毕业设计(论文)外文翻译

合集下载

毕业论文(设计)外文文献翻译及原文

毕业论文(设计)外文文献翻译及原文

金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。

一、引言各个国家的企业在显著不同的金融体制下运行。

金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。

然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。

这项研究结果解释表明企业投资受限于外部资金的可得性。

很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。

因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。

The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。

Information is available instantaneously which means that change and subsequent market reactions occur very quickly。

The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。

Counterparties can rapidly become problematic。

As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。

【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。

毕业设计外文文献翻译范文

毕业设计外文文献翻译范文

毕业设计外文文献翻译专业学生姓名班级学号指导教师优集学院外文资料名称:Knowledge-Based Engineeri--ng Design Methodology外文资料出处:Int.J.Engng Ed.Vol.16.No.1附件: 1.外文资料翻译译文2.外文原文基于知识工程(KBE)设计方法D. E. CALKINS1.背景复杂系统的发展需要很多工程和管理方面的知识、决策,它要满足很多竞争性的要求。

设计被认为是决定产品最终形态、成本、可靠性、市场接受程度的首要因素。

高级别的工程设计和分析过程(概念设计阶段)特别重要,因为大多数的生命周期成本和整体系统的质量都在这个阶段。

产品成本的压缩最可能发生在产品设计的最初阶段。

整个生命周期阶段大约百分之七十的成本花费在概念设计阶段结束时,缩短设计周期的关键是缩短概念设计阶段,这样同时也减少了工程的重新设计工作量。

工程权衡过程中采用良好的估计和非正式的启发进行概念设计。

传统CAD工具对概念设计阶段的支持非常有限。

有必要,进行涉及多个学科的交流合作来快速进行设计分析(包括性能,成本,可靠性等)。

最后,必须能够管理大量的特定领域的知识。

解决方案是在概念设计阶段包含进更过资源,通过消除重新设计来缩短整个产品的时间。

所有这些因素都主张采取综合设计工具和环境,以在早期的综合设计阶段提供帮助。

这种集成设计工具能够使由不同学科的工程师、设计者在面对复杂的需求和约束时能够对设计意图达成共识。

那个设计工具可以让设计团队研究在更高级别上的更多配置细节。

问题就是架构一个设计工具,以满足所有这些要求。

2.虚拟(数字)原型模型现在需要是一种代表产品设计为得到一将允许一产品的早发展和评价的真实事实上原型的过程的方式。

虚拟样机将取代传统的物理样机,并允许设计工程师,研究“假设”的情况,同时反复更新他们的设计。

真正的虚拟原型,不仅代表形状和形式,即几何形状,它也代表如重量,材料,性能和制造工艺的非几何属性。

本科毕业设计外文文献翻译

本科毕业设计外文文献翻译

(Shear wall st ructural design ofh igh-lev el fr ameworkWu Jiche ngAbstract : In t his pape r the basic c oncepts of man pow er from th e fra me sh ear w all str uc ture, analy sis of the struct ur al des ign of th e c ont ent of t he fr ame she ar wall, in cludi ng the seism ic wa ll she ar spa本科毕业设计外文文献翻译学校代码: 10128学 号:题 目:Shear wall structural design of high-level framework 学生姓名: 学 院:土木工程学院 系 别:建筑工程系 专 业:土木工程专业(建筑工程方向) 班 级:土木08-(5)班 指导教师: (副教授)nratiodesign, and a concretestructure in themost co mmonly usedframe shear wallstructurethedesign of p oints to note.Keywords: concrete; frameshearwall structure;high-risebuildingsThe wall is amodern high-rise buildings is an impo rtant buildingcontent, the size of theframe shear wall must comply with building regulations. The principle is that the largersizebut the thicknessmust besmaller geometric featuresshouldbe presented to the plate,the force is close to cylindrical.The wall shear wa ll structure is a flatcomponent. Itsexposure to the force along the plane level of therole ofshear and moment, must also take intoaccountthe vertical pressure.Operate under thecombined action ofbending moments and axial force andshear forcebythe cantilever deep beam under the action of the force levelto loo kinto the bottom mounted on the basis of. Shearwall isdividedinto a whole walland theassociated shear wall in theactual project,a wholewallfor exampl e, such as generalhousingconstruction in the gableor fish bone structure filmwalls and small openingswall.Coupled Shear walls are connected bythecoupling beam shear wall.Butbecause thegeneralcoupling beamstiffness is less thanthe wall stiffnessof the limbs,so. Walllimb aloneis obvious.The central beam of theinflection pointtopay attentionto thewall pressure than the limits of the limb axis. Will forma shortwide beams,widecolumn wall limbshear wall openings toolarge component atbothen ds with just the domain of variable cross-section ro din the internalforcesunder theactionof many Walllimb inflection point Therefore, the calcula tions and construction shouldAccordingtoapproximate the framestructure to consider.The designof shear walls shouldbe based on the characteristics of avariety ofwall itself,and differentmechanical ch aracteristicsand requirements,wall oftheinternalforcedistribution and failuremodes of specific and comprehensive consideration of the design reinforcement and structural measures. Frame shear wall structure design is to consider the structure of the overall analysis for both directionsofthehorizontal and verticaleffects. Obtain theinternal force is required in accordancewiththe bias or partial pull normal section forcecalculation.The wall structure oftheframe shear wall structural design of the content frame high-rise buildings, in the actual projectintheuse of themost seismic walls have sufficient quantitiesto meet thelimitsof the layer displacement, the location isrelatively flexible. Seismic wall for continuous layout,full-length through.Should bedesigned to avoid the wall mutations in limb length and alignment is notupand down the hole. The sametime.The inside of the hole marginscolumnshould not belessthan300mm inordertoguaranteethelengthof the column as the edgeof the component and constraint edgecomponents.Thebi-direc tional lateral force resisting structural form of vertical andhorizontalwallconnected.Each other as the affinityof the shear wall. For one, two seismic frame she ar walls,even beam highratio should notgreaterthan 5 and a height of not less than400mm.Midline columnand beams,wall midline shouldnotbe greater tha nthe columnwidthof1/4,in order toreduce thetorsional effect of the seismicaction onthecolumn.Otherwisecan be taken tostrengthen thestirrupratio inthe column tomake up.If theshear wall shearspan thanthe big two. Eventhe beamcro ss-height ratiogreaterthan 2.5, then the design pressure of thecut shouldnotmakeabig 0.2. However, if the shearwallshear spanratioof less than two couplingbeams span of less than 2.5, then the shear compres sion ratiois notgreater than 0.15. Theother hand,the bottom ofthe frame shear wallstructure to enhance thedesign should notbe less than200mmand notlessthanstorey 1/16,otherpartsshouldnot be less than 160mm and not less thanstorey 1/20. Aroundthe wall of the frame shear wall structure shouldbe set to the beam or dark beamand the side columntoform a border. Horizontal distributionofshear walls can from the shear effect,this design when building higher longeror framestructure reinforcement should be appropriatelyincreased, especially in the sensitiveparts of the beam position or temperature, stiffnesschange is bestappropriately increased, thenconsideration shouldbe givento the wallverticalreinforcement,because it is mainly from the bending effect, andtake in some multi-storeyshearwall structurereinforcedreinforcement rate -likelessconstrained edgeofthecomponent or components reinforcement of theedge component.References: [1 sad Hayashi,He Yaming. On the shortshear wall high-rise buildingdesign [J].Keyuan, 2008, (O2).高层框架剪力墙结构设计吴继成摘要: 本文从框架剪力墙结构设计的基本概念人手, 分析了框架剪力墙的构造设计内容, 包括抗震墙、剪跨比等的设计, 并出混凝土结构中最常用的框架剪力墙结构设计的注意要点。

