ElIIIIIEIII. IlEIII. EhhhEEEE NAVAL POSTORADUATE SCHOOL MONTEREY CA F/6 9/2 AN INPUT/OUTPUT FILTER PROGRAM FOR THE WARFARE ENVIRONMENT

Size: px
Start display at page:

Download "ElIIIIIEIII. IlEIII. EhhhEEEE NAVAL POSTORADUATE SCHOOL MONTEREY CA F/6 9/2 AN INPUT/OUTPUT FILTER PROGRAM FOR THE WARFARE ENVIRONMENT"

Transcription

1 ,' AD-AIIS 7". ElIIIIIEIII NAVAL POSTORADUATE SCHOOL MONTEREY CA F/6 9/2 AN INPUT/OUTPUT FILTER PROGRAM FOR THE WARFARE ENVIRONMENT IlEIII SI4U-ETC(U) MAR 82 P I FOTHER)INPIAN UNCLA SSIFIE[D EhhhEEEE

2 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS AN INPUT/OUTPUT FILTER PROGRAM FOR THE WARFARE ENVIRONMENT SIMULATOR (WES) *1 Peter William Fotheringhan by March 1982 Thesis Advisor: J.il. Wozencraft 71- Approved for public release; distribution unlimited

3 SCCUNIV I CLASSIFICATION OF ToocS PAG fbo boom ave a RM" M~iNATIO PAG EZAD imsttur,,nms REPOR DOOUENTTIOWPAGE- storz COMPLtTIN~i FORM M9OR UIBS 3. govt ACCEUSIZOM J mgca,,gwy4s CAT&ALOG MUmsto 7 b- A %411/0 4. TITLEZ (and Sw"io)e t* TYPRE OF RePOR' a offtfoo COVgmbO An Input/Output Filter Program for the Masr' 1982 is Warfare Environment Simulator (WES) Marc 1982mv.j~ 7. AUTHON..) 0. CONTRACT OWN ONAMY" "Wi.MSCe)j Peter William Fotheringham 9. PERFORMING ONOMIZATION NAME AN A0009A '9 P ON MT. MUMIECT SK men Naval Postgraduate School Monterey, California CoMTNOL.LIMG OFFICE MANC AND ADDRESS 12. REPORT DATE Naval Post graduate School March 1982 Monterey, California IS. MUMUEN Of PAGES MOIORN AGENCY NAME 6 ACOMIESggrifft Imme f" CA&'eIMS~~ OffICS) IS. SECURITY CL.ASS. (of this Pdtelt) 0. ISIU ION STA N MICT (of it""") Approved for public release; distribution unlimited. Uncl assi fled 166. OECL ASS, 1C ATIONiOONGNAOING SCHEDULE 17. OISTNIUUTION STATEMENT (of the 4.sreered to~m Wee 2~b0. it difterihene Repot) IS. SUPPLEMENTARY MOTES Is. KEY WOOD$ (CoUIEom" an Fewerne** l ofmettrad eeew Warfare Environment Simulator Naval Wargame. Wargame Identify sq, week4 "Hmb 20. NAGSTRACT (Ceaft. e o wer"aide It neeceepf and 14m10000F 6F0IWO".leej) 'AThis thesis describes the concept of an input and output filter for the Warfare Environment Simulator (WES). The filter is comprised % of two computer programs which were written in the OCO programmning language. The main program examines the input to the filter on a character by character basis, and provides two basic capabilities which are not currently available in WES. The first is the ability to edit or create files, and the second is a facility for translating ~ DI OA'1 173 torvic"oinov'o. $IisSOf? 3RCUNITV V-ASSIFICATION OF TWIS PAGE VWh" 000a &R#40411

4 ~abbreviations (macros) into WES commands. The macros may include values which are substituted into variables in the commands as they are sent to WES. The second program buffers the output from WES as directed by the main program to avoid an interleaving of output when a process other than WES is in use. Ac3ion For : I TIO AB A-7!!,ibility Codes 1< 2 * 'A'~ji..and/or DDForm O2-fl iCuRIeV 4A"149 A 'J% 0'il 49tiiM o"fae

5 Approved for public release; distribution unlimited. An Input/Output liter Prcgram fcr the Warfare Environrent Simulator (WES) by Peter hiiliair Fotheringham Captain, Uaited States Army B.S., United States Military Academy, 1973 Submitted in partial fulfillrent of the requirements for the degree of MASTER OF SCIENCE IN SYSTEMS TECHNOLOGY (CUMMAND, CONTROL AND COMMUNICATIONS) from the NAVAL POSTGRADUATE SCHOOL March 1962 Author: Approved by: hesi s --- Advisor 4~e4in R4eader b r/ ir C3 Acader cfr up Caderic Dean f1

6 ABSTRACT, This thesis describes the concept of an Input and output I filter for the Warfare Environment Simulator (WES). The filter is comprised of two corputer programs which were written In the "C" programming language. The main program examines the input to the filter on a character by character basis, and provides two casic capabilities which are not currently available in WFS. The first is the ability to edit or create files, and the second is a facility fcr translating abbreviations (macros) into WES commands. The macros may include values which are substituted into variables in the commands as they are sent to WES. The second program buffers the output from WES as directed by the main program to avoid an interleaving of output when a process other than WES is in use. * J Lii t1!4

7 TABLE OF CONTENTS I. BACKGROUND E A. OBJECTIVE E B. INTRODUCTION E A. THE MAIN PRCGRAM General The Subroutines B. THE UNIX INTERFACE C. TEX WES OUTPUT BUFFER PROGRAM D. THE TELNET INTERFACE III. A USER'S GUIDE IV. CONCLUSIONS AND RECOMMENDATIONS A. CONCLUSIONS B. RECOMMENDATIONS APPINDIX A. SAMPLE OUTPUT FROM THE FILTER PROGRAM APPENDIX B. THE MAIN PROGRAM APPENDIX C. THE MAIN PROGRIAM TEXT FILES E APPENDIX Dl. THE WES OUTPUT BUFFER PROGRAV ' BIBLIOGRAPHY ) INITIAL DISTRIBUTION LIST

8 * LIST 0' F'IGURES 1. PROGRAM STRUCTURE - 2. SUBROUTINE "InI()" SUBROUTINE "imenu() SUBROUTINES "macrv(j'" AND "next()" SUBROUTINES "late" ANr "sub() SUBROUTINES "edit(","displa()" AND "rvwtlacro()" SUBROUTINES "tntops2z()" AN;D "culaolnirc()" - 2f 8. SUBROUTINES "help(), quit)' AND "err( so. SUBRCUTINES "popen(" AND "pc1ose()" ie i - i--..

9 ACKNOWLEDGIMENTS I wish to gratefully acknowledge the guidance and encouragement Cf my thesis advisor, Professor Wozencraft, without whose assistance this thesis would not have been possible. Special appreciaticn is also due my second reader, Professor Lyons, whose time end advice were very much appreciated. FinalLy, I would Like to thark the other students in the C3 Curriculum and the staff rembers of the Naval Postgraduate School who assisted ite in designilg and writing the computer programs. L. 7

10 I. BACKGROUND A. OBJECTIVE The objective of this thesis was to develop a filter prcram for the Warfare Environment Simulator (WES). It was envisioned that the program would continuously examine the characters which were being typed in to determine if a predeterminel set of characters (a "string") was present, and if so, to perform some corresponding, and also predetermined function. Additionally, the program would be capable of buffering output fror WES in the event that output from some other process is being displayed on the terminal. For example, tbis would allow for the use of an editor, since the output from WES could be saved, and later displayed on the terminal when the editing session was completed. This objective was met in the manner desrrlbed in the following section. B. INTRODUCTION In achieving the stated objective, two major questions :1, had to be answered. The first question was What functions would be most useful in tne implementaticn cf the filter concept 7" Those who were most familiar with the operation of WES were the least concerned about functions which would make it easier to use: as usual, orce a system has already L. x :

11 been learned, almost by detniltion its use becomes easy. On the other hand, since the majority cf. thcse who have tried to use WES have been initially overwhelmed by its complexity, they provided many suggestions as to what capabilities the filter program should proviie. The second question was 'How will the program determine when a particular function is to be performed?, or similarly, How will the user indicate that a function is to be performed?" The answer to this question dill be 2ddressed first. To enable a user of the program to distinguish between input to WES and a "command" to the filter program, a special character (the "$") was chosen. It miist precede any input which is to be interpreted by the program.?or example, if help" was typed in, it would be passed through the filter to WES without any action being taken by the program, while $help wculd cause the program to display the help file without sending any characters to WES. Answering the first question was a much mere difficult task. The answer lies in the intersection of two lists of II capabilities - a list of what would be most useful to implement, and a list of what i5 reasonable to 1mplenent. The adjective reasonable in this context reans feasible in terms of the limitaticns imposed by: (1) the programming language being used ("C"), (2) the operating system (UN1X) and the standard routines it has access to, and (3) the tme I II IF '?' -,...

12 available to write the program or subroutine. All of these factors were taken into account when the filter concept was develcped and implemented. A review of the capabilities which were common to the two lists resulted in a decision to include the following functions in the filter program: 1. An editing capability for reviewing old files, or creating new ones. 2. A means of identifying certain brief strings of Input, and seuding a muc Tore complex series of characters to WES. 3. A mechanism for substituting arguments provided 2s input for variables in predefined WIS commands. 4. A "default" mcde of operation in which irput prcvided tc, as well as output fromt, WES occurs as it would if the filter program were not being used. A detailed description of how these functions are performed is the topic of the next section. 'I7

13 U II. PROGRAM STRUCTURE AND DESCRIPTION A. THE MAIN PROGRAM 1. General The main prograrr receives input from the keyboard, checks for the special character, and either -asses the other characters to telnet or responds to the special character strings as if they were commands. The special character for this program is the dollar sign ("$"). A causes the program to compare the characters immediately following it to a list of strings of characters which correspond to subroutines which are to be performed. If the input string does not match a string in the list, an error message is generated and no action is taken. These two modes of operation, as indicated in the source code, are (1) The "default" rrode, and (2) the "call subroutine" mode. In the former, ell input characters ere sent to telnet, with the echo (a copy of the character on the terminal screen) being provided by the remote host. In the latter, tne input characters are used to control the prcgram, which performs various functions which are not otherwise available while running the WES prograrr. These functions include listing the available files, Invnkinz,he editor, and expanding abbreviations (later referred to as macros) into standard WES commands. II

