Web Service Technologies and their Synergy with Simulation

合集下载

AMT630

AMT630

AMT630Video Display Controller(Product Specification)Version 1.0 2012.04ARKMICRO TECHNOLOGIES INC. reserves the right to change or modify the information contained herein without notice. It is the customer’s responsibility to obtain the most recent revision of the document. ARKMICRO makes no warranty for the use of its products and bears no responsibility for any errors or omissions that may appear in this document.C ON FI D E NT I ALRevision Record:DateRevisionModification Description2012‐4‐8V1.0Initial VersionC ON FI D E NT I AL1. General DescriptionAMT630 is a highly integrated video control SoC with Digital LCD/TFT panel displaying controller and could support parallel RGB panel, sRGB panel,ITU656 panel, digital TCON and CPU panel. AMT630 integrates a video decoder and an Analog TFT ‐LCD Panel Control. It accepts analog NTSC / PAL / SECAM CVBS signals and S ‐Video from TV tuner, DVD, or VCR sources, including weak and distorted signals. Automatic gain control (AGC) and 9‐bit 2‐channel A/D converters provide high resolution video quantization, with automatic video source and mode detection. User can easily switch and adjust variety of signal source. Multiple internal adaptive PLL could precisely extract pixel clock from video source and perform sharp ‐and ‐keen color demodulation. Build ‐in line buffer supports adaptive 2‐D comb ‐filter, 2‐D sharpening, and synchronization stable in a condense manner. Build ‐in On Screen Display (OSD) module is very flexiable and easy programming. DC/DC, DC/AC, VCOM, etc. modules are cost effective for low cost and small area PCB solutions.2. FeaturesVideo DecoderComposite and S ‐Video Inputs; Multiple standards supported: NTSC and NTSC ‐Japan;PAL (B, D, G, H, I, M, N, etc.); SECAM;Four Analog Inputs: 1xCVBS+1xS ‐Video or 3xCVBS Inputs Analog and Digital AGC9‐Bit 2‐Channel A/D Converters with Fixed Sampling Clock Only One Crystal (24 MHz) required for All Standards Internal PLL to Generate Video ClockAdaptive 2‐D Comb Filter for Luminance and Chrominance Separation Precise Chrominance DemodulationInternal Buffers for Video Stability Control Video Noise ReductionVideo EnhancementFrequency Directive SharpeningBrightness, Contrast, Color, and Tint Adjustments Black ‐Level Extension and White ‐Level ExtensionDigital Chrominance Transient Improvement(DCTI) and Digital Luminance Transient Improvement(DLTI) 3‐channel Gamma curve adjustment Green level enhancement Auto contrast adjustmentAuto chrominance adjustmentScaling EngineSupport Digital panel with the resolution of 480x240, 640x240, 520x288, 800x480, 800x600,1024x768, andmoreSupport horizontal panorama scalingC ON FI D E NT I ALSupport vertical panorama scalingOSD BlockBuilt ‐in 512‐Character Font ROM (Including Special Font Characters) Dynamic OSD font RAM ‐‐‐‐‐‐3072x12 (192 character) bytes 16 colors palette, support 5 OSD windows Support 16 color bitmapBlending with OSD Content and Video Blinking and Highlight FunctionMirror image around FunctionInterfaceBuild ‐in parallel RGB panel, sRGB panel, digital TCON panel and CPU panel interfaces Digital RGB Independent Output Line ‐Inversion, Offset Control 8‐Bit/10‐Bit CCIR 656 Digital Video Output Format Support I2C ‐BUS interface (slave)MCUInstruction fully compatible with industry standard 803x/805x, Fully static synchronous design High performance with 4 clock cycles per instruction cycle, up to 24MHz clock speed Program store in an external SPI Flash or E2PROM with ISP (In System Program) Build ‐in boot ROM support serial port configuration 2 Sets of Built ‐In PWM circuit: 2x16 bit and 3x11 bitBuild ‐in 3 channels 10Bit ADC for serial key or other analog inputSupports 13 standard interrupt sources include external interrupt, 3 Timer, Watchdog etc Programmable I/O ports (GPIO)I2C ‐BUS interface (master and slave)Hardware Remoter decoder support NEC and RC ‐5 IR codePeripheralBuild ‐in MCU & SPI Flash interface& E2PROM interface Support SPI FLASH and E2PROM on line program Build ‐in 10 Bit SAR ADC Build ‐in Display PLLBuild ‐in LDO for 1.8v core powerBuild ‐in DC/DC controller which generate VGH (+15V) and VGL (‐10V) of panel bias voltageBuild ‐in DC/AC controller with over ‐voltage and open ‐Lamp protection make a low ‐cost back ‐light solution Programmable VCOM amplitude & Offset3.3V Power SupplyPackageLQFP 64 Pin PackageC ON FI D E NT I AL3. Application FieldCar Reversing Monitor Visible Door Monitor Portable DVD / TVSmall to medium sized LCD TVOther application using analog panel as the display unit3.1 Portable ‐DVD, Portable ‐TV or Mini ‐TV3.2 Visible Door Monitor/Car Reversing MonitorC ON FI D E NT I AL4. Block DiagramC ON FI D E NT I ALS F _C S /G P I O 9/E 2P _S C L G 2G 3G 4G 5G 6G 7P 14/I N T 3/G 0P 11/T 1/G 1S F _C L K /G P I O 8S P I _S I /G P I O 10S P I _S O /G P I O 11/E 2P _S D AD V D DA V S S 33_D D SA V D D 33_D D SV C O M _A CP01/REMOTER2R3R4R5R6R7RESETN VSYN VDD DVDD R0/GPIO13VSS HSYN DOE DCK V P PR 1X I NX O U TD V D DB 1B 0B 6B 5B 4B 3B 2B 7A V D D _D A CP 17/B I A S _D R VP 07/D C _P W MA10A11A1D AVSS_ADCA21AVDD_ADC A2DVREF_CP15/INT4/TXD1/AD3P13/T2/RXD1/AD2P12/T2EX/AD1VDDDVDD P05/SCL1P04/SDA1AVDD_ADCC OLPIN TYPE DESCRIPTION1 IO ITU_D0_P/GPIO0/G2/PWMA2 IO ITU_D1_P/GPIO1/G3/PWMB3 IO ITU_D2_P/GPIO2/G4/CPU_RST4 IO ITU_D3_P/GPIO3/G5/CPU_CS5 IO ITU_D4_P/GPIO4/G6/CPU_RD6 IO ITU_D5_P/GPIO5/G7/CPU_WR7 IO P14/INT3_N/DC_PWM/STVR/G0/ITU_D6/ITU601_HSYN 8 IO P11/T1/CKV/PMODE/SRGB_DEN/G1/ITU_D7/ITU601_VSYN 9 IO SF_CLK/PCLK/GPIO8 10 IO SF_CS/PCEB/GPIO9/E2P_SCL11 IO SPI_SI/PEN/GPIO10 12 IO SPI_SO/PDATA/GPIO11/E2P_SDA 13 P DVDD14 P VSSD/VSS/AVSS33_DDS 15 PAVDD33_DDS 16 IO VCOM_AC/POL/SRGB_H 17 IO P01/REMOTE18 IO R2/SD2/CPU_D0/TCPH3 19 IO R3/SD3/CPU_D1/P20/STVR/SD0/ITU_D0/CKH3 20 IO R4/SD4/CPU_D2/P21/PWMA/SD1/ITU_D1 21 IO R5/SD5/CPU_D3/P22/PWMB/SD2/ITU_D222 IO R6/SD6/CPU_D4/P23 23 IO R7/SD7/CPU_D5/P24 24 I RESETN 25 IO (BOOT_UART)/STVL/VSYN/CPU_RD/SRGB_V/CPU_D6/SD4/ITU_D426 P VDD27 P DVDD 28 IO (BOOT_SPI)/TCPH1(LD)/GPIO13/SD0/R0/SD5/ITU_D5 29 PVSS 30 IO STHL/HSYN/CPU_CS/CPU_D7/SRGB_H/SD6/ITU_D631 IO (BOOT_OTP)/TCPH4/DOE/CPU_RS/SRGB_DEN/SD1/SD7/ITU_D7 32 IO CKH1/DCK/CPU_WR/CPU_D8/SRGB_CLK/ITU_CLK33 P VPP 34 P DVDD35 AOUT XOUT 36 AIN XIN37 IO G5/CPU_D9/GPIO19/STHR/R138 IO G6/CPU_D10/GPIO20/SCL0/PWMA/B0/RXD2 39IOG7/CPU_D11/GPIO21/SDA0/PWMB/B1/TXD2C ON FI D E NT I AL40 IO B2/P32/CPU_D12 41 IO B3/P33/CPU_D13 42 IO B4/P34/CPU_D14 43 IO B5/P35/CPU_D15 44 IO B6/P36/CPU_D16 45 IO B7/P37/CPU_D17 46 IO DC_PWM/P07 47 IO BIAS_DRV/P17/SRGB_V 48 P AVDD_DAC 49 IO P04/SDA1 50 IO P05/SCL1 51 P DVDD 52 P VDD53 IO P12/T2EX/AD154 IO P13/T2/RXD1/AD2 55 IO P15/INT4/TXD1/AD356 AOUT VREF_C 57 AOUT A2D 58 P AVDD_ADC 59 AINA21 (YC C in channel) 60 P AVSS_ADC 61 AOUT A1D62 AIN A11 CVBS IN 63 AIN A10 CVBS IN 64PAVDD_ADC7. Electrical Characteristics7.1 DC CharacteristicsSYMBOLPARAMETERCONDITIONSMIN.TYP.MAX.UNITDVDD Digital IO supply voltage3.0 3.3 3.6 V I DVDDDigital supply current ‐‐ 50 60 mA VPP OTP Program supply voltage6.5 V AVDD_ADCAnalog ADC supply voltage 3.0 3.3 3.6 V AVDD33_DDS Analog DDS supply voltage 3.0 3.3 3.6 V AVDD33_DAC Analog DAC supply voltage3.0 3.3 3.6 V I AVDDTotal analog supply currentCVBS input405060mAC ON FI D E NT I AL7.2 AC CharacteristicsSYMBOLPARAMETERCONDITIONS MIN.TYP.MAX. UNITAnalog partIclamp Clamping current VI=0.9VDC‐‐ +‐16 ‐‐ uA Vi(p_p)Input voltage(Peak ‐to ‐peak value)For normal video levels 1V(p ‐p), 3dBtermination 18/56 and AC coupling required; Coupling capacitor=22nF ‐‐0.7‐‐V|Zin| Input impedance Clamping current off 200 ‐‐‐‐ K Ω Ci Input capacitance ‐‐ ‐‐ 10 pF @cs Channel crosstalk fi<5MHz ‐‐‐‐ ‐50 dB9‐bit analog ‐to ‐digital convertersB Analog bandwidth At ‐3dB ‐‐ 7 ‐‐ MHz Фdiff Differential phase ‐‐2‐‐ Deg Gdiff Differential gain ‐‐ 2‐‐ % Fadc ADC clock frequency13.5 27 54 MHz DNL DC differential linearity Error ‐‐ 0.7 ‐‐ LSB INLDC integral linearity error‐‐1‐‐ LSBPLLFOUT PLL output range‐‐ ‐‐ 480 MHz FIN Input reference frequency range 1 ‐‐ 24 MHz Fvco VCO frequency range‐‐ ‐‐ 480 MHz Tjitter Timing Jitter Peak to Peak‐‐ 88 ‐‐ Ps Tjitter rms Timing Jitter RMS‐‐ 18 ‐‐Ps10BIT SAR ADCresolution‐‐ 10 ‐‐ BIT Vi(p_p) input voltage(peak ‐to ‐peak value)‐‐ 2 3.3 V Fadc Sample clock‐‐ ‐‐ 1 MHz INLDC integral linearity error‐‐ ‐‐ +‐2 LSB DNLDC differential linearity error ‐‐‐‐+‐2LSBDigital inputsVIL(n) Low ‐level input voltage 0 0.4 V VIH(n)High ‐level inputvoltage2.43.6VC ON FI D E NT I ALDigital outputsVOL Low ‐level output voltage 0 0.4 V VOHHigh ‐level outputvoltage2.4vcc+0.5VTemperatureTA Ambient OperationTemperature0 70 ℃ TSTG Storage Temperature ‐40 125 ℃ TjJunction Temperature125℃8. PackageAMT630 is packaged in a 64 Pin LQFP package.C ON FI D E NT I ALMILLIMETER SYMBOLMIN(mm)NOR(mm)MAX(mm)A ‐ ‐ 1.60 A1 0.05 ‐ 0.20 A2 1.35 1.40 1.45 A3 0.59 0.64 0.69 b 0.17 ‐ 0.25 b1 0.16 0.18 0.20c 0.13 ‐ 0.18 c2 0.12 0.127 0.14D 8.80 9.00 9.20 D1 6.90 7.00 7.10E 8.80 9.00 9.20E1 6.90 7.007.10 eB 8.10 ‐8.25e 0.40BSCL 0.40 ‐ 0.65 L1 1.00BSC θ 0‐ 7°160x160 L/F (mil )210x210C ON FI D E NT I AL。