毕业设计论文 外文文献翻译

毕业设计论文 外文文献翻译

毕业设计(论文)外文参考文献翻译计算机科学与信息工程系系(院)2008 届题目企业即时通Instant Messaging for Enterprises课题类型技术开发课题来源自选学生姓名许帅专业班级 04计算机科学与技术指导老师王占中职称工程师完成日期:2008年4 月 6 日目录I NSTANT M ESSAGING FOR E NTERPRISE (1)1. Tips (1)2. Introduction (1)3. First things first (2)4.The While-Accept loop (4)5. Per-Thread class (6)6. The Client class (7)企业即时通 (9)1.提示 (9)2.简介 (9)3.首先第一件事 (10)4.监听循环 (11)5.单线程类 (13)6.用户端类 (14)Instant Messaging for Enterprise1. TipsIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a tr aditional programming perspective. Although Java is very useful for solving traditional standalone programming problems, it is also important because it will solve programming problems on the World Wide Web. What is the Web?The Web can seem a bit of a mys tery at first, with all this talk of “surfing,”“presence,” and “home pages.” It’s helpful to step back and see what it really is, but to do this you must understand client/server systems, another aspect of computing that is full of confusing issues. The primary idea of a client/server system is that you have a central repository of information,some kind of data, often in a database。

毕业设计(论文)外文资料翻译(学生用)

毕业设计(论文)外文资料翻译(学生用)

毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。

程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。

一般地,我们需要理解连网协议中不同的“层”(Layer)。

而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。

这是一项令人痛苦的工作。

但是,连网本身的概念并不是很难。

我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。

这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。

Java最出色的一个地方就是它的“无痛苦连网”概念。

有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。

我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。

除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。

本章将用一系列易懂的例子解释Java的连网支持。

15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。

早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。

但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。

为达到这个目的,我们采用了IP(互联网地址)的概念。

IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。

我自己的域名是。

所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。

单片机基础毕业设计外文翻译

单片机基础毕业设计外文翻译

本科生毕业设计(论文)外文翻译毕业设计题目:外文题目:Fundamentals of Single-chip Microcomputer 译文题目:单片机基础学院:信息科学与工程学院专业班级:电子信息工程0802班学生姓名:指导教师:外文原文Fundamentals of Single-chip MicrocomputerDr. Dobbs MacintoshJournalAbstractT h e s i n gl e-chi p m i c r o com pu t er i s t h e cul m i na t i on of bo t h t h e d e v el opm e nt o f t h e di gi t al c om p ut e r a nd t h e i nt e gra t e d c i r c ui t a rgu a b l y t h e t ow m o st s i gn i fi c ant i nv en t i on s of t h e 20t h ce n t u r y .T h es e t o w t yp e s o f a rc hi t e c t u r e a r e fo un d i n s i n gl e-c hi p m i c r o com pu t e r.S om e e m p l o y t h e s pl i t p ro gr a m/d at a m em o r y o f t h e H a r v a rd a r ch i t e ct u r e, s ho wn i n F i g.3-5A-1, ot h er s f o l l o w t he p hi l o so ph y,w i d e l y a d a p t ed f o r ge n e r al-pu rp os e com p ut e rs and m i c r op r oc e s s o rs,of m ak i n g n o l o gi c al di s t i nc t i on be t w ee n p ro gr a m a n d d at a m em o r y a s i n t h e P r i n c et on ar c hi t e ct u r e.In ge n e r a l t er m s a si n gl e-c hi p m i cro c om put e r i s c ha r ac t e ri z ed b y t h e i n co r po r at i o n o f al l t h e u ni t s o f a c om put e r i n t o a s i n gl e d e vi c e.Keyword: Single-chip Microcomputer ROM RAM Programming Algorithm Features• Compatible with MCS-51™ Products• 4K Bytes of In-System Reprogrammable Flash Memory– Endurance: 1,000 Write/Erase Cycles• Fully Static Operation: 0 Hz to 24 MHz• Three-level Program Memory Lock• 128 x 8-bit Internal RAM• 32 Programmable I/O Lines• Two 16-bit Timer/Counters• Six Interrupt Sources• Programmable Serial Channel• Low-power Idle and Power-down ModesDescriptionThe AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4Kbytes of Flash programmable and erasable read only memory (PEROM). The deviceis manufactured using Atmel’s high-density nonvolatile memory technology and iscompatible with the industry-standard MCS-51 instruction set and pinout. Theon-chipFlash allows the program memory to be reprogrammed in-system or by a conventionalnonvolatile memory programmer. By combining a versatile 8-bit CPU with Flashon a monolithic chip, the Atmel AT89C51 is a powerful microcomputer which providesa highly-flexible and cost-effective solution to many embedded control applications.The AT89C51 provides the following standard features: 4Kbytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bittimer/counters, a five vector two-level interrupt architecture,a full duplex serial port, on-chip oscillator and clock circuitry.In addition, the AT89C51 is designed with static logicfor operation down to zero frequency and supports twosoftware selectable power saving modes. The Idle Modestops the CPU while allowing the RAM, timer/counters,serial port and interrupt system to continue functioning. ThePower-down Mode saves the RAM contents but freezesthe oscillator disabling all other chip functions until the nexthardware reset.Pin ConfigurationsBlock DiagramPin DescriptionVCCSupply voltage.GNDGround.Port 0Port 0 is an 8-bit open-drain bi-directional I/O port. As anoutput port, each pin can sink eight TTL inputs. When 1sare written to port 0 pins, the pins can be used as highimpedanceinputs.Port 0 may also be configured to be the multiplexed loworderaddress/data bus during accesses to external programand data memory. In this mode P0 has internalpullups.Port 0 also receives the code bytes during Flash programming,and outputs the code bytes during programverification. External pullups are required during program verification.Port 1Port 1 is an 8-bit bi-directional I/O port with internal pullups.The Port 1 output buffers can sink/source four TTL inputs.When 1s are written to Port 1 pins they are pulled high bythe internal pullups and can be used as inputs. As inputs,Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pullups.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2Port 2 is an 8-bit bi-directional I/O port with internal pullups.The Port 2 output buffers can sink/source four TTL inputs.When 1s are written to Port 2 pins they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pullups.Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that use 16-bit addresses (MOVX @DPTR). In this application, it uses strong internal pullups when emitting 1s. During accesses to external data memory that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-orderaddress bits and some control signals during Flash programming and verification.Port 3Port 3 is an 8-bit bi-directional I/O port with internal pullups.The Port 3 output buffers can sink/source four TTL inputs.When 1s are written to Port 3 pins they are pulled high by the internal pullups and can be used as inputs. As inputs,Port 3 pins that are externally being pulled low will source current (IIL) because of the pullups.Port 3 also serves the functions of various special features of the AT89C51 as listed below:Port 3 also receives some control signals for Flash programmingand verification.ALE/PROGAddress Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation ALE is emitted at a constant rate of 1/6the oscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSENProgram Store Enable is the read strobe to external program memory.When theAT89C51 is executing code from external programmemory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPPExternal Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP.XTAL1Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2Output from the inverting oscillator amplifier.Oscillator CharacteristicsXTAL1 and XTAL2 are the input and output, respectively,of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed.Idle ModeIn idle mode, the CPU puts itself to sleep while all the onchip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset. It should be noted that when idle is terminated by a hard ware reset, the device normally resumes programexecution,from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory.Figure 1. Oscillator ConnectionsFigure 2. External Clock Drive ConfigurationPower-down ModeIn the power-down mode, the oscillator is stopped, and the instruction that invokes power-down is the last instruction executed. The on-chip RAM and Special Function Registers retain their values until the power-down mode is terminated. The only exit from power-down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize.Program Memory Lock BitsOn the chip are three lock bits which can be left unprogrammed (U) or can be programmed (P) to obtain the additional features listed in the table below.When lock bit 1 is programmed, the logic level at the EA pin is sampled and latched during reset. If the device is powered up without a reset, the latch initializes to a random value, and holds that value until reset is activated. It is necessary that the latched value of EA be in agreement with the current logic level at that pin in order for the device to function properly.Programming the FlashThe AT89C51 is normally shipped with the on-chip Flash memory array in the erased state (that is, contents = FFH) and ready to be programmed. The programming interface accepts either a high-voltage (12-volt) or a low-voltage (VCC) program enable signal. The low-voltage programming mode provides a convenient way to program theAT89C51 inside the user’s system, while the high-voltage programming mode is compatible with conventional thirdparty Flash or EPROM programmers. The AT89C51 is shipped with either the high-voltage or low-voltage programming mode enabled. The respective top-side marking and device signature codes are listed in the following table.The AT89C51 code memory array is programmed byte-bybyte in either programming mode. To program any nonblank byte in the on-chip Flash Memory, the entire memory must be erased using the Chip Erase Mode.Programming Algorithm: Before programming the AT89C51, the address, data and control signals should be set up according to the Flash programming mode table and Figure 3 and Figure 4. To program the AT89C51, take the following steps.1. Input the desired memory location on the address lines.2. Input the appropriate data byte on the data lines.3. Activate the correct combination of control signals.4. Raise EA/VPP to 12V for the high-voltage programming mode.5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte-write cycle is self-timed and typically takes no more than 1.5 ms.Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached.Data Polling: The AT89C51 features Data Polling to indicate the end of a write cycle. During a write cycle, an attempted read of the last byte written will result in the complement of the written datum on PO.7. Once the write cycle has been completed, true data are valid on all outputs, and the next cycle may begin. Data Polling may begin any time after a write cycle has been initiated.Ready/Busy: The progress of byte programming can also be monitored by theRDY/BSY output signal. P3.4 is pulled low after ALE goes high during programming to indicate BUSY. P3.4 is pulled high again when programming is done to indicate READY.Program Verify: If lock bits LB1 and LB2 have not been programmed, the programmed code data can be read back via the address and data lines for verification. The lock bits cannot be verified directly. Verification of the lock bits is achieved by observing that their features are enabled.Chip Erase: The entire Flash array is erased electrically by using the proper combination of control signals and by holding ALE/PROG low for 10 ms. The code array is written with all “1”s. The chip erase operation must be executed before the code memory can be re-programmed.Reading the Signature Bytes: The signature bytes are read by the same procedure as a normal verification of locations 030H, 031H, and 032H, except that P3.6 and P3.7 must be pulled to a logic low. The values returned are as follows.(030H) = 1EH indicates manufactured by Atmel(031H) = 51H indicates 89C51(032H) = FFH indicates 12V programming(032H) = 05H indicates 5V programmingProgramming InterfaceEvery code byte in the Flash array can be written and the entire array can be erasedby using the appropriate combination of control signals. The write operation cycle is selftimed and once initiated, will automatically time itself to completion. All major programming vendors offer worldwide support for the Atmel microcontroller series. Please contact your local programming vendor for the appropriate software revision.外文资料翻译译文单片机基础摘要:单片机是电脑和集成电路发展的巅峰,有据可查的是它们也是20世纪最意义的两大发明。

