A Distributed Architecture for a Ubiquitous RFID

合集下载

LTE_3GPP_36.213-860(中文版)

LTE_3GPP_36.213-860(中文版)

3GPP
Release 8
3
3GPP TS 36.213 V8.6.0 (2009-03)
Contents
Foreword ...................................................................................................................................................... 5 1 2 3
Internet

Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
© 2009, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TTA, TTC). All rights reserved. UMTS™ is a Trade Mark of ETSI registered for the benefit of its members 3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners LTE™ is a Trade Mark of ETSI currently being registered for the benefit of i ts Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM Association

杰克潘 Cisco 2500系列路由器简介说明书

杰克潘 Cisco 2500系列路由器简介说明书

Cisco2500 SeriesProduct OverviewThe Cisco2500 series routers provide a variety of models designed for branch office and remote site environments. Theserouters are typically fixed configuration with at least two of the following interfaces:•Ethernet (AUI)•10BaseT Ethernet hub•Token Ring•Synchronous serial•Asynchronous serial•ISDN BRIKey Features and BenefitsCisco2500 routers come with Flash EPROM technology for simplified software maintenance. These systems support avariety of Cisco IOS software feature sets,so you can choose a feature set that supports your specific protocol environment.The software feature sets range from an IP and bridging-only to the full array of Cisco’s software functionality, includingAPPN and RMON.Mission-specific models contain less memory and less hardware functionality to support a subset of protocols.Each mission-specific model can be upgraded to full router capability by downloading a new Cisco IOS software feature set and, ifnecessary, adding memory.Cisco2500 series models can be divided into the following categories:•Single LAN routers—Models 2501, 2502, 2503, 2504, 2520, 2521, 2522 and 2523•Mission-specific, entry-level routers—Models 2501CF, 2501LF, 2502CF, 2502LF, 2503I, 2504I, 2520CF, 2520LF, 2521CF, 2521LF, 2522CF, 2522LF, 2523CF and 2523LF•Router/hub combinations—Models 2505, 2507 and 2516•Access servers—Models2509to2512(refer to the“Cisco2500Series Access Servers”section in the“Access Servers”chapter later in the catalog)•Dual LAN routers—Models 2513, 2514 and 2515•Modular routers—Models 2524 and 2525 (optional integrated DSU/CSU or NT-1)SpecificationsHardwareAll the Cisco2500 series models support the features listed in the following table.Table 5-53: Cisco 2500 Series Specifications 1. If your system requires more than 8MB of Flash memory, the additional memory must be ordered separately.2. This feature set is available with Cisco IOS Release 11.0 and later releases.3. The console cable kit includes an RJ-45-to-RJ-45 roll-over console cable, an RJ-45-to-DB-25 male DCE adapter, an RJ-45-to-DB-25 female DTE adapter, and an RJ-45-to-DB-9 female DTE adapterSoftwareTable 5-54: Cisco 2500 Series Environmental Specifications Characteristic DescriptionFlash memoryMinimum of 8 MB of Flash memory, except for the mission-specific routers which require only 4MB of Flash memory. However, depending on the Cisco IOS release that shipped with the sys-tem, it might require more memory. Refer to the “Cisco IOS Software” chapter for the minimum Flash memory required for each feature set.DRAM memory expandability Minimum DRAM required by the Cisco IOS release that shipped with the system. Refer to the “Cisco IOS Software” chapter for the minimum DRAM required for each feature set.Processor type20-MHz 68030Software options—Cisco IOS Re-lease 11.2IP Routing IP Routing PlusIP/IPX with IBM base functionality and APPN Desktop (IP/IPX/AppleTalk/DEC)Desktop (IP/IPX/AppleTalk/DEC) Plus Enterprise Enterprise PlusEnterprise/APPN/PlusMission-specific Cisco 2500 series: application-specific software Software options—Cisco IOS Re-lease 11.1 and 11.0IP RoutingIP Routing with IBM base functionality IP/IPX RoutingIP/IPX Routing with IBM base functionality IP/IPX with IBM base functionality and APPN DesktopDesktop with IBM base functionality EnterpriseEnterprise/APPN RMONMission-specific Cisco 2500 series: application-specific softwareDimensions (H x W x D)Models 2501 to 2516 and 2520 to 2525: 1.75 x 17.5 x 10.56 in. (4.44 x 44.45 x 26.82 cm)Weight (average shipping)Models 2501 to 2516 and 2520 to 2525: 10 lb. (4.5 kg)Standard componentsPower supply and cord Console cable kitRJ-45-to-DB-9 adapter19 in. rack-mount/wall-mount kitDescription SpecificationConsumption For models 2501 to 2525: 40WInput For models 2501 to 2516 and 2520 to 2525: 110 to 220 V AC, 50 to 60 Hz –48VDC Current ratingFor models 2501 to 2516 and 2520 to 2525: 1.0A at 60 Hz, 0.5A at 50 Hz Operating temperature range For models 2501 to 2516 and 2520 to 2525: 32 to 104F (0 to 40C)Nonoperating temperature rangeFor models 2501 to 2516 and 2520 to 2525: –40 to 185F (–40 to 85C)Description SpecificationHumidity (noncondensing)For models 2501 to 2525: 5 to 95%OptionsThe Cisco2500 series routers are discussed in the following sections:•Memory Options•Single LAN Routers•Mission-Specific Routers•Router/Hub Combinations•Access Servers•Dual LAN Routers•Modular Routers•Hardware Product NumbersMemory OptionsAll Cisco2500models include a minimum of8MB of Flash memory,except for the mission-specific routers which include4 MB or 8 MB of Flash memory, depending upon the Cisco IOS software release you order. Additional Flash memory canbe purchased to allow for dual banking or potential future code growth.There are two types of DRAM memory in the Cisco2500 series routers: primary and shared (packet). Primary memory isused to store the operating configuration,routing tables,caches,and queues.Shared memory is used to store incoming andoutgoing packets. In the table below, the physical configuration column lists the amount of DRAM SIMM memorysupported. The system usage column lists how the system allocates the total DRAM memory installed.Table 5-55: Shared and Primary DRAM Memory—Cisco2500 SeriesPhysical Configuration System UsageTotal DRAM Memory DRAM SIMM Shared DRAM Memory Primary DRAM Memory4MB4MB2MB2MB8MB8MB2MB6MB16MB16MB2MB14MBHardware Product NumbersThe Cisco2500series offers the hardware,memory,and NPM cable options listed in the following table.If a product numberends with an equal sign(=),the item can be ordered only as a spare.If a product number does not end with an equal sign,theitem can be ordered as a spare or as a configurable part of a system order.Other hardware options can also be ordered throughthe Cisco authorized reseller channel.Note For options that apply to most systems,refer to the“Cables and Transceivers”or“Power Supplies and Power Cords”chapters later in the catalog.Single LAN RoutersModels2501,2502,2503,2504,2520,2521,2522,and2523(see through)contain the common Cisco2500series featureslisted in the following table. In addition, these models support the network interfaces listed in Table 11-90.Note This section discusses standard models.The mission-specific models are described in the “Mission-Specific Routers”section later in this chapter.Table 5-56: Single LAN Router Network Interfaces 1. Synchronous and asynchronous.2. Synchronous.Figure 5-13: Cisco 2501 Rear ViewFigure 5-14: Cisco 2502 Rear ViewModel Ethernet Token Ring Low-Speed Serial 1Serial 2ISDN BRI 25011002025020102025031002125040102125201022125210122125221082125231821H 8825DB-9DB-60RJ-45On/off switchPowerDB-9DB-60RJ-45On/off switchPowerH 1687Figure 5-16: Cisco 2504 Rear ViewFigure 5-17: Cisco 2520 Rear ViewFigure 5-18: Cisco 2521 Rear ViewDB-15DB-60RJ-45On/off switchPowerH 1688DB-9DB-60RJ-45On/off switchPowerH 1689H 6707DB-15RJ-45On/off switchPower DB-60DB-600H 6696DB-9UTP Token Ring ISDN (BRI)RJ-45On/off switch PowerDB-60Figure 5-20: Cisco 2523 Rear ViewMission-Specific RoutersMission-specific routers are entry-level routers that are based on standard Cisco 2500hardware.However,mission-specific routers contain less memory than standard models and run reduced software images designed for CFRAD,LAN FRAD,and ISDN applications. These reduced software images disable unused ports. Mission-specific routers can be upgraded to full standard-model functionality by purchasing additional software and memory.Table 5-57: Mission-Specific Router Network Interfaces Model Ethernet Token Ring Serial Low-Speed Serial ISDN BRI 2501CF Software disabled 02002501LF 102002502CF 0Software disabled 2002502LF 012002503I 10Software disabled 012504I 01Software disabled 012520CF Software disabled 022Software disabled 2520LF 1022Software disabled 2521CF 0Software disabled 22Software disabled 2521LF 0122Software disabled 2522CF Software disabled 028Software disabled 2522LF128Software disabledH 6697DB-60DB-1510BaseTISDN (BRI)RJ-45On/off switchPowerH 66980DB-15UTP Ethernet ISDN (BRI)RJ-45On/off switchDB-60PowerDB-60Router/Hub CombinationsModels 2505,2507,and 2516support integrated hub functionality as well as all the common features listed in Table 11-89. In addition, these models support the interfaces listed in the following table.Table 5-58: 10BaseT Hub Ports Figure 5-21: Cisco 2505 Rear ViewFigure 5-22: Cisco 2507 Rear View2523CF 0Software disabled 28Software disabled 2523LF128Software disabledModel Serial Hub Ports ISDN BRI 25052802507216025162141Model Ethernet Token Ring Serial Low-Speed Serial ISDN BRI DB-60RJ-45On/off switchPowerH 8826RJ-451Cisco 2505DB-60RJ-45On/off switchPowerH 2544RJ-45Access ServersModels 2509, 2510, 2511, and 2512 are designed to function as access servers for remote node and asynchronous/synchronous routing. For complete information, refer to the “Access Servers” chapter later in the catalog.Dual LAN RoutersModels 2513, 2514, and 2515 provide higher-density LAN support and include all the common features listed in Table 11-89. In addition, these models support the interfaces listed in the table below.Table 5-59: Dual LAN Router Interface Options Figure 5-24: Cisco 2513 Rear ViewModel Ethernet Token Ring Serial 25131122514202251522DB-60RJ-45RJ-45 On/off switch PowerH 2856MDI/MDI-XswitchBRI DB-60DB-15DB-60RJ-45On/off switchPowerH 2547DB-9TOK EN RIN GFigure 5-26: Cisco 2515 Rear ViewModular RoutersModels 2524 and 2525 provide LAN and WAN access in a low-cost modular router platform that can grow with yourinternetworking needs.The Cisco 2524offers an Ethernet (AUI or 10BaseT)LAN connection,and the