ANT Message Protocol and Usage

Size: px
Start display at page:

Download "ANT Message Protocol and Usage"

Transcription

1 ANT Messge Protocol nd Usge D Rev 2.9 Dynstrem Innovtions Inc. July 2, 2007 P F

2 2 of 68 Copyright Informtion nd Usge Notice This informtion disclosed herein is the exclusive property of Dynstrem Innovtions Inc. No prt of this publiction my be reproduced or trnsmitted in ny form or by ny mens including electronic storge, reproduction, execution or trnsmission without the prior written consent of Dynstrem Innovtions Inc. The recipient of this document by its retention nd use grees to respect the copyright of the informtion contined herein. The informtion contined in this document is subject to chnge without notice nd should not be construed s commitment by Dynstrem Innovtions Inc. unless such commitment is expressly given in covering document. The Dynstrem Innovtions Inc. ANT Products described by the informtion in this document re not designed, intended, or uthorized for use s components in systems intended for surgicl implnt into the body, or other pplictions intended to support or sustin life, or for ny other ppliction in which the filure of the Dynstrem product could crete sitution where personl injury or deth my occur. If you use the Products for such unintended nd unuthorized pplictions, you do so t your own risk nd you shll indemnify nd hold Dynstrem nd its officers, employees, subsidiries, ffilites, nd distributors hrmless ginst ll clims, costs, dmges, nd expenses, nd resonble ttorney fees rising out of, directly or indirectly, ny clim of personl injury or deth ssocited with such unintended or unuthorized use, even if such clim lleges tht Dynstrem ws negligent regrding the design or mnufcture of the Product Dynstrem Innovtions Inc. All Rights Reserved.

3 3 of 68 Revision History Revision Effective Dte Description 1.0 April 9, 2005 Preliminry Version Relese 1.31 April 29, 2005 Externl Relese 2.0 December 6, 2005 Description of shred chnnel brodcst ddress, new event codes, ddition of vrious exmples nd other minor updtes 2.1 September 18, 2006 Deleted brodcst cknowledged nd burst chnnel events from the tble. 2.2 November 14, 2006 Added new messges for relese 2.3 Mrch 30, 2007 Added SensRcore messge support 2.4 April 24, 2007 Added Scnning Chnnel Detils 2.5 My 28, 2007 Added Extended Dt Messge Description 2.6 June 7, 2007 Updted EVENT tble nd dded tble describing which events re vilble on which products. 2.7 June 27, 2007 Minor fixes 2.8 July 2, 2007 Document formt chnge 2.9 July 6, 2007 Document formt chnge

4 4 of 68 Tble of Contents 1 Introduction The ANT Product Fmily Network topologies ANT Nodes ANT Chnnels Chnnel Configurtion Network RF Frequency Chnnel ID Chnnel Type Chnnel Period Dt Types & Dt Formt Exmple Chnnel Configurtion Independent Chnnels Shred Chnnels Scnning Chnnels Estblishing chnnel Device Piring Piring Exmple ANT Interfce Messge Structure Host MCU Seril Interfce Physicl Lyer Host PC Seril Interfce Exmple ANT Network Implementtion Implementtion using Independent Chnnels Chnnel between Node B nd Node A Chnnel between Node C nd Node A Chnnel between Node D nd Node A Implementtion using Shred Chnnels Appendix A ANT Messge Detils ANT Messges Config Messges Control Messges Dt Messges Chnnel Event/Response Messges Requested Response Messges Test Mode ANT Messge Structure - Notes ANT Messge Summry ANT Product Cpbilities Interfce Events ANT Messge Detils ANT Constnts Configurtion Messges Control Messges Dt Messges Chnnel Response / Event Messges Requested Response Messges Test Mode Extended Dt Messges PC Functionl Interfce Configurtion ANT Librry Access Appendix B -- SensRcore NVM Messge Detils SensRcore NVM Messges NVM Messge Summry Seril NVM Messges...66

5 5 of 68 1 Introduction ANT is 2.4GHz bidirectionl wireless Personl Are Network (PAN) communictions technology optimized for trnsferring low-dt rte, low-ltency dt between multiple ANT-enbled devices. The ultr-low power consumption of the ANT chipset gurntees n extended bttery life even from low-cpcity supplies such s coin cell bttery, enbling use in hert rte monitors, bicycle computers, nd wrist wtches. ANT s smll size nd low implementtion cost llows effortless integrtion into the tiny form fctor of wrist wtches, PDAs, nd mobile phones. ANT provides crefree hndling of the Physicl, Network nd Trnsport OSI lyers. In ddition, it incorportes key low-level security fetures tht form the foundtion for user-defined sophisticted network security implementtions. ANT ensures dequte user control while considerbly lightening computtionl burden in providing simple yet effective wireless networking solution. Appliction / Presenttion Lyers Higher Level Security User Defined Network / Trnsport & Low Level Security Dt Link Lyer Physicl Lyer Implemented by ANT Figure 1-1: OSI Lyer model of ANT The interfce between ANT nd the Host ppliction hs been designed with the utmost simplicity in mind so tht ANT cn be esily nd quickly implemented into new devices nd pplictions. The encpsultion of the wireless protocol complexity within the ANT chipset vstly reduces the burden on the ppliction host controller, llowing low-cost 4-bit or 8-bit Microcontroller (MCU) to estblish nd mintin complex wireless networks. Dt trnsfers cn be scheduled in deterministic or d-hoc fshion. A burst mode llows for the efficient trnsfer of lrge mounts of stored dt to nd from PC or other computing device. The ANT system ggressively blnces functionlity, cost, size, nd power consumption within the constrints of mobile Personl Are Network. Typicl pplictions include sensor integrtion, tgging systems, remote monitoring, etc. A typicl ANT-enbled device consists of n ppliction host MCU interfced with n ANT module or chipset. The host MCU estblishes nd mintins communiction session to other remote ANT-enbled devices by mens of simple, bidirectionl, seril messge protocol. This document detils the protocol nd provides exmples of how to use ANT for wireless networking.

