Whitepaper_AscenLink_CN_V1.1

合集下载

Ultimaker 3D 打印机设置指南说明书

Ultimaker 3D 打印机设置指南说明书

Ultimaker white paper Setup tosuccess:3D printing for manufacturers6 11 15IntroductionIn manufacturing, time is money. With a 3D printer, jigs, fixtures, and other tools can be produced on demand, on location. This means faster machine setup, less variation during assembly and fitting, and smoother production processes.What you will learnThis guide will help you achieve the benefits of 3D printing as quickly as possible. Using Ultimaker fused filament fabrication (FFF) printers as examples, we will look at:• How to set up your printer and optimize your workspace• How to implement a 3D printing workflow• How to make the most of 3D printing, with application ideasThis guide has been created by Ultimaker’s 3D printing experts. It features examples from real-life manufacturers, so you can learn from those already using 3D printing to reduce production time and costs.SetupTo start using your 3D printer as quickly as possible, you should consider a few things in advance. How is it installed? Where will it be located? Who will use it?UnboxingBefore your 3D printer arrives, visit for useful resources, or watch one of our videos to help you understand your printer’s features and guide you through setup (e.g. the features explained and unboxing videos for the Ultimaker S5).Each Ultimaker printer comes with a quick-start guide detailing how to unpack and install the printer, and start your first print. The first time you turn your printer on, it will ask you to complete simple setup actions: choose the language, install the build plate and printcores, load material, connect to a network (optional), and check for the latest firmware.LocationDesktop 3D printers are considered clean and safe for an office environment, depending on the material being printed, and are quiet enough to be placed on a desk. But if a single 3D printer serves multiple users, or you have a multi-3D printer setup, it may be best to create a central 3D printing area.As Ultimaker 3D printers do not exceed a maximum noise level of 50dB, noise isn’t usually a problem when running a single printer. But when running multiple 3D printers it is better to place them in a separate area to reduce overall noise levels.Ventilation should be considered when using materials with safety requirements, or which produce an unpleasant odor. You could also consider an air management accessory, such as the Ultimaker S5 Air Manager, which removes up to 95% of ultrafine particles (UFPs). Ultimaker provides safety data sheets for every Ultimaker material, so you can identify each materials’ safety requirements.OperationUltimaker 3D printers are designed to ensure reliability and maximum uptime, and are certified for safe unattended use. This means that you can leave your printers to run unattended, for maximum efficiency.Files can be uploaded to the 3D printer via USB or a network connection. With Ultimaker Connect and Ultimaker Cloud, you can start and manage print jobs remotely, access print analytics, and save your print settings to the cloud for remote access.PersonnelUltimaker 3D printers are designed to be simple to use, so you’re unlikely to need specialist training or a new team member to use them. You may, however, need a dedicated operator when running more than 10 printers.To optimize results, staff should be trained to design for additive manufacturing (DfAM).A good introduction to this concept is our free ‘How to design for FFF 3D printing’ guide. Your reseller may offer more in-depth training.Once your team and workspace are ready for 3D printing, it’s time to implement a workflow that streamlines production.WorkflowMaterial selectionMaterial selection is critical to a successful 3D print. Ultimaker 3D printers are optimizedto use the Ultimaker range of materials, but can also use third-party materials. Many material manufacturers provide print profiles for their filaments in Ultimaker Cura, for optimal print results.Here are a few of the most popular materials:• Tough PLA offers good impact resistance with the affordability, speed, and easy-printing of a PLA filament – a great choice for robust, just-in-time tooling • Nylon can be used to create strong parts that also offer abrasion resistance and low friction, perfect for quality assurance gauges that need to be used repeatedly• TPU 95A is a semi-flexible, rubber-like material and can be used to add protective surfaces to toolsMore information on choosing the right material can be found on the Ul timaker website3D modelingWhen designing for 3D printing, there are seven key considerations based on the geometry and features of your part:1. Nozzle size. Consider the diameter of the nozzle you use. The minimum wall thicknessof your part should be equal to or larger than your nozzle’s diameter2. Bottom layer. The bottom layer is the foundation of your 3D print. The larger its surfacearea, the better its adhesion to the printer build plate. Use chamfers insteadof fillets for edges that touch the build plate, as rounded corners are more effective than sharp ones3. Support material. Dual extrusion printers can print support material within overhangsor cavities to enable more complex geometries. This does, however, increase print and material costs. Limit the use of support material by creating overhangs with an angle greater than 45-degrees4. Small details. For designs featuring small details, use a smaller nozzle. Ensure thatsmall details have time to cool before the next layer is printed5. Tolerances. Plastic polymers shrink when heated and then cooled. This needs to beconsidered when designing parts with specific size requirements. With some materials (such as PLA), this is usually unnoticeable, but some filaments may require test printing 6. Fast printing. If print speed is important, you can reduce the thickness of the bottom orthe walls of your print, or choose a larger nozzle diameter7. Modularity. FFF 3D printers are only able to print parts that fit within their build volume,but this doesn’t make them unsuitable for producing large objects. Instead, use amodular design, consisting of multiple components, that can be printed more rapidlyPreparing your 3D model for printingOnce you have a 3D design file, you can transfer it to print preparation software that will turn it into instructions for your 3D printer.Ultimaker Cura is the most widely used 3D printing software in the world, with millions of users, and is free to download from our website.In Ultimaker Cura’s Recommended mode, printing is as easy as loading your model design, choosing key settings (layer height and infill density), and starting your print. You can also switch to Custom mode and tweak multiple settings for highly customized results.With Ultimaker Cura you benefit from the open and integrated Ultimaker ecosystem. Here you will find:• Preconfigured material profiles from leading filament producers, including BASF, Clariant, DSM, DuPont, and Owens Corning• ‘Print from CAD’ integration with free plugins for SolidWorks, Autodesk Inventor, and Siemens NXExtra print profiles and software integration can be downloaded in Ultimaker CuraPrinter operationWhen you have prepared your print in Ultimaker Cura, you can save it to USB orprint via a network.Ultimaker Connect is a network print management tool that enables you to queue multiple print jobs, monitor print progress, and track maintenance and printing analytics from your desktop.This is particularly effective if you have multiple 3D printers. You can create groups of printers for use by different teams, or with a frequently used configuration. Queued print jobs will start automatically when a printer with a matching configuration becomes available.With the Teams feature in Ultimaker Cloud, your 3D printers are accessible to all team members – regardless of where they are, and whether they are on the same network.Post-processingWhen your print finishes, wait for the build plate to cool, then remove the part. If it sticks, use a spatula to free it from the build plate.Often, the only post-processing needed is to remove the thin brim added to your print for optimal adhesion. This can be done by hand or with a small modeling or hobby knife.If you used water-soluble support material such as Ultimaker PVA, you will need to dissolve it before you can use your print. Manually detachable supports, such as Ultimaker Breakaway, can be removed with a pair of pliers.Once supports are removed, you can start additional post-processing options, such as:• Sanding, for a smooth surface finish• Polishing with a plastic polish compound• Gluing modular parts together using a modeling or industrial adhesive• Painting your print, using a primer and separate top coat• Screw threadingNot all post-processing techniques are suitable for all materials, so be sure to research and test your chosen method before trying it on your final part. Follow the manufacturer’s guidelines for any off-the-shelf products you use in post-processing.Removing PVA (left) and Breakaway (right) support materialApplication ideas3D printing gives manufacturers a powerful competitive edge – avoiding outsourcing and speeding up development cycles. With parts fabricated using Ultimaker’s fast and reliable 3D printers, you can ensure faster machine setup, less variation during assembly and fitting, secure part holding, and a smoother production process.But how do you ensure that you are maximizing your return on investment? This list of application ideas will help you make the most of your 3D printer.Jigs and fixturesEnsure efficient production by producing strong and affordable tools, on demand.3D printing is ideal for maintaining a just-in-time inventory and enables you to produce improved iterations within hours.Tip: Create more effective tooling with modular design. Need to prevent a tool from scratching surfaces? Add a layer of semi-flexible TPU 95A material. Does one part of thetool wear down? Design it as a replaceable segment.Quality assuranceTest the quality and accuracy of manufactured parts with precise gauges for the production line. You can also ensure consistency across facilities by sharing 3D models with colleagues. Tip: PLA is a great material for creating precise gauges, due to its dimensional accuracy.Tool organizersEnhance efficiency with 3D printed organizers for production stations. Enable manufacturing best practices such as ‘poka-yoke’ and Six Sigma with customizable workspaces.Tip: Network multiple Ultimaker printers with Ultimaker Connect, and rapidly deliver new organizers to the entire line, so you can evolve and stay lean without delaying production.Replacement partsIf a custom or obsolete part fails and halts production, waiting days or weeks for a new part isn’t an option. With a 3D printer you can quickly replace parts and keep the plant running. Tip: 3D models can also be created from 3D scans, so if a custom part breaks, you don’t even need CAD to create a new one. HP scanning tools integrate with Ultimaker Cura for a simplified scan-to-print workflow.External suppliersUltimaker 3D printers Cost$450 $12Time 35 days 4 daysPrior to in-house 3D printing, Volkswagen Autoeuropa used third-party suppliers to manufacture its custom tools and prototypes. This took several weeks, especially when multiple designs or assemblies were required. It also meant more paperwork and the adoption of a trial-and-error approach, slowing the tool manufacturing process at additional cost.With several Ultimaker 3D printers, Volkswagen Autoeuropa moved 93% of manufactured tool production in-house. Within two years, its assembly-tooling cost savings increased from 70% to 95%. Ultimaker enables Volkswagen Autoeuropa to test solutions without having to contact suppliers, reducing the time taken by an average of eight weeks. The figures below show the cost and time savings from 3D printing the production linetool for the positioning of a vehicle 2.0 TDI emblem.Case study: Volkswagen AutoeuropaBy using 3D printed tools, jigs, and fixtures, Volkswagen Autoeuropa has reduced cycle time operation, labor, and the need for reworking, while improving tool ergonomics. All at a tenth of the cost, saving an estimated $375,000 per year.Luís Páscoa, Pilot Plant Manager at Volkswagen Autoeuropa“The timings and costs to produce tools led us to a fast ROI, better product quality, and satisfaction throughout the entire process – from development stages to the final product. Our innovative 3D printed products are being used in several areas and are consideredbest practices within the Volkswagen Group.”Take the next step to success Build your 3D printing knowledge with industry leaders and experts, or requesta quote, on the Ultimaker website.About UltimakerSince 2011, Ultimaker has built an open and easy-to-use solution of 3D printers, software, and materials that enables professional designers and engineers to innovate every day. Today, Ultimaker is the market leader in desktop 3D printing. From offices in the Netherlands, New York, Boston, and Singapore – plus production facilities in Europe and the US –its global team of over 400 employees work together to accelerate the world’s transition to local, digital manufacturingGeneral inquiries:******************Find a local reseller:/resellers。

惠普 LaserJet 3050 3052 3055 3390 3392 多功能一体机 说明书

惠普 LaserJet 3050 3052 3055 3390 3392 多功能一体机 说明书

HP LaserJet 3050/3052/3055/3390/3392 all-in-one (HP LaserJet 3050/3052/3055/3390/ 3392 多功能一体机)用户指南版权与许可© 2006 版权所有 Hewlett-Packard Development Company, LP未经事先书面许可,严禁进行任何形式的复制、改编或翻译,除非版权法另有规定。

此处包含的信息如有更改,恕不另行通知。

HP 产品和服务的所有保修事项已在产品和服务所附带的保修声明中列出,此处内容不代表任何额外保修。

HP 公司对此处任何技术性或编辑性的错误或遗漏概不负责。

产品号 Q6500-90939Edition 1, 4/2006商标声明Adobe Photoshop® 和 PostScript® 是Adobe Systems Incorporated 的商标。

Corel® 是 Corel Corporation 或 Corel Corporation Limited 的商标或注册商标。

Linux 是 Linus Torvalds 在美国的注册商标。

Microsoft®、Windows®、Windows NT® 和Windows® XP 是 Microsoft Corporation 在美国的注册商标。

UNIX® 是 Open Group 的注册商标。

ENERGY STAR® 和 ENERGY STAR 徽标®是美国环保署在美国的注册标记。

目录1 多功能一体机基本信息多功能一体机配置 (2)HP LaserJet 3050 all-in-one (HP LaserJet 3050 多功能一体机) (2)HP LaserJet 3052/3055 all-in-one (HP LaserJet 3052/3055 多功能一体机) (3)HP LaserJet 3390/3392 all-in-one (HP LaserJet 3390/3392 多功能一体机) (4)多功能一体机功能 (5)多功能一体机部件 (7)HP LaserJet 3050 all-in-one (HP LaserJet 3050 多功能一体机) 部件 (7)正视图 (7)后视图 (7)接口 (8)控制面板 (8)HP LaserJet 3052/3055 all-in-one (HP LaserJet 3052/3055 多功能一体机) 部件 (9)正视图 (9)后视图 (9)接口 (10)控制面板 (10)HP LaserJet 3390/3392 all-in-one (HP LaserJet 3390/3392 多功能一体机) 部件 (11)正视图 (11)后视图 (11)接口 (12)控制面板 (12)2 软件软件安装 (14)典型安装 (14)最小安装 (14)打印机驱动程序 (15)支持的打印机驱动程序 (15)附加驱动程序 (15)选择正确的打印机驱动程序 (15)打印机驱动程序帮助 (Windows) (16)访问打印机驱动程序 (17)其它还有哪些软件可用? (17)Windows 软件 (18)用于 Windows 的软件组件 (18)HP ToolboxFX (18)嵌入式 Web 服务器 (EWS) (18)使用“添加或删除程序”卸载 (18)ZHCN iiiMacintosh 软件 (19)HP Director (HP 控制器) (19)Macintosh Configure Device (Macintosh 配置设备)(Mac OS X V10.3 与Mac OS X V10.4) (19)PDE(Mac OS X V10.3 与 Mac OS X V10.4) (20)安装 Macintosh 软件 (20)安装适用于直接连接 (USB) 的 Macintosh 打印系统软件 (20)安装用于网络的 Macintosh 打印系统软件 (20)从 Macintosh 操作系统中删除软件 (21)3 介质规格一般准则 (24)选择纸张和其它介质 (24)HP 介质 (24)避免使用的介质 (25)可能损坏多功能一体机的介质 (25)介质使用准则 (26)纸张 (26)标签 (26)标签结构 (27)投影胶片 (27)信封 (28)信封结构 (28)双面接缝信封 (28)带不干胶封条或封舌的信封 (29)信封存放 (29)卡片纸和重磅介质 (29)卡片纸结构 (29)卡片纸准则 (29)信头纸和预打印表单 (30)支持的介质重量和尺寸 (31)打印和存放环境 (34)4 使用多功能一体机将介质装入进纸盘 (36)装入要传真、复印或扫描的文档 (36)将纸张装入进纸盘,HP LaserJet 3050/3052/3055 all-in-one (HP LaserJet 3050/3052/3055 多功能一体机) (37)优先进纸槽 (37)250 张进纸盘(纸盘 1) (38)将纸张装入进纸盘,HP LaserJet 3390/3392 all-in-one (HP LaserJet 3390/3392 多功能一体机) (39)单张优先进纸槽(纸盘 1) (39)250 张进纸盘(纸盘 2 或可选纸盘 3) (39)控制打印作业 (40)打印设置优先级 (40)选择来源 (40)选择类型或尺寸 (40)使用多功能一体机控制面板 (41)iv ZHCN更改多功能一体机控制面板显示语言 (41)更改默认介质尺寸和类型 (41)更改默认介质尺寸 (41)更改默认介质类型 (42)更改默认纸盘配置 (42)使用多功能一体机音量控制键 (42)更改警报音量 (43)更改传真音量 (43)更改传真响铃音量 (44)更改多功能一体机控制面板按键音量。

BugFree的基本操作

BugFree的基本操作

BugFree操作手册目录B UG F REE操作手册 (1)一、登陆系统 (3)1、B UG F REE访问地址: (3)2、登录名及密码 (3)二、TESTCASE管理 (3)1、新建T EST C ASE (3)2、复制C ASE (3)3、修改C ASE (3)4、运行C ASE(见三、T EST R ESULT) (3)三、TESTRESULT (3)四、BUG管理 (4)1、新建B UG (4)2、复制B UG (4)3、修改B UG (4)4、解决B UG (4)5、关闭B UG (5)6、激活B UG (5)五、后台管理 (5)1、项目管理---新建项目 (5)2、项目管理---模块管理 (5)3、用户管理 (5)4、用户组管理 (6)5、用户日志 (6)六、统计报表 (6)七、查询 (7)1、设置查询条件 (7)2、快速筛选 (8)3、自定义显示字段 (8)4、查询结果排序 (8)一、登陆系统1、BugFree访问地址:http://132.40.1.130/bugfree/index.phphttp://132.40.1.130/bugfree/index.php(131服务器,但目前不能发送邮件)2、登录名及密码管理员的登录名及密码:admin/123456其他用户的登录名及密码的格式为:ITCode/ITCode(如:zhangbo/zhangbo;chenzc/chenzc;liyh1/liyh1)如不清楚自己的登录名及密码可用admin登陆系统查询。

