10Congestion Control_2010
DL701火力发电厂热工自动化术语

☿থϹॖ⛁ᎹႮࡼ࣪ᴃ᪱DL/T701-1999থᜬᯊⒸ:2002-1-15Ё ढҎ ⇥ ݅ Ϲ ᜐ Ϯ ᷛ ޚথϹॖThermopower automation-vocabularyfor fossil fired power plant2000-02-24থᏗ2000-07-01ЁढҎ⇥݅ᆊথᏗࠡᣄϹᎹϮᾬ[1995]44ϹᜐϮᷛޚᩥՈᅝՈDŽˈ៥☿থϹॖՈৡDŽϵՈᆊˈּՈৡˈˈᕜDŽЎ┉ǃݙՈѸˈᔶՈᩨˊˈේᷛޚDŽᷛޚՈЁ“Ҿᜬ”ՈᾬGB/T13983-92GB/T13283-91ՈᴵDŽ ᷛޚՈ┈AՈ┈DŽᷛޚϵϹᎹϮᾬᷛޚ࣪DŽ ᷛޚ᰻˖ЁϹᴎЁᖗDŽ ҎDŽ ϹᎹϮᾬᷛޚ࣪DŽֲࠡ ᇇᓩϬᷛޚᴀᴃ☿থϬᴃ┈$˄ᦤ߾Ո┈˅ ᆵᴀᷛޚᢈথϬՈᴃˈৃᩥǃᅝǃˊᮍՈ᭛ӊϬ᪱DŽϟ߫ޚ᠔Ոᴵ᭛ˈỞᴀᷛޚЁϬ໐ᵘ៤ᴀᷛޚՈᴵ᭛DŽᴀޚߎČᯊˈ᠔߾ČᴀഛDŽ᠔ޚ῁ˈՓϬᴀᷛޚՈϬϟ߫ޚ᳔ᴀՈৃDŽ*ˋ7 ü Ꮉ⌟ₓࠊϬẔ⌟Ҿᜬᰒ߾Ҿᜬஂܲᑺ൫ *ˋ7 ü Ҿ఼Ҿᜬᴀᴃˊ Ⴎ D₋ϬẔ⌟ϢࠊிඣˈᇍϣˈҹҷՈᮑDŽᇍ☿থˈᰃϣথࠊՈᘏDŽϔѯĀҾᜬϢࠊā Lˈ , DŽˊ ˊ ⛁ D₋ϬẔ⌟Ϣࠊிඣᇍ☿থՈ⛁ϣˈҹҷՈᮑDŽˊ ˊ Ϲ H D₋ϬẔ⌟Ϣࠊிඣᇍ☿থՈথˈҹҷՈᮑѠ V GD DŽˊ ˊ ẋ S D₋ϬẔ⌟ϢࠊிඣᇍϣˈҹҷՈᮑDŽ ˊ ˊ ܼ Z S Dᭈਃࡼǃ᫇ǃذᴎϢˊঞՈₑਃࡼ᪡ˊ ˊ ֕ PᢆඣঞՈẔখ᭄ঞˈҹܲখ᭄źˈẔߎϡখ᭄źDŽЏ⌟ₓிඣՈϔϾবₓᑊᇚᝯ⌟ؐϢؐՈDŽˊ ˊ ֕ VᇍϣՈ֕ࠊDŽ◄ᯊˈẜࣙՈᅝᡸ᪡DŽ ˊ ˊ ▊ඣF G P V▊ඣϵ఼ǃবễ఼ঞᩥਜ਼ᴎϢՈඈ៤ˈᰃϔⒸᭈՈ᠔Ոখ᭄▊ࠊ֜ ৄ ϞՈҾᜬ& খᢅ ˊ ˊ ˊ Ϟ߾ˈҹ֓ؐʱˊᇍϣࠊDŽˊ ˊ ிඣᎹ HிඣᎹඣՈֲՈˈ໐ᇍிඣᇍᬥᵘ៤ǃඈᵘǃǃࠊᴎᵘẟ᪂ᩥՈDŽϔՈࠊᇍᬥඣˈϬᑊՈඈ៤ՈՈ᳝ᴎᭈDŽ໐ඣᴀẜᰃՈϔϾඣՈඈ៤DŽˊ ⌟ₓϢᜬ P D G Lˊ ˊ ⌟ₓ PҹܲₓؐЎՈՈ᪡DŽˊ ˊ >⌟Ո@ₓ >@TৃᅮₓܲՈϔᬥˈЎՈˊ ˊ >ₓ@ؐ Y > D @ϬϔϾ᭄ϔϾᔧՈ⌟ₓᜬ߾Ոₓˈབ Pǃ ǃϔ DŽ ˊ ˊ বₓ Y݊ؐৃব⌟ߎՈₓźDŽˊ ˊ বₓ L Y఼ҾᜬՈবₓDŽˊ ˊ ߎবₓ R Yϵ఼ҾᜬߎՈবₓDŽˊ ˊ ᝯ⌟বₓ P G Y⌟ₓՈবₓDŽᝯ⌟বₓỞ⏽ᑺǃǃₓǃᑺDŽ ˊ ˊ ᝯ⌟ؐ P G YᢈᴵӊՈⒸˈϵ⌟ₓញՈˈᑊҹ᭄ؐ⌟ₓᜬ߾Ոₓؐˊ ˊ >఼ҾᜬՈ@߾ؐ L GL> D P L@ Ҿ఼Ҿᜬ᠔Ոᝯ⌟ₓՈؐDŽˊ ˊ >ₓؐ@ףؐ W Y> D @ᜬ߾ℷₓᯊ᠔ᴵӊϟՈₓՈؐDŽ⊼˖ₓՈףؐᰃϔϾˊˈϔޚܲՈˈỞϬףؐᴹףؐDŽˊ ˊ >ₓՈ@൪ףؐ F W Y > D @ ЎϔᅮՈৃҹҷףؐՈₓؐDŽ⊼˖ ˊϔˈףؐᝯףؐՈˈᇍѢϔᅮՈϬˈؐৃᩥDŽˊϔϾₓՈĀףؐāˈϔϬՈஂܲᑺՈҾᜬᮍDŽˊ ˊ Hᝯ⌟বₓՈᝯ⌟ؐף᭄ؐDŽ⊼˖ ˊᔧ⌟ؐףؐᯊˈ˙⌟ؐϔףؐDŽˊᔧᜬញՈ᭄ߎᯊˈᖙᜬញՈޚDŽˊ ˊ ߾ؐ H R L GL ҾᜬՈ߾ؐ⌟ₓՈ ףؐDŽ ˊ ˊ ᓩϬ GX HҾᜬՈ߾ؐҹᢈؐˈᑊҹ᭄ᜬ߾DŽˊ ˊ ᇍ HҾᜬՈ߾ؐҹᝯ⌟ₓՈ ףؐˈᑊҹ᭄ᜬ߾DŽˊ ˊ ᴀ L Hখ↨ᴵӊϟҾᜬՈ߾ؐDŽˊ ˊ ޚ ஂ ܲᑺ DҾᜬ߾ؐϢ⌟ₓ ףؐՈϔᑺDŽˊ ˊ ޚ ஂ ܲᑺ൫ D FҾᜬޚ ஂ ܲᑺՈ൫DŽˊ ˊ VᢈՈᎹᴵӊϟˈҾᜬញᢈᯊⒸݙবՈ࿁DŽ ˊ ˊ Ẕ⌟Ҿᜬ P L⌟ₓՈҾᜬDŽҹᰃবễ఼ǃӴ఼Ⴎߎӊᰒ߾ញՈҾᜬDŽˊ ˊ Ẕߎӊ VˈGH GHߎ఼ˈ᳝ᯊӊDŽָ⌟বₓˈᑊᇚḰᤶ⌟ₓՈՈӊ఼ӊDŽবₓẔߎӊߎⒸՈ݇ՈˈϡবDŽ ˊ ˊ Ӵ఼ W GXᛳ⌟ₓˈᑊϔᅮᇚ݊ḰᤶՈߎₓՈҾᜬDŽ ᳝ՈӴ఼ˈˊɴᬥՈᗻՈˈབ˖⏽ᑺӴ఼ˈǃᑺǃᑺǃᑺӴ఼ˈₑₓǃǃ఼ˈ఼DŽˊ ˊ বễ఼ WߎᷛޚՈӴ఼DŽবễ఼ৃˈབ˖⏽ᑺবễ఼ǃবễ఼ǃবễ఼ǃₓবễ఼ǃবễ఼ǃবễ఼ǃবễ఼ǃḰợবễ఼ǃϹবễ఼ǃবễ఼DŽˊ ˊ বễ఼V Wញᖂˊ఼Ոবễ఼ˈৃᇍ⌟ₓؐẟ᭄ˊ ࣙ ˈߎޚᢳˋ᭄ˈႮՈবễ఼DŽ ˊ ˊ ᩥ ᜬ P⌟ₓ߾ᝯ⌟ؐՈញDŽϔϬ᭄߾খ᭄ؐՈࢴĀᜬāDŽ ᩥ ᜬ Ϭˈབ⌕ₓᩥǃ⏽ᑺᩥǃᜬDŽ ˊ ˊ ᰒ߾ҾᜬGL Lᰒ߾ ߾ǃ ᝯ⌟ₓؐՈҾᜬDŽˊ ˊ ߾Ҿᜬ L GLˈL GL L߾ᝯ⌟ₓؐ݊݇ؐՈᰒ߾ҾᜬDŽˊ ˊ ᜬ U GHˈU GL L⌟ₓؐ݊݇ؐՈᰒ߾ҾᜬDŽˊ ˊ ᜬ L LᯊⒸˈ῁߾ϔᢈᯊⒸࠄ᭄ᯊⒸՈᝯ⌟বₓᩥؐՈᰒ߾ҾᜬDŽˊ ࠊ FᇍϣՈ᪂ ǃǃϹᴎǃϹࠊӊ ẟՈ ᓔǃ݇ǃਃǃذ DŽˊ ˊ ႮࠊD FⒸࠊӊՈࠊDŽˊ ˊ ࠊ P Fϵᴎᴎᵘ݊ࠊӊՈࠊDŽ ˊ ˊ ᓔɳࠊ R O FߎবₓϡᴀࠊϬՈࠊDŽᢳᓔɳࠊˈẜ᳝ࠊ݊DŽˊ ˊ ࠊ ࠊ F G O FࠊϬবₓՈࠊDŽˊ ˊ ᅮؐࠊ F Z G VüSࠊDŽՓবₓֱᴀՈࠊDŽˊ ˊ বᅮؐࠊF Z Y VüSՓবₓՈᅮؐব࣪ՈࠊDŽˊ ˊ ࠡࠊ G G FᇚϔϾᇍᝯবₓՈźՈḰᤶҹՈ┈ϬՈࠊDŽ ࠊϬՓবₓϢؐՈDŽℸϬৃᮑᓔɳࠊϞDŽˊ ˊ ൫ࠊ F GH FЏࠊ఼ՈߎবₓᰃϔϾࠊ఼Ոখ↨বₓՈࠊDŽ ˊ ˊ ࠊ WüS FՈব࣪ˈߎᓔ݇ϸՈࠊDŽ ˊ ˊ எࠊ FᇚՈஂܲₓḰஎₓˈஎˊˈߎஂܲₓՈࠊDŽˊ ˊ Ⴎࠊ D GD F₋ϬႮՈᮍবࠊᢈ ᪂খ᭄ˈҹࠊிඣᗻՈࠊDŽˊ ˊ ᳔ࠊ R FᢈՈᑺϟˈՓՈࠊDŽˊ ˊ Ⴎࠊ VüW FᇍẋՈᔧՈ᳔ՈᗻˈႮࠊ఼ᭈখ᭄ՈࠊDŽˊ ˊ ࠊ O FỞᓔ݇ₓᓔ݇ₓߎՈࠊDŽˊ ˊ ࠊ V FϔϔிՈࠊDŽˊ ˊ ᭄ָࠊ GL GL F ''Ϭᩥਜ਼ᴎҷࠊ఼ঞࠊញˈָᇍϣՈࠊDŽ᭄ָࠊᰃᩥਜ਼ᴎࠊՈ ϔˈϔ൫ᩥਜ਼ᴎࠊிඣՈϔ൫ˈϬᖂൟᩥਜ਼ᴎᖂˊ఼ᴹ˗ᩥ ਜ਼ᴎᩥਜ਼᪂ඣՈؐDŽˊ ˊ Ⴎࠊிඣ D F Vϵᇍᬥࠊញᵘ៤Ոˈ࿁ᇍᝯᇍᬥՈᎹࠊՈிඣDŽࠊញᝯ ᇍᬥПⒸՈϬᵘ៤ࠊிඣՈẔDŽϔϬ᭄ े᭄ൟ ˈϬᩥਜ਼ᴎ ᭄ᴎঞᢳᴎ ẟ᭄ᢳˈᇚᩥਜ਼ᴎϢᢳDŽˊ ˊ ࠊிඣ F F VₓᰃₓǃߎₓгₓՈࠊிඣDŽඣЁˈϡӊˈඈ៤ӊ Ոߎₓ῁ₓՈ᭄DŽˊ ˊ ࠊிඣ GL F Vₓᰃₓₓˈ໐ߎₓᰃₓՈࠊிඣDŽிඣЁӊˈϔ ࠊிඣ ఼ࣙ ࠊிඣ ࣙӊ DŽˊ ˊ ᴎᵘ DˈD HᇚࠊবЎՈᴎᵘDŽָˈՈࡼ Ϲ⇨ᴎᵘDŽˊ ˊ ᫇ᴎᵘ U Hϵᴎᵘব᪡বₓՈᴎᵘˈབࠊǃDŽ ˊ ˊ ࠊ F YDŽ ϵࠊᴎᵘ᫇ՈˈҹবₓՈ᫇ᴎᵘDŽˊ ᩥਜ਼ᴎிඣF Vˊ ˊ ϔ J Yˊ ˊ ˊ Ϲᩥਜ਼ᴎ H F࿁ₓẔՈϹDŽᑓϬѢᩥਜ਼ǃ᭄ˊႮࠊᮍDŽỞ఼ǃࠊ఼ǃ఼ঞߎᰒ߾᪂ඈ៤DŽˊ ˊ ˊ ᭄ᩥਜ਼ᴎ GL F₋Ϭᜬ߾᭄ˈϬਜ਼ᇍ᭄ՈϹᩥᴎDŽỞ఼ǃࠊញǃݙᄬ఼ඈ៤DŽˊ ˊ ˊ ᖂˊ఼ P₋ϬࠊՈЁˊ & ˈᖂ>ൟ@ᩥਜ਼ᴎՈӊˈᅠࠊDŽˊ ˊ ˊ ᖂ>ൟ@ᩥਜ਼ᴎ PҹՈᩥਜ਼ᴎDŽҹᖂˊ఼ЎˈҹՈ఼ǃߎ݊ᵘ៤ՈDŽˊ ˊ ˊ ᖂ>ൟ@ᩥਜ਼ᴎ V G PᴎDŽϔࠊϹᖂ>ൟ@ᩥਜ਼ᴎӊՈᩥਜ਼ᴎDŽϔ֜ˈᑊ᭄߾఼ҹᰒ߾᭄࣏DŽˊ ˊ ˊ Ꮉࠊᴎ S FՈᢳ ᭄᭄Ո࿁ˈᑊ ᭄ࠊˈҹᅲࠊ ֕Ո᭄ᩥਜ਼ᴎDŽՈ˖ǃᡫᑆᡄᔎˈ࿁ˈᯊࠊՈᡅˈ᳝Ոẋབ˖ᢳₓǃᓔ݇ₓǃ᭄ₓǃₓǃ᭄ₓߎǃᓔ݇ₓߎঞüᴎỞDŽ ˊ ˊ ˊ ӊ P GXඈញՈӊӊˈϔҹඈՈᷛޚՈӊDŽ ˊ ˊ ˊ ᭄ GD᳝˖D Ϭᜬ߾ǃˈҹႮǃḰᤶ໘ˊDŽǃՈϔႮǃ໘ˊՈՈᜬ߾DŽˊ ˊ ˊ L᭄ˊЁˈҹϔᅮՈ᭄ՈDŽˊ ˊ ˊ LϵǃՈDŽᩥਜ਼ᴎЁˈՈӊ ࣙᩥਜ਼ᴎⒸǃᩥਜ਼ᴎᩥਜ਼ᴎⒸҹঞᩥਜ਼ᴎϢඣⒸՈ ˈՈᩥਜ਼ᴎ࣏Ո఼఼ՈϔᾬDŽˊ ˊ ˊ ᘏඃᡞ ࿁ₓ ՈഄՈỞDŽӊⒸՈඃˈᰃ᭄Ոϔ᭄ՈϔՈᘏDŽ ˊ ˊ ˊ ᭄ GD Kϔᴵ᭄ඃՈঝⒸӴՈᘏDŽˊ ˊ ˊ ᭄ GD QϔϾ᭄ϔϾ᭄ⒸӴՈDŽϔϾ᭄ҹϔϾ᭄ˈՈϡՈ៤DŽ᭄᭄Ոঝݙඈ៤DŽˊ ˊ ˊ O D Q $ϔϬˈ᳝ݙϬѢ᭄ঝⒸẟ᭄Ո᭄DŽˊ ˊ ˊ ᭄ GDᩥਜ਼ᴎˊՈ༘݇Ո᭄Ո▊DŽϔϾ᭄ՈϔᾬܼˈᑊϔϾඈ៤DŽˊ ˊ ˊ ҎᴎỞ PüP FᴎᇍDŽᰃᩥਜ਼ᴎ᭄˗ᩥਜ਼ᴎỞ߾ញᇚ໘ˊࠊ߾ߎᴹDŽЎᴎỞˈᑨࠊǃՈӊDŽˊ ˊ ˊ X Wࢴᴎ P L DŽỞϬϬᴹᩥਜ਼ᴎிඣẟՈǃߎ᪂DŽབ˖ᴎǃ֜Ոᰒ߾఼ǃՈ߾఼DŽˊ ˊ ˊ LˈV₋Ϭᖂˊ఼ˈϵݙࠊՈǃ᭄ϔᅮᩥਜ਼ՈDŽ ˊ ˊ ˊ ᓔඣ R Vޚẟˈ࿁ᩥਜ਼ᴎிඣՈϔᩥਜ਼ᴎிඣDŽ ˊ ˊ ˊ ӊ Vᩥਜ਼ᴎՈிඣ࣏ǃϬ࣏ǃ᪡ඣঞ᭄ˊࠊ᳝݇ՈᴀᘏDŽˊ ˊ ˊ ӊ V V࣏ࠊẋˈࣙᩥǃẔǃϬՈᎹDŽབࠊՈ᪡ඣ᪱ˊிඣDŽˊ ˊ ˊ ᑨϬӊ D VЎϬϬՈӊˈབ᭄ˊǃࠊᑨϬӊDŽ ˊ ˊ ˊ ӊ K GZᩥਜ਼ᴎிඣЁՈᘏDŽབǃӊǃߎỞǃ఼DŽ ˊ ˊ ˊ ӊᅠՈഫ఼ӊDŽ খᢅ ˊ ˊ ˊ ᴵˊ ˊ V D G GLˊ ˊ ˊ VϔϾখ᭄ᜬ߾ՈϔϾবₓՈՈˊবₓDŽখ᭄ࢴՈĀখ᭄āDŽˊ ˊ ˊ ᭄GL Vখ᭄ᜬɴϬ᭄ᜬ߾ՈϔඈؐЁՈDŽˊ ˊ ˊ ᢳ D Vখ᭄ᜬɴݙؐՈDŽˊ ˊ ˊ GLᩥਜ਼ᴎிඣЁˈЎᇍϣՈ֕᪡ˈ߾఼ খᢅ ˊ ˊ ˊ ϞՈ ߾DŽˊ ˊ ˊ ᘏ R GLᜬ߾ᝯᇍᬥ᪂ǃখ᭄ࠊிඣՈDŽ ˊ ˊ ˊ ẋ S GLᜬ߾ϔᝯᇍᬥՈϣǃ᪂খ᭄ՈDŽˊ ˊ ˊ ࠊ F G Lᜬ߾ẋবₓՈ⌟ؐǃ᪂ؐǃؐǃߎؐᭈখ᭄ҹঞՈϔDŽˊ ˊ ˊ ᨪϿ D GLࠊߎՈẋᨪՈˈҹϡՈϡՈ߾ᨪՈϔDŽỞ ˈ᪡ҹᮍϔϾϔᨪDŽˊ ˊ ˊ ᅲᯊ UüW W G GLϔᅮՈ₋ᯊⒸ བ ˈᇚϔᯊⒸⒸ བ ݙখ᭄Ո᭄ˈ఼Ёˈ ᑊҹඃ߾ՈϔDŽˊ ˊ ˊ K W G GLϔᅮՈ₋ᯊⒸ བ P ˈᇍϡՈখ᭄ẟᯊⒸ བ G ₋఼Ёˈ◄ ᡅᯊˈৃҹ᫇ߎᯊⒸݙՈ᭄ˈҹඃ߾ՈϔDŽˊ ˊ ˊ ႮᨪϿ V GL D GLᇍẋࠊঝǃ᪡ঝǃỞẟˈᔧᯊᰒ߾݊ՈϔDŽˊ ˊ ˊ F GLҹᜬ߾ϔඈখ᭄ བᴎ⏽ᑺ ՈDŽˊ ˊ ˊ ᓔ GL Z GRᇚՈϔ߾ˈҹ֓ՈDŽ ˊ ˊ ˋߎ LˋR ,ˋˊ ˊ ˊ ᭄ₓ GL L ',ϡՈ᭄ₓˈгᓔ݇ₓ RüR L DŽˊ ˊ ˊ ᢳₓ D L $,ব࣪ՈˊₓDŽˊ ˊ ˊ ᭄ₓߎ GL R 'ϡՈ᭄ₓՈߎˈгᓔ݇ₓߎ RüR R DŽˊ ˊ ˊ ᢳₓߎ D R $ব࣪ՈˊₓՈߎDŽˊ ˊ ˊ ₓ S L ,ϡՈₓՈDŽˊ ˊ ˊ ₓߎ S RϡՈₓՈߎDŽˊ ˊ ˊ GHˈL X᭄ˊிඣЁ᭄ℸඣՈϔDŽˊ ˊ ˊ ߎ᪂ R GHˈR X᭄ˊிඣЁඣễߎ᭄ՈϔDŽˊ ˊ ˊ ߎ᪂ LüR GHˈLüR X ᭄ˊிඣЁϬᴹᇚ᭄ඣˈඣ᭄ˈՈ᪂DŽˊ ˊ ˊ ẋߎỞ S LˋR FDŽָՈߎӊՈᘏDŽӊᇚᝯখ᭄ བ⏽ᑺǃǃₓˈ ǃǃ៤ˈˈ Ոᢳₓǃ᭄ₓǃᓔ݇ₓǃₓ ˈḰᤶࠊᩥਜ਼ᴎ᠔Ո᭄ₓˈᑊࠊᩥਜ਼ᴎߎՈ᭄ₓḰ ࠊ᠔ՈˊₓDŽˊ ˊ S Hᩥਜ਼ᴎிඣЁЏ఼ߚՈ݊ՈᘏDŽˊ ˊ ˊ ᴎ Sϔߎ᪂ˈᇚᩥਜ਼ᴎߎǃՈ᪂DŽˊ ˊ ˊ K G FD ᰒ߾ញՈDŽᩥਜ਼ᴎՈߎˈָՈ᭄ӊ ਞǃᜬ DŽˊ ˊ ˊ ˋ᭄ǃ᭄ˋḰᤶ఼ $ˋ'ǃ'ˋ$ FᇚՈᢳₓ བ˖ǃϹ ḰᤶՈ᭄ₓᑊḰᤶՈ᪂DŽˊ ˊ ˊ ֜ Gϔඈ᳝Ոᵘ៤Ոញˈ᭄݊Ոˈᑊᇚ݊ЏᴎDŽˊ ˊ ˊ֜ϞՈϔࠊˈҹ᪂ǃᅠϔϾՈDŽ ˊ ˊ ˊ ᭄֜ϞՈϔDŽᔧᅗϬᯊˈৃҹᅲ᭄ǃՈᅠDŽˊ ˊ ˊ ߾఼F GH U W &ࢴ߾఼ Y GR GL Xˈ'8 DŽᩥਜ਼ᴎߎՈᰒ߾఼ˈৃҹᰒ߾ǃᜬǃ᪱ˈỞϬඃ߾DŽᰒ߾఼ϟ┈ ᪂֜ǃ఼ˈϬᰒ߾఼ᴎᇍDŽˊ ˊ ˊ O SӊՈ⌟ញDŽϬѢ⌟ᰒ߾఼Ոˊˈᩥਜ਼ᴎᑊᇍՈ ǃDŽˊ ˊ ˊ Wࠊᰒ߾఼ϞՈϔDŽỞˈࠊՈᮍDŽˊ ˊ ˊ ఼ Pᩥਜ਼ᴎՈϔ఼ˈỞϔᜬ☦DŽ ˊ ˊ ˊ Ꮉঝ H VկࠊᎹϬՈˈᇍᩥਜ਼ᴎிඣẟඈᗕǃǃׂՈঝDŽ ˊ ˊ ˊ ᪡ঝ R VկϬՈϔࠊৄDŽᰃᩥਜ਼ᴎⒸՈҎᴎˈϔϾ߾఼ˈẜ ࣙϔϾˈབ⏲֜ǃDŽ ˊ ˊ ᩥਜ਼ᴎ֕ Vˊ ˊ ˊ ᩥਜ਼ᴎ֕ඣ F P Vᇍϣখ᭄᪂⌟ˈᑊˊৢ߾ǃǃᨪՈᩥਜ਼ᴎிඣDŽϬ ѢࠊிඣՈϔᾬᯊࢴĀ᭄ඣā GDˈ'$ DŽˊ ˊ ˊ ᩥਜ਼ᴎ֕ඣ F V VᇚϣՈখ᭄ǃᝯᇍᬥ⌟໘ˊˈᑊՈࠊᢈǃࠊ Ոᩥਜ਼ᴎிඣDŽˊ ˊ ˊ ᭄ GD Dᇚᩥਜ਼ˊẋҹঞࠊЁՈ᭄ҹ₋ˈḰᤶ᭄ᔧˊՈẋDŽˊ ˊ ˊ ᭄ˊ GD Sᇍ᭄ඣՈ᪡ˈབඃǃDŽˊ ˊ ˊ ᭄ GD U GˈGD Oᇚᩥਜ਼ᴎẔ⌟໘ˊẋՈ᭄ˈϔᴎߎᴹDŽ ˊ ˊ ˊ ᭄ K GD PᇚₑՈẔখ᭄ᅮ఼Ёˈᖙᯊˈৃҹᯊ᫇ߎᰒ߾ˈᯊⒸৃҹᰃϔϾǃϔ᭄DŽˊ ˊ ˊ ᅮᯊ S GL Oᇚᩥਜ਼ᴎẔ⌟໘ˊՈ᭄ՈᯊDŽˊ ˊ ˊ S OᴎඈߎɴᯊˈᇚǃৢϔᅮᯊⒸݙᣛՈখ᭄᭄ߎᴹDŽ ˊ ˊ ˊ ᴎ U W OਃࡼՈᮍ খ᭄ᨪǃ᪂ਃذ ਃࡼᴎˈঞᯊᇚ᳝݇খ᭄᪂Ոᓔ݇ߎᴹDŽˊ ˊ ˊ ӊ V R Hথᯊˈᓔ݇ՈˈᯊⒸߎᴹDŽˊ ˊ ˊ ߚ UϬᴹҹՈᴵՈ᳔ⒸˈᇍѢϔϾ⌟ₓிඣˈҹ⌟ₓՈ᳔᭄ₓ˗ᇍѢϔϾࠊிඣˈҹࠊՈ᳔ₓ˗ᇍϹˈᓔ݇Ո᳔ᯊⒸⒸˈϔ൫˗ᇍ&ˈǃᜬՈᑺDŽˊ ˊ ˊ V Uҹ᭄ᜬ߾ՈϔிՈDŽˊ ˊ ˊ ₋ V S GࠊிඣЁⒸՈᯊⒸⒸDŽˊ ˊ ˊ &߾ & GLᇚ᭄ඣЁՈẔ⌟໘ˊ&߾ߎᴹˈབඈখ᭄ᰒ߾ǃ߾ǃ߾ǃඃ߾ǃ߾DŽˊ ˊ ˊ ᗻᩥਜ਼ S Fᇚ᭄ඣЁ⌟໘ˊՈ᭄ˈՈᇍᴎඈẔᩥਜ਼ˈབϬϹˈǃᴎᬜǃᴎඈᬜǃ(ǃ⛁DŽ ˊ ˊ ˊ ᪡ R J GDᇍᴎඈਃǃذǃˊՈϬ᭛߾ˈгᨪߎˈؐʱҹDŽˊ ˊ ߚࠊிඣ GL G F V '₋Ϭᩥਜ਼ᴎǃỞ߾ˈᅲᇍϣՈ᭄ǃࠊᡸˈϬỞ᭄Ոᩥਜ਼ᴎ֕ඣˈ݊ˈ᭄ˈৃDŽԧгҹᰃӊՈߚDŽ ˊ ˊ ˊ ẋࠊ൫ S F OߚࠊிඣᵘЁՈϔ൫ˈ൫ϵՈẋঝǃࠊঝඈ៤ˈঝ⌟Ҿᜬᴎᵘˈᅠ᭄Ո₋໘ˊˈᑊᇍᎹࠊ֕DŽˊ ˊ ˊ ֕൫ V OߚࠊிඣᵘЁ൫ՈϞϔ൫DŽϵᴎ݇ඈ៤DŽ൫ЏࠊϢࠊҹঞˊDŽˊ ˊ ˊ ˊ൫ P OߚࠊிඣᵘЁՈϔ൫ˈϵˊҎᴎඈ៤DŽ൫ҹˊϢˊˈࣙᑺǃிඣǃₓࠊǃࠊᜬǃ᭄ẟǃᦤDŽˊ ˊ ˊ ࠊঝ F Vߚࠊிඣẋࠊ൫ЁՈϔঝˈϬҹᅲᇍᎹՈ᭄ָࠊDŽ ࠊঝҹˈг᭄ඈ៤൫֕ඣDŽ ˊ ˊ ˊ ᭄ঝGD D Vߚࠊிඣẋࠊ൫ЁՈϔঝˈϬѢₓՈẔখ᭄ᅲ᭄Ո₋ˈᇚ݊ᔧՈḰᤶ໘ˊDŽ ᭄ঝҹˈгҹϢ᭄ඈ៤൫֕ඣDŽˊ ˊ ˊ ࠊঝ V F Vϵࠊ఼ S O F ߚࠊிඣࠊঝඈ៤ˈϬҹᅲՈࠊDŽࠊঝҹˈг᭄ඈ៤൫֕ඣDŽˊ ˊ ˊ ẋঝ S Vᰃࠊঝ᭄ঝՈᘏDŽˊ ˊ ˊ ഫࠊ៤Ոǃ໘ˊǃ᫇ࠊǃǃᨪՈ࣏ഫDŽˊ ˊ ˊ ඈᗕǃ FߚࠊிඣЁˈϬඣᡅᇍϡՈഫᔧඈՈẋӊඈᗕDŽ ߚࠊிඣЁˈϬඣᡅˈᇚϡՈঝǃӊˊඈӊDŽˊ ˊ ˊඣ P L V ,ᰃϔϾᩥਜ਼ᴎՈҎᴎிඣDŽˊ᠔ҹϔϾՈϣDŽϔǃࠊˊˊᵘ៤DŽඣˈϣǃᩥǃǃǃǃҎǃඣDŽிඣҹ᭄ǃᜬՈᮍˊˈҹᇍՈˊ᳔ࠊDŽ ҹॖˈϵ൫ՈϣǃᩥǃǃǃǃҎǃඣඈ៤Ոˊඣˈࢴ൫ˊඣDŽˊ ˊ ॖ൫֕ඣ S V L V Ϭᇚᴎඈᩥਜ਼ᴎ֕ඣЁՈ᳝݇ᯊ᭄ؐ ᘏ Ո᪡ঝˈЎؐ ᘏ ֕ᴎඈᅝՈᅲᯊDŽᯊгᑺᇚᴎඈՈ'DŽ ˊ ৃ U᳝˖D ᢈᴵӊϟᢈՈᯊⒸݙᜬǃࠊញᩥਜ਼ᴎிඣᅠՈ࿁DŽՈᯊⒸՈՓϬ᭄ݙˈ᪂ ఼ࣙӊ ࿁ՈDŽϵඣᩥ⌟ₓ᳝ˈ᠔ҹϔϬⒸᯊⒸᜬ߾DŽ ˊ ˊ ৃ PᴵӊᇍՓϬՈҾᜬǃࠊញᩥਜ਼ᴎிඣˈẟՈᑺˈՈ࿁DŽˊ ˊ ৃϬᯊⒸ D WϬՈᢆߎথˈᴵӊབǃ⇨ℷՈϟˈிඣញϬՈᯊⒸDŽˊ ˊ ᯊⒸ P W Ҿᜬǃࠊញᩥਜ਼ᴎிඣՈᢈݙˈᢈᴵӊϟⒸՈᯊⒸؐDŽˊ ˊ ᯊⒸ P W W UҾᜬǃࠊញᩥਜ਼ᴎிඣᢈݙˈᢈՈᴵӊϟˈẟՈᯊⒸՈؐDŽˊ ˊD ᇍϡՈҾᜬǃࠊញˈՈᎹᯊⒸᬙՈᯊⒸˈҹ P W W ᜬ߾DŽᇍৃՈҾᜬǃࠊញˈⒸՈᎹᯊⒸˈᯊᯊⒸDŽˊ ˊ ᬙிඣிඣЁՈ Ҿᜬǃࠊញᩥਜ਼ᴎிඣ ϡՈDŽˊ ˊ ৃϬ DϔϾிඣℷՈᯊⒸᩥՈᘏᯊⒸˈϬ᭄ᴹᜬ߾ˈेˋ DŽˊ ˊ GX GD GHᇍிඣЁ݇⏲Ո໘ϬźՈ᪂DŽˊ ˊ ֵ F P GH VᯊѢ ߎ ⒸՈؐՈDŽ ˊ ˊ P GH YѢ ߎ ⒸՈǃؐՈϹDŽҹᰃᴎ⌟ₓDŽˊ ˊ ᑆᡄ F P GH LϵՈߎՈব࣪DŽˊ ˊ ࠊ F P GH UҾᜬǃࠊញᩥਜ਼ᴎிඣࠊṗᇍ݊ߎՈ࿁DŽ ˊ ˊ ࠊ↨ F P GH U UҾᜬǃࠊញᩥਜ਼ᴎிඣՈˈϢߎՈՈDŽ ࠊ↨Ϭ↨ؐؐՈ Ոߚ᭄ᜬ߾DŽˊ ˊ ֵ V P GH VҾᜬǃࠊញᩥਜ਼ᴎிඣϬՈDŽˊ ˊ V P GH Yᝯ⌟ϹϬՈDŽˊ ˊ ᑆᡄ V P GH Lϵ߾ؐߎՈব࣪DŽˊ ˊ ࠊ V P GH UҾᜬǃࠊញᩥਜ਼ᴎிඣࠊṗᇍ݊ߎՈ࿁DŽ ˊ ˊ ࠊ↨ V P GH U Uߎব࣪Ոֵؐᇍѻߎব࣪ₓDŽࠊ↨Ϭ↨ؐؐՈ Ոߚ᭄ᜬ߾DŽ ☿ˊ Ⴎ D OᰃᇍϔϾࠊ᠔Ո࣏ᑺDŽ݊খ᭄Ẕ⌟ǃ᭄ˊǃႮࠊǃࠊǃᨪᡸঞඣ᪂ᩥՈᅠᑺˈ᳔ؐʱՈ᭄ₓ᠔ՈDŽ☿থՈႮᴎࠊₓঞ˗ᜬঞࠊ᪂ₓ˗ඣ᪂ᩥՈᅠᑺ˗ᮑᎹₓ˗ᡸᯬՈDŽˊ ⛁ᩥ GH R S S D ᩥᇍᬥՈᴵӊᡅˈϔᇍখ᭄Ẕ⌟ P ǃᨪ D ǃࠊ F ᢳₓࠊǃࠊᓔϔ݇ࠊ ᡸ S ݙՈႮඣDŽेᇍǃᴎඈঞிඣǃ(୍ࠊඣˈǃǃǃկǃˊǃ⊍⊍ඣᡸ᠔ՈҾᜬࠊ᪂ඣϔՈிඣ᪂ᩥᅝᩥDŽ ˊ ˊ ࠊᮍ F P GHؐʱࠊᴎඈ݊᪂ՈẔՈˈЏݙࠊ֜ ৄ Ո᠔Ո֕DŽϔࠊ▊ࠊDŽˊ ˊ ࠊ O Fࠊ֜ ৄ Џ བǃᴎ ඣ བ┨ඣǃ⛁ඣ ┈ˈⒸ བˊḪⒸǃկ⊍⋉ ݙˈؐʱࠊ֜ϞˈߚᇍᝯᇍᬥՈẔࠊDŽ ˊ ˊ ▊ࠊ F G FᇚϣՈ᪂݇ඣՈࠊ֜ ৄ ▊ࠊݙˈؐʱᇍՈᴎඈẟՈ֕ࠊDŽˊ ˊ ᴎࠊ üW F G FᇚǃᴎՈࠊ֜ ৄ ▊ࠊݙDŽЏϬѢඣЎࠊՈᴎඈDŽˊ ˊ ࠊ X F G Fᇚᴎඈ ǃᴎঞᴎ Ոࠊ֜ ৄ %֜ ▊ࠊݙˈؐʱᴎඈϔϾࠊDŽϬѢϹඣഛࠊՈᴎඈDŽˊ ˊ ḪⒸؐʱࠊ QüR F GH ϡؐʱˈඣᇍϣࠊՈḪⒸˈℸିⒸՈᡸிඣᅠˈᬙᯊৃҹႮՈ᪂DŽ ˊ ᢳₓࠊிඣ P GX F Vᅲǃᴎঞඣখ᭄ႮࠊՈᘏDŽඣЁˈᐌখ᭄Ⴎࠊঞᨪˈᇍࠡˈ݊ߎₓЎₓՈ᭄DŽᇍӊЁгࠊிඣ&GOü W V DŽ ˊ ˊ ᴎඈࠊ X F GL G FᇚüᴎඈϔϾࠊˈỞࠊಲᴎඈႮՈᎹˈǃᴎՈႮඣথߎˈҹব࣪Ո◄ˈᴎඈ᫇ǃ᫇Ո࿁DŽϬՈ൫ᰃࠊிඣᴎࠊிඣDŽˊ ˊ ˊ P GH W % ᴎࠊ ᓔɳ ˈࠊ ˈՓՈ ᴎব࣪Ո◄DŽℸҹϬˈˈгᴎՈϔDŽˊ ˊ ˊ ᴎ W P GH 7 ࠊ ᓔɳ ˈᴎႮࠊ ˈՓᴎࠡDŽℸᴎඈᴎࠡˈˈгᯊϡՈϔDŽˊ ˊ ˊ F GL G P GHǃᴎᯊࠊՈࠊிඣˈℸՈϬˊ ˊ ࠊிඣ F VᅲࠊՈᘏDŽˊ ˊ ˊ ࠊ GüZ FࠊẟₓՈႮࠊிඣDŽᇍˈࠊிඣDŽˊ ˊ ˊ ࠊ F FࠊẟₓՈࠊிඣˈेࠊՈႮࠊிඣՈˈࣙǃₓࠊDŽˊ ˊ ˊ ࠊ S Fࠊ ℷ ՈႮࠊிඣDŽˊ ˊ ˊ ễࠊ D FࠊₓՈႮࠊிඣDŽˊ ˊ ˊ ࠊ FࠊẟՈₓ (ˈ⊍ˈϬ⇨བǃǃ ՈႮࠊிඣDŽˊ ˊ ˊ ẋ⏽ࠊ V V W F ࠊ⏽ᑺՈႮࠊிඣDŽˊ ˊ ˊ ⏽ࠊ U V W Fࠊ⏽ᑺՈႮࠊிඣDŽˊ ˊ (ᴎࠊிඣ S ˈP ᅲ(ᴎࠊՈᘏDŽˊ ˊ ˊ (୍⏽ᑺࠊ S W F(ˈࠊ(ᴎߎ(୍⏽ᑺՈࠊிඣDŽˊ ˊ ˊ (ᴎҎ ࠊ P L S F ᇍ(ᴎҎ ࠊՈࠊிඣDŽ(ᴎࠊඣՈϡˈࠊবₓᝯₓᰃՈDŽˊ ˊ ˊ (ᴎࠊ O G F R PࠊẟՈ(ₓˈՓ(ᴎ᳔ϟẔՈࠊிඣDŽ ˊ ˊ ᴎࠊிඣ W F VᅲᴎࠊՈᘏDŽेᴎḰợথᴎՈؐՈႮࠊிඣDŽˊ ˊ ˊ ᴎࠊிඣ P K GU F ϵᴎˊ᪂ᩥՈӊǃӊᴎᵘᵘ៤ՈᴎࠊிඣDŽඣDŽˊ ˊ ˊ Ϲࠊிඣ HüK GU F ϵˊ᪂ᩥՈӊǃˊ᪂ᩥՈӊᴎᵘᵘ៤ՈᴎࠊிඣDŽඣDŽˊ ˊ ˊ ᭄ࠊிඣ GL üK GU ' ϵˊ᪂ᩥՈӊǃ᭄ ᩥਜ਼ᴎ ǃˊ᪂ᩥՈӊᴎᵘᵘ៤ՈᴎࠊிඣDŽ᭄DŽˊ ˊ ˊ ᢳࠊிඣ D üK GU $ ϵˊ᪂ᩥՈӊǃᢳǃˊ᪂ᩥՈӊᴎᵘᵘ៤ՈᴎࠊிඣDŽᢳDŽˊ ˊ ˊ ᴎϹࠊிඣ PüHüK GUϬᖂൟᴎ ᩥਜ਼ᴎ ঞᴎᵘᅲᴎႮࠊՈࠊிඣDŽ ⊼˖г᭄ࠊிඣˈᴎՈĀ'āˈĀˊ ˊ ˊ ᴎႮਃذிඣ D GR $7ᴎՈ⛁݊খ᭄ˈᴎࠊிඣᅠᴎՈਃࡼǃᑊذՈႮࠊிඣDŽˊ ˊ ˊ ᴎ⛁֕ඣ W V V V ₋Ϭ᭄ൟˊൟՈᮍ⌟ḰᄤՈ⛁ˈᇚᴎࠊிඣˈϬҹࠊՈՈˈֱḰᄤݙՈႮඣDŽˊ ˊ ˊ ᴎඣ H W VᴎẔˈߎɴᯊ࿁ᮑẟˊˈᑊᯊˈ࿁ᮑˈذᴎẔՈֱᡸிඣDŽ ˊ ˊ ˊ Ḱợࠊ V G FᴎࠊிඣϔˈϬѢਃࡼǃᅮḰợࠊDŽ ˊ ˊ ˊ ࠊˋ O G JᴎࠊிඣϔˈϬѢᇍᴎඈࠊDŽˊ ˊ ˊ ࠊ O G OᴎࠊிඣЁՈࠊϔˈỞࠊᴎ᫇ՈᓔᑺᴹࠊᴎඈߎDŽˊ ˊ ˊ ᡸࠊ RüV G S F ᡸࠊᰃϔࠊՈࠊDŽ᳝ϬᑺࠊᮍՈˈгϬࠊᮍՈˈབᴎḰợḰợՈ ˁᯊˈ݇⒱ˈᔧḰợᯊᓔਃ᫇ˈབℸডˈָḰợࠊಲҹḰợ˗ᯊ₋ϬDŽˊ ˊ ˊ ᡸ RüV G S WᴎֱᡸிඣϔˈᔧᴎḰợϔؐᯊႮᴎ݇ЏDŽˊ ˊ ˊ ࠊ YüS Fᴎࠊிඣϔˈָࠊ᫇ᓔᑺՈࠊᮍDŽ ˊ ˊ ˊ Q JϬবՈᮍবẟₓՈ᫇DŽ$ S DŽˊ ˊ ˊ Ā JϬবẟᓔᑺՈᮍবẟₓՈ᫇DŽ$ DŽˊ ˊ ˊ U R O Gᴎࠊிඣϔˈᇚᴎℷϟ᠔ՈˈথՈⒸݙᾬDŽˊ ˊ ˊ ᫇ YᴎࠊிඣϔˈᔧⒸᬙᴎᑺᯊˈ݇⒱ˈᑊᓊảϔڱᯊⒸৢˈᓔਃ᫇ˈҹᴎϹՈˈிඣՈˈϡிඣሥDŽ ˊ ˊ ˊ ϹḰᤶ఼HüK GU FࠊிඣЁˈᇚϹࠊḰᤶࠊՈ᪂DŽˊ ˊ ˊ ⊍,ǃߕ S WϹḰᤶ఼Ёࠊ᫇⊍ₓᮍՈDŽˊ ˊ ˊ ⊍ᴎ VỞ⊍Ϲࠊࡼ⊍ˈՓЏՈᴎᵘDŽ ˊ ˊ ˊ ˊ Y Pᅮǃ ব࣪Ոᡅˈব᫇Ոᓔਃᮍˈᴎ ܼ ᾬ ՈϟẔDŽḰᤶ $ˋ$W DŽˊ ˊ ˊ Ḱợ ᑺবࡼ GU S V G Y ᴎࠊிඣඃՈDŽỞҹᇍᑨՈḰợؐϢḰợؐՈ᭄ᴹᜬ߾DŽˊ ˊ ˊ ả GH G GඃϟᜐᯊՈϡˈࢴảDŽảҹϔϟᜐඃᇍᑨՈḰợؐϢḰợؐՈ᭄ᜬ߾DŽ ˊ ˊ ݊ˊ ˊ ˊ ࠊிඣ F V %ᴎՈႮǃ⏽ᑺႮࠊிඣՈᘏDŽ ˊ ˊ ˊ Ⴎࠊ D J F $*ࠊথᴎՈႮࠊிඣDŽˊ ˊ ˊ Ⴎᑺிඣ D GL V $'ǃᝯᴎඈᖂඃˈᅲᑺ ՈႮࠊிඣDŽˊ ˊ ˊ Ⴎඣ D V G V $ᴎࠊிඣՈϟˈᅲᴎႮՈࠊிඣDŽ ˊ ᓔ݇ₓࠊிඣ üR Vᅲǃᴎঞਃǃذᓔǃ݇ՈᘏDŽˊ ˊ ࠊிඣ V F VᇍϔᎹඣЏᴎϔᅮࠊՈࠊிඣ ᓔɳࠊࠊ DŽˊ ˊ ˊ ඈ൫ࠊ J FᡞՈՈ᪂ϔϾՈࠊˈབࠊDŽˊ ˊ ˊ ඈ൫ࠊ V FᡞϔᴎঞϔඣϔϾՈࠊˈབᴎǃᓩᴎǃՈࠊǃ఼ࠊDŽˊ ˊ ˊ Ϭ᪂ࠊ D V Gü FҹϞՈ᪂ བ ˈẔذߎᯊˈϬ᪂ਃࡼՈࠊDŽˊ ˊ ˊ ఼ࠊிඣ F V %ব࣪Ոᡅ఼ˈႮ఼ՈࠊඣDŽЁⒸࠊඣЁ៤ᇍՈ఼˗ָࠊඣЁϔৄ(ᴎঞՈਃذࠊிඣˈгϔҹՈࠊிඣDŽˊ ˊ RüWüR Fࠊᓔ݇ ᇍᑨϔৄϹᴎՈ఼ ఼ ˈᑊᇍৄ఼ ఼ ẟ ᓔǃ݇ ᪡DŽˊ ˊ ඃ V FϬᇍϹᴎՈ఼ ఼ ẟˈ໐ϬՈ᪡ᓔ݇ ᇍϹᴎ఼ ఼ ẟ ᓔǃ݇ ᪡DŽˊ ˊ ᓔ݇ₓ᪡఼ üR VϬѢᇍᴎẟਃǃذᓔǃ݇Ո᪂DŽϔᓔ݇DŽˊ ᨪ Dˊ ˊ ᨪඣD Vߎˈҹᜬࠊிඣϡிඣখ᭄ؐՈႮඣDŽˊ ˊ ؐᨪ O DẔߎবₓϟՈᨪDŽˊ ˊ ᨪGH DẔߎবₓؐՈᨪDŽˊ ˊ ఼ Dᜬ݇খ᭄ՈDŽᇍҹᜬ߾ᨪݙՈ఼ࢴDŽˊ ˊ ߎ RֱᡸࡼˈỞˊញϬ߾ߎᓩᡸࡼՈϔDŽ ˊ ˊ ᨪᡥࠊ D F RᨪՈϔˊᮍˈབ བਃࡼ ϟˈখ᭄ؐᨪؐᡅˈᬥˈЎᨪՈᮑDŽˊ ֱᡸϢ S Lˊ ˊ ඣ G ᔧᯊˈֱᡸ ݙ ໐ࠊᮑՈႮඣDŽࣙඣ V V ఼ࠊிඣ % DŽˊ ˊ ˊ ᘏ P WϵֱᡸˈՈ᠔DŽ ˊ ˊ ˊ ⊍ R W݇⒱⊍ˈՈ᠔⊍ₓDŽˊ ˊ ˊ WϵẔ ϔ(୍ ႮDŽˊ ˊ ˊ ☿ḰবЎՈ࣪ᢅ݊ˊᜬDŽˊ ˊ ˊ ☿ HᇚḰবЎᢅϡᢅՈDŽˊ ˊ ˊ VՈ᳔ব࣪ϟˈՈ☿DŽ ˊ ˊ ˈ ☿⌟఼ GHẔ⌟☿ᔎߎৃϬՈϹՈ᪂DŽˊ ˊ ˊ ܼ O R Dᜬ߾Ոϔˈᵘˈ᳝ϟ߫DŽD ᇍ˖Ϭ఼☿⌟⌟ᮍˈᔧϔ⌟఼Ẕ⌟Ո ˋ ᯊ˗Ϭܼ⌟ᮍˈᔧ ˋ ҹϞՈ☿⌟఼Ẕ⌟ϡᯊˈᅮDŽᇍ:ൟ ⚻ᓣ♝ၟ˖ᔧẔ⌟ࠄ☿Ѣϔ᭄ₓᯊ ৃ ⚻᭄ₓঞ ˈᅮ♝ၟ☿DŽF ᇍᓣ ⚻♝ၟ˖ᔧϔ߫ ⚻☿Ẕ⌟఼Ẕ⌟ࠄՈ☿Ѣϔ᭄ₓᯊˈᅮ♝ၟ☿DŽˊ ˊ ˊ ⚻☿Ẕ⌟ L G ϔ ⚻ѢẔ⌟ ⚻☿Ẕ⌟ᮍᓣDŽ ˊ ˊ ˊ ☿Ẕ⌟ H Gᓣ♝ၟˈ ⚻☿Ẕ⌟఼ˈϬ ⚻ ⚻☿Ẕ⌟ᮍᓣDŽˊ ˊ ˊ ܼ♝ၟ☿Ẕ⌟ Gϔ ⚻☿Ẕ⌟఼ˈϬẔ⌟ܼ♝ၟ ⚻☿Ẕ⌟ᮍᓣDŽˊ ˊ ˊ ☿ FẔ ⚻ ˁ ˁ ⚻☿ˈϔᅮᯊⒸ བ V ݙּᯊՈ☿DŽˊ ˊ ˊ ☿ O R O W D Fᓣ ⚻♝ၟϔˈ᳝ ⚻ˈߎ ⚻ ᭄ₓৃ Ո☿DŽˊ ˊ ˊ ᾬ☿ S O R♝ၟϔϾ☿ ⚻☿DŽˊ ˊ ˊ ♝ၟ HϬₓϟˈễ♝ၟˈҹ┨ӏ ˈᑊ˖D ᯊⒸѢ P♝♝ၟݙ DŽˊ ˊ ˊ Āₓ S UϡѢܼₓՈ ˁˈᯊѢ ˁₓDŽ ˊ ˊ ˊ V ⚻☿఼ৢˈՓ ⚻ ᭭DŽˊ ˊ ˊ ⊍ V V R YˈV W Y ᭭ˈႮ ⚻ ᭭☿ DŽˊ ˊ W V L 7 ֕ ǃǃǃᴎ᭄ ՈDŽ ˊ ˊ ˊ Ḹ D PˈW S P ֕ḸDŽˊ ˊ ˊ W V P֕DŽˊ ˊ ˊ G H P֕DŽˊ ˊ ˊ D ҹˈ⌟ₓDŽˊ ˊ ˊ Ḹ Ḹ U H P֕ḸDŽˊ ˊ ˊ Ḹ Ḹ Vˋ Y P ֕ḸḸDŽˊ ˊ ˊ ] VᰃϔϾˈϬḸDŽˊ ˊ ˊ WϔˈDŽ⌟ₓḸ᭄ˈᑊ⌟ߎখDŽˊ ˊ ˊ Ϲ H F Sϔᓣˈҹˈ࿁⌟ₓ⌟ᜬѢᅝDŽˊ ˊ ˊ W⌟ₓḸDŽˊ ˊ ˊ ᬙ D U Hü P $'ᰃϔϾ Ḹ᭄ˈỞẔˈᇍǃ໘DŽẔ⌟ঞ᭄DŽ ˊ ˊ L᳝˖D བṗǃ♝ ⚻ ˈϔ᪂ᯊˈЎৢৢՈDŽ Ўߎϡ࣏ˈ໐ˈ₋࣏ˈҹˈབʌࡴDŽˊ ˊ ᴎ FথᯊˈՓ♝ϔˈৢˈৃᓣ˖D ˁ)ˈᰃᓣDŽˁ)ˈᰃ♝ᓣDŽˊ ˊ U 5ᰃDŽ བඝǃễǃᓩ থǃᴎᯊˈDŽ ˊ ˊ L Fϔখ᭄ࠄϔ᪂ᯊˈᯊϔ᪂DŽ ˊ ǃ F UˈF֜ ৄ ˈᇍĭDŽ ˊ ˊ X F U᳝ᯊࣙ֜ Ո֜ ৄ ˈᇍDŽˊ ˊ F U֜ ৄ ˈᇍDŽབൟ☿ǃ♝ǃ┨DŽˊ ˊ Џ H Fࣙǃবǃկ Ո֜ৄˈĭDŽˊ ˊ ϹϹ F UկDŽˊ ˊ O F Uˈᅝி֜ ৄ Ոˈབ♝ǃǃǃ┨ǃǃ ┨ᇬ DŽˊ ˊ ᴎ♝ üW F U♝ˈ♝ǃ֜ ৄ ՈDŽˊ ˊ HüQ F U֜ৄǃᇍDŽˊ ˊ Ϲ H Uᅝ ࣙ ᶰDŽˊ ˊ ؐ V H UϹՈˈݙDŽˊ ֜ ৄǃᶰˊ ˊ ֜ǃሣ SݙDŽ ϬѢᅝǃDŽˊ ˊ ᶰ Fˈੵ᳝ ݙǃDŽੵDŽˊ ˊ ֜ FǃՈ֜ ሣǃᶰ DŽ ˊ ˊ ৄ FਬৄDŽৄϞ֜ DŽˊ ˊ ᴎ֜ %֜ W J S♝ǃǃথ֜ ৄ DŽˊ ˊ ֜D S┨֜ˈ݊֜DŽˊ ˊ ֜ ሣ P S֜ ሣ Ϟ߾ˈҾǃ߾֜ ሣ DŽˊ ˊ ֜ ሣ VüP S֜ ሣ Ϟ߾֜ ሣˊ ˊ ֱੵ ᶰ Zü Fੵ ᶰ ݙࡴˈ࿁ݙੵ ᶰ DŽ֜ ሣ Ϟ߾DŽᇬ⓶ੵᶰDŽࡴˊ ˊ ⛁ᶰ ੵ üG Ўᶰ ੵ ˈᶰݙֱ݊DŽᶰᓣᓣᓣϸDŽˊ ˊ ੵ ᶰǃᶊ W FˈUկੵ ᶰǃᶊ ˈݙDŽˊ ˊ ᶰ U FញࡴᶰDŽˊ ˊ ൫ G R S൫ * ü ᬜ, ᷛẔˈᇍੵ ᶰ ˈĭ ࣙᇬ ẟDŽ, Lü W S ߾DŽ ˊ V DŽˊ ˊ ☿Ϲ S S Vᇍˈ࿁ˈЎDŽ ᭄݊Ո߾ǃǃ᪡ǃႮDŽˊ ˊ ܼǃ Ϣ֜ǃৄঞ݊ϞϔDŽẔ ᭄ՈϔˈᑊᯊՈˈDŽˊ ˊ ǃ U V K U᭄Ոϔˈ֜ǃৄњDŽ ǃˈ໐DŽˊ ˊ Ởൟ J Vϔˈ֜ ৄ ǃൟњˈ ᳝DŽˊ ˊᝯǃࡼDŽ ˊ ˊ ĭ Sĭ֜ǃৄDŽ ˊ ˊ ᝯ SϵDŽǃ᭄ൟ᭄ ՈDŽˊ ˊ ৄ ৄ L V֕ˈϔৄ&֜ˈ ࡴϔϾDŽˊ ˊ V VϬDŽ˖D Ϲൟ˗ৄ˗F ˗G ᩥிᅲDŽˊ ˊ V F ՈDŽϔ˖D Ꮉ ˗ᯊ˗F ᬙ┨˗G Ẕǃൟ˗H ₑ˗ᅲᯊǃ˗J ˗K ᭄໘˗L ˗DŽˊ ˊ R VᇍՈˈϔϔৄϔϾ֜ˈ֜DŽˊ ˊ ,ˋ2 ,ˋ2 L Hᇍ֜Ϟˈϔ$ˋ'ǃ'ˋ$ǃ',ǃ'2DŽˊ ˊ Ϲൟ S P VǃᅲᯊഄǃՈˈ݊ѢൟϬDŽˊ ˊ L V VЎDŽˊ ˊ ⌟᪙ G D W V ᇍ ࣙǃᜬ֜᪂,ˋ2 ẟ⌟᪙DŽᆵ᭛௦ᓩAabsolute expansion monitor of turbine ..............................................4.6.2.4 accuracy ...........................................................................3.2.17 accuracy class......................................................................3.2.18 actuator, actuating element ........................................................3.3.20 adaptive control ...................................................................3.3.11 air flow control ...................................................................4.3.2.4 alarm ..............................................................................4.5 arm cut out ........................................................................4.5.6 alarm display.......................................................................3.4.2.8 alarm system .......................................................................4.5.1 analog electro hydraulic control (AEH) .............................................4.3.4.4 analog input ˄AI ˅..................................................................3.4.3.2 analog output (AO) .................................................................3.4.3.4 analogue signal ................................................................... 3.4.2.3 annunciator ........................................................................4.5.4 application software .............................................................. 3.4.1.22 automated diagnostics for steam turbine [rotating equipment] (ADRE) ...............4.6.2.11 automation ........................................................................ 3.1 automatic control ................................................................. 3.3.1 automatic control system ...........................................................3.3.17 automatic dispatch system (ADS) ....................................................4.3.5.3 automatic generation control (AGC) .................................................4.3.5.2 automatic level ................................................................... 4.1 automatic synchronized system (ASS) ............................................... 4.3.5.4 automatic stand-by control ........................................................ 4.4.1.3 automatic turbine startup or shutdown control system (ATC) .........................4.3.4.6 auxiliary panel ................................................................... 