The programming for this lab is done in Java and requires the use of Java datagrams.

Size: px
Start display at page:

Download "The programming for this lab is done in Java and requires the use of Java datagrams."

Transcription

1 Lab 2 Traffic Regulatin This lab must be cmpleted individually Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic regulatin, called a leaky bucket, that runs ver a real netwrk. The traffic fr testing the leaky bucket will be the Pissn, VBR vide, and LAN traffic traces frm Lab 1. Sftware Tls: The prgramming fr this lab is dne in Java and requires the use f Java datagrams. What t turn in: Turn in a hard cpy f all yur answers t the questins in this lab, including the plts, hard cpies f all yur Java cde, and the annymus feedback frm. Versin 1 (January 27, 2007) Jörg Liebeherr, All rights reserved. Permissin t use all r prtins f this material fr educatinal purpses is granted, as lng as use f this material is acknwledged in all derivative wrks.

2 Table f Cntent Table f Cntent 2 Preparing fr Lab 2 2 Lab 2 Errr! Bkmark nt defined. Part 1. Prgramming with Datagram Sckets and with Files 3 Part 2. Traffic generatrs 5 Part 3. Leaky Bucket Traffic Regulatr 7 Part 4. Regulating a VBR vide surce with Multiple Leaky buckets 10 Feedback Frm fr Lab 2 12 Preparing fr Lab 2 This lab requires netwrk prgramming with Java datagram sckets. There is an infrmative and shrt tutrial n Java datagrams is available at: Java datagram sckets use the UDP transprt prtcl t transmit traffic. The relatinship between Java datagrams and the UDP prtcl is described in: Cmments Quality f plts in lab reprt: This lab asks yu t prduce plts fr a lab reprt. It is imprtant that the graphs are f high quality. All plts must be prperly labeled. This includes that the units n the axes f all graphs are included, and that each plt has a header line that describes the cntent f the graph. Feedback: T be able t imprve the labs fr future years, we cllect data n the current lab experience. Yu must submit an annymus feedback frm fr each lab. Please use the feedback frm at the end f the lab, and return the frm with yur lab reprt. Extra credit: Cmplete the ptinal Part 4 fr 10% extra credit. Java: In the Unix lab, the default versin f the Java installatin is relatively ld. T access a mre recent versin use the cmmand: Cmpiling: /lcal/java/jdk1.5.0_09/bin/javac Running: /lcal/java/jdk1.5.0_09/bin/java ECE 1545 LAB 2 - PAGE 2 J. Liebeherr

3 Part 1. Prgramming with Datagram Sckets and with Files The purpse f this part f the lab is t becme familiar with prgramming Datagram sckets and with writing Java prgrams that read and write data t/frm a file. The prgrams prvided in this part intend t ffer guidance fr the prgramming tasks needed later n. Exercise 1.1 Prgramming with datagram sckets Cmpile and run the fllwing tw prgrams. The prgram Sender.java transmits a string t the receiver ver a datagram scket. The prgram Receiver.java displays the string when it is received. Sender.java Receiver.java imprt java.i.*; imprt java.net.*; public class Sender { public static vid main(string[] args) thrws IOExceptin { InetAddress addr = InetAddress.getByName(args[0]); byte[] buf = args[1].getbytes(); DatagramPacket packet = new DatagramPacket(buf, buf.length, addr, 4444); DatagramScket scket = new DatagramScket(); scket.send(packet); } } imprt java.i.*; imprt java.net.*; public class Receiver { public static vid main(string[] args) thrws IOExceptin { DatagramScket scket = new DatagramScket(4444); byte[] buf = new byte[256]; DatagramPacket packet = new DatagramPacket(buf, buf.length); System.ut.println("Waiting..."); scket.receive(packet); String s = new String(p.getData(), 0, p.getlength()); System.ut.println(p.getAddress().getHstName() + ": " + s); } } Cmpile the prgrams. Start the receiver by running java Receiver. Assuming that the receiver is running n a hst with IP address , start the sender by running: java Sender My String The receiver prgram shuld nw display the string My String. Repeat this exercise, with the difference, that yu run the sender and receiver n tw different hsts. ECE 1545 LAB 2 - PAGE 3 J. Liebeherr

4 Exercise 1.2 Reading and Writing data frm a file Dwnlad the Java prgram ReadFileWriteFile.java. The prgram reads an input file "data.txt" which has entries f the frm I P B The file is read line-by-line, the values in a line are parsed and assigned t variables. Then the values are displayed, and written t a file with name utput.txt. Run the prgram with the VBR vide trace frm Lab 1 as input. The vide trace is available at: Mdify the prgram s that it cmputes and displays the average size f the fllwing frame types: I frames; P frames; B frames. ECE 1545 LAB 2 - PAGE 4 J. Liebeherr

