外文翻译原文

外文翻译原文
外文翻译原文

5.6 The Network Layer in the Internet

Before getting into the specifics of the network layer in the Internet, it is worth taking at look at the principles that drove its design in the past and made it the success that it is today. All too often, nowadays, people seem to have forgotten them. These principles are enumerated and discussed in RFC 1958, which is well worth reading (and should be mandatory for all protocol designers—with a final exam at the end). This RFC draws heavily on ideas found in (Clark, 1988; and Saltzer et al., 1984). We will now summarize what we consider to be the top 10 principles (from most important to least important).

1.Make sure it works. Do not finalize the design or standard until

multiple prototypes have successfully communicated with each other.

All too often designers first write a 1000-page standard, get it approved, then discover it is deeply flawed and does not work. Then they write version 1.1 of the standard. This is not the way to go.

2.Keep it simple. When in doubt, use the simplest solution. William

of Occam stated this principle (Occam's razor) in the 14th century.

Put in modern terms: fight features. If a feature is not absolutely essential, leave it out, especially if the same effect can be

achieved by combining other features.

3.Make clear choices.If there are several ways of doing the same thing,

choose one. Having two or more ways to do the same thing is looking for trouble. Standards often have multiple options or modes or

parameters because several powerful parties insist that their way is best. Designers should strongly resist this tendency. Just say no.

4.Exploit modularity. This principle leads directly to the idea of

having protocol stacks, each of whose layers is independent of all the other ones. In this way, if circumstances that require one

module or layer to be changed, the other ones will not be affected.

5.Expect heterogeneity. Different types of hardware, transmission

facilities, and applications will occur on any large network. To handle them, the network design must be simple, general, and

flexible.

6.Avoid static options and parameters.If parameters are unavoidable

(e.g., maximum packet size), it is best to have the sender and

receiver negotiate a value than defining fixed choices.

7.Look for a good design; it need not be perfect.Often the designers

have a good design but it cannot handle some weird special case.

Rather than messing up the design, the designers should go with the

good design and put the burden of working around it on the people with the strange requirements.

8.Be strict when sending and tolerant when receiving.In other words,

only send packets that rigorously comply with the standards, but expect incoming packets that may not be fully conformant and try to deal with them.

9.Think about scalability. If the system is to handle millions of

hosts and billions of users effectively, no centralized databases of any kind are tolerable and load must be spread as evenly as

possible over the available resources.

10.Consider performance and cost. If a network has poor performance

or outrageous costs, nobody will use it.

Let us now leave the general principles and start looking at the details of the Internet's network layer. At the network layer, the Internet can be viewed as a collection of subnetworks or Autonomous Systems (ASes) that are interconnected. There is no real structure, but several major backbones exist. These are constructed from high-bandwidth lines and fast routers. Attached to the backbones are regional (midlevel) networks, and attached to these regional networks are the LANs at many universities, companies, and Internet service providers. A sketch of this

quasi-hierarchical organization is given in Fig. 5-52.

Figure 5-52. The Internet is an interconnected collection of many networks.

The glue that holds the whole Internet together is the network layer protocol, IP (Internet Protocol). Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind.

A good way to think of the network layer is this. Its job is to provide

a best-efforts (i.e., not guaranteed) way to transport datagrams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.

Communication in the Internet works as follows. The transport layer takes data streams and breaks them up into datagrams. In theory, datagrams can be up to 64 Kbytes each, but in practice they are usually not more than 1500 bytes (so they fit in one Ethernet frame). Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the network layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process' input stream. As can be seen from Fig. 5-52, a packet originating at host 1 has to traverse six networks to get to host 2. In practice, it is often much more than six.

5.6.1 The IP Protocol

An appropriate place to start our study of the network layer in the Internet is the format of the IP datagrams themselves. An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part and a variable length optional part. The header format is shown in Fig. 5-53. It is transmitted in big-endian order: from left to right, with the high-order bit of the Version field going first. (The SPARC is big endian; the Pentium is little-endian.) On little endian machines, software conversion is required on both transmission and reception.

Figure 5-53. The IPv4 (Internet Protocol) header.

The Version field keeps track of which version of the protocol the datagram belongs to. By including the version in each datagram, it becomes possible to have the transition between versions take years, with some machines running the old version and others running the new one. Currently a

transition between IPv4 and IPv6 is going on, has already taken years, and is by no means close to being finished (Durand, 2001; Wiljakka, 2002; and Waddington and Chang, 2002). Some people even think it will never happen (Weiser, 2001). As an aside on numbering, IPv5 was an experimental real-time stream protocol that was never widely used.

Since the header length is not constant, a field in the header, IHL, is provided to tell how long the header is, in 32-bit words. The minimum value is 5, which applies when no options are present. The maximum value of this 4-bit field is 15, which limits the header to 60 bytes, and thus the Options field to 40 bytes. For some options, such as one that records the route a packet has taken, 40 bytes is far too small, making that option useless.