毕业设计(论文)外文资料翻译【范本模板】

毕业设计(论文)外文资料翻译【范本模板】

南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械系专业:车辆工程专业姓名:宋磊春学号:070102234外文出处:EDU_E_CAT_VBA_FF_V5R9(用外文写)附件:1。

外文资料翻译译文;2.外文原文.附件1:外文资料翻译译文CATIA V5 的自动化CATIA V5的自动化和脚本:在NT 和Unix上:脚本允许你用宏指令以非常简单的方式计划CATIA。

CATIA 使用在MS –VBScript中(V5.x中在NT和UNIX3。

0 )的共用部分来使得在两个平台上运行相同的宏。

在NT 平台上:自动化允许CATIA像Word/Excel或者Visual Basic程序那样与其他外用分享目标。

ATIA 能使用Word/Excel对象就像Word/Excel能使用CATIA 对象。

在Unix 平台上:CATIA将来的版本将允许从Java分享它的对象。

这将提供在Unix 和NT 之间的一个完美兼容。

CATIA V5 自动化:介绍(仅限NT)自动化允许在几个进程之间的联系:CATIA V5 在NT 上:接口COM:Visual Basic 脚本(对宏来说),Visual Basic 为应用(适合前:Word/Excel ),Visual Basic。

COM(零部件目标模型)是“微软“标准于几个应用程序之间的共享对象。

Automation 是一种“微软“技术,它使用一种解释环境中的COM对象。

ActiveX 组成部分是“微软“标准于几个应用程序之间的共享对象,即使在解释环境里。

OLE(对象的链接与嵌入)意思是资料可以在一个其他应用OLE的资料里连结并且可以被编辑的方法(在适当的位置编辑).在VBScript,VBA和Visual Basic之间的差别:Visual Basic(VB)是全部的版本。

