Traffic Shaping (Part 1)

Size: px
Start display at page:

Download "Traffic Shaping (Part 1)"

Transcription

1 Lab 2a Traffic Shaping (Part 1) Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic shaping, called a leaky bucket, that runs ver a real netwrk. The traffic fr testing the leaky bucket will be the Pissn, VBR vide, and LAN traffic traces frm Lab 1. Nte: Lab 2b will be a cntinuatin f this lab. Sftware Tls: The prgramming fr this lab is dne in Java and requires the use f Java datagrams. What t turn in: Turn in a reprt with yur answers t the questins in this lab, including the plts, hard cpies f all yur Java cde, and the annymus feedback frm. Versin 1 (January 27, 2007) Versin 2 (January 28, 2011) Jörg Liebeherr, All rights reserved. Permissin t use all r prtins f this material fr educatinal purpses is granted, as lng as use f this material is acknwledged in all derivative wrks.

2 Table f Cntent Table f Cntent 2 Preparing fr Lab 2a 2 Cmments 2 Part 1. Prgramming with Datagram Sckets and with Files 3 Part 2. Traffic generatrs 5 Part 3. Leaky Bucket Traffic Shaper 7 Feedback Frm fr Lab 2a 13 Preparing fr Lab 2a This lab requires netwrk prgramming with Java datagram sckets. There is an infrmative and shrt tutrial n Java datagrams is available at: Java datagram sckets use the UDP transprt prtcl t transmit traffic. The relatinship between Java datagrams and the UDP prtcl is described in: Cmments Quality f plts in lab reprt: This lab asks yu t prduce plts fr a lab reprt. It is imprtant that the graphs are f high quality. All plts must be prperly labeled. This includes that the units n the axes f all graphs are included, and that each plt has a header line that describes the cntent f the graph. Feedback: T be able t imprve the labs fr future years, we cllect data n the current lab experience. Yu must submit an annymus feedback frm fr each lab. Please use the feedback frm at the end f the lab, and return the frm with yur lab reprt. Extra credit: Cmplete the ptinal Part 4 fr 10% extra credit. Java: In the Unix lab, the default versin f the Java installatin is relatively ld. T access a mre recent versin use the cmmand: Cmpiling: /lcal/java/jdk1.5.0_09/bin/javac Running: /lcal/java/jdk1.5.0_09/bin/java ECE 466 LAB 2A - PAGE 2 J. Liebeherr

3 Part 1. Prgramming with Datagram Sckets and with Files The purpse f this part f the lab is t becme familiar with prgramming Datagram sckets and with writing Java prgrams that read and write data t/frm a file. The prgrams prvided in this part intend t ffer guidance fr the prgramming tasks needed later n. Exercise 1.1 Prgramming with datagram sckets Cmpile and run the fllwing tw prgrams. The prgram Sender.java transmits a string t the receiver ver a datagram scket. The prgram Receiver.java displays the string when it is received. Sender.java Receiver.java imprt java.i.*; imprt java.net.*; public class Sender { public static vid main(string[] args) thrws IOExceptin { InetAddress addr = InetAddress.getByName(args[0]); byte[] buf = args[1].getbytes(); DatagramPacket packet = new DatagramPacket(buf, buf.length, addr, 4444); DatagramScket scket = new DatagramScket(); scket.send(packet); } } imprt java.i.*; imprt java.net.*; public class Receiver { public static vid main(string[] args) thrws IOExceptin { DatagramScket scket = new DatagramScket(4444); byte[] buf = new byte[256]; DatagramPacket packet = new DatagramPacket(buf, buf.length); System.ut.println("Waiting..."); scket.receive(packet); String s = new String(p.getData(), 0, p.getlength()); System.ut.println(p.getAddress().getHstName() + ": " + s); } } Cmpile the prgrams. Start the receiver by running java Receiver. Assuming that the receiver is running n a hst with IP address , start the sender by running: java Sender My String The receiver prgram shuld nw display the string My String. Repeat this exercise, with the difference, that yu run the sender and receiver n tw different hsts. ECE 466 LAB 2A - PAGE 3 J. Liebeherr

4 Exercise 1.2 Reading and Writing data frm a file Dwnlad the Java prgram ReadFileWriteFile.java. The prgram reads an input file "data.txt" which has entries f the frm I P B The file is read line-by-line, the values in a line are parsed and assigned t variables. Then the values are displayed, and written t a file with name utput.txt. Run the prgram with the VBR vide trace frm Lab 1 as input. The vide trace is available at: Mdify the prgram s that it cmputes and displays the average size f the fllwing frame types: I frames; P frames; B frames. ECE 466 LAB 2A - PAGE 4 J. Liebeherr