The Type of service field is one of the few fields that has changed its meaning (slightly) over the years. It was and is still intended to distinguish between different classes of service. Various combinations of reliability and speed are possible. For digitized voice, fast delivery beats accurate delivery. For file transfer, error-free transmission is more important than fast transmission.

Originally, the 6-bit field contained (from left to right), a three-bit Precedence field and three flags, D, T, and R. The Precedence field was a priority, from 0 (normal) to 7 (network control packet). The three flag bits allowed the host to specify what it cared most about from the set {Delay, Throughput, Reliability}. In theory, these fields allow routers to make choices between, for example, a satellite link with high throughput and high delay or a leased line with low throughput and low delay. In practice, current routers often ignore the Type of service field altogether.

Eventually, IETF threw in the towel and changed the field slightly to accommodate differentiated services. Six of the bits are used to indicate which of the service classes discussed earlier each packet belongs to. These classes include the four queueing priorities, three discard probabilities, and the historical classes.

The Total length includes everything in the datagram—both header and data. The maximum length is 65,535 bytes. At present, this upper limit is tolerable, but with future gigabit networks, larger datagrams may be needed.

The Identification field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. All the fragments of a datagram contain the same Identification value.

Next comes an unused bit and then two 1-bit fields. DF stands for Don't Fragment. It is an order to the routers not to fragment the datagram because the destination is incapable of putting the pieces back together again. For example, when a computer boots, its ROM might ask for a memory image to be sent to it as a single datagram. By marking the datagram with the DF bit, the sender knows it will arrive in one piece, even if this means that the datagram must avoid a small-packet network on the best path and take a suboptimal route. All machines are required to accept fragments of 576 bytes or less.

MF stands for More Fragments. All fragments except the last one have this bit set. It is needed to know when all fragments of a datagram have arrived.

The Fragment offset tells where in the current datagram this fragment belongs. All fragments except the last one in a datagram must be a multiple of 8 bytes, the elementary fragment unit. Since 13 bits are provided, there is a maximum of 8192 fragments per datagram, giving a maximum datagram length of 65,536 bytes, one more than the Total length field.

The Time to live field is a counter used to limit packet lifetimes. It is supposed to count time in seconds, allowing a maximum lifetime of 255 sec. It must be decremented on each hop and is supposed to be decremented multiple times when queued for a long time in a router. In practice, it just counts hops. When it hits zero, the packet is discarded and a warning packet is sent back to the source host. This feature prevents datagrams from wandering around forever, something that otherwise might happen if the routing tables ever become corrupted.

When the network layer has assembled a complete datagram, it needs to know what to do with it. The Protocol field tells it which transport process to give it to. TCP is one possibility, but so are UDP and some others. The numbering of protocols is global across the entire Internet. Protocols and other assigned numbers were formerly listed in RFC 1700, but nowadays they are contained in an on-line data base located at https://www.360docs.net/doc/b0888571.html,.

The Header checksum verifies the header only. Such a checksum is useful for detecting errors generated by bad memory words inside a router. The algorithm is to add up all the 16-bit halfwords as they arrive, using one's complement arithmetic and then take the one's complement of the result. For purposes of this algorithm, the Header checksum is assumed to be zero upon arrival. This algorithm is more robust than using a normal add. Note that the Header checksum must be recomputed at each hop because at least one field always changes (the Time to live field), but tricks can be used to speed up the computation.

The Source address and Destination address indicate the network number and host number. We will discuss Internet addresses in the next section. The Options field was designed to provide an escape to allow subsequent versions of the protocol to include information not present in the original design, to permit experimenters to try out new ideas, and to avoid allocating header bits to information that is rarely needed. The options are variable length. Each begins with a 1-byte code identifying the option. Some options are followed by a 1-byte option length field, and then one or more data bytes. The Options field is padded out to a multiple of four bytes. Originally, five options were defined, as listed in Fig. 5-54, but since then some new ones have been added. The current complete list is now maintained on-line at https://www.360docs.net/doc/b0888571.html,/assignments/ip-parameters.

Figure 5-54. Some of the IP options.

The Security option tells how secret the information is. In theory, a military router might use this field to specify not to route through certain countries the military considers to be ''bad guys.'' In practice, all routers ignore it, so its only practical function is to help spies find the good stuff more easily.

The Strict source routing option gives the complete path from source to destination as a sequence of IP addresses. The datagram is required to follow that exact route. It is most useful for system managers to send emergency packets when the routing tables are corrupted, or for making timing measurements.

The Loose source routing option requires the packet to traverse the list of routers specified, and in the order specified, but it is allowed to pass through other routers on the way. Normally, this option would only provide a few routers, to force a particular path. For example, to force a packet from London to Sydney to go west instead of east, this option might specify routers in New York, Los Angeles, and Honolulu. This option is most useful when political or economic considerations dictate passing through or avoiding certain countries.

