to law.Article 30 Where the import or export of goods that infringe upon Intellectual Property Rights constitutes a criminal offence, criminal liability shall be pursued according to law.Article 31 Where the personnel of customs are derelict in their duties, abuse their authority or practice graft in their implementation of protection of Intellectual Property Rights, and a criminal offence is constituted, their criminal liability shall be pursued according to law. Where the same is insufficient to constitute a criminal offence, they shall be subjected to administrative penalty according to law.PART FIVE SUPPLEMENTARY PROVISIONSArticle 32 Where an owner of Intellectual Property Rights handles record filing of his Intellectual Property Rights with the General Administration of Customs, he shall pay the fee for record filing in accordance with the relevant State provisions.Article 33 These Regulations shall be implemented as of 1 March 2004. The PRC, Customs Protection of Intellectual Property Rights Regulations promulgated by the State Council on 5 July 1995 shall be simultaneously repealed.。

ITU-T_T30建议书

ITU-T_T30建议书

T30传真过程摘要:本文档主要介绍T30传真过程的五个阶段。

关键字:T30一、传真建议T30的简介T30是ITU-T制定的传真建议,它定义了三类传真机的传真过程(三类传真机的定义可以参年ITU-T的T.4建议)。

该建议非常完善健硕。

二、T30传真过程1、T30传真过程,如下图:简单的说,各阶段完成的工作如下:Phase A:呼叫建立。

Phase B:前消息处理过程,以满足是识别并选择必须的设备。

Phase C:消息传输过程,包括相位调整和同步。

Phase D:后消息过程,包括结束消息和证实,以及多文件传输过程。

Phase E:呼叫释放过程。

2、阶段A:呼叫建立过程该过程可以有4种形式,分别是“主叫,被叫”与“手动,自动“的排列组合。

即:1、主叫,被叫均手动;2、主叫,被叫均自动;3、主叫手动,被叫自动;4、主叫自动,被叫手动。

呼叫建立过程同普通的电话建立过程,不再赘述。

在真正进入传真阶段,即B阶段前,传真机还要发送两个信号,分别是CED(被叫终端标识,Called terminal identification),CNG (主叫单音Calling tone)。

CED作用:三类传真可以应用该信号实现自动应答。

CNG作用:告诉对端终端处在发送状态。

对自动主叫终端均为手动的终端而言,该信号是必须的,谁是发送端,那么谁就发送该信号。

一旦发送了CNG后,发送端的语音通道就闭塞掉了,无法再进行语音通语。

3、阶段B:前消息处理过程阶段B主要完成能力协商和线路训练。

能力协商主要是速率、编码和纠错方面的协商,类似于Modem的协商。

在这个地过程中主要会发送以下一些信号:用于非标准能力的协商:NSF(非标准设备,Non-standard facilities):进行非标准能力的协商,即非T系列的用户专用能力。

NSC(非标准设备命令,Non-standard facilities command):响应NSF信号中的信息。

ITU数据网、开放系统通信和安全性T-REC-X.1205-200804-I

ITU数据网、开放系统通信和安全性T-REC-X.1205-200804-I

4国际电信联盟ITU-T X.1205(04/2008) 国际电信联盟电信标准化部门X系列:数据网、开放系统通信和安全性电信安全网络安全综述ITU-T X.1205建议书国际电信联盟ITU-T X 系列建议书数据网、开放系统通信和安全性公用数据网业务和设施X.1-X.19 接口X.20-X.49 传输、信令和交换X.50-X.89 网络概貌X.90-X.149 维护X.150-X.179 管理安排X.180-X.199 开放系统互连模型和记法X.200-X.209 服务限定X.210-X.219 连接式协议规范X.220-X.229 无连接式协议规范X.230-X.239 PICS书写形式X.240-X.259 协议标识X.260-X.269 安全协议X.270-X.279 层管理对象X.280-X.289 一致性测试X.290-X.299 网间互通概述X.300-X.349 卫星数据传输系统X.350-X.369 以IP为基础的网络X.370-X.379报文处理系统X.400-X.499 号码簿X.500-X.599 OSI 组网和系统概貌组网X.600-X.629 效率X.630-X.639 业务质量X.640-X.649 命名、寻址和登记X.650-X.679 抽象句法记法1(ASN.1)X.680-X.699 OSI 管理系统管理协议子集和结构X.700-X.709 管理通信服务和协议X.710-X.719 管理信息的结构X.720-X.729 管理功能X.730-X.799 安全X.800-X.849 OSI 应用托付、并发和恢复X.850-X.859 事务处理X.860-X.879 远程操作X.880-X.889 ASN.1的一般应用X.890-X.899 开放分布式处理X.900-X.999 电信安全X.1000-欲了解更详细信息,请查阅 ITU-T建议书目录。

ITU-T X.1205建议书网络安全综述摘要ITU-T X.1205建议书提出了对网络安全的定义。

the internet of things

the internet of things

自1997年起,国际电联发起了名为“对网络的挑战”互联网系列报告,本次报告《国际电信联盟ITU互联网报告2005:物联网》是该系列之七。

本报告由国际电联的战略和政策团队所写,报告所关注的是下一步通信中的新技术,如无限射频识别(RFID)和互连的网络设备的智能计算。

从轮胎到牙刷,各类物体在不久的将来会实现相互通信,这预示着一个新时代的黎明,也许就是今天的互联网让位于明天的互联网该报告共六章,具体内容如下:第一章,介绍物联网及其关键技术,如无处不在的网络,下一代网络,无处不在的计算。

第二章,应用技术,研究了将驱动物联网未来的技术,包括无线互联网,射频识别(RFID),传感器技术,智能物体,纳米技术和小型化;第三章,塑造市场,探讨了这些市场的技术潜力,以及抑制市场增长的因素,着眼于说明在特定的行业中物联网将改变传统的商业模式;第四章,新挑战,思索着障碍走向标准化和事物互联网的更广泛影响的社会,例如增加对隐私权的关注;第五章,世界发展中的机遇,提出了这些技术可能给发展中国家带来的好处,本身也成为导致用户和市场的驱动因素;第六章,用大框图将所有因素联系在一起,并得出未来10年我们的生活方式将发生怎样的改变。

