Telex Release Sample for all Intl customer
【cisco】architecture wifi offload

White PaperArchitecture for Mobile Data Offload over Wi-Fi Access NetworksIntroductionMobile network traffic is growing exponentially, and service providers must manage their networks efficiently to meet consumer demand. The technology evolution of radio access networks is limited by the laws of physics, and significant growth in radio frequency (RF) efficiency can no longer be expected. Long-Term Evolution (LTE) radio access is reaching the limits of Shannon’s law, the spectrum available for mobile data applications is limited, and the only solution for increasing overall mobile network capacity is to increase the carrier-to-interference ratio while decreasing cell size and deploying small cell technologies. The most efficient way to use small cells is to position them in locations where significant amounts of data are generated (shopping malls, stadiums, university campuses, public transportation hubs, etc.) and where subscribers spend most of their time and therefore consume significant amounts of data (homes, offices, etc.). Wi-Fi, one of the small cell technologies, appeals to many operators as a cost-effective mean of offloading large amounts of mobile data traffic while delivering a variety of new services. It offers these features:● ● ● ●Widespread existing deployments Availability of user devices that support the technology Cost efficiency Capability to address new users and devices without mobile subscription (without a subscriber identity module [SIM])● ●Globally available spectrum capacity Standards availability for integration into mobile core networksThis document explores technical aspects of Wi-Fi offload architecture and its capabilities and integration into existing mobile networks to provide a viable and efficient way to offload subscriber traffic.Overview of Wi-Fi Offload ArchitectureThe Third-Generation Partnership Project (3GPP) standard differentiates two types of Wi-Fi access (also referred to as non-3GPP IP access):●Untrusted: Introduced in the early stages of the Wi-Fi specification in 3GPP Release 6 (2005), untrusted access includes any type of Wi-Fi access that either is not under control of the operator (public open hotspot, subscriber’s home WLAN, etc.) or that does not provide sufficient security (authentication, encryption, etc.).●Trusted: Trusted access generally refers to operator-built Wi-Fi access with over-the-air encryption and a secure authentication method. Trusted non-3GPP IP access was introduced only with the LTE standard in 3GPP Release 8 (2008). Although most of today’s offload designs are build on the trusted model, 3GPP does not currently offer guidance for integration with the 3G or 2G packet core. However, as discussed in this document, this type of access is natively integrated into LTE’s evolved packet core (EPC).© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 1 of 23Because most of today’s mobile networks are 3G based, a significant part of this document describes the possible methods of integrated trusted non-3GPP IP access into the 3G mobile packet core (MPC) together with its associated policy and charging control (PCC) architecture. Although the term “trusted non-3GPP IP access” is defined for EPC only, this document extends its definition in 3G contexts to describe Wi-Fi networks controlled by mobile operators. 3GPP 24.302 has the following definition: “For a trusted non-3GPP IP access network, the communication between the user equipment and the EPC is secure.” Thus, with the latest service provider Wi-Fi architectures encompassing Extensible Authentication Protocol (EAP) and IEEE 802.1X-based authentication, and with IEEE 802.11i-based RF encryption and optional use of control and provisioning of wireless access points and Datagram Transport Layer Security (DTLS) for secured user and control planes, all the elements exist for service provider Wi-Fi to be considered as trusted non-3GPP. After the 3G designs, this document describes the evolution of the architectures toward EPC integration as specified in 3GPP standards. Session mobility and, more generally, IP address persistence when moving between 3G, LTE, and Wi-Fi are also covered. The document also discusses the integration models for untrusted networks, although these are less commonly deployed in mobile networks. In the 3GPP specification, the Wi-Fi network is referred to as the Wi-Fi access network only. No details about the Wi-Fi network structure are specified. This document, however, separates the network into the access and gateway components. The Wi-Fi network infrastructure for mobile data offload consists of three parts:● ●Wi-Fi radio access network (Wi-Fi RAN) Wi-Fi access gateway (WAG) and Wi-Fi back-end systems (this document expands the definition from 3GPP TS 23.234 to refer also to non-3GPP WAG)●Packet core integration elements (multiple options)© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 2 of 23Figure 1 illustrates the architecture. It includes integration elements for 3G as well as LTE to show a summary of all designs built throughout this document.Figure 1. Wi-Fi Network ArchitectureIf the Wi-Fi network is used for mobile data offload, which is the topic of this document, it needs to take care of these tasks:● ●Authentication: To help ensure that only authorized subscribers can access the network PCC: For proper billing, quality of service (QoS), and policy enforcement for the traffic generated through Wi-Fi access, ideally compliant with 3GPP PCC●IP persistence: For service mobility between different access networks (3G to Wi-Fi, Wi-Fi to 3G, or across the Wi-Fi network)The following sections examine the details of each of these functions.AuthenticationTo control subscriber access to Wi-Fi networks, multiple authentication methods can be used. The choice of method is crucial to the usability of the network. The more transparent the authentication method is for the subscriber, the greater the likelihood that the subscriber will connect to the network. The authentication method also determines the subscriber and device types that can be addressed in a particular network (subscribers with or without SIM cards, the operator’s subscribers, visiting subscribers, etc.). In a typical modern Wi-Fi network, two types of authentication are available to address all possible subscribers and at the same time provide convenient access to the network for frequent Wi-Fi users. The first method, portalbased authentication, targets customers without a permanent contract with the operator (vouchers, time-limited© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 3 of 23access, SMS payments, etc.). Alternatively, EAP authentication provides transparent and easy access for the operator’s own subscribers with SIM cards or certificates.Portal-Based AuthenticationPortal-based authentication depends on Layer 3 connectivity