网络测量与行为学 网络测量与行为学概述. 程光 东南大学计算机科学与工程学院 CERNET 华东 ( 北 ) 地区网络中心江苏省计算机网络技术重点实验室
|
|
- Ethan Hines
- 5 years ago
- Views:
Transcription
1 网络测量与行为学 网络测量与行为学概述 程光 东南大学计算机科学与工程学院 CERNET 华东 ( 北 ) 地区网络中心江苏省计算机网络技术重点实验室
2 主讲教师简介 计算机工程系, 教授, 安徽黄山人 研究方向 : 网络测量 行为学和网络安全 目前主要研究项目 2009CB 基于自治治理模型的网络管理与安全研究 负责人, 国家 973 BK 下一代网络热点异常自适应抽样测量方法研究 负责人, 江苏省自然基金 高速网络活跃节点检测及其流量分类方法研究, 负责人, 国家自然基金项目 2008BAH37B04 可信任互联网 - 新一代可信任互联网安全和网络服务, 国家科技支撑计划, 子项目负责人 联系方式 gcheng@njnet.edu.cn
3 课程介绍 目标在增强学生在网络方向的研究能力, 开拓学生在网络研究领域的视野, 同时学生能够学习一些网络测量工具 流量仿真建模工具等 通过阅读该领域的论文, 学生学会如何定义一个研究问题 选择一个具体的研究方法, 并完成和网络行为相关的研究课题 主要参考书 互联网流测量, 程光, 东南大学出版社,
4 主要讲授内容 第一部分 : 网络测量与行为学概述, 讲授网络测量与行为学的发展状况和研究内容 第二部分 : 网络测量方法, 讲授抽样测量方法 流数和超点测量方法 重尾流测量 网络流量应用识别 流量匿名化算法 带宽测量方法 拓扑和时延测量方法 第三部分 : 行为分析方法, 讲授行为测度 自相似理论 网络流量测量建模 第四部分 : 行为学相关工具, 讲授相关的测量工具 NS-2 网络仿真器
5 网络测量 行为学主要会议 ACM Internet Measurement Conference (IMC) ACM SIGMETRICS/Performance Passive and Active Measurement ocnference: PAM Sigcomm Infocom
6 阅读文献方法 Context and Problem Statement: What problems are the authors trying to solve? Are they important problems? Why or why not? New Idea: What new architecture, algorithm, mechanism, methodology, or perspective are the authors proposing? How is the new idea different from all other ideas to solve the same problem?
7 阅读文献方法 ( 续 ) What to Evaluate? What, according to the authors, need to be evaluated to confirm the worthiness of their new idea? Runtime? Throughput? Cache miss ratio? Utilization? How to Evaluate? How did the authors go about conducting the evaluation? Did they prove theorems? Did they run simulations? Did they build a system? Did they collect traces from existing systems?
8 阅读文献方法 ( 续 ) Was the Evaluation Correct and Adequate? How was their data collection done? Do you agree with their analysis of the data? Do you agree with their conclusions about the data? Do you have new interpretation of their data? Can you suggest new ways to evaluate their idea? Limitations, Drawbacks, Extensions: Can you think of other aspects of their idea that need to be evaluated? Can you think of extensions or modifications to their idea to improve it? How would you evaluate your improvement? Can you apply their idea or method of evaluation to your own project?
9 What do we care about when we design networks? End to end behavior Reachability Performance in terms of delay, losses, throughput Security Stability/fault resilience of the end to end path System wide behavior Load distribution within a domain Stability/Robustness/Survivability Manageability Evolvability
10 Measurement Purpose Understand the traffic characteristics of existing networks Develop models of traffic for future networks Useful for simulations, planning studies
11 Requirements Network measurement requires hardware or software measurement facilities that attach directly to network Allows us to observe all packet traffic on the network, or to filter it to collect only the traffic of interest Assumes broadcast-based network technology, superuser permission
12 What are we measuring? What is the Internet? Large scale distributed networked computer system What does the Internet look like? Properties of interest Traffic (demand) Infrastructure Applications Performance
13 Traffic Link/network/transport layer? Packet/Byte/Flow Level? Per Flow vs. Per Aggregate? Distributions by applications FTP, HTTP, Peer2peer Fan out: flow level measurements from specific network? source/destination address? AS? Temporal variability (time of day?) Spatial variability Important prefixes? Popular servers? Traffic anomalies How to detect them? How to define normal/ abnormal?
14 Infrastructure All aspects of the physical structure of the network Network topology Connectivity graph: how are basic entities connected? Infer AS hierarchy/relationships? Characteristics of the Infrastructure Links (optical, electrical, wireless): signal strength, bit/block/packet error rate, collision detection Routers: CPU load, buffer length, etc. Switches: buffering, switching speed, collision detection, contention resolution
15 Infrastructure ( 续 ) Control plane: Intra & Inter Domain Routing Link failure characteristics Routes/paths taken IGP/BGP convergence Peering policies
16 Applications Key characteristics/behavior of applications worth measuring Applications Web Video Streaming P2P Network Games Online social network sites Properties User workload models (join/leave) Application demands (bandwidth, etc) Performance characteristics
17 Performance Network operational characteristics or performance Throughput Available bandwidth; bottleneck bandwidth Latency Jitter Losses
18 Measurement Tools Can be classified into hardware and software measurement tools Hardware: specialized equipment Examples: HP 4972 LAN Analyzer, DataGeneral Network Sniffer, others... Software: special software tools Examples: tcpdump, xtr, SNMP, others... Nmap, wireshark
19 Measurement Tools (Cont d) Measurement tools can also be classified as intrusive or nonintrusive Intrusive: the monitoring tool generates traffic of its own during data collection Non-intrusive: the monitoring tool is passive, observing and recording traffic info, while generating none of its own
20 Measurement Tools (Cont d) Measurement tools can also be classified as real-time or non-real-time Real-time: collects traffic data as it happens, and may even be able to display traffic info as it happens Non-real-time: collected traffic data may only be a subset (sample) of the total traffic, and is analyzed off-line (later)
21 Potential Uses of Tools Protocol debugging Network debugging and troubleshooting Changing network configuration Designing, testing new protocols Designing, testing new applications Detecting network weirdness: broadcast storms, routing loops, etc.
22 Potential Uses of Tools (Cont d) Performance evaluation of protocols and applications How protocol/application is being used How well it works How to design it better
23 Potential Uses of Tools (Cont d) Workload characterization What traffic is generated Packet size distribution Packet arrival process Burstiness Important in the design of networks, applications, interconnection devices, congestion control algorithms, etc.