About the Report (1)1 What is the Internet of Things? (2)2 Technologies for the Internet of Things (3)3 Market Opportunities (6)4 Challenges and Concerns (8)5 Implications for the Developing World (10)6 2020: A Day in the Life (12)7 A New Ecosystem (13)Table of Contents (16)About the Report“The Internet of Things” is the seventh in the series of ITU Internet Reports originally launched in 1997 under the title “Challenges to the Network”. This edition has been specially prepared for the second phase of the World Summit on the Information Society (WSIS), to be held in Tunis, 16-18 November 2005.Written by a team of analysts from the Strategy and Policy Unit (SPU) of ITU, the report takes a look at the next step in “always on” communications, in which new technologies like radio-frequency identification (RFID) and smart computing promise a world of networked and interconnected devices. Everything from tyres to toothbrushes might soon be in communications range, heralding the dawn of a new era; one in which today’s Internet (of data and people) gives way to tomorrow’s Internet of Things.The report consists of six chapters as follows:Chapter one,Introducing the Internet of Things, explores the key technical visions underlying the Internet of Things, such as ubiquitous networks, next-generation networks and ubiquitous computing;Chapter two, Enabling Technologies, examines the technologies that will drive the future Internet of Things, including radio-frequency identification (RFID), sensor technologies, smartthings, nanotechnology and miniaturization;Chapter three, Shaping the Market, explores the market potential of these technologies, as well as factors inhibiting market growth. It looks at new business models in selected industries to illustrate how the Internet of Things is changing the way firms do business;Chapter four, Emerging Challenges, contemplates the hurdles towards standardization and the wider implications of the Internet of Things for society, such as growing concerns over privacy;Chapter five, Opportunities for the Developing World, sets out some of the benefits these technologies offer to developing countries that may themselves become lead users and drivers of the market;Chapter six, The Big Picture, draws these threads together and concludes on how our lifestyles may be transformed over the next decade. The Statistical annex presents the latest data and charts for more than 200 economies worldwide in their use of ICTs.This Executive Summary, published separately, provides a synopsis of the full report, which is available for purchase (at the catalogue price of CHF 100) on the ITU website at www.itu.int/publications under General Secretariat.1 What is the Internet of Things?Over a decade ago, the late Mark Weiser developed a seminal vision of future technological ubiquity one in which the increasing “availability of processing power would be accompani ed by its decreasing visibilityWe are standing on the brink of a new ubiquitous computing and communication era, one that will radically transform our corporate, community, and personal spheres. Over a decade ago, the late Mark Weiser developed a seminal vision of future technological ubiquity – one in which the increasing “availability” of processing power would be accompanied by its decreasing “visibility”. As he observed, “the most profound technologies are those that disappear…they weave themselves in to the fabric of everyday life until they are indistinguishable from it”. Early forms of ubiquitous information and communication networks are evident in the widespread use of mobile phones: the number of mobile phones worldwide surpassed 2 billion in mid-2005. These little gadgets have become an integral and intimate part of everyday life for many millions of people, even more so than the internet.Today, developments are rapidly under way to take this phenomenon an important step further, by embedding short-range mobile transceivers into a wide array of additional gadgets and everyday items, enabling new forms of communication between people and things, and between things themselves. A new dimension has been added to the world of information and communication technologies (ICTs): from anytime, any place connectivity for anyone, we willnow have connectivity for anything (Figure 1).Connections will multiply andcreate an entirely new dynamic networkof networks – an Internet of Things. TheInternet of Things is neither sciencefiction nor industry hype, but is basedon solid technological advances andvisions of network ubiquity that arezealously being realized.2 Technologies for the Internet of ThingsThe Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to nanotechnology.First, in order to connecteveryday objects and devices tolarge databases and networks – andindeed to the network of networks(the internet) – a simple,unobtrusive and cost-effectivesystem of item identification iscrucial. Only then can data aboutthings be collected and processed.Radio-frequency identification(RFID) offers this functionality.Second, data collection will benefitfrom the ability to detect changes inthe physical status of things, using sensor technologies. Embedded intelligence in the things themselves can further enhance the power of the network by devolving information processing capabilities to the edges of the network. Finally, advances in miniaturization and nanotechnology mean that smaller and smaller things will have the ability to interact and connect (Figure 2). A combination of all of these developments will create an Internet of Things that connects the world’s objects in both a sensory and an intelligent manner.Indeed, with the benefit of integrated information processing, industrial products and everyday objects will take on smart characteristics and capabilities. They may also take on electronic identities that can be queried remotely, or be equipped with sensors for detecting physical changes around them. Eventually, even particles as small as dust might be tagged andnetworked. Such developments will turn the merely static objects of today into newly dynamic things, embedding intelligence in our environment, and stimulating the creation of innovative products and entirely new services.RFID technology, which uses radio waves to identify items, is seen as one of the pivotal enablers of the Internet of Things. Although it has sometimes been labelled as the next-generation of bar codes, RFID systems offer much more in that they can track items in real-time to yield important information about their location and status. Early applications of RFID include automatic highway toll collection, supply-chain management (for large retailers), pharmaceuticals (for the prevention of counterfeiting) and e-health (for patient monitoring). More recent applications range from sports and leisure (ski passes) to personal security (tagging children at schools). RFID tags are even being implanted under human skin for medical purposes, but also for VIP access to bars like the Baja Beach Club in Barcelona. E-government applications such as RFID in drivers’ licences, passports or cash are under consideration. RFID readers are now being embedded in mobile phones. Nokia, for instance, released its RFID-enabled phones for businesses with workforces in the field in mid-2004 and plans to launch consumer handsets by 2006.The Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to nanotechnology.In addition to RFID, the ability todetect changes in the physical status ofthings is also essential for recordingchanges in the environment. In this regard,sensors play a pivotal role in bridging thegap between the physical and virtualworlds, and enabling things to respond tochanges in their physical environment.Sensors collect data from theirenvironment, generating information andraising awareness about context. Forexample, sensors in an electronic jacketcan collect information about changes in external temperature and the parameters of the jacket can be adjusted accordingly.Embedded intelligence in things themselves will further enhance the power of the network.Embedded intelligence in things themselves will distribute processing power to the edges of the network, offering greater possibilities for data processing and increasing the resilience of the network.This will also empower things and devices at the edges of the network to take independent decisions. “Smart things” are difficult to define, but imply a certain processing power and reaction to external stimuli. Advances in smart homes, smart vehicles and personal robotics are some of the leading areas. Research on wearable computing (including wearable mobilityvehicles) is swiftly progressing. Scientists are using their imagination to develop new devices and appliances, such as intelligent ovens that can be controlled through phones or the internet, online refrigerators and networked blinds (Figure 3).The Internet of Things will draw on the functionality offered by all of these technologies to realize the vision of a fully interactive and responsive network environment.3 Market OpportunitiesThe technologies of the Internet of Things offer immense potential to consumers, manufacturers and firms. However, for these ground-breaking innovations to grow from idea to specific product or application for the mass market, a difficult process of commercialization is required, involving a wide array of players including standard development organizations, national research centres, service providers, network operators, and lead users (Figure 4).From their original inception and throughout the R&D phase, new ideas and technologies must find champions to take them to the production phase. The time to market, too, requires key “lead users” that can push the innovation forward. To date, the technologies driving the Internet of Things are notable for the strong involvement of the private sector, e.g. through industry fora and consortia. Yet public sector involvement is growing, through national strategies for technical development (e.g. nanotechnology) and in sector-specific investments in healthcare, defence or education.RFID is the most mature of the enabling technologies with established standardization protocols and commercial applications reaching the wider market. The global market for RFIDproducts and services is growing fast, with sizeable revenues of between USD 1.5-1.8 billion by 2004. However, this is dwarfed by the total revenues expected over the medium- to long-term, with the spread of smart cards and RFID in all kinds of consumer products, including mobile phones.Changing business strategies is the name of the game…Wireless sensor networks are widely used in industries such as automotive, homeland security, medical, aerospace, home automation, remote monitoring, structural and environmental monitoring. Estimates of their market potential vary (partly due to different definitions), but analysts forecast that as their unit price falls, the number of units deployed will grow significantly. Meanwhile, robotics is expanding into new markets. At present, the market share of industrial robotics is larger than that of personal and service robotics, but this is set to change, as the personal robotics segment is expected to lead future market growth.Changing business strategies is the name of the game, in particular in the retail, automotive and telecommunication industries. Firms are embracing the underlying technologies of the Internet of Things to optimize their internal processes, expand their traditional markets and diversify into new businesses.4 Challenges and ConcernsBuilding on the potential benefits offered by the Internet of Things poses a number of challenges, not only due to the nature of the enabling technologies but also to the sheer scale of their deployment. Technological standardization in most areas is still in its infancy, or remains fragmented. Not surprisingly, managing and fostering rapid innovation is a challenge for governments and industry alike. Standardization is essential for the mass deployment and diffusion of any technology. Nearly all commercially successful technologies have undergone some pro cess of standardization to achieve mass market penetration. Today’s internet and mobile phones would not have thrived without standards such as TCP/IP and IMT-2000.Successful standardization in RFID was initially achieved through the Auto-ID Center and now by EPC Global. However, efforts are under way in different forums (ETSI, ISO, etc...) and there have been calls for the increased involvement of ITU in the harmonization of RFID protocols. Wireless sensor networks have received a boost through the work of the ZigBee Alliance, among others. By contrast, standards in nanotechnology and robotics are far more fragmented, with a lack of common definitions and a wide variety of regulating bodies.One of the most important challenges in convincing users to adopt emerging technologies is the protection of data and privacy. Concerns over privacy and data protection are widespread, particularly as sensors and smart tags can track users’ movements, habits and ongoing preferences. When everyday items come equipped with some or all of the five senses (such as sight and smell) combined with computing and communication capabilities, concepts of data request and data consent risk becoming outdated. Invisible and constant data exchange between things and people, and between things and other things, will occur unknown to the owners and originators of such data. The sheer scale and capacity of the new technologies will magnify this problem. Who will ultimately control the data collected by all the eyes and ears embedded in the environment surrounding us?Public concerns and active campaigns by consumers have already hampered commercial trials of RFID by two well-known retailers. To promote a more widespread adoption of the technologies underlying the Internet of Things, principles of informed consent, data confidentiality and security must be safeguarded. Moreover, protecting privacy must not be limited to technical solutions, but encompass regulatory, market-based and socio-ethical considerations (Figure 5). Unless there are concerted efforts involving all government, civil society and private sector players to protect these values, the development of the Internet of Things will be hampered if not prevented. It is only through awareness of these technological advances, and the challenges they present, that we can seize the future benefits of a fair and user-centric Internet of Things.When everyday items come equipped with some or all of the five senses… combined with computing and communication capabilities, concepts of data request and data consent risk becoming outdated.5 Implications for the Developing WorldThe technologies discussed in this report are not just the preserve of industrialized countries. These technologies have much to offer for the developing world and can lead to tangible applications in, inter alia, medical diagnosis and treatment, cleaner water, improved sanitation, energy production, the export of commodities and food security.In line with the global commitment to achieving the Millennium Development Goals (MDGs), the World Summit on the Information Society (WSIS) focuses on ICT development through the creation of national e-strategies, the guarantee of universal, ubiquitous, equitable and affordable access to technology and the wider dissemination and sharing of information and knowledge. WSIS commitments go far beyond technological diffusion –there is a pledge for common action towards poverty alleviation, the enhancement of human potential and overall development through communication technologies and related emerging technologies. In this regard, the technologies underlying the Internet of Things offer many potential benefits.One does not have to look far to find examples. In the production and export of commodities, sensor technologies are being used to test the quality and purity of different products, such ascoffee in Brazil and beef in Namibia. RFID has been used to track shipments of beef to the European Union to verify their origin, integrity and handling – essential given present trends in food tracability standards. Such applications help ensure the quality and market expansion of commodities from developing countries.The enabling technologies of the Internet of Things have much to offer developing countries in their goals for improving quality of lifeThe enabling technologies of the Internet of Things have much to offer developing countries in their goals for improving quality of life.Nanofilters in Bangladesh are removing pollutants and ensuring that water is safe to drink. Nano-sensors can be used to monitor water quality at reduced cost, while nanomembranes can assist in the treatment of wastewater. Research is under way to apply nanotechnology in the diagnosis and treatment of disease, including the diagnosis of HIV and AIDS, as well as nano-drugs for other diseases. Emerging technologies could also improve the quality and reliability of conventional drugs for the developing world: RFID, for example, can track the origin of safe drugs thereby reducing counterfeit.Sensor technologies can monitor vulnerable environments and prevent or limit natural disasters. Extensive and effective systems are needed to ensure early warning and evacuation, thereby reducing loss of life due to natural disasters. Special robots have for instance been used for mine detection to save lives and limbs in conflict zones. Commercial applications are already beingdeployed in countries like India, Thailand and Turkey, among others.Next-generation communication technologies may well originate in the larger growth markets of the developing world –China and India, in particular. The substantial research programmes currently being undertaken by these developing giants mean that the implementation of the Internet of Things will be adapted to local conditions and circumstances, as well as to international trade. Wal-Mart, for instance, now requires its suppliers to be RFID-compliant. In 2002, Wal-Mart sourced billions of dollars worth of products from China, i.e. around 12% of the total value of US imports from China during that year. Not surprisingly, China is rapidly preparing itself to become a leader in RFID deployment. Far from being passive followers of the Internet of Things, the developing world stands to greatly influence the implementation and widespread adoption of these emerging technologies.6 2020: A Day in the LifeBut what does the Internet of Things mean in a practical sense for a citizen of the future? Let us imagine for a moment a day in the life of Rosa, a 23-year-old student from Spain, in the year 2020.Rosa has just quarrelled with her boyfriend and needs a little time to herself. She decides to drive secretly to the French Alps in her smart Toyota to spend a weekend at a ski resort. But itseems she must first stop at a garage – her car's RFID sensor system (required by law) has alerted her of possible tyre failure. As she passes through the entrance to her favourite garage, a diagnostic tool using sensors and radio technology conducts a comprehensive check of her car and asks her to proceed to a specialized maintenance terminal. The terminal is equipped with fully automated robotic arms and Rosa confidently leaves her beloved car behind in order to get some coffee. The “Orange Wall” beverage machine knows all about Rosa’s love of iced cof fee and pours it for her after Rosa waves her internet watch for secure payment. When she gets back, a brand new pair of rear tyres has already been installed with integrated RFID tags for monitoring pressure, temperature and deformation.What does the Internet of Things mean in a practical sense for a citizen of the future?The robotic guide then prompts Rosa on the privacy-related options associated with the new tyres. The information stored in her car’s control system is intended for maintenance purpos es but can be read at different points of the car journey where RFID readers are available. However, since Rosa does not want anyone to know (especially her boyfriend) where she is heading, such information is too sensitive to be left unprotected. She therefore chooses to have the privacy option turned on to prevent unauthorized tracking.Finally, Rosa can do some shopping and drives to the nearest mall. She wants to buy that new snowboard jacket with embedded media player and weather-adjusting features. The resort she is heading towards uses a network of wireless sensors to monitor the possibilities of avalanches so she feels both healthy and safe. At the French-Spanish border, there is no need to stop, as Rosa’s car contains information on her driver’s li cence and passport which is automatically transmitted to the minimal border control installations.Suddenly, Rosa gets a video-call on her sunglasses. She pulls over and sees her boyfriend who begs to be forgiven and asks if she wants to spend the weekend together. Her spirits rise and on impulse she gives a speech command to the navigation system to disable the privacy protection, so that her boyfriend’s car might find her location and aim directly for it. Even in a world full of smart interconnected things, human feelings continue to rule.7 A New EcosystemThe internet as we know it is transforming radically. From an academic network for the chosen few, it became a mass-market, consumer-oriented network. Now, it is set to become fully pervasive, interactive and intelligent. Real-time communications will be possible not only by humans but also by things at anytime and from anywhere. The advent of the Internet of Things will create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities whilst providing new revenue opportunities for a host of enterprising businesses.The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players (Figure 6). These players have to operate within a constantlyevolving economic and legal system, which establishes a framework for their endeavours. Nevertheless, the human being should remain at the core of the overall vision, as his or her needs will be pivotal to future innovation in this area. Indeed, technology and markets cannot exist independently from the over-arching principles of a social and ethical system. The Internet of Things will have a broad impact on many of the processes that characterize our daily lives, influencing our behaviour and even our values.For the telecommunication industry, the Internet of Things is an opportunity to capitalize on existing success stories, such as mobile and wireless communications, but also to explore new frontiers. In a world increasingly mediated by technology, we must ensure that the human core to our activities remains untouched. On the road to the Internet of Things, this can only be achieved through people-oriented strategies, and tighter linkages between those that create technology and those that use it. In this way, we will be better equipped to face the challenges that modern life throws our way.Technology and markets cannot exist independently of the over arching principles of a social and ethical systemStatistical Annex: Mobile market data for top 20 economies (ranked by total subscriber numbers) as at 31 December 2004Total subscribers, penetration rate, proportion of which are 3G (IMT-2000) subscribers and price of OECD low-user basket in USD* 3G mobile or IMT-2000 , as defined by ITU includes subscribers to commercially available services using CDMA 2000 1x, CDMA 2000 1x EV-DO and W-CDMA standards.** Limited mobility Wireless Local Loop service available, for which WLL 9,921,780 subscribers at 31 December 2004.Statistical Annex: Broadband market data for top 20 economies (ranked by broadband penetration) as at 31 December 2004Total subscribers, penetration rate, as percentage of total internet subscribers and price in USD per 100 kbps。