4.8.6 available time .....................................................................3.5.2 availablity ....................................................................... 3.5.7 axial movement .................................................................... 4.6.2.1 Bbar chart display ................................................................. 3.4.2.12 (function) block .................................................................. 3.4.6.8 boiler control system ............................................................. 4.3.2boiler follow mode (turbine base) (BF) .............................................4.3.1.1 boiler-turbine centralized control................................................. 4.2.4 boiler-turbine control room ........................................................4.7.6 boiler turbine generator panel......................................................4.8.5 burner control system (BCS).........................................................4.4.1.4 bus ............................................................................... 3.4.1.11box ............................................................................ ...4.8.2bypass control system (BPC).........................................................4.3.5.1C cabinet.............................................................................4.8.2cable room..........................................................................4.7.4 cascade control ................................................................... 3.3.8 cathode ray tube (CRT) ............................................................ 3.4.4.7 centralized control ............................................................... 4.2.3 centralized monitoring system.......................................................3.1.7 combustion control..................................................................4.3.2.2 common mode interference .......................................................... 3.5.11 common mode rejection ............................................................. 3.5.12 common mode rejection ratio ....................................................... 3.5.13 common mode signal..................................................................3.5.9 common mode voltage ................................................................3.5.10 computer monitoring system..........................................................3.4.5.1 computer systems....................................................................3.4 computer supervisory................................................................3.4.5 computersupervisory system..........................................................3.4.5.2 configuration ..................................................................... 3.4.6.9 console.............................................................................4.8.4 continuous control system ......................................................... 3.3.18 control ........................................................................... 3.3control board.......................................................................4.8.3control building....................................................................4.7control display.....................................................................3.4.2.7 control mode........................................................................4.2.1control room....................................................................... 4.7.2control station.................................................................... 3.4.6.4 control valve.......................................................................3.3.22control with fixed set-point........................................................3.3.5 control with variable set-point.....................................................3.3.6 conventional true value[of a.quantity] .............................................3.2.11 A/D, D/A onverter...................................................................3.4.4.3 closed loop control.................................................................3.3.4critical flame......................................................................4.6.1.12D data................................................................................3.4.1.8data acquisition....................................................................3.4.5.3data acquisition station............................................................3.4.6.5 data base...........................................................................3.4.1.15data highway........................................................................3.4.1.12data processing.....................................................................3.4.5.4data record, data logging...........................................................3.4.5.5 dead band...........................................................................4.3.4.24 degree of protection................................................................4.8.13 design of thermal power plant automation........................................... 