rfc3856.A Presence Event Package for the Session Initiation Protocol (SIP)

rfc3856.A Presence Event Package for the Session Initiation Protocol (SIP)
rfc3856.A Presence Event Package for the Session Initiation Protocol (SIP)

Network Working Group J. Rosenberg Request for Comments: 3856 dynamicsoft Category: Standards Track August 2004 A Presence Event Package for the Session Initiation Protocol (SIP) Status of this Memo

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited. Copyright Notice

Copyright (C) The Internet Society (2004).

Abstract

This document describes the usage of the Session Initiation Protocol (SIP) for subscriptions and notifications of presence. Presence is

defined as the willingness and ability of a user to communicate with other users on the network. Historically, presence has been limited to "on-line" and "off-line" indicators; the notion of presence here

is broader. Subscriptions and notifications of presence are

supported by defining an event package within the general SIP event

notification framework. This protocol is also compliant with the

Common Presence Profile (CPP) framework.

Table of Contents

1. Introduction (2)

2. Terminology (3)

3. Definitions (3)

4. Overview of Operation (4)

5. Usage of Presence URIs (6)

6. Presence Event Package (7)

6.1. Package Name (8)

6.2. Event Package Parameters (8)

6.3. SUBSCRIBE Bodies (8)

6.4. Subscription Duration (9)

6.5. NOTIFY Bodies (9)

6.6. Notifier Processing of SUBSCRIBE Requests (9)

6.6.1. Authentication (10)

6.6.2. Authorization (10)

6.7. Notifier Generation of NOTIFY Requests (11)

Rosenberg Standards Track [Page 1]

6.8. Subscriber Processing of NOTIFY Requests (13)

6.9. Handling of Forked Requests (13)

6.10. Rate of Notifications (14)

6.11. State Agents (14)

6.11.1. Aggregation, Authentication, and Authorization. 14

6.11.2. Migration (15)

7. Learning Presence State (16)

7.1. Co-location (16)

7.2. REGISTER (16)

7.3. Uploading Presence Documents (17)

8. Example Message Flow (17)

9. Security Considerations (20)

9.1. Confidentiality (20)

9.2. Message Integrity and Authenticity (21)

9.3. Outbound Authentication (22)

9.4. Replay Prevention (22)

9.5. Denial of Service Attacks Against Third Parties (22)

9.6. Denial Of Service Attacks Against Servers (23)

10. IANA Considerations (23)

11. Contributors (24)

12. Acknowledgements (25)

13. Normative References (25)

14. Informative References (26)

15. Author’s Address (26)

16. Full Copyright Statement (27)

1. Introduction

Presence, also known as presence information, conveys the ability and willingness of a user to communicate across a set of devices. RFC

2778 [10] defines a model and terminology for describing systems that provide presence information. In that model, a presence service is a system that accepts, stores, and distributes presence information to interested parties, called watchers. A presence protocol is a

protocol for providing a presence service over the Internet or any IP network.

This document proposes the usage of the Session Initiation Protocol

(SIP) [1] as a presence protocol. This is accomplished through a

concrete instantiation of the general event notification framework

defined for SIP [2], and as such, makes use of the SUBSCRIBE and

NOTIFY methods defined there. Specifically, this document defines an event package, as described in RFC 3265 [2]. SIP is particularly

well suited as a presence protocol. SIP location services already

contain presence information, in the form of registrations.

Furthermore, SIP networks are capable of routing requests from any

user on the network to the server that holds the registration state

for a user. As this state is a key component of user presence, those Rosenberg Standards Track [Page 2]

SIP networks can allow SUBSCRIBE requests to be routed to the same

server. This means that SIP networks can be reused to establish

global connectivity for presence subscriptions and notifications.

This event package is based on the concept of a presence agent, which is a new logical entity that is capable of accepting subscriptions,

storing subscription state, and generating notifications when there

are changes in presence. The entity is defined as a logical one,

since it is generally co-resident with another entity.

This event package is also compliant with the Common Presence Profile (CPP) framework that has been defined in [3]. This allows SIP for

presence to easily interwork with other presence systems compliant to CPP.

2. Terminology

In this document, the key words "MUST", "MUST NOT", "REQUIRED",

"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",

and "OPTIONAL" are to be interpreted as described in RFC 2119 [4] and indicate requirement levels for compliant implementations.

3. Definitions

This document uses the terms as defined in RFC 2778 [10].

Additionally, the following terms are defined and/or additionally

clarified:

Presence User Agent (PUA): A Presence User Agent manipulates

presence information for a presentity. This manipulation can

be the side effect of some other action (such as sending a SIP REGISTER request to add a new Contact) or can be done

explicitly through the publication of presence documents. We

explicitly allow multiple PUAs per presentity. This means that a user can have many devices (such as a cell phone and Personal Digital Assistant (PDA)), each of which is independently

generating a component of the overall presence information for a presentity. PUAs push data into the presence system, but are outside of it, in that they do not receive SUBSCRIBE messages

or send NOTIFY messages.

Presence Agent (PA): A presence agent is a SIP user agent which is capable of receiving SUBSCRIBE requests, responding to them,

and generating notifications of changes in presence state. A

presence agent must have knowledge of the presence state of a

presentity. This means that it must have access to presence

data manipulated by PUAs for the presentity. One way to do

this is by co-locating the PA with the proxy/registrar. Rosenberg Standards Track [Page 3]

Another way is to co-locate it with the presence user agent of the presentity. However, these are not the only ways, and this specification makes no recommendations about where the PA

function should be located. A PA is always addressable with a SIP URI that uniquely identifies the presentity (i.e.,

sip:joe@https://www.360docs.net/doc/6b18623720.html,). There can be multiple PAs for a

particular presentity, each of which handles some subset of the total subscriptions currently active for the presentity. A PA is also a notifier (defined in RFC 3265 [2]) that supports the presence event package.

Presence Server: A presence server is a physical entity that can

act as either a presence agent or as a proxy server for

SUBSCRIBE requests. When acting as a PA, it is aware of the

presence information of the presentity through some protocol

means. When acting as a proxy, the SUBSCRIBE requests are

proxied to another entity that may act as a PA.

Edge Presence Server: An edge presence server is a presence agent that is co-located with a PUA. It is aware of the presence

information of the presentity because it is co-located with the entity that manipulates this presence information.

4. Overview of Operation

In this section, we present an overview of the operation of this

event package. The overview describes behavior that is documented in part here, in part within the SIP event framework [2], and in part in the SIP specification [1], in order to provide clarity on this

package for readers only casually familiar with those specifications. However, the detailed semantics of this package require the reader to be familiar with SIP events and the SIP specification itself.

When an entity, the subscriber, wishes to learn about presence

information from some user, it creates a SUBSCRIBE request. This

request identifies the desired presentity in the Request-URI, using a SIP URI, SIPS URI [1] or a presence (pres) URI [3]. The SUBSCRIBE

request is carried along SIP proxies as any other SIP request would

be. In most cases, it eventually arrives at a presence server, which can either generate a response to the request (in which case it acts as the presence agent for the presentity), or proxy it on to an edge presence server. If the edge presence server handles the

subscription, it is acting as the presence agent for the presentity. The decision at a presence server about whether to proxy or terminate the SUBSCRIBE is a local matter; however, we describe one way to

effect such a configuration, using REGISTER.

Rosenberg Standards Track [Page 4]

The presence agent (whether in the presence server or edge presence

server) first authenticates the subscription, then authorizes it.

The means for authorization are outside the scope of this protocol,

and we expect that many mechanisms will be used. If authorized, a

200 OK response is returned. If authorization could not be obtained at this time, the subscription is considered "pending", and a 202

response is returned. In both cases, the PA sends an immediate

NOTIFY message containing the state of the presentity and of the

subscription. The presentity state may be bogus in the case of a

pending subscription, indicating offline no matter what the actual

state of the presentity, for example. This is to protect the privacy of the presentity, who may not want to reveal that they have not

provided authorization for the subscriber. As the state of the

presentity changes, the PA generates NOTIFYs containing those state

changes to all subscribers with authorized subscriptions. Changes in the state of the subscription itself can also trigger NOTIFY

requests; that state is carried in the Subscription-State header

field of the NOTIFY, and would typically indicate whether the

subscription is active or pending.

The SUBSCRIBE message establishes a "dialog" with the presence agent.

A dialog is defined in RFC 3261 [1], and it represents the SIP state between a pair of entities to facilitate peer-to-peer message

exchanges. This state includes the sequence numbers for messages in both directions (SUBSCRIBE from the subscriber, NOTIFY from the

presence agent), in addition to a route set and remote target URI.

The route set is a list of SIP (or SIPS) URIs which identify SIP

proxy servers that are to be visited along the path of SUBSCRIBE

refreshes or NOTIFY requests. The remote target URI is the SIP or

SIPS URI that identifies the target of the message - the subscriber, in the case of NOTIFY, or the presence agent, in the case of a

SUBSCRIBE refresh.

SIP provides a procedure called record-routing that allows for proxy servers to request to be on the path of NOTIFY messages and SUBSCRIBE refreshes. This is accomplished by inserting a URI into the

Record-Route header field in the initial SUBSCRIBE request.

The subscription persists for a duration that is negotiated as part

of the initial SUBSCRIBE. The subscriber will need to refresh the

subscription before its expiration, if they wish to retain the

subscription. This is accomplished by sending a SUBSCRIBE refresh

within the same dialog established by the initial SUBSCRIBE. This

SUBSCRIBE is nearly identical to the initial one, but contains a tag in the To header field, a higher CSeq header field value, and

possibly a set of Route header field values that identify the path of proxies the request is to take.

Rosenberg Standards Track [Page 5]

The subscriber can terminate the subscription by sending a SUBSCRIBE, within the dialog, with an Expires header field (which indicates

duration of the subscription) value of zero. This causes an

immediate termination of the subscription. A NOTIFY request is then generated by the presence agent with the most recent state. In fact, behavior of the presence agent for handling a SUBSCRIBE request with Expires of zero is no different than for any other expiration value; pending or authorized SUBSCRIBE requests result in a triggered NOTIFY with the current presentity and subscription state.

The presence agent can terminate the subscription at any time. To do so, it sends a NOTIFY request with a Subscription-State header field indicating that the subscription has been terminated. A reason

parameter can be supplied which provides the reason.

