ࡱ> EGDv[@ 2,bjbj44 wViVi# $2,,,PJ-t-42v\f-~|////ANANAN[[[[[[[$]R.`\8QMAN8Q8Q\//0\SSS8Q@/(/[S8Q[SSSX|R}Y /- A,xQX[F\0v\X`TRT`$Y$`YlANNSOlOIANANAN\\22d*dS22*Thesis proposal Han Gao hangao@cs.uchicago.edu April 3rd, 2003 Abstract Accelerated by network technologies, network service becomes a key component for network system development. According to the definition and properties of network service, we propose a multi-layered model for developing and deploying network services. 1. Introduction Based on the concepts of Grid and Future Laboratory, an advanced system architecture is required for ubiquitous access to the network resource. The heterogeneous network characteristics, various device capabilities and specified requirements always make the application have unacceptably performance and, furthermore, the network resources have unexpected low utilization. Network service, as an emergence of new network utility, become one efficient solution for those situations. Consider the following scenario (Figure 1): Alice, a researcher in London, wants to use Access Grid to collaborate with her coworker, Bob, in Chicago. However, in some reason, the media device in Chicago can only interact with 16kHz (sample rate) audio stream while Alice can only produce and consume 8kHz audio steam. After capability negotiation in the AG venue, the network service engine is invoked. It discovers the corresponding network service of transcoding engine, which encodes and decodes between 8kHz and 16kHz. Then the stream route will be redirected via the network service and Alice and Bob can communicate each other freely. During that procedure, the specified modules such as broker, registry, monitor, management and the network service introduce a new framework while it is transparent and unaware for both users in Chicago and London.  Figure 1: AG Scenario: the black arrow lines composite the view of end users; the green tracks composite actual data stream route; the red track composite the manager of the whole framework.  However, the current network service remains many open issues to be resolved. The specific requirements and faster development of scalable services encourage us to design a framework to drive them running smoothly. At the first of all, we should understand the properties of network service: (1) Resource object: we should view it as a kind of network resources which are open to any applications relay on network backplane; (2) Decentralized: there is no global administrator for all of the network services, each network service is managed locally; (3) Heterogeneous: specific conditions make network services have different goals and service domains. Therefore, we should have a general architecture have the following nice properties: Soft-state: due to the heterogeneous characteristics of networks, services can find a reasonable