二、TestCase管理1、新建TestCase测试人员登录系统后,在‘TestCase’标签页中点击【新建Case】按钮,便可弹出新建Case的页面。

其中页面中标黄的输入框为必填项。

A、Case标题:简明扼要的叙述此TestCase的描述,不能超过30字,如超过系统会截断多余内容B、项目名称/模块路径:每个Case都必须选择对应的项目、模块名称,以便于查询并统计此项目、模块的Case情况,如果每个模块指定了相应的负责人,选择了此模块后系统会自动将负责人(指派给)带出。

paperswithcode的使用方法

paperswithcode的使用方法

Paperswithcode是一个以人工智能和机器学习领域为主题的开放式上线评台,旨在帮助研究人员和开发者更好地探索、理解和利用学术论文和相关开源代码。

该评台汇集了大量与人工智能和机器学习相关的论文和代码,为用户提供了一个便捷的搜索和阅读评台,有助于推动科研工作的进展和成果的开发。

1. 注册与登入为了更好地使用Paperswithcode,用户首先需要注册一个账户并登入。

通过电流新箱或者第三方账号(如Google、GitHub等)注册均可。

注册成功后,用户就可以按照自己的兴趣和需求来进行个性化的设置、收藏和订阅,并获得相关推送和更新信息。

2. 论文搜索Paperswithcode提供了强大的论文搜索功能,用户可以根据关键词、作者、领域、年份等信息进行搜索。

在搜索结果页面,用户可以根据相关度、时间、引用次数等排序方式来筛选和浏览论文列表,还可以对搜索结果进行二次筛选和筛除,以便更准确地找到所需的论文。

3. 代码检索除了论文搜索功能外,Paperswithcode还提供了丰富的开源代码检索资源。

用户可以浏览到与特定论文相关的开源代码信息,也可以直接搜索和筛选相关的代码库。

在代码页面上,用户可以查看代码的开源位置区域、更新历史、许可证等详细信息,还可以直接在评台上进行代码的阅读、下载、复制等操作。

4. 论文阅读Paperswithcode为用户提供了上线阅读论文的功能,用户可以直接在评台上阅读到相关的论文内容。

在论文页面上,用户可以浏览到论文的详情信息、摘要、引用、作者等相关信息,并可以直接下载PDF文档进行阅读。

用户还可以进行评论、评分、收藏等操作,与其他用户进行交流和共享。

5. 代码复现Paperswithcode鼓励用户共享和复现相关的代码,用户可以通过推送代码到评台上,以便其他用户参考和使用。

通过共享和复现代码,不仅可以促进研究成果的交流和传播,还可以为其他研究人员提供更多的参考和帮助,推动科研工作的进展和创新。

aceEditor 1.0.1 用户指南说明书

aceEditor 1.0.1 用户指南说明书

Package‘aceEditor’October12,2022Title The'Ace'Editor as a HTML WidgetVersion1.0.1Description Wraps the'Ace'editor in a HTML widget.The'Ace'editor has support for many lan-guages.It can be opened in the viewer pane of'RStudio',and this provides a second source editor. License GPL-3Encoding UTF-8LazyData trueRoxygenNote7.1.1Imports htmltools,htmlwidgets(>=1.5.3),reactR,rstudioapi,toolsURL https:///stla/aceEditorBugReports https:///stla/aceEditor/issuesNeedsCompilation noAuthor Stéphane Laurent[aut,cre],James Hrisho[ctb,cph]('react-ace'library),James Long and contributors[ctb,cph]('Prettier'library),Zeb Zhao[ctb,cph]('indent.js'library),jQuery contributors[ctb,cph]('jQuery'library),Tristan Edwards[ctb,cph]('sweetalert2'library),Limon Monte[ctb,cph]('sweetalert2'library)Maintainer Stéphane Laurent<***********************>Repository CRANDate/Publication2021-03-0610:30:12UTCR topics documented:aceDiffEditor (2)aceEditor (3)getAceModes (5)getAceThemes (5)Index612aceDiffEditor aceDiffEditor Ace diff editorDescriptionOpen the Ace diff editor.UsageaceDiffEditor(file1,file2,mode=NULL,theme=NULL,fontSize=14,tabSize=NULL,autoCompletion=TRUE,snippets=FALSE,width=NULL,height=NULL,elementId=NULL)Argumentsfile1,file2paths tofilesmode the language of thefiles;if NULL,the mode is guessed from the extension of the firstfile;run getAceModes to get the list of available modes theme the theme of the editor;if NULL,the theme is set to the theme currently used in RStudio;run getAceThemes to get the list of available themes fontSize font sizetabSize number of spaces for the indentation(usually2or4);if NULL,it is set to the one used in RStudioautoCompletion logical,whether to enable the auto completionsnippets logical,whether to enable the snippets(for example,there is a snippet for switch in JavaScript)width,height dimensions;the default values are nice for usage in the RStudio viewer pane elementId a HTML id for the container;this is useless for common usageNoteThe diff editor does not correctly reacts when one resizes the RStudio viewer pane.You have to resize it before opening the diff editor.Examplesfile<-system.file("htmlwidgets","aceEditor.css",package="aceEditor")aceDiffEditor(file,file)aceEditor Ace editorDescriptionOpen the Ace editor.UsageaceEditor(contents,mode=NULL,theme=NULL,fontSize=14,tabSize=NULL,autoCompletion=TRUE,snippets=FALSE,width=NULL,height=NULL,elementId=NULL)Argumentscontents this can be the path to afile,NULL to open an empty editor,or missing to open thefile currently open in RStudiomode the language of the contents;if NULL and the contents are read from afile,the mode is guessed from the extension of thefile;run getAceModes to get the listof available modestheme the theme of the editor;if NULL,the theme is set to the theme currently used in RStudio;run getAceThemes to get the list of available themes fontSize font sizetabSize number of spaces for the indentation(usually2or4);if NULL,it is set to the one used in RStudioautoCompletion logical,whether to enable the auto completionsnippets logical,whether to enable the snippets(for example,there is a snippet for switch in JavaScript)width,height dimensions;the default values are nice for usage in the RStudio viewer pane elementId a HTML id for the container;this is useless for common usageExamples#in RStudio, aceEditor() opens the current file:aceEditor()#opens a new JavaScript file:aceEditor(NULL,mode="javascript")#opens an existing file:aceEditor(system.file("htmlwidgets","aceEditor.css",package="aceEditor"))#two editors side-by-side:library(aceEditor)library(htmltools)ed1<-aceEditor(width="100%",height="calc(100vh-10px)")ed2<-aceEditor(width="100%",height="calc(100vh-10px)")if(interactive()){browsable(div(div(ed1,style="position:fixed;left:1vw;right:51vw;"),div(ed2,style="position:fixed;left:51vw;right:1vw;")))}#two stacked editors:library(aceEditor)library(htmltools)ed1<-aceEditor(height="calc(50vh-10px)",width="100%")ed2<-aceEditor(height="calc(50vh-10px)",width="100%")if(interactive()){browsable(tagList(tags$style(HTML(".editor{","position:fixed;","left:1vw;","width:98vw;","}"getAceModes5 )),div(div(ed1,class="editor",style="bottom:calc(50vh-25px);"),div(ed2,class="editor",style="top:calc(50vh);"))))}getAceModes Ace modesDescriptionGet the available modes of the Ace editor.UsagegetAceModes()getAceThemes Ace themesDescriptionGet available themes of the Ace editor.UsagegetAceThemes()IndexaceDiffEditor,2aceEditor,3getAceModes,2,3,5getAceThemes,2,3,56。

HP Deskjet D2500 打印机系列介绍说明书

HP Deskjet D2500 打印机系列介绍说明书

Fact sheet Editorial contacts:Caitlin Roulston, HP+1 206 708 7651***********************Amy TokarskiPorter Novelli for HP+1 212 601 8471******************************Hewlett-Packard Company3000 Hanover StreetPalo Alto, CA 94304 HP Deskjet D2500 Printer Series The affordable HP Deskjet D2500 Printer Series is designed to deliver dependable and consistent prints, making it ideal for printing everyday projects including homework assignments and borderless photos. This reliable, energy-efficient printer series includes several convenient features such as a one-touch print-cancel button to prevent the printing of unwanted pages. Key features and benefits • Save space with the printer’s ultra-compact design and 80-sheet fold-up paper tray. • Get fast and efficient document printing with up to 26 pages per minute (ppm) in black and up to 20 ppm in color.(1) • Print laser-quality black text and vivid color graphics and photos, using HP Vivera inks. • Archived documents retain black text and color quality for decades without fading (2) • Enhance the quality of your documents by using papers with the ColorLok logo. • Print color images with enhanced detail, using ink technology that delivers an extremely small drop size. • Print what you see – HP Smart Web Printing automatically adjusts web pages to prevent cutoff edges while optimizing web printing by letting users easily combine portions of numerous web pages onto one page.(3) • Prevent the printing of unwanted pages while saving on ink and paper with the convenient, print-cancel button.• Print borderless photos on 4 x 6-inch to panorama-size photo paper.• Remove red-eye from images and easily print 4 x 6-inch photos in only a few steps with included HP Photosmart Essential software.(3)• Get three times more black printed pages and two times more color printed pages, using high-capacity ink cartridges.(4)• Easily identify and shop for Original HP cartridges using HP SureSupply.(5)• Each Original HP inkjet print cartridge is brand new for exceptional printingperformance.• HP recommends using general purpose papers with the ColorLok logo for deep, sharp blacks and brilliant colors for professional-looking documents and projects that can be handled confidently.•Trust HP – chosen by consumers as the world’s most reliable printer brand.(6)•Enjoy free, convenient recycling – ink cartridges returned through HP Planet Partners are recycled responsibly.(7)•Conserve resources with ENERGY STAR® compliance.Technical Specifications•Print speeds of up to 26 ppm black and up to 20 ppm color(1)•Photo-quality resolution up to 4,800-optimized dpi(8)•Dimensions/Weighto17.2 inches (w) x 12 inches (d) x 5.5 inches (h)o 6.2 lbs.•Support/Connectivityo USB Hi-speed 2.0o Windows Vista®; Windows XP Home (SP1), XP Pro, XP x64; Windows 2000 Professional (SP4); Mac OS X v 10.5 or later. Windows 2000 andWindows XP x64 are supported with a print driver only.•HP offers a comprehensive support package for the HP Deskjet D2500 Printer Series that includes a one-year limited hardware warranty backed by HP Customer Care, service and support; one-year technical phone support.Original HP Printing Supplies – pricing(9) and availability•HP 60 Black Inkjet Print Cartridge: $14.99•HP 60 Tri-color Inkjet Print Cartridge: $17.99•HP 60XL Black Inkjet Print Cartridge: $29.99•HP 60XL Tri-color Inkjet Print Cartridge: $34.99•HP Advanced Photo Paper (50 sheets, 8.5 x 11-inch): $19.99•HP Premium Presentation Paper (150 sheets, 8.5 x 11-inch): $12.99•General purpose papers with the ColorLok logo. Available in all regions.Pricing and availabilityEstimated U.S. street price of $49.(9)Expected to be available for purchase in spring 2008 in North America.(1) After first page; see /go/inkjetprinter for details.(2) Based on paper industry predictions for acid-free papers and Original HP inks; colorant stability data at room temperature based on similar systems tested as per ISO 11798 and ISO 18909.(3) Not compatible with Windows 2000 or Macintosh operating systems.(4) Compared to the HP 60 Black or Color Ink Cartridge. High-capacity HP ink cartridges not included; please purchase separately.(5) Program features and availability may vary by country. More information is available at/learn/suresupply.(6) Based on worldwide consumer research in 2006 by Milward Brown.(7) HP ink cartridge return and recycling is available in 42 countries and territories around the world, covering 88 percent of the addressable market; see /recycle for details.(8) Up to 4,800 x 1,200-optimized dpi color when printing from a computer on most HP Photo papers and 1,200-input dpi.(9) Estimated U.S. street prices. Actual prices may vary.Energy Star is a U.S. registered mark of the United States Environmental Protection Agency. Windows Vista is either a registered trademark or trademark of Microsoft Corp. in the United States and/or other countries.© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Theonly warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.2/2008。

Infoprint 250 導入と計画の手引き 第 7 章ホスト

Infoprint 250 導入と計画の手引き 第 7 章ホスト

SUBNETMASK
255.255.255.128
Type of service...............: TOS
*NORMAL
Maximum transmission unit.....: MTU
*LIND
Autostart.....................:
AUTOSTART
*YES
: xx.xxx.xxx.xxx
: xx.xxx.xxx.xxx
*
(
)
IEEE802.3
60 1500
: xxxx
48 Infoprint 250
31. AS/400
IP
MTU
1
1
IPDS TCP
CRTPSFCFG (V3R2)
WRKAFP2 (V3R1 & V3R6)
RMTLOCNAME RMTSYS
MODEL
0
Advanced function printing............:
AFP
*YES
AFP attachment........................:
AFPATTACH
*APPC
Online at IPL.........................:
ONLINE
FORMFEED
*CONT
Separator drawer......................:
SEPDRAWER
*FILE
Separator program.....................:
SEPPGM
*NONE
Library.............................:

AscenLink_产品介绍

AscenLink_产品介绍

9
双机备份 HA
基于连接端口的双机备份
– LAN连接端口备份 – DMZ连接端口备份
Internet
通过交换机可支持生成树部 署 避免设备单点故障发生
ISP1
ISP2
ISP3
Put Date Here
Confidential – Xtera Communications, Inc. Proprietary
昂贵的专线扩充成本(T3、T1、E1) 需要更有效率地管理多条链路带宽资源 提升企业效益
Put Date Here Confidential – Xtera Communications, Inc. Proprietary 2
单一链路的风险
router
X
T1 Leased Line
服务器端路由器故障 专线链路中断 ISP端的路由器故障 ISP内部路由机制失灵
Put Date Here
Confidential – Xtera Communications, Inc. Proprietary
6
自动路由Auto Routing
对外流量负载均衡
– 以连接(Connection)为基础的 负载均衡 – 依据流量、连接数、权重、最佳 路径
Internet
ISP 1 ISP 2
P2P & YouTube 10~50k VoIP && Video Conf. 300~500k VoIP Video Conf. 5~20k
P2P & YouTube 1~3M
ERP & Oracle 1~2M
Put Date Here
Confidential – Xtera Communications, Inc. Proprietary

WiFi_Offload_White_Paper[1]

WiFi_Offload_White_Paper[1]