Cisco 2525offers a Token Ring (STP or UTP) LAN connection. Both routers can accommodate up to three WAN modules—two synchronous serial and one ISDN.The choice of synchronous serial W AN modules is as follows:•2-wire, switched, 56-kbps DSU/CSU •4-wire, 56/64-Kbps DSU/CSU •Fractional T1/T1 DSU/CSU •Five-in-one synchronous serialNote The five-in-one synchronous serial WAN module gets its name from the five types of signaling it supports, whichinclude:EIA/TIA-232,EIA/TIA-449,V .35,X.21and EIA-530.You can order a DB-60shielded serial transition cable.The router end of the cable has a DB-60 connector; the other end of the cable has the appropriate connector for the standard interface you specify.The choice of ISDN WAN modules is as follows:•ISDN BRI•ISDN with integrated NT1 deviceThe ISDN W AN modules are keyed so that you cannot insert them into the synchronous serial WAN slots.A blank slot cover is installed over unused slots.DB-15DB-60RJ-45On/off switchPowerH 2546DB-15DB-9DB-60RJ-45On/off switchPowerH 2548DB-9Figure 5-28: Cisco 2525 Rear ViewFigure 5-29: 2-Wire, Switched, 56-Kbps DSU/CSU WAN ModulePowerH 5045On/offswitchConsole port (RJ-45)10BaseT port(RJ-45)Ethernet AUI port (DB-15)LAN activity LED Ethernet link LED Auxiliary port (RJ-45)H 5271PowerOn/off switchConsoleport(RJ-45)UTP port (RJ-45)Token Ring port (DB-9)LANactivityLEDToken Ringin-ring LEDAuxiliary port (RJ-45)H 5046RJ-112-WIRE 56KDSU/CSUTXLBRX ALCDCarrier detectLEDReceive LEDAlarmLED Loopback LEDTransmit LEDCaptive screwCaptive screwFigure 5-30: 4-Wire, 56/64-kbps DSU/CSU WAN ModuleFigure 5-31: Fractional T1/T1 DSU/CSU WAN ModuleFigure 5-32: ISDN BRI WAN ModuleH 5047RJ-48S4-WIRE 56K/64K DSU/CSUTXLBRX ALCDCarrier detectLEDReceive LEDAlarmLED Loopback LEDTransmit LEDCaptive screwCaptive screwH 5048RJ-48CFTI/TI DSU/CSUTX LBRX ALCDCarrier detectLEDReceive LEDAlarmLED Loopback LEDTransmit LEDCaptive screwCaptive screwMONINOUTNETJACK Monitor jackH 5050RJ-45ISDN-BRIS/TACTIVITYISDN BRI activity LEDCaptive screwCaptive screwFigure 5-33: ISDN BRI with Integrated NT1 WAN ModuleFigure 5-34: Five-in-One Synchronous Serial WAN ModuleFigure 5-35: Blank Slot CoverRefer to the “Cisco IOS Software” chapter for detailed software feature set information.Ordering InformationProduct NumbersNote For more information, including cable illustrations, refer to the “Cables and Transceivers” chapter. The “PowerCords” chapter provides international power cord product numbers.H 5051RJ-45ISDN-BRI with NTIACT UCaptive screwCaptive screwNTIH 5049SERIALCaptive screwCaptive screwACTIVITYSerial activity LEDDB-60H 5052Captive screwCaptive screwDo not plug/unplug modules with power on.BLANKTable 5-60: Cisco2500 Series Base Models Hardware Product NumbersModel Description Product Number Cisco2501 1 Ethernet, 2 serial, AC power supply CISCO2501 Cisco2501-DC 1 Ethernet, 2 serial, DC power supply CISCO2501-DC Cisco 2501CF1 2 serial, CFRAD software, AC power supply CISCO2501CF Cisco2501LF 1 Ethernet, 2 serial, LAN FRAD software, AC power supply CISCO2501LF Cisco2502 1 Token Ring, 2 serial, AC power supply CISCO2502 Cisco2502CF1 2 serial, CFRAD software, AC power supply CISCO2502CF Cisco2502LF 1 Token Ring, 2 serial, LAN FRAD software, AC power supply CISCO2502LF Cisco2503 1 Ethernet, 2 serial, 1 ISDN BRI, AC power supply CISCO2503 Cisco2503-DC 1 Ethernet, 2 serial, 1 ISDN BRI, DC power supply CISCO2503-DC Cisco2503I1 1 Ethernet, 1 ISDN BRI, ISDN software, AC power supply CISCO2503I Cisco2503I-DC1 1 Ethernet, 1 ISDN BRI, ISDN software, DC power supply CISCO2503I-DC Cisco2504 1 Token Ring, 2 serial, 1ISDN BRI, AC power supply CISCO2504 Cisco2504-DC 1 Token Ring, 2 serial, 1ISDN BRI, DC power supply CISCO2504-DC Cisco2504I1 1 Token Ring, 1 ISDN BRI, ISDN software, AC power supply CISCO2504I Cisco25058 Ethernet UTP hub ports, 2 serial, AC power supply CISCO2505 Cisco2505-DC8 Ethernet UTP hub ports, 2 serial, DC power supply CISCO2505-DC Cisco250716 Ethernet UTP hub ports, 2 serial, AC power supply CISCO2507 Cisco2507-DC16 Ethernet UTP hub ports, 2 serial, DC power supply CISCO2507-DC Cisco25092 1 Ethernet, 2 serial, 8 async serial, AC power supply CISCO2509 Cisco2509-DC2 1 Ethernet, 2 serial, 8 async serial, DC power supply CISCO2509-DC Cisco25102 1 Token Ring, 2 serial, 8 async serial, AC power supply CISCO2510 Cisco25112 1 Ethernet, 2 serial, 16 async serial, AC power supply CISCO2511 Cisco2511-DC2 1 Ethernet, 2 serial, 16 async serial, DC power supply CISCO2511-DC Cisco25122 1 Token Ring, 2 serial, 16 async serial, AC power supply CISCO2512 Cisco2513 1 Ethernet, 1 Token Ring, 2serial, AC power supply CISCO2513 Cisco2514 2 Ethernet, 2 serial, AC power supply CISCO2514 Cisco2514-DC 2 Ethernet, 2 serial, DC power supply CISCO2514-DC Cisco2515 2 Token Ring, 2 serial, AC power supply CISCO2515 Cisco251614 Ethernet UTP hub ports, 2 sync serial, 1ISDN BRI, AC power supply CISCO2516 Cisco2516-DC14 Ethernet UTP hub ports, 2 sync serial, 1ISDN BRI, DC power supply CISCO2516-DCCISCO2520 Cisco25201Ethernet,2high-speed sync serial,2low-speed async/sync serial,1ISDN BRI inter-face, AC power supplyCisco2520-DC1Ethernet,2high-speed sync serial,2low-speed async/sync serial,1ISDN BRI inter-CISCO2520-DC face, DC power supplyCisco2520CF1 2 high-speed sync serial, 2 low-speed async/sync serial, CFRAD software,CISCO2520CF AC power supplyCisco2520LF1 1 Ethernet, 2 high-speed sync serial, 2 low-speed async/sync serial, LAN FRAD soft-CISCO2520LF ware, AC power supplyCISCO2521 Cisco2521 1 Token Ring, 2 high-speed sync serial, 2 low-speed async/sync serial, 1 ISDN BRIinterface, AC power supplyCisco2521-DC 1 Token Ring, 2 high-speed sync serial, 2 low-speed async/sync serial, 1 ISDN BRICISCO2521-DC interface, DC power supplyCisco2521CF1 2 high-speed sync serial, 2 low-speed async/sync serial, CFRAD software,CISCO2521CF AC power supply1. Mission-specific router. Mission-specific routers are based on standard Cisco 2500 hardware, but they contain less memory and run reduced Cisco IOS images that disable unused ports and support a subset of protocols. By adding software, and possibly memory, mission-specific routers can be upgraded to full standard router functionality.2. See the “Access Servers” chapter later in this catalog, for more information.Cisco 2521LF 1 1 Token Ring, 2 high-speed sync serial, 2 low-speed async/sync serial, LAN FRAD software, AC power supplyCISCO2521LF Cisco 2522 1 Ethernet, 2 high-speed sync serial, 8 low-speed async/sync serial, 1 ISDN BRI in-terface, AC power supplyCISCO2522Cisco 2522-DC 1Ethernet,2high-speed sync serial,8low-speed async/sync serial,1ISDN BRI inter-face, DC power supplyCISCO2522-DC Cisco 2522CF 1 2 high-speed sync serial, 8 low-speed async/sync serial, CFRAD software,AC power supplyCISCO2522CF Cisco 2522LF 11Ethernet,2high-speed sync serial,8low-speed async/sync serial,LAN FRAD soft-ware, AC power supplyCISCO2522LF Cisco 2523 1 Token Ring, 2 high-speed sync serial, 8 low-speed async/sync serial, 1 ISDN BRI interface, AC power supplyCISCO2523Cisco 2523-DC 1 Token Ring, 2 high-speed sync serial, 8 low-speed async/sync serial, 1 ISDN BRI interface, DC power supplyCISCO2523-DC Cisco 2523CF 1 2 high-speed sync serial, 8 low-speed async/sync serial, CFRAD software,AC power supplyCISCO2523CF Cisco 2523LF 1 1 Token Ring, 2 high-speed sync serial, 8 low-speed async/sync serial, LAN FRAD software, AC power supplyCISCO2523LF Cisco 2524 1 Ethernet (AUI or 10BaseT) with 3 slots for WAN modules, AC power supply CISCO2524Cisco 2524-DC 1 Ethernet (AUI or 10BaseT) with 3 slots for WAN modules, DC power supply CISCO2524-DC Cisco 25251 Token Ring (STP or UTP) with 3 slots for WAN modules, AC power supplyCISCO2525Model DescriptionProduct NumberProduct and Part NumbersPart Numbers for the Rack-Mount KitsPart Description Part Number19-in. rack-mount kit1ACS-2500RM-19=24-in. rack-mount kit A25-2500RM-24=Memory OptionsBoot ROM upgrade BOOT-2500=DRAM Memory Options4-MB DRAM SIMM (spare)MEM-1X4D=MEM2500-4U8D4-MB to8-MB DRAM SIMM Factory Up-grade8-MB DRAM SIMM (spare)MEM-1X8D=MEM2500-4U16D 4-MB to 16-MB DRAM SIMM FactoryUpgrade16-MB DRAM SIMM (spare)MEM-1X16D=MEM2500-8U16D 8-MB to 16-MB DRAM SIMM FactoryUpgradeFlash Memory Options4-MB Flash SIMM (spare)MEM-1X4F=MEM2500-8U16F8-MB to 16-MB Flash SIMM Factory Up-grade8-MB Flash SIMM (spare)MEM-1X8F=ModulesSM25-56K22-wire switched 56-kbps DSU/CSU mod-ule(for Cisco2524and Cisco2525routersonly)SM25-56K44-wire 56/64-kbps DSU/CSU module (forCisco 2524 and Cisco 2525 routers only)SM25-T1Fractional T1/T1 DSU/CSU module (forCisco 2524 and Cisco 2525 routers only)SM25-5IN1Five-in-one synchronous serial module(forCisco 2524 and Cisco 2525 routers only)SM25-BRI-S/TISDN BRI module (for Cisco 2524 andCisco 2525 routers only)ISDN with integrated NT1 device moduleSM25-BRI-U(for Cisco 2524 and Cisco 2525 routersonly)SM25-BLANKBlank slot cover(for Cisco2524and Cisco2525 routers only)Redundant Power SystemsPWR-600-AC-RPS 600W redundant AC power system for theCisco 2500 series routersCAB-RPSY-2208Redundant power supply22/18OIR Y-loadcableRedundant power supply 22/18 load cable CAB-RPS-2218=Redundant power supply 22/08 load cable CAB-RPS-2208=ACS-2500RPS=Redundant power supplyfield upgrade forCisco 2500 series routersCables1.The 19-inch rack-mount kit can only be ordered as a spare;a 19-inch rack-mount kit is included with all Cisco 2500series routers.An optional 24-inch rack-mount kit can be ordered from Cisco Systems.2.The auxiliary/console cable kit includes an RJ-45-to-RJ-45roll-over console cable,an RJ-45-to-DB-25male DCE adapter,an RJ-45-to-DB-25female DTE adapter, and an RJ-45-to-DB-9 adapter.EIA/TIA-232 male DTE interface, 10 ft (3m)CAB-232MT EIA/TIA-232 female DCE interface, 10 ft (3 m)CAB-232FC EIA/TIA-449 male DTE interface, 10 ft (3m)CAB-449MT EIA/TIA-449 female DCE interface, 10 ft (3 m)CAB-449FC EIA-530 male DTE interface, 10 ft (3 m)CAB-530MT V .35 male DTE interface, 10 ft (3 m)CAB-V35MT V .35 female DCE interface, 10 ft (3 m)CAB-V35FC X.21 male DTE interface, 10 ft (3 m)CAB-X21MT X.21 female DCE interface, 10 ft (3 m)CAB-X21FC Ethernet AUI adapter cable CAB-3CE18=Auxiliary/console cable kit 2ACS-2500ASYN RJ-45-to-DB-25 management card con-sole cableCAB-MGMT-RH Shielded power cable, United States CABS-AC Shielded power cable, Australia CABS-ACA Shielded power cable, Italy CABS-ACI Shielded power cable, Europe CABS-ACE Shielded power cable, United KingdomCABS-ACUPart DescriptionPart Number。