windows进程(超全)

windows进程(超全)

windows进程(超全)services.exe进程文件 : services or services.exe进程名称 : windows service controller描述 : 管理 windows 服务。

是否为系统进程 : 是smss.exe进程文件 : smss or smss.exe进程名称 : session manager subsystem描述 : 该进程为会话管理子系统用以初始化系统变量,ms-dos 驱动名称类似 lpt1以及 com,调用 win32 壳子系统和运行在windows 登陆过程。

是否为系统进程 : 是snmp.exe进程文件 : snmp or snmp.exe进程名称 : microsoft snmp agent描述 : windows 简单的网络协议代理(snmp)用于监听和发送请求到适当的网络部分。

是否为系统进程 : 是spool32.exe进程文件 : spool32 or spool32.exe进程名称 : printer spooler描述 : windows 打印任务控制程序,用以打印机就绪。

是否为系统进程 : 是spoolsv.exe进程文件 : spoolsv or spoolsv.exe进程名称 : printer spooler service描述 : windows 打印任务控制程序,用以打印机就绪。

是否为系统进程 : 是stisvc.exe进程文件 : stisvc or stisvc.exe进程名称 : still image service描述 : still image service 用于控制扫描仪和数码相机连接在 windows。

是否为系统进程 : 是svchost.exe进程文件 : svchost or svchost.exe进程名称 : service host process描述 : service host process是一个标准的动态连接库主机处理服务。

计算机专业英语单选题

计算机专业英语单选题

1. A __D_copy is a copy of a current file made in order to protect against loss or damage.备份拷贝是为了防止丢失或损坏而制作的当前文件的副本。

A.softB.fileC.hardD.backup2.The most commonly used tool in the design phase is the ____D____.在设计阶段最常用的工具是结构图A.topology chartB.flowchartsC.object-relationship chartD.structure chart3.____A____refers to the parts of the computer that you can see and touch.硬件指的是你能看到和触摸到的电脑的各个部分A.HardwareB.InstructionC.HardshipD.Software4.if we want to retrieve data from the database with SQL,we should use the comand of D如果我们想用SQL从数据库中检索数据,我们应该使用comandA.ins_ertB.upd_ateC.del_eteD.sel_ect5.Which of the following is not the stages of programming?A下面哪个不是编程的阶段A.Print the program.B.Debug the program.pile the program.D.Write a program.6.Multimedia will become increasingly __B__ throughout every aspect of our lives.多媒体将在我们生活的各个方面变得越来越普遍A.preciseB.pervasiveC.permitD.passmunication through the Internet, the_C___ performs the reverse function.通过Internet进行通信,数据通信设备(DCE)执行反向功能。