Wi-Fi Offload WhitepaperVersion 1.0201019AprilCopyright NoticeCopyright © 2010 GSM AssociationAntitrust NoticeThe information contained herein is in full compliance with the GSM Association’s antitrust compliancepolicy.TABLE OF CONTENTS1 DOCUMENT PURPOSE (4)2 EXECUTIVE SUMMARY (4)3 INTRODUCTION (4)3.1 O VERVIEW (4)3.2 S COPE (5)3.3 D EFINITION OF TERMS (5)4 WHAT IS WI-FI OFFLOADING? (6)5 EXAMPLE USE CASES (7)5.1 U SE CASE USING D EVICE ACCESSING VIDEO –M OBILE TV AND/OR Y OU T UBE (7)5.2 U SE C ASE USING L APTOPS DOING BROWSING AND/OR Y OU T UBE (8)5.3 U SE C ASE USING MULTIPLE SSID S (9)6 EXISTING SOLUTIONS (10)6.1 S TANDARD B ODIES (10)6.1.1 IEEE (10)6.1.2 IETF (10)6.1.3 3GPP (10)6.2 I NDUSTRY B ODIES (11)6.2.1 Wi-Fi Alliance (11)6.2.2 Wireless Broadband Alliance (WBA) (11)6.3 E XISTING V ENDOR S OLUTIONS (11)7 TERMINAL & NETWORK REQUIREMENTS (12)7.1 O VERVIEW (12)7.1.1 Automatic provisioning (12)7.1.2 Manual provisioning (12)7.2 T ERMINALS (12)7.2.1 Smartphones (12)7.2.2 Netbooks and Dongles (13)7.3 N ETWORK R EQUIREMENTS: (14)7.4 N ETWORK S ELECTION: (14)8 QUALITY OF SERVICE (15)9 SECURITY AND FRAUD (15)9.1 W I-F I NETWORK ACCESS SECURITY (15)9.1.1 802.11i (15)9.1.2 Web Portals & EAP 802.1X (16)9.2 S ERVICES ACCESS SECURITY (16)10 RECOMMENDATIONS (18)10.1 A UTOMATIC C LIENTS (18)10.2 A UTHENTICATION WITH 802.1X AND EAP-SIM AND EAP-AKA (18)10.3 S ECURITY (19)10.4 Q UALITY OF S ERVICE (19)10.5 R OAMING AND H ANDOFF (19)10.6 P OWER O PTIMISATION (19)10.7 F OCUS ON S TANDARDS D EVELOPMENT O RGANISATIONS (19)ANNEX - TODAY’S WI-FI WORLD SOLUTIONS (20)A1 IEEE (20)A1.1 802.11-2007 (Was previously known as 802.11a/b/d/e/g/h/i/j) (20)A1.2 802.11n (20)A1.3 802.11u (20)A1.4 802.11r (20)A1.5 802.21 (20)A1.6 802.11e (20)A1.7 802.11i (20)A1.8 802.1X (20)A2 IETF (21)A2.1 RADIUS (21)A2.2 EAP (21)A2.3 Network Selection – RFC 5113 (21)A2.4 Mobility management protocols (21)A3 3GPP (22)A3.1 TS 23.402 I-WLAN: Architecture Enhancements for non-3GPP Access to 3GPP networks (23)A3.2 TS 23.302 Access to the 3GPP EPC via non-3GPP access networks (24)A3.3 TS 33.234 and 33.402 3GPP and WLAN Interworking Security (24)A3.4 TR 22.912 3GPP Study on Network Selection Requirements for non-3GPP Access 25A3.5 Service Continuity (25)A3.6 IP Flow Mobility, Local IP Access and Selected Internet IP Traffic Offload (27)A3.7 GAN – Generic Access Network (formerly known as UMA) (28)DOCUMENT MANAGEMENT (29)1 DOCUMENT PURPOSEThis document is in support of GSM Association’s Wi-Fi Offload initiative and is intended to facilitate development of an ecosystem for the availability of Wi-Fi Offload. This is to deliver services to customers whether they are in or out of 3GPP network coverage and also to help reduce the load on the 3GPP network.2 EXECUTIVE SUMMARYThis document explains the current state of Wi-Fi networks and the work being carried out in the relevant standards organisations and also other industry bodies who are working towards a variety of solutions and technologies needed to support Wi-Fi Offload. There are sample use cases covering how operators envisage possibly using Wi-Fi Offload in the future.The document also covers the terminal and network requirements and the important issues of security and quality of service needed to make Wi-Fi Offload available to 3GPP network operators.It also makes the following recommendations that the GSMA consider important to the development and deployment of Wi-Fi Offload that can be used by 3GPP network operators. These recommendations cover:•Automatic connection management client•Authentication with 802.1X and EAP-SIM and EAP-AKA•Roaming and Handoff• Security•Quality of Service• Power OptimisationAnd finally the GSMA will liaise as required with the Standards Development Organisations including 3GPP, IEEE, the Wireless Broadband Alliance, and the Wi-Fi Alliance as the main bodies to be considered for any development and standardisation related to 3GPP-Wi-Fi data offloading using protocols defined in the IETF. The GSMA will liaise with these bodies to ensure the development of a suitable Wi-Fi Offload eco-system as required by 3GPP network operators.3 INTRODUCTION3.1 OverviewThis whitepaper outlines the needs of the mobile community in how it would like to utilise Wi-Fi Offload to help promote and develop the usefulness and availability of its services. The paper gives some simple use cases as examples.The whitepaper gives an overview of the current Wi-Fi world; it then provides a high level outline of the expected network and terminal requirements. It considers some of the security and fraud risks before making some recommendations for the 3GPP and Wi-Fi network operators and associated vendor community to consider.3.2 ScopeThe primary objective of this document is to provide a guide to Wi-Fi Offload technology for data services by Mobile Network Operators. It covers deployment scenarios where Wi-Fi Offload is applicable.The focus of the document will be on aspects of the user terminal and infrastructure that are affected by support of Wi-Fi Offload.Out of scope of this whitepaper is the seamless handoff of voice communication (including service continuity across non-interconnected networks) and the business methods for subscribing or unsubscribing to a network;The initial intended audience for this document is the 3GPP and Wi-Fi network operators and associated vendor community.The scope of this work includes scenarios for using Wi-Fi Offload, industry perspective and SDO work, usage scenarios and network and terminal requirements.3.3 Definition of terms3GPP Third Generation Partnership ProjectAAA Authentication,Authorization and AccountingAGW AccessGatewayAES Advanced Encryption StandardANDSF Access Network Discovery and Selection FunctionBSS Basic Service SetCCMP Counter Mode with Cipher Block Chaining MessageAuthentication Code ProtocolCS CircuitSwitchedEAP ExtensibleAuthentication ProtocolEDCA EnhancedDistributed Channel AccessEPC Evolved Packet CoreePDG Evolved Packet Data GatewayEPS Evolved Packet SystemFMC FixedMobileConvergenceGAN GenericAccessNetworkGPRS General Packet Radio ServiceGSM Global System for MobileIEEE Institute of Electrical and Electronics EngineersIETF ICS Internet Engineering Task Force IMS Centralised ServicesIMS IP Multimedia SubsystemI-WLAN InterworkingWirelessLANLAN MAC MAPIM MMS Local Area NetworkMedia Access ControlMulti Access PDN connectivity and IP flow Mobility Multi Media ServicePLMN Public Land Mobile NetworkQoS Quality of ServiceRADIUS Remote Authentication Dial In User ServiceRSN Robust Security NetworkSDO StandardsDevelopmentOrganisations SIM Subscriber Identity ModuleSMS Short Message ServiceSSID Service Set IdentifierUE UserEquipmentUICC Universal Integrated Circuit cardUMA Unlicensed Mobile AccessUMTS Universal Mobile Telecommunications System USIM Universal Subscriber Identity ModuleWBA Wireless Broadband AllianceWi-Fi Wireless network using IEEE 802.11 standards WiMAX Worldwide Interoperability for Microwave Access WISP Wireless Internet Service ProviderWISPr Wireless Internet Service Provider roamingWLAN Wireless Local Area NetworkWPA2 WRIX Wi-Fi Protected Access Version 2 Wireless Roaming Intermediary eXchange4 WHAT IS WI-FI OFFLOADING?It would be advantageous for the mobile operator to be able to offer packet based services to its customers over more networks than just its own 3GPP network. This would potentially mean that in some cases there would be greater overall network capacity available than existing 3GPP networks alone can offer, or service where none currently exists due to the physical constraints of 3GPP networks, such as some in-building areas where external based cell signals cannot penetrate. Thus, any installed Wi-Fi hotspot could potentially be exploited by the 3GPP operator and its customers.Whilst there are other wireless technologies available, this whitepaper is focusing on the use of Wi-Fi as the deployment of public hotspots, and Wi-Fi in homes and enterprises is becoming extremely widespread.One of the important aspects in Wi-Fi Offload is that it must not degrade, rather preferably improve or enhance, the service to the end user, or provide service where it would otherwise not be available. Its use should be functionally invisible to the end user. The service delivery should be seamless and ideally require no end user interaction.Wi-Fi should be complementary to the excellent wide coverage area 3GPP networks already deliver today and LTE networks will deliver in the future.Currently, the level of functionality required by each operator may be different. Functionality may range from manual selection of a Wi-Fi access point for connection to the internet, to fully automatic selection and authentication with operator based network services. Our vision is that seamless (once set up) network selection and authentication will be a common goal. However, different operators will have different core network implementations and differing views on session continuity and service transparency. Such functionality may be achieved in a number of ways, some standardized and some proprietary. As 3GPP operators, there is a strong interest in the deployment of IMS-based core networks as well as a level of network and service transparency. This leads to a strong interest in the implementation of ICS and IP-based messaging (which must interwork with traditional SMS/MMS functionality), impacting both network and device elements though these aspects are beyond the normal sphere of Wi-Fi Offloading and will not be addressed in this paper.5 EXAMPLE USE CASES5.1 Use case using Device accessing video – Mobile TV and/or You TubeA 3GPP network customer has a Smartphone terminal that also has a Wi-Fi capability. They subscribe to mobile TV services as well as regularly watching music videos on You Tube. They are a regular traveller and are often in range of Wi-Fi hotspots in coffee shops, trains and airport terminals as well as hotels.Scenario:•On the bus from the hire car drop-off to the airport terminal the user begins to watch the news from an international news network on the 3GPP network.•As the user enters the airport terminal, his phone detects the presence of a Wi-Fi hotspot.•The device automatically connects and authenticates the user with the hotspot using the USIM/UICC.•Having already checked-in online the user goes straight to security and pockets the phone.•As soon as he is in the departure area, his device is back in his hands and he resumes watching the news programme, however this time the service is being provided via the Wi-Fi Hotspot in the departure area.•He enters a different terminal, where the Wi-Fi coverage is provided by a different Wi-Fi operator, with which a roaming agreement exists.•The device checks that the new provider is allowed, and checks operator policy on use of the roaming network. If there is no charging difference the operation continues on thevisited network. If charging is different due to the change, the user is notified and must approve roaming onto this new network.•The user arrives at his home airport on his delayed flight and catches a taxi home, his local football team is playing tonight and he will miss the match so he selects the TV application from his device’s home screen.•The user selects the football match from the options on his screen, his pre-existing TV subscription is activated.•The user begins to watch the match via the 3GPP network on his device in the taxi.•As the user enters his stone built cottage the coverage from the local 3GPP cell fails but he has a Wi-Fi network in his home.•The device automatically connects and authenticates the user with the residential hotspot using the USIM/UICC.•The user continues to watch the match on his device, and does not miss the first goal being scored by his team. This may be by session re-establishment and not by an uninterrupted handover, this would depend on the implementation deployed.5.2 Use Case using Laptops doing browsing and/or You TubeSimilar to 3GPP roaming, it is desired to be able to transparently connect to various Wi-Fi hotspots provided by different owners whilst being charged accordingly.The laptop is Wi-Fi enabled with 3GPP access provided via integrated hardware or a dongle. Scenario:• A 3GPP subscriber is working on a confidential document on her laptop computer at a local Starbucks café through her secured corporate VPN portal.•After completing her work, she needs to print out the document for her clients.•She heads off to a local Internet Café and rents a computer workstation.•She reaches into her briefcase and looks for her flash drive to transfer the document.•Unfortunately, she remembers that she left her flash drive back at the home office.•After some quick thinking she reaches for her laptop so that she can email the document to her personal email account and then retrieve it from Café’s PC.•She starts the Network Client on her laptop and notices that there is a Wi-Fi hotspot operated by the store.•Instead of connecting to a 3GPP network, the client software automatically authenticates to the Wi-Fi network through pre-loaded credentials, or by using the dongle’s USIM/UICC, and the interoperator roaming agreements.•She emails the document to herself, accesses it on the Cafe’s computer, and prints it out; ready to head to her client’s meeting.5.3 Use Case using multiple SSIDsA network service provider would like to use custom configured access points with multiple SSIDs to offer WLAN connectivity to casual users who are not the owners or normally resident at the premises where the access point is installed. This may support a commercial relationship between the 3GPP operator and the WLAN provider. The casual users’ devices would have to be pre-configured to authenticate to the SSIDs in the access point.Scenario:• A customer has a Wi-Fi capable device which has been pre-configured with the SSID(s) allocated by the 3GPP network provider for use in this service. As part of the commercial offering the customer may also be required to advertise the same SSID’s on their home Wi-Fi Router.•The customer receives a call from a colleague who needs a file to be sent to them urgently. There is no easily accessible and/or obviously Wi-Fi capable establishment(coffee shop, hotel etc) in the near locale and macro 3GPP network coverage is poor.•The customer knows they are a subscriber to this Wi-Fi service and activates the Wi-Fi on their device. Luckily – there is a Wi-Fi Router advertising the pre-configured SSID of the service.•The device authenticates on the Wi-Fi router and he is able to establish a connection and send the file.Figure 1:Network configuration for multiple pre-configured SSID’s6 EXISTING SOLUTIONS6.1 Standard BodiesThere are three main standards bodies involved in Wi-Fi and Wi-Fi Offload. They are the IEEE, 3GPP and IETF.6.1.1 IEEEThe IEEE are responsible for the standardisation of Wi-Fi access and the various improvements and additions that have been carried out. The focus of this paper is the 802.11 and 802.1 suite of standards.6.1.2 IETFThe IETF have standardised many of the protocols used in Wi-Fi including RADIUS, security methods and also mobility mechanisms.6.1.3 3GPP3GPP have defined systems and protocols for interworking 3GPP networks to non-3GPP networks such as Wi-Fi. This includes solutions such as I-WLAN.A summary of the details of the most relevant work of these bodies is included in the annex.6.2 Industry Bodies6.2.1 Wi-Fi AllianceThe Wi-Fi Alliance has published “Best Current Practices for Wireless Internet Service Provider Roaming”1. The document does not specify a standard of any kind, but does rely on the operational application of standards-based protocols and methodologies.WISPr was chartered by the Wi-Fi Alliance to describe the recommended operational practices, technical architecture, and AAA framework needed to enable subscriber roaming among Wi-Fi based WISP’s. This roaming framework allows Wi-Fi compliant devices to roam into Wi-Fi enabled hotspots for public access and services. The user can be authenticated, using RADIUS, and billed (if appropriate) for service by their Home Entity (such as another service provider or corporation).The WFA also certifies devices using Wi-Fi Protected Setup. WPS enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to automatically configure new wireless networks, add new devices and enable security. This is worth considering as a method to enhance the security of home networks and helping add new devices to the home network.In February 2010 a new Operators Members Interest Meeting was created. This is to offer a voice for operators and to structure their requirements and input to the Wi-Fi community.6.2.2 Wireless Broadband Alliance (WBA)Founded in 2003 by leading telecom operators, the WBA goal is to drive wireless broadband adoption globally by developing common commercial and technical frameworks for interoperability across networks, technologies and devices. Collectively, the WBA members operate around 90,000 Wi-Fi hotspots worldwide with more than 230 million subscribers across Europe & Middle East, Asia Pacific and the Americas.The WBA has implemented commercial Wi-Fi roaming globally using WBA WRIX (Wireless Roaming Intermediary eXchange); The WBA WRIX makes it easier to implement roaming between operators. The WBA collaborates with other industry forums to further enhance WRIX and help harmonize wireless broadband roaming standards.In April 2010, the WBA released WISPr 2.0. WISPr 2.0 is designed for “non” IEEE 802.1X networks as it requires IP communication with the Access Gateway prior to the authentication of the user. WISPr offers authentication services based on layer 3 networking. WISPr 2.0 is designed as a front end to authentication protocols such as Radius, Diameter and the WBA WRIX specification.6.3 Existing Vendor SolutionsThere are several vendors selling Wi-Fi equipment to build networks. Many of these vendors also offer solutions that allow a degree of 3GPP and Wi-Fi internetworking. However often these solutions are proprietary and require additional network elements as well as unique clients1 Best Current Practices for Wireless Internet Service Provider Roaming, Version 1.0, February 2003, Wi-Fi Allianceon the devices. These solutions greatly reduce the opportunity for the user to be able to roam freely and access the services they require where and when they want as they do not offer a standardised solution to allow roaming between networks owned by other operators. Such solutions, or part solutions, are being offered by companies like Attila, Cisco and Ruckus.7 TERMINAL & NETWORK REQUIREMENTS7.1 OverviewIt is important that access points and end user devices support the necessary standard amendments to handle the requirements on data throughput, interference handling, security, authentication and interworking with 3GPP technologies.Apart from that, there exist today innovative technology solutions in the market which can leverage mesh networking principles to solve the backhaul challenge, or smart antenna technologies which can help to deal with interference or to enhance coverage.Today, Wi-Fi Offload is used by some operators to enhance the customer experience with their Smart phones. The current methods include:7.1.1 Automatic provisioningThe mobile device is already provisioned with the SSIDs (and any security keys if required) of the operator’s preferred Wi-Fi providers. On first access to a Wi-Fi provider preferred hotspot, the user may have to enter identification (e.g. the mobile phone number of the device, or PIN number from a text message sent to phone) to verify that he is entitled to the agreed usage tariff (e.g. free use). After the initial access by the device, all future Wi-Fi hotspot access is automatic.7.1.2 Manual provisioningWhere there is no automatic provisioning, the user has to search for and select a Wi-Fi network and enter any security keys required to get access. The facility often exists to store profiles so that every time the device is in range of an existing Wi-Fi hotspot setup, the connection is automatic.7.2 Terminals7.2.1 SmartphonesSmart phones should implement functionality that performs automatic network detection and selection. The device should automatically scan for the appropriate SSID and connect in accordance with operator policy/preference in combination with user defined networks and preferences.The desired functions and features include:•Connection management client, this may be part of the operating system or an additional application.•Downloadable SSID list with operator specified priority and credentials (if not SIM/UICC based). Operator specification of auto authentication parameters, preferred network list, network/SSID blacklist, roaming policies and credentials•Ability for the user to define SSID and credentials for additional networks•Ability to automatically initiate a VPN for specified networks•Respond to Radius request with credentials• Enable 802.1X•Enable EAP-SIM or EAP-AKA•Support of 802.11i/WPA2•Implement power saving features•Support of WPS, including push button configuration•If service continuity is desired, support of the desired scenario highlighted in the annex section A3.5, should be provided along with the appropriate level of Wi-Fi and 3GPP network interconnection. Specifically, the device should include a SIP based IMS client, and possibly support for ICS.7.2.2 Netbooks and DonglesLaptops and netbooks may either have built in 3GPP connectivity or may use dongles to provide connectivity. Nearly all laptops and netbooks are now built including Wi-Fi devices as standard equipment.The desired functions and features include:• Connection management software•Downloadable SSID list with operator specified priority and credentials (if not SIM/UICC based). Operator specification of auto authentication parameters, preferred network list, network/SSID blacklist, roaming policies and credentials•Ability for user to define SSID and credentials for additional networks•Ability to automatically initiate a VPN for specified networks•Automatically scan for SSID and connect in accordance with operator policy/preference in combination with user defined networks and preferences•Respond to Radius request with credentials• Enable 802.1X•Enable EAP-SIM or EAP-AKA, if there is built in 3GPP connectivity or using a 3GPP dongle•Support of 802.11i/WPA2•Implement power saving features•Support of WPS, including push button configuration•If service continuity is desired, support of the desired scenario highlighted in the annex section A3.5, should be provided along with the appropriate level of Wi-Fi and 3GPPnetwork interconnection. Specifically, the device should include a SIP based IMS client, and possibly support for ICS.7.3 Network Requirements:The following is a list of the expected requirements for the networks to support Wi-Fi Offload.•Support of 802.1X•Support of 802.11i/WPA2•EAP-SIM or EAP-AKA enabled•Home access points should support WPS, including push button configuration•Interconnection with 3GPP network operator via I-WLAN or via Internet•Automatic and seamless handoff may become a requirement. Out of scope for this paper.•Collection of billing data and ability to properly format and communicate to the mobile operator.•If service continuity is desired, support of the desired scenario highlighted in section11.3.5 (annex) should be provided along with the appropriate level of Wi-Fi and 3GPPnetwork interconnection.•If session continuity is required then the network must implement such capability based on 3GPP or proprietary solutions.•As standards evolve, support for IP Flow Mobility, Local IP Access and Selected Internet IP Traffic Offload should be considered.7.4 Network Selection:Network selection should provide the following capabilities:•For the device to select the network based on the capability of the network such as QoS, connectivity, signal strength etc.•For the device to detect and switch to the preferred network (when not in an active communication state with the current network).•The Home Operator to be able to configure the list of the preferred Wi-Fi access networks that can be used for automatic selection.•The user to be able to configure the list of the preferred Wi-Fi access networks that can be used for automatic selection.•The user to be able to select manually from the available Wi-Fi accesses available. Network selection mechanisms have been specified by 3GPP and these include network selection for I-WLAN and ANDSF. For operators which have both WiFi and 3GPP infrastructures, it is possible to use ANDSF. This is a layer 3 protocol specified by 3GPP. Itenables mobile devices located in areas of two or more different types of access connectivity to select the most appropriate access network by exchanging information between the mobile device and a server. This is covered in more detail in the Annex A3.1.1. There is a need for further investigation of the ANDSF functions and whether they meet the requirements for network selectionNetwork selection requirements for I-WLAN is specified by 3GPP in specification TS22.2348 QUALITY OF SERVICEMultimedia applications such as VoIP, VoD and Internet Radio have different traffic characteristics and quality of service QoS requirements as compared to traditional internet data traffic. For example VoD requires high bandwidth while VoIP is bursty in nature and requires low delay and jitter. As a result, to ensure a high level of user experience, these traffic types need to be treated differently from the traditional internet traffic. Further, the available bandwidth in the Wi-Fi based WLAN is also limited. Thus it is very essential to manage the access to the Wi-Fi based WLAN resources and prioritise the traffic to ensure appropriate QoS to different kinds of traffic.The IEEE 802.11e standard addresses the link level (between a station and an access point) QoS on Wi-Fi thorough enhancement to the MAC (Media Access Control) layer protocol. The standard provides two approaches - Prioritisation of Traffic and Parameterisation of Traffic. In the traffic prioritization approach, the traffic is classified into one of the four categories - Voice, Video, Best Effort and Background. The transmission is done using Enhanced Distributed Channel Access (EDCA) mechanism.As the QoS capabilities of the 802.11e standard provide QoS on a per-link basis, it can extend existing end-to-end QoS frameworks across Wi-Fi access to end terminals. In general, there are two approaches for providing end-to-end QoS - one using differentiated services and the other based on resource reservation.9 SECURITY AND FRAUDTwo sets of security requirements need to be addressed:•Wi-Fi network access security: This concerns authentication of the customer towards the Wi-Fi network, of the network towards the customer device, and the protection of the Wi-Fi access link.•Services access security: This concerns authentication of the customer towards operator or third party services when connected via Wi-Fi (or other non-cellular access networks), and the protection of this link.In order to provide basic offload of Internet access, Wi-Fi network access security is needed to protect against theft of service and other attacks. However, for the offload operator or third party provided services that are normally secured based on 3GPP network techniques (e.g. music portal, application store, etc.), additional service access security is needed.9.1 Wi-Fi network access security9.1.1 802.11i。