It is also possible to fetch the current presence state, resulting in a one-time notification containing the current state. This is

accomplished by sending a SUBSCRIBE request with an immediate

expiration.

5. Usage of Presence URIs

A presentity is identified in the most general way through a presence URI [3], which is of the form pres:user@domain. These URIs are

resolved to protocol specific URIs, such as the SIP or SIPS URI,

through domain-specific mapping policies maintained on a server.

It is very possible that a user will have both a SIP (and/or SIPS)

URI and a pres URI to identify both themself and other users. This

leads to questions about how these URI relate and which are to be

used.

In some instances, a user starts with one URI format, such as the

pres URI, and learns a URI in a different format through some

protocol means. As an example, a SUBSCRIBE request sent to a pres

URI will result in learning a SIP or SIPS URI for the presentity from the Contact header field of the 200 OK to the SUBSCRIBE request. As another example, a DNS mechanism might be defined that would allow

lookup of a pres URI to obtain a SIP or SIPS URI. In cases where one URI is learned from another through protocol means, those means will often provide some kind of scoping that limit the lifetime of the

learned URI. DNS, for example, provides a TTL which would limit the scope of the URI. These scopes are very useful to avoid stale or

conflicting URIs for identifying the same resource. To ensure that a user can always determine whether a learned URI is still valid, it is RECOMMENDED that systems which provide lookup services for presence

URIs have some kind of scoping mechanism.

Rosenberg Standards Track [Page 6]

If a subscriber is only aware of the protocol-independent pres URI

for a presentity, it follows the procedures defined in [5]. These

procedures will result in the placement of the pres URI in the

Request-URI of the SIP request, followed by the usage of the DNS

procedures defined in [5] to determine the host to send the SIP

request to. Of course, a local outbound proxy may alternatively be

used, as specified in RFC 3261 [1]. If the subscriber is aware of

both the protocol-independent pres URI and the SIP or SIPS URI for

the same presentity, and both are valid (as discussed above) it

SHOULD use the pres URI format. Of course, if the subscriber only

knows the SIP URI for the presentity, that URI is used, and standard RFC 3261 processing will occur. When the pres URI is used, any

proxies along the path of the SUBSCRIBE request which do not

understand the URI scheme will reject the request. As such, it is

expected that many systems will be initially deployed that only

provide users with a SIP URI.

SUBSCRIBE messages also contain logical identifiers that define the

originator and recipient of the subscription (the To and From header fields). These headers can take either a pres or SIP URI. When the subscriber is aware of both a pres and SIP URI for its own identity, it SHOULD use the pres URI in the From header field. Similarly, when the subscriber is aware of both a pres and a SIP URI for the desired presentity, it SHOULD use the pres URI in the To header field.

The usage of the pres URI instead of the SIP URI within the SIP

message supports interoperability through gateways to other

CPP-compliant systems. It provides a protocol-independent form of

identification which can be passed between systems. Without such an identity, gateways would be forced to map SIP URIs into the

addressing format of other protocols. Generally, this is done by

converting the SIP URI to the form :@. This is commonly done in email systems, and has many known problems. The usage of the pres URI is a SHOULD, and not a MUST, to allow for cases where it is known that there are no

gateways present, or where the usage of the pres URI will cause

interoperability problems with SIP components that do not support the pres URI.

The Contact, Record-Route and Route fields do not identify logical

entities, but rather concrete ones used for SIP messaging. SIP [1]

specifies rules for their construction.

6. Presence Event Package

The SIP event framework [2] defines a SIP extension for subscribing

to, and receiving notifications of, events. It leaves the definition of many aspects of these events to concrete extensions, known as Rosenberg Standards Track [Page 7]

event packages. This document qualifies as an event package. This

section fills in the information required for all event packages by

RFC 3265 [2].

6.1. Package Name

The name of this package is "presence". As specified in RFC 3265

[2], this value appears in the Event header field present in

SUBSCRIBE and NOTIFY requests.

Example:

Event: presence

6.2. Event Package Parameters

The SIP event framework allows event packages to define additional

parameters carried in the Event header field. This package,

presence, does not define any additional parameters.

6.3. SUBSCRIBE Bodies

A SUBSCRIBE request MAY contain a body. The purpose of the body

depends on its type. Subscriptions will normally not contain bodies. The Request-URI, which identifies the presentity, combined with the

event package name, is sufficient for presence.

One type of body that can be included in a SUBSCRIBE request is a

filter document. These filters request that only certain presence

events generate notifications, or would ask for a restriction on the set of data returned in NOTIFY requests. For example, a presence

filter might specify that the notifications should only be generated when the status of the user’s instant inbox [10] changes. It might

also say that the content of these notifications should only contain the status of the instant inbox. Filter documents are not specified in this document, and at the time of writing, are expected to be the subject of future standardization activity.

Honoring of these filters is at the policy discretion of the PA.

If the SUBSCRIBE request does not contain a filter, this tells the PA that no filter is to be applied. The PA SHOULD send NOTIFY requests at the discretion of its own policy.

Rosenberg Standards Track [Page 8]

6.4. Subscription Duration

User presence changes as a result of many events. Some examples are: o Turning on and off of a cell phone

o Modifying the registration from a softphone

o Changing the status on an instant messaging tool

These events are usually triggered by human intervention, and occur

with a frequency on the order of seconds to hours. As such,

subscriptions should have an expiration in the middle of this range, which is roughly one hour. Therefore, the default expiration time

for subscriptions within this package is 3600 seconds. As per RFC

3265 [2], the subscriber MAY specify an alternate expiration in the

Expires header field.

6.5. NOTIFY Bodies

As described in RFC 3265 [2], the NOTIFY message will contain bodies that describe the state of the subscribed resource. This body is in a format listed in the Accept header field of the SUBSCRIBE, or a

package-specific default if the Accept header field was omitted from the SUBSCRIBE.

In this event package, the body of the notification contains a

presence document. This document describes the presence of the

presentity that was subscribed to. All subscribers and notifiers

MUST support the "application/pidf+xml" presence data format

described in [6]. The subscribe request MAY contain an Accept header field. If no such header field is present, it has a default value of "application/pidf+xml". If the header field is present, it MUST

include "application/pidf+xml", and MAY include any other types

capable of representing user presence.

6.6. Notifier Processing of SUBSCRIBE Requests

Based on the proxy routing procedures defined in the SIP

specification, the SUBSCRIBE request will arrive at a presence agent (PA). This subsection defines package-specific processing at the PA of a SUBSCRIBE request. General processing rules for requests are

covered in Section 8.2 of RFC 3261 [1], in addition to general

SUBSCRIBE processing in RFC 3265 [2].

Rosenberg Standards Track [Page 9]

User presence is highly sensitive information. Because the

implications of divulging presence information can be severe, strong requirements are imposed on the PA regarding subscription processing, especially related to authentication and authorization.

6.6.1. Authentication

A presence agent MUST authenticate all subscription requests. This

authentication can be done using any of the mechanisms defined in RFC 3261 [1]. Note that digest is mandatory to implement, as specified

in RFC 3261.

In single-domain systems, where the subscribers all have shared

secrets with the PA, the combination of digest authentication over

Transport Layer Security (TLS) [7] provides a secure and workable

solution for authentication. This use case is described in Section

26.3.2.1 of RFC 3261 [1].

In inter-domain scenarios, establishing an authenticated identity of the subscriber is harder. It is anticipated that authentication will often be established through transitive trust. SIP mechanisms for

network asserted identity can be applied to establish the identity of the subscriber [11].

A presentity MAY choose to represent itself with a SIPS URI. By

"represent itself", it means that the user represented by the

presentity hands out, on business cards, web pages, and so on, a SIPS URI for their presentity. The semantics associated with this URI, as described in RFC 3261 [1], require TLS usage on each hop between the subscriber and the server in the domain of the URI. This provides

additional assurances (but no absolute guarantees) that identity has been verified at each hop.

Another mechanism for authentication is S/MIME. Its usage with SIP

is described fully in RFC 3261 [1]. It provides an end-to-end

authentication mechanism that can be used for a PA to establish the

identity of the subscriber.

6.6.2. Authorization

Once authenticated, the PA makes an authorization decision. A PA

MUST NOT accept a subscription unless authorization has been provided by the presentity. The means by which authorization are provided are outside the scope of this document. Authorization may have been

provided ahead of time through access lists, perhaps specified in a

web page. Authorization may have been provided by means of uploading of some kind of standardized access control list document. Back end authorization servers, such as a DIAMETER [12] server, can also be Rosenberg Standards Track [Page 10]

used. It is also useful to be able to query the user for

authorization following the receipt of a subscription request for

which no authorization information has been provided. The

"watcherinfo" event template package for SIP [8] defines a means by

which a presentity can become aware that a user has attempted to

subscribe to it, so that it can then provide an authorization

decision.

Authorization decisions can be very complex. Ultimately, all

authorization decisions can be mapped into one of three states:

rejected, successful, and pending. Any subscription for which the

client is authorized to receive information about some subset of

presence state at some points in time is a successful subscription.

Any subscription for which the client will never receive any

information about any subset of the presence state is a rejected

subscription. Any subscription for which it is not yet known whether it is successful or rejected is pending. Generally, a pending

subscription occurs when the server cannot obtain authorization at

the time of the subscription, but may be able to do so at a later

time, perhaps when the presentity becomes available.

The appropriate response codes for conveying a successful, rejected, or pending subscription (200, 403 or 603, and 202, respectively) are described in RFC 3265 [2].

If the resource is not in a meaningful state, RFC 3265 [2] allows the body of the initial NOTIFY to be empty. In the case of presence,

that NOTIFY MAY contain a presence document. This document would

indicate whatever presence state the subscriber has been authorized

to see; it is interpreted by the subscriber as the current presence

state of the presentity. For pending subscriptions, the state of the presentity SHOULD include some kind of textual note that indicates a pending status.

Polite blocking, as described in [13], is possible by generating a

200 OK to the subscription even though it has been rejected (or

marked pending). Of course, an immediate NOTIFY will still be sent. The contents of the presence document in such a NOTIFY are at the

discretion of the implementor, but SHOULD be constructed in such a

way as to not reveal to the subscriber that their request has

actually been blocked. Typically, this is done by indicating

"offline" or equivalent status for a single contact address.