民航英语试题及答案

民航英语试题及答案

民航英语试题及答案一、选择题(每题2分,共10分)1. Which of the following is NOT a function of air traffic control?A. Providing weather informationB. Ensuring the safe separation of aircraftC. Coordinating with ground servicesD. Performing aircraft maintenance答案:D2. What does the acronym "ATC" stand for in aviation?A. Airline Travel ClubB. Air Traffic ControlC. Advanced Technology CenterD. Airport Terminal Complex答案:B3. What is the standard altitude for cruising at in commercial aircraft?A. 30,000 feetB. 35,000 feetC. 40,000 feetD. 45,000 feet答案:C4. Which of the following is NOT a reason for a flight delay?A. Weather conditionsB. Aircraft maintenanceC. OverbookingD. Airport congestion答案:C5. What is the term used to describe the act of taking off from an aircraft carrier?A. LaunchB. DepartureC. TakeoffD. Catapult答案:A二、填空题(每题2分,共10分)6. The International Civil Aviation Organization (ICAO) usesa standard language for communication known as ________.答案:Pilot7. The term "cleared for takeoff" is used by air traffic control to indicate that an aircraft is ________ to proceed with its departure.答案:authorized8. In aviation, the term "V1" refers to the speed at which the aircraft is committed to ________.答案:takeoff9. The "black box" in an aircraft is actually ________ incolor and is used to record flight data.答案:orange10. The International Air Transport Association (IATA) is a trade association of the world's airlines, and its headquarters are located in ________.答案:Montreal三、阅读理解(每题2分,共20分)阅读以下段落,回答11-15题。

学术英语课后答案 unit1

学术英语课后答案  unit1

学术英语理工教师手册Unit 1 Choosing a TopicI Teaching ObjectivesIn this unit , you will learn how to:1.choose a particular topic for your research2.formulate a research question3.write a working title for your research essay4.enhance your language skills related with reading and listening materials presented in this unit II. Teaching Procedures1.Deciding on a topicTask 1Answers may vary.Task 21 No, because they all seem like a subject rather than a topic, a subject which cannot be addressed even by a whole book, let alone by a1500-wordessay.2Each of them can be broken down into various and more specific aspects. For example, cancer can be classified into breast cancer, lung cancer, liver cancer and so on. Breast cancer can have such specific topics for research as causes for breast cancer, effects of breast cancer and prevention or diagnosis of breast cancer.3 Actually the topics of each field are endless. Take breast cancer for example, we can have the topics like:Why Women Suffer from Breast Cancer More Than Men?A New Way to Find Breast TumorsSome Risks of Getting Breast Cancer in Daily LifeBreast Cancer and Its Direct Biological ImpactBreast Cancer—the Symptoms & DiagnosisBreastfeeding and Breast CancerTask 31 Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text2 describes the various electronic threats a computer may face.2 Both focus on the vulnerability of a computer.3 Text 1 analyzes the ways of computer hackers, while Text 2 describes security problems of a computer.4 Text 1: The way hackers “get inside” a computerText 2: Electronic threats a computer facesYes, I think they are interesting, important, manageable and adequate.Task 41Lecture1:Ten Commandments of Computer EthicsLecture 2:How to Deal with Computer HackersLecture 3:How I Begin to Develop Computer Applications2Answersmay vary.Task 5Answers may vary.2 Formulating a research questionTask 1Text 3Research question 1: How many types of cloud services are there and what are they? Research question 2: What is green computing?Research question 3: What are advantages of the cloud computing?Text 4Research question 1: What is the Web 3.0?Research question 2: What are advantages and disadvantages of the cloud computing? Research question 3: What security benefits can the cloud computing provide?Task 22 Topic2: Threats of Artificial IntelligenceResearch questions:1) What are the threats of artificial intelligence?2) How can human beings control those threats?3) What are the difficulties to control those threats?3 Topic3: The Potentials of NanotechnologyResearch questions:1) What are its potentials in medicine?2) What are its potentials in space exploration?3) What are its potentials in communications?4 Topic4: Global Warming and Its EffectsResearch questions:1) How does it affect the pattern of climates?2) How does it affect economic activities?3) How does it affect human behavior?Task 3Answers may vary.3 Writing a working titleTask 1Answers may vary.Task 21 Lecture 4 is about the security problems of cloud computing, while Lecture 5 is about the definition and nature of cloud computing, hence it is more elementary than Lecture 4.2 The four all focus on cloud computing. Although Lecture 4 and Text 4 address the same topic, the former is less optimistic while the latter has more confidence in the security of cloud computing. Text3 illustrates the various advantages of cloud computing.3 Lecture 4: Cloud Computing SecurityLecture 5: What Is Cloud Computing?Task 3Answers may vary.4 Enhancing your academic languageReading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site 4complex 5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical15range 16exploit 17networking 18involve19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从……到)arise from some misunderstandings(来自于对……误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要有新的思想)4.Translate the following sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。

ITU-T G.8131

ITU-T G.8131
INTERNATIONAL TELECOMMUNICATION UNION
STUDY GROUP 15
TELECOMMUNICATION STANDARDIZATION SECTOR
STUDY PERIOD 2005-2008
TD 297 Rev1(PLEN/15)
English only Original: English
Document history Issue Notes
1.0
Initial version (date TSB)
ITU-T\COM-T\COM15\C\267E.DOC
-3TD297 Rev1 (PLEN/15)
CONTENTS 1 2 3 4 5 6 7 Scope ............................................................................................................................ 5 References..................................................................................................................... 5 Definitions .................................................................................................................... 5 Symbols and abbreviations ........................................................................................... 7 Conventions .................................................................................................................. 7 Network Objectives ...................................................................................................... 7 Architecture types ........................................................................................................ 8 7.1 T-MPLS trail protection ................................................................................. 8 7.1.1 1+1 trail protection ............................................................................................. 8 7.1.2 1:1 trail protection .............................................................................................. 9 7.2 T-MPLS SNC protection ................................................................................ 9 7.2.1 SNC/S protection ............................................................................................ 9 Switching types............................................................................................................. 9 Operation types ............................................................................................................. 9 9.1 Non-revertive operation.................................................................................. 9 9.2 Revertive operation ........................................................................................ 10 Automatic Protection Switching (APS) protocol ......................................................... 10 10.1 APS payload structure .................................................................................... 10 10.2 APS protocol type........................................................................................... 11 Application architectures .............................................................................................. 12 11.1 Unidirectional 1+1 trail protection switching................................................. 12 11.2 Bidirectional 1:1 trail protection switching .................................................... 13 11.3 11.4 12 Unidirectional 1+1 SNC/S protection switching .......................................... 14 Bidirectional 1:1 SNC/S protection switching ............................................... 14