SCOS V6.0 white paper_v1.1(JOF)

SCOS V6.0 white paper_v1.1(JOF)

中标麒麟安全云操作系统V6.0技术白皮书中标软件有限公司目录1 引言11.1 术语 (1)1.2 本文缩略语 (2)1.3 目标读者 (3)2 产品概述42.1 中标麒麟安全云管理平台 (4)2.1.1 功能特点 (4)2.1.2 技术路线和体系架构 (5)2.2 中标麒麟安全云虚拟化服务器 (6)2.2.1 技术路线与功能特点 (6)2.2.2 存储部署方式 (7)2.3 中标麒麟安全云虚拟桌面套件 (8)2.3.1 中标麒麟安全云虚拟桌面客户端 (8)2.3.2 中标麒麟安全云USB共享模块 (9)2.3.3 虚拟桌面应用的体系架构图 (10)3 中标麒麟安全云管理平台具体功能特性 (11)3.1 物理资源管理 (11)3.1.1 主机资源 (11)3.1.2 映像资源 (12)3.1.3 网络资源 (13)3.2 虚拟机全生命周期管理 (13)3.2.1 虚拟机基本管理 (13)3.2.2 虚拟机快照管理 (13)3.2.3 虚拟机状态监控 (13)3.3 安全功能 (14)3.3.1 基于组的层状用户管理 (14)3.3.2 基于组角色和子角色的权限管理 (14)3.3.3 基于组的资源管理 (15)3.3.4 全局标识与认证机制 (16)3.3.5 配置信息备份恢复管理 (16)中标麒麟安全云操作系统V6.0技术白皮书3.3.6 日志与审计功能 (17)3.3.7 密码管理 (17)3.4 监控与统计 (18)3.4.1 实时监控 (18)3.4.2 统计报表 (18)3.4.3 网络拓扑 (19)3.5 其他特性 (19)3.5.1 负载均衡 (19)3.5.2 系统预警 (19)3.5.3 软件下载 (19)中标麒麟安全云操作系统V6.0技术白皮书1引言1.1术语中标麒麟安全云操作系统(NeoKylin Security Cloud Operating System,简称NeoKylin sCloud OS)中标麒麟安全云操作系统是中标软件有限公司(以下简称“中标软件”)基于虚拟化技术、虚拟桌面协议、分布式文件系统以及J2EE体系架构,借助公司在安全操作系统领域的研发经验,为云计算环境构建的安全可靠云基础设施平台产品。

HP LaserJet Enterprise M406dn产品说明书

HP LaserJet Enterprise M406dn产品说明书

Data sheetHP LaserJet Enterprise M406dnHP’s entry-level Enterprise-class printer with speeds up to 40 ppm and strongest security.HP’s entry-level Enterprise-class printer with speeds up to 42 ppm and strongest security.Easy to use, simple to manageHP FutureSmart firmware can be updated with the latest features to optimize your investment for years to come.Centralize control of your printing environment with HP Web Jetadmin—and help build business efficiency.Easily enable workflows across your fleet with a consistent user experience and intuitive, tablet-like icons.Set up this printer fast, and easily manage device settings to help increase efficiency.The world’s most secure printingThe operating code (BIOS) is automatically checked during startup and repairs itself if compromised.Common Criteria certified to continually monitor memory activity to detect and stop attacks in real time.Firmware is automatically checked during startup to determine if it’s authentic code—digitally signed by HP.The printer’s outgoing network connections are inspected to stop suspicious requests and thwart malware.Enhanced productivity to empower work teamsGive workgroups what they need to succeed with hundreds of HP and third-party solutions and card reader support.Help ensure the security of confidential information with PIN/Pull printing to retrieve print jobs.Stay connected with an optional accessory for wireless, Bluetooth® Low Energy, and NFC touch-to-print.Print directly from the 2.7-inch (6.9 cm) color display.Sustainability is smart businessHelp save paper right out of the box. Two-sided (duplex) printing is set at default for automatic savings.Help reduce wasted paper and toner by only printing jobs that are truly needed, using HP Roam for Business.Save energy without sacrificing performance—this printer is ENERGY STAR® and Blue Angel certified.Leverage HP End of Life Solutions to ensure your Hardware and Supplies are sustainably retired.This printer is intended to work only with cartridges that have a new or reused HP chip, and it uses dynamic security measures to block cartridges using a non-HP chip. Periodic firmware updates will maintain the effectiveness of these measures and block cartridges that previously worked. A reused HP chip enables the use of reused, remanufactured, and refilled cartridges. More at: Learn more at /learn/ds91912314678Technical specificationsProduct name HP LaserJet Enterprise M406dn Product number3PZ15AFunctions PrintPrintDuplex printing Automatic (default)Print speed Black (A4, normal) Up to 38 ppm (default); Up to 40 ppm (HP high speed mode); Black (A4, duplex): Up to 31 ipm; Black (letter, normal): Up to 40 ppm (default); Up to 42 ppm (HP high speed mode); Black (letter, duplex): Up to 33 ipm;First page out Black (A4, ready): As fast as 6.5 sec; Black (A4, sleep): As fast as 8.8 secPrint technology LaserPrint resolution Black (best): Up to 1,200 x 1,200 dpi; Black (normal): Up to 600 x 600 dpiPrint resolution technology300 dpi, 600 dpi, HP FastRes 1200, HP ProRes 1200Print cartridges number 1 (black)Standard print languages HP PCL 6, HP PCL 5, HP PostScript level 3 emulation, native PDF printing (v 1.7), Apple AirPrint™Printer management HP Printer Assistant, HP Web JetAdmin Software, HP JetAdvantage Security Manager, HP SNMP Proxy Agent (Part of HP WebJetAdmin), HP WS Pro Proxy Agent (Part of HP WebJetAdmin), Printer Administrator Resource Kit for HP Universal Print Driver (Driver Configuration Utility - Driver Deployment Utility - Managed Printing Administrator)ConnectivityStandard connectivity 1 Hi-Speed USB 2.0 Host; 1 Hi-Speed USB 2.0 Device; 1 Gigabit Ethernet 10/100/1000T networkMobile printing capability HP ePrint; Apple AirPrint™; NFC touch-to-print (optional); Mopria™ Certified; Wi-Fi® Direct printing; ROAM capable for easy printing; PrinterOn PrintWireless capability Optional, enabled with purchase of a wireless hardware accessory. Dual band Wireless Station and Wi-Fi Direct functionality available with HP Jetdirect 3100w BLE/NFC/Wireless Accessory 3JN69ANetwork capabilities Yes, via HP Jetdirect Ethernet embedded print server (standard) which supports: 10Base-T, 100Base-Tx, 1000Base-T; 802.3az (EEE) support on Fast Ethernet and Gig Links; IPsec (standard); 802.11a/b/g/n wireless networking (Optional); second Ethernet port (Optional).Memory Standard: 1 GB; Maximum: 1 GBStorage capacity 4 GB eMMCHard disk Not Applicable to this productProcessor speed800 MHzWarm-up time176 secPaper handlingDuty cycle (monthly)Duty cycle (monthly, A4): Up to 100,000 pages; Recommended monthly page volume: 900 to 4,800 pagesInput capacity100-sheet tray 1, 250-sheet input tray 2; Optional third 550-sheet trayOutput capacity150-sheet output binNumber of paper trays Standard: 2; Maximum: 3Media types Paper (plain, EcoEFFICIENT, light, heavy, bond, colored, letterhead, preprinted, prepunched, recycled, rough); envelopes; labels Media weight Tray 1: 60 to 175 g/m²; tray 2, optional 550-sheet tray 3: 60 to 120 g/m²Media size Custom (metric): Tray 1: 76 x 127 to 216 x 356 mm; Tray 2: 105 x 148 to 216 x 356 mm; Optional Tray: 105 x 148 to 216 x 356 mm; Supported (metric): Tray 1: A4, RA4, A5, B5 (JIS), B6 (JIS), 10 x 15 cm, A6, 16K, envelopes (B5, C5 ISO, C6, DL ISO); Custom: 76 x 127 to 216 x 356 mm; Tray 2: A4; RA4; A5; B5 (JIS); B6 (JIS); A6; 16K; 105 x 148 to 216 x 356 mm; Optional Tray 3: A4; RA4; A5; B5 (JIS); B6 (JIS); A6; 16K; 105 x 148 to 216 x 356 mmPrinter dimensions (W x D x H)381 x 357 x 220 mmPrinter weight~8.5 kgSoftware included No software solutions are included in the Box only on or What's in the box HP LaserJet Enterprise M406dn printer; HP Black Original LaserJet Toner Cartridge (~3,000 pages); Getting started Guide; 1 Power cord Warranty One-year, On-site Repair 24-hour / 7 day a week phone supportSystemsCompatible operating systems Windows Client OS (32/64 bit)-, Win10, Win8.1, Win7 Ultimate, Mobile OS-, iOS, Android, Mac-, Apple® MacOS High Sierra v10.13, Apple® MacOS Mojave v10.14, Apple® MacOS Catalina v10.15, Discrete PCL6 Printer Driver-, For more information on the supported operating systems go to , Enter your product name and search, Click on User Guides and enter your product name and search for User Guide, Search for your (Product Name) - User Guide, Search for the Supported Operating Systems section, UPD PCL6 / PS Printer Drivers, Supported Operating systems, For more information on the supported operating systems see /go/updMinimum system requirements Windows: 2 GB available hard disk space Internet connection or USB port Internet browser. For additional OS hardware requirements see ; Mac: 2 GB available hard drive space Internet connection or USB port Internet browser. For additional OS hardware requirements see Security management Identity management: Kerberos authentication, LDAP authentication, 1000 user PIN codes, Optional HP and 3rd party advanced authentication solutions (e.g., badge readers); Network:IPsec/firewall with Certificate, Pre-shared Key, Kerberos authentication, Supports WJA-10 IPsec configuration Plug-in, 802.1X authentication (EAP-PEAP; EAP-TLS), SNMPv3, HTTPS, Certificates, Access Control List; Data: Storage Encryption, Encrypted PDF & Email (uses FIPS 140 validated cryptographic libraries from Microsoft), SSL/TLS (HTTPS), Encrypted Credentials; Device: HP Sure Start Secure Boot (BIOS Integrity Checking with self-healing capability), Intrusion Detection (Constant in-device monitoring for attacks), Whitelisting (loads only known good code), Embedded Trusted Platform Module, HP Connection Inspector, Security lock slot, USB port disablement; Security management: Compatible with HP JetAdvantage Security Manager, Device Security Syslog Messages processed and accessible in Arcsight and Splunk SIEMsFonts and typefaces 105 internal TrueType fonts scalable in HP PCL, 92 internal scalable fonts in HP PostScript Level 3 emulation (Euro symbol built-in); 1 internal Unicode Fonts (Andale Mono World Type); 2 Internal Windows Vista 8 Fonts (Calibri, Cambria);additional font solutions available via third-party flash memory cards; HP LaserJet Fonts and IPDS Emulation available at/go/laserjetfontsControl panel 2.7" Color Non-Touch Control Panel with 24 Keypad Display 2.658" diagonal Color TFT-LCD back-lit (960 (H) x 240 (V))Power Requirements: 110-volt input voltage: 110 to 127 VAC (+/- 10%), 60 Hz (+/- 3 Hz); 220-volt input voltage: 220 to 240 VAC (+/- 10%), 50/60Hz (+/- 3 Hz) (Not dual voltage, power supply varies by part number with # Option code identifier); Consumption: 531 watts (active printing), 8.1 watts (ready), 1.2 watts (sleep), 0.07 watts (auto-off/manual-on), 0.07 watts (manual off); Typical Electricity Consumption (TEC): 1.189 kWh/Week (Blue Angel); 0.462 kWh/Week (Energy Star 3.0); Power supply type: Internal (built-in) Power SupplyOperating environment Operating temperature range: 15 to 32.5°C; Recommended operating temperature range: 15 to 27°C Operating humidity range: 10 to 90% RH; Recommended operating humidity range: 30 to 70% RHEcolabels Blue Angel RAL-UZ 205; CECP; ENERGY STAR® certified; EPEAT® Silver Sustainable impact specifications Mercury-freeAcoustics Acoustic power emissions: 6.5 B(A) @ 38 ipm; Acoustic power emissions (ready): Inaudible; Acoustic pressure emissions: 54 dB(A) @ 38 ipm; Acoustic pressure emissions bystander (ready): InaudibleSafety approvals and requirements IEC 60950-1:2005 +A1:2009 +A2:2013 (International); EN60950-1:2006 +A11:2009 +A1:2010 +A12:2011 +A2:2013 (EU); EN 60825-1:2014/IEC 60825-1:2014 (Class 1 Laser Product); EN 62479:2010/IEC 62479:2010;IEC 62368-1:2014; EN 62368-1:2014; Low Voltage Directive 2014/35/EU with CE Mark (Europe); GS Certificate (Germany, Europe); UL/cUL Listed and UC CoC (US/Canada); CAN/CSA C22.2 No. 60950-1-07 2nd Ed. 2011-12; Compliance with Laser safety standards 21 CFR 1040.10 and 1040.11 except for deviations pursuant to Laser notice No. 50, Dated June 24, 2007; Other safety approvals as required by individual countries.Supported network protocols Via built-in networking solution: TCP/IP, IPv4, IPv6; Print: TCP-IP port 9100 Direct Mode, LPD, Web Services Printing, IPP 2.0, Apple AirPrint™, HP ePrint; Discovery: SLP, Bonjour, Web Services Discovery; IP Config: IPv4 (BootP, DHCP, AutoIP, Manual), IPv6 (Stateless Link-Local and via Router, Statefull via DHCPv6); Management: SNMPv2/v3, HTTP/HTTPS, Syslog; Security: SNMPv3, SSL Cert Management, IPSec(IKEv1 and IKEv2), Firewall, 802.1x8107231Ordering informationAccessoriesNumber Description3JN69A HP Jetdirect 3100w BLE/NFC/Wireless Accessory 4QL32A HP Legic Secure USB Reader8FP31A HP Jetdirect LAN Accessory8ZN00A HP HIP2 Card Reader Accessory KitD9P29A HP LaserJet Pro 550-sheet Feeder TrayX3D03A HP Universal USB Proximity Card ReaderY7C05A HP HIP2 Keystroke Reader Supplies and MediaNumber Description4WN07A HP Everyday Laser Glossy FSC Paper 120 gsm-150 sht/Tabloid/11 x 17 in 4WN08A HP Everyday Laser Glossy FSC Paper 120 gsm-150 sht/Letter 8.5 x 11 in 7MV81A HP Everyday Laser Glossy FSC Paper 120 gsm-150 sht/A3/297 x 420 mm 7MV82A HP Everyday Laser Glossy FSC Paper 120 gsm-150 sht/A4/210 x 297 mm CF276A HP 76A Black Original LaserJet Toner Cartridge (~3,000 pages)CF276X HP 76X High Yield Black Original LaserJet Toner Cartridge (~10,000 pages) Contact HP via phone: Asia: 65 6253 8500HP Care PacksNumber DescriptionU11X8E HP 3 year Next Business Day Onsite Exchange Service for LaserJet Enterprise M40x U11X9E HP 4 year Next Business Day Onsite Exchange Service for LaserJet Enterprise M40x U11XBE HP 5 year Next Business Day Onsite Exchange Service for LaserJet Enterprise M40x U11XCE HP 3 year 4 hour 9x5 Service for LaserJet Enterprise M40xU11XDE HP 4 year 4 hour 9x5 Service for LaserJet Enterprise M40xU11XFE HP 5 year 4 hour 9x5 Service for LaserJet Enterprise M40xU11XNE HP 3 year Parts Exchange Service for LaserJet Enterprise M40x (Managed Component Only)U11XQE HP 4 year Parts Exchange Service for LaserJet Enterprise M40x (Managed Component Only)U11XRE HP 5 year Parts Exchange Service for LaserJet Enterprise M40x (Managed Component Only)U11XSPE HP 1 year Post Warranty Next Business Day Onsite Exchange Service for LaserJet Enterprise M40xU11XTPE HP 2 year Post Warranty Next Business Day Onsite Exchange Service for LaserJet Enterprise M40xU11XVPE HP 1 year Post Warranty 4 hour 9x5 Service for LaserJet Enterprise M40xU11XWPE HP 2 year Post Warranty 4 hour 9x5 Service for LaserJet Enterprise M40xU11Y0PE HP 1 year Post Warranty Parts Exchange Service for LaserJet Enterprise M40x (Managed Component Only)U11XPPE HP 2 year Post Warranty Parts Exchange Service for LaserJet Enterprise M40x (Managed Component Only)Protect your investment with HP Care Pack. Let HP certified engineers resolve your technical issues. For more details on HP Care Pack, go to /go/cpc HP Inc. officesAustralia 13 10 47 .auChina (010) 6564 3888 Hong Kong (852) 3077 2688 India (80) 2612 9000 /in Indonesia (62-21) 5799 1088 /idw Korea (02) 2199 0114 hp.co.krMalaysia (603) 2332 3333 .my New Zealand (09) 0800 449 553 Philippines (632) 888 5900 /ph Singapore (65) 6275 3888 .sg Taiwan (02) 3789 9900 Thailand (662) 353 9500 /th Vietnam (848) 3823 4151 /vn SolutionsFor more solutions information, please visit /go/gscFootnotesHP’s most advanced embedded security features are available on HP Managed and Enterprise devices with HP FutureSmart firmware 4.5 or above. Claim based on HP review of 2019 published features of competitive in-class printers. Only HP offers a combination of security features to automatically detect, stop, and recover from attacks with a self-healing reboot, in alignment with NIST SP 800-193 guidelines for device cyber resiliency. For a list of compatible products, visit /go/PrintersThatProtect. For more information, visit /go/PrinterSecurityClaims Some features enabled by future HP FutureSmart firmware upgrades may not be available on older devices, if for example, physical product characteristics limit the functionality of the new feature. HP Web Jetadmin is free and available for download at /go/webjetadmin Third-party certification based on Common Criteria Information Technology Security Evaluation ISO/IEC 15408 Standard requirements as of May 2019. Certification applicable to HP Managed and Enterprise devices running HP FutureSmart Firmware version 4.5.1 and later. For more information: https:///files/epfiles/Certification%20Report%20-%20HP%20Intrusion%20Detection.pdf Use of the HP Trusted Platform Module may require a firmware upgrade. Wireless performance is dependent on physical environment and distance from access point and may be limited during active VPN connections. Dependent upon country setup specifications. To enable HP Roam, some devices may require firmware to be upgraded and an optional accessory to add Bluetooth® Low Energy (BLE) beaconing capabilities. Subscription may be required. For more information, visit /go/roam Measured using ISO/IEC 24734, excludes first set of test documents. For more information, see /go/printerclaims. Exact speed varies depending on the system configuration, software application, driver , and document complexity.Technical specifications disclaimersEPEAT® registered where applicable. EPEAT registration varies by country. See for registration status by country.For yield information on the cartridge included with your printer , see /go/toneryield. Yield values measured in accordance with ISO/IEC 19752 and continuous printing. Actual yields vary considerably based on imagesprinted and other factors.Typical Electricity Consumption (TEC) rating represents the typical electricity consumed by a product during 1 week, measured in kilowatt-hours (kWh).Power requirements are based on the country/region where the printer is sold. Do not convert operating voltages. This will damage the printer and void the product warranty. Energy Star value typically based on measurement of 115V device and 230V for Blue Angel.Declared yields based on ISO/IEC 19752 and continuous printing. Actual yields vary considerably based on images printed and other factors. For details see /go/toneryieldDeclared yield value in accordance with ISO/IEC 19752. Actual yields vary considerably based on images printed and other factors. For more information, visit: /go/learnaboutsuppliesTo enable HP Roam, some devices may require firmware to be upgraded and an optional accessory to add Bluetooth® Low Energy (BLE) beaconing capabilities. Customer can purchase the HP Jetdirect 3100w BLE/NFC/Wireless accessory or the RadBeacon USB. Subscription may be required. For more information, visit /go/roamMeasured using ISO/IEC 24734, excludes first set of test documents. For more information see /go/printerclaims. Exact speed varies depending on the system configuration, software application, driver , and document complexity.Measured using ISO/IEC 24734 Feature Performance Test, excludes first set of test documents. For more information see /go/printerclaims. Exact speed varies depending on the system configuration, software application, driver , and document complexity.Measured using ISO/IEC 17629. For more information see /go/printerclaims. Exact speed varies depending on the system configuration, software application, driver , and document complexity.To learn more, visit © Copyright 2021 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in theexpress warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.th-en August 202112345678912345678910。