Silicon Labs Wi-SUN 软件开发套件和硬件产品说明书

Silicon Labs Wi-SUN 软件开发套件和硬件产品说明书

Wi-SUN SDK 1.1.0.0 GAGecko SDK Suite 3.2July 21, 2021Wireless Smart Ubiquitous Network (Wi-SUN) is the leading IPv6 sub-GHz mesh technol-Array ogy for smart city and smart utility applications. Wi-SUN brings Smart Ubiquitous Networksto service providers, utilities, municipalities/local government, and other enterprises, byenabling interoperable, multi-service, and secure wireless mesh networks. Wi-SUN canbe used for large-scale outdoor IoT wireless communication networks in a wide range ofapplications covering both line-powered and battery-powered nodes.Silicon Labs' Wi-SUN hardware is certified by the Wi-SUN Alliance, a global industry as-sociation devoted to seamless LPWAN connectivity. Wi-SUN builds upon open standardinternet protocols (IP) and APIs, enabling developers to extend existing infrastructure plat-forms to add new capabilities. Built to scale with long-range capabilities, high-datathroughput and IPv6 support, Wi-SUN simplifies wireless infrastructure for industrial ap-plications and the evolution of smart cities.These release notes cover SDK versions:1.1.0.0 released July 21, 20211.0.1.0 released June 16, 20211.0.0.0 released May 10, 2021Compatibility and Use NoticesFor information about security updates and notices, see the Security chapter of the Gecko Platform Release notes installed with this SDK or on the Silicon Labs Release Notes page. Silicon Labs also strongly recommends that you subscribe to Security Advisories for up-to-date information. For instructions, or if you are new to the Silicon Labs Wi-SUN SDK, see Using This Release.Compatible Compilers:IAR Embedded Workbench for ARM (IAR-EWARM) version 8.50.9•Using wine to build with the IarBuild.exe command line utility or IAR Embedded Workbench GUI on macOS or Linux could result in incorrect files being used due to collisions in wine’s hashing algorithm for generating short file names.•Customers on macOS or Linux are advised not to build with IAR outside of Simplicity Studio. Customers who do should carefully verify that the correct files are being used.GCC (The GNU Compiler Collection) version 10.2.0, provided with Simplicity Studio.Contents Contents1Wi-SUN Stack (2)1.1New Items (2)1.2Improvements (2)1.3Fixed Issues (2)1.4Known Issues in the Current Release (2)1.5Deprecated Items (3)1.6Removed Items (3)2Wi-SUN Applications (4)2.1New Items (4)2.2Improvements (4)2.3Fixed Issues (4)2.4Known Issues in the Current Release (4)2.5Deprecated Items (5)2.6Removed Items (5)3Using This Release (6)3.1Installation and Use (6)3.2Security Information (6)3.3Support (7)1 Wi-SUN Stack1.1 New ItemsAdded in release 1.1.0.0•Added a new SL_WISUN_MSG_NETWORK_UPDATE_IND_ID event that is fired when the network is updated: ip address update, new primary parent or new secondary parent.•The stack library is now compiled with the preprocessor definition DEBUG_EFM_USER and provides a default implementation of assertEFM(). It will only be used if the application is also compiled with that same definition. The user can provide a custom imple-mentation. See assertEFM() documentation for more information.Added in release 1.0.0.0Wi-SUN stack and SDK initial release1.2 ImprovementsNone1.3 Fixed IssuesFixed in release 1.1.0.0710923 Fixed an issue causig the event SL_WISUN_MSG_CONNECTED_IND_ID to be fired although no new connection was established. It was fired after each network update.699627 Fixed an issue causing connections to fail after an operating class update.721399 Fixed an issue causing US-IE configuration to be invalid when excluding channels.Fixed in release 1.0.1.0701190Fixed an issue causing a parent to lose track of its child frequency hopping sequence. The child router was sending an incorrect IFSU misleading the parent router and forcing it to be one frequency hop interval late. Fixed in release1.0.0.0Wi-SUN stack and SDK initial release1.4 Known Issues in the Current ReleaseIssues in bold were added since the previous release.714402 Wi-SUN border routervery infrequently hits a hard fault. Thecommand line interface is non-responsive and the router will notadvertize anymore. Routers will eventually report a PAN timeout.1.5 Deprecated ItemsNone1.6 Removed ItemsRemoved in release 1.1.0.0•Removed internal type definitions from the API public headers2 Wi-SUN Applications2.1 New ItemsAdded in release 1.0.0.0New Applications:•Wi-SUN - SoC CLI•Wi-SUN - SoC Empty•Wi-SUN - SoC Ping•Wi-SUN - SoC UDP Server•Wi-SUN - SoC UDP Client•Wi-SUN - SoC TCP Server•Wi-SUN - SoC TCP Client•Wi-SUN - SoC Meter•Wi-SUN - SoC Collector•Wi-SUN - SoC CoAP Meter•Wi-SUN - SoC CoAP CollectorNew precompiled demos:•Wi-SUN - SoC Border Router•Wi-SUN - SoC Border Router with backhaulEasy to use features (components):•POSIX like Socket•Application Core (event handling, connection handling, network configuration, etc.)•CoAP (Constrained Application Protocol)Radio Configurator Support (19 PHYs)Simplicity Studio – Network Analyzer Wi-SUN Support2.2 ImprovementsAdded in release 1.1.0.0Wi-SUN - SoC Border Router•Added a new command that configures new certificates•Added a new command to exclude channels from the frequency hopping schedule2.3 Fixed IssuesFixed in release 1.1.0.0720367 Fixed an issue causig collectors from both CoAP and non-CoAP sample applications to remove meters from their meter list.720336 Fixed an issue causing sample application for non-radio board targets to miss a radio configuration.2.4 Known Issues in the Current ReleaseSimplicity Studio – Network Analyzer: Wi-SUN Encrypted Packets are not supported yet2.5 Deprecated Items None2.6 Removed Items None3 Using This ReleaseThis release contains the following•Wi-SUN stack library•Wi-SUN sample applications•Wi-SUN border router pre-compiled demos•DocumentationIf you are a first time user, see QSG181: Silicon Labs Wi-SUN Quick-Start Guide.3.1 Installation and UseA registered account at Silicon Labs is required in order to download the Silicon Labs Wi-SUN SDK. You can register at https:///apex/SL_CommunitiesSelfReg?form=short.SDK installation instructions are covered in the Simplicity Studio 5 User’s Guide and QSG181: Silicon Labs Wi-SUN Quick-Start Guide. Use the Silicon Labs Wi-SUN SDK with the Silicon Labs Simplicity Studio 5 development platform. Simplicity Studio ensures that most software and tool compatibilities are managed correctly. Install software and board firmware updates promptly when you are notified. Documentation specific to the SDK version is installed with the SDK.3.2 Security InformationSecure Vault IntegrationThis version of the stack does not integrate Secure Vault Key Management.Security AdvisoriesTo subscribe to Security Advisories, log in to the Silicon Labs customer portal, then select Account Home. Click HOME to go to the portal home page and then click the Manage Notifications tile. Make sure that ‘Software/Security Advisory Notices & Product Change Notices (PCNs)’ is checked, and that you are subscribed at minimum for your platform and protocol. Click Save to save any changes.3.3 SupportDevelopment Kit customers are eligible for training and technical support. Contact Silicon Laboratories support at /support.Silicon Laboratories Inc.400 West Cesar Chavez Austin, TX 78701USAIoT Portfolio/IoTSW/HW/simplicityQuality /qualitySupport & Community/communityDisclaimerSilicon Labs intends to provide customers with the latest, accurate, and in-depth documentation of all peripherals and modules available for system and software imple-menters using or intending to use the Silicon Labs products. Characterization data, available modules and peripherals, memory sizes and memory addresses refer to each specific device, and “Typical” parameters provided can and do vary in different applications. Application examples described herein are for illustrative purposes only. Silicon Labs reserves the right to make changes without further notice to the product information, specifications, and descriptions herein, and does not give warranties as to the accuracy or completeness of the included information. Without prior notification, Silicon Labs may update product firmware during the manufacturing process for security or reliability reasons. Such changes will not alter the specifications or the performance of the product. Silicon Labs shall have no liability for the consequences of use of the infor -mation supplied in this document. This document does not imply or expressly grant any license to design or fabricate any integrated circuits. The products are not designed or authorized to be used within any FDA Class III devices, applications for which FDA premarket approval is required or Life Support Systems without the specific written consent of Silicon Labs. A “Life Support System” is any product or system intended to support or sustain life and/or health, which, if it fails, can be reasonably expected to result in significant personal injury or death. Silicon Labs products are not designed or authorized for military applications. Silicon Labs products shall under no circumstances be used in weapons of mass destruction including (but not limited to) nuclear, biological or chemical weapons, or missiles capable of delivering such weapons. Silicon Labs disclaims all express and implied warranties and shall not be responsible or liable for any injuries or damages related to use of a Silicon Labs product in such unauthorized applications. Note: This content may contain offensive terminology that is now obsolete. Silicon Labs is replacing these terms with inclusive language wherever possible. For more information, visit /about-us/inclusive-lexicon-projectTrademark InformationSilicon Laboratories Inc.®, Silicon Laboratories ®, Silicon Labs ®, SiLabs ® and the Silicon Labs logo ®, Bluegiga ®, Bluegiga Logo ®, Clockbuilder ®, CMEMS ®, DSPLL ®, EFM ®, EFM32®, EFR, Ember ®, Energy Micro, Energy Micro logo and combinations thereof, “the world’s most energy friendly microcontrollers”, Ember ®, EZLink ®, EZRadio ®, EZRadioPRO ®, Gecko ®, Gecko OS, Gecko OS Studio, ISOmodem ®, Precision32®, ProSLIC ®, Simplicity Studio ®, SiPHY ®, Telegesis, the Telegesis Logo ®, USBXpress ® , Zentri, the Zentri logo and Zentri DMS, Z-Wave ®, and others are trademarks or registered trademarks of Silicon Labs. ARM, CORTEX, Cortex-M3 and THUMB are trademarks or registered trademarks of ARM Hold-ings. Keil is a registered trademark of ARM Limited. Wi-Fi is a registered trademark of the Wi-Fi Alliance. All other products or brand names mentioned herein are trademarks of their respective holders.。