ITU-T K.12-200602

ITU-T K.12-200602

ITU-T K.12(02/2006) TELECOMMUNICATIONSTANDARDIZATION SECTOROF ITUSERIES K: PROTECTION AGAINST INTERFERENCECharacteristics of gas discharge tubes for the protection of telecommunications installationsITU-T Recommendation K.12ITU-T Recommendation K.12Characteristics of gas discharge tubes for the protectionof telecommunications installationsSummaryThis Recommendation gives the basic requirements to be met by gas discharge tubes for the protection of exchange equipment, telecommunication lines and subscriber or customer equipment from surges. It is intended to be used for the harmonization of existing or future specifications issued by gas discharge tube manufacturers, telecommunication equipment manufacturers, administrations or network operators.SourceITU-T Recommendation K.12 was approved on 13 February 2006 by ITU-T Study Group 5 (2005-2008) under the ITU-T Recommendation A.8 procedure.KeywordsElectrical characteristics and test methods, GDT, gas discharge tube.ITU-T Rec. K.12 (02/2006) iFOREWORDThe International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis.The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics.The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1.In some areas of information technology which fall within ITU-T's purview, the necessary standards are prepared on a collaborative basis with ISO and IEC.NOTEIn this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency.Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other obligatory language such as "must" and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party.INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process.As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database.© ITU 2006All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU.ii ITU-T Rec. K.12 (02/2006)CONTENTSPage1 Scope (1)2 References (1)3 Definitions (2)4 Abbreviations (3)5 Storageconditions (3)characteristics (3)6 Electrical6.1 Spark-over voltages (see 7.1, 7.2) (3)6.2 Holdover voltages (see 7.5 and Figures 4 and 5) (5)resistance (see 7.3) (6)6.3 Insulation6.4 Capacitance (6)voltage (6)6.5 Transverse6.6 Life tests (see 7.6 and 7.7) (6)6.7 Short-circuitbehaviour (7)methods (7)7 Test7.1 d.c. spark-over voltage (8)7.2 Impulse spark-over voltage (10)resistance (10)7.3 Insulation7.4 Capacitance (10)test (11)7.5 Holdover7.6 Impulse life – All types of gas discharge tube (see 6.6) (12)7.7 a.c. life – All types of tube (see 6.6) (13)test (14)7.8 Short-circuit7.9 Impulse transverse voltage for 3-electrode gas discharge tubes (14)8 Radiation (14)9 Environmental tests (14)ofterminations (14)9.1 Robustness9.2 Solderability (14)9.3 Resistance to soldering heat (14)9.4 Vibration (15)9.5 Damp heat cyclic (15)9.6 Sealing (15)temperature (15)9.7 Low10 Identification (15)10.1 Marking (15)10.2 Documentation (15)11 Orderinginformation (15)ITU-T Rec. K.12 (02/2006) iiiPage Annex A – Electrical characteristics of GDT (17)Annex B – Test circuit for GDT used in ISDN circuits (19)iv ITU-T Rec. K.12 (02/2006)IntroductionTwo types of GDT may be differentiated by their voltage nominal values. Those values are given in Tables 1a and 1b. Type 1 (Table 1a) represents the common type with a technology well suited for high current protection accomplished by a low glow voltage and arc voltage. Type 2 (Table 1b) represents the low impulse spark-over voltage type which has a faster response time, thus achieving lower impulse spark-over voltages with higher glow voltage and arc voltage, but offer lower current carrying capabilities.Annex A gives basic information about the electrical characteristics of GDTs.ITU-T Rec. K.12 (02/2006) vITU-T Recommendation K.12Characteristics of gas discharge tubes for the protectionof telecommunications installations1 ScopeThis Recommendation:a) gives the characteristics of gas discharge tubes used in accordance with ITU-T Recs K.11and K.46 for the protection of exchange equipment, telecommunication lines and subscriber or customer equipment against overvoltages;b) deals with gas discharge tubes having 2 or 3 electrodes;c) does not deal with mountings and their effect on tube characteristics (see ITU-T Rec. K.65),characteristics apply to gas discharge tubes as a component, mounted only in the ways described for the tests;d) does not deal with mechanical dimensions;e) does not deal with quality assurance requirements;f) does not deal with gas discharge tubes which are connected to electrical power systems.2 ReferencesThe following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation [1] IEC 61643-21 (2000), Low voltage surge protective devices – Part 21: Surge protectivedevices connected to telecommunications and signalling networks – Performancerequirements and testing methods.[2] IEC 60068-2-1 (1990), Environmental testing – Part 2: Tests. Test A: Cold.[3] IEC 60068-2-20 (1979), Environmental testing – Part 2: Tests. Test T: Soldering.[4] IEC 60068-2-6 (1995), Environmental testing – Part 2: Tests – Test Fc: Vibration(sinusoidal).[5] IEC 60068-2-17 (1994), Basic environmental testing procedures – Part 2: Tests – Test Q:Sealing.[6] IEC 60068-2-21 (1999), Environmental testing – Part 2-21: Tests – Test U: Robustness ofterminations and integral mounting devices.[7] IEC 60068-2-30 (2005), Environmental testing – Part 2-30: Tests – Test Db: Damp heat,cyclic (12 h + 12 h cycle).[8] IEC 60060-1 and -2 (1989/1994), High voltage test techniques. Part 1 and Part 2.[9] ITU-T Recommendation K.65 (2004), Overvoltage and overcurrent requirements fortermination modules with contacts for test ports or SPDs.ITU-T Rec. K.12 (02/2006) 13 DefinitionsThis Recommendation defines the following terms.mode: The lowest impedance or on state of a gas discharge tube during normal 3.1 arcoperation (Figure A.1).voltage: The voltage measured across the tube while in lowest impedance state or arc 3.2 arcmode (Figure A.2).3.3 breakdown: See "spark-over".3.4 current turn-off time: The time required for the gas discharge tube to return itself to a non-conducting state following a period of conduction.characteristic: The relationship between the value of the discharge current and 3.5 destructionthe time of flow until the gas discharge tube is mechanically destroyed (break, electrode short-circuit). For periods of time between 1 μs and some ms, it is based on impulse discharge currents, and for periods of time of 0.1 s and greater, it is based on alternating discharge currents.current: The current that passes through a gas discharge tube when spark-over 3.6 dischargeoccurs.alternating: The r.m.s. value of an approximately sinusoidal current,3.7 dischargealternating current passing through the gas discharge tube.3.8 discharge current, impulse: The peak value of the impulse current passing through the gas discharge tube.3.9 dischargevoltage: The voltage that appears across the terminals of a gas discharge tube during the passage of discharge current.3.10 gas discharge tube: A gap, or several gaps, in an enclosed discharge medium, other than air at atmospheric pressure, designed to protect apparatus or personnel, or both, from high transient voltages; see Annex A for the electrical characteristics of GDT also referred to as "gas tube surge arrester".3.11 glowmode: This is a semi on-state in the area of the VI curve where only a limited glow-current flows and the device has not yet turned on or reached the lowest impedance arc-mode (Figure A.1).3.12 glowcurrent: The current which flows after spark-over when circuit impedance limits the discharge current to a value less than the glow-to-arc transition current.voltage:The peak value of the voltage drop across the GDT when a glow-current is 3.13glowflowing. It is sometimes called the glow mode voltage (Figure A.2).3.14 glow-to-arc transition current: The current required for the gas discharge tube to pass from the glow mode into the arc mode.voltage: The maximum d.c. voltage across the terminals of a gas discharge tube 3.15 holdoverunder which it may be expected to clear and to return to the high impedance state after the passage of a surge, under specified circuit conditions.waveform: An impulse waveform designated as x/y has a rise time of xμs and a 3.16 impulsedecay time to half value of yμs as standardized in IEC 60060.3.17 nominal alternating discharge current: For currents with a frequency of 15 Hz to 62 Hz, the alternating discharge current which the gas discharge tube is designed to carry for a defined time.3.18 nominal d.c. spark-over voltage: The voltage specified by the manufacturer to designate the gas discharge tube (type designation) and to indicate its application with respect to the service2ITU-T Rec. K.12 (02/2006)conditions of the installation to be protected. Tolerance limits of the d.c. spark-over voltage are also referred to the nominal d.c. spark-over voltage.3.19 nominal impulse discharge current: The peak value of the impulse current with a defined wave-shape with respect to time for which the gas discharge tube is rated.voltage: See "discharge voltage".3.20 residual3.21 spark-over: An electrical breakdown of the discharge gap of a gas discharge tube. Also referred to as "breakdown".3.22 spark-over voltage: The voltage which causes spark-over when applied across the terminals of a gas discharge tube (Figure A.2).•spark-over voltage, d.c.: The voltage at which the gas discharge tube sparks over with slowly increasing d.c. voltage.impulse: The highest voltage which appears across the terminals of a • spark-overvoltage,gas discharge tube in the period between the application of an impulse of given wave-shape and the time when current begins to flow.3.23 transverse voltage: For a gas discharge tube with several gaps, the difference of the discharge voltages of the gaps assigned to the two conductors of a telecommunications circuit during the passage of discharge current.4 AbbreviationsThis Recommendation uses the following abbreviations:GDT Gas Discharge TubeISDN Integrated Services Digital NetworkxDSL Digital Subscriber Lineconditions5 StorageGas discharge tubes shall be capable of withstanding the following conditions without damage:– Temperature: –40 to +70° C;– Relative humidity: up to 95%.See also 9.5 and 9.7 for environmental conditions.characteristics6 ElectricalGas discharge tubes should have the following characteristics when tested in accordance with clause 7. Subclauses 6.1 to 6.5 apply to virgin gas discharge tubes and also, where quoted in 6.6, to tubes subjected to life tests.voltages (see 7.1, 7.2)6.1 Spark-overSpark-over voltages between the electrodes of a 2-electrode tube or between either line electrode and the earth electrode of a 3-electrode tube shall be within the limits in either Table 1a or 1b.Two types of GDT may be differentiated by their voltage nominal values. By employing special design techniques on either types the disadvantages of the different technologies, to a certain extent, could be compensated for.For 3-electrode tubes, the spark-over voltage between the line electrodes shall not be less than the minimum d.c. spark-over voltages in either Table 1a or 1b. It is recommended to achieve at least 1.2 times the minimum d.c. spark-over voltage given in either Table 1a or 1b.NOTE – For 3-electrode GDTs the maximum d.c. spark-over voltage a-b (line-line) may be restricted, a reasonable value is about 1.8-2.0 times the voltage a/b-c.6.1.1 Spark-over voltage values for type 1 GDT (common type)This type represents a technology well suited for high current protection accomplished by a low glow-voltage and arc-voltage (Table 1a).Table 1a/K.12 – Spark-over voltage values for common types of GDTSpark-over voltaged.c. Impulseat 100 V/µs at 1000 V/μsInitial (1)After life tests(2)Initial (3)After life tests(4)Initial (5)After life tests(6)Nominal (V) Min. (V) Max. (V) Min. (V) Max. (V)(V) (V) (V) (V) 9072 108 65 120450 550 500 600 150 120 180 110 195 500 600 600 700 200 160 240 150 250 600 700 700 800 230 184 280 170 300 600 700 700 800 250 200 300 180 325 600 700 700 800 350 280 420 260 455 900 1000 1000 1100 420 300 500 300 550 900 1000 1000 1100 500 400 600 400 650 1100 1200 1200 1300 600 480 720 450 78013001400140015006.1.2 Spark-over voltage values for type 