5 Part 2. Traffic generatrs The gal in this part f the lab is t build a traffic generatr that emulates realistic traffic surces. The traffic generatr is driven by a traffic trace file, i.e., ne f the trace files frm Lab 1. The entries in the file permit t determine the size f transmitted packets and the elapsed time between packet transmissins. Fr each entry in the trace file, the traffic generatr creates a UDP datagram f the indicated size and transmits the datagram t the traffic sink. The traffic sink recrds time and size f each incming datagram, and writes the infrmatin int a file. The scenari is depicted in the figure belw. In this part f the lab, yu will build a traffic generatr fr the trace files with Pissn traffic. In Part 3, yu wrk with the Bellcre trace file. In Part 4, yu use the VBR vide traffic. Exercise 2.1 Traffic Generatr fr Pissn traffic Write a prgram that is a traffic generatr fr the cmpund Pissn traffic surce (see Lab 1, Exercise 1.4) and that transmits the traffic using Java datagrams t a traffic sink. The traffic sink has t be prgrammed as well. A trace fr the cmpund Pissn surce is available at URL The file has the frmat: SeqN Time (in µsec) Size (in Bytes) This results in a cmpund Pissn prcess with packet arrival rate λ = 1250 packets/sec, and the packet size has an expnential distributin with average size 1/µ =100 Bytes. ECE 466 LAB 2A - PAGE 5 J. Liebeherr

6 The traffic generatr reads each line frm the trace file, re-scales the values, and transmits a UDP datagram packet using the fllwing cnsideratins: The size f the transmitted datagram is equal t the (re-scaled) packet size value; The time f transmissin is determined frm the (re-scaled) time values. (The first packet shuld be transmitted withut delay). Exercise 2.2 Build the Traffic Sink Write a prgram that serves as traffic sink fr the traffic generatr frm the previus exercise. The requirements fr the traffic sink are as fllws: Read packets frm a specified UDP prt; Fr each incming packet, write a line t an utput file that recrds the size f the packet and the time since the arrival f the previus packet (Fr the first packet, the time is zer). Test the traffic sink with the traffic generatr frm Exercise 2.1. Exercise 2.3 Evaluatin Run experiments where yu transmit traffic frm the traffic generatr t the traffic sink. Evaluate the accuracy f the traffic generatr by cmparing the entries in the trace file (at the traffic generatr) t the results written t the utput file (at the sink). Use at least 10,000 data pints fr yur evaluatin. Prepare a plt that shws the difference f trace file and the utput file. Fr example, yu may create tw functins that shw the cumulative arrivals f the trace file and the utput file, respectively, and plt them as a functin f time. Try t imprve the accuracy f the traffic generatr. Evaluate and graph yur imprvements by cmparing them t the initial plt. Exercise 2.4 Accunt fr packet lsses. Packet lsses may ccur due t bit errrs, buffer verflws, cllisins f transmissins, r ther reasns. Packet lsses are less likely if bth the sender and the receiver are n the same machine. The UDP prtcl des nt recver packet lsses. Indicate in yur plts frm the evaluatin any packet lsses. Lab Reprt: Prvide discussins and graphs as requested in Exercise 2.3 and Exercise 2.4. ECE 466 LAB 2A - PAGE 6 J. Liebeherr

7 Part 3. Leaky Bucket Traffic Shaper In this part f the lab, yu familiarize yurself with a reference implementatin f a Leaky Bucket. The implementatin f the leaky bucket (in Java) and dcumentatin fr using the implementatin is available at: ucket In the next lab (Lab 2b) yu will mdify the surce cde f the implementatin. Right nw, the bjective is t run the cde f the reference implementatin, but withut a need t mdify the prvided surce cde. A leaky bucket traffic shaper with burst size LB max and rate r is shwn in the figure. Tkens are fed int the bucket at rate r. N mre tkens are added if the bucket cntains LB max tkens. Data can be transmitted nly if there are sufficient tkens in the bucket. T transmit a packet f L bytes, the bucket must cntain at least L tkens. If there are nt sufficient tkens, the packet must wait until there are enugh tkens in the bucket. The maximum size f the buffer is B max. Initially, the leaky bucket is full and the buffer is empty, i.e., LB(t) = LB max bytes and B(t) = 0 bytes. Nte that L shuld nt be smaller than the maximum packet size. The leaky bucket fr this Lab receives data frm a traffic generatr n a UDP prt and transmits the utput t a traffic sink, specified in terms f a an IP address and a UDP prt. This is illustrated belw. ECE 466 LAB 2A - PAGE 7 J. Liebeherr