14 The filter process was designed to be "file driven". For the most part, the text wbicb is required for displayr in the main program is contained in separate files which are opened, read, and copled to the terminal This allows for the text to be easily changed as necessary, and resrits In a shorter program. This tradeoff is in favor of both simplicity, and flexibility for future expansicn or modification. it should be noted that this flexibility does not extend to changing the menu iext without changing the switches in the main program which control the response of the program to the selection of an option. Aside from, the subroutines, the overall program is divided into three distinct parts (Figure 1). program contrcls the overall filter process. The main It alse causes an asynchronous program to be executed which receives the output from telnet (which is the output from WES In this case), and either sends it directly to the terminal or stores it while cther information is being displayed. This buffer program is discussed in more detail in section II C. The third part of the program is the telnet process, which will be discussed in section II D. K 12

15 [rilter.c" THE VAIN 1 PROGRAM 1\ F I init() m~enu() macrok) next() xlate() sub') edit() display( o "telnet** rvwmacro(' orderprep() rvworders() TEE TELNET 1 I tntops20() PROCESS F c~ab~i~c()/ heli:()/ F err()/ CONNECTS THE FILTER quit()/ popen() TO TOPS203 "readtn.c" J /F * THE BUFFER 1/ RECEIVES THE OUTPUT FROM IPROGRAM [ TELNET AND BUFFERS IT AS RECUIRED1 Figure 1. PROGRAM STRUCTURE 13

16 2. The Subroutines The subroutine "init()" executes the actions which are required to begin using the program (Figure 2). The most significant of these actions are Ps follows: 1. Reading the macros and their WES equivalents into an array so that the program can rapidly determine If an input string is a valid macro, and if it is, output the WES command. 2. Determining the type of terminal that is being used, so that the proper (either line or full screen) Pditor can be called, if required. 3. Determining whether the program will te useri with telret, or for training on the capabilities and operation of the program. The subroutine which controls the display and selection of options is "mrenu)". A text file containing the menu of options is displayed, and a number corresponding to the option selected is entered (Figure 3). The appropriate subroutine is then called. After an option has been completed, the menu is displayed again, and another choice may be made. Returning to the standard WES input mode is the last option on the menu. The following eptions are available in the menu (with the exception of "4" which has not been implemented,: 1. Editing an existing file, cr creating a new file. 2. Displaying the current list of filenages. 3. Editing the list of macros and their WES equivalents. 4. Preparing an order for input to WES. 5. Displaying the current list of orders. 6. Returning to the standara WES Input mcde.

17 -- { THE FILE "mac.text" IS OPENED AND READ INTO ) [ THE ARRAY "mac[]" IN THE MAIN PROGRAM ] Fri Mar 5 21:08:10 PST 1V82 WHAT TYPE OF TERMINAL ARE YOU WORKING ON? 1. Ann Arbor. 2. Digital VT A.D.M.3 or Tektronix. *** TYPE IN 1, 2 OR 3.** 1 (---[ A 1 WAS TYPED IN HERE TO INDICATE THAT ] [ THE TERMINAL BEING USED WAS AN ANN ARBOR ] WELCOME - You have the following options: 1. Telnet to Tops20 and log in automatically. 2. Link to another terminal In the C-3 Lab (primarily for training on this program). =** TYPE IN i OR 2.*** 1 2 <---L A "2" WAS TYPED IN HERE TO INDICATE THAT ] [ PROGRAM WAS TO BE USED FOR TRAINING ] [ THIS RESULTS IN A CALL TC "c3lablink()" Figure 2. SUBROUTINE "init()" 15.*.h

18 [ TYPING "$" AND A CARRIAGE RETURN CAUSES J [ THE FOLLOWING MENU TO BE DISPLATED ] MENU #1 - You have the following options: 1. Review/Edit an existing file. 2. See the current list of filenares. 3. Review/Edit the current macro list. 4. Prepare an order. 5. See the current iist of orders. 6. Quit (return to standard WES input mode). * 'Type in 1, 2, 3,4, 5, or 6. **" 6 (---[ A "6" TYPED HERE CAUSES THE PRCGRAM TO ] [ RETURN TO THE STANDARD WES INPUT MODE ] [ OPTION 4 HAS BEEN INCLUDED BOTH HERE AND ] [ IN THE SOURCE CODE TO DEMONSTRATE AN J [ OPTION WHICH MAY BE ADDED TO THE PROGRAM ] [ IN THE future, AND AS AN EXAMPLE OF HOW ] [ EASILY A MODULE MAY BE ADDED TO THE ) [ PROGRAM <---[ THIS IS THE OPERATING SYSTEM PROMPT FROM ] [ TOPS20, WHICH IS DISPLAYED AFTER OPTION ] [ 6" HAS BEEN SELECTED ] I Figure 3. SUBROUTINE "rrenu()" Oki

19 Items 4 and 5 have been Included in the menu as an example of a potential area for expending the program beyond its capabilities as It is currently written. If option 4 (order preparation) is selected, a message is returned stating that the option Is not Implemented yet. Option 5, however, does list the files in the directory which end in ".ord" ; this can easily be changed to any ending which would readily Identify the files containing standard groups of orders for input to WES. This will be discussed in more detail in Chapter IV. The most complex series of subroutines begins with macro()" (Figure 4). This family of routines includes macroo)", "next()", "xlate()", and "sun()". They are used to accomplish two closely related tasks, both of wbicb are controlled by "macro')". The first tasx is the substitution of a W!S rommand, or a series of WES commands fcr an aobreviation (macro) which is defined ann entered into the file "mac.text". This file may be changed at ary time by choosing menu cption 3. The file is stored In an array in the program to facilitate a rapid search and translate prccess. To expand a simple macro, a is entered, followed by the macro and a carriage return. If the macro is to be used at the beginning (or in the middle) of a sentence, the macro is ended with the character escape". 17

20 a L "iacroo" EXAMINES THE INPUT FCLLOWING A] S"$" IF THE INPUT DOES NOT CORRESPOND TO ] F A PREDETERMINED FUNCTION WITHIN THE,, PROGRAM SUCH AS beip(" OR quito" ] macro( ) next,) a [ SUCCESSIVE CALLS TO NEXT ARE RECUIRED TO ] [ DETERMINE IF A MACRO EXISTS WHICH ] [ MATCHES THE CHARACTERS WHICH ARE BEING ] a 1. TYPED IN. ] 1 I' A CHARACTER IS TYPED IN WHICH DOES ] [ NOT MATCH A MACRO IN ThE CURRENT LIST, I a 12 AN ERROR MESSAGE IS DISPLAYED J [ THE ERROR MESSAGE - "NOT A VALID MACRO" Figure 4. SUBROUTINES "macro()" AND "next()" -. " 18

21 This causes the expansion of the macro to be sent to WES, but It is not follcwed by a carriage return. This type of expansion is useful for senaing commands which are frequently used during the conduct of a game, especially since a new macro can be added to the file while the game is in progress. The second task is an extension of the first in which a macro with argurrents is expanded into one or more IES ccmmands. After the macro and its expansion are found in the array, the arguments are substituted into their appropriate places in the ccmmands as they are sent zc WIS. For example, if "atk.a7(airritz,4,flt1)" is entered, the following actions are taken. "Macro()" is called as soon as enough characters are entered to determine that the input is not a request forone of the programs standard routines, e.g. "help(". In thib case, the letter "a" is sufficient to make this decision. Successive calls to "next()" are made as required to match the string of characters as it is being typed in. This serves two functions. First, no delay is required to locate the macro and send the WES equivalent. Second, as soon as a character is tyred in whicb causes the string of characters to be different from the list of macros L. in "mac.text", an error message ("NOT A VALID racro") is displayed and the program returns to the standard WES input mode. 19 Li-

22 After "$atk.at(nimitz,4,flt1)" is entered, It must be followed ty a carriage return cr an escape character. In either case, the arguments (nimitz, 4, and fltl) are substituted intc the apprcpriate pieces in the ccmmand which Is sent to WES. In this case, the output to WES would be 'OR NIMITZ LAUNCH 4 AE FLT1 lzo ". Since this is a macro with arguments, the substitution and output to WES is accomplished by subo)". If the macro did not have any arguments, the translation and output would have been accomplished ty "xlate()" (Figure 5). As nenticned earlier, following a macro with a carriage return causes a carriage return to be sent to WES, while an escape character allows the macro expansion to be used in the context of a WYS command Idit()" is the routine which provides the capability to review an existing file or to create a new file. Since the type of terminal being used is determined in "Inlt()", the corresponding type of editor can be called. The distinction between the different types of terminels must be made by the program, since the UNIX operating system is not capable of making the distinction on its own. After entering edit()", the name or the file which is to be edited must be entered. Since the prograr examines every character which is typed in, if a mistake is made in typing in the file name, no provisions exist for deleting characters which have been typed Incorrectly. To insvre

23 l."iate()" IS CALLED BY "macro()" TO EXPAND 2 CA MIACRO WHICH D~iS NOT CONTAIN VARIABLES) I OUPU x zate) > II ~ T WES~~J () m cr nexo/ a /UTPU auo Fiur 5. SURUIE xato ND"u I I21

24 that this is not a problem, the program asks for a verification ka y or n ) of the name which has teen entered. Once in the editor, the progrer is no longer examining the input, and the editor is used as it normally would be. As a minirrum, this requires the user to know wbet command must be entered in order to exit from the editor, since the program cannot oe of any assistance. Once the editing session is comrlete, the menu is displayed and another selection must be made. Although the file containing the macros may De edited in this fashion, a menu option has been provided to accomplish this directly (F!ure 6). The second option on the menu is to display the list of filenames which are evailable in the directory which was used to run tne filter program. Display()" is intended to provide a list of files if a particular file is to be eaitel or reviewed, but tne exact name cannot be remembered. It presents the file names in a column format, so that all the files in most directories will be available on the screen at one time (Figure 6). To return to the menu, ary character may be typed in. As previously mentioned in tne discussion on edit()", the subroutine "rvwmecro()" autoiretically calls the macro expansion file ("ra:.zext") into the ap: rorriate editor (F'igure 6). "RvwMacro()" is called b;, selecting 1tem 3 on the renu. This routine was included as an explicit * 22

25 - I edit() I/\ /\ [ INPUT THE NAME 01 ] [ AN EDITCR IS INVOKED L THE FILE TO BE I L WHICH CCRRESPONDS TO ] [ REVIEWED OR [ THE TYPE UF TERMINAL) L CREATED BgING E[ USED "display()" [A COMPLETE LIST OF THE FILENAMES WHICH ARE] LAVAILABLE IN THE DIRECTORY BEING USED ARE) [ DISPLAYED IN A COLUMN FORMAT iii II rthe FILE *mac.text** WHICH CONTAINS THE LIST I I OF MACROS AND THEIR WES EQUIVALENTS IS ICALLED INTO THE EDITOR WHICH CORRESPCNDS TO] I TEE TYPE OF TERMINAL BEING USED Figure 6. SUBROUTINES "edil()","display()" and "rvwmacro()"

