Master Software Tools User Guide (This Guide) in the Adobe Acrobat Reader (If the Reader Is Installed on the Computer)

Total Page:16

File Type:pdf, Size:1020Kb

Master Software Tools User Guide (This Guide) in the Adobe Acrobat Reader (If the Reader Is Installed on the Computer) User Guide Master Software Tools Anritsu Company Part Number: 10580-00439 490 Jarvis Drive Revision: B Morgan Hill, CA 95037-2809 Published: October 2019 USA Copyright 2019 Anritsu Company Front-2 PN: 10580-00439 Rev. B Master Software Tools UG Table of Contents Chapter 1—General Information 1-1 Introduction. 1-1 1-2 Features, Options, and Capabilities . 1-1 1-3 System Requirements . 1-2 Chapter 2—Quick Start--copy 2-1 Introduction. 2-1 2-2 Installation of MST . 2-1 2-3 Connection Methods. 2-1 2-4 Connection and Configuration Using LAN . 2-2 Ethernet LAN Connections . 2-2 Configure the Test Instrument’s IP Address with DHCP . 2-4 Configure the Test Instrument’s IP Address Manually . 2-6 Configure the Computer’s IP Address . 2-8 Configure MST . 2-13 Direct Ethernet Crossover Cable Connection . 2-14 2-5 Connection and Configuration with Other Methods . 2-21 USB Connection and Configuration. 2-21 Serial Connections and Configuration . 2-22 Chapter 3—Graphical User Interface (GUI) 3-1 Introduction. 3-1 3-2 Main Screen . 3-1 3-3 Menu Bar . 3-3 File. 3-3 Edit . 3-6 View. 3-7 Connection . 3-8 Sync. 3-9 Tools . 3-10 Window . 3-12 Help . 3-13 3-4 Toolbar . 3-14 3-5 Graphic Display Edit Toolbar . 3-17 3-6 Active Measurement Window . 3-19 3-7 File Resource Group. 3-19 Local File Resource Directory Window . 3-20 Device File List Window . 3-20 Open File List Window. 3-20 Network Window . 3-21 3-8 Measurement Preview/File Summary Windows . 3-21 3-9 Status Bar. 3-21 Master Software Tools UG PN: 10580-00439 Rev. B Contents-1 Table of Contents (Continued) 3-10 Context Menus & Plot Setup. 3-22 Common Context Menu Command Lines and Plot Setup Configurations. 3-22 Spectrum Analyzer (SPA) . 3-28 Cable and Antenna Analyzer (Vector Network Analyzer - VNA) . 3-29 WCDMA. 3-29 Interference Analyzer (IA) . 3-30 JPEG File. 3-32 Limit Line Node . 3-32 Power Meter, High Accuracy Power Meter, Fixed WiMAX, Mobile WiMAX, WCDMA . 3-33 TD-SCDMA Signal Analyzer . 3-34 Channel Scanner . 3-34 3-11 File Editors, Tools, and Other Miscellaneous Windows . 3-35 Print All Measurements . 3-35 Antenna Editor . 3-35 Cable Editor . 3-36 Signal Standard Editor. 3-36 Language Editor . 3-38 Pass Fail Editor . 3-38 XML Parameter File Editor . 3-39 SPA and VNA Plot Setup: Common Settings . 3-39 VNA Additional Plot Setup Settings . 3-42 Power Meter and High Power Accuracy Meter Plot Setup . 3-44 Enter IP Address . 3-44 Measurement Calculator (VNA). 3-45 DAT File Conversion Tool . 3-45 Distance-To-Fault . 3-45 Trace Rename Utility . 3-46 Product Updates . ..