8 An implementatin f the Leaky bucket fr packet sizes with a variable length is sketched in the fllwing figure. The traffic generatr (TG) generates packets that are transmitted t the Leaky Bucket, which sends the packets t the traffic sink (TS) after applying a shaping plicy. The leaky bucket is cmprised f fur cmpnents: Bucket Receiver (BR), Bucket Sender (BS), the Tken Bucket, and a Buffer. Upn arrival t the leaky bucket, packets are handled by BR which stres packets int the buffer r sends them ut immediately. The Buffer wrks as a FIFO queue with limited capacity and hlds packets until they can be send. The Tken Bucket generates tkens at a given rate (r) and hlds up t LB max tkens. BS takes packets ut f buffer and sends them when enugh tkens are available. The reference implementatin f the Leaky Bucket implements the abve functins, but which is missing details n the methd fr updating the value f LB and fr cmputing the time t* fr waking up the Bucket Sender. This implementatin is prvided by the package LeakyBucket, which cnsists f fur Java classes: Class LeakyBucket Creates the cmpnents f the leaky bucket and starts BR, BS, and TkenBucket in different threads. An instant f LeakyBucket is created with the fllwing parameters: ECE 466 LAB 2A - PAGE 8 J. Liebeherr

9 inprt UDP Prt number, where BR expects arriving packets. utaddress - IP address t which BS sends packets. utprt UDP prt number t which BS sends packets maxpacketsize - Maximum size f packet that can be prcessed. buffercapacity - Capacity f buffer in bytes (B max ). bucketsize Maximum number f tkens in leaky bucket (LB max ). bucketrate - Tken generating rate in tkens/sec (r). filename - Name f file, where arrival times are recrded. Buffer Thread safe implementatin f a FIFO buffer that is meant t be used in prducer/cnsumer scenari. This buffer stres packets that must nt exceed MAX_PACKET_SIZE and has inherent capacity f MAX_VALUE packets. The capacity f the buffer can be specified explicitly in bytes. The buffer has methds fr adding packets t the tail f the buffer and remving packets frm the head f the buffer, peeking at the first packet (withut remving it), and querying the currently ccupied buffer size (in terms f packets r bytes). LeakyBucketReceiver (BR) Waits n a specified UDP prt fr incming packets. When a packet arrives, it recrds its arrival time, size, buffer backlg (B), and the number f tkens in the bucket (LB) t a file. A received packet is prcessed in the fllwing way: if (buffer_is_empty && nt(sendinginprgress) && enugh_tkens_available) cnsume tkens; send packet; else add packet in buffer; Whether a transmissin is in prgress is checked by reading the SendingInPrgress variable f BucketSender. Nte that BucketReceiver and BucketSender never send at the same time, since BucketReceiver nly transmits when the buffer is empty. If a packet cannt be added t the buffer, e.g., because the buffer is full, the packet is drpped and an errr message displayed. LeakyBucketSender (BS) Remves packets frm buffer and transmits them t a specified address (IP address and UDP prt), when there are enugh tkens. The prcedure fr transmissin is as fllws: If (buffer_is_nt_empty) if (enugh_tkens) cnsume tkens; sendinginprgress = true; remve packet frm buffer; send packet; sendinginprgress = false; else get expected time when there will be enugh tkens; sleep fr this time; ECE 466 LAB 2A - PAGE 9 J. Liebeherr