2 GDT (low impulse spark-over voltage type)This type (Table 1b) has a faster response time, thus achieving lower impulse spark-over voltages with higher glow-voltages and arc-voltages. Due to the design of this alternative type, the current capability according to Table 5 is in general much lower than for the comparable size of common type GDT.Higher glow-voltage and arc-voltage in the gas discharge tube means higher power dissipation and thus reduces class capability.It should be noted that there might be some restrictions to the availability of certain higher classes of Table 5 for some of the enhanced impulse voltage limits listed in Table 1b.Table 1b/K.12 – Spark-over voltage values for type 2 GDT(low impulse spark-over voltage type)Spark-over voltaged.c. Impulseat 100 V/μs at 1000 V/μsInitial (1) After life tests (2)Initial (3)After life tests(4)Initial (5)After life tests(6)Nominal (V) Min. (V)Max. (V) Min. (V)Max. (V)(V) (V) (V) (V)200 160 240 150 250 350 450 450 550 230 184 280 170 300 400 500 450 550 350 265 455 265 600 700 800 800 900 420 300 500 300 650 750 850 800 1000 500 400 600 400 700 750 950 8501050600 480 720 420 800 90011001000 12006.1.3 Spark-over voltage assessmentThe spark-over voltages are characterized by a normal distribution assuming that a sufficientnumber of samples are tested.The spark-over voltages should be assessed with criteria specified in Table 2, using the test methods specified in 7.1 and 7.2.Table 2/K.12 – Spark-over voltage assessment methodMeasured values initialProbability of the measured values to be within the toleranceAssessment expression d.c. spark-over voltage 99.7% U + 3S ≤ Maximum U – 3S ≥ Minimum Impulse spark-over voltage99.7%U + 3S ≤ Maximum U – 3S ≥ MinimumNOTE – U is the statistical average value of spark-over voltages. S is the standard deviation.6.2 Holdover voltages (see7.5 and Figures 4 and 5)All types of tube shall have a current turn-off time less than 150 ms when subjected to one or more of the following tests according to the projected use. 6.2.1 Holdover test values for 2-electrode tubes2-electrode tubes tested in a circuit equivalent to Figure 4 where the test circuit components have the values in Table 3. Gas discharge tubes with a nominal d.c. voltage of 230 V or higher shall be tested according to the test circuit shown in Annex B.Table 3/K.12 – Holdover test values for 2-electrode tubesComponentTest 1 Test 2 Test 3 PS152 V80 V135 VR3 260 Ω 330 Ω 1300 Ω R2 (Note) 150 Ω 150 Ω C1(Note)100 nF100 nFNOTE – Components omitted in this test.6.2.2 Holdover test values for 3-electrode tubes3-electrode tubes tested in a circuit equivalent to Figure 5 where components have the values inTable 4.Table 4/K.12 – Holdover test values for 3-electrode tubesComponentTest 1 Test 2 Test 3 PS1 52 V 80 V 135 V PS20 V0 V52 VR3 260 Ω 330 Ω 1300 Ω R2 Note 1 150 Ω 272 Ω (Note 2) 150 Ω 272 Ω (Note 2) C1 Note 1 100 nF 43 nF (Note 2) 100 nF43 nF (Note 2) R4 (Note 3) 136 Ω 136 Ω 136 ΩC2 (Note 3)83 nF83 nF83 nFNOTE 1 – Components omitted in this test. NOTE 2 – Optional alternative. NOTE 3 – Optional.6.3 Insulation resistance (see7.3) Not less than 1 G Ω initially. 6.4 CapacitanceTypically GDTs have a capacitance value of few pF, but not greater than 20 pF. 6.5 Transverse voltageThe transverse voltage for a 3-electrode gas discharge tube is the difference in the dischargevoltages between terminals a and b of the gaps assigned to the two conductors of the circuit during the passage of discharge current. For a 3-electrode gas discharge tube the difference in time between the spark-over of the first and second gap shall not exceed 200 ns. 6.6 Life tests (see 7.6 and 7.7)The currents specified in 6.6.1 for the appropriate nominal current rating of the tube shall be applied. After each current application, the gas discharge tube shall be capable of meeting the requirements of 6.6.2. On completion of the number of current applications specified, the tube shall be capable of meeting the requirements of 6.6.3.6.6.1 Test currentsGas discharge tubes shall be subjected to the currents of columns 2 to 6 of Table 5. For each life test new gas discharge tubes shall be used.Table 5/K.12 – Life test current valuesNominal alternatingdischarge currentNominal impulse discharge currentClass50-60 Hz10Applications8/20 µs10Applications10/350 µs†1Application10/1000 µs300Applications10/1000 µs1500Applications(1) A rms(2)kA peak(3)kA peak(4)A peak(5)A peak(6)1 2.5 2.5 0.5 50 102 5 5 1 100 103 10 10 2.5 100 104 20 10 4 100 105 20 20 4 200 10 † Different high-energy test waveforms exist in some countries and regions, for examples see reference [1].6.6.2 Requirements during life testInsulation resistance: not less than 10 MΩ.d.c. and impulse spark-over voltage: not more than the relevant value in columns 2, 4 and 6 of either Table 1a or 1b.6.6.3 Requirements after completion of life testInsulation resistance: not less than 100 MΩ.d.c. and impulse spark-over voltage: not more than the relevant value in columns 2, 4 and 6 of either Table 1a or 1b.Holdover voltage: as in 6.2.6.7 Short-circuitbehaviourA short-circuit mechanism is necessary for gas discharge tubes intended for use in telecommunication applications where an a.c. current can occur, flowing for an unpredictable time. Depending on the a.c. current flow, the short-circuit mechanism shall operate in sufficient time to prevent the gas discharge tube from being overheated.7 TestmethodsGas discharge tubes shall be tested according to the methods described in 7.1 to 7.8 and in given cases according to Figure B.1 (Test circuit for GDT for ISDN or other telecommunications equipment using higher voltages or bitrates (xDSL)).A proposed type test procedure is given in Tables 6 and 7.Table 6/K.12 – Recommended sample sizes to be used for impulse and a.c. life testsTest Samples sizeTest performed inaccordance with 6.6.1a.c. life 20 Table 5 column 2 Impulse life 20 Table 5 column 3 Impulse life 20 Table 5 column 4 Impulse life 20 Table 5 column 5 Impulse life20Table 5 column 6It is recommended that a minimum of four spark-over voltage measurements are performed on each sample, two in each polarity.Measured values after life test under consideration (5% failure rate accepted), compare either Table 1a or 1b, values after life.Table 7/K.12 – Recommended sample sizes to be used for short-circuit testsTest Samples size Test performed in accordance with Short-circuit5 for each test conditionClause 7.87.1 d.c. spark-over voltage7.1.1 Initial valuesFor testing the initial values of a gas discharge tube, the gas discharge tube shall be placed in darkness for at least 24 hours immediately prior to testing and shall be tested in darkness. The gas discharge tube shall be tested with a voltage which increases so slowly that the spark-over voltage is independent of the rate of rise of the applied voltage. Typically, a rate of rise of 100 V/s is used, but higher rates may be used if it can be shown that the spark-over voltage is not significantly changed thereby. The tolerances on the wave-shape of the rising test voltage are indicated in Figure 1. The voltage is measured across the open-circuited terminals of the generator. U max of Figure 1 is any voltage greater than the maximum permitted d.c. spark-over voltage of the gas discharge tube.Figure 1/K.12 – Spark-over test waveformThe test shall employ a suitable circuit such as that shown in Figure 2. A minimum of 3 seconds shall elapse between repetitions of the test, with either polarity, on the same gas discharge tube.Figure 2/K.12 – Circuit for spark-over testFor 3-electrode tubes, the spark-over voltage between the line electrodes shall not be less than the minimum d.c. spark-over voltage in either Table 1a or 1b.Each pair of terminals of a 3-electrode gas discharge tube shall be tested separately with the other terminal unterminated.NOTE – The use of Figure 1 may be explained as follows:A single mask will do for all values of U max and the nominal rate of rise, provided that it is a suitable size for the display of the waveform and that the scales of U and T of the waveform can be adjusted. This follows because the Y-axis has arbitrary points marked 0 and U max with 0.2U max at the appropriate point between them while the X-axis has arbitrary points marked 0 and T2 with T1 (= 0.2T2), 0.9T1, 1.1T1, 0.9T2, 1.1T2 marked at the appropriate points. The X and Y zeros need not coincide and, in fact, need not be shown at all.To compare a waveform trace with the mask, it is necessary to know the values of U max and the nominal rate of rise for the waveform in question. As an example, consider a waveform with U max = 750 V and nominal rate of rise = 100 V/sec:Then 0.2U max = 150 V, T2 = 7.5 s, T1 = 1.5 s.Hold the mask against the trace and adjust the vertical scale so that the 150 V calibration is against 0.2U max and the 750 V point against U max. Adjust the horizontal scale similarly for 1.5 s =T1 and 7.5 s =T2. Slide the mask so that the 150 V point on the trace is within the bottom boundary of the test window; the remainder of the trace up to 750 V must be within the test window.7.1.2 After life testThis test shall be performed on gas discharge tubes which are subject to life conditions specified in 7.6 and 7.7. In order to achieve a test procedure as close to real practice as possible, the test has to be carried out under daylight conditions. All other test details should comply according to 7.1.1.7.2 Impulse spark-over voltageThe voltage waveform measured across the open circuit test terminals shall have a nominal rate of rise selected from 6.1.1 and shall be within the enclosed limits indicated in Figure 1. Figure 3 showsa suggested arrangement for testing with a voltage impulse having a nominal rate of rise of1.0 kV/μs.A minimum of 3 seconds shall elapse between repetitions of the test, with either polarity, on the same gas discharge tube.Each pair of terminals of a 3-electrode gas discharge tube shall be tested separately with the other terminal unterminated.Figure 3/K.12 – Testing arrangement producing a voltage impulse having a wavefrontwith a virtual steepness of 1 kV/μs (see 6.1 and 7.3)resistance7.3 InsulationThe insulation resistance shall be measured from each terminal to every other terminal of the gas discharge tube(see 6.3). The measurement shall be made at an applied potential of at least 100 V or not more than 90% of the minimum permitted d.c. spark-over voltage. The measuring source shall be limited to a short circuit current of less than 10 mA. Terminals of three-electrode gas discharge tubes not involved in the measurement shall be left unterminated.7.4 CapacitanceThe capacitance shall be measured between each terminal and every other terminal of the gas discharge tube(see 6.4). In measurements involving 3-electrode gas discharge tubes, the terminal not being tested shall be connected to a ground plane in the measuring instrument.7.5 Holdovertest7.5.1 2-electrode gas discharge tubeTests shall be conducted using the circuit of Figure 4 (see also 6.2). Values of PS1, R2, R3 and C1 shall be selected for each test condition from Table 3. The current from the surge generator shall have an impulse waveform of 100 A, 10/1000 μs measured through a short circuit replacing the gas discharge tube under test. The polarity of the impulse current through the gas discharge tube shall be the same as the current from PS1. The time for current turn-off shall be measured for each direction of current passage through the gas discharge tube. Three impulses shall be applied at not greater than 1-minute intervals and the current turn-off time measured for each impulse.Figure 4/K.12 – Circuit for holdover test of 2-electrode gasdischarge tube (see 6.2.1)7.5.2 3-electrode gas discharge tubeTests shall be conducted using the circuit of Figure 5. Values of circuit components shall be selected from Table 4. The simultaneous currents that are applied to the gaps of the gas discharge tube shall have impulse waveforms of 100 A per side or chamber, 10/1000 μs measured through a short circuit replacing the gas discharge tube under test. The polarity of the impulse current through the gas discharge tube shall be the same as the current from PS1 and PS2.。

