网络测量与行为学 网络测量与行为学概述. 程光 东南大学计算机科学与工程学院 CERNET 华东 ( 北 ) 地区网络中心江苏省计算机网络技术重点实验室

Size: px
Start display at page:

Download "网络测量与行为学 网络测量与行为学概述. 程光 东南大学计算机科学与工程学院 CERNET 华东 ( 北 ) 地区网络中心江苏省计算机网络技术重点实验室"

Transcription

1 网络测量与行为学 网络测量与行为学概述 程光 东南大学计算机科学与工程学院 CERNET 华东 ( 北 ) 地区网络中心江苏省计算机网络技术重点实验室

2 主讲教师简介 计算机工程系, 教授, 安徽黄山人 研究方向 : 网络测量 行为学和网络安全 目前主要研究项目 2009CB 基于自治治理模型的网络管理与安全研究 负责人, 国家 973 BK 下一代网络热点异常自适应抽样测量方法研究 负责人, 江苏省自然基金 高速网络活跃节点检测及其流量分类方法研究, 负责人, 国家自然基金项目 2008BAH37B04 可信任互联网 - 新一代可信任互联网安全和网络服务, 国家科技支撑计划, 子项目负责人 联系方式 gcheng@njnet.edu.cn

3 课程介绍 目标在增强学生在网络方向的研究能力, 开拓学生在网络研究领域的视野, 同时学生能够学习一些网络测量工具 流量仿真建模工具等 通过阅读该领域的论文, 学生学会如何定义一个研究问题 选择一个具体的研究方法, 并完成和网络行为相关的研究课题 主要参考书 互联网流测量, 程光, 东南大学出版社,

4 主要讲授内容 第一部分 : 网络测量与行为学概述, 讲授网络测量与行为学的发展状况和研究内容 第二部分 : 网络测量方法, 讲授抽样测量方法 流数和超点测量方法 重尾流测量 网络流量应用识别 流量匿名化算法 带宽测量方法 拓扑和时延测量方法 第三部分 : 行为分析方法, 讲授行为测度 自相似理论 网络流量测量建模 第四部分 : 行为学相关工具, 讲授相关的测量工具 NS-2 网络仿真器

5 网络测量 行为学主要会议 ACM Internet Measurement Conference (IMC) ACM SIGMETRICS/Performance Passive and Active Measurement ocnference: PAM Sigcomm Infocom

6 阅读文献方法 Context and Problem Statement: What problems are the authors trying to solve? Are they important problems? Why or why not? New Idea: What new architecture, algorithm, mechanism, methodology, or perspective are the authors proposing? How is the new idea different from all other ideas to solve the same problem?

7 阅读文献方法 ( 续 ) What to Evaluate? What, according to the authors, need to be evaluated to confirm the worthiness of their new idea? Runtime? Throughput? Cache miss ratio? Utilization? How to Evaluate? How did the authors go about conducting the evaluation? Did they prove theorems? Did they run simulations? Did they build a system? Did they collect traces from existing systems?

8 阅读文献方法 ( 续 ) Was the Evaluation Correct and Adequate? How was their data collection done? Do you agree with their analysis of the data? Do you agree with their conclusions about the data? Do you have new interpretation of their data? Can you suggest new ways to evaluate their idea? Limitations, Drawbacks, Extensions: Can you think of other aspects of their idea that need to be evaluated? Can you think of extensions or modifications to their idea to improve it? How would you evaluate your improvement? Can you apply their idea or method of evaluation to your own project?

9 What do we care about when we design networks? End to end behavior Reachability Performance in terms of delay, losses, throughput Security Stability/fault resilience of the end to end path System wide behavior Load distribution within a domain Stability/Robustness/Survivability Manageability Evolvability

10 Measurement Purpose Understand the traffic characteristics of existing networks Develop models of traffic for future networks Useful for simulations, planning studies

11 Requirements Network measurement requires hardware or software measurement facilities that attach directly to network Allows us to observe all packet traffic on the network, or to filter it to collect only the traffic of interest Assumes broadcast-based network technology, superuser permission

12 What are we measuring? What is the Internet? Large scale distributed networked computer system What does the Internet look like? Properties of interest Traffic (demand) Infrastructure Applications Performance

13 Traffic Link/network/transport layer? Packet/Byte/Flow Level? Per Flow vs. Per Aggregate? Distributions by applications FTP, HTTP, Peer2peer Fan out: flow level measurements from specific network? source/destination address? AS? Temporal variability (time of day?) Spatial variability Important prefixes? Popular servers? Traffic anomalies How to detect them? How to define normal/ abnormal?

14 Infrastructure All aspects of the physical structure of the network Network topology Connectivity graph: how are basic entities connected? Infer AS hierarchy/relationships? Characteristics of the Infrastructure Links (optical, electrical, wireless): signal strength, bit/block/packet error rate, collision detection Routers: CPU load, buffer length, etc. Switches: buffering, switching speed, collision detection, contention resolution

15 Infrastructure ( 续 ) Control plane: Intra & Inter Domain Routing Link failure characteristics Routes/paths taken IGP/BGP convergence Peering policies

16 Applications Key characteristics/behavior of applications worth measuring Applications Web Video Streaming P2P Network Games Online social network sites Properties User workload models (join/leave) Application demands (bandwidth, etc) Performance characteristics

17 Performance Network operational characteristics or performance Throughput Available bandwidth; bottleneck bandwidth Latency Jitter Losses

18 Measurement Tools Can be classified into hardware and software measurement tools Hardware: specialized equipment Examples: HP 4972 LAN Analyzer, DataGeneral Network Sniffer, others... Software: special software tools Examples: tcpdump, xtr, SNMP, others... Nmap, wireshark

19 Measurement Tools (Cont d) Measurement tools can also be classified as intrusive or nonintrusive Intrusive: the monitoring tool generates traffic of its own during data collection Non-intrusive: the monitoring tool is passive, observing and recording traffic info, while generating none of its own

20 Measurement Tools (Cont d) Measurement tools can also be classified as real-time or non-real-time Real-time: collects traffic data as it happens, and may even be able to display traffic info as it happens Non-real-time: collected traffic data may only be a subset (sample) of the total traffic, and is analyzed off-line (later)

21 Potential Uses of Tools Protocol debugging Network debugging and troubleshooting Changing network configuration Designing, testing new protocols Designing, testing new applications Detecting network weirdness: broadcast storms, routing loops, etc.

22 Potential Uses of Tools (Cont d) Performance evaluation of protocols and applications How protocol/application is being used How well it works How to design it better

23 Potential Uses of Tools (Cont d) Workload characterization What traffic is generated Packet size distribution Packet arrival process Burstiness Important in the design of networks, applications, interconnection devices, congestion control algorithms, etc.

24 Potential Uses of Tools (Cont d) Workload modeling Construct synthetic workload models that concisely capture the salient characteristics of actual network traffic Use as representative, reproducible, flexible, controllable workload models for simulations, capacity planning studies, etc.