10 else wait fr packet t arrive t buffer; // buffer wakes up BS when packet arrives TkenBucket This class updates the cntent f the tkens in the tken bucket. A tken bucket is created with tw parameters size and rate, where size is the maximum cntent f the tken bucket (LB max ), rate is the tken generatin rate in tkens per secnd (r). Other classes can request the TkenBucket abut the cntent f the tken bucket, and can request t remve tkens frm the bucket. The fllwing requests are available: getntkens: Returns number f tkens in bucket. remvetkens(x) : Request t remve X tkens frm the bucket. The methd returns false if there are less than X tkens in the bucket. getwaitingtime(x): Returns the waiting time (in nansecnds) until bucket has X tkens. Nte that there is n guarantee that there will be enugh tkens at the returned time (smene else may have remved tkens). Exercise 3.1 Running the reference implementatin f the Leaky Bucket Yur task is t execute the reference implementatin f the leaky bucket s that it receives packets frm yur implementatin f the traffic generatr frm Part 2, and send packets t yur versin f the traffic sink. The transmissins between traffic generatr, leaky bucket, and traffic sink use UDP datagrams. The size and timing f packet transmissins by the traffic generatr is dne as described in Part 2. Upn each packet arrival, the leaky bucket regulatr writes a line t an utput file that recrds the size f the packet and the time since the arrival f the last packet (Fr the first packet, the time is zer). Als recrded are the number f tkens (LB) in the leaky bucket and the backlg in the buffer (B) after the arrival f the packet. In yur implementatin, the traffic sink, the Leaky Bucket, and the traffic generatr must be started separately as independent prcesses. The fllwing cde segment shws hw yu start the LeakyBucket f the reference implementatin in a prcess. The implementatin assumes that the class LeakyBucket is in a subdirectry with name LeakyBucket : imprt LeakyBucket.LeakyBucket; public class Main { ECE 466 LAB 2A - PAGE 10 J. Liebeherr

11 } public static vid main(string[] args) { // listen n prt 4444, send t lcalhst:4445, // max. size f received packet is 1024 bytes, // buffer capacity is 100*1024 bytes, // leaky bucket has tkens, rate 5000 tkens/sec, and // recrds packet arrivals t bucket.txt). LeakyBucket lb = new LeakyBucket(4444, "lcalhst", 4445, 1024, 100*1024, 10000, 5000, "bucket.txt"); new Thread(lb).start(); } Exercise 3.2 Evaluate the reference implementatin fr the Pissn traffic file Cnsider the transmissin f Pissn traffic frm Exercise 2.3. Prepare a single plt that shws the cumulative arrival functin as a functin f time f: The data f the trace file (as read by the traffic generatr); The arrivals at the leaky bucket; The arrivals at the traffic sink. Prvide a secnd plt that shws the cntent f the tken bucket and the backlg in the Buffer as a functin f time. Exercise 3.3 Evaluate the reference implementatin fr the Ethernet and Vide Tracefiles Repeat the evaluatin fr the vide traffic trace and the Ethernet trace file that were used in Lab 1, and which are available at: Vide trace file: Ethernet traffic: There are a few things t nte: The frmat f the trace files fr the Vide and the Ethernet traffic is described in the descriptin f Lab 1. ECE 466 LAB 2A - PAGE 11 J. Liebeherr

12 Fr the vide trace file, the size f a vide frame may exceed the maximum size f a datagram, and yu need t send the frame in multiple datagrams. Lab Reprt: Prvide the surce cde fr yur surce cde fr Exercise 3.1. D nt include the surces fr the traffic generatr and traffic sink. Als, d nt include surce files f the reference implementatin. Fr Exercises 3.2 and 3.3, prvide the set f plts and include a descriptin f the plts. ECE 466 LAB 2A - PAGE 12 J. Liebeherr

13 Feedback Frm fr Lab 2a Cmplete this feedback frm at the cmpletin f the lab exercises and submit the frm when submitting yur lab reprt. The feedback is annymus. D nt put yur name n this frm and keep it separate frm yur lab reprt. Fr each exercise, please recrd the fllwing: Part 1. Prgramming with Datagram Sckets and with Files Part 2. Traffic generatrs Difficulty (-2,-1,0,1,2) -2 = t easy 0 = just fine 2 = t hard Interest Level (-2,-1,0,1,2) -2 = lw interest 0 = just fine 2 = high interest Time t cmplete (minutes) Part 3. Leaky Bucket Traffic Regulatr Please answer the fllwing questins: What did yu like abut this lab? What did yu dislike abut this lab? Make a suggestin t imprve the lab. ECE 466 LAB 2A - PAGE 13 J. Liebeherr

The programming for this lab is done in Java and requires the use of Java datagrams.

The programming for this lab is done in Java and requires the use of Java datagrams. Lab 2 Traffic Regulatin This lab must be cmpleted individually Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic regulatin, called a leaky bucket, that runs ver a real netwrk.