6.7. Notifier Generation of NOTIFY Requests

RFC 3265 details the formatting and structure of NOTIFY messages.

However, packages are mandated to provide detailed information on

when to send a NOTIFY, how to compute the state of the resource, how Rosenberg Standards Track [Page 11]

to generate neutral or fake state information, and whether state

information is complete or partial. This section describes those

details for the presence event package.

A PA MAY send a NOTIFY at any time. Typically, it will send one when the state of the presentity changes. The NOTIFY request MAY contain a body indicating the state of the presentity. The times at which

the NOTIFY is sent for a particular subscriber, and the contents of

the body within that notification, are subject to any rules specified by the authorization policy that governs the subscription. This

protocol in no way limits the scope of such policies. As a baseline, a reasonable policy is to generate notifications when the state of

any of the presence tuples changes. These notifications would

contain the complete and current presence state of the presentity as known to the presence agent. Future extensions can be defined that

allow a subscriber to request that the notifications contain changes in presence information only, rather than complete state.

In the case of a pending subscription, when final authorization is

determined, a NOTIFY can be sent. If the result of the authorization decision was success, a NOTIFY SHOULD be sent and SHOULD contain a

presence document with the current state of the presentity. If the

subscription is rejected, a NOTIFY MAY be sent. As described in RFC 3265 [2], the Subscription-State header field indicates the state of the subscription.

The body of the NOTIFY MUST be sent using one of the types listed in the Accept header field in the most recent SUBSCRIBE request, or

using the type "application/pidf+xml" if no Accept header field was

present.

The means by which the PA learns the state of the presentity are also outside the scope of this recommendation. Registrations can provide a component of the presentity state. However, the means by which a

PA uses registrations to construct a presence document are an

implementation choice. If a PUA wishes to explicitly inform the

presence agent of its presence state, it should explicitly publish

the presence document (or its piece of it) rather than attempting to manipulate their registrations to achieve the desired result.

For reasons of privacy, it will frequently be necessary to encrypt

the contents of the notifications. This can be accomplished using

S/MIME. The encryption can be performed using the key of the

subscriber as identified in the From field of the SUBSCRIBE request. Similarly, integrity of the notifications is important to

subscribers. As such, the contents of the notifications MAY provide authentication and message integrity using S/MIME. Since the NOTIFY is generated by the presence server, which may not have access to the Rosenberg Standards Track [Page 12]

key of the user represented by the presentity, it will frequently be the case that the NOTIFY is signed by a third party. It is

RECOMMENDED that the signature be by an authority over the domain of the presentity. In other words, for a user pres:user@https://www.360docs.net/doc/6b18623720.html,,

the signator of the NOTIFY SHOULD be the authority for https://www.360docs.net/doc/6b18623720.html,. 6.8. Subscriber Processing of NOTIFY Requests

RFC 3265 [2] leaves it to event packages to describe the process

followed by the subscriber upon receipt of a NOTIFY request,

including any logic required to form a coherent resource state.

In this specification, each NOTIFY contains either no presence

document, or a document representing the complete and coherent state of the presentity. Within a dialog, the presence document in the

NOTIFY request with the highest CSeq header field value is the

current one. When no document is present in that NOTIFY, the

presence document present in the NOTIFY with the next highest CSeq

value is used. Extensions which specify the use of partial state for presentities will need to dictate how coherent state is achieved.

6.9. Handling of Forked Requests

RFC 3265 [2] requires each package to describe handling of forked

SUBSCRIBE requests.

This specification only allows a single dialog to be constructed as a result of emitting an initial SUBSCRIBE request. This guarantees

that only a single PA is generating notifications for a particular

subscription to a particular presentity. The result of this is that a presentity can have multiple PAs active, but these should be

homogeneous, so that each can generate the same set of notifications for the presentity. Supporting heterogeneous PAs, each of which

generates notifications for a subset of the presence data, is complex and difficult to manage. Doing so would require the subscriber to

act as the aggregator for presence data. This aggregation function

can only reasonably be performed by agents representing the

presentity. Therefore, if aggregation is needed, it MUST be done in a PA representing the presentity.

Section 4.4.9 of RFC 3265 [2] describes the processing that is

required to guarantee the creation of a single dialog in response to a SUBSCRIBE request.

Rosenberg Standards Track [Page 13]

6.10. Rate of Notifications

RFC 3265 [2] requires each package to specify the maximum rate at

which notifications can be sent.

A PA SHOULD NOT generate notifications for a single presentity at a

rate of more than once every five seconds.

6.11. State Agents

RFC 3265 [2] requires each package to consider the role of state

agents in the package, and if they are used, to specify how

authentication and authorization are done.

State agents are core to this package. Whenever the PA is not

co-located with the PUA for the presentity, the PA is acting as a

state agent. It collects presence state from the PUA, and aggregates it into a presence document. Because there can be multiple PUA, a

centralized state agent is needed to perform this aggregation. That is why state agents are fundamental to presence. Indeed, they have a specific term that describes them - a presence server.

6.11.1. Aggregation, Authentication, and Authorization

The means by which aggregation is done in the state agent is purely a matter of policy. The policy will typically combine the desires of

the presentity along with the desires of the provider. This document in no way restricts the set of policies which may be applied.

However, there is clearly a need for the state agent to have access

to the state of the presentity. This state is manipulated by the

PUA. One way in which the state agent can obtain this state is to

subscribe to it. As a result, if there were 5 PUA manipulating

presence state for a single presentity, the state agent would

generate 5 subscriptions, one to each PUA. For this mechanism to be effective, all PUA SHOULD be capable of acting as a PA for the state that they manipulate, and that they authorize subscriptions that can be authenticated as coming from the domain of the presentity.

The usage of state agents does not significantly alter the way in

which authentication is done by the PA. Any of the SIP

authentication mechanisms can be used by a state agent. However,

digest authentication will require the state agent to be aware of the shared secret between the presentity and the subscriber. This will

require some means to securely transfer the shared secrets from the

presentity to the state agent.

Rosenberg Standards Track [Page 14]

The usage of state agents does, however, have a significant impact on authorization. As stated in Section 6.6, a PA is required to

authorize all subscriptions. If no explicit authorization policy has been defined, the PA will need to query the user for authorization.

In a presence edge server (where the PUA is co-located with the PUA), this is trivially accomplished. However, when state agents are used (i.e., a presence server), a means is needed to alert the user that

an authorization decision is required. This is the reason for the

watcherinfo event template-package [8]. All state agents SHOULD

support the watcherinfo template-package.

6.11.2. Migration

On occasion, it makes sense for the PA function to migrate from one

server to another. For example, for reasons of scale, the PA

function may reside in the presence server when the PUA is not

running, but when the PUA connects to the network, the PA migrates

subscriptions to it in order to reduce state in the network. The

mechanism for accomplishing the migration is described in Section

3.3.5 of RFC 3265 [2]. However, packages need to define under what

conditions such a migration would take place.

A PA MAY choose to migrate subscriptions at any time, through

configuration, or through dynamic means. The REGISTER request

provides one dynamic means for a presence server to discover that the function can migrate to a PUA. Specifically, if a PUA wishes to

indicate support for the PA function, it SHOULD use the callee

capabilities specification [9] to indicate that it supports the

SUBSCRIBE request method and the presence event package. The

combination of these two define a PA. Of course, a presence server

can always attempt a migration without these explicit hints. If it

fails with either a 405 or 489 response code, the server knows that

the PUA does not support the PA function. In this case, the server

itself will need to act as a PA for that subscription request. Once such a failure has occurred, the server SHOULD NOT attempt further

migrations to that PUA for the duration of its registration.

However, to avoid the extra traffic generated by these failed

requests, a presence server SHOULD support the callee capabilities

extension.

Furthermore, indication of support for the SUBSCRIBE request and the presence event package is not sufficient for migration of

subscriptions. A PA SHOULD NOT migrate the subscription if it is

composing aggregated presence documents received from multiple PUA. Rosenberg Standards Track [Page 15]

7. Learning Presence State

Presence information can be obtained by the PA in many ways. No

specific mechanism is mandated by this specification. This section

overviews some of the options, for informational purposes only.

7.1. Co-location

When the PA function is co-located with the PUA, presence is known

directly by the PA.

7.2. REGISTER

A UA uses the SIP REGISTER method to inform the SIP network of its

current communications addresses (i.e., Contact addresses). Multiple UA can independently register Contact addresses for the same

address-of-record. This registration state represents an important

piece of the overall presence information for a presentity. It is an indication of basic reachability for communications.

Usage of REGISTER information to construct presence is only possible if the PA has access to the registration database, and can be

informed of changes to that database. One way to accomplish that is to co-locate the PA with the registrar.

The means by which registration state is converted into presence

state is a matter of local policy, and beyond the scope of this

specification. However, some general guidelines can be provided.

The address-of-record in the registration (the To header field)

identifies the presentity. Each registered Contact header field

identifies a point of communications for that presentity, which can

be modeled using a tuple. Note that the contact address in the tuple need not be the same as the registered contact address. Using an

address-of-record instead allows subsequent communications from a

watcher to pass through proxies. This is useful for policy

processing on behalf of the presentity and the provider.

A PUA that uses registrations to manipulate presence state SHOULD

make use of the SIP callee capabilities extension [9]. This allows

the PUA to provide the PA with richer information about itself. For example, the presence of the methods parameter listing the method

"MESSAGE" indicates support for instant messaging.

The q values from the Contact header field [1] can be used to

establish relative priorities amongst the various communications

addresses in the Contact header fields.

Rosenberg Standards Track [Page 16]

The usage of registrations to obtain presence information increases

the requirements for authenticity and integrity of registrations.

Therefore, REGISTER requests used by presence user agents MUST be

authenticated.

7.3. Uploading Presence Documents

If a means exists to upload presence documents from PUA to the PA,

the PA can act as an aggregator and redistributor of those documents. The PA, in this case, would take the presence documents received from each PUA for the same presentity, and merge the tuples across all of those PUA into a single presence document. Typically, this

aggregation would be accomplished through administrator or user

defined policies about how the aggregation should be done.