25 Measurement Environments Local Area Networks (LAN s) e.g., Ethernet LANs Wide Area Networks (WAN s) e.g., the Internet

26 Summary of Measurement Results The following represents synopsis of the Top 10 Observations from network measurement and monitoring research in the last 10 years Not an exhaustive list, but hits most of the highlights

27 What are the Challenges Large volume of measurement data Challenges in storing and processing data Privacy issues Difficulty in getting accurate of timestamps Offset, skew, resolution Sticky statistical properties Heavy tails Non stationary Insufficient/incomplete information for accurate inferences

28 Observation #1 The traffic model that we use is extremely important in the performance evaluation of routing, flow control, and congestion control strategies Have to consider application-dependent, protocol-dependent, and networkdependent characteristics The more realistic, the better (GIGO)

29 Observation #2 Characterizing aggregate network traffic is difficult Lots of (diverse) applications Just a snapshot: traffic mix, protocols, applications, network configuration, technology, and users change with time

30 Observation #3 Packet arrival process is not Poisson Packets travel in trains Packets travel in tandems Packets get clumped together (ack compression) Interarrival times are not exponential Interarrival times are not independent

31 Observation #4 Packet traffic is bursty Average utilization may be very low Peak utilization can be very high Depends on what interval you use!! Traffic may be self-similar: bursts exist across a wide range of time scales Defining burstiness (precisely) is difficult

32 Observation #5 Traffic is non-uniformly distributed amongst the hosts on the network Example: 10% of the hosts account for 90% of the traffic (or 20-80) Why? Clients versus servers, geographic reasons, popular ftp sites, web sites, etc.

33 Observation #6 Network traffic exhibits locality effects Pattern is far from random Temporal locality Spatial locality Persistence and concentration True at host level, at gateway level, at application level

34 Observation #7 Well over 80% of the byte and packet traffic on most networks is TCP/IP By far the most prevalent Often as high as 95-99% Most studies focus only on TCP/IP for this reason (as they should!)

35 Observation #8 Most conversations are short Example: 90% of bulk data transfers send less than 10 kilobytes of data Example: 50% of interactive connections last less than 90 seconds Distributions may be heavy tailed (i.e., extreme values may skew the mean and/or the distribution)

36 Observation #9 Traffic is bidirectional Data usually flows both ways Not JUST acks in the reverse direction Usually asymmetric bandwidth though Pretty much what you would expect from the TCP/IP traffic for most applications

37 Observation #10 Packet size distribution is bimodal Lots of small packets for interactive traffic and acknowledgements Lots of large packets for bulk data file transfer type applications Very few in between sizes

38 Why is Traffic Measurement Important? Billing the customer Measure usage on links to/from customers Applying billing model to generate a bill Traffic engineering and capacity planning Measure the traffic matrix (i.e., offered load) Tune routing protocol or add new capacity Denial-of-service attack detection Identify anomalies in the traffic Configure routers to block the offending traffic Analyze application-level issues Evaluate benefits of deploying a Web caching proxy Quantify fraction of traffic that is P2P file sharing

39 Applications of Measurements Traffic Engineering: Tune routing protocol parameters to control traffic flow through the network. Network Troubleshooting: Locate and diagnose network performance (or reachability) problems Anomaly Detection Feasibility Study of New Ideas: Measurement can help evaluate the performance of new applications and pinpoint enhancement possibilities

40 Collecting Traffic Data: SNMP Simple Network Management Protocol Standard Management Information Base (MIB) Protocol for querying the MIBs Advantage: ubiquitous Supported on all networking equipment Multiple products for polling and analyzing data Disadvantages: dumb Coarse granularity of the measurement data E.g., number of byte/packet per interface per 5 minutes Cannot express complex queries on the data Unreliable delivery of the data using UDP

41 Collecting Traffic Data: Packet Monitoring Packet monitoring Passively collecting IP packets on a link Recording IP, TCP/UDP, or application-layer traces Advantages: details Fine-grain timing information E.g., can analyze the burstiness of the traffic Fine-grain packet contents Addresses, port numbers, TCP flags, URLs, etc. Disadvantages: overhead Hard to keep up with high-speed links Often requires a separate monitoring device

42 Collecting Traffic Data: Flow Statistics Flow monitoring (e.g., Cisco Netflow) Statistics about groups of related packets (e.g., same IP/TCP headers and close in time) Recording header information, counts, and time Advantages: detail with less overhead Almost as good as packet monitoring, except no fine-grain timing information or packet contents Often implemented directly on the interface card Disadvantages: trade-off detail and overhead Less detail than packet monitoring Less ubiquitous than SNMP statistics

43 Using the Traffic Data in Network Operations SNMP byte/packet counts: everywhere Tracking link utilizations and detecting anomalies Generating bills for traffic on customer links Inference of the offered load (i.e., traffic matrix) Packet monitoring: selected locations Analyzing the small time-scale behavior of traffic Troubleshooting specific problems on demand Flow monitoring: selective, e.g,. network edge Tracking the application mix Direct computation of the traffic matrix Input to denial-of-service attack detection

44 Flow Measurement: Outline Definition Passively collecting statistics about groups of packets Group packets based on headers and spacing in time Essentially a way to aggregate packet measurement data Scope Medium-grain information about user behavior Passively monitoring the link or the interface/router Helpful in characterizing, detecting, diagnosing, and fixing Outline Definition of an IP flow (sequence of related packets) Flow measurement data and its applications Mechanics of collecting flow-level measurements Reducing the overheads of flow-level measurement

45 IP Flows flow 1 flow 2 flow 3 flow 4 Set of packets that belong together Source/destination IP addresses and port numbers Same protocol, ToS bits, Same input/output interfaces at a router (if known) Packets that are close together in time Maximum spacing between packets (e.g., 15 sec, 30 sec) Example: flows 2 and 4 are different flows due to time

46 Flow Abstraction A flow is not exactly the same as a session Sequence of related packets may be multiple flows (due to the close together in time requirement) Sequence of related packets may not follow the same links (due to changes in IP routing) A session is difficult to measure from inside the network Motivation for this abstraction As close to a session as possible from inside the network Flow switching paradigm from IP-over-ATM technology Router optimization for forwarding/access-control decisions (cache the result after the first packet in a flow) might as well throw in a few counters

47 Recording Traffic Statistics (e.g., Netflow) Packet header information (same for every packet) Source and destination IP addresses Source and destination TCP/UDP port numbers Other IP & TCP/UDP header fields (protocol, ToS bits, etc.) Aggregate traffic information (summary of the traffic) Start and finish time of the flow (time of first & last packet) Total number of bytes and number of packets in the flow TCP flags (e.g., logical OR over the sequence of packets) SYN ACK ACK FIN 4 packets 1436 bytes SYN, ACK, & FIN start finish

48 Recording Routing Info (e.g., Netflow) Input and output interfaces Input interface is where the packets entered the router Output interface is the next hop in the forwarding table Source and destination IP prefix (mask length) Longest prefix match on the src and dest IP addresses Source and destination autonomous system numbers Origin AS for src/dest prefix in the BGP routing table forwarding table Processor BGP table Line card Line card Line card Switching Fabric Line card Line card Line card

49 Measuring Traffic as it Flows By source dest input output source prefix source AS intermediate AS dest prefix dest AS Source and destination: IP header Source and dest prefix: forwarding table or BGP table Source and destination AS: BGP table