惠普 LaserJet MFP M180n 多功能一体机用户手册说明书

惠普 LaserJet MFP M180n 多功能一体机用户手册说明书

User Guide© Copyright 2018 HP Development Company, L.P.Chrome and Google Cloud Print are trademarks of Google Inc.The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.First Edition: February 2018Document Part Number: L13110-001Product noticeThis guide describes features that are commonto most models. Some features may not beavailable on your computer.Software termsBy installing, copying, downloading, orotherwise using any software productpreinstalled on this computer, you agree to bebound by the terms of the HP End User LicenseAgreement (EULA). If you do not accept theselicense terms, your sole remedy is to return theentire unused product (hardware and software)within 14 days for a full refund subject to therefund policy of your seller.For any further information or to request a fullrefund of the price of the computer, pleasecontact your seller.Safety warning noticesurface. Do not allow another hard surface, such as an adjoining optional printer, or a soft surface, such aspillows or rugs or clothing, to block airflow. Also, do not allow the AC adapter to come into contact with theskin or a soft surface, such as pillows or rugs or clothing, during operation. The computer and the AC adaptercomply with the user-accessible surface temperature limits defined by the International Standard for Safetyof Information Technology Equipment (IEC 60950).iiiiv Safety warning noticeTable of contents1 Getting to know your computer (1)Right side (1)Left side (3)Display (4)TouchPad (5)Button and speaker (6)Labels (7)2 Navigating the screen (8)Using TouchPad and touch screen gestures (8)Tapping (8)Scrolling (TouchPad only) (9)One-finger scrolling (touch screen only) (10)One-finger swipe (touch screen only) (11)Two-finger pinch zoom (touch screen only) (11)3 Using the action keys (12)Using the action keys (12)4 Power and battery (13)Factory-sealed battery (13)Charging the battery (13)5 Printing (14)Printing from the Google Chrome browser (14)Printing with Google Cloud Print web printing service (14)6 More HP resources (15)More HP resources (15)7 Electrostatic Discharge (16)8 Accessibility (17)Supported assistive technologies (17)Contacting support (17)vIndex (18)vi1Getting to know your computer Right sideComponent Description(1)Audio-out (headphone)/Audio-in(microphone) combo jack Connects optional powered stereo speakers, headphones, earbuds, a headset, or a television audio cable. Also connects an optional headset microphone. This jack does not support optional microphone-only devices. WARNING!To reduce the risk of personal injury, adjust the volume before putting on headphones, earbuds, or a headset. For additional safety information, refer to the Regulatory, Safety, and Environmental Notices.This guide is provided in the box.NOTE:When a device is connected to the jack, the computer speakers are disabled.(2)MicroSD memory card reader Reads optional memory cards that store, manage, share,or access information.To insert a card:1.Hold the card label-side up, with connectors facingthe computer.2.Insert the card into the memory card reader, and thenpress in on the card until it is firmly seated.To remove a card:▲Pull out the card.(3)USB 3.x SuperSpeed port Connects a USB device, such as a cell phone, camera,activity tracker, or smartwatch, and provides high-speeddata transfer.(4)AC adapter and battery light●White: The AC adapter is connected and the battery ischarged.●Amber: The AC adapter is connected and the batteryis charging.Right side1Component Description●Off: The computer is using battery power.(5)USB Type-C power connector and chargingport Connects an AC adapter that has a USB Type-C connector, supplying power to the computer and, if needed, charging the computer battery.2Chapter 1 Getting to know your computerLeft sideComponent Description(1)Nano security cable slot Attaches an optional security cable to the computer.NOTE:The security cable is designed to act as adeterrent, but it may not prevent the computer from beingmishandled or stolen.(2)USB Type-C power connector and chargingport Connects a USB device with a Type-C connector and can charge products such as cell phones, laptops, tablets, and MP3 players, even when the computer is off. Also connects an AC adapter that has a USB Type-C connector, supplying power to the computer and, if needed, charging the computer battery.(3)USB 3.x SuperSpeed port Connects a USB device, such as a cell phone, camera,activity tracker, or smartwatch, and provides high-speeddata transfer.Left side3DisplayComponent Description(1)WLAN antennas*Send and receive wireless signals to communicate with wirelesslocal area networks (WLANs).NOTE:The position of the WLAN antennas may differ,depending on the product.(2)Internal microphones (2)Record sound.(3)Camera light On: The camera is in use.(4)Camera Records video, captures still photographs, and allows videoconferences and online chat by means of streaming video.*The antennas are not visible from the outside of the computer, and antenna location varies. For optimal transmission, keep the areasimmediately around the antennas free from obstructions.For wireless regulatory notices, see the section of the Regulatory, Safety, and Environmental Notices that applies to your country orregion.This guide is provided in the box.4Chapter 1 Getting to know your computerTouchPadComponent DescriptionTouchPad zone Moves the on-screen pointer and selects or activates items on the screen.NOTE:For more information, see Using TouchPad and touch screen gestureson page 8.TouchPad5Button and speakerComponent Description(1)Speaker Produces sound.NOTE:Select products may include an enhanced soundsystem by B&O Play.(2)Power button●When the computer is off, press the button to turn on thecomputer.●When the computer is in the Sleep state, press the buttonbriefly to exit Sleep.●When the computer is on and you want to lock the screen,press the button until you see the sign-in screen appear.Pressing the power button during screen-lock mode turnsoff the computer.●When the computer is on and you want to turn it off, pressand hold the button to lock the screen, and then continueto press the button until the computer turns off.6Chapter 1 Getting to know your computerLabelsThe labels affixed to the computer provide information you may need when you troubleshoot systemproblems or travel internationally with the computer.IMPORTANT:All labels described in this section will be affixed to the bottom of the computer.●Service label—Provides important information to identify your computer. When contacting support, youwill probably be asked for the serial number, and possibly for the product number or the model number.Locate these numbers before you contact support.Your service label will resemble one of the examples shown below. Refer to the illustration that mostclosely matches the service label on your computer.Component(1)Serial number(2)Product number(3)Warranty period(4)Model number (select products only)Component(1)Model name (select products only)(2)Product number(3)Serial number(4)Warranty period●Regulatory label(s)—Provide(s) regulatory information about the computer.●Wireless certification label(s)—Provide(s) information about optional wireless devices and the approvalmarkings for the countries or regions in which the devices have been approved for use.Labels72Navigating the screenYou can navigate the screen in the following ways:●Use touch gestures directly on the computer screen (select products only).●Use touch gestures on the TouchPad.●Use an optional pen, with the digitizer film, for the computer. If a pen is included with your computer,refer to the documentation included with that pen.Using TouchPad and touch screen gesturesThe TouchPad supports a variety of gestures that let your fingers tap and scroll to manipulate items on thedesktop. To navigate a touch screen (select products only), touch the screen directly using gestures describedin this chapter.TappingTap one finger on the TouchPad zone or touch screen to make a selection.Tap two fingers on the TouchPad zone or touch screen to bring up a context-sensitive menu.8Chapter 2 Navigating the screenScrolling (TouchPad only)Scrolling is useful for moving up, down, or sideways on a page or image. Scrolling to the left or the right withtwo fingers will scroll the screen, if there is more content viewable to either side, or will move back and forththrough web browser history.To scroll, place two fingers slightly apart on the TouchPad, and then drag them across the TouchPad in an up,down, left, or right motion.NOTE:Scrolling speed is controlled by finger speed.To scroll between open tabs in Chrome, slide three fingers left or right on the TouchPad.Using TouchPad and touch screen gestures9One-finger scrolling (touch screen only)Scrolling to the left or the right with one finger will move back and forth through web browser history.To scroll, place fingers on the touch screen, and then drag it across the touch screen in a left or right motion.NOTE:Scrolling speed is controlled by finger speed.10Chapter 2 Navigating the screenOne-finger swipe (touch screen only)Swiping up with one finger will hide or show your shelf. The shelf contains a list of popular shortcuts to appsso that you can find them easily.To swipe, place your finger on the bottom of the screen, quickly slide your finger up a short distance, and thenlift it.Two-finger pinch zoom (touch screen only)Use the two-finger pinch zoom to zoom out or in on images or text.●Zoom out by placing two fingers apart on the touch screen and then moving your fingers together.●Zoom in by placing two fingers together on the touch screen and then moving your fingers apart.Using TouchPad and touch screen gestures113Using the action keysUsing the action keysFor more information on action keys and keyboard shortcuts, go to https:///chromebook/ answer/183101. Select your language at the bottom of the page.Icon Key Descriptionesc Activates certain computer functions when pressed in combination with other keys, suchas tab or shift.Back Displays the previous page in your browser history.Forward Displays the next page in your browser history.Reload Reloads your current page.Full screen Opens your page in full-screen mode.Display apps Displays open apps.NOTE:Pressing this button in conjunction with ctrl takes a screenshot.Brightness down Decreases the screen brightness incrementally as long as you hold down the key.Brightness up Increases the screen brightness incrementally as long as you hold down the key.Mute Mutes speaker sound.Volume down Decreases speaker volume incrementally as long as you hold down the key.Volume up Increases speaker volume incrementally as long as you hold down the key.alt+Keyboard backlightbrightness upIncreases the keyboard backlight brightness.alt+Keyboard backlightbrightness downDecreases the keyboard backlight brightness.12Chapter 3 Using the action keys4Power and batteryFactory-sealed batteryThe battery[ies] in this product cannot be easily replaced by users themselves. Removing or replacing thebattery could affect your warranty coverage. If a battery is no longer holding a charge, contact support. Whena battery has reached the end of its useful life, do not dispose of the battery in general household waste.Follow the local laws and regulations in your area for battery disposal.Charging the battery1.Connect the power adapter to the computer.2.Verify that the battery is charging by checking the AC adapter light. This light is located on thecomputer's left side, next to the power connector.AC adapter light StatusWhite The AC adapter is connected and the battery is charged.Amber The AC adapter is connected and the battery is charging.Off The computer is using battery power.3.While the battery is charging, keep the AC adapter connected until the AC adapter light turns white.Factory-sealed battery135PrintingUse one of the following methods to print from your computer:●Print from the Google Chrome TM browser●Print with Google Cloud TM Print web printing serviceNOTE:If you use HP Print for Chrome, the printer cannot be registered with Google Cloud Print. Printing from the Google Chrome browserTo print from the Google Chrome browser, use the HP Print for Chrome app. You can install the HP Print forChrome app from the Chrome Web Store. For more information, see the HP website.1.Go to /us-en/document/c04683559?openCLC=true.2.Select your country.3.Select your language, and then follow the on-screen instructions.Printing with Google Cloud Print web printing serviceGoogle Cloud Print web printing service is a free service that allows you to print documents and photossecurely from your computer. For information about prerequisites and steps for using Google Cloud Print, seethe HP website.1.Go to /us-en/document/c02817255?openCLC=true.2.Select your country.3.Select your language, and then follow the on-screen instructions.14Chapter 5 Printing6More HP resourcesMore HP resourcesTo locate resources that provide product details, how-to information, and more, use this table.Resource ContentsSetup Instructions●How to set up the computer●Help to identify computer componentsHP websiteTo access the latest user guide, go to / support, and follow the instructions to find your product. Then select User Guides.●Support information●Ordering parts and finding additional help ●Accessories available for the deviceWorldwide supportTo get support in your language, go to/support, and select your country.●Online chat with an HP technician ●Support telephone numbers●HP service center locationsSafety & Comfort GuideGo to /ergo.●Proper workstation setup●Guidelines for posture and work habits that increase comfort anddecrease risk of injury●Electrical and mechanical safety informationRegulatory, Safety and Environmental Notices This guide is provided in the box.●Regulatory and safety information ●Battery disposal informationLimited Warranty*Go to /go/orderdocuments.●Warranty information*You can find your HP Limited Warranty located with the user guides on your product and/or on the CD or DVD provided in the box. In some countries or regions, HP may provide a printed warranty in the box. For countries or regions where the warranty is not providedin printed format, you can request a copy from /go/orderdocuments. For products purchased in Asia Pacific, youcan write to HP at POD, PO Box 161, Kitchener Road Post Office, Singapore 912006. Include your product name, and your name, phone number, and postal address.More HP resources157Electrostatic DischargeElectrostatic discharge is the release of static electricity when two objects come into contact—for example,the shock you receive when you walk across the carpet and touch a metal door knob.A discharge of static electricity from fingers or other electrostatic conductors may damage electroniccomponents.To prevent damage to the computer, damage to a drive, or loss of information, observe these precautions:●If removal or installation instructions direct you to unplug the computer, first be sure that it is properlygrounded.●Keep components in their electrostatic-safe containers until you are ready to install them.●Avoid touching pins, leads, and circuitry. Handle electronic components as little as possible.●Use nonmagnetic tools.●Before handling components, discharge static electricity by touching an unpainted metal surface.●If you remove a component, place it in an electrostatic-safe container.16Chapter 7 Electrostatic Discharge8AccessibilityHP designs, produces, and markets products and services that can be used by everyone, including people withdisabilities, either on a stand-alone basis or with appropriate assistive devices.Supported assistive technologiesHP products support a wide variety of operating system assistive technologies and can be configured to workwith additional assistive technologies. Use the Search feature on your device to locate more informationabout assistive features.NOTE:For additional information about a particular assistive technology product, contact customer supportfor that product.Contacting supportWe are constantly refining the accessibility of our products and services and welcome feedback from users. Ifyou have an issue with a product or would like to tell us about accessibility features that have helped you,please contact us at +1 (888) 259-5707, Monday through Friday, 6 a.m. to 9 p.m. North American MountainTime. If you are deaf or hard-of-hearing and use TRS/VRS/WebCapTel, contact us if you require technicalsupport or have accessibility questions by calling +1 (877) 656-7058, Monday through Friday, 6 a.m. to 9 p.m.North American Mountain Time.NOTE:Support is in English only.Supported assistive technologies17IndexAAC adapter light1 accessibility17action keyreload12action keys12back12brightness down12brightness up12esc12forward12full screen12mute12volume down12volume up12audio-in (microphone) jack, identifying1audio-out (headphone) jack, identifying1Bback key, identifyng12batterycharging13factory sealed13light1Bluetooth label7bottom7brightness down key, identifying12 brightness up key, identifying12 buttons, power6Ccamera light, identifying4 camera, identifying4 componentsbutton and speaker6display4left side3right side1connector, power2Eelectrostatic discharge16esc key, identifying12Fforward key, identifying12full screen key, identifying12Hheadphone (audio-out) jack1Iinternal microphones, identifying4Jjacksaudio-in (microphone)1audio-out (headphone)1Kkeyboard backlight, identifying12LlabelsBluetooth7regulatory7serial number7service7wireless certification7WLAN7lightsAC adapter and battery1camera4Mmemory card, identifying1microphone (audio-in) jack,identifying1microSD memory card reader,identifying1mute key, identifying12Nnano security cable slot,identifying3next window12next window key, identifying12PportsUSB 3.x SuperSpeed port1, 3USB Type-C power connector andcharging2, 3power button, identifying6power connector, identifying2printing14product name and number,computer7Rregulatory informationregulatory label7wireless certification labels7reload key, identifying12resources15Sscrolling touch screen gesture10scrolling TouchPad gesture9serial number7serial number, computer7service labels, locating7slotsmicroSD memory card reader1nano security cable3speaker, identifying6support15swiping touch screen gesture11Ttapping gestures8touch screen gesturesone-finger scrolling10one-finger swipe11two-finger pinch zoom11TouchPad and touch screen gestures,tapping8TouchPad gestures, scrolling9TouchPad zone, identifying5traveling with the computer7two-finger pinch zoom touch screengesture1118IndexUUSB 3.x SuperSpeed port,identifying3USB 3.x SuperSpeed, identifying1USB Type-C power connector andcharging port2USB Type-C power connector andcharging port, identifying3Vvolume down key, identifying12volume up key, identifying12Wwireless certification label7WLAN antennas, identifying4WLAN device7WLAN label7Index19。

