Thursday, October 21, 2010

Super-operator altar



10 trillion times a million billion times, never billion ... ...

When our high-performance computing repeatedly record, these figures in people's eyes, is only a symbol of national scientific and technological strength. They are high above, nothing to do with general business users in and can use the word "high-performance computing platform" in addition to the state special department that is large-scale industrial projects, such as large oil field, a large aircraft manufacturing.

This situation appears in the Shanghai Supercomputer Center have changed.

December 2000, the Shanghai Municipal Government for the construction of the Shanghai Supercomputer Center China. As the Super Computer Center is responsible for local government and advance human consciousness is defined Shanghai Super Computer Center became the "public-oriented computing platform", more and more users to high-performance computing with the "high touch."

Public computing platform development as a city an important symbol of modernization, to pierce various sectors of the industry chain, so that more human resources, capital, technology, rapid flow of up to bring huge economic and social benefits. 10 years, increasingly strong demand, as well as cloud computing, Internet of things, triple play and other industries the emergence of new opportunities, quickly ignited the passion of large-scale public computing platforms, the original service in the background of "computing platform" have sprung up to front, out of control.

Currently, Beijing, Shenzhen, Tianjin, Shenyang, Wuhan, Guangzhou, Jinan, Chengdu, Changsha ... ... cities are invested heavily in building Super Computer Center, from 10 trillion times a million to a million billion billion times, and even absolutely billion of large-scale super-computing centers blossom everywhere in the country, some cities is not only one.

Application of high performance computing altar floor, is a sign of progress in IT industry, the development of public computing platform is a regional economic inevitable choice for sustainable development. However, over the face of surging wave count, we ask:

Really need so many ultra-count center?

These expensive computing platform can really play worth it?

Who are these super machines in operation, who is in the use of ultra-ICC?

To this end, our reporter in-depth Shanghai, Chengdu, Lanzhou, trying to uncover the mystery of ultra-ICC.

Last June, officially approved by Ministry of Science agreed to establish a National Supercomputing Center in Shenzhen by the state investment 200 million yuan, was completed in 2010 in Shenzhen by the end of ten million billion calculations a super computer. Almost at the same time, Tianjin Binhai New Area and University of Defense Technology Cooperation Agreement signed by the Ministry of Science, Tianjin Binhai New Area, National Defense University jointly invested 600 million yuan, in the Binhai New Area of Tianjin build a national supercomputing center, developed petaflop supercomputer .

Recently, there were indications that Beijing will build a million trillion times larger Supercomputing Center, related issues are in preparation. In addition, Guangzhou, Shenyang, Chengdu, Changsha, Wuhan and other cities in almost all new or expansion of the Super Computing Center, targets are in 1,000,000,000,000,000 or even million trillion level.

As if overnight, the National Supercomputing Center at the blossom everywhere. We really have such a large computing needs? Do this, "Computer World" reporter visited Shanghai, Chengdu, Gansu and other places representative of the Supercomputing Center, which some have been successfully operating, and some still under construction , and these super-computer centers are facing the same problem - how the altar, into the ordinary.

Subsidize the user to find

90's of last century, people have a certain high-performance computing knowledge. Shanghai Meteorological Bureau found that the existing computing power has been unable to meet everyday computing needs, therefore, they are ready to purchase a new "big machine." When the program reported to the government procurement sector, the Shanghai Municipal Government to consider buying a "big machine" too costly, while the Weather Bureau's use of the frequency is not high, idle time can cause great waste of resources. If this high-level computer can be used as public facilities available to more users, you can play more effective. Therefore, the Shanghai Municipal Government put forward at that time with the "big machine" set up a public service platform, and thus created the concept of super-computing center. "We began to build in 1999 located in Zhangjiang Hi-tech Development Zone in Pudong, the Shanghai Supercomputer Center, in early 2001, the official carrier for the community." Shanghai Super Computing Center Director, Xi Zili introduced.

Xi Zili Supercomputing Center is a service of the first group of people in this industry for over ten years. When it comes to Shanghai Super Computer Center in the early expansion of the user operating difficulty, Xi Zili are marvelous: "It was a large amount of money the Government into operation this Supercomputing Center, if the use is not up on the mean failure, it means a lot of waste of capital, because hardware was already there are not being paid the. "The most difficult process early, is the need to find their own customers. "At first, I want to visit every week, 3 to 5 users to understand their background, operations and needs, to attract them to the center." Xi Zili said, sometimes even subsidize the user to use the machine.

The beginning, the Shanghai Super Computing Center was selected as the industrial users commercial aircraft company, but by that time coincided with the Commercial Aircraft Corporation is not the economy. In the mid-90s, commercial aircraft company bought IBM4381 big machine, but because the company limited funds, the project is not over, these machines have been arrayed not functioning. Although they want to move into the center, but neither money to pay time fee, not many programs can do. Upon learning this, Xi Zili said to each other, willing to pay 200,000 yuan in subsidies as part of its move into the center, This made the business.

In addition to few users, the capacity of the machine itself is also a constraint Shanghai Super Computing Center was a major development. Because the first batch of service in Shanghai Super Computer Center is a large machine divinity series supercomputer, due to the compatibility of the machine, limit the scope of potential applications and users. Until 2004, the Shanghai Super Computer Center ushered in the dawn of open architecture 4000A, the Twilight series and the machine architecture, software, operating systems are open and standardized, which means that the system can and international compatibility of some common software better . Compatibility issues resolved, since 2004, the Shanghai Super Computer Center users an unprecedented development. Last year, the Shanghai Super Computing Center has introduced a series of Dawning 5000A supercomputer to calculate the scale of 230 trillion. Today, Shanghai Super Computer Center of the users have over the various sectors.



Large-scale hardware computing platforms require matching software program

At present, Shanghai Super Computer Center is the operator of the most successful public computing platforms. Unfortunately, the state has invested dozens of ultra-ICC, and now is running out. In addition to super-computing and Shanghai Super Computing Center of the few survival, some on the verge of collapse.

Who is the "super user"

"Only together can really play a role, reflecting the value of public computing platform, which is also government investment to establish ultra-ICC mind." Xi Zili Moreover, the "Computer World," told reporters.

Today, many are building super-computer centers have understood this truth. Although the petaflop-scale supercomputer center in Tianjin has not officially put into use, but the center's leadership among the users already running.

Tianjin Super Computer Center to target the super-computing on demand a strong weather, oil, medicine, architecture and other fields. Therefore, the state director of the Center for Supercomputing Liu Guangming Tianjin Tianjin Meteorological Bureau has research, the Chinese Academy of Architecture building software, the Joint Research Institute of Tianjin International Biomedicine, CNOOC, and Geophysical Research Institute of Shengli Oilfield. He found that these "super big operators" and is very different than in the past, had no money, no one's company, now not only no shortage of talent, and some even built their own computer center, they are super-computing platform for the public What will generate strong demand?

"Demand is still very large." As Xi Zili said, the small-scale processing operation can be completed in their own computing centers, large-scale computing and use to large commercial software project, it is necessary to large-scale public computing platform to run , because only Supercomputing Center have enormous computing power and software capabilities.

Journalists in the survey found that ultra-ICC more than 80% of users are research institutes and universities, while the other 20% are used for industrial production.

Nanjing, BGP is a typical Shanghai Super Computer Center industrial-type users. In fact, Nanjing BGP also has its own computing center, but they often have more large-scale computing needs. One year, Nanjing BGP to participate in an international bid, must within one week on their results to each other, the scale of its computing centers are not enough to complete the operation of this size, so they found a Shanghai Super Computer Center. Xi Zili personally lobbied other users with savings 1000 CPU released to the project in Nanjing BGP, so that they get the results in time to bid. "If there is no such large-scale public computing platform, enterprises will miss many of these large-scale international projects." Xi Zili said.

Therefore, the demand for supercomputing business is very large. Super Computer Center in Gansu Shanghai Super Computer Center, though the much smaller scale, but the value of their customers were well reflected.

Super Computer Center in Gansu Province, according to Director of Hu Tiejun introduced Super Computer Center in Gansu during the construction process and take the side of the building while using the strategy. "Although we do not center, but it focus on forward-looking technology, expansion in 2004 when playing on the plan to create a breakthrough in high performance computing to the next generation IPv6 Internet and data exchange center for the auxiliary network application platform and minutes to complete the construction year. "

Now, Gansu Super Computer Center already has 41 trillion times the fleet, 21 sets of commercial software, 13 sets of shared source software, but also have included Lanzhou University, Lanzhou University, Lanzhou Jiaotong University and other universities, Gansu Provincial Meteorological Bureau, Chinese Academy of Sciences Cold and Arid Regions Research Institute and other government departments and research institutes, and enterprises including wide range of users. In these users, the most targeted, best embodies the central key support at this stage direction, is the cooperation with Lanzhou University, a large-scale virtual screening for drug research.

Drug development is a time-consuming, investing in research work. The traditional drug development process is costly, time, long, high rate of elimination, the average cost of a new drug research and development needs of over one billion U.S. dollars, took about 10 years, about 90% of drug candidates in clinical period be eliminated. Virtual screening in drug stage, should the millions or billions of molecular simulation, the traditional test method is not only a huge workload, but also consume a long time. "The super computer will show the unparalleled advantage." According to Hu Tiejun introduced experimental supercomputer simulation with a very short time, just a few weeks time could be eliminated in a large number of compounds that do not meet the requirements, the scope of screening should much larger than the traditional test, experimental results are more accurate, can greatly improve the efficiency of drug development, considerable savings in R & D funding.