to the network and HTTP communication before granting access to the subscriber. The Wireless Internet Service Provider Roaming (WISPr) standard also uses HTTP communication with the portal for automatic authentication, with the user device launching HTTP communication in the background without user intervention (Figure 2).Figure 2. Portal-Based Authentication ArchitectureThis method relies on the WAG in the Wi-Fi network, which blocks all IP communication for unknown (new) subscribers and redirects HTTP connections to a captive portal. The captive portal is responsible for requesting user credentials from the subscriber and triggering authentication, authorization, and accounting (AAA) to authenticate the subscriber. After successful login, the WAG will typically be signaled by the AAA server. From this moment, the subscriber is known in the AAA cache, and WAG allows the subscriber to send and receive data. Usually, the user’s IEEE 802.11 MAC address is also cached in the AAA server, together with the user data and granted service. If the subscriber leaves the Wi-Fi coverage area and then returns, the subscriber’s device will be recognized by the WAG based on the MAC address and automatically authenticated against the cached AAA record, so the subscriber is not repeatedly redirected to the portal after losing Wi-Fi coverage. This method of MAC address caching is also referred to as transparent automatic logon (TAL).© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 4 of 23A typical TAL attachment call flow is shown in Figure 3 for the case of a Layer 2 attached WAG.Figure 3. Typical Transparent Automatic Logon Call FlowEAP-Based AuthenticationEAP-based authentication uses EAP and IEEE 802.1x to provide Layer 2 authentication for subscribers accessing the network with EAP-capable devices. For actual authentication, multiple credentials can be used, depending on the capability of the device. Devices with SIM cards encapsulate the SIM application information exchange into the EAP message, and these are proxied by the AAA server to the home-location register (HLR) for authentication. EAP-SIM (RFC 4186) or EAP-Authentication and Key Agreement (EAP-AKA; RFC 4187) standards are used for the encapsulation, depending on the type of SIM card used and the HLR capabilities. Obviously, this method requires interconnection between the AAA server and the HLR or home-subscriber server (HSS). The architecture is shown in Figure 4.© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 5 of 23Figure 4.EAP-Based Authentication ArchitectureFor subscribers with non-SIM devices, the operator can distribute certificates for EAP-Transport Layer Security (EAP-TLS) or similar versions of EAP authentication. The typical call flow of EAP authentication (with HLR integration) is shown in Figure 5.Figure 5. Typical EAP Authentication Call Flow© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 6 of 23Note that EAP-based authentication offers a radio security advantage. Because the authentication is handled at Layer 2, EAP messages can be used to negotiate encryption keys for the IEEE 802.11i-based encryption of the radio interface. This approach provides much stronger security for radio communication compared to the unencrypted radio interface of portal-based authentication and is uniquely able to prevent simple MAC address spoofing attacks.Next Generation HotspotIn 2010, Cisco and industry leaders formed the Next Generation Hotspot Task Group in the Wireless Broadband Alliance (WBA). The goal was to rally the industry around a common set of Wi-Fi Alliance (WFA) standards called Hotspot 2.0 that would bring a 3G-like end-user experience to Wi-Fi authentication and roaming. The outcome of the Next Generation Hotspot Task Group is a set of operator guidelines and the Wi-Fi Certified Passpoint interoperability for operators and equipment vendors. The Cisco SP Wi-Fi solution features Next Generation Hotspot, enabling service providers to better manage and monetize their carrier-grade Wi-Fi networks. There are three main building blocks of the next-generation hotspot: IEEE 802.11u, Wi-Fi Protected Access 2 (WPA 2) Enterprise, and EAP-based authentication. For a detailed description of the initiative, see The Future of Hotspots: Making Wi-Fi as Secure and Easy to Use as Cellular.® ™program expected in 2012 from the Wi-Fi Alliance. The certification will help ensure authentication and roamingAuthentication SummaryBecause of the complementary functions of both authentication methods, mobile operators deploying Wi-Fi access networks usually implement both EAP and IEEE 802.1X authentication and portal-based authentication in their networks. Portal-based authentication is used to attract subscribers visiting the network who don’t yet have a relation to the operator. It allows typical public Wi-Fi use cases such as credit card payments, vouchers, and SMS passwords. In general, it enables generation of new revenue from Wi-Fi networks. EAP-based authentication targets primarily devices with the operator’s SIM card. It allows transparent authentication and secure communication without much interaction from the subscriber (only initial configuration of the service set ID (SSID) is needed when a device detects the Wi-Fi network for the first time). In real-life deployments, the introduction of EAP-SIM or EAP-AKA authentication leads to significantly better utilization of the network by subscribers and therefore enables much greater savings from offloading. With the introduction of Wi-Fi Certified Passpoint devices, operators will be able to simplify Wi-Fi network access even more. IEEE 802.11u devices do not need any intervention from the subscriber to connect to the Wi-Fi network (unlike traditional devices, which require SSID selection). Roaming agreements based on the Next Generation Hotspot recommendation (WLAN Roaming Inter-Exchange [WRIX]) enable user equipment with IEEE 802.11u support to choose the right SSID automatically, even in visited networks.Policy and Charging ControlAn important concern of mobile operators is the availability of similar or identical policy enforcement and charging rules for the subscriber, regardless of the RAN being used. Therefore, the design of PCC integration is a crucial part of Wi-Fi offload.© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 7 of 23Experience from live deployments shows that the most efficient approach to PCC integration is the reuse of the elements deployed for the 3GPP services. The actual integration option will depend on the PCC infrastructure implemented in the particular mobile operator network. If the operator uses a device with the standalone policy and charging enforcement function (PCEF), the WAG will be integrated as an additional gateway served by the PCEF. If the PCEF is integrated into the gateway General Packet Radio Service (GPRS) support node (GGSN), the WAG may emulate a serving GPRS support node (SGSN) and switch the Wi-Fi sessions to a GPRS Tunneling Protocol (GTP) tunnel to the traditional GGSN. The following sections discuss the details of these two options. Note that this document describes trusted non-3GPP access integration into 2G and 3G PCC. The 3GPP standard offers no guidance for this integration. Later this document explores standardized architecture for LTE integration and untrusted non-3GPP IP access integration.Standalone PCEFIn the standalone PCEF scenario, the WAG is set up to send user data traffic to the PCEF for PCC integration. At the same time, traffic that does not need policy control (traffic from visiting customers, wholesale traffic, onetime voucher users, etc.) is allowed to go directly to the Internet (Figure 6).Figure 6. Standalone PCEF ArchitectureBecause the PCEF needs to be able to correlate the user identity with the data flows passing the PCEF, a mechanism is needed that can synchronize the user identity with the IP address of the subscriber (so that individual data packets can be associated with the user data plan and processed accordingly). Commonly, the RADIUS proxy function on the PCEF is used to create user session information based on the attributes included in the accounting messages coming from the access gateway for a particular user. Figure 7 shows the typical call flow.© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 8 of 23Figure 7.Typical PCEF Authentication Call FlowIf this model is deployed, the operator needs to help ensure that all mandatory information needed by the PCEF is included in the RADIUS messages from the access gateway or proxied through AAA, where the necessary attributes are added to the message. In addition to the IP address of the subscriber session, information about the international mobile subscriber identity (IMSI), the mobile station international subscriber directory number (MSISDN), and the associated access point name (APN) is usually required.GTP to Traditional GGSNIf the PCEF is an integral part of the GGSN, the option of forcing Wi-Fi sessions into a GTP tunnel (packet data protocol [PDP] context) may provide the best solution for PCC integration. The traffic that does not belong to the mobile subscribers of the operator, and which therefore cannot be processed on the GGSN, is forwarded directly to the Internet (Figure 8).© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 9 of 23Figure 8.GTP-to-Traditional GGSN ArchitectureClearly, GTP support is required on the WAG for this deployment model. Also important to consider is the availability of the required attributes in the PDP context request, which are mandatory in the operator’s PCC system. Again, these attributes commonly include the IMSI, MSISDN, QoS profile, and APN. The call flow for this deployment model is shown in Figure 9.Figure 9. GTP-to-Traditional GGSN Call Flow© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.Page 10 of 23Note that even though all sessions (3G and Wi-Fi) are anchored on the GGSN, this solution does not provide transparent handover of the IP sessions between the Wi-Fi and 3G radio networks. This limitation exists because the Wi-Fi and 3G PDP contexts are individual sessions, and the user device can open them simultaneously. Unfortunately, the 3GPP standard does not provide a mechanism to help ensure that the same GGSN is chosen for both of these PDP contexts, and therefore anchoring of the sessions on the same device cannot be achieved.PCC Integration ConsiderationsWhen performing PCC integration, note the following:●The options listed are valid and needed for 3G. As discussed later, LTE provides native integration into theEPC and therefore into the PCC●The critical element is the capability of the WAG to provide all necessary information for charging(specifically, some of these attributes are not part of EAP authentication and need to be retrievedseparately, if needed: for example, the MSISDN, the QoS profile, and optionally, the 3GPP chargingcharacteristics)●Usually, the PCEF does not handle traffic from users who are not mobile customers of the operator(non-SIM subscribers). This traffic is sent directly to the Internet. If these particular sessions need policy or charging functions, these are usually handled by the WAG and Wi-Fi back-end systems directlyLTEBefore describing the third function of the Wi-Fi offload architecture, session handover, this document examines the integration of PCC in an LTE scenario. This examination will help you later understand user session mobility and anchoring.3GPP TS 23.402 describes native integration of trusted and untrusted non-3GPP IP access networks into the EPC. The standard accepts that the Wi-Fi network is as valid an access network as any other 3GPP radio access network. This acceptance enables operators to use the standards-based EPC components for integration and therefore helps ensure a good level of interoperability between different access types.As mentioned earlier, this document concentrates first on the trusted part of the architecture. To force the Wi-Fi traffic to the EPC, two interfaces are defined, both of them terminating Wi-Fi sessions on the packet data network gateway (P-GW) as shown in Figure 10.Figure 10. 3GPP Architecture for Non-3GPP IP Access Integration into EPC, S2c OptionThe S2c interface is based on the Dual-Stack Mobile IP Version 6 (DSMIPv6) protocol and requires user equipment to support it. DSMIPv6 creates a tunneled connection between the user equipment and the P-GW, which is used to forward all traffic to and from the user equipment. The P-GW is responsible for assigning a virtual IP address to the tunnel during the setup process. This IP address is from the same IP pool that is used for LTE sessions. Because all traffic to and from the user equipment is sent through the tunnel, the P-GW has complete visibility of the user traffic and can apply PCC and other necessary functions to the traffic in the same manner as it does to the LTE sessions (Figure 11).Figure 11. 