24 Potential Uses of Tools (Cont d) Workload modeling Construct synthetic workload models that concisely capture the salient characteristics of actual network traffic Use as representative, reproducible, flexible, controllable workload models for simulations, capacity planning studies, etc.
25 Measurement Environments Local Area Networks (LAN s) e.g., Ethernet LANs Wide Area Networks (WAN s) e.g., the Internet
26 Summary of Measurement Results The following represents synopsis of the Top 10 Observations from network measurement and monitoring research in the last 10 years Not an exhaustive list, but hits most of the highlights
27 What are the Challenges Large volume of measurement data Challenges in storing and processing data Privacy issues Difficulty in getting accurate of timestamps Offset, skew, resolution Sticky statistical properties Heavy tails Non stationary Insufficient/incomplete information for accurate inferences
28 Observation #1 The traffic model that we use is extremely important in the performance evaluation of routing, flow control, and congestion control strategies Have to consider application-dependent, protocol-dependent, and networkdependent characteristics The more realistic, the better (GIGO)
29 Observation #2 Characterizing aggregate network traffic is difficult Lots of (diverse) applications Just a snapshot: traffic mix, protocols, applications, network configuration, technology, and users change with time
30 Observation #3 Packet arrival process is not Poisson Packets travel in trains Packets travel in tandems Packets get clumped together (ack compression) Interarrival times are not exponential Interarrival times are not independent
31 Observation #4 Packet traffic is bursty Average utilization may be very low Peak utilization can be very high Depends on what interval you use!! Traffic may be self-similar: bursts exist across a wide range of time scales Defining burstiness (precisely) is difficult
32 Observation #5 Traffic is non-uniformly distributed amongst the hosts on the network Example: 10% of the hosts account for 90% of the traffic (or 20-80) Why? Clients versus servers, geographic reasons, popular ftp sites, web sites, etc.
33 Observation #6 Network traffic exhibits locality effects Pattern is far from random Temporal locality Spatial locality Persistence and concentration True at host level, at gateway level, at application level
34 Observation #7 Well over 80% of the byte and packet traffic on most networks is TCP/IP By far the most prevalent Often as high as 95-99% Most studies focus only on TCP/IP for this reason (as they should!)
35 Observation #8 Most conversations are short Example: 90% of bulk data transfers send less than 10 kilobytes of data Example: 50% of interactive connections last less than 90 seconds Distributions may be heavy tailed (i.e., extreme values may skew the mean and/or the distribution)
36 Observation #9 Traffic is bidirectional Data usually flows both ways Not JUST acks in the reverse direction Usually asymmetric bandwidth though Pretty much what you would expect from the TCP/IP traffic for most applications
37 Observation #10 Packet size distribution is bimodal Lots of small packets for interactive traffic and acknowledgements Lots of large packets for bulk data file transfer type applications Very few in between sizes
38 Why is Traffic Measurement Important? Billing the customer Measure usage on links to/from customers Applying billing model to generate a bill Traffic engineering and capacity planning Measure the traffic matrix (i.e., offered load) Tune routing protocol or add new capacity Denial-of-service attack detection Identify anomalies in the traffic Configure routers to block the offending traffic Analyze application-level issues Evaluate benefits of deploying a Web caching proxy Quantify fraction of traffic that is P2P file sharing
39 Applications of Measurements Traffic Engineering: Tune routing protocol parameters to control traffic flow through the network. Network Troubleshooting: Locate and diagnose network performance (or reachability) problems Anomaly Detection Feasibility Study of New Ideas: Measurement can help evaluate the performance of new applications and pinpoint enhancement possibilities
40 Collecting Traffic Data: SNMP Simple Network Management Protocol Standard Management Information Base (MIB) Protocol for querying the MIBs Advantage: ubiquitous Supported on all networking equipment Multiple products for polling and analyzing data Disadvantages: dumb Coarse granularity of the measurement data E.g., number of byte/packet per interface per 5 minutes Cannot express complex queries on the data Unreliable delivery of the data using UDP
41 Collecting Traffic Data: Packet Monitoring Packet monitoring Passively collecting IP packets on a link Recording IP, TCP/UDP, or application-layer traces Advantages: details Fine-grain timing information E.g., can analyze the burstiness of the traffic Fine-grain packet contents Addresses, port numbers, TCP flags, URLs, etc. Disadvantages: overhead Hard to keep up with high-speed links Often requires a separate monitoring device
42 Collecting Traffic Data: Flow Statistics Flow monitoring (e.g., Cisco Netflow) Statistics about groups of related packets (e.g., same IP/TCP headers and close in time) Recording header information, counts, and time Advantages: detail with less overhead Almost as good as packet monitoring, except no fine-grain timing information or packet contents Often implemented directly on the interface card Disadvantages: trade-off detail and overhead Less detail than packet monitoring Less ubiquitous than SNMP statistics