全国高中英语竞赛试题

全国高中英语竞赛试题

全国高中英语竞赛试题一、听力理解(共20分)1. 短对话理解(每题1分,共5分)听下面5段对话,每段对话后有一个问题。

从题中所给的A、B、C 三个选项中选出最佳选项。

(对话内容略)1. What does the man want to do?A. Go to the library.B. Watch a movie.C. Do his homework.2. Why is the woman upset?A. She lost her keys.B. She missed the bus.C. She failed the exam.(以下问题略)2. 长对话理解(每题2分,共10分)听下面一段较长的对话,对话后有5个问题。

从题中所给的A、B、C三个选项中选出最佳选项。

(对话内容略)6. What is the relationship between the two speakers?A. Teacher and student.B. Friends.C. Boss and employee.7. What does the woman suggest the man do?A. Take a break.B. Go to the doctor.C. Finish the project first.(以下问题略)3. 短文理解(每题2分,共5分)听下面一段短文,短文后有3个问题。

从题中所给的A、B、C三个选项中选出最佳选项。

(短文内容略)11. What is the main topic of the passage?A. Environmental protection.B. Technological innovation.C. Cultural exchange.12. What does the speaker think about the issue discussed?A. It is very serious.B. It can be easily solved.C. It requires international cooperation.(以下问题略)二、词汇与语法(共20分)4. 词汇题(每题1分,共10分)根据句子的意思和提示,填入适当的单词。