Shanghai Super Computing Center of the Xi Zili, Gansu ultra-ICC Hu Tiejun said that they have achieved the current application of 70% to 80%, in a sense, basically at full capacity. However, there are still doubts the industry, urban construction in the country so many quadrillion times as much, or even 10 thousand trillion times the size of the super computer center, you can really come in handy?

Weak links in software applications

Currently, the application of ultra-ICC is far below the scale of the hardware scale. So many of the industry that "if the application can not keep up, causing the machine and then not as big."

"If there is no advance of hardware resources, making sure that no more applications." Xi Zili did not agree to this view. He believes that it is difficult to define all the urban construction Supercomputing Center's original intention and ability to not rule out that some local governments to follow suit, the image projects out of psychological, "but the public do more advanced computing platforms. In the supercomputing field, needed to drive the hardware development of the industry. "

Xi Zili that only the hardware first developed, these applications can keep pace. If the current super-computing platform to reach 100 trillion times the size it possible to run the 100 trillion times the software. "So supercomputer is certainly necessary, but not too much ahead, as it will cause a waste."

About to build a petaflop supercomputer, "Milky Way," is Professor Wen-Hua Dou National Defense University also believes that human needs for high-performance computers is not enough, every step needs, from basic theory to practical application of technology, material technology and innovation and beyond.

First, the public computing platform promoting the development of high-tech industry has far-reaching significance. The high ground is the high-tech industry high-tech product development capability, the design of new materials, biotechnology, new medicine and environmental protection and comprehensive utilization of resources, the high performance computing can play a significant role. Second, the public computing platform innovation vector as one of the modern service industry, will certainly fueled the development of independent innovation of enterprises. "The Internet and telecommunications networks, wide network integration is an inevitable trend, network integration and development, will effectively promote the new computing models, the new service model for the formation and development." DOU Wen-hua said.

However, many in construction and have built small and medium regional based public computing platforms, as well as parts of a government campaign of the planned petascale supercomputing centers, in addition to slightly stronger than the strength Shanghai Super Computing Center, and many provinces and municipalities in public computing platform infrastructure, support services, operation mechanism have not been systematically developed. In short, it is the application part is still quite weak.

"Sometimes, the domestic Super Computing Center is very tragic." Xi Zili told reporters. Although the Shanghai Super Computer Center of the computing scale is 200 trillion times, but usually reach two trillion times a day, 10 trillion times the size of very good use, and most of the time also, but 50 trillion times.

Why is this so? "Because my super-operator in the field of software levels are poor, do not increase the system's application of the scale." Xi Zili said.

For example, the United States, the advanced field of materials analysis 10 times higher than China or even a hundred times, its ultra-ICC very large scale operations, the basic are 5 100 000 CPU to run, but our country only a few hundred or at most a day 1000 CPU running simultaneously. "Is not worse than others we have available hundreds of times, but our high-performance computing software in the very backward, parallel computing capacity is also very poor." Chengdu Cloud Computing Center Director Wang Jianbo resignation. Even if the construction of the huge hardware computing platforms, lack of a strong software support, "these machines are no different from a pile of junk." Jian-Bo Wang said.

In this case, my ultra-ICC can only buy commercial software developed countries, and some very expensive proprietary software, and even build a hardware platform than the more expensive, the average ultra-ICC simply can not afford. There are some high-tech products, as restrictions on foreign export policy, even if the money will not buy.

According to related person from the past 10 years, although the country has invested in software, a lot of money, but the effect is not significant. In addition to weather, oil and other several pillar industries have a certain software R & D capabilities, large-scale, commercial software is still very little.

The reason, Super Computer Center is an interdisciplinary intersection, which involved extensive industry, its "mother" will be more than one, the software and hardware resources is not in charge of the same ministries, which do not result in development of software understand the hardware architecture, hardware R & D people do not know the characteristics of large-scale software, "This is one of the most fatal problem." Xi Zili said.

However, in the "nuclear high base" and after the introduction of major national science and technology projects to the core of electronic devices, high-end general chips and basic software become bigger and stronger, the state appointed the appropriate body to coordinate the work of ministries. "This is the development of China's public computing platform is a good thing, we hope the integration of industry and more in-depth information." Jian-Bo Wang said.

Commentary

Super Computer Center requires government guidance and help

Super Computer Center is a comprehensive platform for interdisciplinary nature, its development can lead server, software, chips, machinery manufacturing, and other related industries to progress together. Meanwhile, the ultra-ICC also adopted the final results to show progress in all walks of life: the first supercomputer to find oil, the first supercomputer for weather forecasting for the first time with a super-computer analysis of gene ... ... supercomputing affect all walks of industry, it has become the core countries in science and technology competitiveness.

Although we are pleased to see that everywhere in the brewing of large super-computer center, but in a way, the government should guide the conduct throughout, and somewhat in size and geographical planning. Super Computer Center is different from the small and medium construction as possible, blossom, it is a huge project, costs money, time-consuming, labor-intensive. According to reports, Shanghai Super Computer Center of electricity a year reached 12 million yuan. Therefore, the Government should be in power, manpower, policy areas such as auxiliary super-computer center operations.

In addition to high-end applications in the most backward areas of level, our public computing platforms, there are still many problems.

First, the uneven geographical distribution. This uneven distribution of resources, causing a dilemma - there is a demand of the user difficult to obtain resources, valuable resources are faced with idle and waste.

Second, the construction of a lack of unified planning and functions. Super Computer Center under the various different departments related to repeat invest in economically developed regions, and the parts of public computing platform services location ambiguity, the lack of a specific subject area strengths.

Third, do not take cross-disciplinary research in the field service functions.

Fourth, do not improve the industrial chain of high-performance computing. Directly serve the public end-user computing platform, a concrete understanding of user needs, application features and technology trends. Public computing platform is high performance computing hardware and software vendors the main users of public computing platform as a key link in the industry, must maintain the entire eco system of joint development.

However, these problems are not their own super-computer centers can be resolved, right in the hands of their master. For example, the state can plan to control Super Computer Center's construction site, the future super computer centers to form a wider network coverage, can users of radiation to the whole country; In addition, although there are inherent Super Computer Center's "瀹為檯 鎿嶄綔 You Shi" but not "education" and the qualification, in this regard, policies should be introduced to Super Computer Center to train a large number of industry professionals.

In short, public computing platform, which reflects the computing power of our country, but also the equivalent of a high-performance core of the industrial chain, and its progress should be attached great importance to the relevant agencies. (Text / Liu Lili)

Link

Trend of the civilian population of the world's high-performance computing

Currently, high-performance computers to solve face scalability, reliability, power, balance, programmability, and management complexity of such challenges, the industry is to promote high-performance, multicore, virtualization and other technologies. A worldwide movement to high-performance computing has been opened civilians, which we call "pan-performance computing era."

From the global perspective, the public computing platforms deployed in the developed countries already have a large number of which the United States, the largest number. In November 2008 announced the "Global Top 500 high performance computers," shows that 58.2% of the machines installed in the United States, 66% of the total computing power controlled by the United States; followed by the UK, with 9% and 5.4% of the machines The total computing power.

In the United States, government agencies, public computing platform is a major supporter. The most well-known in the United States including the San Diego Supercomputer Center Supercomputer Center (SDSC), the National Center for Supercomputing Applications (NCSA), Pittsburgh Supercomputing Center (PSC), Lawrence Livermore National Laboratory (LLNL ), the U.S. Argonne National Laboratory (ANL) and Oak Ridge National Laboratory (ORNL) and so on.

In the EU, each of the framework of EU research and technological development projects, both invested heavily in high-performance computing. Britain is Europe's largest supercomputing users, mainly Edinburgh Parallel Computing Centre (EPCC) and the University of Manchester academic computing services center (CSAR). Germany, the number of supercomputers installed very basic and the United Kingdom, 3 National Supercomputing Center are the University of Stuttgart High Performance Computing Center (HLRS), John von Neumann Institute for computing (NIC) and the calculation of Munich Leipnitz Center (LRZ). France followed by Germany and the UK, the largest supercomputers run by the French Atomic Energy Commission. Other European countries have had less number of super-computing center. Overall, the European Super Computing Center in facilities, operating model, customer support and application in the fields have a lot of features.

銆??鍦ㄦ棩鏈紝杈冨ぇ鐨勮秴绾ц绠椾腑蹇冩湁鏃ユ湰鍦扮悆妯℃嫙鍣ㄤ腑蹇冦?鏃ユ湰鐗╃悊涓庡寲瀛︾爺绌舵墍(RIKEN)銆佹棩鏈浗绔嬪厛杩涘伐涓氱鎶?爺绌舵墍锛屼互鍙婃棩鏈浗瀹跺畤鑸疄楠屽(JAXA)寤虹珛鐨勪腑蹇冦?

Currently, the developed high-performance computing research and industry input intensity of Ju Tai, Erju into Juyouchixu Xing, Shi Jian Zhang span, which made them high-performance computing research and technology Fangmian have a good foundation has accumulated a wealth of experience, gather a group of professionals. At the same time, high-performance computing on the contribution of national economic construction is also rising, the development of public computing has become a virtuous circle.







