首页 > 最新文献

Proceedings of the seventh symposium on Data communications最新文献

英文 中文
Proceedings of the seventh symposium on Data communications 第七届数据通信专题讨论会论文集
Pub Date : 1981-10-27 DOI: 10.1145/800081
W. Chou, Juan Milton Garduño, K. Thurber
{"title":"Proceedings of the seventh symposium on Data communications","authors":"W. Chou, Juan Milton Garduño, K. Thurber","doi":"10.1145/800081","DOIUrl":"https://doi.org/10.1145/800081","url":null,"abstract":"","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125726739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
48-bit absolute internet and Ethernet host numbers 48位绝对互联网和以太网主机号
Pub Date : 1981-10-01 DOI: 10.1145/800081.802680
Y. K. Dalal, R. Printis
Xerox internets and Ethernet local computer networks use 48-bit absolute host numbers. This is a radical departure from practices currently in use in internetwork systems and local networks. This paper describes how the host numbering scheme was designed in the context of an overall internetwork and distributed systems architecture.
施乐互联网和以太网本地计算机网络使用48位绝对主机号。这与目前在互联网系统和本地网络中使用的做法完全不同。本文描述了如何在整个互联网和分布式系统架构的背景下设计主机编号方案。
{"title":"48-bit absolute internet and Ethernet host numbers","authors":"Y. K. Dalal, R. Printis","doi":"10.1145/800081.802680","DOIUrl":"https://doi.org/10.1145/800081.802680","url":null,"abstract":"Xerox internets and Ethernet local computer networks use 48-bit absolute host numbers. This is a radical departure from practices currently in use in internetwork systems and local networks. This paper describes how the host numbering scheme was designed in the context of an overall internetwork and distributed systems architecture.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133913425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Demand assigned multiple access systems using collision type request channels: Priority messages 使用冲突类型请求通道的需求分配多访问系统:优先级消息
Pub Date : 1981-10-01 DOI: 10.1145/800081.802667
G. Choudhury, S. Rappaport
Demand Assigned Multiple Access (DAMA) schemes in which requests for communication channels are transmitted over collision type channels to a master controller and in which messages of different priorities are present is analyzed. Priority use of the request channels is achieved by having users select among those channels according to a priority dependent probability distribution. Two important schemes of this class are considered. Additionally, three schemes for priority assignment of message channels are treated; two are non-preemptive and one is preemptive. Trade offs among bandwidth utilization and delay are considered as well as optimization of system parameters.
在DAMA (Demand Assigned Multiple Access)方案中,通信通道请求通过冲突型通道传输到主控制器,并且存在不同优先级的消息。请求通道的优先级使用是通过让用户根据优先级相关的概率分布在这些通道中进行选择来实现的。本文考虑了这一类的两个重要方案。此外,还讨论了三种消息通道优先级分配方案;两个是非先发制人的,一个是先发制人的。考虑了带宽利用率和时延的权衡以及系统参数的优化。
{"title":"Demand assigned multiple access systems using collision type request channels: Priority messages","authors":"G. Choudhury, S. Rappaport","doi":"10.1145/800081.802667","DOIUrl":"https://doi.org/10.1145/800081.802667","url":null,"abstract":"Demand Assigned Multiple Access (DAMA) schemes in which requests for communication channels are transmitted over collision type channels to a master controller and in which messages of different priorities are present is analyzed. Priority use of the request channels is achieved by having users select among those channels according to a priority dependent probability distribution. Two important schemes of this class are considered. Additionally, three schemes for priority assignment of message channels are treated; two are non-preemptive and one is preemptive. Trade offs among bandwidth utilization and delay are considered as well as optimization of system parameters.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SNATCH opens manufacturers' networks through gateways SNATCH通过网关打开了制造商的网络
Pub Date : 1981-10-01 DOI: 10.1145/800081.802658
D. Einert, G. Glas
At the present manufacturers' network architectures do not provide co-operation between systems exceeding the boundaries of their own homogeneous networks, i.e. open systems as defined the ISO Reference Model of Open Systems Inter-connection do not yet exist. Project SNATCH shows to open the closed network architectures of two important computer manufacturers by means of gateway system. Mapping the manufacturers protocols onto neutral protocols and vice versa, gateway system acts as a channel between the closed manufacturers' networks. Since this solution is in principle not restricted to systems of only two manufacturers, SNATCH points out a practicable way to a generally open system.