希尔斯通 S 系列网络入侵防御系统(NIPS)S600 S1060 S1560 S190

希尔斯通 S 系列网络入侵防御系统(NIPS)S600   S1060   S1560   S190

Hillstone S-SeriesNetwork Intrusion Prevention System (NIPS)S600 / S1060 / S1560 / S1900 / S2100 / S2160 / S2700 / S2660 / S3560 / S3500 /S3860 / S3900 / S5500 /S5560As the threat landscape continues to evolve aggressively, an increasing number of network pro-tection technologies have quickly emerged. Among these various technologies, Intrusion Preven-tion System (IPS) remains one of the most widely deployed solutions, regardless of platform or form factor.Hillstone Network-based IPS (NIPS) appliance operates in-line, and at wire speed, performing deep packet inspection, and assembling inspection of all network traffic. It also applies rules based on several methodologies, including protocol anomaly analysis and signature analysis to block threats. Hillstone NIPS can be deployed in the network to inspect traffic left undetected by perimeter solutions, and is an integral part of network security systems for its high-performance, no compromise, best-of-breed protection capability and broad and flexible deployment scenarios.Product HighlightsUnparalleled Threat Protection without Performance CompromiseThe Hillstone NIPS platform has the most comprehensive high performance inspection engine, combined with the best-of-breed signature partnering with leading technology part-ners, providing customers the highest threat detection rate with the lowest total cost of ownership (TCO). Hillstone IPS engine has 99.6% blocking rate of static exploits and 98.325% blocking rate of live exploits (reported by NSS Labs).The Hillstone NIPS platform provides high throughput, low latency and maximum availability to maintain efficient secu -rity operations without compromising network performance. NIPS combines protocol analysis, threat reputation and other features that deliver threat protection from Layer 2 to Layer 7, including ARP attack, Dos/DDoS attack, abnormal protocols, malicious URLs, malwares and web attacks.Granular Reporting with User Targeted ViewpointsHillstone NIPS provides comprehensive visibility based on protocol, application, user and content. It can identify more than 4,000 applications, including hundreds of mobile and cloud applications.Bringing multiple sources together, the system can identify contextual information to make proper blocking decisions. With a granular and robust reporting function, it offers visibil-ity across different views:• Unique templates, based on whether you are a business system administrator, a security administrator or the CIO or executive.• Organized Threat Content – whether a security, system risk, network threat or traffic view – in order to help you clearly understand the risk and make the right decision.Product Highlights (Continued) FeaturesIntrusion Prevention• 12,700+ signatures, protocol anomaly detection, rate-based detection, custom signatures, manual, automatic push or pull signature updates, integrated threat encyclopedia• IPS Actions: monitor, block, reset (attackers IP or victim IP, incoming interface) with expiry time• Packet logging option• Filter based selection and review: severity, target, OS, application or protocol • IP exemption from specific IPS signatures• IDS sniffer mode• IPv4 and IPv6 rate based DoS protection with threshold settings against TCP Syn flood, TCP/UDP/SCTP port scan, ICMP sweep, TCP/UDP/SCIP/ICMP session flooding (source/destination)• Active bypass with bypass interfaces• Predefined prevention configuration• Support web server protection, including CC attack, external link attack, iframe, cross-site request forgery (CSRF) attack, etc.• Support protection of brute force attack including FTP, MSRPC, POP3, SMTP, SUNRPC and telnet• Support weak password detection for FTP, MSRPC, POP3, SMTP, SUNRPC and telnet• Threat Details support URI and Attack Data Decoding• Support MPLS frame inspectionThreat Correlation Analytics• Correlation among unknown threats, abnormal behavior and application behavior to discover potential threat or attacks• Multi-dimension correlation rules, automatic daily update from the cloud Advanced Threat Detection• Behavior-based advanced malware detection• Detection of more than 2000 known and unknown malware families including Virus, Worm, Trojan, Spyware, Overflow etc• Real-time, online, malware behavior model database updateAbnormal Behavior Detection• Behavior modeling based on L3-L7 baseline traffic to reveal anomalous network behavior, such as HTTP scanning, Spider, SPAM, SSH/FTP weak password, and spyware• Detection of DDoS including Flood, Sockstress, zip of death, reflect, DNS query, SSL DDos and application DDoS• Supports inspection of encrypted tunneling traffic for unknown applications • Real-time, online, abnormal behavior model database updateAntivirus• Manual, automatic push or pull signature updates• Flow-based antivirus: protocols include HTTP/HTTPS, SMTP, POP3, IMAP, FTP/ SFTP, SMB• Compressed file virus scanning Attack Defense• Abnormal protocol attack defense• Anti-DoS/DDoS, including SYN Flood, DNS Query Flood defense• ARP attack defense• IP scanning and port scanningURL Filtering• Flow-based web filtering inspection• Manually defined web filtering based on URL, web content and MIME header• Dynamic web filtering with cloud-based real-time categorization database: over 140 million URLs with 64 categories (8 of which are security related)• Additional web filtering features:- Filter Java Applet, ActiveX or cookie- Block HTTP Post- Log search keywords- Exempt scanning encrypted connections on certain categories for privacy• Web filtering profile override: allows administrator to temporarily assign different profiles to user/group/IP• Web filter local categories and category rating override• Support allow/block list• Customizable alarmAnti-Spam• Real-time spam classification and prevention• Confirmed spam, suspected spam, bulk spam, valid bulk• Protection regardless of the language, format, or content of the message• Support both SMTP and POP3 email protocols• Inbound and outbound detection• Whitelists to allow emails from trusted domain/email addresses• User-defined blacklistsCloud-Sandbox• Upload malicious files to cloud sandbox for analysis• Support protocols including HTTP/HTTPS, POP3, IMAP, SMTP and FTP• Support file types including PE, ZIP, RAR, Office, PDF, APK, JAR and SWF• File transfer direction and file size control• Provide complete behavior analysis report for malicious files• Global threat intelligence sharing, real-time threat blocking• Support detection only mode without uploading filesData Security• Web content filtering and file content filtering• Support file filtering with over 100 file formats• Support network behavior recordingEase of Deployment and Centralized Management Deploying and managing the Hillstone NIPS is simple, with minimum overhead. It can be deployed in the following modes to meet security requirements and ensure optimal network connectivity:• Active protection (intrusion prevention mode), real time monitoring and blocking.• Passive detection (intrusion detection mode), real time monitoring and alert.The Hillstone NIPS can be managed by the Hillstone Security Management Platform (HSM). Administrators can centrally register, monitor, and upgrade NIPS devices deployed in differ-ent branches or locations, with a unified management policy across the network for maximum efficiency.Features (Continued)Botnet C&C Prevention• Discover intranet botnet host by monitoring C&C connections and block further advanced threats such as botnet and ransomware• Regularly update the botnet server addresses• Prevention for C&C IP and domain• Support TCP, HTTP, and DNS traffic detection• IP and domain whitelistsIP Reputation• Identify and filter traffic from risky IPs such as botnet hosts, spammers, Tor nodes, breached hosts, and brute force attacks• Logging, dropping packets, or blocking for different types of risky IP traffic• Regular IP reputation signature database upgradeApplication Control• Over 4,000 applications that can be filtered by name, category, subcategory, technology and risk• Each application contains a description, risk factors, dependencies, typical ports used, and URLs for additional reference• Actions: block, monitor• Provide multi-dimensional monitoring and statistics for applications running in the cloud, including risk category and characteristics• Support encrypted applicationQuality of Service (QoS)• Support encrypted application• Max/guaranteed bandwidth tunnels or IP/user basis• Tunnel allocation based on security domain, interface, address, user/user group, server/server group, application/app group, TOS, VLAN• Bandwidth allocated by time, priority, or equal bandwidth sharing• Type of Service (TOS) and Differentiated Services (DiffServ) support• Prioritized allocation of remaining bandwidth• Maximum concurrent connections per IP• Bandwidth allocation based on URL category• Bandwidth limit by delaying access for user or IPIPv6• Management over IPv6, IPv6 logging and HA• IPv6 tunneling, DNS64/NAT64 etc• IPv6 routing protocols, static routing, policy routing, ISIS, RIPng, OSPFv3 and BGP4+• IPS, Application identification, Antivirus, Access control, ND attack defense VSYS• System resource allocation to each VSYS• CPU virtualization• Non-root VSYS support IPS, URL filtering, Policy, QoS, etc.• VSYS monitoring and statistics• Support backup of all VSYS configurations at onceSSL Proxy• SSL offload: SSL traffic decryption• SSL require/ exempt: SSL traffic allowed or block based on the policy rules without decryptionFlexible Traffic Analysis and Control• Support 3 operation modes: Route/NAT (layer 3) , Transparent (layer 2) with optional bypass interface, and TAP mode (IDS Mode) with Hillstone Firewall Integration• Traffic analysis and control based on policy rules by source/destination zone, source/destination IP address, users, service or applications High Availability• Redundant heartbeat interfaces• AP and peer mode• Standalone session synchronization• HA reserved management interface• Failover:- Port, local & remote link monitoring- Stateful failover- Sub-second failover- Failure notification• Deployment Options:- HA with link aggregation- Full mesh HA- Geographically dispersed HAVisible Administration• Management access: HTTP/HTTPS, SSH, telnet, console• Central Management: Hillstone Security Manager (HSM), web service APIs • Two-factor authentication: username/password, HTTPS certificates file• System Integration: SNMP, syslog, alliance partnerships• Rapid deployment: USB auto-install, local and remote script execution• Dynamic real-time dashboard status and drill-in monitoring widgets• Storage device management: storage space threshold customization and alarm, old data overlay, stop recording.• Language support: EnglishLogs and Reporting• Logging facilities: local storage for up to 6 months, multiple syslog servers and multiple Hillstone Security Audit (HSA) platforms• Encrypted logging and log integrity with HSA scheduled batch log uploading • Reliable logging using TCP option (RFC 3195)• Detailed traffic logs: forwarded, violated sessions, local traffic, invalid packets • Comprehensive event logs: system and administrative activity audits, routing & networking, VPN, user authentications, WiFi related events• Log aggregation: support aggregation of AV and C&C logs• IP and service port name resolution option• Brief traffic log format option• Granular Reporting with User Targeted Viewpoints- HA Management/C-level View- Business System Owner View- Network Security Administrator ViewStatistics and Monitoring• Application, URL, threat events statistic and monitoring• Real-time traffic statistic and analytics• System information such as concurrent session, CPU, Memory and temperature• iQOS traffic statistic and monitoring, link status monitoring• Support traffic information collection and forwarding via Netflow (v9.0)• Cloud-based threat intelligence push service• Geographical distribution of external network attacksCloudView• Cloud-based security monitoring• 24/7 access from web or mobile application• Device status, traffic and threat monitoring• Cloud-based log retention and reporting500 GB (optional)Dimension (W×D×H, mm)16.9 × 11.8 × 1.7 in(430×300×44mm)17.1×12.6×1.7 in(436x 320x 44mm)16.9 x 14.8 x 1.7 in(430x375x44mm)Weight14.3 lb (6.5 kg)14.33 lb (6.5kg)22.0 lb (10 kg)Temperature32-104°F (0-40°C)32-104°F (0-40°C)32-104°F (0-40°C) Relative Humidity5-85% (no dew)10%~95% (no dew)5-85% (no dew)14 GbpsConsumption 1 + 1 1 + 1 1 + 1Dimension (W×D×H, mm)16.9 × 19.7 × 3.5 in(430×500×88mm)16.9 × 19.7 × 3.5 in(430×500×88mm)17.1×21.3×1.7 in(436x542x44mm)Weight35.3 lb (16 kg)35.3 lb (16 kg)32.6 lb (14.8kg)Temperature32-104°F (0-40°C)32-104°F (0-40°C)32-104°F (0-40°C) Relative Humidity5-85% (no dew)5-85% (no dew)10%~95% (no dew)ModuleIOC-S-4GE-B-LIOC-S-4SFP-LIOC-S-4GE-BIOC-S-4SFPIOC-S-8SFPIOC-S-4GE-4SFPI/O Ports 4 x SFP Ports4 × SFP Ports 4 × GE and 4 × SFP Ports Dimension slot)1U (Occupies 1 generic slot)slot)1U (Occupies 1 generic slot)generic slot) 1U (Occupies 1 generic slot)Weight0.22 lb (0.1 kg)0.22 lb (0.1 kg)0.33 lb (0.15 kg)0.33 lb (0.15 kg)0.55 lb (0.25 kg)0.55 lb (0.25 kg)ModuleIOC-S-2SFP+IOC-S-4SFP+IOC-S-4SFP-BIOC-S-2SFP+-BIOC-S-4SFP+-BIOC-S-4GE-B-HIOC-S-4GE-4SFP-HI/O Ports 2 × SFP+ Ports 4 × SFP+ Ports 4 × SFP Bypass Ports 2 × SFP+ Bypass Ports 4 × SFP+ Bypass Ports 4 × GE Bypass Ports 4 × GE and 4 × SFP Ports Dimension 1U (Occupies 1 generic slot)1U (Occupies 1 generic slot)1U (Occupies 1 generic slot) Weight0.44 lb (0.2 kg)0.88 lb (0.4 kg)0.33 lb (0.15 kg)ModuleIOC-S-8GE-B-HIOC-S-8SFP-HIOC-S-4SFP-HIOC-S-2SFP+-HIOC-S-4SFP+-HIOC-S-4SFP-B-HIOC-S-2SFP+-B-HI/O Ports 8 × GE Bypass Ports 8 × SFP Ports 4 × SFP Ports 2 × SFP+ Ports 4 × SFP+ Ports 4 × SFP Bypass Ports 2 × SFP+ Bypass Ports Dimension 1U (Occupies 1 generic slot)1U (Occupies 1 generic slot)1U (Occupies 1 generic slot) Weight0.55 lb (0.25 kg)0.33 lb (0.15 kg)0.88 lb (0.4 kg)Module OptionsNOTES:(1) IPS throughput data is obtained under HTTP traffic with all IPS rules being turned on;(2) Maximum concurrent connections are obtained under TCP traffic; and it can be upgraded with Additional Enhanced License (AEL);(3) New sessions are obtained under TCP traffic.Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R5. Results may vary based on StoneOS ® version and deployment.ModuleIOC-S-4SFP+-AIOC-S-2MM-BE-AIOC-S-2SM-BE-AIOC-S-2QSFP+-AI/O Ports 4 × SFP , MM bypass (2 pairs of bypass ports) 2 × QSFP+Dimension 1U1UWeight2.09 lb (0.96 kg)2.09 lb (0.96 kg)2.09 lb (0.96 kg)2.09 lb (0.96 kg)。