它能产生独立的计划,它也能建立ActiveX 和服务器。

它可以被编辑。

VB中提供了一个补充文件名为“在线丛书“(VB的5。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

EIDGEN.SSISCHE TECHNISCHE HOCHSCHULE LAUSANNE POLITECNICO FEDERALE DI LOSANNASWISS FEDERAL INSTITUTE OF TECHNOLOGY LAUSANNE COMMUNICATION SYSTEMS DIVISION (SSC)CH-1015 LAUSANNE, SWITZERLANDhttp://sscwww.epfl.chIP Network Management Platforms Before the WebJean-Philippe Martin-FlatinVersion 1: July 1998Version 2: December 1998Technical Report SSC/1998/021IP Network Management Platforms Before the WebJean-Philippe Martin-FlatinEPFL-ICA, 1015 Lausanne, SwitzerlandEmail: martin-flatin@epfl.ch Fax: +41-21-693-6610 Web: http://icawww.epfl.chAbstractIn this paper, we analyze the characteristics and shortcomings of IP network managementplatforms before the arrival of Web technologies. In the first part, we give a brief history ofIP network management, and summarize the limitations of traditional (i.e., pre-Web andSNMP-based) management platforms. We recall the initial objectives of open networkmanagement. We then explain how the early vision of generic management was changed bythe industry’s natural inclination for market segmentation, and how the market of IP networksevolved from generic to vendor-specific equipment, management GUIs and MIBs. In thesecond part, we propose a simple model of traditional IP network management platforms,against which new Web-based management solutions can be compared. We introduce thethree core functions of such platforms (network monitoring, data collection, and eventhandling), distinguish regular management from ad hoc management, and explain howSNMP’s polling model maps onto these functions.Keywords: SNMP, Open Network Management, Network Monitoring, Data Collection,Event Handling.1. IntroductionThe attraction of Web technologies has proved irresistible in many segments of the software industry.In IP network management, people began writing HTML forms and CGIscripts as early as 1993-94.These new technologies were typically used to standardize and automate problem reporting, or toreplace print-outs of network usage reports with electronic equivalents. In 1995-96, vendors beganexperimenting with HTTP servers and Java applets embedded in network equipment, as reported byWellens and Auerbach [26], Bruins [3], and Mullaney [20]. In 1997, many network managementplatform (NMP) vendors integrated a Web interface into their tool. In the course of 1997 and 1998,people realized that recent Web technologies — e.g., Java applets, servlets, RMI, Object Serialization,or mobile agents — could not only do differently what traditional (that is, pre-Web andSNMP-based) NMPs already did before: they also suggested new ways of collecting data, detectingfaults, or distributing the network management application, and more generally, new ways ofmanaging IP networks.The first aforementioned reasons for the success of the Web in IPnetwork management could beascribed to fashion, or to the legitimate desire of enterprises to reduce the range of competenciesneeded to run their business. But the last reason (new ways of managing networks) goes much further,and suggests that Web technologies are here to stay in IP network management, and are more likelyto become more pervasive than to fade away when a new fashion comes in.But how did we come to this point? What were the administrators missing in traditional NMPs thatthey find today in Web-based management? Why were people so pleased with open networkmanagement in the first half of the 1990s, and why do customers currently put so much pressure on1network equipment vendors to have embedded HTTP servers, embedded JVMs, and even securemobile-agent run-time environments?The main goal of this paper is to answer these questions. In section 2, we describe the characteristicsand shortcomings of traditional NMPs. By placing ourselves into an historical perspective, we showhow we came to a point where Web technologies were needed, and how expectations from administratorsevolved through the 1990s. We also highlight the fact that among the limitations that weidentified, only a fraction can be addressed by simply integrating Web browsers into NMPs.The second goal of this paper is to give a simple model of NMPs, to serve as a reference to which newmodels can be compared. This model is depicted and explained in detail in section 3. It is used inparticular in two companion papers [14, 15], where we introduce the push and pull models inWeb-based network management.2. A Brief History of IP Network Management Before the WebIn this section, we give a brief history of IP network management before the Web. We explain theinitial vision of an open market with generic tools, show how it evolved toward captive markets withvendor-specific tools, and study what the consequences of the advent of Windows-based NMPs werein a market so far dominated by Unix.2.1. An open market with generic toolsIn 1990-91, when NMPs1 started to sell by the thousand, many people had a vision of open systemsand generic network equipment. Unix systems were widely deployed in academia; in the industry,they nearly wiped out mini-computers for scientific work. Proprietary network equipment wasgradually replaced with third-party equipment—that is, to interconnect hosts from vendor X, you nolonger had to buy routers or bridges from the same vendor X. SNMP compliance became acommercial argument, often mandated by customers. High heterogeneity was considered a goodthing, because it allowed substantial financial savings by choosing systematically the best buy of theday: if a network administrator wanted to purchase an IP router today, he would select, say, Cisco,whereas tomorrow he would buy 3Com, as a sheer result of unbiased competition in an open market.Putting a whole network together was as simple as using Lego: generic IP routers, bridges, hubs orFDDI concentrators were interchangeable, just as open systems (i.e., Unix hosts) were—more or less.Very naturally, this vision was reflected in the management of this equipment: NMPs evolved fromproprietary solutions, where a vendor would support only its own equipment (e.g., the first release ofSunNet Manager could only manage Sun workstations), to open platforms (e.g., Lexcel’s Lance+),which offered generic GUIs to manage all routers alike, all hubs alike, etc.In those days, the goal was to hide vendor-specific features from operators, who spent their timemonitoring large networks and gazing at GUIs. Any interface of any IP router, or any port of any hub,could be reset the same way. Traffic monitoring was independent of the brand of the equipmentmonitored. Operators resented the idea of having to master dozens of GUIs and dozens of ways of1.A network management platform