43 Using the Traffic Data in Network Operations SNMP byte/packet counts: everywhere Tracking link utilizations and detecting anomalies Generating bills for traffic on customer links Inference of the offered load (i.e., traffic matrix) Packet monitoring: selected locations Analyzing the small time-scale behavior of traffic Troubleshooting specific problems on demand Flow monitoring: selective, e.g,. network edge Tracking the application mix Direct computation of the traffic matrix Input to denial-of-service attack detection
44 Flow Measurement: Outline Definition Passively collecting statistics about groups of packets Group packets based on headers and spacing in time Essentially a way to aggregate packet measurement data Scope Medium-grain information about user behavior Passively monitoring the link or the interface/router Helpful in characterizing, detecting, diagnosing, and fixing Outline Definition of an IP flow (sequence of related packets) Flow measurement data and its applications Mechanics of collecting flow-level measurements Reducing the overheads of flow-level measurement
45 IP Flows flow 1 flow 2 flow 3 flow 4 Set of packets that belong together Source/destination IP addresses and port numbers Same protocol, ToS bits, Same input/output interfaces at a router (if known) Packets that are close together in time Maximum spacing between packets (e.g., 15 sec, 30 sec) Example: flows 2 and 4 are different flows due to time
46 Flow Abstraction A flow is not exactly the same as a session Sequence of related packets may be multiple flows (due to the close together in time requirement) Sequence of related packets may not follow the same links (due to changes in IP routing) A session is difficult to measure from inside the network Motivation for this abstraction As close to a session as possible from inside the network Flow switching paradigm from IP-over-ATM technology Router optimization for forwarding/access-control decisions (cache the result after the first packet in a flow) might as well throw in a few counters
47 Recording Traffic Statistics (e.g., Netflow) Packet header information (same for every packet) Source and destination IP addresses Source and destination TCP/UDP port numbers Other IP & TCP/UDP header fields (protocol, ToS bits, etc.) Aggregate traffic information (summary of the traffic) Start and finish time of the flow (time of first & last packet) Total number of bytes and number of packets in the flow TCP flags (e.g., logical OR over the sequence of packets) SYN ACK ACK FIN 4 packets 1436 bytes SYN, ACK, & FIN start finish
48 Recording Routing Info (e.g., Netflow) Input and output interfaces Input interface is where the packets entered the router Output interface is the next hop in the forwarding table Source and destination IP prefix (mask length) Longest prefix match on the src and dest IP addresses Source and destination autonomous system numbers Origin AS for src/dest prefix in the BGP routing table forwarding table Processor BGP table Line card Line card Line card Switching Fabric Line card Line card Line card
49 Measuring Traffic as it Flows By source dest input output source prefix source AS intermediate AS dest prefix dest AS Source and destination: IP header Source and dest prefix: forwarding table or BGP table Source and destination AS: BGP table
50 Packet vs. Flow Measurement Basic statistics (available from both techniques) Traffic mix by IP addresses, port numbers, and protocol Average packet size Traffic over time Both: traffic volumes on a medium-to-large time scale Packet: burstiness of the traffic on a small time scale Statistics per TCP connection Both: number of packets & bytes transferred over the link Packet: frequency of lost or out-of-order packets, and the number of application-level bytes delivered Per-packet info (available only from packet traces) TCP seq/ack #s, receiver window, per-packet flags, Probability distribution of packet sizes Application-level header and body (full packet contents)
51 Collecting Flow Measurements Route CPU that generates flow records may degrade forwarding performance CPU Router A Line card that generates flow records Router A more efficient to support measurement in each line card Packet monitor that generates flow records Router A Router B third party Monitor
52 Router Collecting Flow Measurement Advantage No need for separate measurement device(s) Monitor traffic over all links in/out of router (parallelism) Ease of providing routing information for each flow Disadvantage Requirement for support in the router product(s) Danger of competing with other 1 st -order router features Possible degradation of the throughput of the router Difficulty of online analysis/aggregation of data on router Practical application View from multiple vantage points (e.g., all edge links)
53 Packet Monitor Collecting Flow Records Advantages No performance impact on packet forwarding No dependence on support by router vendor Possibility of customizing the thinning of the data Disadvantages Overhead/cost of tapping a link & reconstructing packets Cost of buying, deploying, and managing extra equipment No access to routing info (input/output link, IP prefix, etc.) Practical application Selective monitoring of a small number of links Deployment in front of particular services or sites Packet monitor vendors support flow-level output