3GPP Architecture for Non-3GPP IP Access Integration into EPC, S2a OptionAnother option shown in Figure 11 is to choose the S2a interface for forwarding traffic from the Wi-Fi network to the EPC. This interface is based on the Proxy Mobile IPv6 (PMIPv6) protocol. As with S2c, the interface terminates on the P-GW and enables visibility into the user traffic. The difference is that the PMIPv6 protocol does not require any changes on the user equipment. The wireless access gateway (WAG) in the trusted non-3GPP IP access network provides the mobile IP functions transparently for the client. It creates the tunnel, requests the IP address from the P-GW, and then assigns this address to the Wi-Fi connection. In this way, the user equipment is assigned an IP address that is part of the P-GW pool, but it does not see the address as virtual but as a physical address directly on the Wi-Fi interface.Figure 12 shows an overview of LTE architecture. Again, in addition to tunneled traffic to the EPC, direct connection from the WAG to the Internet is enabled for users who are not mobile subscribers of the operator.Figure 12. LTE ArchitectureTwo methods of integration (S2a and S2c) have been used here, and each has different implications for the deployment. The S2c approach requires changes on the user equipment; therefore, it is considered client-based. This feature may not be trivial in a mobile network because of the need for client software for functions. The mobile operator must help ensure that large numbers of different handsets and operating systems can be addressed by the software, must keep the user equipment updated with new versions of software, and must motivate subscribers to use the client software. Figure 13 illustrates the attachment as defined by 3GPP. Phase A represents attachment to the Wi-Fi network. In phase B, the DSMIPv6 tunnel is opened to the P-GW; and in phase C, the session is signaled as the active one. Also illustrated is the establishment of policies for the session using the PCRF.Figure 13. S2c Network Attachment As Defined by 3GPPThe S2a approach eliminates the problem of the client software. The trade-off here is that the operator loses control of Wi-Fi activation and session handover on the user equipment. This loss of control may result in unexpected behavior of the user equipment during switchover from 3GPP access to Wi-Fi and back. Figure 14 shows the attachment as defined by 3GPP. The trusted non-3GPP IP access network represents the Wi-Fi network, with the WAG as part of this network. For a detailed description of the call flow, please refer to 3GPP TS 23.402.Figure 14. S2a Network Attachment As Defined by 3GPPInter-Radio HandoverBefore analyzing different methods of handover, it is important to understand the terms often used in this context. Specifically, you need to understand what session handover is and the types of handover that can be implemented depending on the requirements of the mobile operator.In mobile data networks, one of the most important procedures is handover - when a subscriber moves from one radio station to another. The handover procedure describes the behavior of the network when the subscriber switches from one radio type to another (for example, from 3G to Wi-Fi).Today, few handover types can be used. The one required in the operator’s network needs to balance the expectations of subscribers and the complexity of the architecture.●Handover without IP address persistency (connectivity handover): When a subscriber connects to the Wi-Fiaccess network, the subscriber is authenticated transparently and is assigned a new IP address by theWi-Fi network. All new communications can use the new IP address as the source. All established TCP and UDP connections can, however, still continue over the 3G network. If the user equipment logicdisables the 3G interface, then these established sockets will need to be (automatically) reestablished over Wi-Fi, using the new IP address.●Handover with IP persistency (IP handover): When a subscriber connects to the Wi-Fi network, thesubscriber will be assigned the same IP address as he used on the 3G or LTE network. If the established TCP and UDP connections are bound to a physical interface (because of the TCP/IP stack implementation of the UE), they will need to be (automatically) reestablished using the new Wi-Fi interface, even though they will use the same IP address.●Session handover (transparent handover): This type of handover is similar to IP handover, but thehandover must occur in a time range that allows real-time media applications (voice over IP, streamingvideo, etc.) - for example, using established UDP sockets for media and TCP sockets for the control-plane protocol - to continue without interruption or user-experience degradation as the device switches between Wi-Fi and 3G cellular connectivity.Note that seamless handover can be achieved only with user equipment cooperation, which means that software updating (for client software) is needed on terminals. At minimum, this software needs to provide a virtual interface adapter, to mask the physical interface structure for TCP and UDP sockets. The challenges of client software have already been discussed above.3GPP defines handover mechanisms for trusted Wi-Fi only as part of the LTE architecture. For untrusted Wi-Fi, proposals exist for 3G and LTE. This document starts with a look at trusted non-3GPP IP access networks in LTE.S2a-Based Handover (Clientless)The advantage of PMIPv6 as protocol for the S2a interface is that the protocol is built for network-based IP mobility. Therefore, it can provide, without client involvement, handover of the IP address between different access types. In this design, the P-GW is responsible for anchoring the session, assigning the IP addresses, and switching the PMIPv6 or Ga TP tunnels between different access gateways in the event of handover. The access gateways must support the mobile access gateway (MAG) function to fulfill all mobile IP-related mobile-node functions.Figure 15 illustrates the handover call flow as defined in 3GPP TS 23.402. The trusted non-3GPP IP access element is equivalent to a WAG.Figure 15. Handover Call Flow As Defined in 3GPP TS 23.402Although S2a-based handover is clientless, recall that the problems with Wi-Fi-to-3GPP handover are the existence of two radio interfaces on the user equipment and the role of the user equipment as the handover decision point. Because of these two factors, the network can never ensure that the user equipment is using the proper interface.Note: The definition of what constitutes a proper interface can change on an operator-by-operator basis.Also, at the user equipment, the TCP/IP stack needs to be able to cope with two physical interfaces that may eventually have identical IP addresses. Additionally, in some TCP/IP stack implementations, application sockets may be bound to a physical interface. Therefore, when the user equipment or application switches between interfaces, the application connections must be dropped and may need to be reestablished from the new interface.Given all of these dependencies, the PMIPv6-based architecture cannot (without user equipment support) guarantee operation of a transparent handover function on all user equipment types. This situation can be improved if a properly designed connection manager (with virtual adapters) is installed on all user equipment.Cisco is actively working with chipset and handset vendors to support standardization and development of user equipment that meets the requirements for smooth clientless handover.S2c-Based Handover (Client-based)For the S2c interface, 3GPP reuses the IETF-defined DSMIPv6 protocol between the user equipment and theP-GW as the anchor point. When on the non-3GPP network, the user equipment builds the DSMIPv6 to the appropriate P-GW and is assigned a virtual IP address, which is then used for application communication.The same IP address will be assigned to the user equipment over a 3GPP access network in the event of handover. The 3GPP network is treated as the home network, and therefore the user equipment does not need to set up a DSMIPv6 tunnel on the 3GPP access network.Figure 16, from 3GPP TS 23.402, summarizes the call flow during handover from an LTE access network to aWi-Fi access network.。