check cif Alert 问答

check cif Alert 问答

1.问:在使用checkCIF service进行投稿前检查时,出现了如下的几个alert,想请教该怎么改进。

尤其是两个C类问题!Alert level CPLAT125_ALERT_4_C No _symmetry_space_group_name_Hall Given ....... ? PLAT790_ALERT_4_C Centre of Gravity not Within Unit Cell: Resd. # 1C16 H24 O3--------------------------------------------------------------------------------Alertlevel GPLAT199_ALERT_1_G Check the Reported _cell_measurement_temperature 273 K PLAT200_ALERT_1_G Check the Reported _diffrn_ambient_temperature 273 K PLAT380_ALERT_4_G Check Incorrectly? Oriented X(sp2)-Methyl Moiety C18-------------------------------------------------------------------------------- 0 ALERTlevel A = In general: serious problem0 ALERT level B = Potentially serious problem2 ALERT level C = Check and explain3 ALERT level G = General alerts; check2 ALERT type 1 CIF construction/syntax error, inconsistent or missing data0 ALERT type 2 Indicator that the structure model may be wrong or deficient0 ALERT type 3 Indicator that the structure quality may be low3 ALERT type4 Improvement, methodology, query or suggestion0 ALERT type 5 Informative message, checkPLAT125_ALERT_4_C No _symmetry_space_group_name_Hall Given ....... ?答:在CIF文件中加_symmetry_space_group_name_Hall具体如下:1)是加在_symmetry_space_group_name_H-M 之后例如:_symmetry_space_group_name_H-M 'P 21/c'_symmetry_space_group_name_Hall '-P 2ybc'2)该符号在checkcif后的网页的左上方找.PLAT790_ALERT_4_C Centre of Gravity not Within Unit Cell: Resd. # 1C16 H24 O3分子重心不在单胞内, 要平移或对称操作后, 使得大部分原子的分数坐标都在单胞内,即大部分原子的坐标都是正分数,而不是1.xxx或-0.xxxx具体可在.ins中加move 指令或在xp中用sgen.操作完毕后要重新修正到收敛,产生新的.cif.alert G可不理.第一个加上空间群一列第二个ms分子没在单胞内移动2.cif A错误PLAT307_ALERT_2_A Isolated Metal Atom (Unusual !) ................ Pb1_dPLAT307_ALERT_2_A Isolated Metal Atom (Unusual !) ................ Pb1_i 有没有见过这样的A错误A 错误解释This test reports on metal atoms that are not bonded or at coordinationdistance of other atoms. Isolated ions are very unusual (or non-existent ?)解决方案:把重金属删除后,重新再找。

化学文献查询方法

化学文献查询方法

化学文献查询方法一、检索方法:学化学的人,如果刚进实验室的话,往往是两眼黑,不知道如何下手,要下手往往是漫天刷浆,抓不住重点!那么如何能抓住重点,进行有目的的去读一些论文呢?首先用google来看看你的研究方向,比如你研究某系列的天然物合成,那么你就用这个名字去search,然后先看看有没有中文的介绍,如果有的话,那么先看看它是不是review,最好的是找到中文的review,然后大体看以下,了解你要做的东西当前的进展,有什么人在做,结果如何啊。

然后按图索骥,找到英文的文献,那么可能有很多英文的文献,如何去选呢?选择发表在影响因子高的期刊上的文章来读!!!这个很重要!,因为大牛的教授都是把自己的好结果发在高水平的论文上的。

只要你找一篇比如是JOC上的文章,那么就要看好,里面是否引用了某些review,如果有的话,那么你就去找那个review,一般来说国外的高水平的review都是约稿的,请的是当前的牛教授来写的,有读的价值!依次你可以进行全面的了解相关的研究进展了。

如何对待中文的杂志呢?我的意见可能偏激,我认为完全没有任何读的价值!为什么呢?第一,20%的杂志覆盖了80%的内容,第二,IF太低,低于1的就是垃圾了,没有引起任何人的重视,那么这个结果是没有价值的。

第三,很多中文文献的重复性很差,数据被人为的修改。

那么对待英文呢?同样,低水平的也是很多,对于IF低于1的不要去看,就是看了也不要太当真,原因同中文文献一样,对于化学来说也就是不超过20个有意义的杂志吧,美国化学社的全部,德国的wiley上有几个很好的,sciencedirect上的几个影响因子在2以上的,英国化学社的全部,也就是这些了外加thieme的一个。

完整的检索分为两部分:①寻找相关的文献出处;②找到收录文献的数据库,或者使用相关软件,进行全文下载阅读。

第①步是重要的,第②步是次要的。

可以利用的三大检索工具:Beilstein的CrossFire;ISI的Web of Science;CA on CD。

PaperStream Connect设置指南说明书

PaperStream Connect设置指南说明书

Version 1.0.0.0Copyright © FujitsuContentsIntroduction to PaperStream Connect (2)Setting up PaperStream Capture to Release to Cloud Services (3)Selecting a Cloud Service (4)Logging into a Cloud Service the First Time (4)Logging into a Cloud Service after the First Time (11)PaperStream Capture Release Script Configuration (12)How to Set Up Command Line Parameters (12)Introduction to PaperStream ConnectWith PaperStream Connect, you can release scanned images automatically from the PaperStream Capture scanning application to any of the following supported cloud storage services:▪Dropbox▪Microsoft OneDrive (formally SkyDrive)▪Google Drive▪BoxPaperStream Capture is image capturing software focused on batch scanning. This easy to use capture tool allows you to create batch scanning profiles which include all of the settings and configuration required to control the scanning process from scan to the release of the image.In this PaperStream Connect Guide, you will learn how to configure a Document Profile in the PaperStream Capture scanning application for release to the aforementioned cloud storage services.Before you get started, be sure to install PaperStream Connect on the same computer that you are using for scanning from PaperStream Capture. Note the file path of the application for later use.Setting up PaperStream Capture to Release to Cloud ServicesIn PaperStream Capture, the scan and storage settings can be saved as a document profile before scanning a document.Create a scan document profile as usual. Then go to the Release tab where the file format and the target location to output files are specified.To set up release to a cloud service using PaperStream Connect:1.In the Upload to section, select Other Application.2.Click Settings. The Application Settings window appears.3.In the Application Path field, do one of the following:▪Enter the path to the PaperStream Connect application.▪Click Browse to find the application location on your computer.4.In the Command Line Parameters field leave the default parameter “%f”.5.Click OK when you have finished.6.You are now ready to scan using the new document profile. The subsequent settings will appearwhen the scan is complete.Selecting a Cloud ServiceWhen you complete a scan in PaperStream Capture for the first time using the cloud service Document Profile, the Cloud Service Select window appears. This is where you will select which cloud service you want to store the scanned images.To select the cloud service:1.Select a cloud service by clicking a cloud service icon. The selected service name appears in theCloud service selected field. The highlighted icon also indicates your selection.2.Click Do not show this dialog next time if you do not want to see the Cloud Service Selectscreen again the next time you start the PaperSteam Connect application. In this case, thecurrent cloud service selection will be used.3.Click OK to continue.Logging into a Cloud Service the First TimeAfter selecting a cloud service in the Cloud Service Select window and clicking OK, you will log into the selected service.When you log into a cloud service for the first time from PaperStream Connect, a message appears indicating that you must log in and agree that the PaperStream Connect application may use your account.To log into a cloud service for the first time:1.Enter your user name and password in the log in window for your selected cloud service.2.Click OK. The cloud services authentication window appears.3.Click OK to consent that the PaperStream Connect application may use your account.The user experience will be similar to logging into a cloud service account from an Internet web browser. When you complete the log in and consent, the Upload File To Cloud Service Storage window will appear.Cloud Service User Log in Window and Consent MessagesIn this section, you can view the log in window and message indicators for the following cloud services: DropBox, OneDrive, Google Drive, and Box.DropboxThe following two figures show the Dropbox log in window and the User Consent message.OneDriveThe following two figures show the OneDrive log in window and the User Consent message.Google DriveThe following two figures show the Google Drive log in window and the User Consent message.boxThe following two figures show the box log in window and the User Consent message.Setting Up the Upload Files to Cloud Services WindowThe Upload File To Cloud Service Storage window appears after the log in and consent process is complete.To setup the Upload Files to Cloud Services:1.Fill in the fields as required for your selected cloud service using the information in the tablebelow as your guideline.2.When you have finished, click Upload. The File Upload status window appears and provides youwith the progress of the file upload.3.Select Keep the Cloud Service and Target Folder for Next Upload unless specified checkbox ifyou want the application to remember the cloud service details for the next upload.4.When the upload is finished, a success message appears.5.Click OK to close the window.Logging into a Cloud Service after the First TimeAfter logging into a cloud service for the first time, the user will bypass the login window and consent messages. The PaperSteam Connect application stores the log in process.PaperStream Capture Release Script ConfigurationTo bypass the dialog windows aforementioned in this guide, you can set up a release script in PaperStream Capture. This section includes instructions to set up the command line parameters.How to Set Up Command Line ParametersIn PaperStream Capture, the scan and storage settings can be saved as a document profile before scanning a document.Create a scan document profile as usual. The file format and the target location to output files are specified in the Release tab.To set up release to cloud service using PaperStream Connect command line parameters:1.In the Upload to section, select Other Application.2.Click Settings. The Application Settings window appears.3.In the Application Path field, do one of the following:▪Enter the path to the PaperStream Connect application.▪Click Browse to find the application location.4.In the Command Line Parameters field, leave the default parameter “%f” and then enter thevariable for the selected cloud service and the target folder path as follows.For example, the command line for Google Drive may be similar to the following:%f /g FP=\Documents\images\project1.▪/d = DropBox▪/g = Google Drive▪/b = Box▪/s = OneDrive▪Target Folder path: FP=<Path>5.Click OK when you have finished.。