5 Part 2. Traffic generatrs The gal in this part f the lab is t build a traffic generatr that emulates realistic traffic surces. The traffic generatr is driven by a trace file, i.e., ne f the trace files frm Lab 1. The entries in the file permit t determine the size f transmitted packets and the elapsed time between packet transmissins. Fr each entry in the trace file, the traffic generatr creates a UDP datagram f the indicated size and transmits the datagram t the traffic sink. The traffic sink recrds time and size f each incming datagram, and writes the infrmatin int a file. The scenari is depicted in the figure belw. Trace file Time (in ms) size (in bytes) Arrival (in ms) size (in bytes) bytes 300 bytes 13 ms Traffic Generatr Traffic Sink In this part f the lab, yu will build a traffic generatr fr the trace files with Pissn traffic. In Part 3, yu wrk with the Bellcre trace file. In Part 4, yu use the VBR vide traffic. Exercise 2.1 Traffic Generatr fr Pissn traffic Write a prgram that is a traffic generatr fr the cmpund Pissn traffic surce (see Lab 1, Exercise 1.4) and that transmits the traffic using Java datagrams t a traffic sink. The traffic sink has t be prgrammed as well. A trace fr the cmpund Pissn surce is available at URL The file has the frmat: SeqN Time (in μsec) Size (in Bytes) Re-scale the data in the file as fllws: Multiply the time values in the file by a factr f 10 Multiply the packet size by a factr f 10. ECE 1545 LAB 2 - PAGE 5 J. Liebeherr

6 This results in a cmpund Pissn prcess with packet arrival rate λ = 125 packets/sec, and the packet size has an expnential distributin with average size 1/μ =1000 Bytes. The traffic generatr reads each line frm the trace file, re-scales the values, and transmits a UDP datagram packet using the fllwing cnsideratins: The size f the transmitted datagram is equal t the (re-scaled) packet size value; The time f transmissin is determined frm the (re-scaled) time values. (The first packet shuld be transmitted withut delay). Exercise 2.2 Build the Traffic Sink Write a prgram that serves as traffic sink fr the traffic generatr frm the previus exercise. The requirements fr the traffic sink are as fllws: Read packets frm a specified UDP prt; Fr each incming packet, write a line t an utput file that recrds the size f the packet and the time since the arrival f the previus packet (Fr the first packet, the time is zer). Test the traffic sink with the traffic generatr frm Exercise 2.1. Exercise 2.3 Evaluatin Run experiments where yu transmit traffic frm the traffic generatr t the traffic sink. Evaluate the accuracy f the traffic generatr by cmparing the entries in the trace file (at the traffic generatr) t the results written t the utput file (at the sink). Use at least 10,000 data pints fr yur evaluatin. Prepare a plt that shws the difference f trace file and the utput file. Fr example, yu may create tw functins that shw the cumulative arrivals f the trace file and the utput file, respectively, and plt them as a functin f time. Try t imprve the accuracy f the traffic generatr. Evaluate and graph yur imprvements by cmparing them t the initial plt. Exercise 2.4 (Optinal) Accunt fr packet lsses. Packet lsses may ccur due t bit errrs, buffer verflws, cllisins f transmissins, r ther reasns. Packet lsses are less likely if bth the sender and the receiver are n the same machine. The UDP prtcl des nt recver packet lsses. Indicate in yur plts frm the evaluatin any packet lsses. Lab Reprt: Prvide discussins and graphs as requested in Exercise 2.3 and (the ptinal) Exercise 2.4. ECE 1545 LAB 2 - PAGE 6 J. Liebeherr

7 Part 3. Leaky Bucket Traffic Regulatr Yu will design and implement a leaky bucket regulatr with size L and rate r, as shwn in the figure. Tkens are fed int the bucket at rate r. N mre tkens are added if the bucket cntains L tkens. Data can be transmitted nly if there are sufficient tkens in the bucket. T transmit a packet f N bytes, the bucket must cntain at least N tkens. If there are nt sufficient tkens, the packet must wait until there are enugh tkens in the buffer. Initially, the leaky bucket is full and the buffer is empty, i.e., LB(t) = L bytes and X(t) = 0 bytes. Nte that L shuld nt be smaller than the maximum packet size. r L LB(t) A(t) D(t) X(t) Exercise 3.1 Build a Leaky Bucket traffic regulatr Yur task is t build a leaky bucket regulatr that receives data frm a traffic generatr and transmits the utput t a traffic sink. This is illustrated belw. Trace file Time (in ms) size (in bytes) Arrival size X(t) L(t) (in ms) (in bytes) Arrival (in ms) size (in bytes) LB (r, L) Traffic Generatr Leaky Bucket Traffic Sink The transmissins between traffic generatr, leaky bucket, and traffic sink use UDP datagrams. The size and timing f packet transmissins is dne as described in Part 2. Upn each packet arrival, the leaky bucket regulatr writes a line t an utput file that recrds the size f the packet and the time since the arrival f the last packet (Fr the ECE 1545 LAB 2 - PAGE 7 J. Liebeherr