50 Packet vs. Flow Measurement Basic statistics (available from both techniques) Traffic mix by IP addresses, port numbers, and protocol Average packet size Traffic over time Both: traffic volumes on a medium-to-large time scale Packet: burstiness of the traffic on a small time scale Statistics per TCP connection Both: number of packets & bytes transferred over the link Packet: frequency of lost or out-of-order packets, and the number of application-level bytes delivered Per-packet info (available only from packet traces) TCP seq/ack #s, receiver window, per-packet flags, Probability distribution of packet sizes Application-level header and body (full packet contents)

51 Collecting Flow Measurements Route CPU that generates flow records may degrade forwarding performance CPU Router A Line card that generates flow records Router A more efficient to support measurement in each line card Packet monitor that generates flow records Router A Router B third party Monitor

52 Router Collecting Flow Measurement Advantage No need for separate measurement device(s) Monitor traffic over all links in/out of router (parallelism) Ease of providing routing information for each flow Disadvantage Requirement for support in the router product(s) Danger of competing with other 1 st -order router features Possible degradation of the throughput of the router Difficulty of online analysis/aggregation of data on router Practical application View from multiple vantage points (e.g., all edge links)

53 Packet Monitor Collecting Flow Records Advantages No performance impact on packet forwarding No dependence on support by router vendor Possibility of customizing the thinning of the data Disadvantages Overhead/cost of tapping a link & reconstructing packets Cost of buying, deploying, and managing extra equipment No access to routing info (input/output link, IP prefix, etc.) Practical application Selective monitoring of a small number of links Deployment in front of particular services or sites Packet monitor vendors support flow-level output

54 Mechanics: Flow Cache Maintain a cache of active flows Storage of byte/packet counts, timestamps, etc. Compute a key per incoming packet Concatenation of source, destination, port #s, etc. Index into the flow cache based on the key Creation or updating of an entry in the flow cache key #bytes, #packets, start, finish header key packet key #bytes, #packets, start, finish

55 Mechanics: Evicting Cache Entries Flow timeout Remove flows that have not received a packet recently Periodic sequencing through the cache to time out flows New packet triggers the creation of a new flow Cache replacement Remove flow(s) when the flow cache is full Evict existing flow(s) upon creating a new cache entry Apply eviction policy (LRU, random flow, etc.) Long-lived flows Remove flow(s) that persist for a long time (e.g., 30 min) otherwise flow statistics don t become available and the byte and packet counters might overflow

56 Sampling: Packet Sampling Packet sampling before flow creation (Sampled Netflow) 1-out-of-m sampling of individual packets (e.g., m=100) Create of flow records over the sampled packets Reducing overhead Avoid per-packet overhead on (m-1)/m packets Avoid creating records for a large number of small flows Increasing overhead (in some cases) May split some long transfers into multiple flow records due to larger time gaps between successive packets not sampled time timeout two flows

57 Flow measurement Advantages and Disadvantages Flow measurement Medium-grain view of traffic on one or more links Advantages Lower measurement volume than full packet traces Available on high-end line cards (Cisco Netflow) Control over overhead via aggregation and sampling Disadvantages Computation and memory requirements for the flow cache Loss of fine-grain timing and per-packet information Not uniformly supported by router vendors

58 Useful Links Academic conferences dedicated to Internet Measurements ACM Internet Measurement Conference (IMC) ACM SIGMETRICS Performance Analysis Passive and Active Measurement Workshop (PAM) IETF Working groups IPPM: IP Performance Metrics RMON: Remote Monitoring

59 Important Projects Internet Routing Registry (IRR) and Routing Assets Database (RADb) ARIN, RIPE, APNIC, LACNIC, AfrNIC CAIDA the Cooperative Association for Internet Data Analysis (aff. U. C. San Diego) IPMON NLANR Moat - Measurement and Network Analysis Group (aff. U. C. San Diego) NIMI National Internet Measurement Infrastructure SLAC Tutorial on Internet Monitoring & PingER IEPM Internet End to end Performance Monitoring

60 总结 如何阅读文献 为什么测量 测量数据

计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology

计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology 计算机科学与技术学院 计算机科学与技术学院下设 6 个研究所 : 计算科学理论研究所 数据工程研究所 并行分布式计算研究所 数据存储研究所 数字媒体研究所 信息安全研究所 ;2 个中心 : 嵌入式软件与系统工程中心和教学中心 外存储系统国家专业实验室 教育部信息存储系统重点实验室 中国教育科研网格主结点 国家高性能计算中心 ( 武汉 ) 服务计算技术与系统教育部重点实验室 湖北省数据库工程技术研究中心

More information

A Benchmark For Stroke Extraction of Chinese Characters

A Benchmark For Stroke Extraction of Chinese Characters 2015-09-29 13:04:51 http://www.cnki.net/kcms/detail/11.2442.n.20150929.1304.006.html 北京大学学报 ( 自然科学版 ) Acta Scientiarum Naturalium Universitatis Pekinensis doi: 10.13209/j.0479-8023.2016.025 A Benchmark

More information

实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程

实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 实验三十三 DEIGRP 的配置 一 实验目的 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 二 应用环境 由于 RIP 协议的诸多问题, 神州数码开发了与 EIGRP 完全兼容的 DEIGRP, 支持变长子网 掩码 路由选择参考更多因素, 如带宽等等 三 实验设备 1. DCR-1751 三台 2. CR-V35FC 一条 3. CR-V35MT 一条 四 实验拓扑

More information

如何查看 Cache Engine 缓存中有哪些网站 /URL

如何查看 Cache Engine 缓存中有哪些网站 /URL 如何查看 Cache Engine 缓存中有哪些网站 /URL 目录 简介 硬件与软件版本 处理日志 验证配置 相关信息 简介 本文解释如何设置处理日志记录什么网站 /URL 在 Cache Engine 被缓存 硬件与软件版本 使用这些硬件和软件版本, 此配置开发并且测试了 : Hardware:Cisco 缓存引擎 500 系列和 73xx 软件 :Cisco Cache 软件版本 2.3.0

More information

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet 前 4 个字节都是一样的 0 8 16 31 类型代码检验和 ( 这 4 个字节取决于 ICMP 报文的类型 ) ICMP 的数据部分 ( 长度取决于类型 ) ICMP 报文 首部 数据部分 IP 数据报 ICMP: Internet Control Message

More information

Machine Vision Market Analysis of 2015 Isabel Yang

Machine Vision Market Analysis of 2015 Isabel Yang Machine Vision Market Analysis of 2015 Isabel Yang CHINA Machine Vision Union Content 1 1.Machine Vision Market Analysis of 2015 Revenue of Machine Vision Industry in China 4,000 3,500 2012-2015 (Unit:

More information

智能终端与物联网应用 课程建设与实践. 邝坚 嵌入式系统与网络通信研究中心北京邮电大学计算机学院

智能终端与物联网应用 课程建设与实践. 邝坚 嵌入式系统与网络通信研究中心北京邮电大学计算机学院 智能终端与物联网应用 课程建设与实践 邝坚 jkuang@bupt.edu.cn 嵌入式系统与网络通信研究中心北京邮电大学计算机学院 定位 移动互联网 服务 安 理解 云计算 服务计算 可信 全 交换感知 嵌入式计算 计算 现状与趋势 p 移动互联网发展迅猛 第 27 次中国互联网络发展状况统计报告 (CNNIC) 指出截至 2010 年 12 月, 中国互联网用户数已达到 4.57 亿, 其中移动互联网网民数已达