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • Antenna Gain Measurement Using Image Theory
    i ANTENNA GAIN MEASUREMENT USING IMAGE THEORY SANDRAWARMAN A/L BALASUNDRAM A project report submitted in partial fulfillment of the requirement for the award of the degree Master of Electrical Engineering Faculty of Electrical and Electronic Engineering Universiti Tun Hussein Onn Malaysia JANUARY 2014 v ABSTRACT This report presents the measurement result of a passive horn antenna gain by only using metallic reflector and vector network analyzer, according to image theory. This method is an alternative way to conventional methods such as the three antennas method and the two antennas method. The gain values are calculated using a simple formula using the distance between the antenna and reflector, operating frequency, S- parameter and speed of light. The antenna is directed towards an absorber and then directed towards the reflector to obtain the S11 parameter using the vector network analyzer. The experiments are performed in three locations which are in the shielding room, anechoic chamber and open space with distances of 0.5m, 1m, 2m, 3m and 4m. The results calculated are compared and analyzed with the manufacture’s data. The calculated data have the best similarities with the manufacturer data at distance of 0.5m for the anechoic chamber with correlation coefficient of 0.93 and at a distance of 1m for the shield room and open space with correlation coefficient of 0.79 and 0.77 but distort at distances of 2m, 3m and 4m at all of the three places. This proves that the single antenna method using image theory needs less space, time and cost to perform it.
    [Show full text]
  • United States Patent (19) 11 Patent Number: 5,854,629 Redpath (45) Date of Patent: Dec
    USOO5854629A United States Patent (19) 11 Patent Number: 5,854,629 Redpath (45) Date of Patent: Dec. 29, 1998 54) ENHANCED SCROLLING TECHNIQUE FOR OTHER PUBLICATIONS CONTEXT MENUS IN GRAPHICAL USER The ABCs of Microsoft Office for Window 95 by Guy INTERFACES Hart-Davis, Copy right 1996, ISBN: 0-7821-1866–6. Primary Examiner Raymond J. Bayerl 75 Inventor: Richard J. Redpath, Cary, N.C. Assistant Examiner-Cuong T. Thai Attorney, Agent, or Firm-Gregory M. Doudnikoff 73 Assignee: International Business Machine 57 ABSTRACT Corporation, Armonk, N.Y. A technique is provided for permitting only a predetermined number of panes of a context menu to be displayed and the 21 Appl. No.: 774,560 Scrolling of the context menu for undisplayed panes. Before 22 Filed: Dec. 31, 1996 a context menu is displayed in a graphical user interface, it is determined whether the total number of panes or options (51) Int. Cl. .................................................. G06F 3/00 in the context menu exceeds the number of panes or options 52 U.S. Cl. .......................... 345/341; 345/123: 345/343; to be displayed at One time. If so, upon displaying the 345/973 context menu, a Selectable mechanism is displayed along the bottom edge of the context menu. User Selection of the 58 Field of Search ..................................... 345/123, 341, Selectable mechanism causes the context menu to Scroll up 345/343,973 to display previously undisplayed panes or options. When it is determined that panes logically exist above the top most displayed pane, a Selectable mechanism is displayed along 56) References Cited the top edge of the context menu, Such that user Selection of the top mechanism causes the Scrolling of the panes down.
    [Show full text]
  • Price List/Order Terms
    PRICE LIST/ORDER TERMS 575 SE ASHLEY PLACE • GRANTS PASS, OR 97526 PHONE: (800) 736-6677 • FAX: (541) 471-6251 WIRELESS MADE SIMPLE www.linxtechnologies.com RF MODULES Prices Effective 02/04/04 Linx RF modules make it easy and cost-effective to add wireless capabilities to any product. That’s because Linx modules contain all the components necessary for the transmission of RF. Since no external components (except an antenna) are needed, the modules are easily applied, even by persons lacking previous RF design experience. This conserves valuable engineering resources and greatly reduces the product's time to market. Once in production, Linx RF modules improve yields, reduce placement costs, and eliminate the need for testing or adjustment. LC Series - Low-Cost Ultra-Compact RF Data Module The LC Series is ideally suited for volume use in OEM applications, such as remote control, security, identification, and periodic data transfer. Packaged in a compact SMD package, the LC modules utilize a highly optimized SAW architecture to achieve an unmatched blend of performance, size, efficiency and cost. Quantity TX RX-P* RX-S • Complete RF TX/RX solution <200 $5.60 $11.80 $10.90 • Ultra-compact size • Low cost in volume 200-999 $4.90 $10.65 $9.85 • High-performance SAW 1,000-4,999 $4.38 $9.50 $8.90 architecture >5000 Call Call Call • Direct serial interface • Low power consumption Part #’s Description • 5kbps maximum data rate TXM-***-LC LC Series Transmitter • >300ft. range RXM-***-LC-P LC Series Receiver Pinned SMD • No production tuning RXM-***-LC-S LC Series Receiver Compact SMD • No external components =315, 418, 433MHz 418MHz Standard RX-S *** required (except antenna) * = -P version not recommended for new designs • Wide temperature range RX-P LR Series - Long Range, Low Cost RF Data Module NEW The LR Series provides a 5-10 times range improvement over previous discrete and modular solutions and establishes a new benchmark for range performance and cost effectiveness within our product line.