The specific means by which a presence document is uploaded to a

presence agent are outside the scope of this specification. When a

PUA wishes to have direct manipulation of the presence that is

distributed to subscribers, direct uploading of presence documents is RECOMMENDED.

8. Example Message Flow

This message flow illustrates how the presence server can be

responsible for sending notifications for a presentity. This flow

assumes that the watcher has previously been authorized to subscribe to this resource at the server.

In this flow, the PUA informs the server about the updated presence

information through some non-SIP means.

When the value of the Content-Length header field is "..." this means that the value should be whatever the computed length of the body is. Rosenberg Standards Track [Page 17]

Watcher Server PUA

| F1 SUBSCRIBE | |

|------------------>| |

| F2 200 OK | |

|<------------------| |

| F3 NOTIFY | |

|<------------------| |

| F4 200 OK | |

|------------------>| |

| | |

| | Update presence |

| |<------------------ |

| | |

| F5 NOTIFY | |

|<------------------| |

| F6 200 OK | |

|------------------>| |

Message Details

F1 SUBSCRIBE watcher->https://www.360docs.net/doc/6b18623720.html, server

SUBSCRIBE sip:resource@https://www.360docs.net/doc/6b18623720.html, SIP/2.0

Via: SIP/2.0/TCP https://www.360docs.net/doc/6b18623720.html,;branch=z9hG4bKnashds7

To:

From: ;tag=xfg9

Call-ID: 2010@https://www.360docs.net/doc/6b18623720.html,

CSeq: 17766 SUBSCRIBE

Max-Forwards: 70

Event: presence

Accept: application/pidf+xml

Contact:

Expires: 600

Content-Length: 0

Rosenberg Standards Track [Page 18]

SIP/2.0 200 OK

Via: SIP/2.0/TCP https://www.360docs.net/doc/6b18623720.html,;branch=z9hG4bKnashds7

;received=192.0.2.1

To: ;tag=ffd2

From: ;tag=xfg9

Call-ID: 2010@https://www.360docs.net/doc/6b18623720.html,

CSeq: 17766 SUBSCRIBE

Expires: 600

Contact: sip:https://www.360docs.net/doc/6b18623720.html,

Content-Length: 0

F3 NOTIFY https://www.360docs.net/doc/6b18623720.html, server-> watcher

NOTIFY sip:user@https://www.360docs.net/doc/6b18623720.html, SIP/2.0

Via: SIP/2.0/TCP https://www.360docs.net/doc/6b18623720.html,;branch=z9hG4bKna998sk

From: ;tag=ffd2

To: ;tag=xfg9

Call-ID: 2010@https://www.360docs.net/doc/6b18623720.html,

Event: presence

Subscription-State: active;expires=599

Max-Forwards: 70

CSeq: 8775 NOTIFY

Contact: sip:https://www.360docs.net/doc/6b18623720.html,

Content-Type: application/pidf+xml

Content-Length: ...

[PIDF Document]

F4 200 OK watcher-> https://www.360docs.net/doc/6b18623720.html, server

SIP/2.0 200 OK

Via: SIP/2.0/TCP https://www.360docs.net/doc/6b18623720.html,;branch=z9hG4bKna998sk

;received=192.0.2.2

From: ;tag=ffd2

To: ;tag=xfg9

Call-ID: 2010@https://www.360docs.net/doc/6b18623720.html,

CSeq: 8775 NOTIFY

Content-Length: 0

Rosenberg Standards Track [Page 19]

NOTIFY sip:user@https://www.360docs.net/doc/6b18623720.html, SIP/2.0

Via: SIP/2.0/TCP https://www.360docs.net/doc/6b18623720.html,;branch=z9hG4bKna998sl

From: ;tag=ffd2

To: ;tag=xfg9

Call-ID: 2010@https://www.360docs.net/doc/6b18623720.html,

CSeq: 8776 NOTIFY

Event: presence

Subscription-State: active;expires=543

Max-Forwards: 70

Contact: sip:https://www.360docs.net/doc/6b18623720.html,

Content-Type: application/pidf+xml

Content-Length: ...

[New PIDF Document]

F6 200 OK

SIP/2.0 200 OK

Via: SIP/2.0/TCP https://www.360docs.net/doc/6b18623720.html,;branch=z9hG4bKna998sl

;received=192.0.2.2

From: ;tag=ffd2

To: ;tag=xfg9

Call-ID: 2010@https://www.360docs.net/doc/6b18623720.html,

CSeq: 8776 NOTIFY

Content-Length: 0

9. Security Considerations

There are numerous security considerations for presence. RFC 2779

[13] outlines many of them, and they are discussed above. This

section considers them issue by issue.

9.1. Confidentiality

Confidentiality encompasses many aspects of a presence system:

o Subscribers may not want to reveal the fact that they have

subscribed to certain users

o Users may not want to reveal that they have accepted

subscriptions from certain users

o Notifications (and fetch results) may contain sensitive data

which should not be revealed to anyone but the subscriber Rosenberg Standards Track [Page 20]

hortonworks测试环境离线安装与配置

目录 目录 0 1.基础环境 (2) 2.准备工作 (3) 2.1配置环境 (4) 2.1.1配置hosts文件 (4) 2.1.2 SSH无密码登入 (4) 2.1.3 NTP 时间同步 (5) 2.1.4 SELinux & iptables 关闭 (6) 2.2Java环境安装 (7) 2.2.1 安装JDK (7) 2.2.2 配置环境变量 (7) 3.Ambari安装配置 (9) 3.1配置本地源 (9) 3.1.1 建立本地资源库 (9) 3.1.2 配置repo文件 (10) 3.1.3 配置Media源 (12) 3.1.4 安装必要工具 (12) 3.1.5 配置Media的http源 (12) 3.1.6 安装ambari-server服务 (17)

3.1.7 安装ambari客户端 (46) 3.2ambari服务器配置与管理 (20) 4.常见问题 (50) 4.1mapreduce (50) 4.2oozie安装 (51)

1.基础环境 本人配置 操作系统:redhat6.4 内核版本: 内存大小: 处理器: Ambari版本:ambari-1.6.0 HDP版本:HDP-2.1-latest-centos6-rpm.tar.gz HDP-UTILS版本:HDP-UTILS-1.1.0.17-centos6.tar.gz JDK版本:jdk-7u45-linux-x64

Ambari安装的环境路径(选择安装所有服务的情况): 2.准备工作 本次配置使用hdp-m2作为主master节点

2.1配置环境 2.1.1配置hosts文件 所有机器都得执行,使用root用户 1)@ hostname hdp-m2(该命令可用于临时修改主机名) 2)@ vi /etc/hosts(该命令可用于配置主机名和IP的对应信息) 10.242.157.115 hdp-m1 10.242.157.117 hdp-m2 10.242.157.122 hdp-s1 3)@ vi /etc/sysconfig/network(该命令可用于修改网络主机名) 2.1.2SSH无密码登入 所有机器都得执行,使用root用户 @ yum install ssh(安装SSH协议) @ yum install rsync(rsync是一个远程数据同步工具,可通过LAN/WAN快速同步多台主机间的文件) @ service sshd restart (启动服务) 注:如果系统中没有安装SSH,需要进行以上操作。 @ssh-keygen(该命令生成指定公私秘钥的名字,id_dsa及id_dsa.pub)

CDH-HDP-MAPR-DKH-星环组件比较

一、组件比较:

二、组件简介:

1、Hadoop 简介:集群基础组件,分为存储(HDFS)和计算(Mapreduce)两大部分。apache社区开源。技术来源于2、Hbase 简介:键-值非关系型数据库,apache 3、Zookeeper 4、Spark 简介:内存计算框架,伯克利首先提出,现已开源。 5、Hive 简介:基于HDFS的SQL工具,facebook开发,后开源。 6、Hue 简介:图形化集群工具,cloudera开发,后开源。 7、Impala 简介:基于HDFS的SQL工具,cloudera开发,后开源。 8、Sqoop 简介:用于关系型数据库与NOSQL数据库之间的数据导入导出。Cloudera开发,已开源。 9、Flume 简介:用于数据流的导入, Cloudera开发,已开源。 10、Oozie 简介:工作流系统,用于提交、监控集群作业。Cloudera开发,已开源。 11、Solr 简介:基于Lucene的全文搜索服务器。已开源。 12、Isilon 简介:基于OneFs操作系统的存储产品,美国赛龙公司开发,后属于EMC,一种集群存储方案。 13、K-V store indexer 简介:为HBase到solr的索引中间件,为NGDATA公司开发,已开源。

14、Cloudera Manager 简介:CDH集群安装管理工具。Cloudera开发。 15、kafka 简介:消息队列组件。已经开源。 16、Storm 简介:流数据处理组件。 17、Elasticsearch 简介:基于Lucene的全文搜索服务器。已开源。 18、ESSQL 简介:基于Elasticsearch的SQL工具,大快开发。 19、DK-NLP 简介:自然语言处理组件。大快开发,已开源。 20、DK-SPIDER 简介:分布式爬虫组件。大快开发。 21、DKM 简介:集群安装管理工具。大快开发。 22、DK-DMYSQL 简介:分布式MYSQL组件,大快改写。 23、Apache Falcon 简介:Falcon 是一个面向Hadoop的、新的数据处理和管理平台,设计用于数据移动、数据管道协调、生命周期管理和数据发现。 24、Apache Knox 简介:Apache knox是一个访问hadoop集群的restapi网关,它为所有rest访问提供了一个简单的访问接口点。 25、Apache Phoenix