SequenceManager Logix Controller-based Batch和排队解决方

SequenceManager Logix Controller-based Batch和排队解决方

SequenceManagerLogix Controller-based Batch and Sequencing SolutionA Scalable Batch Solution for Process Control ApplicationsA modern batch system must account for the growing need for architecture flexibility, true distribution of control, and scalability. SequenceManager software provides batch sequencing in the Logix family of controllers by adding powerful new capability closer to the process and opening new possibilities for skids, off network systems, and single unit control. SequenceManager allows you to configure operations in Studio 5000 Logix Designer®, run sequence in FactoryTalk® View SE, and to capture and display batch results.SequenceManager directs PhaseManager™ programs inside a Logix-based controller in an ordered sequence to implement process-oriented tasks for single unit or multiple independent unit operations. Using industry standard ISA-88 methodology, SequenceManager enables powerful and flexible sequencing capabilities that allow for the optimal control of sequential processes.With SequenceManager, you can deliver fast and reliable sequence execution while reducing infrastructure costs for standalone units and complete skid-based system functionality.Key BenefitsSequenceManager™ software significantly reduces engineering time for system integrators and process equipment builders while providing key controller-based batch management capabilities for end users. Key benefits include:• Enables distributed sequence execution • Fast and excellent reliability of sequence execution native to controller • Efficient sequence development and monitoring in core product • Integrated control and HMI solution for intuitive operation • Reduced infrastructure costs for small systems • Provides data necessary for sequence reportingDistributed Batch Management Based on Proven TechnologyBuilt Upon Rockwell AutomationIntegrated ArchitectureSequenceManager was built using the standard control and visualization capabilities found in Rockwell Automation® Integrated Architecture® software. SequenceManager is a new capability that is builtinto Logix firmware that uses visualization through FactoryTalk® View SE to create an integrated sequencing solution. Combined with event and reporting tools, SequenceManager software is a complete batch solution for single unit and skid-based process applications.Scalable Controller-based Solution SequenceManager allows flexible design for skid-based equipment to be developed, tested and delivered asa fully functioning standalone solution but, if needed, seamlessly integrated into a larger control system. This strategy provides the end user with the option to integrate equipment without imposing design constraints on the OEM delivering the skid. Additionally, it enables the end user to deliver equipment as a standalone system without the constraint to scale to a larger process solution in the future. This batch solution offers scalability to help prevent costly redesign and engineering.Flexibility to Meet Process Needs SequenceManager enables you to expand your process control on skid based equipment that performs repetitive tasks and decision-making abilities. By using the ISA-88 methodology, SequenceManager allows for control design that can be adopted to fit the needs of the process industries without the constraints of custom application code. Built-in state model handling provides for fast and easy configuration while maintainingcontrol of the process.Editor and ViewerAs a brand new program type in Studio 5000 Logix Designer®, SequenceManager™ software gives the user the power and flexibility necessary to create dynamic recipes to maximize the effectiveness of the process control system.Without limitations on steps and parameters, and the ability to run parallel phases, to branch, and to loop back and rerun steps, SequenceManager removes the barriers in achieving effective batch within the controller.Sequence ExecutionProcedural sequences are executed through nativefunctions in the controller. With an integrated ISA-88 state model, the control and states of phases can be assured. Standard batch functionality, such as manual control and active step changes, are included to give the operational flexibility that is needed to respond toabnormal process conditions.Allowing for an Intuitive Batch ApplicationResponsive batch interactions between the controller and equipment, along with intuitive operator interfaces, provide the core of a truly distributed batching strategy that drives ISA-88 procedural models.Allen-Bradley, FactoryTalk Batch, FactoryTalk® View SE, Integrated Architecture, Listen.Think.Solve., PhaseManager, PlantPAx, Rockwell Automation, Rockwell Software, SequenceManager, and Studio 5000 Logix Designer are trademarks of Rockwell Automation, Inc. Trademarks not belonging to Rockwell Automation are property of their respective companies.Operator ViewerFactoryTalk® View SE and ActiveX controls monitor and interact with a running procedural sequence through the HMI. Advance ActiveX controls provide an intuitive interface for controlling sequences and changingparameters from the operational environment. Improved capabilities allow the user to perform manual step changes and acquire control easily.Reporting and AnalyticsSequenceManager data generates events that are used to produce batch reports and procedural analysis. A separate event client transfers the event data from the Logixcontroller to a historical database. SequenceManager uses the same data structure and reports as FactoryTalk Batch, which provides a consistent and intuitive batch reporting tool among Rockwell Automation® Batch Solutions.Additional InformationVisit us at /processPublication PROCES-PP001A-EN-E – June 2016Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. Printed in USA.。

德国工业4.0原版

德国工业4.0原版
z
Intense research activities in universities and other research institutions Drastically increasing number of publications in recent years Large amount of funding by the German government
Model predictive control (MPC)
Modern, optimization-based control technique Successful applications in many industrial fields Can handle hard constraints on states and inputs Optimization of some performance criterion Applicable to nonlinear, MIMO systems
A system is strictly dissipative on a set W ⊆ Z with respect to the supply rate s if there exists a storage function λ such that for all (x , u ) ∈ W it holds that λ(f (x , u )) − λ(x ) ≤ s (x , u ) − ρ(x ) with ρ > 0.
k =0 x (k |t + 1) x (t + 1) state x input u t+1 u (k |t + 1) k =N
Basic MPC scheme