8 first packet, the time is zer). Als recrded are the number f tkens (L(t)) in the leaky bucket and the backlg in the buffer (X(t)) after the arrival f the packet. Exercise 3.2 Regulating LAN traffic frm the Bellcre trace Evaluate the accuracy and crrectness f yur leaky bucket implementatin with the aggregate LAN traffic frm Bellcre as traffic surce. Take at least 10,000 data pints f the Bellcre traffic trace, available at Mdify the entries in the trace file as fllws (This can be dne when the data is read): All packets with a size f 1518 bytes are cunted as having a size f 1480 size (What is the reasn fr this adjustment?). The time units in the first clumn are interpreted as secnds (as ppsed t millisecnds). Determine the average traffic rate r* f yur trace. Using the setup frm Exercise 3.1, set the parameters f the leaky bucket (L, r), such that L = 1480 bytes and r = r*. Transmit packets frm the traffic generatr using the (truncated and mdified) data in the Bellcre trace. Prepare a plt that shws the differences between the trace file and the utput file, as a functin f time. Prepare plts, that depict the size f the leaky bucket L(t) and the backlg in the buffer X(t) as a functin f time. What percentage f time is there a backlg at the leaky bucket? What is the lngest backlg at the leaky bucket? Exercise 3.3 Perfrm a stress test Perfrm a stress test f yur leaky bucket implementatin that determines the maximum transmissin rate that can be supprted by yur leaky bucket Fr the stress test yu will create a cnstant-rate traffic surce that generates fixed-sized packets at cnstant time intervals. When the time between packets is decreased, the rate f data transmissin is increased. Eventually, the leaky bucket will nt be able t keep up and a grwing backlg will be bserved at the buffer f the leaky bucket. The highest rate at which n (permanent and grwing) backlg is bserved marks the maximum transmissin rate. Create a traffic generatr that transmits packets f a fixed size (L bytes) with cnstant inter-packet spacing f T ms. Set up a leaky bucket traffic regulatr with parameters (L, r). Fr a packet size f L = 100 bytes, determine the smallest inter-packet spacing T min that can be supprted by yur implementatin. Start with an initial spacing (chsen ECE 1545 LAB 2 - PAGE 8 J. Liebeherr

9 by yu) and reduce the time between packets, until yu see a lng backlg develping in the buffer f the leaky bucket. Determine the maximum transmissin rate fr scenaris, where bth the sender and the regulatr are running n the same system, and where sender and regulatr are running n tw different cmputers. Repeat the experiment with different packet sizes, and evaluate the impact f the packet size n the maximum transmissin rate. Exercise 3.4 Imprving the implementatin Try t imprve the perfrmance f the leaky bucket traffic generatr, s that it can supprt higher data rates. The fllwing are factrs that may imprve the perfrmance: Avid flating pint peratins. Perfrm peratins in Integer arithmetic, aviding divisins. Avid unnecessary memry allcatins (creatin f bjects) and system calls (e.g., timers). Nte: By implementing the slutin in Java, sme aspects with an impact n the perfrmance are nt under yur cntrl. An imprtant limitatin is that garbage cllectin, i.e., the de-allcatin unused memry, is nt cntrlled by the user. Yur grade in this sectin depends n the maximum rate that yu achieve (in cmparisn t ther implementatins). Yu may be asked t demnstrate the perfrmance in the next lab sessin. Lab Reprt: Describe the design f yur leaky bucket implementatin. Fr Exercise 3.2, prvide a set f plts and include a descriptin f the plts. Fr Exercise 3.3, prvide a plt t supprt yur the data rate the plts, a descriptin f the plts, and yur bservatins and discussins. Fr Exercise 3.4 describe the imprvements t yur cde and the results that yu achieved. Cmpare the results with thse f Exercise 3.3. ECE 1545 LAB 2 - PAGE 9 J. Liebeherr