26 option since the macro expansion capability is the most -owerful option available in the 1rogram. In this light, this ability to rapidly add to or charge the list of macros while the WES prograrr is running should trove to be a desirable feature. As trentioned earlier, the subroutine "orderprer()" is not yet implemented, but has been included for the following reasons. The preparation of a series of WES commands, referred to here as an order, was suggested es a useful feature to be added to the prograr. In taie context of WES such a series of comrancs would be called a plan". This routine is envisioned to use a menu, from which small plans would be selected and comoined to form a complete plan. The overall plan would contain standardized control characters, which would be replaced by arguments in a routine similar to "sub)". The plan could then be typed out or edited prior to being sent to WES. Although this description is somewhat limited, it should provide both an explanation of the concept and a framework on which to build if it is to be implemented. The selection nf the next item on the menu ceuses rvworders()" tc be executed. This routine is sirilar to display(), in that it lists the available files of a certain type, in this case files which contain orders. These files are currently assumed to have a file type, or suffix, of.ord. This suffix can be easily changed within 24

27 the program to one which is more easily remembered by the user. A series of suffixes can also be entered in the program if a more general listing of order files is desired. The next subroutine is "tntops20()", which performs a number of functions if the option to use telnet is chosen (Figure 7). iirst, it requests that two prccesses be Initiated - telnet and readtn". The output from telnet (WES) is sent to the background program, "readtn". This connection is established using the UNIX pipe function (). However, the ccnnecticn between the filter program and telnet is created in the program using "popeno()". The tipe facility can not be used by the filter since a pipe sends all of the output of the first process to the second. For example, the pipe functicn would cause the menu to be sent to telnet, which obviously would not be desirable. Popen()" creates a file descriptor, which is essentially a name for the input side of telnet. Using the file descriptor, selected output can be sent to telnet, while other informaticn is lisplayed cn the terminal screen. As will be discussed more thoroughly in Section 1) of this chapter, "tntops20()" also selectively adjusts the terminal modes, which would otherwise cause the keyboard to become inactive. It then sends the file "tntcps20.text" tc teinet. The file contains the commands to log In and to begin running a certain prcgram if desired. This is an example of why the program was designe. to be file driven, 4-

28 "tntops20()" /I / \ / \ RECUEST THAT ] t REQUEST THAT J [ READ THE FILE ] [ THE UNIX j [ THE UNIX I [ open.text OPERATING ] [ OPERATING AND SEND ThE ] SYSTEM ] [ SYSTEM ] [ CONTENTS OF ] CREATE A i [ EXECUTE [ r IT TO TELNET ] TELNET PROCESS j [ THE BUFFER J [ ] USING THE j [ PROGRAV ] [ USED TO LOG ] SUBROUTINE ] "read'in r IN TO TOCS20 ] popen()" ] AT NOSC ] "c3lablink()" /\ /\ /\ [ REQUESTS AND ] [ CREATES A POINTER ] [ ACCEPTS THE INPUT ] [ TO THE TERMINAL [ OF A LETTER TO ] r WHICH HAS BEEN ] [ IDENTIFY THE ] [ SELECTED ] [ TERMINAL TO WHICH ] [ ] [ THE TELNET-LIKE ] [ THE POINTER IS ] [ OUTPUT IS TO BE ] [ USED IN OTHER ] SENT C [ SUBROUTINES ] Figure 7. SUBROUTINES "tntops2e0()" and "c31,ablinko)". i I -lzu

29 for changing the program to be run after logging in is easily accomplished b/ editing tbe "tntops2e.tex, ' file. The help()" rcutine is the first of the stendart routines which are available in the program (Figure 8). It consists of a file which is displayed on the terminal anm contains the basic formats for input to the filter program. The file is displayed by typing in "$ help" or 7". The number of spaces occuring in the input string between words in this case is not significant, e.g., '$ help" and $help achieve the same result. However, this is not true for all input. For the most part, the input to the program is in the form of WES commands, which are handled by the default irode of the program, and as such are sent directly to telnet (WES). The second standard routine is "quit()" (Figure 8). It is requested in the same manner as the help function, ty typing in a dollar sign tollowed ty the word quit (" quit"). Again, the number of spaces between the two worls is not significant. This routine is used to exit from the program, after logging off of the system at NOSC. Logging off also causes the telnet process to be terminated, as indicated by a message on the terminal when this occurs. The filter program could simrply be aborted at this point, however, the output buffer prcgram would still be active, the terminal rodes would not be set normally, and certain file descriptcrs would still be open. All he tasks

30 "helpo " I [ TYPING IN "$ help" OR $?" CAUSES THIS ] C SUBROUTINE TO READ THE FILE "help.text" ] L AND TO DISPLAY IT ON THE TERMINAL ] quitk) I [ TYPING IN "$ quit" CAUSES THIS ROUTINE ] [ TO PERFORM ALL OF TFE FUNCTICNS WHICH ] I. ARE REQUIRED TO EXIT FROM THE PROGRAM ] "err()" [ THIS SUBROUTINE PROVIDES A STANDARD ERROR ] [ MESSAGE ("NOT A VALID INPUT. TRY AGAIN") ] WHICH IS USED IN THE ERROR CHECKING ] [ ROUTINES THROUGEOUT THE PROGRAM ] Figure 8. SUBROUTINES "belp)", "quit(" AND "err()" Zr I. - l o -- ' L _.,2.,... " ' ' -- *, - - *j'-_ A

31 required tc correct these deficiencies are accomplished by quit()". A rressage indicating that the filter program is being exited jroperlj is c.spiayed as these tasks are accofrplished. Failure to use the quit routine will, at best, result in the display cf an operating sjstem j. rorr;t ("%") with input from the keyboard being accepted, but not echoed (displayed) on the terminal as it is typed in. As previously mentioned in the description of tntops20()", a useful connection between the filter progrart and telnet cannot be created using the UNIX pipe facility. Rather, the subroutine "popen(" must be used (Figure 9). The creation of a pipe in this manner allows the program to send only selected output to teinet. "Poler()" returns a file descritor which, in this case, is essentially the name of the input side of telnet. The ouzput whicb Is intended for telnet is then directed using this file descriptor. The procedure for properly "closing" this file descriptor at the end of the program is discussed in the following paragraphs. Sufficient comments have been includea in the source code to provide more details as to exactly hcw "popen()" functions. No further description of this routine will be included here. A graceful (i.e., correct in a prograrming sense) termination of the filter prograrr must include a function which closes the file descriptor ("fd") which is created in "popen()" (figure 9). -UJ This action Is accorrpllshed in the

32 MAIN PROGRAM '.. popen() ---- TELNET a THIS SUBROUTINE IS USED IN LIEU OF THE ] IX PIPE FACILITY TO CREATE A CONNECTION SBETWEEN THE MAIN PROGRAM AND T"LNET I [ THE ROUTINE RETURNS A OILE DESCRIPTOR ] WHICH IS USED TO DIRECT THE OUTPUT OF THE L PROGRAM TC TELNE7T AS REQUIREDJ *pclose()" THIS e SUBROUTINE IS CALLED BY qui" "lto) L CLOSE THE FILE DZSCRIPTCR WHICH WAS [ CREATED BY "popeno" ITHE OTHER STANDARD LIBRARY ROUTINES WHICH [ IT IN TURN CALLS ARE NOT DESCRIBED IN I THIS THESIS Figure,.SUBROUTINES "popen()" AND "-close()" * *.Z * 7.

33 subroutine "pclcse(". The call to *pclcse()" is a part of the quito routine which has already been discussed. The flnal subroutine in the program is "erro)" (Figure 8). It has been included to sixplify and standardize the inclusion of error checking mechanisms which are found throughout the program. The only function it performs when it is called is the output of an error message cn the terminal screen. Due to the fact that the subroutines are file driven, all of the tiles which are required for their operation must be available in the lirectory from which the program is executed. If a file is not available, and an attempt is made to open it, an error will result which will stop the program. This type of catastrophic error coula be avoided, however, the program would be at best handicapped by the aosence of a particular file. For this reason, it is assumed that both the program and the files which are required to run it in its entirety will be available. Similarly, the readtn" program must remain separate from the main program, and it too must be in the directory which is being used. A straightforward means of insuring that all the programs and flies are accounted for is to store them all on a tape, and to read the tape when first using the filter, or when an errcr occurs because a required file has been changed or deleted. I I I III

34 B. THE UNIX INTERFACE In general, the UNIX interface was the most straightforward concept to address in designing and implementing the filter program. In UNIX, essentially all areas where input end/or output can occur are treated as if they are files. To a great extent, this allows the user of a computer with a UNIX operating system to direct his attention to vore important aspects or prograrring. This concept is also found In the "C" programming laneuage, which is essentially the language of UNIX, and which is the language in which this program was written. In "C", however, a distinction is made between the standard input and output (which are generally the keyboard and terminal screen), a data file, end an active computer program (process), in that different formats must be used to receive input from or direct output to them. In most programs this would not be a major concern, but this prograr by design requires t.he use cf all tnree formats. As described earlier, the main program causes a second program to be executed. This program is called "readtn", and buffers the output from telnet (WES) as required. The readtn program runs as a nackground prccess, that is, it is executed ty UNIX independently of the main program. It receives its instructions by having access tc a file which contains a fleg, i.e., a character whose value letermines whether the bu 'fer is to be active or not. The main rrograr Z 2 '7.