The Record route option tells the routers along the path to append their IP address to the option field. This allows system managers to track down

bugs in the routing algorithms (''Why are packets from Houston to Dallas visiting Tokyo first?''). When the ARPANET was first set up, no packet ever passed through more than nine routers, so 40 bytes of option was ample. As mentioned above, now it is too small.

Finally, the Timestamp option is like the Record route option, except that in addition to recording its 32-bit IP address, each router also records a 32-bit timestamp. This option, too, is mostly for debugging routing algorithms.

5.6.2 IP Addresses

Every host and router on the Internet has an IP address, which encodes its network number and host number. The combination is unique: in principle, no two machines on the Internet have the same IP address. All IP addresses are 32 bits long and are used in the Source address and Destination address fields of IP packets. It is important to note that an IP address does not actually refer to a host. It really refers to a network interface, so if a host is on two networks, it must have two IP addresses. However, in practice, most hosts are on one network and thus have one IP address.

For several decades, IP addresses were divided into the five categories listed in Fig. 5-55. This allocation has come to be called classfuladdressing.Itisno longer used, but references to it in the literature are still common. We will discuss the replacement of classful addressing shortly.

Figure 5-55. IP address formats.

The class A, B, C, and D formats allow for up to 128 networks with 16 million hosts each, 16,384 networks with up to 64K hosts, and 2 million networks (e.g., LANs) with up to 256 hosts each (although a few of these are special).

Also supported is multicast, in which a datagram is directed to multiple hosts. Addresses beginning with 1111 are reserved for future use. Over 500,000 networks are now connected to the Internet, and the number grows every year. Network numbers are managed by a nonprofit corporation called ICANN (Internet Corporation for Assigned Names and Numbers) to avoid conflicts. In turn, ICANN has delegated parts of the address space to various regional authorities, which then dole out IP addresses to ISPs and other companies.

Network addresses, which are 32-bit numbers, are usually written in dotted decimal notation. In this format, each of the 4 bytes is written in decimal, from 0 to 255. For example, the 32-bit hexadecimal address C0290614 is written as 192.41.6.20. The lowest IP address is 0.0.0.0 and the highest is 255.255.255.255.

The values 0 and -1 (all 1s) have special meanings, as shown in Fig. 5-56. The value 0 means this network or this host. The value of -1 is used as a broadcast address to mean all hosts on the indicated network.

Figure 5-56. Special IP addresses.

The IP address 0.0.0.0 is used by hosts when they are being booted. IP addresses with 0 as network number refer to the current network. These addresses allow machines to refer to their own network without knowing its number (but they have to know its class to know how many 0s to include). The address consisting of all 1s allows broadcasting on the local network, typically a LAN. The addresses with a proper network number and all 1s in the host field allow machines to send broadcast packets to distant LANs anywhere in the Internet (although many network administrators disable this feature). Finally, all addresses of the form 127.xx.yy.zz are reserved for loopback testing. Packets sent to that address are not put out onto the wire; they are processed locally and treated as incoming packets. This allows packets to be sent to the local network without the sender knowing its number.

1外文文献翻译原文及译文汇总

华北电力大学科技学院 毕业设计(论文)附件 外文文献翻译 学号:121912020115姓名:彭钰钊 所在系别:动力工程系专业班级:测控技术与仪器12K1指导教师:李冰 原文标题:Infrared Remote Control System Abstract 2016 年 4 月 19 日

红外遥控系统 摘要 红外数据通信技术是目前在世界范围内被广泛使用的一种无线连接技术,被众多的硬件和软件平台所支持。红外收发器产品具有成本低,小型化,传输速率快,点对点安全传输,不受电磁干扰等特点,可以实现信息在不同产品之间快速、方便、安全地交换与传送,在短距离无线传输方面拥有十分明显的优势。红外遥控收发系统的设计在具有很高的实用价值,目前红外收发器产品在可携式产品中的应用潜力很大。全世界约有1亿5千万台设备采用红外技术,在电子产品和工业设备、医疗设备等领域广泛使用。绝大多数笔记本电脑和手机都配置红外收发器接口。随着红外数据传输技术更加成熟、成本下降,红外收发器在短距离通讯领域必将得到更广泛的应用。 本系统的设计目的是用红外线作为传输媒质来传输用户的操作信息并由接收电路解调出原始信号,主要用到编码芯片和解码芯片对信号进行调制与解调,其中编码芯片用的是台湾生产的PT2262,解码芯片是PT2272。主要工作原理是:利用编码键盘可以为PT2262提供的输入信息,PT2262对输入的信息进行编码并加载到38KHZ的载波上并调制红外发射二极管并辐射到空间,然后再由接收系统接收到发射的信号并解调出原始信息,由PT2272对原信号进行解码以驱动相应的电路完成用户的操作要求。 关键字:红外线;编码;解码;LM386;红外收发器。 1 绪论