ACF43、ACF44和ACQ44键盘用户代码或接近卡编程指南说明书

ACF43、ACF44和ACQ44键盘用户代码或接近卡编程指南说明书

Esta es una guía rápida para ingresar códigos de usuario o tarjetas de proximidad en los teclados ACF43,ACF44y ACQ44.Los tres modelos de teclado tiene dos formas de operación.Modo normal -Este activara la salida de relevador cuando sea valido un NIP o una tarjeta de proximidad.Modo secure -Este activara la salida de relevador cuando sea valido un NIP mas una tarjeta de proximidad.Este modo requiere de dos condiciones (NIP masTARJETA)Debe de asegurarse que esta en el modo normal de operación del teclado,ya que de otra forma no podrádar de alta códigos o tarjetas.Para saber que esta en el modo de operación normal verifique que el led de la izquierda esta en color verde y esta fijo.Cada usuario en el teclado tiene dos slots de memoria (primario y secundario),los cuales pueden ser utilizados para guardar en uno el NIP y en otro la tarjeta de proximidad (solo en modelo ACF44y ACQ44).Si usted va a utilizar el teclado para acceder por medio de un NIP o por medio de tarjeta,debera dejar el teclado en modo en operación normal y programar un nip o tarjeta en el slot primario de cada usuario.ClaveCA-031-ACFROSSLAREFecha de última modificación17 de Mayo de 2007Número de Documento031Programación de los Teclados Serie ACF de ROSSLARESi usted va a utilizar el teclado para acceder por medio de un NIP mas tarjeta, debera operar el teclado en modo en operación SECURE y programar un NIP en el slot primario y una tarjeta de proximidad en el slot secundario de cada usuario. PROGRAMACION DE NIP o TARJETA EN SLOT PRIMARIOPara entrar a programación realice lo siguiente1. Presione la tecla del # (numeral) dos veces.El led de la izquierda se apagara el led de la derecha cambiara a color rojo2. Presione el código maestro (por default es el 1234)El led de la izquierda seguirá apagado y el led de la derecha cambiara a color verde.Ahora esta dentro de programación.Dentro de Programación1. Presione la tecla 7El led de la izquierda seguirá apagado y el led de la derecha cambiara a color amarillo2. Después presione el número de usuario que va a dar de alta (del 001 al 500)a. Si el led de del lado izquierdo parpadea en color verde puede dar de alta unnuevo código para este usuario en el slot primario3. Ahora presione el código de 4 dígitos para este usuario o presente la tarjeta deproximidad.4.Si es valido el led del lado izquierdo permanecerá en verde y el led de la izquierdaen amarillo.5. Presione la tecla del # (numeral) dos veces para finalizarPara dar de alta otro código o tarjeta repita el procedimiento desde entrar a programación.PROGRAMACION DE TARJETA EN SLOT SECUNDARIOEntrar a programaciónPresione la tecla del # (numeral) dos veces.El led de la izquierda se apagara el led de la derecha cambiara a color rojoPresione el código maestro (por default es el 1234)El led de la izquierda seguirá apagado y el led de la derecha cambiara a color verde.Ahora esta dentro de programación1.- Presione la tecla 7El led de la izquierda seguirá apagado y el led de la derecha cambiara a color amarillo2.- Después presione el número de usuario que ya tiene asignado un NIP en el slotprimario (del 001 al 500)a. Si el led de del lado izquierdo parpadea en color rojo significa puede dar de altauna nueva tarjeta para este usuario en el slot secundario.3.- Ahora presente la tarjeta para este usuario el led rojo ahora se quedara fijo y el ledde la derecha permanecerá en amarillo.4.- Presione la tecla del # (numeral) dos veces para finalizarPara dar de alta otra tarjeta en el slot secundario para un usuario repita el procedimiento desde entrar a programación.BORRADO DE CODIGOS PRIMARIOS Y SECUNDARIOSEntrar a programaciónPresione la tecla del # (numeral) dos veces.El led de la izquierda se apagara el led de la derecha cambiara a color rojoPresione el código maestro (por default es el 1234)El led de la izquierda seguirá apagado y el led de la derecha cambiara a color verde.Ahora esta dentro de programación.Dentro de Programación1. Presione la tecla 8El led de la izquierda encenderá en color rojo y el led de la derecha cambiara a color Naranja.2. Después presione el número de usuario que va a borrar (del 001 al 500)a. Si el led del lado izquierdo parpadea en color rojo, presione el código deprogramación (default 1234). Despues escuchara tres beeps y regresara al modo normal de operaciónb. Si el campo esta vacio el teclado emitira un beep largo y regresara al modonormal de operación.PROGRAMACION DEL TIEMPO DE APERTURA DEL RELEVADOREntrar a programaciónPresione la tecla del # (numeral) dos veces.El led de la izquierda se apagara el led de la derecha cambiara a color rojoPresione el código maestro (por default es el 1234)El led de la izquierda seguirá apagado y el led de la derecha cambiara a color verde.Ahora esta dentro de programación.Dentro de Programación1. Presione la tecla 6El led de la izquierda destellara en color verde y el led de la derecha cambiaraa color verde fijo.2. Después 4 digitos los cuales los dos primeros comenzaran con 05 y los otros dosson el tiempo de apertura del relevador (de 01 a 99 segundos) ejm 05 12, donde 12 es el tiempo que durara habilitado el relevador3. El teclado emitira tres Beeps y regresara al modo de operación normal..ASIGNACION DEL CODIGO DE USUARIO PARA APERTURA DEL RELEVADOR PRINCIPAL Y/O RELEVADOR AUXILIARCuando un codigo en el slot primario es asigando a un usuario, este usrio tiene los derechos para activar el relevador principal. En ests menu se permite al codigo asignado activar el relevador principal y/o relevador auxiliarEntrar a programaciónPresione la tecla del # (numeral) dos veces.El led de la izquierda se apagara el led de la derecha cambiara a color rojoPresione el código maestro (por default es el 1234)El led de la izquierda seguirá apagado y el led de la derecha cambiara a color verde.Ahora esta dentro de programación.Dentro de Programación1.- Presione la tecla 9El led de la izquierda cambiara a color verde y el led de la derecha cambiara a color naranja.2 .- Ingrese los tres digitos del numero de usuario al cual desee programarEl led de la izquierda destellara en color verde y el led de la derecha seguira en color naranja.3.- Presione la opcion que este usuario podra realizar.1.- Asignacion solo al relevador principal2.- Asignacion solo al relevador auxiliar3.- Asignacion al relevador principal y auxiliarSi el codigo asignado es valido el led dejara de destellar4.- Presione la tecla del # (numeral) dos vecesCAMBIO DE OPERACIÓN DEL MODO NORMAL AL MODO SECURESi usted desea operar el teclado con la condición de utilizar un NIP mas la tarjeta de proximidad, cambie el teclado al modo secure de la siguiente forma.Estando en el modo normal, presione 3838 y después la tecla del # (numeral), observe que el led de la izquierda cambia a color ROJO. Ahora ya esta en el modo SECURE.Si desea regresar al modo normal vuelva presionar 3838 mas la tecla del # (numeral), el led de la izquierda volverá a cambiar a verde.RESET DE LOS NIP´S Y TARJETAS DE LOS USUARIOS EN EL TECLADO.Si usted desea borrar toda la información de los usuarios, realice el siguiente procedimientoPrimero asegurese de estar en el modo normal de operación del teclado. El led de la izquierda en color verde y el led de la derecha apagado.Presione la tecla del # (numeral) dos veces.El led de la izquierda se apagara, y el led de la derecha cambiara a color rojo Presione el código maestro (por default es el 1234)El led de la izquierda seguirá apagado y el led de la derecha cambiara a color verde.Presione la tecla del cero, los dos leds cambiaran a color rojo y destellaran de forma simultanea.Vuelva a presionar el código maestro (por default es el 1234), escuchara tres beeps y el led de la izquierda volverá al color verde. El teclado volvera al modo de operación normalAhora el teclado esta listo para volver a programarse de nuevo.CAMBIO DEL CODIGO DE PROGRAMACIONEntrar a programaciónPresione la tecla del # (numeral) dos veces.El led de la izquierda se apagara el led de la derecha cambiara a color rojoPresione el código maestro (por default es el 1234)El led de la izquierda seguirá apagado y el led de la derecha cambiara a color verde.Ahora esta dentro de programación.Dentro de Programación1. Presione la tecla 3El led de la izquierda y el led de la derecha cambiaran a color Verde.2. Después Ingrese el nuevo codigo(de cuatro digitos) , el cual sera ahora el codigode programacion3. El teclado emitira tres Beeps y regresara al modo de operación normal.ASIGNACION DE UN NUEVO CODIGO DE PROGRAMACION(EN CASO DE OLVIDO)Asegurese de estar en el modo de operación normal,el led de la izquierda en color verde y el led de la derecha apagado.1.- Desconecte la alimentacion del teclado2.- Presione el boton de REX (boton de salida)3.- Reconecte la alimentación sin dejar de presionar el REX4.- Libere o suelte el boton de REXAhora tendra 15 segundos para ingresar un nuevo codigo de programacion dentro de la unidad , usando el codigo inicial de fabrica (1234). Pasados estos 15 segundos repita de nuevo la operación.5.- Dentro del tiempo de 15 segundos realice el procedimiento de CAMBIO DEL CODIGO DE PROGRAMACION (recuerde que ahora su codigo es el 1234) y asigne el codigo que desee. Asegurese que el código nuevo de programación no este asignado en algún usuario, de lo contrario repita todo el procedimiento.Cableando la Serie ACF y ACQEL controlador esta provisto con un cable de 60 cm, teniendo un cable de 10 conductores.Guía del color de los CablesCOLOR DESCRIPCIÓNROJO (RED) VOLTAGE POSITIVONEGRO (BLACK) VOLTAGE NEGATIVOVERDE (GREEN) REX (botón de salida)BLANCO (WHITE) MONITORVIOLETA (MORADO) RELEVADOR PRINCIPAL COM GRIS (GRAY) N.OCAFÉ (BROWN) N.CAZUL (BLUE) RELEVADOR Auxiliar COM AMARILLO(YELLOW) N.ONARANJA (ORANGE) N.CCorte y cubra todos los conductores que no se usaran.DIAGRAMA DE CABLEADO Conexión de Chapa MagnéticaESPECIFICACIONES TÉCNICASCARACTERÍSTICAS ELECTRICASRango de operación de voltaje:12VCDMáxima corrienteStandby:95mAMax:150mASalidas de Relevador:Relevador principal Forma C,5ARelevador auxiliar Forma C,5AEntradasREX Contacto seco N.OEntrada Auxiliar Contacto seco N.OLED´s2LEDS tricolorLector de proximidad IntegradoRango de lectura 2.5“(65cm)Modulación ASK a125KHzCARACTERÍSTICAS AMBIENTALESTemperatura de operación-30a65Grados CentígradosHumedad de operación0a95%(no condensada)CARACTERÍSTICAS MECANICASDimensiones120X71X30mmPeso244gramosCONTROL DE ACCESO。

HP PPM Center White Paper - 理解和优化PPM缓存说明书

HP PPM Center White Paper - 理解和优化PPM缓存说明书

HP PPM Center White Paper -Understanding and Tuning the CacheVersion: 1.0October 2014Applies to PPM 9.10 and later.ContentsIntroduction (2)PPM Cache Overview (2)Comparison between Legacy Cache and New Cache (2)Understanding the PPM Cache Statistics reports (3)Legacy Cache (3)New Cache (3)PPM Cache Tuning (3)Flushing the PPM cache with kRunCacheManager.sh and ksc_flush_cache (5)kRunCacheManager.sh (5)Syntax (5)Issues & Limitations (6)ksc_flush_cache (6)Syntax (6)Issues & Limitations (6)PPM Cache changes in PPM 9.31 (6)Conversion from legacy cache to new cache (7)Simplification of new cache configuration (7)Changes to CacheManager Statistics report (7)Changes to kRunCacheManager.sh (7)Changes to ksc_flush_cache (8)More questions? Need help? (8)IntroductionThis document describes the PPM Cache architecture up to PPM 9.30, as well as the changes introduced to the Cache in PPM 9.31. It should help PPM Administrators to correctly tune PPM Caches in order to achieve optimal system performance.PPM Cache OverviewThere are two caches in PPM that can be tuned by PPM Administrators:-Legacy cache (Table Components, Request Type Search Fields, List Validation Values, etc.).It is configured in <PPM_HOME>/conf/tune.conf. Setting the parameters in server.conf works too and some of the parameters can be edited from the admin console.You can view its cache statistics in the “Server Cache Status” report in Workbench’s AdminTools.-New cache (Requests, Request Types, Modules, Portlets, Workflows, etc.).It is configured in <PPM_HOME>/conf/cache.conf.You can view cache statistics in the “CacheManager Statistics” report in Workbench’s AdminTools.Comparison between Legacy Cache and New CacheThe new cache has the following advantages over the legacy cache:-All cache objects are stored using java SoftReference. As a result, if the JVM runs out of Heap Memory, objects in the cache will be automatically garbage collected to free up memory. Thismakes it possible to store large amounts of data in the cache without risking out-of-memoryissues under heavy system load.-There are more cache configuration parameters (at least until PPM 9.31, in which new cache configuration has been simplified).-It is possible to invalidate a single object in the new cache by using ksc_flush_cache special command (which only works with new cache), whereas only full cache flush is possible whenusing kRunCacheManager.sh (which works with both legacy and new cache).-The new cache provides configurable staleness checks, whereas such checks are hard coded in the legacy cache.-More statistics in the Cache report (number of staleness checks, average load time, number of flushes of the different type).Understanding the PPM Cache Statistics reportsThe following information is available in the cache server reports.Legacy CacheFollowing information is available for each legacy cache in the “Server Cache Status Report”:∙Maximum number of objects that can be cached (Cache size)∙Number of additional objects that can be cached (Free units)∙Number of hits, misses and swaps (swaps meaning replace an object by another one when max size is reached)∙Miss rate (the lower, the better)∙Estimation of the amount of memory taken up by the cacheNew CacheFollowing information is available for each new cache in the “CacheManager Statistics Report”:∙Hits, misses, and hit rate (the higher the hit rate, the better)∙Number of cache flushes (broken down by the categories "old", "idle", "soft reference reclaimed", and "max cache size reached")∙Average load time to load an object from database when it is not in the cache∙Number of staleness checks performed∙Max cacheable objects (Cache size), cached object count and maximum idle time∙Whether the cache is distributed or not (if it is, removing an object from the cache in any node of the PPM cluster will send a message to all other cluster nodes to remove that object fromtheir cache).PPM Cache TuningTuning PPM Cache performance should be done at the same time as tuning PPM JVM Heap size. This means finding the right balance between 2 things:-JVM Heap size: Before PPM 9.20, only 32bits JVM was supported, which limited the JVM Heap size to ~1.3GB. Since PPM 9.20 and the adoption of 64bits JVM, the size of the JVM Heapmemory is only limited by the installed physical memory. However, too large Heap size canresult in long full garbage collection times, during which the application is unresponsive. It iscommon to see PPM JVM heap sizes of up to 4 GB, and sometimes more on Service nodes.-Caches size: A larger cache size means more cacheable objects, a better hit rate, and fewer objects to reload from the database, which result in better application performance. However, if cached objects end up taking too much memory, this will impact the performance of theapplication and might even cause out-of-memory problems. Note that only legacy cache isprone to causing such memory problems, as the JVM will automatically discard objects from the new cache whenever the available free memory runs too low.To summarize:-If JVM Heap size is too large, full garbage collection periods will be too long and application might become unresponsive for seconds, degrading users experience-If Caches are too large and end up using up too much memory, the performance of the application will degrade and in the case of legacy cache it might even cause out-of-memoryissues.Tuning your PPM cache can be done by following these steps, which may end up conflicting with each other; if that happens, use your best judgment.-If you see a high number of swaps (legacy cache) or “max cache size reached” flushes (new cache), increase the cache size.-If you see some “soft reference reclaimed” flushes (new cache), increase the JVM Heap or reduce the cache size for cache using up large amounts of space.-If you see a high miss rate (above 20%, legacy cache) or a low hit rate (below 80%, new cache) even after prolonged PPM usage (at least one day of heavy usage), increase the cache size.-If you notice long full garbage collection times (many seconds) during which the system is unresponsive, reduce the Heap size or better tune the JVM Garbage collection. Note that youwill need to use a JVM monitoring tools in order to ensure that JVM pause times are caused by full garbage collection.There are some additional tips that might help you when tuning the PPM cache:1)There is no “standard” cache configuration. Measure, tune, rince & repeat until you reachsatisfactory numbers. All PPM usages are different, and as a result caches configurations should be tuned accordingly.2)When tuning the PPM cache, try to do so after capturing statistics during the highest peak loadtime (usually happening on Friday afternoon or Monday morning). Tuning your cache onlymakes sense if it is tuned to properly handle peak load usage.3)Try not to flush the caches (using kRunCacheManager or ksc_flush_cache) in an automated wayunless you really have to. If using kRunCacheManager, NEVER use the “A” option to flush allcaches in an automated script; you should not flush more caches than necessary.4)If memory limit doesn’t allow you to set the proper max cache size for all the entities, you canrank the cache t o optimize first by the value “Average Load time” x “Misses”, and first increase the cache size of the cache(s) with the highest value. They are the most likely to have ameasurable performance impact.5)You might want to tune differently the PPM nodes in your cluster depending on whether theyare Service nodes or Web User only nodes. The entities loaded (and thus the optimal cachesettings) are different. For example, a pure Service node will never load portlets or menus, but might need a larger cache size for fiscal periods.6)Don’t forget that when using kRunCacheManager.sh, it will always flush selected caches on allnodes of your PPM cluster, but it will reset caches statistics and force garbage collection only on the node it is connected to.Flushing the PPM cache with kRunCacheManager.sh and ksc_flush_cache There are two ways to flush a PPM Cache in a manual or automated way: kRunCacheManager.sh (command line tool), or ksc_flush_cache (special command). They should be called after modifying the data directly in the database without going through one of the supported PPM interfaces (Web UI, SOAP Web Service, REST Web Service, etc.).kRunCacheManager.shkRunCacheManager.sh is a shell script that is run from the command line.Syntaxsh ./kRunCacheManager.sh [<URL>] <cache number>-“URL” parameter is optional. If omitted, it will connect to the first running RMI_URL defined in server.conf. You can pass multiple RMI urls, separated with semicolons (‘;’), and it will connect to the first running one. It is safe to omit this parameter unless you want to connect to a specific PPM node, for example to reset cache statistics or request a garbage collection.-“Cache Number” parameter is the number next to the cache that you want to flush. In order to view the list of caches with their number, run the command without any parameter to list all caches and be prompted for possible options. You can also input a letter to trigger thefollowing actions:o A: Flush All Caches. It is strongly advised not to use this option when runningkRunCacheManager in an automated way.o B: Flush Validation Caches. This will only flush the validation related caches. It can be used when validation definition or values are directly edited in PPM Database.o C: Reset Cache Statistics Counters. This only affects the node you are connected to.o D: Force Garbage Collection.Issues & Limitations-The order of the caches in the list is not consistently enforced and can vary between environments or PPM versions. As a result, if you do flush a specific cache designated by itsnumber in a script, it’s possible that the corresponding cache may change at some point in the future. You should verify that the cache numbers haven’t changed after every PPM upgrade or environment change.-It is not possible to only flush one entity in a cache; the whole cache has to be flushed. This can result in performance impact as all objects from the flushed cached will need to be reloaded.This could have performance impact under heavy load if some caches are flushed too often.-It is strongly advised NOT to use the “flush all caches” option (“kRunCacheManager.sh A”) in an automated way, as it may have performance impact under heavy system load.-If the cache is flushed using kRunCacheManager.sh while the cache maintenance thread is running (it runs every 10 seconds by default), an exception may be fired and thekRunCacheManager.sh cache flush action may be ignored.ksc_flush_cacheksc_flush_cache is a PPM Special Command that can be invoked from any command step (workflow step, PPM report command step, etc.).It only works with new caches.Syntaxksc_flush_cache <cache-name> [<id>]-“cache-name” parameter is the name of the new cache, as defined in cache.conf. For example, in the following cache.conf line:cache.datasource.title = Dashboard Datasourcesthe cache name is datasource.-“id” parameter is optional. If omitted, the cache is flushed from all its entities. If specified, only that entity will be removed from the cache.Issues & Limitations-ksc_flush_cache only works with new caches .-As of PPM 9.30, ksc_flush_cache is an undocumented (though officially supported) special command.-As of PPM 9.30, passing an entity ID to ksc_flush_cache will only work when the cache key is an Integer value. If it is a String value, it will not be flushed, and the only option to remove thedesignated entity will be to flush the whole cache.PPM Cache changes in PPM 9.31Following changes have been done to PPM Cache in 9.31 in order to correct existing issues and limitations.Conversion from legacy cache to new cacheAll the legacy caches listed in kRunCacheManager.sh but one (Scoring Criteria) have been converted to new cache.All these caches are now configured from cache.conf, and their parameters in tune.conf (orserver.conf/admin console) have been deprecated and are not used anymore.Simplification of new cache configurationSome parameters in cache.conf have been removed in an attempt to simplify cache configuration.-The only parameter that can be tuned for all caches is the cache size (parameter “maxSize”).-Parameters “maxAge”, “maxIdleTime”, “resolver” and “stalenessCheckGraceInterval” have been removed.-Parameter “distributed” is inferred automatically based on whether a staleness check in defined (distributed = false) or not (distributed = true).-Cache is automatically set to disabled if maxSize = 0.A staleness check has also been added for request types and table components; even though it’s not enabled by default, if one relies on direct DB upd ates to modify request types or table components, it’s preferable to enable the staleness check rather than disable the cache. Staleness check will only work if column LAST_UPDATE_DATE is modified during data update.One side effect of cache simplification is that the cache maintenance thread (previously used to enforce maxAge and maxIdleTime of cached objects) is now only used to reload the cache.conf configuration when modified at runtime. It doesn’t cause issues anymore when running at the same time as kRunCacheManager.sh.Changes to CacheManager Statistics report-Flush counts of types “old” and “idle” have been removed.-“Cache Flush All” count has been added. It displays the number of times the whole cache has been flushed. It helps identifying abuses of “kRunCacheManager.sh A” or of unnecessary fullcaches flushes.Running “kRunCacheManager.sh A” will increment this value by 1 for all caches.Changes to kRunCacheManager.sh-The order of listed caches has changed: it still lists legacy cache followed by new caches, but now the new caches are ordered alphabetically by cache name.-When listing all caches, the cache name of new caches is displayed in parenthesis after the cache title.-When flushing new caches, you can now use the cache name in place of the cache number. It is advised to always use the cache name, as it doesn’t rely on any ordering of caches in that list.-An extra optional parameter has been added to the command, to pass the entity ID to flush. So you can now flush one specific entity from a cache using kRunCacheManager.sh using thefollowing syntax:sh ./kRunCacheManager.sh [<URL>] <cache name (or cache number)> [<entity ID>] - A new action (E) has been added, that lists all keys in each of the new caches along with their type (String or Integer). This can help diagnose whether a specific entity is currently stored inthe cache or not. Note that in MLU environments, the same key can be displayed multiple times if it is stored in the cache using different languages.Changes to ksc_flush_cache-Passing an entity ID to ksc_flush_cache will now work regardless of the key type (String or Integer).-You can now flush the legacy caches by passing their cache number (as inkRunCacheManager.sh) instead of the cache name. Since there is only one legacy cache left in9.31, it means passing “1” as the cache name to flush the “Scoring Criteria” cache.More questions? Need help?Join the conversation and ask your questions on:- HP PPM Customer Support forum (if you are an existing HP PPM Center customer):/t5/Project-and-Portfolio-Management/bd-p/project-portfolio-mgnt-cust-forum- Public HP PPM Support and News forum:/t5/Project-and-Portfolio-Management/bd-p/itrc-935。