n4会话建立的消息流程及参数符合规范标准

n4会话建立的消息流程及参数符合规范标准下载温馨提示:该文档是我店铺精心编制而成,希望大家下载以后,能够帮助大家解决实际的问题。
文档下载后可定制随意修改,请根据实际需要进行相应的调整和使用,谢谢!并且,本店铺为大家提供各种各样类型的实用资料,如教育随笔、日记赏析、句子摘抄、古诗大全、经典美文、话题作文、工作总结、词语解析、文案摘录、其他资料等等,如想了解不同资料格式和写法,敬请关注!Download tips: This document is carefully compiled by the editor. I hope that after you download them, they can help you solve practical problems. The document can be customized and modified after downloading, please adjust and use it according to actual needs, thank you!In addition, our shop provides you with various types of practical materials, such as educational essays, diary appreciation, sentence excerpts, ancient poems, classic articles, topic composition, work summary, word parsing, copy excerpts, other materials and so on, want to know different data formats and writing methods, please pay attention!现今,随着信息技术的快速发展,各种通信方式的普及和应用使得人们的沟通变得更加便捷和高效。
telegraf的conf文件语法

一、介绍Telegraf是一款由InfluxData开发的开源代理程序,用于收集、处理和汇总指标数据。
Telegraf的配置文件(conf)是用来配置Telegraf 代理程序的重要部分,它定义了数据收集的规则、目标输出和其他配置选项。
本文将详细介绍Telegraf的配置文件语法,以帮助用户了解如何正确配置和定制Telegraf代理程序。
二、基本结构Telegraf的配置文件采用TOML(Tom's Obvious, Minimal Language)格式,具有简洁易读的特点。
配置文件由多个部分组成,每个部分包含一个或多个配置项。
以下是一个Telegraf配置文件的基本结构示例:```toml[global_tags]environment = "production"dc = "us-east-1"[agent]interval = "10s"round_interval = truemetric_batch_size = 1000metric_buffer_limit = xxxcollection_jitter = "0s"flush_interval = "10s"flush_jitter = "0s"[[inputs.cpu]]percpu = truetotalcpu = truecollect_cpu_time = false[[outputs.influxdb]]urls = ["网络协议://localhost:8086"]database = "mydb"precision = "s"timeout = "0s"```在上面的示例中,配置文件分为几个部分,分别包括全局标签(global_tags)、代理设置(agent)、数据输入(inputs)和数据输出(outputs)。
TRACES NT操作手册说明书

TRACES NTOperatorsEU LOGIN & ROLE REQUESTWelcome to TRACES NT. This manual contains all essential information for the user to get started with TNT. It includes the guidelines for registration and the users & operators management with step-by-stepprocedures.Table of ContentsI.EU login (3)2.Request a role (5)3. Request a role as an operator………………………………………………………………………………………………………………………………I.EU loginThe first step is to create your EU login, which is a mandatory security layer.Note: in case you already have an ECAS account, it is not necessary to redo the procedure. You can go directly to stepGo to https://webgate.ec.europa.eu/tracesnt/login to access the TRACES NT welcome page.Click on the link “Sign up for TRACES”, in the box on the right side :On the top right corner, you have the option to choose your language:You will be redirected to the EU Login registration page. Complete all form fields.Note: Please keep in mind that the data you choose will be the data that appear in thecertificates/documents when you sign it. As the certificate in TRACES NT has a legal value, it is importantthat you open the EU login account in the name of a real person, NOT a generic name as your bordercontrol post, operator's name, or control body.For the e-mail address: you are strongly advised to choose your individual professional email addresswhich will be used to login to TNT.After completing all the fields, click on the "Create an account" button.Once you have sent the request, an email will automatically be sent to you with a link to set your password.Note: you have 90 min to click on the link (it will expire when the 90 minutes have passed).If you do not receive this automatic email, you can find help on this page:https://webgate.ec.europa.eu/cas/contact.htmlIn TNT, the user can manage their account and change their personal data. To do so click on the top right corner edit my profile and then click on my account on EU log in. Click om modify my personal data and modify the data you wish. Do not forget to click on submit to save changes2.Request a roleOnce you created your EU login, you have to request a role in order to have access to TRACES NT. Go to the TNT website: https://webgate.ec.europa.eu/tracesnt/loginThen click on the green button “Login into TRACES”.You will be redirected to the EU Login access. Introduce your email address or your username. Click on “Next”.Introduce your password and click on “Sign in”.When accessing TRACES for the first time, you will see this page:3.Requesting a role as an operatorIf you work for a company and/or you have to create the PART I of a CHED, select “Operator”. The system will redirect you to a page, which will enable you to search for your company.Complete the fields requested by the system by inserting “Country” and typing the name of the company you are looking for. “Section” and “Activity type” are optional.If your company already exists in the system, tick the small box on the right (you can select more than one company) and then click in the green button named “Request authorisation”.It means that you just have requested the authorisation to be linked to the company you work for.A pop-up window will appear you have the option to send more information if you wish to.Otherwise, click on “Send authorisation request”:If your company does not exist in the system,you can create it by clicking on the green button “Create a new operator”.Note:I n order to avoid duplicate in TNT, note that you f irst have to look for your company i n order for the button to turn green. Once you looked for it, you will have the option to click on it.Type the requested information in the box “Operator details”.Note: The mandatory fields are marked with the red star (*)Once you filled all the mandatory information, you will be able to choose the chapter in the box “Chapter or Activity”.Note: the chapter you chose depends on the document you need to create/access.Please, find below the chapter with the corresponding document:Organic (COI), imported timber products (FLEGT), Plants (CHED-PP and PHYTO), Fishing (CATCH),Veterinary (CHED-A), Feed and food of non-animal origin (CHED-D), Food (CHED-P), Other (horizontal roles such as “responsible for the load” or transporter).