Infoblox ActiveTrust数据表说明说明书

Infoblox ActiveTrust数据表说明说明书

Key Features• Infoblox Threat Insight in the Cloud detects DNS based data exfiltration and newer threats such as DNSMessenger, DGA, and Fast Flux. Threat Insightis the only DDI solution that leverages reputation, signatures and behavioral analytics to detect DNS based data exfiltration• Infoblox DNS Firewall executes administrator-defined policy action (block, redirect device to a walled garden site, and/or log event)to help stop devices anytime, anywhere from communicating with C&Cs or botnets via DNS • Infoblox Threat IntelligenceData Exchange (TIDE) collects and manages curated threat intelligence from internal and external sources in a single platform. It enables security operations to remediatethreats more rapidly by sharing normalized TIDE data in real time with third-party security systems such as Palo Alto Networks, SIEM, etc• Infoblox Dossier is a threat investigation tool that provides immediate threat context and allows threat analysts to save precious time, shortening the attack window for criminals• Integration with Security Ecosystem Integration with third-party security systems extends the unique visibility we have into DNS to other security systems such as Qualys and Carbon Black Security ChallengesInternet communications, including malware, rely on DNS. Attackers are taking advantage of DNS as a data-exfiltration and malware control point. Over 91 percent of malware uses DNS for data exfiltration and to communicate with C&C servers or redirect traffic to malicious sites. Existing security controls such as firewalls, email proxies, and web proxies rarely focus on DNS and associated threats.Using unverified threat data residing in silos in your cybersecurity infrastructure is like trying to pick out instruments in an orchestra that is playing outdoors in the midst of rush-hour traffic. The noise blocks out everything you really want to hear. Low-quality data creates nuisance red flags that threat analysts still must track down. They can easily be swamped by false-positives, leaving them unable to detect and prevent genuine threats.T o research information and gather context about threats, analysts must go to multiple tools. The process is manual and time consuming, which slows response and often requires high levels of expertise. In addition, they often lack a centralized tool for threat investigation that aggregates threat and indicator data from multiple sources and quickly shares context.The Infoblox SolutionIntercepting DNS traffic is an ideal approach to counter DNS-based data exfiltration and malware communications with C&C sites. In addition, it is an ideal approach for devices on which endpoint agent software cannot be deployed (e.g. POS, medical equipment, certain IoT devices, etc.). ActiveT rust is a highly efficient, scalable solution that offers:Infoblox DNS Firewall for prevention of malware communications with C&C sites and botnetsIn foblox Threat Insight in the Cloud prevents (with DNS firewall) DNS-based data exfiltrationby uniquely leveraging reputation, signatures, and behavioral analytics. It is also able to block (using DNS firewall) newer threats such as DNSMessenger, DGA, and Fast Flux. Threat Insightin the Cloud is offered as a service to scale in the cloud and is bundled with ActiveTrust Plus and ActiveT rust Advanced.SummaryInfoblox ActiveT rust® proactively detects and prevents cyberthreats. ActiveT rust bundles Infoblox DNS Firewall, InfoBlox Threat Insight in the Cloud, Infoblox Threat Intelligence Data Exchange (TIDE), and Infoblox Dossier. The solution prevents data exfiltration and malware command-and-control (C&C) communications via DNS, centrally aggregates curated internal and external threat intelligence, distributes validated threat data to the customer’s security ecosystem for remediation, and enables rapid investigation to identify context and prioritize threats.ActiveTrust Standard ActiveTrust Plus ActiveTrust AdvancedAnnual SubscriptionLicensed by Appliance by model Organization-wide by number ofprotected usersOrganization-wide by number ofprotected usersInfoblox DNS Firewall Zones(RPZs)Standard (4)Standard (4) + Advanced (7) +SURBL (2)Standard (4) + Advanced (13) +SURBL (2)Infoblox Threat Insight inthe Cloud Not available Included IncludedInfoblox Data via ThreatIntelligence Data Exchange Not available One of:* Hostnames* IP Addresses* URLsAll of:R HostnamesR IP AddressesR URLsInfoblox Dossier No (threat lookup via CloudServices Portal only)32,000 queries/year(supports 2 analysts)65,000 queries/year(supports 4 analysts)Third-party Data viaInfoblox Threat IntelligenceData Exchange (TIDE)Not available Available a la carte Available a la carteHardware Requirements If you intend to use Infoblox DNS Firewall for RPZ-based policy enforcement, you need to buy:One or more Infoblox T rinzic (physical) or vNIOS (virtual) appliances with DNS with recursion enabled. Trinzic models:IB Series: IB-800, IB-1400, IB-2200, IB-4000, and IB-4030PT Series: PT-1400/1405, PT-2200/2205, and PT-4000TE Series (physical and virtual appliances): TE-100, TE-810/815/820/825, TE-1410/1415/1420/1425, TE-2210/2215/2220/2225, and TR-4010/TR-4010-10GESoftware Requirements • If you want Threat Insight in the Cloud, then you can purchase either ActiveTrust Plus or ActiveTrust Advanced license. If you will NOT deploy ActiveT rust threat intelligence data on third-party infrastructure, then buy an ActiveT rust Standard license, which is based on the T rinzic appliance models.• If you intend to deploy ActiveT rust threat intelligence data on third-party infrastructure (e.g. next-generationfi rewall, SIEM, Web proxy), then you can buy either ActiveT rust Plus or ActiveTrust Advanced license. The license is based on total number of protected users’ organization-wide (Grid-wide license). The two products vary based on the amount of data sets that can be applied and total number of annual Dossier threat indica-tor queries that can be transacted.Infoblox Threat Intelligence Data Exchange (TIDE) leverages highly accurate machine-readable threat intelligence (MRTI) datato aggregate and selectively distribute data across a broad range of security infrastructure. Our threat intelligence team curates, normalizes, and refines the high-quality threat data to minimize false positives. Our threat feeds begin with information gained from native investigations and harvesting techniques. We then combine them with verified and observed data from trusted partners including government agencies, academic institutions, several premier Internet infrastructure providers, and law enforcement. The end result is a highly refined feed with a very low historical false-positive rate.Infoblox Dossier threat indicator investigation provides rich threat context to prioritize incidents and respond quickly.Optional Services • Infoblox Threat Insight (on premises) for protection against DNS tunneling and sophisticated data ex fi ltration techniques is available as a separate standalone option for purchase for all AT customers.-Note: this only works on the following Infoblox models: PT-1405, TE-1415/V1415, TE-1425/V1425,TE-2210/v2210, 2215/v2215, TE-2220/v2220, 2225/v2225, PT-2200, PT-2205, IB-4010/v4010, V4015,TE-V4010/V4015, PT-4000, IB-4030-DCAGRID-AC/DC, IB-4030-DCAGRID-T1-AC/DC, IB-4030-DCA-GRID-T2-AC/DC, and IB-4030-DCAGRID-T3-AC/DC.• Infoblox Security Ecosystem license enables integration of Infoblox DNS RPZ/Firewall with third-party security systems: FireEye, Qualys and threat intelligence platforms.• Infoblox Dossier (portal, 65,700 queries package) 1-year subscription-ActiveTrust Standard customers can purchase if they want to perform threat investigation, since Dossier is not bundled with ActiveTrust Standard.-ActiveTrust Plus and ActiveT rust Advanced customers that need additional queries beyond what is provid-ed in the base product can also purchase this:-Third-party marketplace threat feeds-Prerequisite: ActiveTrust Plus or ActiveT rust Advanced must be purchased in order for customers topurchase and subscribe to one or more 3rd party marketplace threat feeds-Does NOT Include Maintenance/Support• Infoblox Reporting and Analytics (appliance) – provides rich reporting on Infoblox DNS Firewall (top RPZ hits, top malicious hostnames, users)Note: The SURBL (an Infoblox premium threat intelligence data partner) OEM license is bundled with the ActiveT rust Plus and ActiveT rust Advanced bundles for use by Infoblox DNS Firewall. The Infoblox ActiveT rust and SURBL data sets (Multi-domain and Multi Lite domain) are complementaryand if used together, can enable increased threat coverage. T o learn more about the Infoblox threat intelligence data, please refer to the solution note “Overview of Infoblox Threat Intelligence for ActiveT rust” on the Infoblox website.Key BenefitsWith Infoblox ActiveT rust, you get actionable network intelligence with flexible threat intelligence integrated into your DDI enthronement. this enables you to proactively detect, investigate, prioritize, remediate, and prevent cyber threats.Prevent DNS-based Data exfiltration at Scale in the CloudWith Threat Insight in the Cloud, you can detect and block (with DNS Firewall) DNS-based data exfiltration using a combination of reputation, signature, and behavioral analysis.Detect and Block DNSMessenger, DGA, and Fast FluxOffered as a service, Threat Insight in the Cloud can also detect and block (with DNS Firewall) new threats such as DNSMessenger, DGA, and Fast Flux.Stop DNS-based Malware C&C/botnet CommunicationsWith Infoblox DNS Firewall, you gain proactive network protection against fast-evolving, elusive malware threats that exploit DNS to communicate with C&C sites.Collect and Manage Curated Threat Intelligence from Internal and External Sources in a Single PlatformInfoblox TIDE enables you to aggregate, normalize, and manage internal and multiple third-party threat intelligence data in a single location, preventing siloed and disjointed threat intel.Improve Security Posture by Sharing Curated Threat Intelligence Data in Real Time with Security EcosystemsCreating custom API data feeds built for specific use cases is quick and easy. Combine threat data from all your sources, use contextual metadata to select the relevant subset, and leverage the right format such as JSON, STIX, CSV, CEF, and RPZ to RPZto improve the security posture and situational awareness of your existing security ecosystem, such as NGFW, IPS, web proxy,and SIEM.Extend the Unique Visibility Infoblox Provides into DNS such as Indicators of Compromise (IoCs) to Other Security Systems Infoblox provides the unique visibility into DNS data as the market-leading vendor of DDI that other vendors cannot match. DNS data such as indicators of compromise (IoC) can be shared with other security systems such as vulnerability scanners (Qualys and Rapid7) to kick off a scan when a new device comes on the network to determine whether it is malware infected.Expedite Threat Investigation to Free Up Security Personnel and Provide Timely Access to Context for Threat Indicators Use the Infoblox Dossier research tool as a single source of truth to rapidly understand the types of threats happening on your network, where they are coming from, and the risks they pose to your organization, including understanding the data source, threat severity, and priority. Gain insight into questionable activities related to inbound or outbound network communications. Furthermore, quickly learn about and understand what a variety of trusted sources report about the indicator in question to improve the operational efficiency of scarce security operations resources, saving you time and effort.About InfobloxInfoblox delivers Actionable Network Intelligence to enterprises, government agencies, and service providers around the world. As the industry leader in DNS, DHCP, and IP address management (DDI), Infoblox provides control and security from the core—empowering thousands of organizations to increase efficiency and visibility, reduce risk, and improve customer experience.Corporate Headquarters: +1.408.986.4000 1.866.463.6256(toll-free,U.S.andCanada)********************。