More information

Triangle - Delaunay Triangulator

Triangle - Delaunay Triangulator Triangle - Delaunay Triangulator eryar@163.com Abstract. Triangle is a 2D quality mesh generator and Delaunay triangulator. Triangle was created as part of the Quake project in the school of Computer Science

More information

Understanding IO patterns of SSDs

Understanding IO patterns of SSDs 固态硬盘 I/O 特性测试 周大 众所周知, 固态硬盘是一种由闪存作为存储介质的数据库存储设备 由于闪存和磁盘之间物理特性的巨大差异, 现有的各种软件系统无法直接使用闪存芯片 为了提供对现有软件系统的支持, 往往在闪存之上添加一个闪存转换层来实现此目的 固态硬盘就是在闪存上附加了闪存转换层从而提供和磁盘相同的访问接口的存储设备 一方面, 闪存本身具有独特的访问特性 另外一方面, 闪存转换层内置大量的算法来实现闪存和磁盘访问接口之间的转换

More information

IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic Library)

IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic Library) IEL Newsletter 2013 年 12 月特刊 :2012 年 IEEE 期刊影响因子及相关评价指标情况概览 欢迎体验全新的 IEEE Xplore 数字图书馆 www.ieee.org/ieeexplore IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET

More information

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 RemoteFX 中新的 USB 重定向特性 在 RDS 中所有设备重定向机制 VDI 部署场景讨论 : 瘦客户端和胖客户端 (Thin&Rich). 用户体验 : 演示使用新的 USB 重定向功能 81% 4 本地和远程的一致的体验 (Close

More information

OTAD Application Note

OTAD Application Note OTAD Application Note Document Title: OTAD Application Note Version: 1.0 Date: 2011-08-30 Status: Document Control ID: Release _OTAD_Application_Note_CN_V1.0 Copyright Shanghai SIMCom Wireless Solutions

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 4. Internetworking The Internet Protocol IP Address ARP and DHCP ICMP IPv6 Mobile IP Internet Routing IP Multicasting Multiprotocol Label Switching

More information

VLDB Database School (China) VLDB 中国数据库学院

VLDB Database School (China) VLDB 中国数据库学院 VLDB Database School (China) VLDB 中国数据库学院 2012 Summer School 2012 年暑期学校 July 23 July 27, 2012 2012 年 7 月 23 日 7 月 27 日 Kunming, China 中国 昆明 VLDB Database School (China) School of Information Science and

More information

计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇

计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇 计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法 授课老师 : 王浩宇 haoyuwang@bupt.edu.cn 1 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned

More information

第二小题 : 逻辑隔离 (10 分 ) OpenFlow Switch1 (PC-A/Netfpga) OpenFlow Switch2 (PC-B/Netfpga) ServerB PC-2. Switching Hub

第二小题 : 逻辑隔离 (10 分 ) OpenFlow Switch1 (PC-A/Netfpga) OpenFlow Switch2 (PC-B/Netfpga) ServerB PC-2. Switching Hub 第二小题 : 逻辑隔离 (10 分 ) 一 实验背景云平台服务器上的不同虚拟服务器, 分属于不同的用户 用户远程登录自己的虚拟服务器之后, 安全上不允许直接访问同一局域网的其他虚拟服务器 二 实验目的搭建简单网络, 通过逻辑隔离的方法, 实现用户能远程登录局域网内自己的虚拟内服务器, 同时不允许直接访问同一局域网的其他虚拟服务器 三 实验环境搭建如图 1-1 所示, 我们会创建一个基于 OpenFlow

More information

大数据基准测试 : 原理 方法和应用. 詹剑锋 中国科学院计算技术研究所中国科学院大学 可信云服务大会, 北京 INSTITUTE OF COMPUTING TECHNOLOGY

大数据基准测试 : 原理 方法和应用. 詹剑锋   中国科学院计算技术研究所中国科学院大学 可信云服务大会, 北京 INSTITUTE OF COMPUTING TECHNOLOGY 大数据基准测试 : 原理 方法和应用 詹剑锋 http://prof.ict.ac.cn/bigdatabench 中国科学院计算技术研究所中国科学院大学 2015.7.31 2015 可信云服务大会, 北京 INSTITUTE OF COMPUTING TECHNOLOGY Outline 原理 方法 BigDataBench 计量的意义 科学和人类日常生活的基础 牛顿 ( 力 ) 开尔文 ( 温度

More information

Spark Standalone 模式应用程序开发 Spark 大数据博客 -

Spark Standalone 模式应用程序开发 Spark 大数据博客 - 在本博客的 Spark 快速入门指南 (Quick Start Spark) 文章中简单地介绍了如何通过 Spark s hell 来快速地运用 API 本文将介绍如何快速地利用 Spark 提供的 API 开发 Standalone 模式的应用程序 Spark 支持三种程序语言的开发 :Scala ( 利用 SBT 进行编译 ), Java ( 利用 Maven 进行编译 ) 以及 Python

More information

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容 Content 内容 A1 A2 A3 A4 A5 A6 A7 A8 A9 Login via ICTI CARE Website 通过 ICTI 关爱网站登录 Completing the Application Form 填写申请表 Application Form Created 创建的申请表 Receive Acknowledgement Email 接收确认电子邮件 Receive User

More information

Logitech G302 Daedalus Prime Setup Guide 设置指南

Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Contents / 目录 English................. 3 简体中文................. 6 2 Logitech G302 Daedalus Prime 1 On 2 USB Your Daedalus Prime

More information

操作系统原理与设计. 第 13 章 IO Systems(IO 管理 ) 陈香兰 2009 年 09 月 01 日 中国科学技术大学计算机学院

操作系统原理与设计. 第 13 章 IO Systems(IO 管理 ) 陈香兰 2009 年 09 月 01 日 中国科学技术大学计算机学院 第 13 章 IO Systems(IO 管理 ) 中国科学技术大学计算机学院 2009 年 09 月 01 日 提纲 I/O Hardware 1 I/O Hardware Polling Interrupts Direct Memory Access (DMA) I/O hardware summary 2 Block and Character Devices Network Devices

More information

H3C CAS 虚拟机支持的操作系统列表. Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知

H3C CAS 虚拟机支持的操作系统列表. Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知 H3C CAS 虚拟机支持的操作系统列表 Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知 目录 1 Windows 1 2 Linux 1 2.1 CentOS 1 2.2 Fedora 2 2.3 RedHat Enterprise

More information

本科专业人才培养计划 信息学科大类分册 华中科技大学教务处 二 O 一五年七月

本科专业人才培养计划 信息学科大类分册 华中科技大学教务处 二 O 一五年七月 本科专业人才培养计划 信息学科大类分册 华中科技大学教务处 二 O 一五年七月 目 录 1 2 15 *24 ACM 35 44 53 54 63 71 81 91 99 110 121 130 131 143 *157 166 174 175 189 202 212 2+2 224 232 245 250 251 注 : 带 * 者不属于信息学科大类专业 1 计算机科学与技术学院 计算机科学与技术学院下设

More information

Silverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司

Silverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司 Silverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司 business opportunity 越来越丰富 MTV.COM (1996) CSS FLASH 4.0 AJAX HTML 3.2 DHTML SSL 3.0 FLASH 1.0 REAL AUDIO HTML 1.0 MTV.COM (2008) Silverlight 概览 跨浏览器 IE, Safari,