encompasses a Network Management Station (NMS)—characterized by a givenhardware and a given operating system (e.g. a Sun UltraSparc workstation running Solaris 2.6, or a Compaq Pentium IIPC running Windows NT 4.0)—and management software (e.g. Cabletron Spectrum or HP OpenView). For detailsabout the terminology used in this tutorial, see Martin-Flatin et al. [13].2managing network devices: the physical heterogeneity had to be masked by an apparent homogeneity,in the logical view of a device offered by a management GUI.This vision of IP network management was also shared and promoted by the IETF, who issued anumber of generic MIBs: MIB-II [17] was released in March 1991, the Token Ring MIB [16] in May1991, the RMON MIB [25] in November 1991, the FDDI MIB [4] in January 1992, the Hub MIB [18]in October 1992, etc. This effort from the IETF went on for several years.2.2. Problems with early network management platformsOver time, this vision of openness, and the very concept of genericity (generic equipment managedvia generic GUIs using generic MIBs), did not resist the market reality. The main problems whichwere encountered were the hidden costs of heterogeneity, the limitations of generic MIBs, thevendors’desire to secure niche markets, and the inexperience of new customers.First, customers discovered the hard way that genericity in network equipment is confined tobottom-of-the-range niche markets, such as print servers or terminal servers. But there is no such athing as a generic router, because vendors endeavor to differentiate their offer from the competition—especially for expensive equipment such as routers that sustain the backbone of a LAN. So, forcustomers, the cost of training staff to manage equipment from different vendors, added to the cost ofmaintaining and debugging so many different network devices, quickly turned into a nightmare. Theindustrial reality proved that, over time, the extra costs ascribable to the heterogeneity of the networkequipment often outweigh the immediate financial benefits of going for the best buy of the moment.Second, vendors were not happy with such fierce competition that cut down their margins significantly.They were not happy either with the concept of generic equipment, which reduced theirchances to differentiate their offer from the competition, and thereby justify a higher price for betterequipment. So they looked for ways to segment this open market into multiple captive markets.Third, vendors and customers alike were dissatisfied with the slow pace of the IETF Working Groupsresponsible for issuing generic MIBs. Several MIBs, especially those related to systems management,were released rather late, including the Host MIB [7] in September 1993, the Mail MIB [11] inJanuary 1994, the UPS (Uninterruptible Power Supply) MIB [5] in May 1994, the Modem MIB [1]and the RDBMS MIB [2] in August 1994, etc.Fourth, generic MIBs could not stand the comparison with interactive command line interfaces: theytended to be the least common denominator between all existing interfaces, because the IETF did notwant to appear to favor one vendor over another, and because it could not keep up with the paceimposed by the vendors in a highly competitive market. As a result,administrators and operatorscould do with SNMP only a fraction of what they could do via a terminal directly attached to thenetwork equipment, or via a telnet session. To give a concrete example, security was notstandardized in router management like traffic statistics were in MIB-II. So, although most IP routervendors soon supported per-interface access control lists, no generic MIB allowed to manage themwith SNMP.Consequently, vendors looked for a way to work around the concept of generic network equipment,in order to increase their revenue, better satisfy their customers, and attract new customers. Andundeniably, they succeeded in splitting this large open market of IP network management into amosaic of smaller, captive markets.32.3. Captive markets with vendor-specific toolsThe answer to all these concerns came in the form of vendor-specific MIBs: vendors developed theirown MIBs to manage their own equipment. These proprietary MIBs were richer and more comprehensivethan the generic MIBs then specified by the IETF. They covered most if not all of theinteractive command line interface, whereas generic MIBs covered only a fraction of it. Thisaddressed the fourth issue raised in the previous section. Vendors were also in complete control oftheir own MIBs, so they could update them at a faster pace than the IETF (e.g., there were threereleases of the Cisco MIB between 1991 and 1995). This tackled the third issue.In order to help their customers manage their network equipment, vendors developed vendor-specificmanagement GUIs, and even device-specific management GUIs, which relied heavily, if notexclusively, on their proprietary MIBs. These GUIs were initiallyintegrated into stand-alonemanagement applications, which were sold separately, and generally run on middle-range PCs. Butmany customers had to manage heterogeneous networks, and did not want to run multiplemanagement applications in parallel. This also defeated one of the purposes of integrated networkmanagement: to be able to manage all network equipment from a single NMP. Instead, customerswanted vendors to integrate vendor-specific management GUIs into their favorite NMP. So they did.Peer-to-peer agreements were signed between NMP vendors and network equipment vendors, whichallowed the latter to integrate their proprietary GUIs into existing NMPs. These GUIs were calledadd-ons, because they were optional extensions of the management platforms.Vendor-specific management GUIs gave vendors the opportunity to gain a commercial edge on thecompetition: the quality of these GUIs became a valuable commercial argument for salespeople.Management GUIs evolved to look like the real devices, a feature that operators—and often administrators—came to cherish. Beside the marketing argument that their network equipment supportedgeneric MIBs, a warrant of their openness, vendors also put forward the fact that this equipment couldbe managed with user-friendly and intuitive add-ons, e.g. CiscoWorks by Cisco. Technically, thesetwo arguments were actually opposed; nonetheless, salespeople used them side by side, andsuccessfully.The peer-to-peer agreements that we mentioned above progressively reshaped the entire landscape ofIP network management, by introducing a bias which seriously shook the concept of “open”management. They were based on market shares, business relationships, and mutual commercialinterests. And the bias was that some business partners became more equal than others, to put it in anorwellian