ASP外文翻译原文

https://www.360docs.net/doc/b0888571.html, https://www.360docs.net/doc/b0888571.html, 是一个统一的 Web 开发模型,它包括您使用尽可能少的代码生成企业级 Web 应用程序所必需的各种服务。https://www.360docs.net/doc/b0888571.html, 作为 .NET Framework 的一部分提供。当您编写 https://www.360docs.net/doc/b0888571.html, 应用程序的代码时,可以访问 .NET Framework 中的类。您可以使用与公共语言运行库 (CLR) 兼容的任何语言来编写应用程序的代码,这些语言包括 Microsoft Visual Basic、C#、JScript .NET 和 J#。使用这些语言,可以开发利用公共语言运行库、类型安全、继承等方面的优点的https://www.360docs.net/doc/b0888571.html, 应用程序。 https://www.360docs.net/doc/b0888571.html, 包括: ?页和控件框架 ?https://www.360docs.net/doc/b0888571.html, 编译器 ?安全基础结构 ?状态管理功能 ?应用程序配置 ?运行状况监视和性能功能 ?调试支持 ?XML Web services 框架 ?可扩展的宿主环境和应用程序生命周期管理 ?可扩展的设计器环境 https://www.360docs.net/doc/b0888571.html, 页和控件框架是一种编程框架,它在 Web 服务器上运行,可以动态地生成和呈现 https://www.360docs.net/doc/b0888571.html, 网页。可以从任何浏览器或客户端设备请求 https://www.360docs.net/doc/b0888571.html, 网页,https://www.360docs.net/doc/b0888571.html, 会向请求浏览器呈现标记(例如 HTML)。通常,您可以对多个浏览器使用相同的页,因为 https://www.360docs.net/doc/b0888571.html, 会为发出请求的浏览器呈现适当的标记。但是,您可以针对诸如 Microsoft Internet Explorer 6 的特定浏览器设计https://www.360docs.net/doc/b0888571.html, 网页,并利用该浏览器的功能。https://www.360docs.net/doc/b0888571.html, 支持基于 Web 的设备(如移动电话、手持型计算机和个人数字助理 (PDA))的移动控件。

毕业设计外文翻译附原文

外文翻译 专业机械设计制造及其自动化学生姓名刘链柱 班级机制111 学号1110101102 指导教师葛友华

外文资料名称: Design and performance evaluation of vacuum cleaners using cyclone technology 外文资料出处:Korean J. Chem. Eng., 23(6), (用外文写) 925-930 (2006) 附件: 1.外文资料翻译译文 2.外文原文

应用旋风技术真空吸尘器的设计和性能介绍 吉尔泰金,洪城铱昌,宰瑾李, 刘链柱译 摘要:旋风型分离器技术用于真空吸尘器 - 轴向进流旋风和切向进气道流旋风有效地收集粉尘和降低压力降已被实验研究。优化设计等因素作为集尘效率,压降,并切成尺寸被粒度对应于分级收集的50%的效率进行了研究。颗粒切成大小降低入口面积,体直径,减小涡取景器直径的旋风。切向入口的双流量气旋具有良好的性能考虑的350毫米汞柱的低压降和为1.5μm的质量中位直径在1米3的流量的截止尺寸。一使用切向入口的双流量旋风吸尘器示出了势是一种有效的方法,用于收集在家庭中产生的粉尘。 摘要及关键词:吸尘器; 粉尘; 旋风分离器 引言 我们这个时代的很大一部分都花在了房子,工作场所,或其他建筑,因此,室内空间应该是既舒适情绪和卫生。但室内空气中含有超过室外空气因气密性的二次污染物,毒物,食品气味。这是通过使用产生在建筑中的新材料和设备。真空吸尘器为代表的家电去除有害物质从地板到地毯所用的商用真空吸尘器房子由纸过滤,预过滤器和排气过滤器通过洁净的空气排放到大气中。虽然真空吸尘器是方便在使用中,吸入压力下降说唱空转成比例地清洗的时间,以及纸过滤器也应定期更换,由于压力下降,气味和细菌通过纸过滤器内的残留粉尘。 图1示出了大气气溶胶的粒度分布通常是双峰形,在粗颗粒(>2.0微米)模式为主要的外部来源,如风吹尘,海盐喷雾,火山,从工厂直接排放和车辆废气排放,以及那些在细颗粒模式包括燃烧或光化学反应。表1显示模式,典型的大气航空的直径和质量浓度溶胶被许多研究者测量。精细模式在0.18?0.36 在5.7到25微米尺寸范围微米尺寸范围。质量浓度为2?205微克,可直接在大气气溶胶和 3.85至36.3μg/m3柴油气溶胶。

毕业设计外文翻译原文.