More information

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02)

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02) Lab 3 Packet Scheduling Due Date: Lab reprt is due n Mar 6 (PRA 01) r Mar 7 (PRA 02) Teams: This lab may be cmpleted in teams f 2 students (Teams f three r mre are nt permitted. All members receive the

More information

This labs uses traffic traces from Lab 1 and traffic generator and sink components from Lab 2.

This labs uses traffic traces from Lab 1 and traffic generator and sink components from Lab 2. Lab 3 Packet Scheduling Purpse f this lab: Packet scheduling algrithms determine the rder f packet transmissin at the utput link f a packet switch. This lab includes experiments that exhibit prperties

More information

Programming Project: Building a Web Server

Programming Project: Building a Web Server Prgramming Prject: Building a Web Server Submissin Instructin: Grup prject Submit yur cde thrugh Bb by Dec. 8, 2014 11:59 PM. Yu need t generate a simple index.html page displaying all yur grup members

More information

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure

More information

Enterprise Chat and Developer s Guide to Web Service APIs for Chat, Release 11.6(1)

Enterprise Chat and  Developer s Guide to Web Service APIs for Chat, Release 11.6(1) Enterprise Chat and Email Develper s Guide t Web Service APIs fr Chat, Release 11.6(1) Fr Unified Cntact Center Enterprise August 2017 Americas Headquarters Cisc Systems, Inc. 170 West Tasman Drive San

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 9 2016 v5.1 Answers 100% 1. Which tw characteristics are assciated with UDP sessins? (Chse tw.) Destinatin devices receive traffic with minimal delay. Transmitted data segments are tracked.

More information

To start your custom application development, perform the steps below.

To start your custom application development, perform the steps below. Get Started T start yur custm applicatin develpment, perfrm the steps belw. 1. Sign up fr the kitewrks develper package. Clud Develper Package Develper Package 2. Sign in t kitewrks. Once yu have yur instance

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

Preparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop.

Preparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop. Lab 1 Name: Checked: (instructr r TA initials) Objectives: Learn abut jgrasp - the prgramming envirnment that we will be using (IDE) Cmpile and run a Java prgram Understand the relatinship between a Java

More information

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...

More information

Second Assignment Tutorial lecture

Second Assignment Tutorial lecture Secnd Assignment Tutrial lecture INF5040 (Open Distributed Systems) Faraz German (farazg@ulrik.ui.n) Department f Infrmatics University f Osl Octber 17, 2016 Grup Cmmunicatin System Services prvided by

More information

Practical Exercises in Computer Networks and Distributed Systems

Practical Exercises in Computer Networks and Distributed Systems (V..6, Nv 2) Practical Exercises in Cmputer Netwrks and Distributed Systems Stream Sckets and the Client/Server mdel (C language, W) 2-, Jsé María F Mrán This practical illustrates basic cncepts prtcl

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

Lab 5 Sorting with Linked Lists

Lab 5 Sorting with Linked Lists UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Municode Website Instructions

Municode Website Instructions Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater

More information

SeaLinx Guide. Table of Contents

SeaLinx Guide. Table of Contents SeaLinx Guide Table f Cntents SeaLinx Overview... 2 Cre Cmpnent... 2 Physical Layer... 2 Mac Layer... 3 Netwrk Layer... 4 Transprt Layer... 5 Applicatin Layer... 6 Quick Start Guide... 6 Sftware Installatin

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Extended Traceability Report for Enterprise Architect

Extended Traceability Report for Enterprise Architect Extended Traceability Reprt User Guide Extended Traceability Reprt fr Enterprise Architect Extended Traceability Reprt fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

Dashboard Extension for Enterprise Architect

Dashboard Extension for Enterprise Architect Dashbard Extensin fr Enterprise Architect Dashbard Extensin fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins f the free versin f the extensin... 3 Example Dashbard

More information

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP

More information

Populate and Extract Data from Your Database

Populate and Extract Data from Your Database Ppulate and Extract Data frm Yur Database 1. Overview In this lab, yu will: 1. Check/revise yur data mdel and/r marketing material (hme page cntent) frm last week's lab. Yu will wrk with tw classmates

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first

More information

MyUni Adding Content. Date: 29 May 2014 TRIM Reference: D2013/ Version: 1

MyUni Adding Content. Date: 29 May 2014 TRIM Reference: D2013/ Version: 1 Adding Cntent MyUni... 2 Cntent Areas... 2 Curse Design... 2 Sample Curse Design... 2 Build cntent by creating a flder... 3 Build cntent by creating an item... 4 Cpy r mve cntent in MyUni... 5 Manage files

More information

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template Netwrk Rail ARMS - Asbests Risk Management System Training Guide fr use f the Imprt Survey Template The ARMS Imprt Survey Template New Asbests Management Surveys and their Survey Detail reprts can be added

More information

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.