4.2 detecting device....................................................................3.2.21 deviation alarm.....................................................................4.5.3 diagnostic and test software........................................................4.9.15 differential expansion monitor......................................................4.6.2.3 digital electro-hydraulic control (DEH).............................................4.3.4.3 digital computer....................................................................3.4.1.2 digital input (DI)..................................................................3.4.3.1 digital output (DO).................................................................3.4.3.3 digital signal......................................................................3.4.2.2direct digital control (DDC)........................................................3.3.16 discontinuous control system........................................................3.3.19 display.............................................................................3.4.2.4display for window..................................................................3.4.2.13 display instrument..................................................................3.2.26CRT display.........................................................................3.4.5.14 distributed control system (DCS)....................................................3.4.6 droop...............................................................................4.3.4.23Eeddy current probe..................................................................4.6.2.9 electric automation.................................................................3.1.2 electric control building ..........................................................4.7.3 electric-net control room...........................................................4.7.7 electro-hydraulic control (EHC).....................................................4.3.4.2 electro-hydraulic converter........................................................ 4.3.4.19electronics room....................................................................4.7.8 elevation flame detection...........................................................4.6.1.10 emergency trip system (ETS).........................................................4.3.4.8 engineer station....................................................................3.4.4.11 error...............................................................................3.2.12error of indication.................................................................3.2.13Ffast cut back (FCB).................................................................4.6.4fast valving........................................................................4.3.4.18 fault...............................................................................3.5.6 feedforward control.................................................................3.3.7feed-water control..................................................................4.3.2.1 fiducial error..................................................................... 3.2.14 firmware............................................................................3.4.1.24first out...........................................................................4.5.5 flame...............................................................................4.6.1.4flame envelope......................................................................4.6.1.5flame detector......................................................................4.6.1.7fossil fired power plant simulator..................................................4.9.1 fuctional fidelity..................................................................4.9.5fuel control........................................................................4.3.2.5fuel trip...........................................................................4.6.1.3full furnace flame detection........................................................4.6.1.11full scope high realism simulator...................................................4.9.2 