More information

BlueCore BlueTunes Configuration Tool User Guide

BlueCore BlueTunes Configuration Tool User Guide BlueCore BlueTunes Configuration Tool User Guide Issue 1 CSR Cambridge Science Park Milton Road Cambridge CB4 0WH United Kingdom Registered in England 3665875 Tel.: +44 (0)1223 692000 Fax.: +44 (0)1223

More information

上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分

上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分 上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分 SGM IT < 上汽通用汽车供应商门户网站项目 (SGMSP)> 工作产品名称 :< User Guide 用户手册 > Current Version: Owner: < 曹昌晔 > Date Created:

More information

#MDCC Swift 链式语法应 用 陈乘

#MDCC Swift 链式语法应 用 陈乘 #MDCC 2016 Swift 链式语法应 用 陈乘 方 @ENJOY 关于我 Swift 开发者 ENJOY ios 客户端负责 人 两年年 Swift 实际项 目开发经验 微博 ID: webfrogs Twitter: nswebfrog Writing code is always easy, the hard part is reading it. 链式语法? 链式语法 可以连续不不断地进

More information

Multiprotocol Label Switching The future of IP Backbone Technology

Multiprotocol Label Switching The future of IP Backbone Technology Multiprotocol Label Switching The future of IP Backbone Technology Computer Network Architecture For Postgraduates Chen Zhenxiang School of Information Science and Technology. University of Jinan (c) Chen

More information

XML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中

XML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中 XML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中 We can format your materials to be read.. in print 印刷 XML Conversions online

More information

下一代互联网的发展 Next Generation Internet

下一代互联网的发展 Next Generation Internet 下一代互联网的发展 Next Generation Internet Technology and Future Development Beijing University of Posts and Telecommunications Sept. 2018 Agenda Internet around world Scale, Technology, Standardization and Applications

More information

China Next Generation Internet (CNGI) project and its impact. MA Yan Beijing University of Posts and Telecommunications 2009/08/06.

China Next Generation Internet (CNGI) project and its impact. MA Yan Beijing University of Posts and Telecommunications 2009/08/06. China Next Generation Internet (CNGI) project and its impact MA Yan Beijing University of Posts and Telecommunications 2009/08/06 Outline Next Generation Internet CNGI project in general CNGI-CERNET2 CERNET2

More information

Cyber Security Introduction

Cyber Security Introduction Cyber Security Introduction 2018.10.17 Huiping Sun( ) sunhp@ss.pku.edu.cn Course Overview 教师信息 sunhp@ss.pku.edu.cn https://huipingsun.github.io 1 1530E Course Overview 课程基本信息 14 17 (3204) 10 17 11 14 11

More information

Filters: E-Syn, Momentum, Transient and the DAC

Filters: E-Syn, Momentum, Transient and the DAC Topic 6: Filters: E-Syn, Momentum, Transient and the DAC ADS 2001 Fundamentals - Sept, 2001Slide 6-1 Using the E-Syn tool What does E-Syn do? It makes it easy to create FILTERS and Matching Networks. E-Syn

More information

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition Chapter 7: Deadlocks Silberschatz, Galvin and Gagne 2013 Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number

More information

梁永健. W K Leung. 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei

梁永健. W K Leung. 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei 梁永健 W K Leung 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei Network Threats ICT 移动化云计算社交化大数据 Mobile Cloud Social Big Data 网络威胁 APT Mobile threats Web threats Worms Trojans Botnet

More information

Measurements for Network Operations

Measurements for Network Operations Measurements for Network Operations Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ http://www.research.att.com/~jrex Part 1: Outline Introduction Role of measurement

More information

SESEC IV. China Cybersecurity. Standardization Monthly. Newsletter. June 2018

SESEC IV. China Cybersecurity. Standardization Monthly. Newsletter. June 2018 Author: Betty XU Distributed to: SESEC Partners, EU standardization stakeholders Date of issue: 19-07-2018 SESEC IV China Cybersecurity Standardization Monthly Newsletter Introduction of SESEC Project

More information

Web Science Security & Data Analytics

Web Science Security & Data Analytics Web Science Security & Data Analytics Wang Yang http://cse.seu.edu.cn/personalpage/wyang/ 东南大学网络空间安全学院江苏省网络技术重点实验室 Wang Yang 杨望 School of Cyber Security Security on Network infrastructure Network Security

More information

学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 : Latest update:

学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 :  Latest update: 学习沉淀成长分享 EIGRP 红茶三杯 ( 朱 SIR) 微博 :http://t.sina.com/vinsoney Latest update: 2012-06-01 课程目标 EIGRP 协议基础 EIGRP 基础配置 EIGRP 协议基础 EIGRP 的协议特点 EIGRP 的三张表 EIGRP 数据包 初始路由发现 EIGRP metric DUAL 算法 EIGRP 的协议特点 CISCO

More information

Technology: Anti-social Networking 科技 : 反社交网络

Technology: Anti-social Networking 科技 : 反社交网络 Technology: Anti-social Networking 科技 : 反社交网络 1 Technology: Anti-social Networking 科技 : 反社交网络 The Growth of Online Communities 社交网络使用的增长 Read the text below and do the activity that follows. 阅读下面的短文, 然后完成练习

More information

AvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide

AvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide 简介 我们通过使用烧录有 AvalonMiner 设备管理程序的树莓派作为控制器 使 用户能够通过控制器中管理程序的图形界面 来同时对多台 AvalonMiner 6.0 或 AvalonMiner 6.01 进行管理和调试 本教程将简要的说明 如何把 AvalonMiner

More information

Network Measurement. COS 461 Recita8on. h:p://

Network Measurement. COS 461 Recita8on. h:p:// Network Measurement COS 461 Recita8on h:p://www.cs.princeton.edu/courses/archive/spr14/cos461/ 2! Why Measure the Network? Scien8fic discovery Characterizing traffic, topology, performance Understanding

More information

IP unnumbered 实验讲义 一. 实验目的 : 二. 实验设备 : 三. 实验拓扑 : 四. 实验内容 :

IP unnumbered 实验讲义 一. 实验目的 : 二. 实验设备 : 三. 实验拓扑 : 四. 实验内容 : 一. 实验目的 : IP unnumbered 实验讲义 掌握 ip unnumbered 命令以及命令适用范围 二. 实验设备 : 2600 router*2,serial 相连 IOS (tm) C2600 Software (C2600-DO3S-M), Version 12.0(5)T1 三. 实验拓扑 : F0 S0 S0 F0 Router A Router B 四. 实验内容 : 基本配置

More information

IPv4/IPv6 协议 清华大学研究生课程

IPv4/IPv6 协议 清华大学研究生课程 IPv4/IPv6 协议 1 清华大学研究生课程 > Outline Protocol Background Technology Highlights Enhanced Capabilities Transition Issues Next Steps > What Ever Happened to IPv5? 0 IP March 1977

More information

[ 电子书 ]Spark for Data Science PDF 下载 Spark 大数据博客 -

[ 电子书 ]Spark for Data Science PDF 下载 Spark 大数据博客 - [ 电子书 ]Spark for Data Science PDF 下载 昨天分享了 [ 电子书 ]Apache Spark 2 for Beginners pdf 下载, 这本书很适合入门学习 Spark, 虽然书名上写着是 Apache Spark 2, 但是其内容介绍几乎和 Spark 2 毫无关系, 今天要分享的图书也是一本适合入门的 Spark 电子书, 也是 Packt 出版,2016