目前,制造商的网络架构不提供超越其自身同构网络边界的系统之间的合作,即ISO开放系统互连参考模型所定义的开放系统尚不存在。SNATCH项目展示了通过网关系统打开两个重要计算机制造商封闭的网络体系结构。网关系统将制造商协议映射到中立协议,反之亦然,网关系统充当封闭制造商网络之间的通道。由于此解决方案原则上不限于只有两个制造商的系统,因此SNATCH指出了一种实现一般开放系统的可行方法。
{"title":"SNATCH opens manufacturers' networks through gateways","authors":"D. Einert, G. Glas","doi":"10.1145/800081.802658","DOIUrl":"https://doi.org/10.1145/800081.802658","url":null,"abstract":"At the present manufacturers' network architectures do not provide co-operation between systems exceeding the boundaries of their own homogeneous networks, i.e. open systems as defined the ISO Reference Model of Open Systems Inter-connection do not yet exist. Project SNATCH shows to open the closed network architectures of two important computer manufacturers by means of gateway system. Mapping the manufacturers protocols onto neutral protocols and vice versa, gateway system acts as a channel between the closed manufacturers' networks. Since this solution is in principle not restricted to systems of only two manufacturers, SNATCH points out a practicable way to a generally open system.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling and analysis of flow controlled packet switching networks 流控分组交换网络的建模与分析
Pub Date : 1981-10-01 DOI: 10.1145/800081.802663
S. Lam, Luke Y.-C. Lien
Packet switching networks with flow controlled virtual channels are modeled by closed multi-chain queueing networks. The tree convolution algorithm for an exact analysis of such models is discussed. The algorithm is very efficient when routing chains have sparseness and locality properties that are typical of communication network models. The accuracy of an approximate model of equivalent open chains was investigated. An optimal routing criterion for adding a virtual channel (with a window size of one) to an existing network is explored.
采用封闭多链排队网络对具有流控虚拟通道的分组交换网络进行了建模。讨论了精确分析这类模型的树卷积算法。当路由链具有稀疏性和局部性时,该算法是非常有效的,这是典型的通信网络模型。研究了等效开链近似模型的精度。探讨了在现有网络中添加虚拟通道(窗口大小为1)的最优路由准则。
{"title":"Modeling and analysis of flow controlled packet switching networks","authors":"S. Lam, Luke Y.-C. Lien","doi":"10.1145/800081.802663","DOIUrl":"https://doi.org/10.1145/800081.802663","url":null,"abstract":"Packet switching networks with flow controlled virtual channels are modeled by closed multi-chain queueing networks. The tree convolution algorithm for an exact analysis of such models is discussed. The algorithm is very efficient when routing chains have sparseness and locality properties that are typical of communication network models. The accuracy of an approximate model of equivalent open chains was investigated. An optimal routing criterion for adding a virtual channel (with a window size of one) to an existing network is explored.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
X.75 internetworking of Datapac and Telenet X.75 Datapac和Telenet的互连
Pub Date : 1981-10-01 DOI: 10.1145/800081.802679
Mehmet S. Unsoy, Theresa A. Shanahan
In 1980, agreement was reached by CCITT defining a standard for the interconnection of public data networks. As a result, networks have been able to proceed with the establishment of international services using CCITT Recommendation X.75. This paper discusses the methodology used and the operating experience gained by the introduction of an X.75 interface between the GTE Telenet and Datapac public packet switching networks.
1980年,CCITT达成协议,定义了公共数据网络互连的标准。因此,各网络能够利用国际电信委员会建议X.75着手建立国际服务。本文讨论了在GTE teleenet和Datapac公共分组交换网络之间引入X.75接口所使用的方法和获得的操作经验。
{"title":"X.75 internetworking of Datapac and Telenet","authors":"Mehmet S. Unsoy, Theresa A. Shanahan","doi":"10.1145/800081.802679","DOIUrl":"https://doi.org/10.1145/800081.802679","url":null,"abstract":"In 1980, agreement was reached by CCITT defining a standard for the interconnection of public data networks. As a result, networks have been able to proceed with the establishment of international services using CCITT Recommendation X.75. This paper discusses the methodology used and the operating experience gained by the introduction of an X.75 interface between the GTE Telenet and Datapac public packet switching networks.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116204078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An analysis of link level protocols for error prone links 对易出错链路的链路级协议的分析
Pub Date : 1981-10-01 DOI: 10.1145/800081.802666
L. J. Miller
This paper analyzes the maximum throughput across a full duplex link, under three link level protocols. The three protocols all assume cumulative acknowledgements, but the sender's retransmission policy and the destination's policy on retaining correctly received packets which arrive before an expected retransmission do differ. The results quantify the throughput advantages in retaining all correctly received packets, for the two different retransmission policies. A retention policy on the part of the destination is most advantageous when the link is quite error-prone.