相关链接:



JSP and EJB interaction



Qingdao Shengli Oilfield nursing home use Maxima



Understanding OF the process of DB2 Universal Database (2)



The Economic Observer: the power behind the Green Dam Game Event



Premier Network Monitoring



YouTube To WMV



AVI to MKV



STUDY Notes of JSP tags



CG City Wizard - Wizard is the beginning (1)



Powerpoint Are Three Ways To Insert Video



Farewell babyface, iSee 1 minute to create face-lift effect



"Housekeeper" at your fingertips "groom" first To "trial marriage"



Directory Astrology Or BIORHYTHMS Or Mystic



Liu Liu Jiren, etc. on new overseas opportunities: Pie or trap



Report Firewall And Proxy Servers



MATROSKA to MPEG



Monday, October 18, 2010

DDOS DDOS tracking the introduction and





Chain-level test (Link Testing)

Most of the tracking technologies are starting from the closest to the victim's router, and then began to check the upstream data link, until you find the origin of attack traffic hair. Ideally, this process can be recursive implementation of the attack until you find the source. This technique assumed attack remains active until the completion of tracking, it is difficult after the attack, intermittent attacks or attacks on the track adjustment to track. Including the following two chain-level testing:

1, Input debugging

Many routers offer Input debugging features, which allow administrators to filter certain number of exit data packets, and can decide who can reach the entrance. This feature was used as a traceback: First of all, victim was attacked in determining when all packets from the description of the attack packet flag. Through these signs in the upper reaches of the outlet manager configuration suitable Input debugging. This filter will reflect the relevant input port, the filtration process can continue in the upper class, until to reach the original source. Of course, a lot of this work by hand, some foreign ISP tools for the joint development of their network can automatically follow-up.

But the biggest problem with this approach is the management cost. Multiple ISP links and cooperation with them will take time. Therefore, this approach requires a lot of time, and almost impossible.

2, Controlled flooding

Burch and Cheswick proposed method. This method is actually manufactured flood attacks, by observing the state of the router to determine the attack path. First of all, there should be an upper road map, when under attack, they can start from the victim's upstream routers in accordance with road map on the upstream routers to control the flood, because the data packets with attack-initiated packet router also shared, thus increasing the possibility of the router packet loss. Through this continued up along the road map for, we can close the source of attacks launched.

This idea is very creative but also very practical, but there are several drawbacks and limitations. The biggest drawback is that this approach is itself a DOS attack, it will also carry out some of the trust path DOS, this shortcoming is also difficult procedure. Moreover, Controlled flooding requires an almost covers the entire network topology. Burch and Cheswick also pointed out that this approach could be used for DDOS attacks on the track. This method can only be effective on the ongoing situation in the attack.

CISCO router is CEF (Cisco Express Forwarding) is actually a kind of chain-level test, that is, to use CEF up to the final source, then the link on the router had to use CISCO routers, and support CEF. Must be Cisco 12000 or 7500 series router has. (Do not know how, do not check the latest CISCO document), but the use of this feature is very cost resources.

In the CISCO router (ip source-track support for the router) the IP source tracking in order to achieve the following steps:

1, when the purpose was found to be attacked, opened on the router the destination address of the track, enter the command ip source-track.

2, each Line Card was created to track the destination address specific CEF queue. The line card or port adapter with a specific ASIC for packet transformation, CEF queue is used to package into line card or port adapter's CPU.

3, each line card CPU collect information to track the purpose of communication

4, the timing data generated by export to the router. Be realistic summary of the flow of information, enter the command: show ip source-track summary. Each input interface to display more detailed information, enter the command show ip source-track

5, statistical tracking of IP addresses is a breakdown. This can be used to analyze the upstream router. You can close the current router IP source tracker, enter the command: no ip source-track. And then re-open at the upstream router on this feature.

6, repeat steps 1 through 5, until you find the attack source.

This almost answers securitytest to mention the bar.

Logging

Through this method to record the main data packet router, and then through the data collection techniques to determine the path packets through. While this approach can be used to track the data after the attack, it also has a Ming Xian's shortcomings, such Kenengyaoqiu Daliang of Zi Yuan (or sampling), a large number of data of Syndicated news Bingjuduifu problem.

ICMP tracking

This approach mainly rely on self-generated ICMP router tracking information. Each router has a very low probability (for example: 1 / 200000), the contents of the packet will be copied to an ICMP message in the package, and contains the information near the source address of the router. When the flood attacks beginning, victim can use ICMP messages to reconstruct the attacker path. In this way comparison with the above description, there are many advantages, but there are some disadvantages. For example: ICMP traffic may be filtered from the ordinary, and, ICMP messages should follow the same input debugging feature (the packet with the data packet input port and / or to get the MAC address associated capacity) related, but that in some router has no such function. At the same time, this approach also must be a way to deal with an attacker could send a forged ICMP Traceback message. In other words, we can approach this way, used in conjunction with other tracking mechanisms to allow more effective. (IETF iTrace)

This is the yawl that the IETF working group to study the content, when I made some comments to the Bellovin, but did not get an answer. For example:

1, although a random 1 / 20000 to track packages sent, but the package for forgery TRACEBACK cases, the efficiency of the router will have some effect.

2, track packages, and can not solve the counterfeit problem of authentication. To determine whether it is fake because the package, you must go to certification, and increased workload.

3, even with NULL authentication, also serve the purpose of (a certified case). And will not be much affected.

4, itrace purpose is to deal with the original DOS source of the problem of deception, but now the design seems to make us more concerned about the path and not the source. Is the path is more than the source of our problem to solve DOS useful?

So, there is a bunch of issues that I think iTrace will face the difficult issue.

Packet Marking

The technology concept (because there is no practical) is to the existing agreement on the basis of changes, and changes very little, not like the idea of iTrace, think better than iTrace. There are many details of this tracking study, the formation of a variety of labeling algorithm, but the best is compressed edge sampling algorithm.

Principle of this technique is a change in IP header, in which the identification heavy domain. That is, if not used to the identification domain, then this field is defined as the tag.

The 16bit of idnetification into: 3bit the offset (allows 8 slice), 5bit the distance, and the edge of 8bit slice. 5bit the distance allows 31 routes, which for the current network is already enough.

Marking and path reconstruction algorithm is:

Marking procedure at router R: let R''= BitIntereave (R, Hash (R)) let k be the number of none-overlappling fragments in R''for each packet w let x be a random number from [0 .. 1 ) if xlet o be a random integer from [0 .. k-1] let f be the fragment of R''at offset o write f into w.frag write 0 into w.distance wirte o into w.offset else if w . distance = 0 then let f be the fragment of R''at offset w.offset write f? w.frag into w.frag increment w.distance
Path reconstruction procedure at victim v:
let FragTbl be a table of tuples (frag, offset, distance) let G be a tree with root v let edges in G be tuples (start, end, distance) let maxd: = 0 let last: = v for each packet w from attacker FragTbl.Insert (w.frag, w.offset, w.distance) if w.distance> maxd then maxd: = w.distance for d: = 0 to maxd for all ordered combinations of fragments at distance d construct edge z if d! = 0 then z: = z? last if Hash (EvenBits (z)) = OddBits (z) then insert edge (z, EvenBits (z), d) into G last: = EvenBits (z); remove any edge (x, y, d) with d! = distance from x to v in G extract path (Ri.. Rj) by enumerating acyclic paths in G


Under laboratory conditions only victim of such markers can be caught from 1000 to 2500 package will be able to reconstruct the entire path, and should be said that the result is good, but not put to practical, mainly manufacturers and ISP router support needed .

Ip traceback's been almost a practical technology and laboratory techniques, or inanimate, on the main these, although there are other.

For a long time did not engage in a DDOS against it, and the domestic like product have a black hole, previously know some foreign, such as floodguard, toplayer, radware so. Prompted by securitytest also learned riverhead, I immediately look at their white paper.

Bigfoot made since the previous main ip traceback subject, securitytest also went to the defense. DDOS problem for ip traceback and Mitigation is not the same, ip traceback main track, mainly because of DDOS spoof, which is difficult to determine the real source of attack, and if the attack is easy to find the real source, not just to deal with DDOS, attacks against the other is also helpful, such as legal issues. And Mitigation is the angle from the victims, because the victim is generally unable to investigate the whole network, to identify source, and even be able to find the source, there must be a legal means of communication or to source stop (the attack source and not the source of the attacker), this means that a lot of communication, inter-ISP, across other similar non-technical issues, it is often difficult to handle. But from the victim's point of view, have to be a solution, so we need to Mitigation.

This in turn happens to be my previous scope of the study, therefore, will say a lot. For Mitigation, in fact, the fundamental technology is to a large number of flows from the attack packets and legitimate packets will be separated out, the attack packets discarded out for the approval of the legal package. This is not, so the actual use of technology is to identify how the attack packets as possible, but as small as possible to affect the normal package. This is again to analyze the DDOS (or DOS) of the methods and principles. Basic has the following forms:

1, the system hole formation DOS. This feature fixed, detection and prevention are also easy to

2, protocol attacks (some deal with system-related, some related with the agreement). Such as SYN FLOOD, debris, etc.. Features Fortunately, the detection and prevention is relatively easy. Such as SYN COOKIE, SYN CACHE, debris can be discarded. Such as land attack, smurf, teardrop, etc.