Optimum blank design of an automobile sub-frame Jong-Yop Kim a ,Naksoo Kim a,*,Man-Sung Huh b a Department of Mechanical Engineering,Sogang University,Shinsu-dong 1,Mapo-ku,Seoul 121-742,South Korea b Hwa-shin Corporation,Young-chun,Kyung-buk,770-140,South Korea Received 17July 1998 Abstract A roll-back method is proposed to predict the optimum initial blank shape in the sheet metal forming process.The method takes the difference between the ?nal deformed shape and the target contour shape into account.Based on the method,a computer program composed of a blank design module,an FE-analysis program and a mesh generation module is developed.The roll-back method is applied to the drawing of a square cup with the ˉange of uniform size around its periphery,to con?rm its validity.Good agreement is recognized between the numerical results and the published results for initial blank shape and thickness strain distribution.The optimum blank shapes for two parts of an automobile sub-frame are designed.Both the thickness distribution and the level of punch load are improved with the designed blank.Also,the method is applied to design the weld line in a tailor-welded blank.It is concluded that the roll-back method is an effective and convenient method for an optimum blank shape design.#2000Elsevier Science S.A.All rights reserved. Keywords:Blank design;Sheet metal forming;Finite element method;Roll-back method

土木外文翻译原文和译文

A convection-conduction model for analysis of the freeze-thaw conditions in the surrounding rock wall of a tunnel in permafrost regions Abstract Based on the analyses of fundamental meteorological and hydrogeological conditions at the site of a tunnel in the cold regions, a combined convection-conduction model for air flow in the tunnel and temperature field in the surrounding has been constructed. Using the model, the air temperature distribution in the Xiluoqi No. 2 Tunnel has been simulated numerically. The simulated results are in agreement with the data observed. Then, based on the in situ conditions of sir temperature, atmospheric pressure, wind force, hydrogeology and engineering geology, the air-temperature relationship between the temperature on the surface of the tunnel wall and the air temperature at the entry and exit of the tunnel has been obtained, and the freeze-thaw conditions at the Dabanshan Tunnel which is now under construction is predicted. Keywords: tunnel in cold regions, convective heat exchange and conduction, freeze-thaw. A number of highway and railway tunnels have been constructed in the permafrost regions and their neighboring areas in China. Since the hydrological and thermal conditions changed after a tunnel was excavated,the surrounding wall rock materials often froze, the frost heaving caused damage to the liner layers and seeping water froze into ice diamonds,which seriously interfered with the communication and transportation. Similar problems of the freezing damage in the tunnels also appeared in other countries like Russia, Norway and Japan .Hence it is urgent to predict the freeze-thaw conditions in the surrounding rock materials and provide a basis for the design,construction and

中国的对外贸易外文翻译及原文

外文翻译 原文 Foreign T rade o f China Material Source:W anfang Database Author:Hitomi Iizaka 1.Introduction On December11,2001,China officially joined the World T rade Organization(WTO)and be c a me its143rd member.China’s presence in the worl d economy will continue to grow and deepen.The foreign trade sector plays an important andmultifaceted role in China’s economic development.At the same time, China’s expanded role in the world economy is beneficial t o all its trading partners. Regions that trade with China benefit from cheaper and mor e varieties of imported consumer goods,raw materials and intermediate products.China is also a large and growing export market.While the entry of any major trading nation in the global trading system can create a process of adjustment,the o u t c o me is fundamentally a win-win situation.In this p aper we would like t o provide a survey of the various institutions,laws and characteristics of China’s trade.Among some of the findings, we can highlight thefollowing: ?In2001,total trade to gross domestic pr oduct(GDP)ratio in China is44% ?In2001,47%of Chinese trade is processed trade1 ?In2001,51%of Chinese trade is conduct ed by foreign firms in China2 ?In2001,36%of Chinese exports originate from Gu an gdon g province ?In2001,39%of China’s exports go through Hong Kong to be re-exported elsewhere 2.Evolution of China’s Trade Regime Equally remarkable are the changes in the commodity composition of China’s exports and imports.Table2a shows China’s annu al export volumes of primary goods and manufactured goods over time.In1980,primary goods accounted for 50.3%of China’s exports and manufactured goods accounted for49.7%.Although the share of primary good declines slightly during the first half of1980’s,it remains at50.6%in1985.Since then,exports of manufactured goods have grown at a much

【最新推荐】应急法律外文文献翻译原文+译文

文献出处:Thronson P. Toward Comprehensive Reform of America’s Emergency Law Regime [J]. University of Michigan Journal of Law Reform, 2013, 46(2). 原文 TOWARD COMPREHENSIVE REFORM OF AMERICA’S EMERGENCY LAW REGIME Patrick A. Thronson Unbenownst to most Americans, the United States is presently under thirty presidentially declared states of emergency. They confer vast powers on the Executive Branch, including the ability to financially incapacitate any person or organization in the United States, seize control of the nation’s communications infrastructure, mobilize military forces, expand the permissible size of the military without congressional authorization, and extend tours of duty without consent from service personnel. Declared states of emergency may also activate Presidential Emergency Action Documents and other continuity-of-government procedures, which confer powers on the President—such as the unilateral suspension of habeas corpus—that appear fundamentally opposed to the American constitutional order.