磁性材料基本特性

1. 磁性材料的磁化曲线 磁性材料是由铁磁性物质或亚铁磁性物质组成的,在外加磁场H作用下,必有相应的磁化强度M或磁感应强度B,它们随磁场强度H的变化曲线称为磁化曲线(M~H或B~H曲线)。磁化曲线一般来说是非线性的,具有2个特点:磁饱和现象及磁滞现象。即当磁场强度H足够大时,磁化强度M达到一个确定的饱和值Ms,继续增大H,Ms保持不变;以及当材料的M值达到饱和后,外磁场H降低为零时,M并不恢复为零,而是沿MsMr曲线变化。 材料的工作状态相当于M~H曲线或 B~H曲线上的某一点,该点常称为工作点。 饱和磁感应强度 Bs: 其大小取决于材料的成分,它所对应的物理状态是材料内部的磁化矢量整齐排列; 剩余磁感应强度Br: 是磁滞回线上的特征参数,H回到0时的B值. 矩形比: Br/Bs; 矫顽力Hc: 是表示材料磁化难易程度的量,取决于材料的成分及缺陷(杂质、应力等); 磁导率m:是磁滞回线上任何点所对应的B与H的比值,与器件工作状态密切相关 初始磁导率mi、最大磁导率mm、微分磁导率md、振幅磁导率ma、有效磁导率me、脉冲磁导率mp 居里温度Tc: 铁磁物质的磁化强度随温度升高而下降,达到某一温度时,自发磁化消失,转变为顺磁性, 该临界温度为居里温度. 它确定了磁性器件工作的上限温度 损耗P: 磁滞损耗Ph及涡流损耗Pe P=Ph+Pe=af+bf2+cPeμf2t2/,r 降低磁滞损耗Ph的方法是降低矫顽力Hc;降低涡流损耗Pe的方法是减薄磁性材料的厚度t及提高材料的电阻率r 在自由静止空气中磁芯的损耗与磁芯的温升关系为:总功率耗散(亳瓦特)/表面积(平方厘米) 3. 软磁材料的磁性参数与器件的电气参数之间的转换 设计软磁器件通常包括三个步骤:正确选用磁性材料;

磁性材料基本参数详解

磁性材料基本参数详解 磁性是物质的基本属性之一,磁性现象与各种形式的电荷的运动相关联,物质内部电子的运动和自旋会产生一定大小的磁矩,因而产生磁性。 自然界物质按其磁性的不同可分为:顺磁性物质、抗磁性物质、铁磁性物、反铁磁性物质以及亚铁磁性物质,其中铁磁性物质和亚铁磁性物质属于强磁性物质,通常将这两类物质统称为“ 磁性材料” 。 铁氧体颗粒料: 是已经过配料、混合、预烧、粉碎和造粒等工序,可以直接用于成形加工的铁氧体料粒。顾客使用该料可直接压制成毛坯,经烧结、磨削后即可制成所需磁芯。本公司生产并销售高品质的铁氧体颗粒料,品种包括功率铁氧体JK 系列和高磁导率铁氧体JL 系列。 锰锌铁氧体: 主要分为高稳定性、高功率、高导铁氧体材料。它是以氧化铁、氧化锌为主要成分的复合氧化物。其工作频率在1kHz 至10MHz 之间。主要用着开关电源的主变压器用磁芯. 。 随着射频通讯的迅猛发展,高电阻率、高居里温度、低温度系数、低损耗、高频特性好(高电阻率ρ、低损耗角正切tg δ)的镍锌铁氧体得到重用,我司生产的Ni-Zn 系列磁芯,其初始磁导率可由10 到2500 ,使用频率由1KHz 到100MHz 。但主要应用于1MHz 以上的频段、磁导率范围在7-1300 之间的EMC 领域、谐振电路以及超高频功率电路中。磁粉芯: 磁环按材料分为五大类:即铁粉芯、铁镍钼、铁镍50 、铁硅铝、羰基铁。使用频率可达100KHZ ,甚至更高。但最适合于10KHZ 以下使用。 磁场强度H : 磁场“ 是传递运动电荷或者电流之间相互作用的物理物” 。 它可以由运动电荷或者电流产生,同时场中其它运动或者电流发生力的作用。 均匀磁场中,作用在单位长磁路的磁势叫磁场强度,用H 表示; 使一个物体产生磁力线的原动力叫磁势,用F 表示:H=NI/L, F = N I H 单位为安培/ 米(A/m ),即: 奥斯特Oe ;N 为匝数;I 为电流,单位安培(A ),磁路长度L 单位为米(m )。 在磁芯中,加正弦波电流,可用有效磁路长度Le 来计算磁场强度: 1 奥斯特= 80 安/ 米 磁通密度,磁极化强度,磁化强度 在磁性材料中,加强磁场H 时,引起磁通密度变化,其表现为: B= ц o H+J= ц o (H+M) B 为磁通密度( 磁感应强度) ,J 称磁极化强度,M 称磁化强度,ц o 为真空磁导率,其值为4 π× 10 ˉ 7 亨利/ 米(H/m ) B 、J 单位为特斯拉,H 、M 单位为A/m, 1 特斯拉=10000 高斯(Gs ) 在磁芯中可用有效面积Ae 来计算磁通密度:

磁性材料的基本特性16505

1.磁性材料的磁化曲线 磁性材料是由铁磁性物质或亚铁磁性物质组成的,在外加磁场H作用下,必有相应的磁化强度M或磁感应强度B,它们随磁场强度H的变化曲线称为磁化曲线(M~H或B~H曲线)。磁化曲线一般来说是非线性的,具有2个特点:磁饱和现象及磁滞现象。即当磁场强度H足够大时,磁化强度M达到一个确定的饱和值Ms,继续增大H,Ms保持不变;以及当材料的M值达到饱和后,外磁场H降低为零时,M并不恢复为零,而是沿MsMr曲线变化。 材料的工作状态相当于M~H曲线或B ~H曲线上的某一点,该点常称为工作点。 饱和磁感应强度Bs: 其大小取决于材料的成分,它所对应的物理状态是材料内部的磁化矢量整齐排列; 剩余磁感应强度Br: 是磁滞回线上的特征参数,H回到0时的B值. 矩形比: Br/Bs; 矫顽力Hc: 是表示材料磁化难易程度的量,取决于材料的成分及缺陷(杂质、应力等); 磁导率m:是磁滞回线上任何点所对应的B与H的比值,与器件工作状态密切相关 初始磁导率mi、最大磁导率mm、微分磁导率md、振幅磁导率ma、有效磁导率me、脉冲磁导率mp 居里温度Tc: 铁磁物质的磁化强度随温度升高而下降,达到某一温度时,自发磁化消失,转变为顺磁性, 该临界温度为居里温度. 它确定了磁性器件工作的上限温度 损耗P: 磁滞损耗Ph及涡流损耗Pe P=Ph+Pe=af+bf2+cPeμf2t2/,r 降低磁滞损耗Ph的方法是降低矫顽力Hc;降低涡流损耗Pe的方法是减薄磁性材料的厚度t及提高材料的电阻率r 在自由静止空气中磁芯的损耗与磁芯的温升关系为:总功率耗散(亳瓦特)/表面积(平方厘米) 3.软磁材料的磁性参数与器件的电气参数之间的转换 ?设计软磁器件通常包括三个步骤:正确选用磁性材料; ?合理确定磁芯的几何形状及尺寸;

大数据平台技术框架选型分析

大数据平台框架选型分析 一、需求 城市大数据平台,首先是作为一个数据管理平台,核心需求是数据的存和取,然后因为海量数据、多数据类型的信息需要有丰富的数据接入能力和数据标准化处理能力,有了技术能力就需要纵深挖掘附加价值更好的服务,如信息统计、分析挖掘、全文检索等,考虑到面向的客户对象有的是上层的应用集成商,所以要考虑灵活的数据接口服务来支撑。 二、平台产品业务流程

三、选型思路 必要技术组件服务: ETL >非/关系数据仓储>大数据处理引擎>服务协调>分析BI >平台监管

四、选型要求 1.需要满足我们平台的几大核心功能需求,子功能不设局限性。如不满足全部,需要对未满足的其它核心功能的开放使用服务支持 2.国内外资料及社区尽量丰富,包括组件服务的成熟度流行度较高 3.需要对选型平台自身所包含的核心功能有较为深入的理解,易用其API或基于源码开发

4.商业服务性价比高,并有空间脱离第三方商业技术服务 5.一些非功能性需求的条件标准清晰,如承载的集群节点、处理数据量及安全机制等 五、选型需要考虑 简单性:亲自试用大数据套件。这也就意味着:安装它,将它连接到你的Hadoop安装,集成你的不同接口(文件、数据库、B2B等等),并最终建模、部署、执行一些大数据作业。自己来了解使用大数据套件的容易程度——仅让某个提供商的顾问来为你展示它是如何工作是远远不够的。亲自做一个概念验证。 广泛性:是否该大数据套件支持广泛使用的开源标准——不只是Hadoop和它的生态系统,还有通过SOAP和REST web服务的数据集成等等。它是否开源,并能根据你的特定问题易于改变或扩展?是否存在一个含有文档、论坛、博客和交流会的大社区? 特性:是否支持所有需要的特性?Hadoop的发行版本(如果你已经使用了某一个)?你想要使用的Hadoop生态系统的所有部分?你想要集成的所有接口、技术、产品?请注意过多的特性可能会大大增加复杂性和费用。所以请查证你是否真正需要一个非常重量级的解决方案。是否你真的需要它的所有特性? 陷阱:请注意某些陷阱。某些大数据套件采用数据驱动的付费方式(“数据税”),也就是说,你得为自己处理的每个数据行付费。因为我们是在谈论大数据,所以这会变得非常昂贵。并不是所有的大数据套件都会生成本地Apache Hadoop代码,通常要在每个Hadoop集群的服务器上安装一个私有引擎,而这样就会解除对于软件提供商的独立性。还要考虑你使用大数据套件真正想做的事情。某些解决方案仅支持将Hadoop用于ETL来填充数据至数据仓库,而其他一些解决方案还提供了诸如后处理、转换或Hadoop集群上的大数据分析。ETL仅是Apache Hadoop和其生态系统的一种使用情形。 六、方案分析