全国2024年上半年高等教育自考试软件工程试题含解析

全国2024年上半年高等教育自考试软件工程试题含解析

全国2024年上半年高等教育自考试软件工程试题一、单项选择题1、结构化分析方法给出了一种能表达功能模型的工具是______。

A.HIPO图B.PAD图C.N-S图D.DFD图2、类的状态机一般有几种不同的运行状态,其中处于等待接收事件,接收处理完事件后又进入等待状态,通常采用______。

A.IdleB.InitializingC.CommandD.Active3、结构精细化设计过程中,为了提高模块的独立性,应遵循的原则是______。

A.低内聚高耦合B.低内聚低耦合C.高内聚低耦合D.高内聚高耦合4、软件工程在20世纪60年代末到80年代初获得的主要成果有______。

A.CASE产品B.面向对象语言C.瀑布模型D.软件生存周期过程5、“与所规约的系统执行之间的偏差”是指______。

A.错误B.失效C.故障D.误差6、集成化能力成熟度模型(CMMI)中有22个过程域,分为4类:项目管理类、工程类、过程管理类和______。

A.需求管理类B.支持类C.项目包类D.目标类7、RUP的迭代、增量式开发过程中,需要估算成本、进度,并能够减少次要的错误风险,至少需要完成______。

A.初始阶段B.精化阶段C.构造阶段D.移交阶段8、下列不属于软件危机的主要表现是______。

A.软件生产效率低B.软件开发没有工具支持C.软件生产质量低D.软件开发缺乏可遵循的原理、原则、方法体系以及有效的管理9、在销售管理系统需求文档中出现下列描述,属于设计约束范畴的是______。

A.系统应能产生月销售报表B.系统应在5分钟内计算出给定季度的总销售税C.对要构建的账户接收系统,必须为月财务状况系统提供更新信息D.任取1秒钟,一个特定应用所消耗的可用计算能力平均不超过50%10、需求规约的基本性质包括重要性和稳定性程度、一致的、完整的和______。