35 also has access to the file containing the flag, and by changing the character in the file causes the buffer to be enabled (") cr disabled ("2"). The main program also requests that the telnet process be initiated. This operation is handled by a call to the UNIX operating systeir, and will be discuissed in more detail in the section on the telaet Interface. C. THE WES OUTPUT BUFFER PROGRAM This program, the filter process. readtn, is essential to the cperation c-" Without a buffer, the output from WIS would be mixed on the terminal screen with the output from the process which the user has selected. This would not have any effect on either WES or the user program, however, It would be at best confusing to the user. An additional, and perhaps more sericus proolem asscciated with interleaving the two outputs is that the user would be required to divide his attention between them. Buffering the WES output allows him to concentrate on ore issue at a time, and to be quickly brought up to date when the second prccess is completed. One means of controlling the output of the buffer is to use the X-ON/X-OFF feature which is a part of UNIX. In short, if the terminal page length ("pagelen") is not zero, and flowout is enanled, the UNIX operating system will send the output from WES or from the buffer program to the

36 terminal screen a page at a time. To continue with the next page, an X-ON, which is currently a "ccntrol- ", is typed in. This character is interpreted by UNIX, but is not considered to be a valid input to the prcgraf. Similarly, a control-s can be used to stop the output before the end of a page is reached. Rather than displaying cne page at a time, a control-p can be used to enter the zoom mode", in which the output dces nct stop at the end cf each page. The "'control-f" is a toggle, that is, a second "ccntrol-f" causes the page length to once again take effect. D. TEE TILNET INTERFACE Although not obvious in the source code, significant problems were encountered in implementing a program which provides input to the telnez process. The author of telnet, Dan Franx1in of Bolt, Beranek, and Newman (BN), stated that he did not anticipate the use of a program to feed telnet when he wrote the telnet process. He agreed that the input terminal becomes disabled when an atterpt is made to create a connection between a process and telnet. This terminal lockup" is caused by the telnet program, which changes the terminal modes in such a manner that nc input can be generated from the keyboard. This only occurs when a program Is used to create the telnet process. With this fact in mind, the program was written to reset the modes after the telnet prccess is created, so that the keyboard

37 w77 will be reactivated. This is accomplished in the filter program in the subroutine tntops2e()". The main prcgram creates telnet as a means of' connecting the computer (a PDP 11/70) In the CZ Secure Computer Laboratory to one of the virtual machines at the Naval Ocean SysteMs Center (NOSC) in San Diego. Aside from the fact that a different operating system is being used after logging in to the systeir at NOSC, telnet itself is transparent to the user. It allows prcgrams and processes to be run fro the terminal as if a physical ccnnection to the NOSC computer existed. LAIA

38 Ill. A USER'S GUIDE The purpose of this section is to provide the user of the filter program with a concise, step-by-ster set of instructions to follow in becoming familiar with the filter progra.. Tbis is most easily accomplished by using the training mode, since the output of the prcgram which would normally be sent via telnet to WIS cen be displayed on an adjacent terminal for easy reference. A copy cf a training session on the filter program is found in Appendix A. Three steps must be followed in crder to begin training on the filter program. used must be specified. First, the type of terminal being This choice is made by simply entering the number from the menu which corresponds to the type of terminal from. which the program is being run. Second, a " training mode. must be entered to use the program in the Finally, the letter whicb Identifies the terminal to which the "telnet" output is to te sent must, be entered. Although the letters which correspond to the Ann Arbor terminals are shown on the screen, and a list of all possible terminal identifiers is shown, this 7ay not be adequate or simple enough to follow. As an alternative, login" on the terminal which is to be used to display the output, as well as on the terminal to be used to run the filter program. On the keytcard cf the display terminal,

39 type dpy yourname", where yourname is the narre used to eo to login. This will show the urper or lowercase letter which ccrresponds tc the terminal, cr tty, immediately follcwing the user name. Enter this letter when asked for the "tty you want to link to. Note that unlike rany programs, the filter program reads every character as it is typed In, and a carriage return is not required after an entry is made unless it is specifically asked for, or after "$help", $quit", or "rracro is entered. Messages Indicating that the link is being established, and that the keyboard can then be used will be displayed on the input termrinal. To review the three basic types of entries which can be made, enter $ help, followed by a carriage return. it should be noted that this and any other entry which begins with a "$ must end with a carriage return (CR), or, in the case of macros, alternatively with an escape character. The three entries, "$ CR", $ macro CR", and "$ quit CR cause the menu, a macro expansion, and termination of the prograr to occur respectively. In the training Tode, a simulated system prompt ("@") is displayed on both the injut and output terminals, since it would be seen if telnet was being used. After reviewing the help file, input "* CR" to display the menu cf cpticns. Step through each of the six items on the menu, returning to the standard WES input mode by choosing the sixth cpticn. At this time, the macro.~ 7

40 expansion capability can be demonstrated. If a copy of the rile mac.text is not available, return to the menu, edit the macro list by selecting item 3, and write down one or more macros. arguments, Itf Enter a "$" followed by the macro (with ny) and end the input with a carriage return. If the macro has been entered properly, no error message will be displayed, and the WES command(s) will be displayed on both the input and the output terminals. Insure that the proper number of arguments, in the prcper sequence, are entered. For easy reference, abbreviations fcr the arguments have been included in each racro in mac.text. For example, s must be replaced by a ship name, "n" by a flight name, and # " by the quantity of items (e.g. F-14's) whicb are desired. It is anticipated that a paper copy cf the macro file will be telpful and should be available if a relatively large number of macros are being used. The addition of the letters to represent the arguments of a macro should also be accomplished when a new macro is added to the list, to insure that it is properly documented for future use.

41 IV. CCNCLUSICNS AND RECOMIMENDATIONS A. CONCLUSICNS The input and cutput filter program has been successfully demonstrated to be a viable concept which interfaces well witb both tbe Warfare Environment Simulator (WES) and the user. At tne present time, the progrem has been tested with WES being run using several different, nut predetermined scenarios. This approach has been sufficient to detect and correct deficiencies in the prcgrars whlcb make up the filter, tut a recommendation for future tesing and use is made in the next section. B. RECOMMENDATICNS 1. Future Testing Although the program was testea ca an incremental basis as it was developed, and significant changes were made to insure that its use did not interfere with the conduct of a WES wargare in any way, more extensive testing sholld be accomplished as follows. The program should be used dturinz a truly interactive wargarre, as opposed to the wargarres which have recently been run in which essentially all orders were entered from a prepared script. An interactive wer7arre would be especially useful in evaluating the actual and potential value of the most powerful capaoility which the f.. *

42 program provides, i.e. macro expansion. Any scenario in which the player is forced to be active a great deal of the time would be most useful in accomplishing this evaluation. 2. Other A~plications A general ooservation and recorrmendation for further work stems from the fact that the input/output filter concept has an unlimited number of possible applications. In general, interactive computer programs such as WES are readily accessitle, but not flexible or easy to rrcdify, if they can be changed at all. The filter concept, on the other hand, provides a mechanism for achievirg a wide range of flexibility in terrs of aids and options which can be provided while remaining within the constraints on input imposed by an otherwise inflexible process. The general structure which has been presented here should serve as an adequate baseline from which to develop Tany variations of the filter program.. r 40

43 APPENDIX A SAMPLE OUTPUT FROM THE FILTER PROGRAM The attached text Is a ccpy of the actual output of the filter prograr when used in the training mode. The only significant difference between the output shown here and the output when the prograr is used with telnet is as follows. In telnet, the echc is provided by the remote host (TCPS20), so that both the input echo and the output from #ES appear in capital letters. The copies of the menu of options which occur after it is displayed the first time have been removed and replaced with "(MENU HERE)*. 41

44 -4 E 0 hc. 2. U-3 ( Q NU N - r4-4 to -A 0 oa N- n- -1 N ~ C~Jb a P4 E :3% -14 r24 9 N 0 o -4 &4 5.~( & 'U U4 ~ 4 Pri4-0~ ~ *. 4~' ' 2-42

45 6-J cu) 10 " o I~) **~CU - * Ee) 10 - Q FA4 :31- IA O Or 33 u I a I4 p % 0 -b>b > - I" a3 ba &-0- i# IQ J ;p% V-4 4.b pq a4 1-4E I OL '- A4 ~a4 ~ I p E- 0- I & C. E4 Z- E-4 4 z- E- - :- * * E- I04 Z4 0 6-aI' - I4 :a,. O0 E- 0.) 43

46 ajmj W 1 E Q E - co Q4-0 tv >a Q Cz -4- S 0 4 P: V m'f A E id oa aj la e 0 0 r: (U. a)j 0 0..a) GJ 0C/ C. 0 b C.i 4 C 0 o~~ ~ ~ z 0~. 4.a~ 1-4 ~ ~ tu (La -. 4 to c (a P ku P4 to4 Qj flji V)J L4 cu r- 0 0I mu. &Ci -4 C.J -4 00~ Q) d E-. E E- l Ci 0 (1)n ioa. C 0 A3 0 '0 C Q~ r ~ E- J2 Ci 0 Ci0 J 4 E U 0)a cu

47 o 0) cu a) ~ * -i -~. -4 L)ImP r4-4 ji -9nC q O.0w N.4 0 o 4o S. 4 r-~ P V) VI fo 6 -b W2. 12Ja Mt E-~ Cjr1J a.b a.~j PAfr5~ :3.4 =~ X q=. -4 A 10 eo 6.2 E-4 f4j ~ 04 p~ 0 o E-4. ~U '

48 F A4 0 * 4. - E-4 W. * 00 ci aj- F 0~ = 0 : 41 4LCU 0o -. -~- Q4 1-4 u) m- e- a, '4 46

49 E- ;1. 4E4. -. D4 fu44 I (U E-4 * P. e~oc~ae-4 4-a4 pj 4-4 ;.4 E4-4 4.' E 0- to Q-au-~o~ EEa - E- P47

50 0 1 VIP. E- 0 ' czl N i w.4 ua 0 1 W = = 0 *~E PA x ~ - 04;_ -. C. 0 ).4- Clq ) *Oc o2 Cl2I =1 o-4-4 = pq 10 -n' Q C-0 m-0 a ; QQ Z0,m di PN-.14 r-* = I = 0 "~f ev Pcf E- I =00 E- 00 :3: 3; 3: 4-0 ~ V ) V) :a#.4-.ff. in v)u kni L i A u it E- to. =.c~i d14 E- 0 Cl))I 2--A AA r-ul-c1-4 Q E-4 I') n C- C - f ~ U- C~C c- : Q N nq. 48

51 -dq r0 ' = i-s ~ C.) 0 '~ ~ e w 0 494

52 00 P z ' 0-4 UUW 1-4 z- E- Q~ o.- P Z 4 4- E P4 I-& ( IV W p.4 P6.24 5Cu.4 q w- 9 E.4 0 E c nx 0 ne - AZ 6-.) En I- a, ~ C V) -d 0 = bae4-4 E4: E- E" E- Z 1.-4 C))~4r. Vs~~.4 4 m4 - E4-4 *~~~~- ~ A 4 * ~5-4E ~; PA d ~ ;,) 3 r4' l - -m - V) 4 cl ~ C/~ C4 1.4 n -, 5-50