6 6 of 68 2 The ANT Product Fmily ANT technology hs been incorported into fmily of products tht llows prticulr implementtion to be scled to suit the needs of the ppliction nd the vision of the product designer. ANT technology is vilble in the following formts. ANT Single Chip & Chipset Intended for integrtion onto the customer s PCB nd interfced with host MCU. 1. Nordic Semiconductor nrf24ap1 A complete ANT implementtion integrted into single-chip RF protocol nd trnsceiver Integrted Circuit (IC). 2. Two-chip ANT solutions combine n ANT-protocol MCU with Nordic Semiconductor RF IC (such s the nrf2401a or nrf24l01). A vriety of two-chip options re vilble, providing either onewy or two-wy RF communictions, llowing the protocol to be scled with the needs of the ppliction. The two-chip solutions provide the ultimte in low power consumption. ANT Module A certifiction redy PCB module incorportes n ANT chipset nd cn be piggybcked onto n existing PCB, llowing for immedite product integrtion with miniml effort. ANT USB Stick The ANT USB Stick provides bridge between n ANT network nd PC. ANT USB comes with roylty-free drivers which cn be redistributed with ANT. ANT Development Kit Development Kits re vilble to provide timely nd efficient pth to ANT integrtion for both the embedded nd PC environments. The embedded environment offers esy integrtion with custom hrdwre. The PC environment provides USB interconnection long with drivers nd smple pplictions. ANT PC Interfce Softwre A roylty-free PC softwre librry provides n interfce to the ANT USB Stick nd ANT Development Kit, nd is redily integrted with customer s PC ppliction.

7 7 of 68 3 Network topologies The ANT protocol hs been designed from the ground up to support lrge rnge of sclble network topologies. It cn be s simple s 2-node unidirectionl connection between trnsmitting peripherl device nd receiver, or s complex s multi-trnsceiver system with full point-to-multipoint communiction cpbilities. Simple Networks Complex Networks Independent Networks Brodcst Networks Shred Chnnel Networks Figure 3-1: Exmple ANT Networks For the purpose of illustrtion, simple exmple is shown next to demonstrte the bsic concept of ANT chnnels.

8 8 of 68 Sensor 1 Chnnel A Chnnel C Hub 1 Hub 2 Chnnel B Sensor 2 Figure 3-2: A Simple ANT Network ANT usge nd configurtion re chnnel-bsed. Ech ANT node (represented by circle) cn connect to other ANT nodes vi dedicted chnnels. Ech chnnel generlly connects two nodes together; however single chnnel cn in fct connect multiple nodes. Ech chnnel hs s minimum single mster nd single slve prticipnt. The mster cts s the primry trnsmitter; the slve cts s the primry receiver. In Figure 3-2, lrge rrows indicte the primry dt flow from mster to slve, with smll rrows indicting reverse messge flow (e.g. Chnnel B, C). A chnnel with single rrow (e.g. Chnnel A) is used to represent one-wy link, which supports the use of lower-cost trnsmit-only nodes. Note tht n ANT node cn ct s both slve (e.g. Hub1 chnnel A, B) nd mster (e.g. Hub1 chnnel C) simultneously. The following tble describes the mster / slve sttus of ech of the chnnels shown in Figure 3-2 Chnnel Mster Slve Chnnel A Sensor1 (TX-Only) Hub1 (RX) Chnnel B Sensor2 (TX) Hub1 (RX) Chnnel C Hub1 (TX) Hub2 (RX)

9 9 of 68 4 ANT Nodes Ech node in n ANT network consists of n ANT protocol engine nd host controller (MCU). The ANT engine encpsultes the complexity of estblishing nd mintining ANT connections nd chnnel opertion within its firmwre. The host controller is thus free to hndle the prticulrs of n ppliction with only limited burden in inititing ANT communictions to other nodes, which it does vi simple seril interfce between host nd ANT engine, s shown in the following digrm. Node Node Host MCU Seril Interfce Ant Engine Figure 4-1: Contents of n ANT node

10 10 of 68 5 ANT Chnnels In this section, further detils re presented bout the ANT protocol s most fundmentl building block: the chnnel. As previously discussed, chnnel must be estblished to connect two nodes together. Node1 Chnnel A Node2 Node1 Node2 Host1 Host2 Ant1 Chnnel A Ant2 Mster Slve Figure 5-1: Chnnel communiction between two ANT nodes A chnnel consists of: A mster (e.g. Node1) A slve (e.g. Node2) 5.1 Chnnel Configurtion In order for two ANT devices to communicte, they require common chnnel configurtion tht includes informtion relted to the operting prmeters of chnnel. The following informtion is required to define chnnel configurtion. Network RF Frequency Trnsmission Type Device Type Chnnel Type Chnnel Period Dt Types

11 11 of 68 Dt Formt Although the configurtion of specific chnnel will likely remin constnt throughout its connection, mster cn mintin multiple chnnels tht differ in terms of chnnel configurtion prmeters Network ANT supports the estblishment of numerous unique public nd privte networks. A prticulr network my specify set of operting rules for ll prticipting nodes. In order for two ANT devices to communicte, they must be members of the sme network. This provides the bility to estblish network tht cn be purposely shred mong multiple vendors with the gol of estblishing n open system of interoperble devices. Conversely, privte network could be defined to ensure network privcy nd restrict ccess to intended prticipting devices. Chnnels cn be independently ssigned to different networks so tht it is possible for single ANT device to be member of multiple networks. The ANT Network hs two components which re described below Network Number The Network Number is n 8-bit field with the rnge of cceptble vlues being from 0 to the mximum number defined by the ANT implementtion. It cn be obtined by the host by querying the ANT system using the pproprite request messge. Plese refer to Section 9 for more detils. The defult Network Number is Network Key The Network Key is n 8-byte field which is configurble by the host ppliction. A prticulr Network Number will hve corresponding Network Key. The Network Number nd the Network Key together provide the bility to deploy network with vried levels of ccess control nd security options. By defult ANT firmwre ssigns the Network Number 0 with the defult Public Network Key. This network is open to ll prticipting devices nd hs no set rules governing its use. For more informtion on estblished public networks or inititing your own network, plese contct Dynstrem t RF Frequency ANT technology supports the use of ny of the vilble 125 unique RF operting frequencies. A chnnel will operte on single frequency throughout its existence, which must be known nd dhered to by both mster nd slve prior to the estblishment of chnnel. The RF frequency is n 8-bit field with cceptble vlues rnging from 0 to 124. This vlue represents the offset in 1MHz increments from 2400MHz, with the mximum network frequency being 2524MHz. For exmple, if network operting frequency of 2450MHz ws desired, the RF frequency field will be set s 50. Desired _ RF _ Frequency( MHz) 2400MHz RF _ Frequency _ vl = 1MHz The following eqution cn be used to determine the vlue for the RF frequency field.