毕业设计(论文)外文资料翻译〔含原文〕

南京理工大学 毕业设计(论文)外文资料翻译 教学点:南京信息职业技术学院 专业:电子信息工程 姓名:陈洁 学号: 014910253034 外文出处:《 Pci System Architecture 》 (用外文写) 附件: 1.外文资料翻译译文;2.外文原文。 指导教师评语: 该生外文翻译没有基本的语法错误,用词准确,没 有重要误译,忠实原文;译文通顺,条理清楚,数量与 质量上达到了本科水平。 签名: 年月日 注:请将该封面与附件装订成册。

附件1:外文资料翻译译文 64位PCI扩展 1.64位数据传送和64位寻址:独立的能力 PCI规范给出了允许64位总线主设备与64位目标实现64位数据传送的机理。在传送的开始,如果回应目标是一个64位或32位设备,64位总线设备会自动识别。如果它是64位设备,达到8个字节(一个4字)可以在每个数据段中传送。假定是一串0等待状态数据段。在33MHz总线速率上可以每秒264兆字节获取(8字节/传送*33百万传送字/秒),在66MHz总线上可以528M字节/秒获取。如果回应目标是32位设备,总线主设备会自动识别并且在下部4位数据通道上(AD[31::00])引导,所以数据指向或来自目标。 规范也定义了64位存储器寻址功能。此功能只用于寻址驻留在4GB地址边界以上的存储器目标。32位和64位总线主设备都可以实现64位寻址。此外,对64位寻址反映的存储器目标(驻留在4GB地址边界上)可以看作32位或64位目标来实现。 注意64位寻址和64位数据传送功能是两种特性,各自独立并且严格区分开来是非常重要的。一个设备可以支持一种、另一种、都支持或都不支持。 2.64位扩展信号 为了支持64位数据传送功能,PCI总线另有39个引脚。 ●REQ64#被64位总线主设备有效表明它想执行64位数据传送操作。REQ64#与FRAME#信号具有相同的时序和间隔。REQ64#信号必须由系统主板上的上拉电阻来支持。当32位总线主设备进行传送时,REQ64#不能又漂移。 ●ACK64#被目标有效以回应被主设备有效的REQ64#(如果目标支持64位数据传送),ACK64#与DEVSEL#具有相同的时序和间隔(但是直到REQ64#被主设备有效,ACK64#才可被有效)。像REQ64#一样,ACK64#信号线也必须由系统主板上的上拉电阻来支持。当32位设备是传送目标时,ACK64#不能漂移。 ●AD[64::32]包含上部4位地址/数据通道。 ●C/BE#[7::4]包含高4位命令/字节使能信号。 ●PAR64是为上部4个AD通道和上部4位C/BE信号线提供偶校验的奇偶校验位。 以下是几小结详细讨论64位数据传送和寻址功能。 3.在32位插入式连接器上的64位卡

英文翻译与英文原文.陈--

翻译文献:INVESTIGATION ON DYNAMIC PERFORMANCE OF SLIDE UNIT IN MODULAR MACHINE TOOL (对组合机床滑台动态性能的调查报告) 文献作者:Peter Dransfield, 出处:Peter Dransfield, Hydraulic Control System-Design and Analysis of TheirDynamics, Springer-Verlag, 1981 翻译页数:p139—144 英文译文: 对组合机床滑台动态性能的调查报告 【摘要】这一张纸处理调查利用有束缚力的曲线图和状态空间分析法对组合机床滑台的滑动影响和运动平稳性问题进行分析与研究,从而建立了滑台的液压驱动系统一自调背压调速系统的动态数学模型。通过计算机数字仿真系统,分析了滑台产生滑动影响和运动不平稳的原因及主要影响因素。从那些中可以得出那样的结论,如果能合理地设计液压缸和自调背压调压阀的结构尺寸. 本文中所使用的符号如下: s1-流源,即调速阀出口流量; S el—滑台滑动摩擦力 R一滑台等效粘性摩擦系数: I1—滑台与油缸的质量 12—自调背压阀阀心质量 C1、c2—油缸无杆腔及有杆腔的液容; C2—自调背压阀弹簧柔度; R1, R2自调背压阀阻尼孔液阻, R9—自调背压阀阀口液阻 S e2—自调背压阀弹簧的初始预紧力; I4, I5—管路的等效液感 C5、C6—管路的等效液容: R5, R7-管路的等效液阻; V3, V4—油缸无杆腔及有杆腔内容积; P3, P4—油缸无杆腔及有杆腔的压力 F—滑台承受负载, V—滑台运动速度。本文采用功率键合图和状态空间分折法建立系统的运动数学模型,滑台的动态特性可以能得到显著改善。