53 P,4. I..~4...S W.. 5 AC W CU 0z 0 0 to 4) no 0 o>- OJ QJ- f I E ~~~~ 00~ E.W- 1JO O.4E ~~.~ -~ % (1, 94 a4j~*~ pr u ~ >t ' '-a04 CD,.-40 % 0. eut~ 0 0 PL4 W ~ 0 to4~4 00 ulc 0 Q 4 c.q - ;p E, #- -4 vi rr S. :1 0-uLn 0 >4 ~ ~ ~ ~ ~ ~ 944Dw- ~. N k-cuwii - P6.E-4 u % a- - vu# 0 -va,.i -4 *6-0 ;M Q-.0 eaj Z. -24., * u aj EJ - 4 Q tn % -P " * E-4 :3fo- r - P4 % 04 U W U ( 4.3 ; - -Q JW a = c Q=a -n, B00"w- IN E- -E - - x -r -L E- 1' *5

54 *. S.. fu3~ ~ * * -4 *- PA4. E- ;M4 4.0* c * 4- cu- *0 * it a 0-0 I 52H~

55 -E " - 'L, 1; C * -4!0 -- a) j 42 a) 42.2 ro (a ul 0 U- 53

56 *. * *a2 a as fa a * - -.it 'a )0 uuto CU to co EU a'u ; 'U 4.v;. '0 v;u A -4 AC I b I -, 14 %J % G % J J -4~ a G % % j J ~,, 0,.. "... o, i ",,.. i.,.;., i; to 'U*. a fa a) 'U ev to (u* * ~ E S..-4~~c I H - I I I IVI L J ~ ~- J 4 VIi i _ -,. 0..,,-5

57 CU U -4 W (a 4L (at C to. w (a j eu WoL toq W a) *a 61) 0.; 4.a #- -4 *.5.*eS, - ;4 *-4 " ~-45 ;. cu cj Cu (1) cu , j 44 It It It % - $. PO ".. "-r,. S %n 55

58 P-4-4 Ad 1-4 *a 100,J -4 ~ (U ~ ev- wl4 U 4l 4 0 5o % - - ~.- ~ Q.~ -4 c. LOU UE -4o U 1U

59 O.J -4E voon * ~* '4.0~ * u'l E F.4 LO 0.1 ( ~c -V% ~- 0) oa P ai1.z wi;w b V 0 to Q) V~ CU %+ Q) ~ ~ 44 C~* Oi - 4. i ('UbJ - ) Q 0C)U. 1) U..4 COU.40" U0 A-- S O C.1. - ~ "4* ;b :0 o* p t- P, > > ' A 4 Uoow Q1 W~~ w.1o w w~ ZA L > c ~ ) ~-W a,~ 0Z - 57

60 bi 0 C Fz --.- #--b *0 0-a 0.1 -Pc -t o 'l -l'. 1 o Ulv-444 S3 0.a - (a toa)di 0 S-a * Q "'.0058

61 311* cu0 ts *a. m 4' A cm m 0r U c ;. # 0 oo #a 4-- C. -~ ii * P4 *.~4 a a 10 59

62 ;4 0 C.1 41 *j 0 * 5~-4 a * -- =-i E-4 "fu *~% Oj O,. q E- E-.'dP PE 04a 61 k 03 0 ; cd *3M- P. -40 c 0 4.J 44 * ;f. f.4z &q.il)q 0J ccd Q4 A la 4-44.I &af Ad -4- M~ - d -4 Q# -O P4 - (a o; z 5-4 a w4 ea W *a C. - - o j CU in (U Q) -4 hd4 ~ C -~4C O F.4 o.. $5. ~ G IJ ~ O ~~~~~~~~L ~ zo C o ' C o 0 04 cp. 4 uj :s41k U 3 60

63 -4.. 3m. cu. cu. Pq F a* a) - 0 4, 4.J E ).."-4c G* kn :4 - &-a. - cm-i '.. I 0W' 0i ;-j cu ) QI W

64 1-N. " N. C.) C-) I A to - - S4 ~ ee 3 ' ' 0-b 0 + to440 Q 0 (ou 04 ) E-4. u (U 0 0De 0 to Qi' -4.#- Z E = a fu a im Lni * 4. to rb -4 X N, o'u aj c I.0 r-4+ Q PA* '---- PA W + 0-4) ~ C.-0 C.) E. ~ 0 0k u -. P ii U~5 * 62

65 .. -., ",,., *..,. E S31 c -4 E QJ *I NO II O II I S..,.,. -4 u Q*t ma el 0.' 4-1 Eui 4-0 *Oa) r I -h ,4 ~~~d(1 J a,.-.)v,-,,-, - -,'I.,, , - '.- L -..,. to -4 c.) o + ea~~a-~4 *. 1 ~~~- t.4 - U~( +* a I) II -O * H -44-4C4-63

66 = L* *.0 la &Q~ a. -. N c P +- j tc.) _v 4-.)w) E-4z\ 'V * Q.J - +~4. ~. oa1- ~ ru.) ~ ' *-0 - N. C.) -4 ku F 'MA - o - 4

67 It* *.s- Q* 0.. * * SE E ;m CUG E '-E 0 E.E It 4-4 E o Z m E4 N C.> 4. It II F- 9-4 *- U Gaa - u. Q E c -z ZIE - P. ep 11~ N ;- P.M4- I/4~ -4 ~!-.0- P -f 4. ~ ~ ~ c 04 Z A44' ' v G) 'D ;0.4- II Ga a 'VP ~65 '

68 nj 0 4 n '.44 Fr 4- -a 6 66

69 i~n '-a 0 0c5 'U - Q CU kn 110 r* S I 4 N. N.0 0 -qp c LO - 00 Ii~ 0.0I4I..0 ~ - -'. c.) Vf. 4,... tn a 4-Z 44 ~ a 0~ 4c. =~I* w IL OV F4. l :*. I cu 67

70 or '-4-4 W4'- 6-4., a~ sz O E- E-4- F- c-4 E- i it x- 54 E- u0 - b.. to -4 -N1 '00 ;H; 0 ar-4q E- 0. f F-Q 4-4P4 ;14 r4 in 0 (u0ca ul I... 4 " -4Ln -4'-f4 0f z. 0.1 (I 1 jj9- A-. m - -- oo W ; 9-i -4 68

71 -4 (U IIO 4)+ to ' It ~IL 0 - % 4 * A~ it -4 S..O F- wi ~ I L) o %- *. IV F"~4 I.-i 4 )II m.. 04 j.0 It 4) -4 i ) 4 69 I,i i iii i iiiiii i iijl i iiiii

72 ril4 PQ IfV a) o Y a-4-4 rw * *1M 4-6e4-4 4-a 44 a4 pq ;9E4 A) 11-0 II -4 ~ I W -4 4coV - P4 ;P 4-".4- ' - Z ~ ;: 4I I 4n. I * ~ ~-' S~-~ 70

73 -E- -4 OD r- - r9t 0- w-* 0- If 11 &# ba ;H -.4 r. I. - -e a 0 01 Q (a I 4. = f - 'V. -4.) u c. -b. $a N I P-4 A 6- CU P. Pk 14 - u i m"0'm0: I Al44 ;-4P It C 1~

74 *D 6a f. (a tr) -4 Coo -E- a;- -4 E ) =0 -U Le So- *-.- 4 r" t - -i tq~- -4~q~\ II4.. 6j ~~A- ~ - 'o,0 *w 400U4 N %~~c S. hd q.." r4 r U". -4 I ~fo ro (a ~4~4 '4 ~ 11. II.072

75 *.D P4 = - O* W #a E--44 f 1 i f i t i P4 iz4f Qj g 4L NO h u 4 k *a -4t 4-r * 4*-.& #.a - 5- W4 94 to J - cu'4 ~ - g4 0 ~ ' ~ '73

76 *m cu 4.Ea4 CJ-44 if 11 0 P. 2 = - 4 6L-.- * + E- - E-4- oo to > 1 * 0 -. HiI 4 4 '4 E~U - * a ~ a~a H~l ~ t 4 6.x *a U. -* U~ ~ ~ 5 5- S.. U2. - II ~ ~-'V -474

77 4-44 : (U -4c I.. i.- tovr4. - 6A fa o ea (a0t 4w 440 4W - *0C - 0& Z (a. fu a. to cu *. ;3 0UU Qa u Z a R k to~-- t to ~0O~h OA 'o A -l 0 AA ;.% Z".a r OC.*

CD _. _. 'p ~~M CD, CD~~~~V. C ~'* Co ~~~~~~~~~~~~- CD / X. pd.0 & CD. On 0 CDC _ C _- CD C P O ttic 2 _. OCt CD CD (IQ. q"3. 3 > n)1t.

CD _. _. 'p ~~M CD, CD~~~~V. C ~'* Co ~~~~~~~~~~~~- CD / X. pd.0 & CD. On 0 CDC _ C _- CD C P O ttic 2 _. OCt CD CD (IQ. q3. 3 > n)1t. n 5 L n q"3 +, / X g ( E 4 11 " ') $ n 4 ) w Z$ > _ X ~'* ) i 1 _ /3 L 2 _ L 4 : 5 n W 9 U~~~~~~ 5 T f V ~~~~~~~~~~~~ (Q ' ~~M 3 > n)1 % ~~~~V v,~~ _ + d V)m X LA) z~~11 4 _ N cc ', f 'd 4 5 L L " V +,

More information

SPARE CONNECTORS KTM 2014

SPARE CONNECTORS KTM 2014 SPAREPARTSCATALOG: // ENGINE ART.-NR.: 3208201EN CONTENT CONNECTORS FOR WIRING HARNESS AA-AN CONNECTORS FOR WIRING HARNESS AO-BC CONNECTORS FOR WIRING HARNESS BD-BQ CONNECTORS FOR WIRING HARNESS BR-CD

More information

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS

More information

TMCH Report March February 2017

TMCH Report March February 2017 TMCH Report March 2013 - February 2017 Contents Contents 2 1 Trademark Clearinghouse global reporting 3 1.1 Number of jurisdictions for which a trademark record has been submitted for 3 2 Trademark Clearinghouse

More information

ENDF/B-VII.1 versus ENDFB/-VII.0: What s Different?