3, bandwidth FLOOD. Waste flow plug-bandwidth, feature poor recognition, defense is not easy

4, the basic legal FLOOD. More difficult than three, such as distribution of Slashdot.

Real DDOS, usually combining a variety of ways. For example SYNFLOOD, may also be bandwidth FLOOD.

The main factors that affect the defense is to see whether the features available, such as 1,2 relatively easy to solve, some of the basic does not affect the use of the FLOOD, it can well be abandoned, such as ICMP FLOOD. However, the attack packets if contracting tools to better package disguised as legitimate, it is difficult to identify out.

Mitigation methods in general is:

1, Filter. For obvious characteristics, such as some worms, the router can handle that. Of course, the filter is the ultimate solution, as long as the identification of the attack packets, it is to filter out these packets.

2, random packet loss. Associated with the random algorithm, a good algorithm can make the legitimate packets are less affected

3, SYN COOKIE, SYN CACHE other specific defensive measures. For some regular means of defense and attack filtering. For example ICMP FLOOD, UDP FLOOD. SYN COOKIE are all to avoid spoof, at least there are three TCP handshake, so better to judge SPOOF

4, passive neglect. It can be said to be deceived is also a way to confirm that. The normal connection fails will try again, but the attackers generally do not try. So can temporarily abandoned for the first time the connection request and a second or third connection request.

5, take the initiative to send a RST. Against SYN FLOOD, such as on a number of IDS. Of course, the real is not valid.

6, statistical analysis and fingerprints. It would have been the main content, but in the end the algorithm into a dead end, because the main problem is an algorithm. Through statistical analysis point of view to get the fingerprint, and then to abandon the attack fingerprint package is also a anomaly detection technology. Very simple, but it is not easy to affect the legal package, and will not become a random packet loss. (In fact it was considered too complex, have to be a detailed analysis of the attack packets and legitimate packets, the actual need, as long as the attack packets to filter out enough, even to attack packets through, but as long as not to cause DOS on it.) This is also a lot of The main subject of the researchers, the purpose is identifying attack packets.

Now back to securitytest mentioned riverhead. On the riverhead of the technology, I have just learned from their white paper on, but based on my analysis methods did not exceed the above-mentioned range.

riverhead's core program is the detection of Detection, transfer Diversion and mitigation Mitigation, which is to detect attacks, and then transferred to the traffic guard on their products, and then guard for Mitigation.

Its implementation steps are:

Because there is no map, we first define what can be said clearly:

# Source close to distributed denial of service for the remote router routers

# Close to the victim's router to router proximal

# Riverhead's Guard equipment subsidiary subsidiary router router installed

Defense steps

1, first detected in a DDOS place and understand the victim

2, Guard Notice to the remote router to send BGP (BGP circular set in the victim's prefix, and get higher than the original priority notice BGP), said the victim from the remote router to have a new route, and routed to the loopback Guard interface, all to the victim's have been transferred to the subsidiary Guard on the router

3, Guard inspection flow, and remove one of the attack traffic, and then forwarded to the traffic safety sub router, in the back victim

The core is the Guard, technology is described in the MVP architecture white paper (Multi-Verification Process), which is five levels below

Filter (Filtering): This module contains the static and dynamic DDOS filtering. Static filtering, blocking non-essential traffic, which can be user-defined or default riverhead provided. Dynamic filtering is based on the details of behavior analysis and flow analysis, by increasing the flow of the recognition of suspicious or malicious traffic blocking has been confirmed to be real-time updates

Anti-cheat (Anti-Spoofing): This module verify whether the packet into the system to be deceived. Guard uses a unique, patented source verification mechanism to prevent cheating. Also adopted a mechanism to confirm the legitimate flow of legitimate data packets to be discarded to eliminate

Anomaly detection (Anomaly Recognition): The module monitors all anti-cheat has not been filtered and discard the flow module, the flow records with the normal baseline behavior, it is found abnormal. The idea is that through pattern matching, different from the black-hat and the difference between legitimate communications. The principle used to identify the attack source and type, and proposed guidelines for interception of such traffic.

Anomaly detection include: attacks on the size of packet size and flow rate of the distribution of packet arrival time of the port distribution of the number of concurrent flow characteristics of a high-level agreement, the rate of entry
Traffic Category: Source IP Source port destination port protocol type connection capacity (daily, weekly)

Protocol Analysis (Protocol Analysis): The anomaly detection module processing found in the application of suspicious attacks, such as http attack. Protocol analysis also detected a number of agreements misconduct.

Traffic restrictions (Rate Limiting): mainly those who consume too many resources dealing with the source of traffic.

So, in fact the most important content is in the statistical analysis of anomaly detection, but it seems not much to see from the above special place, but must have a good algorithm. Such as FILTER, actually deal with some very familiar features of obvious attacks, anti-cheating is against syn flood like this, perhaps also a syn cookie module, but may have more patented technologies. Protocol analysis should in fact is relatively weak, but can be common agreement on some specific attacks, protocol error detection and identification of some acts simply agreed to check that this is very simple. Traffic restrictions are that a random packet loss, the most helpless way, so the final level.

Because this product is mainly for Mitigation, not ip traceback. But can be determined or there are important issues, such as:

1, how to deal with the real bandwidth flood. If the router is gigabit, but attacks have accounted for 90% of the traffic, only to shed 10% of the legitimate use, the router has first started with random packet loss of the Guard. (No way, this is the bottleneck of all defense technology)

2, the real attack. The real attack is difficult or not identifiable. For example, the same basic form with the normal, if and statistics are very similar, it is difficult to distinguish. Some attacks, such as reflective of the e-mail attacks, it is perfectly legal, but very hard to classify them.







Recommended links:



WMV to Zune



Ministry of Finance denied the procurement of the Green Dam said the Ministry of Industry is the onl



ASP Script Timeout Problem When Running The Ultimate Solution



Articles About Languages Education



QuickTime To MPG



There Must Be Higher Under The High Commission Income



Emergency Response to where



Used to create automatic play music listening Pros CD



Year-end top ten hot jobs to see what people are missing?



Life difficult for PC industry in 2009, will welcome the FIRST decline since 2001



YouTube to WMV



How to convert protected wma to mp3 for ipod



Catalogs Religion



Niuhong Hong: The Explosion Of Crack SONY Battery Fans



Tools And Editors Specialist



Picked Games Board



Tuesday, October 5, 2010

CMMI: tailored, is the fundamental



Respondents: quality assurance manager of Hunan Branch Chong Liu sub Mbayu
Interviewer: China's Feng Shan Software Network



Quality assurance manager of Hunan Branch Chong Liu sub Mbayu

July 9, 2007, Hunan Branch Innovation Information Technology Co., Ltd. (former long-Chako create System Integration Company) Director, passed the SEI appraisers Dr. Edward Wang chaired CMMI3 level SCAMPI Class A formal assessment. The company is upgrading from the 1.2 version of the CMMI model since the first domestic release by the model CMMI3 assessment software company.

Reporter (hereinafter referred to as "mind"): Today, the honor to interview from Hunan Changsha, Hunan Branch Information Technology Co., Ltd. The quality assurance record manager Liu sub Mbayu, first of all, please give us talk about the history of the company to implement CMMI.

Liu sub Mbayu (hereinafter referred to as "Liu"): Hunan Section creative IT industry in Hunan, a well-known enterprises, the business covers system integration, intelligent building, industrial vision, and software development, software development accounts for most of country. Since the end of 2003, Hunan Branch started with CMMI model innovation ideas and concepts, the process of building a system of software projects, especially building the independent quality assurance system, and accumulated rich experience in process improvement and process data. July 9 this year, a formal assessment by CMMI3, get CMMI3 certificate.

Process is so simple, but from the experience gained in the certification process, it is difficult to use a few words clearly.

With the domestic software technology continues to evolve, the software has grown in scale of production, customer requirements have become more sophisticated software, the software become increasingly complex, increasingly competitive market, so the software will become increasingly demanding business high. Scale production, improve software quality and reduce software development costs, as product on schedule, is an urgent need for software companies to solve problems.

In such a background, Section creative choice in 2001 ISO9001: 2000 standard, built the quality management system, after several years of operation and continuous improvement, characteristics of the formation of a Section record in business management and project development in played a key role. We also problems in the software process analysis, on the various management concepts and methods of analysis, the end of 2003 on the use of SEI's CMMI model for philosophy, combined with the company many years of accumulation, the software development process was modified, in particular, is to build an independent quality assurance system and process R & D projects and product inspection and audit. After three years of operation, the establishment of a management system for the enterprises themselves, to determine their own management philosophy, developed his own unique corporate culture, which, using a variety of tools to manage the process of software system development process and project record, accumulated rich process data. In order to expand the software market, software product development to further improve efficiency, reduce development costs, improve risk control capability, enhance market competitiveness, the company decided to conduct a formal CMMI3 Accreditation. We ask the Beijing Aobo Ocean Consulting do for us, process improvement and evaluation of certified consulting, well prepared, in the July 9, 2007 adopted by the director of SEI appraisers Dr. Edward Wang chaired CMMI3 level formal SCAMPI Class A assessment, and get Dr. Edward Wang CMMI3 certificate issued on the spot.

CMMI assessment process by the company to improve end of a stage, it is our business beyond the starting point for further continuous improvement.

Note: by the CMM certification, what it means for your company? Its practical value for your company mainly in the where?