A.可修改的B.可复用的C.可测试的D.无歧义的11、软件测试中,白盒测试技术依据的是程序的______。

DIGI BOARD 2数字技术实验板说明书

DIGI BOARD 2数字技术实验板说明书

The DIGI BOARD 2has been developed for the in-struction and detailed study of fundamental digital tech-nology,non-contact control engineering and microcom-puter technology.All the function groups re-quired for conducting experi-ments in digital technology are integrated in the DIGI BOARD 2and supplied with power by a built-in power supply unit.The individual function groups are connected in 2mm connection technique.The DIGI BOARD 2can be set up as a desktop unit for conducting experiments or suspended in a rack for demonstration purposes.The DIGI BOARD 2can be converted into a portable training unit by simply screw-ing it into a Box:All the ex-periments can be conducted directly in the Box.Dust-free storage and protection against transport damages are further advantages of the Box version.The experiment manual…Experiments in Digital Tech -nology”(Type V 0160)is of-fered together with the DIGI BOARD 2.This manual contains detai-led experiment instructions with problems and solutions section.Function Groups of theDIGI BOARD 2-2input keyboards with 4pairs of keys (L/H)each-Clock generator with divider,TTL level,crys-tal-controlled-DC signal source 0...5V/10mA-Hexadecimal/dual coding switch (double)-LED display,divided into 3groups with the colours red,yellow,green -HIGH/LOW,for tapping HIGH,LOW states-7-segment display (2-digit),with decoder:dual/7-segment-Adapter (2mm jacks/SUB-D socket),for adapt-ing 2mm jacks to SUB-D connector (25-pin),pins 1...13and 18assigned -8AND gates,with pull-up Resistors,one gate is disconnectable-6OR gates,with pull-down Resistors,one gate is disconnectable -3AND/OR combi-gates -1-bit comparator.Universal training and exercise unit for fundamental digital technology/microcomputer technology.The DIGI BOARD 2contains all function groups and the power supply for fast experiment setup.Can be used as a desktop,demonstration or portable training unit .Individual expansion possibilities.With an adapter for connection to a computerDIGI BOARD 2 (Type 3910)14 / 14 V 02 T e c h ni c a l c h a n g e s w i t h o u t p r i o r n o t i c e !1/2hps SystemTechnikLehr- + Lernmittel GmbH Altdorfer Strasse 16 88276 Berg Tel.: Fax: Web: E-Mail:7 51 / 5 60 75 80 7 51 / 5 60 75 77 (Germany)+ 49 + 49****************************Competence in TrainingSystemTechnik-4-bit comparator-4JK-flipflops,can also be used as RS flipflops-4D-flipflops-2adders(4-bit),with input and output carry-Monoflop,settable times: 0.1s;1s;5s-Multiplexer,4channels-Demultiplexer,4channels -Shift register(4-bit),paral-lel and serial operation possible,bidirectional-ALU,for conducting16 arithmetic and16logical computing operations with 4-bit dual numbers-Binary counter(4-bit),up/down counter-2inverters with open col-lector(pull-up resistors can be connected)-2Schmitt triggers,invert-ing-Units complements for negating a4-bit binary number-Antivalence and equiva-lence gates-RAM8x4,static RAM,8addresses,4bits data width -EEPROM8x4,storagetime without power supplyapprox.1hour-AD/DA converter(4-bit)-Two slots for expanding acircuit with additionalplug-in modulesDigital Technology/Microcomputer TechnologyTechnical DataMains connection-Voltages(via LE connector):230V AC / 115V(110V)AC;30VA;50... 60HzIntegrated power supply for additional plug-in modules5V DC/max.1A;the power is supplied via the plugs in the baseof the modules.DC voltage source+5V / 0.5AFor connecting external equipmentIC componentsAll IC components are inserted in sockets.Mechanical designThe front panel of the DIGI BOARD2is made of5mm thickLaminate,matt blue in colour with white engraving representingthe built-in function groups.The rear of the DIGI BOARD2is protected with a grey plasticcover.Its shape allows the Board to be placed at an ergonomi-cally favourable angle for example on a table.Dimensions and weights-Board version,Type3910:532x297x95mm(w x h x d);weight:3.5kg-Box version,Type3910and Type3910.20:580x450x155mm;weight:7.5kgRecommendedAccessoriesExperiment manual:…Experiments inDigital Technology”(Type V0160)with prob-lems and solutions sectionfor the following subjects:--Basic logical circuits-Schmitt triggers-Bistable flipflops-Monostable flipflops-Code converters,coders-Computing circuits-Counting circuits-Register circuits-Multiplex mode-ALU-Memory circuits-Analog-digital converter,digital-analog converter-Set of Accessories(Type3910.1),comprising2mm connecting leads(60in all)The components listed below are used for setting up experi-ments above and beyond those described in the experimentmanual…Experiments in Digital Technology”(Type V0160).-IC BOARD(Type3530)-IC Socket,dual-in-line(Type9156)-IC Socket,20-pin(Type9156.2)-IC Socket,28-pin(Type9156.3)-Assembly kit comprising:Empty Housings(Type9152.7)Universal PCB,with dot grid(Type9167)Universal PCB,with line grid(Type9167.1)Jacks(Type9168),Stickers(Type9162.5-6)Expansion PossibilitiesSubject to technical modifications. Competence in TrainingSystemTechnik2/2。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A Distributed Architecture for a Ubiquitous RFIDSensing Network#D. C. Ranasinghe1, K. S. Leong1, M. L. Ng1, D. W. Engels2, P. H. Cole11Auto-ID Labs, Schoool of Electrical and Electronic Engineering, University of AdelaideSA 5005, Australia,{damith, kleong, mng, cole}@.au2Auto-ID Labs, Department of Mathematics and Computer Science, Massachusetts Institute of Technology77 Massachusetts Avenue, NE-46, Cambridge MA 02139, dwe@AbstractThe concept of a “Networked Physical World” originated from the Auto-ID Center, now called the Auto-ID Labs. Such a system can be realized with a combination of automatic identification technology and a ubiquitous computer network that will glue the physical world together. The ability to form a ubiquitous network of physical objects has a wide range of applications including manufacturing automation, supply chain management and collection of sensor derived data. We describe the building block system components of a distributed ubiquitous RFID network aimed at enabling ubiquitous sensing with RFID and explore the data flows within the system.1.I NTRODUCTIONOriginally the architecture to build a ubiquitous item identification network commenced at the former Auto-ID Center, now the Auto-ID Labs [1] with the process of standardization issues currently managed by EPCglobal Inc [2]. The Auto-ID Center’s vision was to create a “Smart World” by building an intelligent infrastructure linking objects, information, and people through computer networks oblivious to the users. The creation of the intelligent infrastructure demanded the ability to identify objects automatically and uniquely with the backbone of the infrastructure provided by a ubiquitous computing system leveraging the internet for global connectivity. The components forming the intelligent infrastructure are commonly referred to as an EPC Network where the term EPC (Electronic Product Code) is a result of the unique object identification scheme employed by the system. This new infrastructure enables object-centric computing that will allow universal coordination of physical resources through remote monitoring and control by both humans and machines. While the applications of this technology are widespread the EPC Network is expected revolutionize supply chain management. The EPC Network is assembled upon many building blocks representing a number of fundamental technologies and standards. The enabling technology around which this network is constructed is RFID. Not only does RFID replace the more traditional barcode for logistic applications but it also provides the possibility of placing additional features on RFID ICs such as environmental sensors. This has the potential to revolutionize sensing applications as RFID is able to bridge the gap between the physical domain and the digital domain. We present the system components and technologies of the ubiquitous sensing network architecture (EPC Network) in the first section and provide architecture for extending the local area EPC Networks with an outline of the data flow within such a network.2.EPC N ETWORKThe network of physical objects is achieved by integrating an electronic Radio Frequency Identification (RFID) transponder (RFID label) into each object. Each RFID label may have added features such as sensors for monitoring physical parameters: temperature, pressure, or harmful agents: toxic chemicals, bacterial agents.The system networks objects seamlessly by communicating with these labels at suitably placed locations: portals, mobile locations, through handheld devices, and potentially, eventually for some tags, continuously throughout the environment. A network of RFID Readers is used to collect data from tagged objects. The RFID labeled objects communicate an EPC (Electronic Product Code) code to identify themselves as a unique entity. The EPC is in essence a pointer to a database record describing the tagged object and the functionalities provided by the tag. The data originating from the network of Readers is passed to control and data collection systems that provide service layer functionalities. An illustration of the components constituting the EPC Network is shown in Fig. 1.Fig. 1. An Overview of an EPC Network. The arrows indicate the flow of data from tags to network support system and the flow of control and databack to the Readers and tags.EPC Networks are significantly different from more traditional computer networks in the sense that the flow of data and information is from many nodes (RFID tags) at the edge of the network towards a number of central servers. In RFID networks, Readers detect certain events or Readers query RFID labels to obtain event data and forward the resulting information to backend applications or servers. The application systems then respond to these events and application processes orchestrate corresponding actions; such as ordering additional products, sending theft alerts, raising alarms regarding harmful chemicals or replacing fragile components before failure.Fig. 2. The component based structure of a local area EPC Network. The EPC Network is a component based architecture with six primary components, some physical, some, logical: (1) RFID tags, (2) RFID tag Readers (interrogators) (3) Electronic Product Code (EPC), (4) Application Level Events Engines, (5) Object Name Service (ONS), and (6) EPC Information Service (EPCIS) . Fig. 2 shows the structure of a typical EPC Network.Fig. 3. Wide area EPC Network overview. The local EPC networks are able to route their information and requests to remote and unknown locations using the translation services provided by a network of global public ONSservers.The EPC Network shown in Fig. 2 is a local area EPC Network akin to LANs. This model captures the architecture of the system at a local site: company or organization, or a private network. Nonetheless, local EPC Networks can be linked together through the already established backbone of the Internet to achieve a global flow of information and data while extending the outreach and the usefulness of the EPC Network. Fig. 3 illustrates such an architecture where a global public ONS (Object Name Service) system may be used to connect public local area EPC Networks. The subject of ONS is considered in Section 5 of the paper.3.RFID C OMPONENTSThe RFID aspects of the EPC Network consist of RFID tags (the miniature computing devices forming an interface to the physical world) and RFID Readers. The following is an overview of the RFID components of the EPC Network while a more complete and thorough coverage of the topic may be obtained from [3].RFID tags, when coupled to a Reader network, form the link between physical objects and the virtual world in the EPC Network. RFID tags have a small radio antenna that transmits information over a short range to an RFID tag Reader [3]. RFID technology may use both powered and non-powered means to activate the electronic tags. Powered devices use batteries to actively transmit data from the tags to more distant Readers. Electronic highway toll systems are good examples of active RFID tags. Passive RFID devices literally harvest energy from the electromagnetic field of an active Reader to both power the tag and transmit the data. Modern RFID labels are fabricated using standard CMOS technology and are interrogated by the process of RF backscatter [4]. In the most cost effective and popular technology, the tags are passive and in consequence the ranges of operation are limited (few meters) [5]. Passive systems are well suited for use in the EPC Network due to their low cost.The architecture of the network does not place a restriction on the tags that can be employed as tags with substantially enhanced functionality will extend the depth of the application layer. Such functionality can be provided with active RFID labels. The most common objective of an active RFID label is to obtain a long read rangeusing battery-assisted backscatter. An active backscattering label will modulate the powering carrier or asubcarrier toestablish a communication link with the Reader while using the batteryto power the logic circuits of the label [3].Labels Fig. 4. RFID System overview. The transmitter, Receiver, and the Controller forms the RFID Reader. Here a transmitter of interrogation signals which is contained within a Reader communicates via electromagnetic waves with an electronically coded label to elicit from the label a reply signal containing useful data characteristic of the object to which the label is attached. The reply signal is detected by a receiver in the interrogator and made available toa control system.However other types of active labels may not use backscatter but instead use a battery (such as a paper battery) for powering and transmitting requirements (independent reply generating labels). This distinction is more apparent in therange of operation of the label. Under RFID systems operating under the US regulations for the ISM (Industrial, Scientific and Medical) band of 902-926 MHz (allowed transmit power in this band is 4W EIRP), a backscattered reply can be correctly decoded in the range of several tens of meters while an independent reply generating label will work in the range of several hundred metersA simple illustration of the concept of a Radio Frequency Identification (RFID) systems used in the EPC Network are shown in Fig. 4. Currently there are standardization efforts to produce a harmonious air interface for low cost RFID tags that requires a minimum of functionality implemented on the microchip. However there are existing protocols for an RFID air interface in the ISO standards (ISO 18000). Communication between a Reader and a label (via a radiofrequency interface) may involve interrogating the label to obtain data, writing data to the label or beaming commands to the label so as to affect its behaviour. The Readers possess their own source of power, processing capability and an antenna. A ubiquitous Reader network will allows continuous tracking and identification of physical objects. Reader arrays can be fabricated and integrated in floor tiles, carpeting, shelf structures, cabinets and appliances. Similarly to cellular phone grids, the Reader network may provide seamless and continuous communication to RFID tags. A data collection and control system must support the Reader network to enable efficient use of the continuous, or at least very frequent, object communications. Additionally, in order to access and identify these objects, a scheme is required to uniquely name and identify objects.A.Unique object identifierMSB LSBHeader General ManagerNumber ObjectClassSerial NumberFig. 