12 12 of 68 The defult RF frequency field vlue is 66 nd represents the network operting frequency of 2466MHz. It is importnt to note tht it is not necessry to use different RF frequencies to support multiple coexisting chnnels. The TDMA nture of the ANT system mens tht lrge number of chnnels cn coexist on single common RF frequency. It is the product developer s responsibility to ensure tht RF frequencies used will comply with the regultions of ll regions of the world in which this equipment is to be used Chnnel ID The most bsic descriptor of chnnel is its chnnel ID. In order to estblish n ANT chnnel, the host must specify its chnnel ID. It s 4-byte homogenous vlue tht contins 3 fields Trnsmission Type, Device Type nd Device Number. They re detiled below Trnsmission Type The trnsmission type is n 8-bit field used to define certin trnsmission chrcteristics of device. Exmple usge is the SensRcore implementtion which defines the two lest significnt bits of the trnsmission type to define the presence nd size of shred ddress field t the beginning the dt pylod, nd bit 3 defines the next byte following the ddress field Device Type The device type is n 8-bit field used to denote the type of ech prticipting network device. This field is used to differentite between multiple nodes of network devices so tht prticipnts re wre of the vrious clsses of connected nodes nd cn decode received dt ccordingly. For exmple, hert rte monitor will be ssigned different device type thn bike speed sensor nd the hert rte monitor s dt pylod will be interpreted ccordingly. A receiver node my communicte to multiple device types but its device type must be set to 0. Plese note tht the most significnt bit of the Device Type is used to control device piring. More informtion on device piring cn be found in Section 6. Specific implementtion-level informtion bout chnnel ID usge is provided in the chnnel ID functionl description locted in Section Device Number The device number is 16-bit field tht is ment to be unique for given device type. Typiclly, this my be correlted to the seril number of the device or could be rndom number generted by the device if the process of setting seril numbers for prticulr product is unvilble. This field my lso be used s wild crd during device piring s described in the chnnel ID functionl description locted in Section Chnnel Type Chnnel type specifies the type of communiction tht will occur on the chnnel. It is n 8-bit field with only certin cceptble vlues in the rnge of 0 to 255. The vlues re specified in the tble below.

13 13 of 68 Vlue 0x00 0x10 0x20 0x30 0x40 0x50 Description Bidirectionl Receive Chnnel Bidirectionl Trnsmit Chnnel Shred Bidirectionl Receive Chnnel Shred Bidirectionl Trnsmit Chnnel Receive Chnnel with option to not cler wild crd upon successful mtch. Trnsmit Only Chnnel Note tht the chnnel type must be specified prior to estblishing chnnel. For bidirectionl chnnel type, the dt flow for the forwrd chnnel is determined by the mode specified. For exmple, if node estblishes bidirectionl receive chnnel type, it will ssume the role of the receiver on the forwrd chnnel nd hs the potentil to trnsmit on the reverse chnnel. Plese refer to Sections nd , below, for more informtion on the concept of forwrd nd reverse chnnels Chnnel Period The chnnel period represents the bsic messge rte of dt pckets sent by the mster. By defult brodcst dt pcket will be sent or received on every timeslot t this rte. The chnnel messge rte cn rnge from 0.5Hz to bove 200Hz with the upper limit being implementtion specific. The defult messge rte is 4Hz, which is chosen to provide good performnce s described below. It is recommended tht the messge rte be left t the defult to provide more redily discoverble networks with good performnce chrcteristics. The chnnel period is 16-bit field with its vlue determined s shown in the following eqution Chnnel _ Period _ vl = MessgeRte( Hz) For exmple, to hve messge rte of 4Hz on chnnel, the chnnel period vlue must be set to / 4 = The mximum messge rte (or the minimum chnnel period) depends on the computtionl cpcity of the system. High dt rtes in combintion with multiple ctive chnnels will substntilly limit the mximum messge rte. Proper ssignment of chnnel period is criticl nd it is impertive to be mindful of the following issues. The messge rte is directly proportionl to the power consumption. Plese see respective ANT product dtsheet for detils. A smll chnnel period llows for higher dt-trnsfer rtes. A smll chnnel period results in fster successful device-serch opertions Dt Types & Dt Formt The chnnel dt type determines the type of communiction tht will occur between the prticipnts of tht chnnel. The dt type is specified by the host ppliction using the messge ID field of the seril messge tht it provides to the ANT system. Plese refer to Section 7 for more detils on the seril interfce between host nd ANT.

14 14 of 68 The overll communiction hs two levels one governs the direction (mster to slve or vice vers) nd the second specifies the type. They re described in detil in the following sections Forwrd Chnnel Communiction (Mster Slve) Dt messges re trnsmitted from the mster to slve on every chnnel timeslot. Three bsic dt types re supported which re listed below. 1. Brodcst 2. Acknowledged 3. Burst Brodcst Dt Brodcst dt is the most bsic dt type nd is the system defult. Brodcst dt is sent from the chnnel mster to the slve on every chnnel timeslot. This form of dt is never cknowledged, nd so the chnnel mster will be unwre in the cse of lost dt pckets. In the cse of one-wy trnsmission link (trnsmit-only node communicting to receiver), brodcst dt is the only vilble dt type due to the inbility of n cknowledgement. Brodcst dt consumes the lest mount of RF bndwidth nd system power consumption. It is the preferred choice of communiction where occsionl dt loss is not criticl (though it should be noted tht ny dt loss will be very limited in most non-hostile RF environments). An exmple system where occsionl dt loss is not criticl is tht of temperture logging system, where chnges in temperture re reltively slow compred to the communictions messge rte. Brodcst dt is sent t every time slot of the messge period. If no new dt hs been provided by the host, the previous messge is re-trnsmitted Acknowledged Dt At ny time during n estblished two-wy connection, the mster cn choose to send n cknowledged dt pcket in plce of brodcst dt pcket. The slve will respond to the cknowledged dt pcket with n cknowledgment messge bck to the mster. The mster s host controller will be notified of ech cknowledged dt pcket s success or filure. The host my choose to send every dt pcket s cknowledged dt, or mix brodcst nd cknowledged dt s pproprite to the prticulr ppliction. Acknowledged dt pckets use more RF bndwidth nd consume more power, which should be tken into considertion when designing power-sensitive pplictions. Acknowledged dt is idelly suited for the trnsmission of criticl control dt where 100% dt trnsmission integrity is required. There is no utomtic re-trnsmission of uncknowledged dt pckets. If the dt type isn t specified s Acknowledged or if no new dt is provided before the trnsmit time slot, the messge is sent s Brodcst dt type Burst Dt Burst dt trnsmission provides mechnism for the mster to send lrge mounts of dt to the slve. A burst trnsction begins t the next scheduled timeslot, nd consists of series of continuous