More information

(ii). o IP datagram packet is payload of a TCP segment o TCP segment is payload of an IP datagram. (iii).

(ii). o IP datagram packet is payload of a TCP segment o TCP segment is payload of an IP datagram. (iii). CSC 344: Cmputer Netwrks Review Questins 1. Select the crrect answer amng the chices by placing a checkmark next t the right statement. (i). ARP (Address Reslutin Prtcl) is used t btain IP address fr a

More information

STIDistrict AL Rollover Procedures

STIDistrict AL Rollover Procedures 2009-2010 STIDistrict AL Rllver Prcedures General Infrmatin abut STIDistrict Rllver IMPORTANT NOTE! Rllver shuld be perfrmed between June 25 and July 25 2010. During this perid, the STIState applicatin

More information

TUTORIAL --- Learning About Your efolio Space

TUTORIAL --- Learning About Your efolio Space TUTORIAL --- Learning Abut Yur efli Space Designed t Assist a First-Time User Available t All Overview Frm the mment yu lg in t yur just created myefli accunt, yu will find help ntes t guide yu in learning

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast

More information

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

SAS Hot Fix Analysis, Download and Deployment Tool

SAS Hot Fix Analysis, Download and Deployment Tool SAS Ht Fix Analysis, Dwnlad and Deplyment Tl SASHFADD Versin 2.2.1 Usage Guide What's New in SASHFADD 2.2.1? Table f Cntents Intrductin... 1 System Requirements... 2 Imprtant infrmatin regarding tl usage...

More information

Project 3 Specification FAT32 File System Utility

Project 3 Specification FAT32 File System Utility Prject 3 Specificatin FAT32 File System Utility Assigned: Octber 30, 2015 Due: Nvember 30, 11:59 pm, 2015 Yu can use the reminder f the slack days. -10 late penalty fr each 24-hur perid after the due time.

More information

Uploading Files with Multiple Loans

Uploading Files with Multiple Loans Uplading Files with Multiple Lans Descriptin & Purpse Reprting Methds References Per the MHA Handbk, servicers are required t prvide peridic lan level data fr activity related t the Making Hme Affrdable

More information

Aras Innovator Viewer Add-Ons

Aras Innovator Viewer Add-Ons Aras Innvatr Viewer Add-Ons Aras Innvatr 9.2 Dcument #: 9.2.02232009 Last Mdified: 4/1/2010 Aras Crpratin ARAS CORPORATION Cpyright 2010 All rights reserved Aras Crpratin 300 Brickstne Square Suite 904

More information

Project #1 - Fraction Calculator

Project #1 - Fraction Calculator AP Cmputer Science Liberty High Schl Prject #1 - Fractin Calculatr Students will implement a basic calculatr that handles fractins. 1. Required Behavir and Grading Scheme (100 pints ttal) Criteria Pints

More information

Java Socket Workshop. July Purpose of this workshop:

Java Socket Workshop. July Purpose of this workshop: Java Socket Workshop July 2012 Purpose of this workshop: The objective of this workshop is to gain experience with writing and compiling programs using the Java programming language. The exercises provide

More information

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader Hughes BGAN-X 9202 Upgrader User Guide (Mac) Rev 1.0 (23-Feb-12) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9202 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is

More information

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Asset Template

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Asset Template Netwrk Rail ARMS - Asbests Risk Management System Training Guide fr use f the Imprt Asset Template The ARMS Imprt Asset Template New assets can be added t the Asbests Risk Management System (ARMS) using

More information

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader Hughes BGAN-X 9211 Upgrader User Guide (Mac) Rev 1.2 (6-Jul-17) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9211 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is

More information

MICRONET INTERNATIONAL COLLEGE BDTVEC ND in Computer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013

MICRONET INTERNATIONAL COLLEGE BDTVEC ND in Computer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013 MICRONET INTERNATIONAL COLLEGE BDTVEC ND in Cmputer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013 Prduce dcumentatin fr the prgram Submit the SOFTCOPY and als HARDCOPY