Windows 7 安装指南:通过 USB Type C 端口说明书

Windows 7 安装指南:通过 USB Type C 端口说明书

Technical Whitepaper Installing Windows 7 through USB Type CApril 2016901238-001Table of contents1 Introduction (3)2 Drivers and updates (4)2.1 USB 3.1 driver (4)2.2 Windows updates (4)3 Procedure overview (5)4 Modifying install.wim (6)5 Modifying boot.wim (7)1IntroductionWindows 7 does not come with built-in USB 3.1 drivers support during install. Since the drivers are missing, once you boot into the OS installation set up, the communication through the USB type C port is lost.This guide provides instructions on how to prepare to install Windows 7 through a USB Type C port.2Drivers and updatesThe following driver and Windows updates will be neededfor this process:2.1USB3.1 driverDownload Intel® USB 3.1 eXtensible Host Controller v15.2.30.250. This package provides drivers for Alpine Ridge USB3.1 Controller for Windows 7:∙Intel(R) USB 3.1 eXtensible Host Controller Driver∙Intel(R) USB 3.1 Hub DriverThe drivers are available on HP Support: ( /us-en/ )2.2Windows updates∙KB2990941 ( https:///en-us/kb/2990941 )∙KB3087873 ( https:///en-us/kb/3087873 )3Procedure overview1.Download and extract the USB 3.1 drivers (see Drivers and updates on page 4).2.Download and extract the Windows updates (see Windows updates on page 4).NOTE: The downloaded drivers and updates should be placed in a location on your system that is easy to find or remember.3.Create a bootable Windows 7 image on a USB flash drive.4.With the bootable Windows 7 flash drive inserted, launch the Windows Command Prompt.NOTE: You must run the Command Prompt as an Administrator.5.Follow the steps to modify the install.wim (see Modifying install.wim on page 6) and boot.wim files (see Modifyingboot.wim on page 7).6.Eject and remove the USB flash drive, then attach it to the computer on which Windows 7 will be installed using aUSB Type C-to-USB Type A dongle.7.Turn on or restart the computer and enter the system BIOS by pressing the f10 key when the HP logo appears,then make the following modifications.a.Turn fast boot offb.Change USB settings to No Securityc.Enable Legacy bootd.Disable Secure boot8.Save changes, restart the system, and enter the boot menu by pressing the f9 key when the HP logo appears.9.Select “Legacy boot” from the options provided.10.Follow the on-screen instructions to install Windows 7.4Modifying install.wimUsing the command prompt as Administrator, enterthe following commands:1.Type the following command to get the WIM index information.Dism /Get-WimInfo /WimFile:<install_wim_file>NOTE:<install_wim_file> is the path to the install.wim (usually d:\sources\install.wim).An index or name value is required for most operations that specify a WIM file. Note the index number of thewindows version you are installing.2.Create a directory to mount the windows image.MD <mount_directory1>EXAMPLE:MD C:\temp\installw73.Mount install.wim to the directory created in step 2.DISM /Mount-Wim /WimFile: <install_wim_file> /name: “<Name>” /MountDir:<mou nt_directory1>For <Name>, fill in the name of the Windows version, i.e. “Windows 7 Professional.”4.Apply the update package (.msu) file:DISM /image: <mount_directory1> /Add-Package /Packagepath: <msu_file>NOTE:<msu_file> is the path to each one of the updates KB2990941 and KB3087873 (see Windows updates on page 4 and Procedure overview on page 5). You will need to run this step twice, once for each update package.5.Inject the downloaded USB 3.1 drivers (see USB 3.1 driver on page 4).Dism /Image:<mount_directory1> /Add-Driver /Driver:<driver_folder> /Recurse /forceunsigned<driver_folder> is the location of the USB 3.1 drivers on the flash drive (see Procedure overview on page5).6.Unmount the install.wim.Dism /Unmount-Wim /MountDir:<mount_directory1> /Commit5Modifying boot.wimUsing the command prompt as Administrator, enterthe following commands:1.Type the following command to get the WIM index information.Dism /Get-WimInfo /WimFile:<boot_wim_file>NOTE:<boot_wim_file> is the path to the boot.wim (usually d:\sources\boot.wim).An index or name value is required for most operations that specify a WIM file. Note the index number of thewindows version you are installing.2.Create a directory to mount the windows image.MD <mount_directory1>EXAMPLE:MD C:\temp\bootw73.Mount boot.wim to the directory created in step 2.DISM /Mount-Wim /WimFile: <boot_wim_file> /index:2 /MountDir:<mount_directo4.Inject the downloaded USB 3.1 drivers (see USB 3.1 driver on page 4).Dism /Image:<mount_directory1> /Add-Driver /Driver:<driver_folder> /Recurse /forceunsigned<driver_folder> is the location of the USB 3.1 drivers on the flash drive (see Procedure overview on page5).5.Unmount the boot.wim.Dism /Unmount-Wim /MountDir:<mount_directory2> /Commit。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

智能型带宽整合管理器技术白皮书亚盛信息技术有限公司2004年08月目录1 前言 (3)2 ASCENLINK®产品介绍 (4)2.1A SCEN L INK®主要特色与优点 (4)负载均衡(Load Balancing) (4)外连线路状态侦测(WAN Link Health Detection )及高容错力 (5)多条外连线路整合(WAN Line Trunking ) (5)Link Tunnel (6)提供备份线路功能 (6)持续路由(Persistent Route) (6)Multihoming 机制 (7)对外服务的负载均衡&南北电信网络互访问题Server Load Balance(服务器负载均衡) (7)独创的SwiftDNS TM专利技术 (7)内建DNS功能 (8)QoS / 带宽管理(Bandwidth Management)功能 (8)安全保护 (9)完整网络传输的监控及报表功能 (9)高可靠度HA(High Availability )备份机制 (9)精心设计的SwiftNAT TM功能 (10)外部合法IP 地址穿透(Public IP Pass-Through) (10)易于操作的网页界面管理模式(Web-Based Administration) (10)提供IP-MAC映射功能 (10)提供PPPoE、DHCP Client功能 (10)提供DHCP租约信息显示服务 (10)SNMP功能 (11)网络快取功能 (11)2.2采用A SCEN L INK®的十大理由 (11)2.3应用效益 (11)3.1W AN链路质量成本效益最佳化 (13)3.2W AN链路的稳定性 (13)3.3M ULTIHOMING 保证企业对外服务不中断 (14)3.4链路功能确保带宽充分利用 (15)3.5详细的链路状态报告 (15)4 公司介绍 (17)1 前言全球的互联网络不断蓬勃发展,造成企业的运营模式迅速产生剧变,同时各种Internet技术上的应用以超乎想象的速度推陈出新,像E-mail、WWW 、VoIP、E-Commerce、e-Learning等等,已经逐渐成为我们工作中密不可分的一部分。

包括从中小企业到大型公司、学校单位或政府机关,甚至是银行与证券公司等,都是通过Internet来与合作伙伴进行沟通、数据共享以及电子交易等服务。

而在计算机网络化日趋重要的今天,Internet提供了一个让通讯标准化的环境,彻底改变了人与人、人与计算机以及计算机与计算机之间的沟通模式,并大幅提高了工作效率与准确性。

但综观当前Internet的发展现状,仍是属于起步的阶段,因此有许多的问题急待解决。

而每当一个重要的问题找出解决之道后,Internet的功效会进一步提高,用途也变的更加广泛。

但是,也由于我们对Internet的依赖越来越加深,因而衍生出许多棘手的问题,例如网络阻塞、带宽使用不当、网络断线或带宽不足以及各种类型服务器扩充性的问题。

整体来说,广域网络(WAN )的连接质量成本效益最佳化、链路带宽使用最有效率与链路的稳定性,是采用广域网络为基础的计算机环境成功的关键因素。

针对于此,AscenVision公司提出了具有针对性的解决方案,利用AscenVision公司的广域网带宽管理设备AscenLink®,可以有效的解决上述问题。

2 AscenLink®产品介绍AscenLink® 是亚盛信息技术所推出的广域网络(WAN )/ 局域网络(LAN )边界设备之一,可整合不同ISP及网络WAN线路,使进出Internet/Intranet 的流量提供承载分配及容错备份,确保Internet/Intranet的存取服务不会中断,维持线路的平稳、快速的传输品质。

AscenLink® 能与现有的硬件设备与应用系统相兼容,不需要复杂的设置,并内建带宽管理功能,让有限的带宽资源达到最佳的使用效能。

AscenLink®主要根据客户在对广域网络所遇到的问题、及MIS对于网络管理的无力感,提供一个超值及完善的解決方案。

一、面对用户拥有多条广域网链路,却无法有效的充分利用和有效管理时,AscenLink®提供了多线路整合的功能。

二、针对用户的多链路,AscenLink®提供了多链路双向的负载均衡功能,使得用户的多条链路实现负载均衡和冗余备份。

三、为了确保关键业务的应用,AscenLink®内置了QoS 功能,能够根据实际商务需求、服务种类、封包类型、流量来源以及目地(以IP 与网络子网来定义)等参数决定带宽分配的政策。

通过滤除非预期的网络流量,能大幅改善带宽的使用率,使您在接收重要资料时能拥有最好的传输品质。

四、强大的报表系统功能是AscenLink®有别于同类产品的一大特点,通过LinkReport TM详细的报表,可以使的用户实时的了解在每一条广域网链路上服务种类、封包类型、流量来源以及目地,同时也能实时了解每一条广域网链路的连接状态。

2.1 AscenLink® 主要特色与优点负载均衡(Load Balancing)AscenLink® 能够确保用户租用服务供应商多条线路时,其效能达到最佳化。

达到线路最佳化的目的,是确保信息在不同的线路上传输时,能够选择最快速、最稳定的线路传输。

这必须依用户不同的环境及需求选择不同的演算法则(Algorithm )。

AscenLink® 可支援下列六种负载均衡之演算法:固定指派(Fixed ):选择固定的广域网络连线,参数是广域网络连线的号码。

根据连接数(By Connection):比较各线路上建立的连接数量,让数据流依照所输入的连接比例方式在指定的广域网络连接上分配流量。

轮流指派(Round-Robin ):按照单纯的比重分配,参数是分配到各广域网络连线的比重。

根据下载流量(By Downstream Traffic ):选择下载负载最轻的广域网路连线,参数是需要考虑的广域网络连线。

根据上传流量(By Upstream Traffic ):选择上传负载最轻的广域网络连线,参数是需要考虑的广域网络连线。

根据全部流量(By Total Traffic):选择总负载(上传及下载)最轻的广域网络连线,参数是需要考虑的广域网络连线。

外连线路状态侦测(WAN Link Health Detection )及高容错力AscenLink® 采用精心设计的检测机制,自动侦测对外连线状态,通过智能型路由引擎为流量做最适当的路径安排。

当任一条对外连线中断或不稳定时,AscenLink® 会自动将流量导引至其他可用且稳定的外连线路,以确保整体对外连线永不中断。

一旦发生问题的连线回复正常时,AscenLink® 也能自动侦测出来,并重新分配每条连线的流量负载,将整体对外连线的使用率做最有效率及最佳化的运用。

多条外连线路整合(WAN Line Trunking )AscenLink® 能够整合多条对外网络连线,包括DDN、FR、ISDN到ADSL、Cable等宽带网络,让局域网络内的使用者连线至广域网络时,如同使用一条虚拟外连线路(WAN Line Trunking ),既快速又可靠。

AscenLink® 针对不同需求可提供3至8个对外连接端口的机型供企业选择使用,同时也可支援虚拟联结(Virtual Link),通过与外部交换器的连结,最多可连多达40 条广域网络线路,达到最佳对外连线扩充的功能。

除自动流量导引外,AscenLink® 也支持特殊流量导引政策。

网管人员可依下列方式做特殊专线流量导引,让您的商业应用政策与网络政策能够紧密地结合。

1. 源地址(Source IP )2. 目的地址(Destination )3. 应用种类Link TunnelLink Tunnel是AscenLink® 提供的一个强有力的功能,它不仅仅是能够完成普通意义上的负载均衡和冗余备份,而且保证了在一个Connection中实现数据传送的不间断性。

许多的关键业务,如VPN、Video Conference、电子商务等在广域网络上的应用,都面临着一个问题,那就是如何有效的保证数据的传送能够在一个连接中(Connection)完成,Link Tunnel实现了这个功能,保证了关键业务的执行。

提供备份线路功能AscenLink® 提供Backup Line功能,可以使您的备用链路出于StandBy状态,当主用链路的流量达到某一个设定值时,备用链路将自动启用,进行有效的流量负载分担。

如果主用线路因为以外发生中断,备用线路(Backup Line)将及时承担起传输作用,避免网络瘫痪,极大的降低了因此带来的损失。

持续路由(Persistent Route)当用户需要连接到公网上需要身份认证的服务器时,如做电子商务或邮件认证时,可以通过持续路由完成认证的过程,然后再按照制定的智能路由进行有效的负载均衡。

Multihoming 机制Multihoming ,意指在Internet与企业网站间架设多条连线,包括单一ISP 或不同ISP 的线路,以确保两者之间连线的稳定与品质,并大大降低断线风险.负载均衡&不间断服务通过MultiHoming机制,AscenLink可以保证用户访问内部服务的不间断及在多条链路上进行负载均衡,保证某条链路断路后对内部数据的访问的不间断,南北电信互访速度问题针对南北电信网络互访速度较慢的问题,AscenLink可以通过相关策略设定(Local DNS设定),回应解析请求用户相同ISP的A记录地址,从而保证用户通过相同ISP链路进行服务的访问,加快了内部数据的访问速度。

此功能特别针对您有对外服务的应用,而且要保证服务不中断,诸如:●企业网站●政府对外服务系统●网络下单系统●远程教育系统●银行、金融电子交易Server Load Balance(服务器负载均衡)AscenLink不仅提供对WAN链路的负载均衡及不间断服务,同时可以提供对内部服务器进行负载均衡的功能。

通过AscenLink WAN口的PublicIP与内部服务器进行相关的映射,可以保证外部用户对这些提供相同内容服务器访问的负载均衡,可以将访问请求依次轮循到内部的不同服务器,从而减轻每台服务器的负载量,加速访问速度。

独创的SwiftDNS TM专利技术DNS传统容错(DNS轮询)的一个问题是一旦某个服务器出现故障,即使及时修改了DNS设置,还是要等待足够的时间(刷新时间)才能发挥作用,在此期间保存了故障的服务器地址的客户计算机将不能正常存取服务器。

相关文档
最新文档