计算机专业英语考试试题及答案

计算机专业英语考试试题及答案

计算机专业英语考试试题及答案一、选择题1. Which of the following is NOT a programming language?A. JavaB. PythonC. HTMLD. CSS2. What does the acronym "SQL" stand for?A. Structured Query LanguageB. Simple Query LanguageC. Script Query LanguageD. Secure Query Language3. Which protocol is commonly used for sending and receiving emails?A. FTPB. HTTPC. SMTPD. TCP4. What does the term "CPU" refer to?A. Central Processing UnitB. Computer Processing UnitC. Central Program UnitD. Computer Program Unit5. Which of the following is NOT a type of network topology?A. StarB. RingC. MeshD. Scroll二、填空题1. HTML stands for Hypertext Markup Language, which is used for ____________.2. The process of converting source code into machine code is called ____________.3. IP address stands for ____________.4. The act of copying files from a remote server to a local computer is known as ____________.5. The programming language developed by Apple Inc. for iOS and macOS is ____________.三、简答题1. What is the difference between a compiler and an interpreter? Provide examples of programming languages that use each of these methods.2. Explain the concept of object-oriented programming (OOP) and provide an example of a programming language that utilizes this paradigm.3. Describe the client-server model and provide an example of a commonly used protocol within this model.四、论述题Discuss the impact of artificial intelligence (AI) on various industries. Provide examples of how AI is being used in fields such as healthcare, finance, and transportation. Analyze the potential benefits and challenges of implementing AI in these industries.答案:一、选择题1. C. HTML2. A. Structured Query Language3. C. SMTP4. A. Central Processing Unit5. D. Scroll二、填空题1. creating and structuring the content of a webpage2. compilation3. Internet Protocol4. downloading5. Swift三、简答题1. A compiler translates the entire source code into machine code before the program is executed. Examples of languages that use compilers are C, C++, and Java. On the other hand, an interpreter translates and executes the source code line by line. Python and Ruby are examples of languages that use interpreters.2. Object-oriented programming (OOP) is a programming paradigm that organizes data and functions into reusable objects. It focuses on the concept of classes and objects, allowing for code reuse and encapsulation. An example of a programming language that uses OOP is Java, where objects are instances of classes and can interact with each other through methods and attributes.3. The client-server model is a distributed computing architecture wherea server provides services or resources to multiple clients. The clients request and receive these resources through the network. An example of a commonly used protocol within this model is the Hypertext Transfer Protocol (HTTP), which is used for communication between web browsers (clients) and web servers.四、论述题Artificial intelligence (AI) has had a significant impact on various industries. In healthcare, AI is being used for diagnoses and treatments, analyzing medical images, and personalized medicine. For example, AI-powered algorithms can help detect diseases like cancer at an early stage, leading to better treatment outcomes. In finance, AI is utilized for fraud detection, algorithmic trading, and customer service. AI algorithms can analyze large amounts of financial data to identify patterns and make accurate predictions. In transportation, AI is being employed for autonomous vehicles, traffic management, and logistics optimization. Self-driving cars, for instance, use AI algorithms to navigate and make decisions on the road.The implementation of AI in these industries brings about many benefits, such as increased efficiency, improved accuracy, and cost savings. AI systems can process and analyze vast amounts of data much faster than humans, leading to faster and more accurate results. However, there are also challenges to consider. Privacy and security concerns arise as AI systems handle sensitive information. There is also the worry of job displacement, as AI automation may replace certain human tasks. Additionally, ethical considerations need to be addressed, such as bias in algorithms and the potential for AI to be used for malicious purposes.Overall, the impact of AI on various industries is undeniable. It has the potential to revolutionize healthcare, finance, transportation, and many other sectors. However, careful implementation and regulation are necessary to ensure its responsible and beneficial use.。

TP-LINK AC1900 Wireless Dual Band Gigabit ADSL2+模式

TP-LINK AC1900 Wireless Dual Band Gigabit ADSL2+模式

Features
Speed
Wi-Fi Range
· Blazing Fast Wireless Speed – Combined wireless speeds up to 1.9Gbps at 2.4GHz & 5GHz band concurrently
· Support 802.11 ac – Offering 3 times faster data rate than 802.11n in a single stream
· Dual-core Processor – 1GHz dual-core processor boosts data transfer rate
· Ultimate Range & Reliable Wi-Fi – High-powered ampli ers ensure continuous Wi-Fi signal to all your devices while boosting widespread converage throughout your very large home
Easy Sharing
Ease of Use
Security
· Dual USB Ports for Fast Sharing – With one ultra-fast USB 3.0 port and one USB 2.0 port, you can access and share a printer as well as your files and media locally. Via the router’s FTP server, you can also have access to your files & media with networked devices remotely