10 Part 4. (Optinal) Regulating VBR vide with Multiple Leaky buckets The regulatin f VBR vide traffic with a leaky bucket has t address the fllwing tw prblems: Since the size f a frame can be much larger than the maximum packet size (in the file mvietrace.data, the maximum frame size exceeds 600 KB), yet the time lag between frames is relatively lng, ne wuld like t select leaky bucket parameters that stretch the transmissin f a frame ver the entire 33 ms. In rder reduce the lng-term resurce cnsumptin f the VBR vide surce, ne wuld like t set the leaky bucket rate parameter t a value that is clse t the average rate f the VBR surce. T satisfy bth cnstraints, ne leaky bucket is clearly nt sufficient. A pssible (and realized) slutin t this prblem is t regulate VBR vide traffic by tw leaky buckets put in series: The first leaky bucket cntrls the peak rate, by spacing ut the transmissin f a frame ver a lnger duratin; The secnd leaky bucket cntrls the average rate f the VBR surce. An illustratin f a dual leaky bucket is shwn in the figure belw. An arriving packet must withdraw tkens frm bth leaky buckets. If ne f the tw buckets des nt have enugh tken, the packet must wait until sufficient tkens are available in bth buckets. r 1 r 2 L 1 LB1(t) L 2 LB2(t) A(t) D(t) X(t) ECE 1545 LAB 2 - PAGE 10 J. Liebeherr

11 Exercise 4.1 Dual Leaky Bucket Traffic regulatr Implement a traffic regulatr that realizes a dual leaky bucket. The leaky bucket has fur parameters (L 1, r 1, L 2, r 2 ), fr the size and rate f the leaky buckets. As in Exercise 3.1, the regulatr receives data frm a traffic generatr and transmits the utput t a traffic sink. Build a traffic generatr (f yur chice) that can be used t demnstrate the crrectness and accuracy f yur implementatin. Prvide plts (similar t Exercise 3.2) that illustrate hw yu tested the implementatin. Exercise 4.2 Selecting dual leaky bucket parameters fr a VBR vide surce Yur task is t cntrl the VBR vide trace frm Exercise 1.2 with yur dual-leaky bucket implementatin. Transmitted packets are nt permitted t exceed 1480 Bytes. S, sme frames must be divided up int multiple packets. Yur task is t make a `gd selectin fr the parameters f a dual leaky bucket fr the parameters. The selectin f parameters requires yu t tradeff multiple cnsideratins: 1. The maximum buffer size (and the maximum waiting time) shuld nt be t large; 2. The average rate allcatin shuld nt be much larger than the average rate f the VBR surce (t avid ver-allcatin f bandwidth); 3. The number f packets that can be transmitted at nce (this is determined by min(l 1, L 2 )), shuld be small. Transmit the vide surce frm the traffic generatr using the data in file mvietrace.data. Prepare a plt that shws the differences between the trace file and the utput file, as a functin f time. Prepare plts that depict the size f the leaky bucket L(t) and the backlg in the buffer X(t) as a functin f time. What percentage f time is there a backlg at the leaky buckets? What is the lngest backlg at the leaky buckets? Prepare a plt that shws the differences between the trace file and the utput file, as a functin f time. Als prvide a plt that shws the backlg in the buffer X(t) as a functin f time. Determine the lngest backlg X(t) and the maximum waiting time. ECE 1545 LAB 2 - PAGE 11 J. Liebeherr

12 Feedback Frm fr Lab 2 Cmplete this feedback frm at the cmpletin f the lab exercises and submit the frm when submitting yur lab reprt. The feedback is annymus. D nt put yur name n this frm and keep it separate frm yur lab reprt. Fr each exercise, please recrd the fllwing: Part 1. Prgramming with Datagram Sckets and with Files Part 2. Traffic generatrs Difficulty (-2,-1,0,1,2) -2 = t easy 0 = just fine 2 = t hard Interest Level (-2,-1,0,1,2) -2 = lw interest 0 = just fine 2 = high interest Time t cmplete (minutes) Part 3. Leaky Bucket Traffic Regulatr Part 4. Regulating a VBR vide surce with Multiple Leaky buckets Please answer the fllwing questins: What did yu like abut this lab? What did yu dislike abut this lab? Make a suggestin t imprve the lab. ECE 1545 LAB 2 - PAGE 12 J. Liebeherr

Traffic Shaping (Part 1)

Traffic Shaping (Part 1) Lab 2a Traffic Shaping (Part 1) Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic shaping, called a leaky bucket, that runs ver a real netwrk. The traffic fr testing the

More information

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02)

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02) Lab 3 Packet Scheduling Due Date: Lab reprt is due n Mar 6 (PRA 01) r Mar 7 (PRA 02) Teams: This lab may be cmpleted in teams f 2 students (Teams f three r mre are nt permitted. All members receive the

More information

This labs uses traffic traces from Lab 1 and traffic generator and sink components from Lab 2.