15 15 of 68 cknowledged dt messges from mster to slve. Any lost messges re utomticlly retrnsmitted. There is no limit on the durtion of burst trnsction. A burst trnsction tkes precedence over ll other chnnels on both prticipting nodes. If there re other chnnels in the system, cre should be tken to service them with resonble frequency. Although the ANT protocol is robust nd cn hndle outges cused by burst trnsfers or other externl interference, excessive chnnel strvtion my led to undesirble behvior Reverse Chnnel Dt (Slve Mster) At the end of every chnnel timeslot, the slve my optionlly send dt to the mster. The sme three bsic dt types s described in Section (Mster Slve) re supported. 1. Brodcst 2. Acknowledged 3. Burst Brodcst Dt Brodcst dt is sent from the slve to the mster t the end of chnnel timeslot if expressly requested by the Host MCU of the slve (without request, no dt is sent by defult). As is the cse for the forwrd chnnel, this form of dt is never cknowledged, nd so the chnnel slve will be unwre in the cse of lost dt pckets. Brodcst messges re sent only once on the reverse chnnel. In other words, there is no brodcst messge sent on every time slot of the messge period in the reverse chnnel s opposed to the forwrd chnnel Acknowledged Dt At ny time during n estblished two-wy connection, the slve cn optionlly choose to send n cknowledged dt pcket to the mster t the end of chnnel timeslot. The mster will respond to ny cknowledged dt pcket with n cknowledgment in the form of vlid receipt of the pcket. The slve s host controller will be notified of ech cknowledged dt pcket s success or filure. The slve will still lwys know if the cknowledged dt pcket hs successfully completed. Similr to the forwrd chnnel, there is no utomtic re-trnsmission of uncknowledged dt pckets Burst Dt Bulk dt my be sent from the slve to the mster in much the sme wy s described from mster to slve in Section (forwrd chnnel). A reverse burst trnsfer will commence t the end of the forwrd chnnel timeslot. The host ppliction softwre on both the mster nd slve sides should be implemented to expect common dt type (i.e. brodcst vs. cknowledged vs. burst) to be utilized s pproprite for prticulr ppliction. The specific formt of the contents of the dt pylod must be previously estblished by both host controllers such tht dt cn be properly decoded nd interpreted Exmple Chnnel Configurtion Below is n exmple of chnnel configurtion for simple ppliction.

16 16 of 68 Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 1 Smple Seril Number Trnsmission Type 1 Trnsmission Type (no shred ddress) Device Type 1 Smple Device Type Chnnel Type 0x10 Bidirectionl Trnsmit Chnnel Chnnel Period Hz Messge Rte Dt Type 0x4E Brodcst 5.2 Independent Chnnels An independent chnnel hs only one mster nd one slve. It is possible for the mster or the slve to be mster or slve to nother or number of other nodes. But from the point of view of n independent chnnel, there is only one of ech. For exmple, consider the four-node network in Figure 3-2. All chnnels hve only one mster nd one slve. A brodcst network shown in Figure 3-1 is lso formed using independent chnnels even though the dt from one mster is received by mny slves. Such network hs unique mster who doesn t purposely initite communiction with multiple slves on the sme chnnel. Although independent chnnels offer simplicity in implementtion node cn only support limited number of simultneous independent chnnels within the confines of the system s computtionl bility. For exmple, the nrf24ap1 cn support 4 independent chnnels. For n implementtion exmple using independent chnnels, refer to Section Shred Chnnels Shred chnnels cn be used where single ANT node must receive nd possibly process dt from mny nodes. In this scenrio, multiple nodes will shre single independent chnnel to communicte with the centrl node. An exmple of shred chnnel network is provided in Figure 3-1. Shred chnnels re mde possible by the use of two-byte Shred Chnnel Address field nd specific vlue for the Chnnel Type; both re controlled by the host ppliction. The Shred Chnnel Address field replces the first two bytes of the dt pylod provided by the host ppliction to ANT if chnnel is defined s being shred chnnel. A shred chnnel cn support more thn slve devices using single independent chnnel. In shred chnnel network, the node tht is required to estblish communiction with mny other nodes must initite the shred chnnel s the mster. All other nodes tht need to ccess this shred chnnel must be configured s the slves. The chnnel must be configured s shred chnnel t ll nodes, mster or slve, tht my ccess tht chnnel. The mster controls the communiction by providing the Shred Chnnel Address in its forwrd chnnel messge. A slve will respond on the reverse chnnel only if its Shred Chnnel Address mtches the one it receives in the forwrd chnnel messge from the mster. In either the mster or the slve node, messges re relesed to the host ppliction only if the Shred Chnnel Address of the received messge mtches wht the ANT system is configured to respond to t the time or if the Shred Chnnel Address is 0. Typiclly, the slve will only be configured once to respond to prticulr Shred Chnnel Address. However, the mster will require continuous reconfigurtion if communiction with multiple slves over the shred chnnel is desired. The mster cn send dt to ll slves t the sme time using the Shred Chnnel Address of 0.

17 17 of 68 The shred chnnel concept is extensible to cknowledged dt nd burst dt trnsctions. In burst dt trnsctions, only the 1 st dt pcket requires the Shred Chnnel Address in the dt pylod, the remining dt pckets my contin only the ppliction dt. Plese refer to Section 8.2 for smple network implementtion using shred chnnels. 5.4 Scnning Chnnels Scnning chnnels re nother method tht cn be used where single ANT node must receive nd possibly process dt from mny nodes. In this scenrio, multiple nodes, setup s trnsmitters, will brodcst on single RF frequency to communicte with the centrl node which receives full time. An exmple of scnning chnnel network would be conceptully similr to tht of the shred chnnel network provided in Figure 3-1. In scnning chnnel, the node tht is required to estblish communiction with mny other nodes is setup s receiver tht is continuously ctive. Due to this configurtion, this node drws significnt power (~18 ma) s its RF is ctive continuously. The trnsmit nodes should hve unique device numbers in the chnnel ID so tht messges cn be correlted to specific devices esily. 5.5 Estblishing chnnel The following steps must be tken in order to properly estblish communiction chnnel between two ANT nodes. The prerequisite for estblishing chnnel is tht the mster nd the slve must hve common knowledge of the chnnel configurtion s outlined in Section 5.1. Procedure: 1. Prior to estblishing chnnel, the mster selects its intended network type, operting frequency, nd messge rte. 2. The mster estblishes the chnnel by trnsmitting 8-byte pylod dt pckets in prticulr timeslot t the estblished messge rte. The ANT chnnel will be mintined indefinitely t the given timeslot nd messge rte. The chnnel mster s host controller will optionlly provide new dt pylods to the ANT engine for continuing trnsmissions. 3. The slve selects the network type, operting frequency, nd messge rte of the mster from which it ll ttempt to receive. 4. The slve estblishes new ANT chnnel by serching for the intended unique mster. 5. Once the mster hs been locted, connection is estblished, nd the slve receives dt indefinitely from the mster t the given timeslot nd messge rte.