architecture to fit in. Each component will exist and be maintained via a mixture of explicit and probabilistic means; Decentralized: services are managed by the specific processing chain. In this specific procedure we have local management modules; Self-adaptable: the architecture should provide a global adaptation during network service running. Reconfigure the necessary components to handle the dynamic and non-local changes; Transparent: the running procedure of network service is as transparent as possible to each end user. The application server invokes the network service and then afterward steps are processed by the other modules in our framework; Stream-capability: the high speed of networks and high processing ability of processors drive us consider the framework have an ability to deal with large scale data stream. 2. Theoretical Model As we discussed above, the future framework of network should be comprised by a set of network resource object and links connect them. We view the running systems as a chain of object nodes, data stream flow back and forth along the links. According that view, we propose a general architecture for development and utilization of network services. Our theoretical model is four layered, hierarchical system structure (Figure 2): Application layer: users can plug their various resources, applications and services from different domains in this layer; Content Interceptor layer: this layer translates applications, resources and services to description files defined by specific schemas. It also forward the content information down to stream layer; Stream Routing layer: recording information of data stream to a suitable data structure from content layer, obtain link information from lower layer; Network Link layer: providing registered network physical links and reflectors to upper layer.  Figure 2: General Architecture: yellow blocks represent APIs; red lines connect each layer to each corresponding management module. We note that there are sets of APIs for interactions among layers and controls with management. 3. Technical Details We find several interesting projects in this framework. 3.1 General Matcher Before the whole framework running, we need build a chain of each related nodes network services and clients. Along the chain, data steam can be processed or just forwarded by each node. A broker should be an important module to build a chain since we need negotiate capability of each object for the best performance. For efficiency and portability, we propose a general matcher for various kinds of capabilities (Figure 3). The schemas become a key component for each interceptor file, since for different capabilities there are different parameters and conditions. Currently, we use a description language ClassAd as our implementation libraries. 