Liu: First of all, is the management concept is further deepened. CMMI from the United States, the United States has a strong cultural identity, the essence of which we should be gradually absorbed, in order to improve and deepen our management philosophy to improve the management level.

Second, the standard process documentation, project records of the process. This is consistent with the principles of ISO9000, the. Our business, asked the members of software projects should be required daily log registration, evaluation and testing of defects defects need to be recorded, making the project process can be transparent and controllable.

Third, the quantitative monitoring of the project process. Software project quality, schedule and cost control, from qualitative to quantitative a qualitative leap. Quantitative characteristics reflect monitoring is CMMI. Only quantified, objective comparison between the various project evaluation and assessment possible. We used to process data accumulated through the analysis of a business process measurement baseline.

Fourth, the institutionalization of internal process improvement. Process improvement can not be done overnight, but is not guaranteed, but must be with the development of enterprises, with the requirements of the outside world, as the project changes in the practice, and constantly be improved. This process will be permanent eternal. Our business will continue to improve as a specific project management and planning, from the system and the operational level to ensure improved sustainability.

Of course, the role of management is implicit, not all immediate. In the implementation of CMMI, the company's management at the beginning of the process would improve the expectations are high, I hope a significant effect within a short time, in fact very real. Is not effective, how effective, must use the data to speak, too few data samples within the short term, the effect is difficult to distinguish, even a partial will have not increased but decreased in the case. After so many years of accumulated data show that improvements were effective, especially in the general promotion of the standard process, the assessment of efficiency, and product development cycle to further control and risk control will be enhanced greatly, greatly improving customer satisfaction, and further reduce development costs the. I believe that the standard process through constant practice and improvement, process the data accumulate, our software products necessary to further improve productivity, product quality control and meet user needs further research and development to further reduce costs, and further enhance the market competitiveness of enterprises.

In addition, the current highly competitive software market, most software companies required high R & D capabilities, many software projects, especially in international projects, software companies with CMMI qualification requirements, which will undoubtedly raise the threshold of a software project competition. Our company passed the CMMI assessment, is very conducive to market competition is conducive to participation in international software outsourcing race.

Reporter: How does your company solve the CMM-length problem?

Liu: any new changes are meant to change the will and interests of the re-adjustment of force of habit. CMMI model used to transform the software process is the same need to create a new process is different from past norms, inter-face, ideas change, means that changes to certain habits, certain control flow changes in the original, but also means the thinking and work to change the way we can imagine, from management to general staff, there will be a different level of resistance, a lack of cooperation of the possible existence of a natural resistance to the implementation, which is necessary to face must be resolved.

From management, on one hand need to give yourself time to recharge, and consciously accept the CMMI concept, and constantly update their own knowledge, from the ideological to solve the problem, the most critical. Only with the support of management's conscious, fully in line with any change there will be a success. On the other hand, in the face of challenge or conflict with staff, managers should have a firm attitude towards the implementation of CMMI are determined, should not the slightest hesitation and hesitation, otherwise, it is easy to give up halfway, it is easy just a form. Have input, we will be rewarding. Also proved that the standard process based on CMMI model system did help the company improve the quality of software development, help reduce development costs, help to improve the quality of software products, which allow customers to our services more positive.

From the staff point of view, I think more important is the need to strengthen execution. Large-scale enterprises through training, to strengthen the implementation of staff awareness of staff familiarity with the standard process, in particular the process of establishing clear recommendations for improvement channel, so that employees have ownership, can directly participate in the work process improvement, can be easily put forward their suggestions for improvement. Ideological interpretation of the CMMI development processes to the specific process, the distribution of the daily norm, so employees do not care about the CMMI's profound theoretical knowledge, simply do not care enterprises are ISO standards or any CMMI model, or other management system standards, as long as the documents by the company to do on the trip. Employees in large part solved the doubts and misgivings.

From the company's top decision makers view the need to implement CMMI management philosophy, to CMMI culture into the company's culture. Corporate culture is the highest level of business operations, with good corporate culture, company policies and systems can really launch and implement. In this process, we have a good core idea of the CMM into a company's core philosophy and culture.

Would also like to emphasize that adhere to a gradual approach. Anyone involved in the process, processes, methods and tools of the larger changes should persist after the first pilot to promote the idea of the problem found in the pilot, the pilot in the improvement of a new process, new processes, new methods and become familiar with new tools This promotion is relatively easy.

Some management software companies, including some developers often complain about or that management will be strictly tied to their innovation, they think that to promote CMMI in a step by step, what activities are done according to plans and standard procedures to do, on corporate culture of innovation will play a negative role. I have met the developers, the large number of people who hold this view.

I would like to form this view for two reasons: First, when the enterprise in the implementation of CMMI, too mechanical, not on reality, not closely integrated with the practice, doing the form, for authentication and certification, dampened the enthusiasm of developers. For example, the analysis and design phase, need to develop the ability to play a larger element of creativity, if only from the records of the template's Geshi unity to requirements, including font size, indentation inspection and control, ignoring the content of the assessment, must resentment caused by the developer, but this is not a unified template that does not matter. If equipped with specialized information developer, specializing in the development of documentation, analysis and design staff can work from a standardized document freed the needs of specific creative analysis and software design, and information for professional developers to do the work of the document standardization, we will improve the efficiency of the document will be higher quality. Second, such persons lack of real software engineering experience and management experience, too few large projects to do, too little experience of failure, or failure is not conducted an objective analysis of the causes. On this point is no dispute, CMMI is a software engineering experience and a master of lessons learned, we do not go to repeat those failures.

Reporter: Finally, for those who are ready to embark on the road to CMMI business, you have nothing to say to them?

Liu: First of all, uphold the ingenious, we take the initiative. Mechanically in the implementation of the provisions of CMMI CMMI often mistakes. In the domestic software enterprises, many organizations from the workshop-style software development was a gradual, though to varying degrees set up their own software development process, but there are some limitations or shortcomings. In the enterprise, really more than 10 years experience in software engineering staff is relatively small, but very often we do not want to manage. Business groups in the formation of EPG should be fully considered and the development experience of software engineering experience. If the EPG members have a lack of engineering experience, there is no real practical experience of experts guide the understanding of the CMMI can not be very deep, easy to mechanically CMMI standard provisions or other business processes to CMMI best doctrine of good practice, not to cut and change them, in fact, this is precisely contrary to the spirit of CMMI.

CMMI is a master of software engineering experience is summed up from practice to practice guidance, CMMI is also an updated version of itself and constantly improve. Every business has its own characteristics, like Microsoft's MSF, it is the management process of Microsoft's own internal standards, Microsoft's product development experience is a summary of some of the content of the CMMI in the Mei You, Wan Quan Guo Lai can learn to use, so long as you can improve enterprise management level of their own software, they should be bold attempt.

When the implementation of CMMI, it encountered resistance, in part because copying provisions CMMI not meet the real business, no specific analysis of specific situations. In fact, the first-line managers, developers best understanding of the actual. Who understand the practical, who has a say. Therefore, in order to develop CMMI standard, especially when we want to perform in the development process, standard operating procedures and guidelines and record template, we must first seek the views of actors, fully refined, and only on the basis of consensus to promote.

In addition to modified and not revolutionary. A revolutionary way to implement the CMMI, hope that, through a campaign to address the issue of process capability, one may not understand CMMI, do not know the management of improvement is gradual, a possible the knowledge, expectations in the short term through the CMMI assessment , pure pursuit of market buzz. Although some enterprises in a short time by a high-level CMMI assessment, I'm afraid the absence of effective and not difficult to adhere to our identity, had to give up halfway, it has a lot of examples. After the introduction of an enterprise CMMI will greatly affect the corporate culture, change our thinking and ways of doing things. It has been vividly likened the process to improve weight loss, you can rely on weight loss surgery or starving to lose weight in a short time, but if you do not fundamentally improve diet, lifestyle, exercise habits, then weight will quickly return to the status quo, or even more fat. I think this analogy is very vivid.

Finally, the need to adhere to CMMI several features of culture, will ultimately succeed. First, the process of implementing the ideas, adhere to the process input and output documents, and adhering to input and output of the verification and validation. Second, establish a hierarchical management thinking. Separation of powers is the essence of America's institutional culture, CMMI is also true, naturally has its unique advantages, projects need to adhere to project managers, quality assurance personnel and process monitoring of project staff independence, while local costs will inevitably lead to increased, but ensure that the project can be controlled from the fundamentally visual, the benefits will far outweigh their investment. Third, persist in using the data to speak, that is, adhere to process and product measurement data. The level of production efficiency, product quality is good or bad, project schedule delays, the demand level of quality and risk control, qualitative description is often feeble, unconvincing, and only with objective data, quantitative comparison of only the most convincing force, which is CMMI level into the foundation and protection.

Wish all companies interested in adopting the CMMI model as soon as possible to benefit from CMMI, arrive early like.







Recommended links:



SWF to MP4



AWS Express, turned out to Yanhuang PCC writing a new chapter in BPM



Who In The Sale Of National Sentiment!



Distributed POWERBUILDER works



Toshiba To Pay For Dedicated HD-DVD Format, Paramount Has Been Criticized



PPTV sued the PPS legislation grievances to experts hope



Report Hobby



To expose the fraud: WinRAR to compress 775MB 13.4MB



Usa Zip Code Map Services



3GP to FLV



"Cockroaches door", HP will lose?