This labs uses traffic traces from Lab 1 and traffic generator and sink components from Lab 2. Lab 3 Packet Scheduling Purpse f this lab: Packet scheduling algrithms determine the rder f packet transmissin at the utput link f a packet switch. This lab includes experiments that exhibit prperties

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

Programming Project: Building a Web Server

Programming Project: Building a Web Server Prgramming Prject: Building a Web Server Submissin Instructin: Grup prject Submit yur cde thrugh Bb by Dec. 8, 2014 11:59 PM. Yu need t generate a simple index.html page displaying all yur grup members

More information

Lab 5 Sorting with Linked Lists

Lab 5 Sorting with Linked Lists UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces

More information

Project #1 - Fraction Calculator

Project #1 - Fraction Calculator AP Cmputer Science Liberty High Schl Prject #1 - Fractin Calculatr Students will implement a basic calculatr that handles fractins. 1. Required Behavir and Grading Scheme (100 pints ttal) Criteria Pints

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

Test Pilot User Guide

Test Pilot User Guide Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus

More information

COP2800 Homework #3 Assignment Spring 2013

COP2800 Homework #3 Assignment Spring 2013 YOUR NAME: DATE: LAST FOUR DIGITS OF YOUR UF-ID: Please Print Clearly (Blck Letters) YOUR PARTNER S NAME: DATE: LAST FOUR DIGITS OF PARTNER S UF-ID: Please Print Clearly Date Assigned: 15 February 2013

More information

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Municode Website Instructions

Municode Website Instructions Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater

More information

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template Netwrk Rail ARMS - Asbests Risk Management System Training Guide fr use f the Imprt Survey Template The ARMS Imprt Survey Template New Asbests Management Surveys and their Survey Detail reprts can be added

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital

More information

Practical Exercises in Computer Networks and Distributed Systems

Practical Exercises in Computer Networks and Distributed Systems (V..6, Nv 2) Practical Exercises in Cmputer Netwrks and Distributed Systems Stream Sckets and the Client/Server mdel (C language, W) 2-, Jsé María F Mrán This practical illustrates basic cncepts prtcl

More information

TUTORIAL --- Learning About Your efolio Space

TUTORIAL --- Learning About Your efolio Space TUTORIAL --- Learning Abut Yur efli Space Designed t Assist a First-Time User Available t All Overview Frm the mment yu lg in t yur just created myefli accunt, yu will find help ntes t guide yu in learning

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

MyUni Adding Content. Date: 29 May 2014 TRIM Reference: D2013/ Version: 1

MyUni Adding Content. Date: 29 May 2014 TRIM Reference: D2013/ Version: 1 Adding Cntent MyUni... 2 Cntent Areas... 2 Curse Design... 2 Sample Curse Design... 2 Build cntent by creating a flder... 3 Build cntent by creating an item... 4 Cpy r mve cntent in MyUni... 5 Manage files

More information

Transmission Control Protocol Introduction

Transmission Control Protocol Introduction Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable

More information

Integrating QuickBooks with TimePro

Integrating QuickBooks with TimePro Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Prf. Mntek Singh Spring 2019 Lab #7: A Basic Datapath; and a Sprite-Based Display Issued Fri 3/1/19; Due Mn 3/25/19

More information

TL 9000 Quality Management System. Measurements Handbook. SFQ Examples

TL 9000 Quality Management System. Measurements Handbook. SFQ Examples Quality Excellence fr Suppliers f Telecmmunicatins Frum (QuEST Frum) TL 9000 Quality Management System Measurements Handbk Cpyright QuEST Frum Sftware Fix Quality (SFQ) Examples 8.1 8.1.1 SFQ Example The

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.

More information

ECE 545 Project Deliverables

ECE 545 Project Deliverables Tp-level flder: _ Secnd-level flders: 1_assumptins 2_blck_diagrams 3_interface 4_ASM_charts 5_surce_cdes 6_verificatin 7_timing_analysis 8_results 9_benchmarking 10_bug_reprts

More information

RxAXIS Security Module 09/25/2013

RxAXIS Security Module 09/25/2013 RxAXIS Security Mdule 09/25/2013 Lessn Title Intrductin: Security Mdule In this tutrial we are ging t lk at the Security Maintenance Mdule f the RxAXIS system. When used, this system gives emplyees access

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 9 2016 v5.1 Answers 100% 1. Which tw characteristics are assciated with UDP sessins? (Chse tw.) Destinatin devices receive traffic with minimal delay. Transmitted data segments are tracked.