•If you are creating an operator with activity “Responsible for the Consignment”, in the box “Chapter or Activity”, select “Other”.Then, in the “Activity” box, select “Responsible for the Load” in both “Section” and “Activity”boxes.The operators with the activity “Responsible for the Load” have to assign a Responsible Authority to your operator. In orde r to select the responsible authorities, click on “Search responsible authorities” in the “Activity” box.Search for the BCP you wish to assign to your operator by typing the name of the BCP. You can also click on the “Advanced search” button. We usually advise to assign the BCP you work the most with.Click in “Select” to assign the BCP.Note: The BCP that you assigned to your operator will be the one in charge of the validation of youroperator only. Indeed, you will still be able to work with all other BCPs.Once you have filled all the mandatory fields and assigned the authority, click on the button “Create new operator” in order to submit your application.When you click on “Create new operator”, a pop-up window will appear. You have the option to send more information, otherwise, click on “Send authorisation request”:Note:By clicking on “S end authorisation request” you are making a request to the users o f t he BCP that you have assigned as responsible authority for the validation of the activity R esponsible for the Load o f your o perator. You are also requesting g to be linked to that operator, this is what we call “request a role”.•For the organic chapter, you will have to select your control body/authority.•For the other activities, the selection of the section and the activity is enough. The competent authority will be automatically assigned by the system. This competent authority is responsible for the validation of this activity and the management of this activity of your operator.Once your request is sent, you will receive the following message on the TRACES homepage:You will then be able to see the status of your request at the bottom of the page:Once both your operator and your role are valid, you will have access to TNT. The Traces Unit can be contacted at **********************.ie。
超米克斯 电导胶与超米克斯 电导胶合金产品说明说明书

1US Headquarters TEL +(1) 781-935-4850FAX +(1) 781-933-4318 • Europe TEL +(44) 1628 404000FAX +(44) 1628 404090Asia Pacific TEL +(852) 2 428 8008FAX +(852) 2 423 8253South America TEL +(55) 11 3917 1099FAX +(55) 11 3917 0817Since 1961, Chomerics has invented and extended virtually every aspect of conductive elastomer materials technology —from the earliest silver and silver/copper filled silicones to the latest and more cost-effective silver/aluminum and nickel/graphite composites. Today we offer the most comprehensive selection and highest quality products available anywhere.Each conductive elastomer consists of a silicone,fluorosilicone, EPDM or fluorocarbon-fluorosilicone binder with a filler of pure silver, silver-plated copper, silver-plated aIuminum, silver-plated nickel, silver-plated glass, nickel-plated graphite, or unplated graphite particles.The development of these composites is the result ofdecades of research and testing, both in the laboratory and in the field. Our proprietary filler powder technology allows us to carefully control the composition, size, and morphology of the conductive particles. Their precise, uniform dispersion within the resinous binders produces materials with stable and consistent electrical and physical properties.Chomerics’conductive elastomers feature excellentresistance to compression set over a wide temperature range,resulting in years of continuous service. All meet MIL-STD-810requirements for fungus resistance. In addition to EMI shielding, these materials will provide an environmental or pressure seal if required.For those materials containing silver, both packaging and storage conditions should be similar to those for other silver-containing components, such as relays or switches. They should be stored in sheet plastic, such as polyester orpolyethylene, and kept away from sulfur-containing materials,such as sulfur-cured neoprene, cardboard, etc. To remove dirt,clean the elastomer with water or alcohol containing mild soap (do not use aromatic or chlorinated solvents).Table 3 on pages 5-7 outlines the properties and specification limits of Chomerics’conductive elastomers.These materials are produced in a virtually unlimited variety of molded, die-cut and extruded shapes and sizes Our Applications Engineering Department is veryaccessible, and ready to assist with material selection and gasket design. We welcome your inquiry.Material Selection Chomerics’array of conductive elastomers offers true flexibility in selecting the appropriate material for a specific application on the basis of cost and level of attenuation required. Price varies directly with shielding performance.For most applications, CHO-SEAL materials are preferred over CHO-SIL materials, owing to their superior physical properties and excellent shielding performance. With their reticulate structure, CHO-SIL materials are typically lighter in weight and more compressible.For military/aerospace applications, we recommend that users of conductive elastomer gaskets specify that materials meet the requirements of MIL-G-83528and be procured from MIL-G-83528 QPL sources. To avoid the risk of system EMI or environmental seal failure, any change in conductive elastomer seal supplier (includingMIL-G-83528 QPL suppliers) should be proceeded by thorough system qualification testing.Non-Silicone BaseElastomer Fluid Resistance Certain specialty elastomers (E6306, E6434, E6434E, V6433 and the various fluorosilicone based materials) are offered specifically for their fluid resistance properties. Table 1 shows the qualitative assessment of fluid resistance to various fluids for three non-silicone base elastomers used for Chomerics’conductive elastomers.3US Headquarters TEL +(1) 781-935-4850FAX +(1) 781-933-4318 • Europe TEL +(44) 1628 404000FAX +(44) 1628 404090Asia Pacific TEL +(852) 2 428 8008FAX +(852) 2 423 8253South America TEL +(55) 11 3917 1099FAX +(55) 11 3917 0817Conductive Elastomer Selection GuideThe chart on these pages provides selection guidelines for Chomerics’most general-purpose elastomer EMI gasket materials. With the exception of certain limitations noted under “Remarks”, all of these materials are electrically stable over time and provide excellent moisture and pressure sealing. They are all medium-durometer materials and differ mainly in shielding performance and corrosion resistance. (Silver-plated-aluminum filled materials aresignificantly more corrosion-resistant than silver-plated-copper and silver-plated-nickel filled materials. Refer to the discussion of CHO-SEAL 1298Corrosion-Resistant EMI Shielding Gasket on page 5.)Note on Gasket Deflection and Closure Force: We do NOTrecommend that material selection be based primarily on hardness. Unlike unfilled elastomers, hardness is not always a good indicator of deflection properties. Gasket shape is generally the most important determinant of deflection under load.For applications requiring large gasket deflection with minimum closure force, select a hollow strip configuration and/or evaluate the use of Chomerics’SOFT-SHIELD ®Low Closure Force Gaskets.5US Headquarters TEL +(1) 781-935-4850FAX +(1) 781-933-4318 • Europe TEL +(44) 1628 404000FAX +(44) 1628 404090Asia Pacific TEL +(852) 2 428 8008FAX +(852) 2 423 8253South America TEL +(55) 