More information

嵌入式 Linux 中的文件系统 : 设计思想和工作原理

嵌入式 Linux 中的文件系统 : 设计思想和工作原理 嵌入式 Linux 中的文件系统 : 设计思想和工作原理 刘肖凡博士副教授东南大学计算机学院 2014.12 关于我 刘肖凡 东南大学计算机科学与工程学院副教授 计算机工程系副主任 香港理工大学电子及资讯工程学系学士 博士 3 年教授 操作系统原理 课程经验 研究方向 : 大数据 复杂网络 江苏省软件工程标准化委员会委员 中国计算机协会青年科技论坛南京分论坛学术委员 内容提要 文件系统概念回顾 主流嵌入式

More information

Outline. Motivations (1/3) Distributed File Systems. Motivations (3/3) Motivations (2/3)

Outline. Motivations (1/3) Distributed File Systems. Motivations (3/3) Motivations (2/3) Outline TFS: Tianwang File System -Performance Gain with Variable Chunk Size in GFS-like File Systems Authors: Zhifeng Yang, Qichen Tu, Kai Fan, Lei Zhu, Rishan Chen, Bo Peng Introduction (what s it all

More information

测试基础架构 演进之路. 茹炳晟 (Robin Ru) ebay 中国研发中心

测试基础架构 演进之路. 茹炳晟 (Robin Ru) ebay 中国研发中心 测试基础架构 演进之路 茹炳晟 (Robin Ru) ebay 中国研发中心 茹炳晟 (Robin Ru) 主要工作经历 : ebay 中国研发中心 -- 测试基础架构技术主管 Hewlett-Packard 惠普软件 ( 中国 ) 研发中心 -- 测试架构师 资深测试专家 Alcatel-Lucent 阿尔卡特朗讯 ( 上海 ) 研发中心 -- 测试技术主管 Cisco 思科 ( 中国 ) 研发中心

More information

SNMP Web Manager. User s Manual

SNMP Web Manager. User s Manual SNMP Web Manager User s Manual Table of Contents 1. Introduction... 2 2. SNMP Web Manager Install, Quick Start and Uninstall... 2 2.1. Software Installation... 3 2.2. Software Quick Start... 6 2.3. Software

More information

Apache Kafka 源码编译 Spark 大数据博客 -

Apache Kafka 源码编译 Spark 大数据博客 - 经过近一个月时间, 终于差不多将之前在 Flume 0.9.4 上面编写的 source sink 等插件迁移到 Flume-ng 1.5.0, 包括了将 Flume 0.9.4 上面的 TailSou rce TailDirSource 等插件的迁移 ( 当然, 我们加入了许多新的功能, 比如故障恢复 日志的断点续传 按块发送日志以及每个一定的时间轮询发送日志而不是等一个日志发送完才发送另外一个日志

More information

LAB 3: DC Simulations and Circuit Modeling

LAB 3: DC Simulations and Circuit Modeling ADS Fundamentals - 2001 LAB 3: DC Simulations and Circuit Modeling Overview - This chapter introduces the use of behavioral models to create a system such as a receiver. This lab will be the first step

More information

LAB 5: S-parameter Simulation and Optimization

LAB 5: S-parameter Simulation and Optimization ADS Fundamentals - 2001 LAB 5: S-parameter Simulation and Optimization Overview - This exercise continues the amp_1900 design. It teaches how to setup, run, optimize and plot the results of various S-parameter

More information

CHINA VISA APPLICATION CONCIERGE SERVICE*

CHINA VISA APPLICATION CONCIERGE SERVICE* TRAVEL VISA PRO ORDER FORM Call us for assistance 866-378-1722 Fax 866-511-7599 www.travelvisapro.com info@travelvisapro.com CHINA VISA APPLICATION CONCIERGE SERVICE* Travel Visa Pro will review your documents

More information

Chapter 1 (Part 2) Introduction to Operating System

Chapter 1 (Part 2) Introduction to Operating System Chapter 1 (Part 2) Introduction to Operating System 张竞慧办公室 : 计算机楼 366 室电邮 :jhzhang@seu.edu.cn 主页 :http://cse.seu.edu.cn/personalpage/zjh/ 电话 :025-52091017 1.1 Computer System Components 1. Hardware provides

More information

<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties>

<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties> SpringBoot 的基本操作 一 基本概念在 spring 没有出现的时候, 我们更多的是使用的 Spring,SpringMVC,Mybatis 等开发框架, 但是要将这些框架整合到 web 项目中需要做大量的配置,applicationContext.xml 以及 servlet- MVC.xml 文件等等, 但是这些文件还还不够, 还需要配置 web.xml 文件进行一系列的配置 以上操作是比较麻烦的,

More information

Chapter 11 SHANDONG UNIVERSITY 1

Chapter 11 SHANDONG UNIVERSITY 1 Chapter 11 File System Implementation ti SHANDONG UNIVERSITY 1 Contents File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and

More information

2. Introduction to Digital Media Format

2. Introduction to Digital Media Format Digital Asset Management 数字媒体资源管理 2. Introduction to Digital Media Format 任课 老师 : 张宏鑫 2014-09-30 Outline Image format and coding methods Audio format and coding methods Video format and coding methods

More information

Presentation Title. By Author The MathWorks, Inc. 1

Presentation Title. By Author The MathWorks, Inc. 1 Presentation Title By Author 2014 The MathWorks, Inc. 1 4G LTE 轻松入门 陈建平 MathWorks 中国 2014 The MathWorks, Inc. 2 大纲 4G 综述 LTE 系统工具箱的应用 黄金参考模型 点到点链路级仿真 信号发生和分析 信号信息恢复 4G 系统的并行仿真加速 3 无线标准的演化 * *Although ETSI

More information

IBM 开源技术微讲堂容器技术与微服务系列

IBM 开源技术微讲堂容器技术与微服务系列 IBM 开源技术微讲堂容器技术与微服务系列 第五讲 Kubernetes 简介 h,p://ibm.biz/opentech- ma 1 容器技术和微服务 系列公开课 每周四晚 8 点档 Docker 一种全新的 工作 方式 容器编排 工具 Docker Swarm 数据中 心操作系统的内核 Apache Mesos 大数据 Web 服务 CI/CD: 一个都不能少 深 入理解 Mesos 的资源调度及使

More information

TW5.0 如何使用 SSL 认证. 先使用 openssl 工具 1 生成 CA 私钥和自签名根证书 (1) 生成 CA 私钥 openssl genrsa -out ca-key.pem 1024

TW5.0 如何使用 SSL 认证. 先使用 openssl 工具 1 生成 CA 私钥和自签名根证书 (1) 生成 CA 私钥 openssl genrsa -out ca-key.pem 1024 TW5.0 如何使用 SSL 认证 先使用 openssl 工具 1 生成 CA 私钥和自签名根证书 (1) 生成 CA 私钥 openssl genrsa -out ca-key.pem 1024 Generating RSA private key, 1024 bit long modulus.++++++...++++++ e is 65537 (0x10001) (2) 生成待签名证书 openssl