Lists Mathematics Education



WMV To Zune



Monday, September 27, 2010

Beijing: refused to sign the contract is terminated will receive compensation


琛ュ伩閲戞寜宸ヤ綔骞撮檺鏀粯聽 鏈?涓嶈秴杩?2涓湀
聽聽聽 浠婂悗锛屾湰甯傚姵鍔ㄨ?濡傛嫆缁濈璁㈠姵鍔ㄥ悎鍚岋紝鐢ㄤ汉鍗曚綅鍙В闄ゅ姵鍔ㄥ叧绯伙紝浣嗗繀椤绘敮浠樼粡娴庤ˉ鍋块噾銆?Yesterday, the Municipal Labor and Social Security Bureau issued the "Beijing Lao She owned [2005] No. 77 Notice", on the establishment of labor relation issues and made detailed provisions.
Specified in the notice, the employer of labor relations in the lift, you must work according to number of years working in the unit to pay economic compensation.
The amount of economic compensation standards: working hours, for one year, to pay one month's wages in the economic compensation (less than one year according to the standard payment of one year); working hours for two years, to pay two months salary The economic compensation, and so on, but not more than 12 months of compensation.
For the economy to pay the standard monthly compensation, notice that, may, after mutual consultation, according to workers before I terminate the labor relationship, the 12-month average wage to perform.
Labor and social security department reminded the public that if the city workers and employers on the controversy over the existence of labor relations, may apply to the labor dispute arbitration committee for arbitration, or call 12 333 hotline for help.
According to regulations, workers refer to the legal working age in the country within a working capacity of the staff. Employer from the date of employment or a labor relations and labor relations should be established labor contracts. In other words, as long as there is substantial employment labor relations exist, they must sign labor contracts.
New regulations on the protection of workers (soon to visit)
Yesterday, the Municipal Labor and Social Security Bureau of Labor Wage Department official said, and the Ministry of Labor and Social Security, "to establish labor relations matters on notice" different, the city issued the "Beijing Lao She owned [2005] No. 77 Notice" combination of the actual situation of the city.
銆??鎹浜哄+浠嬬粛锛屽浜庡姵鍔ㄨ?鎷掔粷绛捐鍔冲姩鍚堝悓鐨勶紝鐢ㄤ汉鍗曚綅鍙互瑙i櫎鍔冲姩鍏崇郴锛屼絾搴斿綋涓哄姵鍔ㄨ?鏀粯缁忔祹琛ュ伩閲戯紝杩欎富瑕佹槸涓轰簡鏇村ソ鐨勭淮鎶ゅ姵鍔ㄨ?鐨勬潈鐩娿? Because in reality, workers refused to sign labor contracts, it may be because the memory unit to provide the labor contract and other unfair terms in the result. If the worker voluntarily terminate the labor relationship, the employer can not pay economic compensation.





相关链接:



DVR-MS To MPEG



Lying XML (directory)



QuickTime to MPEG



Terminal And Telnet Clients STORAGE



UTM Revolution - Who can not have both fish and bear's paw?



MKV to Xbox 360



CGI teaching: CGI environment variables used



weight loss for the Windows vista system security



Arima COMPUTER integrated way of human resources



President Of The Diversity Of Thinking And Practice In The Other Hand, Since According To (the)



How to quickly Assess the adoption of CMMI



BI, in the M & A growth?



reviews Accounting And Finance



Premier Screen CAPTURE



Tuesday, September 14, 2010

Operators burn punched 11 million users four drama success



Over the past year, China's "3G first year." One year ago today, the global news media, flash, China issued 3G licenses FireWire. This is the national implementation of the economic stimulus plan for a strong, China Mobile, China Telecom and China Unicom were given a 3G "pass", thus China into the 3G era.

Over the past year called "crazy money-burning" of the year. Carriers to drop down nearly 150 billion yuan of the large amount of money, setting off wave after wave of 3G wave, hitting the cities and even villages, one after another, behind the market staged battle is in full swing.

Networking contest the most money-losing carrier battle

3G was named last year's "most money-losing business," this is not an exaggeration. Statistics of the Ministry of Industry and Information said that the three major carriers last year, up 143.5 billion yuan of investment. The most direct return on heavy investment is more and more cities and even towns joined the ranks of 3G.

The last day of last year, announced that China Mobile, TD completion of the network 3, for more than 70% of the country to achieve 3G coverage areas and cities. China Mobile 3G coverage of 238 cities, covering only the beginning of the licensing of 10 cities. The same day, China Unicom, also said two of the 50 cities has begun to distribute telephone numbers, its WCDMA network covering 335 cities nationwide. However, China Telecom, the fastest pace. As early as last October, China Telecom's 3G network will cover 342 prefecture-level cities, 2055 more than 6,000 county-level cities and towns developed.

While in Happy Valley enclosure, the three carriers start competing brands Raiders, from China Telecom's "Wireless LAN" to China Mobile's "G3", and then to China Unicom's "fertile" advertising campaign and amplified.

According to the latest statistics Ovid consultation, last year China has more than 11 million 3G users, of which China Mobile's TD users temporarily first, a total of 500 million users fall under his command. TD rally the Chinese telecommunications industry in this effort of communication standards, the 3G over the first year of implementation of "third world" expected.

Feast equipment manufacturers ZTE and Huawei are the international jumping

Network operators building large single-feed fertilizer equipment suppliers. Contest in the Chinese and foreign brands, local equipment manufacturers come to the fore, especially Huawei and ZTE.

Several joy are anxious that this situation is the 2009 portrait of equipment manufacturers. Telecom operators in China, followed by a round of bidding equipment, Huawei, ZTE, Datang and Putian outshine the former foreign predators.

Foreign media inventory last year in the telecommunications industry, the use of the "Western does not shine Dongfang Liang" image view. Huawei and ZTE in China "3G first year" to draw up a beautiful curve. The end of the first quarter of last year, Huawei in the global telecommunications equipment market share of 15%. The end of the third quarter, Huawei's global market share rose to 20%, crowding out Noci, become second only to Ericsson, the world's second-largest telecommunications equipment manufacturers. ZTE's global market share rose to 7%. The two Chinese companies to take off in the same time, Alcatel-Lucent, Nokia Siemens and Nortel and other foreign companies struggling.

Huawei is the envy of the financial statements of last year, sales are expected to more than 30 billion U.S. dollars, an increase of nearly 29% over the previous year to become China's largest CDMA and WCDMA providers.

ZTE's mobile phone in the "wall" and the "wall" while flowering, is expected to become the world's No. 5 mobile phone operators. This is an unprecedented leap in mobile phone business.

Melee carriers operating system, PC giants control the mobile phone chain

Last year, China Mobile Release Ophone from platform to Intel chips Gangster joint Nokia; blossom everywhere from the Google Android phone, Google-branded handsets to the Nexus One Phone hot baked; from Nokia to create Linux-based maemo, to Qualcomm Brew MP cell phone plan ; from Plam exit the market, to the popular Apple iphone wave of global ... ... 3G mobile phone operating system to unprecedented fierce competition, gave birth to many new elements and Aspect.

Smartphone end stage go it alone, "terminal + application" model gradually become the mainstream. The strength of IT industry, all have aimed at mobile Internet opportunities, China Mobile, MM (application mall) on the line, which is the world's first operators to launch an online software store. China Telecom "Tianyi space" application Mart also launched a public beta. China Unicom is not far behind in the preparation of "Wo Shopping Mall."

Smart phones Smart 3G mobile phone universal tide thousand is not a dream

Last year in the first half, kept the mobile phone operator company sounded "Assembly", industry enthusiasm unprecedented agitation. So, Apple iPhone is coming, Blackberry has come, a variety of Xphone have come - moving OPhone, Google, Gphone, Microsoft Wphone and Unicom brewing in Uphone. The latest move is that China Telecom in the field of high-end smart phones have found a breakthrough in its 3G Internet, four-channel dual network dual standby phone and WIFI / WAPI Internet access a big fuss.

Competition in addition to high-end phones, the low-cost 3G smartphone market has entered the critical point. China Telecom Head Ma Daojie terminal, said a highlight of this year will be to build more affordable 3G phone. This year, China Telecom tried to thousands of 3G smart phones to grab the user.

At the same time, thousands of mobile smart phones have also been sharpening its talons. TD Industry Alliance, Lu Yu, director of marketing, said 600 to 1,500 yuan in low-cost smart phone will achieve a breakthrough this year. She expects the number of TD users will break 30 million mark, TD end market size will reach 45 billion yuan. As of the end of December last year, TD total number of 266 terminal section.

In fact, in the terminal area, but the most eye-catching smartphone, the last year from Smarbook to the Booklet, and then to electric paper book can be described as colorful.

3G the first year of Events

Licensing

January 7, 2009, the Ministry of Industry and Information Technology of China Mobile, China Telecom and China Unicom issued three third-generation mobile communication (3G) license, a move indicates that China has formally entered into the 3G era. Among them, the approval of China Mobile TD-SCDMA-based technology to increase standard of the 3G license, China Telecom to increase technical standard based on CDMA2000 3G licenses, China Unicom to increase technical standard based on WCDMA 3G license.

Brand

December 22, 2008, China Telecom launched its 3G brand "Tian-yi." January 7, 2009, China Mobile China Mobile 3G release marking "G3". April 28, 2009, China Unicom issued a new corporate brand "fertile."