54 Mechanics: Flow Cache Maintain a cache of active flows Storage of byte/packet counts, timestamps, etc. Compute a key per incoming packet Concatenation of source, destination, port #s, etc. Index into the flow cache based on the key Creation or updating of an entry in the flow cache key #bytes, #packets, start, finish header key packet key #bytes, #packets, start, finish
55 Mechanics: Evicting Cache Entries Flow timeout Remove flows that have not received a packet recently Periodic sequencing through the cache to time out flows New packet triggers the creation of a new flow Cache replacement Remove flow(s) when the flow cache is full Evict existing flow(s) upon creating a new cache entry Apply eviction policy (LRU, random flow, etc.) Long-lived flows Remove flow(s) that persist for a long time (e.g., 30 min) otherwise flow statistics don t become available and the byte and packet counters might overflow
56 Sampling: Packet Sampling Packet sampling before flow creation (Sampled Netflow) 1-out-of-m sampling of individual packets (e.g., m=100) Create of flow records over the sampled packets Reducing overhead Avoid per-packet overhead on (m-1)/m packets Avoid creating records for a large number of small flows Increasing overhead (in some cases) May split some long transfers into multiple flow records due to larger time gaps between successive packets not sampled time timeout two flows
57 Flow measurement Advantages and Disadvantages Flow measurement Medium-grain view of traffic on one or more links Advantages Lower measurement volume than full packet traces Available on high-end line cards (Cisco Netflow) Control over overhead via aggregation and sampling Disadvantages Computation and memory requirements for the flow cache Loss of fine-grain timing and per-packet information Not uniformly supported by router vendors
58 Useful Links Academic conferences dedicated to Internet Measurements ACM Internet Measurement Conference (IMC) ACM SIGMETRICS Performance Analysis Passive and Active Measurement Workshop (PAM) IETF Working groups IPPM: IP Performance Metrics RMON: Remote Monitoring
59 Important Projects Internet Routing Registry (IRR) and Routing Assets Database (RADb) ARIN, RIPE, APNIC, LACNIC, AfrNIC CAIDA the Cooperative Association for Internet Data Analysis (aff. U. C. San Diego) IPMON NLANR Moat - Measurement and Network Analysis Group (aff. U. C. San Diego) NIMI National Internet Measurement Infrastructure SLAC Tutorial on Internet Monitoring & PingER IEPM Internet End to end Performance Monitoring
60 总结 如何阅读文献 为什么测量 测量数据
计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology
计算机科学与技术学院 计算机科学与技术学院下设 6 个研究所 : 计算科学理论研究所 数据工程研究所 并行分布式计算研究所 数据存储研究所 数字媒体研究所 信息安全研究所 ;2 个中心 : 嵌入式软件与系统工程中心和教学中心 外存储系统国家专业实验室 教育部信息存储系统重点实验室 中国教育科研网格主结点 国家高性能计算中心 ( 武汉 ) 服务计算技术与系统教育部重点实验室 湖北省数据库工程技术研究中心
More informationA Benchmark For Stroke Extraction of Chinese Characters
2015-09-29 13:04:51 http://www.cnki.net/kcms/detail/11.2442.n.20150929.1304.006.html 北京大学学报 ( 自然科学版 ) Acta Scientiarum Naturalium Universitatis Pekinensis doi: 10.13209/j.0479-8023.2016.025 A Benchmark
More information实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程
实验三十三 DEIGRP 的配置 一 实验目的 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 二 应用环境 由于 RIP 协议的诸多问题, 神州数码开发了与 EIGRP 完全兼容的 DEIGRP, 支持变长子网 掩码 路由选择参考更多因素, 如带宽等等 三 实验设备 1. DCR-1751 三台 2. CR-V35FC 一条 3. CR-V35MT 一条 四 实验拓扑
More information如何查看 Cache Engine 缓存中有哪些网站 /URL
如何查看 Cache Engine 缓存中有哪些网站 /URL 目录 简介 硬件与软件版本 处理日志 验证配置 相关信息 简介 本文解释如何设置处理日志记录什么网站 /URL 在 Cache Engine 被缓存 硬件与软件版本 使用这些硬件和软件版本, 此配置开发并且测试了 : Hardware:Cisco 缓存引擎 500 系列和 73xx 软件 :Cisco Cache 软件版本 2.3.0
More informationPrevious on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet
ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet 前 4 个字节都是一样的 0 8 16 31 类型代码检验和 ( 这 4 个字节取决于 ICMP 报文的类型 ) ICMP 的数据部分 ( 长度取决于类型 ) ICMP 报文 首部 数据部分 IP 数据报 ICMP: Internet Control Message
More informationMachine Vision Market Analysis of 2015 Isabel Yang
Machine Vision Market Analysis of 2015 Isabel Yang CHINA Machine Vision Union Content 1 1.Machine Vision Market Analysis of 2015 Revenue of Machine Vision Industry in China 4,000 3,500 2012-2015 (Unit:
More information智能终端与物联网应用 课程建设与实践. 邝坚 嵌入式系统与网络通信研究中心北京邮电大学计算机学院
智能终端与物联网应用 课程建设与实践 邝坚 jkuang@bupt.edu.cn 嵌入式系统与网络通信研究中心北京邮电大学计算机学院 定位 移动互联网 服务 安 理解 云计算 服务计算 可信 全 交换感知 嵌入式计算 计算 现状与趋势 p 移动互联网发展迅猛 第 27 次中国互联网络发展状况统计报告 (CNNIC) 指出截至 2010 年 12 月, 中国互联网用户数已达到 4.57 亿, 其中移动互联网网民数已达
More informationTriangle - Delaunay Triangulator
Triangle - Delaunay Triangulator eryar@163.com Abstract. Triangle is a 2D quality mesh generator and Delaunay triangulator. Triangle was created as part of the Quake project in the school of Computer Science
More informationUnderstanding IO patterns of SSDs
固态硬盘 I/O 特性测试 周大 众所周知, 固态硬盘是一种由闪存作为存储介质的数据库存储设备 由于闪存和磁盘之间物理特性的巨大差异, 现有的各种软件系统无法直接使用闪存芯片 为了提供对现有软件系统的支持, 往往在闪存之上添加一个闪存转换层来实现此目的 固态硬盘就是在闪存上附加了闪存转换层从而提供和磁盘相同的访问接口的存储设备 一方面, 闪存本身具有独特的访问特性 另外一方面, 闪存转换层内置大量的算法来实现闪存和磁盘访问接口之间的转换
More informationIEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic Library)
IEL Newsletter 2013 年 12 月特刊 :2012 年 IEEE 期刊影响因子及相关评价指标情况概览 欢迎体验全新的 IEEE Xplore 数字图书馆 www.ieee.org/ieeexplore IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET
More informationMicrosoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司
Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 RemoteFX 中新的 USB 重定向特性 在 RDS 中所有设备重定向机制 VDI 部署场景讨论 : 瘦客户端和胖客户端 (Thin&Rich). 用户体验 : 演示使用新的 USB 重定向功能 81% 4 本地和远程的一致的体验 (Close
More informationOTAD Application Note
OTAD Application Note Document Title: OTAD Application Note Version: 1.0 Date: 2011-08-30 Status: Document Control ID: Release _OTAD_Application_Note_CN_V1.0 Copyright Shanghai SIMCom Wireless Solutions
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 4. Internetworking The Internet Protocol IP Address ARP and DHCP ICMP IPv6 Mobile IP Internet Routing IP Multicasting Multiprotocol Label Switching
More informationVLDB Database School (China) VLDB 中国数据库学院
VLDB Database School (China) VLDB 中国数据库学院 2012 Summer School 2012 年暑期学校 July 23 July 27, 2012 2012 年 7 月 23 日 7 月 27 日 Kunming, China 中国 昆明 VLDB Database School (China) School of Information Science and
More information计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇
计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法 授课老师 : 王浩宇 haoyuwang@bupt.edu.cn 1 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned
More information第二小题 : 逻辑隔离 (10 分 ) OpenFlow Switch1 (PC-A/Netfpga) OpenFlow Switch2 (PC-B/Netfpga) ServerB PC-2. Switching Hub
第二小题 : 逻辑隔离 (10 分 ) 一 实验背景云平台服务器上的不同虚拟服务器, 分属于不同的用户 用户远程登录自己的虚拟服务器之后, 安全上不允许直接访问同一局域网的其他虚拟服务器 二 实验目的搭建简单网络, 通过逻辑隔离的方法, 实现用户能远程登录局域网内自己的虚拟内服务器, 同时不允许直接访问同一局域网的其他虚拟服务器 三 实验环境搭建如图 1-1 所示, 我们会创建一个基于 OpenFlow
More information大数据基准测试 : 原理 方法和应用. 詹剑锋 中国科学院计算技术研究所中国科学院大学 可信云服务大会, 北京 INSTITUTE OF COMPUTING TECHNOLOGY
大数据基准测试 : 原理 方法和应用 詹剑锋 http://prof.ict.ac.cn/bigdatabench 中国科学院计算技术研究所中国科学院大学 2015.7.31 2015 可信云服务大会, 北京 INSTITUTE OF COMPUTING TECHNOLOGY Outline 原理 方法 BigDataBench 计量的意义 科学和人类日常生活的基础 牛顿 ( 力 ) 开尔文 ( 温度
More informationSpark Standalone 模式应用程序开发 Spark 大数据博客 -
在本博客的 Spark 快速入门指南 (Quick Start Spark) 文章中简单地介绍了如何通过 Spark s hell 来快速地运用 API 本文将介绍如何快速地利用 Spark 提供的 API 开发 Standalone 模式的应用程序 Spark 支持三种程序语言的开发 :Scala ( 利用 SBT 进行编译 ), Java ( 利用 Maven 进行编译 ) 以及 Python
More informationICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容
Content 内容 A1 A2 A3 A4 A5 A6 A7 A8 A9 Login via ICTI CARE Website 通过 ICTI 关爱网站登录 Completing the Application Form 填写申请表 Application Form Created 创建的申请表 Receive Acknowledgement Email 接收确认电子邮件 Receive User
More informationLogitech G302 Daedalus Prime Setup Guide 设置指南
Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Contents / 目录 English................. 3 简体中文................. 6 2 Logitech G302 Daedalus Prime 1 On 2 USB Your Daedalus Prime
More information操作系统原理与设计. 第 13 章 IO Systems(IO 管理 ) 陈香兰 2009 年 09 月 01 日 中国科学技术大学计算机学院
第 13 章 IO Systems(IO 管理 ) 中国科学技术大学计算机学院 2009 年 09 月 01 日 提纲 I/O Hardware 1 I/O Hardware Polling Interrupts Direct Memory Access (DMA) I/O hardware summary 2 Block and Character Devices Network Devices
More informationH3C CAS 虚拟机支持的操作系统列表. Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知
H3C CAS 虚拟机支持的操作系统列表 Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知 目录 1 Windows 1 2 Linux 1 2.1 CentOS 1 2.2 Fedora 2 2.3 RedHat Enterprise
More information本科专业人才培养计划 信息学科大类分册 华中科技大学教务处 二 O 一五年七月
本科专业人才培养计划 信息学科大类分册 华中科技大学教务处 二 O 一五年七月 目 录 1 2 15 *24 ACM 35 44 53 54 63 71 81 91 99 110 121 130 131 143 *157 166 174 175 189 202 212 2+2 224 232 245 250 251 注 : 带 * 者不属于信息学科大类专业 1 计算机科学与技术学院 计算机科学与技术学院下设
More informationSilverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司
Silverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司 business opportunity 越来越丰富 MTV.COM (1996) CSS FLASH 4.0 AJAX HTML 3.2 DHTML SSL 3.0 FLASH 1.0 REAL AUDIO HTML 1.0 MTV.COM (2008) Silverlight 概览 跨浏览器 IE, Safari,
More informationBlueCore BlueTunes Configuration Tool User Guide
BlueCore BlueTunes Configuration Tool User Guide Issue 1 CSR Cambridge Science Park Milton Road Cambridge CB4 0WH United Kingdom Registered in England 3665875 Tel.: +44 (0)1223 692000 Fax.: +44 (0)1223
More information上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分
上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分 SGM IT < 上汽通用汽车供应商门户网站项目 (SGMSP)> 工作产品名称 :< User Guide 用户手册 > Current Version: Owner: < 曹昌晔 > Date Created:
More information#MDCC Swift 链式语法应 用 陈乘
#MDCC 2016 Swift 链式语法应 用 陈乘 方 @ENJOY 关于我 Swift 开发者 ENJOY ios 客户端负责 人 两年年 Swift 实际项 目开发经验 微博 ID: webfrogs Twitter: nswebfrog Writing code is always easy, the hard part is reading it. 链式语法? 链式语法 可以连续不不断地进
More informationMultiprotocol Label Switching The future of IP Backbone Technology
Multiprotocol Label Switching The future of IP Backbone Technology Computer Network Architecture For Postgraduates Chen Zhenxiang School of Information Science and Technology. University of Jinan (c) Chen
More informationXML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中
XML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中 We can format your materials to be read.. in print 印刷 XML Conversions online
More information下一代互联网的发展 Next Generation Internet
下一代互联网的发展 Next Generation Internet Technology and Future Development Beijing University of Posts and Telecommunications Sept. 2018 Agenda Internet around world Scale, Technology, Standardization and Applications
More informationChina Next Generation Internet (CNGI) project and its impact. MA Yan Beijing University of Posts and Telecommunications 2009/08/06.
China Next Generation Internet (CNGI) project and its impact MA Yan Beijing University of Posts and Telecommunications 2009/08/06 Outline Next Generation Internet CNGI project in general CNGI-CERNET2 CERNET2