function group control..............................................................4.4.1.1 function key........................................................................3.4.4.5furnace pressure contro.............................................................4.3.2.3 furnace purge.......................................................................4.6.1.15 furnace safetyguard supervisory system (FSSS).......................................4.6.1 fuzzy control.......................................................................3.3.10Ggeneric simulator...................................................................4.9.4H hardware............................................................................3.4.1.23hard copy...........................................................................3.4.4.2historical trend display............................................................3.4.2.10Iindication [of a measuring instrument]..............................................3.2.9 indicator ˈindicating instrument ...................................................3.2.27 individual burner flame detection...................................................4.6.1.9 information.........................................................................3.4.1.9input device ˈinput unit............................................................3.4.3.7 input/output ˄I/O ˅.................................................................3.4.3input-output device, input-output unit..............................................3.4.3.9 input variable..................................................................... 3.2.5integrating instrument .............................................................3.2.29intelligent terminal................................................................3.4.1.18interface ......................................................................... 3.4.1.10interlock ......................................................................... 4.6.3interlock control ................................................................. 4.6.6intrinsic error ................................................................... 3.2.16instructor station................................................................. 4.9.8instructor station software ........................................................4.9.14 I/O interface eguipment ............................................................4.9.12 Kkeyboard............................................................................3.4.4.4keyphasor transducer .............................................................. 4.6.2.8Llocal areanetwork (LAN)............................................................ 3.4.1.14 life................................................................................3.5.5light pen...........................................................................4.4.8limit alarm.........................................................................4.5.2load control of ball mill ......................................................... 4.3.3.3 load governing......................................................................4.3.4.10load limit .........................................................................4.3.4.11local control...................................................................... 4.2.2local control room ................................................................ 4.7.5logic control ..................................................................... 3.3.14loss of all flame ................................................................. 4.6.1.8loss of flame to a corner ..........................................................6.1.13。
微信客户端怎样应对弱网络

改善弱网络探索移动互联网下弱网络处理方式大纲介绍弱网络 移动网络快速重传HARQ 业界方案传输层应用层我们的方案物理层架构BSN 负责处理一个移动电话和网络交换子系统之间的通信流量和信令 SGSN 负责在它的地理位置服务区域内从移动台接收或向其发送数据包GGSN 负责在 GPRS 网络和外部包交换网络之间的互联手机SGSNGGSN GGSN互联网网站无线网络 核心网络DNSWAP 网关BSNMS环境电波 用户距离远误码率高信号问题 用户过多 误码包 用户移动 基站切换丢包率高用户数量 信令分配 丢包误码包不稳定的延迟基站距离 用户数量 拥塞控制不稳定的带宽MS 和BSN 间的问题Akimai数据分析July2010TCP丢包差别在1%丢包的定义:SACK、DUP ACK、超时重传统计数据连接成功后和实际使用情况有差别BER = 10-5BER = 10-6 Throughput (pkts/sec) 39.439 87.455 Success Probability 0.9892 0.999123.847 58.032 Transfer time of 5000 pkts.in secs.Wireless link has a bandwidth of 0.8 Mb and delay of 100 ms.Sour c e:“H A LA E LA A R A G”-“I m p r o v i n g T C P P e rf o r m a n c e o v e r M o b i l e N e t w o r k s” –“A C M C o m p u t i n g S u rv e y s, V o l. 34,N03,S e p2002,p p357-374”`✓移动互联网:10-4 到10-6✓有线以太网:10-12✓光纤:10-15 ✓BER:10-5 100k数据出现1bit错误✓设定MTU为1500 PER: 1.5%✓TCP/IP直接丢弃误码包✓原始无线链路的BER为10-4弱网络定义:和BSN 间丢包和误码率更高的情况业界方案HARQ Hybrid Automatic Repeat reQuest✓ARQ自动重传请求✓FEC前向纠错编码✓HARQ是3GPP的标准方案。
大学英语4unit2原文及翻译(...