外文翻译原文

204/JOURNAL OF BRIDGE ENGINEERING/AUGUST1999

JOURNAL OF BRIDGE ENGINEERING /AUGUST 1999/205 ends.The stress state in each cylindrical strip was determined from the total potential energy of a nonlinear arch model using the Rayleigh-Ritz method. It was emphasized that the membrane stresses in the com-pression region of the curved models were less than those predicted by linear theory and that there was an accompanying increase in ?ange resultant force.The maximum web bending stress was shown to occur at 0.20h from the compression ?ange for the simple support stiffness condition and 0.24h for the ?xed condition,where h is the height of the analytical panel.It was noted that 0.20h would be the optimum position for longitudinal stiffeners in curved girders,which is the same as for straight girders based on stability requirements.From the ?xed condition cases it was determined that there was no signi?cant change in the membrane stresses (from free to ?xed)but that there was a signi?cant effect on the web bend-ing stresses.Numerical results were generated for the reduc-tion in effective moment required to produce initial yield in the ?anges based on curvature and web slenderness for a panel aspect ratio of 1.0and a web-to-?ange area ratio of 2.0.From the results,a maximum reduction of about 13%was noted for a /R =0.167and about 8%for a /R =0.10(h /t w =150),both of which would correspond to extreme curvature,where a is the length of the analytical panel (modeling the distance be-tween transverse stiffeners)and R is the radius of curvature.To apply the parametric results to developing design criteria for practical curved girders,the de?ections and web bending stresses that would occur for girders with a curvature corre-sponding to the initial imperfection out-of-?atness limit of D /120was used.It was noted that,for a panel with an aspect ratio of 1.0,this would correspond to a curvature of a /R =0.067.The values of moment reduction using this approach were compared with those presented by Basler (Basler and Thurlimann 1961;Vincent 1969).Numerical results based on this limit were generated,and the following web-slenderness requirement was derived: 2 D 36,500a a =1?8.6?34 (1) ? ??? t R R F w ?y where D =unsupported distance between ?anges;and F y =yield stress in psi. An extension of this work was published a year later,when Culver et al.(1973)checked the accuracy of the isolated elas-tically supported cylindrical strips by treating the panel as a unit two-way shell rather than as individual strips.The ?ange/web boundaries were modeled as ?xed,and the boundaries at the transverse stiffeners were modeled as ?xed and simple.Longitudinal stiffeners were modeled with moments of inertias as multiples of the AASHO (Standard 1969)values for straight https://www.360docs.net/doc/b0888571.html,ing analytical results obtained for the slenderness required to limit the plate bending stresses in the curved panel to those of a ?at panel with the maximum allowed out-of-?atness (a /R =0.067)and with D /t w =330,the following equa-tion was developed for curved plate girder web slenderness with one longitudinal stiffener: D 46,000a a =1?2.9 ?2.2 (2) ? ? ? t R f R w ?b where the calculated bending stress,f b ,is in psi.It was further concluded that if longitudinal stiffeners are located in both the tension and compression regions,the reduction in D /t w will not be required.For the case of two stiffeners,web bending in both regions is reduced and the web slenderness could be de-signed as a straight girder panel.Eq.(1)is currently used in the ‘‘Load Factor Design’’portion of the Guide Speci?cations ,and (2)is used in the ‘‘Allowable Stress Design’’portion for girders stiffened with one longitudinal stiffener.This work was continued by Mariani et al.(1973),where the optimum trans-verse stiffener rigidity was determined analytically. During almost the same time,Abdel-Sayed (1973)studied the prebuckling and elastic buckling behavior of curved web panels and proposed approximate conservative equations for estimating the critical load under pure normal loading (stress),pure shear,and combined normal and shear loading.The linear theory of shells was used.The panel was simply supported along all four edges with no torsional rigidity of the ?anges provided.The transverse stiffeners were therefore assumed to be rigid in their directions (no strains could be developed along the edges of the panels).The Galerkin method was used to solve the governing differential equations,and minimum eigenvalues of the critical load were calculated and presented for a wide range of loading conditions (bedding,shear,and combined),aspect ratios,and curvatures.For all cases,it was demonstrated that the critical load is higher for curved panels over the comparable ?at panel and increases with an increase in curvature. In 1980,Daniels et al.summarized the Lehigh University ?ve-year experimental research program on the fatigue behav-ior of horizontally curved bridges and concluded that the slen-derness limits suggested by Culver were too severe.Equations for ‘‘Load Factor Design’’and for ‘‘Allowable Stress Design’’were developed (respectively)as D 36,500a =1?4?192(3)? ?t R F w ?y D 23,000a =1?4 ?170 (4) ? ? t R f w ?b The latter equation is currently used in the ‘‘Allowable Stress Design’’portion of the Guide Speci?cations for girders not stiffened longitudinally. Numerous analytical and experimental works on the subject have also been published by Japanese researchers since the end of the CURT project.Mikami and colleagues presented work in Japanese journals (Mikami et al.1980;Mikami and Furunishi 1981)and later in the ASCE Journal of Engineering Mechanics (Mikami and Furunishi 1984)on the nonlinear be-havior of cylindrical web panels under bending and combined bending and shear.They analyzed the cylindrical panels based on Washizu’s (1975)nonlinear theory of shells.The governing nonlinear differential equations were solved numerically by the ?nite-difference method.Simple support boundary condi-tions were assumed along the curved boundaries (top and bot-tom at the ?ange locations)and both simple and ?xed support conditions were used at the straight (vertical)boundaries.The large displacement behavior was demonstrated by Mi-kami and Furunishi for a range of geometric properties.Nu-merical values of the load,de?ection,membrane stress,bend-ing stress,and torsional stress were obtained,but no equations for design use were presented.Signi?cant conclusions include that:(1)the compressive membrane stress in the circumfer-ential direction decreases with an increase in curvature;(2)the panel under combined bending and shear exhibits a lower level of the circumferential membrane stress as compared with the panel under pure bending,and as a result,the bending moment carried by the web panel is reduced;and (3)the plate bending stress under combined bending and shear is larger than that under pure bending.No formulations or recommendations for direct design use were made. Kuranishi and Hiwatashi (1981,1983)used the ?nite-ele-ment method to demonstrate the elastic ?nite displacement be-havior of curved I-girder webs under bending using models with and without ?ange rigidities.Rotation was not allowed (?xed condition)about the vertical axis at the ends of the panel (transverse stiffener locations).Again,the nonlinear distribu-