本文分析了三种链路级协议下全双工链路的最大吞吐量。这三种协议都假定累积确认,但是发送方的重传策略和目的地保留在预期重传之前到达的正确接收的数据包的策略是不同的。对于两种不同的重传策略,结果量化了保留所有正确接收的数据包的吞吐量优势。当链接非常容易出错时,目的地部分的保留策略是最有利的。
{"title":"An analysis of link level protocols for error prone links","authors":"L. J. Miller","doi":"10.1145/800081.802666","DOIUrl":"https://doi.org/10.1145/800081.802666","url":null,"abstract":"This paper analyzes the maximum throughput across a full duplex link, under three link level protocols. The three protocols all assume cumulative acknowledgements, but the sender's retransmission policy and the destination's policy on retaining correctly received packets which arrive before an expected retransmission do differ. The results quantify the throughput advantages in retaining all correctly received packets, for the two different retransmission policies. A retention policy on the part of the destination is most advantageous when the link is quite error-prone.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"460 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132936485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why a ring? 为什么是戒指?
Pub Date : 1981-10-01 DOI: 10.1145/800081.802676
J. Saltzer, K. Pogran, D. Clark
In a world increasingly populated with Ethernets and Ethernet-like nets a few sites continue to experiment with rings of active repeaters for local data communication. This paper explores some of the engineering problems involved in designing a ring that has no central control, and then compared the M.I.T.-designed ring with Ethernet on a variety of operational and subtle technical grounds, on each of which the ring may possess important or interesting advantages.
在一个以太网和类似以太网的网络日益普及的世界里,一些站点继续尝试用有源中继器环进行本地数据通信。本文探讨了设计一个没有中央控制的环所涉及的一些工程问题,然后将麻省理工学院设计的环与以太网在各种操作和微妙的技术基础上进行了比较,每个环都可能具有重要或有趣的优势。
{"title":"Why a ring?","authors":"J. Saltzer, K. Pogran, D. Clark","doi":"10.1145/800081.802676","DOIUrl":"https://doi.org/10.1145/800081.802676","url":null,"abstract":"In a world increasingly populated with Ethernets and Ethernet-like nets a few sites continue to experiment with rings of active repeaters for local data communication. This paper explores some of the engineering problems involved in designing a ring that has no central control, and then compared the M.I.T.-designed ring with Ethernet on a variety of operational and subtle technical grounds, on each of which the ring may possess important or interesting advantages.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133730463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
A heuristic method for optimizing an intercity data transmission network 一种优化城际数据传输网络的启发式方法
Pub Date : 1981-10-01 DOI: 10.1145/800081.802662
R. Pazos
This paper deals with the problem of finding the minimum cost flow pattern for a large intercity data transmission network which provides private lines between pairs of cities and which is subject to capacity constraints. This problem can be formulated as a minimum cost multicommodity flow problem. The most efficient linear and integer programming approaches yield programs with memory requirements proportional to the square of the problem size, making impractical their use for large scale problems. In this paper a heuristic method is described which produces suboptimal solutions with smaller execution time requirements, and memory requirements linear with the problem size. Experimental results are presented comparing the proposed method with a Linear Programming approach.
本文研究了在容量约束下提供城际专用线的大型城际数据传输网的最小成本流模式问题。这个问题可以表述为最小成本多商品流动问题。最有效的线性和整数规划方法产生的程序的内存需求与问题大小的平方成正比,这使得它们在大规模问题中的应用变得不切实际。本文描述了一种启发式方法,该方法产生的次优解具有较小的执行时间要求,并且内存要求与问题大小成线性关系。实验结果与线性规划方法进行了比较。
{"title":"A heuristic method for optimizing an intercity data transmission network","authors":"R. Pazos","doi":"10.1145/800081.802662","DOIUrl":"https://doi.org/10.1145/800081.802662","url":null,"abstract":"This paper deals with the problem of finding the minimum cost flow pattern for a large intercity data transmission network which provides private lines between pairs of cities and which is subject to capacity constraints. This problem can be formulated as a minimum cost multicommodity flow problem. The most efficient linear and integer programming approaches yield programs with memory requirements proportional to the square of the problem size, making impractical their use for large scale problems. In this paper a heuristic method is described which produces suboptimal solutions with smaller execution time requirements, and memory requirements linear with the problem size. Experimental results are presented comparing the proposed method with a Linear Programming approach.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HDLC reliability and the FRBS method to improve it HDLC可靠性及FRBS方法的改进
Pub Date : 1981-10-01 DOI: 10.1145/1013879.802683
J. Selga, J. Rivera
This paper arrived late and can be found, published in full, on pages 260-267 of the Proceedings.
这篇论文姗姗来迟,全文发表在《论文集》的260-267页。
{"title":"HDLC reliability and the FRBS method to improve it","authors":"J. Selga, J. Rivera","doi":"10.1145/1013879.802683","DOIUrl":"https://doi.org/10.1145/1013879.802683","url":null,"abstract":"This paper arrived late and can be found, published in full, on pages 260-267 of the Proceedings.","PeriodicalId":217472,"journal":{"name":"Proceedings of the seventh symposium on Data communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1981-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the seventh symposium on Data communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1