More information

新一代 ODA X5-2 低调 奢华 有内涵

新一代 ODA X5-2 低调 奢华 有内涵 新一代 ODA X5-2 低调 奢华 有内涵 李昊首席销售顾问甲骨文公司系统事业部 内容预览 1 2 3 4 ODA 概述 ODA X5-2 新功能 / 特性介绍 ODA X5-2 市场定位 & 竞争分析总结 & 讨论 内容预览 1 2 3 4 ODA 概述 ODA X5-2 新功能 / 特性介绍 ODA X5-2 市场定位 & 竞争分析总结 & 讨论 什么是 ODA ODA: 五年四代, 稳中求变

More information

Declaration of Conformity STANDARD 100 by OEKO TEX

Declaration of Conformity STANDARD 100 by OEKO TEX Declaration of Conformity STANDARD 100 by OEKO TEX OEKO-TEX - International Association for Research and Testing in the Field of Textile and Leather Ecology OEKO-TEX - 国际纺织和皮革生态学研究和检测协会 Declaration of

More information

第 18 章网际协议 (2) IPv 年 10 月 26 日星期五

第 18 章网际协议 (2) IPv 年 10 月 26 日星期五 第 18 章网际协议 (2) IPv6 南京大学计算机系 黄皓教授 2007 年 10 月 26 日星期五 1. Introduction 1. Introduction Background of IPv6 The Internet is growing extremely rapidly. The latest Internet Domain Survey, conducted in January

More information

The Design and Optimization for the TDMA Network-on-Chip

The Design and Optimization for the TDMA Network-on-Chip 第 29 卷第 2 期 计算机辅助设计与图形学学报 Vol. 29 No.2 2017 年 2 月 Journal of Computer-Aided Design & Computer Graphics Feb. 2017 时分复用片上网络的设计与优化 许胜 1,2), 付斌章 1,2)*, 陈明宇 1,2) 1,2), 张立新 1) ( 中国科学院计算技术研究所计算机体系结构国家重点实验室北京

More information

Advanced Design System Fundamentals

Advanced Design System Fundamentals Advanced Design System - 2001 Fundamentals 3 days of intensive training - prerequisite for all other ADS courses. Course Part Number N3211A/B from Agilent EEsof EDA Customer Education E8900-90346 Instructor

More information

Virtual Memory Management for Main-Memory KV Database Using Solid State Disk *

Virtual Memory Management for Main-Memory KV Database Using Solid State Disk * ISSN 1673-9418 CODEN JKYTA8 E-mail: fcst@vip.163.com Journal of Frontiers of Computer Science and Technology http://www.ceaj.org 1673-9418/2011/05(08)-0686-09 Tel: +86-10-51616056 DOI: 10.3778/j.issn.1673-9418.2011.08.002

More information

TDS - 3. Battery Compartment. LCD Screen. Power Button. Hold Button. Body. Sensor. HM Digital, Inc.

TDS - 3. Battery Compartment. LCD Screen. Power Button. Hold Button. Body. Sensor. HM Digital, Inc. TDS - 3 Battery Compartment LCD Screen Power Button Hold Button Body Sensor Dual Range Measures from 0~999ppm, with a resolution of 1 ppm. From 1,000 to 9,990ppm, the resolution is 10 ppm, indicated by

More information

Safety Life Cycle Model IEC61508 安全生命周期模型 -IEC61508

Safety Life Cycle Model IEC61508 安全生命周期模型 -IEC61508 exida is a unique organization rich with Functional Safety and Control System Security support, products, services, experience, expertise, and an unending quest to exceed customer expectations. Fully integrated

More information

Concept: Traffic Flow. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig

Concept: Traffic Flow. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig Concept: Traffic Flow Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig 1 Passive measurement capabilities: Packet monitors Available data: All protocol information All content Possible analysis: Application

More information

HBase 在 hulu 的使用和实践. hulu

HBase 在 hulu 的使用和实践. hulu HBase 在 hulu 的使用和实践 张虔熙 @ hulu qianxi.zhang@hulu.com About hulu About me 张虔熙 ü 软件工程师 @Hulu 大数据平台组 ü 专注于分布式计算和存储技术 ü 热衷于参与开源社区贡献代码 üqianxi.zhang@hulu.com Agenda Overview Audience Platform( 用户画像系统 ) Auto

More information

Microsemi - Leading Innovation for China s Hyperscale Data Centers

Microsemi - Leading Innovation for China s Hyperscale Data Centers Power Matters. TM Microsemi - Leading Innovation for China s Hyperscale Data Centers Andrew Dieckmann Sr. Director, Scalable Storage Product Marketing 1 议程 China A Storage Growth Engine Data Center Storage

More information

Division of Science and Technology

Division of Science and Technology BNU-HKBU UNITED INTERNATIONAL COLLEGE UNDERGRADUATE HANDBOOK 2008 Division of Science and Technology Computer Science and Technology Programme Com puter Science and Technology Program m e Contents 1.

More information

Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制

Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 by Hannan-Bin-Liaqat (11117018) to School of Software in partial fulfillment of the requirements for the degree of Doctor of Philosophy

More information

软件和支持订订 1.1 订阅单位定义 订阅服务费用以称为 单位 的计量标准为依据 下表 1.1 定义了用于计量贵方使用的软件订阅的数量的各种单位 在贵方购买行为所适用的订单中以及在附件中包含了各种软件订阅所适用的具体单位

软件和支持订订 1.1 订阅单位定义 订阅服务费用以称为 单位 的计量标准为依据 下表 1.1 定义了用于计量贵方使用的软件订阅的数量的各种单位 在贵方购买行为所适用的订单中以及在附件中包含了各种软件订阅所适用的具体单位 PRODUCT APPENDIX 1 SOFTWARE AND SUPPORT SUBSCRIPTIONS 软件和支持订订 This Product Appendix (which includes Exhibits applicable to specific Red Hat Products) contains terms that describe the parameters and govern

More information

Software Engineering. Zheng Li( 李征 ) Jing Wan( 万静 )

Software Engineering. Zheng Li( 李征 ) Jing Wan( 万静 ) Software Engineering Zheng Li( 李征 ) Jing Wan( 万静 ) 作业 Automatically test generation 1. 编写一个三角形程序, 任意输入三个整数, 判断三个整形边长能否构成三角形, 如果是三角形, 则判断它是一般三角形 等腰三角形或等边三角形, 并输出三角形的类型 2. 画出程序的 CFG, 计算圈复杂度 3. 设计一组测试用例满足测试准则

More information

1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架

1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 1. DWR 1.1 DWR 基础 1.1.1 概念 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 2 作用 使用 DWR, 可以直接在 html 网页中调用 Java 对象的方法 ( 通过 JS 和 Ajax) 3 基本原理主要技术基础是 :AJAX+ 反射 1) JS 通过 AJAX 发出请求, 目标地址为 /dwr/*, 被 DWRServlet(

More information

Green Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD

Green Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD www.lsdtech.co.kr Green Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD 2012. 09. 28 1. 公司介绍 LSD Tech Co., Ltd LSD Tech( 株 ) 以制造 SSD 服务器,

More information

PCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图

PCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图 PCU50 的整盘备份 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 OS Loader V4.00 Please select the operating system to start: SINUMERIK Use and to move the highlight to your choice. Press Enter