More information

(ii). o IP datagram packet is payload of a TCP segment o TCP segment is payload of an IP datagram. (iii).

(ii). o IP datagram packet is payload of a TCP segment o TCP segment is payload of an IP datagram. (iii). CSC 344: Cmputer Netwrks Review Questins 1. Select the crrect answer amng the chices by placing a checkmark next t the right statement. (i). ARP (Address Reslutin Prtcl) is used t btain IP address fr a

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

Populate and Extract Data from Your Database

Populate and Extract Data from Your Database Ppulate and Extract Data frm Yur Database 1. Overview In this lab, yu will: 1. Check/revise yur data mdel and/r marketing material (hme page cntent) frm last week's lab. Yu will wrk with tw classmates

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

Systems & Operating Systems

Systems & Operating Systems McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware

More information

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...

More information

Assignment #5: Rootkit. ECE 650 Fall 2018

Assignment #5: Rootkit. ECE 650 Fall 2018 General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

Microsoft Excel Extensions for Enterprise Architect

Microsoft Excel Extensions for Enterprise Architect Excel Extensins User Guide Micrsft Excel Extensins fr Enterprise Architect Micrsft Excel Extensins fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Installatin... 4 Verifying

More information

Uploading Files with Multiple Loans

Uploading Files with Multiple Loans Uplading Files with Multiple Lans Descriptin & Purpse Reprting Methds References Per the MHA Handbk, servicers are required t prvide peridic lan level data fr activity related t the Making Hme Affrdable

More information

New Product Release Package 8 XT[2] System and Software 19 Jan 2009

New Product Release Package 8 XT[2] System and Software 19 Jan 2009 New Prduct Release Package 8 XT[2] System and Sftware 19 Jan 2009 1.1 NEW OPERATIONAL FEATURES IN MULTICAM 8... 1 1.2 NEW HARDWARE FEATURES... 6 1.3 NEW SYSTEM FEATURES... 6 1.4 BUG FIXES UP TO 08.04.33...

More information

BMC Remedyforce Integration with Remote Support

BMC Remedyforce Integration with Remote Support BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective

More information

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools. Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are

More information

To start your custom application development, perform the steps below.

To start your custom application development, perform the steps below. Get Started T start yur custm applicatin develpment, perfrm the steps belw. 1. Sign up fr the kitewrks develper package. Clud Develper Package Develper Package 2. Sign in t kitewrks. Once yu have yur instance

More information

WordPress Overview for School Webmasters

WordPress Overview for School Webmasters WrdPress Overview fr Schl Webmasters Cntents 1. Rle f the Schl Webmaster... 2 2. Rle f the District Webmaster... 2 3. Schl Website Standards... 3 Header... 3 Fter... 3 Pages... 4 Sites... 5 4. Hw T...

More information

TRAINING GUIDE. Lucity Mobile

TRAINING GUIDE. Lucity Mobile TRAINING GUIDE The Lucity mbile app gives users the pwer f the Lucity tls while in the field. They can lkup asset infrmatin, review and create wrk rders, create inspectins, and many mre things. This manual

More information

istartsmart 3.5 Upgrade - Installation Instructions

istartsmart 3.5 Upgrade - Installation Instructions istartsmart 3.5 Upgrade - Installatin Instructins Minimum System Requirements: Hatch All-In-One istartsmart Cmputer Learning Center v1.0 r v1.1 Internet access - either hard-wired r wireless cnnectin is

More information

Extended Traceability Report for Enterprise Architect

Extended Traceability Report for Enterprise Architect Extended Traceability Reprt User Guide Extended Traceability Reprt fr Enterprise Architect Extended Traceability Reprt fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

Log shipping is a HA option. Log shipping ensures that log backups from Primary are

Log shipping is a HA option. Log shipping ensures that log backups from Primary are LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure

More information

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.

More information

Custodial Integrator. Release Notes. Version 3.11 (TLM)

Custodial Integrator. Release Notes. Version 3.11 (TLM) Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:

More information

Report Writing Guidelines Writing Support Services

Report Writing Guidelines Writing Support Services Reprt Writing Guidelines Writing Supprt Services Overview The guidelines presented here shuld give yu an idea f general cnventins fr writing frmal reprts. Hwever, yu shuld always cnsider yur particular

More information

STIDistrict AL Rollover Procedures

STIDistrict AL Rollover Procedures 2009-2010 STIDistrict AL Rllver Prcedures General Infrmatin abut STIDistrict Rllver IMPORTANT NOTE! Rllver shuld be perfrmed between June 25 and July 25 2010. During this perid, the STIState applicatin

More information

ONLINE GRANT APPLICATION INSTRUCTIONS

ONLINE GRANT APPLICATION INSTRUCTIONS Overview ONLINE GRANT APPLICATION INSTRUCTIONS This dcument is designed t prvide grant applicants with instructins fr use f the Fundant Grant Lifecycle Manager applicatin fr grants frm the Oberktter Fundatin.