More informationCyber Security Introduction
Cyber Security Introduction 2018.10.17 Huiping Sun( ) sunhp@ss.pku.edu.cn Course Overview 教师信息 sunhp@ss.pku.edu.cn https://huipingsun.github.io 1 1530E Course Overview 课程基本信息 14 17 (3204) 10 17 11 14 11
More informationFilters: E-Syn, Momentum, Transient and the DAC
Topic 6: Filters: E-Syn, Momentum, Transient and the DAC ADS 2001 Fundamentals - Sept, 2001Slide 6-1 Using the E-Syn tool What does E-Syn do? It makes it easy to create FILTERS and Matching Networks. E-Syn
More informationChapter 7: Deadlocks. Operating System Concepts 9 th Edition
Chapter 7: Deadlocks Silberschatz, Galvin and Gagne 2013 Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number
More information梁永健. W K Leung. 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei
梁永健 W K Leung 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei Network Threats ICT 移动化云计算社交化大数据 Mobile Cloud Social Big Data 网络威胁 APT Mobile threats Web threats Worms Trojans Botnet
More informationMeasurements for Network Operations
Measurements for Network Operations Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ http://www.research.att.com/~jrex Part 1: Outline Introduction Role of measurement
More informationSESEC IV. China Cybersecurity. Standardization Monthly. Newsletter. June 2018
Author: Betty XU Distributed to: SESEC Partners, EU standardization stakeholders Date of issue: 19-07-2018 SESEC IV China Cybersecurity Standardization Monthly Newsletter Introduction of SESEC Project
More informationWeb Science Security & Data Analytics
Web Science Security & Data Analytics Wang Yang http://cse.seu.edu.cn/personalpage/wyang/ 东南大学网络空间安全学院江苏省网络技术重点实验室 Wang Yang 杨望 School of Cyber Security Security on Network infrastructure Network Security
More information学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 : Latest update:
学习沉淀成长分享 EIGRP 红茶三杯 ( 朱 SIR) 微博 :http://t.sina.com/vinsoney Latest update: 2012-06-01 课程目标 EIGRP 协议基础 EIGRP 基础配置 EIGRP 协议基础 EIGRP 的协议特点 EIGRP 的三张表 EIGRP 数据包 初始路由发现 EIGRP metric DUAL 算法 EIGRP 的协议特点 CISCO
More informationTechnology: Anti-social Networking 科技 : 反社交网络
Technology: Anti-social Networking 科技 : 反社交网络 1 Technology: Anti-social Networking 科技 : 反社交网络 The Growth of Online Communities 社交网络使用的增长 Read the text below and do the activity that follows. 阅读下面的短文, 然后完成练习
More informationAvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide
AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide 简介 我们通过使用烧录有 AvalonMiner 设备管理程序的树莓派作为控制器 使 用户能够通过控制器中管理程序的图形界面 来同时对多台 AvalonMiner 6.0 或 AvalonMiner 6.01 进行管理和调试 本教程将简要的说明 如何把 AvalonMiner
More informationNetwork Measurement. COS 461 Recita8on. h:p://
Network Measurement COS 461 Recita8on h:p://www.cs.princeton.edu/courses/archive/spr14/cos461/ 2! Why Measure the Network? Scien8fic discovery Characterizing traffic, topology, performance Understanding
More informationIP unnumbered 实验讲义 一. 实验目的 : 二. 实验设备 : 三. 实验拓扑 : 四. 实验内容 :
一. 实验目的 : IP unnumbered 实验讲义 掌握 ip unnumbered 命令以及命令适用范围 二. 实验设备 : 2600 router*2,serial 相连 IOS (tm) C2600 Software (C2600-DO3S-M), Version 12.0(5)T1 三. 实验拓扑 : F0 S0 S0 F0 Router A Router B 四. 实验内容 : 基本配置
More informationIPv4/IPv6 协议 清华大学研究生课程
IPv4/IPv6 协议 1 清华大学研究生课程 > Outline Protocol Background Technology Highlights Enhanced Capabilities Transition Issues Next Steps > What Ever Happened to IPv5? 0 IP March 1977
More information[ 电子书 ]Spark for Data Science PDF 下载 Spark 大数据博客 -
[ 电子书 ]Spark for Data Science PDF 下载 昨天分享了 [ 电子书 ]Apache Spark 2 for Beginners pdf 下载, 这本书很适合入门学习 Spark, 虽然书名上写着是 Apache Spark 2, 但是其内容介绍几乎和 Spark 2 毫无关系, 今天要分享的图书也是一本适合入门的 Spark 电子书, 也是 Packt 出版,2016
More information嵌入式 Linux 中的文件系统 : 设计思想和工作原理
嵌入式 Linux 中的文件系统 : 设计思想和工作原理 刘肖凡博士副教授东南大学计算机学院 2014.12 关于我 刘肖凡 东南大学计算机科学与工程学院副教授 计算机工程系副主任 香港理工大学电子及资讯工程学系学士 博士 3 年教授 操作系统原理 课程经验 研究方向 : 大数据 复杂网络 江苏省软件工程标准化委员会委员 中国计算机协会青年科技论坛南京分论坛学术委员 内容提要 文件系统概念回顾 主流嵌入式
More informationOutline. Motivations (1/3) Distributed File Systems. Motivations (3/3) Motivations (2/3)
Outline TFS: Tianwang File System -Performance Gain with Variable Chunk Size in GFS-like File Systems Authors: Zhifeng Yang, Qichen Tu, Kai Fan, Lei Zhu, Rishan Chen, Bo Peng Introduction (what s it all
More information测试基础架构 演进之路. 茹炳晟 (Robin Ru) ebay 中国研发中心
测试基础架构 演进之路 茹炳晟 (Robin Ru) ebay 中国研发中心 茹炳晟 (Robin Ru) 主要工作经历 : ebay 中国研发中心 -- 测试基础架构技术主管 Hewlett-Packard 惠普软件 ( 中国 ) 研发中心 -- 测试架构师 资深测试专家 Alcatel-Lucent 阿尔卡特朗讯 ( 上海 ) 研发中心 -- 测试技术主管 Cisco 思科 ( 中国 ) 研发中心
More informationSNMP Web Manager. User s Manual
SNMP Web Manager User s Manual Table of Contents 1. Introduction... 2 2. SNMP Web Manager Install, Quick Start and Uninstall... 2 2.1. Software Installation... 3 2.2. Software Quick Start... 6 2.3. Software
More informationApache Kafka 源码编译 Spark 大数据博客 -
经过近一个月时间, 终于差不多将之前在 Flume 0.9.4 上面编写的 source sink 等插件迁移到 Flume-ng 1.5.0, 包括了将 Flume 0.9.4 上面的 TailSou rce TailDirSource 等插件的迁移 ( 当然, 我们加入了许多新的功能, 比如故障恢复 日志的断点续传 按块发送日志以及每个一定的时间轮询发送日志而不是等一个日志发送完才发送另外一个日志
More informationLAB 3: DC Simulations and Circuit Modeling
ADS Fundamentals - 2001 LAB 3: DC Simulations and Circuit Modeling Overview - This chapter introduces the use of behavioral models to create a system such as a receiver. This lab will be the first step
More informationLAB 5: S-parameter Simulation and Optimization
ADS Fundamentals - 2001 LAB 5: S-parameter Simulation and Optimization Overview - This exercise continues the amp_1900 design. It teaches how to setup, run, optimize and plot the results of various S-parameter