3.2 Matching Algorithms  Figure 3: General Matcher: each red block represent a schema for each capability description files and rule set files. We propose a heuristic algorithm for capability negotiation. A resolution vector is represented as  EMBED Equation.3  where  EMBED Equation.3 are n independent parameters and  EMBED Equation.3  is an n dimensional vector space. For each capability set, we can compose at least one segment a set of vectors in this space. Suppose there are two vectors  EMBED Equation.3  need to match with each other. The capability transformation service can be represented as an  EMBED Equation.3  transformation matrix  EMBED Equation.3  related with  EMBED Equation.3 ,  EMBED Equation.3 :  EMBED Equation.3  Suppose we have two sets of resolutions:  EMBED Equation.3 ,  EMBED Equation.3 . Our goal is to find a transformation service which transforms each possible best resolution from each set:  EMBED Equation.3  From above equation, we can obtain the best capability for each side via transformation service. Considering multiple sets situation, suppose we have  EMBED Equation.3  sets of capabilities,  EMBED Equation.3  We obtain independent capability sets first:  EMBED Equation.3  and find the optimal transformation service for each two independent capability sets:  EMBED Equation.3  3.3 Stream Topology Algorithms Stream routing layer integrate service information forwarded by the upper layer content interceptor -- with connectivity information provided by the lower layer network links. One technical point is that we need define a data structure for storing all information, such as session number, session type, resource, destination and cost. We can use record as the following: ( session, type, source, destination, cost ) Due to cost or bandwidth issues, there is no path for some pairs of nodes and the active session is not connected. One idea is that we can borrow a node or set of nodes from another session and make every pair of nodes can interact each other in this active session. We can simplify this model by mathematical description. Suppose we have two sets of nodes: active session  EMBED Equation.3 . For the active session, we have a graph:  EMBED Equation.3 . If it is not connected, we need borrow a node or set of nodes from  EMBED Equation.3  and comprise a new connected graph:  EMBED Equation.3 . We note cost of graph as  EMBED Equation.3 . The optimal solution is a minimum-cost graph:  3.4 Network Service Architecture Integration As we discussed above, our theoretical model is a multi-layered hierarchical architecture. Here, we need two API libraries to package the network service. Each lower layer is designed for providing service to upper layer while the upper layers provide necessary information to lower layers. So we need a interacting API library for interaction between two adjacent layers. Since each layer interact