way.As far as network equipment vendors were concerned, small companies (especially start-ups) foundit very difficult to sign any agreement at all with NMP vendors. They had small market shares, andthey did not bring in new customers or new revenue, so they were of no interest to large NMP vendors.For these small companies, the best strategy was to find one large customer willing to pay the highprice for the integration of a management GUI into its current NMP (especially to manage cuttingedge equipment)... but such customers were difficult to find. Large equipment vendors, conversely,had no problem to integrate their GUIs into any NMP: their names even appeared on the bookletsadvertising these NMPs. But the timeliness of this integration depended to a large extent on the qualityof the business partnership between the equipment and the NMP vendors. Between the time a newequipment was put on the market and the time its management GUI could be integrated in a givenNMP, it could take several weeks, or two months, or six months...As far as customers were concerned, gone were the days of open systems, generic MIBs and NMPsable to manage any network equipment. Gradually, they became prisoners of their NMP or theirvendor-specific add-ons.For customers managing small networks, the relative cost of the NMP was high, compared to the totalprice of their network equipment. To put it simply, they had two options: they could abide by the rulesset by their NMP vendor, and get flashy GUIs in a timely manner from one of its “friends”; or theycould take the dangerous route of a start-up company, and try to live with user-unfriendly MIBbrowsers, additional NMSs, and dissatisfied operators. In practice, in most business settings, they hadno choice.For customers managing large networks, the problem was not so much their NMP as the heterogeneityof their network equipment. They could afford another NMP, if reallyneeded, but they were prisonersof their existing equipment suppliers, and especially their vendor-specific add-ons. Companies couldrealistically train operators to master a few dozens GUIs, but they could not ask them to know severalhundred. Similarly, administrators could not be expected to manage an infinitely large number ofdifferent systems. Consequently, companies could not afford to have too many suppliers for theirnetwork equipment. When a network administrator wanted to buy a device of a certain type, for whichhe/she already had one or two suppliers, he/she would always select one of these suppliers, and wasprepared to pay a higher price for it than that of the competitors.Whatever the size of their network, customers could no longer pull the prices down as much as theycould in the past. Competition had been hampered: the IP network management market had entered alogic of captive markets. Vendors had managed to address the second issue raised in section 2.2, thatis, secure niche markets exposed to little competition.Proprietary MIBs and GUIs were initially resisted by many experienced customers, who knew thedrawbacks of captive markets. But from 1992-93, they were quickly adopted by new customers,perhaps more na.ve, who did not realize that by doing so, they were contributing to the segmenting ofthe open market of SNMP into a multitude of captive markets. In other words, they were wreckingthe very reason why they had come to SNMP in the first place: its openness. SNMP was no longer anopen protocol supporting open management in an open market: it had become an open protocolsupporting proprietary management in a mosaic of captive markets. The sole stable guarantees ofopenness were the use of third-party NMPs, and the conformance to one of the SNMP managementframeworks (SNMPv1, SNMPv2, SNMPv3).To be fair, captive markets were not only bad news for customers. Admittedly, they induced higherpurchase costs for customers. But they also lowered the training cost ofstaff (administrators andoperators), and they significantly simplified the maintenance of the network equipment. Indeed,although they were created primarily by vendors for their own sake, captive markets also suitedcustomers in some respects, and, in particular, addressed the first issue raised above.Peer-to-peer agreements between NMP and network equipment vendors had an even greater impacton the NMPs market. As far as NMP vendors were concerned, the major players knew that they werea must for large network equipment vendors. They did not have to spend much money for all majorequipment vendors to port their management GUIs onto their NMP. But smaller players were progressivelyleft out. The less customers an NMP vendor had, the less chances its NMP would have to raiseinterest from equipment vendors. By snowball effect, smaller players were initially supported onemonth later than the bigger players, then six months later, and one day, they were not supported at all.If customers wanted to manage a piece of equipment with an NMP that had only gained a small market5share, they were charged for its development... a strong deterrent indeed! For small equipmentvendors, as we saw, the situation was also bad; but at least they had a workaround: customers couldmanage their equipment with a dedicated PC, directly attached to the equipment. Things were muchworse for small NMP vendors: without peer-to-peer agreements, they could not survive.As a result, these agreements caused the number of actors in the NMPs market to reduce drastically.During the years 1993-95, minor players gave up this market, one after the other, and only four NMPvendors managed to retain a significant market share: HP with OpenView, Sun with SunNet Manager(which later became Solstice), Cabletron with Spectrum, and IBM with NetView. These platformsstill dominate the IP network management market today. Interestingly enough, only one of these fourcompanies came from the networking industry, while the three others came from the computingindustry. The reason was that third-party management software appeared to be a guarantee ofimpartiality and openness. A company like HP was more trustworthy when it claimed to manage allnetwork equipment alike, whatever its vendor, than the heavy weights of the networking industry likeCisco or 3Com, who had too many business interests at stake1.The only type of peer-to-peer agreement we considered so far involved NMP and network equipmentvendors. But another type of agreement soon appeared. NMPs initially relied on a single solution tostore management data; this could be a proprietary database (like HP OpenView in its early days), athird-party DBMS (relational or object-oriented), or a directory tree of text files. But large customersoften had an RDBMS in their intranet; they had already