Unit 2 Period 7 Wildlife Protection高中英语(人教版必修第二册)

Unit 2 Period 7 Wildlife Protection高中英语(人教版必修第二册)

What does the WWF do to protect wildlife?
The “World Wide Fund For Nature” (WWF) was founded in 1961 as the “World Wildlife Fund”, and it retains that name in the US and Canada. Its mission is “to stop the degradation of the planet’s natural environment and to build a future in which humans live in harmony with nature”. It is the world’s largest conservation organisation with over five million supporters and works on over a thousand projects in more than a hundred countries. The logo of the organisation originates from a panda named Chi Chi who was transferred from Beijing Zoo to London Zoo in 1958. As the only giant panda in the Western world at the time, she soon became famous and the logo was designed to represent her and is still used today.
2 Read and complete the passage with the present continuous passive voice of the verbs in brackets.

5 对ITU-R建议书、报告等的参引

5 对ITU-R建议书、报告等的参引

ITU-R第2-6号决议大会筹备会议(1993-1995-1997-2000-2003-2007-2012年)国际电联无线电通信全会,考虑到a)国际电联《组织法》第13条、国际电联《公约》第8条和全权代表大会通过的《国际电联大会、全会和会议的总规则》的相关部分,对无线电通信全会在筹备世界无线电通信大会(WRC)过程中的责任和职能做出了规定;b)需要为这种筹备工作做出特殊安排,注意到特别委员会在筹备与大会议项有关的程序和规则事项方面承担重要职能,有关该委员会的规则见ITU-R第38号决议,做出决议1 应根据以下原则组织召开大会筹备会议(CPM):–CPM应是永久性的;–它应研究下届大会议程的议题,并为随后一届大会做出初步准备工作;–与会邀请应送至国际电联所有成员国以及无线电通信部门成员;–文件应分发给国际电联所有成员国以及希望参加CPM的无线电通信部门成员,同时顾及全权代表大会第167号决议(2010年,瓜达拉哈拉);–CPM的职责范围应包括对来自无线电通信研究组及特别委员会的资料进行更新、合理化、介绍和讨论,同时审议提交会议的新资料,包括有关审议现有世界无线电通信大会决议、建议和文稿(如有的话)以及成员国提交的有关下届及随后的世界无线电通信大会议程的文稿。

这些文稿应纳入CPM报告的附件中,仅供参考;2 CPM的范围须是,为支持世界无线电通信大会的工作起草一份综合报告,主要基于:–各主管部门、特别委员会、无线电通信研究组(亦见《公约》第156款)及其它来源(见《公约》第19条)提交给此类大会并供其审议的有关规则、技术、操作和程序问题的文稿;–尽可能将源资料中的不同方法折衷,之后将折衷后的不同意见纳入,或在各种方法不能折衷时,将不同意见及其理由纳入;3 工作方法须见附件1;4 起草CPM报告草案的指导原则见附件2。

附件1大会筹备会议的工作方法1 规则、技术、操作、和程序问题将酌情交由研究组或特别委员会研究。

ITU-T E.214(cn)

ITU-T E.214(cn)

ITU-T E.214(02/2005) 国际电信联盟电信标准化部门E系列: 综合网络运行、电话业务、业务运行和人为因素水上移动业务和公众陆地移动业务用于信令连接控制部分(SCCP)的移动全球标题的结构ITU-T E.214建议书国际电信联盟ITU-T E系列建议书综合网络运行、电话业务、业务运行和人为因素国际操作定义 E.100-E.103有关主管部门的一般规定 E.104-E.119有关用户的一般规定 E.120-E.139 国际电话业务的操作 E.140-E.159国际电话业务的编号方案 E.160-E.169国际选路方案 E.170-E.179 用于国内信令系统的信令音 E.180-E.189国际电话业务的编号方案 E.190-E.199水上移动业务和公众陆地移动业务 E.200-E.229国际电话业务中与计费和账务有关的操作规定国际电话业务的计费 E.230–E.249 为账务目的对呼叫时长的测量和记录 E.260–E.269 利用国际电话网作非话应用概述 E.300–E.319传真电报 E.320–E.329有关用户的ISDN规定 E.330–E.349国际选路方案 E.350–E.399 网络管理国际业务统计 E.400–E.409 国际网络管理 E.410–E.419 国际电话业务质量检测 E.420–E.489 业务工程话务的测量和记录 E.490–E.505 业务预测 E.506–E.509确定人工操作的电路数量 E.510–E.519确定自动和半自动操作的电路数量 E.520–E.539服务等级 E.540–E.599定义 E.600–E.649IP网络的业务工程 E.650–E.699 ISDN业务工程 E.700–E.749 移动网络业务工程 E.750–E.799 电信业务质量:概念、模型、指标和可靠性规划与电信业务质量相关的术语和定义 E.800–E.809电信业务的模型 E.810–E.844 电信业务的业务质量指标和相关概念 E.845–E.859业务质量指标在电网络规划设计中的使用 E.860–E.879设备、网络和业务的性能的现场数据的收集和评估 E.880–E.899如果需要进一步了解细目,请查阅ITU-T建议书清单。

itu完全手册-说明书

itu完全手册-说明书

2009 年目录ITU(国际电信联盟) (5)●ITU的地位和职能 (5)●ITU组织机构 (5)●ITU的历史6●ITU的成员7●ITU主要出版物 (7)●成员权利------专门为成员设置的TIES帐户 (8)什么是TIES? (8)利用TIES帐户可以得到什么? (8)公司申请的公用TIES帐户、自己如何再申请TIES帐户? (8)利用TIES帐户申请研究组的邮件列表(以ITU-T SG13组为例) (9)●如何向ITU提交文稿?(相关链接:itu.int/ITU-T/edh/faqs-docsub) (10)一般准则 (10)文档的提交格式 (10)提交文档的软件 (10)可以通过以下四种电子方式进行提交 (10)●如何参加ITU的会议 (11)在日内瓦开会 (11)位置 (12)注册 (12)会议室 (12)文档 (12)会议室LA N接入(有线LA N、无线LAN、无线卡购买、无线配置参数) (13)电源 (13)咖啡、茶和午餐 (14)旅馆 (14)计算机自助 (14)电话和传真设备 (14)在日内瓦之外开会 (15)文档 (15)●会议文件—研究组或工作组会议的会议文件 (15)成员文稿 (15)--正常文稿Normal contributions (15)--迟到文稿Delayed contributions (15)其它文件 (16)--临时文件Temporary documents (16)--报告Reports (16)●会议文件—报告起草人小组会议的会议文件 (16)ITU-T(国际电信联盟—电信标准部) (17)●ITU和ITU-T (17)●ITU-T的标准化工作------ 技术实体 (17)研究组(Study Group) (18)工作组(Working Party) (18)研究课题(Question) (18)特别项目(Special Project) (18)牵头研究组(Lead Study Group) (18)电信标准化局(TSB) (18)●研究组的工作方法 (19)课题(Question)的立项、批准和撤消 (19)课题的立项 (19)课题的批准 (20)课题的撤消 (20)提交和处理文稿 (21)提交文稿 (21)文稿的处理 (21)研究组和工作组会议 (21)研究组管理 (23)研究组结构和工作分配 (23)联合工作组(Joint Coordination Group) (23)●建议的批准程序(TAP和AAP) (23)TAP传统批准程序 (23)启动TAP的必要条件 (24)征求意见、协商(征求成员国意见) (25)研究组会议批准程序 (25)通知 (26)错误修正 (26)建议书的废止(撤消) (27)AAP加速批准程序 (27)启动AAP的必要条件 (28)最后征求意见(Last call)和重新审查 (28)研究组会议批准程序 (29)通知 (30)错误修正 (30)建议书的废止(撤消) (31)TAP与AAP的比较 (31)适用范围 (31)批准时间 (31)部门成员可以更多参与 (33)●ITU-T的标准化工作------ 技术职位 (33)研究组主席和副主席(Study Group chairmen and vice-chairmen) (33)工作组主席(Working Party Chairmen) (33)报告起草人(Rapporteur) (34)编辑(Editor) (34)●ITU-T的标准化工作------ 行政实体 (34)ITU全会 (34)ITU理事会 (34)ITU-T世界电信标准大会(WTSA) (34)电信标准化顾问组(TSA G) (34)●ITU-T组织结构图 (34)●ITU-T召开的全会 (35)●ITU-T研究组、研究领域及相关建议(2001-2004研究期) (36)●ITU-T建议(标准) (38)ITU-R(国际电信联盟—无线通信部) (39)●ITU-R的标准化工作 (39)●ITU-R组织结构图 (40)●ITU-R研究组及相关建议 (41)●ITU-R建议(标准) (42)ITU-D(国际电信联盟—电信发展部) (43)ITU(国际电信联盟)ITU的地位和职能国际电信联盟(ITU)成立于1865年,至今已有138年的历史。

Unit3EnvironmentalProtection重点词组及造句讲义-高中英语人教版选择性

Unit3EnvironmentalProtection重点词组及造句讲义-高中英语人教版选择性

选择性必修三Unit 3 Environmental Protection重点短语Ⅰ.英译中1.dozens of 数十个的2.fossil fuel 化石燃料3.carbon dioxide 二氧化碳4.dispose of 处理5.on standby 待命6.household waste 家庭垃圾7.seize the initiative 掌握主动权8.pay a high price 付出高昂的代价9.cost sb one's life 使某人丧命10.carry out an inspection 进行检查11.be skin and bone(s) 瘦得皮包骨12.fine sb/ sth for (doing) sth 因(做)某事而罚款某人/某物dozens of 数十个的翻译:数十个学生参加了这次比赛。