18 18 of 68 6 Device Piring The ct of piring two devices (mster with slve) involves estblishing reltionship between two nodes tht wish to communicte with one nother in future communiction sessions. This reltionship cn be permnent, semi-permnent or trnsitory. A piring opertion consists of slve device cquiring the unique ID of the mster device. If permnent piring is desired, the slve node should store the mster s ID to be used to open chnnel with this ID in ll subsequent communiction sessions. In semi-permnent sitution, the slve my wish to occsionlly purge ny stored ID nd pir with new mster. In trnsitory sitution, the slve my pir with mster on temporry bsis only. Plese note tht if mster uses only brodcst messging, or if it uses the shred chnnel feture, multiple slves my pir nd communicte with the sme mster. Estblishing chnnel involves the brodcsting of unique ID by the mster, nd serch nd cquisition of this ID by slve. In the cse where slve does not hve knowledge of specific mster ID, piring mechnism is vilble. The slve cn serch for mster with wild crd ID; upon successful serch result the specific ID of the mster cn be stored nd used in the sme mnner s previously described for ll future communictions. 6.1 Piring Exmple An exmple of piring opertion on network of three remote temperture sensors (msters) nd one bse unit (slve) is shown in Figure 6-1. Temp Sensor 1 Chnnel 0 Bse Unit Chnnel 2 Temp Sensor 3 Temp Sensor 2 Chnnel 1 Figure 6-1: Exmple ANT Network for use in Device Piring The bse unit wishes to estblish permnent reltionship with ll temperture sensors. To initite the piring opertion, ech temperture sensor should be plced into piring mode. From user perspective, it is left to the ppliction to define the method of entry into piring mode for exmple this could be done upon initil insertion of bttery, or by mens of button push by the user, etc. As fr s the ANT seril messge interfce is concerned, the host controller invokes piring mode by sending the following messges to the ANT engine (See Section 9.3 for detils):

19 19 of Configure Chnnel 2. Set Chnnel ID (discoverble) 3. Open TX Chnnel 4. Begin trnsmitting dt on its timeslot At this time, the bse unit (slve) must be prepred to serch for the ID of the pproprite device type (temperture sensor). It performs the following: 1. Configure Chnnel 2. Set Chnnel ID (Trnsmission Type = Specific or Wild crd, Device Type = Temperture sensor with Piring Bit Set, Device Number = Wild Crd) 3. Open RX Chnnel The bse unit finds temperture sensor ID s reported by the slve ANT engine to the host controller; the ID is stored by the host controller for future chnnel estblishment. This procedure is repeted for ll three temperture sensors. The temperture sensor cn then choose to disble its discoverbility fter time-out period (or fter connection cknowledgement from the bse unit if bidirectionl trnsmission is supported) in order to be invisible to future discovery by other slve devices. This piring process is required only once for the lifetime of n ANT system if permnent reltionship between two specific devices is desired. In such cse, piring my be performed during product mnufcturing (fctory environment) to remove the burden from the customer.

20 20 of 68 7 ANT Interfce The host ppliction nd ANT communicte through simple seril interfce. The host cn tke the form of n embedded microcontroller or PC, but the bsic functionlity remins unchnged. 7.1 Messge Structure A typicl seril messge between the host nd ANT engine hs the following bsic formt. SYNC MSG LENGTH MSG ID DATA_1 DATA_2... DATA_N CHECKSUM Figure 7-1: ANT Seril Messge Structure As shown bove, ech messge begins with SYNC byte nd ends with CHECKSUM. The bytes re sent LSBit first. The following tble describes ech component of the seril messge shown bove. Byte # Nme Length Description 0 SYNC 1 Byte Fixed vlue of (MSB:LSB) 1 MSG LENGTH 1 Byte Number of dt bytes in the messge. 1 < N < 9 2 MSG ID 1 Byte Dt Type Identifier 0: Invlid : Vlid Dt Type (See Section 9 for detils) 3..N+2 DATA_1..DATA_N N Bytes Dt bytes N+3 CHECKSUM 1 Byte XOR of ll previous bytes including the SYNC byte A complete summry of supported messges between host nd the ANT engine is presented in Section 9. The tble is vlid for both types of ANT interfces of Host MCU ANT, nd Host PC Interfce ANT. Messge formtting is first presented in summry form, which includes messge length, ID nd dt fields of ech respective messge type. Plese note tht the multi-byte fields hve been implemented in little endin formt. Using the exmple of Chnnel ID messge, the lest significnt byte of Device Number is ssigned to Dt1, nd the most significnt byte to Dt Host MCU Seril Interfce Physicl Lyer The ANT seril interfce between host controller nd ANT engine cn be implemented over either synchronous or synchronous connection. The connection type is selected by the product designer s preferred for the given implementtion. The precise detils of the physicl nd electricl interfce of ech ANT product cn be found in ech respective ANT product dtsheet. 7.3 Host PC Seril Interfce The primry method of communiction between ANT nd PC is through the ANT PC Interfce Librry. The components of this librry re listed in Section 9. 8 Exmple ANT Network Implementtion A smple network implementtion to present the fetures of the ANT engine is shown in Figure 8-1 below.