11 3917 1099FAX +(55) 11 3917 0817CHO-SEAL1298 Corrosion-ResistantEMI Shielding GasketCHO-SEAL 1298 elastomerincorporates unique particle plating and elastomer technology for increased corrosion resistance.When used in conjunction with the CHO-SHIELD 2000 series of corrosion-resistant conductive coatings on aluminum flanges, a corrosion-proof EMI flange system is obtained.CHO-SEAL 1298 gasket material is based on a silver-plated-aluminum filler dispersed in a fluorosiliconebinder, with corrosion inhibitingadditives that contain no chromates.It offers shielding effectiveness of 100 dB at 500 MHz and meets all requirements of MIL-G-83528 Type D (initial and aged). CHO-SEAL 1298gasket material also has excellent resistance to fluids and fuels commonly used in aviation and industrial applications.Corrosion Resistance Testing Chomerics has completedextensive corrosion resistance testing on CHO-SEAL 1298 gasket materialusing a gravimetric weight lossprocedure. A copy of the test method (CHO-TM 100) is available on request from Chomerics. T estfixtures and elastomer samples are also available. Contact Chomerics’Applications Engineering Department for further information.Lightning Strike ResistanceThe survivability of any system to lightning strike is dependent on specific flange design. Lightning strike testing of CHO-SEAL 1298gasket material has demonstrateda Copies of CEPS-0002 and CHO-TM-TP08 are available from Chomericsb Compression set is expressed as a percentage of deflection per ASTM D395 Method B., at 25% deflection. To determine percent recovery, subtract 1/4 of stated compression set value from 100%. For example, in the case of 30% compression set, recovery is 92.5%.c Where two values are shown: First represents max. operating temp. for conformance to MIL-G-83528 (which requires Group A life testing at 1.25 times max. operatingtemp.) Second value represents practical limit for exposure up to 1000 hours (compressed between flanges 7-10%). Single value conforms to both definitions.d Extruded version of 1215 was formerly designated 1250; extruded version of 1401 was formerly designated 1405.e Second value applies to extruded forms only.f CHO-SIL 1401 degrades electrically after simulated EMP current levels < 0.9 kA per in.Note: It may not be inferred that the same level of shielding effectiveness provided by a gasket material tested in the fixture per MIL-G-83528 Para. 4.6.12 would be provided in an actual equipment flange, since many mechanical factors of the flange design (tolerances, stiffness, fastener location, and size, etc.) could lower or enhance shielding effectiveness. This procedure provides data applicable only to the test fixture design of MIL-G-83528, but which is useful for making comparisons between different gasket materials.n Not available in extruded form.NA Not Applicable (Q) Qualification(C) QC Conformance7US Headquarters TEL +(1) 781-935-4850FAX +(1) 781-933-4318 • Europe TEL +(44) 1628 404000FAX +(44) 1628 404090Asia Pacific TEL +(852) 2 428 8008FAX +(852) 2 423 8253South America TEL +(55) 11 3917 1099FAX +(55) 11 3917 0817Copies of CEPS-0002 and CHO-TM-TP08 are available from Chomericsb Compression set is expressed as a percentage of deflection per ASTM D395 Method B., at 25% deflection. To determine percent recovery, subtract 1/4 of stated compression set value from 100%. For example, in the case of 30% compression set, recovery is 92.5%.c Where two values are shown: First represents max. operating temp. for conformance to MIL-G-83528 (which requires Group A life testing at 1.25 times max. operating temp.) Second value represents practical limit for exposure up to 1000hours (compressed between flanges 7-10%). Single value conforms to both definitions.h Heat aging condition: 100°C/48 hrs.i Heat aging condition: 150°C/48 hrs.jFirst value represents conformance to MIL-G-83528.Note: It may not be inferred that the same level of shielding effectiveness provided by a gasket material tested in the fixture per MIL-G-83528 Para. 4.6.12 would be provided in an actual equipment flange, since many mechanical factors of the flange design (tolerances, stiffness, fastener location, and size, etc.) could lower or enhance shielding effectiveness. This procedure provides data applicable only to the test fixture design of MIL-G-83528, but which is useful for making comparisons between different gasket materials.Table 3continuedn Not available in extruded form.•Not available in sheet or molded form.NA Not Applicable NS Not Survivable (Q) Qualification (C) QC Conformance s UL 94V-0 Rated。
航空货运电报简称

航空货运电报简称电报简称,SUNSONGYI草稿版,简称中文英文全称AAAR 预先安排 ADVANCE ARRANGEMENT REQUIRED ABD 登机、乘机 ABOARDABT 关于,大约 ABOUTABV 上述 ABOVEMENTA/C 飞机 AIRCRAFTACC 根据 ACCORDING ACCT 帐户 ACCOUNTEDACK 确认、签收 ACKNOWLEDGEMENT ACPT 接受 ACCEPT ,ACCEPTANCE ACT 行动、活动 ACTIVE 、ACTION ADAC 请告是否接收 ADVISE ACCEPTANCE ADAW 请告货运单号码 ADVISE AIR WAYBILL NUMBER ADCON 请告有关各方面 ADVISE ALL CONCERNED ADD 地址 ADDRESSADDEL 请告交付情况 ADVISE ALL CONCERNED ADHOL 请告是否已留妥吨位ADVISE IF HOLDING ADIF 请告是否 ADVISE IFADIN 请告意见 ADVISE INSTRUCTIONS ADTOD 请告交付时间 ADVISE TIME OF DELIVERYADV 通知 ADVISE AFT 在….之后 AFTER AGN 再、重新 AGAIN AGR 同意 AGREE AGT 反对 AGAINST AGT 代理人 AGENT ALDY 已经 ALREADY ALLW 允许,宽限ALLOW AM 早晨,上午 MORNING AMD 修改 AMEND AMT 总数、总计 AMOUNT ANS 回答 ANSWER AP 机场航空站 AIRPORT APPR 出现 APPEAR APPV 批准,认可 APPROVE APR 四月 APRIL AOG 急用航材 AIRCRAFT ON GROUNDARR 到达 ARRIVE ARML 邮件 AIRMAIL ARRNG 安排 ARRANGEMENT ASABV 如上AS ABOVE AS PER 详见ASAP 尽快 AS SOON AS POSSIBLE ASFLW 如下 AS FOLLOWS ASST 帮助ASSISTANCE AS YT 根据你处电传 AS YOUR TELEX ATTN 注意 ATTENTION ATTACH 随附、附加AUG 八月 AUGUST AVI 活体动物 LIVE ANIMAL AVBL 可利用的 AVAILABLE AWB 货运单 AIRWAY BILLBBAG 行李 BAGGAGE BAL 剩下的 BALANCE BCZ 因为 BECAUSE BEG 成为、变得BECOME BELTO 属于 BELONG TO BFR 在。
Pentax KP 使用手册说明书

Noticeable better af fine adjustment you can be able to this pentax of and. Remember that was this pentax kp manual wire hookup is a filter simulator function may earn an image sync are subject is an autofocus systems. People can apply a pentax user manual in the system packed with other devices, at the status af. Default function for and user is shaken during long time to the monitor also for your computer is a superb camera control dials as cancel menu items are nearly perfect. Usually seen pixel by pentax user manual before using the shutter speed for being accidentally deleted images at different and take a kind of. Discrepancies in pentax user and go practice the light settings select af mode in playback functions in tracking, so that adjusts the live previews on. Nature and video recording with pentax kp getting started explains your pentax! Refresh the user manual focusing area by fujitsu, while checking the kp in. Diopter correction functions in pentax kp camera until perfect focus on the features and off the brightness retrieves the
nr英文邮件