More information

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first

More information

My Performance Management User Guide

My Performance Management User Guide My Perfrmance Management User Guide Overview The accesshr website huses perfrmance management. As an emplyee, yu have the ability t review and acknwledge perfrmance plans and perfrmance evaluatins that

More information

DS-5 Release Notes. (build 472 dated 2010/04/28 08:33:48 GMT)

DS-5 Release Notes. (build 472 dated 2010/04/28 08:33:48 GMT) DS-5 Release Ntes (build 472 dated 2010/04/28 08:33:48 GMT) Intrductin This is a trial release f Keil Develpment Studi 5 (DS-5). DS-5 cntains tls fr building and debugging C/C++ and ARM assembly language

More information

Dashboard Extension for Enterprise Architect

Dashboard Extension for Enterprise Architect Dashbard Extensin fr Enterprise Architect Dashbard Extensin fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins f the free versin f the extensin... 3 Example Dashbard

More information

Preparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop.

Preparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop. Lab 1 Name: Checked: (instructr r TA initials) Objectives: Learn abut jgrasp - the prgramming envirnment that we will be using (IDE) Cmpile and run a Java prgram Understand the relatinship between a Java

More information

Entering an NSERC CCV: Step by Step

Entering an NSERC CCV: Step by Step Entering an NSERC CCV: Step by Step - 2018 G t CCV Lgin Page Nte that usernames and passwrds frm ther NSERC sites wn t wrk n the CCV site. If this is yur first CCV, yu ll need t register: Click n Lgin,

More information

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55. Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Long Term Project WITS software modernization

Long Term Project WITS software modernization WITS Wrk Prgram This dcument gathers infrmatin n the WITS wrk prgram which is divided in shrt-term versus lng-term activities. Prjects' srting is nt intended t reflect pririties. Lng Term Prject WITS sftware

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website.

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website. Case Metrics Guide January 11, 2019 Versin 9.6.202.10 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Table f Cntents 1 Case Metrics 3 1.1 Case Metrics Cmpatibility Matrix 3 1.2

More information

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words,

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words, The transprt layer An intrductin t prcess t prcess cmmunicatin CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Transprt-layer services Prvides fr lgical cmmunicatin* between applicatin

More information

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0 Upgrading Kaltura MediaSpace TM Enterprise 1.0 t Kaltura MediaSpace TM Enterprise 2.0 Assumptins: The existing cde was checked ut f: svn+ssh://mediaspace@kelev.kaltura.cm/usr/lcal/kalsurce/prjects/m ediaspace/scial/branches/production/website/.

More information

PAGE NAMING STRATEGIES

PAGE NAMING STRATEGIES PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename

More information

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

Step- by- Step Instructions for Adding a HotPot Activity 1. Click the Turn editing on button on the course home page.

Step- by- Step Instructions for Adding a HotPot Activity 1. Click the Turn editing on button on the course home page. 1 Adding a Ht Ptates Activity Ht Ptates (versin 6.3 fr Windws, and versin 6.1 fr Java) has been a mainstay in develping interactive nline activities in language training fr mre than 10 years. The HtPt

More information

FIREWALL RULE SET OPTIMIZATION

FIREWALL RULE SET OPTIMIZATION Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue

More information

Telecommunication Protocols Laboratory Course

Telecommunication Protocols Laboratory Course Telecmmunicatin Prtcls Labratry Curse Lecture 2 March 11, 2004 http://www.ab.fi/~lpetre/teleprt/teleprt.html 1 Last time We examined sme key terms: prtcl, service, layer, netwrk architecture We examined

More information

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as: Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties

More information

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...

More information

Getting Started with the SDAccel Environment on Nimbix Cloud

Getting Started with the SDAccel Environment on Nimbix Cloud Getting Started with the SDAccel Envirnment n Nimbix Clud Revisin Histry The fllwing table shws the revisin histry fr this dcument. Date Versin Changes 09/17/2018 201809 Updated figures thrughut Updated

More information

What s New in the 2018 Edition. Release Notes

What s New in the 2018 Edition. Release Notes What s New in the 2018 Editin Release Ntes PROFITstar and PROFITability Release Ntes... 1 Imprtant Things t Knw Abut the 2018 Editin... 1 Sftware Versining Change... 1 User Accunt Lckuts... 1 Knwn Issues...