21 21 of 68 Node D Node A Node C Node B Figure 8-1: Exmple ANT Network for implementtion The simple four-node network describes n ppliction where informtion from multiple nodes (B, C nd D) is to be received nd possibly nlyzed by single centrl node (A). The rrows indicte the primry flow of informtion between the corresponding nodes. The following cn be ssumed. Node B is to use the brodcst dt type Node D is to use the brodcst dt type Node C requires the cknowledged dt type All of the network prerequisites, such s network type, device ID, RF Frequency etc. re known between ll nodes Device piring hs lredy been performed between the msters nd their corresponding slves Sections 8.1 nd 8.2 describe two methods of utilizing ANT to deploy the bove exmple network. 8.1 Implementtion using Independent Chnnels Using independent chnnels is the simplest method by which the forementioned network cn be implemented. Given the bove ssumptions, three independent chnnels re required. The configurtion for ech chnnel is shown in the following tbles. Chnnel between Node B nd Node A where Node B will be the mster:

22 22 of 68 Node Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 1 Seril Number of Node B B A Trnsmission Type 1 Trnsmission Type (no shred ddress) Device Type 1 Device Type of Node B Chnnel Type 0x10 Bidirectionl Trnsmit Chnnel Chnnel Period 8192 Defult 4Hz Messge Rte Dt Type 0x4E Brodcst Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 1 Seril Number of Node B Trnsmission Type 1 Trnsmission Type (no shred ddress) Device Type 1 Device Type of Node B Chnnel Type 0x00 Bidirectionl Receive Chnnel Chnnel Period 8192 Defult 4Hz Messge Rte Dt Type 0x4E Brodcst Chnnel between Node C nd Node A where Node C will be the mster: Node Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 10 Seril Number of Node C C A Trnsmission Type 1 Trnsmission Type (no shred ddress) Device Type 2 Device Type of Node C Chnnel Type 0x10 Bidirectionl Trnsmit Chnnel Chnnel Period 8192 Defult 4Hz Messge Rte Dt Type 0x4F Acknowledged Network Type 0 Defult Public Network RF Frequency 72 Frequency 2472MHz Device Number 10 Seril Number of Node C Trnsmission Type 1 Trnsmission Type (no shred ddress) Device Type 2 Device Type of Node C Chnnel Type 0x00 Bidirectionl Receive Chnnel Chnnel Period 8192 Defult 4Hz Messge Rte Dt Type 0x4F Acknowledged Chnnel between Node D nd Node A where Node A will be the mster:

23 23 of 68 Node Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 2 Seril Number of Node D D A Trnsmission Type 1 Trnsmission Type (no shred ddress) Device Type 1 Device Type of Node D Chnnel Type 0x10 Bidirectionl Trnsmit Chnnel Chnnel Period 8192 Defult 4Hz Messge Rte Dt Type 0x4E Brodcst Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 2 Seril Number of Node D Trnsmission Type 1 Trnsmission Type (no shred ddress) Device Type 1 Device Type of Node D Chnnel Type 0x00 Bidirectionl Receive Chnnel Chnnel Period 8192 Defult 4Hz Messge Rte Dt Type 0x4E Brodcst Section detils the sequence of events nd messge trnsctions between the host nd ANT for ech prticipting node s the bove chnnels re estblished nd the network is formed. Refer to Section 5.4 for more informtion on the procedure for estblishing chnnel Chnnel between Node B nd Node A The chnnel between Node B nd Node A is estblished s follows. Mster: Node B The host issues the ANT_AssignChnnel() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is ssigned t the discretion of the host. The host issues the ANT_SetChnnelID() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is the sme s step 1. The host opens the chnnel using the ANT_OpenChnnel() messge. The host provides ANT with dt s it sees fit using the ANT_SendBrodcstDt() messge. Plese note tht the frequency t which the host provides ANT with new dt my not be the sme s the chnnel period. ANT will trnsmit the sme dt if no new dt is mde vilble by the host. However, pproprite sfegurds to ccount for such repeted messges should be in plce on the slve. Slve: Node A The host issues the ANT_AssignChnnel() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is ssigned t the discretion of the host. The host issues the ANT_SetChnnelID() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is the sme s in the previous step.

24 24 of 68 The host opens the chnnel using the ANT_OpenChnnel() messge. The host will now be informed using the ChnnelEventFunc(Chn, EV) type messge from ANT whenever the messge from Node B is received. Bsed on the chnnel configurtion settings, this will hppen t 1Hz Chnnel between Node C nd Node A The chnnel between Node C nd Node A is estblished s follows. Mster: Node C The host issues the ANT_AssignChnnel() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is ssigned t the discretion of the host. The host issues the ANT_SetChnnelID() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is the sme s in step 1. The host opens the chnnel using the ANT_OpenChnnel() messge. The host provides ANT with ppliction dt tht is to be sent through the chnnel s n cknowledged messge using the ANT_SendAcknowledgedDt() messge. ANT then communictes the success or filure of the trnsction bck to the host using messge code embedded inside chnnel event messge. If ANT doesn t receive n cknowledge bck from the slve, it will not utomticlly resend the messge. The host must process the filure messge code nd hndle the retries itself. Plese refer to the Appendix for list of the vrious messge codes. Slve: Node A The host issues the ANT_AssignChnnel() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is ssigned t the discretion of the host. The host issues the ANT_SetChnnelID() messge with the configurtion fields filled s mentioned in the tble bove. The chnnel number is the sme s in the previous step. The host opens the chnnel using the ANT_OpenChnnel() messge. The host will now be informed using the ChnnelEventFunc(Chn, EV) type dt messge whenever n cknowledged messge is received from Node C. The cknowledgement of the received messge is hndled within ANT; hence the host only needs to process or use the received dt. The messges re received t the rte specified by the chnnel configurtion settings Chnnel between Node D nd Node A The procedure for estblishing the chnnel t Node D is exctly the sme s tht of Node B. The host of Node C will open third chnnel to communicte with Node B in the sme wy s for Node A. The bove ANT network will continue to function s it ws deployed unless n ppliction lyer event dicttes otherwise. 8.2 Implementtion using Shred Chnnels Another method by which the network shown in Figure 8-1 cn be implemented is with the use of single shred chnnel insted of three independent chnnels. The trde-off is the incresed computtionl burden on the host of the network hub (Node A) nd the reduction in the mount of mximum useful dt per pcket from 8 bytes to 6 bytes.