磁性材料的基本特性及分类参数

一. 磁性材料的基本特性 1. 磁性材料的磁化曲线 磁性材料是由铁磁性物质或亚铁磁性物质组成的,在外加磁场H 作用下,必有相应的磁化强度M 或磁感应强度B,它们随磁场强度H 的变化曲线称为磁化曲线(M~H或B~H曲线)。磁化曲线一般来说是非线性的,具有2个特点:磁饱和现象及磁滞现象。即当磁场强度H足够大时,磁化强度M达到一个确定的饱和值Ms,继续增大H,Ms保持不变;以及当材料的M值达到饱和后,外磁场H降低为零时,M并不恢复为零,而是沿MsMr曲线变化。材料的工作状态相当于M~H曲线或B~H曲线上的某一点,该点常称为工作点。 2. 软磁材料的常用磁性能参数 饱和磁感应强度Bs:其大小取决于材料的成分,它所对应的物理状态是材料内部的磁化矢量整齐排列。 剩余磁感应强度Br:是磁滞回线上的特征参数,H回到0时的B值。 矩形比:Br∕Bs 矫顽力Hc:是表示材料磁化难易程度的量,取决于材料的成分及缺陷(杂质、应力等)。 磁导率μ:是磁滞回线上任何点所对应的B与H的比值,与器件工作状态密切相关。 初始磁导率μi、最大磁导率μm、微分磁导率μd、振幅磁导率μa、有效磁导率μe、脉冲磁导率μp。 居里温度Tc:铁磁物质的磁化强度随温度升高而下降,达到某一温度时,自发磁化消失,转变为顺磁性,该临界温度为居里温度。它确定了磁性器件工作的上限温度。 损耗P:磁滞损耗Ph及涡流损耗Pe P = Ph + Pe = af + bf2+ c Pe ∝ f2 t2 / ,ρ降低,磁滞损耗Ph的方法是降低矫顽力Hc;降低涡流损耗Pe 的方法是减薄磁性材料的厚度t 及提高材料的电阻率ρ。在自由静止空气中磁芯的损耗与磁芯的温升关系为: 总功率耗散(mW)/表面积(cm2)

Apache atlas使用说明文档

Apache atlas 第一章:Apache atlas简介 为寻求数据治理的开源解决方案,Hortonworks公司联合其他厂商与用户于2015年发起数据治理倡议,包括数据分类、集中策略引擎、数据血缘、安全和生命周期管理等方面。Apache Atlas 项目就是这个倡议的结果,社区伙伴持续的为该项目提供新的功能和特性。该项目用于管理共享元数据、数据分级、审计、安全性以及数据保护等方面,努力与Apache Ranger整合,用于数据权限控制策略。目前最新版本是2.0.0. .1apache atlas 架构介绍 1.1.1核心组件Core Type System: Apache Atlas 允许用户为他们想要管理的元数据对象定义一个模型,该模型被叫做“类型”。类型的实例被称为“实体”,实体用来表示被管理的实际元数据对象类型系统是允许用户定义和管理类型和实体的组件。。 例如:Atlas 本身自带的hive_table类 Name: hive_table TypeCategory: Entity SuperTypes: DataSet Attributes: name: string db: hive_db owner: string createTime: date

lastAccessTime: date comment: string retention: int sd: hive_storagedesc partitionKeys: array aliases: array columns: array parameters: map viewOriginalText: string viewExpandedText: string tableType: string temporary: boolean 从上面示例中可以看出,类由名称name唯一标识 类型具有元类型。Atlas具有以下元类型: ?基本元类型:boolean, byte, short, int, long, float, double, biginteger, bigdecimal, string, date ?枚举 ?集合元类型:array, map ?复合元类型:Entity, Struct, Classification, Relationship Hive_table类的一个实体 guid: "9ba387dd-fa76-429c-b791-ffc338d3c91f" typeName: "hive_table" status: "ACTIVE" values: name: “customers” db: { "guid": "b42c6cfc-c1e7-42fd-a9e6-890e0adf33bc", "typeName": "hive_db" } owner: “admin” createTime: 1490761686029 updateTime: 1516298102877 comment: null retention: 0 sd: { "guid": "ff58025f-6854-4195-9f75-3a3058dd8dcf", "typeName": "hive_storagedesc" } partitionKeys: null aliases: null columns: [ { "guid": "65e2204f-6a23-4130-934a-9679af6a211f", "typeName": "hive_column" }, { "guid": "d726de70-faca-46fb-9c99-cf04f6b579a6", "typeName": "hive_column" }, ... ]

磁性材料的基本特性

一.磁性材料的基本特性 1.磁性材料的磁化曲线 磁性材料是由铁磁性物质或亚铁磁性物质组成的,在外加磁场H作用下,必有相应的磁化强度M或磁感应强度B,它们随磁场强度H的变化曲线称为磁化曲线(M~H或B~H曲线)。磁化曲线一般来说是非线性的,具有2个特点:磁饱和现象及磁滞现象。即当磁场强度H足够大时,磁化强度M达到一个确定的饱和值Ms,继续增大H,Ms保持不变;以及当材料的M值达到饱和后,外磁场H降低为零时,M并不恢复为零,而是沿MsMr曲线变化。 材料的工作状态相当于M~H曲线或B~H曲线上的某一点,该点常称为工作点。 2.软磁材料的常用磁性能参数 ?饱和磁感应强度Bs: 其大小取决于材料的成分,它所对应的物理状态是材料内部的磁化矢量整齐排列; ?剩余磁感应强度Br: 是磁滞回线上的特征参数,H回到0时的B值. 矩形比: Br/Bs; ?矫顽力Hc: 是表示材料磁化难易程度的量,取决于材料的成分及缺陷(杂质、应力等); ?磁导率m:是磁滞回线上任何点所对应的B与H的比值,与器件工作状态密切相关; ?初始磁导率mi、最大磁导率mm、微分磁导率md、振幅磁导率ma、有效磁导率me、脉冲磁导率mp; ?居里温度Tc: 铁磁物质的磁化强度随温度升高而下降,达到某一温度时,自发磁化消失,转变为顺磁性, 该临界温度为居里温度. 它确定了磁性器件工作的上限温度; ?损耗P: 磁滞损耗Ph及涡流损耗Pe P=Ph+Pe=af+bf2+cPeμf2t2/,r 降低磁滞损耗Ph的方法是降低矫顽力Hc;降低涡流损耗Pe的方法是减薄磁性材料的厚度t及提高材料的电阻率r; ?在自由静止空气中磁芯的损耗与磁芯的温升关系为:总功率耗散(亳瓦特)/表面积(平方厘米) 3.软磁材料的磁性参数与器件的电气参数之间的转换 ?设计软磁器件通常包括三个步骤:正确选用磁性材料;

磁性材料的基本特性

磁性材料的基本特性 1. 磁性材料的磁化曲线 磁性材料是由铁磁性物质或亚铁磁性物质组成的,在外加磁场H 作用下,必有相应的磁化强度M 或磁感应强度B,它们随磁场强度H 的变化曲线称为磁化曲线(M~H或B~H曲线)。磁化曲线一般来说是非线性的,具有2个特点:磁饱和现象及磁滞现象。即当磁场强度H 足够大时,磁化强度M达到一个确定的饱和值Ms,继续增大H,Ms保持不变;以及当材料的M值达到饱和后,外磁场H降低为零时,M并不恢复为零,而是沿MsMr曲线变化。材料的工作状态相当于M~H曲线或B~H曲线上的某一点,该点常称为工作点。 2. 软磁材料的常用磁性能参数 饱和磁感应强度Bs:其大小取决于材料的成分,它所对应的物理状态是材料内部的磁化矢量整齐排列。 剩余磁感应强度Br:是磁滞回线上的特征参数,H回到0时的B值。 矩形比:Br∕Bs 矫顽力Hc:是表示材料磁化难易程度的量,取决于材料的成分及缺陷(杂质、应力等)。 磁导率μ:是磁滞回线上任何点所对应的B与H的比值,与器件工作状态密切相关。 初始磁导率μi、最大磁导率μm、微分磁导率μd、振幅磁导率μa、有效磁导率μe、脉冲磁导率μp。 居里温度Tc:铁磁物质的磁化强度随温度升高而下降,达到某一温度时,自发磁化消失,转变为顺磁性,该临界温度为居里温度。它确定了磁性器件工作的上限温度。 损耗P:磁滞损耗Ph及涡流损耗Pe P = Ph + Pe = af + bf2+ c Pe ∝ f2 t2 / ,ρ降低,磁滞损耗Ph的方法是降低矫顽力Hc;降低涡流损耗Pe 的方法是减薄磁性材料的厚度t 及提高材料的电阻率ρ。在自由静止空气中磁芯的损耗与磁芯的温升关系为: 总功率耗散(mW)/表面积(cm2) 3. 软磁材料的磁性参数与器件的电气参数之间的转换 在设计软磁器件时,首先要根据电路的要求确定器件的电压~电流特性。器件的电压~电流特性与磁芯的几何形状及磁化状态密切相关。设计者必须熟悉材料的磁化过程并拿握材料的磁性参数与器件电气参数的转换关系。设计软磁器件通常包括三个步骤:正确选用磁性材料;合理确定磁芯的几何形状及尺寸;根据磁性参数要求,模拟磁芯的工作状态得到相应的电气参数。 磁性材料是一种重要的电子材料。早期的磁性材料主要采用金属及合金系统,随着生产的发展,在电力工业、电讯工程及高频无线电技术等方面,迫切要求提供一种具有很高电阻率的高效能磁性材料。在重新研究磁铁矿及其他具有磁性的氧化物的基础上,研制出了一种新型磁性材料——铁氧体。铁氧体属于氧化物系统的磁性材料,是以氧化铁和其他铁族元素或稀土元素氧化物为主要成分的复合氧化物,可用于制造能量转换、传输和信息存储的各种功能器件。

hue安装手册

HUE 安装手册

本文档主要参考cloudera和hortonworks的安装文档,但这两个文档主要是针对自己产品的安装,有些配置是产品特有的配置,特别是cloudera的安装文档,hortonwork的文档不错,本手册主要是参考hortonwork的安装文档而来,并增加了thrift的插件配置和安装。 以上是hue和hadoop组件的整体结构图: 1. 安装步骤: 安装前,最好先阅读下以上提到的两篇安装手册,本手册是安装中软国际的安装包中安装的hue,也可以把yum源地址配置成hortonworks 的安装包,这里的说明的yum安装源是中软国际的安装包。 主节点:master.hadoop jobtracker节点:node4.hadoop 本手册是把hue安装在主节点master.hadoop上 2. 配置hadoop(通过ambari界面更改如下配置文件)

1.hdfs-site.xml dfs.webhdfs.enabled true 2.core-site.xml hadoop.proxyuser.hue.hosts * hadoop.proxyuser.hue.groups * 3.webhcat-site.xml webhcat.proxyuser.hue.hosts * webhcat.proxyuser.hue.groups *