ENDF/B-VII.1 versus ENDFB/-VII.0: What s Different? LLNL-TR-548633 ENDF/B-VII.1 versus ENDFB/-VII.0: What s Different? by Dermott E. Cullen Lawrence Livermore National Laboratory P.O. Box 808/L-198 Livermore, CA 94550 March 17, 2012 Approved for public

More information

Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site

Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site Escalation rate 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 0001 AA01 Administrative Assistant Level I $51.00

More information

22ND CENTURY_J1.xls Government Site Hourly Rate

22ND CENTURY_J1.xls Government Site Hourly Rate Escalation rate 000 AA0 Administrative Assistant Level I 000 AA0 Administrative Assistant Level II 000 AB0 Application Engineer Level I 000 AB0 Application Engineer Level II 000 AC0 Application Programmer

More information

EXPERIMENT 1. FAMILIARITY WITH DEBUG, x86 REGISTERS and MACHINE INSTRUCTIONS

EXPERIMENT 1. FAMILIARITY WITH DEBUG, x86 REGISTERS and MACHINE INSTRUCTIONS EXPERIMENT 1 FAMILIARITY WITH DEBUG, x86 REGISTERS and MACHINE INSTRUCTIONS Pre-lab: This lab introduces you to a software tool known as DEBUG. Before the lab session, read the first two sections of chapter

More information

B.2 Measures of Central Tendency and Dispersion

B.2 Measures of Central Tendency and Dispersion Appendix B. Measures of Central Tendency and Dispersion B B. Measures of Central Tendency and Dispersion What you should learn Find and interpret the mean, median, and mode of a set of data. Determine

More information

Training manual: An introduction to North Time Pro 2019 ESS at the terminal

Training manual: An introduction to North Time Pro 2019 ESS at the terminal Training manual: An introduction to North Time Pro 2019 ESS at the terminal Document t2-0800 Revision 15.1 Copyright North Time Pro www.ntdltd.com +44 (0) 2892 604000 For more information about North

More information

A New Method of Using Polytomous Independent Variables with Many Levels for the Binary Outcome of Big Data Analysis

A New Method of Using Polytomous Independent Variables with Many Levels for the Binary Outcome of Big Data Analysis Paper 2641-2015 A New Method of Using Polytomous Independent Variables with Many Levels for the Binary Outcome of Big Data Analysis ABSTRACT John Gao, ConstantContact; Jesse Harriott, ConstantContact;

More information

Cl. Cl. ..., V, V, -I..., - QJ d.

Cl. Cl. ..., V, V, -I..., - QJ d. )> Cl. Cl...., m V, V, -I..., QJ :J V, - QJ d. 0 :J Main Points Address Translation Concept - How do we convert a virtual address to a physical address? Flexible Address Translation I R. lz G.z: f1..t:?z:.mo/2_'-(

More information

SIMATIC S plus TIA Portal

SIMATIC S plus TIA Portal Product range overview SIMATIC S7-1500 plus TIA Portal Power + Efficiency The ultimate plus in automation Intuitive, efficient, proven TIA Portal redefines engineering Answers for industry. Your plus of

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

Scorciatoie da tastiera - Circad 4.09

Scorciatoie da tastiera - Circad 4.09 Scorciatoie da tastiera - Circad 4.09 File FE New File - File FO Open File - File FR Re-Open - File FT Total Recall - File FD Load - File FC Close File - File FE Erase File - File FS Save File - File FA

More information

NOTICE. The above identified patent application is available for licensing. Requests for information should be addressed to:

NOTICE. The above identified patent application is available for licensing. Requests for information should be addressed to: Serial Number 09/864,819 Filing Date 24 May 2001 Inventor Thomas W. Smith NOTICE The above identified patent application is available for licensing. Requests for information should be addressed to: OFFICE

More information

A Command and Query Language Assembler for an Extended Data Management System

A Command and Query Language Assembler for an Extended Data Management System University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science April 1971 A Command and Query Language Assembler for an Extended Data Management System

More information

Lionbridge ondemand for Adobe Experience Manager

Lionbridge ondemand for Adobe Experience Manager Lionbridge ondemand for Adobe Experience Manager Version 1.1.0 Configuration Guide October 24, 2017 Copyright Copyright 2017 Lionbridge Technologies, Inc. All rights reserved. Published in the USA. March,

More information

Customer Maintenance Parts List

Customer Maintenance Parts List C US R MODEL SUFFIX Customer Maintenance Parts List Model 0 R0000 dot recorder Made in China RECORDER STYLE FREQUENCY NO. SUPPLY N00 0 TAG NO. Note: Parts marked with a symbol are Customer Maintenance

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

PIE-10 Electronic. Time Recorder SPECIFICATIONS. Operation Manual

PIE-10 Electronic. Time Recorder SPECIFICATIONS. Operation Manual PIE-10 Electronic Time Recorder SPECIFICATINS peration Manual Power requirement : For PIX-10 input : AC16.5V, 60Hz, 0.6A (Max.) For AC adapter : AC120V ± 10%, 60Hz AC230V ± 10%, 50Hz AC240V ± 10%, 50Hz

More information

EducAide Software. Instructions for producing an Acces-compatible database module (program version 3.41 or higher)

EducAide Software. Instructions for producing an Acces-compatible database module (program version 3.41 or higher) EducAide Software Instructions for producing an Acces-compatible database module (program version 3.41 or higher) Requirements In order to produce your own database module, you need: a license for Acces,

More information

0z 0. di.0. co LU.C. C- co 2 (C

0z 0. di.0. co LU.C. C- co 2 (C o 1.3' 6L wg) r cc ) 6 z LIz Co z * di. co L.C C co 2 (C c E REPORT DOCMENTATION PAGE Form, Approved OPM No. 74188 Public inin mpos tzma bwsdca for thls coiloim as of infonwtiot isst.s wad to twro I bow

More information

FLIGHTS TO / FROM CANADA ARE DOMESTIC

FLIGHTS TO / FROM CANADA ARE DOMESTIC MINIMUM CONNECTING TIME Houston, USA FLIGHTS TO / FROM CANADA ARE DOMESTIC IAH (Intercontinental Airport) DOMESTIC TO DOMESTIC :45 AA TO DL :40 CO TO AC :30 AA, UA, US :20 CO :30 DL, WN :25 DOMESTIC TO

More information

MAC 1147 Exam #6 Review

MAC 1147 Exam #6 Review MAC 1147 Exam #6 Review Instructions: Exam #6 will consist of 8 questions plus a bonus problem. Some questions will have multiple parts and others will not. Some questions will be multiple choice and some

More information

Developing Real-Time Systems

Developing Real-Time Systems Developing Real-Time Systems by George R. Dimble, Jr. Introduction George R. Trimble, Jr., obtained a B.A. from St. John's College in 1948 and an M.A. in mathematics from the University of Delaware in

More information

S E C T I O N O V E R V I E W

S E C T I O N O V E R V I E W AN INTRODUCTION TO SHELLS S E C T I O N O V E R V I E W Continuing from last section, we are going to learn about the following concepts: understanding quotes and escapes; considering the importance of

More information

We, the undersigned Councilmembers, approve the claims in the amount of $78, this 18th day of September, CITY OF WOODINVILLE CLAIMS

We, the undersigned Councilmembers, approve the claims in the amount of $78, this 18th day of September, CITY OF WOODINVILLE CLAIMS CITY F DINVILL CLAIMS "I, the undersigned, do hereby certify under penalty of perjury that the materials have been furnished, the services rendered or the labor performed as described herein, and shon

More information

Telecommunications and Internet Access By Schools & School Districts

Telecommunications and Internet Access By Schools & School Districts Universal Service Funding for Schools and Libraries FY2014 E-rate Funding Requests Telecommunications and Internet Access By Schools & School Districts Submitted to the Federal Communications Commission,

More information

Team Members. When viewing this job aid electronically, click within the Contents to advance to desired page. Introduction... 2

Team Members. When viewing this job aid electronically, click within the Contents to advance to desired page. Introduction... 2 Introduction Team Members When viewing this job aid electronically, click within the Contents to advance to desired page. Contents Introduction... 2 About STARS -... 2 Technical Assistance... 2 STARS User

More information

Review of Fundamentals

Review of Fundamentals Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log

More information

271 Health Care Eligibility Benefit Inquiry Response Educational Guide

271 Health Care Eligibility Benefit Inquiry Response Educational Guide 271 Health Care Eligibility Benefit Inquiry Response Educational Guide June 2010 - Version 1.1 Disclaimer INGENIX is still under development stages and frequent changes within this document are expected.

More information

EDIT - DOS/65 EDITOR VERSION 2.1

EDIT - DOS/65 EDITOR VERSION 2.1 EDIT - DOS/65 EDITOR (Copyright) Richard A. Leary 180 Ridge Road Cimarron, CO 81220 This documentation and the associated software is not public domain, freeware, or shareware. It is still commercial documentation

More information

6800 Programming - Introduction. This section of our manual has been written to help you begin

6800 Programming - Introduction. This section of our manual has been written to help you begin 6800 Programming - Introduction This section of our manual has been written to help you begin programming your 6800 Computer System. Programming is a complicated subject. This manual describes only the

More information

Office of Institutional Research CITY COLLEGE OF NEW YORK

Office of Institutional Research CITY COLLEGE OF NEW YORK Office of Institutional Research CITY COLLEGE OF NEW YORK PREFACE CITY FACTS describes student, instructional and non-instructional staff as well as our administrators demographic and the Sponsored Programs

More information

PRESENTS: Ap.LCase. App!e PugetSound Program Library Exchange

PRESENTS: Ap.LCase. App!e PugetSound Program Library Exchange PRESENTS: Ap.LCase App!e PugetSound Program Library Exchange Ap.LCase LOWER CASE CHIP by Paul Brown Ap. LCase may be used only on a Rev.7 or later Apple. If you don't know what version your Apple is, STOP

More information

KLIC-DI COMMERCIAL PRODUCT MANUAL INTERFACE KNX COMMERCIAL A/C UNIT ZN1CL-KLIC-DI. Edition 8 Version 1.6

KLIC-DI COMMERCIAL PRODUCT MANUAL INTERFACE KNX COMMERCIAL A/C UNIT ZN1CL-KLIC-DI. Edition 8 Version 1.6 PRODUCT MANUAL KLIC-DI COMMERCIAL INTERFACE KNX COMMERCIAL A/C UNIT ZN1CL-KLIC-DI Edition 8 Version 1.6 Index 1. Introduction... 3 2. Installation... 5 2.1. KLIC-DI Installation... 5 2.2. Elements Description...

More information

C H R I S. Children s Registry and Information System Data Facilitator Manual. Technical Support Information

C H R I S. Children s Registry and Information System Data Facilitator Manual. Technical Support Information C H R I S Children s Registry and Information System Data Facilitator Manual Technical Support Information 5665 Ponce de Leon Blvd. Coral Gables, FL 33146 (800) 231-5747 chris.um@miami.edu http://www.chris.miami.edu

More information

Modbus User Manual APPLIED MOTION PRODUCTS, INC. Modbus is a registered trademark of Schneider Electric, licensed to the Modbus Organization, Inc.