25 25 of 68 As mentioned in the description of shred chnnels erlier, the min receiver will become the mster of the shred chnnel with the trnsmitters its slves. Ech slve will hve unique two-byte shred chnnel ddress which will be known only to itself nd the mster. Moreover, ll nodes on the shred chnnel network will hve to be trnsceivers, s opposed to the independent chnnel implementtion where nodes B nd D could be trnsmit only. The updted network digrm for this setup is shown below. Node A Mster Shred Chnnel Node B Slve Node D Slve Shred Chnnel Address = 1 Shred Chnnel Address = 3 Node C Slve Shred Chnnel Address = 2 Figure 8-2: Shred chnnel implementtion of smple network The chnnel configurtion for ech node is shown in the tble below. Slve Node B Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 3 Seril Number of Node A Trnsmission Type 3 Trnsmission Type (2 byte shred ddress) Device Type 3 Device Type of Node A Chnnel Type 0x20 Shred Receive Chnnel Chnnel Period 2370 ~12Hz Messge Rte Dt Type 0x4E Brodcst

26 26 of 68 Slve Node C Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 3 Seril Number of Node A Trnsmission Type 3 Trnsmission Type (2 byte shred ddress) Device Type 3 Device Type of Node A Chnnel Type 0x20 Shred Receive Chnnel Chnnel Period 2370 ~12Hz Messge Rte Dt Type 0x4F Acknowledged Slve Node D Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 3 Seril Number of Node A Trnsmission Type 3 Trnsmission Type (2 byte shred ddress) Device Type 3 Device Type of Node A Chnnel Type 0x20 Shred Receive Chnnel Chnnel Period 2370 ~12Hz Messge Rte Dt Type 0x4E Brodcst Mster Node A Prmeter Vlue Description Network Type 0 Defult Public Network RF Frequency 66 Defult Frequency 2466MHz Device Number 3 Seril Number of Node A Trnsmission Type 3 Trnsmission Type (2 byte shred ddress) Device Type 3 Device Type of Node A Chnnel Type 0x30 Shred Trnsmit Chnnel Chnnel Period 2370 ~12Hz Messge Rte Dt Type 0x4E Brodcst Plese note: The Network Type, RF Frequency, Device Number, Trnsmission Type nd Device Type re controlled by the mster (Node A). All slves tht wnt to use this shred chnnel must dhere to these prmeters. The ppliction-level chnnel periods re the sme for Node B (4Hz), Node C (4Hz) nd Node D (4Hz) s they were in the implementtion using independent chnnels. However, the mster needs the shred chnnel to operte t 12Hz (the sum of the messge rtes of ll slve nodes) t the very lest to suffice the requirements for ech slve. Since there is only one shred chnnel, ll slves will hve to bide by the rules of the chnnel initited by the mster. Hence, they will hve to estblish chnnels with the sme

27 27 of 68 messge rte s the mster. However, the host of ech of the slve nodes cn still communicte with ANT t only 4Hz. The following steps need to be tken for implementing the 4-node ANT network using single shred chnnel. Mster: Node A The host issues the ANT_AssignChnnel() messge with the configurtion fields filled s shown in the tble bove. The chnnel number is ssigned t the discretion of the host. The host issues the ANT_SetChnnelID() messge with the configurtion fields filled s shown in the tble bove. The chnnel number is the sme s in step 1. The host ssigns the chnnel s messge rte using the ANT_SetChnnelPeriod() messge nd the vlue listed in the bove tble. The host opens the chnnel using the ANT_OpenChnnel() messge. The host provides ANT with n ANT_SendBrodcstDt() messge, with the first two dt bytes representing the shred chnnel ddress of the slve to which the next RF messge is ddressed. ANT informs the host ech time messge is received on the reverse chnnel of the RF messge tht ws sent to the slve with the corresponding shred chnnel ddress. For this prticulr network, ech slve would send messge bck to the mster Node A ech time its shred chnnel ddress ppers. Slve: Node B The host issues the ANT_AssignChnnel() messge with the configurtion fields filled s shown in the tble bove. The chnnel number is ssigned t the discretion of the host. The host issues the ANT_SetChnnelID() messge with the configurtion fields filled s shown in the tble bove. The chnnel number is the sme s in step 1. The host sets the chnnel period using the ANT_SetChnnelPeriod() to the sme messge rte s the mster Node A. The host opens the chnnel using the ANT_OpenChnnel() messge. The host sends single Send_BrodcstDt() messge with the first two bytes s the shred chnnel ddress of Slve Node B to configure ANT to listen to the messges tht re ddressed to Slve Node B. The host will now be informed ech time ANT receives messge from the mster on the chnnel tht hs the shred chnnel ddress of Node B. For this ppliction, the host would provide dt to ANT to be sent bck to the mster on the reverse chnnel using the ANT_SendBrodcstDt() messge t 4Hz rte. ANT will send the dt on the reverse chnnel whenever it receives the properly ddressed messge on the forwrd chnnel. Slve: Node C The host issues the ANT_AssignChnnel() messge with the configurtion fields filled s shown in the tble bove. The chnnel number is ssigned t the discretion of the host. The host issues the ANT_SetChnnelID() messge with the configurtion fields filled s shown in the tble bove. The chnnel number is the sme s in step 1.

28 28 of 68 The host sets the chnnel period using the ANT_SetChnnelPeriod() to the sme messge rte s the mster Node A. The host opens the chnnel using the ANT_OpenChnnel() messge. The host sends single Send_BrodcstDt() messge with the first two bytes s the shred chnnel ddress of Slve Node C to configure ANT to listen to the messges tht re ddressed to Slve Node C. The host will now be informed ech time ANT receives messge from the mster on the chnnel tht hs the shred chnnel ddress of Node C. For this ppliction, the host would provide dt to ANT to be sent bck to the mster on the reverse chnnel using the ANT_SendAcknowledgedDt() messge t 4Hz rte. ANT will send the dt on the reverse chnnel whenever it receives the properly ddressed messge on the forwrd chnnel. A chnnel event messge from ANT informs the host if n cknowledgement is received from the mster or if the dt is sent bck successfully. Slve: Node D The procedure is similr to the slve Node B procedure. The difference is tht ANT will be configured to inform the host when it receives messge with the shred chnnel ddress of Node D. The bove two network implementtions re to be used s mens for gining fmilirity with network design nd deployment using ANT. The smple network could be implemented in other more efficient wys using vrious dvnced fetures of ANT. In generl, n ppliction will govern the method of implementtion tht is best suited for its needs.