磁性材料的基本特性及分类参数

磁性材料的基本特性及分类参数 https://www.360docs.net/doc/6b18623720.html,/来源:日期:2006年04月25日 一. 磁性材料的基本特性 1. 磁性材料的磁化曲线 磁性材料是由铁磁性物质或亚铁磁性物质组成的,在外加磁场H 作用下,必有相应的磁化强度M 或磁感应强度B,它们随磁场强度H 的变化曲线称为磁化曲线(M~H或B~H曲线)。磁化曲线一般来说是非线性的,具有2个特点:磁饱和现象及磁滞现象。即当磁场强度H足够大时,磁化强度M达到一个确定的饱和值Ms,继续增大H,Ms保持不变;以及当材料的M值达到饱和后,外磁场H降低为零时,M并不恢复为零,而是沿MsMr曲线变化。材料的工作状态相当于M~H曲线或B~H曲线上的某一点,该点常称为工作点。 2. 软磁材料的常用磁性能参数 饱和磁感应强度Bs:其大小取决于材料的成分,它所对应的物理状态是材料内部的磁化矢量整齐排列。 剩余磁感应强度Br:是磁滞回线上的特征参数,H回到0时的B值。 矩形比:Br∕Bs 矫顽力Hc:是表示材料磁化难易程度的量,取决于材料的成分及缺陷(杂质、应力等)。 磁导率μ:是磁滞回线上任何点所对应的B与H的比值,与器件工作状态密切相关。 初始磁导率μi、最大磁导率μm、微分磁导率μd、振幅磁导率μa、有效磁导率μe、脉冲磁导率μp。 居里温度Tc:铁磁物质的磁化强度随温度升高而下降,达到某一温度时,自发磁化消失,转变为顺磁性,该临界温度为居里温度。它确定了磁性器件工作的上限温度。 损耗P:磁滞损耗Ph及涡流损耗Pe P = Ph + Pe = af + bf2+ c Pe ∝ f2 t2 / ,ρ降低,磁滞损耗Ph的方法是降低矫顽力Hc;降低涡流损耗Pe 的方法是减薄磁性材料的厚度t 及提高材料的电阻率ρ。在自由静止空气中磁芯的损耗与磁芯的温升关系为: 总功率耗散(mW)/表面积(cm2) 3. 软磁材料的磁性参数与器件的电气参数之间的转换 在设计软磁器件时,首先要根据电路的要求确定器件的电压~电流特性。器件的电压~电流特性与磁芯的几何形状及磁化状态密切相关。设计者必须熟悉材料的磁化过程并拿握材料的磁性参数与器件电气参数的转换关系。设计软磁器件通常包括三个步骤:正确选用磁性材料;合理确定磁芯的几何形状及尺寸;根据磁性参数要求,模拟磁芯的工作状态得到相应的电气参数。 二、软磁材料的发展及种类

最受关注的13款大数据产品

最受关注的13款大数据产品 大数据是当下IT领域最活跃的话题之一。没有比近日在圣何塞举行的Hadoop Summit 2013更好的地方去了解关于大数据的最新动态了。 有超过60家大数据公司参与其中,既包括像英特尔和https://www.360docs.net/doc/6b18623720.html,这样的知名厂商,也有像Sqrrl和Platfora这样成立没有多久的初创公司。以下是这次峰会上展示的13款全新的或者增强的大数据产品。 Continuuity开发公司现在支持批量处理

Continuuity发布了支持批量处理的Continuuity Developer Suite 1.7,将MapReduce集成到平台中为开发者提供更广泛的工作负载能力。 Continuuity帮助Java开发者构建能运行Hadoop和HBase数据库的应用。这些应用支持像运作分析这样的实时应用。但是Continuuity的首席执行官Jon Gray表示,一些应用仍然要求MapReduce的批量处理架构。 Continuuity Developer Suite 1.7还提供了一些用于流式实时分析、定位和个性化以及异常检测的应用模板。 Datameer首次展示大数据分析软件 Datameer发布了面向企业用户的Datameer 3.0数据集成和分析软件。该版本增加了“智能分析”功能,可以从Hadoop中保存的大量复杂数据中自动找出模型和关联性。

Datameer 3.0采用四种机器学习的技术:聚类、决策树、列依赖性和建议。虽然这些通常是数据科学家涉足的领域,但是被集成到了Datameer软件中,这样企业用户就可以将其作为一项自助服务使用。 Datameer 3.0将在未来几个月内提供给用户进行beta测试。 Hortonwork社区预览支持Yarn的HDP 2.0平台 Hortonworks将在社区中预览下一代支持Yarn(下一代Hadoop数据处理框架)的Hortonworks Data Platform。 作为ASF Hadoop项目的一部分,Yarm旨在实现多个用户实例,而不是单一的数据集。HDP 2.0社区预览版本中支持Yarn,将让Hortonworks的合作伙伴和客户能够使用这项新技术,参与到最终规范的制定中,Hortonworks营销副总裁Dave McJannet这样表示。 Kognitio推出第八代分析平台

磁性材料的基本特性

磁性材料的基本特性 2007年07月05日星期四21:18 1. 磁性材料的磁化曲线 磁性材料是由铁磁性物质或亚铁磁性物质组成的,在外加磁场H 作用下,必有相应的磁化强度M 或磁感应强度B,它们随磁场强度H 的变化曲线称为磁化曲线(M~H或B~H曲线)。磁化曲线一般来说是非线性的,具有2个特点:磁饱和现象及磁滞现象。即当磁场强度H足够大时,磁化强度M达到一个确定的饱和值Ms,继续增大H,Ms保持不变;以及当材料的M值达到饱和后,外磁场H降低为零时,M并不恢复为零,而是沿MsMr曲线变化。材料的工作状态相当于M~H曲线或B~H曲线上的某一点,该点常称为工作点。 2. 软磁材料的常用磁性能参数 饱和磁感应强度Bs:其大小取决于材料的成分,它所对应的物理状态是材料内部的磁化矢量整齐排列。 剩余磁感应强度Br:是磁滞回线上的特征参数,H回到0时的B值。 矩形比:Br∕Bs 矫顽力Hc:是表示材料磁化难易程度的量,取决于材料的成分及缺陷(杂质、应力等)。 磁导率μ:是磁滞回线上任何点所对应的B与H的比值,与器件工作状态密切相关。 初始磁导率μi、最大磁导率μm、微分磁导率μd、振幅磁导率μa、有效磁导率μe、脉冲磁导率μp。 居里温度Tc:铁磁物质的磁化强度随温度升高而下降,达到某一温度时,自发磁化消失,转变为顺磁性,该临界温度为居里温度。它确定了磁性器件工作的上限温度。 损耗P:磁滞损耗Ph及涡流损耗Pe P = Ph + Pe = af + bf2+ c Pe ∝ f2 t2 / ,ρ 降低, 磁滞损耗Ph的方法是降低矫顽力Hc;降低涡流损耗Pe 的方法是减薄磁性材料的厚度t 及提高材料的电阻率ρ。在自由静止空气中磁芯的损耗与磁芯的温升关系为: 总功率耗散(mW)/表面积(cm2) 3. 软磁材料的磁性参数与器件的电气参数之间的转换 在设计软磁器件时,首先要根据电路的要求确定器件的电压~电流特性。器件的电压~电流特性与磁芯的几何形状及磁化状态密切相关。设计者必须熟悉材料的磁化过程并拿握材料的磁性参数与器件电气参数的转换关系。设计软磁器件通常包括三个步骤:正确选用磁性材料;合理确定磁芯的几何形状及尺寸;根据磁性参数要求,模拟磁芯的工作状态得到相应的电气

IGBT基本参数详解讲解

第一部分IGBT模块静态参数 1,:集射极阻断电压 在可使用的结温范围内,栅极和发射极短路状况下,集射极最高电压。手册里一般为25℃下的数据,随着结温的降低,会逐渐降低。由于模块内外部的杂散电感,IGBT在关断时最容易超过限值。 2,:最大允许功耗 在25℃时,IGBT开关的最大允许功率损耗,即通过结到壳的热阻所允许的最大耗散功率。 其中,为结温,为环境温度。二极管的最大功耗可以用同样的公式获得。 在这里,顺便解释下这几个热阻, 结到壳的热阻抗,乘以发热量获得结与壳的温差; 芯片热源到周围空气的总热阻抗,乘以发热量获得器件温升; 芯片结与PCB间的热阻抗,乘以单板散热量获得与单板的温差。 3,集电极直流电流 在可以使用的结温范围流集射极的最大直流电流。根据最大耗散功率的定义,可以由最大耗散功率算出该值。所以给出一个额定电流,必须给出对应的结和外壳的温度。 ) 4,可重复的集电极峰值电流 规定的脉冲条件下,可重复的集电极峰值电流。 5,RBSOA,反偏安全工作区 IGBT关断时的安全工作条件。如果工作期间的最大结温不被超过,IGBT在规定的阻断电压下可以驱使两倍的额定电流。 6,短路电流

短路时间不超过10us。请注意,在双脉冲测试中,上管GE之间如果没有短路或负偏压,就很容易引起下管开通时,上管误导通,从而导致短路。 7,集射极导通饱和电压 在额定电流条件下给出,Infineon的IGBT都具有正温度效应,适宜于并联。 随集电极电流增加而增加,随着增加而减小。 可用于计算导通损耗。根据IGBT的传输特性, 计算时,切线的点尽量靠近工作点。对于SPWM方式,导通损耗由下式获得, M为调制因数;为输出峰值电流;为功率因数。 第二部分IGBT模块动态参数 1,模块内部栅极电阻 为了实现模块内部芯片的均流,模块内部集成了栅极电阻,该电阻值常被当成总的驱动电阻的一部分计算IGBT驱动器的峰值电流能力。 2,外部栅极电阻 数据手册中往往给出的是最小推荐值,可以通过以下电路实现不同的和。