造句:Dozens of students took part in the petition.特殊句型:一般过去时,简单句fossil fuel 化石燃料翻译:化石燃料是导致环境污染的主要原因之一。

造句:The use of fossil fuels is one of the main reasons for environmental pollution.特殊句型:简单句carbon dioxide 二氧化碳翻译:过多的二氧化碳排放加剧了全球气候变暖。

造句:Excessive emissions of carbon dioxide have exacerbated global warming.特殊句型:现在完成时,简单句dispose of 处理,解决翻译:我们需要找到一个合适的方法来处理这些废物。

造句:We need to find an appropriate way to dispose of these wastes.特殊句型:不定式作目的状语on standby 待命,备用翻译:消防队员全天待命,准备随时出动。

itu文稿 -回复

itu文稿 -回复

itu文稿-回复什么是ITU?ITU是国际电信联盟(International Telecommunication Union)的简称,是一个全球性的国际组织,成立于1865年,是联合国系统内最古老的专门机构之一。

ITU的宗旨是促进全球电信和信息通信领域的合作和发展,以致力于提高各国通信网络和信息社会的发展水平。

ITU提供了一个国际平台,使各国政府、私营部门和学术界能够合作,分享经验,制定共同的标准和政策,推动电信和信息通信技术的全球发展。

ITU主要由三个部门组成,分别是标准化部门(ITU-T)、发展部门(ITU-D)和无线通信部门(ITU-R)。

这些部门共同致力于各种领域内的标准化、政策制定和技术研究。

ITU的标准化部门(ITU-T)负责制定电信和信息通信领域的国际标准,以促进各国间的互联互通和互操作性,确保全球电信网络的互联互通。

ITU-T的工作范围包括从基础架构到各种电信服务和应用的标准制定。

ITU的发展部门(ITU-D)致力于提升发展中国家的电信和信息通信技术水平,促进数字包容和全球信息社会的公平发展。

ITU-D通过为发展中国家提供技术援助、培训和知识共享等方式,帮助这些国家充分利用和发展电信和信息通信技术。

ITU的无线通信部门(ITU-R)负责调查、研究和制定各种无线通信技术和频率使用方面的国际规约。

ITU-R在无线通信和卫星通信领域的标准制定和频谱管理方面发挥着重要的作用,确保全球无线通信的有序发展。

ITU还定期举办各种国际会议、研讨会和展览会,旨在促进各国间的合作交流,推动电信和信息通信技术的创新和发展。

ITU的工作对全球电信和信息通信行业有着重要的影响,对于实现全球互联互通和推动数字化转型具有重要意义。

总结起来,ITU是一个全球性的专门机构,致力于促进全球电信和信息通信领域的合作和发展。

通过制定标准、提供技术援助和分享知识,ITU为各国间的互联互通和信息社会的发展做出了重要贡献。

G.651.1-200707-E

G.651.1-200707-E

INTERNATIONAL TELECOMMUNICATION UNIONITU-T G.651.1(07/2007) TELECOMMUNICATIONSTANDARDIZATION SECTOROF ITUSERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKSTransmission media and optical systems characteristics – Optical fibre cablesCharacteristics of a 50/125 µm multimode graded index optical fibre cable for the optical access networkCAUTION !PREPUBLISHED RECOMMENDATIONThis prepublication is an unedited version of a recently approved Recommendation.It will be replaced by the published version after editing. Therefore, there will be differences between this prepublication and the published version.FOREWORDThe International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis.The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics.The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1.In some areas of information technology which fall within ITU-T's purview, the necessary standards are prepared on a collaborative basis with ISO and IEC.NOTEIn this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency.Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other obligatory language such as "must" and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party.INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process.As of the date of approval of this Recommendation, ITU [had/had not] received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http://www.itu.int/ITU-T/ipr/.© ITU 2007All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU.Recommendation G.651.1Characteristics of a 50/125 µm multimode graded index optical fibre cable forthe optical access networkSummaryThe ITU-T Recommendation G.651.1 “Characteristics of a 50/125 µm multimode graded index optical fibre cable for the optical access network” recommends a quartz multimode fibre to be used for the access network in specific environments. These environments are multi-tenant building sub-networks in which broadband services have to be delivered to individual apartments. The recommended multimode fibre supports the cost-effective use of 1 Gb/s Ethernet systems over link lengths up to 550 m, usually based upon the use of 850 nm transceivers.The recommended fibre type is an improved version of the well-known 50/125 um multimode graded-index fibre as recommended in G.651. Its cost effective use is very common in datacom systems applied in enterprise buildings throughout the world for quite a number of years. AbstractThis document contains the text of ITU-T Recommendation G.651.1. “Characteristics of a 50/125 µm multimode graded index optical fibre cable for the optical access network”.IntroductionThis document contains New Recommendation G.651.1 version 1.0, devoted to the specific requirements for 50/125 µm multimode optical fibre and cable used in the optical access networks to and in buildings and homes.CONTENTSPage0 Introduction (3)1 Scope (3)2 References (3)3 Terms and definitions (4)4 Abbreviations (4)attributes (4)5 Fibrediameter (5)5.1 Claddingdiameter (5)5.2 Coreconcentricityerror (5)5.3 Core5.4 Non-circularity (5)non-circularity (5)5.4.1 Claddingnon-circularity (5)5.4.2 Coreaperture (5)5.5 Numericalloss (5)5.6 Macrobending5.7 Material properties of the fibre (6)5.7.1 Fibrematerials (6)materials (6)5.7.2 Protectiveprofile (6)index5.8 Refractivebandwidth (6)5.9 Modal5.10 Chromatic dispersion coefficient (6)attributes (7)6 Cablecoefficient (7)6.1 AttenuationBandwidth (7)6.2 Modal7 Tables of recommended values (7)8 Bibliography (8)ITU-T Recommendation G.651.1Characteristics of a 50/125 µm multimode graded index optical fibre cable forthe optical access network0 IntroductionWorldwide, various technologies for Broadband Access Networks are advancing rapidly to provide the high capacity needed for the increasing customer demands with respect to new services. Apart from the technologies, also the network structures and customer densities vary considerably. A specific segment, which is in the main scope of this Recommendation, is the network in a multi-tenant building. Quite a large percentage of all customers in the world are living in these buildings. Due to the high connection density and the short distribution cable lengths, cost-effective high capacity optical networks can be designed and installed by making use of 50/125 µm graded-index multimode fibres (see informative Appendices 1 and 2). The effective use of this network type has been shown by its extended and experienced use for datacom systems in enterprise buildings with system bit-rates ranging from 10 Mb/s up to 10 Gb/s. This use is supported by a large series of IEEE system standards and IEC fibre and cable standards which will be used as the main references in this Recommendation.1 ScopeThis Recommendation describes a 50/125 µm graded-index multimode optical fibre cable which is suitable to be used in the 850 nm region or in the 1300 nm region or alternatively may be used in both wavelength regions simultaneously.The geometrical, optical, transmission and mechanical parameters are described below in two categories of attributes:• fibre attributes are those attributes that are retained throughout cabling and installation;• cable attributes that are recommended for cables as they are delivered;This Recommendation, and the different performance categories found in the table of clause 7, is intended to support the following related system Recommendations and Standards:• IEEE Standard for Information Technology 802.3(tm)-2005The characteristics of this fibre, including the definitions of the relevant parameters, their test methods and relevant values, will be refined as studies and experience progress.2 ReferencesThe following references contain provisions that, through references in this text, constitute the provisions of this Recommendation. At the time of publication, the editions indicated were valid. All references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the references listed below. A list of the currently valid ITU-T Recommendations and IEC standards is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation.[1] IEC 60793-2, Optical fibres − Part 2: Product specifications - General[2] IEC 60793-2-10 standard; “Optical fibres – Part 2-10: Product specifications – Sectionalspecification for category A1 multimode fibres, type A1a.[3] IEC 60793-1-1, Optical fibres – Part 1-1: Measurement methods and test procedures – General andguidance[4] IEC 60793-1-20, Optical fibres – Part 1-20: Measurement methods and test procedures – Fibregeometry[5] IEC 60793-1-30, Optical fibres – Part 1-30: Measurement methods and test procedures – Fibreproof test[6] IEC 60793-1-40, Optical fibres – Part 1-40: Measurement methods and test procedures –Attenuation[7] IEC 60793-1-41, Optical fibres – Part 1-41: Measurement methods and test procedures –Bandwidth[8] IEC 60793-1-42, Optical fibres – Part 1-42: Measurement methods and test procedures –Chromatic dispersion[9] IEC 60793-1-43, Optical fibres – Part 1-43: Measurement methods and test procedures –Numerical aperture[10] IEC 60793-1-47, Optical fibres – Part 1-47: Measurement methods and test procedures –Macrobending loss[11] IEC 60793-1-49, Optical fibres – Part 1-49: Measurement methods and test procedures –Differential mode delay[12] IEC 60794-2, Optical fibre cables – Part 2: Indoor cables – Sectional specification[13] IEC 60794-2-11, Optical fibre cables - Part 2-11: Indoor optical fibre cables - Detailedspecification for simplex and duplex cables for use in premises cables[14] IEC 60794-2-21, Optical fibre cables - Part 2-21: Indoor optical fibre cables - Detailedspecification for multi-fibre optical distribution cables for use in premises cabling[15] IEC 60794-2-31, Optical fibre Cables- Part 2-31: Indoor optical fibre cables - Detailedspecification for optical fibre ribbon cables for use in premises cabling[16] IEC 60794-3-12, Optical fibre cables – Part 3-12 : Outdoor cables - Detailed specification for ductand directly buried optical telecommunication cables for use in premises cabling[17] IEC 61280-4-1, Fibre-optic communication subsystem test procedures – Part 4-1: Installed cableplant – multimode attenuation measurement3 Terms and definitionsFor the purposes of this Recommendation, the definitions and the guidelines to be followed in the measurement to verify the various characteristics are given in the IEC Standards series IEC 60793, IEC 60794 and IEC 61280-4-1. Values shall be rounded to the number of digits given in the Tables of Recommended values before conformance is evaluated.4 AbbreviationsThis Recommendation uses the following abbreviations:ApertureNA Numericalattributes5 FibreThe characteristics of the fibre providing a minimum essential design framework for fibre manufacture, system design and use are recommended in this clause and in clause 7. Ranges or limits on values are presented in the tables of clause 7. In this clause those attributes have been listed only where additional information is helpful.The recommended characteristics will not be significantly affected