29 29 of 68 9 Appendix A ANT Messge Detils 9.1 ANT Messges A summry of the vrious messges tht comprise the seril interfce between ANT nd host is provided in Section Config Messges The ANT configurtion messges llow the Host to set or chnge vrious prmeters of chnnel, such s the network, device type, trnsmission type, messge rte, RF frequency etc. These messges re the first step in enbling system for ANT communiction Control Messges After desirble configurtion of n ANT chnnel or chnnels, the control messges provide method for supervising the RF s well the ctivity of the ANT system Dt Messges The finl step in estblishing ANT communiction, the dt messges form the bsic input nd output of dt from n ANT node. In typicl ppliction, the Host will spend most of its ANT specific time on hndling dt messges Chnnel Event/Response Messges The chnnel event/response messges re comprised of notifictions nd dt tht re sent from ANT to the Host. These include RF events tht occur on chnnel s well s messges tht provide informtion bout the stte of the ANT system Requested Response Messges The Host is ble to obtin informtion from ANT using request messges. ANT replies to the requests using response messges. These include summry of the cpbilities, version informtion nd sttus of chnnels Test Mode ANT lso ccepts specil test mode messges which llow the product developer or tester to verify proper opertion of the RF hrdwre but plcing ANT in RF CW mode. 9.2 ANT Messge Structure - Notes The From column in Section 9.3 denotes the direction of dt flow. An entry of ANT indictes dtflow from ANT Host. An entry of Host indictes dtflow from Host ANT. The Response column in Section 9.3 indictes whether ANT will send response messge to the respective commnd.

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19 Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

Chromebook Parent/Student Information

Chromebook Parent/Student Information Chromebook Prent/Student Informtion 1 Receiving Your Chromebook Student Distribution Students will receive their Chromebooks nd cses during school. Students nd prents must sign the School City of Hmmond

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Blackbaud The Raiser s Edge

Blackbaud The Raiser s Edge Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Rotating DC Motors Part II

Rotating DC Motors Part II Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

UNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510.

UNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510. UNITED STATES DEPARTMENT OF AGRICULTURE Wshington, D.C. 20250 ACTION BY: All Divisions nd Offices FGIS Directive 2510.1 12-11-73 FEDERAL TORT CLAIMS I PURPOSE This Instruction: A Sets forth the bsic provisions

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

File Storage Guidelines Intended Usage

File Storage Guidelines Intended Usage Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Project 6 Aircraft static stability and control

Project 6 Aircraft static stability and control Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

802.16e requirements from an operator s perspective

802.16e requirements from an operator s perspective 802.16e requirements from n opertor s perspective IEEE 802.16 Presenttion Submission Templte (Rev. 8.3) Document Number: IEEE S802.16e-03/23 Dte Submitted: 2003-03-10 Source: Anthony (Tony) Klinkert Voice:

More information

Pay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details

Pay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details With CreCredit... Strt cre immeditely Py over time with low monthly pyments For yourself nd your fmily Types of Promotionl Options tht my be vilble: Not ll enrolled helthcre prctices offer ll specil finncing

More information

Advanced Baseline and Release Management. Ed Taekema

Advanced Baseline and Release Management. Ed Taekema Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones

Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones Wireless Wkeups Revisited: Energy Mngement for VoIP over Wi-Fi Smrtphones Yuvrj Agrwl, Rnveer Chndr,AlecWolmn, Prmvir Bhl, Kevin Chin, Rjesh Gupt Microsoft Reserch, Microsoft Corportion, University of

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

STRM Log Manager Installation Guide

STRM Log Manager Installation Guide Security Thret Response Mnger Relese 2012.0 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Pulished: 2012-09-12 Copyright Notice Copyright 2012 Juniper

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007 elerning pltforms nd consulttion service t CU Presented by Judy Lo 31 August 2007 Agend The elerning guidelines How elerning cn lower your work burden nd enhnce lerning? The elerning pltforms The elerning

More information

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM

More information

Design Example 1 Special Moment Frame

Design Example 1 Special Moment Frame Design Exmple 1 pecil Moment Frme OVERVIEW tructurl steel specil moment frmes (MF) re typiclly comprised of wide-flnge bems, columns, nd bem-column connections. Connections re proportioned nd detiled to

More information

Commercial Cooling Rebate Application

Commercial Cooling Rebate Application Commercil Cooling Rebte Appliction Generl Informtion April 1 st 2015 through Mrch 31 st 2016 AMU CUSTOMER INFORMATION (Plese print clerly) Business Nme: Phone #: Contct Nme: Miling Address: City: Stte:

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Prescriptive Program Rebate Application

Prescriptive Program Rebate Application Prescriptive Progrm Rebte Appliction Check the pproprite progrm box for your rebte. OID Internl Use Only Cooling FSO (Fluid System Optimiztion) Foodservice Equipment Heting Lighting Motors & Drives Customer

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Morgan Stanley Ad Hoc Reporting Guide

Morgan Stanley Ad Hoc Reporting Guide spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Quick Start for Beginners to Drive a Stepper Motor

Quick Start for Beginners to Drive a Stepper Motor Freescle Semiconductor Appliction Note AN2974 Rev. 1, 06/2005 Quick Strt for Beginners to Drive Stepper Motor by: Mtthew Grnt 16-Bit Automotive Applictions Microcontroller Division Introduction This ppliction

More information

Humana Critical Illness/Cancer

Humana Critical Illness/Cancer Humn Criticl Illness/Cncer Criticl illness/cncer voluntry coverges py benefits however you wnt With our criticl illness nd cncer plns, you'll receive benefit fter serious illness or condition such s hert

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00 COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Active & Retiree Plan: Trustees of the Milwaukee Roofers Health Fund Coverage Period: 06/01/2015-05/31/2016 Summary of Benefits and Coverage:

Active & Retiree Plan: Trustees of the Milwaukee Roofers Health Fund Coverage Period: 06/01/2015-05/31/2016 Summary of Benefits and Coverage: Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge for: Single & Fmily Pln Type: NPOS This is only summry. If you wnt more detil bout your coverge nd costs, you cn get the complete

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

Quick Reference Guide: Reset Password

Quick Reference Guide: Reset Password Quick Reference Guide: Reset Pssword How to reset pssword This Quick Reference Guide shows you how to reset your pssword if you hve forgotten it. There re three wys to reset your SingPss pssword: 1) Online

More information

trademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007

trademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007 trdemrk nd symbol guidelines trdemrk guidelines The trdemrk Cn be plced in either of the two usul configurtions but horizontl usge is preferble. Wherever possible the trdemrk should be plced on blck bckground.

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

Uplift Capacity of K-Series Open Web Steel Joist Seats. Florida, Gainesville, FL 32611; email: psgreen@ce.ufl.edu

Uplift Capacity of K-Series Open Web Steel Joist Seats. Florida, Gainesville, FL 32611; email: psgreen@ce.ufl.edu Uplift Cpcity of K-Series Open Web Steel Joist Sets Perry S. Green, Ph.D, M.ASCE 1 nd Thoms Sputo, Ph.D., P.E., M.ASCE 2 1 Assistnt Professor, Deprtment of Civil nd Costl Engineering, University of Florid,

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Warm-up for Differential Calculus

Warm-up for Differential Calculus Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information