信息技术导论英语

信息技术导论英语

信息技术导论英语Information technology (IT) has become an integral part of our daily lives, revolutionizing the way we communicate, work, and access information. This diverse field encompasses a wide range of domains, including computer hardware and software, networking, cybersecurity, data management, and artificial intelligence, among others. At its core, IT aims to develop and utilize technological solutions to enhance productivity, efficiency, and connectivity across various sectors.One of the most significant impacts of IT is the transformation of communication. The advent of the internet and digital communication platforms has shrunk the world, allowing individuals and organizations to connect and collaborate seamlessly across geographical boundaries. Email, instant messaging, video conferencing, and social media have become indispensable tools for personal and professional interactions. Additionally, IT has facilitated the rapid dissemination of information, making knowledge more accessible and democratizing education through online platforms and digital resources.In the realm of business, IT has revolutionized operational processesand decision-making strategies. Enterprise resource planning (ERP) systems, customer relationship management (CRM) software, and data analytics tools enable organizations to streamline operations, optimize resource allocation, and gain valuable insights into market trends and consumer behavior. Moreover, the integration of IT into supply chain management has enhanced logistics and distribution networks, facilitating efficient product delivery and inventory management.Healthcare is another sector that has witnessed tremendous advancements due to IT. Electronic health records (EHRs) have improved data management and patient care coordination, while telemedicine applications have expanded access to medical services, particularly in remote or underserved areas. Furthermore, advanced imaging technologies, robotic surgeries, and computational drug design have revolutionized diagnostic and therapeutic approaches, leading to improved patient outcomes and advancing medical research.Cybersecurity has emerged as a critical aspect of IT, as the increasing reliance on digital systems and the exchange of sensitive information has made data protection a paramount concern. IT professionals work diligently to develop robust security measures, such as firewalls, encryption techniques, and intrusion detection systems, to safeguard against cyber threats and ensure the confidentiality, integrity, andavailability of digital assets.Moreover, IT has played a pivotal role in advancing scientific research and innovation. High-performance computing (HPC) systems and sophisticated simulations have enabled scientists to tackle complex problems, analyze vast amounts of data, and model intricate phenomena across various disciplines, from astrophysics and climate research to drug discovery and materials science.As IT continues to evolve, emerging technologies such as artificial intelligence (AI), machine learning, and the Internet of Things (IoT) are poised to further transform our lives. AI algorithms are being integrated into numerous applications, from virtual assistants and predictive analytics to autonomous vehicles and intelligent decision support systems. IoT, on the other hand, is enabling the interconnectivity of physical devices and sensors, paving the way for smart homes, cities, and industrial automation.While the advancements in IT have brought about numerous benefits, they also raise ethical considerations and challenges. Issues related to privacy, data security, algorithmic bias, and the responsible development and deployment of AI systems require careful deliberation and proactive governance to ensure that technology serves the greater good of society.In conclusion, information technology has permeated virtually every aspect of our modern world, reshaping the way we live, work, and interact. As a dynamic and ever-evolving field, IT continues to push the boundaries of innovation, driving progress and shaping the future of our global society. Embracing the potential of IT while addressing its ethical implications will be crucial in navigating the technological landscape ahead.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Proceedings of the2002Winter Simulation ConferenceE.Y¨u cesan,C.-H.Chen,J.L.Snowdon,and J.M.Charnes,eds.WEB SER VICE TECHNOLOGIES AND THEIR SYNERGY WITH SIMULATIONSenthilanand ChandrasekaranGregory SilverJohn lerJorge CardosoAmit P.ShethDepartment of Computer Science/LSDIS LabThe University of GeorgiaAthens,Georgia30602-7404,U.S.A.ABSTRACTThe World Wide Web has had an huge influence on the computingfield in general as well as simulation in particular(e.g.,Web-Based Simulation).A new wave of development based upon XML has started.Two of the most interesting aspects of this development are the Semantic Web and Web Services.This paper examines the synergy between Web service technology and sim-ulation.In one direction,Web service processes can be simulated for the purpose of correcting/improving the design.In the other direction,simulation mod-els/components can be built out of Web services.Work on seamlessly using simulation as a part of Web service composition and process design,as well as on using Web services to re-build the JSIM Web-based simulation en-vironment is highlighted.1INTRODUCTIONThe World Wide Web has had an huge influence on the computingfield in general as well as simulation in particular(e.g.,Web-Based Simulation).A new wave of development based upon eXtensible Markup Language has started.Two of the most interesting aspects of this development are the Semantic Web and Web Services. This paper examines the synergy between Web ser-vice technology and simulation.In one direction,Web service processes can be simulated for the purpose of correcting/improving the design or even for making adaptive changes at runtime(Miller et al.2002).The success of an organization depends greatly on the effi-ciency and effectiveness of its business processes.The advent of Web services and Web processes(composition of Web services)enables organizations to easily collab-orate in their business processes.When composing a Web process it is useful to analyze and compute overall operational properties.This allows organizations to translate their vision into their busi-ness processes more efficiently,since Web process can be designed according to operational metrics.Opera-tional metrics can be described using a suitable Quality of Service(QoS)model(Cardoso,Miller et al.2002; Cardoso,Sheth et al.2002;Miller et al.2002).Such a model makes possible the description of Web services and Web processes according to their timeliness,cost of service,and reliability.QoS analysis becomes increasingly more important when Web processes model complex and mission-critical applications.QoS analysis and monitoring serve to ensure that each application meets user require-ments.For e-commerce processes,it is important to know the QoS an application will exhibit before mak-ing the service available to customers.At runtime,it is important to identify whether processes exhibit the metrics specified at design time.If threshold levels are reached,adaptation strategies need to be applied to correct the operational metrics of Web processes.The analysis of Web processes according to their QoS can be carried out using several methods.While math-ematical methods have been effectively used(Cardoso, Miller et al.2002),another alternative is to utilize sim-ulation analysis(Miller et al.2002).Simulation plays an important role by exploring“what-if”questions dur-ing the process composition phase.Our earlier work on workflows and simulation(Miller et al.2002)enables us to perceive how simulation can serve as a tool for the Web process composition problem.The analysis of the QoS of Web processes differs from the analysis of workflows due to the distribution,autonomy,and het-erogeneity of its components.Our current work on using simulation for Web ser-vices focuses on extending JSIM(Miller et al.1997; Nair et al.1996)and integrating it with Web process design tools,as well as Web process enactment engines. The designer,Web Process Design Tool(WPDT),al-lows composition to be done graphically.To aid the user in this composition task,our system is enhanced with enactment and simulation features.Enactment of a process helps in evaluating the performance of the in-dividual services and simulation is done to study theprocess in action,before enactment.In the other direction,using Web services for simu-lation,simulation models/components can be built out of Web services.Well tested simulation models may be placed on the Web for others to use.Resources and tools used in simulation environments make excellent candidates for Web services.If this vision can be real-ized,future development can be done on a higher plane, allowing better and more comprehensive solutions to be developed.The rest of the paper is organized as follows.In Sec-tion2,we present the related work in this area while Section3introduces composite Web services,issues re-lated to specification of Web services,and composition of Web services.Section4covers our system archi-tecture,Web process designer tool,and our enactment technique.In Section5,we explain our performance evaluation approach for evaluating/comparing the in-voked Web services.Simulation and its application to Web process composition are discussed in Section6. Section7discusses how simulations may be built out of Web services.Finally,conclusion and future work are presented in Section8.2RELATED WORKSome work has begun on the use of simulation to study Web service composition and Web processes,but little work has been done on the use of Web services to build simulation environments.Web service composition is an active area of research,with many concepts and languages being proposed by different research groups. IBM has proposed WSFL(Web Service Flow Language) (Leymann2001),an XML based language developed to describe complex service compositions.WSFL sup-ports aflow model and a global model specification for each Web process.Theflow model defines the structure of the Web process,while the global model specifies the Web services,which implement the activities in the process.Microsoft’s Web service composition language, XLANG(Thatte2001),extends the WSDL(Web Ser-vice Description Language)(Christensen et al.2001)to provide a model for orchestration of services.XL(Flo-rescu et al.2002),another portable W3C compliant XML programming language,is designed for the imple-mentation of Web Services.In contrast to these XML based standards,researchers are developing DAML-S (Ankolekar et al.2001),which aims to automate Web service tasks(discovery,composition,invocation,and monitoring)using specifications based on ontologies. DAML-S,unlike the earlier XML based languages,is capable of describing the semantics of Web services.Is-sues such as searching for services and interoperability of selected services arise when a Web service composi-tion is done.Cardoso and Sheth(2002)explore seman-tic searching for Web services and their interoperability. An ontology based solution is proposed in that paper. Though use of simulation to test processes has been carried out earlier for workflow models(Miller et al. 1995;Miller et al.2002),simulation of composite Web services represents a new direction.The work that most closely relates to ours is described