with its specific management, control API library implementation is necessary for module and layer. We will embed this library to content-interceptor layer for a detailed example and integrate each layer by implementing interacting API. PAGE v 4 Network Figure 1: AG Scenario: the black arrow lines composite the view for application users M G M N T Content Stream Routing Network Link Application Matcher Rule Set Input Set Result  EMBED Equation.3   EMBED Equation.3  bdjklv" r t v w  8 P ^ ! N S Z [ d Efimvhcz}h%h& *hlKheh#1hmh~rh nhh[h<hqg hNK5 hqg5hqghqg5hyN=hh"he hNKhNKhNKhNKH*hNKhB#shqghB#s5hqghNK53[kluvs t t;t;t;Y t;t;gd6gdqg@&gdV$ !a$ dh $  0a$/@&gdV/7gdNK8@&gdV8$a$gdNKM@&]^gdV++,X;>?@AP"vľ̘|x|tplhR%h&uhOh? h;fh;h4hohrGFh@$hl$hbh?!h?!CJjh?!UnHtH hgCJ h?!5CJ h?!CJh?!h6 h6h6hqgh65!jhV5UmHnHtHu h65 hqghqgh& *h%'wOo34\"gdCiL%gdCiL%gdZ@gd51gdrGF !gdogd6vwMNOvn234k#$F 9z! hCiLCJjhCiLUmHnHtHuhCiLhiKhDhhZ@hzphS>h;6QhKYh5 h5h5h5h5 h55hJah0wh7h3@hoh,hBhrGF h6h@$3!%:NOPQ_`def!".ýygaZ h05CJ h0CJ"jh0UaJmHnHtHu h05aJ h0Z65aJ h#ZaJ h0Z6aJ hCaJ h0aJ h aJ hxaJ hkaJ h{aJ hnaJ hmV3aJ h5aJhh5aJ haJ hY@5aJ hY@aJ h =4aJ hiKCJ h =45CJ h =4CJ#PQef :!"u""##^gdaegd.[/$a$gd.[/gdCiL.   !"#'(DEXYZ[ⵦ✖piRCjhhEHUaJ-j8B h@CJOJQJUVnHtH hyJ6aJjhyJhyJEHUaJ-j*9B hyJ@CJOJQJUVnHtH hyJaJjhyJUaJjhhEHUaJ-j8B h@CJOJQJUVnHtHjhUaJ hOaJ h aJ haJ hcj0aJ h FaJ h0Z6aJ h0CJ[`abd    + 2 3 X n o q r 童rcjd h 2KhV_EHUaJ-j:B hV_@CJOJQJUVnHtHjh 2KUaJ h 2KaJ h4SaJ hOaJ h=laJ hi|aJjhcj0hcj0EHUaJ-j8B hcj0@CJOJQJUVnHtHjhcj0UaJ h&'aJ hcj0aJ h6aJ hE2aJ haJ! !!ɹ}w`Q}KEA=h.fh.[/ h FaJ h.[/aJjhhhhEHUaJ-jU.9B hh@CJOJQJUVnHtH hhaJjhhUaJ hV_aJjv h4Sh4SEHUaJ-j-9B h4S@CJOJQJUVnHtH h4SaJjh4SUaJ hOaJ h 2KaJjh 2KUaJj h 2Kh 2KEHUaJ-j;:B h 2K@CJOJQJUVnHtH!"!#!6!7!8!9!a!c!d!w!x!y!z!{!|!}!!!!!!!!!"("]"^"q"ļČqd``X`jh*Uh*jhF~hF~EHU-j09B hF~@CJOJQJUVnHtHhF~jhF~Uj%hA h;EHU-j:B h;@CJOJQJUVnHtHhA jhA Uh;h.[/jhOh 2KEHU-j:B h 2K@CJOJQJUVnHtHh.fjh.fUhaeq"r"s"t""""" # # #!#"###:#;#N#O#P#Q#R#U#h#~######ǿǨǿDŽwssoogP-j:B hf~@CJOJQJUVnHtHjhMEUhzh(*jh9h(*EHU-j:B h(*@CJOJQJUVnHtHjh9h9EHU-j:B h9@CJOJQJUVnHtHjh9Uh9hMEh*jh*Ujh*hJ8EHU-j4:B hJ8@CJOJQJUVnHtH######$$$9$>$?$R$S$T$U$V$W$[$u$v$$$)%*%k%s%%%%%%/&5&O&r&|&''''޷Φޡ|xtxtphtjhYeUh7hYeh"Zh2hJh6Uhh.hYq hh h5 h*5h9j %h"haeEHU-j:B hae@CJOJQJUVnHtHjh"Uhaehf~h"hzh(*jhMEUjM"hzhf~EHU(#$V$W$v$w$%/&((()-).)++++++++++++++&`#$gd.[/'''''''''''C(D(W(X(Y(Z(((((((((((ˬˈ{dWSOGOjh/WUh/WhWj.h7h/WEHU-j1 j5hWhxEHU-j }#Y̝7`,\xRxPAe0@@W\hyu7lܸiV'm@B )ؾÉ j݌{27]rc ~(ƊTvAt#G1g<lF5I٧N=s' ^U`ư!:C, 76bpH3cϰC G 3;Eƭ^y>3G#*3Ѧfu[IENDB`nܲꏵ 7>PNG  IHDR DPLTE@ tRNS,bKGD cmPPJCmp0712HsIDAT8OSQ0C7uJtso|h4cEa)x"87d_AܶE|28'?p]@(%2{xgX g ^|&RB }#tA (bIYD_@ B4$+g:wX&dk*4>LЍYɺ]/p"juؾ]7} E^]kdz>dKW*uTAIENDB`n\x'~kQy"CPNG  IHDR DPLTE>>>eSFtRNSiDbKGD cmPPJCmp0712HsIDAT8Or0 ) *"hk{+uC<8t09:'M)|H&3l G)'JRji0ITS t$rs~f.T7@7]!<>4=nIFh?"촎! nԹQp,z(^`v`/`Tp1a\֤ $)+!Y5(Me# SA i+0^K|YnscVe(9K؜/TC&7pdX .w*rVB` I`Qw QSdiV/kgǓ`"Q0|ņQk 4L5]Tf!