by cable manufacture or installation and therefore apply equally to individual fibres, fibres incorporated into a cable wound on a drum, and fibres in an installed cable.5.1 Cladding diameterThe recommended nominal value of the cladding diameter is 125 µm. A tolerance is also specified and shall not exceed the value in clause 7. The cladding diameter deviation from nominal shall not exceed thespecified tolerance. For measuring the value of this attribute, reference is made to reference [4] from clause 25.2 Core diameterThe recommended nominal value of the core diameter is 50 µm. A tolerance is also specified and shall not exceed the value in clause 7. The core diameter deviation from nominal shall not exceed the specified tolerance. For measuring the value of this attribute, reference is made to reference [4] from clause 25.3 Core concentricity errorThe core concentricity error shall not exceed the value specified in clause 7. For measuring the value of this attribute, reference is made to reference [4] from clause 2.5.4 Non-circularity5.4.1 Cladding non-circularityThe cladding non-circularity shall not exceed the value found in clause 7. For measuring the value of this attribute, reference is made to reference [4] from clause 2.5.4.2 Core non-circularityThe core non-circularity shall not exceed the value found in clause 7. For measuring the value of this attribute, reference is made to reference [4] from clause 2.5.5 Numerical apertureThe numerical aperture NA is the sine of the vertex half-angle of the largest cone of rays that can enter or leave the core of an optical fibre, multiplied by the refractive index of the medium in which the vertex of the cone is located. All values measured at 850 nm. The value of the numerical aperture is about 5% lower than the value of the maximum theoretical numerical aperture NA tmax which is derived from a refractive index measurements trace of the core and claddingin which n 1 is the maximum refractive index of the core and n 2 is the refractive index of the innermost homogeneous cladding. For measuring the value of this attribute, reference is made to reference [9] from clause 2. 5.6 Macrobending lossMacrobending loss varies with bend radius and number of turns about a mandrel with a specified radius but is rather independent of the measuring wavelength. Therefore, testing at one of the wavelengths specified in the clause 7 may be sufficient to ensure compliance with this Recommendation.When testing multiple macrobends the mode distribution encountered at a specific macrobend may depend on how many macrobends precede it. For example, the first bend might influence the launch condition at the second bend, and the second bend might influence the launch condition at the third bend, etc. Consequently, the macrobending added loss at a given bend might be different than the macrobending added loss at another bend. In particular, the first bend may have the largest influence on following bends. Consequently, the macrobending added loss produced by multiple bends should not be expressed in the units of “dB/bend” by ()½2221max n n NA t −=dividing the total added loss by the number of bends, but in dB for the specified number of bends. For measuring the value of this attribute, reference is made to references [10] and [17] from clause 2.The macrobending added loss for the multimode fibre within the scope of this recommendation is fully determined by its NA value (see Table 1, clause 7) and the launching conditions at the position in the cable network where a bend is present.NOTE 1 – A qualification test may be sufficient to ensure that this requirement is being met.5.7 Material properties of the fibre5.7.1 Fibre materialsThe substances of which the fibres are made should be indicated.NOTE – Care may be needed in fusion splicing fibres of different substances. Provisional results indicate that adequate splice loss and strength can be achieved when splicing different high-silica fibres.5.7.2 Protective materialsThe physical and chemical properties of the material used for the fibre primary coating and the best way of removing it (if necessary) should be indicated. In the case of single jacketed fibre, similar indications shall be given.5.8 Refractive index profileThe refractive index profile of the fibre does not generally need to be known.5.9 Modal bandwidthThe modal bandwidth is specified with a minimum value at one or more wavelengths in both the 850 nm and 1300 nm regions. The optical fibre modal bandwidth shall not be lower than the values recommended in clause 7.By convention, the modal bandwidth is linearly normalized to 1 km. For measuring the value of this attribute, reference is made to reference [7] from clause 25.10 Chromatic dispersion coefficientThe chromatic dispersion coefficient, D(λ), is specified by putting limits on the parameters of a chromatic dispersion curve that is a function of wavelength in the 1300 nm region. The chromatic dispersion coefficient limit for any wavelength, λ, is calculated with the minimum zero-dispersion wavelength, λ0min , the maximum zero-dispersion wavelength, λ0max , and the maximum zero-dispersion slope coefficient, S 0max , according to:The values of λ0min , λ0max , and S 0max shall be within the limits indicated in the tables of clause 7. For measuring the value of this attribute, reference is made to reference [8] from clause 2Note 1: The worst case chromatic dispersion coefficient at 850 nm as derived from the recommended valuesin clause 7 is -104 ps/nm.km (e.g. S 0 = 0,09375 ps/nm2·km at λ0 = 1340 nm or S 0 = 0,10125ps/nm2·km at λ0 = 1320 nm ).Note 2: Specification compliance of chromatic dispersion can be assured by compliance to the numerical aperture specification()⎥⎥⎦⎤⎢⎢⎣⎡⎟⎠⎞⎜⎝⎛λλ−λ≤λ≤⎥⎥⎦⎤⎢⎢⎣⎡⎟⎠⎞⎜⎝⎛λλ−λ4min 0max 04max 0max 01414S D Sattributes6 CableSince the geometrical and optical characteristics of fibres given in clause 5 are barely affected by the cabling process, this clause gives recommendations mainly relevant to transmission characteristics of cabled fibres. Environmental and test conditions are paramount and are described in the guidelines for test methods.coefficient6.1 AttenuationThe attenuation coefficient is specified with a maximum value at one or more wavelengths in both the 850nm and 1300 nm regions. The optical fibre cable attenuation coefficient values shall not exceed the values recommended in clause 7. For measuring the value of this attribute, reference is made to reference [6] from clause 2Bandwidth6.2 ModalThe cable requirement for modal bandwidth is that the cable shall include fibre that complies with the fibre modal bandwidth-length product as recommended in clause 7.7 Tables of recommended valuesTable 1 / G.651.1 summarizes the recommended values for the 50/125 µm graded-index multimode fibresthat satisfy the objectives of this Recommendation. They support the application in Ethernet based systemswith transmission speeds ranging up to 1 Gb/s, either in the 850 nm or in the 1300 nm wavelength window.For the 1 Gb/s systems the link length is 550 m both at 850 nm (1000BASE-SX) and at 1300 nm(1000BASE-LX).The modal bandwidth-length product requirements as stated in Table 1/G.651.1 have been coded as “OM2”in the IEC/ISO Standard 11801 and have also been normatively defined in the optical fibre cable standards listed in clause 21. The use of ”OM-3” grade multimode fibre, supporting 10 Gb/s transmission at 850 nm(10GBASE-SX), satisfies the requirements of this Recommendation also because it has higher bandwidth. Longer link lengths up to 1000 or 2000 m at either one of the two or both wavelength regions can be supported if the customer and the manufacturer agree on improved attribute values, modal bandwidth in particular.Table 1/G.651.1 attributesFibre attributesValue Attribute DetailNominal 125 Cladding diameterµmTolerance ±2 µmCore diameterµmNominal 50Tolerance ±3 µmCore-cladding concentricity error Maximum 3 µmCore non-circularity Maximum 6 %Cladding non-circularity Maximum 2 %Numerical apertureNominal 0.20Tolerance ± 0.015Macrobend lossmmRadius 15Number of turns 2Table 1/G.651.1 attributesMaximum at 850 nm 1 dBNOTES 1 and 2 Maximum at 1300 nm 1 dBProof stress Minimum 0.69 GPaMinimum at 850 nm 500 MHz.kmModal bandwidth-length productfor overfilled launch Minimum at 1300 nm 500 MHz.kmλ0min 1295nmλ0max 1340nmS0max for1295 ≤λ0≤ 1310 nm ≤ 0.105ps/nm2 × kmChromatic dispersion coefficientNOTE 3S0max for1310 ≤λ0≤ 1340 nm≤ 375x(1590-λ0)*10-6ps/nm2 × kmCable attributesAttribute DetailValueMaximum at 850 nm 3.5 dB/kmAttenuation coefficientMaximum at 1300 nm 1.0 dB/kmNOTE 1: In case of use of the multimode fibre outside the scope of thisRecommendation, other macrobending loss values may be valid asspecified in reference [2] of clause 2NOTE 2: For testing the macrobending loss value, the launching conditions asspecified for the attenuation measurement in normative reference [17] ofclause 2 shall be used.NOTE 3: The worst case chromatic dispersion coefficient at 850 nm (e.g. S0 =0,09375 ps/nm2·km at λ0 = 1340 nm or S0 = 0,10125 ps/nm2·km at λ0 =1320 nm) is -104 ps/nm·km.8 BibliographyThe following documents contain provisions which, through reference in this text, constitute other relevant information[1] ITU-T SG15 WP 1; ANT Standards Overview[2] IEC 62048:2002, Optical fibres – Reliability – Power law theory[3] ITU-T G.983 series on “Broadband optical access system based on Passive OpticalNetworks (PON)”[4] ITU-T G.984 series on “Characteristics of Gigabit-capable Passive Optical Networks(GPON)”[5] ITU-T Recommendation L.67; “Small count optical fibre cables for indoor applications”;October 2006_____________。

国际电联名词解释

国际电联名词解释

国际电联名词解释
国际电联(International Telecommunication Union,ITU)是一个全球性的联合国专门机构,负责协调和规范全球电信和信息通信技术(ICT)领域的发展。

ITU的宗旨是促进全球电信和通信技术的互联互通,为全球各国提供高质量的电信服务,并加强全球通信基础设施的发展。

ITU的主要职责包括制定国际电信标准、管理和分配全球无线电频谱资源、推动电信技术的研究和发展以及促进全球数字包容。

ITU还举办各种会议和研讨会,为各成员国提供交流和合作的平台。

ITU的工作范围涵盖了广泛的领域,包括电信网络、卫星通信、无线通信、互联网、电子商务、电子邮件、数据传输和多媒体等。

ITU致力于推动技术的创新和发展,以促进信息和通信技术在社会经济发展中的应用。

ITU的成员由全球各个国家、地区和国际组织组成,目前有193个成员国和800多个成员组织。

ITU通过成员之间的合作和协调,推动全球电信和通信技术的发展,并为全球通信市场的稳定和可持续发展做出贡献。

ITU在全球范围内具有重要的影响力和权威性,其制定的标准和政策
对全球电信和通信技术产业具有指导作用。

通过与各国政府、行业协会和国际组织的密切合作,ITU成为促进全球信息社会建设和数字包容的重要力量。

总之,国际电联是一个致力于促进全球电信和信息通信技术的发展的国际组织,通过制定标准、管理无线电频谱、促进技术研发和举办会议等方式,推动全球通信基础设施的发展,促进各国的互联互通和数字包容。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档