大学英语4 unit 2 原文及翻译(College English 4, unit 2,original text and Translation)能看到、听到、感觉、闻到和说话的智能汽车?自己开车?这听起来像是一场梦,但计算机革命将把它变成现实。
能看、能听、有知觉、具嗅觉、会说话的智能汽车?还能自动驾驶?这听起来或许像是在做梦,但计算机革命正致力于把这一切变为现实。
智能汽车Michio Kaku1,即使汽车工业在过去七十年里基本保持不变,也即将感受到计算机革命的影响。
智能汽车米其奥?卡库即便是过去70年间基本上没有多少变化的汽车工业,也将感受到计算机革命的影响。
2汽车工业是二十世纪最赚钱、最强大的行业之一。
目前地球上有5亿辆汽车,每十个人就有一辆车。
汽车工业的销售额约为一兆美元,成为世界上最大的制造业。
汽车工业是20世纪最赚钱、最有影响力的产业之一。
目前世界上有5亿辆车,或者说每10人就有1辆车汽车工业的销售额达一万亿美元左右,从而成为世界上最大的制造业。
3这辆车及其行驶的道路将在二十一世纪彻底改变。
未来“智能汽车”的关键是传感器。
我们会看到车辆和道路,看到、听到、感觉到、闻到、说话和行为,”Bill Spreitzer预言,美国通用汽车公司的程序技术总监,这是未来智能汽车和智能公路设计。
汽车及其行驶的道路,将在21世纪发生重大变革。
未来”智能汽车”的关键在于传感器。
”我们会见到能看、能听、有知觉、具嗅觉、会说话并能采取行动的车辆与道路,“正在设计未来智能汽车和智能道路的通用汽车公司其项目的技术主任比尔?斯普雷扎预言道。
4美国每年大约有40000人死于交通事故。
在车祸中丧生或重伤的人数是如此之大,以至于我们再也懒得在报纸上提起这些事了。
这些死亡人数中有一半来自醉酒司机,还有许多来自粗心大意。
一辆智能汽车可以消除大部分车祸。
它可以感知司机是否喝醉了通过电子传感器,可以拿起空气中的酒精蒸气,并拒绝启动发动机。
2010 Nissan 日产 零排放的未来

Benefits To The Consumer
• True zero-emission vehicle • Affordable pricing • Lower Total Cost of Ownership than a comparable Internal Combustion Engine • Lower maintenance costs than an ICE vehicle (Less complexity, no engine, no oil changes)
SL: $33,720 (msrp)
+ + + + + + Photovoltaic solar panel spoiler Rearview camera Universal Garage Door Opener Cargo Cover Auto on/off headlamps Fog lamps
Speed
Low Cool
High
Climate control
ON
Heat
Climate control
ON
Heat
Nissan Confidential
Making Zero-emissions Affordable
2011 Nissan LEAF – MSRP starting at $32,780
Level I, Level II and DC Fast Charging
Type
Power Supply 120VAC
Single Phase
Charger Power 1.4kW 3.3kW
Charging Level Level 1
Charger Location
唐铭杰——XCP Congestion Control

Introduction
(4)TCP SACK是有M.Mathis等人在1995年提出的。也是关注一个窗口内
多个数据包丢失的情况。实现在一个RTT内选择重传多个丢失的数据包, 提高了TCP性能,是目前最好的ACK反馈机制。缺点为要修改TCP发接代码, 增加了TCP复杂性,不能大规模的应用
(5)TCP Vegas是由L.S.Brakmo等在1994年提出的一种新的拥塞控制策
RTT = XXXX Congestion window = yyyy Feedback = +10 RTT = XXXX
RTT = XXXX Congestion window = yyyy Feedback = +5
Congestion window = yyyy
Feedback = +10
The Protocol
bandwidth, Q persistent queue size
Proportional to spare bandwidth Also want to drain the persistent queue
Fairness controller
Convergence to min-max fairness If > 0, increase all flow with same throughput If < 0, decrease all flow the same portion of
Per-packet feedback
H_feedback = pi – ni pi is the positive feedback
ni is the negative feedback
天津理工大学 计算机网络题库

PART Ⅰ: ChoiceB 1. Which of the following services does not the transport layer provide for the application layer?A.In-order delivery of data segments between processesB.Best effort delivery of data segments between communicating hostsC.Multiplexing and demultiplexing of transport layer segmentsD.Congestion controlA 2. What are the two of the most important protocols in the Internet?A. TCP and IPB. TCP and UDPC. TCP and SMTPD. ARP and DNSC 3. The Internet provides two services to its distributed applications: a connection oriented reliable service and a ( ).A. connection oriented unreliable serviceB. connectionless reliable serviceC. connectionless unreliable serviceD. In order data transport serviceD 4. Processes on two different end systems communicate with each other by exchanging ( ) across the computer network.A. packetsB. datagramC. framesD. messagesA 5. The job of delivering the data in a transport-layer segment to the correct socket is called ( ).A. demultiplexingB. multiplexingC. TDMD. FDMC 6. Two important reasons that the Internet is organized as a hierarchy of networks for the purposes of routing are:A.Least cost and maximum free circuit availabilityB.Message complexity and speed of convergenceC.Scale and administrative autonomyD.Link cost changes and link failureB 7. Which of characters is not distance-vector algorithm’s characters?()A. iterativeB. globalC. asynchronousD. distributedD 8. The length of IPV6 address is ()bits.A. 32B. 48C. 64D. 128C 9. The host component of a CIDR address of the form a.b.c.d/25 can contain addresses for:A.225 hosts (minus “special” hosts)B.512 hosts (minus “special” hosts)C.2(32-25) hosts (minus “special” hosts)D.25 hosts (minus “special” hosts)C 10. The primary function of the address resolution protocol (ARP) that resides in Internet hosts androuters is:A.To provide LAN router functionsB.To translate between LAN addresses and physical interface addressesC.To translate IP addresses to LAN addressesD.To calculate the shortest path between two nodes on a LANA 11. The POP3 protocol runs over ____ and uses port ____.A. TCP 110B. UDP 110C. UDP 25D. TCP 25D 12.When a destination host transport layer receives data from the network layer, it unambiguouslyidentifies the appropriate process to pass the data to by using a triplet consisting of:A. Source port #, destination IP address, and source IP addressB. Destination port #, source port #, process ID#C. Destination port #, source port #, destination IP addressD. Destination port #, source port #, source IP addressD 13. From the list below, select the items found in the TCP segment structure that are not found in theUDP segment structure:A. Application Generated DataB. Destination Port #C. Source Port #D. Sequence #A 14. The RIP routing protocol is based on an algorithm that is:A. Based on information received only from link “neighbors”B. A link state algorithmC. An OSPF algorithmD. A centralized routing algorithmB 15. With an exterior routing protocol, which of the following issues generally dominates the routing decisions?A. Geographical distance between AS’sB. PolicyC. Number of AS’s traversedD. Current congestion levels in the AS’sA 1. End system are connected together by ____.A. communication linksB. application layerC. transport layerD. the network layerC 2. Which application’s NOT using TCP?A. SMTPB. HTTPC. DNSD. All of themB 3. In the polling protocols, the master node polls each of the nodes in a/an ____ fashion.A. randomB. appointedC. round-robinD. uncirculatedC 4. The DNS protocol runs over ____ and uses port ____.A. UDP 36B. TCP 36C. UDP 53D. TCP 53A 5. TCP provides a ____ service to its applications to eliminate the possibility of the sender over-flowingthe receiver’s buffer.A. flow-controlB. congestion controlC. reliability controlD. data connectionD 6. We can classify just about any multiple access protocol as belonging to one of three categories: channel partitioning protocols, random access protocols, and ____.A. address resolution protocolsB. Dynamic host configuration protocolsC. link-control protocolsD. taking-turns protocolsB 8. The maximum transfer unit(MTU) in Ethernet frame structure is ()byte .A. 1000B. 1500C. 800D. 2000B 9. The socket of UDP is identified by _____ and _______.A. source IP address and source port numberB. destination IP address and destination port number.C. source IP address and destination port number.D. destination IP address and source IP address.C 10. Which is not plug and play in the following four items?A. DHCPB. HubsC. RoutersD. SwitchesD 11.Which of routers is not default routers ?A. first-hop routerB. source routerC. destination routerD. second-hop routerB 13. ICMP is_____.A. the protocol of Application layerB. the protocol of network layerC. the protocol of transport layerD. not a part of TCP/IP protocolsB 14. As general, we has following channel partitioning protocols except ____.A. TDMB. CSMAC. FDMD.CDMAD 15. ____ is most used for error reporting.A. UDPB. SMTPC. FTPD. ICMPB 16. The header of IPV6 is ____byte.A. 20B. 40C. 60D. 80B 17. In the network layer these service are host-to-host service provided by ____. (B)A. the transport layer to the network layerB. the network layer to the transport layerC. the network layer to the network layerD. the transport layer to the transport layerA 18. If there is not enough memory to buffer an incoming packet , a policy that drop the arriving packet called ____.A. drop-tailB. packet lossC. protocolD. encapsulationC 19. In either case, a ____ receives routing protocol messages, which are used to configure its forwarding table.A. serverB. hostC. routerD. ModemD 20. Which of the following functions does not belong to PPP___.A. framingB. link-control protocolsC. network-control protocolsD. error correctionB 1. Which of the following services does the Internet network layer provide for the Internet transport layer?A.In-order delivery of data segments between processesB.Best effort delivery of data segments between communicating hostsC.Multiplexing and demultiplexing of transport layer segmentsD.Congestion controlD 2. The main task of the Internet’s Domain Name System (DNS) is to:A.Translate port numbers to IP addressesB.Specify the standards for Internet domain namesC.Provide an authority for registering domain namesD.Translate mnemonic(记忆的)names to IP addressesA 10. The FTP protocol runs over ____ and uses port ____.A. TCP 21B. TCP 80C. UDP 20D. TCP 110C 3.RDT3.0’s receiver FSM is same to:a) RDT1.0 b) RDT2.1 c) RDT2.2 d) RDT2.0B 4.The Transmission Control Protocol (TCP) provides which of the following services?a)End-to-end station addressingb)Application multiplexingc)Inter network routingd)Medium access control (MAC)D 6.Given that the requested information is not available at any intermediate databases, a non-iterated DNS query from a requesting host would follow the path:a)Root name server, local name server, authoritative name serverb)Authoritative name server, root name server, host name serverc)Local name server, root name server, local name server, authoritative name servere)Local name server, root name server, authoritative name serverA 8.lect the four essential steps, briefly described, for terminating a TCP connection between a client and a server, assuming that the initiating host is the client:(1)Client sends TCP segment with ACK0 and final sequence number(2)Client