ޣ{g3IENDB`nEGyaLk=PNG  IHDR DPLTEӚ痗ǿĻƸÿZZ\wwzEEG''(\/tRNSqbKGD cmPPJCmp0712HsIDAT8Oc8N0 FYF&fV6vN.n^>~ EDp+BRum2r LJ,*ljr n`T7042f`4153B2(酤( ƐP$aQ@8$$i@Pܼ"$%e@ʪjƚZƺz$ M-@ֶNF.h1gm0(=i `9bqY̝`!"FŌKB`*X|U׬]~ 7 78H `\bƅ&-0nٺmvn۶k=Vs:0@ׁ>r c _@cJpNś+y(x PJ0IENDB`n=wdyYjXPNG  IHDR DPLTEbbb¾hhhqqraaa444iiimmmqqqvvvwwwxxxzzzggg[[[000䬫VVV,,,᧦OOO(((kkknnnpppsssyyyIII###۱JJJDDD ذ===կ777ɭ222+++%%% ÿĦwwy~~  ^MtRNSo{bKGD cmPPJCmp0712Hs IDAT8O_ q'٭yHVH9Z4"..:d7fсuEvV3L}yxa<3_?F m1Os.ty ,Z[U4h0Ar woU ^Y[޷ac l:pKYo+l(رrWUn13{`>56c fÁjU{ up*?V;WGHh')١ lS-ZڰUhg;;t`g<_\0'BB.^" <(p\%]Ҵ`(G7tX$c;=]wYoɡ!xp02=WC1'Q]adShϢF>}—9Ќ<~s=-G80Y@:-tH@6+t#t=?$p40+ѿ%:c`?9 LtuFIENDB``!} лH[# hxtxcdd`` @c112BYL%bpuz07w12B` /LCΗa|==) J`rd SA1_P%2lMa(w sm"6DAFpA84g0y{@9I)$5$ŠV "f|byx9/Dd |b  c $A? ?3"`?2M}u DL`!M}u  ` &0xcdd``> @c112BYL%bpu?Yh 2! YPP& >@ArWpenR~CP` W7.CwsN}jo G  J:zzz:p50уa $5XAFA|C=\aZQRϥJW1H |h``E#RpeqIj.HA " 1 1 @c112BYL%bpudK F&&\"CD1,İr!v120eDLuDd hb  c $A? ?3"`?2X^r -N2w]3L`!X^r -N2w]2`@ |axcdd`` @c112BYL%bpu  dQ%~Cl')'ZQR}-8a{M]\v>4m 0y{@iI)$5$ŠQ υv<^'f,?Dd b  c $A? ?3"`?2f#D p&B L`!:#D p&@` !xcdd`` @c112BYL%bpuea;)Dd Tb  c $A? ?3"`?2sk Vt($aO L`!Gk Vt($a XJxcdd`` @c112BYL%bpu4L=`dbR ,.Iq1(2tB ;/G3X?^)Dd Tb  c $  !"#$%&'()*+,-./0123456789:;=>?@ABCwFIpJKMLNPOQSRTVUWYXZ[\]^_`abdcefghijkmlnqortsuxyz{|}~Root Entrys F 1AH6Data <8WordDocumentrwObjectPoolukA 1A_1111004814FkAkAOle CompObjfObjInfo $).14789:;<=@CFIJKLMPUXYZ]`abehijklorsv{ FMicrosoft Equation 3.0 DS Equation Equation.39qA€0,i 2v =(v 1 ,v 2 ,...,v n )"R nEquation Native _1111042779' FkAkAOle CompObj f FMicrosoft Equation 3.0 DS Equation Equation.39q V v 1 ,v 2 ,...,v n FMicrosoft Equation 3.0 DS Equation Equation.39qObjInfo Equation Native  r_1111005341FkAkAOle  CompObjfObjInfoEquation Native 6_1111005700FkAkAA|l R n FMicrosoft Equation 3.0 DS Equation Equation.39qAN |l 2v 1 ,2v 2 "R nOle CompObjfObjInfoEquation Native j_1111144629FkAkAOle CompObjfObjInfo FMicrosoft Equation 3.0 DS Equation Equation.39qC4~ nn FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native 1_1111144507 EFkAkAOle CompObj fObjInfo! Equation Native !)_1111043570$FkAkAOle "C  T FMicrosoft Equation 3.0 DS Equation Equation.39q  2v, 1CompObj#%#fObjInfo&%Equation Native &:_1111043669",)FAAOle 'CompObj(*(fObjInfo+*Equation Native +: FMicrosoft Equation 3.0 DS Equation Equation.39q h | 2v 2 FMicrosoft Equation 3.0 DS Equation Equation.39q_11111443486.FAAOle ,CompObj-/-fObjInfo0/Equation Native 0X_1111145624@3FAAOle 2CompObj243fC<4h 2v 1 =T2v 2 FMicrosoft Equation 3.0 DS Equation Equation.39qC·@Tb S 1n =2v 1,1 ,2v 1,2ObjInfo55Equation Native 6_11110442568FAAOle > ,...,2v 1,i ,...{,2v 1,n },S 2n =2v 2,1 ,2v 2,2 ,...,2v 2,j ,...