More information

TechSmith Relay 5.1.5

TechSmith Relay 5.1.5 TechSmith Relay 5.1.5 WHAT END USERS NEED TO KNOW This upgrade cmes with new features that will be available t yu. Fr all f these feature t be installed n yur cmputer few steps will need t be taken. After

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Prf. Mntek Singh Spring 2019 Lab #7: A Basic Datapath; and a Sprite-Based Display Issued Fri 3/1/19; Due Mn 3/25/19

More information

Avaya 9610 IP Telephone End User Guide

Avaya 9610 IP Telephone End User Guide Avaya 9610 IP Telephne End User Guide 9610 IP Telephne End User Guide 1 P age Table f Cntents Abut Yur Telephne... 3 Abut Scrlling and Navigatin... 3 Selecting Names, Numbers, r Features... 3 Starting

More information

Ephorus Integration Kit

Ephorus Integration Kit Ephrus Integratin Kit Authr: Rbin Hildebrand Versin: 2.0 Date: May 9, 2007 Histry Versin Authr Cmment v1.1 Remc Verhef Created. v1.2 Rbin Hildebrand Single Sign On (Remved v1.7). v1.3 Rbin Hildebrand Reprting

More information

VMware EVO:RAIL Customer Release Notes

VMware EVO:RAIL Customer Release Notes VMware EVO:RAIL Custmer Release Ntes EVO:RAIL Release 1.2.0 Dcument Revisin: 1.2.0-2 (May 27, 2015) Cpyright 1998-2015 VMware, Inc. All rights reserved. Cpyright, trademark, and patent infrmatin: http://pubs.vmware.cm/cpyright-trademark.html.

More information

Getting Started with the Web Designer Suite

Getting Started with the Web Designer Suite Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite

More information

Integrating QuickBooks with TimePro

Integrating QuickBooks with TimePro Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data

More information

User Guide. Document Version: 1.0. Solution Version:

User Guide. Document Version: 1.0. Solution Version: User Guide Dcument Versin: 1.0 Slutin Versin: 365.082017.3.1 Table f Cntents Prduct Overview... 3 Hw t Install and Activate Custmer Satisfactin Survey Slutin?... 4 Security Rles in Custmer Satisfactin

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words,

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words, The transprt layer An intrductin t prcess t prcess cmmunicatin CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Transprt-layer services Prvides fr lgical cmmunicatin* between applicatin

More information

BMC Remedyforce Integration with Remote Support

BMC Remedyforce Integration with Remote Support BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective

More information

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010 Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic

More information

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.

More information

Copyrights and Trademarks

Copyrights and Trademarks Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and

More information

Custodial Integrator. Release Notes. Version 3.11 (TLM)

Custodial Integrator. Release Notes. Version 3.11 (TLM) Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Information about the ACC Education App Featuring ACCSAP 9

Information about the ACC Education App Featuring ACCSAP 9 Infrmatin abut the ACC Educatin App Featuring ACCSAP 9 Key Features: This app is designed t be a study tl fr select educatinal prducts. It des nt include all features and functinality f the nline prtin

More information

TRAINING GUIDE. Overview of Lucity Spatial

TRAINING GUIDE. Overview of Lucity Spatial TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign

More information

Release Notes. Dell SonicWALL Security firmware is supported on the following appliances: Dell SonicWALL Security 200

Release Notes. Dell SonicWALL  Security firmware is supported on the following appliances: Dell SonicWALL  Security 200 Release Ntes Email Security Dell SnicWALL Email Security 8.0.1 SnicOS Cntents System Cmpatibility... 1 Enhancements in Email Security 8.0.1... 2 Reslved Issues... 3 Upgrading t Email Security 8.0.1...

More information

McAfee Endpoint Upgrade Assistant 2.2

McAfee Endpoint Upgrade Assistant 2.2 Release Ntes McAfee Endpint Upgrade Assistant 2.2 Fr use with eplicy Orchestratr Cntents Abut this release... 2 Release build... 2 Changes in this Release... 3 Custm Lg Lcatin... 3 EUA Envirnment Lgin

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

Creating a TES Encounter/Transaction Entry Batch

Creating a TES Encounter/Transaction Entry Batch Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.