spent fortunes on training its administrators,and were very reluctant to use another DBMS; so they asked NMP vendors to support their existingRDBMSs. Unfortunately, although all RDBMSs spoke SQL, they all offered different APIs (therewas no mature ODBC in those days), and the cost of porting from one RDBMS to another was highfor NMP vendors. This problem appeared to be solved when peer-to-peer agreements began to besigned by NMP and DBMS vendors. But unlike what happened with NMP and network equipmentvendors (all major NMPs soon supported all major equipment vendors, and vice versa), the proportionof agreements that were actually signed by NMP and DBMS vendors remained fairly low, comparedto the number of actors on these markets. In 1995-96, just before the days of Web-based management,Cabletron still supported only a proprietary OODBMS, whereas HP, Sun and IBM supported only oneor two major RDBMSs (Oracle, Sybase, Informix, Ingres). As most customers could not afford to buya new DBMS for the sole purpose of network management, they often resorted to storing managementdata into text files, and writing ad hoc scripts to exploit this data.2.4. The move from Unix-based to Windows-based network management platformsBefore the Web came into the game, a last change occurred in the IP network management market.As this market had gained the reputation of being mature, in 1993-94, many small to medium-sizedenterprises (SMEs) decided to make a move toward SNMP-based network management. But for thesecompanies, an expensive NMS running expensive software was simply not an option: there had to bean inexpensive way to manage their relatively small networks. Operators were also out of thequestion: these companies could not afford staff monitoring constantly the health of their network,which generally consisted of a fairly small LAN, with possibly just a few WAN links. Networkmanagement was entirely the responsibility of the network administrator, who was managing thenetwork on an ad hoc basis (typically when a problem showed up, that is, troubleshooting rather than1.In the PC market, a similar conflict of interests exists between Microsoft vendor of the Windows operating system,Microsoft vendor of applications for Windows, and third-party vendors of applications for Windows. Is Microsofttrustworthy when it claims that Windows treats all applications alike?6monitoring), and did not require permanent access to an NMS. Finally, Unix was generally not anoption either, as SMEs were mostly equipped with PCs and Mac’s, and often lacked Unix expertise.In order to take on this new market, which was all the more attractive since the market of largernetworks was almost fully equipped, NMP vendors came up with so-called “light” versions of theirsoftware. They were “light” in the sense that they were less demanding in terms of CPU, memory anddisk resources, they did not offer all the functionalities of the Unix-based NMPs (e.g., no RDBMS tostore polled data), and they were less expensive. These were not as inexpensive as customers werehoping for, but they could easily run on middle-range PCs, and they could run under Windows. As amatter of fact, by 1996, with the significant increase in the power of PCs and the generalization ofWindows NT in enterprises (that is, a clean and stable operating system a la Unix, which did notrepeatedly crash like Windows 3.1), there were no longer any functionality differences betweenUnix-based and Windows-based NMPs.This evolution enlarged the network management market significantly. But it also indirectly made thedevelopment costs for network equipment vendors skyrocket: not only did they have to integrate theirdevice-specific GUIs into all major Unix-based NMPs, they also had to support these NMPs undernew operating systems: Windows 3.1, Windows 95, Windows 98, Windows NT 3.x, Windows 4.x...2.5. Problems with traditional network management platformsTo summarize the shortcomings of IP network management before the Web, customers had threegrievances: (i) they sought less expensive solutions, in terms of both hardware and software; inparticular, they did not want to have dedicated hardware to manage small networks; (ii) they wantedto be able to store management data in whatever RDBMS they happened to own, and did not want tobe constrained by peer-to-peer agreements signed or not signed between NMP and RDBMS vendors;(iii) those who were supporting a Unix system for the sole purpose of network management wantedto use a PC or a Mac instead, since this kind of expertise was ubiquitous in enterprises; but they didnot want to buy a new and expensive NMP for that.Network equipment vendors were primarily dissatisfied by the huge cost they had to bear to supporta myriad of device-specific GUIs running on all existing hardware and operating systems. They alsoshared two concerns with customers. First, they wanted to reduce the time-to-market ofvendor-specific management GUIs. Ideally, they wanted any network equipment to be manageablevia a nice GUI (that is, not a mere MIB browser) as soon as it was launched on the market. Start-upcompanies also wanted to have access to integrated management platforms, in order to attract morecustomers. Second, both vendors and customers needed a solution to the problem of versioning. Fromtime to time, network equipment vendors release a new version of their proprietary MIBs and GUIs.As it was not possible to upgrade all equipment and the add-ons of the NMP at the same time,customers had to live with several versions of the same MIB at the same time, either temporarily orpermanently. But many NMPs were poorly designed in this respect: some did not support multipleversions of the same MIB, while others required the administrator to enter manually, device bydevice, what version of the MIB was supported. Customers and vendors alike wanted this phase to beautomated, e.g. via some kind of MIB-discovery protocol.7In summary, we showed in section 2 how the way of managing IP networks evolved since theinception of SNMP and open network management, and how the initial vision of generic equipmentwas lost in favor of a more pragmatic, business-oriented approach leading to:. peer-to-peer agreements between vendors. captive markets for customers. vendor-specific management add-ons3. A Simple Model of Network Management Platforms Before the Web Now that we have explained how IP networks were typically managed when Web technologiesarrived in this field, let us present a simple model of how NMPs were structured before the Web. Thismodel will be used in [14, 15] as a standard against which new models, integrating Web technologies,can be compared and assessed.Traditional NMPs can all be modeled as follows:。

相关文档
最新文档