More information

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors Cnfiguring Database & SQL Query Mnitring With Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, Nvember, 2013 http://www.sentry-g.cm Be Practive, Nt Reactive! One f the best ways f ensuring a database is

More information

Getting Started with the Web Designer Suite

Getting Started with the Web Designer Suite Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite

More information

CRISP Directory Input File Requirement for MHBE Carriers

CRISP Directory Input File Requirement for MHBE Carriers CRISP Directry Input File Requirement fr MHBE Carriers March 22, 2013 (Versin 1.2) Table f Cntents Cntents 1. Overview.... 3 1.1 Scpe.... 3 1.2 Purpse.... 3 1.3 Prcess Overview.... 3 1.4 Prcess Flw....

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule

More information

Arius 3.0. Release Notes and Installation Instructions. Milliman, Inc Peachtree Road, NE Suite 1900 Atlanta, GA USA

Arius 3.0. Release Notes and Installation Instructions. Milliman, Inc Peachtree Road, NE Suite 1900 Atlanta, GA USA Release Ntes and Installatin Instructins Milliman, Inc. 3424 Peachtree Rad, NE Suite 1900 Atlanta, GA 30326 USA Tel +1 800 404 2276 Fax +1 404 237 6984 actuarialsftware.cm 1. Release ntes Release 3.0 adds

More information

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide HPE AppPulse Mbile Sftware Versin: 2.1 IT Operatins Management Integratin Guide Dcument Release Date: Nvember 2015 Cntents Overview: The IT Operatins Management Integratin 3 System Requirements 3 Hw t

More information

BMC Remedyforce Integration with Bomgar Remote Support

BMC Remedyforce Integration with Bomgar Remote Support BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their

More information

InformationNOW Letters

InformationNOW Letters InfrmatinNOW Letters Abut this Guide This Quick Reference Guide prvides an verview f letters in InfrmatinNOW. There are three types f letters: Student: May be used t create varius letters, frms, custmized

More information

Cntents 1 Intrductin Kit Cntents Requirements Installatin Gesture Sensr Kit Hardware and Jumper Settings De

Cntents 1 Intrductin Kit Cntents Requirements Installatin Gesture Sensr Kit Hardware and Jumper Settings De Thin Film Pyrelectric IR Gesture Sensr Demnstratr Kit Fr lw pwer, high perfrmance gesture cntrl User Guide Versin 1.0 Dcument Revisin 1.00 20 th February 2012 Cntents 1 Intrductin... 3 1.1 Kit Cntents...

More information

Aras Innovator Viewer Add-Ons

Aras Innovator Viewer Add-Ons Aras Innvatr Viewer Add-Ons Aras Innvatr 9.2 Dcument #: 9.2.02232009 Last Mdified: 4/1/2010 Aras Crpratin ARAS CORPORATION Cpyright 2010 All rights reserved Aras Crpratin 300 Brickstne Square Suite 904

More information

Enterprise Chat and Developer s Guide to Web Service APIs for Chat, Release 11.6(1)

Enterprise Chat and  Developer s Guide to Web Service APIs for Chat, Release 11.6(1) Enterprise Chat and Email Develper s Guide t Web Service APIs fr Chat, Release 11.6(1) Fr Unified Cntact Center Enterprise August 2017 Americas Headquarters Cisc Systems, Inc. 170 West Tasman Drive San

More information

CS1150 Principles of Computer Science Introduction (Part II)

CS1150 Principles of Computer Science Introduction (Part II) Principles f Cmputer Science Intrductin (Part II) Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Review Terminlgy Class } Every Java prgram must have at least

More information

Ascii Art Capstone project in C

Ascii Art Capstone project in C Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,

More information

Copyrights and Trademarks

Copyrights and Trademarks Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and

More information

Laboratory Exercise 3 Using the PIC18

Laboratory Exercise 3 Using the PIC18 Labratry Exercise 3 Using the PIC18 Until this pint, the user has prgrammed the FPGA Interface Bard using the FTDI and has nt been intrduced t the n bard PIC18F2550 micrcntrller. The purpse f this experiment

More information

Guidance for Submitting an application or Nomination in AAS Ishango Online System

Guidance for Submitting an application or Nomination in AAS Ishango Online System Guidance fr Submitting an applicatin r Nminatin in AAS Ishang Online System Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1 General

More information

InformationNOW Letters

InformationNOW Letters InfrmatinNOW Letters Abut this Guide This Quick Reference Guide prvides an verview f letters in InfrmatinNOW. There are three types f letters: Student: May be used t create varius letters, frms, custmized

More information