污水处理外文翻译(带原文)

提高塔式复合人工湿地处理农村生活污水的 脱氮效率1 摘要: 努力保护水源,尤其是在乡镇地区的饮用水源,是中国污水处理当前面临的主要问题。氮元素在水体富营养化和对水生物的潜在毒害方面的重要作用,目前废水脱氮已成为首要关注的焦点。人工湿地作为一种小型的,处理费用较低的方法被用于处理乡镇生活污水。比起活性炭在脱氮方面显示出的广阔前景,人工湿地系统由于溶解氧的缺乏而在脱氮方面存在一定的制约。为了提高脱氮效率,一种新型三阶段塔式混合湿地结构----人工湿地(thcw)应运而生。它的第一部分和第三部分是水平流矩形湿地结构,第二部分分三层,呈圆形,呈紊流状态。塔式结构中水流由顶层进入第二层及底层,形成瀑布溢流,因此水中溶解氧浓度增加,从而提高了硝化反应效率,反硝化效率也由于有另外的有机物的加入而得到了改善,增加反硝化速率的另一个原因是直接通过旁路进入第二部分的废水中带入的足量有机物。常绿植物池柏(Taxodium ascendens),经济作物蔺草(Schoenoplectus trigueter),野茭白(Zizania aquatica),有装饰性的多花植物睡莲(Nymphaea tetragona),香蒲(Typha angustifolia)被种植在湿地中。该系统对总悬浮物、化学需氧量、氨氮、总氮和总磷的去除率分别为89%、85%、83%、83% 和64%。高水力负荷和低水力负荷(16 cm/d 和32 cm/d)对于塔式复合人工湿地结构的性能没有显著的影响。通过硝化活性和硝化速率的测定,发现硝化和反硝化是湿地脱氮的主要机理。塔式复合人工湿地结构同样具有观赏的价值。 关键词: 人工湿地;硝化作用;反硝化作用;生活污水;脱氮;硝化细菌;反硝化细菌 1. 前言 对于提高水源水质的广泛需求,尤其是提高饮用水水源水质的需求是目前废水深度处理的技术发展指向。在中国的乡镇地区,生活污水是直接排入湖泊、河流、土壤、海洋等水源中。这些缺乏处理的污水排放对于很多水库、湖泊不能达到水质标准是有责任的。许多位于中国的乡镇地区的社区缺乏足够的生活污水处理设备。由于山区地形、人口分散、经济基础差等原因,废水的收集和处理是很成问题的。由于资源短缺,经济欠发达地区所采取的废水处理技术必须低价高效,并且要便于施用,能量输入及维护费用较低,而且要保证出水能达标。建造在城市中基于活性污泥床的废水集中处理厂,对于小乡镇缺乏经济适用性,主要是由于污水收集结构的建造费用高。 1Ecological Engineering,Fen xia ,Ying Li。

相关文档
最新文档