    [Show full text]
  • Amateur Computer Group of New Jersey NEWS Volume 39, Number 01 January 2014
    Amateur Computer Group of New Jersey NEWS Volume 39, Number 01 January 2014 Main Meeting/Election Report ACGNJ Meetings Brenda Bell, ACGNJ For the very latest news on ACGNJ meetings, please On December 6, 2013, we held our Annual Business visit the ACGNJ Website (www.acgnj.org). Meeting, with 8 persons attending. Having reached a Board of Directors Meeting: December 31, 7:00 PM quorum, the meeting was called to order at 9:09 PM. MOVED to Friday, January 3, 7:00 PM. Mike Redlich presented a President's Report. (Due to the New Year's Holiday) Malthi Masurekar presented a Treasurer's Report. Board of Directors Meeting: Friday, Jan 3, 7:00 PM Several topics were raised for discussion, including Mike Redlich (president (at) acgnj.org) membership issues and outreach to other clubs. Main Meeting: Friday, January 3. 8:00 PM Election results. Without discussion, and with no Mike Redlich (president (at) acgnj.org) additional candidates being nominated for our two Lunics (Linux/UNIX): Monday, January 6, 8:00 PM still open Director positions, John Raff moved that Andreas Meyer (lunics (at) acgnj.org) the Secretary cast one vote for the pat slate. The Investing: Thursday, January 9, 8:00 PM motion was seconded and carried. Jim Cooper (jim (at) thecoopers.org). President: Michael Redlich NJ Gamers: Friday, January 10, 6:00 PM Vice-President: Wendy Bell Gregg McCarthy (greggmajestic (at) gmail.com) Secretary: Brenda Bell Treasurer: Malthi Masurekar Layman’s Forum: Monday, January 13, 8:00 PM Directors (Two year term, through end of 2015): Matt Skoda (som359 (at) gmail.com) Gregg McCarthy Java: Tuesday, January 14, 7:30 PM John Raff Mike Redlich (mike (at) redlich.net) Frank Warren Window Pains: Friday, January 17, 7:00 PM Directors (From last year, through end of 2014): !!!WARNING!!! This meeting will NOT be held in Bob Hawes our usual location.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow
    Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow To cite this version: Ricci Ieong, Kam-Pui Chow. Validation Rules for Enhanced Foxy P2P Network Investigations. 10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73- 83, 10.1007/978-3-662-44952-3_6. hal-01393761 HAL Id: hal-01393761 https://hal.inria.fr/hal-01393761 Submitted on 8 Nov 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Chapter 6 VALIDATION RULES FOR ENHANCED FOXY P2P NETWORK INVESTIGATIONS Ricci Ieong and Kam-Pui Chow Abstract Experiments with the Foxy P2P network have demonstrated that the first uploader of a file can be identified when search queries are sub- mitted to all the network nodes during initial file sharing. However, in real Foxy networks, file search queries are not transmitted to the entire Foxy network and this process may not identify the first uploader. This paper presents a set of validation rules that validate the observed first uploader. The validation rules define the seeder curve that consistently describes the number of uploaders over time.