永磁体基本性能参数

永磁体基本性能参数 Prepared on 22 November 2020

永磁体基本性能参数 永磁材料:永磁材料被外加磁场磁化后磁性不消失,可对外部空间提供稳定磁场。钕铁硼永磁体常用的衡量指标有以下四种: 剩磁(Br)单位为特斯拉(T)和高斯(Gs)1Gs= 将一个磁体在闭路环境下被外磁场充磁到技术饱和后撤消外磁场,此时磁体表现的磁感应强度我们称之为剩磁。它表示磁体所能提供的最大的磁通值。从退磁曲线上可见,它对应于气隙为零时的情况,故在实际磁路中磁体的磁感应强度都小于剩磁。钕铁硼是现今发现的Br最高的实用永磁材料。 磁感矫顽力(Hcb)单位是安/米(A/m)和奥斯特(Oe)或1Oe≈m 处于技术饱和磁化后的磁体在被反向充磁时,使磁感应强度降为零所需反向磁场强度的值称之为磁感矫顽力(Hcb)。但此时磁体的磁化强度并不为零,只是所加的反向磁场与磁体的磁化强度作用相互抵消。(对外磁感应强度表现为零)此时若撤消外磁场,磁体仍具有一定的磁性能。钕铁硼的矫顽力一般是11000Oe以上。 内禀矫顽力(Hcj)单位是安/米(A/m)和奥斯特(Oe)1Oe≈m 使磁体的磁化强度降为零所需施加的反向磁场强度,我们称之为内禀矫顽力。内禀矫顽力是衡量磁体抗退磁能力的一个物理量,如果外加的磁场等于磁体的内禀矫顽力,磁体的磁性将会基本消除。钕铁硼的Hcj会随着温度的升高而降低所以需要工作在高温环境下时应该选择高Hcj的牌号。

磁能积(BH)单位为焦/米3(J/m3)或高奥(GOe)1MGOe≈m3 退磁曲线上任何一点的B和H的乘积既BH我们称为磁能积,而B×H的最大值称之为最大磁能积(BH)max。磁能积是恒量磁体所储存能量大小的重要参数之一,(BH)max越大说明磁体蕴含的磁能量越大。设计磁路时要尽可能使磁体的工作点处在最大磁能积所对应的B和H附近。 各向同性磁体:任何方向磁性能都相同的磁体。 各向异性磁体:不同方向上磁性能会有不同;且存在一个方向,在该方向取向时所得磁性能最高的磁体。烧结钕铁硼永磁体是各向异性磁体。 取向方向:各向异性的磁体能获得最佳磁性能的方向称为磁体的取向方向。也称作“取向轴”,“易磁化轴”。 磁场强度:指空间某处磁场的大小,用H表示,它的单位是安/米(A/m),也有用奥斯特(Oe)作单位的。 磁感应强度:磁感应强度B的定义是:B=μ0(H+M),其中H和M 分别是磁化强度和磁场强度,而μ0是真空导磁率。磁感应强度又称为磁通密度,即单位面积内的磁通量。单位是特斯拉(T)。 磁化强度:指材料内部单位体积的磁矩矢量和,用M表示,单位是安/米(A/m)。它与磁感应强度和磁场强度有如下关系 B=(M+H)μ0 在各向同性线性媒质中,磁化强度M和磁场强度H成正比,M=XmH,Xm是磁化率。上式可改写成

磁材基础知识简介

1.磁性材料简介 磁性材料是指由过渡金属元素铁、钴、镍及其合金等组成的能够直接或间接产生磁性的物质。 根据物质在外磁场中表现出的特性,物质的磁性可分为五类:顺磁性、抗磁性、铁磁性、亚铁磁性、反铁磁性。我们把顺磁性和抗磁性物质称为弱磁性物质,把铁磁性和亚铁磁性物质称为强磁性物质。 通常所说的磁性材料是指强磁性物质。磁性材料按磁化后去磁的难易可分为软磁材料和硬磁材料。磁化后容易去掉磁性的物质叫软磁材料,不容易去磁的物质叫硬磁材料,也称为永磁材料。软硬磁材料最明显的区别就是矫顽力,一般来讲软磁材料的矫顽力较小,硬磁材料的矫顽力较大。通常软磁材料的矫顽力小于80 A/m,而永磁材料的矫顽力则大于4000 A/m。磁性材料按使用又可分为软磁材料、永磁材料和功能磁性材料。功能磁性材料主要有磁致伸缩材料、磁记录材料、磁电阻材料、磁泡材料、磁光材料、旋磁材料以及磁性薄膜材料等。 磁性材料的磁化过程可通过磁滞回线来表示。图1和1’分别为软磁材料和永磁材料的磁滞回线。其中Bs表示饱和磁感应强度,Br表示剩磁,Hc表示矫顽力。图中可以看出,软磁材料和硬磁材料最明显的区别就在于,硬磁材料的矫顽力远大于软磁材料。 图1 磁性材料的磁滞回线 1:软磁材料的磁滞回线,1’:硬磁材料的磁滞回线;Hc、Hc’:矫顽力;Bs、Bs’:饱和磁感应强度;Br、Br’:剩磁。

1.1 磁性材料各性能参数 (1)饱和磁感应强度Bs:是指磁体被磁化至饱和状态时的磁感应强度,其大小取决于材料的成分,与其他外在条件无关。它所对应的物理状态是材料内部的磁化矢量整齐排列。 (2)剩余磁感应强度Br:磁性材料经磁化至技术饱和,去掉外磁场后所保留的表面场Br, 称为剩余磁感应强度。简称剩磁,用Br表示,单位为特斯拉(T)或高斯(Gs),换算关系为1 T=10000 Gs。 (3)矫顽力Hc:磁性材料在饱和磁化后,当外磁场退回到零时其磁感应强度B 并不退到零,只有在原磁化场相反方向加上一定大小的磁场才能使磁感应强度退回到零,该磁场称为矫顽磁场,又称矫顽力。矫顽力单位是奥斯特(Oe)或千安/米(kA/m),1 kA/m=12.56 Oe。矫顽力反应了磁性材料抵抗退磁的能力。 (4)居里温度Tc:也称磁性转变点,是指材料可以在铁磁和顺磁体之间改变的温度。当温度低于居里温度时物质表现为铁磁性,此时和材料有关的磁场很难改变。当温度高于居里温度时物质表现为顺磁性。简单地说,居里温度就是材料失去磁性时的温度,即高于此温度时材料磁性消失。 1.2 软磁材料的主要技术指标 软磁材料是指能够迅速响应外磁场的变化,且能低损耗地获得高磁感应强度的材料,它既容易受外磁场磁化,又容易退磁。应用中,对软磁材料的主要技术指标有以下要求: (1)初始磁导率μi和最大磁导率μmax要高。磁导率是表征材料的磁性、导磁性及磁化难易程度的一个磁学量,是软磁材料的重要参数。初始磁导率是磁中性状态下磁导率的极限值,从使用要求看,主要是看起始磁导率μi。 (2)矫顽力Hc要小。软磁材料的基本性能要求是能快速地响应外磁场变化,这就要求材料具有低矫顽力值。通常软磁材料的矫顽力约为10-1~102 A/m。 (3)饱和磁感应强度Bs要高。饱和磁感应强度是软磁材料的重要磁性参量。通常要求软磁材料具有高的饱和磁感应强度Bs,这样不仅可以获得高的μi值,还可以节省资源,实现磁性器件的小型化。材料的Bs值一般不可能有较大变动。 (4)功率损耗P要低。软磁材料多用于交流磁场,因此动态磁化造成的次损耗不可忽视。动态磁化所造成的次损耗包括3个部分:涡流损耗,磁滞损耗和剩余

磁铁牌号及性能参数

能积和矫顽力,可吸起相当于自身重量的640倍的重物。高能量密度的优点使钕铁硼永磁材料在现代工业和电子技术中获得了广泛应用,从而使仪器仪表、电声电机、磁选磁化等设备的小型化、轻量化、薄型化成为可能。 钕铁硼的优点是性能价格比高,具良好的机械特性,易于切削加工;不足之处在于居里温度点低,温度特性差,且易于粉化腐蚀,必须通过调整其化学成分和采取表面处理方法使之得以改进,从而达到实际应用的要求。 钕铁硼的制造采用粉末冶金工艺,将含有一定配比的原材料如:钕、镝、铁、钴、铌、镨、铝、硼铁等通过中频感应熔炼炉冶炼成合金钢锭,然后破碎制成3~5μm 的粉料,并在磁场中压制成型,成型后的生坯在真空烧结炉中烧结致密并回火时效,这样就得到了具有一定磁性能的永磁体毛坯。毛坯经过磨削、钻孔、切片等加工工序后,再经表面处理就得到了用户所需的钕铁硼成品。 表征磁性材料参数分别是: 1、磁能积(BH): 定义:在永磁体的退磁曲线的任意点上磁通密度(B)与对应的磁场强度(H)的乘积。它是表征永 磁材料单位体积对外产生的磁场中总储存能量的一个参数。 单位:兆高·奥(MGOe)或焦/米3(J/m3) 简要说明:退磁曲线上任何一点的B和H的乘积即BH我们称为磁能积,而B×H的最大值称之为最大磁能积,为退磁曲线上的D点。磁能积是衡量磁体所储存能量大小的重要参数之一。在磁体使用时对应于一定能量的磁体,要求磁体的体积尽可能小。 2、剩磁Br: 定义:将铁磁性材料磁化后去除磁场,被磁化的铁磁体上所剩余的磁化强度。 3、矫顽力(Hcb、Hcj) Hcj(内禀矫顽力)使磁体的磁化强度降为零所需施加的反向磁场强度,我们称之为内禀矫顽力。内禀矫顽力是衡量磁体抗退磁能力的一个物理量,是表示材料中的磁化强度M退到零的矫顽力。在磁体使用中,磁体矫顽力越高,温度稳定性越好。 Hcb(磁感矫顽力)给磁性材料加反向磁场时,使磁感应强度降为零所需反向磁场强度的值称之为磁感矫顽力(Hcb)。但此时磁体的磁化强度并不为零,只是所加的反向磁场与磁体的磁化强度作用相互抵消。(对外磁感应强度表现为零)此时若撤消外磁场,磁体仍具有一定的磁性能。 4、温度系数 剩磁可逆温度系数αBr:当工作环境温度自室温T0升至温度T1时,钕铁硼的剩磁Br也从B0降至B1;当环境温度恢复至室温时,Br并不能恢复到B0,而只能到B0'。此后当环境温度在

相关文档
最新文档