More informationCHINA VISA APPLICATION CONCIERGE SERVICE*
TRAVEL VISA PRO ORDER FORM Call us for assistance 866-378-1722 Fax 866-511-7599 www.travelvisapro.com info@travelvisapro.com CHINA VISA APPLICATION CONCIERGE SERVICE* Travel Visa Pro will review your documents
More informationChapter 1 (Part 2) Introduction to Operating System
Chapter 1 (Part 2) Introduction to Operating System 张竞慧办公室 : 计算机楼 366 室电邮 :jhzhang@seu.edu.cn 主页 :http://cse.seu.edu.cn/personalpage/zjh/ 电话 :025-52091017 1.1 Computer System Components 1. Hardware provides
More information<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties>
SpringBoot 的基本操作 一 基本概念在 spring 没有出现的时候, 我们更多的是使用的 Spring,SpringMVC,Mybatis 等开发框架, 但是要将这些框架整合到 web 项目中需要做大量的配置,applicationContext.xml 以及 servlet- MVC.xml 文件等等, 但是这些文件还还不够, 还需要配置 web.xml 文件进行一系列的配置 以上操作是比较麻烦的,
More informationChapter 11 SHANDONG UNIVERSITY 1
Chapter 11 File System Implementation ti SHANDONG UNIVERSITY 1 Contents File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and
More information2. Introduction to Digital Media Format
Digital Asset Management 数字媒体资源管理 2. Introduction to Digital Media Format 任课 老师 : 张宏鑫 2014-09-30 Outline Image format and coding methods Audio format and coding methods Video format and coding methods
More informationPresentation Title. By Author The MathWorks, Inc. 1
Presentation Title By Author 2014 The MathWorks, Inc. 1 4G LTE 轻松入门 陈建平 MathWorks 中国 2014 The MathWorks, Inc. 2 大纲 4G 综述 LTE 系统工具箱的应用 黄金参考模型 点到点链路级仿真 信号发生和分析 信号信息恢复 4G 系统的并行仿真加速 3 无线标准的演化 * *Although ETSI
More informationIBM 开源技术微讲堂容器技术与微服务系列
IBM 开源技术微讲堂容器技术与微服务系列 第五讲 Kubernetes 简介 h,p://ibm.biz/opentech- ma 1 容器技术和微服务 系列公开课 每周四晚 8 点档 Docker 一种全新的 工作 方式 容器编排 工具 Docker Swarm 数据中 心操作系统的内核 Apache Mesos 大数据 Web 服务 CI/CD: 一个都不能少 深 入理解 Mesos 的资源调度及使
More informationTW5.0 如何使用 SSL 认证. 先使用 openssl 工具 1 生成 CA 私钥和自签名根证书 (1) 生成 CA 私钥 openssl genrsa -out ca-key.pem 1024
TW5.0 如何使用 SSL 认证 先使用 openssl 工具 1 生成 CA 私钥和自签名根证书 (1) 生成 CA 私钥 openssl genrsa -out ca-key.pem 1024 Generating RSA private key, 1024 bit long modulus.++++++...++++++ e is 65537 (0x10001) (2) 生成待签名证书 openssl
More information新一代 ODA X5-2 低调 奢华 有内涵
新一代 ODA X5-2 低调 奢华 有内涵 李昊首席销售顾问甲骨文公司系统事业部 内容预览 1 2 3 4 ODA 概述 ODA X5-2 新功能 / 特性介绍 ODA X5-2 市场定位 & 竞争分析总结 & 讨论 内容预览 1 2 3 4 ODA 概述 ODA X5-2 新功能 / 特性介绍 ODA X5-2 市场定位 & 竞争分析总结 & 讨论 什么是 ODA ODA: 五年四代, 稳中求变
More informationDeclaration of Conformity STANDARD 100 by OEKO TEX
Declaration of Conformity STANDARD 100 by OEKO TEX OEKO-TEX - International Association for Research and Testing in the Field of Textile and Leather Ecology OEKO-TEX - 国际纺织和皮革生态学研究和检测协会 Declaration of
More information第 18 章网际协议 (2) IPv 年 10 月 26 日星期五
第 18 章网际协议 (2) IPv6 南京大学计算机系 黄皓教授 2007 年 10 月 26 日星期五 1. Introduction 1. Introduction Background of IPv6 The Internet is growing extremely rapidly. The latest Internet Domain Survey, conducted in January
More informationThe Design and Optimization for the TDMA Network-on-Chip
第 29 卷第 2 期 计算机辅助设计与图形学学报 Vol. 29 No.2 2017 年 2 月 Journal of Computer-Aided Design & Computer Graphics Feb. 2017 时分复用片上网络的设计与优化 许胜 1,2), 付斌章 1,2)*, 陈明宇 1,2) 1,2), 张立新 1) ( 中国科学院计算技术研究所计算机体系结构国家重点实验室北京
More informationAdvanced Design System Fundamentals
Advanced Design System - 2001 Fundamentals 3 days of intensive training - prerequisite for all other ADS courses. Course Part Number N3211A/B from Agilent EEsof EDA Customer Education E8900-90346 Instructor
More informationVirtual Memory Management for Main-Memory KV Database Using Solid State Disk *
ISSN 1673-9418 CODEN JKYTA8 E-mail: fcst@vip.163.com Journal of Frontiers of Computer Science and Technology http://www.ceaj.org 1673-9418/2011/05(08)-0686-09 Tel: +86-10-51616056 DOI: 10.3778/j.issn.1673-9418.2011.08.002
More informationTDS - 3. Battery Compartment. LCD Screen. Power Button. Hold Button. Body. Sensor. HM Digital, Inc.
TDS - 3 Battery Compartment LCD Screen Power Button Hold Button Body Sensor Dual Range Measures from 0~999ppm, with a resolution of 1 ppm. From 1,000 to 9,990ppm, the resolution is 10 ppm, indicated by
More informationSafety Life Cycle Model IEC61508 安全生命周期模型 -IEC61508
exida is a unique organization rich with Functional Safety and Control System Security support, products, services, experience, expertise, and an unending quest to exceed customer expectations. Fully integrated
More informationConcept: Traffic Flow. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig
Concept: Traffic Flow Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig 1 Passive measurement capabilities: Packet monitors Available data: All protocol information All content Possible analysis: Application
More informationHBase 在 hulu 的使用和实践. hulu
HBase 在 hulu 的使用和实践 张虔熙 @ hulu qianxi.zhang@hulu.com About hulu About me 张虔熙 ü 软件工程师 @Hulu 大数据平台组 ü 专注于分布式计算和存储技术 ü 热衷于参与开源社区贡献代码 üqianxi.zhang@hulu.com Agenda Overview Audience Platform( 用户画像系统 ) Auto
More informationMicrosemi - Leading Innovation for China s Hyperscale Data Centers
Power Matters. TM Microsemi - Leading Innovation for China s Hyperscale Data Centers Andrew Dieckmann Sr. Director, Scalable Storage Product Marketing 1 议程 China A Storage Growth Engine Data Center Storage
More informationDivision of Science and Technology
BNU-HKBU UNITED INTERNATIONAL COLLEGE UNDERGRADUATE HANDBOOK 2008 Division of Science and Technology Computer Science and Technology Programme Com puter Science and Technology Program m e Contents 1.
More informationCongestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制
Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 by Hannan-Bin-Liaqat (11117018) to School of Software in partial fulfillment of the requirements for the degree of Doctor of Philosophy
More information软件和支持订订 1.1 订阅单位定义 订阅服务费用以称为 单位 的计量标准为依据 下表 1.1 定义了用于计量贵方使用的软件订阅的数量的各种单位 在贵方购买行为所适用的订单中以及在附件中包含了各种软件订阅所适用的具体单位
PRODUCT APPENDIX 1 SOFTWARE AND SUPPORT SUBSCRIPTIONS 软件和支持订订 This Product Appendix (which includes Exhibits applicable to specific Red Hat Products) contains terms that describe the parameters and govern
More informationSoftware Engineering. Zheng Li( 李征 ) Jing Wan( 万静 )
Software Engineering Zheng Li( 李征 ) Jing Wan( 万静 ) 作业 Automatically test generation 1. 编写一个三角形程序, 任意输入三个整数, 判断三个整形边长能否构成三角形, 如果是三角形, 则判断它是一般三角形 等腰三角形或等边三角形, 并输出三角形的类型 2. 画出程序的 CFG, 计算圈复杂度 3. 设计一组测试用例满足测试准则
More information1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架
1. DWR 1.1 DWR 基础 1.1.1 概念 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 2 作用 使用 DWR, 可以直接在 html 网页中调用 Java 对象的方法 ( 通过 JS 和 Ajax) 3 基本原理主要技术基础是 :AJAX+ 反射 1) JS 通过 AJAX 发出请求, 目标地址为 /dwr/*, 被 DWRServlet(
More informationGreen Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD
www.lsdtech.co.kr Green Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD 2012. 09. 28 1. 公司介绍 LSD Tech Co., Ltd LSD Tech( 株 ) 以制造 SSD 服务器,
More informationPCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图
PCU50 的整盘备份 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 OS Loader V4.00 Please select the operating system to start: SINUMERIK Use and to move the highlight to your choice. Press Enter
More informationOperating Systems. Chapter 4 Threads. Lei Duan
Operating Systems Chapter 4 Threads Lei Duan leiduan@scu.edu.cn 2015.2 Agenda 4.1 Processes and Threads 4.2 Types of Threads 4.3 Multicore and Multithreading 4.4 Summary 2015-04-01 2/49 Agenda 4.1 Processes
More informationpublic static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host)
网络编程 杨亮 网络模型 访问 网络 Socket InetAddress 类 public static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host) public class OreillyByName
More informationWireless Presentation Pod
Wireless Presentation Pod WPP20 www.yealink.com Quick Start Guide (V10.1) Package Contents If you find anything missing, contact your system administrator. WPP20 Wireless Presentation Pod Quick Start Guide
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 3. Packet Switching Networks Network Layer Functions Virtual Circuit and Datagram Networks ATM and Cell Switching X.25 and Frame Relay Routing
More informationIEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic
IEL Newsletter 2016 年 10 月特刊 :2015 年 IEEE 期刊影响因子及相关评价指标情况概览 欢迎体验全新的 IEEE Xplore 数字图书馆 www.ieee.org/ieeexplore IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET
More informationBi-monthly report. Tianyi Luo
Bi-monthly report Tianyi Luo 1 Work done in this week Write a crawler plus based on keywords (Support Chinese and English) Modify a Sina weibo crawler (340M/day) Offline learning to rank module is completed
More informationLAB 5: S-parameter Simulation and Optimization
ADS Fundamentals - 2001 LAB 5: S-parameter Simulation and Optimization Overview - This exercise continues the amp_1900 design. It teaches how to setup, run, optimize and plot the results of various S-parameter
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 3. Packet Switching Networks Network Layer Functions Virtual Circuit and Datagram Networks ATM and Cell Switching X.25 and Frame Relay Routing
More informationDPDK Summit China 2017
DPDK Summit China 2017 Network Acceleration and Performance Improvement Lou, Fangliang ZTE Agenda 第一第二第三第四 Performance optimization concepts and methods Performance optimization crisis Software Performance
More informationOracle 一体化创新云技术 助力智慧政府信息化战略. Copyright* *2014*Oracle*and/or*its*affiliates.*All*rights*reserved.** *
Oracle 一体化创新云技术 助力智慧政府信息化战略 ?* x * Exadata Exadata* * * Exadata* InfiniBand 0Gbits/S 5?10 * Exadata* * Exadata& & Oracle exadata! " 4 " 240 12! "!! " " " Exadata* Exadata & Single?Instance*Database*
More informationIBM 开源技术微讲堂容器技术与微服务系列
IBM 开源技术微讲堂容器技术与微服务系列 第 二讲 容器管理 工具 Docker Swarm h.p://ibm.biz/opentech- ma 1 容器技术和微服务 系列公开课 每周四晚 8 点档 Docker 一种全新的 工作 方式 容器管理 工具 Docker Swarm 数据中 心操作系统的内核 Apache Mesos 大数据 Web 服务 CI/CD: 一个都不能少 深 入理解 Mesos
More information上海泛腾电子科技有限公司徐鹤军 上海张江高科技园区碧波路 500 号 306 室. Tel :
上海泛腾电子科技有限公司徐鹤军 15901848767 上海张江高科技园区碧波路 500 号 306 室 Tel : 5027-0385 Mission Statement FIVAL focus on design ready-for-production platform, help customer speed up time to market is our mission. Foresight
More information付敏跃. 浙江大学控制系 University of Newcastle, Australia
Nt Networked kdcontrol lsystems: Opportunities and Challenges 付敏跃 浙江大学控制系 University of Newcastle, Australia Outline Introductory Comments on Networked Control Systems Examples of Applications Wireless
More information基于项目信息类专业教育实验班本科培养计划 (2+2)
基于项目信息类专业教育实验班本科培养计划 (+) Undergraduate Program for Advanced Project-based Information Science Education (+) 一培养目标 Ⅰ. Program Objectives This program is designed in a unique learning-via-doing approach
More informationSmart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016
Smart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016 42 = Average Age of a Company According to Christensen, well-established companies are not capable of change in face
More informationBritannica Academic Online Edition 大不列顛百科全书网络学术版
Britannica Academic Online Edition 大不列顛百科全书网络学术版 The Complete Digital Resource Deep use of online resources 2013 The Complete Digital Resource High profile contributors Current content Collaborative content
More informationEqualLogic Best Practices for SQL Server Deployments
EqualLogic Best Practices for SQL Server Deployments 李光明 Goldman_Li@dell.com Storage Solution Specialist Dell Storage Forum: EqualLogic User Conference Xiamen, Jan 15-16, 2011 Notices & Disclaimers Copyright
More information云计算入门 Introduction to Cloud Computing GESC1001
Lecture #6 云计算入门 Introduction to Cloud Computing GESC1001 Philippe Fournier-Viger Professor School of Humanities and Social Sciences philfv8@yahoo.com Fall 2017 1 Introduction Last week: how cloud applications
More informationComputer Security and Cryptography
Computer Security and Cryptography CS381 来学嘉 计算机科学与工程系电院 3-423 室 34205440 1356 4100825 laix@sjtu.edu.cn 2015-05 Organization Week 1 to week 16 (2015-03 to 2014-06) 东中院 -3-102 Monday 3-4 节 ; week 9-16 Wednesday
More informationHK NATER TECH LIMITED
HK NATER TECH LIMITED WL-UM01WBS-7632 Specification Customer: Description: WL-UM01WBS-7632-V1.0 Customer P/N: Date: Customer Approve Auditing Admit Provider Approve Auditing Admit Customer: Add: Tel: Fax:
More informationSafe Memory-Leak Fixing for C Programs
Safe Memory-Leak Fixing for C Programs Qing Gao, Yingfei Xiong, Yaqing Mi, Lu Zhang, Weikun Yang, Zhaoing Zhou, Bing Xie, Hong Mei Institute of Software, Peking Unversity 内存管理 安全攸关软件的开发必然涉及内存管理问题 软件工程经典问题,
More informationNetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E
NetScreen 概念与范例 ScreenOS 参考指南 第 7 卷 : 虚拟系统 ScreenOS 5.0.0 编号 093-0930-000-SC 修订本 E Copyright Notice Copyright 2004 NetScreen Technologies, Inc. All rights reserved. NetScreen, NetScreen Technologies, GigaScreen,
More information