More information

CS1150 Principles of Computer Science Introduction (Part II)

CS1150 Principles of Computer Science Introduction (Part II) Principles f Cmputer Science Intrductin (Part II) Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Review Terminlgy Class } Every Java prgram must have at least

More information

APPLY PAGE: LOGON PAGE:

APPLY PAGE: LOGON PAGE: APPLY PAGE: Upn accessing the system fr the first time, yu will land n the Apply Page. This page will shw yu any currently pen pprtunities that yu can apply fr, as well as any relevant deadlines r ther

More information

Test Pilot User Guide

Test Pilot User Guide Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus

More information

Transmission Control Protocol Introduction

Transmission Control Protocol Introduction Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule

More information

PAGE NAMING STRATEGIES

PAGE NAMING STRATEGIES PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename

More information

html o Choose: Java SE Development Kit 8u45

html o Choose: Java SE Development Kit 8u45 ITSS 3211 Intrductin f Prgramming 1 Curse ITSS 3211 Intrductin t Prgramming Instructr Jytishka Ray Term Summer 2016 Meetings Mndays, 6 p.m. 8:45 p.m. Rm JSOM 12.202 Instructr: Jytishka Ray Email: jxr114030@utdallas.edu

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

Report Writing Guidelines Writing Support Services

Report Writing Guidelines Writing Support Services Reprt Writing Guidelines Writing Supprt Services Overview The guidelines presented here shuld give yu an idea f general cnventins fr writing frmal reprts. Hwever, yu shuld always cnsider yur particular

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information

Ascii Art Capstone project in C

Ascii Art Capstone project in C Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,

More information

BI Publisher TEMPLATE Tutorial

BI Publisher TEMPLATE Tutorial PepleSft Campus Slutins 9.0 BI Publisher TEMPLATE Tutrial Lessn T2 Create, Frmat and View a Simple Reprt Using an Existing Query with Real Data This tutrial assumes that yu have cmpleted BI Publisher Tutrial:

More information

istartsmart 3.5 Upgrade - Installation Instructions

istartsmart 3.5 Upgrade - Installation Instructions istartsmart 3.5 Upgrade - Installatin Instructins Minimum System Requirements: Hatch All-In-One istartsmart Cmputer Learning Center v1.0 r v1.1 Internet access - either hard-wired r wireless cnnectin is

More information

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f

More information

COP2800 Homework #3 Assignment Spring 2013

COP2800 Homework #3 Assignment Spring 2013 YOUR NAME: DATE: LAST FOUR DIGITS OF YOUR UF-ID: Please Print Clearly (Blck Letters) YOUR PARTNER S NAME: DATE: LAST FOUR DIGITS OF PARTNER S UF-ID: Please Print Clearly Date Assigned: 15 February 2013

More information

FIREWALL RULE SET OPTIMIZATION

FIREWALL RULE SET OPTIMIZATION Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue

More information

BMC Remedyforce Integration with Bomgar Remote Support

BMC Remedyforce Integration with Bomgar Remote Support BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their

More information

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers Page 1 f 18 HW4 Sftware versin 3 Device Manager and Data Lgging LOG-RC Series Data Lggers 2011; Page 2 f 18 Table f cntents 1 ORGANIZATION OF THE HW4 MANUALS... 3 2 OVERVIEW... 4 3 INITIAL SETUP... 4 3.1

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

RxAXIS Security Module 09/25/2013

RxAXIS Security Module 09/25/2013 RxAXIS Security Mdule 09/25/2013 Lessn Title Intrductin: Security Mdule In this tutrial we are ging t lk at the Security Maintenance Mdule f the RxAXIS system. When used, this system gives emplyees access

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

1on1 Sales Manager Tool. User Guide

1on1 Sales Manager Tool. User Guide 1n1 Sales Manager Tl User Guide Table f Cntents Install r Upgrade 1n1 Page 2 Setting up Security fr Dynamic Reprting Page 3 Installing ERA-IGNITE Page 4 Cnverting (Imprting) Queries int Dynamic Reprting

More information

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

Apply IU Admin Center

Apply IU Admin Center Overview The (fr undergraduate applicatins) allws administrative users t view the applicatins which are in prgress and applicatins which have been submitted. Yu can search fr applicatins by last name,

More information

Assignment #5: Rootkit. ECE 650 Fall 2018

Assignment #5: Rootkit. ECE 650 Fall 2018 General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment

More information

Getting Started with the SDAccel Environment on Nimbix Cloud

Getting Started with the SDAccel Environment on Nimbix Cloud Getting Started with the SDAccel Envirnment n Nimbix Clud Revisin Histry The fllwing table shws the revisin histry fr this dcument. Date Versin Changes 09/17/2018 201809 Updated figures thrughut Updated

More information