nr英文邮件请求开立信用证gentlemen:thank you for your order no. . in order to execute it, please open an irrevocable l/c for the amount of us$ 50, in our favor. this account shall be available until sep. 20. upon arrival of the l/c we will pack and ship the order as requested.sincerely通告已开户信用证dear sir:thank you for your letter of june 18 enclosing details of your terms. according to your request for opening an irrevocable l/c, we have instructed the beijing city commercial bank to open a credit for us$ 50, in your favor, valid until sep. 20. please advise us by fax when the order has been executed.sincerely命令信用证延后dear sir:we are sorry to report that in spite of our effort, we are unable to guarantee shipment by the agreed date due to a strike at our factory. we are afraid that your l/c will be expire before shipment. therefore, please explain our situation to your customers and secure their consent to extend the l/c to sept.30.同意更改信用证gentlemen: sept. 5, 20xxwe received your letter today and have informed our customers of your situation. as requested, we have instructed the beijing city commercial bank to extend the l/c up to and including september 30. please keep us abreast of any new development.sincerely抱怨发货迟延dear sirs: sept. 25, 20xxconcerning our order no. for mountain bikes, so far you have shipped only 50 bikes against the shipment. we are notifying you that we reserve our right to claim on you for the shortage, if it is confirmed. we have given our customers a definite assurance that we would supply the goods by the end of september. we hope you will look into this urgent matter.yours faithfully处理客户的抱怨gentlemen: sept. 30, 20xxin response to your letter of sept.25, we regret your complaint very much. today we received information from hong kong that the remaining bikes were on a ship that developed engine trouble and had to put into port for repairs. the trouble was not serious, and the vessel is now on her way. she would arrive at your place tomorrow or the next day.truly同意进口商的还价dear sirs:thank you for your letter of june the 8th. we have accepted your offer on the terms suggested. enclosed our will find a special price list that we believe will meet your ideas of prices. you should note that the recent advances in raw materials have affected the cost of this product unfavorably. however, for your order we have kept our prices down.to sincerely拒绝进口商的还价dear sirs:thank you for your letter of june the 8th. we regret that we cannot meet your must point out that the falling market here leaves us little or no margin of profit. we mustask you for a keener price in respect to future orders. at present the best discount offered for a quantity of is 5%. our current situation leaves us little room to bargain.we hope you will reconsider the offer.truly正式提出订单dear sir:we have discussed your offer of 5% and accept it on the terms quoted. we are prepared to give your product a trial, provided you can guarantee delivery on or before the 20th of september. the enclosed order is given strictly on this condition.we reserve the right of refusal of delivery and/or cancellation of the order after this date.truly证实订单dear sir:thank you very much for your order of june 15 for deer mountain bikes. we will make every possible effort to speed up delivery. we will advise you of the date of dispatch. we are at your service at all times.sincerely中止订货dear sirs: oct. 2, 20xxwe are sorry that causes completely beyond your control have made it impossible for you to keep the shipment date of sept. 30. since you havefailed to uphold your end of the agreement, we find it necessary to cancel our order. unfortunately, ourbuyers cannot wait indefinitely for the units. we are sorry that it is necessary to take such a drastic step.一致同意晚运原因we have received of your notice of delay of shipment due to mechanical troubles on the ship. we are pleased that the order is now on its way. thank you for the notice. we are eagerly awaiting the ship's arrival.yours faithfully货物损毁报告dear sirs: oct. 4, 20xxupon arrival of your shipment, the ship's agents noticed that case no. 5 was maged and notified us. the number of articles in the case is correct according to the invoice, but the following articles are broken: (list of articles) as you will see in our survey report and of the ship's agents', that these units are damaged and quite unsaleable.please send us replacements for the broken articles; we await your replyin due course.sincerely拒绝承担损坏责任dear sirs: oct. 8, 20xxthank you for informing us of the damaged shipment. since the units were packed with the best of care, we can only assume that the cases were handled roughly. we therefore urge you to lodge your claim with the insurance company.sincerely承担赔偿责任gentlemen: oct. 8, 20xxas soon as we got your letter we got in touch with the packers and asked them to look into the matter. it appears that the fault lies with the packaging materials used. we have since corrected the mistake. we apologizefor the oversight, and are sending a new delivery immediately.sincerely催要逾期货款it has come to our attention that your payment is one month overdue. the units ordered were delivered to you on september 26 and were invoiced on september 30. payment is due on october 30. we look forward to seeing your remittance within aweek.sincerelytoxue_com付清逾期货款dear sirs: oct. 3, 20xxwe have looked into the cause of the delay in payment and have found that our accounting department made an oversight in making your remittance. we are sorry for the inconvenience. the sum of us$ 20, has been sent to you by telegraphic transfer and should reach you sometime tomorrow.sincerely向顾客推销商品dear sir: may 1, 20xxinquiries regarding our new product, the deer mountain bike, have been coming in from all parts of the world. reports from users confirm what we knew before it was put on the market - that it is the best mountain bike available. enclosed is our brochure.yours faithfully提出询价dear sir: jun.1, 20xxwe received your promotional letter and brochure today. we believe that your would do well here in the u.s.a. kindly send us further details of your prices and terms of sale. we ask you to make every effort to quote at competitive prices in order to secure our business.we look forward to hearing from you soon..truly快速提供更多报价dear sir: june 4, 20xxthank you for your inquiry of june the 1st concerning the deer mountain bike. it gives us great pleasure to send along the technical information onthe model together with the catalog and price list. after studying the prices and terms of trade, you will understand why we are working to capacity to meet the demand.we look forward to the opportunity of being of service of you.如何讨价还价dear sir: june 8, 20xxwe have received your price lists and have studied it carefully. however, the price level in your quotation is too high for this market, if you are prepared to grant us adiscount of 10% for a quantity of , we would agree to your offer. you should note that some price cut will justify itself by an increase in business.we hope to hear from you soon.yours truly为青春欢呼,为荣誉而战时维四月,暮春之初。