in Narayanan and Mcllraith(2002).In their work,DAML-S service de-scriptions of composite services are encoded in a Petri Net formalism,providing decision procedures for Web services simulation,verification,and composition.3COMPOSITE WEB SER VICESEarlier attempts in distributed computing to estab-lish interoperability with standards such as DCOM, CORBA,EJB and RMI had key limitations like plat-form dependency,tight coupling and limited interoper-ability.Hence the industry saw the need for a new dis-tributed computing approach that can overcome these limitations.The Web services paradigm has been pro-posed to solve these problems.A Web service is a universally accessible software component deployed on the Web.Such a software com-ponent is described by an interface listing the collection of operations that can be performed on it.Web services (unlike earlier distributed computing models)are suit-able for integrating e-business applications for the fol-lowing reasons.They are XML based,allowing them to address data encoding problems that existed in earlier models.They support XML based distributed comput-ing using SOAP(Simple Object Access Protocol)and can be accessed using ubiquitous transport protocols like HTTP and SMTP.Individual(atomic)Web services provide only spe-cific functionality.A Web Process(composite Web ser-vice)is a service made up of several components,each of which may be an atomic Web service.A process is created by orchestrating existing Web services,and defining the control and dataflows among them.A proper specification of Web services and Web pro-cesses is required for efficient inter-operation in a dis-tributed environment.3.1Web Services SpecificationDescription of services in a widely accepted format is vital for the widespread use of Web services.Ser-vice providers describe their Web services and adver-tise them in a registry.This enables service requesters to search for services,that match their requirements. XML,the emerging standard for data representation, has been chosen as the language for describing Webservices.The specification of a Web service,should in-clude syntactic(what does it look like),semantic(what does it mean)and QoS(how well does it perform)in-formation.Quality of Service(QoS)(Cardoso,Sheth et al.2002)attributes,which are timeliness,cost of ser-vice,and reliability,provide a description of the quality that can be expected from the service.Time,cost and reliability are some of the QoS attributes that describe a service.WSDL and DAML-S are the two major languages used to describe Web services.WSDL is the W3C stan-dard XML language used to specify a Web service’s in-terface and it defines the syntactic information about a service.DAML-S is an ontology based interface descrip-tion language,that can describe the syntactic as well as the semantic content of a service.DAML-S describes some nonfunctional QoS related attributes of a service, but WSDL does not provide any QoS information.3.2Web Process SpecificationA Web Process needs to be described in a way similar to the way a Web service’s interface is described.Pop-ular languages for describing the composition of Web services include WSFL,XLANG,and DAML-S.These languages can be used to describe composed process. Interoperability issues among the chosen Web services needs to be taken care of when using these languages to develop a process.The developer has to explicitly understand the details of the interfaces and specify the mappings that are required.As WSFL is one of the ma-ture and practical languages for Web process composi-tion,we chose WSFL to represent composed processes in our system.The WSFL specification is currently be-ing worked on to add QoS extensibility elements.Since this work is still in progress,we have extended WSFL’s specification to include time,cost,and reliability QoS attributes for each activity in our system.3.2.1Web Service CompositionWeb service composition is the creation of a Web Pro-cess from individual Web services.Web processes facili-tate expanding the utility of Web services.Web service composition can be either static or dynamic.In static composition,the services are predetermined during the design of the Web process.In a dynamic composition, the Web service to be used for an activity is decided at run-time by,for example,the process enactment en-gine.Dynamic composition involves run-time searching of registries tofind services.Web service composition can be represented as a workflow graph with activities(services)and transi-tion links(control and data).In composing Web ser-vices to form processes,data links and control links are used to specify the dataflow and controlflow re-spectively among the services.Standard constructs like XOR splits,AND splits,XOR joins,AND joins are used to capture the execution logic in the process.An XOR split is used to indicate the branching of the control flow in one of the outgoing control links.An AND split indicates the branching of the controlflow in all of the outgoing control links in parallel.An AND join indi-cates synchronizing on all incoming controls links while an XOR join indicates waiting on one of the indicated incoming control links3.2.2ScenarioFigure2depicts the tasks involved in buying a book.The activities(Web services)in this pro-cess are SearchAmazonCatalog,ChooseProduct,Check-Credit,CheckInventory,GenerateBackOrder,Release-Order and rmation about re-lated books for a given search is retrieved using the SearchAmazonCatalog service and a book is chosen by the user via the ChooseProduct service.The user’s account is then checked for sufficient funds using the CheckCredit service.CheckCredit service is an example of an XOR split activity.After the CheckCredit ser-vice,the controlflows in one of the two control links depending on whether the CheckCredit service returns success or failure.If the user has sufficient credit,the CheckInventory service is invoked;else the SendCredit-LowInfo service is invoked.If the CheckInventory Web service returns true the ReleaseOrder service is invoked to send the books,else the GenerateBackOrder service is invoked.4SYSTEM DESIGNIn this section,we describe our system architecture for designing,simulating,and creating Web service pro-cesses(see Figure1).A Web Process Designer Tool(WPDT)is used to compose processes and store the designs in a repository. These Web process models are transformed automati-cally to JSIM simulation models using the inbuilt Simu-lation Model Generator.Simulation is done to evaluate the performance of the process.The simulation model can be modified to answer“what-if”questions about the process.The Web process may also be enacted on a test basis,to evaluate the performance of its Web services.Based on the results of the simulation and test enactment,we may adapt the process to meet our needs.Figure1:System Architecture4.1WPDT-Web Process DesignAs part of our work,we have developed the WPDT,for composing Web services into Web processes(see Fig-ure2).WPDT is a process-design tool,that allows static composition of Web services to build Web pro-cesses.WPDT stores Web processes as WSFL specifi-cations.We will briefly explain how WPDT is used to design Web processes.A Web process,similar to a workflow, is represented as a digraph with source,sink,activi-ties(Web services)and transition links.In WPDT,we have three kinds of nodes,namely,source node,sink node and activity ers need to provide the in-formation about the Web services implementing each activity.This includes the WSDLfile location and QoS information.The dataflow(DataLink)between the activities is represented as green transition links(not in picture).The black transition links represents both dataflow and controlflow(DataLink/ControlLink) between the activities as shown in Figure2.WPDT stores its Web process designs(XML based WSFL specifications)in a Db4XML repository(Sipani et al.2002),which is an XML database,developed at the University of Georgia.Since Db4XML supports XQuery(XML Query Language),users can compose a Web process and efficiently query the design using the XQuery language.Efficient querying of these Web process designs is desired when one needs to extract information about a design.To test a process,we need to enact it.In the next section,we discuss enactment strategies that can be employed to invoke a Web process and our system im-plementation.4.2Web Process EnactmentWeb process enactment is similar to a workflow enact-ment,the difference being the components of a workflow are activities while the components of a Web process are Web services.Web services differ from workflow activities in their distribution,autonomy and hetero-geneity.Substantial research on workflow enactment, has been done in the LSDIS Lab at the University of Georgia(Sheth et al.1996;Miller,Palaniswami et al. 1998,Kochut et al.1999).Based on our work,we put forward two approaches for enacting Web processes:a centralized approach and a distributed approach.The centralized approach is based on a client/server architecture.It uses a controller,which controls the ex-ecution of the Web process and serves as the client re-questing service from the Web services.The controller invokes a Web service,gets the results,based on the re-sults and the Web process design specification,the con-troller then invokes the next appropriate Web service. This controller-based approach is the easiest means of enacting Web processes.The distributed approach for a Web process enact-ment is more complex.In a distributed approach there is no controller,and Web services are expected to share the execution context of the process,so that distributed execution is possible with the collaboration of other Web services.This sharing of the context can be achieved dynamically by peer-to-peer communication between Web service hosts(Benatallah et al.2002),or using agent based solutions(Stormer2001).We have implemented the centralized technique in our system with a controller executing the composed Web process.In our implementation,a Perl controller module,manages the entire Web process execution. This Perl enactment code is generated from the WSFLFigure 2:Web Process Design using WPDTspecification of the Web process.Perl was selected be-cause its easy to use SOAP modules help in quickly scripting the process description from the WSFL spec-ification.During the test enactment of a Web process,we in-strument our controller module to determine the em-pirical data associated with the test.This includes measuring the total time taken for each Web service invocation.This enables us to analyze individual Web service performance and analyze the distribution of ser-vice times associated with its execution.5PERFORMANCE EV ALUATIONPerformance evaluation of Web services can help im-plementers understand the behavior of the activities in a composed process.Since the performance of a single Web service has the potential to affect the performance of an entire Web process,it is wise to evaluate the per-formance of the critical services within a process before enactment.The time taken by a single Web service depends on Service time (S),Message delay time (M)and Queue time (Q).Service time is the amount of time that the Web service takes to perform its task.Message de-lay time is determined by the size of the message be-ing transmitted/returned and the load on the network through which the message is being sent.Queue time is the delay caused by the load on the system where the Web service is deployed.The Total invocation time (T)for Web