{,2v 2,m } FMicrosoft Equation 3.0 DS EqCompObj79?fObjInfo:AEquation Native Bl_1111150132=FAAuation Equation.39q P $k S 1n ,S 2n "R n FMicrosoft Equation 3.0 DS Equation Equation.39qOle DCompObj<>EfObjInfo?GEquation Native HyC]L T 1,2 =T(S 1n ,S 2n )='max 2v 1,i    (T i,j ),      where 2v 1,i =T i,j 2v 2,j FMicrosoft Equation 3.0 DS Eq_1111148214BFAAOle NCompObjACOfObjInfoDQuation Equation.39qC 4h k FMicrosoft Equation 3.0 DS Equation Equation.39qC S 1n ,Equation Native R)_11111484201TGFAAOle SCompObjFHTfObjInfoIVEquation Native W_1111149547LFAAOle [S 2n ,...,S kn , S in "R n , i=1,...,k. FMicrosoft Equation 3.0 DS Equation Equation.39qCp 2S  1n CompObjKM\fObjInfoN^Equation Native __1111149817J;QFAA"2S  2n "..."2S  ln ,                   ld"k FMicrosoft Equation 3.0 DS Equation Equation.39qCMl| {T 1,2Ole cCompObjPRdfObjInfoSfEquation Native gi ,T 1,3 ,...,T i,j ,...,T l"1,l } ,       where T i,j =T(2S  in ,2S  jn ) FMicrosoft Equation 3.0 DS Equation Equation.39q_1111230488O^VFAAOle mCompObjUWnfObjInfoXpAqT~ V and no-active session V' FMicrosoft Equation 3.0 DS Equation Equation.39qEquation Native q_1111230568[FAAOle tCompObjZ\ufObjInfo]wEquation Native x=_1111230713Yh`FAAOle yA!0$ G(V,E) FMicrosoft Equation 3.0 DS Equation Equation.39qA~ V' FMicrosoft Equation 3.0 DS EqCompObj_azfObjInfob|Equation Native }-_1111230769eFAAOle ~CompObjdffObjInfogEquation Native Uuation Equation.39qA9$ G''(V'',E'') FMicrosoft Equation 3.0 DS Equation Equation.39q_1111231001cmjFAAOle CompObjikfObjInfolEquation Native 5_1111231653oFAAOle CompObjnpfA l C(G) FMicrosoft Equation 3.0 DS Equation Equation.39qAŸt~ C opt ='min V'',E'' (C(G''(V'',E'')))ObjInfoqEquation Native 1TableaSummaryInformation(tA? ?3"`?2sKZl/rOL`!GKZl/r XJxcdd`` @c112BYL%bpu tV6aqyi靋M޷T 9kR,4Pb~_4gӛKaDd hb   c $A ? ?3"`? 2emy!R=L`!emy!R=@ |Mxcdd``.ed``baV d,FYzP1n:&v! KA?H1 ߁qC0&dT20ͤ `[YB2sSRs=^~*g`0``*F\_tŲ|cFb_?c.` 2!Ob|^P Ma(w ڇ˟{:8[~ nF0O xBwpTrAS8倍 v0o(u021)WĸADs!Dd b   c $A ? ?3"`? 2qyT1}?;UL`!qyT1}?;@. sxڥkA棻4~ l{@ zD z*<(^r؃)J(BQP,T0Λ2i{3!h5-̺NKm.]&þ.&L:52CLI@ I &m8d1DŽ:[0G̪h!/1Yb( uSR7%ufRW71ƿjUBrYn;ugbή`jWϼ4,\#̈́b.ĐRs#"OW\Fv. $W͸j"%*j8q<8u^DԏEo< }(Ny+pKOO.ΓU:_3?%=O{ :nɼmCvpv}:-XջL`!pv}:-Xջ:@Hxcdd`` @c112BYL%bpuscO~y,q" HR2/A-I y;^ jL䓅Z{iM;qPp8 uwYκT5Շuׯ?zh ){1X'ˆ/"5, ǒZn6FN=|y79kxc>C|IcJ2ĺ//]S^0 Vadoa6}|{h8fm>E|fʶ_sOql˄GuM~l+,ﮓ>dQu 348߈odW _/!۾E}Z4flk=}CbgU[ 76'6?8똩sڭjr|oՄIZX OT:Ehگ8׹-/{Z %[NMH5"z}JgQ'3~N u7#0UDd P b  c $A? ?3"`?2VTldDjp\ڂq{(L`!sVTldDjp\ڂq.HAxڕPJ@ٴlTC T/AgC]0$B!)D< E @c112BYL%bpu;vv0o(L:+KRsAb\ ]@΃an ML<Dd @b  c $A? ?3"`?2cZ%ab/L`!ZcZ%a2 (xcdd``dd``baV d,FYzP1n:&B@?b u  ㆪaM,,He` @201d++&1l?z+8U`T TﰁjVe`://bu|!T5̨|&_ň*$0Hc 08_w䂆.8 [v0o(:+KRsAb\ ]@0΃aa q #3Xk[Dd D@b  c $A? ?3"`?2_BEڋHC;L1L`!3BEڋHC xcdd`` @c112BYL%bpu 1z07w12B` /LCΗa|==) J`rd SA1_P%2lMa(w sm"6DAFpA84g0y{@9I)$5$ŠV "f|byx9/Dd b  c $A? ?3"`?2 } лH[##6L`!