    [Show full text]
  • MATLAB Creating Graphical User Interfaces  COPYRIGHT 2000 - 2004 by the Mathworks, Inc
    MATLAB® The Language of Technical Computing Creating Graphical User Interfaces Version 7 How to Contact The MathWorks: www.mathworks.com Web comp.soft-sys.matlab Newsgroup [email protected] Technical support [email protected] Product enhancement suggestions [email protected] Bug reports [email protected] Documentation error reports [email protected] Order status, license renewals, passcodes [email protected] Sales, pricing, and general information 508-647-7000 Phone 508-647-7001 Fax The MathWorks, Inc. Mail 3 Apple Hill Drive Natick, MA 01760-2098 For contact information about worldwide offices, see the MathWorks Web site. MATLAB Creating Graphical User Interfaces COPYRIGHT 2000 - 2004 by The MathWorks, Inc. The software described in this document is furnished under a license agreement. The software may be used or copied only under the terms of the license agreement. No part of this manual may be photocopied or repro- duced in any form without prior written consent from The MathWorks, Inc. FEDERAL ACQUISITION: This provision applies to all acquisitions of the Program and Documentation by, for, or through the federal government of the United States. By accepting delivery of the Program or Documentation, the government hereby agrees that this software or documentation qualifies as commercial computer software or commercial computer software documentation as such terms are used or defined in FAR 12.212, DFARS Part 227.72, and DFARS 252.227-7014. Accordingly, the terms and conditions of this Agreement and only those rights specified in this Agreement, shall pertain to and govern the use, modification, reproduction, release, performance, display, and disclosure of the Program and Documentation by the federal government (or other entity acquiring for or through the federal government) and shall supersede any conflicting contractual terms or conditions.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Contrôles De Conformité Nessus Audit Des Configurations Et Du Contenu Du Système 14 Janvier 2014 (Révision 74)
    Contrôles de conformité Nessus Audit des configurations et du contenu du système 14 janvier 2014 (Révision 74) Table des matières Introduction ......................................................................................................................................... 4 Prérequis ...................................................................................................................................................... 4 Clients de Nessus et de SecurityCenter .................................................................................................... 4 Normes et conventions ............................................................................................................................... 4 Normes de conformité ................................................................................................................................. 5 Audits de configuration, fuites de données et conformité ....................................................................... 6 Qu'est-ce qu'un audit ? .............................................................................................................................. 6 Audit et scan des vulnérabilités .................................................................................................................. 6 Exemples d'éléments d'audit ...................................................................................................................... 6 Windows ....................................................................................................................................................................
    [Show full text]
  • An Improved Method to Determine the Antenna Factor Wout Joseph and Luc Martens, Member, IEEE
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Ghent University Academic Bibliography 252 IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 54, NO. 1, FEBRUARY 2005 An Improved Method to Determine the Antenna Factor Wout Joseph and Luc Martens, Member, IEEE Abstract—In this paper, we present an improved method to de- [5] and [6]. These methods make use of tabulated values of termine the antenna factor of three antennas. Instead of using a the maximum field strength for frequencies below 1000 MHz. reflecting ground plane we use absorbers. Destructive interference An advantage of our method is that it is applicable for both E- between the direct beam and the residual reflected beam from the absorbers is avoided by splitting the measured frequency range and H-field probes. For the calibration of loop antennas, two in bands and changing the distance between the two antennas de- methods are described in [7]. The first method is based on cal- pending on the frequency band. Furthermore, this method is ap- culation of the loop impedances. The second method is by gen- plicable for both E- and H-field probes. Our method has also the erating a well-defined standard magnetic field. The first method advantage of being low-cost: The method does not need to be per- cannot be used because the geometric shape of the split-shield formed in an anechoic chamber to obtain high accuracy. To take the residual reflections of the environment into account, we perform a loop probes is not simple.
    [Show full text]