Modbus User Manual APPLIED MOTION PRODUCTS, INC. Modbus is a registered trademark of Schneider Electric, licensed to the Modbus Organization, Inc. APPLIED MOTION PRODUCTS, INC. Modbus is a registered trademark of Schneider Electric, licensed to the Modbus Organization, Inc. Covers the following Modbus RTU enabled drives: ST5-Q-RN ST5-Q-RE ST5-Q-NN

More information

INT 21H and INT 10H Programming and Macros

INT 21H and INT 10H Programming and Macros Dec Hex Bin 4 4 00000100 ORG ; FOUR INT 21H and INT 10H Programming and Macros OBJECTIVES this chapter enables the student to: Use INT 10H function calls to: Clear the screen. Set the cursor position.

More information

Using nu/tpu on UNIX Last revised: 1/28/00

Using nu/tpu on UNIX Last revised: 1/28/00 Using nu/tpu on UNIX Last revised: 1/28/00 nu/tpu is a general-purpose text editor available on UNIX that simulates the TPU editor available on VMS operating systems. By default nu/tpu emulates the EDT

More information

GENERAL REFERENCE MANUAL. From the original English Manual - (L.C. Sept 2017)

GENERAL REFERENCE MANUAL. From the original English Manual - (L.C. Sept 2017) GENERAL REFERENCE MANUAL Preface Programma 101 is a completely self-contained desktop machine capable of operating in manual mode as a high speed electronic printing calculator, in program mode as an

More information

Task Management. Version 6.0 B

Task Management. Version 6.0 B Task Management Version 6.0 B The documentation in this publication is provided pursuant to a Sales and Licensing Contract for the Prophet 21 System entered into by and between Prophet 21 and the Purchaser

More information

Ocean Express Procedure: Quote and Bind Renewal Cargo

Ocean Express Procedure: Quote and Bind Renewal Cargo Ocean Express Procedure: Quote and Bind Renewal Cargo This guide provides steps on how to Quote and Bind your Renewal business using Ocean Express. Renewal Process Click the Ocean Express link within the

More information

ASX Customer Workshop ASX 24 Specifications and Development Environment

ASX Customer Workshop ASX 24 Specifications and Development Environment ASX Customer Workshop ASX 24 Specifications and Development Environment 26 August 2015 Customer Readiness Team New Trading Platform Customer Workshop Project Update ASX 24 Functionality and Specifications

More information

https://support.industry.siemens.com/cs/ww/en/view/

https://support.industry.siemens.com/cs/ww/en/view/ Support Packages for TIA Portal V14 February 2018 https://support.industry.siemens.com/cs/ww/en/view/72341852 Siemens Industry Online Support This entry is from the Siemens Industry Online Support. The

More information

Introduction to EMACS. Harriet Borton Academic and Research Computing

Introduction to EMACS. Harriet Borton Academic and Research Computing Introduction to EMACS Harriet Borton Academic and Research Computing Contents Starting Emacs 2 Parts of the Emacs Screen 3 Basic Editing 4 Entering text 4 Moving around in a file 4 Deleting text 4 Undoing

More information

Language Live! Levels 1 and 2 correlated to the Arizona English Language Proficiency (ELP) Standards, Grades 5 12

Language Live! Levels 1 and 2 correlated to the Arizona English Language Proficiency (ELP) Standards, Grades 5 12 correlated to the Standards, Grades 5 12 1 correlated to the Standards, Grades 5 12 ELL Stage III: Grades 3 5 Listening and Speaking Standard 1: The student will listen actively to the ideas of others

More information

OPAL-RT FIU User Guide.

OPAL-RT FIU User Guide. OPAL-RT FIU User Guide www.opal-rt.com Published by Opal-RT Technologies, Inc. 1751 Richardson, suite 2525 Montreal, Quebec, Canada H3K 1G6 www.opal-rt.com 2013 Opal-RT Technologies, Inc. All rights reserved

More information

S5-115U. Application

S5-115U. Application S5-115U S5-115U Design Central configuration Distributed configuration Note General technical specifications S5-115U Principle of operation Program memory Processor Programming S5-115U Cyclic program execution

More information

Global Forum 2007 Venice

Global Forum 2007 Venice Global Forum 2007 Venice Broadband Infrastructure for Innovative Applications In Established & Emerging Markets November 5, 2007 Jacquelynn Ruff VP, International Public Policy Verizon Verizon Corporate

More information

INTRODUCTION. NOTE Some symbols used in this manual CL = Click Left CR = Click Right DCL = Double Click Left = Enter. Page 1

INTRODUCTION. NOTE Some symbols used in this manual CL = Click Left CR = Click Right DCL = Double Click Left = Enter. Page 1 INTRODUCTION OBJECTIVE The purpose of this manual is to provide the student with practical experience in the writing of assembly language programs, and give them background and instructions on how to use

More information

. ).-... I s 0 4 i o s ) ( i. Name CA K44-14". Block 3-4B: Linear Programming Homework

. ).-... I s 0 4 i o s ) ( i. Name CA K44-14. Block 3-4B: Linear Programming Homework Name CA K44-14". Block 3-4B: Linear Programming Homework 1. An electronics company makes two kinds of TV's: LCD and plasma. Let x be the number of LCD TV's and y be the number of plasma TV's made in a

More information

RSTS/E RMS-11 Utilities

RSTS/E RMS-11 Utilities RSTS/E RMS-11 Utilities Order No. AA-P509A-TC March 1983 This document describes the RMS-11 utility programs : RMSDES, RMSIFL, RMSCNV, RMSDEP, RMSBCK, and RMSRST. RMSDEF, which has been superseded by RMSDES,

More information

OFFICE OF NAVAL RESEARCH CONTRACT N C-0118 TECHNICAL REPORT 94-07

OFFICE OF NAVAL RESEARCH CONTRACT N C-0118 TECHNICAL REPORT 94-07 OFFICE OF NAVAL RESEARCH NTRACT N00014-88-C-0118 TECHNICAL REPORT 94-07 FINAL INSPECTION OF LACTATED RINGER'S RESUSCITATION FLUID, INTRAVENOUS SODIUM CHLORIDE SOLUTION, AND SODIUM CHLORIDE-GLUSE SOLUTION

More information

https://support.industry.siemens.com/cs/ww/en/view/

https://support.industry.siemens.com/cs/ww/en/view/ Support Packages for TIA Portal V13 March 2018 https://support.industry.siemens.com/cs/ww/en/view/72341852 Siemens Industry Online Support This entry is from the Siemens Industry Online Support. The general

More information

GRAF:Graphic Additions to FORTRAN

GRAF:Graphic Additions to FORTRAN GRAF:Graphic Additions to FORTRAN by A. HURWITZ and J. P. CITRON ibm Los Angeies Scientific Center Los Angeles, California and J. B. YEATON* Health Sciences Computing Facility, UCLA Los Angeles, California

More information

COMPUTER ARCHITECTURE AND ORGANIZATION Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital

COMPUTER ARCHITECTURE AND ORGANIZATION Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital hardware modules that accomplish a specific information-processing task. Digital systems vary in

More information

My Favorite bash Tips and Tricks

My Favorite bash Tips and Tricks 1 of 6 6/18/2006 7:44 PM My Favorite bash Tips and Tricks Prentice Bisbal Abstract Save a lot of typing with these handy bash features you won't find in an old-fashioned UNIX shell. bash, or the Bourne

More information

UYM-UOM-UOY-UOD- UOS-UOB-UOR

UYM-UOM-UOY-UOD- UOS-UOB-UOR UY-UO-UOY-UOD- UOS-UOB-UOR Indexable date stamps at.: Acier inoxydable 5-55 HRC :15 Remove inner insert from the outer insert using a screwdriver REF* REF REF REF REF REF REF D F 1 UY 4/2* UO 4 UOY 4/2*

More information

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p.

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. 2 Conventions Used in This Book p. 2 Introduction to UNIX p. 5 An Overview

More information

2.5 Continuity. f(x) + g(x) > (M c) + (c - 1) == M. Thus,

2.5 Continuity. f(x) + g(x) > (M c) + (c - 1) == M. Thus, 96 D CHAPTER LIMITS AND DERIVATIVES If() - LI < c. Let 6 be the smaller of 61 and 6. Then 0 < I - al < 6 =} a - 61 < X < a or a < < a + 6 so If() - LI < c. Hence, lim f() == L. So we have proved that lim

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Practical No : 1 Enrollment No: Group : A Practical Problem Write a date command to display date in following format: (Consider current date as 4 th January 2014) 1. dd/mm/yy hh:mm:ss 2. Today's date is:

More information

IEC Contactors. Auxiliary Contact Blocks GENERAL

IEC Contactors. Auxiliary Contact Blocks GENERAL IEC Contactors Auxiliary Contact Blocks GENERAL Description 3RH19 Auxiliary contact blocks The 3RH19 auxiliary contact blocks are available in 1, 2, 3 and 4-pole front mount versions and 2-pole side mount

More information

Financial Aid Packaging. User Guide

Financial Aid Packaging. User Guide Financial Aid Packaging User Guide Copyright (c) 2001 Jenzabar, Inc. All rights reserved. You may print any part or the whole of this documentation to support installations of Jenzabar software. Where

More information

================== CEDRIC VERSION 2.1 By M.J.RANDALL ================== INTRODUCTION

================== CEDRIC VERSION 2.1 By M.J.RANDALL ================== INTRODUCTION ================== CEDRIC VERSION 2.1 By M.J.RANDALL ================== INTRODUCTION CEDRIC is a screen-oriented text editor specifically designed for software development, rather than word-processing.

More information

SAP Help for Student Lifecycle Management

SAP Help for Student Lifecycle Management SAP Help for Student Lifecycle Management Applies to: Student Lifecycle Management EHP3 Summary This document describes the features and functions delivered with Student Lifecycle Management EHP3. Author(s):

More information

SIMATIC ET 200SP Product information on documentation of the ET 200SP distributed I/O system Product Information

SIMATIC ET 200SP Product information on documentation of the ET 200SP distributed I/O system Product Information SIMATIC ET 200SP Product information on documentation of the ET 200SP distributed I/O system Product Information General amendments to the documentation Contents This product information includes amendments

More information

annotated bibliography

annotated bibliography annotated bibliography by Alycia Attaway WORD COUNT 1366 CHARACTER COUNT 8903 TIME SUBMITTED 27-OCT-2011 11:39PM PAPER ID 210957288 dev CMS . CMS ital 1 CMS GRADEMARK REPORT FINAL GRADE 86 / 100 GENERAL

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Laboratory 1. Part 1: Introduction to Spreadsheets

Laboratory 1. Part 1: Introduction to Spreadsheets Laboratory 1 Part 1: Introduction to Spreadsheets By the end of this laboratory session you should be familiar with: Navigating around a worksheet. Naming sheets and cells. Formatting. The use of formulae.