} лH[# hxtxcdd`` @c112BYL%bpuz07w12B` /LCΗa|==) J`rd SA1_P%2lMa(w sm"6DAFpA84g0y{@9I)$5$ŠV "f|byx9/Oh+'0  , 8 DPX`hpThesishesHan Gaoan an ThesisHan Gao116Microsoft Word 10.0@\@@@SZG$ Rt$  m  oZ."SystemZ(Lr0P Z-@Garamond- "2 ahTHESIS PROPOSALGXI5*5?HR?Q5DB 2 W ah 8ha'@Garamond- 2 ?ah ,ha'2  ahHan GaoTK(2L(2 2 + ah -ha'm2 Aah hangao@cs.uchicago.edu 2(2,(2[)#0)2)(,2)11 2 } ah ,ha'-2 l ahApril 3TC2 /@Garamond-2 t ahrd-2  ah, 2003.... 2  ah -ha'- 2 t y ah 8ha'2 U v ahABSTRACTAC2DEACD 2 U } ah 7ha'- 2 6 y ah ,ha'D2 &ahAccelerated by network technologies, nC)))) ()1D2)D2)B2 /D))2222,)#E22 2 ahetwork T)B2 .E%2 ~ ahservice becomes a #) .))D2))2L*#D(2 ah keyD.)) 2 Cah ha' 2 8ahcomponent for )2L222)22 52 8ahnetwork system development. 2*B2 .#*#)L1).)23L)22 8 ahAccording C))2!12,2 89 ahto 2#2 8 ahthe definition a2)1*232(2 8ahnd 21ha':2 ahproperties of network service, 2 22)!)#C3C2)B3 .C$) .))C&2  ahwe propose a multiB)C2 223#)C(CL0 2 3 ah-&2 Q ahlayered model for ()) )1DL21)C3!ha'L2 +ahdeveloping and deploying network services. 1).)222,(211)22)2,2)B2 .#) .))# 2 : ah -ha'-hhaagg``ff__ee^^dd]]cc\\bb[[aaZZ``YY _ _X X  ^ ^W W  ] ]V V  \ \U U  [ [T T ZZSSYYRRXXQQWWPPVVOODocumentSummaryInformation8CompObjj՜.+,D՜.+,H hp|  LC@#{ ThesisThesis proposalHan Gao Abstract1. Introduction Title Headings0lt|UseDefaultLanguageVersionLCID F7w   FMicrosoft Word Document MSWordDocWord.Document.89qXV`V Normal$ !a$ @CJOJQJ_HmH sH tH H`H  Heading 1$$dh@&a$5H`H  Heading 2$$dh@&a$5KHL`L  Heading 3$$dh@&a$ 6@KHL`L  Heading 4$$dh@&a$ 6@KHL`L  Heading 5$$dh@&a$ 6@KHN`N  Heading 6$$xP@&a$ :@KHH`H  Heading 7$P<@& ;@KHD`D  Heading 8$$dh@&a$KHD `D  Heading 9 $$dh@&a$KHDA`D Default Paragraph FontVi`V  Table Normal :V 44 la (k (No List .X`. Emphasis6]8B`8  Body Text dhL L Index 1 $ x 0^`0a$CJL "L Index 2 $ x 0^`0a$CJJ 2J Index 3 x 80^8`0@CJN BN Index 4 x 80^8`0 6@CJN RN Index 5 x 80^8`0 6@CJ0 b0 TOC 1  ! 8 r8 TOC 2 ! h^h6 6 TOC 3 ! ^6 6 TOC 4 ! 8^86 6 TOC 5 ! ^V V  Comment Text$ Ed$x^`E:`: Header$$ a$: `: Footer$$ a$F! F  Index Heading $CJKHF" F Caption0]^@CJT# T Table of Figures ! 0^`0Z+ Z  Endnote Text$! Ed$x^`ECJ\, "\ Table of Authorities" ! h^h`8- 28  Macro Text#OJQJJ. "J  TOA Heading$$$$a$5KH@/`R@ List% P^`\1`Qb\  List Number+& & F h! ^`:2`Qr: List 2' 88^8:3`Q: List 3( ^:4`Q: List 4) ^:5`Q: List 5* pp^pT:`aT  List Number 2 + & F h^h`T;`aT  List Number 3 , & F 8^`T<`aT  List Number 4 - & F 8^8`T=`aT  List Number 5 . & F ^`<J`a< Subtitle /d5\\C`\ Body Text Indent"0$hd^h`a$BD`QB  List Continue 1 BE`"B List Continue 2 28^8BF`2B List Continue 3 3^BG`BB List Continue 4 4^BH`RB List Continue 5 5p^pL>`qL Title"6$d]^a$5;.L`r. Date 7$0a$8o8 Author8$da$\o\ Block Quotation9$d]^6<o< Body Text Keep:$RoR  Chapter Label;$$$0a$ 6@FCJToT Chapter Subtitle<$$$a$@KHVoV  Chapter Title=$$$00a$ ;@KH2o2  Footer Even><o<  Footer First ? !8o8  Footer Odd @ XoX  Footnote Base A Ed$^`ECJHo"H Glossary DefinitionBdDo2D  Header BaseC$$ a$2oB2  Header EvenD<oR<  Header First E !8ob8  Header Odd F NoN  Heading BaseG$$$dha$5KHPoP  Index BaseH x 0^`0@CJ*o* NameI$a$:o: PictureJ$$da$NoqN  Section LabelK$$a$ 5;@ VoV Subtitle CoverL$$0]^a$`oq`  Title Cover&M$d ]^a$ 5;@4o4 TOC Base N ! @& @ Footnote ReferenceH*>' > Comment ReferenceCJ>* > Endnote ReferenceH*:o!: Glossary Entry5\@o1@ Lead-in Emphasis;@2oA2  SuperscriptH*: R:  Footnote TextUx.)