Business

April 1, 2009, China's domestic 3G mobile standard TD-led, after a 1-year commercial trial, the official launch of the commercial process.

銆??2009骞?鏈?6鏃ワ紝鍦ㄤ腑鍥?G鍙戠墝100澶╀箣闄咃紝涓浗鐢典俊瀹e竷鍦ㄩ鎵?20涓煄甯傛寮忓晢鐢ㄥ叾3G涓氬姟锛岃?133銆?53鍜?89绛夋墜鏈哄彿娈电殑鐢ㄦ埛鍙洿鎺ュ崌绾т娇鐢?G缃戠粶銆?br />
May 17, 2009, China Unicom launched 3G in 56 cities in commercial trial, on October 1, China Unicom officially commercial 3G network.

銆??鈻犺鑰呰瀵?br />
Look forward to the era of 3G civilians

"Castles in the air" as "proximity." In the past year, 3G staged the drama to ordinary foot off the eyes of addiction.

We are pleased to see that, 3G will reach the office at: phone screen makes the smiling faces of their loved ones feel warm and noble past, dressed in civilian clothes more and more of the smart phone as "3G first year of the" best move people selling point.鍚屾椂锛?G瀵瑰唴闇?殑鎷夊姩绔嬬瑙佸奖锛屾湰鍦熻澶囧晢鍦ㄥ浗闄呭法澶寸殑鏅亶鍥板涓椿寰楁湁婊嬫湁鍛炽?

However, in addition to lively advertising campaign, high-end mobile phone turns debut and peaked again in addition to statistics, the average person, 3G brings surprises, or too little, not enough to engender the urge to upgrade.

First of all, 3G's rates still too high, whether it is mobile Internet access or voice calls, the cost is still a certain threshold. Although the operator has launched the "stored Huafei for mobile phones" and other incentives, but touched upon the cell phone prices will always see a high level, but the algorithm incentives puzzled. In fact, consumers do not care what brand and what you are operators, cost is the most important measure.

Secondly, 3G licenses before the clamor of the so-called "killer application" did not give all themselves. Now look, before the general optimism of 3G video calls and did not fire up. As the first batch of 3G users, the author himself did not play a few video calls, because the concrete used in many conditions bound, for example, call each other must also be 3G users.

Some people wonder, 3G speed of development is too slow? Allegedly to a company's findings on the 3G user is melancholy: 3G "first experience were" typical of a low age, low income and low education, and the industry is expected to complete this not the same.

3G embarrassment is far more than that.澶ф妸鐨勯摱瀛愮牳杩涘幓涔嬪悗锛屽鍔犵殑甯﹀杩樻病鏈夌粰杩愯惀鍟嗗甫鏉ョ湡閲戠櫧閾躲?鍦ㄦ櫤鑳芥墜鏈哄ぇ鏅強鐨勬氮娼笅锛屽浗浜у搧鐗岀殑韬奖澶皯銆?An official said the Ministry of Industry, trapped in the core technology, 3G mobile phone standing on the top of the current mostly foreign giants. Reported last year, the production of 3G handsets in China, the foreign-funded enterprises accounted for 93%.

Fortunately, the confusion is only temporary, perhaps these questions will be resolved in 2010. We look forward to a genuine civilian era of 3G. 3G mobile phone is only as 2G handsets to sell when the 3G era that is popular.







相关链接:



realplayer FLV



youtube video formats



Windows media player psp



Wmv Mpeg Converter



Thursday, August 5, 2010

Xiang Yang North Korea: IPv6 Pioneering and harvest


Why Digital China network to start-up phase of the development came hard? In the new dawn of innovative technologies, the Chinese enterprises to seize opportunities to leapfrog development, and foreign giants on an equal footing? The road towards innovation, Digital is how to bear the pressure from inside and outside a firm grasp their own rhythm and pace of development?

Depends on how far companies can go to see how far.

Independent research and development, for most Chinese enterprises still in its infancy, and even still elusive, however, some pioneers have tasted the fruits of success. This independent research and development of road for every Chinese enterprises are not the broad road is flat, every enterprise has a small trail of their own, each firm also has a huge repertoire of R & D story.

In the golden age of OEM networking products, many companies have no technical ability to do OEM choose to sit in the cash register, and Digital Networks has chosen the hard road of independent research and development.

Maturity in the market for networking products, which has the technical capacity of the enterprises have withdrawn from the market, but it tasted Digital Network to bring the fruits of innovation: a one-time adoption of IPv6 is the first phase of testing, and become the first Gold Certified through the IPv6 The company, its 7600 series of Gigabit switches are still the core of the overseas market in 2004 to achieve a breakthrough. In October, should be invited to the NDRC, Digital China Digital China network will also represent the first group to participate in the eighth, held in Shenzhen Hi-Tech Fair, unveiled the next generation network (NGN) Pavilion.

Digital Network debut in the eighth before the fair, China Computer Daily News the Digital Networks CTO Dr. Xiang Yangchao, listen to him talk about the rough road of those who developed the story.

Independent research and development of the road: moving several times leap

Reporter: Digital Networks, said, we first concern is that a local Internet companies is how to take the road of independent research and development? Many people in the industry for the first time to understand the network of independent research and development of Digital China, in 2002, after the company parted ways with the D-Link, we surprised that you can in a very short period of time the network launched a series of self-developed products.

Xiang Yang North Korea: Digital self-developed road network is not smooth, and even passed several stages of R & D department from the relocation of several office addresses to analyze evolution.

Our independent research and development history dates back to 1997, when calculated by the Chinese Academy of Sciences and co-founded Lenovo Lenovo Research Institute, of which 50% of the power network of R & D work is done, when including network security, network management, routers , switches, and network testing are five. Since 1999 involved in 863 projects - high-performance router, large-scale projects, R & D personnel has grown, office address transferred to the Institute of Physics. Lenovo split in 2000 after the company moved to the network where the building code Heeg.

Before moving to Sigal building code, as the nature of the R & D Institute, our participation in large-scale projects of national high-performance router, when the participants combine with the forces should be said that very strong research base. At the time, some of the network R & D results and not products and marketization, but a lot of talent cultivation. Since 2000, Digital Networks began thinking of R & D R & D department to adjust according to their own. From the prospective study, to close the market mature products, we have completed the research to the results from the accumulation of technology, complete R & D department from the Institute to change the pattern.

Reporter: Why Digital Network in the popular networking products OEM golden era, but chose to walk independently developed such a hard road? R & D and CTO from the perspective of how to look at the decision-making?

Xiang Yang North Korea: Internet companies established since that day, we have been discussing is the independent R & D or OEM, the end result is that we must unswervingly take the road of independent research and development. Although the initial phase of very hard, but after years of network technology and product development, we already have accumulated a great deal of basic technology, the importance of independent research and development continue to make R & D achievements in the former to be an epiphany. When we settled on with Digital China Group to the development of information industry base, to complete its third move, the researchers doubled the size of 5 fan than in the past, accounting for one third of the total number of companies, but also for investment in research and development have continued to increase in current annual sales of 10% to 12% are used for R & D.

Reporter: It can be said that many technology from scratch, you as the CTO of the biggest difficulties and pressures that? Is how to lead your team in high-end network equipment R & D R & D, passed the most difficult of the founding period?

Xiang Yang North Korea: When I first faced with the difficult task of how to strengthen the industry in depth, there is the size of the market accounted for half of the entire network of industry products to speed up the switch. However, we realize that switch products will be developed in the beginning we mainly the access and aggregation layers done in several years of accumulated technology, technology is mature, we began to plan to set foot in the core layer switches products. We all know that manufacturers should have its own core products, or face severe market competition. In 2003, we began to plan their core routing switches designed products. This product should be able to cope with multi-service load conditions, the core application.

Through the efforts, in 2004, we introduced 76 Series Gigabit core switch. Can be introduced in 2004 on the Gigabit core switch, based on technology from our many years of accumulation. One high-end switch is a large part of the technical threshold of routing functions, which had just used our high-performance routers in R & D projects in many countries, the accumulation of routing technology, it can quickly pass the threshold. In addition, new research has begun to switch on the system architecture level, taking into account the future impact of IPv6.

IPv6 road: no small heart with bottom pressure

Reporter: Tom 椹柉璐归噷鏇?in "The World is Flat" is mentioned: "As long as there is broadband, as long as you have ambition, no matter where you are, are not marginalized. Competition foothold become equal, and small shrimp and can equal the great whales. "We know that back in 2003, Digital China IPv6 network has been fully anticipate the future development prospects, in particular an accurate grasp of the" IPv6 technology can enable all countries on the same starting line, "This an opportunity. In 2005, your company become the first certified by the second phase of the enterprise IPv6. Before that, you feel the company's internal and external to the Digital China network migration to IPv6 what attitude?

Xiang Yang North Korea: In 2003, although we see IPv6 R & D direction, but then did not select large-scale commercial IPv6 research. In fact, this point, the company's attitude is consistent from top to bottom: prospective study and practical work to balance. When our energies are IPv4 products and research programs, research and development primarily to consider how to improve the integrity of network products from high to low line. Time to consider IPv6, mainly in infrastructure designed to consider the application and technology trends and future integration and compatibility, because the independent research and development of new products and programs must be able to meet future demand, but there was no large-scale R & D investment to do IPv6.