More information

Operating Systems. Chapter 4 Threads. Lei Duan

Operating Systems. Chapter 4 Threads. Lei Duan Operating Systems Chapter 4 Threads Lei Duan leiduan@scu.edu.cn 2015.2 Agenda 4.1 Processes and Threads 4.2 Types of Threads 4.3 Multicore and Multithreading 4.4 Summary 2015-04-01 2/49 Agenda 4.1 Processes

More information

public static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host)

public static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host) 网络编程 杨亮 网络模型 访问 网络 Socket InetAddress 类 public static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host) public class OreillyByName

More information

Wireless Presentation Pod

Wireless Presentation Pod Wireless Presentation Pod WPP20 www.yealink.com Quick Start Guide (V10.1) Package Contents If you find anything missing, contact your system administrator. WPP20 Wireless Presentation Pod Quick Start Guide

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 3. Packet Switching Networks Network Layer Functions Virtual Circuit and Datagram Networks ATM and Cell Switching X.25 and Frame Relay Routing

More information

IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic

IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic IEL Newsletter 2016 年 10 月特刊 :2015 年 IEEE 期刊影响因子及相关评价指标情况概览 欢迎体验全新的 IEEE Xplore 数字图书馆 www.ieee.org/ieeexplore IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET

More information

Bi-monthly report. Tianyi Luo

Bi-monthly report. Tianyi Luo Bi-monthly report Tianyi Luo 1 Work done in this week Write a crawler plus based on keywords (Support Chinese and English) Modify a Sina weibo crawler (340M/day) Offline learning to rank module is completed

More information

LAB 5: S-parameter Simulation and Optimization

LAB 5: S-parameter Simulation and Optimization ADS Fundamentals - 2001 LAB 5: S-parameter Simulation and Optimization Overview - This exercise continues the amp_1900 design. It teaches how to setup, run, optimize and plot the results of various S-parameter

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 3. Packet Switching Networks Network Layer Functions Virtual Circuit and Datagram Networks ATM and Cell Switching X.25 and Frame Relay Routing

More information

DPDK Summit China 2017

DPDK Summit China 2017 DPDK Summit China 2017 Network Acceleration and Performance Improvement Lou, Fangliang ZTE Agenda 第一第二第三第四 Performance optimization concepts and methods Performance optimization crisis Software Performance

More information

Oracle 一体化创新云技术 助力智慧政府信息化战略. Copyright* *2014*Oracle*and/or*its*affiliates.*All*rights*reserved.** *

Oracle 一体化创新云技术 助力智慧政府信息化战略. Copyright* *2014*Oracle*and/or*its*affiliates.*All*rights*reserved.** * Oracle 一体化创新云技术 助力智慧政府信息化战略 ?* x * Exadata Exadata* * * Exadata* InfiniBand 0Gbits/S 5?10 * Exadata* * Exadata& & Oracle exadata! " 4 " 240 12! "!! " " " Exadata* Exadata & Single?Instance*Database*

More information

IBM 开源技术微讲堂容器技术与微服务系列

IBM 开源技术微讲堂容器技术与微服务系列 IBM 开源技术微讲堂容器技术与微服务系列 第 二讲 容器管理 工具 Docker Swarm h.p://ibm.biz/opentech- ma 1 容器技术和微服务 系列公开课 每周四晚 8 点档 Docker 一种全新的 工作 方式 容器管理 工具 Docker Swarm 数据中 心操作系统的内核 Apache Mesos 大数据 Web 服务 CI/CD: 一个都不能少 深 入理解 Mesos

More information

上海泛腾电子科技有限公司徐鹤军 上海张江高科技园区碧波路 500 号 306 室. Tel :

上海泛腾电子科技有限公司徐鹤军 上海张江高科技园区碧波路 500 号 306 室. Tel : 上海泛腾电子科技有限公司徐鹤军 15901848767 上海张江高科技园区碧波路 500 号 306 室 Tel : 5027-0385 Mission Statement FIVAL focus on design ready-for-production platform, help customer speed up time to market is our mission. Foresight

More information

付敏跃. 浙江大学控制系 University of Newcastle, Australia

付敏跃. 浙江大学控制系 University of Newcastle, Australia Nt Networked kdcontrol lsystems: Opportunities and Challenges 付敏跃 浙江大学控制系 University of Newcastle, Australia Outline Introductory Comments on Networked Control Systems Examples of Applications Wireless

More information

基于项目信息类专业教育实验班本科培养计划 (2+2)

基于项目信息类专业教育实验班本科培养计划 (2+2) 基于项目信息类专业教育实验班本科培养计划 (+) Undergraduate Program for Advanced Project-based Information Science Education (+) 一培养目标 Ⅰ. Program Objectives This program is designed in a unique learning-via-doing approach

More information

Smart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016

Smart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016 Smart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016 42 = Average Age of a Company According to Christensen, well-established companies are not capable of change in face

More information

Britannica Academic Online Edition 大不列顛百科全书网络学术版

Britannica Academic Online Edition 大不列顛百科全书网络学术版 Britannica Academic Online Edition 大不列顛百科全书网络学术版 The Complete Digital Resource Deep use of online resources 2013 The Complete Digital Resource High profile contributors Current content Collaborative content

More information

EqualLogic Best Practices for SQL Server Deployments

EqualLogic Best Practices for SQL Server Deployments EqualLogic Best Practices for SQL Server Deployments 李光明 Goldman_Li@dell.com Storage Solution Specialist Dell Storage Forum: EqualLogic User Conference Xiamen, Jan 15-16, 2011 Notices & Disclaimers Copyright

More information

云计算入门 Introduction to Cloud Computing GESC1001

云计算入门 Introduction to Cloud Computing GESC1001 Lecture #6 云计算入门 Introduction to Cloud Computing GESC1001 Philippe Fournier-Viger Professor School of Humanities and Social Sciences philfv8@yahoo.com Fall 2017 1 Introduction Last week: how cloud applications

More information

Computer Security and Cryptography

Computer Security and Cryptography Computer Security and Cryptography CS381 来学嘉 计算机科学与工程系电院 3-423 室 34205440 1356 4100825 laix@sjtu.edu.cn 2015-05 Organization Week 1 to week 16 (2015-03 to 2014-06) 东中院 -3-102 Monday 3-4 节 ; week 9-16 Wednesday

More information

HK NATER TECH LIMITED

HK NATER TECH LIMITED HK NATER TECH LIMITED WL-UM01WBS-7632 Specification Customer: Description: WL-UM01WBS-7632-V1.0 Customer P/N: Date: Customer Approve Auditing Admit Provider Approve Auditing Admit Customer: Add: Tel: Fax:

More information

Safe Memory-Leak Fixing for C Programs

Safe Memory-Leak Fixing for C Programs Safe Memory-Leak Fixing for C Programs Qing Gao, Yingfei Xiong, Yaqing Mi, Lu Zhang, Weikun Yang, Zhaoing Zhou, Bing Xie, Hong Mei Institute of Software, Peking Unversity 内存管理 安全攸关软件的开发必然涉及内存管理问题 软件工程经典问题,

More information

NetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E

NetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E NetScreen 概念与范例 ScreenOS 参考指南 第 7 卷 : 虚拟系统 ScreenOS 5.0.0 编号 093-0930-000-SC 修订本 E Copyright Notice Copyright 2004 NetScreen Technologies, Inc. All rights reserved. NetScreen, NetScreen Technologies, GigaScreen,

More information