sends TCP segment with FIN =1 and goes into FIN_WAIT state(3)Server sends TCP segment to ACK the client’s FIN request and enters CLOSE_WAIT state(4)Server sends TCP segment with FIN=0(5)Server sends TCP segment with FIN=1(6)Client sends TCP segment with to ACK server’s FIN and enters second FIN_WAIT state(7)Client sends TCP segment with FIN=0a) 2,3,5,6 b) 5,1,2,3 c) 1,3,5,7 d) 2,3,4,6B 10.When compensating for link cost changes in the distance vector algorithm, it can generally be said that:a)Increased costs are propagated quickly, i.e., “bad news” travels fastb)Decreased costs are propagated rapidly, i.e., “good news” travels fastc)Decreased costs do not converged)None of the aboveB 14.As an IP datagram travels from its source to its destination:a)the source IP address is changed at each router to identify the sending routerb)the router uses the destination IP address to consult its routing tablec)the router does not use the IP addresses in the datagramd)the destination IP address is changed at each router to reflect the next hopC 15.From the list below, choose the bit pattern which could be a valid generator value for the CRC code (R) 11010:a)1110b)011010c)100101d)10011A 16.Consider sending a 1300 byte IPv4 datagram into a link that has an MTU of 500 bytes:a)Three fragments are created.b)Four fragments are created.c)Three fragments are created with offsets 0, 500 1000d)The last fragment consists of exactly 300 bytes of data from the original datagramC 17.Suppose one IPv6 router wants to send a datagram to another IPv6 router, but the two are connected together via an intervening IPv4 router. If the two routers use tunneling, then:a)The sending IPv6 router creates an IPv4 datagram and puts it in the data field of an IPv6datagram.b)The sending IPv6 router creates one or more IPv6 fragments, none of which is larger than themaximum size of an IPv4 datagram.c)The sending IPv6 router creates an IPv6 datagram and puts it in the data field of an IPv4datagram.d)The sending IPv6 router creates an IPv6 datagram and intervening IPv4 router will reject theIPv6 datagramD 18.Which of the following was an important consideration in the design of IPv6a)fixed length 40-byte header and specified options to decrease processing time at IPv6 nodesb)128-bit addresses to extend the address spacec)different types of service (flows) definedd)all of the aboveD 19.A network bridge table is used to perform the following:a)Mapping MAC addresses to bridge port numbersb)Forwarding frames directly to outbound ports for MAC addresses it handlesc)Filtering (discarding) frames that are not destined for MAC addresses it handlesd)All of the abovePART Ⅱ: True / False (1 points per question – total:20 points)1. The DNS server can update the records. (T)2. The TCP connection is a direct virtual pipe between the client’s socket and the server’s connection socket. (T)3. SMTP protocol connect the sender’s mail server and receiver’s mail server (T)4. Whereas a transport-layer protocol provides logical communication between processes running on different hosts, a network-layer protocol provides logical communication between hosts. (T)5. UDP and TCP also provide integrity checking by including right-detection fields in their headers. (F)6. If the application developer chooses UDP instead of TCP, then the application is not directly talking with IP. ( F )7. When we develop a new application, we must assign the application a port number. ( T )8. Real-tine applications, like Internet phone and video conferencing, react very poorly to TCP’s congestion control. ( T )9. The sender knows that a received ACK or NAK packet was generated in response to its most recently transmitted data packet. (T)10. To simplify terminology, when in an Internet context, we refer to the 4-PDU as a unit. (F)11. DV algorithm is essentially the only routing algorithm used in practice today in the Internet。
WinAC RTX 2010 快速入门概要

I CS LS TS Page 1WinAC RTX 2010 快速入门目录WinAC RTX 2010 快速入门 ............................................................................... 1 1WinAC RTX 的概念..................................................................................... 4 2WinAC RTX 的应用..................................................................................... 4 3 WinAC RTX 2010 的安装. (4)3.1WinAC RTX 2010 软件包 (4)3.2WinAC RTX 2010 安装的硬件需求 (5)3.3WinAC RTX 2010 安装的软件需求 (6)3.4WinAC RTX 2010 安装前的检查 (6)3.5WinAC RTX 2010 的安装过程 (7)3.6 WinAC RTX 2010 安装后系统的变化 (7)4WinLC RTX 的启停和操作 .......................................................................... 8 5WinAC RTX 的内部架构 ........................................................................... 11 6WinAC RTX 的配置................................................................................... 12 7WinAC RTX 在 Step 7 V5.X 中的组态 ..................................................... 18 8 WinAC RTX 在 TIA Portal 中的组态 (18)8.1PC Station 组态 (18)8.2 WinAC RTX 在 TIA Portal 中的组态 (20)I CS LS TS Page 21 WinAC RTX 的概念WinAC RTX 是可实现 S7 控制器 (S7-300/400 功能的软 PLC ,即运行于带RTX 实时扩展的 Windows 上的一个应用软件。
3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Congestion Control--Background Control--Background
Two sides of the same coin pre-allocate resources so that to avoid congestion precontrol congestion if (and when) is occurs
2011-6-8
Destiuter
Destination 2
Source 3 ISE-UJN(c) Zhenxiang Chen, University of Jinan
4
Queuing Technology
Originally TCP assumed FIFO (First-In(First-InFirstFirst-Out) queuing
Network Congestion Control
Advanced Network Architecture For Postgraduates Chen Zhenxiang and Yang Bo. School of Information Science and Engineering. University of Jinan
1 2 4 8
D
A
D D
A A
D D
D A
D A A A
Dest
2011-6-8
ISE-UJN(c) Zhenxiang Chen, University of Jinan
10
TCP Slow Start
Rate Timeouts
halved t
Exponential “slow start” Slow start in operation until it reaches half of previous cwnd.
2011-6-8
ISE-UJN(c) Zhenxiang Chen, University of Jinan
11
Slow Start Threshold (ssthresh)
2011-6-8 ISE-UJN(c) Zhenxiang Chen, University of Jinan 6
Additive Increase/Multiplicative Decrease
TCP is modified to have no more than(only) the minimum of the congestion window and the advertised window bytes of unacknowledged data. MaxWindow = MIN(CongestionWindow, AdvertisedWindow) MIN(CongestionWindow, AdvertisedWindow) EffectiveWindow = MaxWindow - (LastByteSent - LastByteAcked). LastByteAcked). TCP source sets the CongestionWindow based on the level of congestion it perceives to exist in the network. This involves decreasing the congestion window when the level of congestion goes up, and increasing the congestion window when the level of congestion goes down. The mechanism is commonly called AIMD--additive increase / AIMD-multiplicative decrease. “cwnd” follows additive increase/multiplicative decrease (AIMD) (线性加 cwnd” AIMD) (线性加 乘性减-慢增快减) 乘性减-慢增快减) On receipt of Ack: Ack: cwnd += 1 ISE-UJN(c) cwnd *= University On packet loss (timeout): Zhenxiang Chen, 0.5
Router 1.5-Mbps T1 link Source 2
Destination
Two points of implementation hosts at the edges of the network (transport protocol) routers inside the network (queuing discipline) Underlying service model bestbest-effort (Now) multiple QoS (qualities of service ) (Now and later)
does not discriminate between traffic sources
Fair Queuing (FQ)
Explicitly segregates traffic based on flows Ensures no flow captures more than its share of capacity Variation: weighted fair queuing (WFQ) (WFQ)
2011-6-8
Throughput/delay
Optimal load
Load
ISE-UJN(c) Zhenxiang Chen, University of Jinan
3
Congestion Control Framework
Keeps network operating at full capacity, but minimizes packet loss maximize “goodput” goodput” Two cases:
t
2011-6-8
ISE-UJN(c) Zhenxiang Chen, University of Jinan
9
TCP AIMD: Slow Start (慢启)
Idea: Begin with CongestionWindow (cwnd) = 1 packet; For each ACK received (one RTT), increase the cwnd by 1; Results in cwnd pattern of: 1, 2, 4, 8, 16, 32, …… 32, Takes time proportional to log2W to reach a window of W ( may be longer if ACK delayed ). Src
of Jinan 7
2011-6-8
AIMD: Additive Increase
Src
D A D D A A D D D A A A
Dest The cwnd is set to 1 MSS (Maximum Segment Size) for a slow start. Actually, TCP uses bytes, not segments to count: When ACK is received: cwnd += MSS * (MSS/cwnd) (in Bytes)
self-interference: self-interference: if stream > link capacity
typical for residential access links
drop own packets
mutual interference: multiple streams competing for bottleneck interference: bandwidth
loss as congestion indicator unfairness rude streams push aside polite ones
Source 1 Router
Two common approaches: rate-based: rate-based: control rate of traffic window-based: window-based: limit number of unacknowledged packets-packets-window size controls rate
2011-6-8 ISE-UJN(c) Zhenxiang Chen, University of Jinan 8
AIMD: Multiplicative Decrease Leads to the TCP “ sawtooth ”
Rate
Timeouts
halved
Could take a long time to get started!
2011-6-8 Flow 1 Flow 2 Round-robin service Flow 3
Flow 4
ISE-UJN(c) Zhenxiang Chen, University of Jinan
5
Section 1:
TCP Congestion Control
TCP uses a round-trip delay estimate for its adaptive roundwindowing scheme to transmit data reliably over an unreliable network with time varying bandwidth. In other words, send at the rate of the slowest component: network or receiver. receiver. TCP uses a CongestionWindow (cwnd) in the sender side to cwnd) do congestion avoidance. The congestion window indicates the maximum amount of data that can be sent out on a connection without being acknowledged. It is congestion control's counterpart to flow control's AdvertisedWindow. AdvertisedWindow. The AdvertisedWindow is sent by the receiving side of the connection, How about the CongestionWindow(cwnd)? CongestionWindow(cwnd)?