From the beginning of 2004, we started to consider IPv6 R & D and investment in research started six months after deployment. At that time, focused on a number of R & D focus on developing the backbone for closed, so do the other day to day development work was less affected. Focus on research into the structure of expert system of sorting out the results are satisfactory, it is mainly accumulated in previous years met the technical effectiveness of a down, the commercialization of IPv6 migration therefore relatively smooth and fast. We are confident this R & D department, after a closed development into a lot of manpower and energy research and development for nearly a year, in May 2005 through the first stage of IPv6 certification. Then we put a lot of strength to undertake solid, in September a one-time adoption of IPv6 is the second phase of testing.

Reporter: It is reported that Digital China as one passed the authentication, also third-party testing agency refunded 30% of the certification test cost?

Xiang Yang North Korea: When we send test before the third-party evaluation has been suggested that, after the company was once without a pass, so we were also ready to put a few people dedicated to follow the 3 months evaluation personnel stationed in the psychological well a prolonged war preparations. Third-party testing in the delivery, we are very cautious, in the company's test environment has already done a very thorough test. The results the first time we passed the test, how many or some unexpected.

It is worth mentioning that in the first phase of IPv6 test before sending, our products already have a lot of IPv6 can be the second phase of testing protocols and functions, because on the first phase of testing the sense of network products, the user end and can not really use them, from the application yet. So passed the first stage, we began to consider sending the second phase of testing, the only way to make products for user applications. Either from the market point of view, or from the user point of view, we need to do the user can use the IPv6 product, rather than certified, and this is then we will soon be the first to obtain IPv6 on the second phase of certification of domestic enterprises reasons.

Reporter: independent research and development from the beginning to the second stage through the IPv6 testing, I believe that within the company there are always different views. CTO is in the air waves, especially, in IPv4, when just started pioneering the development of IPv6, you will certainly hear the voices from different areas and pressure.

Xiang Yang North Korea: In early 2004, we have from the market and the national policy orientation, clearly felt a wave of IPv6, the market has a lot of users, such as the voice of college. We are constantly adding new features to improve the product while IPv4, IPv6 to do this new platform, at least to put 1 / 3 of the human and effort. The platform is made in the function is actually the same as IPv4, if the user does not endorse may suffer losses. Can not let the huge investment failed to be implemented.

From R & D point of view, I bear the greatest pressure is to first ensure that IPv4 meet market needs, as much as possible to ensure IPv6 innovation. Platform can be smoothly transformed from IPv4 to IPv6 platform, the biggest pressure and risk of R & D department in the party. If the transfer of instability after the IPv6 platform, they will cut off the lifeline of the entire company.

But from a technical point of view, I have no pressure, after all, the future of the technology for many years and our strength, I and the entire R & D departments are well-thought-of. However, from the corporate level to consider the burden of the body really very heavy, the main concern is to see the return on corporate investment. IPv6, IPv4 innovation will affect the user's customized needs and product innovation capabilities? These are the conflicts, how to balance pressure.

Reporter: Even though you are a second phase of testing through the IPv6 business, but not the first one through the first phase of testing. Then see the other enterprises have passed the test, you just start preparing, you feel the pressure from internal and external?

Xiang Yang North Korea: We do also feel some pressure. However, beginning in July 2004 when the research IPv6, IPv4 we have just completed a high-end product development, launched a high-end routing switch 7600 series, when the push to ensure full line of products IPv4 and product line integrity is top priority. Therefore, we will not worry so much about the practice of other companies, the most important thing is to ensure their own pace and rhythm. Facts later proved that we had the lead in the second stage.

Road to Innovation: allow fail to create value

Reporter: Speaking of innovation, you should be the most affection for. "Growth comes from innovation, and innovation leading IT services," the industry familiar with the phrase. Innovation, for products such as Digital China Networks-based companies is particularly important. It is said that your company, the importance of an innovation system is "allowed to fail." I ask, as head of R & D, you and your team how to understand the "Allow failure"? Specific examples and share with us?

Xiang Yang North Korea: I think the innovation to create value, no innovative ideas, there can be no 7600 series, not to have achieved a leading IPv6. But I think the goal of innovation is also a planned innovation, I will ask the developers have to go out and see the market look at user requirements, to the Forum to watch the trend, the direction can not be allowed to see a "preview" mechanism. This preview is in fact a small-scale investment, within a few months a small research projects and research. A lot of rehearsal for the project was unsuccessful, but if successful will be able to open up new market opportunities.

Reporter: innovative mechanisms highlighted by many companies. R & D department, how do you balance the interests of long-term investment and the recent conflicts? As a CTO to lead and motivate staff to carry forward the spirit of innovation, encourage them to continue to innovate?

Xiang Yang North Korea: We had set up R & D when compared to the scale of growth has improved significantly, even to the current R & D has accounted for one third of the total number of companies, but still in the research stage of development, I believe that some Chinese companies have also reached this scale. We currently can not support a lot of personal whim, or to give them time to working to achieve, try these ideas. Our current thinking is not encourage large-scale innovation, but innovation is not possible, we are still based on user and market needs, targeted to innovation, to make technical staff clear "technology to create value" of this idea .

Of course, incentives are also very important. The second phase of testing such as IPv6, we have no set time points, did not form a project plan, if not reached and will not punish, but to motivate them extra incentive. May 2005 through the first phase of testing time, the second phase of our products through most of the work has been completed and therefore not as a project Ji Hua Ji Zhexieyanfa Renyuantaiduo of Yali, the staff of the Chuangxin policy of the spirit and motivate them continue its efforts, a few months after the first in the country through the second phase of testing. Each company is different, Digital technical staff share a common vision - technology to create value, they developed the product to be recognized, is the highest honor.

Reporter: Speaking of honor, the ordinary man, president of Digital China Group Award should be awarded to the management team, and you have got the fiscal 2005 president of Digital Award. Do you think you can get the highest honor within the company's reason? Received this award, the heart is pressure?

Xiang Yang North Korea: President's Award in the past, given the sales and management personnel, is the first time last year awarded to technical staff. Guo Wei, president of Digital China Group in the transformation and innovation, and more recognition of technological innovation to create value. I got the President Award, is believed to be the encouragement of all technical staff. In the near future, we will continue to develop forward-looking orientation of value networks. Such as research and development have been identified to continue the high-end products in the market to move into the field operators, the development of carrier-grade Ethernet. And from a technical level, Ethernet is the future development of operational reliability in high availability level of development, which is the development trend. In addition, wireless broadband and security will also be studied.

Link

Digital China Networks

Digital China Networks Limited is a wholly owned subsidiary of Digital China, to the spirit of entrepreneurship and innovation, based on application of the domestic industry to target market-oriented, fully integrated resources to promote full range of industry solutions, network products development. Its self-developed products include switches, routers, firewalls and other network equipment across the board, is a leading manufacturer of professional network and business scope covers LAN, WAN, wireless network, metropolitan area network and broadband access networks and other fields.

Digital network access to the network since 1997, the market has been active grasp user needs, our "customer-oriented, technology-driven, service first" purpose. Over the years, based on independent research and development, established to provide users with a variety of customized products and complete solutions for rapid response mechanism. Digital China network to promote the "Dynamic Distributed Defense Security Management Strategy" - 3D-SMP, inside and outside for customers and create a "solid" network security environment. Digital Network became the first gold-certified through the global IPv6 network companies, in the IPv6 next-generation Internet core technologies, not only walking in the forefront of the domestic network of manufacturers, but also become an internationally renowned manufacturer of a strong network of competitors.

Digital networks in education, operators, government, business, financial, military, public security, medical and other industries and welcomed by customers, has achieved remarkable success, not only into the e-government IT hundred, also won the China Communications industry "top fifty overall strength of the telecommunications" and "service Telecom IT companies top ten" in the education sector has become the first brand for customers.

Digital China network, independent research and development is not free, walk or even several stages of R & D department from the relocation of several office addresses to analyze evolution.

I think the innovation to create value, not innovative ideas, there can be no 7600 series, not to have achieved a leading IPv6.

Digital China Networks Limited Vice President and CTO, 1996 in automatically by the Chinese Academy of Sciences Ph.D., former CAS Institute of Computing Information Network Research Center Director, Academic Computing Committee and the National SME Innovation Fund Network communication evaluation experts, responsible for routing switches, firewalls and network management software development, is well-known network of technical experts.

Since 2002, he was vice president of Digital China Networks, Technical Director and General Manager of R & D center, leading the team successfully developed 27 and 36 series routers, embedded operating system platform to exchange routing DCNOS, cross-platform network management system, including 10 000 Zhao core routing switch products including full line of switches, wire-speed Gigabit network processor-based firewall, the security under a wide range of LAN management system certification.

R & D team in 2005, leading line of switching products to the IPv6 routing protocol transition of R & D, and in June 2005 successfully passed the first stage of IPv6 certification, in September through the second phase of IPv6 certification.






相关链接:



IP address errors caused by routing anomalies located



Lu First Group: The Advent Of The China Open Source Inflection Point



Articles about Music Composers



Ts to mpg



Flash video playback controls REVERSED



Vob format



Strategy And War Games Report



E-cology In The Pan Micro Series 22



Computer Education Infomation



Digital TV CHUNJIANG Plumbing



DEALERS also need to plan



reviews Audio Recorders



convert SWF to flv



Was brilliant: Ten-man weapon crack revealed inside story of classical



free download mp4 to mpeg Converter