More information

ITST Searching, Extracting & Archiving Data

ITST Searching, Extracting & Archiving Data ITST 1136 - Searching, Extracting & Archiving Data Name: Step 1 Sign into a Pi UN = pi PW = raspberry Step 2 - Grep - One of the most useful and versatile commands in a Linux terminal environment is the

More information

RSA NetWitness Logs. IBM iseries Last Modified: Monday, May 22, Event Source Log Configuration Guide

RSA NetWitness Logs. IBM iseries Last Modified: Monday, May 22, Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide IBM iseries Last Modified: Monday, May 22, 2017 Event Source Product Information: Vendor: IBM Event Source: iseries AS400 Versions: V6.1.x, V7.1,

More information

A Data Hanag emen t Sys tem Proposal for the ARPA Network. This proposal is being written to facilitate discussions on a design for a

A Data Hanag emen t Sys tem Proposal for the ARPA Network. This proposal is being written to facilitate discussions on a design for a ' Ne t wor k Working Group RFC: 304 NIC: 9077 Catagories 03, 04, 07.D. B. McKay, IBM february 17, 1972 Obsoletes: none R c. V Updates: none I. J iv 9077 1v\ov1."L A Data Hanag emen t Sys tem Proposal for

More information

March Canadian Public Tenders Buyer Guide

March Canadian Public Tenders Buyer Guide March 2010 Canadian Public Tenders Buyer Guide Table of Contents WELCOME TO MERX... 1 ABOUT THIS REFERENCE GUIDE... 1 SECTION 1 GETTING STARTED... 2 SYSTEM REQUIREMENTS... 2 NAVIGATING IN MERX... 2 SECTION

More information

Documentation of SAP Student Lifecycle Management (IS-HER- CM) BS 7 (EHP 4)

Documentation of SAP Student Lifecycle Management (IS-HER- CM) BS 7 (EHP 4) Documentation of SAP Student Lifecycle Management (IS-HER- CM) BS 7 (EHP 4) Applies to: Student Lifecycle Management EHP4 For more information, visit the Higher Education & Research homepage. Summary This

More information

2016 Survey of Internet Carrier Interconnection Agreements

2016 Survey of Internet Carrier Interconnection Agreements 2016 Survey of Internet Carrier Interconnection Agreements Bill Woodcock Marco Frigino Packet Clearing House November 21, 2016 PCH Peering Survey 2011 Five years ago, PCH conducted the first-ever broad

More information

(C) Copyright. Andrew Dainis =============================================================================

(C) Copyright. Andrew Dainis ============================================================================= (C) Copyright. Andrew Dainis ============================================================================= The C3D data file format was developed by Andrew Dainis in 1987 as a convenient and efficient

More information

MAA3182SC, MAB3091SC INTELLIGENT DISK DRIVES OEM MANUAL

MAA3182SC, MAB3091SC INTELLIGENT DISK DRIVES OEM MANUAL MAA3182SC, MAB3091SC INTELLIGENT DISK DRIVES OEM MANUAL SCSI LOGICAL INTERFACE SPECIFICATIONS C141-E039-01EN FOR SAFE OPERATION Handling of This manual This manual contains important information for using

More information

How to Implement I 2 C Serial Communication Using Intel MCS-51 Microcontrollers

How to Implement I 2 C Serial Communication Using Intel MCS-51 Microcontrollers APPLICATION NOTE How to Implement I 2 C Serial Communication Using Intel MCS-51 Microcontrollers SABRINA D QUARLES APPLICATIONS ENGINEER April 1993 Order Number 272319-001 Information in this document

More information

Elmo Servo Drives. Information Sheet for Crimson v2.0. Compatible Devices. Elmo Servo Drives using SimplIQ. Verified Device BAS-3/230-3

Elmo Servo Drives. Information Sheet for Crimson v2.0. Compatible Devices. Elmo Servo Drives using SimplIQ. Verified Device BAS-3/230-3 Elmo Servo Drives Information Sheet for Crimson v2.0 Compatible Devices Elmo Servo Drives using SimplIQ Verified Device BAS-3/230-3 Accessible Data Command Description Type Notes -- Motion Commands...

More information

C E R T I F I C A T E O F C O M P L I A N C E

C E R T I F I C A T E O F C O M P L I A N C E Issued to: SIEMENS AG LOW VOLTAGE SIEMENSSTRASSE 10 93055 REGENSBURG, GERMANY This is to certify that representative samples of Motor Controllers, Manual See following pages for list of models Have been

More information

PTS/Data Highway Interface Software User s Manual

PTS/Data Highway Interface Software User s Manual PTS/Data Highway Interface Software User s Manual February 1997 MAN527 Contents 1. Introduction 1 2. Program Functions 2 3. Programming 3 3.1 General 3 3.2 Register Size 3 3.3 Files and Messages 3 3.4

More information

CitiService News August 1, 2017 Edition No. 8

CitiService News August 1, 2017 Edition No. 8 CitiService News August 1, 2017 Edition No. 8 In this edition CitiDirect user reviews and the terms of using the SafeWord card CitiDirect user reviews and the terms of using the SafeWord card We are answering

More information

Introduction to MATLAB

Introduction to MATLAB Introduction to MATLAB Contents 1.1 Objectives... 1 1.2 Lab Requirement... 1 1.3 Background of MATLAB... 1 1.4 The MATLAB System... 1 1.5 Start of MATLAB... 3 1.6 Working Modes of MATLAB... 4 1.7 Basic

More information

Lab #2: Building the System

Lab #2: Building the System Lab #: Building the System Goal: In this second lab exercise, you will design and build a minimal microprocessor system, consisting of the processor, an EPROM chip for the program, necessary logic chips

More information

Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS 3.0(2) and CallManager 3.2

Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS 3.0(2) and CallManager 3.2 Cisco - Installing and Configuring Extension Mobility Using Either: Extended Services 2... Page 1 of 90 Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS

More information

Solution Guide for Chapter 18

Solution Guide for Chapter 18 Solution Guide for Chapter 18 Here are the solutions for the Doing the Math exercises in Girls Get Curves! DTM from p. 310-311 2. The diameter of a circle is 6 ft across. A chord measures 4 ft. How far

More information

PCL ISO 8859/5 Latin/Cyrillic

PCL ISO 8859/5 Latin/Cyrillic Page 1 of 5 PCL Symbol Se t: 10N Unicode gly ph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space -- -- -- -- $21 U0021 Ê Exclamation mark -- -- -- -- $22 U0022 Ë Quotation

More information

Exploring UNIX: Session 3

Exploring UNIX: Session 3 Exploring UNIX: Session 3 UNIX file system permissions UNIX is a multi user operating system. This means several users can be logged in simultaneously. For obvious reasons UNIX makes sure users cannot

More information

mm Monochrome Display and Printer Adapter

mm Monochrome Display and Printer Adapter --- ---- - --_. - - - --- ---- ----- Personal Computer Hardware Reference Library mm Monochrome Display and Printer Adapter 6361511 ii Contents Introduction... 1 Monochrome Display Adapter Function...

More information

VI (and Clone) Introductory Guide

VI (and Clone) Introductory Guide VI (and Clone) Introductory Guide Susan Liebeskind (shl@cc.gatech.edu) Miles O Neal (meo@rru.com) Systems & Software Solutions December 12, 1998 ABSTRACT Vi, the standard screen editor on Unix machines,

More information

Parts List, Charging Chart, Wiring Diagrams

Parts List, Charging Chart, Wiring Diagrams Parts List, Charging Chart, Wiring Diagrams PHH150, PHH180 3 Phase PACKAGE HEAT PUMP UNITS TABLE OF CONTENTS PARTS LIST------------ 2-5 PARTS DRAWING - - - - - - -6-16 CHARGING CHARTS - - - - - - - 17

More information

CHAPTER III TMN MANAGEMENT

CHAPTER III TMN MANAGEMENT CHAPTER III TMN MANAGEMENT TMN Management TMN Management The term TMN is introduced by the ITU-T (the former CCITT) as an abbreviation for 'Telecommunications Management Network'. The concept of a TMN

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Comments on Concepts of OSE in TR and proposals for related changes to Parts 1 and 3.

Comments on Concepts of OSE in TR and proposals for related changes to Parts 1 and 3. EWOS-1 TITLE: SOURCE: ISO/IEC JTC1/SGFS N... Comments on Concepts of OSE in TR 10000 and proposals for related changes to Parts 1 and 3. EUROPEAN WORKSHOP FOR OPEN SYSTEMS DATE: STATUS: Contribution to

More information

Creating a Shell or Command Interperter Program CSCI411 Lab

Creating a Shell or Command Interperter Program CSCI411 Lab Creating a Shell or Command Interperter Program CSCI411 Lab Adapted from Linux Kernel Projects by Gary Nutt and Operating Systems by Tannenbaum Exercise Goal: You will learn how to write a LINUX shell

More information

Experiment N o 1. 1 Introduction to Assembly Language Programming

Experiment N o 1. 1 Introduction to Assembly Language Programming Experiment N o 1 1 Introduction to Assembly Language Programming Introduction: This experiment introduces the student to assembly language programming. In order to illustrate the basic concepts of assembly

More information

KLIC-DI VRV PRODUCT MANUAL INTERFACE KNX DAIKIN VRV ZN1CL-KLIC-DI. Edition 4 Version 1.0

KLIC-DI VRV PRODUCT MANUAL INTERFACE KNX DAIKIN VRV ZN1CL-KLIC-DI. Edition 4 Version 1.0 PRODUCT MANUAL KLIC-DI VRV INTERFACE KNX VRV ZN1CL-KLIC-DI Edition 4 Version 1.0 Index 1. Introduction... 3 2. Installation... 5 2.1. KLIC-DI Installation... 5 2.2. Elements Description... 6 3. Configuration...

More information

5-1 Instruction Codes

5-1 Instruction Codes Chapter 5: Lo ai Tawalbeh Basic Computer Organization and Design 5-1 Instruction Codes The Internal organization of a digital system is defined by the sequence of microoperations it performs on data stored

More information