5. Bit level representation of an EPC general type identifier format. The unique object identifier must have a global scope that is capable of identifying all objects uniquely and act as a pointer to information stored about the object and the functionalities of the tag somewhere over the network. The Electronic Product Code (EPC) is a scheme designed for universal object identification with the associated standards developed by EPCglobal Inc. A binary representation of the EPC is shown in Fig. 5 [6].The Header identifies the EPC format used by the tag; 96-bit, 64-bit or 256-bit. The General Manager Number identifies an organizational entity. These numbers need to be unique and thus need to be assigned by a standards body such as EPCglobal Inc. while Object Class is used by a General Manager to identify a specific object class. The Serial Number is a unique number within each Object Class. The identifier encoding format is one of many possible schemes.A more suitable scheme for sensor networks may be envisioned.It is important for serial numbers to be unique for objects labeled by a particular organization within a object class. However, different objects may reuse the same serial numbers, as the difference in object codes will ensure unique identification of the product. Hence, the triplet of General Manager Number, Object Class, and Serial Number uniquely identifies an object.The unique identifier format defined as the EPC is a flexible data structure. The format provided in Fig. 5 is only one possibility that might be suitable for a sensor network. However, the flexible framework provided by the EPC permits organizations to integrate its own standards based numbering format.B.Extending RFID to Sensing ApplicationsThe mechanism used by RFID Readers to obtain information stored in the E2PROM memory of an RFID label can be applied directly for the collection of data obtained by sensors. This will require extending a simple RFID chip interface to log sensor derived data [7 and 8] in its memory.However there are number of engineering challenges that needs to be overcome. Passive RFID systems do not have an onboard power source and thus the sensors on passive labels can not operate while the label is not in a Reader range. Passive RFID labels are also power constrained systems that function by deriving its power from a Reader interrogation signals thus the available energy for a sensor is limited and is dependent upon the proximity to the Reader. Nevertheless this is not a serious inherence to the development efforts as active RFID labels [3] provide a suitable and cost effective alternative. In addition it is possible for a Reader network to frequently power a distributed network of RFID sensors or to power when required, to regularly obtain sensor derived data. However in the future energy scavenging systems on board passive RFID labels may power the sensors and provide sufficient power to store sensor derived data in a E2PROM memory [9 and 10].4.A PPLICATION L EVEL E VENT (ALE)E NGINEAn ALE Engine system is a middleware system providing real time processing of RFID tag data. Conceptually an ALE Engine occupies the space between a Reader (or multiple Readers) and the applications systems (Fig. 6). Networked ALE Engine systems form a framework to manage and react to event generated by tag reads by interrogators. The ALE Engine passes requests from the applications to the Reader(s) and receives unique tag identifiers and possibly other data from sensors, and passes that information to the applications. The ALE Engine has several fundamental functions integrated into its design, some of which are data filtering of received tag and sensor data, aggregation and counting of tag data and accumulation of data over time periods. These fundamental functions are required to handle the potentially large quantities of data that RFID systems are capable of generating through continuous interrogation of tags. For instance ALE Engines enable local applications to state the significance of specific data obtained from RFID tags (forinstance a record of temperature variations over a time period) and to report accumulated data using a standard format defined by an XML schema (an existing XML schema definition can be found in [11]). Thus the ALE Engine framework may implement an application specific XML schema (such as that more suited towards a specific sensor application) or a number of such schema to allow the capture and reporting of physical world events and measurements. The ALE Engine consists of two primary interfaces that allow it to communicate with external systems: the Reader Interface and the Application Level Event Interface. The former provides and interface between the ALE Engine and Readers, and the latter between the ALE Engine and external applications [11]. An ALE Engine is composed of multiple ALE Engine Services each of which has its own functionality. The ALE Engine Services can be visualized as modules in the ALE Engine. These modules can be combined to perform certain functions for specific applications. Hence one or more applications may make method calls to the ALE Engine resulting in an operation being performed (collection and return of temperature readings from a sensor) and the return of results. Other than ALE Engine Services interacting with each other to perform certain tasks, ALE Engine Services can also interact with services such as the EPC Information Service (EPCIS) to provide services for framework of global applications. Fig. 6 shows the basic architecture of the ALE Engine system.ALE EngineFig. 6. Architecture of a ALE Engine System and its interaction with EPCNetwork components; EPCIS and Readers[11].Event management is a primary service provided by ALEEngine services. A common event management function isfiltering, which is particularly useful in situations where thereis heavy data traffic. For example, Readers may read datacoming in from multiple RFID tags, repeatedly. Not all of thedata from all of the tags may be of interest to the application.Filtering of that data can eliminate information, that is eitherredundant (multiple reads of the same data) or that is notrequired (tags read but not of interest to that application),from reaching the specific application.A. EPC Data Encapsulation and ReportingThe unique identifier on RFID labels serves as a reference toinformation however the storage, transport and description ofthat information requires a structured and universal body thatcan be easily understood, stored and transported across theinternet. Previously the Auto-ID Center defined the PhysicalMarkup Language (PML) (PML Core specification 1.0, Sept.2003) to encode captured object information. However recentdevelopments have retreated from such a rigid definition tothe characterization of two instances: ECSpec andECReports instances using a standard XML depiction.Thus requests to the ALE Engine are sent as an ECSpecobject while data from the ALE Engine is returned as anECReports object. The XML schema for these objects aredefined with extensions to accommodate different applicationor manufacture specific XML schema (such as that suited fora specific sensor application) or a number of such schemas toallow the capture and reporting of physical world events andmeasurements. The core XML schema is tailored specificallyto describe common attributes of physical objects andobservables, such as the expiry date, manufacture date,weight, or the time an object was seen at location X. XMLpromises a universal means for encoding structuredinformation while the core XML schema is rigid, simple anduse elements that can be understood easily because thedefinition uses long descriptive tags.5.O BJECT N AME S ERVICEThe functionality provided by the ONS system is similar tothe services provided by the Domain Name System (DNS),however instead of translating host names to their underlyingIP addresses for user applications, ONS translates an EPCinto a URL(s). The Object Name Service (ONS) in an EPCNetwork identify a list of network accessible serviceendpoints that pertain to the EPC in question. The ONSfunctions like a “reverse phone directory” since the ONS usea number (EPC) to retrieve the location of EPC data from itsdatabases. The ONS is based on existing DNS systems andthus queries to, and responses from ONS adhere to DNSstandards. Fig. 7 shows the overview of an ONS system.The ONS need to revolve to a greater depth than an IPaddress. An IP address is only sufficient to discover a locationbut it is not sufficient to locate a particular service needed byan application. It is possible to serve one service at each IPaddress and avoid the complications in the resolution process.Alternatively an IP address may host a number of otherservices. In a scenario where multiple services are provided ata specific IP address the ONS will need to resolve down to aunique URL with the exact path and name of the service(such a service provided by an EPCIS).A challenging aspect of the resolution process is the ability toselect the required URL since a list of URLs corresponding toa particular EPC may be returned by the ONS server (asshown in step 5). The format of the choices returned by ONS is defined in the Naming Authority Pointer (NAPTR). The complete definition of NAPTR can be found in [12]. In essence, NAPTR is a collection of information that points to a location on the World Wide Web when only an URI is provided. The NAPTR formatted as [Order] [Pref] [Flags] [Service] [Regexp] [Replacement] where the URL is located in the field [Regexp] while [Order], [Pref] (Preference), and [Flags] are used to state the preference order of a list of URLs. [Service] is used to specify the type of service that is offered, such as HTML or PML, while [Replacement] is reserved for future use.Fig. 7. An overview of an ONS system functionality [13]. An EPC encoded in an RFID label is read by an RFID Reader where the different functionalities associated with the EPC or services provided by an EPCIS associated with the tag is resolved through a query of the local ONS server. In the event that the local ONS sever is unable to satisfy the requests it is forwarded to a global ONS sever for resolution.T ABLE 1.O UTLINES A DESCRIPTION OF THE OBJECT NAME RESOLUTIONPROCESS ILLUSTRATED IN F IGURE 5Description1 A reader interrogates a tag and obtains the EPC in binary form.2 The EPC obtained (as a binary number) is passed to the local network application processes.3 The EPC is then converted into URI form (converting binary into integers)Example: [urn:epc:id:gid:2.24.400]4 URI is converted into domain name form.- Remove urn:epcExample [id:gid:2.24.400]- Remove serial numberExample [id:gid:2.24]- Invert the string (replace ‘:’ with ‘.’)Example [24.2.gid.id]- Append “”Example []5 The ONS will generate a set of possible URLs thatpoint to one or many services (such as those provided by a EPC-IS)Example:[/epcis.php/sensor_is.asp/epc_is.wsdl]6 The correct URL is picked and extracted from NAPTR recordExample: [/epc_is.wsdl]7 Application systems send a request to the URL.6.EPC I NFORMATION S ERVICEThe EPC Information Service (EPCIS), which is the gateway between any requester of information and the database containing that information. It responds to queries for data from authorized entities in a format that can be described using a standard format while the persistent storage of that data by the EPCIS may in any format or standard. The EPCIS is the “interpreter” communicating between database(s) and application(s) and provides a standardized interface to the rest of the EPC Network for accessing EPC related information and transactions.Databases Databases Fig. 8. Interaction between EPCIS, ONS and external applicationsA possible and a common interface for an EPCIS can be defined by adopting we services technology. A web services interface allow applications in the wider area network to utilize services provided by local EPCIS using remote method invocation paradigm (Fig. 9). Such architecture has the advantage of leveraging standardized XML messaging frameworks, such as that provided by SOAP (Simple Object Access Protocol) and the description of services provided defined in terms of a WSDL (Web Services Description Language) file. Hence an application requiring information is able to access a WSDL file with a description of the available service methods, input and output parameters to the methods as well as obtain binding information to invoke those methods.EPCIS provides a model for the integration of RFID networks across the globe. However it is important that EPCIS provides a secure communication layer so that local EPC Networks can retain the authority to determine access to information. WS-Security is a candidate proposal that describes enhancements to SOAP messaging to provide message integrity and message confidentiality [14] while proposed architectural extensions to the existing WS-Security profile [15] can provide access control as well as a federated security model for EPCIS.Information about a particular RFID tag or sensor (with a specific EPC) may be spread across a number of local networks. The ONS does not resolve to the serial number level of the EPC and the DNS technology upon which the ONS is based also does not allow the fine grain resolution down to serial number levels. Resolution down to serial level (to a specific RFID tag or sensor) is handled by the EPCIS Discovery Service (EPCIS-DS). EPCIS-DS provides a method for custodians of a particular RFID tag data to update a register within the EPCIS-DS to indicate that that they are in possession of data related to that particular RFID tag. The register may contain a list of EPCIS URLs where such information may be obtained [15]. This may be an important consideration in a mobile RFID sensor network that may move from its origin to various local networks.7.C ONCLUSIONThis paper has introduced the technology and concepts of the EPC Network that can form a ubiquitous RFID sensor network. The EPC Network as a ubiquitous item identification network has applications in supply chain management, while as an sensor network may have applications in monitoring physical conditions such as temperature, product tamper detection, toxic chemical detection such as in subways, and also as a noninvasive monitoring system such as the use of RFID sensors for long term monitoring of a patients heart condition. The EPC Network is still a concept under constant development to realize a Networked Physical World. Extending the functionality of RFID chips to include sensors will enhance the usefulness of that network while providing an array of possible applications. The functionality of an RFID sensing network can be summarized as providing the linkages between all physical objects and the environment with RFID tags where the network components of the EPC Network provide the management of the vast volume of data generated by Readers and the provision for secure access and sharing of sensor derived data on a global scale.A CKNOWLEDGEMENTThe authors would like to thank Mark Harrison, Alf Grasso and Behnam Jamali for their invaluable discussions and support.R EFERENCES[1]Auto-ID Labs: [2]EPCglobal Inc.: [3]K, Finkenzeller, RFID Handbook: Radio FrequencyIdentification Fundamentals and Applications. JohnWiley & Sons, New York , 1999.[4]P. H. Cole, and D. M. Hall, “Integral backscatteringtransponders for low cost rf id applications”, FourthAnnual Wireless Symposium and Exhibition, SantaClara, 1996, pp. 328-336 [5]P. H. Cole, D. M. Hall, M. Loukine, and C. D.Werner, “Fundamental Constraints on rf Tagging Systems”, Third Annual Wireless Symposium and Exhibition, Santa Clara, 1995, pp. 294-303[6]EPCglobal Inc: EPC Generation 1 Tag Data StandardVersion 1.1 Rev. 1.27, accessed June 2005.[7]R. W. Cernosek, B. A. Chin, J. M. Barbaree, V.Vodyanoy, D. E. conner, and Y-H. P. Hsieh, “A Rapid Biosensing System for Detecting Food-Borne Pathogens”, Proceeding of the Sensors Expo, 2001, pp. 113-116.[8] C. Wentworth, “Radio Frequency IdentificationSensors”, 7th World Multiconference on Systemics, Cybernetics and Informatics, 2003.[9] C. B. William, and R. B. Yates, “Analysis of a micro-electric generator for Microsystems”, Transducers ‘95/Eurosensors IX, pp.369-372, 1995.[10]P. Glynne-Jones, S. P. Beeby, and N. M. White,“Towards a piezoelectric vibration-powered microgenerator”, IEEE Proceedings of Science, Measurement and Technology, vol. 148, 2, pp.68-72, 2001.[11]Auto-ID Center: Auto-ID ALE Engine specificationVersion 1.0, (Work in Progress), Feb. 2005[12]Auto-ID Center: Auto-ID Object Name Service(ONS) 1.0, (Work in Progress), Oct. 2004[13]P. H. Cole, D. W. Engels, “Auto-ID – 21st centurysupply chain technology”, Proc. of the AEEMA Cleaner Greener Smarter Conference (invited paper), Melbourne, 2002.[14]B. Atkinson, et al., “Web Services Security (WS-Security) Specification version 1.0.05, /developerworks/webservices/library/ws -secure/, 2005.[15]IBM Corporation and Microsoft Corporation,“Security in a Web Services World: A proposed Architecture and Roadmap”, white paper, /library/default.asp?url=/lib rary/en-us/dnwssecur/html/securitywhitepaper.asp,April 2002,[16]M. Harrison, “EPC Information Service (EPCIS)”,Auto-ID Labs Workshop, Zurich 2004.。

相关文档
最新文档