`a.  Page NumberRYrR V Document MapW-D M OJQJ^Jkmx $,7>10/2JIKLTUkmx      t$X:X$[kluvstw O o 34\"PQef:uVWvw/ !-!.!################+$,$-$.$0$2$4$6$8$9$B$C$R$S$`$a$b$n$o$w$x$$$$$$$$$$$$M080808070/0/00l0l0l00t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t10t810t10t10t10t0t0t0t 0t0t%0t%0t%0t%0t0t0t0t0t0t0t0t0t0t 0t0t0t0t 0t0t0t 0t0t 0t 0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t0t00 @0@0@0@0 @0@0@0@00( 0H00000000000000000000000000000000@00@000w \"$>;00$ n>;00>;00>;00>;00>;00>;00>;00>;00$ >;0 0^>;0 0>;0 0>;0 0ݙ>;0 0>;0 00P@0P@0P v!.[ !q"#'(+,, !"#$&')+#+,,%(*,  "DXZq"68cwy|]qs  ":NP>RTC W Y  $::::::::::::::::::::: ! ::HTVob$?$ ͒mڢ\EwXb$ܲꏵ 7>|_b$x'~kQy"Cddb$EGyaLk=uib$wdyYjXEo2$} лH[#u@v4U (   t  t0 3  3"t  s *QRX?"` t0^  C "A pc03 +Df   C *Anetwork4HDf   C *Anetwork4yDf   C *Anetwork44D^   C "A pc07QD^   C "A pc02 HXf  C *Aserver02 4XxB  <D+xB  <DQ6~B  BD+X~B  BD4XQ  NG{wHPI{wp   HGHIH  "  NG\HIa B  c }ξ}ξE`FNQ&UVW))? XX6381-D81^ DS &{'LO^ D+ YL^0L8]T+ YL7Gn2H+IJ7GI:9]T:I:Q= qR&QJ 7JJ >:*;9>:+$.+] x!+] 6381$ 3-D^ D %D^0L8]TH+ YL^0L8]T7G@8Cn2H+IJI:B,= qR&N7#Q7JK J 7J>:8*;9+ +$ x!+ ] x!+$(,`C0*0*ITNT0*0* BCCloud#" `Xe{ " B HZH?I4>XB ,   h  " . 3"n - c $X99?"` "x 2 02)X? P x 1 01)X?x  x 0 00)X?* x  x / 0/)X? x  7 <7)X?._ f 9 s *)X?8  f 8 s *)X?Bi s$ l : 0)X?Vxf = s *)X?x f ; s *)X? x~ > 6>)X?  " ? NG*H I)X?xo " @ NG*HuI)X?x " B NG*HJIs)X?x  " C NG*H0I)X?x  ` D c $)X? x h  +2 F 3"n E c $X99?"` +2 I s * )X?"` ~.[/   J s * )X?"`~.3/   K s * )X?"`+3-   L s * )X?"`j1x2  f M s *)X? ~. /f N s *)X?+-f O s *)X?j12f2 P s *)X?G-~.f Q s *)X?[9//f2 R s *)X?G/j1z T s *A  ? ?C"`?t U s *A ? ?3"`?B S  ?      :>?=>@>B;>C $~:KG T@, 3'+&(t.= 4FvWN4T TUR%T .R"./R".0R"<1R"!62R"D0,3R".4R"L6"5R"l.46R"|.7R""68R"\n,9R".:R".[,,rr$    j33ww$ 8 *urn:schemas-microsoft-com:office:smarttagsdate8 *urn:schemas-microsoft-com:office:smarttagsCity9 *urn:schemas-microsoft-com:office:smarttagsplace 200334DayMonthYear  .9###$KPdhacRT }  ]"^"#####$3333333333333333[lut3QduW !-!########.$7$9$A$C$Q$S$_$b$m$o$v$x$$$$$$$###$Han Gao|.}:N-~,xz+ &@bLv^`.^`.88^8`.^`.hh^h`.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.~}|@b          C3@A Yq  1 6/W7[D~#Z=NP l$& *(*.[/cj0#12mV3 =4fN40Z6yN=?R>rGF7H 2KiKCiL;6Q4S6UKY"ZaZN[V_>`eYeqgxgks=m nHpzpjYqnr~rB#s mszs&umCvxi|cz}'~F~f~Z@eJax0&G=l@k6,4;MEV;OBE2 CsyJa0w;f5zkg&'.LdF40{ @$"5%npR%"S>m9?! Fh? O.fhJ8lKJ*[b7W4#+NK}<aeB T <Y@o@####$`@UnknownGz Times New Roman5Symbol3& z Arial9Garamond?5 z Courier New5& zaTahoma"qHxht;t&tSZ@SZ@!24d##3{Ma 3QH)?NK;C:\Program Files\Microsoft Office\Templates\1033\Thesis.dotThesisHan GaoHan Gao$