service s is given in the formula below:T(s )=S(s )+M(s )+Q(s )Our enactment system uses the centralized approach and is therefore controller based,allowing us to do per-formance evaluation by instrumentation on the con-troller side.We determined the total invocation time for each Web service and then calculated the time for each of the components that make up total invocation time.Message delay time was calculated by invoking a ping function for each Web service.XML messages were sent and received,but the Web service performed no work.Service time was calculated by running tests against the Web service in an environment where the load and queuing delay for the service were controlled.The queue time was determined by running the test in an environment where the Web service was loaded with requests.Figure 3shows the average time taken by the primary Web services in our test enactment.Performance evaluation can help in adapting the Web process based on the Quality of Service requirements.Figure 3shows the distribution of the overall time for one of our tests.In Figure 3,the ReleaseOrder Web service has a high queuing time.This may indicate that the system hosting the service is not able to handle the load.Replacing the ReleaseOrder Web service with another service may improve the quality of service for the Web process.The performance evaluation of Web services needs to be done in a controlled manner.This requires that one be able to control the load on the system during testing.The distribution and autonomy of Web services makesFigure3:Timing Results for the Book Purchasing Web Processmeeting this requirement diffiing simulation to predict the performance of a Web process is therefore very useful.6SIMULATIONSimulation helps in determining how composed Web services will perform when they are deployed and may also uncover structural errors in the design.Simulation serves as an important step in designing efficient pro-cesses.The WPDT process designer is integrated with the JSIM simulation system.WPDT is linked to a JSIM Model Generator to generate JSIM simulation model from the WSFL process model.Currently JSIM simu-lates the controller based enactment of Web processes (see Figure4).Simulation of distributed enactment is underway.As both WSFL process model and JSIM simulation model are represented as digraphs,mapping from the WSFL model to the JSIM Model is straightfor-ward.Control links in the process model map to trans-ports in the JSIM simulation model.Activities in the process model map to facilities in the simulation model. Thinking for a moment in the other direction,one could use WFSL like specifications as a basis for developing XML standards for specifying simulation models.6.1JSIM SimulationThe latest version of JSIM,a Java-based simulation and animation environment(Nair et al.1996;Miller et al. 1997),contains several features that support the sim-ulation of Web processes.JSIM simulation models are constructed using the following basic components:•Source Nodes:Generate entities using an inter-ar-rival time produced by a random variate.•Server Nodes:Provide service to entities using a service time produced by a random variate.Servers may have one or several service units.•Facility Nodes:Behave like a server node but also provide a queue for waiting entities.•Sink Nodes:Consume entities and capture statis-tical information about the entities.•Transports:Edges that connects two nodes.•SimObjects:Instances of simulation entities. Messages sent to or received from Web services are modeled as SimObjects.The Web services in the pro-cess are modeled as Facility or Server nodes,and the communication channels between Web services are modeled as Transports.The primary enhancements,conditional routing and AND splits,to support the simulation of Web services are discussed briefly.6.1.1Conditional RoutingIn prior versions of JSIM,an entity leaving a node would probabilistically choose an out edge to transport it to the next node.JSIM has been enhanced to allow an out edge to be selected based on the values of sim-ulation entity attributes.The model developer is given the option to add additional attributes to instances of the SimObject class and out edge selection criteria toinstances of the Transport class.The selection criteria are specified as Java condition expressions.AND Splits allow an entity to choose more than one out edge to transport it.When an entity encounters an AND Split,the entity is cloned and each copy of the entity exits the node on a different out edge.Each of the copies of the entity continues to traverse the graph until they encounter a node containing an AND Join. Each copy of the entity will wait at this node until all other copies arrive.Once all of the copies arrive,they are joined by rule-based merging of the attribute values of the copy entity with the attribute values of the orig-inal entity and placing results into the attributes of the original entity.The copies are then removed from the model,and the original entity may continue to traverse the graph.The time for the original entity to be transported from the node with the AND Split to the node with the AND Join is considered to be the greatest amount of time that it takes any of the copies to be transported between the nodes.When simulating Web processes,the JSIM model takes as input the distribution functions characterizing the Web services.The service time distribution func-tions of the Web services,are used to generate service times for characterizing the facility/server nodes in the JSIM model specification.These distribution functions can be computed by performance evaluation tests as ex-plained earlier or obtained from the service providers. 7BUILDING SIMULATION ENVIRON-MENTS OUT OF WEB SER VICESCurrently,the World Wide Web is mainly a collection of documents that are searchable via keywords.Enor-mous efforts are currently underway to transform it into a more effective Web.Simultaneously,Web documents are being made more meaningful and functional capa-bilities are being added.These efforts are referred to as the Semantic Web and Web Services,respectively. The intent of the semantic Web is to allow users tofind more of the information they want and less of the in-formation they do not want.In other words,hits will be better targeted.With the incredible aggregate com-puting power and newer,higher network bandwidths, it only makes sense to provide services on the Web. This has been done for awhile in a proprietary fashion (e.g.,ordering a book from ).For thefirst time in the history of computing,infrastructure is be-ing developed to provide services in a standardized and interoperable fashion,on a global scale.7.1Types of Web ServicesMany types of Web services can be useful in simulation. We discuss three types below.7.1.1Whole Models as Web Services Prehaps the most useful is to make complete simula-tion models available as Web services.Certain sites develop an expertise with certain types of simulation (e.g.,a highway traffic simulation or weather simula-tion)and if one wishes to perform such a simulation, they could simply send a SOAP message to the appro-priate site which characterizes the scenario they wish to study.The model Web service could charge on a per use basis or lease out its service.7.1.2Environmental Components as Web Ser-vicesDrilling down a bit,a simulation may use several major components such as Databases,Spreadsheets,Knowl-edge Bases,Visualization Tools,OLAP Tools,Data Mining Tools,Scenario Managers,Optimizers and ponents with infrequent interation are the best candidates to be separated out as Web ser-vices.The service may be provided by a third party,but might well be provided within the same organization. The Web service paradigm would be followed for the purposes of standardization,interoperability,maintain-ability andflexibility(e.g.,if the company’s database is replaced,so long as the relevant Web service is redevel-oped,none of the simulation models using the database need to be changed).•Thefirst three components/resources(Databases, Spreadsheets and Knowledge Bases)are mainly data/information/knowledge sources and sinks which would be primarily used at the beginning and end of a simulation and hence are excellent candidates for becomming Web services.•The second three components/tools(Visualization Tools,OLAP Tools and Data Mining Tools)can be decoupled from the simulation and simply ac-cess an information resource,so they are also well suited.•Thefinal three components(Scenario Managers, Optimizers and Animators)are more tightly cou-pled with simulation,but are still separable enough to form cooperative Web services.Depending on its form an animator may be either tightly-coupled(e.g.,has access to the simulation state)or loosely-coupled(e.g.,has access to a trace that is say stored in a database).Figure4:JSIM Model for the Book Purchasing Web ProcessThe beauty of this approach is that one could de-velop a simulation or general-purpose simulation engine and simply link it with other state-of-the-art compo-nents.Some of these components such as databases and visualization tools are better left to other commu-nities/industries rather than having to be redeveloped by the simulation community.As Web services,they would then be readily and easily available.7.1.3Model Federates as Web ServicesThefinal step in utilizing Web service technology would be to code model federates as Web services.If the in-teraction rate between federates is not too high,the disadvantage of increased overhead may be outweighed by the interoperability benefits.In cases in which en-forcement of cauasality is not important,this change would be straightfoward.If causality is to be enforced, then new infrastructure needs to be developed.Already, there are efforts to provide composite Web services with transactional capabilities(Mikalsen et al.2002).Pro-vision for casuality could similarly be provided.Such an effort would parallel the work done on the High-Level Architecture(Frederick et al.2000)and might even serve as a spark to ignite commercial efforts at standardization for distributed/federated simulation, the practicality of which has so far been limited to the military sector.7.2Evolution of JSIMDuring the past decade researchers have explored the use of component-based software to develop modular simulation environments.These environments allow developers to treat simulation models and other data resources as components that can be assembled to cre-ate more elaborate simulation models.The JSIM simu-lation environment currently uses Java Beans technol-ogy to link the simulation models(Miller et al.1998). JSIM also uses XML-based messaging to address in-teroperability issues(Huang and Miller2001).Other researchers have used an agent-based environment for linking simulation models,data resources and other components(Wilson et al.2001;Mills-Tettey et al. 2002).The JSIM project is currently in the process of con-version to Web service technology.Services will be composed both statically and dynamically for sim-ulation applications.Services(models,resources, tools or federates)may be found on the Web us-ing registries/repositories.Decriptions in the form of WSDL,WFSL,DAML-S or some newer descrip-tion/information modeling scheme will be used.On-tologies will provide a semantic basis for the terms used in these descriptions providing greater pricision infind-ing the appropriate Web service.Web service technol-ogy is being used to make JSIM models available as。

相关文档
最新文档